# Introduction

**FPT Identity & Access Management (FPT IAM)** is a feature that allows Tenant owners to share access to resources on their **FPT Cloud** with other users with different permissions.&#x20;

Some basic concepts in FPT IAM:&#x20;

* **Role**: The user's role within the organization, which defines the permissions the user is capable of performing.&#x20;
* Currently, FPT IAM supports two basic roles: **Super Admin** and **Readonly**. If these two roles do not meet your needs, you can create Custom Roles with customizable permissions.&#x20;
* Each role has a list of permissions.&#x20;
* **Permission**: determines what features a user can perform on which resources. Each permission belongs to one role.&#x20;
* **User group**: A group of users with the same role (by tenant or VPC).&#x20;
* **IAM users**: Users added to the tenant who have the right to interact with resources in the tenant according to their assigned role.&#x20;

The tenant owner has full control over all VPC resources, including permission features. This account will be assigned the ORG Admin role by default.&#x20;

To use IAM, the **Tenant Owner** must first create roles and permissions for roles (Instance manager, Data analyst, etc.) and create user groups assigned to the corresponding roles.&#x20;

* For the created User group, the Tenant owner can select and customize the Role and Permission as appropriate.&#x20;
* Assign permissions by inviting additional IAM users to the User group via email.&#x20;
* After receiving the invitation, IAM users can register/log in or log in via the organization's SSO to the FPT Portal as instructed and use the resources in the invited VPC/Tenant.&#x20;
