If you need to assign different permissions to employees in your enterprise to access your DLI resources, IAM is a good choice for fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you securely access to your cloud resources.
With IAM, you can use your account to create IAM users for your employees, and assign permissions to the users to control their access to specific resource types. For example, some software developers in your enterprise need to use DLI resources but must not delete them or perform any high-risk operations. To achieve this result, you can create IAM users for the software developers and grant them only the permissions required for using DLI resources.
If your account does not require individual IAM users for permissions management, you may skip over this section.
By default, new IAM users do not have permissions assigned. You need to add the users to one or more groups, and attach permissions policies or roles to these groups. The users then inherit permissions from the groups to which they are added. After authorization, the users can perform specified operations on DLI based on the permissions.
DLI is a project-level service deployed and accessed in specific physical regions. To assign ServiceStage permissions to a user group, specify the scope as region-specific projects and select projects for the permissions to take effect. If All projects is selected, the permissions will take effect for the user group in all region-specific projects. When accessing DLI, the users need to switch to a region where they have been authorized to use cloud services.
Role/Policy Name |
Description |
Category |
Dependency |
---|---|---|---|
DLI FullAccess |
Full permissions for DLI. |
System-defined policy |
This role depends on other roles in the same project.
|
DLI ReadOnlyAccess |
Read-only permissions for DLI. With read-only permissions, you can use DLI resources and perform operations that do not require fine-grained permissions. For example, create global variables, create packages and package groups, submit jobs to the default queue, create tables in the default database, create datasource connections, and delete datasource connections. |
System-defined policy |
None |
Tenant Administrator |
Tenant administrator
|
System-defined role |
None |
DLI Service Administrator |
DLI administrator.
|
System-defined role |
None |
Table 2 lists the common operations supported by each system policy. You can choose required system policies according to this table.
Resource |
Operation |
Description |
DLI FullAccess |
DLI ReadOnlyAccess |
Tenant Administrator |
DLI Service Administrator |
---|---|---|---|---|---|---|
Queue |
DROP_QUEUE |
Deleting a Queue |
√ |
× |
√ |
√ |
SUBMIT_JOB |
Submitting a job |
√ |
× |
√ |
√ |
|
CANCEL_JOB |
Terminating a Job |
√ |
× |
√ |
√ |
|
RESTART |
Restarting a queue |
√ |
× |
√ |
√ |
|
GRANT_PRIVILEGE |
Granting permissions to a queue |
√ |
× |
√ |
√ |
|
REVOKE_PRIVILEGE |
Revoking permissions to a queue |
√ |
× |
√ |
√ |
|
SHOW_PRIVILEGES |
Viewing the queue permissions of other users |
√ |
× |
√ |
√ |
|
Database |
DROP_DATABASE |
Deleting a database |
√ |
× |
√ |
√ |
CREATE_TABLE |
Creating a table |
√ |
× |
√ |
√ |
|
CREATE_VIEW |
Creating a view |
√ |
× |
√ |
√ |
|
EXPLAIN |
Explaining the SQL statement as an execution plan |
√ |
× |
√ |
√ |
|
CREATE_ROLE |
Creating a role |
√ |
× |
√ |
√ |
|
DROP_ROLE |
Deleting a role |
√ |
× |
√ |
√ |
|
SHOW_ROLES |
Displaying a role |
√ |
× |
√ |
√ |
|
GRANT_ROLE |
Binding a role |
√ |
× |
√ |
√ |
|
REVOKE_ROLE |
Unbinding a role |
√ |
× |
√ |
√ |
|
SHOW_USERS |
Displaying the binding relationships between all roles and users |
√ |
× |
√ |
√ |
|
GRANT_PRIVILEGE |
Granting permissions to the database |
√ |
× |
√ |
√ |
|
REVOKE_PRIVILEGE |
Revoking permissions to the database |
√ |
× |
√ |
√ |
|
SHOW_PRIVILEGES |
Viewing database permissions of other users |
√ |
× |
√ |
√ |
|
DISPLAY_ALL_TABLES |
Displaying tables in a database |
√ |
√ |
√ |
√ |
|
DISPLAY_DATABASE |
Displaying databases |
√ |
√ |
√ |
√ |
|
CREATE_FUNCTION |
Creating a function |
√ |
× |
√ |
√ |
|
DROP_FUNCTION |
Deleting a function |
√ |
× |
√ |
√ |
|
SHOW_FUNCTIONS |
Displaying all functions |
√ |
× |
√ |
√ |
|
DESCRIBE_FUNCTION |
Displaying function details |
√ |
× |
√ |
√ |
|
Table |
DROP_TABLE |
Deleting tables |
√ |
× |
√ |
√ |
SELECT |
Querying tables |
√ |
× |
√ |
√ |
|
INSERT_INTO_TABLE |
Inserting table data |
√ |
× |
√ |
√ |
|
ALTER_TABLE_ADD_COLUMNS |
Adding a column |
√ |
× |
√ |
√ |
|
INSERT_OVERWRITE_TABLE |
Overwriting a table |
√ |
× |
√ |
√ |
|
ALTER_TABLE_RENAME |
Renaming a table |
√ |
× |
√ |
√ |
|
ALTER_TABLE_ADD_PARTITION |
Adding partitions to the partition table |
√ |
× |
√ |
√ |
|
ALTER_TABLE_RENAME_PARTITION |
Renaming a table partition |
√ |
× |
√ |
√ |
|
ALTER_TABLE_DROP_PARTITION |
Deleting partitions from a partition table |
√ |
× |
√ |
√ |
|
SHOW_PARTITIONS |
Displaying all partitions |
√ |
× |
√ |
√ |
|
ALTER_TABLE_RECOVER_PARTITION |
Restoring table partitions |
√ |
× |
√ |
√ |
|
ALTER_TABLE_SET_LOCATION |
Setting the partition path |
√ |
× |
√ |
√ |
|
GRANT_PRIVILEGE |
Granting permissions to the table |
√ |
× |
√ |
√ |
|
REVOKE_PRIVILEGE |
Revoking permissions to the table |
√ |
× |
√ |
√ |
|
SHOW_PRIVILEGES |
Viewing table permissions of other users |
√ |
× |
√ |
√ |
|
DISPLAY_TABLE |
Displaying a table |
√ |
√ |
√ |
√ |
|
DESCRIBE_TABLE |
Displaying table information |
√ |
× |
√ |
√ |
|
Enhanced datasource connection |
BIND_QUEUE |
Binding an enhanced datasource connection to a queue It is only used to grant permissions across projects. |
× |
× |
× |
× |