文档

AliyunServiceRolePolicyForMongoDB

更新时间:

AliyunServiceRolePolicyForMongoDB 是专用于服务关联角色的授权策略,会在创建服务关联角色 AliyunServiceRoleForMongoDB 时自动授权,以允许服务关联角色代您访问其他云服务。本策略由对应的阿里云服务按需更新,请勿将本策略授权给服务关联角色之外的 RAM 身份使用。

策略详情

  • 类型:系统策略

  • 创建时间:2020-10-12 18:06:05

  • 更新时间:2020-10-12 18:06:05

  • 当前版本:v1

策略内容

{
  "Version": "1",
  "Statement": [
    {
      "Effect": "Allow",
      "Resource": "acs:log:*:*:project/nosql-*",
      "Action": [
        "log:GetLogstoreLogs",
        "log:ListLogStores",
        "log:GetLogStore",
        "log:GetIndex",
        "log:GetLogstoreHistogram",
        "log:GetConfig",
        "log:ListConfig",
        "log:GetDashboard",
        "log:ListDashboard",
        "log:CreateLogStore",
        "log:CreateIndex",
        "log:UpdateIndex",
        "log:CreateDashboard",
        "log:UpdateDashboard",
        "log:CreateSavedSearch",
        "log:UpdateSavedSearch",
        "log:CreateProject"
      ]
    },
    {
      "Action": [
        "kms:ListKeys",
        "kms:ListKeyVersions",
        "kms:ListAliases",
        "kms:ListAliasesByKeyId",
        "kms:ListResourceTags",
        "kms:DescribeKey",
        "kms:TagResource",
        "kms:UntagResource"
      ],
      "Resource": "acs:kms:*:*:*",
      "Effect": "Allow"
    },
    {
      "Action": [
        "kms:Encrypt",
        "kms:Decrypt",
        "kms:GenerateDataKey",
        "kms:CreateAlias"
      ],
      "Resource": "acs:kms:*:*:*",
      "Effect": "Allow",
      "Condition": {
        "StringEqualsIgnoreCase": {
          "kms:tag/acs:rds:instance-encryption": "true"
        }
      }
    },
    {
      "Action": "ram:DeleteServiceLinkedRole",
      "Resource": "*",
      "Effect": "Allow",
      "Condition": {
        "StringEquals": {
          "ram:ServiceName": "mongodb.aliyuncs.com"
        }
      }
    }
  ]
}

相关文档

  • 本页导读 (1)
文档反馈