Overview
Features
Scenarios
Use Limits
Resource Types Supporting Tag APIs
Type | Default Upper Limit | Handling Rule in Case of Exceeding the Upper Limit | Is Increase Supported | Method of Increase |
The number of tag policies under a single root account | A maximum value of 100 | Saving a tag policy is not allowed when it is created. | Yes | |
The number of tag policies that can be bound to a single root account or sub-account user | A maximum value of 10 | Binding a tag policy to the user is not allowed. | No | - |
The number of tag keys in an effective policy | A maximum value of 50 | Excess tag keys will not be merged when an effective policy is generated. | No | - |
The maximum number of characters for a single tag policy | A maximum value of 4,096 characters | Saving a tag policy is not allowed when the number of its characters exceeds the limit. | Yes | Supporting a separate increase for root accounts and sub-accounts |
Feature Name | Effect Before Setting | Effect After Setting |
Flexible Scope of Effectiveness for Tag Policies | There is no policy, and users bind tags on their own. | When linked to a root account, it can take effect on that account When bound to a specific sub-user, it can exclusively affect that sub-user. You can bind certain sub-users in batches as needed. |
Automatic Repair Scenarios | User settings are wrong and hard to detect, and can only be manually modified after self-inspection. | For existing resources that are not tagged, if a sub-user adds a tag that is inconsistent with the constraints within the tag policy, automatic correction is supported |
Automatic Assignment Scenarios | Users need to input each tag to be searched for and selected and remember which key values need to be bound. | When creating or editing resource tags, it can automatically display tag keys or tag values for sub-users by default, thereby reducing the steps sub-users need to take or preventing omissions. |
Mandatory Interception Scenarios | User settings are wrong and not detected, and need to be corrected after being discovered. | When tags are edited for existing resources, if the key value does not comply with constraints within the tag policy, the binding will be intercepted. For example, if a sub-user is required to bind Product: Product A , but the sub-user edits it as Product: Product B , the binding will be intercepted. |
Tag Policy Key Value Limits | Users need to search among all key values. | After this feature is enabled, effective policy keys will be displayed first when tag keys are set for resources. When tag values are set, only the value agreed for the tag key in the effective policy can be selected, and all tag values cannot be selected. This includes creating new resources or editing existing resources. |
Apakah halaman ini membantu?
Anda juga dapat Menghubungi Penjualan atau Mengirimkan Tiket untuk meminta bantuan.
masukan