Updated on 2025-11-10 GMT+08:00

Permissions

If you need to assign different permissions to personnel in your enterprise to access your TaurusDB resources, Identity and Access Management (IAM) is a good choice for fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you secure access to your Huawei Cloud resources. If your Huawei Cloud account does not require IAM for permissions management, you can skip this section.

IAM is a free service. You only pay for the resources in your account.

With IAM, you can control access to specific Huawei Cloud resources. For example, if you want some software developers in your enterprise to be able to use TaurusDB resources but do not want them to be able to delete TaurusDB resources or perform any other high-risk operations, you can create IAM users and grant permission to use TaurusDB resources but not permission to delete them.

IAM supports role/policy-based authorization and identity policy-based authorization.

The following table describes the differences between these two authorization models.

Table 1 Differences between role/policy-based and identity policy-based authorization

Authorization Model

Core Relationship

Permissions

Authorization Method

Scenario

Role/Policy

User-permission-authorization scope

  • System-defined roles
  • System-defined policies
  • Custom policies

Assigning roles or policies to principals

To authorize a user, you need to add it to a user group first and then specify the scope of authorization. It provides a limited number of condition keys and cannot meet the requirements of fine-grained permissions control. This method is suitable for small- and medium-sized enterprises.

Identity policy

User-policy

  • System-defined identity policies
  • Custom identity policies
  • Assigning identity policies to principals
  • Attaching identity policies to principals

You can authorize a user by attaching an identity policy to it. User-specific authorization and a variety of key conditions allow for more fine-grained permissions control. However, this model can be hard to set up. It requires a certain amount of expertise and is suitable for medium- and large-sized enterprises.

Assume that you want to grant IAM users the permissions needed to create TaurusDB instances in CN North-Beijing4 and OBS buckets in CN South-Guangzhou. With role/policy-based authorization, the administrator needs to create two custom policies and attach both to the IAM users. With identity policy-based authorization, the administrator only needs to create one custom policy and configure the condition key g:RequestedRegion for the policy, and then attach the policy to the users or grant the users the access permissions to the specified regions. Identity policy-based authorization is more flexible than role/policy-based authorization.

Policies and actions in the two authorization models are not interoperable. You are advised to use the identity policy-based authorization model. For details about system-defined permissions, see Role/Policy-based Authorization and Identity Policy-based Authorization.

For more information about IAM, see IAM Service Overview.

Role/Policy-based Authorization

TaurusDB supports role/policy-based authorization. New IAM users do not have any permissions assigned by default. You need to first add them to one or more groups and then attach policies or roles to these groups. The users then inherit permissions from the groups and can perform specified operations on cloud services based on the permissions they have been assigned.

TaurusDB is a project-level service deployed for specific regions. When you set Scope to Region-specific projects and select the specified projects (for example, ap-southeast-2) in the specified regions (for example, AP-Bangkok), the users only have permissions for TaurusDB instances in the selected projects. If you set Scope to All resources, the users have permissions for TaurusDB instances in all region-specific projects. When accessing TaurusDB instances, the users need to switch to the authorized region.

Table 2 lists all the system-defined permissions for TaurusDB. System-defined policies in role/policy-based authorization are not interoperable with those in identity policy-based authorization.

Table 2 System-defined permissions for TaurusDB

Role/Policy Name

Description

Type

Dependencies

TaurusDB FullAccess

Full permissions for TaurusDB.

System-defined policy

None

TaurusDB ReadOnlyAccess

Read-only permissions for TaurusDB.

System-defined policy

None

Table 3 lists the common operations supported by system-defined permissions for TaurusDB.

Table 3 Common operations supported by system-defined permissions
Operation TaurusDB FullAccess TaurusDB ReadOnlyAccess

Creating a TaurusDB instance

Supported

Not supported

Deleting a TaurusDB instance

Supported

Not supported

Querying TaurusDB instances

Supported

Supported

Modifying parameters in a parameter template

Supported

Not supported

Changing DB instance specifications

Supported

Not supported

Creating a manual backup

Supported

Not supported

Querying backups

Supported

Supported

Querying error logs

Supported

Supported

Rebooting a DB instance

Supported

Not supported

Querying DB instances

Supported

Supported

Creating a parameter template

Supported

Not supported

Deleting a parameter template

Supported

Not supported

Modifying a backup policy

Supported

Not supported

Viewing parameter templates

Supported

Supported

Deleting a DB instance

Supported

Not supported

Deleting a manual backup

Supported

Not supported

Querying project tags

Supported

Supported

Applying a parameter template

Supported

Not supported

Adding or deleting project tags in batches

Supported

Not supported

Changing quotas

Supported

Not supported

Upgrading a DB instance version

Supported

Not supported

Promoting a read replica to primary

Supported

Not supported

Changing a database port

Supported

Not supported

Changing a security group

Supported

Not supported

Changing a private IP address

Supported

Not supported

Enabling or disabling SSL

Supported

Not supported

Changing a DB instance name

Supported

Not supported

Adding a read replica

Supported

Not supported

Deleting a read replica

Supported

Not supported

Scaling storage space

Supported

Not supported

Changing a DB instance password

Supported

Not supported

Binding an EIP

Supported

Not supported

Unbinding an EIP

Supported

Not supported

Modifying a monitoring policy

Supported

Not supported

Changing a failover priority

Supported

Not supported

Changing a maintenance window

Supported

Not supported

Isolating nodes

Supported

Not supported

Enabling or disabling SQL Explorer

Supported

Not supported

Querying HTAP instances

Supported

Supported

Creating an HTAP instance

Supported

Not supported

Modifying an HTAP instance

Supported

Not supported

Deleting an HTAP instance

Supported

Not supported

Changing an HTAP instance name

Supported

Not supported

Rebooting an HTAP instance

Supported

Not supported

Upgrading an HTAP instance version

Supported

Not supported

Promoting a read replica of an HTAP instance to primary

Supported

Not supported

Changing the specifications of an HTAP instance

Supported

Not supported

Scaling up storage of an HTAP instance

Supported

Not supported

Binding an EIP to an HTAP instance

Supported

Not supported

Unbinding an EIP from an HTAP instance

Supported

Not supported

Changing the port of an HTAP instance

Supported

Not supported

Changing an HTAP instance password

Supported

Not supported

Creating an HTAP data synchronization task

Supported

Not supported

Modifying an HTAP data synchronization task

Supported

Not supported

Deleting an HTAP data synchronization task

Supported

Not supported

Adding or repairing an HTAP data synchronization table

Supported

Supported

Creating a proxy instance

Supported

Not supported

Changing a proxy address

Supported

Not supported

Changing the read weights of a proxy instance

Supported

Not supported

Changing the port of a proxy instance

Supported

Not supported

Enabling or disabling access control for a proxy instance

Supported

Not supported

Deleting a proxy instance

Supported

Not supported

Querying proxy instances

Supported

Supported

Upgrading a proxy instance version

Supported

Not supported

Changing a proxy instance name

Supported

Not supported

Adding proxy nodes

Supported

Not supported

Deleting proxy nodes

Supported

Not supported

Changing the specifications of a proxy instance

Supported

Not supported

Applying for a private domain name for a proxy instance

Supported

Not supported

Changing the domain name of a proxy instance

Supported

Not supported

Deleting the domain name of a proxy instance

Supported

Not supported

Changing the routing policy of a proxy instance

Supported

Not supported

Enabling or disabling SSL for a proxy instance

Supported

Not supported

Creating a database user

Supported

Not supported

Deleting a database user

Supported

Not supported

Changing the password of a database user

Supported

Not supported

Querying database users

Supported

Supported

Granting permissions to a database user

Supported

Not supported

Revoking permissions from a database user

Supported

Not supported

Creating a database

Supported

Not supported

Deleting a database

Supported

Not supported

Querying databases

Supported

Supported

Querying predefined tags

Supported

Not supported

Querying configured log groups

Supported

Not supported

Querying configured log streams

Supported

Not supported

Configuring an auto scaling policy

Supported

Not supported

Configuring an audit log policy

Supported

Not supported

Querying an audit log policy

Supported

Supported

Querying audit logs

Supported

Supported

Obtaining the link for downloading an audit log

Supported

Supported

Querying and modifying a serverless compute policy

Supported

Not supported

Querying and modifying a serverless scale-up policy

Supported

Not supported

Identity Policy-based Authorization

TaurusDB supports identity policy-based authorization. Table 4 lists all the system-defined identity policies for TaurusDB. System-defined policies in identity policy-based authorization are not interoperable with those in role/policy-based authorization.

Table 4 System-defined policies for TaurusDB

System-defined Policy

Description

Type

TaurusDBFullAccessPolicy

Full permissions for TaurusDB.

System-defined identity policy

TaurusDBReadOnlyAccessPolicy

Read-only permissions for TaurusDB.

System-defined identity policy

Table 5 lists the common operations supported by system-defined policies for TaurusDB.

Table 5 Common operations supported by system-defined permissions
Operation TaurusDBFullAccessPolicy TaurusDBReadOnlyAccessPolicy

Creating a TaurusDB instance

Supported

Not supported

Deleting a TaurusDB instance

Supported

Not supported

Querying TaurusDB instances

Supported

Supported

Modifying parameters in a parameter template

Supported

Not supported

Changing DB instance specifications

Supported

Not supported

Creating a manual backup

Supported

Not supported

Querying backups

Supported

Supported

Querying error logs

Supported

Supported

Rebooting a DB instance

Supported

Not supported

Querying DB instances

Supported

Supported

Creating a parameter template

Supported

Not supported

Deleting a parameter template

Supported

Not supported

Modifying a backup policy

Supported

Not supported

Viewing parameter templates

Supported

Supported

Deleting a DB instance

Supported

Not supported

Deleting a manual backup

Supported

Not supported

Querying project tags

Supported

Supported

Applying a parameter template

Supported

Not supported

Adding or deleting project tags in batches

Supported

Not supported

Changing quotas

Supported

Not supported

Upgrading a DB instance version

Supported

Not supported

Promoting a read replica to primary

Supported

Not supported

Changing a database port

Supported

Not supported

Changing a security group

Supported

Not supported

Changing a private IP address

Supported

Not supported

Enabling or disabling SSL

Supported

Not supported

Changing a DB instance name

Supported

Not supported

Adding a read replica

Supported

Not supported

Deleting a read replica

Supported

Not supported

Scaling storage space

Supported

Not supported

Changing a DB instance password

Supported

Not supported

Binding an EIP

Supported

Not supported

Unbinding an EIP

Supported

Not supported

Modifying a monitoring policy

Supported

Not supported

Changing a failover priority

Supported

Not supported

Changing a maintenance window

Supported

Not supported

Isolating nodes

Supported

Not supported

Enabling or disabling SQL Explorer

Supported

Not supported

Querying HTAP instances

Supported

Supported

Creating an HTAP instance

Supported

Not supported

Modifying an HTAP instance

Supported

Not supported

Deleting an HTAP instance

Supported

Not supported

Changing an HTAP instance name

Supported

Not supported

Rebooting an HTAP instance

Supported

Not supported

Upgrading an HTAP instance version

Supported

Not supported

Promoting a read replica of an HTAP instance to primary

Supported

Not supported

Changing the specifications of an HTAP instance

Supported

Not supported

Scaling up storage of an HTAP instance

Supported

Not supported

Binding an EIP to an HTAP instance

Supported

Not supported

Unbinding an EIP from an HTAP instance

Supported

Not supported

Changing the port of an HTAP instance

Supported

Not supported

Changing an HTAP instance password

Supported

Not supported

Creating an HTAP data synchronization task

Supported

Not supported

Modifying an HTAP data synchronization task

Supported

Not supported

Deleting an HTAP data synchronization task

Supported

Not supported

Adding or repairing an HTAP data synchronization table

Supported

Supported

Creating a proxy instance

Supported

Not supported

Changing a proxy address

Supported

Not supported

Changing the read weights of a proxy instance

Supported

Not supported

Changing the port of a proxy instance

Supported

Not supported

Enabling or disabling access control for a proxy instance

Supported

Not supported

Deleting a proxy instance

Supported

Not supported

Querying proxy instances

Supported

Supported

Upgrading a proxy instance version

Supported

Not supported

Changing a proxy instance name

Supported

Not supported

Adding proxy nodes

Supported

Not supported

Deleting proxy nodes

Supported

Not supported

Changing the specifications of a proxy instance

Supported

Not supported

Applying for a private domain name for a proxy instance

Supported

Not supported

Changing the domain name of a proxy instance

Supported

Not supported

Deleting the domain name of a proxy instance

Supported

Not supported

Changing the routing policy of a proxy instance

Supported

Not supported

Enabling or disabling SSL for a proxy instance

Supported

Not supported

Creating a database user

Supported

Not supported

Deleting a database user

Supported

Not supported

Changing the password of a database user

Supported

Not supported

Querying database users

Supported

Supported

Granting permissions to a database user

Supported

Not supported

Revoking permissions from a database user

Supported

Not supported

Creating a database

Supported

Not supported

Deleting a database

Supported

Not supported

Querying databases

Supported

Supported

Querying predefined tags

Supported

Not supported

Querying configured log groups

Supported

Not supported

Querying configured log streams

Supported

Not supported

Configuring an auto scaling policy

Supported

Not supported

Configuring an audit log policy

Supported

Not supported

Querying an audit log policy

Supported

Supported

Querying audit logs

Supported

Supported

Obtaining the link for downloading an audit log

Supported

Supported

Querying and modifying a serverless compute policy

Supported

Not supported

Querying and modifying a serverless scale-up policy

Supported

Not supported