更新时间:2025-12-02 gmt 08:00

弹性负载均衡 elb-j9九游会登录

云服务在iam预置了常用授权项,称为系统身份策略。如果iam系统身份策略无法满足授权要求,管理员可以根据各j9九游会登录的服务支持的授权项,创建iam自定义身份策略来进行精细的访问控制,iam自定义身份策略是对系统身份策略的扩展和补充。

除iam服务外,organizations服务中的服务控制策略(service control policy,以下简称scp)也可以使用这些授权项元素设置访问控制策略。

scp不直接进行授权,只划定权限边界。将scp绑定到组织单元或者成员账号时,并没有直接对组织单元或成员账号授予操作权限,而是规定了成员账号或组织单元包含的成员账号的授权范围。iam身份策略授予权限的有效性受scp限制,只有在scp允许范围内的权限才能生效。

iam服务与organizations服务在使用这些元素进行访问控制时,存在着一些区别,详情请参见:iam服务与organizations服务权限访问控制的区别

本章节介绍iam服务身份策略授权场景中自定义身份策略和组织服务中scp使用的元素,这些元素包含了操作(action)、资源(resource)和条件(condition)。

操作(action)

操作(action)即为身份策略中支持的授权项。

  • “访问级别”列描述如何对操作进行分类(list、read和write等)。此分类可帮助您了解在身份策略中相应操作对应的访问级别。
  • “资源类型”列指每个操作是否支持资源级权限。
    • 资源类型支持通配符号*表示所有。如果此列没有值(-),则必须在身份策略语句的resource元素中指定所有资源类型(“*”)。
    • 如果该列包含资源类型,则必须在具有该操作的语句中指定该资源的urn。
    • 资源类型列中必需资源在表中用星号(*)标识,表示使用此操作必须指定该资源类型。

    关于elb定义的资源类型的详细信息请参见资源类型(resource)

  • “条件键”列包括了可以在身份策略语句的condition元素中支持指定的键值。
    • 如果该授权项资源类型列存在值,则表示条件键仅对列举的资源类型生效。
    • 如果该授权项资源类型列没有值(-),则表示条件键对整个授权项生效。
    • 如果此列条件键没有值(-),表示此操作不支持指定条件键。

    关于elb定义的条件键的详细信息请参见条件(condition)

  • “别名”列包括了可以在身份策略中配置的策略授权项。通过这些授权项,可以控制支持策略授权的api访问。详细信息请参见身份策略兼容性说明

您可以在身份策略语句的action元素中指定以下elb的相关操作。

表1 elb支持的授权项

授权项

描述

访问级别

资源类型(*为必须)

条件键

别名

elb:flavors:show

授予查询指定规格的详情。

read

flavor *

-

elb:flavors:get

elb:flavors:list

授予查询规格详情列表的权限。

list

flavor *

-

-

elb:quotas:list

授予查询配额列表的权限。

list

-

-

-

elb:quotas:show

授予查询可以创建指定类型资源的最大数量的权限。

read

-

-

elb:quotas:get

elb:availability-zones:list

授予查询可用区列表的权限。

list

availabilityzone *

-

-

-

g:enterpriseprojectid

elb:loadbalancers:list

授予查询负载均衡器实例列表。

list

loadbalancer *

-

-

-

g:enterpriseprojectid

elb:loadbalancers:show

授予获取负载均衡器实例详情的权限。

read

loadbalancer *

elb:loadbalancers:get

elb:loadbalancers:create

授予创建负载均衡器实例的权限。

write

loadbalancer *

-

-

subnet

-

-

elb:loadbalancers:update

授予更新负载均衡器实例的权限。

write

subnet

-

elb:loadbalancers:put

loadbalancer *

-

elb:associatepublicips

elb:loadbalancers:delete

授予删除负载均衡器实例的权限。

write

loadbalancer *

-

elb:listeners:create

授予创建监听器的权限。

write

listener *

g:enterpriseprojectid

-

loadbalancer *

-

elb:listeners:update

授予修改监听器的权限。

write

listener *

elb:listeners:put

elb:listeners:list

授予查询监听器列表的权限。

list

listener *

-

-

-

g:enterpriseprojectid

elb:listeners:show

授予获取监听器详情的权限。

read

listener *

elb:listeners:get

elb:listeners:delete

授予删除监听器的权限。

write

listener *

-

elb:certificates:list

授予查询证书列表的权限。

list

certificate *

-

-

-

g:enterpriseprojectid

elb:certificates:show

授予获取证书详情的权限。

read

certificate *

-

elb:certificates:get

elb:certificates:create

授予创建证书的权限。

write

certificate *

-

-

-

g:enterpriseprojectid

elb:certificates:update

授予修改证书的权限。

write

certificate *

-

elb:certificates:put

elb:certificates:delete

授予删除证书的权限。

write

certificate *

-

-

elb:certificates:setprivatekeyecho

授予设置证书私钥回显开关的权限。

write

-

-

-

elb:certificates:getprivatekeyecho

授予查询证书私钥回显开关的权限。

write

-

-

-

elb:healthmonitors:create

授予创建健康检查的权限。

write

healthmonitor *

g:enterpriseprojectid

-

pool *

g:enterpriseprojectid

elb:healthmonitors:update

授予修改健康检查的权限。

write

healthmonitor *

g:enterpriseprojectid

elb:healthmonitors:put

elb:healthmonitors:delete

授予删除健康检查的权限。

write

healthmonitor *

g:enterpriseprojectid

-

elb:healthmonitors:show

授予获取健康检查详情的权限。

read

healthmonitor *

g:enterpriseprojectid

elb:healthmonitors:get

elb:healthmonitors:list

授予查询健康检查列表的权限。

list

healthmonitor *

-

-

-

g:enterpriseprojectid

elb:ipgroups:list

授予查询ip地址组列表的权限。

list

ipgroup *

-

-

-

g:enterpriseprojectid

elb:ipgroups:show

授予获取ip地址组详情的权限。

read

ipgroup *

-

elb:ipgroups:get

elb:ipgroups:create

授予创建ip地址组的权限。

write

ipgroup *

-

-

-

g:enterpriseprojectid

elb:ipgroups:update

授予修改ip地址组的权限。

write

ipgroup *

-

elb:ipgroups:put

elb:ipgroups:delete

授予删除ip地址组的权限。

write

ipgroup *

-

-

elb:ipgroups:showrelatedlisteners

授予获取ip地址组关联的监听器的权限。

read

ipgroup *

-

elb:ipgroups:related-listeners

elb:l7policies:create

授予创建7层转发策略的权限。

write

listener *

-

l7policy *

g:enterpriseprojectid

pool

g:enterpriseprojectid

elb:l7policies:update

授予修改7层转发策略的权限。

write

l7policy *

g:enterpriseprojectid

elb:l7policies:put

listener

pool

g:enterpriseprojectid

elb:l7policies:delete

授予删除7层转发策略的权限。

write

l7policy *

g:enterpriseprojectid

-

elb:l7policies:show

授予获取转发策略详情的权限。

read

l7policy *

g:enterpriseprojectid

elb:l7policies:get

elb:l7policies:list

授予查询转发策略的权限。

list

l7policy *

-

-

-

g:enterpriseprojectid

elb:l7rules:create

授予创建7层转发规则的权限。

write

l7rule *

g:enterpriseprojectid

-

l7policy *

g:enterpriseprojectid

elb:l7rules:update

授予修改7层转发规则的权限。

write

l7rule *

g:enterpriseprojectid

elb:l7rules:put

elb:l7rules:list

授予查询转发规则的权限。

list

l7policy *

-

-

l7rule *

-

-

g:enterpriseprojectid

elb:l7rules:show

授予获取7层转发规则详情的权限。

read

l7rule *

g:enterpriseprojectid

elb:l7rules:get

elb:l7rules:delete

授予删除7层转发规则的权限。

write

l7rule *

g:enterpriseprojectid

-

elb:logtanks:list

授予查询云日志列表的权限。

list

logtank *

-

-

-

g:enterpriseprojectid

elb:logtanks:show

授予获取云日志详情的权限。

read

logtank *

g:enterpriseprojectid

elb:logtanks:get

elb:logtanks:create

授予创建云日志的权限。

write

logtank *

g:enterpriseprojectid

-

loadbalancer *

elb:logtanks:update

授予修改云日志的权限。

write

logtank *

g:enterpriseprojectid

elb:logtanks:put

elb:logtanks:delete

授予删除云日志的权限。

write

logtank *

g:enterpriseprojectid

-

elb:pools:list

授予查询后端服务器组列表的权限。

list

pool *

-

-

-

g:enterpriseprojectid

elb:pools:show

授予获取后端服务器组详情的权限。

read

pool *

g:enterpriseprojectid

elb:pools:get

elb:pools:create

授予创建后端服务器组的权限。

write

loadbalancer

-

listener

pool *

g:enterpriseprojectid

elb:pools:update

授予修改后端服务器组的权限。

write

pool *

g:enterpriseprojectid

elb:pools:put

elb:pools:delete

授予删除后端服务器组的权限。

write

pool *

g:enterpriseprojectid

-

elb:members:list

授予查询后端服务器列表的权限。

list

pool

-

-

member *

-

-

g:enterpriseprojectid

elb:members:show

授予获取后端服务器详情的权限。

read

member *

g:enterpriseprojectid

elb:members:get

elb:members:create

授予创建后端服务器的权限。

write

member *

g:enterpriseprojectid

-

pool *

g:enterpriseprojectid

subnet

-

elb:members:update

授予修改后端服务器的权限。

write

member *

g:enterpriseprojectid

elb:members:put

elb:members:delete

授予删除后端服务器的权限。

write

member *

g:enterpriseprojectid

-

elb:security-policies:list

授予查询安全策略的权限。

list

securitypolicy *

-

-

-

g:enterpriseprojectid

elb:security-policies:show

授予获取安全策略详情的权限。

read

securitypolicy *

-

elb:security-policies:get

elb:security-policies:create

授予创建安全策略的权限。

write

securitypolicy *

-

-

-

g:enterpriseprojectid

elb:security-policies:update

授予修改安全策略的权限。

write

securitypolicy *

-

elb:security-policies:put

elb:security-policies:delete

授予删除安全策略的权限。

write

securitypolicy *

-

-

elb:loadbalancers:export

授予导出负载均衡器的权限。

read

loadbalancer *

-

elb:listeners:export

授予导出监听器的权限。

read

listener *

-

elb的api通常对应着一个或多个授权项。表2展示了api与授权项的关系,以及该api需要依赖的授权项。

表2 api与授权项的关系

api

对应的授权项

依赖的授权项

get /v3/{project_id}/elb/flavors

elb:flavors:list

-

get /v3/{project_id}/elb/flavors/{flavor_id}

elb:flavors:show

-

get /v3/{project_id}/elb/quotas/details

elb:quotas:list

-

get /v3/{project_id}/elb/quotas

elb:quotas:show

-

post /v3/{project_id}/elb/loadbalancers

elb:loadbalancers:create

-

delete /v3/{project_id}/elb/loadbalancers/{loadbalancer_id}

elb:loadbalancers:delete

-

delete /v3/{project_id}/elb/loadbalancers/{loadbalancer_id}/force-elb

elb:loadbalancers:delete

-

get /v3/{project_id}/elb/loadbalancers

elb:loadbalancers:list

-

get /v3/{project_id}/elb/loadbalancers/{loadbalancer_id}

elb:loadbalancers:show

-

get /v3/{project_id}/elb/loadbalancers/{loadbalancer_id}/statuses

elb:loadbalancers:show

-

put /v3/{project_id}/elb/loadbalancers/{loadbalancer_id}

elb:loadbalancers:update

-

post /v3/{project_id}/elb/loadbalancers/{loadbalancer_id}/availability-zone/batch-remove

elb:loadbalancers:update

-

post /v3/{project_id}/elb/loadbalancers/{loadbalancer_id}/availability-zone/batch-add

elb:loadbalancers:update

-

post /v3/{project_id}/elb/loadbalancers/change-charge-mode

elb:loadbalancers:create

-

post /v3/{project_id}/elb/ipgroups

elb:ipgroups:create

-

delete /v3/{project_id}/elb/ipgroups/{ipgroup_id}

elb:ipgroups:delete

-

get /v3/{project_id}/elb/ipgroups

elb:ipgroups:list

-

get /v3/{project_id}/elb/ipgroups/{ipgroup_id}

elb:ipgroups:show

-

put /v3/{project_id}/elb/ipgroups/{ipgroup_id}

elb:ipgroups:update

-

post /v3/{project_id}/elb/ipgroups/{ipgroup_id}/iplist/create-or-update

elb:ipgroups:update

-

post /v3/{project_id}/elb/ipgroups/{ipgroup_id}/iplist/batch-delete

elb:ipgroups:update

-

get /v3/{project_id}/elb/ipgroups/{ipgroup_id}/related-listeners

elb:ipgroups:showrelatedlisteners

-

post /v3/{project_id}/elb/security-policies

elb:security-policies:create

-

delete /v3/{project_id}/elb/security-policies/{security_policy_id}

elb:security-policies:delete

-

get /v3/{project_id}/elb/security-policies

elb:security-policies:list

-

get /v3/{project_id}/elb/system-security-policies

elb:security-policies:list

-

get /v3/{project_id}/elb/security-policies/{security_policy_id}

elb:security-policies:show

-

put /v3/{project_id}/elb/security-policies/{security_policy_id}

elb:security-policies:update

-

post /v3/{project_id}/elb/pools/{pool_id}/members

elb:members:create

-

delete /v3/{project_id}/elb/pools/{pool_id}/members/{member_id}

elb:members:delete

-

get /v3/{project_id}/elb/pools/{pool_id}/members

elb:members:list

-

get /v3/{project_id}/elb/pools/{pool_id}/members/{member_id}

elb:members:show

-

put /v3/{project_id}/elb/pools/{pool_id}/members/{member_id}

elb:members:update

-

post /v3/{project_id}/elb/pools/{pool_id}/members/batch-update

elb:members:update

-

get /v3/{project_id}/elb/members

elb:members:list

-

post /v3/{project_id}/elb/pools/{pool_id}/members/batch-add

elb:members:create

-

post /v3/{project_id}/elb/pools/{pool_id}/members/batch-delete

elb:members:delete

-

post /v3/{project_id}/elb/pools

elb:pools:create

-

delete /v3/{project_id}/elb/pools/{pool_id}

elb:pools:delete

-

get /v3/{project_id}/elb/pools

elb:pools:list

-

get /v3/{project_id}/elb/pools/{pool_id}

elb:pools:show

-

put /v3/{project_id}/elb/pools/{pool_id}

elb:pools:update

-

post /v3/{project_id}/elb/master-slave-pools

elb:pools:create

-

get /v3/{project_id}/elb/master-slave-pools

elb:pools:list

-

get /v3/{project_id}/elb/master-slave-pools/{pool_id}

elb:pools:show

-

delete /v3/{project_id}/elb/master-slave-pools/{pool_id}

elb:pools:delete

-

post /v3/{project_id}/elb/listeners

elb:listeners:create

-

delete /v3/{project_id}/elb/listeners/{listener_id}

elb:listeners:delete

-

delete /v3/{project_id}/elb/listeners/{listener_id}/force

elb:listeners:delete

-

get /v3/{project_id}/elb/listeners

elb:listeners:list

-

get /v3/{project_id}/elb/listeners/{listener_id}

elb:listeners:show

-

put /v3/{project_id}/elb/listeners/{listener_id}

elb:listeners:update

-

post /v3/{project_id}/elb/healthmonitors

elb:healthmonitors:create

-

delete /v3/{project_id}/elb/healthmonitors/{healthmonitor_id}

elb:healthmonitors:delete

-

get /v3/{project_id}/elb/healthmonitors

elb:healthmonitors:list

-

get /v3/{project_id}/elb/healthmonitors/{healthmonitor_id}

elb:healthmonitors:show

-

put /v3/{project_id}/elb/healthmonitors/{healthmonitor_id}

elb:healthmonitors:update

-

get /v3/{project_id}/elb/availability-zones

elb:availability-zones:list

-

get /v3/{project_id}/elb/preoccupy-ip-num

elb:loadbalancers:show

-

post /v3/{project_id}/elb/logtanks

elb:logtanks:create

-

delete /v3/{project_id}/elb/logtanks/{logtank_id}

elb:logtanks:delete

-

get /v3/{project_id}/elb/logtanks

elb:logtanks:list

-

get /v3/{project_id}/elb/logtanks/{logtank_id}

elb:logtanks:show

-

put /v3/{project_id}/elb/logtanks/{logtank_id}

elb:logtanks:update

-

post /v3/{project_id}/elb/certificates

elb:certificates:create

-

delete /v3/{project_id}/elb/certificates/{certificate_id}

elb:certificates:delete

-

get /v3/{project_id}/elb/certificates

elb:certificates:list

-

get /v3/{project_id}/elb/certificates/{certificate_id}

elb:certificates:show

-

put /v3/{project_id}/elb/certificates/{certificate_id}

elb:certificates:update

-

post /v3/{project_id}/elb/certificates/settings/private-key-echo

elb:certificates:setprivatekeyecho

-

get /v3/{project_id}/elb/certificates/settings/private-key-echo

elb:certificates:getprivatekeyecho

-

post /v3/{project_id}/elb/l7policies

elb:l7policies:create

-

delete /v3/{project_id}/elb/l7policies/{l7policy_id}

elb:l7policies:delete

-

get /v3/{project_id}/elb/l7policies

elb:l7policies:list

-

get /v3/{project_id}/elb/l7policies/{l7policy_id}

elb:l7policies:show

-

put /v3/{project_id}/elb/l7policies/{l7policy_id}

elb:l7policies:update

-

post /v3/{project_id}/elb/l7policies/batch-update-priority

elb:l7policies:update

-

post /v3/{project_id}/elb/l7policies/{l7policy_id}/rules

elb:l7rules:create

-

delete /v3/{project_id}/elb/l7policies/{l7policy_id}/rules/{l7rule_id}

elb:l7rules:delete

-

get /v3/{project_id}/elb/l7policies/{l7policy_id}/rules

elb:l7rules:list

-

get /v3/{project_id}/elb/l7policies/{l7policy_id}/rules/{l7rule_id}

elb:l7rules:show

-

put /v3/{project_id}/elb/l7policies/{l7policy_id}/rules/{l7rule_id}

elb:l7rules:update

-

资源类型(resource)

资源类型(resource)表示身份策略所作用的资源。如表3中的某些操作指定了可以在该操作指定的资源类型,则必须在具有该操作的身份策略语句中指定该资源的urn,身份策略仅作用于此资源;如未指定,resource默认为“*”,则身份策略将应用到所有资源。您也可以在身份策略中设置条件,从而指定资源类型。

elb定义了以下可以在自定义身份策略的resource元素中使用的资源类型。

表3 elb支持的资源类型

资源类型

urn

pool

elb:::pool:

loadbalancer

elb:::loadbalancer:

certificate

elb:::certificate:

healthmonitor

elb:::healthmonitor:

ipgroup

elb:::ipgroup:

securitypolicy

elb:::securitypolicy:

logtank

elb:::logtank:

availabilityzone

elb:::availabilityzone:

member

elb:::member:/

l7policy

elb:::l7policy:

l7rule

elb:::l7rule:/

flavor

elb:::flavor:

subnet

vpc:::subnet:

listener

elb:::listener:

条件(condition)

条件键概述

条件(condition)是身份策略生效的特定条件,包括条件键运算符

  • 条件键表示身份策略语句的condition元素中的键值。根据适用范围,分为全局级条件键和服务级条件键。
    • 全局级条件键(前缀为g:)适用于所有操作,在鉴权过程中,云服务不需要提供用户身份信息,系统将自动获取并鉴权。详情请参见:全局条件键
    • 服务级条件键(前缀通常为服务缩写,如elb:)仅适用于对应服务的操作,详情请参见表4
    • 单值/多值表示api调用时请求中与条件关联的值数。单值条件键在api调用时的请求中最多包含一个值,多值条件键在api调用时请求可以包含多个值。例如:g:sourcevpce是单值条件键,表示仅允许通过某个vpc终端节点发起请求访问某资源,一个请求最多包含一个vpc终端节点id值。g:tagkeys是多值条件键,表示请求中携带的所有标签的key组成的列表,当用户在调用api请求时传入标签可以传入多个值。
  • 运算符与条件键、条件值一起构成完整的条件判断语句,当请求信息满足该条件时,身份策略才能生效。支持的运算符请参见:运算符

elb支持的服务级条件键

elb定义了以下可以在自定义身份策略的condition元素中使用的条件键,您可以使用这些条件键进一步细化身份策略语句应用的条件。

表4 elb支持的服务级条件键

服务级条件键

类型

单值/多值

说明

elb:associatepublicips

boolean

单值

根据创建或修改负载均衡器时是否涉及创建或绑定公网操作筛选访问权限。若要完全限制弹性负载均衡器的公网访问,则需要同时使用弹性公网ip的相关action进行策略管理。

elb:updatelisteneripgroup

boolean

单值

根据修改监听器时是否涉及更新访问控制筛选访问权限。

elb:onlyupdatelisteneripgroup

boolean

单值

根据修改监听器时是否仅涉及更新访问控制筛选访问权限。

相关文档

网站地图