检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
If the organization is no longer needed, you can delete it. Managing Organizations OU management You can use your management account to add, modify, view, and delete OUs.
apm:application:listTagsForResource - POST /v2/account-mgt/business/create-account apm:application:create - DELETE /v2/account-mgt/business/delete/{id} apm:application:delete - POST /v2/account-mgt/business/get-accounts apm:application:get - PUT /v2/account-mgt/business/update-account
/delete cnad:blackWhiteIpList:delete - PUT /v1/cnad/protected-ips/tags cnad:ipTag:put - GET /v1/cnad/packages cnad:package:list - PUT /v1/cnad/packages/{package_id}/name cnad:package:put - POST /v1/cnad/policies cnad:policy:create - DELETE /v1/cnad/policies/{policy_id} cnad:policy
cfw:ipGroup:listIpGroupMember - GET /v1/{project_id}/address-sets cfw:ipGroup:listIpGroups - DELETE /v1/{project_id}/domain-set/domains/{set_id} cfw:domainGroup:delete - GET /v1/{project_id}/service-items cfw:serviceGroup:listServiceGroupMember - DELETE /v1/{project_id}/service-items
Grants permission to delete a stack. write stack * - rf:stack:getTemplate Grants permission to get the template of a stack. read stack * - rf:stack:listEvents Grants permission to list deployment events of a stack. list stack * - rf:stack:listResources Grants permission to list all
Grants permission to delete an AS configuration. write scalingConfig* - as:scalingConfig:batchDelete Grants permission to delete AS configurations. write scalingConfig* - as:scalingConfig:list Grants permission to list AS configurations. list scalingConfig* - as:scalingConfig:get
Grants permission to delete predefined tags. write - - tms:resourceTags:list Grants permission to list resource tags. list - - tms:resourceTags:create Grants permission to create resource tags. write - - tms:resourceTags:delete Grants permission to delete resource tags. write - -
/{id} cc:cloudConnectionRoutes:get - GET /v3/{domain_id}/ccaas/cloud-connection-routes cc:cloudConnectionRoutes:list - POST /v3/{domain_id}/ccaas/authorisations cc:authorisation:create - DELETE /v3/{domain_id}/ccaas/authorisations/{id} cc:authorisation:delete - PUT /v3/{domain_id}
task. write synctask - oms:synctask:get Grants permission to query details about a synchronization task. read synctask - oms:synctask:delete Grants permission to delete a synchronization task. write synctask - oms:synctask:statistics Grants permission to query statistics about a
Grants permission to delete a share member. permission_management backup * g:EnterpriseProjectId cbr:vaults:showCheckpoint Grants permission to query a restore point. read - - cbr:vaults:showSummary Grants permission to query the vault overview. list - - cbr:vaults:replicate Grants
chart:upload - DELETE /v2/charts/{chart_id} cce:chart:delete - PUT /v2/charts/{chart_id} cce:chart:update - GET /v2/charts/{chart_id} cce:chart:getChart - GET /v2/charts cce:chart:listChart - GET /v2/charts/{chart_id}/archive cce:chart:download - GET /v2/charts/{project_id}/quotas
Table 1 Actions supported by PCA Action Description Access Level Resource Type (*: Required) Condition Key pca:ca:create Grants the permission to create a private CA. write ca * - - g:EnterpriseProjectId pca:ca:delete Grants the permission to delete a private CA. write ca * g:ResourceTag
Table 1 Actions supported by DCS Action Description Access Level Resource Type (*: Required) Condition Key dsc:asset:delete Grants permission to delete data assets. write asset * - dsc:asset:list Grants permission to query the data asset list. list asset * - dsc:asset:create Grants
Grant the permission to delete a cluster. write cluster * g:EnterpriseProjectId g:ResourceTag/<tag-key> css:cluster:modifySpecifications Grant the permission to modify cluster specifications. write cluster * g:EnterpriseProjectId g:ResourceTag/<tag-key> css:cluster:list Grant the
/v1/{project_id}/sfs-turbo/shares/{share_id} sfsturbo:shares:deleteShare vpc:ports:get vpc:ports:delete vpc:securityGroupRules:delete vpc:securityGroups:delete POST /v1/{project_id}/sfs-turbo/shares/{share_id}/action sfsturbo:shares:extendShare billing:order:pay vpc:vpcs:get vpc:
Table 2 Actions and dependencies supported by VPC Endpoint APIs API Action Dependencies POST /v1/{project_id}/vpc-endpoints vpcep:endpoints:create - DELETE /v1/{project_id}/vpc-endpoints/{vpc_endpoint_id} vpcep:endpoints:delete - GET /v1/{project_id}/vpc-endpoints vpcep:endpoints:
a project's tags. tagging - g:ResourceTag/<tag-key> g:TagKeys codeartsperftest::deleteSlaTemplate Grants permission to delete an SLA template. write - - codeartsperftest::deleteCronTask Grants permission to delete a crontask. write - g:ResourceTag/<tag-key> codeartsperftest::createTag
Read instance * g:EnterpriseProjectId g:ResourceTag/<tag-key> swr:instance:delete (Enterprise Edition) Grants permission to delete an instance.
/v3/{project_id}/backups/{backups_id} dds:backup:delete - GET /v3/{project_id}/backups?
Before disabling trusted access for the LTS service, delete the configurations of multi-account log aggregation on the LTS console and then disable the trusted access on the Organizations console.