当子用户通过RDS Open API进行资源访问时,RDS后台向RAM进行权限检查,以确保调用者拥有响应权限。 每个不同的RDS API会根据涉及到的资源以及API的语义来确定需要检查哪些资源的权限。具体地,每个API的鉴权规则见下表
Action | 鉴权规则 |
CreateDBInstance | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DeleteDBInstance | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeDBInstances | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
SwitchDBInstanceNetType | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
ModifyDBInstanceDescription | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
ModifyDBInstanceMaintainTime | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
PurgeDBInstanceLog | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DeleteDatabase | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
ModifyDBDescription | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeFilesForSQLServer | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeImportsForSQLServer | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
CancelImport | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
ResetAccountPassword | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
RevokeAccountPrivilege | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DeleteAccount | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
CreateBackup | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
CreateTempDBInstance | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
ModifyBackupPolicy | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeDBInstancePerformance | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeSlowLogRecords | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeBinlogFiles | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeSQLLogRecords | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeOptimizeAdviceOnMissPK | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeOptimizeAdviceOnMissIndex | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeParameters | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
CreatePrepaidDBInstanceForChannel | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
ModifyPrepaidDBInstanceSpec | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
CreatePostpaidDBInstanceForChannel | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
ModifyPostpaidDBInstanceSpec | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeDBInstanceAttribute | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
RestartDBInstance | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
ModifySecurityIps | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
UpgradeDBInstanceEngineVersion | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
CreateDatabase | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeDatabases | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
CreateUploadPathForSQLServer | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
ImportDataForSQLServer | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
ImportDataBaseBetweenInstances | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
CreateAccount | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
GrantAccountPrivilege | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeAccounts | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
ModifyAccountDescription | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeBackups | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeBackupPolicy | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeResourceUsage | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeSlowLogs | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeErrorLogs | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeSQLLogReports | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeOptimizeAdviceOnStorage | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeOptimizeAdviceOnExcessIndex | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
DescribeOptimizeAdviceByDBA | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
ModifyeParameter | acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid |
版权声明:本文内容由阿里云实名注册用户自发贡献,版权归原作者所有,阿里云开发者社区不拥有其著作权,亦不承担相应法律责任。具体规则请查看《阿里云开发者社区用户服务协议》和《阿里云开发者社区知识产权保护指引》。如果您发现本社区中有涉嫌抄袭的内容,填写侵权投诉表单进行举报,一经查实,本社区将立刻删除涉嫌侵权内容。
在阿里云的RDS服务中,当子用户通过Open API访问资源时,确实需要遵循细粒度的权限控制规则,以确保操作的安全性和合规性。上述表格展示了一系列RDS API操作及其对应的权限检查规则。这些规则基于RAM(Resource Access Management)服务来实施,确保每个API调用者具有执行特定操作所需的权限。
规则格式如acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid
,解释如下:
acs:
是阿里云服务的前缀。rds:
指明该权限是针对RDS服务的。$regionid:
表示操作涉及的区域ID,例如cn-hangzhou
。$accountid:
是阿里云账户的ID,表明权限属于哪个账户。dbinstance/$dbinstanceid
指定权限作用于具体的数据库实例,其中$dbinstanceid
是数据库实例的唯一标识。这意味着,如果一个子用户想要执行如CreateDBInstance
这样的操作,RAM会检查该子用户是否拥有形如acs:rds:$regionid:$accountid:dbinstance/$dbinstanceid
的权限,确保其有权限在指定区域和账户下的特定数据库实例上创建新的数据库实例。
对于开发者或系统管理员来说,了解这些鉴权规则至关重要,因为这直接关系到如何为不同角色的子用户正确配置访问策略,既保证系统的安全性,又不会过度限制必要的操作权限。通过RAM,可以实现对子用户的精细化权限管理,比如只允许某个子用户查看(Describe)数据库实例,而不允许其修改(Modify)或删除(Delete)实例,从而达到权限最小化原则,增强系统的安全性。