AliyunServiceRolePolicyForSFMAccessACK 是专用于服务关联角色的授权策略,会在创建服务关联角色 AliyunServiceRoleForSFMAccessACK 时自动授权,以允许服务关联角色代您访问其他云服务。本策略由对应的阿里云服务按需更新,请勿将本策略授权给服务关联角色之外的 RAM 身份使用。
策略详情
类型:系统策略
创建时间:2026-01-27 11:11:47
更新时间:2026-01-27 11:11:47
当前版本:v1
策略内容
{
"Version": "1",
"Statement": [
{
"Effect": "Allow",
"Action": [
"cs:CheckControlPlaneLogEnable",
"cs:CheckServiceRole",
"cs:DeployPolicyInstance",
"cs:DescribeClusterEvents",
"cs:DescribeClusterLogs",
"cs:DescribeClusterNodePoolDetail",
"cs:DescribeClusterNodePools",
"cs:DescribeClusterNodes",
"cs:DescribeClusterResources",
"cs:DescribeKubernetesVersionMetadata",
"cs:DescribeSubaccountK8sClusterUserConfig",
"cs:DescribeTrigger",
"cs:DescribeUserClusterNamespaces",
"cs:DescribeUserQuota",
"cs:GetClusterAddonInstance",
"cs:GetKubernetesTrigger",
"cs:GetUserPermissions",
"cs:ListClusterKubeconfigStates",
"cs:AttachInstancesToNodePool",
"cs:CreateCluster",
"cs:CreateClusterNodePool",
"cs:CreateKubernetesTrigger",
"cs:CreateTrigger",
"cs:ListUserKubeConfigStates",
"cs:ModifyCluster",
"cs:ModifyClusterAddon",
"cs:ModifyClusterNodePool",
"cs:OpenAckService",
"cs:DescribeClustersForRegion",
"cs:ListClusterAddonInstanceResources"
],
"Resource": "*"
},
{
"Action": "ram:DeleteServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "ack-access.sfm.aliyuncs.com"
}
}
}
]
}相关文档
该文章对您有帮助吗?