检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
NIC Management Permission API Action Dependencies IAM Project Enterprise Project Authorization by Instance Authorization by Tag Binding a private IP address to an ECS NIC PUT /v1/{project_id}/cloudservers/nics/{nic_id} ecs:cloudServerNics:update - Supported Not supported Not supported
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.
ECS Status Management Permission API Action Dependencies IAM Project Enterprise Project Authorization by Instance Authorization by Tag Changing an ECS OS POST /v2/{project_id}/cloudservers/{server_id}/changeos ecs:cloudServers:changeOS - Supported Supported Supported Supported Changing
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.
For IAM users, permissions for COC operations need to be granted. For details, see Configuring Custom Policies for ECS Self-Service O&M. UniAgent must be installed. UniAgent is a unified data collection agent that supports script delivery and execution.
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.
Huawei Cloud KMS can ingest attestation documents from QingTian Enclave instances and validates the measurements in the attestation documents against those specified in the IAM policies to determine whether QingTian Enclave instances can access KMS APIs.
For IAM users, permissions for COC operations need to be granted. For details, see Configuring Custom Policies for ECS Self-Service O&M. A UniAgent must be installed. A UniAgent is a unified data collection agent that supports script delivery and execution.
Lifecycle Management Permission API Action Dependencies IAM Project Enterprise Project Authorization by Instance Authorization by Tag Creating ECSs (pay-per-use or yearly/monthly) POST /v1.1/{project_id}/cloudservers Assigning a New EIP ecs:cloudServers:createServers Using an Existing
Disk Management Permission API Action Dependencies IAM Project Enterprise Project Authorization by Instance Authorization by Tag Detaching a disk from an ECS DELETE /v1/{project_id}/cloudservers/{server_id}/detachvolume/{volume_id} ecs:cloudServers:detachVolume - Supported Supported
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.
Authorization Each account has all of the permissions required to call all APIs, but IAM users must have the required permissions specifically assigned. If you are using role/policy-based authorization, see the required permissions in Permissions and Supported Actions.