IBM Cloud Docs
Managing user access

Managing user access

IBM Cloud Hyper Protect Crypto Services supports a centralized access control system, which is governed by IBM Cloud® Identity and Access Management, to help you manage users and access for your encryption keys.

Roles and permissions

The following table shows the roles that Hyper Protect Crypto Services supports.

Table 1. Roles and permissions
Roles Permissions
Service administrator Manages platform access and service access, grants access to keys, creates and deletes service instances, and manages keys. An IBM Cloud account owner is automatically assigned the service administrator permission.
Crypto unit administrator Provides signature keys, and signs Trusted Key Entry (TKE) administrative commands such as for adding another crypto unit administrator. In some cases, a crypto unit administrator can also be a master key custodian.
Master key custodian Provides master key parts for initializing a service instance. In some cases, a master key custodian can also be a crypto unit administrator.
Certificate administrator Sets up and manages administrator signature keys and client certificates to enable the second layer of TLS authentication in GREP11 or PKCS #11 API connections. The administrator needs to be assigned the Certificate Manager IAM service access role to perform the corresponding actions.
Service user Manages root keys and standard keys through user interface and the API, and performs cryptographic operations through the PKCS #11 API or the Enterprise PKCS #11 over gRPC (GREP11) API. Based on the platform access roles and service access roles, service users can be further categorized with various permissions.

The following diagram illustrates the roles and permissions.

Hyper Protect Crypto Services roles
Figure 1. Hyper Protect Crypto Services roles and responsibilities

IAM platform access roles

With Cloud Identity and Access Management (IAM), you, as an account owner or a service administrator, can manage and define access for service users and resources in your IBM Cloud account.

To simplify access, Hyper Protect Crypto Services aligns with IAM roles so that each user has a different view of the service, according to the role the user is assigned. If you are a service administrator, you can assign Cloud IAM roles that correspond to the specific Hyper Protect Crypto Services permissions you want to grant to members of your team.

The following table lists the IBM Cloud IAM roles in the context of Hyper Protect Crypto Services. For complete IAM documentation and how to assign access, see Managing access in IBM Cloud.

Use IBM Cloud platform access roles to grant permissions at the account level, such as the ability to create or delete instances in your IBM Cloud account.

Table 2. Lists platform management roles as they apply to Hyper Protect Crypto Services
Action Viewer Editor Operator Administrator
View Hyper Protect Crypto Services instances. checkmark icon checkmark icon checkmark icon checkmark icon
Create Hyper Protect Crypto Services instances. checkmark icon checkmark icon
Delete Hyper Protect Crypto Services instances. checkmark icon checkmark icon
Invite new users and manage access policies. checkmark icon

If you're an account owner, you are automatically assigned Administrator platform access to your Hyper Protect Crypto Services service instances so you can further assign roles and customize access policies for others.

IAM service access roles

As a service administrator, use the service access roles to grant permissions of service users at the service level, such as the ability to view, create, or delete Hyper Protect Crypto Services keys.

  • As a Reader, you can browse a high-level view of keys and use keys to perform wrap and unwrap actions. Readers cannot create, modify, or delete keys.
  • As a ReaderPlus, you have the same permissions as a Reader, with the additional ability to retrieve a standard key's material.
  • As a Writer, you can create, modify, rotate, and use keys. Writers cannot delete or disable keys.
  • As a Manager, you can perform all actions that a Reader, ReaderPlus and Writer can perform, including the ability to delete keys and set policies for keys. Managers cannot purge keys.
  • As a VMware KMIP Manager, you can configure KMIP for VMware with Hyper Protect Crypto Services to enable encryption with your own root keys.
  • As a KMS Key Purge role, you can purge a deleted key to permanently remove a key from your instance.
  • As a Certificate Manager role, you can manage administrator signature keys and client certificates for the second layer of authentication in GREP11 or PKCS #11 API connections.

The following table shows how service access roles map to Hyper Protect Crypto Services permissions. IAM roles are the default roles provided. Custom roles can be defined by the user.

  • Trusted Key Entry (TKE) uses either smart cards or software CLI plug-in with IAM authentication. Commands that deals with managing keys locally on the smart card or CLI are not included. Those commands do not interact with the HSM domain.
  • The key management service API is used for envelope encryption and deals with root keys that are used by IBM Cloud services for encrypting data-at-rest.
  • HSM APIs (the PKCS #11 API and the GREP11 API) are used for application-level encryption.
  • Key Management Interoperability Protocol (KMIP) adapter is used to configure the KMIP for VMware service with Hyper Protect Crypto Services to enable vSphere encryption or vSAN encryption by using your own root keys.
  • Certificate Manager Server receives and processes requests for setting up certificate administrator signature keys and client certificates to enable the second layer of authentication in GREP11 or PKCS #11 API connections.
Table 3. Lists service access roles as they apply to Hyper Protect Crypto Services TKE commands
Action Reader ReaderPlus Writer Manager Crypto unit administrator
TKE view state: ibmcloud tke cryptounit-admins,ibmcloud tke cryptounit-compare,ibmcloud tke cryptounit-thrhlds,ibmcloud tke cryptounit-mk. checkmark icon
TKE set context: ibmcloud tke-cryptounit-add, ibmcloud tke-cryptounit-rm. checkmark icon
TKE admin add or remove: ibmcloud tke cryptounit-admin-add, ibmcloud tke cryptounit-admin-rm. checkmark icon checkmark icon
TKE Set Admin Quorum Threshold: ibmcloud tke -cryptounit-thrhld-set. checkmark icon checkmark icon
TKE Master Key operations (load, rotate, clear, zeroize, recover): ibmcloud tke cryptounit-mk-*, ibmcloud tke auto-init, ibmcloud tke auto-mk-rotate, ibmcloud tke auto-recover. checkmark icon checkmark icon
Table 4. Lists service access roles as they apply to Hyper Protect Crypto Services key resources
Action Reader ReaderPlus Writer Manager KMS Key Purge
Create a key. checkmark icon checkmark icon
Import a key. checkmark icon checkmark icon
Retrieve a key. checkmark icon checkmark icon checkmark icon
Retrieve key metadata. checkmark icon checkmark icon checkmark icon checkmark icon
Retrieve key total. checkmark icon checkmark icon checkmark icon checkmark icon
List keys. checkmark icon checkmark icon checkmark icon checkmark icon
Wrap a key. checkmark icon checkmark icon checkmark icon checkmark icon
Unwrap a key. checkmark icon checkmark icon checkmark icon checkmark icon
Rewrap a key. checkmark icon checkmark icon checkmark icon checkmark icon
Patch a key. checkmark icon
Rotate a key. checkmark icon checkmark icon
Disable a key. checkmark icon
Enable a key. checkmark icon
Schedule deletion for a key. checkmark icon checkmark icon
Cancel deletion for a key. checkmark icon checkmark icon
Delete a key. checkmark icon
Purge a key. checkmark icon
Restore a key. checkmark icon
Set key policies. checkmark icon
List key policies. checkmark icon
Set instance policies. checkmark icon
List instance policies. checkmark icon
Create an import token. checkmark icon checkmark icon
Retrieve an import token. checkmark icon checkmark icon
Create a registration.1 checkmark icon checkmark icon checkmark icon checkmark icon
List registrations for a key. checkmark icon checkmark icon checkmark icon checkmark icon
List registrations for any key. checkmark icon checkmark icon checkmark icon checkmark icon
Update a registration.1 checkmark icon checkmark icon checkmark icon checkmark icon
Replace a registration.1 checkmark icon checkmark icon checkmark icon checkmark icon
Delete a registration.1 checkmark icon checkmark icon checkmark icon checkmark icon
Create a key ring. checkmark icon checkmark icon
List key rings. checkmark icon checkmark icon checkmark icon checkmark icon
Delete a key ring. checkmark icon
Create a key alias. checkmark icon checkmark icon
Delete a key alias. checkmark icon

1: This action is performed on your behalf by an integrated service that enables support for key registration. Learn more.

Table 5. Lists service access roles as they apply to HSM APIs
Action Reader ReaderPlus Writer Manager
Get mechanism list and information checkmark icon checkmark icon checkmark icon checkmark icon
Create or delete keystore checkmark icon
List keystores checkmark icon
Generate key checkmark icon checkmark icon
Generate key pair checkmark icon checkmark icon
Store key checkmark icon checkmark icon
Generate random checkmark icon checkmark icon checkmark icon checkmark icon
List keys checkmark icon checkmark icon checkmark icon checkmark icon
Get or set key attribute checkmark icon checkmark icon checkmark icon checkmark icon
Wrap key checkmark icon checkmark icon checkmark icon checkmark icon
Rewrap key checkmark icon checkmark icon checkmark icon checkmark icon
Unwrap key checkmark icon checkmark icon checkmark icon checkmark icon
Update key checkmark icon checkmark icon checkmark icon checkmark icon
Encrypt checkmark icon checkmark icon checkmark icon checkmark icon
Decrypt checkmark icon checkmark icon checkmark icon checkmark icon
Sign checkmark icon checkmark icon checkmark icon checkmark icon
Verify checkmark icon checkmark icon checkmark icon checkmark icon
Digest checkmark icon checkmark icon checkmark icon checkmark icon
Table 6. Lists service access roles as they apply to KMIP adapters connected to Hyper Protect Crypto Services
Action Reader ReaderPlus Writer Manager VMware KMIP Manager
Activate KMIP endpoint. checkmark icon
Deactivate KMIP endpoint. checkmark icon
Get status of KMIP endpoint. checkmark icon
Add client certificates to KMIP endpoint for usage of mutual TLS. checkmark icon
Delete client certificates from KMIP endpoint for usage of mutual TLS. checkmark icon
Table 8. Lists service access roles as they apply to Certificate Manager
Action Reader ReaderPlus Writer Manager Certificate Manager
Create the administrator signature key. checkmark icon
Refresh and update the administrator signature key. checkmark icon
Retrieve the administrator signature key of the certificate administrator. checkmark icon
Delete the administrator signature key of the certificate administrator. checkmark icon
Create or update the client certificates. checkmark icon
List all client certificates that are managed by the certificate administrator. checkmark icon
Retrieve client certificates. checkmark icon
Delete client certificates. checkmark icon

Managing access to multiple instances

If you have multiple Hyper Protect Crypto Services instances in different accounts, you might need to leverage IBM Cloud enterprises to manage accounts and user access.

  1. Create the enterprise hierarchy

    With IBM Cloud enterprises, you can centrally manage multiple accounts and resources. You can create an enterprise hierarchy as needed by nesting account groups or accounts within the enterprise account. The access management to the enterprise and the child accounts is isolated to provide greater security. To learn how to create an enterprise and add accounts to an enterprise, see Best practices for organizing resources and assigning access.

  2. Organize account resources in resource groups

    Hyper Protect Crypto Services instances are associated with child accounts of the enterprise. Within each account, you can organize service instances in resource groups so that you can assign different access policies to each resource group to enable independent access control. For how to create resource groups and organize resources, see Best practices for organizing resources.

  3. Assign access to manage the enterprise and resources

    Based on the Hyper Protect Crypto Services IAM platform roles and service roles that are listed, you can assign users respective access to each tier of the enterprise hierarchy. You can also group users or service IDs by defining access groups to streamline the process of assigning access. For more information about assigning access, Access management in the cloud.

  4. Use IBM Cloud API keys

    You can create IBM Cloud API keys for users or services to track and control API usage. The user API key is associated with the user identity and inherits all access that the user is assigned. The service API key is granted the access that is associated with a specific service ID. API keys can also be used to generate IAM tokens for API calls authentication. For how to manage API keys, see Managing user API keys and Managing service ID API keys.

The following example shows how to use the enterprise to manage multiple instances and user access. Assume that your organization has two Hyper Protect Crypto Services instances for development and production, and two separate teams are managing and operating these instances. you can create the following enterprise hierarchy to better manage accounts, instances, and user access:

An example of the enterprise hierarchy and user access management
Figure 2. An example of the enterprise hierarchy and user access management

  • Use separate accounts and distinct resource groups to manage instances for development purpose and production purpose.
  • Assign users the minimum access to the corresponding resources. For example, assign the enterprise managers the administrator role for accounts and billing management. Assign the developer team members the editor and manager roles for performing operations toward the development instance. Assign other members the viewer and reader role for viewing only instance resources.

What's next

Account owners and admins can invite users and set service policies that correspond to the Hyper Protect Crypto Services actions the users can perform. For more information about assigning user roles, see Managing access to resources.