Skip to content

Introduction

The ICDC Platform provides users with the ability to efficiently and securely manage computing resources.
This document describes the key concepts and main features of the platform, which form the foundation for users' interaction with cloud resources.

The diagram below illustrates the general structure of the interaction between Locations, Accounts, and Users within the platform:

Glossary

Key terms and their functional purposes:

  • Location - an autonomous part of the cloud installed on dedicated hardware (e.g., LOC1, LOC2, LOC3). It represents the physical location of computing resources such as virtual processors, RAM, and storage.
    Each location includes internal infrastructure components and has a unique three-letter code that incorporates a country code.
    Within a location, Accounts are created by the location administrator.
    A Location is managed by an Operator, who may use their own equipment or third-party hardware.

  • Operator — the owner of a private or public cloud business managing one or more Locations.

  • Regional Location (REG) manages user access and roles for Accounts and resources.

  • Account is an organizational structure where computing resources are hosted, and a group of users is defined. Each account is isolated within its own security perimeter, allowing users to create and manage their own information systems.
    Every user belongs to at least one account. An account can be accessible in multiple Locations simultaneously.

  • Resource Partition — a part of a Location's resources allocated to a specific Account and limited by the account's assigned quota.

User Roles

The user's role determines the functionality available in the services:

Role Assignment Scope
Operator Owner of a public or private cloud business. Objects of all Accounts in the Location.
Owner Users fully responsible for account actions, security, and billing. All objects within the Account.
Admin Manages Account settings and user actions, ensuring security, but cannot manage billing. All Account objects except billing settings.
Member Views and uses all services of the Location. Only their own objects.

Browsers Compatibility

For consistent Platform performance and correct page display, we recommend using one of these compatible browser versions:

Browser Compatibility
Chrome Version 57 and newer
Firefox Version 52 and newer
Opera Version 44 and newer
Safari Version 12 and newer
Edge Version 57 and newer
Internet Explorer Not supported

Authentication

To start using ICDC Platform services, you need to sign in.

  1. On the login page, fill in the following fields:

    • Username or email — your username or email address;
    • Password — your password.
  2. Click the Sign in button.

For improved security, it is recommended to use a One-Time Password (OTP). OTP can be configured in the user account console.

Setting Up Two-Factor Authentication

To enhance account security, you can enable two-factor authentication (2FA).

  1. Open your account console in Keycloak.
  2. Navigate to: Account securitySigning inTwo-factor authenticationSetup authenticator application.

  3. Follow the instructions:

    • Install one of the following authenticator apps on your mobile device:

      • Microsoft Authenticator
      • Google Authenticator
      • FreeOTP
    • Open the app and scan the QR code or enter the provided key manually.

    • Enter the one-time code generated by the app and click Submit to complete the setup.

After completing these steps, two-factor authentication will be enabled.

You can manage OTP settings in the account console, including disabling two-factor authentication if needed.

Signing In with 2FA Enabled

If two-factor authentication is enabled, the login process includes two steps:

  1. Enter your Username or email and Password.
  2. Enter the one-time password (OTP) generated by your authenticator app.