检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Using IAM Roles or Policies to Grant Access to RDS Identity and Access Management (IAM) lets you manage role/policy-based permissions of your RDS instances. With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure.
Using IAM Identity Policies to Grant Access to RDS Identity and Access Management (IAM) lets you manage identity policy-based permissions of your RDS instances. With IAM, you can: Create IAM users or user groups for personnel based on your enterprise's organizational structure.
Using IAM to Grant Access to RDS Using IAM Roles or Policies to Grant Access to RDS Using IAM Identity Policies to Grant Access to RDS
Creating a Subaccount of rdsuser Describes the permissions of the rdsuser account and how to create and manage IAM users under the rdsuser account. Creating tempdb Files Describes how to create tempdb temporary data files on RDS for SQL Server.
This permission can be granted using Identity and Access Management (IAM). On the IAM console, add permission policies to user groups. For details, see Creating a User Group and Assigning Permissions.
To use DBA Assistant on the RDS console, IAM users must have the RDS FullAccess, DAS FullAccess (or DAS Administrator), and CES FullAccess permissions. To grant these permissions, see Using IAM Roles or Policies to Grant Access to RDS.
IAM users can use RDS resources only after their accounts and passwords are verified. For details, see Creating an IAM User and Logging In.
Access Control RDS controls access through the account/IAM user and security groups. When you create an RDS DB instance, an account is automatically created. To separate out specific permissions, you can create IAM users and assign permissions to them as needed.
For details, see Granting IAM Users Under an Account the Access to a Bucket and Resources in the Bucket. Download the backup file. On the OBS Browser+ page, click the bucket that you added.
iam:agencies:listAgencies, iam:roles:listRoles, and iam:agencies:pass actions.