Skip to content

Commit a1a558c

Browse files
authored
Merge pull request #8208 from ovh/YC-dev/gbarideau/iam-cross-account
Updating IAM guide and Managing Contact guide with cross-account feature
2 parents c5b226a + 60d25f2 commit a1a558c

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

45 files changed

+446
-135
lines changed

pages/account_and_service_management/account_information/iam-policies-api/guide.de-de.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: Verwendung von IAM-Richtlinien mit der OVHcloud API (EN)
33
excerpt: "Find out how to give specific access rights to users from an OVHcloud account"
4-
updated: 2025-07-17
4+
updated: 2025-08-27
55
---
66

77
## Objective
@@ -357,6 +357,16 @@ The available operators for condition types are:
357357

358358
If not specified, the default operator is **EQ**.
359359

360+
#### Policies targeting other OVHcloud customer accounts
361+
362+
Access policies can target other OVHcloud customer accounts.
363+
The targeted account of this policy will be able to manage the rights received that way on its own policies, but will never be able to override the rights set on the access policy.
364+
365+
For example, an account **xx1111-ovh** gives rights on `vps:apiovh:ips/*` to account **xx2222-ovh**:
366+
Account **xx2222-ovh** will be able to give the right `vps:apiovh:ips/delete` to its own users, but will never be able to grant the right `vps:apiovh:reboot`.
367+
368+
Access to the support will still be reserved to the owner of the resource.
369+
360370
### Identities
361371

362372
Policies apply to users, which can be accounts, users or user groups.

pages/account_and_service_management/account_information/iam-policies-api/guide.en-asia.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to use IAM policies using the OVHcloud API
33
excerpt: "Find out how to give specific access rights to users from an OVHcloud account"
4-
updated: 2025-07-17
4+
updated: 2025-08-27
55
---
66

77
## Objective
@@ -357,6 +357,16 @@ The available operators for condition types are:
357357

358358
If not specified, the default operator is **EQ**.
359359

360+
#### Policies targeting other OVHcloud customer accounts
361+
362+
Access policies can target other OVHcloud customer accounts.
363+
The targeted account of this policy will be able to manage the rights received that way on its own policies, but will never be able to override the rights set on the access policy.
364+
365+
For example, an account **xx1111-ovh** gives rights on `vps:apiovh:ips/*` to account **xx2222-ovh**:
366+
Account **xx2222-ovh** will be able to give the right `vps:apiovh:ips/delete` to its own users, but will never be able to grant the right `vps:apiovh:reboot`.
367+
368+
Access to the support will still be reserved to the owner of the resource.
369+
360370
### Identities
361371

362372
Policies apply to users, which can be accounts, users or user groups.

pages/account_and_service_management/account_information/iam-policies-api/guide.en-au.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to use IAM policies using the OVHcloud API
33
excerpt: "Find out how to give specific access rights to users from an OVHcloud account"
4-
updated: 2025-07-17
4+
updated: 2025-08-27
55
---
66

77
## Objective
@@ -357,6 +357,16 @@ The available operators for condition types are:
357357

358358
If not specified, the default operator is **EQ**.
359359

360+
#### Policies targeting other OVHcloud customer accounts
361+
362+
Access policies can target other OVHcloud customer accounts.
363+
The targeted account of this policy will be able to manage the rights received that way on its own policies, but will never be able to override the rights set on the access policy.
364+
365+
For example, an account **xx1111-ovh** gives rights on `vps:apiovh:ips/*` to account **xx2222-ovh**:
366+
Account **xx2222-ovh** will be able to give the right `vps:apiovh:ips/delete` to its own users, but will never be able to grant the right `vps:apiovh:reboot`.
367+
368+
Access to the support will still be reserved to the owner of the resource.
369+
360370
### Identities
361371

362372
Policies apply to users, which can be accounts, users or user groups.

pages/account_and_service_management/account_information/iam-policies-api/guide.en-ca.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to use IAM policies using the OVHcloud API
33
excerpt: "Find out how to give specific access rights to users from an OVHcloud account"
4-
updated: 2025-07-17
4+
updated: 2025-08-27
55
---
66

77
## Objective
@@ -357,6 +357,16 @@ The available operators for condition types are:
357357

358358
If not specified, the default operator is **EQ**.
359359

360+
#### Policies targeting other OVHcloud customer accounts
361+
362+
Access policies can target other OVHcloud customer accounts.
363+
The targeted account of this policy will be able to manage the rights received that way on its own policies, but will never be able to override the rights set on the access policy.
364+
365+
For example, an account **xx1111-ovh** gives rights on `vps:apiovh:ips/*` to account **xx2222-ovh**:
366+
Account **xx2222-ovh** will be able to give the right `vps:apiovh:ips/delete` to its own users, but will never be able to grant the right `vps:apiovh:reboot`.
367+
368+
Access to the support will still be reserved to the owner of the resource.
369+
360370
### Identities
361371

362372
Policies apply to users, which can be accounts, users or user groups.

pages/account_and_service_management/account_information/iam-policies-api/guide.en-gb.md

Lines changed: 12 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to use IAM policies using the OVHcloud API
33
excerpt: "Find out how to give specific access rights to users from an OVHcloud account"
4-
updated: 2025-07-17
4+
updated: 2025-08-27
55
---
66

77
## Objective
@@ -357,6 +357,16 @@ The available operators for condition types are:
357357

358358
If not specified, the default operator is **EQ**.
359359

360+
#### Policies targeting other OVHcloud customer accounts
361+
362+
Access policies can target other OVHcloud customer accounts.
363+
The targeted account of this policy will be able to manage the rights received that way on its own policies, but will never be able to override the rights set on the access policy.
364+
365+
For example, an account **xx1111-ovh** gives rights on `vps:apiovh:ips/*` to account **xx2222-ovh**:
366+
Account **xx2222-ovh** will be able to give the right `vps:apiovh:ips/delete` to its own users, but will never be able to grant the right `vps:apiovh:reboot`.
367+
368+
Access to the support will still be reserved to the owner of the resource.
369+
360370
### Identities
361371

362372
Policies apply to users, which can be accounts, users or user groups.
@@ -723,4 +733,4 @@ Here is a part of the output:
723733

724734
## Go further
725735

726-
Join our [community of users](/links/community).
736+
Join our [community of users](/links/community).

pages/account_and_service_management/account_information/iam-policies-api/guide.en-ie.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to use IAM policies using the OVHcloud API
33
excerpt: "Find out how to give specific access rights to users from an OVHcloud account"
4-
updated: 2025-07-17
4+
updated: 2025-08-27
55
---
66

77
## Objective
@@ -357,6 +357,16 @@ The available operators for condition types are:
357357

358358
If not specified, the default operator is **EQ**.
359359

360+
#### Policies targeting other OVHcloud customer accounts
361+
362+
Access policies can target other OVHcloud customer accounts.
363+
The targeted account of this policy will be able to manage the rights received that way on its own policies, but will never be able to override the rights set on the access policy.
364+
365+
For example, an account **xx1111-ovh** gives rights on `vps:apiovh:ips/*` to account **xx2222-ovh**:
366+
Account **xx2222-ovh** will be able to give the right `vps:apiovh:ips/delete` to its own users, but will never be able to grant the right `vps:apiovh:reboot`.
367+
368+
Access to the support will still be reserved to the owner of the resource.
369+
360370
### Identities
361371

362372
Policies apply to users, which can be accounts, users or user groups.

pages/account_and_service_management/account_information/iam-policies-api/guide.en-sg.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to use IAM policies using the OVHcloud API
33
excerpt: "Find out how to give specific access rights to users from an OVHcloud account"
4-
updated: 2025-07-17
4+
updated: 2025-08-27
55
---
66

77
## Objective
@@ -357,6 +357,16 @@ The available operators for condition types are:
357357

358358
If not specified, the default operator is **EQ**.
359359

360+
#### Policies targeting other OVHcloud customer accounts
361+
362+
Access policies can target other OVHcloud customer accounts.
363+
The targeted account of this policy will be able to manage the rights received that way on its own policies, but will never be able to override the rights set on the access policy.
364+
365+
For example, an account **xx1111-ovh** gives rights on `vps:apiovh:ips/*` to account **xx2222-ovh**:
366+
Account **xx2222-ovh** will be able to give the right `vps:apiovh:ips/delete` to its own users, but will never be able to grant the right `vps:apiovh:reboot`.
367+
368+
Access to the support will still be reserved to the owner of the resource.
369+
360370
### Identities
361371

362372
Policies apply to users, which can be accounts, users or user groups.

pages/account_and_service_management/account_information/iam-policies-api/guide.en-us.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: How to use IAM policies using the OVHcloud API
33
excerpt: "Find out how to give specific access rights to users from an OVHcloud account"
4-
updated: 2025-07-17
4+
updated: 2025-08-27
55
---
66

77
## Objective
@@ -357,6 +357,16 @@ The available operators for condition types are:
357357

358358
If not specified, the default operator is **EQ**.
359359

360+
#### Policies targeting other OVHcloud customer accounts
361+
362+
Access policies can target other OVHcloud customer accounts.
363+
The targeted account of this policy will be able to manage the rights received that way on its own policies, but will never be able to override the rights set on the access policy.
364+
365+
For example, an account **xx1111-ovh** gives rights on `vps:apiovh:ips/*` to account **xx2222-ovh**:
366+
Account **xx2222-ovh** will be able to give the right `vps:apiovh:ips/delete` to its own users, but will never be able to grant the right `vps:apiovh:reboot`.
367+
368+
Access to the support will still be reserved to the owner of the resource.
369+
360370
### Identities
361371

362372
Policies apply to users, which can be accounts, users or user groups.

pages/account_and_service_management/account_information/iam-policies-api/guide.es-es.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Cómo utilizar las políticas de IAM con la API de OVHcloud (EN)"
33
excerpt: "Find out how to give specific access rights to users from an OVHcloud account"
4-
updated: 2025-07-17
4+
updated: 2025-08-27
55
---
66

77
## Objective
@@ -357,6 +357,16 @@ The available operators for condition types are:
357357

358358
If not specified, the default operator is **EQ**.
359359

360+
#### Policies targeting other OVHcloud customer accounts
361+
362+
Access policies can target other OVHcloud customer accounts.
363+
The targeted account of this policy will be able to manage the rights received that way on its own policies, but will never be able to override the rights set on the access policy.
364+
365+
For example, an account **xx1111-ovh** gives rights on `vps:apiovh:ips/*` to account **xx2222-ovh**:
366+
Account **xx2222-ovh** will be able to give the right `vps:apiovh:ips/delete` to its own users, but will never be able to grant the right `vps:apiovh:reboot`.
367+
368+
Access to the support will still be reserved to the owner of the resource.
369+
360370
### Identities
361371

362372
Policies apply to users, which can be accounts, users or user groups.

pages/account_and_service_management/account_information/iam-policies-api/guide.es-us.md

Lines changed: 11 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Cómo utilizar las políticas de IAM con la API de OVHcloud (EN)"
33
excerpt: "Find out how to give specific access rights to users from an OVHcloud account"
4-
updated: 2025-07-17
4+
updated: 2025-08-27
55
---
66

77
## Objective
@@ -357,6 +357,16 @@ The available operators for condition types are:
357357

358358
If not specified, the default operator is **EQ**.
359359

360+
#### Policies targeting other OVHcloud customer accounts
361+
362+
Access policies can target other OVHcloud customer accounts.
363+
The targeted account of this policy will be able to manage the rights received that way on its own policies, but will never be able to override the rights set on the access policy.
364+
365+
For example, an account **xx1111-ovh** gives rights on `vps:apiovh:ips/*` to account **xx2222-ovh**:
366+
Account **xx2222-ovh** will be able to give the right `vps:apiovh:ips/delete` to its own users, but will never be able to grant the right `vps:apiovh:reboot`.
367+
368+
Access to the support will still be reserved to the owner of the resource.
369+
360370
### Identities
361371

362372
Policies apply to users, which can be accounts, users or user groups.

0 commit comments

Comments
 (0)