IAM Overview


The EnOS Identity and Access Management (IAM) helps you manage user identities and control access to your resources in EnOS. IAM allows you to manage user account lifecycles, authenticate user identities, and control the access rights to the resources in EnOS. When multiple users exist in an organization unit (OU), the minimum permission principle can be enforced to reduce risks to your enterprise information security.


EnOS applies the IAM scheme to achieve multi-tenancy. In EnOS, each tenant is managed as an OU. Data that belongs to different organizations are securely segregated and can only be accessed by users that are registered to the organization.


IAM also ensures that a user can access only the resources that the user is authorized to. This is achieved through the grouping of users and assigning appropriate access permissions.


The built-in IAM schemes of EnOS provide capabilities of identity management, authentication, and authorization.

Identity Management

With IAM, a hierarchy structure is introduced to represent the relationship that exists within an organization. Each tenant is identified as an OU.


EnOS offers the following types of identities:

  • User accounts are usually created for EnOS Management Console users and operation staff.

  • Service accounts (a.k.a. application tokens) are assigned to applications for accessing the EnOS service APIs.

  • Device identities are assigned to all devices (including edge devices) that connect to the EnOS Cloud.


All identities are created under organizations. Among the types of user identities, EnOS provides several types of user accounts. For more information, see IAM Concepts.

Authentication

IAM provides different authentication methods for different account types.

Authorization

EnOS adopts Role-Based-Access-Control (RBAC), which is a policy neutral access control mechanism defined around roles and privileges. The access control rule is defined as a 3-tuples in the form of role-permission-resource. The resource includes the following:

  • Applications: applications that a role has access to

  • User Interface: menu items or buttons that a role can see

  • API: APIs that a role can invoke

  • Data: data that a role can read or write

  • Reports: reports that a role can read

  • Events: events from an application that a role can view or handle


IAM allows the OU administrator to define access control rules to grant privileges/permissions of resources to other accounts through the EnOS Management Console GUI or through the APIs.


Accounts with the appropriate privileges granted may access the corresponding resources via the EnOS service APIs or EnOS Management Console. Access control validation is performed by IAM service for each access attempt.