If you are not authorized to access an instance by using the proxy endpoints that the data security protection feature generates for the instance, you can apply for related permissions. After the application is approved, you can get the certification information that is used to access the instance by using proxy endpoints.

Prerequisites

  • The data security protection feature is enabled for the instance. For more information about how to enable the feature, see Enable the data security protection feature.
  • You are not authorized to access the instance by using proxy endpoints.
    Note You can view your permissions by using one of the following methods:
    • On the Access tab, select Data security protection for Classification. Then, you can view the instances that you are authorized to access by using proxy endpoints. For more information about how to go to the Access tab, see View owned permissions.
    • On the Data security protection tab, check whether you are authorized. For more information about how to go to this tab, see Step 1.
  • You are not a DMS administrator, a database administrator (DBA), or the owner of the instance.

Apply for the permissions to access an instance by using proxy endpoints

  1. Log on to the DMS console. In the left-side navigation pane, right-click the instance that you want to manage and select Data security protection.
    Note You can also go to the Data security protection tab by using the following methods:
    • On the Workbench tab, find the instance that you want to manage on the Instance List tab of the Resource List section. Move the pointer over More in the Actions column and select Data security protection.
    • In the top navigation bar, move the pointer over the All functions icon and choose System > Instance. On the Instance List tab, find the instance that you want to manage, move the point over More in the Actions column, and then select Data security protection.
  2. On the Data security protection tab, click One-click Application for opening. appyforauth
    Then, a Data Security Protection Work Order ticket is generated. workapplicationAfter the ticket is approved, you can view your certification information on the Data security protection tab.

Related operations

After you are authorized, you can perform the following operations to manage your certification information and permissions:
  • View the AccessSecret that you are authorized to use to connect to the proxy endpoints that the data security protection feature generates for the instance. By default, the AccessSecret is masked. To view the plaintext AccessSecret, click View.
  • Update the AccessSecret that an authorized user uses to connect to the proxy endpoints that the data security protection feature generates for the instance. After you click Update, a new AccessSecret is generated. After the update, the programs of the authorized user cannot access the instance by using the previous AccessSecret.
  • Release your permissions. If you do not need to access the instance by using the proxy endpoints generated by the data security protection feature, click Release to release your permissions.

What to do next

You can access the instance over the MySQL or HTTPS protocol by using the proxy endpoints generated by the data security protection feature.