The Basics of Cloudalus IAM

5 min read
Back to Blog

A brief overview of the Cloudalus Identity and Access Management (IAM) system.

Cloudalus's Identity and Access Management (IAM) system is a powerful tool that allows you to control who has access to your resources and what they can do with them. It's a fundamental building block of security on Cloudalus, and it's important to understand how it works.

The core of Cloudalus IAM is the concept of a policy. A policy is a JSON document that defines a set of permissions. These permissions can be attached to users, groups, or roles. When a user tries to access a resource, Cloudalus evaluates all the policies that apply to that user and determines whether they have the necessary permissions.

There are three main types of policies in Cloudalus IAM:

  • Identity-based policies are attached to a single user, group, or role. They define the permissions that are granted to that identity.
  • Resource-based policies are attached to a resource, such as a database or a storage bucket. They define who has access to that resource and what they can do with it.
  • Session policies are temporary policies that are created when a user assumes a role. They define the permissions that are granted to the user for that session.

By combining these different types of policies, you can create a flexible and granular access control system that meets the needs of your organisation.

C
Cloudalus

© 2026 Cloudalus. All rights reserved.

* Redis is a trademark of Redis Labs Ltd. Any rights therein are reserved to Redis Labs Ltd. Any use by Cloudalus is for referential purposes only and does not indicate any sponsorship, endorsement or affiliation between Redis and Cloudalus.