September 13, 2019 By Michelle Kaufman
Martin Smolny
< 1 min read

In this new tutorial, we’ll show you how to control access to cloud resources.

For some time now in IBM Cloud Identity and Access Management (IAM), you have been able to add federated users to access groups based on the identity information sent from your enterprise identity provider—this feature is called dynamic rules for access groups. Over the last few months, we have worked to improve the usability and user experience as well as added additional capabilities for setting up dynamic rules in the IBM Cloud console.

Check out the new tutorial

To learn more about using dynamic rules for your access groups, check out this new tutorial about how to control access to cloud resources. In 45 minutes or less, you will learn all of the tasks needed to effectively set rules to dynamically give access to your staff through the membership of access groups. The tasks you will learn include the following:

  • Create an access group.
  • Add static members to the access group.
  • Add access policies to the access group so that the membership will have an impact on authorization decisions.
  • Learn about dynamic rules, including how they evaluate, which conditions and comparators exist, and how attributes from your enterprise identity providers are propagated into dynamic rules evaluation.
  • Add a dynamic rule to an access group.
  • Validate that the dynamic rule was executed correctly.

After you check out the tutorial, head over to the IBM Cloud console and try it out!

Was this article helpful?
YesNo

More from Cloud

Fortressing the digital frontier: A comprehensive look at IBM Cloud network security services

6 min read - The cloud revolution has fundamentally transformed how businesses operate. Its superior scalability, agility and cost-effectiveness have made it the go-to platform for organizations of all sizes. However, this shift to the cloud has introduced a new landscape of ever-evolving security threats. Data breaches and cyberattacks continue to hit organizations, making robust cloud network security an absolute necessity. IBM®, a titan in the tech industry, recognizes this critical need, provides a comprehensive suite of tools and offers unmatched expertise to fortify…

How well do you know your hypervisor and firmware?

6 min read - IBM Cloud® Virtual Private Cloud (VPC) is designed for secured cloud computing, and several features of our platform planning, development and operations help ensure that design. However, because security in the cloud is typically a shared responsibility between the cloud service provider and the customer, it’s essential for you to fully understand the layers of security that your workloads run on here with us. That’s why here, we detail a few key security components of IBM Cloud VPC that aim…

New IBM study: How business leaders can harness the power of gen AI to drive sustainable IT transformation

3 min read - As organizations strive to balance productivity, innovation and environmental responsibility, the need for sustainable IT practices is even more pressing. A new global study from the IBM Institute for Business Value reveals that emerging technologies, particularly generative AI, can play a pivotal role in advancing sustainable IT initiatives. However, successful transformation of IT systems demands a strategic and enterprise-wide approach to sustainability. The power of generative AI in sustainable IT Generative AI is creating new opportunities to transform IT operations…

IBM Newsletters

Get our newsletters and topic updates that deliver the latest thought leadership and insights on emerging trends.
Subscribe now More newsletters