If you use multiple Tencent Cloud services such as TcaplusDB, VPC, CVM, and TencentDB that are managed by different users sharing your Tencent Cloud account key, you may face the following problems:
You can allow different users to manage different services through sub-accounts so as to avoid the above problems. By default, a sub-account doesn't have permission to use the TcaplusDB service or resources. Therefore, you need to create a policy to grant the required permission to the sub-account.
Cloud Access Management (CAM) is a web-based Tencent Cloud service that helps you securely manage and control access permissions to your Tencent Cloud resources. Using CAM, you can create, manage, and terminate users (groups), and control the Tencent Cloud resources that can be used by the specified user through identity and policy management.
When using CAM, you can associate a policy with a user or user group to allow or forbid them to use specified resources to complete specified tasks. For more information on CAM policies, please see Policy Syntax.
If you do not need to manage the access permissions to TcaplusDB resources for sub-accounts, you can skip this part. This will not affect your understanding and usage of other parts in the documentation.
A CAM policy must authorize or deny the use of one or more TcaplusDB operations. At the same time, it must specify the resources that can be used for the operations (which can be all resources or partial resources for certain operations). A policy can also include the conditions set for the manipulated resources.
Certain TencentCloud APIs for TcaplusDB do not support resource-level permissions, which means that for this type of API operations, you cannot specify a given resource for use when they are performed; instead, you must specify all resources for use.
|Basic policy structure||Policy Syntax|
|Operation definition in a policy||TcaplusDB Operations|
|Resource definition in a policy||TcaplusDB Resource Path|
|Supported resource-level permissions in TcaplusDB||Supported Resource-Level Permissions in TcaplusDB|
|Console Examples||Console Examples|