หน้านี้ยังไม่พร้อมใช้งานในภาษาท้องถิ่นของคุณ เรากำลังพยายามอย่างหนักเพื่อเพิ่มเวอร์ชันภาษาอื่น ๆ เพิ่มเติม ขอบคุณสำหรับการสนับสนุนเสมอมา
- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Permissions Management
- Enterprise Routers
- Attachments
- Route Tables
- Associations
- Propagations
- Routes
-
Routing Control
-
Route Policies
- Route Policy Overview
- Creating a Route Policy
- Associating a Route Policy with an Enterprise Router
- Changing the Route Policy Associated with an Enterprise Router
- Disassociating a Route Policy from an Enterprise Router
- Modifying a Route Policy
- Viewing a Route Policy
- Deleting a Route Policy
- Adding a Policy Node to a Route Policy
- Modifying a Policy Node in a Route Policy
- Exporting Policy Nodes in a Route Policy
- Viewing a Policy Node in a Route Policy
- Deleting a Policy Node from a Route Policy
-
IP Prefix Lists
- IP Prefix List Overview
- Creating an IP Prefix List
- Modifying the Name of an IP Prefix List
- Viewing an IP Prefix List
- Deleting an IP Prefix List
- Adding a Prefix Rule to an IP Address Prefix List
- Modifying an IP Prefix Rule in an IP Prefix List
- Exporting Prefix Rules in an IP Prefix List
- Viewing a Prefix Rule in an IP Prefix List
- Deleting a Prefix Rule from an IP Prefix List
-
AS_Path Lists
- AS_Path List Overview
- Creating an AS_Path List
- Modifying the Name of an AS_Path List
- Viewing an AS_Path List
- Deleting an AS_Path List
- Adding an AS_Path Filter to an AS_Path List
- Exporting AS_Path Filters in an AS_Path List
- Viewing an AS_Path Filter in an AS_Path List
- Deleting an AS_Path Filter from an AS_Path List
-
Route Policies
- Sharing
- Flow Logs
- Monitoring and Auditing
- Tags
- Quotas
-
Best Practices
- Summary on Enterprise Router Best Practices
- Connecting VPCs Across Regions Using Enterprise Router and Central Network
- Using Enterprise Router to Isolate VPCs in the Same Region
- Using a Third-Party Firewall to Protect VPCs Connected by Enterprise Routers
- Enabling an On-Premises Data Center to Access Service VPCs Using an Enterprise Router and Transit VPC
- Setting Up a Hybrid Cloud Network Using Enterprise Router and Direct Connect Global DC Gateway
-
Setting Up a Hybrid Cloud Network Using Enterprise Router and a Pair of Direct Connect Connections (Global DC Gateway)
- Overview
- Network and Resource Planning
- Process of Setting Up a Hybrid Cloud Network Using Enterprise Router and a Pair of Direct Connect Connections (Global DC Gateway)
- Procedure for Setting Up a Hybrid Cloud Network Using Enterprise Router and a Pair of Direct Connect Connections (Global DC Gateway)
-
Setting Up a Hybrid Cloud Network Using Enterprise Router and a Pair of Active/Standby Direct Connect Connections (Global DC Gateway)
- Overview
- Network and Resource Planning
- Process of Setting Up a Hybrid Cloud Network Using Enterprise Router and a Pair of Active/Standby Direct Connect Connections (Global DC Gateway)
- Procedure for Setting Up a Hybrid Cloud Network Using Enterprise Router and a Pair of Active/Standby Direct Connect Connections (Global DC Gateway)
- Setting Up a Hybrid Cloud Network Using Enterprise Router, VPN, and Direct Connect (Global DC Gateway)
- Setting Up a Hybrid Cloud Network Using Enterprise Router and Direct Connect (Virtual Gateway)
- Setting Up a Hybrid Cloud Network Using Enterprise Router and a Pair of Direct Connect Connections (Virtual Gateway)
- Setting Up a Hybrid Cloud Network Using Enterprise Router, VPN, and Direct Connect (Virtual Gateway)
- Allowing VPCs to Share an EIP to Access the Internet Using Enterprise Router and NAT Gateway
- Using Enterprise Router to Migrate the Network Set Up Through VPC Peering
- Using Enterprise Router to Migrate the Network Set Up Through Direct Connect (Global DC Gateway)
- Using Enterprise Router and Central Network to Migrate the Network Set Up Through a Cloud Connection
- API Reference
- FAQs
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Service Overview
- Getting Started
- Enterprise Routers
- Attachments
- Route Tables
- Associations
- Propagations
- Routes
- Sharing
- Flow Logs
- Monitoring
- Interconnecting with CTS
- Permissions Management
- Tags
- Quotas
- FAQ
- Change History
-
User Guide (Ankara Region)
- Service Overview
- Getting Started
- Permissions Management
- Enterprise Routers
- Attachments
- Route Tables
- Associations
- Propagations
- Routes
- Sharing
- Flow Logs
- Monitoring
- Quotas
- FAQ
- Change History
- API Reference (Ankara Region)
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Copied.
Permissions
If you need to assign different permissions to employees in your enterprise to control their access to your cloud resources, you can use the Identity and Access Management (IAM) for fine-grained permissions management. IAM provides functions such as identity authentication, permissions management, and access control.
On the IAM console, you can create IAM users and assign permissions to control their access to specific resources. For example, you can create IAM users for software developers and assign permissions to allow them to use enterprise router resources but disallow them from performing any high-risk operations such as deleting such resources.
IAM is free of charge.
For more information, see IAM Service Overview.
Enterprise Router Permissions
By default, new IAM users do not have any permissions assigned. You need to add them to one or more groups and attach policies or roles to these groups so that these users can inherit permissions from the groups and perform specified operations on cloud services.
An enterprise router is a project-level service deployed in a specific region. You need to select a project such as ap-southeast-2 for which the permissions will be granted. If you select All projects, the permissions will be granted for all the projects. You need to switch to the authorized region before accessing an enterprise router.
- Role-based authorization: It is a coarse-grained authorization that defines permissions based on user responsibilities. There are only a limited number of roles, and some of them may depend on others. If so, you need to assign both roles to grant permissions. Role-based authorization is not an ideal choice for fine-grained authorization and minimum access control.
- Policy-based authorization: a type of fine-grained authorization that defines permissions required to perform operations on specific cloud resources under certain conditions. It is more flexible than role-based authorization and can achieve minimum access control. For example, you can grant IAM users only the permissions to perform specified operations on enterprise routers.
System Policy |
Description |
Type |
Dependency |
---|---|---|---|
ER FullAccess |
Administrator permissions for enterprise routers. Users with such permissions can operate and use all resources on enterprise routers. |
System-defined policy |
None |
ER ReadOnlyAccess |
Read-only permissions for enterprise routers. Users with such permissions can only view data on enterprise routers. |
System-defined policy |
None |
Operation |
Tenant Administrator |
Tenant Guest |
ER FullAccess |
ER ReadOnlyAccess |
---|---|---|---|---|
Creating an enterprise router |
√ |
x |
√ |
x |
Modifying an enterprise router |
√ |
x |
√ |
x |
Viewing an enterprise router |
√ |
√ |
√ |
√ |
Deleting an enterprise router |
√ |
x |
√ |
x |
Adding a Virtual Private Cloud (VPC) to an enterprise router |
√ |
x |
√ |
x |
Deleting a VPC attachment |
√ |
x |
√ |
x |
Viewing attachments of all types |
√ |
√ |
√ |
√ |
Creating a route table |
√ |
x |
√ |
x |
Renaming a route table |
√ |
x |
√ |
x |
Viewing a route table |
√ |
√ |
√ |
√ |
Deleting a route table |
√ |
x |
√ |
x |
Creating an association for an attachment in a route table |
√ |
x |
√ |
x |
Viewing associations in a route table |
√ |
√ |
√ |
√ |
Deleting an association from a route table |
√ |
x |
√ |
x |
Creating a propagation for an attachment in the route table |
√ |
x |
√ |
x |
Viewing a propagation in a route table |
√ |
√ |
√ |
√ |
Deleting a propagation from a route table |
√ |
x |
√ |
x |
Creating a static route |
√ |
x |
√ |
x |
Modifying a static route |
√ |
x |
√ |
x |
Viewing a route |
√ |
√ |
√ |
√ |
Deleting a static route |
√ |
x |
√ |
x |
Creating a flow log |
√ |
x |
√ |
x |
Viewing a VPC flow log |
√ |
√ |
√ |
√ |
Disabling a flow log |
√ |
x |
√ |
x |
Enabling a flow log |
√ |
x |
√ |
x |
Deleting a flow log |
√ |
x |
√ |
x |
Adding a resource tag |
√ |
x |
√ |
x |
Modifying a resource tag |
√ |
x |
√ |
x |
Viewing a resource tag |
√ |
√ |
√ |
√ |
Deleting a resource tag |
√ |
x |
√ |
x |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot