AliyunServiceRolePolicyForRDSGAD is the authorization policy dedicated to a service-linked role. The policy is automatically attached to a service role when the service role is created. Then, the service-linked role is authorized to access other cloud services. This policy is updated by the relevant Alibaba Cloud service. Do not attach this policy to a RAM identity other than a service-linked role.
Policy details
Type: service system policy
Creation time: 17:47:44 on August 20, 2021
Update time: 17:47:44 on August 20, 2021
Current version: v1
Policy content
{
"Version": "1",
"Statement": [
{
"Action": [
"rds:DescribeAccounts",
"rds:DescribeAvailableClasses",
"rds:DescribeAvailableResource",
"rds:DescribeAvailableZones",
"rds:DescribeDatabases",
"rds:DescribeDBInstanceAttribute",
"rds:DescribeDBInstanceDetail",
"rds:DescribeRegions"
],
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"rds:ResourceTag/gadinstance": "yes"
}
}
},
{
"Action": [
"rds:CreateDBInstance"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": [
"dts:ConfigureDtsJob",
"dts:StopDtsJob",
"dts:StartDtsJob",
"dts:ModifyDtsJob",
"dts:DeleteDtsJob",
"dts:DescribeDtsJobDetail",
"dts:DescribeDtsJobs",
"dts:InitDtsRdsInstance",
"dts:UntagResources",
"dts:ListTagResources"
],
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"acs:ResourceTag/gadinstance": "yes"
}
}
},
{
"Action": [
"dts:CreateDtsInstance",
"dts:TagResources"
],
"Resource": "*",
"Effect": "Allow"
},
{
"Action": "ram:DeleteServiceLinkedRole",
"Resource": "*",
"Effect": "Allow",
"Condition": {
"StringEquals": {
"ram:ServiceName": "gad.rds.aliyuncs.com"
}
}
}
]
}