IBM Cloud® Identity and Access Management (IAM) provides secure access control that enable developers to do all sorts of useful things. For example, if an organization’s corporate security policies require that IBM Cloud credentials always be encrypted and rotated every week, developers can use IAM to securely provide credentials that write to the Cloudant Service.
IAM policy enables a subject to access a resource. There are three primary values in a policy: a subject, roles, and resources.
Contribute your Thoughts:
Chosen Answer:
This is a voting comment (?). You can switch to a simple comment. It is better to Upvote an existing comment if you don't have anything to add.
Submit