If you need refined permission management for MQTT resources, the following features can be achieved by Cloud Access Management (CAM):
User and permission assignment: Create independent users or roles for members of different functional departments based on enterprise organizational structure, and allocate exclusive security credentials (console login password, cloud API key) or request temporary security credentials to ensure secure and controllable access to MQTT resources.
Fine-grained access control: Set differentiated access policies based on employee functions to precisely control the executable operations and accessible resource scope for each user/role, achieving strict permission isolation.
Account System Introduction
Capability differences between different account types and related reference documents are as follows:
|
|
| Sub-user | Collaborator | Message recipient |
Definition | Owns all Tencent Cloud resources and can access any of them. | Created by the root account and fully owned by the root account that created it. | Originally has the identity of a root account. After being added as a collaborator of the current root account, it becomes one of the sub-accounts, able to switch back to the root account identity. | Only has message receiving capabilities. |
Console Access | ✔ | ✔ | ✔ | - |
Programmatic Access | ✔ | ✔ | ✔ | - |
Authorizing with Policies | Default has full policy access | ✔ | ✔ | - |
Message Notification | ✔ | ✔ | ✔ | ✔ |
Reference Documentation | | | | |
Note:
To ensure the security of your Tencent Cloud account and cloud resource usage, avoid using the Tencent Cloud root account directly to operate resources unless necessary. Instead, create sub-accounts, assign them policies based on the principle of least privilege, and use these sub-accounts with limited permissions to operate your cloud resources.
Policies
Policies are syntax specifications for defining and describing one or more permissions. By default, the root account has access to all its resources, while the sub-account doesn't have access to any resources under the root account.
The root account can grant users/user groups the permissions to view and use specific resources by associating policies. Tencent Cloud policy types are divided into preset policies and custom policies.
Preset Policy
MQTT provides two preset policies for sub-accounts:
|
QcloudMQTTFullAccess | Full read-write access can be performed on the product console |
QcloudMQTTReadOnlyAccess | Read-only access: only view console information |
Custom Policies
If the system permission policy cannot meet your requirements, you can create custom permission policies to implement minimum authorization. Policy settings can be precise to [API, resource, user/user group, allow/deny, condition] dimensions. Using custom permission policies helps achieve refined permission control, which is an effective method to enhance resource access security.
Currently Tencent Cloud offers the following two flexible ways to create custom policies to meet different usage habits and requirements:
Visual view: Use wizard-based operations. Users do not need to understand policy syntax and can select cloud services, operations, resources, conditions, and other elements through the interface. The policy is automatically generated by the system to lower the usage threshold.
JSON view: You can edit policy content after selecting a policy template, or directly write policy content in JSON format within the frame. Suitable for users with a certain technical foundation.
Custom policy example
The subaccount granted this permission policy can only query certificate details, query the MQTT client list, and query MQTT instance details for the instance mqtt-xxx.
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"mqtt:DescribeClientList",
"mqtt:DescribeInstance",
"mqtt:DescribeCaCertificate"
],
"resource": [
"qcs::mqtt::uin/1000****5002:instance/mqtt-****"
]
}
]
}
Authorizing Your Sub-Account
When using MQTT, sub-accounts need authorization in two aspects:
|
Access to other cloud services | During the process of using MQTT, it may be necessary to access the user's other cloud product resources (VPC, CVM, etc.), such as viewing the AZ information where the user subnet resides. | |
Read/write permissions for MQTT resources | Obtain read/write permissions for MQTT resources. | |
References
|
Understand the Relationship Between Policy and User | |
Understand the Basic Policy Structure | |
Learn about which products support CAM | |