Role-based Access Control
Role-based access control
● Complete isolation of multi tenants
● Grant access through policies based on organizations, roles, and user permissions
● Integration with third-party identity management (such as LDAP, Microsoft AD, etc.) and SSO
By setting fine-grained privileges and permissions, you can control access, requests, and specifications for resources and services.
Through flexible approval, you can define different request and change processes for different departments and services
Strict control, flexible approval
● Built-in approval process definition, or integration with third-party ITSM systems
● Strictly control who must approve the changes and schedule them in a predefined maintenance window
● Define which parameters in service requests can be modified by which approval level to meet the process requirements.
Approval and Management
Standardization, unified service
Enhance standardization through abstracting IT infrastructure concepts and provide unified cross-cloud services
● Define operating systems in CMP to manage virtual machine templates and public cloud images, and establish standard services
● Define instance types in CMP to configure standard CPU and memory combinations, and normalize the instance types used by the organization
● Set naming conventions for deployment, cloud resources, and OS host names to ensure uniqueness and compliance
● IP address directory structure and address pool management. Multi-level directories define different levels of network environment and IP address segments
|