检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
For IAM endpoints, see Regions and Endpoints. Debugging You can debug this API in API Explorer.
If an IAM user does not have sufficient permissions, an agency cannot be automatically created. To solve this problem, assign permissions defined in the Tenant Administrator policy to the IAM user.
For details about how to obtain the agency ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
X-Auth-Token Yes String IAM user token (no special permission requirements). Response Parameters Table 3 Parameters in the response body Parameter Type Description service Object Service information.
In the case of a custom policy for agencies, the parameter value should be "Action": ["iam:tokens:assume"]. Effect String Effect of the permission. The value can be Allow or Deny.
For details about how to obtain a user group ID, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information.
Click Authorize, select the SMS Custom Policy For EPS At IAM policy, and click Next. Select All resources for Scope and click OK.
Only non-administrator IAM users can be used for installing isap-agent. Make sure the /opt/cloud directory where you install isap-agent and use the collector has at least 100 GB of free disk space.
iam:roles:listRoles, and iam:agencies:pass actions.
Solution You can allow IAM users to access cloud services either using programmatic methods or through the console. Ensure that an IAM user does not have both a password and an access key. Rule Logic If an IAM user is disabled, this user is compliant.
IAM username or email address Enter the IAM username or email address. Obtain the IAM account name from the administrator. IAM user password Enter the initial password provided by the administrator. The organization member needs to change the password upon the first login.
Log in to the management console as the IAM user. If resource information is displayed, the IAM user has been successfully assigned the required permissions. Figure 5 My Resources Parent topic: FAQs
For more information about IAM, see the IAM Service Overview. MTD Permissions By default, new IAM users do not have any permissions. You need to add a user to one or more groups, and attach permissions policies or roles to these groups.
Solution You can enable login protection for the noncompliant IAM users. For more details, see Login Protection. Rule Logic If an IAM user is in the disabled state, this user is compliant. If an IAM user that is enabled has MFA enabled, this user is compliant.
This section describes how to use IAM to implement fine-grained permissions control for your VPC resources. With IAM, you can: Create IAM users for personnel based on your enterprise's organizational structure.
If your account does not require individual IAM users for permissions management, you can skip this section. IAM is a free service. You only pay for the resources in your account. For more information about IAM, see IAM Service Overview.
IAM can be used free of charge. You pay only for the resources in your account. For more information about IAM, see IAM Service Overview. VBS Permissions By default, new IAM users do not have permissions assigned.
IAM can be used free of charge. You pay only for the resources in your account. For more information about IAM, see IAM Service Overview. VBS Permissions By default, new IAM users do not have permissions assigned.
Figure 4 Selecting Identity and Access Management Grant the admin or Full Access permission to the IAM user. Once done, the IAM user can view service monitoring data.
For example, the endpoint of IAM in region CN-Hong Kong is iam.ap-southeast-1.myhuaweicloud.com.