Help Center/ TaurusDB/ User Guide/ Using IAM to Grant Access to TaurusDB/ Creating an IAM User and Granting TaurusDB Permissions
Updated on 2025-08-21 GMT+08:00

Creating an IAM User and Granting TaurusDB Permissions

This section describes how to use IAM for fine-grained permissions control over your TaurusDB resources. With IAM, you can:

  • Create IAM users for employees based on your enterprise's organizational structure. Each IAM user will have their own security credentials for accessing TaurusDB resources.
  • Grant only the permissions required for users to perform specific tasks.
  • Entrust an account or cloud service to perform professional and efficient O&M on your TaurusDB resources.

If your account does not require individual IAM users, skip this section.

Figure 1 describes the procedure for granting permissions.

Prerequisites

Learn about the permissions (see system-defined permissions) supported by TaurusDB and choose roles or policies according to your requirements. For the permissions of other services, see system-defined permissions.

Process Flow

Figure 1 Process for granting TaurusDB permissions
  1. Create a user group and assign permissions to it.

    Create a user group on the IAM console and assign the GaussDBFullAccessPolicy permissions to the group.

    To use some interconnected services, you also need to configure permissions of such services. For example, when using DAS to connect to a DB instance, you need to configure the GaussDBFullAccessPolicy and DASFullAccesssPolicy permissions.

  2. Create an IAM user.

    Create a user on the IAM console and add the user to the group created in 1.

  3. Log in and verify permissions.

    Log in to the TaurusDB console using the created user, and verify that the user only has read permissions for TaurusDB.

    Choose Service List > TaurusDB and click Buy DB Instance. If you can buy an instance, the required permission policy has already been applied.