检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
The IAM Identity Center user you created is displayed in the user list. Step 4: Creating a Permission Set In the navigation pane of IAM Identity Center, choose Multi-Account Permissions > Permission Sets.
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer.
Table 3 login_protects Parameter Type Description enabled Boolean Indicates whether login protection has been enabled for an IAM user. The value can be true or false. user_id String IAM user ID. verification_method String Login authentication method of the IAM user.
Listing MFA Device Information of IAM Users Function This API is provided for the administrator to query the MFA device information of IAM users. The API can be called using both the global endpoint and region-specific endpoints. For IAM endpoints, see Regions and Endpoints.
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer.
Synchronizing IAM Users to a Database Function This API is used to synchronize IAM users to a database. Calling Method For details, see Calling APIs.
Using IAM to Grant Access to Optimization Advisor Using IAM Roles or Policies to Grant Access to Optimization Advisor Using IAM Identity Policies to Grant Access to OA Parent topic: Permissions Management
Using IAM to Grant Access to Cost Center Using IAM Roles or Policies to Grant Access to Cost Center Using IAM Identity Policies to Grant Access to Cost Center Parent topic: Permissions Management
CTS records all operations performed on IAM, such as creating users and user groups. Table 1 shows the IAM operations that can be recorded by CTS.
Viewing IAM Operation Records IAM Operations Supported by CTS Viewing CTS Traces in the Trace List
For details, see Managing IAM Users' Access to the Console. Access Keys: You can manage access keys of the IAM user. For details, see Managing Access Keys for an IAM User.
Wait for the notification regarding the creation of an IAM user on the email terminal. You have received the email alarm about creating an IAM user. CTS can monitor the operation of creating an IAM user. Links to FAQs What Should I Do If I Cannot Enable CTS as an IAM User?
Using IAM to Grant Access to FlexusX FlexusX allows you to use IAM to implement fine-grained permissions control on your FlexusX resources. With IAM, you can: Create IAM users or user groups for personnel based on your enterprise's organizational structure.
Granting IAM User Groups Basic Permissions on All OBS Resources Scenario This topic describes how to use OBS system roles and policies preset in IAM to grant basic operation permissions for all OBS resources to multiple IAM users or user groups.
Parent topic: IAM User Management
of an IAM user.
Rotating IAM Secrets Using FunctionGraph Scenario This section describes how to rotate IAM secrets through KMS using a FunctionGraph template. Constraints Only IAM member accounts can be rotated. IAM master accounts cannot be rotated.
Using IAM to Grant Access to RDS Using IAM Roles or Policies to Grant Access to RDS Using IAM Identity Policies to Grant Access to RDS
General Procedure You can perform security audit on the permissions of IAM users, including identity policies attached to IAM users and IAM user groups.
Using IAM to Grant AAD Permissions Creating a User and Granting the AAD Access Permission Creating an AAD Custom Policy AAD Permissions and Actions Permission Dependency of the AAD Console Parent Topic: Advanced Anti-DDoS User Guide