IBM Cloud Docs
Managing access with IAM for IBM Cloud DNS Services

Managing access with IAM for IBM Cloud DNS Services

IBM Cloud® DNS Services leverages IAM to perform authorization and Authentication.

Access to DNS Services instances for users in your account is controlled by IBM Cloud Identity and Access Management (IAM). Every user that accesses the DNS Services in your account must be assigned an access policy with an IAM role defined. The policy determines what actions a user can perform within the context of the service or instance that you select. The allowable actions are customized and defined by the IBM Cloud service as operations that are allowed to be performed on the service. The actions are then mapped to IAM user roles.

Policies enable you to grant access at different levels. Some of the options include the following:

  • Access across all instances of the service in your account.
  • Access to an individual service instance in your account.
  • Access to a specific resource within an instance.

Roles and permissions

With IBM Cloud IAM, you can manage and define access for users and resources in your account.

To simplify access, DNS Services aligns with IBM Cloud IAM roles so that each user has a different view of the service, according to the role the user is assigned. If you are a security admin for your service, you can assign IBM Cloud IAM roles that correspond to the specific IBM Cloud® DNS Services permissions you want to grant to members of your team.

This section discusses IBM Cloud IAM in the context of DNS Services. For complete IAM documentation, see Managing access in IBM Cloud.

Platform access roles

Use platform access roles to grant permissions at the account level, such as the ability to create or delete DNS Services instances in your IBM Cloud account.

Platform access roles
Action Role
View IBM Cloud® DNS Services instances Administrator, Operator, Editor, Viewer
Create IBM Cloud® DNS Services instances Administrator, Editor
Delete IBM Cloud® DNS Services instances Administrator, Editor

Service access roles

Use service access roles to grant permissions at the service level, such as the ability to view, create, or delete DNS zones, resource records, and permitted networks.

The following table shows how service access roles map to DNS Services permissions.

Service access roles
Role Description Actions
Reader A reader can browse a high-level view of DNS zones, resource records, and permitted networks. Readers cannot create, delete or modify any resources under DNS Services instances. View DNS zones, resource records, and permitted networks.
Writer A writer can modify DNS zones and resource records, in addition to actions that a reader can perform. All actions that a reader can perform, also can update DNS zones and resource records.
Manager A manager can perform all actions that a reader and writer can perform, including the ability to create and delete DNS zones, create and delete resource records, and also add and remove permitted networks. All actions that a Reader or a Writer can perform, also can create and delete DNS zones. Additionally, can create and delete resource records, and add or remove permitted networks.

Working with permitted network (VPC) related IAM access

To add a VPC into permitted networks for a DNS zone, users must have the Operator role on the VPC resource. The permission can be granted to any user by creating an IAM access policy with the following assignments in IBM Cloud UI:

  1. Select VPC Infrastructure for What type of access do you want to assign?.
  2. Select Virtual Private Cloud for Resource Type.
  3. Choose the appropriate VPC under VPC ID.

To learn more about providing Operator level access to the VPC, see VPC: Getting started with IAM.