检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
To identify the entity that uses an access key, create an IAM user with the same name as the corresponding IAM user or your account. Click OK. Obtain an access key for the IAM user. Log in to the IAM console as an administrator and select the EU-Dublin region.
For details about how to obtain the project ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
For details about how to obtain the project ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer. URI DELETE /v3.0/OS-ROLE/roles/{role_id} Table 1 URI parameters Parameter Mandatory Type Description role_id Yes String Custom policy ID.
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer. URI DELETE /v3/OS-FEDERATION/identity_providers/{id} Table 1 URI parameters Parameter Mandatory Type Description id Yes String ID of the identity provider to be deleted.
In the case of a custom policy for agencies, this parameter should be set to "Action": ["iam:agencies:assume"]. Effect String Effect of the permission. The value can be Allow or Deny.
For details about how to obtain the agency ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
For details about how to obtain the account ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
Request Parameters Table 2 Parameters in the request header Parameter Mandatory Type Description X-Auth-Token Yes String Authenticated token with iam:permissions:listEnterpriseProjectsForGroup or Security Administrator permission.
IAM provides a limited number of roles for permissions management. Huawei Cloud services interwork with each other. Roles of some services take effect only if they are assigned along with roles of other services. For more information, see Assigning Dependency Roles.
You cannot modify or delete your account in IAM, but you can do so in My Account. IAM User You can use your account to create IAM users and assign permissions for specific resources.
For details about how to obtain a user group ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
For details about the relationship between accounts and IAM users, see Relationship Between an Account and Its IAM Users. name Yes String IAM username. password Yes String Password of the IAM user.
Querying a Metadata File Function This API is provided for the administrator to query the metadata file imported to IAM for an identity provider. The API can be called using both the global endpoint and region-specific endpoints. For IAM endpoints, see Regions and Endpoints.
", "display_name" : "IAMAgencyPolicy", "type" : "AX", "policy" : { "Version" : "1.1", "Statement" : [ { "Action" : [ "iam:agencies:assume" ], "Resource" : { "uri" : [ "/iam/agencies/07805acaba800fdd4fbdc00b8f888..." ] },
As mentioned, IAM is responsible for the security of the service itself and provides a secure data protection mechanism. Tenants are responsible for the secure use of IAM services, including security parameter configuration and permission splitting and granting by enterprises.
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer. URI PATCH /v3/OS-FEDERATION/identity_providers/{id} Table 1 URI parameters Parameter Mandatory Type Description id Yes String ID of the identity provider to be updated.
For details about how to obtain a user group ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer.
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer.