检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
To identify the principal that uses access keys, create an IAM user with the same name as the corresponding IAM user or your account. Click OK. Obtain an access key for the IAM user. Log in to the IAM console and select the EU-Dublin region.
Click in the upper left corner of the page and choose Management & Governance > IAM Identity Center. In the navigation pane, choose Multi-Account Permissions > Permission Sets. View the created permission sets and their details in the list.
Create an IAM user and grant permissions to the user.
To improve security, you are advised to enable MFA in IAM Identity Center.
For details about how to obtain the project ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
Figure 1 Relationship between VIAS and IAM IAM VIAS uses Identity and Access Management (IAM) for authentication and authorization. DIS VIAS transmits analysis results to Data Ingestion Service (DIS) in the format of structured data.
"Action": [ "hss:hosts:switchVersion", "hss:hosts:manualDetect", "hss:manualDetectStatus:get" ] } ] } Parent Topic: IAM
Step 1: Create a User Group Log in to the IAM console. On the IAM console, choose User Groups from the left navigation pane, and click Create User Group in the upper right corner.
URI POST /v1/instances/{instance_id}/access-control-attribute-configuration Table 1 Path parameters Parameter Mandatory Type Description instance_id Yes String Globally unique ID of an IAM Identity Center instance Request Parameters Table 2 Parameters in the request header Parameter
Replace the fields in bold with the actual values. accountid: ID of the account to which the IAM user belongs. username: name of the IAM user to be created. email: email address of the IAM user. **********: password of the IAM user. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
For details about how to obtain the project ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
Verifying Permissions This section describes how to verify IAM user permissions. Sign in to the management console as an IAM user. Choose Enterprise > Project Management in the upper right corner of the page.
User Management Creating Users Logging In as an IAM Identity Center User and Accessing Resources Managing Users Deleting a User Configuring the Duration of the User Portal Session
Appendixes Status Codes Error Codes Obtaining Information About Account, IAM User, Group, Project, Region, and Agency
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer. URI DELETE /v3.0/OS-ROLE/roles/{role_id} Table 1 URI parameters Parameter Mandatory Type Description role_id Yes String Custom policy ID.
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer. URI DELETE /v3/OS-FEDERATION/identity_providers/{id} Table 1 URI parameters Parameter Mandatory Type Description id Yes String ID of the identity provider to be deleted.
In the case of a custom policy for agencies, the type of this parameter is Object, and the value should be "Resource": {"uri": ["/iam/agencies/agencyTest"]}.
For details about how to obtain the agency ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
users: Creating a custom policy: iam:agencies:listAgencies iam:agencies:createAgency iam:permissions:listRolesForAgencyOnProject iam:permissions:grantRoleToGroupOnProject iam:roles:listRoles iam:roles:createRole Adding system role Security Administrator: Select a user group to which
For details about how to obtain the account ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.