tencent cloud

TDMQ for RabbitMQ

Release Notes and Announcements
Release Notes
Announcements
Product Introduction
Introduction and Selection of the TDMQ Product Series
What Is TDMQ for RabbitMQ
Strengths
Use Cases
Description of Differences Between Managed Edition and Serverless Edition
Open-Source Version Support Description
Comparison with Open-Source RabbitMQ
High Availability
Use Limits
TDMQ for RabbitMQ-Related Concepts
Regions
Related Cloud Services
Billing
Billing Overview
Pricing
Billing Example
Convert to Monthly Subscription from Hourly Postpaid
Renewal
Viewing Consumption Details
Overdue Payments
Refund
Getting Started
Getting Started Guide
Step 1: Preparations
Step 2: Creating a RabbitMQ Cluster
Step 3: Configuring a Vhost
Step 4: Using the SDK to Send and Receive Messages
Step 5: Querying a Message
Step 6: Deleting Resources
User Guide
Usage Process Guide
Configuring the Account Permission
Creating a Cluster
Configuring a Vhost
Connecting to the Cluster
Managing Messages
Configure Advanced Feature
Managing the Cluster
Viewing Monitoring Data and Configuring Alarm Policy
Use Cases
Use Instructions of Use Cases
RabbitMQ Client Use Cases
RabbitMQ Message Reliability Use Cases
Usage Instructions for MQTT Protocol Supported by RabbitMQ
Migrate Cluster
Migrating RabbitMQ to Cloud
Step 1. Purchasing a TDMQ Instance
Step 2: Migrating Metadata to the Cloud
Step 3: Enabling Dual Read-Write
API Reference (Managed Edition)
API Overview
API Reference (Serverless Edition)
History
Introduction
API Category
Making API Requests
Relevant APIs for RabbitMQ Serverless PAAS Capacity
RabbitMQ Serverless Instance Management APIs
Data Types
Error Codes
SDK Documentation
SDK Overview
Spring Boot Starter Integration
Spring Cloud Stream Integration
Java SDK
Go SDK
Python SDK
PHP SDK
Security and Compliance
Permission Management
Network Security
Deletion Protection
Change Records
CloudAudit
FAQs
Service Level Agreement
Contact Us

Account Permission Overview

PDF
Mode fokus
Ukuran font
Terakhir diperbarui: 2026-01-04 15:02:27
To perform fine-grained permission management for RabbitMQ resources, you can use the Cloud Access Management (CAM) service to achieve the following features:
User and permission assignment: Create independent users or roles for members of different functional departments based on the enterprise organizational structure. Assign dedicated security credentials (such as the console login password and cloud API key) or request temporary security credentials to ensure secure and controlled access to RabbitMQ resources.
Fine-grained permission control: Set differentiated access policies based on employee responsibilities to precisely control the types of operations each user or role can perform and the scope of resources they can access, achieving strict permission isolation.

Account System Introduction

The capability differences between different account types and the reference documentations are as follows:
Account Type
Root Account
Sub-account
Sub-user
Collaborator
Message Recipient
Definition
Owns all Tencent Cloud resources and can access any of its resources.
Created by the root account and fully owned by the root account that created the sub-user.
Has root account identity and has been added as a collaborator to the current root account. As one of the sub-accounts under the current root account, it can switch back to its root account identity.
Only has the message receiving feature.
Console access
-
Programmatic access
-
Policy authorization
Has all policies by default.
-
Message notification
Reference Documentation
Note:
To ensure the security of your Tencent Cloud account and cloud resource usage, avoid using the Tencent Cloud root account directly to operate resources unless necessary. Instead, create sub-accounts, assign them policies based on the principle of least privilege, and use these sub-accounts with limited permissions to operate your cloud resources.

Policies

Policies are used to define and describe the syntax rules for one or more permissions. By default, the root account has access permissions for all resources under it, while its sub-accounts have no access permissions for any resources under it.
The root account can grant users/user groups the permission to view and use specific resources by associating policies with them. Tencent Cloud policies are categorized into preset policies and custom policies.

Preset Policies

RabbitMQ provides two preset policies for sub-accounts:
TDMQ for RabbitMQ Version
Policy
Description
Managed Edition
QcloudTDMQFullAccess
Full read/write access permissions, which allow you to perform read/write operations in the product console.
QcloudTDMQReadOnlyAccess
Read-only access permissions, which allow you to view related information in the console only.
Serverless Edition
QcloudTrabbitFullAccess
Full read/write access permissions, which allow you to perform read/write operations in the product console.
QcloudTrabbitReadOnlyaccess
Read-only access permissions, which allow you to view related information in the console only.

Custom Policies

If the system permission policy cannot meet your requirements, you can create a custom permission policy to achieve least privilege. Policy settings can be precisely controlled at the [API, resource, users/user group, allowing/denying, condition] dimensions. Using custom permission policies helps achieve fine-grained control of permissions and is an effective means to enhance resource access security.
Currently, Tencent Cloud provides the following two flexible custom policy creation methods to meet different usage habits and requirements:
Visualized editor: adopts a wizard-based approach where users can select cloud services, operations, resources, conditions, and other elements via the page without needing to understand policy syntax. The system automatically generates policies, lowering the barrier to use.
JSON editor: allows editing policy content based on specific requirements after selecting a policy template, or directly writing JSON-formatted policy content in the editor. Suitable for users with a technical background.
Custom policy example
The sub-accounts that are granted this permission policy only have console and API permissions to query the instance list, queue details, connection list, and messages for the instance amqp-xxx.
{
"version": "2.0",
"statement": [
{
"effect": "allow",
"action": [
"tdmq:DescribeRabbitMQConnection",
"tdmq:DescribeRabbitMQMessage",
"tdmq:DescribeRabbitMQQueueDetail",
"tdmq:ListRabbitMQInstances"
],
"resource": [
"qcs::tdmq::uin/1000*****555:cluster/amqp-ae3de8qd"
]
}
]
}

Sub-account Authorization Operations

When a sub-account uses RabbitMQ, permissions need to be granted in two aspects:
Type
Description
Reference Documentation
Permissions to access other cloud products
Permissions to access other cloud product resources, such as Virtual Private Cloud (VPC) and Cloud Virtual Machine (CVM,) during the use of RabbitMQ, for example, to view the availability zone (AZ) information of the user's subnet.
Read/Write permissions for RabbitMQ resources
Obtain read/write permissions for RabbitMQ resources.

Documentation

Purpose
Link
Understand the relationship between policies and users.
Understand the basic structure of a policy.
Understand which other products support CAM.


Bantuan dan Dukungan

Apakah halaman ini membantu?

masukan