Access control method | Applicable scenario | Service | Intended user | Usage note |
RAM Policy | Manage the permissions and temporary access permissions of the RAM users under an Alibaba Cloud account. | RAM | You want to grant permissions to a RAM user and use Tablestore as the RAM user, or you want to access Tablestore by using temporary access tokens. For more information, see Use a RAM policy to grant permissions to a RAM user. | Grant the same permissions to different RAM users under the same Alibaba Cloud account. Grant the same permissions on all Tablestore resources or multiple Tablestore instances. Specify the conditions that are required for a policy to take effect. For example, restrict the IP addresses, protocols, and TLS versions that a client can use to access Tablestore resources and the time when users can access Tablestore resources. Grant temporary access permissions on Tablestore resources.
|
Control Policy | Manage the security policies for Alibaba Cloud accounts of different departments in an enterprise in a centralized manner. The Control Policy feature does not grant permissions but only denies access. | Resource Management | You have multiple Alibaba Cloud accounts for your enterprise and want to manage the permissions of these accounts in a centralized manner. For more information, see Use a custom access control policy to define the permission boundaries of enterprise users. | |
Network ACL | Control the network access to a Tablestore instance under an Alibaba Cloud account. | Tablestore | You want to restrict the types of networks or sources from which users can access the resources of a Tablestore instance. For more information, see the Network ACL. | |
Instance Policy | Grant fine-grained permissions on API operations on a Tablestore instance under an Alibaba Cloud account. | Tablestore | You want to restrict the access sources of the resources of a Tablestore instance. For more information, see Use instance policies to restrict the access sources of an instance. | Restrict the access sources of a Tablestore instance, including the IP addresses, networks, and TLS versions that users can use to access the instance. |