检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Synchronizing IAM Users to the Database Function This API is used to synchronize IAM users to the database. Call Method For details, see Calling APIs.
With IAM, you can use your Huawei Cloud account to create IAM users, and assign permissions to the users to control their access to specific resources.
Otherwise, contact the IAM account administrator to grant your IAM account this permission.
For example, to obtain the IAM token in the CN-Hong Kong region, obtain the endpoint of IAM (iam.ap-southeast-1.myhuaweicloud.com) for this region and the resource-path (/v3/auth/tokens) in the URI of the API used to obtain a user token.
In this way, IAM implements fine-grained permission management.
IAM provides identity authentication, fine-grained permissions management, and access control. IAM helps you secure access to your cloud resources.
If your Huawei Cloud account does not need individual IAM users for permissions management, skip this section. IAM can be used free of charge. You pay only for the resources in your account. For more information about IAM, see Service Overview.
Related Services IAM GaussDB(DWS) uses Identity and Access Management (IAM) for authentication and authorization. Users who have the DWS Administrator permissions can fully utilize GaussDB(DWS).
Currently, the GaussDB(DWS) cluster supports two login modes: custom (username + password) and IAM account. Custom login is the default login mode. With IAM account login, you create an IAM user in the database and use a token to log in.
Using GaussDB(DWS) with IAM This section describes how to use IAM to implement fine-grained permissions control for your GaussDB(DWS) resources. With IAM, you can: Create IAM users for employees based on the organizational structure of your enterprise.
IAM or enterprise projects: Type of projects for which an action will take effect. Policies that contain actions supporting both IAM and enterprise projects can be assigned to user groups and take effect in both IAM and Enterprise Management.
IAM permissions: This problem occurs when a user has only an IAM account. In this case, permissions such as VPC and EVC/BMS permissions need to be assigned to the IAM account. Or, the user can use the master account to perform scaling out.
For security purposes, create Identity and Access Management (IAM) users and grant them permissions for routine management. Users An IAM user is created using an account to use cloud services. Each IAM user has its own identity credentials (password and access keys).
Authentication and Access Control Resource Access Control (IAM Permission Control) Separation of Database Access Permissions Permissions Management Using GRANT and REVOKE Row-Level Access Control Parent topic: Security
Managing Database Permissions Synchronizing IAM Users to the Database Querying All Database Users and Roles Querying User Information Modifying User Information Modifying Database Object Permissions Querying Database Object Permissions Obtaining the Cluster O&M Account Status Perform
Using the JDBC and ODBC Drivers to Connect to a Cluster Development Specifications JDBC Version Description Downloading the JDBC or ODBC Driver Using JDBC to Connect to a Cluster Configuring JDBC to Connect to a Cluster (Load Balancing Mode) Configuring JDBC to Connect to a Cluster (IAM
For details, see IAM Basic Information. After operation protection is enabled, when you perform a mission-critical operation, the system will protect the operation.
Log in to the IAM console and create a custom policy.
When using a token for authentication, cache it to prevent frequently calling the IAM API used to obtain a user token.
Using JDBC to Connect to a Cluster Using ODBC to Connect to a Cluster Using the Third-Party Function Library psycopg2 of Python to Connect to a Cluster Using the Python Library PyGreSQL to Connect to a Cluster Configuring JDBC to Connect to a Cluster (IAM Authentication Mode) Parent