Managed Policy Sets¶
DotID provides managed policy sets — pre-defined, platform-provided collections of policies with well-known names. They cannot be modified or deleted by users.
Managed policy sets provide common permission bundles that can be attached to IAM users and groups, similar to AWS managed policies.
Naming Convention¶
{Service}FullAccess— all actions in a namespace (e.g.IAMFullAccess){Service}ReadOnlyAccess— read and list actions onlyAdministratorAccess— global wildcard (all actions, all resources)
Managed policy set names are reserved. Custom policy sets must not use these names.
Permission Sets¶
Permission sets are bundles of one or more managed IAM policies. They are assigned to IDC users through account assignments and define what the user can do within a given account.
Platform-Core Permission Sets¶
Permission Set |
Bundled IAM Policies |
|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Service-Registered Permission Sets¶
Registered by consumer services at startup.
Permission Set |
Service |
Bundled IAM Policies |
|---|---|---|
|
TrustMint |
|
|
TrustMint |
|
|
Bazaar |
|
|
Bazaar |
|
Managed SCP Templates¶
Platform-managed SCP templates are registered by services. They are attached to partner accounts when a platform operator approves a partner registration request.
SCP Template |
Service |
Allowed Actions |
|---|---|---|
|
TrustMint |
|
|
TrustMint |
|
|
Bazaar |
|
|
Bazaar |
|
Managed IAM Policies¶
Full access to all actions and resources.
Use case: Management account root user, platform superadmin.
{
"Version": "2024-01-01",
"Statement": [{
"Sid": "AdministratorAccess",
"Effect": "Allow",
"Action": "*",
"Resource": "*"
}]
}
Full access to IAM operations: users, groups, policies, credentials, permission boundaries, and resource policies.
Use case: Account administrator managing IAM resources within their account.
{
"Version": "2024-01-01",
"Statement": [{
"Sid": "IAMFullAccess",
"Effect": "Allow",
"Action": "iam:*",
"Resource": "*"
}]
}
Read-only access to IAM resources.
{
"Version": "2024-01-01",
"Statement": [{
"Sid": "IAMReadOnlyAccess",
"Effect": "Allow",
"Action": [
"iam:User:Read", "iam:User:List",
"iam:Group:Read", "iam:Group:List",
"iam:Policy:Read", "iam:Policy:List",
"iam:InlinePolicy:Read", "iam:InlinePolicy:List",
"iam:ResourcePolicy:Read", "iam:ResourcePolicy:List",
"iam:PermissionBoundary:Read",
"iam:Credentials:Read"
],
"Resource": "*"
}]
}
Full access to organization management: org lifecycle, OUs, and member accounts.
Use case: Management account root user managing org structure.
{
"Version": "2024-01-01",
"Statement": [{
"Sid": "OrganizationFullAccess",
"Effect": "Allow",
"Action": "org:*",
"Resource": "*"
}]
}
Read-only access to organization structure.
{
"Version": "2024-01-01",
"Statement": [{
"Sid": "OrganizationReadOnlyAccess",
"Effect": "Allow",
"Action": [
"org:Organization:Read",
"org:OU:Read", "org:OU:List",
"org:Account:Read", "org:Account:List"
],
"Resource": "*"
}]
}
Full access to service control policy management.
Use case: Management account root user defining security guardrails.
{
"Version": "2024-01-01",
"Statement": [{
"Sid": "SCPFullAccess",
"Effect": "Allow",
"Action": "scp:*",
"Resource": "*"
}]
}
Read-only access to audit events.
Use case: Delegated admin for org-wide compliance visibility. The
audit namespace is delegable.
{
"Version": "2024-01-01",
"Statement": [{
"Sid": "AuditReadOnlyAccess",
"Effect": "Allow",
"Action": [
"audit:Event:Read",
"audit:Event:List",
"audit:Event:Export"
],
"Resource": "*"
}]
}
Full access to service quota operations.
Use case: Delegated admin managing quotas across the organization. The
quota namespace is delegable.
{
"Version": "2024-01-01",
"Statement": [{
"Sid": "QuotaCenterFullAccess",
"Effect": "Allow",
"Action": "quota:*",
"Resource": "*"
}]
}
Read-only access to service quotas and increase requests.
{
"Version": "2024-01-01",
"Statement": [{
"Sid": "QuotaCenterReadOnlyAccess",
"Effect": "Allow",
"Action": [
"quota:Quota:Read", "quota:Quota:List",
"quota:Request:Read", "quota:Request:List"
],
"Resource": "*"
}]
}
Service-Registered Managed Policies¶
The following policies are registered at service startup.
NovaBell (notifications):
NotificationsFullAccess (notifications:*),
NotificationsReadOnlyAccess (read/list/count).
TrustMint (licensing):
LicensingFullAccess (licensing:*),
LicensingReadOnlyAccess (read/list),
LicensingApprovalAccess (approval management),
LicensingEndUserAccess (device/license read + request).
Bazaar (marketplace):
MarketplaceFullAccess (marketplace:*),
MarketplaceDeveloperAccess (product CRUD),
MarketplaceReadOnlyAccess (read-only browse),
MarketplaceAdminAccess (product management + admin).
Summary¶
Policy / Permission Set |
Scope |
Description |
|---|---|---|
|
|
All actions, all resources |
|
read-only |
All read/list actions across all namespaces |
|
|
All IAM operations |
|
|
All organization operations |
|
|
All SCP operations |
|
|
Read-only audit events (delegable) |
|
|
All quota operations (delegable) |
|
|
Read-only quota access |
|
|
All notification operations |
|
|
Read-only notification access |
|
cross-service |
Licensing end-user + marketplace developer (Dev2M/OTAForge) |
|
|
Device enrollment and license requests (TrustMint) |
|
|
Approval read/write for license managers (TrustMint) |
|
|
Product CRUD for marketplace developers (Bazaar) |
|
|
Product browsing and acquisition (Bazaar) |