Creating a User and Granting TaurusDB Permissions
This section describes how to use IAM for fine-grained permissions control over your TaurusDB resources. With IAM, you can:
- Create IAM users for employees based on your enterprise's organizational structure. Each IAM user will have their own security credentials for accessing TaurusDB resources.
- Grant only the permissions required for users to perform specific tasks.
- Entrust a cloud service account to perform efficient O&M on your TaurusDB resources.
If your account does not require individual IAM users, skip this section.
Figure 1 describes the procedure for granting permissions.
Prerequisites
Learn about the permissions (see system-defined permissions) supported by TaurusDB and choose roles or policies according to your requirements. For the permissions of other services, see system-defined permissions.
- Create a user group and assign permissions to it.
Create a user group on the IAM console and attach the GaussDB FullAccess policy to the group.
To use some functions of other services, you need to configure the GaussDB FullAccess permission and the permission of the corresponding services. For example, when using DAS to connect to a DB instance, you need to configure the GaussDB FullAccess and DAS FullAccess permissions.
- Create an IAM user.
Create a user on the IAM console and add the user to the group created in 1.
- Log in and verify permissions.
Log in to the TaurusDB console using the created user, and verify that the user only has read permissions for TaurusDB.
Choose Service List > TaurusDB and click Buy DB Instance. If you can buy an instance, the required permission policy has already been applied.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot