检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
IAM authentication: See "Application Scenarios of IAM Authentication" in Permissions Management. LakeFormation metadata permissions management See Connecting DLI to LakeFormation.
Figure 1 Granting permissions of a global variable to a user Table 2 Global variable parameters Parameter Description Username Name of the IAM user who is granted permissions NOTE: This username must be an existing IAM username.
IAM authentication: See "Application Scenarios of IAM Authentication" in Permissions Management. LakeFormation metadata permissions management See Connecting DLI to LakeFormation. Parent topic: Using Delta to Develop Jobs in DLI
Region-specific projects: IAM users will be able to use resources in the selected region-specific projects based on assigned permissions. Enterprise projects: IAM users will be able to use resources in the selected enterprise projects based on assigned permissions.
To ensure account security, create Identity and Access Management (IAM) users and grant them permissions for routine management. User An IAM user is created by an account in IAM to use cloud services. Each IAM user has its own identity credentials (password and access keys).
If the user is an IAM user, you can set permissions for it. If the user is already an administrator, you can only view the permissions information. In the Operation column of the IAM user or project, click Set Permission. The Set Permission dialog box appears.
With IAM, you can use your Huawei Cloud account to create IAM users for your employees, and assign permissions to the users to control their access to specific resource types.
Figure 1 Granting permissions on datasource connections Table 1 Permission granting parameters Parameter Description Username Name of the IAM user to whom permissions on the datasource connection are to be granted. NOTE: The username is the name of an existing IAM user.
Create a custom IAM policy Policy_A to grant the permission to access resources E1 and DB1 under enterprise project A.
Preparations Configuring DLI Agency Permissions Creating an IAM User and Granting Permissions Configuring a DLI Job Bucket
Figure 2 Getting permissions Authorization on IAM Log in to the IAM console. In the navigation pane, choose Permissions > Policies/Roles. On the displayed page, click Create Custom Policy. Create a permission policy for the subuser to view DLI Flink jobs.
DLI Permission Management Overview of the DLI Permission System DLI Permission Management IAM Permission Management Example Use Case: Creating a User Group and Granting Permissions for Using DLI Elastic Resource Pools and Databases
User authorization: Achieves precise allocation of user permissions by managing IAM users within the same account.
Username/Project Name If you select User, enter the IAM username when adding a user to the database. NOTE: The username must be an existing IAM username and has been used to log in to the DLI management console.
HetuEngine does not support IAM user authorization and requires resource authorization provided by the DLI console. Solution Grant users the permission to create tables by referring to Managing Database Permissions. Parent topic: DLI Permissions Management
Set Username to the name of the desired IAM user, and select the required permissions for the user. Click OK to. Table 1 describes the related parameters.
IAM Identity and Access Management (IAM) authenticates access to DLI. For details about related operations, see Creating an IAM User and Granting Permissions and Creating a Custom Policy. CTS Cloud Trace Service (CTS) audits performed DLI operations.
NOTE: The username is the name of an existing IAM user. Click OK. Parent Topic: Managing Program Packages of Jar Jobs
With CTS, you can monitor high-risk and sensitive operations related to IAM in real time. If you perform such an operation when using DLI, CTS sends a notification to subscribers.
With IAM, you can use your HUAWEI CLOUD account to create IAM users for your employees, and assign permissions to the users to control their access to specific resource types.