Utilizamos cookies propias y de terceros para mejorar su experiencia y nuestros servicios, identificando sus preferencias de navegación por Internet en nuestro sitio web. Si continúa navegando, consideramos que acepta el uso. Puede encontrar más información en nuestra Política de cookies.

Telefonica Background

IAM provides the following functions

  • Centrally controls user security certificates.
  • Controls the creation, rotation, and revocation of Open Cloud service  access security credentials (for example, access key) of each user.
  • Centrally controls user access policies.
  • Controls user access policies in the Open Cloud service system. The policies include setting an ACL to restrict malicious access of non-trusted networks and disabling certain insecure users to access the Open Cloud service system.
  • Provides permissions based on user groups.
  • The IAM service restricts the Open Cloud service access permissions of users based on their responsibilities, such as administrator and R&D engineer. When a user accesses a website, you are able to easily update the Open Cloudservice access permissions of the user to reflect the change in the role.
  • If hardware fails, key services take time to repair and seriously affect the normal business operations of users. IAM uses layered hot redundancy protection, which allows key services to automatically switch over and restore services in the event of a hardware failure.
Category Feature Description
Public cloud resource security management

Security certificate management The security key of each user can be created in and deleted from the Open Cloud. Users are allowed to use their security keys to access cloud resources through the opened APIs.
User access policy management An enterprise administrator is able to set ACL rules for users accessing cloud resources.
User rights management An enterprise administrator is able to set cloud resource operation rights of users based on their responsibilities.