Release Notes
Announcements
QcloudCFSFullAccess policy. Below is the policy syntax for using the preset QcloudCFSFullAccess policy to grant collaborators or sub-users full read/write access to all CFS resources and VPC/subnet query permission:{"version": "2.0","statement": [{"action":["cfs:*"],"resource": "*",“effect": "allow"},{"action":["vpc:DescribeVpcEx","vpc:DescribeSubnetEx"],"resource": "*",“effect": "allow"}]}
QcloudCFSReadOnlyAccess policy. Below is the policy syntax for using the preset QcloudCFSReadOnlyAccess policy to grant collaborators or sub-users read-only access to all CFS resources and VPC/subnet query permission:{"version": "2.0","statement": [{"action":["cfs:Describe*"],"resource": "*",“effect": "allow"},{"action":["vpc:DescribeVpcEx","vpc:DescribeSubnetEx"],"resource": "*",“effect": "allow"}]}
Parameter | Options and Effect |
Effect | Allow or Reject |
Sevice | Select CFS here |
Action | All CFS-supported actions |
Resource | Specify the resources in six-segment format: For all resources in CFS, enter *.For all resources in a specified region, use the format qcs::cfs:ap-guangzhou::*.For all resources in all regions under a specified user account, use the format qcs::cfs::uin/27700000:*.For all file systems in a specified region under a specified user account, use the format qcs::cfs:ap-guangzhou:uin/27700000:filesystem/*.For file systems in a specified user group under a specified user account, use the format qcs::cfs::uin/27700000:pgroup/pgroup-doxpcqh.Note: The UIN in a policy must be a root account UIN. The file systems or permission group resources must belong to the root account. If a policy generator is used: Service: You can only enter "cfs". Region: Select a region from the drop-down list box as needed. Account: The current account information will be auto filled. If it is not filled, you can enter uin/xxxxxxx, where xxxxxxx is the UIN.Resource prefix: You can enter filesystem, snap, or resource, which represents file system instances, snapshot instances, or storage resource unit instances, respectively.Resource: Enter a resource ID, such as cfs-xxxxx. |
Condition |
API Category | API Name | API Description | Permission Type | Note |
Service APIs | SignUpCfsService | Activates the CFS service | Write | You do not need to specify resources when authorizing this API. |
| DescribeCfsServiceStatus | Queries whether the CFS service is activated | Read | You do not need to specify resources when authorizing this API. |
File system APIs | DescribeCfsFileSystems | Lists file systems | Read | You need to specify the resources as * when authorizing this API. |
| CreateCfsFileSystem | Creates a file system | Write | You do not need to specify file system resources when authorizing this API. |
| UpdateCfsFileSystemName | Updates the file system name | Write | You need to specify file system resources when authorizing this API. |
| UpdateCfsFileSystemPGroup | Updates the permission group for a file system | Write | You need to specify file system resources when authorizing this API. |
| UpdateCfsFileSystemSizeLimit | Updates the file system quota | Write | You need to specify file system resources when authorizing this API. |
| DeleteCfsFileSystem | Deletes a file system | Write | You need to specify file system resources when authorizing this API. |
| DescribeMountTargets | Queries mount targets | Read | You need to specify file system resources when authorizing this API. |
| AddMountTarget | Creates a mount target | Write | You need to specify file system resources when authorizing this API. |
| DeleteMountTarget | Deletes a mount target | Write | You need to specify file system resources when authorizing this API. |
Permission group APIs | DescribeCfsPGroups | Lists permission groups | Read | You need to specify the resources as * when authorizing this API. |
| CreateCfsPGroup | Creates a permission group | Write | You do not need to specify resources when authorizing this API. |
| UpdateCfsPGroup | Updates the information of a permission group | Write | You need to specify permission group resources when authorizing this API. |
| DeleteCfsPGroup | Deletes a permission group | Write | You need to specify permission group resources when authorizing this API. |
| DescribeCfsRules | Lists permission group rules | Read | You need to specify permission group resources when authorizing this API. |
| CreateCfsRule | Creates a permission group rule | Write | You need to specify permission group resources when authorizing this API. |
| UpdateCfsRule | Updates the information of a permission group rule | Write | You need to specify permission group resources when authorizing this API. |
| DeleteCfsRule | Deletes a permission group rule | Write | You need to specify permission group resources when authorizing this API. |
Key APIs | DescribeKmsKeys | Queries KMS keys | Read | You need to specify the resources as * when authorizing this API. |
QcloudCFSReadOnlyAccess policy statement to learn how to write the policy.{"version": "2.0","statement": [{"effect": "Effect","action":["Action"],"resource": "Resource"}]}
{"version": "2.0","statement": [{"effect": "deny","action":["name/cfs:DeleteCfsFileSystem","name/cfs:UpdateCfsFileSystemSizeLimit"],"resource": ["qcs::cfs::uin/2779643970:filesystem/cfs-11111111","qcs::cfs::uin/2779643970:filesystem/cfs-22222222","qcs::cfs::uin/2779643970:filesystem/cfs-33333333"]}]}
QcloudCFSFullAccess, QcloudCFSReadOnlyAccess, or a custom policy and click Bind User/Group in the Operation column. Then, locate and select the user or user group that needs to be authorized and click OK.Esta página foi útil?
Você também pode entrar em contato com a Equipe de vendas ou Enviar um tíquete em caso de ajuda.
comentários