检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Creating a User and Granting SFS Turbo Permissions This section describes how to use IAM to implement fine-grained permissions control for your SFS Turbo resources. With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure.
Obtaining Access Keys (AK/SK) To access SFS using access keys as an IAM user, the programmatic access must be enabled. For details, see Viewing or Modifying IAM User Information. When calling an API, you need to use the AK/SK to verify the signature.
You can use IAM to securely control access to your SFS Turbo resources. Table 1 SFS Turbo access control Method Description Reference Permissions control IAM permissions IAM permissions define which actions on your cloud resources are allowed or denied.
For example, to obtain an IAM token in the CN-Hong Kong region, obtain the endpoint of IAM (iam.ap-southeast-1.myhuaweicloud.com) for this region and the resource-path (/v3/auth/tokens) in the URI of the API used to obtain a user token.
Policies that contain actions for both IAM and enterprise projects can be used and applied for both IAM and Enterprise Management. Policies that only contain actions for IAM projects can be used and applied to IAM only.
IAM is a free service. You only pay for the resources in your account. For more information about IAM, see IAM Service Overview. SFS Turbo Permissions New IAM users do not have any permissions assigned by default.
The token obtained from IAM is valid for only 24 hours. If you want to use one token for authentication, you can cache it to avoid frequently calling.
For security purposes, create Identity and Access Management (IAM) users and grant them permissions for routine management. User An IAM user is created by an account in IAM to use cloud services. Each IAM user has its own identity credentials (password and access keys).
name "password": "********", // IAM user password "domain": { "name": "domainname" // Name of the account to which the IAM user belongs } } } }, "scope
When employees in your enterprise need to use SFS Turbo, the enterprise administrator can use IAM to create users and control these users' permissions on enterprise resources.
All Permissions SFS Turbo uses Identify and Access Management (IAM) for permissions management. You can control the read and write permissions of file systems by granting IAM users fine-grained SFS Turbo permissions using IAM custom policies.
Released in: all regions Creating an SFS Turbo File System Permissions Management SFS Turbo uses IAM to manage permissions. You can use IAM custom policies to grant IAM users fine-grained SFS Turbo permissions to control the read and write permissions of file systems.
SFS Turbo Actions File System Permission API Action Dependencies IAM Project (Project) Enterprise Project (Enterprise Project) Creating a File System POST /v1/{project_id}/sfs-turbo/shares sfsturbo:shares:createShare Creating an SFS Turbo file system requires VPC-related permissions
{Endpoint} is the IAM endpoint and can be obtained from Regions and Endpoints. For details about API authentication, see Authentication. The following is an example response.
An IAM user assigned the SFS Turbo ReadOnlyAccess policy does not need to have the VPC ReadOnlyAccess policy assigned explicitly. Procedure Log in to the SFS Turbo console. In the file system list, view the file systems you have created.
If the permissions granted to an IAM user contain both "Allow" and "Deny", the "Deny" permissions take precedence over the "Allow" permissions.
An IAM user assigned the SFS Turbo Full Access policy does not need to have the VPC FullAccess policy assigned explicitly. To create yearly/monthly file systems, the BSS Administrator policy is required.