检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Creating an IAM User and Granting MRS Permissions Use IAM to implement fine-grained permission control over your MRS.
Parent topic: IAM Synchronization
Granting an IAM User the Read Permissions on Specific Objects Scenario This topic describes how to grant an IAM user the read permissions on an object or a set of objects in an OBS bucket.
Table 5 users Parameter Type Description name String IAM username. links Object IAM user resource link information. domain_id String ID of the account used to create the IAM user. enabled Boolean Enabling status of the IAM user. true (default value) indicates that the user is enabled
startIdentityCenter Grants permission to enable IAM Identity Center. write - - IdentityCenter:instance:deleteIdentityCenter Grants permission to disable IAM Identity Center. write - - IdentityCenter:instance:list Grants permission to query the IAM Identity Center instance list. list
For details about the condition keys defined by IAM Access Analyzer, see Conditions. The following table lists the actions that you can define in SCP statements for IAM Access Analyzer.
For details about the condition keys defined by IAM Identity Broker, see Conditions. The following table lists the actions that you can define in policy statements for IAM Identity Broker.
Create a user group on the IAM console, and assign the DLI ReadOnlyAccess permission to the group. Create an IAM user. Create a user on the IAM console and add the user to the group created in 1. Log in and verify permissions.
All IAM Policies Are in Use Rule Details Table 1 Rule details Parameter Description Rule Name iam-policy-in-use Identifier iam-policy-in-use Description If an IAM policy has not been attached to any IAM users, user groups, or agencies, this policy is noncompliant.
All IAM Roles Are in Use Rule Details Table 1 Rule details Parameter Description Rule Name iam-role-in-use Identifier iam-role-in-use Description If an IAM role has not been attached to any IAM users, user groups, or agencies, this role is noncompliant.
Relationship Between IAM Identities and Operators Huawei Cloud IAM provides the following types of identities: IAM users, IAM agencies, cloud service agencies, IAM Identity Center users, and federated users.
Figure 1 Going to the IAM user security settings page View the basic information about the IAM user. Modifying Basic Information About an Individual IAM User Log in to the IAM console as the administrator.
Using IAM to Grant Access to MgC This section describes how to use Identity and Access Management (IAM) for fine-grained permissions control on your MgC resources. With IAM, you can: Create IAM users for employees based on the organizational structure of your enterprise.
Calling APIs Through IAM Authentication Token Authentication AK/SK Authentication
Granting UCS Permissions to IAM Users Application Scenarios UCS permissions management offers fine-grained control over permissions using IAM and Kubernetes RBAC. It also supports IAM-based fine-grained permissions control and IAM token-based authentication.
Recommended Configuration To grant resource-level permissions to an IAM user, use a bucket policy. Precautions After configuration, the IAM user can download objects using APIs or SDKs.
Synchronizing IAM Users to MRS IAM user synchronization is to synchronize IAM users bound with MRS policies to the MRS system and create accounts with the same usernames but different passwords as the IAM users.
Create an IAM user and add it to the user group. Create a user on the IAM console and add it to the user group created in 1. Log in and verify permissions. Log in to the console as the IAM user.
Logging In as an IAM User and Verifying Permissions Log in to the console using the IAM user you created and verify the permissions. Assume that an IAM user has only the OCR ReadOnlyAccess permission, that is, the read-only access permission.
Logging In to Huawei Cloud as an IAM User To log in as an IAM user, you can choose IAM User on the login page or obtain the IAM user login link from the administrator.