IBM Cloud Docs
Managing IAM access for IBM Cloud Logs Routing

Managing IAM access for IBM Cloud Logs Routing

IBM Cloud Logs Routing permissions cannot be assigned using the IAM UI. Use the CLI or API to assign permissions.

Access to IBM® Cloud Logs Routing service instances for users in your account is controlled by IBM Cloud® Identity and Access Management (IAM). Every user that accesses the IBM Cloud Logs Routing service in your account must be assigned an access policy with an IAM role. Review the following roles, actions, and more to help determine the best way to assign access to IBM Cloud Logs Routing.

The access policy that you assign users in your account determines what actions a user can do within the context of the service or specific instance that you select. The allowable actions are customized and defined by the IBM Cloud Logs Routing as operations that are allowed to be done on the service. Each action is mapped to an IAM platform or service role that you can assign to a user. IAM access policies enable access to be granted at different levels.

When assigning roles, select the appropriate IAM role based on the actions you need to perform within IBM Cloud Logs Routing. See IAM actions by task for more information.

For an example of how assign Manager roles using the IBM Cloud CLI, see Setting up permissions for managing tenants by using the CLI.

If a specific role and its actions don't meet the needs of the use case that you're looking to address, you can create a custom role and pick the actions to include.

Managing access by using access groups

An access group can be created to organize a set of users, service IDs, and trusted profiles into a single entity that makes it easy for you to assign access. You can assign a single policy to the group instead of assigning the same access multiple times for an individual user or service ID.

Access groups are assigned policies that grant roles and permissions to the members of that group. Members of an access group can include multiple identity types, like users, service IDs, and trusted profiles. The members inherit the policies, roles, and permissions that are assigned to the access group, and also keep the roles that they are assigned individually.

For more information, see Setting up access groups.

To manage access or assign new access for users by using access groups, you must be the account owner, administrator, or editor on all Identity and Access enabled services in the account. Or, you can be the assigned administrator or editor for the IAM Access Groups Service.

Choose any of the following actions to manage access groups in the IBM Cloud:

To get up and running quickly with IAM by setting up access groups for quick access assignments, inviting users to your account, and managing their access, see Assigning access to resources by using access groups.

Configuring Trusted Profiles

When using Trusted Profiles for authentication, it's important that the Compute Resource is configured with the correct values. If necessary, follow the steps below to add or update the 'Compute Resource' in your Trusted Profile:

Adding or Updating Compute Resource:

  1. Navigate to the IBM Cloud console and click on Manage > Access (IAM).

  2. Select Trusted Profiles from the menu.

  3. Open your trusted profile and go to the Compute Resource section. A list where you can edit existing conditions or create new ones is displayed.

    • Choose the appropriate Service Type.
    • Add the condition Namespace to ibm-observe.

    These condition values match the default configuration for agent installation. If agent configuration values have been modified or additional conditions are required, ensure to configuration values accordingly.

Managing access by assigning policies directly to users or service IDs

To assign user's access to resources you must be an administrator on all services in the account, or the assigned administrator for the particular service or service instance. To assign access to a service ID, you must be administrator on the identity service or the specific service ID.

Choose any of the following actions to manage access for users or service IDs by using IAM policies:

IAM actions by task

Review the available platform and service roles that are available, and the actions that are mapped to each to help you assign access.

Table 1. IAM platform roles for IBM® Cloud Logs Routing
Action IAM action Administrator Editor Operator Viewer
View console logs-router.dashboard.view Yes Yes Yes No
Table 2. IAM service roles for IBM® Cloud Logs Routing
Action IAM action Manager Writer Reader
Create (onboard) a tenant logs-router.tenant.create Yes No No
Delete (offboard) a tenant logs-router.tenant.delete Yes No No
Edit (update) the configuration of a tenant logs-router.tenant.update Yes No No
View the configuration of a tenant logs-router.tenant.read No No Yes
Send log data logs-router.event.send No Yes No

Reference information

About service IDs

A service ID identifies a service or application similar to how a user ID identifies a user. Service IDs are used to connect an application inside or outside of IBM Cloud® to an IBM Cloud® service. Service ID API keys inherit all access that is assigned to the specific service ID.

You can assign specific access policies to the service ID that restrict permissions for using specific services, or even combine permissions for accessing different services. Since service IDs are not tied to a specific user, if a user leaves an organization and is deleted from the account, the service ID remains. This way, your application or service stays up and running.

For more information, see Creating and working with service IDs.

About trusted profiles

You can use trusted profiles to:

  • Grant different IBM Cloud® identities access to resources in your account
  • Automatically grant federated users access to your account with conditions based on SAML attributes from your corporate directory.
  • Set up fine-grained authorization for applications that are running in compute resources. This way, you aren't required to create service IDs or API keys for the compute resources.
  • Establish trust with IBM Cloud® services or service IDs in another account to grant cross-account access.

Choose any of the following actions to manage trusted profiles in the IBM Cloud: