检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Using IAM to Grant Access to GeminiDB DynamoDB-Compatible API Creating a User and Granting Permissions to Use GeminiDB DynamoDB-Compatible API Custom Policies for GeminiDB DynamoDB-Compatible API Parent Topic: Working with GeminiDB DynamoDB-Compatible API
Using IAM to Grant Access to GeminiDB Redis API Creating a User and Granting GeminiDB Redis API Permissions Custom Policies of GeminiDB Redis API Parent Topic: Working with GeminiDB Redis API
Using IAM to Grant Access to GeminiDB Influx API Creating a User Group and Assigning Permissions Custom Policies Parent Topic: Working with GeminiDB Influx API
Using IAM to Grant Access to GeminiDB Cassandra API Creating a User and Granting Permissions Creating a Custom Policy Parent Topic: Working with GeminiDB Cassandra API
"nosql:instance:delete", "vpc:publicIps:list", "vpc:publicIps:update" ], "Effect": "Allow" } ] } Parent Topic: Using IAM
With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure. Each IAM user will have their own security credentials for accessing GeminiDB resources. Grant only the permissions required for users to perform a specific task.
Figure 8 Viewing permissions Step 2: Create an IAM User IAM users can be created for employees or applications of an enterprise. Each IAM user has their own security credentials, and inherits permissions from the groups it is a member of.
Creating a User and Granting GeminiDB Redis API Permissions This section describes how to use IAM to control fine-grained permissions for your GeminiDB resources. With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure.
"nosql:instance:delete", "vpc:publicIps:list", "vpc:publicIps:update" ], "Effect": "Allow" } ] } Parent Topic: Using IAM
Creating a User Group and Assigning Permissions This section describes how to use IAM to control fine-grained permissions for your GeminiDB resources. With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure.
Creating a User Group and Assigning Permissions This section describes how to use IAM to control fine-grained permissions for your GeminiDB resources. With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure.
The token obtained from IAM is valid for only 24 hours. If you want to use a token for authentication, you can cache it to avoid frequently obtaining the token.
Policies that only contain actions for IAM projects can be used and only take effect for IAM. For the differences between IAM and enterprise projects, see Differences Between IAM and Enterprise Management.
Making an API Request This section describes the structure of a REST API, and uses the IAM API for obtaining a user token as an example to describe how to call an API. The obtained token is used to authenticate other APIs.
"iam:agencies:createAgency", "iam:agencies:listAgencies", "iam:roles:listRoles", "iam:roles:createRole" ] } ] } Create a user group and assign permissions.
"iam:agencies:createAgency", "iam:agencies:listAgencies", "iam:roles:listRoles", "iam:roles:createRole" ] } ] } Create a user group and assign permissions.
Creating a User and Granting Permissions This section describes how to use IAM to control fine-grained permissions for your GeminiDB resources. With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure.
users: Creating a custom policy: iam:agencies:listAgencies iam:agencies:createAgency iam:permissions:listRolesForAgencyOnProject iam:permissions:grantRoleToGroupOnProject iam:roles:listRoles iam:roles:createRole Adding system role Security Administrator: Select a user group to which
"nosql:instance:delete", "vpc:publicIps:list", "vpc:publicIps:update" ], "Effect": "Allow" } ] } Parent Topic: Using IAM
"nosql:instance:delete", "vpc:publicIps:list", "vpc:publicIps:update" ], "Effect": "Allow" } ] } Parent Topic: Using IAM