检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Obtaining Account, IAM User, Group, Project, Region, and Agency Information Obtaining Account, IAM User, and Project Information Using the console On the Huawei Cloud homepage, click Console in the upper right corner.
Why Can't I Cancel the Authorization After the IAM User Delegates the Read and Write Permissions on OBS Buckets? The permissions of the IAM user are not clear. As a result, the IAM user may fail to delegate the read and write permissions on OBS buckets to an MPC user.
An IAM User Cannot Select an Existing SFS Turbo File System When Using a Dedicated Resource Pool to Create a Training Job The IAM user cannot view existing SFS Turbo file systems due to insufficient permissions.
Parent Topic: Using IAM to Grant AAD Permissions
Why Is the Message "Connect IAM Timeout" Displayed When I Attempt to Access DMS? Symptom An error message "Connect IAM Timeout" is displayed when I attempt to use the API to access DMS.
You may encounter the following errors related to IAM authentication information: Incorrect IAM authentication information: verify aksk signature fail Incorrect IAM authentication information: AK access failed to reach the limit,forbidden Incorrect IAM authentication information:
Creating a User Group and Assigning Permissions This section describes how to use IAM to control fine-grained permissions for your GeminiDB resources. With IAM, you can: Create IAM users for employees based on your enterprise's organizational structure.
How Do I Authorize an IAM User to Use Workspace Application Streaming? Scenarios An IAM user account created by the administrator needs to be assigned permissions before using Workspace Application Streaming.
The frontend requires only the "iam:agencies:list" and "iam:agencies:listV5" IAM action permissions. The IAMReadOnlyPolicy in step 3 may include unnecessary permissions.
If your account does not need individual IAM users, then you may skip over this section. By default, new IAM users do not have any permissions. You need to add a user to one or more groups, and attach permissions policies or roles to these groups.
The frontend requires only the "iam:agencies:list" and "iam:agencies:listV5" IAM action permissions. The IAMReadOnlyPolicy in step 3 may include unnecessary permissions.
Possible Causes The login account does not have the IAM ReadOnly permission. Solution Assign the IAM ReadOnly permission to your account. For details, see Assigning Permissions to an IAM User. Parent Topic: Product Consultation
The following is an example deny policy: { "Version": "1.1", "Statement": [{ "Action": ["rds:instance:delete"], "Effect": "Deny" }] } Parent Topic: Using IAM to Grant Access to RDS
To assign permissions of the IoTDA FullAccess policy to the user group that the IAM user belongs to, do as follows: Procedure: Visit IAM and click Try Free to access the IAM console. In the navigation pane, choose User Groups. Click Authorize in the row of the target user group.
What Should I Do If a Table Cannot Be Created After I Switch to an IAM Identity Center User? Symptom A user created in IAM Identity Center was configured with the v3 system policy LakeFormation FullAccess.
CNAD Pro Permissions and Actions This section describes how to use IAM for fine-grained CNAD permissions management. If your Huawei Cloud account does not need individual IAM users, skip this section. By default, new IAM users do not have any permissions.
Obtaining Account, IAM User, Group, Project, Region, and Agency Information Obtaining Account, IAM User, and Project Information Using the console On the Huawei Cloud homepage, click Console in the upper right corner.
Obtaining Account, IAM User, Project, User Group, Region, and Agency Information Obtaining Account, IAM User, and Project Information Using the console Your username, user ID, account name, account ID, project name, and project ID need to be specified in the URL and request body for
Cloud Services that Support Resource-Level Authorization Using IAM If you want to grant permissions to an IAM user for specific resources, create a custom policy that contains permissions for the resources, and attach the policy to the user.
Otherwise, contact the IAM account administrator to grant your IAM account this permission.