After you create a RAM user and authorize the RAM user to access Hybrid Backup Recovery (HBR), you can use the RAM user to manage your resources in Hybrid Backup Recovery (HBR). This topic describes how to create a RAM user and authorize the RAM user to access Hybrid Backup Recovery (HBR).
Background information
You may need to grant O&M staff the permissions to manage your Hybrid Backup Recovery (HBR) resources and grant other staff the permissions to access Hybrid Backup Recovery (HBR) resources based on your business requirements. In this case, you can create RAM users and grant required permissions to the RAM users. Then, the related staff such as the O&M staff can access Hybrid Backup Recovery (HBR) resources as RAM users. For data security reasons, we recommend that you follow the principle of least privilege (PoLP) when you grant permissions to RAM users. For more information about RAM users, see Introduction.
Step 1: Create a RAM user
To manage user permissions by using RAM, you must create RAM users. Then, you need to grant different permissions to each RAM user.
If you have multiple RAM users within your Alibaba Cloud account, you can create RAM user groups to classify and authorize these RAM users. This simplifies the management of RAM users and permissions. For more information, see Create a user group.
To create a RAM user, perform the following steps:
Step 2: Grant permissions to a RAM user
By default, a new RAM user has no permissions. You must grant permissions to the RAM user before the RAM user can be used to perform operations in the console or call API operations.
- AliyunHBRFullAccess: grants a RAM user the full access permissions on HBR.
- AliyunHBRReadOnlyAccess: grants a RAM user the read-only permissions on HBR.
You can also attach custom policies to the RAM user in the RAM console to achieve fine-grained access control. For more information, see Create a custom policy.
To attach the AliyunHBRReadOnlyAccess policy to a RAM user, perform the following steps:
What to do next
You can grant the permissions on a backup vault to a specified RAM user. These permissions allow the RAM user only to back up or restore the backup vault.
You can grant permissions by using the following sample policies. You can copy the script and paste the script in the RAM console to create a custom policy, and then attach the custom policy to the RAM user. For more information, see Isolate backup permissions and recovery permissions.
- To disallow a RAM user to restore a backup vault, use the following sample policy:
{ "Version": "1", "Statement": [ { "Effect": "Deny", "Action": [ "hbr:CreateRestore", "hbr:CreateRestoreJob", "hbr:CreateHanaRestore", "hbr:CreateUniRestorePlan", "hbr:CreateSqlServerRestore" ], "Resource": [ "acs:hbr:*:1178******531:vault/v-000******blx06", "acs:hbr:*:1178******531:vault/v-000******blx06/client/*" ] } ] }
- To disallow a RAM user to back up a backup vault, use the following sample policy:
{ "Version": "1", "Statement": [ { "Effect": "Deny", "Action": [ "hbr:CreateUniBackupPlan", "hbr:UpdateUniBackupPlan", "hbr:DeleteUniBackupPlan", "hbr:CreateHanaInstance", "hbr:UpdateHanaInstance", "hbr:DeleteHanaInstance", "hbr:CreateHanaBackupPlan", "hbr:UpdateHanaBackupPlan", "hbr:DeleteHanaBackupPlan", "hbr:CreateClient", "hbr:CreateClients", "hbr:UpdateClient", "hbr:UpdateClientSettings", "hbr:UpdateClientAlertConfig", "hbr:DeleteClient", "hbr:DeleteClients", "hbr:CreateJob", "hbr:UpdateJob", "hbr:CreateBackupPlan", "hbr:UpdateBackupPlan", "hbr:ExecuteBackupPlan", "hbr:DeleteBackupPlan", "hbr:CreateBackupJob", "hbr:CreatePlan", "hbr:UpdatePlan", "hbr:CreateTrialBackupPlan", "hbr:ConvertToPostPaidInstance", "hbr:KeepAfterTrialExpiration" ], "Resource": [ "acs:hbr:*:1178******9531:vault/v-000******blx06", "acs:hbr:*:1178******9531:vault/v-000******blx06/client/*" ] } ] }