My title

Role-based Access Control

Role-based access control

Complete isolation of multi tenants

● Grant access through policies based on organizations, roles, and user permissions

Integration with third-party identity management (such as LDAP, Microsoft AD, etc.) and SSO

By setting fine-grained privileges and permissions, you can control access, requests, and specifications for resources and services.

Through flexible approval, you can define different request and change processes for different departments and services

Strict control, flexible approval

Built-in approval process definition, or integration with third-party ITSM systems

● Strictly control who must approve the changes and schedule them in a predefined maintenance window

● Define which parameters in service requests can be modified by which approval level to meet the process requirements.

Approval and Management

Standardization, unified service

Enhance standardization through abstracting IT infrastructure concepts and provide unified cross-cloud services

Define operating systems in CMP to manage virtual machine templates and public cloud images, and establish standard services

Define instance types in CMP to configure standard CPU and memory combinations, and normalize the instance types used by the organization

Set naming conventions for deployment, cloud resources, and OS host names to ensure uniqueness and compliance

IP address directory structure and address pool management. Multi-level directories define different levels of network environment and IP address segments

Standardized Infrastructure Resources
Ultimate control starts from here!