Updated on 2025-11-11 GMT+08:00

Permissions Management

If you need to assign different permissions to employees in your enterprise to access your DWS resources on Huawei Cloud, IAM is a good choice for fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you secure access to your Huawei Cloud resources. If your account does not require IAM for permissions management, you can skip this section.

IAM can be used free of charge. You pay only for the resources in your account.

With IAM, you can control users' access to Huawei Cloud resources through authorization. For example, if you want some software developers in your enterprise to use DWS resources but do not want them to delete DWS clusters or perform any high-risk operations, you can create IAM users and grant permissions to them to use DWS clusters but not permissions to delete clusters.

There are two types of IAM authorization: role/policy-based authorization and identity policy-based authorization.

The following table describes the main differences.

Table 1 Differences between role/policy-based and identity policy-based authorization

Name

Authorization Using

Permission

Authorization Method

Description

Role/Policy

User-permissions-authorization scope

  • System-defined role
  • System-defined policy
  • Custom policy

Assigning roles or policies to principals

To authorize a user, add it to a user group and specify the scope of authorization. It is hard to provide fine-grained permissions control using authorization granted by user groups and a limited number of condition keys. This method is suitable for small and medium-sized enterprises.

Identity policy-based authorization

User-policy

  • System-defined policy
  • Custom identity policy
  • Assigning identity policies to principals
  • Attaching identity policies to principals

To authorize a user, grant an identity policy to it. User-specific authorization and a variety of key conditions allow for more fine-grained permissions control. However, this model can be hard to set up. It requires a certain amount of expertise and is suitable for medium- and large-sized enterprises.

Assume that you want to grant IAM users the permissions to create DWS instances in CN North-Beijing4 and OBS buckets in CN South-Guangzhou. With role/policy-based authorization, the administrator needs to create two custom policies and attach both to the IAM users. With identity policy-based authorization, the administrator only needs to create one custom policy, configure the condition key g:RequestedRegion for the policy, and then attach the policy to the users or grant the users the access permissions to the specified regions. Identity policy-based authorization is more flexible than role/policy-based authorization.

Policies/identity policies and actions in the two authorization models are not interoperable. You are advised to use the identity policy-based authorization model. For details about system-defined permissions of the two models, see System-defined Permissions in Role/Policy-based Authorization and System-defined Permissions in Identity Policy-based Authorization.

For more information about IAM, see IAM Service Overview.

System-defined Permissions in Role/Policy-based Authorization

DWS supports authorization with policies/roles. By default, new IAM users do not have permissions assigned. You need to add a user to one or more groups, and attach permissions policies or roles to these groups. Users inherit permissions from the groups to which they are added and can perform specified operations on cloud services.

DWS is a project-level service deployed and accessed in specific physical regions. When you set Scope to Region-specific projects and select the specified projects (for example, ap-southeast-2) in the specified regions (for example, AP-Bangkok), the users only have permissions for RGC resources in the selected projects. If you set Scope to All resources, the users have permissions for RGC resources in all region-specific projects. When accessing DWS, the users need to switch to a region where they have been authorized to use DWS.

Table 2 lists all the system-defined roles and policies supported by DWS. System-defined policies in role/policy-based authorization and identity policy-based authorization are not interoperable.

System policies and roles provided by DWS can only be used to manage and access DWS resources. DWS may dynamically add or delete permission dependencies on peripheral resources as needed. Therefore, these policies and roles cannot be used to access resources of other products.

Table 2 DWS system permissions

Role/Policy Name

Description

Category

Dependency

DWS ReadOnlyAccess

Read-only permissions for DWS. Users granted these permissions can only view DWS data.

System-defined policy

None

DWS FullAccess

Database administrator permissions for DWS. Users granted these permissions can perform all operations on DWS.

System-defined policy

None

DWS Administrator

Database administrator permissions for DWS. Users granted these permissions can perform operations on all DWS resources.

  • Users also granted permissions of the VPC Administrator policy can create VPCs or subnets.
  • Users also granted permissions of the CES Administrator policy can view monitoring information of data warehouse clusters.
  • If you need to create an agency, you also need to configure the SecurityAdministrator permission.

System-defined role

Dependent on the Tenant Guest and Server Administrator policies, which must be assigned in the same project as the DWS Administrator policy.

DWS Database Access

Database access permissions for DWS. Users granted these permissions can generate temporary database user credentials based on IAM users to connect to databases in the data warehouse clusters.

System-defined role

None

  • If you use the EIP binding function for the first time in each project of each region, the system prompts you to create the DWSAccessVPC agency to authorize DWS to access VPC. After the authorization is successful, DWS can switch to a healthy VM when the VM bound with the EIP becomes faulty.
  • In addition to policy permissions, you may need to grant different operation permissions on resources to users of different roles. For details about operations, such as creating snapshots and restarting clusters, see Syntax of Fine-Grained Permissions Policies.
  • By default, only Huawei Cloud accounts or users with Security Administrator permissions can query and create agencies. By default, IAM users in the account do not have the permission to query and create agencies. When an EIP is bound, the binding button is shielded. In this case, you need to contact a user with the DWS Administrator permission to authorize the DWS agency on the current page. For details, see Allowing DWS to Manage Resources.

Table 3 lists the common operations supported by system-defined permissions for DWS.

Table 3 Common operations supported by system-defined permissions for DWS

Operation

DWS FullAccess

DWS ReadOnlyAccess

DWS Administrator

DWS Database Access

Creating/Restoring clusters

x

x

Obtaining the cluster list

x

Obtaining the details of a cluster

x

Setting automated snapshot policy

x

x

Setting security parameters/parameter groups

x

x

Restarting a cluster

x

x

Scaling out a cluster

x

x

Changing all specifications

x

x

Resetting passwords

x

x

Deleting clusters

x

x

Configuring maintenance windows

x

x

Binding EIPs

x

x

x

Unbinding EIPs

x

x

x

Creating DNS domain names

x

x

Releasing DNS domain names

x

x

Modifying DNS domain names

x

x

Creating MRS connections

x

x

Updating MRS connections

x

x

Deleting MRS connections

x

x

Adding/Deleting tags

x

x

Editing tags

x

x

Creating snapshots

x

x

Obtaining tenant credentials

Deleting snapshots

x

x

Copying snapshots

x

x

System-defined Permissions in Identity Policy-based Authorization

DWS supports identity policy-based authorization. Table 4 lists all the system-defined identity policies for DWS. System-defined identity policies in identity policy-based authorization and role/policy-based authorization are not interoperable.

Table 4 DWS system-defined identity policies

Role/Policy Name

Description

Type

Dependency

DWSReadOnlyPolicy

Read-only permissions for DWS. Users granted these permissions can only view DWS data.

System-defined identity policy

None

DWSFullAccessPolicy

Database administrator permissions for DWS. Users granted these permissions can perform all operations on DWS.

System-defined identity policy

None

Role/Policy-based authorization in IAM 5.0 is compatible with role/policy-based authorization in IAM 3.0.

Table 5 lists the common operations supported by system-defined identity policies for DWS.

Table 5 Common operations supported by system-defined identity policies for DWS

Operation

DWSFullAccessPolicy

DWSReadOnlyPolicy

Creating/Restoring clusters

x

Obtaining the cluster list

Obtaining the details of a cluster

Configuring an automated snapshot policy

x

Setting security parameters/parameter groups

x

Restarting a cluster

x

Scaling out a cluster

x

Changing all specifications

x

Resetting passwords

x

Deleting a cluster

x

Configuring maintenance windows

x

Binding EIPs

x

Unbinding EIPs

x

Creating DNS domain names

x

Releasing DNS domain names

x

Modifying DNS domain names

x

Creating MRS connections

x

Updating MRS connections

x

Deleting MRS connections

x

Adding/Deleting tags

x

Editing tags

x

Creating snapshots

x

Obtaining the snapshot list

Deleting snapshots

x

Copying snapshots

x