Overview

Identity and Access Management (IAM) will define the permissions and actions that individuals and services can perform on your platform, regardless of whether you access Exoscale programmatically through the command line, via your preferred coding language, through integrations with third-party tools, or using the user-friendly web portal.

Terminology

  • Identity
    Represents users or services that have access to the Exoscale platform. These can be individuals, applications, or any entity that interacts with Exoscale resources.
  • Access Management
    The process and policies used to control who is authenticated and authorized to use resources.
  • Policies
    Sets of permissions attached to identities that define what actions they can perform on which resources.
  • Roles
    Collections of policies that can be assigned to identities to streamline permission assignments that meet specific needs or job functions.
  • Permissions
    Specific rights that define what actions an identity can perform, such as read, write, or delete resources.
  • Authentication
    The process of verifying an identity when it tries to access resources.
  • Authorization
    The process of determining whether an authenticated identity has permission to perform a requested action on a resource.

Features

  • Fine-Grained Access Controls
    Allows administrators to define precise access controls at various levels, ensuring that users and services have only the permissions they need.
  • Policy-Based Permissions
    Provides the ability to write policies that specify who can access which resources and what actions they can perform.
  • Role-Based Access Control (RBAC)
    Supports assigning roles to users and groups, simplifying the management of permissions by associating roles with specific job functions.
  • Multi-Factor Authentication (MFA)
    Enhances security by requiring multiple forms of verification before granting access to the platform.
  • Audit Logging
    Keeps detailed logs of user activities and changes made within the IAM system, aiding in compliance and monitoring.
  • API Access
    Provides programmatic access to manage IAM resources, allowing developers to integrate IAM functionality into their workflows.
  • Customizable Policies: Allows for the creation of customized policies tailored to specific organizational needs, accommodating diverse security requirements.

Availability

ZoneCountryCityAvailability
at-vie-1AustriaVienna
at-vie-2AustriaVienna
ch-gva-2SwitzerlandGeneva
ch-dk-2SwitzerlandZurich
de-fra-1GermanyFrankfurt
de-muc-1GermanyMunich
bg-sof-1BulgariaSofia

Limitations