检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Delete the created rule as required. To delete a single application rule, click Delete in the Operation column of the application rule to be deleted. In the displayed dialog box, click OK.
group √ x workspace:userGroups:getUsers GET /v2/{project_id}/groups/{group_id}/users Query users in a user group √ x workspace:ou:create POST /v2/{project_id}/ous Add OU information √ x workspace:ou:delete DELETE /v2/{project_id}/ous/{ou_id} Delete OU information √ x workspace:ou
To delete unnecessary data, click Delete in the Operation column.
To disable Internet access, you need only to delete the SNAT rule. Related resources will not be deleted. 2. Delete related resources that are not in use as required. Otherwise, fees will be generated. Parent topic: Application Internet Access Management
Clicking Delete in the Operation column of the binding record will delete the bound user information. In this case, the end user needs to bind the virtual MFA device again on the client and log in to the desktop using a dynamic verification code.
More > Edit More > Delete More > Set Visibility 1. In the App Center list, choose More > Edit or Delete. The page for modifying or deleting an application is displayed. 2. You can modify parameters of an added application or delete an application. 3.
If you delete files on the desktop during the backup, the backup of deleted files may fail. Therefore, to ensure data integrity, you are advised to delete the target data after the current backup is complete and then perform a backup again.
Therefore, do not delete or modify the workspace_admin_trust agency when using Workspace. The workspace_admin_trust agency may need to be delegated again in the following scenarios: The permissions required by Workspace may change with the version.
Execute the script or command, for example, route DELETE *, to modify route data. Delete ports 28511, 28512, 28521, and 28522 from the Windows firewall exception options. Enable software or tools that can restrict network traffic, such as Internet Protocol Security (IPsec).
You can determine whether to select Delete users at the same time. 2. Once a desktop is deleted, system disks are deleted together. This operation cannot be undone. Exercise caution when performing this operation. 3.
You can purchase or delete desktops at any time. Parent topic: Purchasing a Desktop
URI DELETE /v2/{project_id}/groups/{group_id} Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Project ID. group_id Yes String Desktop user group ID.
Click to delete the existing icon. Click, select the required icon on your local PC, and click Open. After the icon image is uploaded successfully, close the Modify Icon dialog box. Parent topic: Managing Applications
How Do I Delete a Sandbox? How Do I Remove the Yellow Border of an Application After the Sandbox Application Is Started? Parent topic: Terminal User Operation Guide
Delete the MFA devices from the list on the mobile device. To enable virtual MFA again, bind the virtual MFA device. Parent topic: Configuring Multi-Factor Authentication
URI DELETE /v2/{project_id}/users/{user_id}/otp-devices Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Project ID. user_id Yes String User ID.
DELETE: requests the server to delete specified resources, for example, to delete an object. HEAD: requests the server to return the response header only. PATCH: requests a server to update a part of a specified resource.
URI DELETE /v2/{project_id}/desktops/{desktop_id} Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Project ID. desktop_id Yes String Desktop ID.
Deleting a desktop naming rule Under the Desktop Naming Rules tab, click Delete in the Operation column of the desired naming rule. The Delete Desktop Naming Rule page is displayed. Click OK.
In the Selected on the right, click to delete a user from the restricted user list, as shown in Figure 1. Figure 1 Modifying a policy object Click OK. After the policy is modified, it takes effect upon the next login of the user. Parent topic: Direct Connect Access Management