tencent cloud

Feedback

Authorizing Sub-account Read-only Access to CVM-related Resources

Last updated: 2024-01-23 18:02:53
The enterprise account, CompanyExample (ownerUin: 12345678), has a sub-account, Developer, that requires query permission for CVM instances and related resources (VPC, CLB) for the CVM service under the CompanyExample enterprise account. The sub-account is not allowed to create, delete, or start up/shut down CVM instances.
Solution A:
The enterprise account, CompanyExample, associates the Developer sub-account with the preset policy QcloudCVMReadOnlyAccess. To learn how to associate a policy with a user account, see Authorization Management.
Solution B:
Step 1: create the following policy by using policy syntax.
{
"version": "2.0",
"statement": [
{
"action": [
"cvm:Describe*",
"cvm:Inquiry*"
],
"resource": "*",
"effect": "allow"
},
{
"action": [
"vpc:Describe*",
"vpc:Inquiry*",
"vpc:Get*"
],
"resource": "*",
"effect": "allow"
},
{
"action": [
"clb:Describe*"
],
"resource": "*",
"effect": "allow"
},
{
"effect": "allow",
"action": "monitor:*",
"resource": "*"
}
]
}
Step 2: associate the sub-account with the policy. To learn how to associate a policy with a user account, see Authorization Management.
Contact Us

Contact our sales team or business advisors to help your business.

Technical Support

Open a ticket if you're looking for further assistance. Our Ticket is 7x24 avaliable.

7x24 Phone Support