⚙️
API Reference
  • Introduction
  • Features
  • Roadmaps & Requests
  • Frequently Asked Questions
  • Release notes
  • 💡START HERE
    • Terminology
    • Identity and Access Management (IAM)
      • Overview
      • Users in IAM
      • Policies in IAM
      • Roles in IAM
      • Security best practices
    • Dynamic Objects
      • Object Definition
      • Field Definition
      • Data Validation
      • Data Security
        • Encryption
      • Version Control
      • Audit Logs
    • System Architecture Diagram
    • How-To Guides
      • Clinic Project
  • 🔌CORE API Reference
    • Overview
    • Auth
    • Projects
    • Organization
    • Users
    • Roles
    • Policies
    • Objects
    • Item
    • Files
    • Notifications
    • API Request History
    • Auto-Documentation
    • Branches & Merging
    • API Performance
  • ☁️[Coming SOON] YOUR ACCELERATOR PLATFORM ACCOUNT
    • Help and Support
    • Account Page
    • Billing
    • Upgrading an Instance
    • Adjust Server Performance
    • Custom Domain
    • Change Server Region
    • Manage Team
    • API Rate Limit
    • Developer API
  • 🔓SECURITY AND COMPLIANCE
    • Best Practices
    • SOC 2 Type 2 & SOC 3
    • GDPR
    • HIPAA
    • ISO 27001:2013
    • ISO 9001:2015
    • Penetration Testing
  • Accelerator Platform - Core APIs
  • Identity and Access Management
Powered by GitBook
On this page
  • First-time access only: Your root user credentials
  • IAM users
  1. START HERE
  2. Identity and Access Management (IAM)

Users in IAM

You can give access to your Accelerator platform account to specific users and provide them specific permissions to access resources in your Accelerator platform account. You can use IAM to create new users or federate existing users into Accelerator Platform.

Topics

  • First-time access only: Your root user credentials

  • IAM users

First-time access only: Your root user credentials

When you create an Accelerator platform account, you begin with one sign-in identity that has complete access to all Accelerator platform services and resources in the account. This identity is called the Accelerator platform account root user or Project Admin and is accessed by signing in with the email address and password that you used to create the account. We strongly recommend that you don't use the root user for your everyday tasks. Safeguard your root user credentials and use them to perform the tasks that only the root user can perform.

IAM users

IAM users are not separate accounts; they are users within your account. Each user can have its own password for access to the Accelerator platform Instance. You can also create an individual access key for each user so that the user can make programmatic requests to work with resources in your account.

As a Project Admin you can create multiple organizations in your instance. Each organization can have multiple user tables stored within it. Project Admin can also add users to different organizations. As a root user you create multiple roles with different permission sets and assign those roles and permissions to different users.

PreviousOverviewNextPolicies in IAM

Last updated 2 years ago

💡