首次使用辦公安全平臺前,您需要先授予辦公安全平臺訪問云資源的權限。本文介紹如何授權。
前提條件
您已開通辦公安全平臺。
您使用的是阿里云主賬號或擁有創建和刪除服務關聯角色權限的RAM賬號。
背景信息
首次使用辦公安全平臺時,阿里云會自動創建辦公安全平臺的關聯角色AliyunServiceRoleForCsas
,授權辦公安全平臺訪問其他關聯的阿里云服務。服務關聯角色無需您手動創建或做任何修改。相關內容請參見服務關聯角色。
操作步驟
辦公安全平臺關聯角色介紹
以下是辦公安全平臺關聯角色的介紹:
角色名稱:
AliyunServiceRoleForCsas
權限策略名稱:
AliyunServiceRolePolicyForCsas
說明該權限策略為系統默認提供的策略,其策略名稱和策略內容都不支持修改。
權限策略示例:
{ "Version": "1", "Statement": [ { "Action": [ "ecs:DescribeInstances", "ecs:CreateSecurityGroup", "ecs:DeleteSecurityGroup", "ecs:AuthorizeSecurityGroup", "ecs:DescribeSecurityGroups", "ecs:DescribeSecurityGroupReferences", "ecs:ModifySecurityGroupPolicy", "ecs:ModifySecurityGroupRule", "ecs:ModifySecurityGroupEgressRule", "ecs:CreateNetworkInterface", "ecs:DeleteNetworkInterface", "ecs:DescribeNetworkInterfaces", "ecs:CreateNetworkInterfacePermission", "ecs:DescribeNetworkInterfacePermissions", "ecs:DeleteNetworkInterfacePermission", "ecs:AttachNetworkInterface", "ecs:DetachNetworkInterface", "ecs:RevokeSecurityGroup" ], "Resource": "*", "Effect": "Allow" }, { "Action": [ "rds:DescribeDBInstances", "rds:DescribeSecurityGroupConfiguration", "rds:ModifySecurityGroupConfiguration", "rds:DescribeDBInstanceIPArrayList", "rds:ModifySecurityIps" ], "Resource": "*", "Effect": "Allow" }, { "Action": [ "kvstore:DescribeInstances", "kvstore:DescribeGlobalDistributeCache", "kvstore:DescribeSecurityIps", "kvstore:ModifySecurityIps", "kvstore:DescribeSecurityGroupConfiguration", "kvstore:ModifySecurityGroupConfiguration" ], "Resource": "*", "Effect": "Allow" }, { "Action": [ "dds:DescribeDBInstances", "dds:DescribeSecurityIps", "dds:ModifySecurityIps", "dds:DescribeSecurityGroupConfiguration", "dds:ModifySecurityGroupConfiguration" ], "Resource": "*", "Effect": "Allow" }, { "Action": [ "polardb:DescribeDBClusters", "polardb:DescribeDBClusterAccessWhitelist", "polardb:ModifyDBClusterAccessWhitelist" ], "Resource": "*", "Effect": "Allow" }, { "Action": [ "vpc:DescribeVpcs", "vpc:DescribeVSwitches", "vpc:CreateVpc", "vpc:DeleteVpc", "vpc:CreateVSwitch", "vpc:DeleteVSwitch", "vpc:DescribeZones", "vpc:DescribePhysicalConnections", "vpc:DescribeVirtualBorderRouters", "vpc:DescribeVirtualBorderRoutersForPhysicalConnection", "vpc:DescribeVpnGateways", "vpc:DescribeVpnGateway", "vpc:DescribeCustomerGateways", "vpc:DescribeVpnConnections", "vpc:DescribeVpcAttribute", "vpc:DescribeRouteTables", "vpc:DescribeRouteTableList", "vpc:DescribeRouteEntryList" ], "Resource": "*", "Effect": "Allow" }, { "Action": [ "cen:DescribeCens", "cen:DescribeCenAttachedChildInstances", "cen:DescribeCenAttachedChildInstanceAttribute", "cen:AttachCenChildInstance", "cen:DetachCenChildInstance", "cen:GrantInstanceToCen", "cen:RevokeInstanceFromCen" ], "Resource": "*", "Effect": "Allow" }, { "Action": [ "smartag:CreateSmartAGTrafficService", "smartag:UpdateSmartAGTrafficService", "smartag:DeleteSmartAGTrafficSerivce", "smartag:ListSmartAGTrafficService", "smartag:DescribeSmartAccessGateways", "smartag:DescribeCloudConnectNetworks", "smartag:CreateCloudConnectNetwork", "smartag:ModifyCloudConnectNetwork", "smartag:DeleteCloudConnectNetwork", "smartag:CreateSmartAccessGatewaySoftware", "smartag:UpgradeSmartAccessGatewaySoftware", "smartag:DowngradeSmartAccessGatewaySoftware", "smartag:BindSmartAccessGateway", "smartag:UnbindSmartAccessGateway" ], "Resource": "*", "Effect": "Allow" }, { "Action": [ "log:PostLogStoreLogs", "log:GetProject", "log:ListProject", "log:GetLogStore", "log:ListLogStores", "log:CreateLogStore", "log:CreateProject", "log:GetIndex", "log:CreateIndex", "log:UpdateIndex", "log:CreateDashboard", "log:ClearLogStoreStorage", "log:UpdateLogStore", "log:UpdateDashboard", "log:CreateSavedSearch", "log:UpdateSavedSearch", "log:DeleteLogStore", "log:DeleteSavedSearch", "log:GetSavedSearch", "log:ListSavedSearch", "log:DeleteDashboard", "log:GetDashboard", "log:ListDashboard" ], "Resource": "acs:log:*:*:project/csas-project-*", "Effect": "Allow" }, { "Action": [ "pvtz:DescribeZones", "pvtz:DescribeZoneInfo", "pvtz:DescribeZoneRecords" ], "Resource": "*", "Effect": "Allow" }, { "Action": "ram:DeleteServiceLinkedRole", "Resource": "*", "Effect": "Allow", "Condition": { "StringEquals": { "ram:ServiceName": "csas.aliyuncs.com" } } } ] }
相關問題
為什么我使用RAM用戶無法自動創建SASE服務關聯角色?
RAM用戶需要擁有指定的權限,才能自動創建或刪除服務關聯角色。您需為RAM用戶添加以下權限策略:
{
"Statement": [
{
"Action": [
"ram:CreateServiceLinkedRole"
],
"Resource": "acs:ram:*:主賬號ID:role/*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": [
"csas.aliyuncs.com"
]
}
}
}
],
"Version": "1"
}
說明
詳細操作步驟指導,請參見為RAM角色授權。
文檔內容是否對您有幫助?