| Product | Role Name | Role Types | Role Entity |
|---|---|---|---|
| Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInRce | Service-Related Roles | rce.teo.cloud.tencent.com |
| Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInDdos | Service-Related Roles | ddos.teo.cloud.tencent.com |
| Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInCaptcha | Service-Related Roles | captcha.teo.cloud.tencent.com |
| Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInRceIntl | Service-Related Roles | rce.teointl.cloud.tencent.com |
| Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInCertlist | Service-Related Roles | certlist.teo.cloud.tencent.com |
| Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInInference | Service-Related Roles | edgeoneinference.teo.cloud.tencent.com |
| Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInUpstreamgw | Service-Related Roles | upstreamgw.teo.cloud.tencent.com |
| Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInCaptchaIntl | Service-Related Roles | captcha.teointl.cloud.tencent.com |
| Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInCAMUserGroup | Service-Related Roles | camusergroup.teo.cloud.tencent.com |
| Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInDnspodaccessEO | Service-Related Roles | DnspodaccesEO.TEO.cloud.tencent.com |
| Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInRealTimeLogCLS | Service-Related Roles | realtimelogcls.teo.cloud.tencent.com |
Use Cases: The current role is the TEO service linked role, which will query risk labels in RCE service within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"rce:DescribeRiskLabels"
],
"resource": "*"
}
]
}
Use Cases: The current role is the TEO service linked role, which will be able to CRUD the configurations in the DDoS protection product within the scope of the associated policy permissions.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"antiddos:ModifyProtection",
"antiddos:DescribeProtections",
"antiddos:DeleteProtection",
"antiddos:CreateProtection",
"antiddos:ModifyProtectionResource",
"antiddos:DescribeProtectionResources"
],
"resource": "*"
}
]
}
Use Cases: The current role is the TEO service linked role, which will query captcha result in Captcha service within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"captcha:DescribeCaptchaResult"
],
"resource": "*"
}
]
}
Use Cases: The current role is the TEO service linked role, which will query risk labels in RCE service within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"rce:DescribeRiskLabels"
],
"resource": "*"
}
]
}
Use Cases: The current role is the TEO service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"resource": [
"*"
],
"action": [
"ssl:DescribeCertificate",
"ssl:DescribeCertificateDetail",
"ssl:DescribeCertificates",
"ssl:DownloadCertificate",
"ssl:ModifyCertificateAlias",
"ssl:UploadCertificate"
]
}
]
}
Use Cases: The current role is the TEO service linked role, which will access your TCR resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"tcr:DescribeRegions",
"tcr:DescribeInstances",
"tcr:DescribeNamespaces",
"tcr:DescribeRepositories",
"tcr:DescribeImages",
"tcr:DescribeRepositoryFilterPersonal",
"tcr:PullRepository",
"tcr:CreateInstanceToken",
"tcr:DescribeImagePersonal",
"tcr:DescribeApplicationTokenPersonal"
],
"resource": "*"
}
]
}
Use Cases: The current role is the teo service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"statement": [
{
"action": [
"vpc:DescribeVpcs",
"vpc:DescribeSubnets",
"vpc:DescribeDirectConnectGateways"
],
"effect": "allow",
"resource": [
"*"
]
}
],
"version": "2.0"
}
Use Cases: The current role is the TEO service linked role, which will query captcha result in Captcha service within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"captcha:DescribeCaptchaResult"
],
"resource": "*"
}
]
}
Use Cases: The current role is the TEO service linked role, which will query your user group info configured in CAM service within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"cam:GetGroup"
],
"resource": "*"
}
]
}
Use Cases: The current role is the TEO service linked role, which will query the status of the domain name you have connected to the DNSPod product and related resolution records within the scope of the associated policy, and help you quickly complete the resolution modification in the scenario of one-click resolution modification, which will accelerate the service switch to EO.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"dnspod:CreateRecord",
"dnspod:ModifyRecordStatus",
"dnspod:DescribeRecordList",
"dnspod:ModifyRecord",
"dnspod:DescribeDomain"
],
"resource": "*"
}
]
}
Use Cases: The current role is the TEO service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"action": [
"cls:pushLog",
"cls:searchLog",
"cls:listLogset",
"cls:getLogset",
"cls:listTopic",
"cls:getTopic",
"cls:createTopic",
"cls:modifyTopic",
"cls:deleteTopic",
"cls:createLogset",
"cls:modifyLogset",
"cls:deleteLogset",
"cls:downloadLog",
"cls:getIndex",
"cls:modifyIndex",
"cls:CreateIndex"
],
"resource": "*",
"effect": "allow"
}
]
}
Feedback