tencent cloud

TDMQ for CKafka

Release Notes and Announcements
Release Notes
Broker Release Notes
Announcement
Product Introduction
Introduction and Selection of the TDMQ Product Series
What Is TDMQ for CKafka
Strengths
Scenarios
Technology Architecture
Product Series Introduction
Apache Kafka Version Support Description
Comparison with Apache Kafka
High Availability
Use Limits
Regions and AZs
Related Cloud Services
Billing
Billing Overview
Pricing
Billing Example
Changing from Postpaid by Hour to Monthly Subscription
Renewal
Viewing Consumption Details
Overdue Payments
Refund
Getting Started
Guide for Getting Started
Preparations
VPC Network Access
Public Domain Name Access
User Guide
Usage Process Guide
Configuring Account Permission
Creating Instance
Configuring Topic
Connecting Instance
Managing Messages
Managing Consumer Group
Managing Instance
Changing Instance Specification
Configuring Traffic Throttling
Configuring Elastic Scaling Policy
Configuring Advanced Features
Viewing Monitoring Data and Configuring Alarm Rules
Synchronizing Data Using CKafka Connector
Use Cases
Cluster Resource Assessment
Client Practical Tutorial
Log Integration
Open-Source Ecosystem Integration
Replacing Supporting Route (Old)
Migration Guide
Migration Solution Overview
Migrating Cluster Using Open-Source Tool
Troubleshooting
Topics
Clients
Messages
​​API Reference
History
Introduction
API Category
Making API Requests
Other APIs
ACL APIs
Instance APIs
Routing APIs
DataHub APIs
Topic APIs
Data Types
Error Codes
SDK Reference
SDK Overview
Java SDK
Python SDK
Go SDK
PHP SDK
C++ SDK
Node.js SDK
SDK for Connector
Security and Compliance
Permission Management
Network Security
Deletion Protection
Event Record
CloudAudit
FAQs
Instances
Topics
Consumer Groups
Client-Related
Network-Related
Monitoring
Messages
Agreements
CKafka Service Level Agreements
Contact Us
Glossary
문서TDMQ for CKafkaUser GuideConfiguring Account PermissionGranting Tag-Level Permissions to Sub-accounts

Granting Tag-Level Permissions to Sub-accounts

PDF
포커스 모드
폰트 크기
마지막 업데이트 시간: 2026-01-20 16:52:40

Scenarios

You can use the policy feature in the Cloud Access Management (CAM) console to grant read/write permissions for TDMQ for CKafka (CKafka) resources that are owned by the root account and bound with tags to sub-accounts through tag-based authorization. The sub-accounts that are granted these permissions can gain control capabilities over resources under the corresponding tags.

Prerequisites

A sub-account has been created for an employee using the Tencent Cloud root account. For detailed operations, see Creating a Sub-account.
At least one CKafka instance has been created.
At least one tag is available. If not, see Configuring Resource Tags to create one.

Operation Steps

Step 1: Binding Tags to Resources

1. Log in to the CKafka console by using the root account, and click Instance List in the left sidebar.
2. Select the target instance, click Edit Tag, and bind resource tags to the instance.


Step 2: Authorizing Permissions by Tag

1. Log in to the CAM console.
2. In the left sidebar, select Policies, click Create a custom policy, and select Authorize by Tag for the policy creation method.
3. In the visualized policy generator, enter ckafka in Service for filtering, select CKafka(ckafka) from the results, and select All Actions (*) for Action. You can also select the corresponding operations as needed.
Note:
All APIs of the services are included in the operations allowed. You can use Whether tag-based authorization is supported to filter APIs and check whether they support authorization by tag.
Yes: APIs support tag-based authorization and have the operation permissions for resources associated with the tags.
No: APIs that do not support tag-based authorization. In subsequent steps, you can choose whether to grant operation permissions for all resources to these APIs that do not support tag-based authorization.
To support authorization for multiple services, you can click Add in the upper-left corner to add multiple authorization statements and configure authorization policies for other services.
4. In the Select a Tag section, select the tag keys and tag values bound to the cluster resources. You can select multiple tag keys and tag values.
5. In the Select Condition Key section, select condition keys. You can select both resource_tag and request_tag, or select either one of them.

6. Determine whether to Whether to grant permission "resource": "*" to APIs that do not support Tag. If you select this option, APIs that do not support tags will have operation permissions for all resources.
7. Click Next and set the policy name. The policy name is automatically generated by the console and is set to policygen by default, with a suffix number generated based on the creation date. You can customize it.
8. Click Select User or Select User Group to select the users or user groups to be granted resource permissions.



9. Click Completed. The relevant sub-accounts can control resources under the specified tags based on the policy.


도움말 및 지원

문제 해결에 도움이 되었나요?

피드백