检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
To ensure account security, create Identity and Access Management (IAM) users and grant them permissions for routine management. User An IAM user is created by an account in IAM to use cloud services. Each IAM user has its own identity credentials (password and access keys).
Permissions Management Creating an IAM User and Granting Organizations Permissions Creating Custom Policies
IAM users in the delegated administrator account still need IAM permissions to access and manage the specified service. This API can be called only from the organization's management account.
listAgencies iam:permissions:listRolesForAgency iam:permissions:listRolesForAgencyOnProject POST /v1.0/{project_id}/clusters/{cluster_id}/node/offline css:cluster:shrinkNodes iam:agencies:listAgencies iam:permissions:listRolesForAgency iam:permissions:listRolesForAgencyOnProject POST
Appendixes Status Codes Error Codes Obtaining Account, IAM User, Group, Project, Region, and Agency Information
Supported Unlimited Account Management IAM Identity Center You can use IAM Identity Center to centrally manage your workforce identities and their access to multiple accounts in your organization.
Service-linked Agency The Organizations service uses IAM trust agencies to enable trusted services to perform tasks on your behalf in your organization's member accounts.
users:listUsers iam:groups:listGroups PUT /v3/{project_id}/notifications cts:notification:update smn:topic:listTopic iam:users:listUsers iam:groups:listGroups DELETE /v3/{project_id}/notifications cts:notification:delete - GET /v3/{project_id}/notifications/{notification_type} cts
effective policies POST https://{endpoint}/v1/organizations/entities/effective-policies Example Responses Status code: 200 Successful. { "last_updated_at" : "2023-01-11T11:00:00Z", "policy_content" : "{\"tags\":{\"color\":{\"tag_value\":[],\"tag_key\":\"Color\",\"enforced_for\":[\"iam
The member account then can grant its IAM users the permission to perform action A but not action B. Even if the permission to perform action B is assigned, the permission cannot be applied.
If the permissions granted to an IAM user contain both Allow and Deny, the Deny statements take precedence over the Allow statements.
They have no effect on the management account, IAM users, and agencies. SCPs are applied within 30 minutes after they are attached.
If so, the policies will apply to the new member account and all IAM users in the member account. When you use the management account to enable a trusted service, the trusted service can create a service-linked agency for that trusted service in the member account.
The action prefix must be the name of a cloud service that has been interconnected with IAM 5.0, for example, Action="ram:*:*". Wildcards (*) are not supported for prefixes. For example, Action="*" or Action="*:*:*" is not allowed.
POST /v1/{project_id}/stacks/{stack_name}/continuations rf:stack:continueDeploy - GET /v1/{project_id}/stacks/{stack_name}/execution-plans/{execution_plan_name}/prices rf:stack:estimateExecutionPlanPrice bss:discount:view PATCH /v1/{project_id}/stacks/{stack_name} rf:stack:update iam
Typical Cases What Are the Differences in Access Control Between IAM and Organizations? What Should I Do When Encountering SCP Errors?
After an account created via Organizations leaves an organization, the IAM agency created by default during the creation of the account will not be automatically deleted. The organization management account can still use that agency to access data of member accounts.
Read - - - rgc:landingZoneIdentityCenter:get Grants permission to obtain IAM Identity Center user information. Read - - - rgc:operation:list Grants permission to query the status of a registered OU or an enrolled account.
Router Attachments Instances Route tables Elastic Volume Service (EVS) Volume FunctionGraph Functions Global Accelerator (GA) Accelerators Listeners GaussDB Instances GaussDB(for MySQL) Instances GeminiDB (originally named GaussDB for NoSQL) Instances Identity and Access Management (IAM
IAM users in the delegated administrator account still need IAM permissions to access and manage the specified service. This API can be called only from the organization's management account.