Three-role Separation Model

The Cloud supports the three-role separation model for permission management, which decomposes the super administrator (admin) permissions and assigns them to the system administrator, security administrator, and security auditor. The system administrator manages resources of the Cloud, the security administrator handles permissions, and the security auditor oversees audits. The three roles are independent of and constrain each other.

The three-role separation model decomposes the super permissions of the super administrator and into the three distinct roles, effectively reducing the security risks caused by excessive super administrator permissions and further enhancing Cloud security.


Tenant Management Permissions

Tenant management primarily provides enterprise users with organizational structure management, project-based resource access control, ticket management, independent region management, and other functions. The tenant management feature is provided as a separate functional module.

Characteristics:
  • Users are separate from roles. Roles, as a collection of permissions, can be flexibly bound to or unbound from tenant management users.
  • Roles are categorized into system roles and custom roles. System roles are roles with predefined permission scopes provided by the Cloud by default. Custom roles are roles created by users as needed.
  • The UI supports API-level permission control, flexibly adapting to the permission configuration requirements of various scenarios.

SM2 Certificate Login

The Cloud provides a certificate login feature based on the Shang Mi 2 (SM2) algorithm. After enable this feature, you must use a UKey for login authentication to ensure identity authenticity.

To use this feature, ensure that you have the module license of cryptography security compliance installed and certificate login enabled.

Certificate login can be enabled for the admin or tenants. To enable certificate login for tenants, ensure that the tenant management module license is installed on the Cloud.




Archives

Download Document Archives

Download

Already filled the basic info?Click here.

Enter at least 2 characters.
Cannot be empty.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

An email with a verification code will be sent to you. Make sure the address you provided is valid and correct.

同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Download

Not filled the basic info yet? Click here.

Invalid email address or mobile number.
同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Email Us

contact@zstack.io
ZStack Training and Certification
Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Email Us

contact@zstack.io
Request Trial
Enter at least 2 characters.
Invalid mobile number.
Enter at least 4 characters.
Invalid email address.
Wrong code. Try again. Send Code Resend Code (60s)

同意 不同意

I have read and concur with the Site TermsPrivacy PolicyRules and Conventions on User Management of ZStack Cloud

Email Us

contact@zstack.io

The download link is sent to your email address.

If you don't see it, check your spam folder, subscription folder, or AD folder. After receiving the email, click the URL to download the documentation.

The download link is sent to your email address.

If you don't see it, check your spam folder, subscription folder, or AD folder.
Or click on the URL below. (For Internet Explorer, right-click the URL and save it.)

Thank you for using ZStack products and services.

Submit successfully.

We'll connect soon.

Thank you for using ZStack products and services.