Product | Role Name | Role Types | Role Entity |
---|---|---|---|
Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInCertlist | Service-Related Roles | certlist.teo.cloud.tencent.com |
Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInUpstreamgw | Service-Related Roles | upstreamgw.teo.cloud.tencent.com |
Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInDnspodaccessEO | Service-Related Roles | DnspodaccesEO.TEO.cloud.tencent.com |
Tencent Cloud EdgeOne | TEO_QCSLinkedRoleInRealTimeLogCLS | Service-Related Roles | realtimelogcls.teo.cloud.tencent.com |
Use Cases: The current role is the TEO service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"resource": [
"*"
],
"action": [
"ssl:DescribeCertificate",
"ssl:DescribeCertificateDetail",
"ssl:DescribeCertificates",
"ssl:DownloadCertificate",
"ssl:ModifyCertificateAlias",
"ssl:UploadCertificate"
]
}
]
}
Use Cases: The current role is the teo service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"statement": [
{
"action": [
"vpc:DescribeVpcs",
"vpc:DescribeSubnets"
],
"effect": "allow",
"resource": [
"*"
]
}
],
"version": "2.0"
}
Use Cases: The current role is the TEO service linked role, which will query the status of the domain name you have connected to the DNSPod product and related resolution records within the scope of the associated policy, and help you quickly complete the resolution modification in the scenario of one-click resolution modification, which will accelerate the service switch to EO.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"dnspod:CreateRecord",
"dnspod:ModifyRecordStatus",
"dnspod:DescribeRecordList",
"dnspod:ModifyRecord",
"dnspod:DescribeDomain"
],
"resource": "*"
}
]
}
Use Cases: The current role is the TEO service linked role, which will access your other service resources within the scope of the permissions of the associated policy.
Authorization Polices
{
"version": "2.0",
"statement": [
{
"action": [
"cls:pushLog",
"cls:searchLog",
"cls:listLogset",
"cls:getLogset",
"cls:listTopic",
"cls:getTopic",
"cls:createTopic",
"cls:modifyTopic",
"cls:deleteTopic",
"cls:createLogset",
"cls:modifyLogset",
"cls:deleteLogset",
"cls:downloadLog",
"cls:getIndex",
"cls:modifyIndex",
"cls:CreateIndex"
],
"resource": "*",
"effect": "allow"
}
]
}
Was this page helpful?