检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Parameter Type Description policy_id String Unique ID of the IAM system-defined identity policy Minimum length: 20 Maximum length: 2048 policy_name String Name of the IAM system-defined identity policy Minimum length: 1 Maximum length: 100 Table 6 page_info Parameter Type Description
Maximum length: 2048 Table 3 Parameters in the request body Parameter Mandatory Type Description managed_policy_id Yes String Unique ID of the IAM system-defined identity policy managed_policy_name No String Name of the IAM system-defined identity policy Minimum length: 1 Maximum
Click in the upper left corner of the page and choose Management & Governance > IAM Identity Center. In the navigation pane, choose Users. In the user list, click a username to go to the user details page.
To identify the principal that uses access keys, create an IAM user with the same name as the corresponding IAM user or your account. Click OK. Obtain an access key for the IAM user. Log in to the IAM console and select the EU-Dublin region.
Parent topic: IAM User SSO via SAML
Create an IAM user and grant permissions to the user.
Click in the upper left corner of the page and choose Management & Governance > IAM Identity Center. In the navigation pane, choose Multi-Account Permissions > Permission Sets. View the created permission sets and their details in the list.
For details about how to obtain the project ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
Figure 1 Relationship between VIAS and IAM IAM VIAS uses Identity and Access Management (IAM) for authentication and authorization. DIS VIAS transmits analysis results to Data Ingestion Service (DIS) in the format of structured data.
Step 1: Create a User Group Log in to the IAM console. On the IAM console, choose User Groups from the left navigation pane, and click Create User Group in the upper right corner.
To improve security, you are advised to enable MFA in IAM Identity Center.
Replace the fields in bold with the actual values. accountid: ID of the account to which the IAM user belongs. username: name of the IAM user to be created. email: email address of the IAM user. **********: password of the IAM user. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16
For details about how to obtain the project ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
URI POST /v1/instances/{instance_id}/access-control-attribute-configuration Table 1 Path parameters Parameter Mandatory Type Description instance_id Yes String Globally unique ID of an IAM Identity Center instance Request Parameters Table 2 Parameters in the request header Parameter
"Action": [ "hss:hosts:switchVersion", "hss:hosts:manualDetect", "hss:manualDetectStatus:get" ] } ] } Parent Topic: IAM
Verifying Permissions This section describes how to verify IAM user permissions. Sign in to the management console as an IAM user. Choose Enterprise > Project Management in the upper right corner of the page.
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer. URI DELETE /v3.0/OS-ROLE/roles/{role_id} Table 1 URI parameters Parameter Mandatory Type Description role_id Yes String Custom policy ID.
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer. URI DELETE /v3/OS-FEDERATION/identity_providers/{id} Table 1 URI parameters Parameter Mandatory Type Description id Yes String ID of the identity provider to be deleted.
In the case of a custom policy for agencies, the type of this parameter is Object, and the value should be "Resource": {"uri": ["/iam/agencies/agencyTest"]}.
Appendixes Status Codes Error Codes Obtaining Information About Account, IAM User, Group, Project, Region, and Agency