检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Granting Permissions to Use FlexusL Instances Through IAM FlexusL allows you to use IAM to implement fine-grained permissions control on your FlexusL resources. With IAM, you can: Create IAM users or user groups for personnel based on your enterprise's organizational structure.
Solution Add the IAM user to a user group and grant the group CORS FullAccess permissions. Then, the IAM user inherits the permissions granted to the user group. The following describes how to grant permissions to an IAM user.
"iam:agencies:list*", "iam:agencies:createAgency", "iam:agencies:createServiceLinkedAgencyV5", "coc:agency:get", "coc:agency:create", "iam:permissions:grantRoleToAgency",
To call this API as an IAM user, the IAM user must be granted the required permissions. For details, see Permissions and Supported Actions. URI POST /v2/orders/subscriptions/resources/renew Request For details about the request parameters, see Request.
To call this API as an IAM user, the IAM user must be granted the required permissions. For details, see Permissions and Supported Actions. URI POST /v2/orders/subscriptions/resources/unsubscribe Request For details about the request parameters, see Request.
To call this API as an IAM user, the IAM user must be granted the required permissions. For details, see Permissions and Supported Actions. URI POST /v1/{project_id}/cloudservers/action Request For details about the request parameters, see Starting ECSs in a Batch.
If you are an IAM user, a message is displayed, indicating that you do not have the required permissions. The account administrator needs to grant you the COC FullAccess permissions by doing the following: Grant a user group the COC FullAccess permissions.
To call this API as an IAM user, the IAM user must be granted the required permissions. For details, see Permissions and Supported Actions. URI POST /v1/{project_id}/cloudservers/action Request For details about the request parameters, see Stopping ECSs in a Batch.
To call this API as an IAM user, the IAM user must be granted the required permissions. For details, see Permissions and Supported Actions.
To call this API as an IAM user, the IAM user must be granted the required permissions. For details, see Permissions and Supported Actions. URI GET /v1/{project_id}/cloudservers/{server_id} In the parameter description, server_id indicates the cloud server ID.
The following shows part of the response body for the API used to create an IAM user: { "user": { "id": "c131886aec...
To call this API as an IAM user, the IAM user must be granted the required permissions. For details, see Permissions and Supported Actions. URI PUT /v1/{project_id}/cloudservers/{server_id} In the parameter description, server_id indicates the cloud server ID.
To call this API as an IAM user, the IAM user must be granted the required permissions. For details, see Permissions and Supported Actions.
To call this API as an IAM user, the IAM user must be granted the required permissions. For details, see Permissions and Supported Actions. URI POST /v1/{project_id}/cloudservers/action Request For details about the request parameters, see Restarting ECSs in a Batch.
Log in to the IAM console. On the IAM console, choose Agencies from the navigation pane on the left, and click Create Agency on the displayed page. Enter an agency name.
": { "name": "username", //IAM user name "password": "$ADMIN_PASS", //IAM user password.
If you are an IAM user, a message is displayed, indicating that you do not have the required permissions. The account administrator needs to grant you the COC FullAccess permissions by doing the following: Grant a user group the COC FullAccess permissions.
Policies that contain actions for both IAM and enterprise projects can be used and applied for both IAM and Enterprise Management. Policies that contain actions only for IAM projects can be used and applied to IAM only.
IAM helps you securely access your cloud resources. With IAM, you can create IAM users and grant them permissions to access only specific resources.
Replace the bold parameters with the actual values. accountid: account ID of an IAM user username: name of an IAM user email: email of an IAM user **********: login password of an IAM user POST https://iam.ap-southeast-1.myhuaweicloud.com/v3.0/OS-USER/users Content-Type: application