AliyunServiceRolePolicyForMqttTunnel 是专用于服务关联角色的授权策略,会在创建服务关联角色 AliyunServiceRoleForMqttTunnel 时自动授权,以允许服务关联角色代您访问其他云服务。本策略由对应的阿里云服务按需更新,请勿将本策略授权给服务关联角色之外的 RAM 身份使用。
策略详情
类型:系统策略
创建时间:2025-10-31 17:55:46
更新时间:2025-10-31 17:55:46
当前版本:v1
策略内容
{
"Version": "1",
"Statement": [
{
"Action": [
"privatelink:UpdateVpcEndpointAttribute",
"privatelink:DeleteVpcEndpoint",
"privatelink:CreateVpcEndpoint",
"privatelink:ListVpcEndpoints",
"privatelink:GetVpcEndpointAttribute",
"privatelink:ListVpcEndpointServicesByEndUser",
"privatelink:ListVpcEndpointZones",
"privatelink:ListVpcEndpointSecurityGroups",
"privatelink:AddZoneToVpcEndpoint",
"privatelink:RemoveZoneFromVpcEndpoint"
],
"Resource": "acs:privatelink:*:*:*",
"Effect": "Allow"
},
{
"Action": [
"privatelink:CreateVpcEndpoint",
"vpc:DescribeVSwitches",
"ecs:CreateSecurityGroup"
],
"Resource": "acs:vpc:*:*:*",
"Effect": "Allow"
},
{
"Action": [
"privatelink:CreateVpcEndpoint",
"ecs:DescribeSecurityGroupAttribute",
"ecs:DescribeSecurityGroups",
"ecs:CreateSecurityGroup",
"ecs:AuthorizeSecurityGroup",
"ecs:DeleteSecurityGroup",
"ecs:RevokeSecurityGroup"
],
"Resource": "acs:ecs:*:*:*",
"Effect": "Allow"
},
{
"Action": "ram:DeleteServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "ep-tunnel.mqtt.aliyuncs.com"
}
}
}
]
}相关文档
该文章对您有帮助吗?