检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
IAM Projects and Enterprise Projects Creating an IAM Project and Assigning Permissions Creating an IAM Project Go to the management console, hover over the username in the upper right corner, and choose Identity and Access Management from the drop-down list.
IAM Projects and Enterprise Projects IAM Projects Projects in IAM group and isolate OpenStack resources (compute, storage, and network resources). Resources in your account must be mounted under projects. Each project can be a department or a project team.
permissions:grantRoleToAgencyOnProject iam:agencies:listAgencies iam:roles:listRoles iam:agencies:getAgency iam:agencies:createAgency iam:permissions:listRolesForAgency iam:permissions:listRolesForAgencyOnProject iam:permissions:listRolesForAgencyOnDomain
With IAM, you can: Create IAM users for employees based on the organizational structure of your enterprise. Each IAM user has their own security credentials to access EG resources. Grant only the permissions required for users to perform a specific task.
View this agency on the IAM console. Table 2 Permissions of EG_DELEGATE_FG_AGENCY Permission Description VPC Administrator Required for FunctionGraph to connect to VPC when you create a connection.
OpenSchema 1.0 CloudEvents SDKs and APIs supported High Concurrency and Availability Tens of millions of concurrent events Distributed cluster-based deployment with 99.99% availability and strong disaster recovery (DR) Security and Reliability Connected to Identity and Access Management (IAM
If you use an IAM user account, contact the Huawei Cloud account administrator to authorize you to use the EG service. Logging In to the EG Console Log in to Huawei Cloud console. Click and select a region.
PASSWORD: IAM user password. DOMAIN_NAME: Account name. IAM_ENDPOINT: IAM endpoint. For details, see Regions and Endpoints. PROJECT_ID: The project ID. Obtain it by referring to API Credentials. CHANNEL_ID: Obtain a channel ID by referring to Collecting Information.
Example: account1,account2 Policy { "Sid": "allow_account_to_put_events", "Effect": "Allow", "Principal": { "IAM": [] }, "Action": "eg:channels:putEvents", "Resource": "urn:eg:cn-north-7:eeb7f0f587674635a3669e1d63013316:channel:" } NOTE: The policy is read-only and
Table 1 Cloud service event sources Cloud Application Engine (CAE) Database and Application Migration (UGO) Classroom Content Moderation Virtual Private Cloud (VPC) CodeCheck GaussDB NoSQL API Gateway (APIG) Data Warehouse Service (DWS) CloudDeploy Identity and Access Management (IAM