Identity and access management
Introduction
Identity and Access Management helps users manage resource access permissions within cloud accounts. It caters to various enterprise roles by granting different staff levels access to specific product permissions. For enterprises requiring multi-user collaboration for resource operations, using Identity and Access Management is recommended.
It is applicable to the following usage scenarios:
- Medium and large enterprise customers: Authorization management for multiple employees in the enterprise
- Technology-oriented vendor or SAAS platform provider: Resource and permission management for proxy clients
- Small and medium-sized developers or small enterprise: Add project members or collaborators for resource management
Create User
-
After logging into the root account, select Identity and Access Management from the console to access the user management page.

- Click on User Management in the left navigation bar, then click New User on the IAM User Management List page.
- In the New User dialog box that appears, enter the username, confirm the details, and return to the IAM User Management List to view the newly created IAM user.
Configuration Policy
BCC offers both system and custom policies, allowing for product-level and instance-level permission control.
- System policy: A pre-defined set of permissions provided by the Baidu AI Cloud system for resource management. These can be directly assigned to IAM users, but users cannot modify them.
- Custom policy: A user-created, more granular set of permissions for resource management, allowing specific permissions to be configured for single instances. This provides flexibility to address the unique permission management needs of different users.
System Policy
The system policy includes 2 types of policies: full control management permission, operation and maintenance permission and read-only permission. The scope of permission is as follows:
| Operation type | Permission scope |
|---|---|
| Read-only operation | View only BCC Instances and their mounted CDS disks, snapshots, and security group lists |
| Operation and maintenance operations |
|
| Full control management |
|
Custom Policy
Custom policies authorize users at the instance level, differing from system policies as they apply exclusively to selected instances.
Go to Policy Management through the left navigation bar, click Create Policy, enter the policy name, and select BCC as the service type. The policy creation method is set to Visual Editor by default and requires no adjustments.

User Authorization
Under User Management -> IAM User List, locate the relevant IAM user and click Add Permission in the Operations column. You can then authorize the user through either a System Policy or a Custom Policy.
Note: To change an IAM user's permissions without modifying existing policy rules, you must delete the current policy and assign a new one since existing policy permissions cannot be unchecked or edited directly.
Sign in as IAM User
After the root account authorizes the IAM user, it can share the login link with the IAM user. The IAM user can then access the root account's management console via this link and operate or view the root account's resources based on the granted policies.

For other detailed operations, refer to: Identity and Access Management.
