tencent cloud

Tencent Cloud Observability Platform

Release Notes and Announcements
Release Notes
Product Introduction
Overview
Strengths
Basic Features
Basic Concepts
Use Cases
Use Limits
Purchase Guide
Tencent Cloud Product Monitoring
Application Performance Management
Mobile App Performance Monitoring
Real User Monitoring
Cloud Automated Testing
Prometheus Monitoring
Grafana
EventBridge
PTS
Quick Start
Monitoring Overview
Instance Group
Tencent Cloud Product Monitoring
Application Performance Management
Real User Monitoring
Cloud Automated Testing
Performance Testing Service
Prometheus Getting Started
Grafana
Dashboard Creation
EventBridge
Alarm Service
Cloud Product Monitoring
Tencent Cloud Service Metrics
Operation Guide
CVM Agents
Cloud Product Monitoring Integration with Grafana
Troubleshooting
Practical Tutorial
Application Performance Management
Product Introduction
Access Guide
Operation Guide
Practical Tutorial
Parameter Information
FAQs
Mobile App Performance Monitoring
Overview
Operation Guide
Access Guide
Practical Tutorial
Tencent Cloud Real User Monitoring
Product Introduction
Operation Guide
Connection Guide
FAQs
Cloud Automated Testing
Product Introduction
Operation Guide
FAQs
Performance Testing Service
Overview
Operation Guide
Practice Tutorial
JavaScript API List
FAQs
Prometheus Monitoring
Product Introduction
Access Guide
Operation Guide
Practical Tutorial
Terraform
FAQs
Grafana
Product Introduction
Operation Guide
Guide on Grafana Common Features
FAQs
Dashboard
Overview
Operation Guide
Alarm Management
Console Operation Guide
Troubleshooting
FAQs
EventBridge
Product Introduction
Operation Guide
Practical Tutorial
FAQs
Report Management
FAQs
General
Alarm Service
Concepts
Monitoring Charts
CVM Agents
Dynamic Alarm Threshold
CM Connection to Grafana
Documentation Guide
Related Agreements
Application Performance Management Service Level Agreement
APM Privacy Policy
APM Data Processing And Security Agreement
RUM Service Level Agreement
Mobile Performance Monitoring Service Level Agreement
Cloud Automated Testing Service Level Agreement
Prometheus Service Level Agreement
TCMG Service Level Agreements
PTS Service Level Agreement
PTS Use Limits
Cloud Monitor Service Level Agreement
API Documentation
History
Introduction
API Category
Making API Requests
Monitoring Data Query APIs
Alarm APIs
Legacy Alert APIs
Notification Template APIs
TMP APIs
Grafana Service APIs
Event Center APIs
TencentCloud Managed Service for Prometheus APIs
Monitoring APIs
Data Types
Error Codes
Glossary

Overview

PDF
フォーカスモード
フォントサイズ
最終更新日: 2025-03-10 22:14:23
If you use the performance testing service in Tencent Cloud, which is managed by different people but shares your cloud account key, the following issues may arise:
The risk of your key being exposed is high since multiple users are sharing it.
You cannot restrict others' access permissions, which can easily lead to accidental operations causing security risks.
At this point, you can address the above issues by using sub-accounts to enable different people to manage different services. By default, sub-accounts do not have permission to use the performance testing service. Therefore, you need to create policies to grant sub-accounts the permissions they need to access the required resources.

Introduction

Cloud Access Management (CAM) is a set of web services provided by Tencent Cloud. It is mainly used to help customers securely manage access permissions to resources under Tencent Cloud accounts. With CAM, you can create, manage, and terminate users (groups), and control who can use which Tencent Cloud resources through identity and policy management.
When using CAM, you can associate a policy with a user or a group of users. The policy can authorize or deny users the ability to use specified resources to complete specific tasks. For more basic information on CAM policies, see Policy Syntax. For more information on using CAM policies, see Policies.

Authorization Methods

PTS supports two authorization methods: resource-level authorization and tag-based authorization. Here is a detailed explanation of each method:
Resource-level authorization: You can grant sub-accounts management permissions for individual resources through policy syntax or default policies. For more information, see Policy Syntax and Policy Granting.
Tag-based authorization: You can grant sub-accounts management permissions for resources associated with specific tags by tagging the resources accordingly. For more information, see Tag Overview.
Note:
If you do not need to conduct cloud access management on performance testing service-related resources for sub-accounts, you can skip this section. Skipping these parts will not affect your understanding and use of the rest of the document.


ヘルプとサポート

この記事はお役に立ちましたか?

フィードバック