检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
With IAM, you can: Create IAM users for personnel based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing CDN resources.
Create an IAM user and add it to the created user group. On the IAM console, create an IAM user and add it to the user group created in 1. Log in as the IAM user and verify permissions.
Parent topic: Using IAM to Grant Access to CBH
Using IAM Identity Policies to Grant Access to CBH If you need to manage the permissions for your CBH resources, you can use Identity and Access Management (IAM). With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure.
Using IAM Roles or Policies to Grant Access to DDS Identity and Access Management (IAM) lets you manage role/policy-based permissions of your DDS instances. With IAM, you can: Create IAM users for personnel based on your enterprise's organizational structure.
IAM Permissions Elastic Resource Pool Table 1 Elastic resource pool permission set Operation Permission (service:resource:action) (Role/Policy-based Authorization) Creating an elastic resource pool dli:elasticresourcepool:create Querying all elastic resource pools / Deleting an elastic
With IAM, you can: Create IAM users or user groups for personnel based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing DCS resources.
Using IAM Identity Policies to Grant Access to HSS You can perform identity policy-based authorization using Identity and Access Management (IAM). Create IAM users or user groups for personnel based on your enterprise's organizational structure.
With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure. Each IAM user has their own security credentials, providing access to BMS resources. Grant only the permissions required for users to perform a specific task.
With IAM, you can: Create IAM users or user groups for employees based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing BMS resources. Grant only the permissions required for users to perform a specific task.
With IAM, you can: Create IAM users or user groups for personnel based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing CDN resources.
With IAM, you can: Create IAM users for personnel based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing DNS resources.
Using IAM Roles or Policies to Grant Access to HSS You can perform role/policy-based authorization using Identity and Access Management (IAM). Create IAM users for employees based on the organizational structure of your enterprise.
With IAM, you can: Create IAM users or user groups for personnel based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing DDS resources.
With IAM, you can: Create IAM users or user groups for personnel based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing ECS resources.
Using IAM Roles or Policies to Grant Access to DSC To manage DSC permissions based on roles and policies, you can use Identity and Access Management (IAM) to implement fine-grained permissions control over your IAM resources.
With IAM, you can: Create IAM users or user groups for personnel based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing LTS resources.
With IAM, you can: Create IAM users for personnel based on your enterprise's organizational structure. Each IAM user has their own identity credentials for accessing LTS resources.
All IAM APIs support HTTPS to encrypt data during transmission. Parent topic: Data Protection
Deleting IAM User Quota Function Deletes quota for an IAM user. This API can be used only when IAM user isolation is enabled. Only the root account can delete the quota. Calling Method For details, see Calling APIs.