检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
          • All
          • Products
          • Solutions
          • Documentation
          • KooGallery
          • Developer
          • Learn
          • More
          9426 results found
          • Permissions and Supported Actions - Enterprise Self-Service Management

            Permissions and Supported Actions - Enterprise Self-Service Management

            Policies that contain actions only for IAM projects can be used and applied to IAM only. For details about the differences between IAM and enterprise projects, see What Are the Differences Between IAM Projects and Enterprise Projects?

            Help > Enterprise Self-Service Management > API Reference
          • Identity Authentication and Access Control - Simple Message Notification

            Identity Authentication and Access Control - Simple Message Notification

            You can use IAM to control access to your SMN resources. IAM permissions define which actions on your cloud resources are allowed or denied.

            Help > Simple Message Notification > Service Overview > Security
          • Introduction - GeminiDB

            Introduction - GeminiDB

            Policies that only contain actions for IAM projects can be used and only take effect for IAM. For the differences between IAM and enterprise projects, see Differences Between IAM and Enterprise Management.

            Help > GeminiDB > API Reference > Permission Policies and Supported Actions
          • Step 1 Creating a User Group and Adding Users to the User Group - ModelArts

            Step 1 Creating a User Group and Adding Users to the User Group - ModelArts

            This section describes how to create a user group and IAM users and add the IAM users to the user group.

            Help > ModelArts > Best Practices > Permissions Management > Configuration Practices in Typical Scenarios > Assigning Basic Permissions for Using ModelArts
          • Creating a User and Granting the Read-Only Permission to the User - Document Database Service

            Creating a User and Granting the Read-Only Permission to the User - Document Database Service

            Figure 5 Specifying the scope Step 2: Create an IAM User IAM users can be created for employees or applications of an enterprise. Each IAM user has their own security credentials, and inherits permissions from the groups it is a member of.

            Help > Document Database Service > Best Practices
          • Creating a User and Assigning DSC Permissions - Data Security Center

            Creating a User and Assigning DSC Permissions - Data Security Center

            Create a user group on the IAM console, and assign the DSC FullAccess permissions to the group. Creating an IAM User. Create a user on the IAM console and add it to the group created in 1. Logging In as an IAM User and verify permissions.

            Help > Data Security Center > User Guide > Permissions Management
          • Overview - Enterprise Management

            Overview - Enterprise Management

            Overview Scenario EPS supports resource management using IAM users. You can grant IAM users different permissions to ensure controlled and secure resource access.

            Help > Enterprise Management > User Guide > Project Management > Getting Started
          • UCS Resource Permissions (IAM-based) - Ubiquitous Cloud Native Service

            UCS Resource Permissions (IAM-based) - Ubiquitous Cloud Native Service

            ReadOnlyAccess permissions (read-only permissions on IAM) to IAM users to obtain the IAM user list.

            Help > Ubiquitous Cloud Native Service > User Guide > Permissions
          • Creating a User and Granting Permissions - Container Guard Service

            Creating a User and Granting Permissions - Container Guard Service

            With IAM, you can: Create IAM users for employees based on the organizational structure of your enterprise. Each IAM user has their own security credentials, providing access to CGS resources. Grant only the permissions required for users to perform a task.

            Help > User Guide > Managing Permissions
          • Permissions - Tag Management Service

            Permissions - Tag Management Service

            If your Huawei Cloud account does not require IAM for permissions management, you can skip this section. IAM can be used free of charge. You pay only for the resources in your account. For more information about IAM, see IAM Service Overview.

            Help > Tag Management Service > Service Overview
          • UCS Permissions - Ubiquitous Cloud Native Service

            UCS Permissions - Ubiquitous Cloud Native Service

            figure shows the permissions management flow of a new IAM user.

            Help > Ubiquitous Cloud Native Service > User Guide > Permissions
          • Making an API Request - Distributed Message Service for Kafka

            Making an API Request - Distributed Message Service for Kafka

            Use actual values in the bold fields. accountid indicates the account ID of the IAM user. username indicates the username of the IAM user to be created. email indicates the email of the IAM user. ********** indicates the password of the IAM user.

            Help > Distributed Message Service for Kafka > API Reference > Calling APIs
          • Making an API Request - Distributed Message Service for RocketMQ

            Making an API Request - Distributed Message Service for RocketMQ

            Use actual values in the bold fields. accountid indicates the account ID of the IAM user. username indicates the username of the IAM user to be created. email indicates the email of the IAM user. ********** indicates the password of the IAM user.

            Help > Distributed Message Service for RocketMQ > API Reference > Calling APIs
          • Making an API Request - Distributed Message Service for RabbitMQ

            Making an API Request - Distributed Message Service for RabbitMQ

            Use actual values in the bold fields. accountid indicates the account ID of the IAM user. username indicates the username of the IAM user to be created. email indicates the email of the IAM user. ********** indicates the password of the IAM user.

            Help > Distributed Message Service for RabbitMQ > API Reference > Calling APIs
          • Custom Policies Do Not Allow All Actions for a Service - Config

            Custom Policies Do Not Allow All Actions for a Service - Config

            Tag iam Trigger Type Configuration change Filter Type iam.roles, iam.policies Configure Rule Parameters None Applicable Scenario This rule allows you to ensure that your IAM users or agencies do not have unintended permissions attached.

            Help > Config > User Guide > Resource Compliance > Built-In Policies > Identity and Access Management
          • Querying Permanent Access Keys - Identity and Access Management

            Querying Permanent Access Keys - Identity and Access Management

            Querying Permanent Access Keys Function This API can be used by the administrator to query all permanent access key of an IAM user or used by an IAM user to query all of their own permanent access keys.

            Help > Identity and Access Management > API Reference > API > Access Key Management
          • Making an API Request - Distributed Cache Service

            Making an API Request - Distributed Cache Service

            Replace the italic fields in bold with the actual values. accountid: account ID of the IAM user username: IAM username to be created email: email address of the IAM user **********: password of the IAM user POST https://iam.ap-southeast-1.myhuaweicloud.com/v3.0/OS-USER/users Content-Type

            Help > Distributed Cache Service > API Reference > Calling APIs
          • Making an API Request - SoftWare Repository for Container

            Making an API Request - SoftWare Repository for Container

            For example, to obtain an IAM token in the CN-Hong Kong region, obtain the endpoint of IAM (iam.ap-southeast-1.myhuaweicloud.com) for this region and the resource-path (/v3/auth/tokens) in the URI of the API used to obtain a user token.

            Help > SoftWare Repository for Container > API Reference > Calling APIs
          • Step 3 Configuring Agent-based ModelArts Access Authorization - ModelArts

            Step 3 Configuring Agent-based ModelArts Access Authorization - ModelArts

            Step 3 Configuring Agent-based ModelArts Access Authorization After assigning IAM permissions, configure ModelArts access authorization for IAM users on the ModelArts page so that ModelArts can access dependent services such as OBS, SWR, and IEF.

            Help > ModelArts > Best Practices > Permissions Management > Configuration Practices in Typical Scenarios > Assigning Basic Permissions for Using ModelArts
          • Identity Authentication and Access Control - Data Replication Service

            Identity Authentication and Access Control - Data Replication Service

            For details, see Step 2: Create IAM Users and Log In. Access Control Permissions control You can use IAM to assign different permissions to different employees in your enterprise to access your instance resources. For details about DRS permissions, see Permissions Management.

            Help > Data Replication Service > Service Overview > Security
          Total results: 9426
          • Previous
          • 1
          • ...
          • 32
          • 33
          • 34
          • ...
          • 472
          • Next
          • Go
          Load More
          Was this helpful?
          Feedback
          /200
          Submit Cancel
          Contact Sales After-Sales Self Service
          • Site Terms
          • Privacy Statement

          Explore Huawei Cloud

          Why Us Customer Stories Trust Center Legal Press Releases

          Featured Services

          Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

          Service and Support

          Documentation Contact Us Public Notices Support Plans Service Health Dashboard

          Account and Payment

          Top Up Invoices Billing Center My Account Payment Method

          Quick Links

          Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

          © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

          • Site Terms
          • Privacy Statement