FPT Identity & Access Management (FPT IAM) is a feature that allows tenant owners to share access to resources on their FPT Cloud to other users with different permissions. Some basic concepts in FPT IAM:
Role: The user's role in the organization, which specifies the permissions that the user is capable of exercising.
Currently, FPT IAM supports 2 basic roles: Super Admin and Readonly. If these 2 Roles don't meet your needs, you can create your own Custom Roles with custom permission sets.
Each role has a list of permissions.
Permission: determines what features the user has permission to perform on which resource. Each permission belongs to 1 role.
User group: A group of users with the same role (by tenant or VPC).
IAM users: Users who are added to the tenant, have access to the resources in the tenant according to the assigned role.
Tenant owners have full control over all VPC resources, including decentralization. This account will be assigned the ORG Admin role by default. To use IAM, the Tenant Owner first needs to create Roles and permissions for roles (Instance manager, Data analyst,...) and create User groups that are assigned the corresponding Roles.
For the created User group, the Tenant owner can select and customize the Role and Permission accordingly.
Decentralize permissions by inviting more IAM users to the User group via email.
After receiving the invitation, IAM users can register/log in or log in through the organization's SSO to FPT Portal according to the instructions and use the resources in the invited VPC/Tenant.
This article will provide you with the information you need to know before you start using FPT IAM, how to initialize and manage it.