检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
"iam:permissions:revokeRoleFromAgencyOnDomain", "iam:permissions:checkRoleForAgencyOnProject", "iam:permissions:checkRoleForAgencyOnDomain", "iam:roles:createRole", "iam:roles:listRoles",
Solution Add the IAM user to a user group and grant the group CORS FullAccess permissions. Then, the IAM user inherits the permissions granted to the user group. The following describes how to grant permissions to an IAM user.
For details, see Creating an IAM User and Granting Permissions. Parent topic: Permissions Management
iam:agencies:listAgencies iam:agencies:createAgency iam:permissions:listRolesForAgencyOnProject iam:permissions:grantRoleToAgencyOnProject Permissions required for querying agencies: System-defined policy: IAM ReadOnlyAccess Add the following actions to the custom policy: iam:agencies
Assigning the Required Permissions Any IAM user granted with the listAllNotebooks and listUsers permissions can click View all on the notebook page to view the instances of all IAM users in the current IAM project.
Assigning the Required Permissions Any IAM user granted with the listAllNotebooks and listUsers permissions can click View all on the notebook page to view the instances of all IAM users in the current IAM project.
IAM user You can use your account to create IAM users and assign permissions for specific resources. Each IAM user has their own identity credentials (passwords or access keys) and uses cloud resources based on assigned permissions. IAM users cannot make payments themselves.
Solution Check whether the permissions of the current user in IAM are changed, whether the user is removed from the user group, or whether the permission policy of the user group to which the user belongs is changed. If they are indeed changed, log in to the system again.
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer.
The principal can be either a user or a group in IAM Identity Center.
Type Description role_id String Unique ID of the IAM system-defined policy Minimum length: 20 Maximum length: 2048 role_name String Name of the IAM system-defined policy Minimum length: 1 Maximum length: 100 Table 6 page_info Parameter Type Description next_marker String If present
Coarse-grained IAM permissions are broad permissions on various operations.
Procedure You can add, edit, or delete tags of a permission set on the IAM Identity Center console. Log in to the Huawei Cloud console. Click in the upper left corner of the page and choose Management & Governance > IAM Identity Center.
Maximum length: 2048 Table 3 Parameters in the request body Parameter Mandatory Type Description managed_role_id Yes String Unique ID of the IAM system-defined policy managed_role_name No String Name of the IAM system-defined policy Minimum length: 1 Maximum length: 128 Response Parameters
Parameter Type Description policy_id String Unique ID of the IAM system-defined identity policy Minimum length: 20 Maximum length: 2048 policy_name String Name of the IAM system-defined identity policy Minimum length: 1 Maximum length: 100 Table 6 page_info Parameter Type Description
Feature Description Phase Document 1 Changing the access type of IAM users The administrator can change the access type of an IAM user on the Basic Information page.
The VPN gateways and connections created by a Huawei Cloud account are invisible to IAM user accounts. A message will be displayed indicating that the system is busy if you create a VPN gateway or connection using an IAM user account.
Maximum length: 2048 Table 3 Parameters in the request body Parameter Mandatory Type Description managed_policy_id Yes String Unique ID of the IAM system-defined identity policy managed_policy_name No String Name of the IAM system-defined identity policy Minimum length: 1 Maximum
Click in the upper left corner of the page and choose Management & Governance > IAM Identity Center. In the navigation pane, choose Users. In the user list, click a username to go to the user details page.
Parent topic: IAM User SSO via SAML