Policy Syntax

Policy Content

A fine-grained policy consists of the policy version (the Version field) and statement (the Statement field).

Example Policies

Authentication Process

IAM authenticates users according to the permissions granted to the users. The following diagram shows the authentication process.

Figure 1 Authentication process

The actions in each policy bear the OR relationship.

  1. A user accesses the system and initiates an operation request.
  2. The system evaluates all the permissions policies assigned to the user.
  3. The system looks for explicit Deny permissions in these policies. If the system finds an explicit Deny that applies, it returns a decision of Deny, and the authentication ends.
  4. If no explicit Deny is found, the system looks for Allow permissions that would apply to the request. If the system finds an explicit Allow permission that applies, it returns a decision of Allow, and the authentication ends.
  5. If no explicit Allow permission is found, the system returns a decision of Deny, and the authentication ends.