Overview

Benefits

User Management and Access Permissions
Within CAM, users can be created and provided with distinct security credentials, including Cloud API keys, login passwords, and MFA devices. Additionally, temporary keys can be requested to grant users access to services and resources. Furthermore, permissions and user actions can be managed effectively through CAM.

Role and Role Permission Management

Federated User and Federated User Permission Management
You have the option to activate the federated identity feature, which permits existing identities (users, groups, and roles) within your organization to access the CAM console, utilize APIs, and access resources without necessitating the creation of individual users for each identity. Cloud is compatible with SAML 2.0-based identity management solutions.
Features
Access Permissions Management
Customized Permissions
Multi-factor Authentication
Federated Identity
CAM facilitates temporary access to your account for users who have already acquired a password from a third-party authentication system, such as your organization’s network or an Internet identity provider.
PCI DSS Compliance
Scenarios
Refined Access Control for Resources
Single Sign-on to Cloud
Multi-factor Authentication for Improved Account Security

Through CAM, you have the flexibility to tailor access permissions for your services and resources. You can establish users or roles within CAM and allocate distinct security credentials (such as console login passwords or Cloud API keys) to them, or request temporary security credentials for accessing resources. Additionally, you can oversee permissions to regulate the actions users and roles are authorized to execute and the resources they are permitted to access.

Through CAM, you can leverage your current authentication system to provide access permissions to your employees and services for services and resources. Cloud offers federated authentication utilizing SAML 2.0 (Security Assertion Markup Language 2.0), ensuring compatibility with your organizational account systems within a private network. For further details, refer to the documentation on SAML 2.0-based Federated Authentication.

Multi-factor authentication enhances security by introducing an extra layer of protection beyond the traditional username and password. Presently, two authentication methods are available: hardware/virtual MFA device code and mobile verification code. Depending on the setup, users may need to input a valid authentication code to confirm their identity and device environment before accessing sensitive operations or logging in.