Managing IAM access for IBM Cloud Logs Routing
IBM Cloud Logs Routing permissions cannot be assigned using the IAM UI. Use the CLI or API to assign permissions.
Access to IBM® Cloud Logs Routing service instances for users in your account is controlled by IBM Cloud® Identity and Access Management (IAM). Every user that accesses the IBM Cloud Logs Routing service in your account must be assigned an access policy with an IAM role. Review the following roles, actions, and more to help determine the best way to assign access to IBM Cloud Logs Routing.
The access policy that you assign users in your account determines what actions a user can do within the context of the service or specific instance that you select. The allowable actions are customized and defined by the IBM Cloud Logs Routing as operations that are allowed to be done on the service. Each action is mapped to an IAM platform or service role that you can assign to a user. IAM access policies enable access to be granted at different levels.
When assigning roles, select the appropriate IAM role based on the actions you need to perform within IBM Cloud Logs Routing. See IAM actions by task for more information.
For an example of how assign Manager
roles using the IBM Cloud CLI, see Setting up permissions for managing tenants by using the CLI.
If a specific role and its actions don't meet the needs of the use case that you're looking to address, you can create a custom role and pick the actions to include.
Managing access by using access groups
An access group can be created to organize a set of users, service IDs, and trusted profiles into a single entity that makes it easy for you to assign access. You can assign a single policy to the group instead of assigning the same access multiple times for an individual user or service ID.
Access groups are assigned policies that grant roles and permissions to the members of that group. Members of an access group can include multiple identity types, like users, service IDs, and trusted profiles. The members inherit the policies, roles, and permissions that are assigned to the access group, and also keep the roles that they are assigned individually.
For more information, see Setting up access groups.
To manage access or assign new access for users by using access groups, you must be the account owner, administrator, or editor on all Identity and Access enabled services in the account. Or, you can be the assigned administrator or editor for the IAM Access Groups Service.
Choose any of the following actions to manage access groups in the IBM Cloud:
To get up and running quickly with IAM by setting up access groups for quick access assignments, inviting users to your account, and managing their access, see Assigning access to resources by using access groups.
Configuring Trusted Profiles
When using Trusted Profiles for authentication, it's important that the Compute Resource
is configured with the correct values. If necessary, follow the steps below to add or update the 'Compute Resource' in your Trusted Profile:
Adding or Updating Compute Resource:
-
Navigate to the IBM Cloud console and click on Manage > Access (IAM).
-
Select Trusted Profiles from the menu.
-
Open your trusted profile and go to the
Compute Resource
section. A list where you can edit existing conditions or create new ones is displayed.- Choose the appropriate Service Type.
- Add the condition
Namespace
toibm-observe
.
These condition values match the default configuration for agent installation. If agent configuration values have been modified or additional conditions are required, ensure to configuration values accordingly.
Managing access by assigning policies directly to users or service IDs
To assign user's access to resources you must be an administrator on all services in the account, or the assigned administrator for the particular service or service instance. To assign access to a service ID, you must be administrator on the identity service or the specific service ID.
Choose any of the following actions to manage access for users or service IDs by using IAM policies:
- To grant permissions, see Assigning access.
- To revoke permissions, see Removing access.
- To review assigned permissions, see Reviewing your assigned access.
IAM actions by task
Review the available platform and service roles that are available, and the actions that are mapped to each to help you assign access.
Action | IAM action | Administrator | Editor | Operator | Viewer |
---|---|---|---|---|---|
View console | logs-router.dashboard.view |
Yes | Yes | Yes | No |
Action | IAM action | Manager | Writer | Reader |
---|---|---|---|---|
Create (onboard) a tenant | logs-router.tenant.create |
Yes | No | No |
Delete (offboard) a tenant | logs-router.tenant.delete |
Yes | No | No |
Edit (update) the configuration of a tenant | logs-router.tenant.update |
Yes | No | No |
View the configuration of a tenant | logs-router.tenant.read |
No | No | Yes |
Send log data | logs-router.event.send |
No | Yes | No |
Reference information
About service IDs
A service ID identifies a service or application similar to how a user ID identifies a user. Service IDs are used to connect an application inside or outside of IBM Cloud® to an IBM Cloud® service. Service ID API keys inherit all access that is assigned to the specific service ID.
You can assign specific access policies to the service ID that restrict permissions for using specific services, or even combine permissions for accessing different services. Since service IDs are not tied to a specific user, if a user leaves an organization and is deleted from the account, the service ID remains. This way, your application or service stays up and running.
For more information, see Creating and working with service IDs.
- Creating a service ID.
- Updating a service ID.
- Deleting a service ID.
- To avoid a situation where your service ID is deleted causing an outage or disruption for the users of your service, you have the option to lock your service ID. Locking a service ID also prevents any policies from being changed, deleted, or assigned. For more information, see Locking a service ID.
About trusted profiles
You can use trusted profiles to:
- Grant different IBM Cloud® identities access to resources in your account
- Automatically grant federated users access to your account with conditions based on SAML attributes from your corporate directory.
- Set up fine-grained authorization for applications that are running in compute resources. This way, you aren't required to create service IDs or API keys for the compute resources.
- Establish trust with IBM Cloud® services or service IDs in another account to grant cross-account access.
Choose any of the following actions to manage trusted profiles in the IBM Cloud:
- To create a trusted profile, see Creating trusted profiles.
- To update a trusted profile, see Updating trusted profiles.
- To delete a trusted profile, see Removing a trusted profile.