数据库安全服务 DBSS
云服务在IAM预置了常用的权限,称为系统身份策略。如果IAM系统身份策略无法满足授权要求,管理员可以根据各服务支持的授权项,创建IAM自定义身份策略来进行精细的访问控制,IAM自定义身份策略是对系统身份策略的扩展和补充。
除IAM服务外,Organizations服务中的服务控制策略(Service Control Policy,以下简称SCP)也可以使用这些授权项元素设置访问控制策略。
SCP不直接进行授权,只划定权限边界。将SCP绑定到组织单元或者成员账号时,并没有直接对组织单元或成员账号授予操作权限,而是规定了成员账号或组织单元包含的成员账号的授权范围。IAM身份策略授予权限的有效性受SCP限制,只有在SCP允许范围内的权限才能生效。
IAM服务与Organizations服务在使用这些元素进行访问控制时,存在着一些区别,详情请参见:IAM服务与Organizations服务权限访问控制的区别。
本章节介绍IAM服务身份策略授权场景中自定义身份策略和组织服务中SCP使用的元素,这些元素包含了操作(Action)、资源(Resource)和条件(Condition)。
操作(Action)
操作(Action)即为身份策略中支持的授权项。
- “访问级别”列描述如何对操作进行分类(List、Read和Write等)。此分类可帮助您了解在身份策略中相应操作对应的访问级别。
- “资源类型”列指每个操作是否支持资源级权限。
- 资源类型支持通配符号*表示所有。如果此列没有值(-),则必须在身份策略语句的Resource元素中指定所有资源类型(“*”)。
- 如果该列包含资源类型,则必须在具有该操作的语句中指定该资源的URN。
- 资源类型列中必需资源在表中用星号(*)标识,表示使用此操作必须指定该资源类型。
关于DBSS定义的资源类型的详细信息请参见资源类型(Resource)。
- “条件键”列包括了可以在身份策略语句的Condition元素中支持指定的键值。
- 如果该授权项资源类型列存在值,则表示条件键仅对列举的资源类型生效。
- 如果该授权项资源类型列没有值(-),则表示条件键对整个授权项生效。
- 如果此列条件键没有值(-),表示此操作不支持指定条件键。
关于DBSS定义的条件键的详细信息请参见条件(Condition)。
- “别名”列包括了可以在身份策略中配置的策略授权项。通过这些授权项,可以控制支持策略授权的API访问。详细信息请参见身份策略兼容性说明。
您可以在身份策略语句的Action元素中指定以下DBSS的相关操作。
授权项 | 描述 | 访问级别 | 资源类型(*为必须) | 条件键 | 别名 |
|---|---|---|---|---|---|
dbss:auditInstance:listSqlInjectRules | 授予权限以查询SQL注入规则。 | List | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:listSqls | 授予权限以获取审计结果信息。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:switchSqlInjectRule | 授予权限以开启或关闭sql注入策略。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:addSqlInjectRule | 授予权限以添加自定义sql注入规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:orderSqlInjectRule | 授予权限以对sql规则优先级进行排序。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:createReporter | 授予权限以立即生成报表。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:listReporters | 授予权限以查询报表信息。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:getRiskRuleDetail | 授予权限以查询指定风险规则策略。 | Read | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:listAlarmEmails | 授予权限以查询告警邮件信息。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:downloadReporter | 授予权限以下载报表。 | Read | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:listAuditScopeRules | 授予权限以查询审计范围策略列表。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:addSensitiveRule | 授予权限以添加隐私数据保护规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:editSensitiveRule | 授予权限以编辑隐私数据保护规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:deleteReporter | 授予权限以删除报表。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:listOperateLog | 授予权限以查询用户操作日志信息。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:listMonitorInfos | 授予权限以查询审计实例监控信息。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:listSessionInfo | 授予权限以查询审计实例会话信息。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:switchBackup | 授予权限以开启或关闭备份功能。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss::downloadLicense | 授予权限以下载销售许可证。 | Read | - | - | dbss:auditInstance:list |
dbss::deleteAuditInstanceJob | 授予权限以删除审计实例创建失败的任务。 | Write | - | - | dbss:auditInstance:delete |
dbss::listRdsDb | 授予权限以查询RDS数据库。 | List | - | - | dbss:auditInstance:list |
dbss:auditInstance:instanceStart | 授予权限以开启审计实例。 | Write | auditInstance * | dbss:auditInstance:start | |
dbss:auditInstance:reboot | 授予权限以重启审计实例。 | Write | auditInstance * | - | |
dbss:auditInstance:stop | 授予权限以关闭审计实例。 | Write | auditInstance * | - | |
dbss:auditInstance:upgrade | 授予权限以升级审计实例。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss::queryUpgradeStatus | 授予权限以查询审计实例升级状态。 | List | - | - | dbss:auditInstance:createOnOrder |
dbss:auditInstance:updateSecurityGroup | 授予权限以修改审计实例安全组。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:modifyAttribute | 授予权限以修改审计实例审计属性。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:downloadAgent | 授予权限以下载agent。 | Read | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:switchAgent | 授予权限以开启或关闭Agent。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:listAgents | 授予权限以获取agent列表。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:deleteAgent | 授予权限以删除agent。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:addAgent | 授予权限以添加agent。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:previewReporter | 授予权限以预览报表。 | Read | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:setAlarmConfig | 授予权限以配置告警信息。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:configAlarmEmail | 授予权限以配置告警邮件信息。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:getAlarmConfig | 授予权限以查询告警配置信息。 | Read | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:listRiskRules | 授予权限以查询风险规则策略。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:exportInstancesDatabaseConfig | 授予权限以导出数据库配置。 | List | auditInstance * | - | dbss:auditInstance:createOnOrder |
dbss:auditInstance:createOnPeriod | 授予权限以包年包月计费模式创建审计实例。 | Write | auditInstance * | - | dbss:auditInstance:createOnOrder |
- | |||||
dbss:auditInstance:editSqlInjectRule | 授予权限以编辑自定义sql注入规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:deleteSqlInjectRule | 授予权限以删除自定义sql注入规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:deleteSensitiveRule | 授予权限以删除隐私数据保护规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:deleteAuditScopeRule | 授予权限以删除审计范围规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:deleteRiskRule | 授予权限以删除风险规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:deleteBackup | 授予权限以删除本地备份信息。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:listBackups | 授予权限以查询备份信息。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:getBackupConfig | 授予权限以获取备份配置信息。 | Read | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:editAuditScopeRule | 授予权限以编辑审计范围规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:instanceList | 授予权限以查询审计实例信息。 | List | auditInstance * | - | dbss:auditInstance:list |
dbss:auditInstance:createOnDemand | 授予权限以按需模式创建审计实例。 | Write | auditInstance * | - | - |
- | |||||
dbss::listCommonInfo | 授予权限以查询公共信息。 | List | - | - | dbss:auditInstance:list |
dbss:auditInstance:listInstancesSummaryInfo | 授予权限以查询所有审计实例总览信息。 | List | auditInstance * | - | dbss:auditInstance:list |
dbss::getauditInstancesSummaryTaskStatus | 授予权限以查询总览任务状态。 | Read | - | - | dbss:auditInstance:list |
dbss::updateAuditInstancesSummaryInfo | 授予权限以更新所有审计实例总览信息。 | Write | - | - | dbss:auditInstance:start |
dbss:auditInstance:setReporterConfig | 授予权限以更改报表的计划任务配置信息。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:getReporterConfig | 授予权限以获取报表的计划任务配置信息。 | Read | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:addBareDatabase | 授予权限以添加自建数据库。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:listDatabases | 授予权限以查询数据库列表。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:switchDatabase | 授予权限以开启关闭数据库审计功能。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:deleteDatabase | 授予权限以删除数据库。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:addAuditScopeRule | 授予权限以添加审计范围规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:switchAuditScopeRule | 授予权限以开启关闭审计范围规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:addRiskRule | 授予权限以添加风险规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:switchRiskRule | 授予权限以开启或关闭风险规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:editRiskRule | 授予权限以编辑风险规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:setRiskRulePriority | 授予权限以设置风险规则优先级。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:listStatistics | 授予权限以查询审计实例概览信息。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:listSensitiveRules | 授予权限以查询隐私数据脱敏规则。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:modifySensitiveRuleSaveResultSwitch | 授予权限以开启关闭存储结果集开关。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:modifySensitiveRuleAnonymizeSwitch | 授予权限以开启关闭隐私数据脱敏开关。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:switchSensitiveRule | 授予权限以开启或关闭隐私数据保护规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:listAlarmItems | 授予权限以查询告警信息。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:markAlarm | 授予权限以标记告警信息。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:deleteAlarm | 授予权限以删除告警信息。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:restoreBackup | 授予权限以恢复备份信息。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:retryBackup | 授予权限以重试备份操作。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:getRiskBackupConfigInfo | 授予权限以获取风险导出配置信息。 | Read | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:switchRiskBackup | 授予权限以开启关闭风险导出功能。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:getRiskBackupBucketInfo | 授予权限以获取风险导出obs桶信息。 | Read | auditInstance * | dbss:auditInstance:list | |
dbss:auditInstance:setRiskBackupBucketInfo | 授予权限以设置风险导出obs桶信息。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:addRdsDatabase | 授予权限以添加RDS数据库。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss::getServerInfo | 授予权限以获取DBSS服务信息。 | Read | - | - | dbss:auditInstance:list |
dbss::getAuditInstanceJob | 授予权限以查看审计实例任务创建信息。 | Read | - | - | dbss:auditInstance:list |
dbss:auditInstance:listJobs | 授予权限以列举审计实例任务创建信息。 | List | auditInstance * | - | dbss:auditInstance:list |
dbss::listObsBuckets | 授予权限以查询obs桶列表。 | List | - | - | dbss:auditInstance:list |
dbss:auditInstance:instanceDelete | 授予权限以删除审计实例。 | Write | auditInstance * | dbss:auditInstance:delete | |
dbss::listResourcesByTag | 授予权限以根据标签信息查询审计实例。 | List | - | dbss:auditInstance:list | |
dbss::tagResource | 授予权限以批量添加实例标签。 | Tagging | - | dbss:auditInstance:createOnOrder | |
dbss::unTagResource | 授予权限以批量删除实例标签。 | Tagging | - | dbss:auditInstance:delete | |
dbss::listTags | 授予权限以查询项目下的所有标签。 | List | - | - | dbss:auditInstance:list |
dbss::listTagsForResource | 授予权限以查询实例标签信息。 | List | - | - | dbss:auditInstance:list |
dbss:auditInstance:addWhitelist | 授予权限以添加白名单规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:deleteWhitelist | 授予权限以删除白名单规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:updateWhitelist | 授予权限以更新白名单规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:addWhitelist | 授予权限以添加SQL白名单规则。 | Write | auditInstance * | dbss:auditInstance:createOnOrder | |
dbss:auditInstance:listWhitelist | 授予权限以查询白名单规则。 | List | auditInstance * | dbss:auditInstance:list | |
dbss:dbEncryptInstance:createOnPeriod | 授予权限以包年包月计费模式创建数据库加密实例。 | Write | dbEncryptInstance * | - | - |
dbss:dbEncryptInstance:delete | 授予权限以删除数据库加密实例。 | Write | dbEncryptInstance * | - | - |
dbss:dbEncryptInstance:list | 授予权限以列举数据库加密实例。 | List | dbEncryptInstance * | - | - |
dbss:dbEncryptInstance:start | 授予权限以开启数据库加密实例。 | Write | dbEncryptInstance * | - | - |
dbss:dbEncryptInstance:stop | 授予权限以关闭数据库加密实例。 | Write | dbEncryptInstance * | - | - |
dbss:dbEncryptInstance:reboot | 授予权限以重启数据库加密实例。 | Write | dbEncryptInstance * | - | - |
dbss:dbEncryptInstance:resetPasswd | 授予权限以重置数据库加密实例账号密码。 | Write | dbEncryptInstance * | - | - |
dbss:dbEncryptInstance:updateSecurityGroup | 授予权限以更改数据库加密实例安全组。 | Write | dbEncryptInstance * | - | - |
dbss:dbEncryptInstance:bindEip | 授予权限以绑定数据库加密实例的弹性IP。 | Write | dbEncryptInstance * | - | - |
dbss:dbEncryptInstance:unbindEip | 授予权限以解绑数据库加密实例的弹性IP。 | Write | dbEncryptInstance * | - | - |
dbss:dbEncryptInstance:modifyAttribute | 授予权限以修改数据库加密实例的属性。 | Write | dbEncryptInstance * | - | - |
dbss:dbOmInstance:createOnPeriod | 授予权限以包年包月计费模式创建数据库运维实例。 | Write | dbOmInstance * | - | - |
dbss:dbOmInstance:delete | 授予权限以删除数据库运维实例。 | Write | dbOmInstance * | - | - |
dbss:dbOmInstance:list | 授予权限以列举数据库运维实例。 | List | dbOmInstance * | - | - |
dbss:dbOmInstance:start | 授予权限以开启数据库运维实例。 | Write | dbOmInstance * | - | - |
dbss:dbOmInstance:stop | 授予权限以关闭数据库运维实例。 | Write | dbOmInstance * | - | - |
dbss:dbOmInstance:reboot | 授予权限以重启数据库运维实例。 | Write | dbOmInstance * | - | - |
dbss:dbOmInstance:resetPasswd | 授予权限以重置数据库运维实例账号密码。 | Write | dbOmInstance * | - | - |
dbss:dbOmInstance:updateSecurityGroup | 授予权限以更改数据库运维实例安全组。 | Write | dbOmInstance * | - | - |
dbss:dbOmInstance:bindEip | 授予权限以绑定数据库运维实例的弹性IP。 | Write | dbOmInstance * | - | - |
dbss:dbOmInstance:unbindEip | 授予权限以解绑数据库运维实例的弹性IP。 | Write | dbOmInstance * | - | - |
dbss:dbOmInstance:modifyAttribute | 授予权限以修改数据库运维实例的属性。 | Write | dbOmInstance * | - | - |
dbss:auditInstance:getInfo | 授予权限以获取审计实例信息。 | Read | auditInstance * | dbss:auditInstance:list |
DBSS的API通常对应着一个或多个授权项。表2展示了API与授权项的关系,以及该API需要依赖的授权项。
API | 对应的授权项 | 依赖的授权项 |
|---|---|---|
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/sql-rules | dbss:auditInstance:listSqlInjectRules | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/sql/list-rules | dbss:auditInstance:listSqlInjectRules | - |
POST /dbss/v1/{project_id}/{instance_id}/dbss/audit/rule/sql-injections | dbss:auditInstance:listSqlInjectRules | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sqls | dbss:auditInstance:listSqls | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sqls/list-sqls | dbss:auditInstance:listSqls | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/sql-rule/switch | dbss:auditInstance:switchSqlInjectRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/sql/switch | dbss:auditInstance:switchSqlInjectRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/sql-rule | dbss:auditInstance:addSqlInjectRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/sql | dbss:auditInstance:addSqlInjectRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/sql-rules/rank | dbss:auditInstance:orderSqlInjectRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/sql/rank-sql | dbss:auditInstance:orderSqlInjectRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/reports | dbss:auditInstance:createReporter | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/reports/results/create-report | dbss:auditInstance:createReporter | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/reports/list | dbss:auditInstance:listReporters | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/reports/list-reports | dbss:auditInstance:listReporters | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/rule/risk/{risk_id} | dbss:auditInstance:getRiskRuleDetail | - |
GET /dbss/v1/{project_id}/{instance_id}/dbss/audit/rule/risk/{risk_id} | dbss:auditInstance:getRiskRuleDetail | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/operation/emails | dbss:auditInstance:listAlarmEmails | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/operation/list-emails | dbss:auditInstance:listAlarmEmails | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/reports/{report_id} | dbss:auditInstance:downloadReporter | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/reports/results/{report_id}/download-report | dbss:auditInstance:downloadReporter | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/rule/scopes | dbss:auditInstance:listAuditScopeRules | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/rule/scope/list-scope | dbss:auditInstance:listAuditScopeRules | - |
GET /dbss/v1/{project_id}/{instance_id}/dbss/audit/rule/scopes | dbss:auditInstance:listAuditScopeRules | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/sensitive/masks | dbss:auditInstance:listSensitiveRules | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/sensitive/mask/list-rules | dbss:auditInstance:listSensitiveRules | - |
GET /dbss/v1/{project_id}/{instance_id}/dbss/audit/sensitive/masks | dbss:auditInstance:listSensitiveRules | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sensitive/masks | dbss:auditInstance:addSensitiveRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sensitive/mask/add-rule | dbss:auditInstance:addSensitiveRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sensitive/masks/{rule_id} | dbss:auditInstance:editSensitiveRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sensitive/mask/{rule_id}/edit-rule | dbss:auditInstance:editSensitiveRule | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/reports/templates | dbss:auditInstance:listReporters | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/reports/list-templates | dbss:auditInstance:listReporters | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/rule/risk | dbss:auditInstance:listRiskRules | - |
GET /dbss/v1/{project_id}/{instance_id}/dbss/audit/rule/risk | dbss:auditInstance:listRiskRules | - |
DELETE /dbss/v1/{project_id}/{instance_id}/audit/reports/{report_id} | dbss:auditInstance:deleteReporter | - |
DELETE /dbss/v1/{project_id}/{instance_id}/audit/reports/results/{report_id}/delete-report | dbss:auditInstance:deleteReporter | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/general/operate-log | dbss:auditInstance:listOperateLog | - |
POST /dbss/v1/{project_id}/{instance_id}/dbss/audit/operate-log | dbss:auditInstance:listOperateLog | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/operation/monitorinfo | dbss:auditInstance:listMonitorInfos | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/operation/get-monitorinfo | dbss:auditInstance:listMonitorInfos | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sessionstatistics/clientsession | dbss:auditInstance:listSessionInfo | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sessionstatistics/list-clientsession | dbss:auditInstance:listSessionInfo | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sessionstatistics/accountsession | dbss:auditInstance:listSessionInfo | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sessionstatistics/list-accountsession | dbss:auditInstance:listSessionInfo | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/backup/stop | dbss:auditInstance:switchBackup | dbss:auditInstance:getBackupConfig |
POST /dbss/v1/{project_id}/{instance_id}/audit/backup/stop-backup | dbss:auditInstance:switchBackup | dbss:auditInstance:getBackupConfig |
POST /dbss/v1/{project_id}/{instance_id}/audit/backup/start | dbss:auditInstance:switchBackup | dbss:auditInstance:getBackupConfig |
POST /dbss/v1/{project_id}/{instance_id}/audit/backup/start-backup | dbss:auditInstance:switchBackup | dbss:auditInstance:getBackupConfig |
GET /dbss/v1/{project_id}/dbss/saleslicense/download | dbss::downloadLicense | - |
GET /dbss/v1/{project_id}/dbss/download-saleslicense | dbss::downloadLicense | - |
DELETE /dbss/v1/{project_id}/dbss/audit/job/{failed_id} | dbss::deleteAuditInstanceJob | - |
DELETE /dbss/v1/{project_id}/dbss/audit/delete-job/{failed_id} | dbss::deleteAuditInstanceJob | - |
GET /dbss/v2/{project_id}/audit/databases/rds | dbss::listRdsDb | - |
POST /dbss/v1/{project_id}/dbss/audit/rds-instance | dbss::listRdsDb | - |
POST /dbss/v1/{project_id}/dbss/audit/guassDbInstance | dbss::listRdsDb | - |
POST /dbss/v1/{project_id}/dbss/audit/instance/start | dbss:auditInstance:instanceStart | - |
POST /dbss/v1/{project_id}/dbss/audit/start-instance | dbss:auditInstance:instanceStart | - |
POST /dbss/v1/{project_id}/dbss/audit/instance/reboot | dbss:auditInstance:reboot | - |
POST /dbss/v1/{project_id}/dbss/audit/reboot-instance | dbss:auditInstance:reboot | - |
POST /dbss/v1/{project_id}/dbss/audit/instance/stop | dbss:auditInstance:stop | - |
POST /dbss/v1/{project_id}/dbss/audit/stop-instance | dbss:auditInstance:stop | - |
POST /dbss/v1/{project_id}/dbss/{instance_id}/audit/upgrade | dbss:auditInstance:upgrade | - |
GET /dbss/v1/{project_id}/dbss/audit/upgrade/status | dbss::queryUpgradeStatus | - |
POST /dbss/v1/{project_id}/dbss/audit/securitygroup | dbss:auditInstance:updateSecurityGroup | - |
POST /dbss/v1/{project_id}/dbss/audit/update-securitygroup | dbss:auditInstance:updateSecurityGroup | - |
PUT /dbss/v1/{project_id}/dbss/audit/instances/{instance_id} | dbss:auditInstance:modifyAttribute | - |
POST /dbss/v1/{project_id}/dbss/audit/update-instance/{instance_id} | dbss:auditInstance:modifyAttribute | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/operation/agent/{agent_id}/download | dbss:auditInstance:downloadAgent | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/operation/download-agent/{agent_id} | dbss:auditInstance:downloadAgent | - |
GET /dbss/v2/{project_id}/{instance_id}/audit/agents/{agent_id} | dbss:auditInstance:downloadAgent | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/agent/switch | dbss:auditInstance:switchAgent | - |
GET /dbss/v2/{project_id}/{instance_id}/audit/agents | dbss:auditInstance:listAgents | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/agents/{db_id} | dbss:auditInstance:listAgents | - |
DELETE /dbss/v1/{project_id}/{instance_id}/audit/agents/{db_id}/{agent_id} | dbss:auditInstance:deleteAgent | - |
DELETE /dbss/v2/{project_id}/{instance_id}/audit/agents/{agent_id} | dbss:auditInstance:deleteAgent | - |
POST /dbss/v2/{project_id}/{instance_id}/audit/agents | dbss:auditInstance:addAgent | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/agents | dbss:auditInstance:addAgent | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/agent/add-agent | dbss:auditInstance:addAgent | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/agent/{agent_id} | dbss:auditInstance:addAgent | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/reports/{report_id}/preview | dbss:auditInstance:previewReporter | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/reports/{report_id}/preview-report | dbss:auditInstance:previewReporter | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/general/alarm-config | dbss:auditInstance:setAlarmConfig | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/operation/config-email | dbss:auditInstance:configAlarmEmail | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/general/alarm-config | dbss:auditInstance:getAlarmConfig | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/risk/search-rules | dbss:auditInstance:listRiskRules | - |
POST /dbss/v1/{project_id}/obs/upload-config | dbss:auditInstance:exportInstancesDatabaseConfig | - |
POST /dbss/v1/charge/{project_id}/audit/period/order | dbss:auditInstance:createOnPeriod | dbss::listCommonInfo |
GET /dbss/v1/{project_id}/{instance_id}/audit/agent/get-agent | dbss:auditInstance:listAgents | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/agent/del-agent | dbss:auditInstance:deleteAgent | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/sql/{sql_id} | dbss:auditInstance:editSqlInjectRule | - |
DELETE /dbss/v1/{project_id}/{instance_id}/audit/rule/sql/{sql_id} | dbss:auditInstance:deleteSqlInjectRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sensitive/mask/delete-rules | dbss:auditInstance:deleteSensitiveRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/risk/list-rules | dbss:auditInstance:listRiskRules | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/scope/delete-scope | dbss:auditInstance:deleteAuditScopeRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/risk/delete-risk | dbss:auditInstance:deleteRiskRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/backup/del-backup | dbss:auditInstance:deleteBackup | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/backup/status | dbss:auditInstance:listBackups | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/backup/auto-backup-template | dbss:auditInstance:getBackupConfig | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/scope/edit-rule/{scope-id} | dbss:auditInstance:editAuditScopeRule | - |
GET /dbss/v1/{project_id}/dbss/audit/list-instances | dbss:auditInstance:instanceList | - |
POST /dbss/v1/{project_id}/dbss/audit/create-instance | dbss:auditInstance:createOnDemand | dbss::listCommonInfo |
POST /dbss/v2/{project_id}/dbss/audit/charge/period/order | dbss:auditInstance:createOnPeriod | dbss::listCommonInfo |
GET /dbss/v2/{project_id}/dbss/audit/availability-zone | dbss::listCommonInfo | - |
- | dbss:auditInstance:listInstancesSummaryInfo | - |
GET /dbss/v2/{project_id}/audit/summary/{busi_type}/taskstatus | dbss::getauditInstancesSummaryTaskStatus | - |
GET /dbss/v1/{project_id}/audit/summary/info | dbss:auditInstance:listInstancesSummaryInfo | - |
GET /dbss/v1/{project_id}/audit/summary/{busi_type}/taskstatus | dbss::getauditInstancesSummaryTaskStatus | - |
GET /dbss/v1/{project_id}/audit/risk/statistics | dbss:auditInstance:listInstancesSummaryInfo | - |
POST /dbss/v1/{project_id}/audit/summary/{busi_type}/taskstatus | dbss::updateAuditInstancesSummaryInfo | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/reports/templates-topic/scheduler/config-task | dbss:auditInstance:setReporterConfig | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/reports/templates-topic/scheduler/{template_id} | dbss:auditInstance:getReporterConfig | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/general/alarm-config-topic | dbss:auditInstance:setAlarmConfig | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/general/alarm-config-topic | dbss:auditInstance:getAlarmConfig | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/databases | dbss:auditInstance:addBareDatabase | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/operation/databases | dbss:auditInstance:addBareDatabase | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/operation/create-database | dbss:auditInstance:addBareDatabase | - |
GET /dbss/v1/{project_id}/{instance_id}/dbss/audit/databases | dbss:auditInstance:listDatabases | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/operation/databases | dbss:auditInstance:listDatabases | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/operation/list-databases | dbss:auditInstance:listDatabases | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/operation/switch | dbss:auditInstance:switchDatabase | - |
POST /dbss/v2/{project_id}/{instance_id}/audit/databases/switch | dbss:auditInstance:switchDatabase | - |
DELETE /dbss/v2/{project_id}/{instance_id}/audit/databases/{db_id} | dbss:auditInstance:deleteDatabase | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/operation/database/delete | dbss:auditInstance:deleteDatabase | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/operation/delete-database | dbss:auditInstance:deleteDatabase | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/scopes | dbss:auditInstance:addAuditScopeRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/scope/add-rule | dbss:auditInstance:addAuditScopeRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/scope/switch | dbss:auditInstance:switchAuditScopeRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/risk | dbss:auditInstance:addRiskRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/risk/add-rule | dbss:auditInstance:addRiskRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/risk/switch | dbss:auditInstance:switchRiskRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/risk/{risk_id} | dbss:auditInstance:editRiskRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/risk/edit-risk/{risk_id} | dbss:auditInstance:editRiskRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/scopes/{scope_id} | dbss:auditInstance:editAuditScopeRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/operation/email/{email_id} | dbss:auditInstance:configAlarmEmail | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/operation/edit-email/{email_id} | dbss:auditInstance:configAlarmEmail | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/risk/rank-risk | dbss:auditInstance:setRiskRulePriority | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/rule/sql-rule/{rule_id} | dbss:auditInstance:editSqlInjectRule | - |
DELETE /dbss/v1/{project_id}/{instance_id}/audit/rule/sql-rule/{rule_id} | dbss:auditInstance:deleteSqlInjectRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/reports/templates/scheduler/config-task | dbss:auditInstance:setReporterConfig | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/general/risk-statistics | dbss:auditInstance:listStatistics | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/general/session-statistics | dbss:auditInstance:listStatistics | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/general/sql-statistics | dbss:auditInstance:listStatistics | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/reports/templates/scheduler/{template_id} | dbss:auditInstance:getReporterConfig | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/sqls/{sql_statement_id} | dbss:auditInstance:listSqls | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/sensitive/result/switch | dbss:auditInstance:listSensitiveRules | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/sensitive/mask/switch | dbss:auditInstance:listSensitiveRules | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sensitive/result/switch | dbss:auditInstance:modifySensitiveRuleSaveResultSwitch | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sensitive/mask/switch | dbss:auditInstance:modifySensitiveRuleAnonymizeSwitch | - |
DELETE /dbss/v1/{project_id}/{instance_id}/audit/sensitive/masks/{rule_id} | dbss:auditInstance:deleteSensitiveRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/sensitive/mask/rule/switch | dbss:auditInstance:switchSensitiveRule | - |
DELETE /dbss/v1/{project_id}/{instance_id}/audit/rule/scopes/{scope_id} | dbss:auditInstance:deleteAuditScopeRule | - |
DELETE /dbss/v1/{project_id}/{instance_id}/audit/rule/risk/{risk_id} | dbss:auditInstance:deleteRiskRule | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/general/alarm-log | dbss:auditInstance:listAlarmItems | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/alarm-log | dbss:auditInstance:listAlarmItems | - |
PUT /dbss/v1/{project_id}/{instance_id}/audit/general/alarm-log/{alarm_id} | dbss:auditInstance:markAlarm | - |
DELETE /dbss/v1/{project_id}/{instance_id}/audit/general/alarm-log/{alarm_id} | dbss:auditInstance:deleteAlarm | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/general/mark-alarm-log | dbss:auditInstance:markAlarm | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/general/synopsis-statistics | dbss:auditInstance:listStatistics | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/backups | dbss:auditInstance:listBackups | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/backup/get-backup | dbss:auditInstance:listBackups | - |
DELETE /dbss/v1/{project_id}/{instance_id}/audit/backups/{id} | dbss:auditInstance:deleteBackup | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/backup/restore | dbss:auditInstance:restoreBackup | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/backup/retry | dbss:auditInstance:retryBackup | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/backup/bucket-name | dbss:auditInstance:getBackupConfig | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/backup/status | dbss:auditInstance:listBackups | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/backup/auto-backup-template | dbss:auditInstance:getBackupConfig | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/backup/risk-templates | dbss:auditInstance:getRiskBackupConfigInfo | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/backup/risk-template/{db_id} | dbss:auditInstance:getRiskBackupConfigInfo | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/backup/risk/switch | dbss:auditInstance:switchRiskBackup | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/backup/risk-bucket-path | dbss:auditInstance:getRiskBackupBucketInfo | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/backup/risk-bucket-path | dbss:auditInstance:setRiskBackupBucketInfo | - |
GET /dbss/v1/{project_id}/{instance_id}/audit/backup/bucket-path | dbss:auditInstance:getBackupConfig | - |
POST /dbss/v1/{project_id}/{instance_id}/dbss/audit/databases/rds | dbss:auditInstance:addRdsDatabase | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/operation/rds | dbss:auditInstance:addRdsDatabase | - |
POST /dbss/v1/{project_id}/{instance_id}/audit/operation/create-guassdb-rds | dbss:auditInstance:addRdsDatabase | - |
POST /dbss/v2/{project_id}/{instance_id}/audit/databases/rds | dbss:auditInstance:addRdsDatabase | - |
POST /dbss/v1/{domain_id}/{instance_id}/audit/backup/risk-bucket-path/global | dbss:auditInstance:setRiskBackupBucketInfo | - |
POST /dbss/v1/{domain_id}/{instance_id}/audit/backup/global/switch | dbss:auditInstance:switchBackup | dbss:auditInstance:getBackupConfig |
POST /dbss/v1/{domain_id}/{instance_id}/audit/backup/risk/global/switch | dbss:auditInstance:switchRiskBackup | - |
GET /dbss/v1/{project_id}/dbss/server-info | dbss::getServerInfo | - |
GET /dbss/v1/{project_id}/dbss/audit/jobs/{resource_id} | dbss::getAuditInstanceJob | - |
GET /dbss/v1/{project_id}/dbss/audit/list-jobs/{resource_id} | dbss::getAuditInstanceJob | - |
GET /dbss/v1/{project_id}/dbss/audit/list-jobs | dbss:auditInstance:listJobs | - |
GET /dbss/v1/{project_id}/dbss/audit/specification | dbss::listCommonInfo | - |
GET /dbss/v1/{project_id}/dbss/audit/instances | dbss:auditInstance:instanceList | - |
GET /dbss/v1/{project_id}/dbss/audit/quota | dbss::listCommonInfo | - |
GET /dbss/v1/{project_id}/dbss/availability-zone | dbss::listCommonInfo | - |
GET /dbss/v1/{project_id}/dbss/get-availability-zone | dbss::listCommonInfo | - |
GET /dbss/v1/{project_id}/obs/audit/backup/obs-buckets | dbss::listObsBuckets | - |
POST /dbss/v1/{project_id}/dbss/audit/security-group | dbss:auditInstance:updateSecurityGroup | - |
POST /dbss/v1/{project_id}/dbss/audit/instances | dbss:auditInstance:createOnDemand | dbss::listCommonInfo |
- | dbss:auditInstance:instanceDelete | - |
DELETE /dbss/v1/{project_id}/dbss/audit/delete-instance | dbss:auditInstance:instanceDelete | - |
POST /dbss/v1/{project_id}/{resource_type}/resource-instances/filter | dbss::listResourcesByTag | - |
POST /dbss/v1/{project_id}/{resource_type}/resource-instances/count | dbss::listResourcesByTag | - |
POST /dbss/v1/{project_id}/{resource_type}/{resource_id}/tags/create | dbss::tagResource | - |
DELETE /dbss/v1/{project_id}/{resource_type}/{resource_id}/tags/delete | dbss::unTagResource | - |
- | dbss::listResourcesByTag | - |
GET /dbss/v1/{project_id}/{resource_type}/tags | dbss::listTags | - |
GET /dbss/v1/{project_id}/{resource_type}/{resource_id}/tags | dbss::listTagsForResource | - |
- | dbss:auditInstance:addWhitelist | - |
- | dbss:auditInstance:deleteWhitelist | - |
- | dbss:auditInstance:updateWhitelist | - |
- | dbss:auditInstance:listWhitelist | - |
- | dbss:dbEncryptInstance:createOnPeriod | - |
- | dbss:dbEncryptInstance:delete | - |
- | dbss:dbEncryptInstance:list | - |
- | dbss:dbEncryptInstance:start | - |
- | dbss:dbEncryptInstance:stop | - |
- | dbss:dbEncryptInstance:reboot | - |
- | dbss:dbEncryptInstance:resetPasswd | - |
- | dbss:dbEncryptInstance:updateSecurityGroup | - |
- | dbss:dbEncryptInstance:bindEip | eip:publicIps:associateInstance |
- | dbss:dbEncryptInstance:unbindEip | eip:publicIps:update |
- | dbss:dbEncryptInstance:modifyAttribute | - |
- | dbss:dbOmInstance:createOnPeriod | - |
- | dbss:dbOmInstance:delete | - |
- | dbss:dbOmInstance:list | - |
- | dbss:dbOmInstance:start | - |
- | dbss:dbOmInstance:stop | - |
- | dbss:dbOmInstance:reboot | - |
- | dbss:dbOmInstance:resetPasswd | - |
- | dbss:dbOmInstance:updateSecurityGroup | - |
- | dbss:dbOmInstance:bindEip | eip:publicIps:associateInstance |
- | dbss:dbOmInstance:unbindEip | eip:publicIps:update |
- | dbss:dbOmInstance:modifyAttribute | - |
- | dbss:auditInstance:getInfo | - |
资源类型(Resource)
资源类型(Resource)表示身份策略所作用的资源。如表3中的某些操作指定了可以在该操作指定的资源类型,则必须在具有该操作的身份策略语句中指定该资源的URN,身份策略仅作用于此资源;如未指定,Resource默认为“*”,则身份策略将应用到所有资源。您也可以在身份策略中设置条件,从而指定资源类型。
DBSS定义了以下可以在自定义身份策略的Resource元素中使用的资源类型。
条件(Condition)
条件键概述
条件(Condition)是身份策略生效的特定条件,包括条件键和运算符。
- 条件键表示身份策略语句的Condition元素中的键值。根据适用范围,分为全局级条件键和服务级条件键。
- 全局级条件键(前缀为g:)适用于所有操作,在鉴权过程中,云服务不需要提供用户身份信息,系统将自动获取并鉴权。详情请参见:全局条件键。
- 服务级条件键(前缀通常为服务缩写,如dbss:)仅适用于对应服务的操作,详情请参见表4。
- 单值/多值表示API调用时请求中与条件关联的值数。单值条件键在API调用时的请求中最多包含一个值,多值条件键在API调用时请求可以包含多个值。例如:g:SourceVpce是单值条件键,表示仅允许通过某个VPC终端节点发起请求访问某资源,一个请求最多包含一个VPC终端节点ID值。g:TagKeys是多值条件键,表示请求中携带的所有标签的key组成的列表,当用户在调用API请求时传入标签可以传入多个值。
- 运算符与条件键、条件值一起构成完整的条件判断语句,当请求信息满足该条件时,身份策略才能生效。支持的运算符请参见:运算符。
DBSS支持的服务级条件键
DBSS定义了以下可以在自定义身份策略的Condition元素中使用的条件键,您可以使用这些条件键进一步细化身份策略语句应用的条件。

