You can create custom policies to supplement system-defined policies and implement more refined access control.
For example, when creating a custom policy containing the action evs:volumes:create for EVS, specify the scope as Project-level services.
A custom policy can contain actions of multiple services that are globally accessible or accessible through region-specific projects. To define permissions required to access both global and project-level services, create two custom policies and specify the scope as Global services and Project-level services.
Only one cloud service can be selected for each permission block. To configure permissions for multiple cloud services, click Add Permissions or switch to the JSON view.
Name |
Description |
---|---|
Condition Key |
A key in the Condition element of a statement. There are global and service-level condition keys. Global condition keys (starting with g:) are available for operations of all services, while service-level condition keys (starting with a service abbreviation name such as obs:) are available only for operations of the corresponding service. |
Operator |
Used together with a condition key to form a complete condition statement. |
Value |
Used together with a condition key and an operator that requires a keyword, to form a complete condition statement. |
If the policy content is incorrect after modification, check and modify the content, or click Reset to cancel the modifications.
For example, when creating a custom policy containing the action evs:volumes:create for EVS, specify the scope as Project-level services.
A custom policy can contain actions of multiple services that are globally accessible or accessible through region-specific projects. To define permissions required to access both global and project-level services, create two custom policies and specify the scope as Global services and Project-level services.