检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Using IAM to Grant Access to RDS Creating a User and Granting Permissions RDS Custom Policies
The following is an example deny policy: { "Version": "1.1", "Statement": [{ "Action": ["rds:instance:delete"], "Effect": "Deny" }] } Parent Topic: Using IAM to Grant Access to RDS
For details, see Granting IAM Users Under an Account the Access to a Bucket and Resources in the Bucket. Download the backup. On the OBS Browser+ page, click the bucket that you added.
For details, see Granting IAM Users Under an Account the Access to a Bucket and Resources in the Bucket. Download the backup file. On the OBS Browser+ page, click the bucket that you added.
Operation Process Process Description Preparations Sign up for a HUAWEI ID, enable Huawei Cloud services, make sure you have a valid payment method configured, create IAM users, and grant them specific RDS permissions.
You can create an IAM user and user group on the IAM console and grant the user specific operation permissions, to perform refined management on Huawei Cloud. For details, see Creating a User and Granting Permissions. Procedure Go to the Buy DB Instance page.
This permission can be granted using Identity and Access Management (IAM). On the IAM console, add permission policies to user groups. For details, see Creating a User Group and Assigning Permissions.
Parent Topic: Using IAM to Grant Access to RDS
To use DBA Assistant on the RDS console, IAM users must have the RDS FullAccess, DAS FullAccess, DAS Administrator, and CES FullAccess permissions. For details, see Creating a User and Granting Permissions.
IAM users can use RDS resources only after their accounts and passwords are verified. For details, see Step 2: Create IAM Users and Log In.
Access Control RDS controls access through the account/IAM user and security groups. When you create an RDS DB instance, an account is automatically created. To separate out specific permissions, you can create IAM users and assign permissions to them as needed.
iam:roles:listRoles, and iam:agencies:pass actions.