CoreWeave Identity and Access Management (IAM) controls access to Cloud Platform resources using IAM Access Policies. These policies define which principals (users or groups) are allowed to perform specific actions across CoreWeave services. There are also separate authorization mechanisms for the following services:Documentation Index
Fetch the complete documentation index at: https://docs.coreweave.com/llms.txt
Use this file to discover all available pages before exploring further.
| Authorization Area | Description |
|---|---|
| The AI Object Storage S3-compatible API, which is governed by organization and bucket access policies | Controls access to data in CoreWeave AI Object Storage. |
| CKS authorization within clusters | Access and roles for Kubernetes resources managed by CKS. |
| SUNK cluster access, managed through SUNK User Provisioning (SUP) | SUP provisions CoreWeave IAM user and group data into POSIX identities in the cluster. IAM Access Policies do not directly govern SUNK cluster access. |
Next steps
- Learn about IAM Access Policies.
- Create an IAM Access Policy.