百度智能云

All Product Document

          Relational Database Service

          Identity and Access Management

          Introductions

          The RDS Identity and Access Management (IAM) refers to the operation privileges assigned by the original user as the master account of the sub-account for assigning relevant products or instances to the sub-account, making possible the granular privilege management. For example, you can assign the front-line operators (like DBA) product- or instance-level RDS OPS privileges, and others (except operators) product- or instance-level RDS viewing privileges.

          The IAM is suitable for the following scenarios:

          • Medium and large-sized enterprises: Grant multiple employees the authorization for management in the enterprise;
          • Technology-based vendors or SAAS platform providers: Perform resource management and access control for proxy customers;
          • Small and medium developers or small-sized enterprises: Add project members or collaborators to perform resource management.

          Create an IAM user

          1. After the primary account user logs in to the account, the user selects the "Identity and Access Management" in the console to enter the user administration page.

          image.png

          1. Click "User Management" in the left Navbar, and click "Create IAM user" on the " IAM user" page.
          2. In the pop-up "New User" dialog box, enter and confirm the "User Name", and then return to the " IAM user Administration List" area to view the created IAM user.

          Configuration policies

          The RDS supports both system policies and user-defined policies to realize product-level and instance-level privilege control of RDS, respectively.

          System Policies

          The system policy is the RDS product-level privilege. The RDS has three system policies, namely, product-level management privilege, product-level OPS privilege, and product-level read-only privilege. The scope of the privilege is as follows:

          Privilege Privilege Scope
          RDS product-level management privilege. RDS Instance's all operation privileges:
          RDS product-level OPS privilege. Includes the privileges for access to and operation of the RDS instances under all master accounts, but excludes the privileges for creating master instances/read-only instances/proxy instances, cloning an instance, changing the configuration, topping-up, tagging, changing the billing mode, and releasing an instance.
          RDS product-level read-only privilege. Includes privileges for viewing the RDS instance lists, and for viewing, monitoring, and logging the instance details, and excludes operation privileges.

          Custom Policies

          The IAM user can add a custom policy to perform instance-level privilege control by clicking "Policy Management >Create Policy". Here, you can add the custom policies in two ways, i.e., "Create by Policy Generator" and "Create by Tag". And, the user can set and modify the policy content according to specific privilege.

          image.png

          • Create by policy generator: after selecting "Create by Policy Generator", the user may carry out privilege configuration by clicking "Add Privilege" on the page.

          image.png

          In the pop-up window, select the service "RDS", and carry out privilege configuration by "Policy Generator" and "Edit Policy File". (1) When selecting "Policy Generator", the user may select privilege effectiveness and instance operation, in addition to adding custom policy by configuring the resource zone. After clicking, the created policy appears in the custom policy list.

          image.png

          (2) When selecting "Edit Policy File", the user may add custom policy by editing the policy file. The policy file, in essence, is a JSON file, and both the system policy and the user-defined policy are mapped into a JSON string of ACL in the end.

          image.png

          With the ACL policy configuration file, users can define a privilege policy very flexibly but need to understand the meaning of ACL strings. For the syntax used in editing ACL privilege policy, see the documentation [Policy Syntax]. You can use the privileges and resources in the file to define the privileges and resources.

          Implications of fields specified in the policy file are as follows:

          Field Data type Description Required Father Node
          accessControlList list The initial part of identity acl is composed of one or multiple groups of acl configuration items, of which, acl configuration item is composed of service+region+effect+permission+resource. Yes No
          +service string Service component influenced by "acl" configuration item, and the RDS is set as "bce:rds"。 Yes accessControlList
          region string Regions influenced by acl configuration item, with value range including "bj", "gz", "su", "hk” and "?". Herein, "bj" denotes the Beijing region," gz" denotes the Guangzhou region, "su" denotes the Suzhou region, "h" denotes Hong Kong region,and"?" denotes all regions. You can write the value within the quotation marks, and use the English punctuation marks. Yes accessControlList
          +effect string Specify if Request, which matches current acl configuration item, can be performed, and the value is "Allow" or "Deny" 。" "Allow" denotes "Yes" and "Deny" denotes "No". Yes accessControlList
          +permission list Privilege influenced by ACL configuration item, and the value is "READ" and asterisk wildcard"?". READ denotes read-only privilege, and "?" denotes OPS privilege. Yes accessControlList
          +resource list Resource influenced by ACL configuration item supports asterisk wildcard"?" and specific instance ID. "?" represents all instances, and multiple instance IDs can be configured, with values written within English quotation marks, and separated by English comma. No accessControlList
          • Create by Tag

          The IAM user can configure policies by "Create by Tab"

          The RDS custom instance-level privilege scope is explained as follows:

          Privilege Privilege Scope
          RDS instance-level management privilege. Includes all operation privileges of the RDS instances (excluding the newly created master instance):
          RDS instance-level OPS privilege. Includes all operation privileges of the selected RDS instance (including correlated read-only and proxy instances), but excludes the privileges for creating master/read-only/proxy instances, cloning instances, changing configuration, topping-up, tagging, changing the billing mode, and releasing instances.
          RDS instance-level read-only privilege. Includes the privileges for viewing, monitoring, and logging the selected RDS instances (including correlated read-only and proxy instances)

          User authorization

          Select "Add Privilege" in the "Operation" column of the corresponding IAM user of "User Management -> IAM user".

          image.png

          In this pop-up window, select "All Policies", "System Policies", or "Custom Policies" for user authorization.

          image.png

          Note: If you modify the privilege of an IAM user without modification of the existing policy rules, you can only delete the existing policy and add a policy. But, you cannot unselect the added privilege policy.

          IAM user login

          After the primary account has authorized the IAM user, the link can be sent to the IAM user. Also, the IAM user can log in to the management console of the primary account through the IAM user login link. And, the IAM user can operate and view the primary account resources based on the authorized policy.

          image.png

          For more information on detailed operations, please see Identity and Access Management.

          Previous
          Security Management
          Next
          RDS-for-PostgreSQL Operation Guide