Updated on 2024-04-11 GMT+08:00

Creating a User and Granting Permissions

This chapter describes how to use Identity and Access Management (IAM) to implement fine-grained permissions control for your RDS resources. With IAM, you can:

  • Create IAM users for employees based on your enterprise's organizational structure. Each IAM user will have their own security credentials for accessing RDS resources.
  • Grant only the permissions required for users to perform a specific task.
  • Entrust a account or cloud service to perform efficient O&M on your RDS resources.

If your account does not require individual IAM users, skip this chapter.

This section describes the procedure for granting permissions (see Figure 1).

Prerequisites

Learn about the permissions (see ) supported by RDS and choose policies or roles according to your requirements. For the system policies of other services, see .

For more information about system policies supported by RDS, see Permissions Management.

Process Flow

Figure 1 Process for granting RDS permissions
  1. Create a user group and assign permissions to it.

    Create a user group on the IAM console, and attach the RDS ReadOnlyAccess policy to the group.

  2. Create an IAM user and add it to the user group

    Create a user on the IAM console and add the user to the group created in 1.

  3. Log in and verify permissions.

    Log in to the RDS console by using the created user, and verify that the user only has read permissions for RDS.

    • Choose Service List > Relational Database Service and click Buy DB Instance. If a message appears indicating that you have insufficient permissions to perform the operation, the RDS ReadOnlyAccess policy has already taken effect.
    • Choose any other service in Service List. If a message appears indicating that you have insufficient permissions to access the service, the RDS ReadOnlyAccess policy has already taken effect.