检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Can I Enable IoTDA for IAM Users or Sub-Projects? 1. You can enable IoTDA as an Identity and Access Management (IAM) user. However, the enabled IoTDA service belongs to the IAM master account. That is, the master account is the payment entity. 2.
To assign permissions of the IoTDA FullAccess policy to the user group that the IAM user belongs to, do as follows: Procedure: Visit IAM and click Try Free to access the IAM console. In the navigation pane, choose User Groups. Click Authorize in the row of the target user group.
"iam:permissions:revokeRoleFromAgencyOnDomain", "iam:permissions:checkRoleForAgencyOnProject", "iam:permissions:checkRoleForAgencyOnDomain", "iam:roles:createRole", "iam:roles:listRoles",
Roles are provided by IAM to define service-based permissions that match user's job responsibilities.
When you use the new domain name, the IAM API for authentication is called, and the Huawei Cloud account and password need to be carried in the request.
IAM permissions define which actions on your cloud resources are allowed or denied. After creating an IAM user, the administrator needs to add it to a user group and grant the permissions required by IoTDA to the user group.
Can I Enable IoTDA for IAM Users or Sub-Projects? Which Regions of Huawei Cloud Are Supported by the IoT Platform? Does Huawei Provide Modules, Hardware Devices, and Application Software? What Should I Do If I Want to Call an API But Have No Permissions to Do So as an IAM User?
Debugging the API Obtaining the Token for an IAM User Before using platform APIs, an application must call the API Obtaining the Token of an IAM User for authentication. After the authentication is successful, Huawei Cloud returns X-Subject-Token.
On the IAM console, choose Agencies, locate the iotda_admin_trust agency, and grant KMS Administrator and OBS OperateAccess permissions to the agency.
After configuring Postman, debug the following APIs when the application simulator connects to IoTDA using HTTPS: Obtaining the Token for an IAM User Listing Projects Accessible to an IAM User Creating a Product Querying a Product Creating a Device Querying a Device Advanced Experience
You can obtain the token by calling the IAM API Obtaining a User Token Through Password Authentication. In the returned response header, X-Subject-Token is the desired user token. For details about how to obtain the token, see Token Authentication.
An agency named iotda_admin_trust is created on the Identity and Access Management (IAM) console and an administrator role is bound by default. Figure 1 Agency - iotda_admin_trust Parent topic: Rules
Obtain the token by calling the IAM API for obtaining a user token through password authentication. In the returned response header, X-Subject-Token is the desired user token. For details about how to obtain the token, see Token Authentication.
Obtain the token by calling the IAM API for obtaining a user token through password authentication. In the returned response header, X-Subject-Token is the desired user token. For details about how to obtain the token, see Token Authentication.
Users An Identity and Access Management (IAM) user is created by an account to use cloud services. Each IAM user has its own identity credentials (password and access keys). An IAM user can view the account ID and user ID on the My Credentials page of the management console.
Obtain the token by calling the IAM API for obtaining a user token through password authentication. In the returned response header, X-Subject-Token is the desired user token. For details about how to obtain the token, see Token Authentication.
You can obtain the token by calling the IAM API Obtaining a User Token Through Password Authentication. In the returned response header, X-Subject-Token is the desired user token. For details about how to obtain the token, see Token Authentication.
You can obtain the token by calling the IAM API Obtaining a User Token Through Password Authentication. In the returned response header, X-Subject-Token is the desired user token. For details about how to obtain the token, see Token Authentication.
You can obtain the token by calling the IAM API Obtaining a User Token Through Password Authentication. X-Subject-Token in the response header returned by the API is the desired user token. For details about how to obtain the token, see Token Authentication.
Obtain the token by calling the IAM API for obtaining a user token through password authentication. In the returned response header, X-Subject-Token is the desired user token. For details about how to obtain the token, see Token Authentication.