Preset Policy Name | Description |
QcloudTIONEFullAccessContainMultiservice | Full read/write permissions for TI-ONE. Full read/write permissions for all features of TI-ONE, as well as permissions for CAM, VPC, CLS, TCR, TCOP, COS, tags, Finance, CFS, EMR, CVM, GooseFS, and CLB. This policy provides the highest platform permissions and is recommended for platform administrators. |
QcloudTIONEResouceGroupFullAccessContainMultiservice | Full read permissions for TI-ONE and full read/write permissions for the Platform Management module. Full read/write permissions for the Platform Management module and permissions for dependent APIs, including read permissions for CAM, VPC, CLS, TCR, TCOP, COS, tags, Finance, CFS, Elastic MapReduce, CVM, GooseFS, and permissions for placing orders. This policy provides read-only permissions for platform resource management and other models, and is recommended for resource managers. |
QcloudTIONEReadOnlyAccessContainMultiservice | Full read permissions for TI-ONE. Read-only permissions for associated cloud products including CAM, VPC, CLS, TCR, TCOP, COS, tags, CFS, EMR, CVM, and GooseFS. This policy is recommended for users who only need to view content on TI-ONE. |
QcloudTIONEDeveloperContainMultiservice | Read/write permissions required for TI-ONE training and inference, as well as read permissions for platform management. It includes read/write permissions for modules such as Model Hub, Data Center, Training Workshop, Model Management, and Model Services; read permissions for Platform Management; basic permissions for other cloud products that the platform depends on. This policy is suitable for regular developers who are not platform administrators. |
QcloudTIONEOperationalPrecondition | Full permissions to all operational-level APIs of TI-ONE. Includes full permissions to all operational-level APIs of TI-ONE. This policy is suitable when you need to grant fine-grained read/write permissions to sub-users based on tags. |
Preset Policy Name | Description |
QcloudAccessForTIONERoleInTakeOver | It authorizes the TI-ONE service role to access other associated cloud service resources when maintaining resource group nodes. It includes operations permissions related to CVM, VPC, Private DNS, and TCR. This policy requires authorization when users add nodes to a resource group for the first time. |
QcloudAccessForTIONERoleInCodeRepository | It authorizes the TI-ONE service role with the permission for Key Management Service (KMS). It includes permissions for creating keys, encryption, decryption, generating data keys, and querying key lists in KMS. This policy requires authorization in scenarios requiring encryption, such as using custom image keys; starting a dev machine, container login for Task-based Modeling/Online Services; using code repository keys. |
QcloudAccessForTIONERole | It authorizes the TI-ONE service role with the basic operational permissions required for running. It includes listing COS files and performing create, read, update, and delete (CRUD) operations on file content; querying VPC networks and subnets; creating, querying, searching, and downloading CLS; querying Cloud Monitor and pulling TCR. This policy requires authorization for background services when users use TI-ONE. |
QcloudAccessForTIONERoleInGoosefs | It authorizes the TI-ONE service role to perform GooseFS storage operations. It includes querying GooseFS clusters; creating and viewing Client nodes; creating, querying, and deleting FUSE clients; querying namespaces. This policy requires authorization when users require additional use of the GooseFS service in managed clusters. |
QcloudTIONESanityCheck | It authorizes TI-ONE service roles to start health check tasks. This policy is associated with TI-ONE service roles and authorizes the TI-ONE Ops team to start health check tasks. This policy requires authorization when the TI-ONE Ops team assists in troubleshooting node failures. |
QcloudAccessForTIONERoleInNetwork | It authorizes the TI-ONE service role to configure networks. This policy is associated with TI-ONE service roles to map task services started in TI-ONE products to the user's network configuration. This policy requires authorization when users configure custom network parameters. |
Feedback