Managing Users
Last updated
Was this helpful?
Last updated
Was this helpful?
When accessing the Impossible Cloud Storage Console as a root user, you can create sub-users to give other people access to the console.
The Users tab serves as the single-source-of-truth for all users registered in your organization. You can add, filter, and delete users (sub-users) as well as edit the assigned rights, including assigning group memberships and access keys.
To add users, follow these instructions:
Navigate to the Users tab on the left-pane.
Click on the Add User button on the top-right of the console.
Fill in the user's email and password to give them access to the console.
Inform the recipient about the account details.
To delete users, follow these instructions:
Navigate to the Users tab on the left-pane.
Click on the delete icon next to the user.
Confirm the deletion.
The root user has full administrative control, including the ability to manage access and permissions for all sub-users in the account. This includes assigning permissions, managing access keys, and updating user metadata such as tags.
Permissions for sub-users can be managed in two ways:
Group-Based Policies: Sub-users assigned to one or more groups will automatically inherit the permissions defined by the policies attached to those groups.
Inline Policies: Alternatively, policies can be assigned directly to individual users through inline policies. This allows for more granular permission control when group-based management is not sufficient.
Additionally, the root user can also create or delete access keys for any sub-user. This facilitates easier key rotation and credential management without requiring direct login access to the sub-user's account.
To manage a sub-user’s settings:
Navigate to the Users tab in the Console.
Click on the desired sub-user to open their management panel.
Use the available tabs — Groups, Tags, Access Keys, and Inline Policies — to manage each aspect of the sub-user's configuration.
These tools give the root user fine-grained control over user permissions and credentials, helping enforce security and compliance standards efficiently.