检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
ACLs are write and read permissions attached to accounts, and are not as fine-grained as bucket policies and IAM policies. It is recommended that you use IAM permissions and bucket policies for access control.
Table 5 GetBucketLoggingOutput Parameter Type Description RequestId string Explanation: Request ID returned by the OBS server Agency string Explanation: Name of the IAM agency created by the owner of the target bucket for OBS. You can select an existing IAM agency or create one.
Grant each department with required IAM user permissions and use bucket policies to grant the IAM users independent permissions on resources. Add external buckets on OBS Browser+ to isolate bucket resources between departments.
Allocate IAM users with different roles to each department and use bucket policies to authorize the IAM users independent permissions on resources. Add external buckets on OBS Browser+ to isolate bucket resources between departments.
IAM is recommended for granting permissions. For details, see IAM Custom Policies. The mapping between OBS regions and endpoints must comply with what is listed in Regions and Endpoints.
IAM Agency Select an IAM agency of OBS, with the OBS OperateAccess permission assigned. If no such agency is available, create one. Click OK. The online decompression policy is created.
Grant permissions to an IAM user.
owner = Owner(owner_id='ownerid') # Grant the read and write permissions to an IAM user (userid).
Permissions IAM Agency Delegates OBS to operate your resources, so that OBS can use this agency to implement cross-region replication. If there is no IAM agency available, click View IAM Agencies to create one.
When an IAM user initiates a request, this parameter value is the ID of the account where the IAM user belongs. When an anonymous user initiates a request, this parameter value is Anonymous.
Restrictions To obtain an object ACL, you must be the bucket owner or have the required permission (obs:object:GetObjectAcl in IAM or GetObjectAcl in a bucket policy). For details, see Introduction to OBS Access Control, IAM Custom Policies, and Configuring an Object Policy.
If no such an IAM agency is available, you can create one by referring to Creating an Agency for Back to Source.
To perform this operation, the user must be the bucket owner or the bucket owner's IAM user that has permissions required for deleting bucket policies. The 204 error code "No Content" is returned regardless of whether a requested bucket policy exists or not.
If you want to apply the bucket policy to only the IAM users under that account, enter one or more IAM user IDs. To obtain the account ID and IAM user ID, log in to the console as an IAM user and go to the My Credentials page.
Where Can I Obtain an IAM User ID? Can I Install Two OBS Browser+ Tools from Different Sites in One System? What Are the Differences Between OBS Browser+ and OBS Browser? Does OBS Browser+ Support the Migration of Account and Task Information from OBS Browser?
If the two account IDs are inconsistent, or you logged in to the console as an IAM user, then you are not the bucket owner. In this case, continue to the next step.
For details about how to grant users the KMS CMKFullAccess permission, see Assigning Permissions to an IAM User. Method 2: Use the temporary URL generated by sharing the encrypted object. When you use the shared URL for access, the server automatically decrypts the object.
An account (including all IAM users under this account) can create a maximum of 100 buckets and parallel file systems. There is no limit on the number and total size of objects in a bucket.
For details, see Obtaining Account, IAM User, Project, User Group, Region, and Agency Information.
An account (including all IAM users under the account) can create a maximum of 100 buckets. You can leverage the fine-grained permission control capability of OBS to properly plan and use buckets.