Users

Path: Left sidebar > Object Storage > Users

When to Use:

  • When onboarding object-storage access for users, applications, or automation.

  • When rotating credentials, adjusting quotas, or reviewing account state.

Purpose:

This page explains how to create users and roles, retrieve credentials, and manage user-level quotas and access state.

Steps:

  1. Open Object Storage > Users.

  2. Review the Users or Roles tab based on the task.

  3. Create or expand the target user or role.

  4. Validate credentials, quota settings, and account state after the change.

Expected Outcome:

  • You can create or update the required object-storage identity and confirm it is ready for use.

What You See:

  • User and role tables, create panels, expanded tabs for details and keys, and quota actions.

What This Screenshot Shows:

  • The screenshots on this page show the create-user, role, and expanded user-detail workflows in a reference environment.

Actions in This Screen:

  • Create users and roles.

  • Expand users to review keys, quotas, and capabilities.

  • Edit, suspend, or quota-manage existing accounts.

If this fails:

  1. Confirm the required owner, tenant, or quota prerequisite exists first.

  2. Retrieve and store credentials immediately if the key pair is newly created.

  3. Re-open the expanded row or create panel if the UI state did not refresh.

Users Overview

The Users page manages all S3 and Swift user accounts that can access object storage. Every client application that reads or writes objects needs a user account with valid credentials.

The page has two tabs: Users and Roles.

Users List - Column Reference

Column

What It Shows

Username

The unique user ID used as the S3 access-key owner identifier

Full Name

The display name for this account

Email

Email address associated with the account

Suspended

Whether this account is locked. No (green dot) means active.

Max Buckets

Maximum number of buckets this user can create

Capacity Limit

Whether a storage quota is enforced. - means no quota is set.

Note

Use the status text values (for example No, Enabled, Disabled) as authoritative. Dot colors can vary by UI theme.

Tip

Suspended means the account cannot make new S3/Swift requests. Existing data, buckets, and keys are preserved. Re-enable by editing the user and unchecking Suspended.

How To Create A User

Path: Object Storage > Users > + Create User

  1. Open Object Storage > Users.

  2. Click + Create User.

  3. In User ID, enter a unique identifier (lowercase, hyphens, numbers).

  4. Leave Show Tenant unchecked for standard deployments.

  5. Enter Full Name.

  6. Enter Email (optional).

  7. Set Max Buckets to the limit required by your team policy.

  8. Leave Suspended unchecked for a new active account.

  9. Keep S3 Key > Auto-generate key checked.

  10. Keep User Quota and Bucket Quota disabled unless limits are needed.

  11. Review values and click Create User.

Expected Outcome:

  • User appears in the list with Suspended = No.

  • S3 Access Key and Secret Key are generated.

  • Expand row > and open Keys tab to retrieve credentials.

Important

Do not uncheck Auto-generate key unless you explicitly need user-supplied keys.

Warning

Secret Key is masked in the Keys tab. Use the reveal icon, copy it immediately, and store it securely. If lost, generate a new key pair.

Note

In the create panel, Create User saves the account and X closes the panel without creating the user.

Object Users page with Create User panel

What This Screenshot Shows: Create User Panel (UI Reference; Values Depend On Your Environment).

Create User - Field Reference

Field

Value / Options

Description

User ID *

Text input

Required. Unique. Lowercase with hyphens. S3 account identifier.

Show Tenant

Optional checkbox

For multi-tenant RGW setups. Leave unchecked for standard deployments.

Full Name *

Text input

Required display name. Does not change API identity.

Email address

Optional text input

Reference only. Does not affect authentication.

Max buckets

Dropdown

Maximum bucket count this user can create.

Suspended

Checkbox

Creates account in locked state if checked.

S3 Key > Auto-generate key

Checkbox

Generates Access Key and Secret Key automatically.

User quota > Enabled

Checkbox

Enforces total storage limit across all this user’s buckets.

Bucket quota > Enabled

Checkbox

Enforces per-bucket limit for all buckets this user creates.

User Detail Tabs

Expand a user row using chevron >. Five tabs appear.

Top-right actions in expanded panel: Edit and Quota.

Details Tab

Field

What It Shows

User ID

Unique user identifier used for S3 requests and bucket ownership

Display Name

Human-readable full name

Email

Email on file. - means none set

Max Buckets

Maximum bucket count this user can own

Suspended

Current account state. No (green dot) means active

Note

In this expanded view, Edit updates user properties and Quota opens the quota form for this same user. After you click Edit User in the edit panel, changes are saved immediately for that user.

Object Users expanded row details tab

What This Screenshot Shows: Users Expanded Row - Details Tab (UI Reference; Values Depend On Your Environment).

Keys Tab

Field

What It Shows

User

The user ID this key belongs to

Access Key

Public Access Key ID used by clients

Secret Key

Masked in the list view. Reveal icon shows full value.

Note

The expanded panel action buttons (Edit and Quota) remain available while you are on the Keys tab. Clicking Edit opens the user edit panel; after Edit User, updated user fields apply immediately.

How to retrieve S3 credentials after user creation:

  1. Expand user row >.

  2. Click Keys tab.

  3. Copy Access Key.

  4. Reveal and copy Secret Key.

  5. Store both in a password manager or secrets vault.

Tip

You can use multiple key pairs per user for zero-downtime credential rotation.

Warning

If a secret is compromised, delete that key pair immediately and create a new one.

Object Users expanded row keys tab with masked secret

What This Screenshot Shows: Users Expanded Row - Keys Tab (UI Reference; Values Depend On Your Environment).

Subusers Tab

Shows Swift sub-user accounts under the main user.

Empty state (No subusers found) is normal for S3-only deployments.

Note

Edit and Quota remain available in the expanded panel while viewing Subusers. Clicking Edit opens the user edit panel; after Edit User, updated user fields apply immediately.

Subuser Access Level

What It Allows

read

Read-only via Swift API

write

Write-only via Swift API

read-write

Read and write via Swift API

full

Full Swift operations including admin functions

Object Users expanded row subusers tab empty state

What This Screenshot Shows: Users Expanded Row - Subusers Tab (UI Reference; Values Depend On Your Environment).

Capabilities Tab

Shows fine-grained RGW admin API capabilities for this user.

Empty state (No capabilities found) is the recommended starting state for standard storage users.

Note

Edit and Quota remain available in the expanded panel while viewing Capabilities. Clicking Edit opens the user edit panel; after Edit User, updated user fields apply immediately.

Capability

What It Allows

users

Read/write user management via admin API

buckets

Read/write bucket management via admin API

metadata

Cluster metadata access

usage

Usage statistics access

zone

Zone configuration access

Warning

Capabilities grant administrative power beyond a user’s own data. Standard user accounts should have zero capabilities.

Object Users expanded row capabilities tab empty state

What This Screenshot Shows: Users Expanded Row - Capabilities Tab (UI Reference; Values Depend On Your Environment).

Quota Tab

Shows current quota settings for this user.

Field

What It Shows

Quota Enabled

Disabled (grey dot) means no quota; Enabled (green dot) means active

Max Size

Maximum total storage across all user buckets; Unlimited if unset

Max Objects

Maximum total object count; Unlimited if unset

How to change quota settings:

  1. Expand user row > and open Quota tab.

  2. Click Quota button in expanded panel.

  3. Enable quota toggle.

  4. Enter Max Size (KB) and/or Max Objects.

  5. Click Save.

Note

When quota is reached, further uploads are rejected. Existing objects remain readable/deletable until space is freed or limits are raised.

Note

In this view, Quota opens the quota edit form and Edit opens user account editing for the same user. After Edit User, updated user fields apply immediately.

Object Users expanded row quota tab

What This Screenshot Shows: Users Expanded Row - Quota Tab (UI Reference; Values Depend On Your Environment).

User Actions

Edit User

How to access:

  • Expand user row and click Edit.

What you can change:

  • Full Name

  • Email

  • Max Buckets

  • Suspended state

  • User Quota

  • Bucket Quota

What you cannot change:

  • User ID (permanent)

Steps:

  1. Expand user row.

  2. Click Edit.

  3. Update fields.

  4. Click Edit User.

Expected Outcome:

  • Changes apply immediately. Suspending blocks API access within seconds.

  • Existing data and credentials remain preserved.

When to suspend a user:

  • Team member departed and access must be blocked without data deletion.

  • Credential compromise investigation requires temporary lock.

  • Service account must be paused during maintenance.

Delete User

How to access:

  • Click trash icon on the user row.

Before you delete (mandatory check):

Deleting a user does not delete their buckets or objects. Buckets remain ownerless unless reassigned/deleted first.

Steps:

  1. Open Object Storage > Buckets.

  2. Find buckets owned by this user.

  3. Delete buckets or reassign owner to another active user.

  4. Return to Object Storage > Users.

  5. Click trash icon on user row.

  6. Confirm deletion.

Expected Outcome:

  • User account and access keys are permanently removed.

  • Any client using those credentials loses access immediately.

Warning

Deleting a user is permanent. User ID cannot be reused.

Troubleshooting - Users

Problem You See

Most Likely Cause

What To Do

+ Create User button missing

Viewer role

Request Operator or Administrator role

Cannot retrieve Secret Key

Key not captured or not revealed

Open Keys tab and reveal secret; if unavailable, generate new key pair

Invalid credentials from client

Wrong key pair or deleted key

Verify client key against Keys tab; generate new key pair if needed

S3 requests rejected for this user

Account suspended

Check Suspended in Details; uncheck via Edit if appropriate

User cannot create more buckets

Max Buckets limit reached

Increase Max Buckets in Edit

Uploads failing for this user

User quota reached

Check Quota tab; delete objects or increase quota

Note

If issue persists, raise a support ticket via Monitoring > Alerts or Karios Support.

Roles Tab

Path: Object Storage > Users > Roles

The Roles tab manages IAM-style roles for federated identity access to object storage. Roles define what an assumed identity can do using a JSON trust policy without issuing permanent S3 credentials.

Empty state (No IAM roles found) is normal for new deployments.

Note

Use + Create Role in the top-right area to open the role creation panel.

Object Users roles tab empty state

What This Screenshot Shows: Roles Tab (UI Reference; Values Depend On Your Environment).

Roles List - Column Reference

Columns in this section are visible after at least one role exists. In new deployments, the Roles page shows the No IAM roles found empty state.

Column

What It Shows

Role Name

Unique role identifier

Path

Organizational prefix (for example /application/)

ARN

Unique Amazon Resource Name for the role

Create Date

Timestamp when the role was created

How To Create An IAM Role

Path: Object Storage > Users > Roles > + Create Role

  1. Open Object Storage > Users.

  2. Click Roles tab.

  3. Click + Create Role.

  4. Enter Role Name.

  5. Set Path (optional).

  6. Enter Assume Role Policy Document JSON.

  7. Click Create.

Policy template shown in the form:

{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Principal":{"AWS":["*"]},"Action":["sts:AssumeRole"]}]}

For production, replace * with specific allowed principals.

Expected Outcome:

  • Role appears in Roles list with name, path, and ARN.

Create IAM Role panel in Object Users roles tab

What This Screenshot Shows: Create IAM Role Panel (UI Reference; Values Depend On Your Environment).

Note

In the role panel, Create saves the role and X closes the panel without creating it.

Note

Roles are an advanced federated-identity feature. Standard team and service access should use Users with S3 credentials.