检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token.
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Authorization No String Authentication information. This parameter is mandatory for AK/SK authentication.
{Endpoint} indicates the endpoint of IAM, which can be obtained from Endpoints. For details about API authentication, see Authentication. The following is an example response.
{Endpoint} indicates the endpoint of IAM, which can be obtained from Endpoints. For details about API authentication, see Authentication. The following is an example response.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token.
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Authorization No String Authentication information. This parameter is mandatory for AK/SK authentication.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Access-Control-Allow-Internal No String Service authentication token.
After assigning an IAM user the Live FullAccess permission, you need to assign the user the following Cloud Eye permissions to monitor metrics of Live: CES ReadOnlyAccess: On the Cloud Eye console, choose Cloud Service Monitoring > Live to view resource monitoring metrics of Live.
If you need to call a Live API in another region, replace the endpoint with the IAM endpoint of the region.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Access-Control-Allow-Internal No String Service authentication token.
Commercial use Querying Stream Data 2 Live allows using IAM to manage permissions on Live resources. You can manage permissions on Live resources in a refined manner.
If you need to call a Live API in another region, replace the endpoint with the IAM endpoint of the region.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Access-Control-Allow-Internal No String Service authentication token.
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Authorization No String Authentication information. This parameter is mandatory for AK/SK authentication.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Access-Control-Allow-Internal No String Service authentication token.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Access-Control-Allow-Internal No String Service authentication token.
When a new IAM user uses Media Live for the first time, they need to configure the permission to create a domain name. Adding Domain Names of Media Live Add the ingest and streaming domain names to Live. The following describes how to add an ingest domain name.
When a new IAM user uses Media Live for the first time, they need to configure the permission to create a domain name. Notes An area needs to be specified for stream push, and the streaming domain name needs to be associated with an ingest domain name.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token.
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Authorization No String Authentication information. This parameter is mandatory for AK/SK authentication.