tencent cloud

Cloud Access Management

Product Introduction
CAM Overview
Features
Scenarios
Basic Concepts
Use Limits
User Types
Purchase Guide
Getting Started
Creating Admin User
Creating and Authorizing Sub-account
Logging In to Console with Sub-account
User Guide
Overview
Users
Access Key
User Groups
Role
Identity Provider
Policies
Permissions Boundary
Troubleshooting
Downloading Security Analysis Report
CAM-Enabled Role
Overview
Compute
Container
Microservice
Essential Storage Service
Data Process and Analysis
Data Migration
Relational Database
Enterprise Distributed DBMS
NoSQL Database
Database SaaS Tool
Database SaaS Service
Networking
CDN and Acceleration
Network Security
Data Security
Application Security
Domains & Websites
Big Data
Middleware
Interactive Video Services
Real-Time Interaction
Media On-Demand
Media Process Services
Media Process
Cloud Real-time Rendering
Game Services
Cloud Resource Management
Management and Audit Tools
Developer Tools
Monitor and Operation
More
CAM-Enabled API
Overview
Compute
Edge Computing
Container
Distributed cloud
Microservice
Serverless
Essential Storage Service
Data Process and Analysis
Data Migration
Relational Database
Enterprise Distributed DBMS
NoSQL Database
Database SaaS Tool
Networking
CDN and Acceleration
Network Security
Endpoint Security
Data Security
Business Security
Application Security
Domains & Websites
Office Collaboration
Big Data
Voice Technology
Image Creation
Tencent Big Model
AI Platform Service
Natural Language Processing
Optical Character Recognition
Middleware
Communication
Interactive Video Services
Real-Time Interaction
Stream Services
Media On-Demand
Media Process Services
Media Process
Cloud Real-time Rendering
Game Services
Education Sevices
Medical Services
Cloud Resource Management
Management and Audit Tools
Developer Tools
Monitor and Operation
More
Use Cases
Security Practical Tutorial
Multi-Identity Personnel Permission Management
Authorizing Certain Operations by Tag
Supporting Isolated Resource Access for Employees
Enterprise Multi-Account Permissions Management
Reviewing Employee Operation Records on Tencent Cloud
Implementing Attribute-Based Access Control for Employee Resource Permissions Management
During tag-based authentication, only tag key matching is supported
Business Use Cases
TencentDB for MySQL
CLB
CMQ
COS
CVM
VPC
VOD
Others
API Documentation
History
Introduction
API Category
Making API Requests
User APIs
Policy APIs
Role APIs
Identity Provider APIs
Data Types
Error Codes
FAQs
Role
Key
Others
CAM Users and Permissions
Glossary
문서Cloud Access ManagementBusiness Use CasesOthersAuthorizing Different Sub-accounts Separate Permissions to Manage Tencent Cloud Resources

Authorizing Different Sub-accounts Separate Permissions to Manage Tencent Cloud Resources

PDF
포커스 모드
폰트 크기
마지막 업데이트 시간: 2024-01-23 18:02:53

Introduction

If you have purchased different Tencent Cloud resources, you can use tags to group the resources for easy management. You can grant different sub-accounts management permissions by tags so that they can manage resources separately. This document takes a use case as an example to describe how to grant a sub-account the permission to manage separate Tencent Cloud resources by using tags.

Prerequisites

Suppose that:
The enterprise account CompanyExample has two sub-accounts DevA and DevB.
The ID of sub-account DevA is 12345.
The ID of sub-account DevB is 67890.
The enterprise account CompanyExample has two CVM instances whose IDs are ins-1 and ins-2 respectively.
The enterprise account CompanyExample has two tag keys (test1 and test2) and two tag values (test1 and test2).

Directions

Tagging CVM instances

You can add tag keys and tag values to CVM instances ins-1 and ins-2 with the following steps to manage resources by tag.

Adding test1 tag key and test1 tag value to CVM instance ins-1

1. Log in to the Tag Console, set the following filters to filter out the target CVM instance, and click Query Resource.
Resource Type: type of the resource to be queried. Only products supporting tags can be queried. For more information, please see Products That Support Tags. In this example, select CVM instance.
Region: region of the resource to be queried. In this example, select Beijing.
2. Select the target CVM instance from the filtered results. In this example, we select CVM instance ins-1.
3. Click Edit Tag Value.
4. In the pop-up window, select the tag key and enter the tag value. In this example, the tag key and value are both test1.
5. Click OK to add test1 tag key and test1 tag value to CVM instance ins-1.

Adding test2 tag key and test2 tag value to CVM instance ins-2

1. Log in to the Tag Console, set the following filters to filter out the target CVM instance, and click Query Resource.
Resource Type: type of the resource to be queried. Only products supporting tags can be queried. For more information, please see Products That Support Tags. In this example, we select CVM instance.
Region: region of the resource to be queried. In this example, we select Beijing.
2. Select the target CVM instance from the filtered results. In this example, we select CVM instance ins-2.
3. Click Edit Tag Value.
4. In the pop-up window, select the tag key and enter the tag value. In this example, the tag key and value are both test2.
5. Click OK to add test2 tag key and test2 tag value to CVM instance ins-2.

Authorizing user by tag

You can grant sub-account DevA management permission for tag key test1 and tag value test1 and grant sub-account DevB tmanagement permission for tag key test2 and tag value test2. They will then be able to manage tagged resources accordingly.

Granting sub-account DevA management permission for tag key test1 and tag value test1

1. Log in to the CAM Console and click Create Custom Policy in the top-left corner.
2. In the creation method selection window that pops up, click Authorize by Tag to enter the authorization by tag page.
3. Select the following information and click Next.
Authorize User/User Group: check the user/user group to be authorized. In this example, 12345 is selected, which is the ID of sub-account DevA.
Tag Key: select the tag key to be authorized. In this example, we select tag key test1.
Tag Value: select the tag value to be authorized. In this example, we select tag value test1.
Resources: the management permission is granted by default.
4. On the verification page, enter the policy name, verify the policy content, and click Done to grant sub-account DevA management permission for tag key test1 and tag value test1.

Granting sub-account DevB management permission for tag key test2 and tag value test2

1. Log in to the CAM Console and click Create Custom Policy in the top-left corner.
2. In the creation method selection window that pops up, click Authorize by Tag to enter the authorization by tag page.
3. Select the following information and click Next.
Authorize User/User Group: check the user/user group to be authorized. In this example, 67890 is selected, which is the ID of sub-account DevB.
Tag Key: select the tag key to be authorized. In this example, we select tag key test2.
Tag Value: select the tag value to be authorized. In this example, we select tag value test2.
Resources: the management permission is granted by default.
4. On the verification page, enter the policy name, verify the policy content, and click Done to grant sub-account DevB management permission for tag key test2 and tag value test2.

Managing new resources

Follow the instructions in Tagging CVM Instances to add tag keys and tag values to manage new resources.

도움말 및 지원

문제 해결에 도움이 되었나요?

피드백