Last update:2026-03-25 15:08:05
This article introduces the key terms and their definitions in IAM (Access Control) to help you quickly understand the basic concepts and usage of IAM.
The main account is automatically created after a customer establishes a service relationship with CDNetworks. It is the entity to which purchased products, services, and resources belong, and is also responsible for the associated costs.
The main account has full management permissions for all resources under the account. It can log in to the console to centrally view, configure, and manage all activated products, services, and resources.
In IAM, the main account also serves as the administrator role and can be used for the following:
It is generally recommended that only administrators or designated personnel within the organization use and maintain the main account.
IAM users are user accounts created by the main account in Access Control (IAM) to meet the requirements of multi-user collaboration and role-based management.
By default, newly created IAM users do not have any permissions. Only after authorization is granted by the main account can they access the specified products, resources, or features. IAM users themselves do not incur charges separately; all resource usage, service measurements, and billing for accounts under your organization are managed centrally by the main account.
Using IAM Users Helps You:
A unified management relationship exists between the main account and IAM users.
You can regard the main account as an organization-level administrator account, while IAM users are member accounts created and managed by the main account.
Identity credentials are used to verify user identities, primarily for logging into the console or invoking APIs.
Identity credentials are sensitive information. Please keep them properly to prevent security risks caused by potential leaks.
Common types of identity credentials in IAM include:
The login username and password are used to access the console. After logging in, users can access and manage relevant products, services, and resources according to their granted permissions.
AccessKey is used to access platform capabilities through API requests or SDK, and is applicable to product scenarios that support programmatic access.
If your operations require system integration, automated scripts, or application-based service calls, you can utilize AccessKey for identity authentication and API access.
It is recommended to regularly review and update your credentials, and to avoid storing or transmitting credential information in insecure environments.
A permission policy is a set of rules in IAM used to define access permissions, and also serves as the basic unit for granting permissions.
By attaching permission policies to an IAM user, you can control which features and resources the user can access and what actions they are permitted to perform.
System policies are permission policies that are predefined and maintained by CDNetworks.
These types of policies are typically designed for common authorization scenarios and have fixed content, which cannot be modified by customers. When you want to quickly complete standardized permission assignments, you can use system policies directly.
A custom policy is a permission policy created and maintained by the customer based on their specific business requirements.
By using custom policies, you can more flexibly control the scope of IAM users’ access to specific features or resources, enabling finer-grained authorization.
When system policies cannot meet actual management scenarios, custom policies can be used as a supplement.
A feature policy is used to control the range of console features accessible to IAM users, such as page functionality, configuration capabilities, or data viewing permissions.
For applicable products, assigning only feature policies is usually not sufficient for users to view specific resource content. Feature permissions will only take effect when users are also granted the corresponding resource scope.
If a specific type of product in the console requires you to configure both feature permissions and resource scope, please follow the actual authorization rules.
An expression policy is a policy type defined based on IAM permission syntax. It is used to control IAM user access to specific resources through rule expressions.
With expression policies, you can specify in greater detail:
Expression policies are applicable to scenarios requiring fine-grained authorization.
The specific supported scope may vary by product. Please refer to the actual capabilities displayed in the console.
A service group refers to a group of acceleration domains and applies only to CDN and security-related products (such as Flood Shield and WAF). Resources for other products (such as Object Storage) are already included in the policy and are not assigned via service groups. Once a service group is assigned to a user, the user can manage the domains within that service group.
An acceleration domain can belong to multiple service groups, and a single user can also be assigned to multiple service groups.
Preset – Customer Service Group
When the contract is signed and the first user is created, the system automatically generates the Preset – Customer service group, which includes all acceleration domains under that customer’s account. The name of this service group cannot be modified.
Preset – Product Service Group
This service group automatically includes all domains associated with new contracts. With this group, customers can view the total traffic data under the contract and reconcile it with billing statements, making it easier to estimate traffic changes or plan for contract upgrades.
A custom service group allows you to select any combination of domains under contracts within the customer account. Once configured, assign it to an IAM user to grant management permissions for the domains included in the service group.