检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Elastic Volume Service (EVS) The Organizations service provides Service Control Policies (SCPs) to set access control policies. SCPs do not actually grant any permissions to a principal. They only set the permissions boundary for the principal.
Service Name Reference 1 Cloud Backup and Recovery (CBR) Cloud Backup and Recovery (CBR) 2 Elastic Volume Service (EVS) Elastic Volume Service (EVS) 3 Scalable File Service Turbo (SFS Turbo) Scalable File Service Turbo (SFS Turbo) Networking No.
Storage Cloud Backup and Recovery (CBR) Elastic Volume Service (EVS) Scalable File Service Turbo (SFS Turbo) Parent topic: Actions Supported by SCP-based Authorization
disk to multiple ECSs in a batch. write instance * evs:Encrypted ecs:KmsKeyId ecs:VolumeId evs:Encrypted ecs:cloudServers:showServer Grants permission to query ECS details. read instance * - ecs:cloudServers:attach Grants permission to attach disks to an ECS. write instance * evs
order:pay billing:contract:viewDiscount vpc:vpcs:get vpc:subnets:get vpc:securityGroups:get vpc:securityGroups:create vpc:ports:get vpc:ports:create vpc:ports:update vpc:securityGroupRules:get vpc:securityGroupRules:create vpc:quotas:list cbr:backups:get cbr:vaults:addResources evs
Volume Service (EVS) Volume FunctionGraph Functions Global Accelerator (GA) Accelerators Listeners GaussDB Instances GaussDB(for MySQL) Instances GeminiDB (originally named GaussDB for NoSQL) Instances Identity and Access Management (IAM) Agencies Users Image Management Service (
Enterprise Project Management Service (EPS) Organizations provides your with Service Control Policies for access control. SCPs do not actually grant any permissions to a principal. They only set the permissions boundary for the principal. When SCPs are attached to an organizational
instance:loginInstance - PUT /v2/{project_id}/cbs/instance/password cbh:instance:resetInstancePassword - PUT /v2/{project_id}/cbs/instance/login-method cbh:instance:resetInstanceLoginMethod - DELETE /v2/{project_id}/cbs/instance cbh:instance:deleteInstance - cbh:instance:alterInstance evs
write instance* g:EnterpriseProjectId g:ResourceTag/<tag-key> bms:KmsKeyId evs:Encrypted bms:VolumeType bms:VolumeId bms:servers:detachVolume Grants permission to detach EVS disks from a BMS. write instance* g:EnterpriseProjectId g:ResourceTag/<tag-key> bms:servers:updateMetadata
Encrypted g:EnterpriseProjectId cce:nodepool:delete Grants permission to delete a node pool. write cluster * g:EnterpriseProjectId cce:nodepool:updateNodepool Grants permission to update a node pool. write cluster * - - evs:Encrypted g:EnterpriseProjectId cce:nodepool:getNodepool
subnets:get vpc:vpcs:list vpc:ports:get vpc:ports:create vpc:ports:update vpc:securityGroups:get vpc:securityGroups:create vpc:securityGroups:delete vpc:securityGroupRules:create vpc:securityGroupRules:delete vpc:quotas:list eip:publicIps:list eip:publicIps:get eip:publicIps:create evs
Table 2 Actions and dependencies supported by CSS APIs API Action Dependency POST /v1.0/{project_id}/clusters css:cluster:create ecs:cloudServerFlavors:get evs:types:get vpc:vpcs:list vpc:securityGroups:list vpc:securityGroups:get vpc:subnets:list vpc:subnets:get vpc:ports:create
Public services, such as Elastic Cloud Server (ECS), Elastic Volume Service (EVS), Object Storage Service (OBS), Virtual Private Cloud (VPC), Elastic IP (EIP), and Image Management Service (IMS), are shared within the same region.
ecs:cloudServers:showServer ecs:cloudServers:attach evs:volumes:use ecs:cloudServers:stop ecs:cloudServers:start ecs:cloudServers:detachVolume evs:volumes:delete evs:snapshots:delete evs:volumes:get PUT /v3/sources/{source_id}/diskinfo sms:server:updateDiskInfo - GET /v3/sources/
volumes:list POST /v3/{project_id}/checkpoints/sync cbr:vaults:sync - POST /v3/{project_id}/vaults cbr:vaults:create ecs:cloudServers:listServersDetails evs:volumes:list POST /v3/{project_id}/vaults/order cbr:vaults:create ecs:cloudServers:listServersDetails evs:volumes:list GET
types:get evs:volumes:use ims:images:get vpc:subnets:list DELETE /v3/{project_id}/keypairs/{keypair_name}/private-key kps:SSHKeyPair:clearPrivateKey - Table 8 Actions and dependencies supported by Dedicated HSM APIs API Action Dependent Permission GET /v1/{project_id}/dew/hsms/{hsm_id