检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Must I Use an IAM User (Sub Account) to Configure Transfer on CTS and Perform Operations on an OBS Bucket? No. You only need to ensure that you have the permissions to perform operations on OBS buckets. Parent topic: FAQs
Must I Use an IAM User (Sub Account) to Configure Transfer on CTS and Perform Operations on an OBS Bucket? No. You only need to ensure that you have the permissions to perform operations on OBS buckets. Parent topic: FAQs
Must I Use an IAM User (Sub Account) to Configure Transfer on CTS and Perform Operations on an OBS Bucket? No. You only need to ensure that you have the permissions to perform operations on OBS buckets.
Relationship Between IAM Identities and Operators Huawei Cloud IAM provides the following types of identities: IAM users, IAM agencies, cloud service agencies, IAM Identity Center users, and federated users.
What Should I Do If I Cannot Enable CTS as an IAM User? Background If you fail to enable CTS as an IAM user, perform the following steps. Procedure Check whether the IAM user has the permission. If yes, go to 2.
How Do I Find Out the Login IP Address of an IAM User? Background If you want to check if there are security risks in your account by examining the login IP addresses and login time of IAM users, you can view traces recorded by CTS. Prerequisites You have enabled CTS.
The token obtained from IAM is valid for only 24 hours. If you want to use the same token for authentication, you can cache it to avoid frequent calling of the IAM API.
IAM or enterprise projects: Type of projects for which an action will take effect. Policies that contain actions for both IAM and enterprise projects can be used and take effect for both IAM and Enterprise Management.
Replace the fields in bold with the actual values. accountid: ID of the account to which the IAM user belongs. username: name of the IAM user to be created. email: email address of the IAM user. **********: password of the IAM user. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
How Do I Find Out the Login IP Address of an IAM User? Background If you want to check if there are security risks in your account by examining the login IP addresses and login time of IAM users, you can view traces recorded by CTS. Prerequisites You have enabled CTS.
How Do I Find Out the Login IP Address of an IAM User? Background If you want to check if there are security risks in your account by examining the login IP addresses and login time of IAM users, you can view traces recorded by CTS. Prerequisites You have enabled CTS.
For example, the endpoint of IAM in the ME-Abu Dhabi region is iam.ae-ad-1.myhuaweicloud.com. resource-path: Access path of an API for performing a specified operation. Obtain the path from the URI of an API.
The cts_admin_trust agency of IAM contains the following permissions: OBS Administrator KMS Administrator SMN Administrator
IAM or enterprise projects: Type of projects for which an action will take effect. Policies that contain actions for both IAM and enterprise projects can be used and take effect for both IAM and Enterprise Management.
Making an API Request This section describes the structure of a REST API request, and uses the IAM API for obtaining a user token as an example to demonstrate how to call an API. The obtained token can then be used to authenticate the calling of other APIs.
agencies:listAgencies iam:agencies:createAgency iam:permissions:grantRoleToAgencyOnProject iam:permissions:listRolesForAgencyOnProject iam:projects:listProjects iam:groups:listGroups iam:users:listUsers iam:users:listUsersForGroup Creating a key event notification cts:notification
Permissions Management This chapter describes how to use IAM for fine-grained permissions control for your CTS resources. With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure.
If your account does not require IAM users for permissions management, you may skip this section. IAM can be used free of charge. You pay only for the resources in your account. For details, see IAM Service Overview.
Permissions Management You can use Identity and Access Management (IAM) for fine-grained permissions control for your CTS. With IAM, you can: Create IAM users for personnel based on your enterprise's organizational structure.
Permissions Management This chapter describes how to use IAM for fine-grained permissions control for your CTS resources. With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure.