You can use IAM for fine-grained permissions control for your Cloud Eye resources. With IAM, you can:
If your account does not require individual IAM users, skip this topic.
This topic describes the procedure for granting permissions (see Figure 1).
You have learned about the system policies of Cloud Eye before assigning the preset Cloud Eye permissions to user groups (if needed). To grant custom permissions to a user group, ensure that you have created a custom Cloud Eye policy.
For details about the system policies supported by Cloud Eye and the comparison between these policies, see Permissions.
Create a user group on the IAM console, and attach the CES Administrator, Tenant Guest, and Server Administrator policies to the group.
Log in to the Cloud Eye console as the created user, and verify that the user only has the CES Administrator permissions. After you log in to the Cloud Eye console and use related functions, if no authentication failure message is displayed, the authorization is successful.