更新时间:2024-08-19 GMT+08:00
分享

DDoS高防 AAD

Organizations服务中的服务控制策略(Service Control Policies,以下简称SCP)可以使用这些授权项元素设置访问控制策略。

SCP不直接进行授权,只划定权限边界。将SCP绑定到组织单元或者成员账号时,并没有直接对组织单元或成员账号授予操作权限,而是规定了成员账号或组织单元包含的成员账号的授权范围。

本章节介绍组织服务中SCP使用的元素,这些元素包含了操作(Action)、资源(Resource)和条件(Condition)。

如何使用这些元素编辑SCP自定义策略,请参考创建SCP

操作(Action)

操作(Action)即为SCP策略中支持的授权项。

  • “访问级别”列描述如何对操作进行分类(list、read和write等)。此分类可帮助您了解在SCP策略中相应操作对应的访问级别。
  • “资源类型”列指每个操作是否支持资源级权限。
    • 资源类型支持通配符号*表示所有。如果此列没有值(-),则必须在SCP策略语句的Resource元素中指定所有资源类型(“*”)。
    • 如果该列包含资源类型,则必须在具有该操作的语句中指定该资源的URN。
    • 资源类型列中必需资源在表中用星号(*)标识,表示使用此操作必须指定该资源类型。

    关于AAD定义的资源类型的详细信息请参见资源类型(Resource)

  • “条件键”列包括了可以在SCP策略语句的Condition元素中支持指定的键值。
    • 如果该授权项资源类型列存在值,则表示条件键仅对列举的资源类型生效。
    • 如果该授权项资源类型列没有值(-),则表示条件键对整个授权项生效。
    • 如果此列条件键没有值(-),表示此操作不支持指定条件键。

    关于AAD定义的条件键的详细信息请参见条件(Condition)

您可以在SCP策略语句的Action元素中指定以下AAD的相关操作。

表1 AAD支持的授权项

授权项

描述

访问级别

资源类型(*为必须)

条件键

aad:alarmConfig:create

授予创建告警设置的权限。

write

alarmConfig *

-

aad:alarmConfig:put

授予修改告警设置的权限。

write

alarmConfig *

-

aad:alarmConfig:get

授予查询告警设置的权限。

read

alarmConfig *

-

aad:alarmConfig:delete

授予删除告警设置的权限。

write

alarmConfig *

-

aad:certificate:delete

授予删除证书的权限。

write

certificate *

-

aad:certificate:list

授予查询证书列表的权限。

list

certificate *

-

aad:certificate:set

授予修改域名对应证书的权限。

write

certificate *

-

domain *

g:EnterpriseProjectId

aad:dashboard:delete

授予删除报表日志配置的权限。

write

-

-

aad:dashboard:get

授予获取报表数据和日志配置的权限。

read

-

-

aad:dashboard:set

授予修改报表日志配置的权限。

write

-

-

aad:domain:create

授予添加防护域名的权限。

write

domain *

g:EnterpriseProjectId

aad:domain:delete

授予删除防护域名的权限。

write

domain *

g:EnterpriseProjectId

aad:domain:get

授予查询防护域名详情的权限。

read

domain *

g:EnterpriseProjectId

aad:domain:list

授予查询域名列表的权限。

list

domain *

g:EnterpriseProjectId

aad:domain:put

授予修改域名防护属性的权限。

write

domain *

g:EnterpriseProjectId

aad:forwardingRule:create

授予添加转发规则的权限。

write

forwardingRule *

g:EnterpriseProjectId

aad:forwardingRule:delete

授予删除转发规则的权限。

write

forwardingRule *

g:EnterpriseProjectId

aad:forwardingRule:get

授予查询转发规则的权限。

read

forwardingRule *

g:EnterpriseProjectId

aad:forwardingRule:list

授予导出转发规则的权限。

list

forwardingRule *

g:EnterpriseProjectId

aad:forwardingRule:put

授予修改转发规则中的回源IP的权限。

write

forwardingRule *

g:EnterpriseProjectId

aad:instance:create

授予创建实例的权限。

write

instance *

g:EnterpriseProjectId

aad:instance:get

授予查询实例属性的权限。

read

instance *

g:EnterpriseProjectId

aad:instance:list

授予查询实例列表的权限。

list

instance *

g:EnterpriseProjectId

aad:instance:put

授予修改实例属性的权限。

write

instance *

g:EnterpriseProjectId

aad:policy:create

授予添加防护规则的权限。

write

policy *

g:EnterpriseProjectId

aad:policy:delete

授予删除防护规则的权限。

write

policy *

g:EnterpriseProjectId

aad:policy:get

授予查询防护规则详情的权限。

read

policy *

g:EnterpriseProjectId

aad:policy:list

授予查询防护规则列表的权限。

list

policy *

g:EnterpriseProjectId

aad:policy:put

授予修改防护规则的权限。

write

policy *

g:EnterpriseProjectId

aad:quotas:get

授予查询防护规格的权限。

read

-

-

aad:whiteBlackIpRule:create

授予添加防护黑白名单的权限。

write

whiteBlackIpRule *

g:EnterpriseProjectId

aad:whiteBlackIpRule:delete

授予删除防护黑白名单的权限。

write

whiteBlackIpRule *

g:EnterpriseProjectId

aad:whiteBlackIpRule:list

授予查询防护黑白名单列表的权限。

list

whiteBlackIpRule *

g:EnterpriseProjectId

aad:protectedIp:put

授予修改防护对象标签的权限。

write

-

-

aad:protectedIp:list

授予查询防护对象列表的权限。

list

-

-

aad:package:put

授予修改防护包的权限。

write

package *

-

aad:package:list

授予查询防护包列表的权限。

list

package *

-

aad:block:put

授予解封IP的权限。

write

-

-

aad:block:list

授予查询封堵ip列表的权限。

list

-

-

aad:block:get

授予查询封堵和解封信息的权限。

read

-

-

aad:alarmConfig:create

授予创建告警设置的权限。

write

alarmConfig *

-

aad:alarmConfig:put

授予修改告警设置的权限。

write

alarmConfig *

-

aad:alarmConfig:get

授予查询告警设置的权限。

read

alarmConfig *

-

aad:alarmConfig:delete

授予删除告警设置的权限。

write

alarmConfig *

-

aad:certificate:delete

授予删除证书的权限。

write

certificate *

-

aad:certificate:list

授予查询证书列表的权限。

list

certificate *

-

aad:certificate:set

授予修改域名对应证书的权限。

write

certificate *

-

domain *

g:EnterpriseProjectId

aad:dashboard:delete

授予删除报表日志配置的权限。

write

-

-

aad:dashboard:get

授予获取报表数据和日志配置的权限。

read

-

-

aad:dashboard:set

授予修改报表日志配置的权限。

write

-

-

aad:domain:create

授予添加防护域名的权限。

write

domain *

g:EnterpriseProjectId

aad:domain:delete

授予删除防护域名的权限。

write

domain *

g:EnterpriseProjectId

aad:domain:get

授予查询防护域名详情的权限。

read

domain *

g:EnterpriseProjectId

aad:domain:list

授予查询域名列表的权限。

list

domain *

g:EnterpriseProjectId

aad:domain:put

授予修改域名防护属性的权限。

write

domain *

g:EnterpriseProjectId

aad:forwardingRule:create

授予添加转发规则的权限。

write

forwardingRule *

g:EnterpriseProjectId

aad:forwardingRule:delete

授予删除转发规则的权限。

write

forwardingRule *

g:EnterpriseProjectId

aad:forwardingRule:get

授予查询转发规则的权限。

read

forwardingRule *

g:EnterpriseProjectId

aad:forwardingRule:list

授予导出转发规则的权限。

list

forwardingRule *

g:EnterpriseProjectId

aad:forwardingRule:put

授予修改转发规则中的回源IP的权限。

write

forwardingRule *

g:EnterpriseProjectId

aad:instance:create

授予创建实例的权限。

write

instance *

g:EnterpriseProjectId

aad:instance:get

授予查询实例属性的权限。

read

instance *

g:EnterpriseProjectId

aad:instance:list

授予查询实例列表的权限。

list

instance *

g:EnterpriseProjectId

aad:instance:put

授予修改实例属性的权限。

write

instance *

g:EnterpriseProjectId

aad:policy:create

授予添加防护规则的权限。

write

policy *

g:EnterpriseProjectId

aad:policy:delete

授予删除防护规则的权限。

write

policy *

g:EnterpriseProjectId

aad:policy:get

授予查询防护规则详情的权限。

read

policy *

g:EnterpriseProjectId

aad:policy:list

授予查询防护规则列表的权限。

list

policy *

g:EnterpriseProjectId

aad:policy:put

授予修改防护规则的权限。

write

policy *

g:EnterpriseProjectId

aad:quotas:get

授予查询防护规格的权限。

read

-

-

aad:whiteBlackIpRule:create

授予添加防护黑白名单的权限。

write

whiteBlackIpRule *

g:EnterpriseProjectId

aad:whiteBlackIpRule:delete

授予删除防护黑白名单的权限。

write

whiteBlackIpRule *

g:EnterpriseProjectId

aad:whiteBlackIpRule:list

授予查询防护黑白名单列表的权限。

list

whiteBlackIpRule *

g:EnterpriseProjectId

aad:protectedIp:put

授予修改防护对象标签的权限。

write

-

-

aad:protectedIp:list

授予查询防护对象列表的权限。

list

-

-

aad:package:put

授予修改防护包的权限。

write

package *

-

aad:package:list

授予查询防护包列表的权限。

list

package *

-

aad:block:put

授予解封IP的权限。

write

-

-

aad:block:list

授予查询封堵ip列表的权限。

list

-

-

aad:block:get

授予查询封堵和解封信息的权限。

read

-

-

AAD的API通常对应着一个或多个授权项。表2展示了API与授权项的关系,以及该API需要依赖的授权项。

表2 API与授权项的关系

API

对应的授权项

依赖的授权项

POST /v1/{project_id}/cad/alart/config

aad:alarmConfig:create

-

POST /v1/cnad/alarm-config

aad:alarmConfig:put

-

DELETE /v1/cnad/alarm-config

aad:alarmConfig:delete

-

GET /v1/{project_id}/cad/alart/list

aad:alarmConfig:get

-

GET /v1/cnad/alarm-config

aad:alarmConfig:get

-

DELETE /v1/aad/certificate/del

aad:certificate:delete

-

GET /v1/{project_id}/cad/domains/certificatelist

aad:certificate:list

-

GET /v1/aad/certificate-details

aad:certificate:list

-

POST /v1/{project_id}/cad/domains/certificate

aad:certificate:set

-

POST /v1/aad/configs/lts/delete

aad:dashboard:delete

-

GET /v1/{project_id}/cad/ddosinfo/events_type

aad:dashboard:get

-

GET /v1/aad/configs/lts_region

aad:dashboard:get

-

GET /v1/aad/configs/lts

aad:dashboard:get

-

GET /v1/{project_id}/waf/event/timeline

aad:dashboard:get

-

GET /v1/{project_id}/waf/event/request/peak

aad:dashboard:get

-

GET /v1/{project_id}/waf/event/attack/type

aad:dashboard:get

-

GET /v1/{project_id}/waf/event/attack/source/num

aad:dashboard:get

-

GET /v1/{project_id}/waf/event/attack/source

aad:dashboard:get

-

GET /v1/{project_id}/cad/instances/flow_pps

aad:dashboard:get

-

GET /v1/{project_id}/cad/instances/flow_bps

aad:dashboard:get

-

GET /v1/{project_id}/cad/instances/events

aad:dashboard:get

-

GET /v1/{project_id}/cad/ddosinfo/peak

aad:dashboard:get

-

POST /v1/aad/configs/lts

aad:dashboard:set

-

POST /v1/{project_id}/aad/domains

aad:domain:create

-

POST /v1/{project_id}/cad/domains/del

aad:domain:delete

-

GET /v1/{project_id}/aad/domains/{domain_id}/service-config

aad:domain:get

-

GET /v1/{project_id}/cad/domains/ports

aad:domain:list

-

GET /v1/{project_id}/cad/domains/name

aad:domain:get

-

GET /v1/{project_id}/cad/domains/line/{enterprise_project_id}

aad:domain:list

-

GET /v1/{project_id}/cad/domains/instances

aad:domain:get

-

GET /v1/{project_id}/cad/domains/brief

aad:domain:get

-

GET /v1/{project_id}/aad/domains/waf-list

aad:domain:list

-

GET /v1/{project_id}/cad/domains

aad:domain:list

-

POST /v1/{project_id}/aad/domains/{domain_id}/service-config

aad:domain:put

-

POST /v1/{project_id}/cad/domains/switch

aad:domain:put

-

POST /v1/{project_id}/cad/domains/cnameDispatchSwitch

aad:domain:put

-

POST /v1/{project_id}/cad/domains/cname/switch

aad:domain:put

-

POST /v1/{project_id}/cad/instances/protocol_rule

aad:forwardingRule:create

-

POST /v1/{project_id}/cad/instances/protocol_rule/import

aad:forwardingRule:create

-

DELETE /v1/{project_id}/cad/instances/protocol_rule/{rule_id}

aad:forwardingRule:delete

-

POST /v1/{project_id}/cad/instances/protocol_rule/batchdel

aad:forwardingRule:delete

-

GET /v1/{project_id}/cad/instances/rules

aad:forwardingRule:get

-

GET /v1/{project_id}/cad/instances/protocol_rule/export

aad:forwardingRule:list

-

PUT /v1/{project_id}/cad/instances/protocol_rule/{rule_id}

aad:forwardingRule:put

-

POST /v1/{project_id}/cad/instances/cad_open

aad:instance:create

-

GET /v1/{project_id}/cad/products

aad:instance:create

-

GET /v1/{project_id}/{resource_type}/{resource_id}/tags

aad:instance:get

-

GET /v1/{project_id}/cad/upgradeproducts/{instance_id}

aad:instance:get

-

GET /v1/{project_id}/cad/instances/detail/{instance_id}

aad:instance:get

-

GET /v1/{project_id}/aad/instances/brief-list

aad:instance:list

-

GET /v1/{project_id}/cad/sourceip

aad:instance:list

-

GET /v1/{project_id}/cad/instances

aad:instance:list

-

POST /v1/{project_id}/{resource_type}/{resource_id}/tags/action

aad:instance:put

-

POST /v1/{project_id}/cad/instances/cad_spec_upgrade

aad:instance:put

-

PUT /v1/{project_id}/cad/instances/{instance_id}/name

aad:instance:put

-

PUT /v1/{project_id}/cad/instances/{instance_id}/elastic/{ip_id}

aad:instance:put

-

POST /v1/{project_id}/aad/policies/waf/cc

aad:policy:create

-

POST /v1/cnad/policies

aad:policy:create

-

DELETE /v1/{project_id}/aad/policies/waf/cc/{rule_id}

aad:policy:delete

-

DELETE /v1/cnad/policies/{policy_id}

aad:policy:delete

-

GET /v1/{project_id}/cad/flowblock

aad:policy:get

-

GET /v1/cnad/policies/{policy_id}

aad:policy:get

-

GET /v1/{project_id}/aad/policies/waf/cc

aad:policy:list

-

GET /v1/cnad/policies

aad:policy:list

-

PUT /v1/{project_id}/aad/policies/waf/cc/{rule_id}

aad:policy:put

-

POST /v1/{project_id}/cad/flowblock/udp

aad:policy:put

-

POST /v1/{project_id}/cad/flowblock/foreign

aad:policy:put

-

POST /v1/cnad/policies/{policy_id}/ip-list/add

aad:policy:put

-

POST /v1/cnad/policies/{policy_id}/bind

aad:policy:put

-

POST /v1/cnad/policies/{policy_id}/ip-list/delete

aad:policy:put

-

POST /v1/cnad/policies/{policy_id}/unbind

aad:policy:put

-

PUT /v1/cnad/policies/{policy_id}

aad:policy:put

-

GET /v1/{project_id}/aad/quotas/domain-port

aad:quotas:get

-

GET /v1/{project_id}/scc/waf/quota

aad:quotas:get

-

GET /v1/{project_id}/cad/quotas

aad:quotas:get

-

GET /v1/{project_id}/cad/ip/quotas

aad:quotas:get

-

GET /v1/{project_id}/cad/bwlist/quota

aad:quotas:get

-

GET /v1/{project_id}/aad/user-configs

aad:quotas:get

-

POST /v1/{project_id}/cad/bwlist

aad:whiteBlackIpRule:create

-

POST /v1/{project_id}/cad/bwlist/delete

aad:whiteBlackIpRule:delete

-

GET /v1/{project_id}/cad/bwlist

aad:whiteBlackIpRule:list

-

PUT /v1/cnad/protected-ips/tags

aad:protectedIp:put

-

GET /v1/cnad/protected-ips

aad:protectedIp:list

-

POST /v1/cnad/packages/{package_id}/protected-ips

aad:package:put

-

PUT /v1/cnad/packages/{package_id}/name

aad:package:put

-

GET /v1/cnad/packages

aad:package:list

-

GET /v1/cnad/packages/{package_id}/unbound-protected-ips

aad:package:list

-

POST /v1/unblockservice/{domain_id}/unblock

aad:block:put

-

GET /v1/unblockservice/{domain_id}/block-list

aad:block:list

-

GET /v1/unblockservice/{domain_id}/unblock-quota-statistics

aad:block:get

-

GET /v1/unblockservice/{domain_id}/block-statistics

aad:block:get

-

GET /v1/unblockservice/{domain_id}/unblock-record

aad:block:get

-

GET /v1/{project_id}/cad/instances/{instance_id}/elastic_count/{ip_id}

aad:instance:get

-

GET /v1/{project_id}/cad/instances/{data_center}/elastic/{line}/{ip_id}

aad:instance:get

-

GET /v1/aad/remain-vip-number

aad:quotas:get

-

GET /v1/aad/instance/connection-num

aad:dashboard:get

-

PUT /v1/{project_id}/cad/instances/{instance_id}/pp-switch

aad:instance:put

-

GET /v1/aad-service/ces/{domain_id}/dims-info

aad:instance:list

-

GET /v1/aad-service/ces/v2/{domain_id}/instances

aad:instance:list

-

GET /v1/{project_id}/cad/instances/security-statistics

aad:instance:list

-

GET /v1/aad/domain/instances/rules

aad:domain:list

-

POST /v1/aad/policy/modify

aad:policy:put

-

POST /v1/aad/geoip

aad:policy:put

-

GET /v1/aad/geoip

aad:policy:get

-

DELETE /v1/aad/geoip/{ruleId}

aad:policy:delete

-

PUT /v1/aad/geoip/{ruleId}

aad:policy:put

-

POST /v1/aad/whiteip

aad:policy:put

-

GET /v1/aad/whiteip

aad:policy:get

-

DELETE /v1/aad/whiteip

aad:policy:delete

-

POST /v1/aad/custom

aad:policy:put

-

GET /v1/aad/custom

aad:policy:get

-

PUT /v1/aad/custom/{ruleId}

aad:policy:put

-

DELETE /v1/aad/custom/{ruleId}

aad:policy:delete

-

GET /v1/aad/policy/details

aad:policy:get

-

POST /v1/aad/cc/intelligent/modify

aad:policy:put

-

GET /v1/aad/geoip/map

aad:policy:get

-

GET /v1/aad/instances/{instance_id}/{ip}/ddos-statistics

aad:dashboard:get

-

GET /v1/aad/protected-domains/{domain_id}

aad:domain:get

-

GET /v1/aad/protected-domains

aad:domain:list

-

PUT /v1/aad/protected-domains/{domain_id}

aad:domain:put

-

POST /v1/aad/instances/{instance_id}/{ip}/rules/batch-create

aad:forwardingRule:create

-

POST /v1/aad/instances/{instance_id}/{ip}/rules/batch-delete

aad:forwardingRule:delete

-

GET /v1/aad/instances/{instance_id}/{ip}/rules

aad:forwardingRule:list

-

PUT /v1/aad/instances/{instance_id}/{ip}/rules/{rule_id}

aad:forwardingRule:put

-

GET /v1/aad/instances

aad:instance:list

-

资源类型(Resource)

资源类型(Resource)表示SCP策略所作用的资源。如表3中的某些操作指定了可以在该操作指定的资源类型,则必须在具有该操作的SCP策略语句中指定该资源的URN,SCP策略仅作用于此资源;如未指定,Resource默认为“*”,则SCP策略将应用到所有资源。您也可以在SCP策略中设置条件,从而指定资源类型。

AAD定义了以下可以在自定义SCP策略的Resource元素中使用的资源类型。

表3 AAD支持的资源类型

资源类型

URN

forwardingRule

aad::<account-id>:forwardingRule:<forwarding-rule-id>

package

aad::<account-id>:package:<package-id>

policy

aad::<account-id>:policy:<policy-id>

alarmConfig

aad::<account-id>:alarmConfig:<alarm-config-id>

domain

aad::<account-id>:domain:<domain-id>

certificate

aad::<account-id>:certificate:<certificate-id>

instance

aad::<account-id>:instance:<instance-id>

whiteBlackIpRule

aad::<account-id>:whiteBlackIpRule:<white-black-ip-rule-id>

条件(Condition)

AAD服务不支持在SCP策略中的条件键中配置服务级的条件键。

AAD可以使用适用于所有服务的全局条件键,请参考全局条件键

相关文档