检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
          • All
          • Products
          • Solutions
          • Documentation
          • KooGallery
          • Developer
          • Learn
          • More
          9454 results found
          • How Do I Grant Some CDN Permissions to IAM Users? - Content Delivery Network

            How Do I Grant Some CDN Permissions to IAM Users? - Content Delivery Network

            How Do I Grant Some CDN Permissions to IAM Users? You can use IAM to implement fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you secure access to your Huawei Cloud resources.

            Help > Content Delivery Network > FAQs > Usage
          • Assigning Agency Permissions to an IAM User - Identity and Access Management

            Assigning Agency Permissions to an IAM User - Identity and Access Management

            To authorize IAM users to manage these resources, assign permissions to the users. You can authorize an IAM user to manage resources for all delegating parties, or authorize the user to manage resources for a specific delegating party.

            Help > Identity and Access Management > User Guide > Agency Management > Delegating Another Account for Resource Management
          • IAM Users Do Not Have Directly Assigned Policies or Permissions - Config

            IAM Users Do Not Have Directly Assigned Policies or Permissions - Config

            Rule Logic If an IAM user has any directly assigned policies or permissions, the IAM user is noncompliant. If an IAM user does not have directly assigned policies or permissions, the IAM user is compliant. Parent topic: Identity and Access Management

            Help > Config > User Guide > Resource Compliance > Built-In Policies > Identity and Access Management
          • How Do I Create an IAM Agency? - Image Management Service

            How Do I Create an IAM Agency? - Image Management Service

            How Do I Create an IAM Agency? Scenarios During cross-region image replication, an agency is required to verify cloud service permissions in the destination region. So, create a cloud service agency before the replication.

            Help > Image Management Service > FAQs > Accounts and Permissions
          • Using IAM to Authorize Specified Resources Across Different Regions - Identity and Access Management

            Using IAM to Authorize Specified Resources Across Different Regions - Identity and Access Management

            For details about the two services, see What Are the Differences Between IAM and Enterprise Management? Solution to requirement 2: In IAM, company A creates IAM users for employees and adds the IAM users to different groups.

            Help > Identity and Access Management > Best Practices
          • Creating IAM Users and Granting Them Permissions to Use CSS - Cloud Search Service

            Creating IAM Users and Granting Them Permissions to Use CSS - Cloud Search Service

            Creating IAM Users and Granting Them Permissions to Use CSS You can use Identity and Access Management (IAM) for fine-grained permissions control for CSS. With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure.

            Help > Cloud Search Service > User Guide > CSS Service Permission Management
          • IAM Policies Do Not Allow Blocked Actions on KMS Keys - Config

            IAM Policies Do Not Allow Blocked Actions on KMS Keys - Config

            With this rule, you can detect IAM policies that allow blocked actions on KMS keys to prevent unintended data encryption and decryption. Solution You can modify noncompliant IAM policies based on the evaluation results.

            Help > Config > User Guide > Resource Compliance > Built-In Policies > Identity and Access Management
          • Granting Permissions to ServiceStage-Dependent Services - ServiceStage

            Granting Permissions to ServiceStage-Dependent Services - ServiceStage

            Parent topic: Using IAM to Grant Access to ServiceStage

            Help > ServiceStage > User Guide > Using IAM to Grant Access to ServiceStage
          • Obtaining Temporary Access Keys and Security Tokens of an IAM User - Identity and Access Management

            Obtaining Temporary Access Keys and Security Tokens of an IAM User - Identity and Access Management

            X-Auth-Token No String IAM user token, federated user token, or agency token. Specify either X-Auth-Token or Authorization (recommended). You can obtain the token from X-Subject-Token by calling the API for obtaining an IAM user token or agency token.

            Help > Identity and Access Management > API Reference > API > Access Key Management
          • Creating a User and Granting ServiceStage Permissions - ServiceStage

            Creating a User and Granting ServiceStage Permissions - ServiceStage

            Creating a User and Granting ServiceStage Permissions You can use Identity and Access Management (IAM) for fine-grained permissions control for your ServiceStage. With IAM, you can: Create IAM users for personnel based on your enterprise's organizational structure.

            Help > ServiceStage > User Guide > Using IAM to Grant Access to ServiceStage
          • Updating the Mapping Between a User (Group) and an IAM Agency - MapReduce Service

            Updating the Mapping Between a User (Group) and an IAM Agency - MapReduce Service

            Updating the Mapping Between a User (Group) and an IAM Agency Function This API is used to update the mapping between a user or user group and an IAM agency. Constraints None Debugging You can debug this API in API Explorer. Automatic authentication is supported.

            Help > MapReduce Service > API Reference > API V2 > Agency Management
          • Adding Developer Profile to IAM Users - Huawei Cloud Astro Zero

            Adding Developer Profile to IAM Users - Huawei Cloud Astro Zero

            The added IAM user is displayed in the user list. Use the added IAM user to log in to Huawei Cloud Astro Zero. Log in to the Huawei Cloud Astro Zero console as the added IAM user. Figure 2 Logging in as an IAM user On the homepage, access an environment as required.

            Help > Huawei Cloud Astro Zero > User Guide (Low-Code) > Addition of Developer Users
          • HSS Actions - Host Security Service

            HSS Actions - Host Security Service

            If your Huawei Cloud account does not need individual IAM users, then you may skip over this section. By default, new IAM users do not have any permissions assigned. You need to add a user to one or more groups, and assign policies or roles to these groups.

            Help > Host Security Service > User Guide > Using IAM to Grant Access to HSS
          • Querying the Mapping Between a User (Group) and an IAM Agency - MapReduce Service

            Querying the Mapping Between a User (Group) and an IAM Agency - MapReduce Service

            Querying the Mapping Between a User (Group) and an IAM Agency Function This API is used to obtain details about the mapping between a user or user group and an IAM agency. Constraints None Debugging You can debug this API in API Explorer. Automatic authentication is supported.

            Help > MapReduce Service > API Reference > API V2 > Agency Management
          • Using IAM to Grant Access to GeminiDB Cassandra API - GeminiDB

            Using IAM to Grant Access to GeminiDB Cassandra API - GeminiDB

            Using IAM to Grant Access to GeminiDB Cassandra API Creating a User and Granting Permissions Creating a Custom Policy Parent Topic: Working with GeminiDB Cassandra API

            Help > GeminiDB > GeminiDB Cassandra API > Working with GeminiDB Cassandra API
          • Using IAM to Grant Access to GeminiDB Influx API - GeminiDB

            Using IAM to Grant Access to GeminiDB Influx API - GeminiDB

            Using IAM to Grant Access to GeminiDB Influx API Creating a User Group and Assigning Permissions Custom Policies Parent Topic: Working with GeminiDB Influx API

            Help > GeminiDB > GeminiDB Influx API > Working with GeminiDB Influx API
          • Using IAM to Grant Access to GeminiDB Redis API - GeminiDB

            Using IAM to Grant Access to GeminiDB Redis API - GeminiDB

            Using IAM to Grant Access to GeminiDB Redis API Creating a User and Granting GeminiDB Redis API Permissions Custom Policies of GeminiDB Redis API Parent Topic: Working with GeminiDB Redis API

            Help > GeminiDB > GeminiDB Redis API > Working with GeminiDB Redis API
          • Using IAM to Grant Access to GeminiDB HBase API - GeminiDB

            Using IAM to Grant Access to GeminiDB HBase API - GeminiDB

            Using IAM to Grant Access to GeminiDB HBase API Creating a User and Granting Permissions to Use GeminiDB HBase API Custom Policies for GeminiDB HBase API Parent Topic: Working with GeminiDB HBase API

            Help > GeminiDB > GeminiDB HBase API > Working with GeminiDB HBase API
          • Using IAM to Grant Access to GeminiDB DynamoDB-Compatible API - GeminiDB

            Using IAM to Grant Access to GeminiDB DynamoDB-Compatible API - GeminiDB

            Using IAM to Grant Access to GeminiDB DynamoDB-Compatible API Creating a User and Granting Permissions to Use GeminiDB DynamoDB-Compatible API Custom Policies for GeminiDB DynamoDB-Compatible API Parent Topic: Working with GeminiDB DynamoDB-Compatible API

            Help > GeminiDB > GeminiDB DynamoDB-Compatible API > Working with GeminiDB DynamoDB-Compatible API
          • Example: Granting IAM Users the Permission to Create CSS Clusters - Cloud Search Service

            Example: Granting IAM Users the Permission to Create CSS Clusters - Cloud Search Service

            IAM username or email address Alice IAM username or email address entered during the user creation. You can obtain the IAM username and IAM user's initial password from the administrator. IAM user password ******** Password of the IAM user, rather than the account.

            Help > Cloud Search Service > User Guide > CSS Service Permission Management
          Total results: 9454
          • Previous
          • 1
          • ...
          • 11
          • 12
          • 13
          • ...
          • 473
          • Next
          • Go
          Load More
          Was this helpful?
          Feedback
          /200
          Submit Cancel
          Contact Sales After-Sales Self Service
          • Site Terms
          • Privacy Statement

          Explore Huawei Cloud

          Why Us Customer Stories Trust Center Legal Press Releases

          Featured Services

          Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

          Service and Support

          Documentation Contact Us Public Notices Support Plans Service Health Dashboard

          Account and Payment

          Top Up Invoices Billing Center My Account Payment Method

          Quick Links

          Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

          © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

          • Site Terms
          • Privacy Statement