The permission assistant is a feature provided by Enterprise Distributed Application Service (EDAS) to help you create EDAS-related policies in Resource Access Management (RAM). You can use the EDAS permission assistant to create RAM policies based on EDAS-defined permission policies with efficiency.
View system permission policies
EDAS provides eight system permission policies for different roles on the Permission Assistant page in the EDAS console. You can select a system permission policy and copy its content based on the purpose of a role in the EDAS console. Then, log on to the RAM console, create a RAM policy by using the copied content, and attach the RAM policy to the RAM user that corresponds to the role. For more information, see Replace EDAS-defined permissions with RAM policies.
For more information about the eight system permission policies provided by EDAS, see Overview of system permission policies provided by EDAS.
Create a custom permission policy
You can also use the EDAS permission assistant to create custom permissions policies. The following example shows how to create a custom permission policy.
- The permissions to view the test microservice namespace in the China (Beijing) region.
- The permissions to view all clusters in the test microservice namespace in the China (Beijing) region.
- Full permissions except for the creation permissions on the test microservice namespace.
Overview of system permission policies provided by EDAS
Super Admin
- Full permissions on microservice namespaces
- Full permissions on clusters
- Full permissions on applications
- Full permissions on microservices
- Full permissions on configuration management
The following RAM policy grants the same permissions:
{
"Version": "1",
"Statement": [
{
"Effect": "Allow",
"Action": [
"edas:*Namespace"
],
"Resource": [
"acs:edas:*:*:namespace/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:*Cluster"
],
"Resource": [
"acs:edas:*:*:namespace/*/cluster/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:*Application"
],
"Resource": [
"acs:edas:*:*:namespace/*/application/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:*Service"
],
"Resource": [
"acs:edas:*:*:namespace/*/application/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:ManageSystem",
"edas:ManageOperation",
"edas:ReadOperationLog"
],
"Resource": [
"acs:edas:*:*:*"
]
}
]
}
App Admin
- Full permissions on applications
- Full permissions on microservices
- Full permissions on clusters
The following RAM policy grants the same permissions:
{
"Version": "1",
"Statement": [
{
"Effect": "Allow",
"Action": [
"edas:*Application"
],
"Resource": [
"acs:edas:*:*:namespace/*/application/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:*Service"
],
"Resource": [
"acs:edas:*:*:namespace/*/application/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:ReadCluster"
],
"Resource": [
"acs:edas:*:*:namespace/*/cluster/*"
]
}
]
}
App Operator
- Full permissions on applications except for the permissions to create applications
- Full permissions on microservices
- The edas:ManageOperation (system management) permission
The following RAM policy grants the same permissions:
{
"Version": "1",
"Statement": [
{
"Effect": "Allow",
"Action": [
"edas:*Application"
],
"Resource": [
"acs:edas:*:*:namespace/*/application/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:*Service"
],
"Resource": [
"acs:edas:*:*:namespace/*/application/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:ManageOperation"
],
"Resource": [
"acs:edas:*:*:*"
]
},
{
"Effect": "Deny",
"Action": [
"edas:CreateApplication"
],
"Resource": [
"acs:edas:*:*:namespace/*/application/*"
]
}
]
}
App Browser
- Permissions to view applications
- Permissions to view microservices
The following RAM policy grants the same permissions:
{
"Version": "1",
"Statement": [
{
"Effect": "Allow",
"Action": [
"edas:ReadApplication"
],
"Resource": [
"acs:edas:*:*:namespace/*/application/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:ReadService"
],
"Resource": [
"acs:edas:*:*:namespace/*/application/*"
]
}
]
}
Resource Admin
- Full permissions on microservice namespaces
- Full permissions on clusters
The following RAM policy grants the same permissions:
{
"Version": "1",
"Statement": [
{
"Effect": "Allow",
"Action": [
"edas:*Namespace"
],
"Resource": [
"acs:edas:*:*:namespace/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:*Cluster"
],
"Resource": [
"acs:edas:*:*:namespace/*/cluster/*"
]
}
]
}
Resource Operator
- Full permissions on microservice namespaces except for the permissions to create microservice namespaces
- Full permissions on clusters except for the permissions to create clusters
The following RAM policy grants the same permissions:
{
"Version": "1",
"Statement": [
{
"Effect": "Allow",
"Action": [
"edas:*Namespace"
],
"Resource": [
"acs:edas:*:*:namespace/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:*Cluster"
],
"Resource": [
"acs:edas:*:*:namespace/*/cluster/*"
]
},
{
"Effect": "Deny",
"Action": [
"edas:CreateNamespace"
],
"Resource": [
"acs:edas:*:*:namespace/*"
]
},
{
"Effect": "Deny",
"Action": [
"edas:CreateCluster"
],
"Resource": [
"acs:edas:*:*:namespace/*/cluster/*"
]
}
]
}
Resource Browser
- Permissions to view microservice namespaces
- Permissions to view clusters
The following RAM policy grants the same permissions:
{
"Version": "1",
"Statement": [
{
"Effect": "Allow",
"Action": [
"edas:ReadNamespace"
],
"Resource": [
"acs:edas:*:*:namespace/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:ReadCluster"
],
"Resource": [
"acs:edas:*:*:namespace/*/cluster/*"
]
}
]
}
Edas Browser
- Microservice namespaces
- Clusters
- Applications
- Microservices
- Configurations
- Operation logs
The following RAM policy grants the same permissions:
{
"Version": "1",
"Statement": [
{
"Effect": "Allow",
"Action": [
"edas:ReadNamespace"
],
"Resource": [
"acs:edas:*:*:namespace/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:ReadCluster"
],
"Resource": [
"acs:edas:*:*:namespace/*/cluster/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:ReadApplication"
],
"Resource": [
"acs:edas:*:*:namespace/*/application/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:ReadService"
],
"Resource": [
"acs:edas:*:*:namespace/*/application/*"
]
},
{
"Effect": "Allow",
"Action": [
"edas:ReadOperationLog"
],
"Resource": [
"acs:edas:*:*:*"
]
}
]
}