tencent cloud


Tag-Based Project Resource Management

Last updated: 2022-09-14 14:51:04



    This document describes how to use tags and tag authentication to manage project resources in the tag system. It is applicable to scenarios where a user used projects in the legacy console and granted sub-accounts access through project authentication.

    Project management is centralized management of resources in the project dimension. You can add Tencent Cloud product resources that support project management to a project. Then, select Policies > Create Custom Policy > Create by Product Feature or Project Permission in the CAM console to generate a project policy. You can associate the project policy with project-related users or user groups, so that they can get the permission to manipulate project resources.

    The legacy COS console enables permission management operations based on projects. However, a project policy grants the full access to all resources under all products included in the project. It cannot meet the needs for multi-dimensional tagging and categorization or manage permissions in a refined manner. In the new COS console, COS only supports tag-based permission management for project resources.

    COS uses the tag service for compatibility with the legacy project feature. In the tag service system, a project is a special tag with the tag key being project. You can still create a project and then create a bucket under it in the project console. COS will automatically double-write the project association of a bucket during bucket creation to the tag service, so that the association can be displayed in the console.


    • If you need to manage buckets in a categorized manner, we recommend you directly use tags instead of projects to implement tasks such as permission control and cost allocation. For more information on how to add tags in the console, see Setting Bucket Tags.
    • For more information on projects, see Project and Tag. For more information on the tag service, see Tag.
    • For more information on benefits of tags, see Project and Tag.

    Granting Sub-Account Access to Project

    You can grant a sub-account access to a project by following the steps below:

    1. Log in to the Project console, create a project, name it, and submit it. Then, create a resource such as a bucket or CVM instance under it.
      If you already have a project with storage or computing resources, you can skip this step.
    2. After you create a project and bind a resource to it, enter the Policy Management page and click Create Custom Policy > Authorize by Tag. You can select the tag authentication method. Then, select the corresponding project tag and grant the sub-account access to all resources under it.
    3. The default policy is to grant the sub-account access to all resources under the project tag. If you want the sub-account to perform only specified operations on certain resources under the tag, you can change the action (for specifying operations) and resource (for specifying resources) in the policy syntax as instructed in Syntax Structure and click Complete.
    4. If you want the sub-account to be able to create buckets, you also need to grant it the PUT Bucket permission. On the Policy Management page, click Create Custom Policy > Create by Policy Generator and grant the sub-account the corresponding permission.
    Contact Us

    Contact our sales team or business advisors to help your business.

    Technical Support

    Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

    7x24 Phone Support