Identity and access management ensures that only authorized administrators and end users can access or operate specific Alibaba Cloud resources, preventing unauthorized or malicious access. This helps meet compliance and audit requirements. This topic describes the identity and access management capabilities provided by Elastic Desktop Service (EDS) Enterprise to enhance security.
01 Account management
1.1 Use a RAM user as the administrator account
To reduce potential risks associated with excessive access, avoid using your Alibaba Cloud account, which has full access to all cloud resources, as the administrator account. Instead, create a Resource Access Management (RAM) user with administrator privileges to log on to the EDS Enterprise console and assign permissions to this RAM user according to your specific business needs.
|
1.2 Manage end user account lifecycles
Administrators of EDS Edition can assign cloud resources (such as cloud computers) to end users. To maintain security throughout the account lifecycle, perform the following actions as needed:
Promptly reclaim cloud computers allocated to end users when they're no longer in use.
Disable end user accounts as necessary.
Ensure timely deletion of accounts that are no longer required.
|
1.3 Configure the password validity period
By default, end user accounts have permanent password validity. However, you can set a password validity period between 30 and 365 days. Once a password expires, the owner must change it before logging on again.
|
02 Permission management
2.1 RAM-based tiered administrator access control
With EDS Enterprise, you can manage permissions by using Resource Access Management (RAM), allowing different RAM users to handle specific aspects of cloud computers. This enables granular access control for streamlined management.
|
2.2 Alibaba Cloud Workspace account system-based tiered administrator access control
The Alibaba Cloud account that you use to log on to the EDS console has full permissions on EDS features and resources. If your company has a complex organizational structure, multiple departments, and a large number of employees and cloud computers, one administrator is not sufficient to manage all tasks. Additionally, having only one administrator does not meet the permission isolation requirements for business. In this scenario, the main administrator needs one or more sub-administrators to help manage tasks. In this situation, the following requirements must be met:
Different sub-administrators have varying levels of permissions. For example, Sub-administrator A can create and manage users but cannot create and manage cloud computers, while Sub-administrator B can only view data and cannot perform any other operations.
Access to different data is restricted to specific permissions. For example, Sub-administrator C has permissions to view and manage only cloud computers in the R&D department, while Sub-administrator D has permissions to view and manage only cloud computers in the design department.
EDS Enterprise's permission management module addresses the preceding requirements.
|
03 Identity authentication
3.1 MFA
Multi-factor authentication (MFA) is a simple yet effective security measure that adds an extra layer of protection beyond just a username and password. It requires secondary authentication when administrators log on to the EDS Enterprise console or end users access a terminal, ensuring enhanced security for your account and cloud resources. Note that this process does not affect API calls made by using an AccessKey pair.
|
3.2 Specify permitted terminals
Each terminal has a unique, tamper-proof identifier called a UUID, which serves as its trusted identity. This UUID is globally unique and cannot be forged, ensuring secure authentication. Administrators can enable trusted device authentication, restricting end users to log on to only the specified terminals. Once trusted device authentication is enabled, end users cannot access cloud computers from unauthorized terminals.
|
3.3 Client logon verification
By default, this feature is disabled. When this feature is enabled, end users are required to verify their identity by entering a verification code sent to their email addresses. This occurs when end users logging on to Alibaba Cloud Workspace from new devices. Logon access is granted only after the verification is successfully completed.
|
04 Access control
4.1 Terminal access control
Cloud computer policies enable you to manage terminal access through logon method controls and IP address whitelisting. To enhance security, we recommend that you configure these policies to restrict end users to specific terminal types and approved IP address ranges when they access cloud computers.
You can configure the Logon Method Control parameter to choose the type of Alibaba Cloud Workspace terminals that can be used by end users.
Example: To ensure the information security of an enterprise, the administrator sets this parameter to Windows Client and macOS Client.
You can configure the CIDR Block Whitelist parameter to specify the allowed CIDR blocks for accessing cloud computers from Alibaba Cloud Workspace terminals.
Example: To enhance enterprise information security, the administrator adds the CIDR blocks of all office-based Alibaba Cloud Workspace terminals to the whitelist. This restricts employees to connecting to cloud computers only from these whitelisted Alibaba Cloud Workspace terminals.
|
4.2 Timeout-triggered automatic logout
By default, timeout-triggered automatic logout is disabled. When this feature is enabled, Alibaba Cloud Workspace terminals automatically log off end users if they do not connect to cloud resources, such as cloud computers, applications, phones, or enterprise drives, within the specified timeout period. This feature enhances data security by ensuring inactive sessions are terminated promptly.
|