Help Center/ Data Replication Service/ API Reference/ Permissions and Supported Actions/ Actions Supported by Policy-based Authorization
Updated on 2025-12-15 GMT+08:00

Actions Supported by Policy-based Authorization

This section describes the actions supported by DRS in policy-based authorization.

Supported Actions

DRS provides system-defined policies that can be directly used in IAM. You can also create custom policies to supplement system-defined policies for more refined access control. Operations supported by policies are specific to APIs. The following are common concepts related to policies:

  • Permissions: statements in a policy that allow or deny certain operations.
  • APIs: REST APIs that can be called by a user who has been granted specific permissions.
  • Actions: specific operations that are allowed or denied in a custom policy.
  • Dependencies: actions which a specific action depends on. When allowing an action for a user, you also need to allow any existing action dependencies for that user.
  • IAM projects/Enterprise projects: the authorization scope of a custom policy. A custom policy can be applied to IAM projects or enterprise projects or both. Policies that contain actions for both IAM and enterprise projects can be used and applied for both IAM and Enterprise Management. Policies that contain actions only for IAM projects can be used and applied to IAM only. Administrators can check whether an action supports IAM projects or enterprise projects in the action list. For details about the differences between IAM projects and enterprise projects, see What Are the Differences Between IAM and Enterprise Management?

DRS supports the following actions in custom policies:

The check mark (√) indicates that the action takes effect. The cross mark (x) indicates that the action does not take effect.

Table 1 Task actions

Permission

API

Action

IAM Project

Enterprise Project

Creating tasks in batches

POST /v3/{project_id}/jobs/batch-creation

drs:migrationJobs:create (To create an instance, an IAM user must be granted the RDS ReadOnlyAccess, VPC FullAccess, and SMN FullAccess permissions in the project.)

Testing connections in batches

POST /v3/{project_id}/jobs/batch-connection

drs:migrationJobs:connect (To test the connection, an IAM user must be granted the VPC FullAccess permission in the project.)

Testing connections in batches (cluster mode)

POST /v3/{project_id}/jobs/cluster/batch-connection

drs:migrationJobs:connect (To test the connection, an IAM user must be granted the VPC FullAccess permission in the project.)

Modifying tasks in batches

PUT /v3/{project_id}/jobs/batch-modification

drs:migrationJob:modify

Querying objects selected in batches

PUT /v3/{project_id}/jobs/batch-select-objects

drs:migrationJobs:select (To obtain object selection information, an IAM user must be granted the RDS FullAccess and DAS FullAccess permissions in the project.)

Performing a batch pre-check

POST

/v3/{project_id}/jobs/batch-precheck

drs:migrationJob:action

Querying pre-check results in batches

POST /v3/{project_id}/jobs/batch-precheck-result

drs:migrationJob:get

Setting flow control for tasks

PUT

/v3/{project_id}/jobs/batch-limit-speed

drs:migrationJobs:update

Obtaining database parameters in batches

POST /v3/{project_id}/jobs/batch-get-params

drs:databaseParameters:get

Modifying database parameters

POST /v1.0/{projectId}/jobs/{jobId}/params

drs:dataBaseParams:modify (An IAM user must be granted the RDS ReadOnlyAccess, VPC FullAccess, SMN FullAccess and DAS FullAccess permissions.)

Starting tasks in batches

POST /v3/{project_id}/jobs/batch-starting

drs:migrationJob:action

Resuming or retrying tasks in batches

POST /v3/{project_id}/jobs/batch-retry-task

drs:migrationJob:action

Pausing tasks in batches

POST /v3/{project_id}/jobs/batch-starting

drs:migrationJob:action

Stopping and deleting tasks in batches

DELETE /v3/{project_id}/jobs/batch-jobs

drs:migrationJobs:delete (To stop or delete an instance, an IAM user must be granted the RDS ReadOnlyAccess, VPC FullAccess, and SMN FullAccess permissions in the project.)

Changing the passwords of the source and destination databases in batches

PUT /v3/{project_id}/jobs/batch-modify-pwd

drs:migrationJobs:update

Setting definers in batches

POST /v3/{project_id}/jobs/batch-replace-definer

drs:migrationJob:updateJobConfig

Creating comparison tasks in batches

POST /v3/{project_id}/jobs/batch-create-compar

drs:migrationCompareJob:create

Querying comparison results in batches

POST /v3/{project_id}/jobs/batch-compare-result

drs:CompareJob:getResult

Querying task progress in batches

POST /v3/{project_id}/jobs/batch-progress

drs:migrationJobs:getProgress

Querying tasks of a tenant

POST /v3/{project_id}/jobs

DRS ReadOnlyAccess

Querying task details in batches

POST /v3/{project_id}/jobs/batch-detail

drs:migrationJob:get

Querying task statuses in batches

POST /v3/{project_id}/jobs/batch-status

drs:migrationJob:get

Updating migration user information in batches

GET /v3/{project_id}/jobs/{job_id}/get-src-user

drs:migrationJob:modifyUserInfo

Obtaining the migration user information of the source database

PUT /v3/{project_id}/jobs/batch-update-user

drs:migrationJob:getSrcUsers

Processing data in batches

POST /v3/{project_id}/jobs/batch-transformation

drs:migrationJob:action

Performing primary/standby switchovers in batches

POST /v3/{project_id}/jobs/batch-switchover

drs:disasterRecoveryJob:switchover

Querying RPO and RTO information in batches

POST /v3/{project_id}/jobs/batch-rpo-and-rto

drs:dataGuardJob:list

Querying DR monitoring data

POST /v3/{project_id}/jobs/disaster-recovery-monitoring-data

drs:disasterRecoveryJob:get

Querying the DR initialization progress in batches

POST /v3/{project_id}/jobs/batch-struct-process

drs:disasterRecoveryJob:get

Querying DR initialization object details in batches

POST /v3/{project_id}/jobs/{type}/batch-struct-detail

drs:disasterRecoveryJob:get

Querying quotas

GET /v3/{project_id}/quotas

drs:quota:get