AliyunServiceRolePolicyForRDSGAD 是专用于服务关联角色的授权策略,会在创建服务关联角色 AliyunServiceRoleForRDSGAD 时自动授权,以允许服务关联角色代您访问其他云服务。本策略由对应的阿里云服务按需更新,请勿将本策略授权给服务关联角色之外的 RAM 身份使用。
策略详情
类型:系统策略
创建时间:2021-08-20 17:47:44
更新时间:2021-08-20 17:47:44
当前版本:v1
策略内容
{
"Version": "1",
"Statement": [
{
"Action": [
"rds:DescribeAccounts",
"rds:DescribeAvailableClasses",
"rds:DescribeAvailableResource",
"rds:DescribeAvailableZones",
"rds:DescribeDatabases",
"rds:DescribeDBInstanceAttribute",
"rds:DescribeDBInstanceDetail",
"rds:DescribeRegions"
],
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"rds:ResourceTag/gadinstance": "yes"
}
}
},
{
"Action": [
"rds:CreateDBInstance"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"dts:ConfigureDtsJob",
"dts:StopDtsJob",
"dts:StartDtsJob",
"dts:ModifyDtsJob",
"dts:DeleteDtsJob",
"dts:DescribeDtsJobDetail",
"dts:DescribeDtsJobs",
"dts:InitDtsRdsInstance",
"dts:UntagResources",
"dts:ListTagResources"
],
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"acs:ResourceTag/gadinstance": "yes"
}
}
},
{
"Action": [
"dts:CreateDtsInstance",
"dts:TagResources"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": "ram:DeleteServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "gad.rds.aliyuncs.com"
}
}
}
]
}
相关文档
文档内容是否对您有帮助?