tencent cloud

All product documents
TDMQ for Apache Pulsar
Granting Sub-Account Access Permissions
Last updated: 2024-08-19 16:39:56
Granting Sub-Account Access Permissions
Last updated: 2024-08-19 16:39:56

Basic Concepts of CAM

The root account authorizes sub-accounts by binding policies, which can be precisely set at the [API, resource, user/user group, allow/deny, condition] dimension.

Account System

Root account: Owns and has unrestricted access to all Tencent Cloud resources.
Sub-account: Includes sub-users and collaborators.
Sub-user: Created by the main account and completely belongs to the root account that created the Sub-user.
Collaborator: A user with a main account identity added as a collaborator to the current root account, becoming one of its sub-accounts and able to switch back to the root account identity
Identity credentials: Includes log-in credentials and access certificates. Log-in credentials refer to a user’s log-in name and password. Access certificates refer to Tencent Cloud API keys (SecretId and SecretKey).

Resource and Permission

Resource: An object being operated in Tencent Cloud services, such as a CVM instance, a COS bucket, or a VPC instance
Permission: An authorization to allow or disallow some users to perform certain operations. By default, a root account has full access to all the resources under the account, while a sub-account does not have access to any resources under the root account.
Policy: A syntax rule that defines and describes one or more permissions. The root account performs authorization by associating policies with users/user groups.

Sub-Account Using Pulsar

To ensure that the sub-account can successfully use Pulsar, the root account needs to authorize the sub-account.
Root account logs in to CAM Console, finds the corresponding sub-account in the sub-account list, and clicks the Authorize in the operation column.
Pulsar offers two preset policies for sub-accounts: QcloudTDMQReadOnlyAccess and QcloudTDMQFullAccess. The former can only view related information in the console, while the latter can perform read-write operations in the product console.

In addition to the above preset policies, for ease of use, the root account needs to grant the sub-accounts appropriate permissions to call other cloud services based on actual needs. The use of Pulsar involves the following API permissions of various cloud services:
Tencent Cloud Services
API Name
API Function
Corresponding Role in Pulsar
TCOP (Monitor)
GetMonitorData
Query metric monitoring data.
View the corresponding monitoring metrics displayed in the console.
TCOP (Monitor)
DescribeDashboardMetricData
Query metric monitoring data.
View the corresponding monitoring metrics displayed in the console.
Resource Tag (Tags)
DescribeResourceTagsByResourceIds
Query resource tag.
View cluster resource tags.
To grant the sub-account the above permissions, for the root account, you need to go to the CAM Console on the Policies page, and perform the Create Custom Policy operation. Click Create by****Policy Syntax for creation, then select Blank Template, and enter the following policy syntax:
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"monitor:GetMonitorData",
"monitor:DescribeDashboardMetricData",
"tag:DescribeResourceTagsByResourceIds"
],
"resource": [
"*"
]
}
]
}

After the policy is created, associate the newly created policy with the sub-account as shown below:



Was this page helpful?
You can also Contact Sales or Submit a Ticket for help.
Yes
No

Feedback

Contact Us

Contact our sales team or business advisors to help your business.

Technical Support

Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

7x24 Phone Support
Hong Kong, China
+852 800 906 020 (Toll Free)
United States
+1 844 606 0804 (Toll Free)
United Kingdom
+44 808 196 4551 (Toll Free)
Canada
+1 888 605 7930 (Toll Free)
Australia
+61 1300 986 386 (Toll Free)
EdgeOne hotline
+852 300 80699
More local hotlines coming soon