Impossible Cloud Documentation
  • Company overview
    • What is Impossible Cloud
  • Getting Started
    • Getting Started with Impossible Cloud Storage
      • Setting up
      • Next steps
      • Getting support
  • Feature Release Notes
    • 29th April 2025
  • Impossible cloud storage Guide
    • Storage Console URLs and API Endpoints
    • Storage Console
      • Accessing the console
        • Signing up for Impossible Cloud Storage
        • Signing in to Impossible Cloud Storage
        • Session lifetime limits
      • Interacting with the console
        • Navigating the menu
        • Using the panel
    • Buckets and Objects
      • Creating a bucket
      • Storing objects in a bucket
      • Interacting with objects
      • Creating folders in a bucket
      • Interacting with folders and buckets
      • Public File Sharing via URLs
      • Emptying a Bucket
      • Limitations
      • Versioning and object lock
        • Enabling versioning
        • Using versioning
        • Enabling object lock
        • Using object lock
    • Access keys
    • CLI User Guide
      • AWS CLI installation instructions
      • AWS CLI configuration
      • Using Impossible Cloud with AWS CLI
      • AWS CLI basic commands
      • AWS CLI advanced commands
        • Examples
      • AWS CLI for cloud-to-cloud migration scenarios
      • AWS CLI Credentials & Config chain
      • AWS CLI: IAM
        • Limitations
        • List of supported operations
        • Operations Descriptions and Examples
    • Usage
      • Storage Calculation
      • Fair use policy
    • Profile settings
      • Multi-Factor Authentication (MFA)
        • Enabling and Disabling MFA
        • MFA Reset
        • Organization-Wide Policies
  • Security
    • Securing Your Data
    • Identity Access Management (IAM)
      • Managing Users
      • Managing Groups
      • Managing Policies
    • CORS support
      • Limitations
      • CORS Configuration
  • Integrations with other applications
    • Backup Software Integrations Guides
    • Cloud Storage Browsers Integrations Guides
    • Media Management Software Integrations Guides
    • NAS Applications Integrations Guides
  • Other support resources
    • Impossible Cloud Management Console (ICMC)
    • Knowledge Base
    • Help Center
    • System Status
Powered by GitBook
On this page
  • Creating a User
  • Deleting a User
  • Managing Users as a Root User

Was this helpful?

Export as PDF
  1. Security
  2. Identity Access Management (IAM)

Managing Users

When accessing the Impossible Cloud Storage Console as a root user, you can create sub-users to give other people access to the console.

The Users tab serves as the single-source-of-truth for all users registered in your organization. You can add, filter, and delete users (sub-users) as well as edit the assigned rights, including assigning group memberships and access keys.

The Users tab is only available for root users - and accordingly also conducting any of the above actions.

Creating a User

To add users, follow these instructions:

  1. Navigate to the Users tab on the left-pane.

  2. Click on the Add User button on the top-right of the console.

  • Fill in the user's email and password to give them access to the console.

  • Inform the recipient about the account details.

Refer to our relevant documentation on rules for setting a password.

Deleting a User

To delete users, follow these instructions:

  1. Navigate to the Users tab on the left-pane.

  2. Click on the delete icon next to the user.

  3. Confirm the deletion.

Managing Users as a Root User

The root user has full administrative control, including the ability to manage access and permissions for all sub-users in the account. This includes assigning permissions, managing access keys, and updating user metadata such as tags.

Permissions for sub-users can be managed in two ways:

  • Group-Based Policies: Sub-users assigned to one or more groups will automatically inherit the permissions defined by the policies attached to those groups.

  • Inline Policies: Alternatively, policies can be assigned directly to individual users through inline policies. This allows for more granular permission control when group-based management is not sufficient.

Additionally, the root user can also create or delete access keys for any sub-user. This facilitates easier key rotation and credential management without requiring direct login access to the sub-user's account.

To manage a sub-user’s settings:

  1. Navigate to the Users tab in the Console.

  2. Click on the desired sub-user to open their management panel.

  3. Use the available tabs — Groups, Tags, Access Keys, and Inline Policies — to manage each aspect of the sub-user's configuration.

These tools give the root user fine-grained control over user permissions and credentials, helping enforce security and compliance standards efficiently.

PreviousIdentity Access Management (IAM)NextManaging Groups

Last updated 2 months ago

Was this helpful?