Skip to Content
DocsResource ControlAccess Authorization

Access Authorization

Tip

The Access Authorization page is used for centralized management of node, asset, and account access permissions, enabling a unified and standardized authorization system.

With six permission controls (connect, share, upload, download, copy, paste), combined with security policies such as access time, sensitive command interception, and IP whitelisting, administrators can efficiently create and adjust authorization rules to meet compliance and security requirements for various business scenarios.

Users can perform detailed batch configurations on this page, or use the Resource Control - Asset Management or Resource Control - Account Management pages for quick authorization setup. All authorization data will be displayed on this page, regardless of the configuration method.

Create Access Authorization

Click the “Create” button in the upper right corner to add a new access authorization.

access_time

Access Authorization Parameter Description

CategoryParameterDescriptionRequired
Basic InfoNameName of the authorization policy, for easy management and lookup
DescriptionBrief description of the authorization policy
Valid TimeTime period during which the authorization policy is effective; leave blank for permanent
Is EnableEnable or disable the current authorization policy
Target SelectFolder Select
  • All: Applies to all folders
  • Select Folder: Specify target folder
  • Regex: Match folders by regular expression
  • Select Tag: Match folders by tag
  • Exclude Folder: Specify folders to exclude
Asset Select
  • All: Applies to all assets
  • Select Asset: Specify target asset
  • Regex: Match assets by regular expression
  • Select Tag: Match assets by tag
  • Exclude Asset: Specify assets to exclude
Account Select
  • All: Applies to all accounts
  • Select Account: Specify target account
  • Regex: Match accounts by regular expression
  • Select Tag: Match accounts by tag
  • Exclude Account: Specify accounts to exclude
Access ControlAuthorization RoleSpecify the user role for this authorization
Permission ConfigSelect required permissions to define allowed operations.
Note: Upload and download apply to SSH/RDP protocols; copy and paste apply to RDP protocol.
Access TimeSelect or customize access time templates, supporting multiple time zones and periods.
See Resource Control - Access Time for details.
Command FilterConfigure interception of high-risk or sensitive commands to enhance system security.
See Resource Control - Command Filter for details.
IP WhitelistSet allowed IP addresses; multiple IPs can be configured