Access Management
Access Accounts
On the vDB service, you can use 2 types of accounts to access OpenSearch. Details of these 2 types include:
Root user account: This is the first account created to access GreenNode with full access to all resource services on GreenNode.
IAM user account: This is an account created through the IAM system and used to operate through the vDB Portal.
Root user account
Create Root User Account
To create a Root user account, please register at the registration page https://register.vngcloud.vn/signup.
After creating the Root user account, collect the following information to access and work with resources using the Root user account:
The email address used to create the Root user account.
The password for the Root user account.
Cancel Root User Account
To cancel a Root account, you need to contact us by creating a ticket requesting account cancellation. For more details, see Account Cancellation Guide.
IAM user account
Create IAM User Account
To create an IAM user account, please first refer to the guide below:
Log in to https://iam.console.vngcloud.vn/ with your Root User Account.
Select User Account.
Select Create a User Account.
In the Account username field, enter your desired Account username. The IAM User Account name must be between 5 (minimum) and 50 (maximum) characters long and can only include uppercase and lowercase letters (a-z, A-Z), numbers (0-9), periods (.), underscores (_), and hyphens (-). The IAM User Account name should not contain sensitive information (e.g., IP addresses, login passwords,...) and the IAM User Account name must be unique within a GreenNode account until that IAM User Account is deleted. For example, the following IAM User Account name is valid: IAM_Sales_Department_01.
Select Add a username.
In the Account password field, you can:
Enter your desired password. The password must be between 8 (minimum) and 50 (maximum) characters long and must include at least 1 uppercase letter (A-Z), 1 lowercase letter (a-z), 1 number (0-9), and 1 special character (!@#$%,...).
Select Auto-generate if you want the system to automatically create a password for you.
Select Copy to copy the password. You must collect this information to access vDB OpenSearch using the IAM User Account.
Select Create User Account.
Create policy for IAM user account
To create a policy for accessing vDB OpenSearch resources, follow the steps below:
Log in to https://iam.console.vngcloud.vn/ with your Root User Account.
Select the Policy folder.
Select Create a Policy.
Enter Name and Description for the Policy.
Select Next step.
Select Product as vdb-opensearch.
Select Actions:
Select Allow permissions: by default, the vIAM system will always enable this, meaning permissions are allowed to be applied on the policy. If you disable this mode, the system will deny (reverse) the corresponding permissions.
Allow permissions: allows access according to the selected action.
Deny permissions: denies access according to the selected action.
Select All vdb-opensearch actions if you want to create a policy with permission to perform all actions on vDB OpenSearch. For detailed action descriptions, please refer to Features, OpenSearch Cluster Resources and Access Rights.
Select Resources: Select All resources if you want the selected access permissions to be allowed to access all resources on your SSO account.
After completing these 8 steps, the policy for OpenSearch cluster has been created. Next, assign it to the IAM User Account.

Link IAM User Account with corresponding policy
After you have created the IAM User Account and desired Policy, you need to link the IAM User Account to the policy following the guide below:
Log in to https://iam.console.vngcloud.vn/ with your Root User Account.
Select the User Account folder.
Select the IAM User Account you want to assign permissions to.
Select Attach policies.
Select the policies you want. The vIAM system supports attaching multiple policies to a single IAM User Account. If these policies contain independent permissions, they will complement each other (i.e., permission lists are merged). Conversely, if these policies contain conflicting permissions, you will not be able to access the corresponding resources according to these permission lists (i.e., permission lists are merged and when conflicting, they cancel each other out).
Select Attach.
Access Management
Access resources using Root user account
Follow the steps below to log in to vDB OpenSearch with a Root user account:
Access the vDB OpenSearch login page: https://signin.vngcloud.vn.
The main login page will appear. Select LOG IN WITH ROOT USER.
Enter the email address and password linked to your account and select Log in. If you previously logged in as root user in this browser, your browser may remember the email address for the Root User Account. If so, you will see the screen shown in the next step. If you previously logged in as an IAM user using an IAM User Account in this browser, your browser may display the IAM user login page instead. To return to the main login page, select LOG IN WITH ROOT USER.
After successful login, you have full access and can perform all features provided by the vDB OpenSearch service on your resources.
Access resources using IAM user account
Follow the steps below to log in to vDB OpenSearch with an IAM user account:
Access the vDB OpenSearch login page: https://signin.vngcloud.vn.
The main login page will appear. Select LOG IN WITH IAM USER ACCOUNT.
Enter the email address of the Root user when registering the GreenNode account.
Enter the username and password of the IAM user account created on the vIAM system.
Select LOG IN WITH IAM USER ACCOUNT. If you previously logged in as an IAM user account in this browser, your browser may remember the IAM user account address. If so, you will see the screen shown in step 3. After successful login with IAM user account, the main screen of vDB OpenSearch will display the user type you are using to log in (Root user account or IAM user account).
After successful login, you have access and can perform features provided by the vDB OpenSearch service on resources that have been authorized for you.
Last updated

