检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.
For example, SecMaster can check whether permissions are assigned by role in IAM, whether security groups allow all inbound access in VPC, and whether WAF protection policies are enabled. You can harden the configuration based on the recommended methods.
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token.
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. By default, 100 records will be returned.
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token.
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Table 3 Request body parameters Parameter Mandatory Type Description repository Yes String Image repository name.
Procedure Call an IAM API to obtain a user token by referring to Authentication. Obtain the ID of the task to be queried by referring to Obtaining a Task ID.
For details about how to obtain the token, see Obtaining an IAM User Token.
When calling the Identity and Access Management (IAM) API to obtain a user token, set the scope field to domain. The value of X-Subject-Token in the response header is the user token.
Table 5 graph_1 Parameter Type Description id String Graph ID name String Graph name createdBy String IAM username isMultiAz String Whether to enable cross-AZ HA regionCode String Region code azCode String AZ code schemaPath Array of schemaPath_1 objects Path for storing the metadata
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Authorization No String Authentication information. This parameter is mandatory for AK/SK authentication.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. Authorization No String Authentication information. This parameter is mandatory when AK/SK-based authentication is used.
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Authorization No String Authentication information. This parameter is mandatory for AK/SK authentication.
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Authorization No String Authentication information. This parameter is mandatory for AK/SK authentication.
The token can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token. Authorization No String Authentication information. This parameter is mandatory for AK/SK authentication.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. Authorization No String Authentication information. This parameter is mandatory when AK/SK-based authentication is used.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. Authorization No String Authentication information. This parameter is mandatory when AK/SK-based authentication is used.