⚙️
API Reference
  • Introduction
  • Features
  • Roadmaps & Requests
  • Frequently Asked Questions
  • Release notes
  • 💡START HERE
    • Terminology
    • Identity and Access Management (IAM)
      • Overview
      • Users in IAM
      • Policies in IAM
      • Roles in IAM
      • Security best practices
    • Dynamic Objects
      • Object Definition
      • Field Definition
      • Data Validation
      • Data Security
        • Encryption
      • Version Control
      • Audit Logs
    • System Architecture Diagram
    • How-To Guides
      • Clinic Project
  • 🔌CORE API Reference
    • Overview
    • Auth
    • Projects
    • Organization
    • Users
    • Roles
    • Policies
    • Objects
    • Item
    • Files
    • Notifications
    • API Request History
    • Auto-Documentation
    • Branches & Merging
    • API Performance
  • ☁️[Coming SOON] YOUR ACCELERATOR PLATFORM ACCOUNT
    • Help and Support
    • Account Page
    • Billing
    • Upgrading an Instance
    • Adjust Server Performance
    • Custom Domain
    • Change Server Region
    • Manage Team
    • API Rate Limit
    • Developer API
  • 🔓SECURITY AND COMPLIANCE
    • Best Practices
    • SOC 2 Type 2 & SOC 3
    • GDPR
    • HIPAA
    • ISO 27001:2013
    • ISO 9001:2015
    • Penetration Testing
  • Accelerator Platform - Core APIs
  • Identity and Access Management
Powered by GitBook
On this page
  • What is IAM?
  • IAM Features
  • Accessing IAM
  • When do I use IAM?
  • How IAM works
  1. START HERE
  2. Identity and Access Management (IAM)

Overview

PreviousIdentity and Access Management (IAM)NextUsers in IAM

Last updated 2 years ago

What is IAM?

The Accelerator platform's Identity and Access Management (IAM) serves as a web-based solution, expertly designed to facilitate secure control over access to resources within the platform. By employing IAM, you can efficiently manage permissions in a centralized manner, determining the specific resources users can access on the Accelerator platform. IAM plays a vital role in overseeing authentication (sign-in) and authorization (permission allocation) processes for resources.

Upon establishing an Accelerator platform account, a single sign-in identity is provided, granting comprehensive access to all services and resources in the account. Referred to as the Accelerator platform account root user, this identity can be accessed using the email address and password registered during account creation. It is highly recommended to reserve the root user for specialized tasks, while utilizing separate identities for routine activities. Secure the root user credentials diligently and employ them solely for tasks exclusively reserved for the root user.

Contents

IAM Features

IAM gives you the following features:

  • Collaborative access to your Accelerator platform account: Allow others to manage and utilize resources within your Accelerator platform account without disclosing your password or access key.

  • Fine-grained authorizations: Assign varying permissions to diverse individuals for distinct resources.

Accessing IAM

When do I use IAM?

How IAM works

💡
IAM Features
Accessing IAM
When do I use IAM?
How IAM works
Overview of Accelerator platform identity management: Users
Overview of access management: Permissions and policies