QcloudCFSFullAccess
policy. Below is the policy syntax for using the preset QcloudCFSFullAccess
policy to grant collaborators or sub-users full read/write access to all CFS resources and VPC/subnet query permission:{"version": "2.0","statement": [{"action":["cfs:*"],"resource": "*",“effect": "allow"},{"action":["vpc:DescribeVpcEx","vpc:DescribeSubnetEx"],"resource": "*",“effect": "allow"}]}
QcloudCFSReadOnlyAccess
policy. Below is the policy syntax for using the preset QcloudCFSReadOnlyAccess
policy to grant collaborators or sub-users read-only access to all CFS resources and VPC/subnet query permission:{"version": "2.0","statement": [{"action":["cfs:Describe*"],"resource": "*",“effect": "allow"},{"action":["vpc:DescribeVpcEx","vpc:DescribeSubnetEx"],"resource": "*",“effect": "allow"}]}
Parameter | Options and Effect |
Effect | Allow or Reject |
Sevice | Select CFS here |
Action | All CFS-supported actions |
Resource | Specify the resources in six-segment format: For all resources in CFS, enter * .For all resources in a specified region, use the format qcs::cfs:ap-guangzhou::* .For all resources in all regions under a specified user account, use the format qcs::cfs::uin/27700000:* .For all file systems in a specified region under a specified user account, use the format qcs::cfs:ap-guangzhou:uin/27700000:filesystem/* .For file systems in a specified user group under a specified user account, use the format qcs::cfs::uin/27700000:pgroup/pgroup-doxpcqh .Note: The UIN in a policy must be a root account UIN. The file systems or permission group resources must belong to the root account. If a policy generator is used: Service: You can only enter "cfs". Region: Select a region from the drop-down list box as needed. Account: The current account information will be auto filled. If it is not filled, you can enter uin/xxxxxxx , where xxxxxxx is the UIN.Resource prefix: You can enter filesystem , snap , or resource , which represents file system instances, snapshot instances, or storage resource unit instances, respectively.Resource: Enter a resource ID, such as cfs-xxxxx . |
Condition |
API Category | API Name | API Description | Permission Type | Note |
Service APIs | SignUpCfsService | Activates the CFS service | Write | You do not need to specify resources when authorizing this API. |
| DescribeCfsServiceStatus | Queries whether the CFS service is activated | Read | You do not need to specify resources when authorizing this API. |
File system APIs | DescribeCfsFileSystems | Lists file systems | Read | You need to specify the resources as * when authorizing this API. |
| CreateCfsFileSystem | Creates a file system | Write | You do not need to specify file system resources when authorizing this API. |
| UpdateCfsFileSystemName | Updates the file system name | Write | You need to specify file system resources when authorizing this API. |
| UpdateCfsFileSystemPGroup | Updates the permission group for a file system | Write | You need to specify file system resources when authorizing this API. |
| UpdateCfsFileSystemSizeLimit | Updates the file system quota | Write | You need to specify file system resources when authorizing this API. |
| DeleteCfsFileSystem | Deletes a file system | Write | You need to specify file system resources when authorizing this API. |
| DescribeMountTargets | Queries mount targets | Read | You need to specify file system resources when authorizing this API. |
| AddMountTarget | Creates a mount target | Write | You need to specify file system resources when authorizing this API. |
| DeleteMountTarget | Deletes a mount target | Write | You need to specify file system resources when authorizing this API. |
Permission group APIs | DescribeCfsPGroups | Lists permission groups | Read | You need to specify the resources as * when authorizing this API. |
| CreateCfsPGroup | Creates a permission group | Write | You do not need to specify resources when authorizing this API. |
| UpdateCfsPGroup | Updates the information of a permission group | Write | You need to specify permission group resources when authorizing this API. |
| DeleteCfsPGroup | Deletes a permission group | Write | You need to specify permission group resources when authorizing this API. |
| DescribeCfsRules | Lists permission group rules | Read | You need to specify permission group resources when authorizing this API. |
| CreateCfsRule | Creates a permission group rule | Write | You need to specify permission group resources when authorizing this API. |
| UpdateCfsRule | Updates the information of a permission group rule | Write | You need to specify permission group resources when authorizing this API. |
| DeleteCfsRule | Deletes a permission group rule | Write | You need to specify permission group resources when authorizing this API. |
Key APIs | DescribeKmsKeys | Queries KMS keys | Read | You need to specify the resources as * when authorizing this API. |
QcloudCFSReadOnlyAccess
policy statement to learn how to write the policy.{"version": "2.0","statement": [{"effect": "Effect","action":["Action"],"resource": "Resource"}]}
{"version": "2.0","statement": [{"effect": "deny","action":["name/cfs:DeleteCfsFileSystem","name/cfs:UpdateCfsFileSystemSizeLimit"],"resource": ["qcs::cfs::uin/2779643970:filesystem/cfs-11111111","qcs::cfs::uin/2779643970:filesystem/cfs-22222222","qcs::cfs::uin/2779643970:filesystem/cfs-33333333"]}]}
QcloudCFSFullAccess
, QcloudCFSReadOnlyAccess
, or a custom policy and click Bind User/Group in the Operation column. Then, locate and select the user or user group that needs to be authorized and click OK.
Was this page helpful?