检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
          • All
          • Products
          • Solutions
          • Documentation
          • KooGallery
          • Developer
          • Learn
          • More
          9441 results found
          • Creating an IAM User and Granting DMS for RocketMQ Permissions - Distributed Message Service for RocketMQ

            Creating an IAM User and Granting DMS for RocketMQ Permissions - Distributed Message Service for RocketMQ

            With IAM, you can: Create IAM users for personnel based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing DMS for RocketMQ resources.

            Help > Distributed Message Service for RocketMQ > User Guide > Permissions Management
          • Creating an IAM User and Granting DMS for Kafka Permissions - Distributed Message Service for Kafka

            Creating an IAM User and Granting DMS for Kafka Permissions - Distributed Message Service for Kafka

            With IAM, you can: Create IAM users for personnel based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing DMS for Kafka resources.

            Help > Distributed Message Service for Kafka > User Guide > Permissions Management
          • Ingesting Logs to LTS Across IAM Accounts - Log Tank Service

            Ingesting Logs to LTS Across IAM Accounts - Log Tank Service

            If the delegator account deletes the agency from IAM after cross-account ingestion is configured, LTS will not detect the deletion and the ingestion configuration will continue to take effect.

            Help > Log Tank Service > User Guide > Log Ingestion
          • Accessing OBS Using Temporary Access Keys of an IAM Agency - Object Storage Service

            Accessing OBS Using Temporary Access Keys of an IAM Agency - Object Storage Service

            Accessing OBS Using Temporary Access Keys of an IAM Agency The IAM agency is a function of Identity and Access Management (IAM).

            Help > Object Storage Service > Permissions Configuration Guide > Access Requests
          • Using IAM to Grant Access to FlexusRDS - Huawei Cloud Flexus-Huawei Cloud Flexus RDS

            Using IAM to Grant Access to FlexusRDS - Huawei Cloud Flexus-Huawei Cloud Flexus RDS

            Using IAM to Grant Access to FlexusRDS Creating a User and Granting Permissions for FlexusRDS FlexusRDS Custom Policies Parent topic: Working with FlexusRDS for MySQL

            Help > Huawei Cloud Flexus-Huawei Cloud Flexus RDS > User Guide > Working with FlexusRDS for MySQL
          • Using IAM to Grant Anti-DDoS Permissions - Anti-DDoS Service

            Using IAM to Grant Anti-DDoS Permissions - Anti-DDoS Service

            Using IAM to Grant Anti-DDoS Permissions Creating a User Group and Assigning the Anti-DDoS Access Permission Anti-DDoS Custom Policies Anti-DDoS Permissions and Actions Permission Dependency of the Anti-DDoS Console Parent Topic: CNAD Basic (Anti-DDoS) User Guide

            Help > Anti-DDoS Service > User Guide > CNAD Basic (Anti-DDoS) User Guide
          • Using IAM to Grant CNAD Permissions - Anti-DDoS Service

            Using IAM to Grant CNAD Permissions - Anti-DDoS Service

            Using IAM to Grant CNAD Permissions Creating a User and Granting the CNAD Access Permission CNAD Pro Custom Policies CNAD Pro Permissions and Actions Permission Dependency of the CNAD Console Parent Topic: CNAD Advanced (CNAD) Operation Guide

            Help > Anti-DDoS Service > User Guide > CNAD Advanced (CNAD) Operation Guide
          • Why Can't an IAM User View Any CodeArts Projects After Login? - CodeArts

            Why Can't an IAM User View Any CodeArts Projects After Login? - CodeArts

            Why Can't an IAM User View Any CodeArts Projects After Login? Symptom An administrator has created an IAM user for a team member. After the member logs in to the system as an IAM user, no project is displayed on the page.

            Help > CodeArts > FAQs > General
          • Assigning SFS Turbo Folder-Level Access Permissions to an IAM User - ModelArts

            Assigning SFS Turbo Folder-Level Access Permissions to an IAM User - ModelArts

            Assigning SFS Turbo Folder-Level Access Permissions to an IAM User Scenario Grant access permission of specific SFS Turbo folders to IAM users. Granting the IAM user the SFS Turbo folder-level access permission is a whitelist function.

            Help > ModelArts > Best Practices > Permissions Management > Configuration Practices in Typical Scenarios
          • IAM Users, Project Members, and Repository Members - CodeArts Repo

            IAM Users, Project Members, and Repository Members - CodeArts Repo

            IAM Users, Project Members, and Repository Members Relationships Between IAM Users, Project Members, and Repository Members Repository members come from members of the project to which the repository belongs. Project members mainly come from IAM users of tenants.

            Help > CodeArts Repo > User Guide > Managing Member Permissions
          • Using IAM Roles or Policies to Grant Access to DLI - Data Lake Insight

            Using IAM Roles or Policies to Grant Access to DLI - Data Lake Insight

            Using IAM Roles or Policies to Grant Access to DLI The role/policy-based authorization model provided by Identity and Access Management (IAM) lets you control access to DLI resources.

            Help > Data Lake Insight > User Guide > DLI Permission Management > IAM Permission Management
          • Configuring the JDBC Connection to Connect to a Cluster Using IAM Authentication - Data Warehouse Service

            Configuring the JDBC Connection to Connect to a Cluster Using IAM Authentication - Data Warehouse Service

            AccessKeyID and SecretAccessKey are the access key ID and secret access key corresponding to the IAM user specified by DbUser. Set DbUser to the IAM username. Note that the current version does not support hyphens (-) in the IAM username.

            Help > Data Warehouse Service > User Guide(ME-Abu Dhabi Region) > Cluster Connection > Using the JDBC and ODBC Drivers to Connect to a Cluster > Connecting to a Cluster Using IAM Authentication
          • How Can an IAM User Receive Alarm Notifications? - Cloud Eye

            How Can an IAM User Receive Alarm Notifications? - Cloud Eye

            How Can an IAM User Receive Alarm Notifications? To enable an IAM user to receive alarm notifications, subscribe the email address or phone number of the user to an SMN topic and select the topic when you create alarm rules.

            Help > Cloud Eye > FAQs > Product Usage > Alarm Management
          • What If I Cannot Enable CTS as an IAM User? - Cloud Trace Service

            What If I Cannot Enable CTS as an IAM User? - Cloud Trace Service

            What If I Cannot Enable CTS as an IAM User? Background If you fail to enable CTS as an Identity and Access Management (IAM) user, perform the following steps. Procedure Check whether the IAM user has the permission. If yes, go to 2.

            Help > Cloud Trace Service > FAQs > Product Consulting
          • What Should I Do If the IAM Account Permissions Are Abnormal? - Cloud Eye

            What Should I Do If the IAM Account Permissions Are Abnormal? - Cloud Eye

            What Should I Do If the IAM Account Permissions Are Abnormal? To use server monitoring, IAM users in a user group must have the Security Administrator permissions. If they do not have the permissions, a message indicating abnormal permissions is displayed.

            Help > Cloud Eye > FAQs > Troubleshooting > Permissions Management
          • What Are the Differences Between IAM Users and Enterprise Member Accounts? - Identity and Access Management

            What Are the Differences Between IAM Users and Enterprise Member Accounts? - Identity and Access Management

            What Are the Differences Between IAM Users and Enterprise Member Accounts? IAM Users IAM users are created using an account in IAM or Enterprise Management (User Management page). They are managed and granted permissions by the account.

            Help > Identity and Access Management > FAQs > Project Management
          • What Are the Differences Between IAM Users and Enterprise Member Accounts? - Enterprise Management

            What Are the Differences Between IAM Users and Enterprise Member Accounts? - Enterprise Management

            What Are the Differences Between IAM Users and Enterprise Member Accounts? IAM Users IAM users are created using an account in IAM or Enterprise Management (User Management page). They are managed and granted permissions by the account.

            Help > Enterprise Management > User Guide > Project Management > FAQs
          • Can I Use an IAM Account to Purchase IoT Data? - Global SIM Link

            Can I Use an IAM Account to Purchase IoT Data? - Global SIM Link

            Can I Use an IAM Account to Purchase IoT Data? Yes, but the IAM account must have the GSL FullAccess permission, and the creation, payment, and viewing of orders require authorization from the Billing Center (BSS).

            Help > Global SIM Link > FAQs > Purchase
          • Assigning Agency Permissions to an IAM User - Identity and Access Management

            Assigning Agency Permissions to an IAM User - Identity and Access Management

            To authorize IAM users to manage these resources, assign permissions to the users. You can authorize an IAM user to manage resources for all delegating parties, or authorize the user to manage resources for a specific delegating party.

            Help > Identity and Access Management > User Guide > Agency Management > Delegating Another Account for Resource Management
          • What Are the Differences Between IAM and Enterprise Management? - Enterprise Management

            What Are the Differences Between IAM and Enterprise Management? - Enterprise Management

            Resource isolation IAM allows you to create multiple projects in a region for resource isolation. An IAM project can contain resources of only one region.

            Help > Enterprise Management > User Guide > Project Management > FAQs
          Total results: 9441
          • Previous
          • 1
          • ...
          • 10
          • 11
          • 12
          • ...
          • 473
          • Next
          • Go
          Load More
          Was this helpful?
          Feedback
          /200
          Submit Cancel
          Contact Sales After-Sales Self Service
          • Site Terms
          • Privacy Statement

          Explore Huawei Cloud

          Why Us Customer Stories Trust Center Legal Press Releases

          Featured Services

          Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

          Service and Support

          Documentation Contact Us Public Notices Support Plans Service Health Dashboard

          Account and Payment

          Top Up Invoices Billing Center My Account Payment Method

          Quick Links

          Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

          © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

          • Site Terms
          • Privacy Statement