No results found. Please try re-entering the product name
Resource Access Management (RAM) is an identity management and access control service provided by Ping An Cloud. You can use RAM to create and manage user accounts and control their access to your resources.
You can create different accounts for users and grant suitable access permissions. It is able to protect the encryption keys of cloud accounts from being shared to other users or production failures occurred by unsolicited accesses.
It centralizes instances and data as well as permissions to cloud resources to just a few people for control and management, thus preventing redundant permissions.
You can either use default authorization strategies to grant general access permissions to sub-users, or define an authorization strategy as per individual business requirements.
On an individual basis, permission can be granted to specific operations on certain ECS instances in specific resource clusters.
To operate a project on cloud, company F created a master account on Ping An Cloud and bought several cloud services. Several employees participating in the project needed to conduct different operations on the resources stored in the cloud, such as procurement and O&M. As they came from different departments, therefore, different privileges were required. Being concerned about the security of businesses deployed on the cloud, company F was reluctant to disclose master account keys directly to its employees. In this situation, it can use RAM to create sub-accounts for and assign different privileges to various employees (see figure 1), or set up user groups and bind related authorization strategies to each group and then add users to such groups for centralized management (see figure 2).
F is a financial company that owns a master account in Ping An Cloud and has bought cloud services for deployment of its business applications. However, F wanted to focus on business expansion, so it entrusted the system O&M to company I. For the benefit of data and account security, F does not need to hand over its master account keys to company I, but uses RAM to create a sub-user account for company I and grant suitable access permissions to it. Company I can then further fine-detail such permission and grant them to its employees. When cooperation between company F and I is terminated, company F may end or delete the accesses permissions granted to company I at any time.
Ping An Life Insurance
Qianhai Exchange
Ping An Wanjia Medicare
TongCe Technology
You can bind one or several authorization strategies to each user or group to limit their operational access to certain resources.
It enables central management of instances or data created by users. When a user leaves your organization, these instances and data are still in your full control.
One group may be comprised of several users; and one user can be categorized into several groups.
Call us
400-151-8800
Email us
cloud@pingan.com