Managing Users
When accessing the Impossible Cloud Storage Console as a root user, you can create sub-users to give other people access to the console.
The Users tab serves as the single-source-of-truth for all users registered in your organization. You can add, filter, and delete users (sub-users) as well as edit the assigned rights, including assigning group memberships and access keys.
Creating a User
To add users, follow these instructions:
Navigate to the Users tab on the left-pane.
Click on the Add User button on the top-right of the console.
Fill in the user's email and password to give them access to the console.
Inform the recipient about the account details.
Deleting a User
To delete users, follow these instructions:
Navigate to the Users tab on the left-pane.
Click on the delete icon next to the user.
Confirm the deletion.
Managing Users as a Root User
The root user has full administrative control, including the ability to manage access and permissions for all sub-users in the account. This includes assigning permissions, managing access keys, and updating user metadata such as tags.
Permissions for sub-users can be managed in two ways:
Group-Based Policies: Sub-users assigned to one or more groups will automatically inherit the permissions defined by the policies attached to those groups.
Inline Policies: Alternatively, policies can be assigned directly to individual users through inline policies. This allows for more granular permission control when group-based management is not sufficient.
Additionally, the root user can also create or delete access keys for any sub-user. This facilitates easier key rotation and credential management without requiring direct login access to the sub-user's account.
To manage a sub-user’s settings:
Navigate to the Users tab in the Console.
Click on the desired sub-user to open their management panel.
Use the available tabs — Groups, Tags, Access Keys, and Inline Policies — to manage each aspect of the sub-user's configuration.
These tools give the root user fine-grained control over user permissions and credentials, helping enforce security and compliance standards efficiently.
Last updated
Was this helpful?