Product | Role Name | Role Types | Role Entity |
---|---|---|---|
Database Management Console | DMC_QCSLinkedRoleInWorkOrderReview | Service-Related Roles | dmc.cloud.tencent.com |
Use Cases: The current role is the DMC service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"statement": [
{
"action": [
"cam:ListUsersForGroup",
"cam:ListGroupsForUser",
"cam:DescribeSubAccounts",
"cam:ListGroups",
"cdb:DescribeAccounts",
"dcdb:DescribeAccounts",
"cynosdb:DescribeAccounts",
"mongodb:DescribeAccountUsers",
"mariadb:DescribeAccounts",
"postgres:DescribeAccounts",
"sqlserver:DescribeAccounts",
"sts:AssumeRole",
"cam:ListAttachedUserAllPolicies",
"cam:GetGroup",
"cam:ListUsers",
"cvm:DescribeInstances",
"vdb:DescribeInstances",
"vdb:DescribeInstanceProperties",
"vdb:DescribeEmbedding",
"redis:DescribeInstances",
"keewidb:DescribeInstances",
"mongodb:DescribeDBInstances",
"ctsdb:DescribeDBInstances",
"tdach:DescribeInstances",
"cdb:DescribeInstances",
"sqlserver:DescribeDBInstances",
"mariadb:DescribeDBInstances",
"postgres:DescribeDBInstanceAttribute",
"postgres:DescribeDBInstances",
"dcdb:DescribeDCDBInstanceDetail",
"tdmysql:DescribeDBInstanceDetail",
"tbase:DescribeInstanceDetail",
"vpc:DescribeDirectConnectGateway",
"vpc:DescribeVpnGateways",
"cam:GetAccountSummary",
"cam:GetUserPermissionBoundary",
"cam:ListCollaborators",
"cam:GetUser",
"cam:GetPolicy",
"cam:ListAttachedGroupPolicies",
"cam:ListAttachedUserPolicies",
"cam:ListEntitiesForPolicy",
"cam:ListPolicies",
"cam:GetRole",
"cam:GetRolePermissionBoundary",
"cam:ListAttachedRolePolicies"
],
"effect": "allow",
"resource": "*"
}
],
"version": "2.0"
}
Was this page helpful?