检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
It can be obtained by calling the IAM API. The value of X-Subject-Token in the response header is the user token.
Authorization Information Each account has all the permissions required to call all APIs, but IAM users must be assigned the required permissions.
It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is the user token.
Authorization Information Each account has all the permissions required to call all APIs, but IAM users must be assigned the required permissions.
IAM. * - KMS_REGION_ID: regions supported by KMS. For details, see https://developer.huaweicloud.com/intl/en-us/endpoint?DEW. * - KMS_ENDPOINT: endpoint for accessing KMS. For details, see https://developer.huaweicloud.com/intl/en-us/endpoint?
Authorization Information Each account has all the permissions required to call all APIs, but IAM users must be assigned the required permissions.
Authorization Information Each account has all the permissions required to call all APIs, but IAM users must be assigned the required permissions.
Authorization Information Each account has all the permissions required to call all APIs, but IAM users must be assigned the required permissions.
You can host encryption and decryption keys in KMS and create an agency in IAM for FunctionGraph to access KMS. Asset Identification and Management Volume Backup Service (VBS) EVS backup encryption feature relies on KMS.
For details, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information. CSMS_ENDPOINT: endpoint for accessing CSMS. There will be security risks if the AK/SK used for authentication is directly written into code.
Authorization Information Each account has all the permissions required to call all APIs, but IAM users must be assigned the required permissions.
For details, see Obtaining Account, IAM User, Group, Project, Region, and Agency Information. KMS_ENDPOINT: endpoint for accessing KMS. For details, see Endpoints. There will be security risks if the AK/SK used for authentication is directly written into code.