Customizing IAM settings for an enterprise
Customize the IAM settings for all of the accounts in your enterprise to meet compliance and internal standards. You can centrally manage IAM settings like API key creation, authentication, and active sessions for new and existing accounts with enterprise-managed settings templates.
The tutorial uses a fictitious company that's called Example Corp, which set up an enterprise with the following structure. As you complete the tutorial, adapt each step to match your organization's security setting requirements.
Before you begin
Read How enterprise-managed IAM access works and Creating enterprise-managed settings templates to learn the basics of enterprise-managed IAM.
Verify that you have the required access in an Enterprise account, which is the root account from which you assign IAM templates to child accounts. To create IAM templates, you must have the Template Administrator role on All IAM Account Management services. To assign IAM templates to child accounts, you must have the Template Assignment Administrator role on All IAM Account Management services and the Viewer role or higher on the Enterprise service.
New and existing accounts in your enterprise must turn on the Enterprise-managed IAM setting to be eligible for IAM template assignments. For more information, see Opting in to enterprise-managed IAM.
Create the settings template
Settings templates are created in the Enterprise account. The versions of only one setting template can be assigned in an enterprise. Create two versions of the same template to assign to account groups that have different account security requirements.
-
In the IBM Cloud® console, go to Manage > Access (IAM) > Templates.
-
Click IAM settings > Create.
-
Enter the name of the settings template, such as AccountSecuritySettings, to identify the settings template in your enterprise account.
-
Enter a description for this version of the template. For example, let's say
v1
is for the Development department account group. Your description might include the department name, level of multifactor authentication that is required, and other settings that you define in the template.The template name is consistent across versions, while the description can be unique to differentiate between versions and their purpose.
-
Click Create.
-
Click Account.
- Allow developers to create API keys by leaving the setting API key creation cleared.
- Restrict developers from creating service IDs by enabling the setting Service ID creation.
- Restrict the IP addresses that developers can use to access their accounts by entering the IP addresses that the Development department uses. This way, attempts to access the Development accounts outside of this list are blocked.
-
Click Authentication.
- Select MFA for a user with or without an IBMid > U2F MFA. Use the highest level of MFA for developers because they have high levels of access to critical resources.
-
Click Login session.
- Configure Active sessions to 12 hours to make sure the users are logging in at least once during their work day.
- Configure the Sign out due to inactivity setting to 30 minutes to make sure that idle sessions require reauthentication within this time limit.
Your configuration is saved automatically.
Any settings that aren't defined in the template can be managed by the child account. Before you can create the second version, review and commit v1
by completing the following steps.
- Click Review.
- Verify that the settings template is configured to your expectation.
- Click the checkbox to confirm that you can't edit the version.
- Click Commit.
Create the second version
Create another version of the settings template for the Marketing and Sales department groups. These departments don't have as much access to resources as developers, so they don't need the same strict settings as the Development department groups.
- In the IBM Cloud console, go to Manage > Access (IAM) > Templates.
- Click IAM settings and select the AccountSecuritySettings template.
- Click the New version icon .
- Enter the Marketing and Sales department in the description, the level of multifactor authentication that is required, and other settings that you define in the template.
- Click Create.
- Click Account.
- Don't allow the Marketing and Sales department users to create API keys by enabling the setting that restricts API key creation.
- Don't allow the Marketing and Sales department users to create service IDs by enabling the setting that restricts Service ID creation.
- Restrict the IP addresses that Marketing and Sales department users can use to access their accounts by entering the IP addresses that they use. This way attempts to access the Marketing and Sales accounts outside of this list are blocked.
- Click Authentication.
- Select MFA for a user with or without an IBMid > TOTP MFA. Use the middle level of MFA for marketing and sales to protect the resources in those accounts.
- Click Review.
- Verify that the settings template is configured to your expectation.
- Click the checkbox to confirm that you can't edit the version.
- Click Commit.
- Click the Templates breadcrumb to go back to the list of IAM settings templates.
Now, you're ready to assign both v1
and v2
to their corresponding account groups.
Assign versions to account groups
Assign v1
to the Development account group and v2
to the Marketing and Sales account groups. When you assign a template to an account group, accounts that you move into the account group or new accounts that you create
in the group inherit the settings template automatically.
Assign v1
to the Development group
- In the IBM Cloud console, go to Manage > Access (IAM) > Templates.
- Click IAM settings.
- Go to the AccountSecuritySettings template and click the Table expand icon .
- Click
v1
of the AccountSecuritySettings template. - Click Assign accounts.
- Select the Development account group.
- Click Assign accounts.
After the IAM settings template is assigned, you are directed to the Assignment reports. From here, you can view the assignment details and manage where v1
of the template is assigned.
Assign v2
to the Marketing and Sales group
- Click the Versions icon and select
v2
of the AccountSecuritySettings template. - Click Assign accounts.
- Select the Marketing and Sales account groups.
- Click Assign accounts.
After the IAM settings template is assigned, you are directed to the Assignment reports. From here, you can view the assignment details and manage where v2
of the template is assigned.
Next steps
Now that you learned how to set up accounts in your enterprise that are customized consistently, you can continue to add accounts and account groups as your teams and cloud workloads grow. For more information, see Creating enterprise-managed settings templates.