Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

With IAM, you manage access control by defining who (identity) has what access (role) for which resource. For example, Networks, Entities, Advertisers or Partners are resources.

In IAM, permission to access a resource isn't granted directly to the end user. Instead, permissions are grouped into roles, and roles are granted to authenticated users. An IAM policy defines and enforces what roles are granted to which users, and this policy is attached to a resource. When an authenticated user attempts to access a resource, IAM checks the resource's policy to determine whether the action is permitted.

...