Create a Subuser
Step 1: Open the Sub-user Management
You can create only three SubUsers.
Log in to the Zata.ai dashboard.
From the left sidebar, go to Subusers → Subusers
You will see the Sub-user Management page

Step 2: Create a New Subuser
Click on Create Subuser (top right button)
A popup will open: Create Subuser
Required Fields
Username:
Must be unique
Allowed characters:
Letters (a–z, A–Z)
Numbers (0–9)
Dot (.)
Underscore (_)
Dash (-)
Length: 1–64 characters
Email:
Enter a valid email address
Region:
Select the required region from dropdown(indore)
Optional Field
Description
Add any note (optional)

Step 3: Create the Sub-user
Click on Create Subuser
After clicking:
Sub-user is created successfully
A credentials file is automatically downloaded
Important Note:
This file contains:
Access Key
Secret Key
You cannot retrieve the Secret Key again later.
Step 4: Save Credentials Securely
Downloaded file must be stored securely
If lost:
You need to generate a new key
Old key must be deleted.
Step 5: Verify Sub-user Creation
After creation, you will see the sub-user listed with:
Username
Assigned Buckets
Status (Active)
Last Active
Actions
Status should be Active but Initially, no bucket is assigned

Step 6: Open Sub-user Details
Click on the Sub-user name
You will open Bucket Access Management page
Step 7: Assign Bucket
Click on + Assign New Bucket
You will proceed to assign access to a bucket

Step 8: Configure Access Rule
A popup will appear: Add Access Rule
Select permission:
View Only
Read access
Upload Only
Upload only
View & Upload
Read + Write
Full Access
Complete control
For testing, select Full Access
Click Create Rule

Step 9: Verify Access Rule
You will be redirected to Manage Bucket Access Rules page
Check:
Permission → Full Access
Status → Active
This confirms access is successfully configured

Step 10: Final Verification
Go back to Sub-user Management page.
Check:
Assigned Buckets : 1
Status : Active
Sub-user is now ready to use

Sub-user creation and access configuration is successfully completed. The user can now access assigned buckets using S3-compatible tools.

Last updated