检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
To learn more about how IAM is different from Organizations for access control, see How IAM Is Different from Organizations for Access Control?. This section describes the elements used by IAM custom identity policies and Organizations SCPs.
Policies that contain actions only for IAM projects can be used and applied to IAM only.
If status code 201 is returned for the API for Creating an IAM User, the request is successful. Response Header Similar to a request, a response also has a header, for example, Content-Type. For the API for Creating an IAM User, the message header shown in Figure 1 is returned.
For security purposes, create IAM users and grant them permissions for routine management. User An IAM user is created by an account in IAM to use cloud services. Each IAM user has its own identity credentials (password and access keys).
Access Control Anti-DDoS uses IAM to control access, assigning system roles and implementing fine-grained permission management. For details about permission management, see: Permission Management for Anti-DDoS Parent topic: Security
Procedure Description 1 Using IAM to Grant CNAD Permissions Use Identity and Access Management (IAM) to grant fine-grained CNAD service permissions to users. 2 Purchasing a CNAD Instance Purchase a CNAD instance based on service requirements. 3 Adding a Protection Policy Configure
It is automatically enabled when you purchase an EIP. 2 Using IAM to grant Anti-DDoS permissions Use Identity and Access Management (IAM) to grant fine-grained Anti-DDoS service permissions to users. 3 Configuring an EIP protection policy You can set a traffic scrubbing threshold
CNAD Basic (Anti-DDoS) User Guide Anti-DDoS Overview Using IAM to Grant Anti-DDoS Permissions Setting a Traffic Scrubbing Threshold to Intercept Attack Traffic Setting DDoS Alarm Notifications Enabling DDoS Alarm Notifications Enabling Logging Viewing an EIP Monitoring Report Viewing
CNAD Advanced (CNAD) Operation Guide CNAD Overview Using IAM to Grant CNAD Permissions Purchasing a CNAD Instance Adding a Protection Policy Adding a Protected Object Enabling Alarm Notifications for DDoS Attacks Enabling Logging Viewing Statistics Reports Managing Instances Managing
Advanced Anti-DDoS User Guide AAD Overview Using IAM to Grant AAD Permissions Purchasing an AAD Instance Connecting Services to AAD Configuring a Protection Policy Enabling Alarm Notifications for DDoS Attacks Enabling Logging Viewing Statistics Managing Instances Managing Domain
Procedure Description 1 Using IAM to Grant AAD Permissions Use Identity and Access Management (IAM) to grant fine-grained AAD permissions to users. 2 Purchasing an AAD Instance Purchase an AAD instance based on service requirements. 3 Connecting Services to AAD Connect the domain
Setting Alarm Rules (CNAD) Setting Alarm Rules (AAD) Setting Event Alarm Notifications (Anti-DDoS) Setting Event Alarm Notifications (CNAD) Configuring Event Alarm Notifications (AAD) Identity and Access Management (IAM) Identity and Access Management (IAM) provides the permission
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Content-Type Yes String Content-Type request header.
{Endpoint} is the IAM endpoint and can be obtained from Regions and Endpoints. For details about API authentication, see Authentication.
When using a token for authentication, cache it to prevent frequently calling the IAM API used to obtain a user token. Ensure that the token is valid when you use it. Using a token that will soon expire may cause API calling failures.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Content-Type Yes String Content-Type request header.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Content-Type Yes String Content-Type request header.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Content-Type Yes String Content-Type request header.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Content-Type Yes String Content-Type request header.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Content-Type Yes String Content-Type request header.