检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
As mentioned, IAM is responsible for the security of the service itself and provides a secure data protection mechanism. Tenants are responsible for the secure use of IAM services, including security parameter configuration and permission splitting and granting by enterprises.
", "display_name" : "IAMAgencyPolicy", "type" : "AX", "policy" : { "Version" : "1.1", "Statement" : [ { "Action" : [ "iam:tokens:assume" ], "Resource" : { "uri" : [ "/iam/agencies/agencyTest" ] }, "Effect" : "Allow"
Parent topic: IAM User SSO via SAML
body Parameter Mandatory Type Description group_ids Yes Array of strings Group ID list Minimum length: 1 Maximum length: 47 Array length: 1-100 member_id Yes Object Group member ID Table 4 member_id Parameter Mandatory Type Description user_id Yes String Globally unique ID of an IAM
For details about how to obtain a user group ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
Policy IAM supports both system-defined and custom policies. System-defined Policies System-defined policies cover various common actions of a cloud service. System-defined policies can be used to assign permissions to user groups, but they cannot be modified.
Ensure that you have the IAM permission to modify DDM accounts. An expired account of DDM cannot be used to log in to the system. You need to reset the password and log in again. Figure 1 Account expired Procedure Log in to the DDM console.
principal is an IAM root user.
If your Huawei Cloud account does not need individual IAM users for permissions management, skip over this section. IAM can be used free of charge. You pay only for the resources in your account. For more information about IAM, see IAM Service Overview.
Parent topic: IAM User SSO via SAML
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer.
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer. URI PATCH /v3/OS-FEDERATION/identity_providers/{id} Table 1 URI parameters Parameter Mandatory Type Description id Yes String ID of the identity provider to be updated.
URI POST /v1/instances/{instance_id}/permission-sets/{permission_set_id}/detach-managed-policy Table 1 Path parameters Parameter Mandatory Type Description instance_id Yes String Globally unique ID of an IAM Identity Center instance permission_set_id Yes String Globally unique ID
URI POST /v1/instances/{instance_id}/permission-sets/{permission_set_id}/detach-managed-role Table 1 Path parameters Parameter Mandatory Type Description instance_id Yes String Globally unique ID of an IAM Identity Center instance permission_set_id Yes String Globally unique ID of
IAM user: An IAM user's permissions are granted by the administrator. The enterprise project information displayed on the Enterprise Project Management Service page varies for each IAM user based on the permissions assigned.
If you want to share a DataArts Studio instance with an IAM user with the DAYU User account permissions, prepare an IAM user by referring to Creating an IAM User and Assigning DataArts Studio Permissions, add the user as a workspace member, and assign a role to the member.
In this scenario, you can create IAM users for the software developers and grant them only the permissions required for viewing CodeArts resources. If you do not require individual IAM users, skip this chapter. IAM can be used free of charge.
IAM users do not have these permissions by default. To do so, you use the account to add an IAM user to a user group in IAM and assign permissions policies to the user group. This process is called authorization.
Replace the italic fields in bold with the actual values. accountid: ID of the account to which the IAM user belongs. username: IAM username to be created. email: email address of the IAM user. **********: password of the IAM user.
Replace the italic fields in bold with the actual values. accountid: ID of the account to which the IAM user belongs. username: IAM username to be created. email: email address of the IAM user. **********: password of the IAM user.