检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Using IAM to Grant Access to RDS for MariaDB Creating a User and Granting Permissions RDS for MariaDB Custom Policies
Create an IAM user and add it to the user group. Create a user on the IAM console and add the user to the group created in 1. Log in and verify permissions.
The following is an example deny policy: { "Version": "1.1", "Statement": [{ "Action": ["rds:instance:delete"], "Effect": "Deny" }] } Parent topic: Using IAM to Grant Access to RDS for MariaDB
For fine-grained permissions management, create an Identity and Access Management (IAM) user and user group on the IAM console and grant the user specific operation permissions. For details, see Creating a User and Granting Permissions. Go to the Buy DB Instance page.
For details, see Granting IAM Users Under an Account the Access to a Bucket and Resources in the Bucket. Download the backup file. On the OBS Browser+ page, click the bucket that you added.
Parent topic: Using IAM to Grant Access to RDS for MariaDB
IAM users can use RDS resources only after their accounts and passwords are verified. For details, see Creating an IAM User and Logging In.
Access Control RDS controls access through the account/IAM user and security groups. When you create an RDS for MariaDB instance, an account is automatically created. To separate out specific permissions, you can create IAM users and assign permissions to them as needed.
iam:roles:listRoles, and iam:agencies:pass actions.