检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Figure 8 Viewing permissions Step 2: Create an IAM User IAM users can be created for employees or applications of an enterprise. Each IAM user has their own security credentials, and inherits permissions from the groups it is a member of.
"iam:agencies:createAgency", "iam:agencies:listAgencies", "iam:roles:listRoles", "iam:roles:createRole" ] } ] } Create a user group and assign permissions.
"iam:agencies:createAgency", "iam:agencies:listAgencies", "iam:roles:listRoles", "iam:roles:createRole" ] } ] } Create a user group and assign permissions.
"iam:agencies:createAgency", "iam:agencies:listAgencies", "iam:roles:listRoles", "iam:roles:createRole" ] } ] } Create a user group and assign permissions.
Log in to the IAM console using a Huawei Cloud account or as an IAM user, locate the IAM user that the target instance belongs to, and add it to the user group created in 3. The IAM user will inherit permissions of the user group.
Log in to the IAM console using a Huawei Cloud account or as an IAM user, locate the IAM user that the target instance belongs to, and add it to the user group created in 3. The IAM user will inherit permissions of the user group.
Log in to the IAM console using a Huawei Cloud account or as an IAM user, locate the IAM user that the target instance belongs to, and add it to the user group created in 3. The IAM user will inherit permissions of the user group.
Log in to the IAM console using a Huawei Cloud account or an IAM account, locate the IAM user that the target instance belongs to, and add it to the user group created in 2. The IAM user will inherit permissions of the user group.
Log in to the IAM console using a Huawei Cloud account or an IAM account, locate the IAM user that the target instance belongs to, and add it to the user group created in 2. The IAM user will inherit permissions of the user group.
You can create IAM users and use them to manage GeminiDB resources. When you log in using an IAM user, password authentication is required. For details, see Step 2: Create IAM Users and Log In.
IAM Identity and Access Management (IAM) provides permission management for GeminiDB. TMS Tag Management Service (TMS) enables you to use tags to manage resources on the management console.
Working with GeminiDB DynamoDB-Compatible API Using IAM to Grant Access to GeminiDB DynamoDB-Compatible API Buying a GeminiDB DynamoDB-Compatible Instance Instance Connection and Management Data Migration Instance Lifecycle Management Instance Modifications Data Backup Data Restoration
Working with GeminiDB HBase API Using IAM to Grant Access to GeminiDB HBase API Buying a GeminiDB HBase Instance Instance Connection and Management Data Migration Instance Lifecycle Management Instance Modifications Data Backup Data Restoration Logs and Audit Viewing Metrics and Configuring
Working with GeminiDB Cassandra API Using IAM to Grant Access to GeminiDB Cassandra API Buying a GeminiDB Cassandra Instance Instance Connection and Management Data Migration Instance Lifecycle Management Instance Modifications Intra-region DR Cross-region Dual-active DR Data Backup
Working with GeminiDB Redis API Using IAM to Grant Access to GeminiDB Redis API Buying a GeminiDB Redis Instance Instance Connection and Management Data Migration Instance Management Modifying Instance Settings Data Backup Data Restoration Diagnosis Analysis Account and security Parameter
Working with GeminiDB Influx API Using IAM to Grant Access to GeminiDB Influx API Buying a GeminiDB Influx Instance Instance Connection and Management Migrating Data Converting Data into a Parquet file and Exporting the Data to OBS Instance Lifecycle Management Instance Modifications
GeminiDB Actions Table 1 Instance management actions Permission API Action IAM Project Enterprise Project Creating a DB instance POST /v3/{project_id}/instances nosql:instance:create √ √ Deleting a DB instance DELETE /v3/{project_id}/instances/{instance_id} nosql:instance:delete √
Constraints: N/A Values: N/A Default value: N/A Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String Explanation: User token You can obtain the token by calling the IAM API by following Obtaining a User Token Through Password
Configuring the Required Permissions If you have an IAM account, assign DAS FullAccess permissions to all users of the account. For details, see Create User Groups and Assign Permissions.
Constraints: N/A Values: N/A Default value: N/A Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String Explanation: User token You can obtain the token by calling the IAM API by following Obtaining a User Token Through Password