检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
For security purposes, create IAM users and grant them permissions for routine management. User An IAM user is created by an account in IAM to use cloud services. Each IAM user has its own identity credentials (password and access keys).
Procedure Description 1 Using IAM to Grant CNAD Permissions Use Identity and Access Management (IAM) to grant fine-grained CNAD service permissions to users. 2 Purchasing a CNAD Instance Purchase a CNAD instance based on service requirements. 3 Adding a Protection Policy Configure
It is automatically enabled when you purchase an EIP. 2 Using IAM to grant Anti-DDoS permissions Use Identity and Access Management (IAM) to grant fine-grained Anti-DDoS service permissions to users. 3 Configuring an EIP protection policy You can set a traffic scrubbing threshold
CNAD Basic (Anti-DDoS) User Guide Anti-DDoS Overview Using IAM to Grant Anti-DDoS Permissions Setting a Traffic Scrubbing Threshold to Intercept Attack Traffic Setting DDoS Alarm Notifications Enabling DDoS Alarm Notifications Enabling Logging Adding a Tag to an EIP Viewing an EIP
CNAD Advanced (CNAD) Operation Guide CNAD Overview Using IAM to Grant CNAD Permissions Purchasing a CNAD Instance Adding a Protection Policy Adding a Protected Object Enabling Alarm Notifications for DDoS Attacks Enabling Logging Viewing Statistics Reports Managing Instances Managing
Advanced Anti-DDoS User Guide AAD Overview Using IAM to Grant AAD Permissions Purchasing an AAD Instance Connecting Services to AAD Configuring a Protection Policy Enabling Alarm Notifications for DDoS Attacks Enabling Logging Viewing Statistics Managing Instances Managing Domain
Procedure Description 1 Using IAM to Grant AAD Permissions Use Identity and Access Management (IAM) to grant fine-grained AAD permissions to users. 2 Purchasing an AAD Instance Purchase an AAD instance based on service requirements. 3 Connecting Services to AAD Connect the domain
{Endpoint} is the IAM endpoint and can be obtained from Regions and Endpoints. For details about API authentication, see Authentication.
When using a token for authentication, cache it to prevent frequently calling the IAM API used to obtain a user token. A token specifies temporary permissions in a computer system.