Overview
Identity and Access Management (IAM) will define the permissions and actions that individuals and services can perform on your platform, regardless of whether you access Exoscale programmatically through the command line, via your preferred coding language, through integrations with third-party tools, or using the user-friendly web portal.
Terminology
- Identity
Represents users or services that have access to the Exoscale platform. These can be individuals, applications, or any entity that interacts with Exoscale resources. - Access Management
The process and policies used to control who is authenticated and authorized to use resources. - Policies
Sets of permissions attached to identities that define what actions they can perform on which resources. - Roles
Collections of policies that can be assigned to identities to streamline permission assignments that meet specific needs or job functions. - Permissions
Specific rights that define what actions an identity can perform, such as read, write, or delete resources. - Authentication
The process of verifying an identity when it tries to access resources. - Authorization
The process of determining whether an authenticated identity has permission to perform a requested action on a resource.
Features
- Fine-Grained Access Controls
Allows administrators to define precise access controls at various levels, ensuring that users and services have only the permissions they need. - Policy-Based Permissions
Provides the ability to write policies that specify who can access which resources and what actions they can perform. - Role-Based Access Control (RBAC)
Supports assigning roles to users and groups, simplifying the management of permissions by associating roles with specific job functions. - Multi-Factor Authentication (MFA)
Enhances security by requiring multiple forms of verification before granting access to the platform. - Audit Logging
Keeps detailed logs of user activities and changes made within the IAM system, aiding in compliance and monitoring. - API Access
Provides programmatic access to manage IAM resources, allowing developers to integrate IAM functionality into their workflows. - Customizable Policies: Allows for the creation of customized policies tailored to specific organizational needs, accommodating diverse security requirements.
Availability
Zone | Country | City | Availability |
---|---|---|---|
at-vie-1 | Austria | Vienna | |
at-vie-2 | Austria | Vienna | |
ch-gva-2 | Switzerland | Geneva | |
ch-dk-2 | Switzerland | Zurich | |
de-fra-1 | Germany | Frankfurt | |
de-muc-1 | Germany | Munich | |
bg-sof-1 | Bulgaria | Sofia |