Skip to content

Commit 4d4dae4

Browse files
committed
chore: updated the IAM permissions
1 parent c81fe9b commit 4d4dae4

File tree

2 files changed

+132
-28
lines changed

2 files changed

+132
-28
lines changed

README.md

Lines changed: 51 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -41,16 +41,60 @@ Three solutions are offered:
4141
You need the following permissions to run this module.
4242

4343
- Account Management
44-
- **Resource Group** service
45-
- `Viewer` platform access
44+
- **All Account Management services** service
45+
- `Administrator` platform access
4646
- IAM Services
47-
- **Workspace for Power Virtual Server** service
48-
- **Power Virtual Server** service
49-
- `Editor` platform access
47+
- **IAM Identity Service** service
48+
- `Administrator` platform access
49+
- **All Identity and Access enabled services** service
50+
-`Manager` service access
51+
-`Administrator` platform access
52+
- Resource Management
53+
- **Resource Management** service
54+
-`Administrator` platform access
55+
- Networking Services
5056
- **VPC Infrastructure Services** service
51-
- `Editor` platform access
57+
-`manager` service access
58+
-`VPN Client` , `Administrator` ,`Share Broker` , `Share Remote Account Accessor` platform access
5259
- **Transit Gateway** service
53-
- `Editor` platform access
60+
-`manager` service access
61+
-`Editor` platform access
62+
- Compute Services
63+
- **Power Virtual Server Workspace** service
64+
-`Manager` service access
65+
-`Editor` platform access
66+
- Security Services
67+
- **Key Protect** service
68+
-`Manager` service access
69+
-`Administrator` platform access
70+
- **Secrets Manager** service
71+
-`Manager` service access
72+
-`Administrator` platform access
73+
- **Hyper Protect Crypto Services** service
74+
-`Manager` service access
75+
-`Administrator` platform access
76+
- **Security and Compliance Center Workload Protection** service
77+
-`Manager` service access
78+
-`Administrator` platform access
79+
- Monitoring & Management
80+
- **Cloud Monitoring** service
81+
-`Manager` service access
82+
-`Administrator` platform access
83+
- **Monitoring** service
84+
-`Administrator` platform access
85+
- **Activity Tracker Event Routing** service
86+
-`Editor` platform access
87+
- Storage Services
88+
- **Cloud Object Storage** service
89+
-`Manager` service access
90+
-`Administrator` platform access
91+
- **Container Registry** service
92+
-`Reader` service access
93+
-`Viewer` platform access
94+
- Application Services
95+
- **App Configuration service** service
96+
-`Manager` service access
97+
-`Administrator` platform access
5498

5599
<!-- BEGIN CONTRIBUTING HOOK -->
56100
## Contributing

ibm_catalog.json

Lines changed: 81 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -396,59 +396,119 @@
396396
],
397397
"iam_permissions": [
398398
{
399+
"service_name": "cloud-monitoring",
399400
"role_crns": [
401+
"crn:v1:bluemix:public:iam::::role:Administrator",
400402
"crn:v1:bluemix:public:iam::::serviceRole:Manager"
401-
],
402-
"service_name": "appid"
403+
]
403404
},
404405
{
406+
"service_name": "account-management",
405407
"role_crns": [
406-
"crn:v1:bluemix:public:iam::::serviceRole:Manager"
407-
],
408-
"service_name": "cloud-object-storage"
408+
"crn:v1:bluemix:public:iam::::role:Administrator"
409+
]
409410
},
410411
{
412+
"service_name": "kms",
411413
"role_crns": [
414+
"crn:v1:bluemix:public:iam::::role:Administrator",
412415
"crn:v1:bluemix:public:iam::::serviceRole:Manager"
413-
],
414-
"service_name": "hs-crypto"
416+
]
415417
},
416418
{
419+
"service_name": "resource-controller",
417420
"role_crns": [
418421
"crn:v1:bluemix:public:iam::::role:Administrator"
419-
],
420-
"service_name": "iam-identity"
422+
]
421423
},
422424
{
425+
"service_name": "iam-identity",
423426
"role_crns": [
424-
"crn:v1:bluemix:public:iam::::serviceRole:Manager"
425-
],
426-
"service_name": "kms"
427+
"crn:v1:bluemix:public:iam::::role:Administrator"
428+
]
429+
},
430+
{
431+
"service_name": "monitoring",
432+
"role_crns": [
433+
"crn:v1:bluemix:public:iam::::role:Administrator"
434+
]
435+
},
436+
{
437+
"service_name": "activity-tracker",
438+
"role_crns": [
439+
"crn:v1:bluemix:public:iam::::role:Editor"
440+
]
427441
},
428442
{
443+
"service_name": "app-configuration",
429444
"role_crns": [
430445
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
431446
"crn:v1:bluemix:public:iam::::role:Administrator"
432-
],
433-
"service_name": "is.vpc"
447+
]
434448
},
435449
{
450+
"service_name": "secrets-manager",
436451
"role_crns": [
452+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
453+
"crn:v1:bluemix:public:iam::::role:Administrator"
454+
]
455+
},
456+
{
457+
"service_name": "security-compliance",
458+
"role_crns": [
459+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
460+
"crn:v1:bluemix:public:iam::::role:Administrator"
461+
]
462+
},
463+
{
464+
"service_name": "power-iaas",
465+
"role_crns": [
466+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
437467
"crn:v1:bluemix:public:iam::::role:Editor"
438-
],
439-
"service_name": "is.vpc"
468+
]
440469
},
441470
{
471+
"service_name": "is.vpc",
442472
"role_crns": [
473+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
474+
"crn:v1:bluemix:public:iam::::role:Administrator",
443475
"crn:v1:bluemix:public:iam::::role:Editor"
444-
],
445-
"service_name": "transit.gateway"
476+
]
446477
},
447478
{
479+
"service_name": "hs-crypto",
448480
"role_crns": [
449-
"crn:v1:bluemix:public:iam::::serviceRole:Manager"
450-
],
451-
"service_name": "power-iaas"
481+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
482+
"crn:v1:bluemix:public:iam::::role:Administrator"
483+
]
484+
},
485+
{
486+
"service_name": "iam",
487+
"role_crns": [
488+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
489+
"crn:v1:bluemix:public:iam::::role:Administrator"
490+
]
491+
},
492+
{
493+
"service_name": "transit.gateway",
494+
"role_crns": [
495+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
496+
"crn:v1:bluemix:public:iam::::role:Editor"
497+
]
498+
},
499+
{
500+
"service_name": "container-registry",
501+
"role_crns": [
502+
"crn:v1:bluemix:public:iam::::role:Reader",
503+
"crn:v1:bluemix:public:iam::::role:Viewer"
504+
]
505+
},
506+
{
507+
"service_name": "cloud-object-storage",
508+
"role_crns": [
509+
"crn:v1:bluemix:public:iam::::serviceRole:Manager",
510+
"crn:v1:bluemix:public:iam::::role:Administrator"
511+
]
452512
}
453513
],
454514
"architecture": {

0 commit comments

Comments
 (0)