检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
URI POST /v1/instances/{resource_type}/{resource_id}/tags/delete Table 1 Path parameters Parameter Mandatory Type Description resource_type Yes String Resource type Enumerated value: identitycenter:permissionset (permission set) resource_id Yes String Unique ID of a permission set
DELETE: requests the server to delete specified resources, for example, an object. HEAD: requests the server to return the response header. PATCH: requests the server to update partial content of a specified resource.
In the Identity Provider Certificates area, import or delete certificates by referring to Managing Certificates. Figure 1 Editing SAML 2.0 configuration Parent topic: Configuring an External Identity Provider
In the displayed dialog box, enter DELETE and click OK. Figure 7 Deleting an access token IAM Identity Center supports two access tokens at most. To generate additional access tokens, delete expired or unused access tokens. Parent topic: Configuring an External Identity Provider
Example policy denying permission set deletion: { "Version": "1.1", "Statement": [ { "Effect": "Deny", "Action": [ "IdentityCenter:permissionSet:delete" ] } ] } Example 3: Create a custom policy containing
Contact technical support. 400 IdentityCenter.1508 Failed to delete the MFA device: {0}. Failed to delete the MFA device for the user. Check whether the parameter is correct. 500 IdentityCenter.1508 Failed to delete the MFA device: {0}.
If you do not want some users to have permission to delete a specified organization unit (OU), you can add the following policy content to custom identity policies of the permission set to prevent these users from deleting the specified OUs.
URI POST /v1/instances/{instance_id}/account-assignments/delete Table 1 Path parameters Parameter Mandatory Type Description instance_id Yes String Globally unique ID of an IAM Identity Center instance Request Parameters Table 2 Parameters in the request header Parameter Mandatory
policy in a specified permission set GET https://{hostname}/v1/instances/{instance_id}/permission-sets/{permission_set_id}/custom-policy Example Response Status code: 200 { "custom_policy" : "{\"Version\":\"5.0\",\"Statement\":[{\"Effect\":\"Deny\",\"Action\":[\"organizations:ous:delete
If policies and custom policies have been configured in the permission set, enabling identity policy will delete them. Figure 3 Setting policies In the Confirm step, confirm the modification and click OK.
Request Adding a custom identity policy to a specified permission set PUT https://{hostname}/v1/instances/{instance_id}/permission-sets/{permission_set_id}/custom-policy { "custom_policy" : "{\"Version\":\"5.0\",\"Statement\":[{\"Effect\":\"Deny\",\"Action\":[\"organizations:ous:delete