Understand resource scoping in Vultr IAM. Resource scoping lets you grant permissions on specific resources instead of all resources within a service category.
Resource scoping is the ability to restrict a permission policy to specific resources rather than applying it broadly across an entire service. Without resource scoping, a policy that grants access to Object Storage applies to all subscriptions in your organization. With resource scoping, the same policy can be restricted to only specific subscriptions, giving you precise control over exactly which resources a user, group, or role can interact with.
Every permission policy in Vultr IAM has a resource field in its definition that determines the scope of the policy. This field accepts either:
*) — the policy applies to all resources of the targeted service and action. This is the default scope for Vultr-managed policies.For example, a policy granting read and list access to Object Storage scoped to a specific UUID will allow the user to read and list that subscription only. All other subscriptions in the organization remain inaccessible to that user unless another policy explicitly grants access to them.
A permission policy in Vultr IAM operates across three layers simultaneously:
object-storage, compute, vke)create, read, update, delete, list)*) or specific resources by UUIDWhen creating or editing a custom permission policy in the Vultr Console, resource scoping is available directly in the visual policy builder. After selecting a service and defining actions, you can optionally specify resource UUIDs to scope the policy. If no UUID is provided, the policy applies broadly using the * wildcard.