检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Cause Analysis The IAM permission has been modified. The permission in the browser cache is inconsistent with that on the backend server. Solution Log in to the console and deploy the application again. Parent topic: FAQs About ServiceStage
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.
Edit the application, select Authorized User, and create an authorized IAM user. In the displayed Create Service Endpoint: IAM User dialog box, enter the AK/SK of the account authorized to deploy CCE.
If the current tenant does not have the CCE cluster operation permission, select IAM authorization for deployment. Other: The software package is deployed and published in the CCE cluster of another tenant in IAM authorization mode.
Other tenant: The software package is deployed in the CCE cluster of another tenant for release in IAM authorization mode. If you select Other tenant, you must select an authorized tenant to deploy the CCE cluster. Select Current tenant.
If the current tenant does not have the CCE cluster operation permission, select IAM authorization for deployment. Other: The software package is deployed and published in the CCE cluster of another tenant in IAM authorization mode.
If the current tenant does not have the CCE cluster operation permission, select IAM authorization for deployment. Other: The software package is deployed and published in the CCE cluster of another tenant in IAM authorization mode.
If not, select IAM authorization for deployment. Other: The software package is deployed and published in the FunctionGraph of the Other in IAM authorization mode. You must select an authorized tenant for FunctionGraph deployment.
For security purposes, create IAM users and grant them permissions for routine management. User A user is created using a domain to use cloud services. Each user has its own identity credentials (password and access keys).
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.
Making an API Request This section describes the structure of a REST API request, and calls the IAM API for obtaining a user token as an example. The obtained token can then be used to authenticate the calling of other APIs.
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.
IAM authorization If the current user does not have the FunctionGraph operation permissions, you can use IAM to authorize the user. Function Functions created in FunctionGraph. For details, see FunctionGraph Usage Process.
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.
When using a token for authentication, cache it to prevent frequently calling the IAM API for obtaining a user token. A token specifies temporary permissions in a computer system.
Ensure that the target host cluster exists and try again. 403 Deploy.00021485 IAM authentication failed. IAM authentication failed. Check whether you have the required IAM permissions. 400 Deploy.00021486 agency_urn: Mandatory. The value of agency_urn cannot be empty.
It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.