检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Developing API Calling Authentication (IAM) Token Authentication AK/SK Authentication Parent topic: Developer Guide for Service Integration
Common Errors Related to IAM Authentication Information When an API using IAM authentication is called, the following IAM authentication error may be encountered: Incorrect IAM authentication information: verify aksk signature fail Incorrect IAM authentication information: AK access
Common Errors Related to IAM Authentication Information When an API using IAM authentication is called, the following IAM authentication error may be encountered: Incorrect IAM authentication information: verify aksk signature fail Incorrect IAM authentication information: AK access
Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token, which can be obtained by calling the IAM API (value of X-Subject-Token in the response header).
Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token, which can be obtained by calling the IAM API (value of X-Subject-Token in the response header).
For example, you have obtained the IAM endpoint (iam.xxx.com) of a region and found the resource-path (/v3/auth/tokens) in the URI of the API that is used to obtain a user token.
IAM or enterprise projects: Type of projects for which an action will take effect. Policies that contain actions for both IAM and enterprise projects can be used and take effect for both IAM and Enterprise Management.
Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token, which can be obtained by calling the IAM API (value of X-Subject-Token in the response header).
Create a user group on the IAM console, and assign the ROMA ReadOnlyAccess policy to the group. Create an IAM user. Create a user on the IAM console and add the user to the group created in 1. Log in as the IAM user and verify permissions.
Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token, which can be obtained by calling the IAM API (value of X-Subject-Token in the response header).
Deleting a Custom Authorizer Function Deleting a Custom Authorizer Authorization Information Each account has all the permissions required to call all APIs, but IAM users must be assigned the required permissions.
Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token, which can be obtained by calling the IAM API (value of X-Subject-Token in the response header).
Deleting an Application Configuration Function Deleting an Application Configuration Authorization Information Each account has all the permissions required to call all APIs, but IAM users must be assigned the required permissions.
Parent topic: Developing API Calling Authentication (IAM)
Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token, which can be obtained by calling the IAM API (value of X-Subject-Token in the response header).
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token.
Creating an Application Configuration Function Creating an Application Configuration Authorization Information Each account has all the permissions required to call all APIs, but IAM users must be assigned the required permissions.
Parent topic: Developing API Calling Authentication (IAM)
Modifying an Application Configuration Function Modifying an Application Configuration Authorization Information Each account has all the permissions required to call all APIs, but IAM users must be assigned the required permissions.
IAM is free of charge. You pay only for the resources in your account. For more information about IAM, see What Is IAM? ROMA Connect Permissions By default, new IAM users do not have any permissions assigned.