检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
IAM权限是作用于云资源的,IAM权限定义了允许和拒绝的访问操作,以此实现云资源权限访问控制。管理员创建IAM用户后,需要将用户加入到一个用户组中,IAM可以对这个组授予VPCEP所需的权限,组内用户自动继承用户组的所有权限。 详情请参见权限管理。
", "name": "IAMUser", "description": "IAM User Description", "areacode": "", "phone": "", "email
访问所连接的终端节点服务的IPv6的地址。
ip String 访问所连接的终端节点服务的IP。 仅当同时满足如下条件时,返回该参数: 当查询连接interface类型终端节点服务的终端节点时。 终端节点服务启用“连接审批”功能,且已经“接受”连接审批。
pendingAcceptance:待接受 creating:创建中 accepted:已接受 rejected:已拒绝 failed:失败 deleting:删除中 ip String 访问所连接的终端节点服务的IP。
ip String 访问所连接的终端节点服务的IP。 仅当同时满足如下条件时,返回该参数: 当查询连接interface类型终端节点服务的终端节点时。 终端节点服务启用“连接审批”功能,且已经“接受”连接审批。
ip String 访问所连接的终端节点服务的IP。 仅当同时满足如下条件时,返回该参数: 当查询连接interface类型终端节点服务的终端节点时。 终端节点服务启用“连接审批”功能,且已经“接受”连接审批。
": "IAM User Description" } } 到此为止,一个API请求所需要的内容已经准备完成,您可以使用curl、Postman或直接编写代码等方式发送请求调用API。
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
pendingAcceptance:待接受 creating:创建中 accepted:已接受 rejected:已拒绝 failed:失败 deleting:删除中 description String 终端节点连接描述。
- endpoint:虚拟IP,适用于作为虚IP场景使用 请求参数 表2 请求Header参数 参数 是否必选 参数类型 描述 X-Auth-Token 是 String 用户Token。
"is_domain": false, "parent_id": "65ewtrgaggshhk1223245sghjlse684b", "name": "project_name", "description
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure
It is recommended that the AK and SK be stored in ciphertext in configuration files or environment variables and decrypted during use to ensure