diff --git a/docs/iam/umn/ALL_META.TXT.json b/docs/iam/umn/ALL_META.TXT.json index 1c3c4857..3958b334 100644 --- a/docs/iam/umn/ALL_META.TXT.json +++ b/docs/iam/umn/ALL_META.TXT.json @@ -1,540 +1,840 @@ [ { "uri":"iam_01_0021.html", - "product_code":"", + "product_code":"iam", "code":"1", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", + "doc_type":"usermanual", "kw":"Service Overview", "title":"Service Overview", "githuburl":"" }, { "uri":"iam_01_0026.html", - "product_code":"", + "product_code":"iam", "code":"2", "des":"Identity and Access Management (IAM) provides identity authentication, permissions management, and access control. With IAM, you can create users for individuals, systems", - "doc_type":"", + "doc_type":"usermanual", "kw":"What Is IAM?,Service Overview,User Guide", "title":"What Is IAM?", "githuburl":"" }, { "uri":"en-us_topic_0046611276.html", - "product_code":"", + "product_code":"iam", "code":"3", "des":"IAM provides the following basic functions:Refined permissions managementYou can control user access to different projects and grant different permissions to users for th", - "doc_type":"", + "doc_type":"usermanual", "kw":"IAM Features,Service Overview,User Guide", "title":"IAM Features", "githuburl":"" }, { "uri":"iam_01_0023.html", - "product_code":"", + "product_code":"iam", "code":"4", - "des":"You can manage users in your account and their security credentials. In addition, you can configure federated identity authentication so that users in other systems can a", - "doc_type":"", + "des":"You can manage users in your account and their security credentials. In addition, you can configure identity federation so that users in other systems can access the clou", + "doc_type":"usermanual", "kw":"Identity Management,Service Overview,User Guide", "title":"Identity Management", "githuburl":"" }, { "uri":"iam_01_0024.html", - "product_code":"", + "product_code":"iam", "code":"5", "des":"You can grant users permissions to access different resources.Plan user groups and grant permissions to each user group.Add a user to a specific user group so that the us", - "doc_type":"", + "doc_type":"usermanual", "kw":"Permissions Management,Service Overview,User Guide", "title":"Permissions Management", "githuburl":"" }, { "uri":"iam_01_0035.html", - "product_code":"", + "product_code":"iam", "code":"6", "des":"To prevent personal data, such as the username, password, and mobile number, from being accessed by unauthorized entities or individuals, IAM encrypts the data before sto", - "doc_type":"", + "doc_type":"usermanual", "kw":"Personal Data Protection Mechanism,Service Overview,User Guide", "title":"Personal Data Protection Mechanism", "githuburl":"" }, { "uri":"iam_01_0027.html", - "product_code":"", + "product_code":"iam", "code":"7", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", + "doc_type":"usermanual", "kw":"Getting Started", "title":"Getting Started", "githuburl":"" }, { "uri":"iam_01_0034.html", - "product_code":"", + "product_code":"iam", "code":"8", "des":"Your account has full access to your resources. For security purposes, create a security administrator and perform routine management as the security administrator.If a u", - "doc_type":"", + "doc_type":"usermanual", "kw":"Getting Started with IAM,Getting Started,User Guide", "title":"Getting Started with IAM", "githuburl":"" }, { "uri":"iam_01_0029.html", - "product_code":"", + "product_code":"iam", "code":"9", "des":"For security purposes, create a security administrator and manage users in your account as the security administrator.Programmatic access: Users can access cloud services", - "doc_type":"", + "doc_type":"usermanual", "kw":"Username,Creating a Security Administrator,Getting Started,User Guide", "title":"Creating a Security Administrator", "githuburl":"" }, { "uri":"iam_01_0030.html", - "product_code":"", + "product_code":"iam", "code":"10", "des":"As a security administrator, you can create user groups and grant them permissions.To enable users to directly view their permissions, set a description for the user grou", - "doc_type":"", + "doc_type":"usermanual", "kw":"Creating a User Group and Assigning Permissions,Getting Started,User Guide", "title":"Creating a User Group and Assigning Permissions", "githuburl":"" }, { "uri":"iam_01_0031.html", - "product_code":"", + "product_code":"iam", "code":"11", "des":"As a security administrator, you can create a user and add the user to a user group. The user automatically inherits the permissions of the user group.For security purpos", - "doc_type":"", + "doc_type":"usermanual", "kw":"Username,Creating a User and Adding the User to a User Group,Getting Started,User Guide", "title":"Creating a User and Adding the User to a User Group", "githuburl":"" }, { "uri":"iam_01_0032.html", - "product_code":"", + "product_code":"iam", "code":"12", - "des":"You can log in to the cloud system as a user and access cloud services based on granted permissions.Verify the information displayed on the Login Verification page during", - "doc_type":"", - "kw":"Logging In as a User,Getting Started,User Guide", - "title":"Logging In as a User", + "des":"You can log in to the cloud platform as an IAM user and access cloud services based on granted permissions.If either of the following has been configured on Security Sett", + "doc_type":"usermanual", + "kw":"Logging In as an IAM User,Getting Started,User Guide", + "title":"Logging In as an IAM User", "githuburl":"" }, { "uri":"iam_01_0040.html", - "product_code":"", + "product_code":"iam", "code":"13", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", + "doc_type":"usermanual", "kw":"User Guide", "title":"User Guide", "githuburl":"" }, { - "uri":"iam_01_0011.html", - "product_code":"", + "uri":"iam_01_06.html", + "product_code":"iam", "code":"14", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", + "doc_type":"usermanual", + "kw":"IAM Users", + "title":"IAM Users", + "githuburl":"" + }, + { + "uri":"en-us_topic_0046611303.html", + "product_code":"iam", + "code":"15", + "des":"If you need to share resources in your account to other users, you can create users by using the console or by calling an API, and set security credentials and required p", + "doc_type":"usermanual", + "kw":"Username,Creating a User,IAM Users,User Guide", + "title":"Creating a User", + "githuburl":"" + }, + { + "uri":"en-us_topic_0079496985.html", + "product_code":"iam", + "code":"16", + "des":"IAM users created without being added to any groups do not have permissions. You can assign permissions to these IAM users on the IAM console. After authorization, the us", + "doc_type":"usermanual", + "kw":"Assigning Permissions to an IAM User,IAM Users,User Guide", + "title":"Assigning Permissions to an IAM User", + "githuburl":"" + }, + { + "uri":"iam_01_0552.html", + "product_code":"iam", + "code":"17", + "des":"You can log in to the console as an IAM user or obtain the IAM user login link from the administrator and then use the link to log in.Domain name: The name of the account", + "doc_type":"usermanual", + "kw":"Logging In as an IAM User,IAM Users,User Guide", + "title":"Logging In as an IAM User", + "githuburl":"" + }, + { + "uri":"en-us_topic_0046661675.html", + "product_code":"iam", + "code":"18", + "des":"You can modify the user information, including the status, access type, description, external identity ID, and belonged user group.If the job responsibilities of a user a", + "doc_type":"usermanual", + "kw":"Viewing and Modifying User Information,IAM Users,User Guide", + "title":"Viewing and Modifying User Information", + "githuburl":"" + }, + { + "uri":"iam_02_0004.html", + "product_code":"iam", + "code":"19", + "des":"After an IAM user is deleted, they can no longer log in and their username, password, access keys, and authorizations will be cleared and cannot be recovered.Make sure th", + "doc_type":"usermanual", + "kw":"Deleting an IAM User,IAM Users,User Guide", + "title":"Deleting an IAM User", + "githuburl":"" + }, + { + "uri":"iam_01_0653.html", + "product_code":"iam", + "code":"20", + "des":"As an administrator, you can reset the password of an IAM user if the user has forgotten the password and no email address or mobile number has been bound to the user.To ", + "doc_type":"usermanual", + "kw":"Changing the Login Password of an IAM User,IAM Users,User Guide", + "title":"Changing the Login Password of an IAM User", + "githuburl":"" + }, + { + "uri":"en-us_topic_0080335069.html", + "product_code":"iam", + "code":"21", + "des":"You can modify user permissions using either of the following methods:Change the user groups to which a user belongs on the Modify User page. Choose this method if you wa", + "doc_type":"usermanual", + "kw":"Modifying User Permissions,IAM Users,User Guide", + "title":"Modifying User Permissions", + "githuburl":"" + }, + { + "uri":"en-us_topic_0079497018.html", + "product_code":"iam", + "code":"22", + "des":"Resources in different projects or regions are isolated. You can access resources only in the projects or regions for which you have been granted permissions. If you do n", + "doc_type":"usermanual", + "kw":"Switching Projects or Regions,IAM Users,User Guide", + "title":"Switching Projects or Regions", + "githuburl":"" + }, + { + "uri":"iam_01_0655.html", + "product_code":"iam", + "code":"23", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"User Groups and Authorization", + "title":"User Groups and Authorization", + "githuburl":"" + }, + { + "uri":"en-us_topic_0046611269.html", + "product_code":"iam", + "code":"24", + "des":"You can plan user groups based on user responsibilities and grant the required permissions to the user groups. Users inherit permissions from the user groups to which the", + "doc_type":"usermanual", + "kw":"Creating a User Group and Assigning Permissions,User Groups and Authorization,User Guide", + "title":"Creating a User Group and Assigning Permissions", + "githuburl":"" + }, + { + "uri":"iam_03_0002.html", + "product_code":"iam", + "code":"25", + "des":"A user inherits permissions from the groups to which the user belongs. To change the permissions of a user, add the user to a new group or remove the user from an existin", + "doc_type":"usermanual", + "kw":"Adding Users to or Removing Users from a User Group,User Groups and Authorization,User Guide", + "title":"Adding Users to or Removing Users from a User Group", + "githuburl":"" + }, + { + "uri":"iam_01_0430.html", + "product_code":"iam", + "code":"26", + "des":"To delete a user group, do the following:To delete multiple user groups at a time, do the following:", + "doc_type":"usermanual", + "kw":"Deleting a User Group,User Groups and Authorization,User Guide", + "title":"Deleting a User Group", + "githuburl":"" + }, + { + "uri":"en-us_topic_0085605493.html", + "product_code":"iam", + "code":"27", + "des":"As a security administrator, you can view and modify the basic information, permissions, and users of a user group. You can modify users' permissions by changing the grou", + "doc_type":"usermanual", + "kw":"Viewing and Modifying User Group Information,User Groups and Authorization,User Guide", + "title":"Viewing and Modifying User Group Information", + "githuburl":"" + }, + { + "uri":"iam_03_0004.html", + "product_code":"iam", + "code":"28", + "des":"To revoke a policy or role attached to a user group, do the following:To revoke multiple policies or roles attached to a user group, do as follows:", + "doc_type":"usermanual", + "kw":"Revoking Permissions of a User Group,User Groups and Authorization,User Guide", + "title":"Revoking Permissions of a User Group", + "githuburl":"" + }, + { + "uri":"iam_01_0657.html", + "product_code":"iam", + "code":"29", + "des":"Cloud services interwork with each other. Roles of some services take effect only if they are assigned along with roles of other services.For example, the DNS Administrat", + "doc_type":"usermanual", + "kw":"Assigning Dependency Roles,User Groups and Authorization,User Guide", + "title":"Assigning Dependency Roles", + "githuburl":"" + }, + { + "uri":"iam_01_0015.html", + "product_code":"iam", + "code":"30", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Permissions", + "title":"Permissions", + "githuburl":"" + }, + { + "uri":"iam_01_019.html", + "product_code":"iam", + "code":"31", + "des":"By default, new IAM users do not have permissions assigned. You need to add a user to one or more groups, and attach permissions policies or roles to these groups. Users ", + "doc_type":"usermanual", + "kw":"Basic Concepts,Permissions,User Guide", + "title":"Basic Concepts", + "githuburl":"" + }, + { + "uri":"iam_01_0601.html", + "product_code":"iam", + "code":"32", + "des":"Roles are a type of coarse-grained authorization mechanism that defines service-level permissions based on user responsibilities. IAM provides a limited number of roles f", + "doc_type":"usermanual", + "kw":"Roles,Permissions,User Guide", + "title":"Roles", + "githuburl":"" + }, + { + "uri":"iam_01_0017.html", + "product_code":"iam", + "code":"33", + "des":"A fine-grained policy consists of the policy version (the Version field) and statement (the Statement field).Version: Distinguishes between role-based access control (RBA", + "doc_type":"usermanual", + "kw":"Policy Syntax,Permissions,User Guide", + "title":"Policy Syntax", + "githuburl":"" + }, + { + "uri":"iam_01_0016.html", + "product_code":"iam", + "code":"34", + "des":"You can create custom policies to supplement system-defined policies and implement more refined access control.Global services: Select this option if the services to whic", + "doc_type":"usermanual", + "kw":"Creating a Custom Policy,Permissions,User Guide", + "title":"Creating a Custom Policy", + "githuburl":"" + }, + { + "uri":"iam_01_0600.html", + "product_code":"iam", + "code":"35", + "des":"Use the following method to assign permissions of the FullAccess policy to a user but also forbid the user from accessing CTS. Create a custom policy for denying access t", + "doc_type":"usermanual", + "kw":"Custom Policy Use Cases,Permissions,User Guide", + "title":"Custom Policy Use Cases", + "githuburl":"" + }, + { + "uri":"en-us_topic_0046611308.html", + "product_code":"iam", + "code":"36", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Security Settings", + "title":"Security Settings", + "githuburl":"" + }, + { + "uri":"iam_07_0001.html", + "product_code":"iam", + "code":"37", + "des":"You can configure the account settings, critical operation protection, login authentication policy, password policy, and access control list (ACL) on the Security Setting", + "doc_type":"usermanual", + "kw":"Security Settings Overview,Security Settings,User Guide", + "title":"Security Settings Overview", + "githuburl":"" + }, + { + "uri":"iam_01_0703.html", + "product_code":"iam", + "code":"38", + "des":"As an account administrator, both you and your IAM users can manage basic information on this page.A mobile number or an email address can be bound only to one account or", + "doc_type":"usermanual", + "kw":"Basic Information,Security Settings,User Guide", + "title":"Basic Information", + "githuburl":"" + }, + { + "uri":"iam_07_0002.html", + "product_code":"iam", + "code":"39", + "des":"Only an administrator can configure critical operation protection, and IAM users can only view the configurations. If an IAM user needs to modify the configurations, the ", + "doc_type":"usermanual", + "kw":"Critical Operation Protection,Security Settings,User Guide", + "title":"Critical Operation Protection", + "githuburl":"" + }, + { + "uri":"iam_01_0704.html", + "product_code":"iam", + "code":"40", + "des":"The Login Authentication Policy tab of the Security Settings page provides the Session Timeout, Account Lockout, Recent Login Information, Recent Login Information, and C", + "doc_type":"usermanual", + "kw":"Login Authentication Policy,Security Settings,User Guide", + "title":"Login Authentication Policy", + "githuburl":"" + }, + { + "uri":"iam_01_0607.html", + "product_code":"iam", + "code":"41", + "des":"The Password Policy tab of the Security Settings page provides the Password Composition & Reuse, Password Expiration, and Minimum Password Age settings.Only the administr", + "doc_type":"usermanual", + "kw":"Password Policy,Security Settings,User Guide", + "title":"Password Policy", + "githuburl":"" + }, + { + "uri":"iam_07_0003.html", + "product_code":"iam", + "code":"42", + "des":"The ACL tab of the Security Settings page provides the IP Address Ranges, IPv4 CIDR Blocks, and VPC Endpoints settings for allowing user access only from specified IP add", + "doc_type":"usermanual", + "kw":"ACL,Security Settings,User Guide", + "title":"ACL", + "githuburl":"" + }, + { + "uri":"en-us_topic_0066738518.html", + "product_code":"iam", + "code":"43", + "des":"Projects are used to group and isolate OpenStack resources, including compute, storage, and network resources. A project can be a department or a project team. Resources ", + "doc_type":"usermanual", + "kw":"Projects,User Guide,User Guide", + "title":"Projects", + "githuburl":"" + }, + { + "uri":"en-us_topic_0079496986.html", + "product_code":"iam", + "code":"44", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Agencies", + "title":"Agencies", + "githuburl":"" + }, + { + "uri":"iam_01_0054.html", + "product_code":"iam", + "code":"45", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Account Delegation", + "title":"Account Delegation", + "githuburl":"" + }, + { + "uri":"iam_06_0001.html", + "product_code":"iam", + "code":"46", + "des":"The agency function enables you to delegate another account to implement O&M on your resources based on assigned permissions.You can delegate resource access only to acco", + "doc_type":"usermanual", + "kw":"Delegating Resource Access to Another Account,Account Delegation,User Guide", + "title":"Delegating Resource Access to Another Account", + "githuburl":"" + }, + { + "uri":"en-us_topic_0046613147.html", + "product_code":"iam", + "code":"47", + "des":"By creating an agency, you can share your resources with another account, or delegate an individual or team to manage your resources. You do not need to share your securi", + "doc_type":"usermanual", + "kw":"Creating an Agency (by a Delegating Party),Account Delegation,User Guide", + "title":"Creating an Agency (by a Delegating Party)", + "githuburl":"" + }, + { + "uri":"iam_01_0063.html", + "product_code":"iam", + "code":"48", + "des":"When a trust relationship is established between your account and another account, you become a delegated party. By default, only your account and the members of the admi", + "doc_type":"usermanual", + "kw":"(Optional) Assigning Permissions to an IAM User (by a Delegated Party),Account Delegation,User Guide", + "title":"(Optional) Assigning Permissions to an IAM User (by a Delegated Party)", + "githuburl":"" + }, + { + "uri":"en-us_topic_0046613148.html", + "product_code":"iam", + "code":"49", + "des":"When an account establishes a trust relationship with your account, you become a delegated party. You and all the users you have authorized can switch to the delegating a", + "doc_type":"usermanual", + "kw":"Switching Roles (by a Delegated Party),Account Delegation,User Guide", + "title":"Switching Roles (by a Delegated Party)", + "githuburl":"" + }, + { + "uri":"iam_06_0004.html", + "product_code":"iam", + "code":"50", + "des":"Services on the cloud platform interwork with each other, and some cloud services are dependent on other services. To delegate a cloud service to access other services an", + "doc_type":"usermanual", + "kw":"Cloud Service Delegation,Agencies,User Guide", + "title":"Cloud Service Delegation", + "githuburl":"" + }, + { + "uri":"iam_01_0730.html", + "product_code":"iam", + "code":"51", + "des":"To modify the permissions, validity period, and description of an agency, click Modify in the row containing the agency you want to modify.You can change the cloud servic", + "doc_type":"usermanual", + "kw":"Deleting or Modifying Agencies,Agencies,User Guide", + "title":"Deleting or Modifying Agencies", + "githuburl":"" + }, + { + "uri":"en-us_topic_0059870089.html", + "product_code":"iam", + "code":"52", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Identity Providers", + "title":"Identity Providers", + "githuburl":"" + }, + { + "uri":"en-us_topic_0079620341.html", + "product_code":"iam", + "code":"53", + "des":"The cloud platform provides identity federation based on Security Assertion Markup Language (SAML) or OpenID Connect. This function allows users in your enterprise manage", + "doc_type":"usermanual", + "kw":"identity federation,Identity federation,Introduction,Identity Providers,User Guide", + "title":"Introduction", + "githuburl":"" + }, + { + "uri":"iam_08_0251.html", + "product_code":"iam", + "code":"54", + "des":"IAM supports two SSO types: virtual user SSO and IAM user SSO. This section describes the two SSO types and their differences, helping you to choose an appropriate type f", + "doc_type":"usermanual", + "kw":"Application Scenarios of Virtual User SSO and IAM User SSO,Identity Providers,User Guide", + "title":"Application Scenarios of Virtual User SSO and IAM User SSO", + "githuburl":"" + }, + { + "uri":"iam_08_0002.html", + "product_code":"iam", + "code":"55", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Virtual User SSO via SAML", + "title":"Virtual User SSO via SAML", + "githuburl":"" + }, + { + "uri":"iam_08_0021.html", + "product_code":"iam", + "code":"56", + "des":"The cloud platform supports identity federation with Security Assertion Markup Language (SAML), which is an open standard that many identity providers (IdPs) use. During ", + "doc_type":"usermanual", + "kw":"Overview of Virtual User SSO via SAML,Virtual User SSO via SAML,User Guide", + "title":"Overview of Virtual User SSO via SAML", + "githuburl":"" + }, + { + "uri":"iam_08_0003.html", + "product_code":"iam", + "code":"57", + "des":"To establish a trust relationship between an enterprise IdP and the cloud platform, upload the metadata file of the cloud platform to the enterprise IdP, and then create ", + "doc_type":"usermanual", + "kw":"Step 1: Create an IdP Entity,Virtual User SSO via SAML,User Guide", + "title":"Step 1: Create an IdP Entity", + "githuburl":"" + }, + { + "uri":"iam_08_0252.html", + "product_code":"iam", + "code":"58", + "des":"You can configure parameters in the enterprise IdP to determine what information will be sent to the cloud platform. The cloud platform authenticates the federated identi", + "doc_type":"usermanual", + "kw":"Step 2: Configure the Enterprise IdP,Virtual User SSO via SAML,User Guide", + "title":"Step 2: Configure the Enterprise IdP", + "githuburl":"" + }, + { + "uri":"iam_08_0004.html", + "product_code":"iam", + "code":"59", + "des":"After an enterprise IdP user logs in to the cloud platform, the cloud platform authenticates the identity and assigns permissions to the user based on the identity conver", + "doc_type":"usermanual", + "kw":"Step 3: Configure Identity Conversion Rules,Virtual User SSO via SAML,User Guide", + "title":"Step 3: Configure Identity Conversion Rules", + "githuburl":"" + }, + { + "uri":"iam_08_0025.html", + "product_code":"iam", + "code":"60", + "des":"Federated users can initiate a login from the IdP or SP.Initiating a login from an IdP, for example, Microsoft Active Directory Federation Services (AD FS) or Shibboleth.", + "doc_type":"usermanual", + "kw":"Step 4: Verify the Federated Login,Virtual User SSO via SAML,User Guide", + "title":"Step 4: Verify the Federated Login", + "githuburl":"" + }, + { + "uri":"iam_08_0005.html", + "product_code":"iam", + "code":"61", + "des":"Configure a federated login entry in the enterprise IdP to enable enterprise users use the login link to access the cloud platform.An IdP entity has been created on the c", + "doc_type":"usermanual", + "kw":"(Optional) Step 5: Configure a Federated Login Entry in the Enterprise IdP,Virtual User SSO via SAML", + "title":"(Optional) Step 5: Configure a Federated Login Entry in the Enterprise IdP", + "githuburl":"" + }, + { + "uri":"iam_08_0253.html", + "product_code":"iam", + "code":"62", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"IAM User SSO via SAML", + "title":"IAM User SSO via SAML", + "githuburl":"" + }, + { + "uri":"iam_08_0254.html", + "product_code":"iam", + "code":"63", + "des":"The cloud platform supports identity federation with Security Assertion Markup Language (SAML), which is an open standard that many identity providers (IdPs) use. During ", + "doc_type":"usermanual", + "kw":"Overview of IAM User SSO via SAML,IAM User SSO via SAML,User Guide", + "title":"Overview of IAM User SSO via SAML", + "githuburl":"" + }, + { + "uri":"iam_08_0255.html", + "product_code":"iam", + "code":"64", + "des":"To establish a trust relationship between an enterprise IdP and the cloud platform, upload the metadata file of the cloud platform to the enterprise IdP, and then create ", + "doc_type":"usermanual", + "kw":"Step 1: Create an IdP Entity,IAM User SSO via SAML,User Guide", + "title":"Step 1: Create an IdP Entity", + "githuburl":"" + }, + { + "uri":"iam_08_0256.html", + "product_code":"iam", + "code":"65", + "des":"You can configure parameters in the enterprise IdP to determine what information will be sent to the cloud platform. The cloud platform authenticates the federated identi", + "doc_type":"usermanual", + "kw":"Step 2: Configure the Enterprise IdP,IAM User SSO via SAML,User Guide", + "title":"Step 2: Configure the Enterprise IdP", + "githuburl":"" + }, + { + "uri":"iam_08_0257.html", + "product_code":"iam", + "code":"66", + "des":"For the IAM user SSO type, you must configure an external identity ID for the IAM user which the federated user maps to on the cloud platform. The external identity ID mu", + "doc_type":"usermanual", + "kw":"Step 3: Configure an External Identity ID,IAM User SSO via SAML,User Guide", + "title":"Step 3: Configure an External Identity ID", + "githuburl":"" + }, + { + "uri":"iam_08_0258.html", + "product_code":"iam", + "code":"67", + "des":"Federated users can initiate a login from the IdP or SP.Initiating a login from an IdP, for example, Microsoft Active Directory Federation Services (AD FS) or Shibboleth.", + "doc_type":"usermanual", + "kw":"Step 4: Verify the Federated Login,IAM User SSO via SAML,User Guide", + "title":"Step 4: Verify the Federated Login", + "githuburl":"" + }, + { + "uri":"iam_08_0259.html", + "product_code":"iam", + "code":"68", + "des":"Configure a federated login entry in the enterprise IdP to enable enterprise users use the login link to access the cloud platform.An IdP entity has been created on the c", + "doc_type":"usermanual", + "kw":"(Optional) Step 5: Configure a Federated Login Entry in the Enterprise IdP,IAM User SSO via SAML,Use", + "title":"(Optional) Step 5: Configure a Federated Login Entry in the Enterprise IdP", + "githuburl":"" + }, + { + "uri":"iam_08_0022.html", + "product_code":"iam", + "code":"69", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Virtual User SSO via OpenID Connect", + "title":"Virtual User SSO via OpenID Connect", + "githuburl":"" + }, + { + "uri":"iam_08_0010.html", + "product_code":"iam", + "code":"70", + "des":"This section describes how to configure identity federation and how identity federation works.The following describes how to configure your enterprise IdP and the cloud p", + "doc_type":"usermanual", + "kw":"Overview of Virtual User SSO via OpenID Connect,Virtual User SSO via OpenID Connect,User Guide", + "title":"Overview of Virtual User SSO via OpenID Connect", + "githuburl":"" + }, + { + "uri":"iam_08_0009.html", + "product_code":"iam", + "code":"71", + "des":"To establish a trust relationship between an enterprise IdP and the cloud platform, set the user redirect URLs and create OAuth 2.0 credentials in the enterprise IdP. On ", + "doc_type":"usermanual", + "kw":"Step 1: Create an IdP Entity,Virtual User SSO via OpenID Connect,User Guide", + "title":"Step 1: Create an IdP Entity", + "githuburl":"" + }, + { + "uri":"iam_08_0008.html", + "product_code":"iam", + "code":"72", + "des":"Federated users are named FederationUser by default in the cloud platform. These users can only log in to the cloud platform and they do not have any other permissions. Y", + "doc_type":"usermanual", + "kw":"Step 2: Configure Identity Conversion Rules,Virtual User SSO via OpenID Connect,User Guide", + "title":"Step 2: Configure Identity Conversion Rules", + "githuburl":"" + }, + { + "uri":"iam_08_0007.html", + "product_code":"iam", + "code":"73", + "des":"Configure a federated login entry in the enterprise IdP to enable enterprise users use the login link to access the cloud platform.An IdP entity has been created on the c", + "doc_type":"usermanual", + "kw":"(Optional) Step 3: Configure Login Link in the Enterprise Management System,Virtual User SSO via Ope", + "title":"(Optional) Step 3: Configure Login Link in the Enterprise Management System", + "githuburl":"" + }, + { + "uri":"en-us_topic_0079620340.html", + "product_code":"iam", + "code":"74", + "des":"An identity conversion rule is a JSON object which can be modified. The following is an example JSON object:[ \n { \n \"remote\": [ \n { \n ", + "doc_type":"usermanual", + "kw":"Syntax of Identity Conversion Rules,Identity Providers,User Guide", + "title":"Syntax of Identity Conversion Rules", + "githuburl":"" + }, + { + "uri":"iam_10_0002.html", + "product_code":"iam", + "code":"75", + "des":"MFA authentication provides an additional layer of protection on top of the username and password. If you enable MFA authentication, users need to enter the username and ", + "doc_type":"usermanual", + "kw":"MFA Authentication and Virtual MFA Device,User Guide,User Guide", + "title":"MFA Authentication and Virtual MFA Device", + "githuburl":"" + }, + { + "uri":"iam_01_0011.html", + "product_code":"iam", + "code":"76", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", "kw":"Auditing", "title":"Auditing", "githuburl":"" }, { "uri":"iam_01_0012.html", - "product_code":"", - "code":"15", + "product_code":"iam", + "code":"77", "des":"Table 1 lists Identity and Access Management (IAM) operations that can be recorded by Cloud Trace Service (CTS).", - "doc_type":"", + "doc_type":"usermanual", "kw":"IAM Operations That Can Be Recorded by CTS,Auditing,User Guide", "title":"IAM Operations That Can Be Recorded by CTS", "githuburl":"" }, { "uri":"iam_01_0013.html", - "product_code":"", - "code":"16", + "product_code":"iam", + "code":"78", "des":"After you enable CTS, it records key operations performed on IAM. You can view the operation records of the last 7 days on the CTS console.The following filters are avail", - "doc_type":"", + "doc_type":"usermanual", "kw":"Viewing Audit Logs,Auditing,User Guide", "title":"Viewing Audit Logs", "githuburl":"" }, - { - "uri":"iam_01_06.html", - "product_code":"", - "code":"17", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", - "kw":"User and User Group Management", - "title":"User and User Group Management", - "githuburl":"" - }, - { - "uri":"en-us_topic_0079496985.html", - "product_code":"", - "code":"18", - "des":"As a security administrator, you can grant permissions to a user group and add users to it. The users inherit the permissions of the user group and can access the cloud s", - "doc_type":"", - "kw":"Managing Users and Permissions,User and User Group Management,User Guide", - "title":"Managing Users and Permissions", - "githuburl":"" - }, - { - "uri":"en-us_topic_0066738518.html", - "product_code":"", - "code":"19", - "des":"Projects are used to group and isolate OpenStack resources, including compute, storage, and network resources. A project can be a department or a project team. Resources ", - "doc_type":"", - "kw":"Managing Projects,User and User Group Management,User Guide", - "title":"Managing Projects", - "githuburl":"" - }, - { - "uri":"en-us_topic_0046611269.html", - "product_code":"", - "code":"20", - "des":"You can plan user groups based on user responsibilities and grant the required permissions to the user groups. Users inherit permissions from the user groups to which the", - "doc_type":"", - "kw":"Creating a User Group,User and User Group Management,User Guide", - "title":"Creating a User Group", - "githuburl":"" - }, - { - "uri":"en-us_topic_0046611303.html", - "product_code":"", - "code":"21", - "des":"If you need to share resources in your account to other users, you can create users by using the console or by calling an API, and set security credentials and required p", - "doc_type":"", - "kw":"Username,Creating a User,User and User Group Management,User Guide", - "title":"Creating a User", - "githuburl":"" - }, - { - "uri":"en-us_topic_0079497018.html", - "product_code":"", - "code":"22", - "des":"Resources in different projects or regions are isolated. You can access resources only in the projects or regions for which you have been granted permissions. If you do n", - "doc_type":"", - "kw":"Switching Projects or Regions,User and User Group Management,User Guide", - "title":"Switching Projects or Regions", - "githuburl":"" - }, - { - "uri":"en-us_topic_0046661675.html", - "product_code":"", - "code":"23", - "des":"As an administrator, you can view and modify the basic information, user groups, and logs of each user. In addition, you can change the groups to which a user belongs if ", - "doc_type":"", - "kw":"Viewing and Modifying User Information,User and User Group Management,User Guide", - "title":"Viewing and Modifying User Information", - "githuburl":"" - }, - { - "uri":"en-us_topic_0085605493.html", - "product_code":"", - "code":"24", - "des":"As a security administrator, you can view and modify the basic information, permissions, and users of a user group. You can modify users' permissions by changing the grou", - "doc_type":"", - "kw":"Viewing and Modifying User Group Information,User and User Group Management,User Guide", - "title":"Viewing and Modifying User Group Information", - "githuburl":"" - }, - { - "uri":"en-us_topic_0080335069.html", - "product_code":"", - "code":"25", - "des":"You can modify user permissions using either of the following methods:Change the user groups to which a user belongs on the Modify User page. Choose this method if you wa", - "doc_type":"", - "kw":"Modifying User Permissions,User and User Group Management,User Guide", - "title":"Modifying User Permissions", - "githuburl":"" - }, - { - "uri":"iam_01_0015.html", - "product_code":"", - "code":"26", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", - "kw":"Fine-Grained Policy Management", - "title":"Fine-Grained Policy Management", - "githuburl":"" - }, - { - "uri":"iam_01_019.html", - "product_code":"", - "code":"27", - "des":"A fine-grained policy is a set of permissions that define operations allowed to be performed on specific cloud services. A policy can contain multiple permission sets. Af", - "doc_type":"", - "kw":"Fine-Grained Policies,Fine-Grained Policy Management,User Guide", - "title":"Fine-Grained Policies", - "githuburl":"" - }, - { - "uri":"iam_01_0017.html", - "product_code":"", - "code":"28", - "des":"A fine-grained policy consists of the policy version (the Version field) and statement (the Statement field).Version: Distinguishes between role-based access control (RBA", - "doc_type":"", - "kw":"Policy Syntax,Fine-Grained Policy Management,User Guide", - "title":"Policy Syntax", - "githuburl":"" - }, - { - "uri":"iam_01_0016.html", - "product_code":"", - "code":"29", - "des":"You can create custom policies to supplement system-defined policies and implement more refined access control.Global services: Select this option if the services to whic", - "doc_type":"", - "kw":"Creating a Custom Policy,Fine-Grained Policy Management,User Guide", - "title":"Creating a Custom Policy", - "githuburl":"" - }, - { - "uri":"iam_01_0600.html", - "product_code":"", - "code":"30", - "des":"Use the following method to assign permissions of the FullAccess policy to a user but also forbid the user from accessing CTS. Create a custom policy for denying access t", - "doc_type":"", - "kw":"Custom Policy Use Cases,Fine-Grained Policy Management,User Guide", - "title":"Custom Policy Use Cases", - "githuburl":"" - }, - { - "uri":"en-us_topic_0046611308.html", - "product_code":"", - "code":"31", - "des":"Users with Security Administrator permissions can configure a login authentication policy, password policy, and ACL to keep your user information and system secure.In the", - "doc_type":"", - "kw":"Account Settings,User Guide,User Guide", - "title":"Account Settings", - "githuburl":"" - }, - { - "uri":"en-us_topic_0079496986.html", - "product_code":"", - "code":"32", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", - "kw":"Agency Management", - "title":"Agency Management", - "githuburl":"" - }, - { - "uri":"iam_01_0054.html", - "product_code":"", - "code":"33", - "des":"Agency is a trust relationship between a delegating account and a delegated account. By creating an agency, you can grant permissions to another account or cloud service ", - "doc_type":"", - "kw":"Delegating Resource Access to Another Account,Agency Management,User Guide", - "title":"Delegating Resource Access to Another Account", - "githuburl":"" - }, - { - "uri":"en-us_topic_0046613147.html", - "product_code":"", - "code":"34", - "des":"By creating an agency, you can share your resources with another account or a cloud service (such as ECS), or delegate an individual or team to manage your resources. You", - "doc_type":"", - "kw":"Creating an Agency (by a Delegating Party),Agency Management,User Guide", - "title":"Creating an Agency (by a Delegating Party)", - "githuburl":"" - }, - { - "uri":"iam_01_0063.html", - "product_code":"", - "code":"35", - "des":"When a trust relationship is established between another account and your account, you become a delegated party and you can authorize a user to manage resources for the d", - "doc_type":"", - "kw":"Assigning Permissions to a User (by a Delegated Party),Agency Management,User Guide", - "title":"Assigning Permissions to a User (by a Delegated Party)", - "githuburl":"" - }, - { - "uri":"en-us_topic_0046613148.html", - "product_code":"", - "code":"36", - "des":"When an account establishes a trust relationship between itself and your account, you become a delegated party. You and all the users you have authorized can switch to th", - "doc_type":"", - "kw":"Switching Roles (by a Delegated Party),Agency Management,User Guide", - "title":"Switching Roles (by a Delegated Party)", - "githuburl":"" - }, - { - "uri":"en-us_topic_0059870089.html", - "product_code":"", - "code":"37", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", - "kw":"Federated Identity Authentication", - "title":"Federated Identity Authentication", - "githuburl":"" - }, - { - "uri":"en-us_topic_0079620341.html", - "product_code":"", - "code":"38", - "des":"If you have an identity authentication system, you do not need to create new users in the service provider system. Instead, you can configure federated identity authentic", - "doc_type":"", - "kw":"Introduction,Federated Identity Authentication,User Guide", - "title":"Introduction", - "githuburl":"" - }, - { - "uri":"iam_08_0002.html", - "product_code":"", - "code":"39", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", - "kw":"SAML-based Federated Identity Authentication", - "title":"SAML-based Federated Identity Authentication", - "githuburl":"" - }, - { - "uri":"iam_08_0003.html", - "product_code":"", - "code":"40", - "des":"To establish a trust relationship between an enterprise identity provider and the cloud system, upload the metadata file of the cloud system to the identity provider, and", - "doc_type":"", - "kw":"Step 1: Create an Identity Provider,SAML-based Federated Identity Authentication,User Guide", - "title":"Step 1: Create an Identity Provider", - "githuburl":"" - }, - { - "uri":"iam_08_0004.html", - "product_code":"", - "code":"41", - "des":"As the enterprise administrator, you can manage identities and permissions of federated users in the enterprise identity provider. By configuring identity conversion rule", - "doc_type":"", - "kw":"Step 2: Configure Identity Conversion Rules,SAML-based Federated Identity Authentication,User Guide", - "title":"Step 2: Configure Identity Conversion Rules", - "githuburl":"" - }, - { - "uri":"iam_08_0005.html", - "product_code":"", - "code":"42", - "des":"Configure the login link of the identity provider in the enterprise management system so that enterprise users can use this link to access the cloud system.An identity pr", - "doc_type":"", - "kw":"Step 3: Configure Login Link in the Enterprise Management System,SAML-based Federated Identity Authe", - "title":"Step 3: Configure Login Link in the Enterprise Management System", - "githuburl":"" - }, - { - "uri":"iam_08_0010.html", - "product_code":"", - "code":"43", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", - "kw":"OpenID Connect–based Federated Identity Authentication", - "title":"OpenID Connect–based Federated Identity Authentication", - "githuburl":"" - }, - { - "uri":"iam_08_0009.html", - "product_code":"", - "code":"44", - "des":"To establish a trust relationship between an enterprise identity provider and the cloud system, create an identity provider and configure authorization information on the", - "doc_type":"", - "kw":"Step 1: Create an Identity Provider,OpenID Connect–based Federated Identity Authentication,User Guid", - "title":"Step 1: Create an Identity Provider", - "githuburl":"" - }, - { - "uri":"iam_08_0008.html", - "product_code":"", - "code":"45", - "des":"As the enterprise administrator, you can manage identities and permissions of federated users in the enterprise identity provider. By configuring identity conversion rule", - "doc_type":"", - "kw":"Step 2: Configure Identity Conversion Rules,OpenID Connect–based Federated Identity Authentication,U", - "title":"Step 2: Configure Identity Conversion Rules", - "githuburl":"" - }, - { - "uri":"iam_08_0007.html", - "product_code":"", - "code":"46", - "des":"Configure the login link of the identity provider in the enterprise management system so that enterprise users can use this link to access the cloud system.An identity pr", - "doc_type":"", - "kw":"Step 3: Configure Login Link in the Enterprise Management System,OpenID Connect–based Federated Iden", - "title":"Step 3: Configure Login Link in the Enterprise Management System", - "githuburl":"" - }, - { - "uri":"en-us_topic_0079620340.html", - "product_code":"", - "code":"47", - "des":"An identity conversion rule is a JSON object which can be modified. The following is an example JSON object:[ \n { \n \"remote\": [ \n { \n ", - "doc_type":"", - "kw":"Syntax of Identity Conversion Rules,Federated Identity Authentication,User Guide", - "title":"Syntax of Identity Conversion Rules", - "githuburl":"" - }, - { - "uri":"iam_10_0002.html", - "product_code":"", - "code":"48", - "des":"MFA authentication provides an additional layer of protection on top of the username and password. If you enable MFA authentication, users need to enter the username and ", - "doc_type":"", - "kw":"MFA Authentication and Virtual MFA Device,User Guide,User Guide", - "title":"MFA Authentication and Virtual MFA Device", - "githuburl":"" - }, { "uri":"iam_01_0000.html", - "product_code":"", - "code":"49", + "product_code":"iam", + "code":"79", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", + "doc_type":"usermanual", "kw":"FAQs", "title":"FAQs", "githuburl":"" }, { "uri":"iam_01_0002.html", - "product_code":"", - "code":"50", + "product_code":"iam", + "code":"80", "des":"For account security purposes, you are advised to enable login authentication. After this function is enabled, users need to enter an SMS, MFA, or email verification code", - "doc_type":"", + "doc_type":"usermanual", "kw":"How Do I Enable Login Authentication?,FAQs,User Guide", "title":"How Do I Enable Login Authentication?", "githuburl":"" }, { "uri":"iam_01_0003.html", - "product_code":"", - "code":"51", + "product_code":"iam", + "code":"81", "des":"MFA authentication provides an additional layer of protection on top of the username and password. If MFA–based login authentication is enabled, you will need to enter a ", - "doc_type":"", + "doc_type":"usermanual", "kw":"How Do I Bind a Virtual MFA Device?,FAQs,User Guide", "title":"How Do I Bind a Virtual MFA Device?", "githuburl":"" }, { "uri":"iam_01_0001.html", - "product_code":"", - "code":"52", + "product_code":"iam", + "code":"82", "des":"After MFA–based login authentication is enabled, you need to enter an MFA verification code in addition to the username and password when logging in to the console. Open ", - "doc_type":"", + "doc_type":"usermanual", "kw":"How Do I Obtain MFA Verification Codes?,FAQs,User Guide", "title":"How Do I Obtain MFA Verification Codes?", "githuburl":"" }, { "uri":"iam_01_0004.html", - "product_code":"", - "code":"53", + "product_code":"iam", + "code":"83", "des":"You can unbind the virtual MFA device as long as the mobile phone used to bind the MFA device is available and the MFA application is still installed on the phone.On the ", - "doc_type":"", + "doc_type":"usermanual", "kw":"How Do I Unbind a Virtual MFA Device?,FAQs,User Guide", "title":"How Do I Unbind a Virtual MFA Device?", "githuburl":"" }, { "uri":"en-us_topic_0046611300.html", - "product_code":"", - "code":"54", + "product_code":"iam", + "code":"84", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "doc_type":"", + "doc_type":"usermanual", "kw":"Change History,User Guide", "title":"Change History", "githuburl":"" diff --git a/docs/iam/umn/CLASS.TXT.json b/docs/iam/umn/CLASS.TXT.json index 85143d7a..5ada8fe7 100644 --- a/docs/iam/umn/CLASS.TXT.json +++ b/docs/iam/umn/CLASS.TXT.json @@ -1,488 +1,758 @@ [ { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"", + "product_code":"iam", "title":"Service Overview", "uri":"iam_01_0021.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"", "code":"1" }, { "desc":"Identity and Access Management (IAM) provides identity authentication, permissions management, and access control. With IAM, you can create users for individuals, systems", - "product_code":"", + "product_code":"iam", "title":"What Is IAM?", "uri":"iam_01_0026.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"1", "code":"2" }, { "desc":"IAM provides the following basic functions:Refined permissions managementYou can control user access to different projects and grant different permissions to users for th", - "product_code":"", + "product_code":"iam", "title":"IAM Features", "uri":"en-us_topic_0046611276.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"1", "code":"3" }, { - "desc":"You can manage users in your account and their security credentials. In addition, you can configure federated identity authentication so that users in other systems can a", - "product_code":"", + "desc":"You can manage users in your account and their security credentials. In addition, you can configure identity federation so that users in other systems can access the clou", + "product_code":"iam", "title":"Identity Management", "uri":"iam_01_0023.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"1", "code":"4" }, { "desc":"You can grant users permissions to access different resources.Plan user groups and grant permissions to each user group.Add a user to a specific user group so that the us", - "product_code":"", + "product_code":"iam", "title":"Permissions Management", "uri":"iam_01_0024.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"1", "code":"5" }, { "desc":"To prevent personal data, such as the username, password, and mobile number, from being accessed by unauthorized entities or individuals, IAM encrypts the data before sto", - "product_code":"", + "product_code":"iam", "title":"Personal Data Protection Mechanism", "uri":"iam_01_0035.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"1", "code":"6" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"", + "product_code":"iam", "title":"Getting Started", "uri":"iam_01_0027.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"", "code":"7" }, { "desc":"Your account has full access to your resources. For security purposes, create a security administrator and perform routine management as the security administrator.If a u", - "product_code":"", + "product_code":"iam", "title":"Getting Started with IAM", "uri":"iam_01_0034.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"7", "code":"8" }, { "desc":"For security purposes, create a security administrator and manage users in your account as the security administrator.Programmatic access: Users can access cloud services", - "product_code":"", + "product_code":"iam", "title":"Creating a Security Administrator", "uri":"iam_01_0029.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"7", "code":"9" }, { "desc":"As a security administrator, you can create user groups and grant them permissions.To enable users to directly view their permissions, set a description for the user grou", - "product_code":"", + "product_code":"iam", "title":"Creating a User Group and Assigning Permissions", "uri":"iam_01_0030.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"7", "code":"10" }, { "desc":"As a security administrator, you can create a user and add the user to a user group. The user automatically inherits the permissions of the user group.For security purpos", - "product_code":"", + "product_code":"iam", "title":"Creating a User and Adding the User to a User Group", "uri":"iam_01_0031.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"7", "code":"11" }, { - "desc":"You can log in to the cloud system as a user and access cloud services based on granted permissions.Verify the information displayed on the Login Verification page during", - "product_code":"", - "title":"Logging In as a User", + "desc":"You can log in to the cloud platform as an IAM user and access cloud services based on granted permissions.If either of the following has been configured on Security Sett", + "product_code":"iam", + "title":"Logging In as an IAM User", "uri":"iam_01_0032.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"7", "code":"12" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"", + "product_code":"iam", "title":"User Guide", "uri":"iam_01_0040.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"", "code":"13" }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"", - "title":"Auditing", - "uri":"iam_01_0011.html", - "doc_type":"", + "product_code":"iam", + "title":"IAM Users", + "uri":"iam_01_06.html", + "doc_type":"usermanual", "p_code":"13", "code":"14" }, { - "desc":"Table 1 lists Identity and Access Management (IAM) operations that can be recorded by Cloud Trace Service (CTS).", - "product_code":"", - "title":"IAM Operations That Can Be Recorded by CTS", - "uri":"iam_01_0012.html", - "doc_type":"", + "desc":"If you need to share resources in your account to other users, you can create users by using the console or by calling an API, and set security credentials and required p", + "product_code":"iam", + "title":"Creating a User", + "uri":"en-us_topic_0046611303.html", + "doc_type":"usermanual", "p_code":"14", "code":"15" }, { - "desc":"After you enable CTS, it records key operations performed on IAM. You can view the operation records of the last 7 days on the CTS console.The following filters are avail", - "product_code":"", - "title":"Viewing Audit Logs", - "uri":"iam_01_0013.html", - "doc_type":"", + "desc":"IAM users created without being added to any groups do not have permissions. You can assign permissions to these IAM users on the IAM console. After authorization, the us", + "product_code":"iam", + "title":"Assigning Permissions to an IAM User", + "uri":"en-us_topic_0079496985.html", + "doc_type":"usermanual", "p_code":"14", "code":"16" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"", - "title":"User and User Group Management", - "uri":"iam_01_06.html", - "doc_type":"", - "p_code":"13", + "desc":"You can log in to the console as an IAM user or obtain the IAM user login link from the administrator and then use the link to log in.Domain name: The name of the account", + "product_code":"iam", + "title":"Logging In as an IAM User", + "uri":"iam_01_0552.html", + "doc_type":"usermanual", + "p_code":"14", "code":"17" }, { - "desc":"As a security administrator, you can grant permissions to a user group and add users to it. The users inherit the permissions of the user group and can access the cloud s", - "product_code":"", - "title":"Managing Users and Permissions", - "uri":"en-us_topic_0079496985.html", - "doc_type":"", - "p_code":"17", + "desc":"You can modify the user information, including the status, access type, description, external identity ID, and belonged user group.If the job responsibilities of a user a", + "product_code":"iam", + "title":"Viewing and Modifying User Information", + "uri":"en-us_topic_0046661675.html", + "doc_type":"usermanual", + "p_code":"14", "code":"18" }, { - "desc":"Projects are used to group and isolate OpenStack resources, including compute, storage, and network resources. A project can be a department or a project team. Resources ", - "product_code":"", - "title":"Managing Projects", - "uri":"en-us_topic_0066738518.html", - "doc_type":"", - "p_code":"17", + "desc":"After an IAM user is deleted, they can no longer log in and their username, password, access keys, and authorizations will be cleared and cannot be recovered.Make sure th", + "product_code":"iam", + "title":"Deleting an IAM User", + "uri":"iam_02_0004.html", + "doc_type":"usermanual", + "p_code":"14", "code":"19" }, { - "desc":"You can plan user groups based on user responsibilities and grant the required permissions to the user groups. Users inherit permissions from the user groups to which the", - "product_code":"", - "title":"Creating a User Group", - "uri":"en-us_topic_0046611269.html", - "doc_type":"", - "p_code":"17", + "desc":"As an administrator, you can reset the password of an IAM user if the user has forgotten the password and no email address or mobile number has been bound to the user.To ", + "product_code":"iam", + "title":"Changing the Login Password of an IAM User", + "uri":"iam_01_0653.html", + "doc_type":"usermanual", + "p_code":"14", "code":"20" }, { - "desc":"If you need to share resources in your account to other users, you can create users by using the console or by calling an API, and set security credentials and required p", - "product_code":"", - "title":"Creating a User", - "uri":"en-us_topic_0046611303.html", - "doc_type":"", - "p_code":"17", + "desc":"You can modify user permissions using either of the following methods:Change the user groups to which a user belongs on the Modify User page. Choose this method if you wa", + "product_code":"iam", + "title":"Modifying User Permissions", + "uri":"en-us_topic_0080335069.html", + "doc_type":"usermanual", + "p_code":"14", "code":"21" }, { "desc":"Resources in different projects or regions are isolated. You can access resources only in the projects or regions for which you have been granted permissions. If you do n", - "product_code":"", + "product_code":"iam", "title":"Switching Projects or Regions", "uri":"en-us_topic_0079497018.html", - "doc_type":"", - "p_code":"17", + "doc_type":"usermanual", + "p_code":"14", "code":"22" }, { - "desc":"As an administrator, you can view and modify the basic information, user groups, and logs of each user. In addition, you can change the groups to which a user belongs if ", - "product_code":"", - "title":"Viewing and Modifying User Information", - "uri":"en-us_topic_0046661675.html", - "doc_type":"", - "p_code":"17", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"iam", + "title":"User Groups and Authorization", + "uri":"iam_01_0655.html", + "doc_type":"usermanual", + "p_code":"13", "code":"23" }, { - "desc":"As a security administrator, you can view and modify the basic information, permissions, and users of a user group. You can modify users' permissions by changing the grou", - "product_code":"", - "title":"Viewing and Modifying User Group Information", - "uri":"en-us_topic_0085605493.html", - "doc_type":"", - "p_code":"17", + "desc":"You can plan user groups based on user responsibilities and grant the required permissions to the user groups. Users inherit permissions from the user groups to which the", + "product_code":"iam", + "title":"Creating a User Group and Assigning Permissions", + "uri":"en-us_topic_0046611269.html", + "doc_type":"usermanual", + "p_code":"23", "code":"24" }, { - "desc":"You can modify user permissions using either of the following methods:Change the user groups to which a user belongs on the Modify User page. Choose this method if you wa", - "product_code":"", - "title":"Modifying User Permissions", - "uri":"en-us_topic_0080335069.html", - "doc_type":"", - "p_code":"17", + "desc":"A user inherits permissions from the groups to which the user belongs. To change the permissions of a user, add the user to a new group or remove the user from an existin", + "product_code":"iam", + "title":"Adding Users to or Removing Users from a User Group", + "uri":"iam_03_0002.html", + "doc_type":"usermanual", + "p_code":"23", "code":"25" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"", - "title":"Fine-Grained Policy Management", - "uri":"iam_01_0015.html", - "doc_type":"", - "p_code":"13", + "desc":"To delete a user group, do the following:To delete multiple user groups at a time, do the following:", + "product_code":"iam", + "title":"Deleting a User Group", + "uri":"iam_01_0430.html", + "doc_type":"usermanual", + "p_code":"23", "code":"26" }, { - "desc":"A fine-grained policy is a set of permissions that define operations allowed to be performed on specific cloud services. A policy can contain multiple permission sets. Af", - "product_code":"", - "title":"Fine-Grained Policies", - "uri":"iam_01_019.html", - "doc_type":"", - "p_code":"26", + "desc":"As a security administrator, you can view and modify the basic information, permissions, and users of a user group. You can modify users' permissions by changing the grou", + "product_code":"iam", + "title":"Viewing and Modifying User Group Information", + "uri":"en-us_topic_0085605493.html", + "doc_type":"usermanual", + "p_code":"23", "code":"27" }, { - "desc":"A fine-grained policy consists of the policy version (the Version field) and statement (the Statement field).Version: Distinguishes between role-based access control (RBA", - "product_code":"", - "title":"Policy Syntax", - "uri":"iam_01_0017.html", - "doc_type":"", - "p_code":"26", + "desc":"To revoke a policy or role attached to a user group, do the following:To revoke multiple policies or roles attached to a user group, do as follows:", + "product_code":"iam", + "title":"Revoking Permissions of a User Group", + "uri":"iam_03_0004.html", + "doc_type":"usermanual", + "p_code":"23", "code":"28" }, { - "desc":"You can create custom policies to supplement system-defined policies and implement more refined access control.Global services: Select this option if the services to whic", - "product_code":"", - "title":"Creating a Custom Policy", - "uri":"iam_01_0016.html", - "doc_type":"", - "p_code":"26", + "desc":"Cloud services interwork with each other. Roles of some services take effect only if they are assigned along with roles of other services.For example, the DNS Administrat", + "product_code":"iam", + "title":"Assigning Dependency Roles", + "uri":"iam_01_0657.html", + "doc_type":"usermanual", + "p_code":"23", "code":"29" }, { - "desc":"Use the following method to assign permissions of the FullAccess policy to a user but also forbid the user from accessing CTS. Create a custom policy for denying access t", - "product_code":"", - "title":"Custom Policy Use Cases", - "uri":"iam_01_0600.html", - "doc_type":"", - "p_code":"26", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"iam", + "title":"Permissions", + "uri":"iam_01_0015.html", + "doc_type":"usermanual", + "p_code":"13", "code":"30" }, { - "desc":"Users with Security Administrator permissions can configure a login authentication policy, password policy, and ACL to keep your user information and system secure.In the", - "product_code":"", - "title":"Account Settings", - "uri":"en-us_topic_0046611308.html", - "doc_type":"", - "p_code":"13", + "desc":"By default, new IAM users do not have permissions assigned. You need to add a user to one or more groups, and attach permissions policies or roles to these groups. Users ", + "product_code":"iam", + "title":"Basic Concepts", + "uri":"iam_01_019.html", + "doc_type":"usermanual", + "p_code":"30", "code":"31" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"", - "title":"Agency Management", - "uri":"en-us_topic_0079496986.html", - "doc_type":"", - "p_code":"13", + "desc":"Roles are a type of coarse-grained authorization mechanism that defines service-level permissions based on user responsibilities. IAM provides a limited number of roles f", + "product_code":"iam", + "title":"Roles", + "uri":"iam_01_0601.html", + "doc_type":"usermanual", + "p_code":"30", "code":"32" }, { - "desc":"Agency is a trust relationship between a delegating account and a delegated account. By creating an agency, you can grant permissions to another account or cloud service ", - "product_code":"", - "title":"Delegating Resource Access to Another Account", - "uri":"iam_01_0054.html", - "doc_type":"", - "p_code":"32", + "desc":"A fine-grained policy consists of the policy version (the Version field) and statement (the Statement field).Version: Distinguishes between role-based access control (RBA", + "product_code":"iam", + "title":"Policy Syntax", + "uri":"iam_01_0017.html", + "doc_type":"usermanual", + "p_code":"30", "code":"33" }, { - "desc":"By creating an agency, you can share your resources with another account or a cloud service (such as ECS), or delegate an individual or team to manage your resources. You", - "product_code":"", - "title":"Creating an Agency (by a Delegating Party)", - "uri":"en-us_topic_0046613147.html", - "doc_type":"", - "p_code":"32", + "desc":"You can create custom policies to supplement system-defined policies and implement more refined access control.Global services: Select this option if the services to whic", + "product_code":"iam", + "title":"Creating a Custom Policy", + "uri":"iam_01_0016.html", + "doc_type":"usermanual", + "p_code":"30", "code":"34" }, { - "desc":"When a trust relationship is established between another account and your account, you become a delegated party and you can authorize a user to manage resources for the d", - "product_code":"", - "title":"Assigning Permissions to a User (by a Delegated Party)", - "uri":"iam_01_0063.html", - "doc_type":"", - "p_code":"32", + "desc":"Use the following method to assign permissions of the FullAccess policy to a user but also forbid the user from accessing CTS. Create a custom policy for denying access t", + "product_code":"iam", + "title":"Custom Policy Use Cases", + "uri":"iam_01_0600.html", + "doc_type":"usermanual", + "p_code":"30", "code":"35" }, { - "desc":"When an account establishes a trust relationship between itself and your account, you become a delegated party. You and all the users you have authorized can switch to th", - "product_code":"", - "title":"Switching Roles (by a Delegated Party)", - "uri":"en-us_topic_0046613148.html", - "doc_type":"", - "p_code":"32", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"iam", + "title":"Security Settings", + "uri":"en-us_topic_0046611308.html", + "doc_type":"usermanual", + "p_code":"13", "code":"36" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"", - "title":"Federated Identity Authentication", - "uri":"en-us_topic_0059870089.html", - "doc_type":"", - "p_code":"13", + "desc":"You can configure the account settings, critical operation protection, login authentication policy, password policy, and access control list (ACL) on the Security Setting", + "product_code":"iam", + "title":"Security Settings Overview", + "uri":"iam_07_0001.html", + "doc_type":"usermanual", + "p_code":"36", "code":"37" }, { - "desc":"If you have an identity authentication system, you do not need to create new users in the service provider system. Instead, you can configure federated identity authentic", - "product_code":"", - "title":"Introduction", - "uri":"en-us_topic_0079620341.html", - "doc_type":"", - "p_code":"37", + "desc":"As an account administrator, both you and your IAM users can manage basic information on this page.A mobile number or an email address can be bound only to one account or", + "product_code":"iam", + "title":"Basic Information", + "uri":"iam_01_0703.html", + "doc_type":"usermanual", + "p_code":"36", "code":"38" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"", - "title":"SAML-based Federated Identity Authentication", - "uri":"iam_08_0002.html", - "doc_type":"", - "p_code":"37", + "desc":"Only an administrator can configure critical operation protection, and IAM users can only view the configurations. If an IAM user needs to modify the configurations, the ", + "product_code":"iam", + "title":"Critical Operation Protection", + "uri":"iam_07_0002.html", + "doc_type":"usermanual", + "p_code":"36", "code":"39" }, { - "desc":"To establish a trust relationship between an enterprise identity provider and the cloud system, upload the metadata file of the cloud system to the identity provider, and", - "product_code":"", - "title":"Step 1: Create an Identity Provider", - "uri":"iam_08_0003.html", - "doc_type":"", - "p_code":"39", + "desc":"The Login Authentication Policy tab of the Security Settings page provides the Session Timeout, Account Lockout, Recent Login Information, Recent Login Information, and C", + "product_code":"iam", + "title":"Login Authentication Policy", + "uri":"iam_01_0704.html", + "doc_type":"usermanual", + "p_code":"36", "code":"40" }, { - "desc":"As the enterprise administrator, you can manage identities and permissions of federated users in the enterprise identity provider. By configuring identity conversion rule", - "product_code":"", - "title":"Step 2: Configure Identity Conversion Rules", - "uri":"iam_08_0004.html", - "doc_type":"", - "p_code":"39", + "desc":"The Password Policy tab of the Security Settings page provides the Password Composition & Reuse, Password Expiration, and Minimum Password Age settings.Only the administr", + "product_code":"iam", + "title":"Password Policy", + "uri":"iam_01_0607.html", + "doc_type":"usermanual", + "p_code":"36", "code":"41" }, { - "desc":"Configure the login link of the identity provider in the enterprise management system so that enterprise users can use this link to access the cloud system.An identity pr", - "product_code":"", - "title":"Step 3: Configure Login Link in the Enterprise Management System", - "uri":"iam_08_0005.html", - "doc_type":"", - "p_code":"39", + "desc":"The ACL tab of the Security Settings page provides the IP Address Ranges, IPv4 CIDR Blocks, and VPC Endpoints settings for allowing user access only from specified IP add", + "product_code":"iam", + "title":"ACL", + "uri":"iam_07_0003.html", + "doc_type":"usermanual", + "p_code":"36", "code":"42" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"", - "title":"OpenID Connect–based Federated Identity Authentication", - "uri":"iam_08_0010.html", - "doc_type":"", - "p_code":"37", + "desc":"Projects are used to group and isolate OpenStack resources, including compute, storage, and network resources. A project can be a department or a project team. Resources ", + "product_code":"iam", + "title":"Projects", + "uri":"en-us_topic_0066738518.html", + "doc_type":"usermanual", + "p_code":"13", "code":"43" }, { - "desc":"To establish a trust relationship between an enterprise identity provider and the cloud system, create an identity provider and configure authorization information on the", - "product_code":"", - "title":"Step 1: Create an Identity Provider", - "uri":"iam_08_0009.html", - "doc_type":"", - "p_code":"43", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"iam", + "title":"Agencies", + "uri":"en-us_topic_0079496986.html", + "doc_type":"usermanual", + "p_code":"13", "code":"44" }, { - "desc":"As the enterprise administrator, you can manage identities and permissions of federated users in the enterprise identity provider. By configuring identity conversion rule", - "product_code":"", - "title":"Step 2: Configure Identity Conversion Rules", - "uri":"iam_08_0008.html", - "doc_type":"", - "p_code":"43", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"iam", + "title":"Account Delegation", + "uri":"iam_01_0054.html", + "doc_type":"usermanual", + "p_code":"44", "code":"45" }, { - "desc":"Configure the login link of the identity provider in the enterprise management system so that enterprise users can use this link to access the cloud system.An identity pr", - "product_code":"", - "title":"Step 3: Configure Login Link in the Enterprise Management System", - "uri":"iam_08_0007.html", - "doc_type":"", - "p_code":"43", + "desc":"The agency function enables you to delegate another account to implement O&M on your resources based on assigned permissions.You can delegate resource access only to acco", + "product_code":"iam", + "title":"Delegating Resource Access to Another Account", + "uri":"iam_06_0001.html", + "doc_type":"usermanual", + "p_code":"45", "code":"46" }, { - "desc":"An identity conversion rule is a JSON object which can be modified. The following is an example JSON object:[ \n { \n \"remote\": [ \n { \n ", - "product_code":"", - "title":"Syntax of Identity Conversion Rules", - "uri":"en-us_topic_0079620340.html", - "doc_type":"", - "p_code":"37", + "desc":"By creating an agency, you can share your resources with another account, or delegate an individual or team to manage your resources. You do not need to share your securi", + "product_code":"iam", + "title":"Creating an Agency (by a Delegating Party)", + "uri":"en-us_topic_0046613147.html", + "doc_type":"usermanual", + "p_code":"45", "code":"47" }, { - "desc":"MFA authentication provides an additional layer of protection on top of the username and password. If you enable MFA authentication, users need to enter the username and ", - "product_code":"", - "title":"MFA Authentication and Virtual MFA Device", - "uri":"iam_10_0002.html", - "doc_type":"", - "p_code":"13", + "desc":"When a trust relationship is established between your account and another account, you become a delegated party. By default, only your account and the members of the admi", + "product_code":"iam", + "title":"(Optional) Assigning Permissions to an IAM User (by a Delegated Party)", + "uri":"iam_01_0063.html", + "doc_type":"usermanual", + "p_code":"45", "code":"48" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"", - "title":"FAQs", - "uri":"iam_01_0000.html", - "doc_type":"", - "p_code":"", + "desc":"When an account establishes a trust relationship with your account, you become a delegated party. You and all the users you have authorized can switch to the delegating a", + "product_code":"iam", + "title":"Switching Roles (by a Delegated Party)", + "uri":"en-us_topic_0046613148.html", + "doc_type":"usermanual", + "p_code":"45", "code":"49" }, { - "desc":"For account security purposes, you are advised to enable login authentication. After this function is enabled, users need to enter an SMS, MFA, or email verification code", - "product_code":"", - "title":"How Do I Enable Login Authentication?", - "uri":"iam_01_0002.html", - "doc_type":"", - "p_code":"49", + "desc":"Services on the cloud platform interwork with each other, and some cloud services are dependent on other services. To delegate a cloud service to access other services an", + "product_code":"iam", + "title":"Cloud Service Delegation", + "uri":"iam_06_0004.html", + "doc_type":"usermanual", + "p_code":"44", "code":"50" }, { - "desc":"MFA authentication provides an additional layer of protection on top of the username and password. If MFA–based login authentication is enabled, you will need to enter a ", - "product_code":"", - "title":"How Do I Bind a Virtual MFA Device?", - "uri":"iam_01_0003.html", - "doc_type":"", - "p_code":"49", + "desc":"To modify the permissions, validity period, and description of an agency, click Modify in the row containing the agency you want to modify.You can change the cloud servic", + "product_code":"iam", + "title":"Deleting or Modifying Agencies", + "uri":"iam_01_0730.html", + "doc_type":"usermanual", + "p_code":"44", "code":"51" }, { - "desc":"After MFA–based login authentication is enabled, you need to enter an MFA verification code in addition to the username and password when logging in to the console. Open ", - "product_code":"", - "title":"How Do I Obtain MFA Verification Codes?", - "uri":"iam_01_0001.html", - "doc_type":"", - "p_code":"49", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"iam", + "title":"Identity Providers", + "uri":"en-us_topic_0059870089.html", + "doc_type":"usermanual", + "p_code":"13", "code":"52" }, { - "desc":"You can unbind the virtual MFA device as long as the mobile phone used to bind the MFA device is available and the MFA application is still installed on the phone.On the ", - "product_code":"", - "title":"How Do I Unbind a Virtual MFA Device?", - "uri":"iam_01_0004.html", - "doc_type":"", - "p_code":"49", + "desc":"The cloud platform provides identity federation based on Security Assertion Markup Language (SAML) or OpenID Connect. This function allows users in your enterprise manage", + "product_code":"iam", + "title":"Introduction", + "uri":"en-us_topic_0079620341.html", + "doc_type":"usermanual", + "p_code":"52", "code":"53" }, + { + "desc":"IAM supports two SSO types: virtual user SSO and IAM user SSO. This section describes the two SSO types and their differences, helping you to choose an appropriate type f", + "product_code":"iam", + "title":"Application Scenarios of Virtual User SSO and IAM User SSO", + "uri":"iam_08_0251.html", + "doc_type":"usermanual", + "p_code":"52", + "code":"54" + }, { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", - "product_code":"", + "product_code":"iam", + "title":"Virtual User SSO via SAML", + "uri":"iam_08_0002.html", + "doc_type":"usermanual", + "p_code":"52", + "code":"55" + }, + { + "desc":"The cloud platform supports identity federation with Security Assertion Markup Language (SAML), which is an open standard that many identity providers (IdPs) use. During ", + "product_code":"iam", + "title":"Overview of Virtual User SSO via SAML", + "uri":"iam_08_0021.html", + "doc_type":"usermanual", + "p_code":"55", + "code":"56" + }, + { + "desc":"To establish a trust relationship between an enterprise IdP and the cloud platform, upload the metadata file of the cloud platform to the enterprise IdP, and then create ", + "product_code":"iam", + "title":"Step 1: Create an IdP Entity", + "uri":"iam_08_0003.html", + "doc_type":"usermanual", + "p_code":"55", + "code":"57" + }, + { + "desc":"You can configure parameters in the enterprise IdP to determine what information will be sent to the cloud platform. The cloud platform authenticates the federated identi", + "product_code":"iam", + "title":"Step 2: Configure the Enterprise IdP", + "uri":"iam_08_0252.html", + "doc_type":"usermanual", + "p_code":"55", + "code":"58" + }, + { + "desc":"After an enterprise IdP user logs in to the cloud platform, the cloud platform authenticates the identity and assigns permissions to the user based on the identity conver", + "product_code":"iam", + "title":"Step 3: Configure Identity Conversion Rules", + "uri":"iam_08_0004.html", + "doc_type":"usermanual", + "p_code":"55", + "code":"59" + }, + { + "desc":"Federated users can initiate a login from the IdP or SP.Initiating a login from an IdP, for example, Microsoft Active Directory Federation Services (AD FS) or Shibboleth.", + "product_code":"iam", + "title":"Step 4: Verify the Federated Login", + "uri":"iam_08_0025.html", + "doc_type":"usermanual", + "p_code":"55", + "code":"60" + }, + { + "desc":"Configure a federated login entry in the enterprise IdP to enable enterprise users use the login link to access the cloud platform.An IdP entity has been created on the c", + "product_code":"iam", + "title":"(Optional) Step 5: Configure a Federated Login Entry in the Enterprise IdP", + "uri":"iam_08_0005.html", + "doc_type":"usermanual", + "p_code":"55", + "code":"61" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"iam", + "title":"IAM User SSO via SAML", + "uri":"iam_08_0253.html", + "doc_type":"usermanual", + "p_code":"52", + "code":"62" + }, + { + "desc":"The cloud platform supports identity federation with Security Assertion Markup Language (SAML), which is an open standard that many identity providers (IdPs) use. During ", + "product_code":"iam", + "title":"Overview of IAM User SSO via SAML", + "uri":"iam_08_0254.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"63" + }, + { + "desc":"To establish a trust relationship between an enterprise IdP and the cloud platform, upload the metadata file of the cloud platform to the enterprise IdP, and then create ", + "product_code":"iam", + "title":"Step 1: Create an IdP Entity", + "uri":"iam_08_0255.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"64" + }, + { + "desc":"You can configure parameters in the enterprise IdP to determine what information will be sent to the cloud platform. The cloud platform authenticates the federated identi", + "product_code":"iam", + "title":"Step 2: Configure the Enterprise IdP", + "uri":"iam_08_0256.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"65" + }, + { + "desc":"For the IAM user SSO type, you must configure an external identity ID for the IAM user which the federated user maps to on the cloud platform. The external identity ID mu", + "product_code":"iam", + "title":"Step 3: Configure an External Identity ID", + "uri":"iam_08_0257.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"66" + }, + { + "desc":"Federated users can initiate a login from the IdP or SP.Initiating a login from an IdP, for example, Microsoft Active Directory Federation Services (AD FS) or Shibboleth.", + "product_code":"iam", + "title":"Step 4: Verify the Federated Login", + "uri":"iam_08_0258.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"67" + }, + { + "desc":"Configure a federated login entry in the enterprise IdP to enable enterprise users use the login link to access the cloud platform.An IdP entity has been created on the c", + "product_code":"iam", + "title":"(Optional) Step 5: Configure a Federated Login Entry in the Enterprise IdP", + "uri":"iam_08_0259.html", + "doc_type":"usermanual", + "p_code":"62", + "code":"68" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"iam", + "title":"Virtual User SSO via OpenID Connect", + "uri":"iam_08_0022.html", + "doc_type":"usermanual", + "p_code":"52", + "code":"69" + }, + { + "desc":"This section describes how to configure identity federation and how identity federation works.The following describes how to configure your enterprise IdP and the cloud p", + "product_code":"iam", + "title":"Overview of Virtual User SSO via OpenID Connect", + "uri":"iam_08_0010.html", + "doc_type":"usermanual", + "p_code":"69", + "code":"70" + }, + { + "desc":"To establish a trust relationship between an enterprise IdP and the cloud platform, set the user redirect URLs and create OAuth 2.0 credentials in the enterprise IdP. On ", + "product_code":"iam", + "title":"Step 1: Create an IdP Entity", + "uri":"iam_08_0009.html", + "doc_type":"usermanual", + "p_code":"69", + "code":"71" + }, + { + "desc":"Federated users are named FederationUser by default in the cloud platform. These users can only log in to the cloud platform and they do not have any other permissions. Y", + "product_code":"iam", + "title":"Step 2: Configure Identity Conversion Rules", + "uri":"iam_08_0008.html", + "doc_type":"usermanual", + "p_code":"69", + "code":"72" + }, + { + "desc":"Configure a federated login entry in the enterprise IdP to enable enterprise users use the login link to access the cloud platform.An IdP entity has been created on the c", + "product_code":"iam", + "title":"(Optional) Step 3: Configure Login Link in the Enterprise Management System", + "uri":"iam_08_0007.html", + "doc_type":"usermanual", + "p_code":"69", + "code":"73" + }, + { + "desc":"An identity conversion rule is a JSON object which can be modified. The following is an example JSON object:[ \n { \n \"remote\": [ \n { \n ", + "product_code":"iam", + "title":"Syntax of Identity Conversion Rules", + "uri":"en-us_topic_0079620340.html", + "doc_type":"usermanual", + "p_code":"52", + "code":"74" + }, + { + "desc":"MFA authentication provides an additional layer of protection on top of the username and password. If you enable MFA authentication, users need to enter the username and ", + "product_code":"iam", + "title":"MFA Authentication and Virtual MFA Device", + "uri":"iam_10_0002.html", + "doc_type":"usermanual", + "p_code":"13", + "code":"75" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"iam", + "title":"Auditing", + "uri":"iam_01_0011.html", + "doc_type":"usermanual", + "p_code":"13", + "code":"76" + }, + { + "desc":"Table 1 lists Identity and Access Management (IAM) operations that can be recorded by Cloud Trace Service (CTS).", + "product_code":"iam", + "title":"IAM Operations That Can Be Recorded by CTS", + "uri":"iam_01_0012.html", + "doc_type":"usermanual", + "p_code":"76", + "code":"77" + }, + { + "desc":"After you enable CTS, it records key operations performed on IAM. You can view the operation records of the last 7 days on the CTS console.The following filters are avail", + "product_code":"iam", + "title":"Viewing Audit Logs", + "uri":"iam_01_0013.html", + "doc_type":"usermanual", + "p_code":"76", + "code":"78" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"iam", + "title":"FAQs", + "uri":"iam_01_0000.html", + "doc_type":"usermanual", + "p_code":"", + "code":"79" + }, + { + "desc":"For account security purposes, you are advised to enable login authentication. After this function is enabled, users need to enter an SMS, MFA, or email verification code", + "product_code":"iam", + "title":"How Do I Enable Login Authentication?", + "uri":"iam_01_0002.html", + "doc_type":"usermanual", + "p_code":"79", + "code":"80" + }, + { + "desc":"MFA authentication provides an additional layer of protection on top of the username and password. If MFA–based login authentication is enabled, you will need to enter a ", + "product_code":"iam", + "title":"How Do I Bind a Virtual MFA Device?", + "uri":"iam_01_0003.html", + "doc_type":"usermanual", + "p_code":"79", + "code":"81" + }, + { + "desc":"After MFA–based login authentication is enabled, you need to enter an MFA verification code in addition to the username and password when logging in to the console. Open ", + "product_code":"iam", + "title":"How Do I Obtain MFA Verification Codes?", + "uri":"iam_01_0001.html", + "doc_type":"usermanual", + "p_code":"79", + "code":"82" + }, + { + "desc":"You can unbind the virtual MFA device as long as the mobile phone used to bind the MFA device is available and the MFA application is still installed on the phone.On the ", + "product_code":"iam", + "title":"How Do I Unbind a Virtual MFA Device?", + "uri":"iam_01_0004.html", + "doc_type":"usermanual", + "p_code":"79", + "code":"83" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"iam", "title":"Change History", "uri":"en-us_topic_0046611300.html", - "doc_type":"", + "doc_type":"usermanual", "p_code":"", - "code":"54" + "code":"84" } ] \ No newline at end of file diff --git a/docs/iam/umn/en-us_image_0000001089129340.png b/docs/iam/umn/en-us_image_0000001089129340.png deleted file mode 100644 index 226e1519..00000000 Binary files a/docs/iam/umn/en-us_image_0000001089129340.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0000001100309480.png b/docs/iam/umn/en-us_image_0000001100309480.png new file mode 100644 index 00000000..25ea05ab Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001100309480.png differ diff --git a/docs/iam/umn/en-us_image_0000001117174928.png b/docs/iam/umn/en-us_image_0000001117174928.png new file mode 100644 index 00000000..5eb55cbb Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001117174928.png differ diff --git a/docs/iam/umn/en-us_image_0000001146589991.png b/docs/iam/umn/en-us_image_0000001146589991.png new file mode 100644 index 00000000..7dd9279b Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001146589991.png differ diff --git a/docs/iam/umn/en-us_image_0000001146708849.png b/docs/iam/umn/en-us_image_0000001146708849.png new file mode 100644 index 00000000..3f6c95ef Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001146708849.png differ diff --git a/docs/iam/umn/en-us_image_0000001162246460.png b/docs/iam/umn/en-us_image_0000001162246460.png new file mode 100644 index 00000000..c54038cf Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001162246460.png differ diff --git a/docs/iam/umn/en-us_image_0000001162406406.png b/docs/iam/umn/en-us_image_0000001162406406.png new file mode 100644 index 00000000..780afc2a Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001162406406.png differ diff --git a/docs/iam/umn/en-us_image_0000001207367895.png b/docs/iam/umn/en-us_image_0000001207367895.png new file mode 100644 index 00000000..6d1b02dc Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001207367895.png differ diff --git a/docs/iam/umn/en-us_image_0000001207368543.png b/docs/iam/umn/en-us_image_0000001207368543.png new file mode 100644 index 00000000..e0168a60 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001207368543.png differ diff --git a/docs/iam/umn/en-us_image_0000001209454671.png b/docs/iam/umn/en-us_image_0000001209454671.png new file mode 100644 index 00000000..46cfcbc0 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001209454671.png differ diff --git a/docs/iam/umn/en-us_image_0000001209613221.png b/docs/iam/umn/en-us_image_0000001209613221.png new file mode 100644 index 00000000..e55805d8 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001209613221.png differ diff --git a/docs/iam/umn/en-us_image_0000001209614103.png b/docs/iam/umn/en-us_image_0000001209614103.png new file mode 100644 index 00000000..59f695c7 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001209614103.png differ diff --git a/docs/iam/umn/en-us_image_0000001474176978.png b/docs/iam/umn/en-us_image_0000001474176978.png new file mode 100644 index 00000000..028963cc Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001474176978.png differ diff --git a/docs/iam/umn/en-us_image_0000001511377602.png b/docs/iam/umn/en-us_image_0000001511377602.png new file mode 100644 index 00000000..0ed42639 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001511377602.png differ diff --git a/docs/iam/umn/en-us_image_0000001511378178.png b/docs/iam/umn/en-us_image_0000001511378178.png new file mode 100644 index 00000000..f0f1b222 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001511378178.png differ diff --git a/docs/iam/umn/en-us_image_0000001511524692.png b/docs/iam/umn/en-us_image_0000001511524692.png new file mode 100644 index 00000000..a73628e5 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001511524692.png differ diff --git a/docs/iam/umn/en-us_image_0000001511856446.png b/docs/iam/umn/en-us_image_0000001511856446.png new file mode 100644 index 00000000..32218a8b Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001511856446.png differ diff --git a/docs/iam/umn/en-us_image_0000001524684833.png b/docs/iam/umn/en-us_image_0000001524684833.png new file mode 100644 index 00000000..098d5498 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001524684833.png differ diff --git a/docs/iam/umn/en-us_image_0000001562564797.png b/docs/iam/umn/en-us_image_0000001562564797.png new file mode 100644 index 00000000..004dde38 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001562564797.png differ diff --git a/docs/iam/umn/en-us_image_0000001562896221.png b/docs/iam/umn/en-us_image_0000001562896221.png new file mode 100644 index 00000000..f6d61c7e Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001562896221.png differ diff --git a/docs/iam/umn/en-us_image_0000001606753690.png b/docs/iam/umn/en-us_image_0000001606753690.png new file mode 100644 index 00000000..5931a145 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001606753690.png differ diff --git a/docs/iam/umn/en-us_image_0000001606779168.png b/docs/iam/umn/en-us_image_0000001606779168.png new file mode 100644 index 00000000..d799cda9 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001606779168.png differ diff --git a/docs/iam/umn/en-us_image_0000001606781176.png b/docs/iam/umn/en-us_image_0000001606781176.png new file mode 100644 index 00000000..6ccded3d Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001606781176.png differ diff --git a/docs/iam/umn/en-us_image_0000001606781944.png b/docs/iam/umn/en-us_image_0000001606781944.png new file mode 100644 index 00000000..7c3090f4 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001606781944.png differ diff --git a/docs/iam/umn/en-us_image_0000001606783928.png b/docs/iam/umn/en-us_image_0000001606783928.png new file mode 100644 index 00000000..130ed766 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001606783928.png differ diff --git a/docs/iam/umn/en-us_image_0000001606937268.png b/docs/iam/umn/en-us_image_0000001606937268.png new file mode 100644 index 00000000..ae2fcdf6 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001606937268.png differ diff --git a/docs/iam/umn/en-us_image_0000001606939052.png b/docs/iam/umn/en-us_image_0000001606939052.png new file mode 100644 index 00000000..acf7c27f Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001606939052.png differ diff --git a/docs/iam/umn/en-us_image_0000001606942104.png b/docs/iam/umn/en-us_image_0000001606942104.png new file mode 100644 index 00000000..77a3b294 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001606942104.png differ diff --git a/docs/iam/umn/en-us_image_0000001606944408.png b/docs/iam/umn/en-us_image_0000001606944408.png new file mode 100644 index 00000000..7825da49 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001606944408.png differ diff --git a/docs/iam/umn/en-us_image_0000001606945160.png b/docs/iam/umn/en-us_image_0000001606945160.png new file mode 100644 index 00000000..c17d826c Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001606945160.png differ diff --git a/docs/iam/umn/en-us_image_0000001607193154.png b/docs/iam/umn/en-us_image_0000001607193154.png new file mode 100644 index 00000000..6b8230c2 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001607193154.png differ diff --git a/docs/iam/umn/en-us_image_0000001607216988.png b/docs/iam/umn/en-us_image_0000001607216988.png new file mode 100644 index 00000000..5931a145 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001607216988.png differ diff --git a/docs/iam/umn/en-us_image_0000001607217960.png b/docs/iam/umn/en-us_image_0000001607217960.png new file mode 100644 index 00000000..bfd0595b Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001607217960.png differ diff --git a/docs/iam/umn/en-us_image_0000001607219512.png b/docs/iam/umn/en-us_image_0000001607219512.png new file mode 100644 index 00000000..de9bb3d5 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001607219512.png differ diff --git a/docs/iam/umn/en-us_image_0000001607256960.png b/docs/iam/umn/en-us_image_0000001607256960.png new file mode 100644 index 00000000..35e5a61d Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001607256960.png differ diff --git a/docs/iam/umn/en-us_image_0000001607259280.png b/docs/iam/umn/en-us_image_0000001607259280.png new file mode 100644 index 00000000..96c1014e Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001607259280.png differ diff --git a/docs/iam/umn/en-us_image_0000001646287137.png b/docs/iam/umn/en-us_image_0000001646287137.png new file mode 100644 index 00000000..1073f956 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001646287137.png differ diff --git a/docs/iam/umn/en-us_image_0000001646293253.png b/docs/iam/umn/en-us_image_0000001646293253.png new file mode 100644 index 00000000..1073f956 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001646293253.png differ diff --git a/docs/iam/umn/en-us_image_0000001646367745.png b/docs/iam/umn/en-us_image_0000001646367745.png new file mode 100644 index 00000000..1073f956 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001646367745.png differ diff --git a/docs/iam/umn/en-us_image_0000001646415725.png b/docs/iam/umn/en-us_image_0000001646415725.png new file mode 100644 index 00000000..92e75d68 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001646415725.png differ diff --git a/docs/iam/umn/en-us_image_0000001646542753.png b/docs/iam/umn/en-us_image_0000001646542753.png new file mode 100644 index 00000000..1073f956 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001646542753.png differ diff --git a/docs/iam/umn/en-us_image_0000001646661553.png b/docs/iam/umn/en-us_image_0000001646661553.png new file mode 100644 index 00000000..1073f956 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001646661553.png differ diff --git a/docs/iam/umn/en-us_image_0000001655953453.png b/docs/iam/umn/en-us_image_0000001655953453.png new file mode 100644 index 00000000..35e5a61d Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001655953453.png differ diff --git a/docs/iam/umn/en-us_image_0000001655985477.png b/docs/iam/umn/en-us_image_0000001655985477.png new file mode 100644 index 00000000..1bd90371 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001655985477.png differ diff --git a/docs/iam/umn/en-us_image_0000001656073017.png b/docs/iam/umn/en-us_image_0000001656073017.png new file mode 100644 index 00000000..5955c9c8 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656073017.png differ diff --git a/docs/iam/umn/en-us_image_0000001656273117.png b/docs/iam/umn/en-us_image_0000001656273117.png new file mode 100644 index 00000000..ae2fcdf6 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656273117.png differ diff --git a/docs/iam/umn/en-us_image_0000001656300001.png b/docs/iam/umn/en-us_image_0000001656300001.png new file mode 100644 index 00000000..bfd0595b Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656300001.png differ diff --git a/docs/iam/umn/en-us_image_0000001656303477.png b/docs/iam/umn/en-us_image_0000001656303477.png new file mode 100644 index 00000000..4098788b Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656303477.png differ diff --git a/docs/iam/umn/en-us_image_0000001656303721.png b/docs/iam/umn/en-us_image_0000001656303721.png new file mode 100644 index 00000000..bfd0595b Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656303721.png differ diff --git a/docs/iam/umn/en-us_image_0000001656337241.png b/docs/iam/umn/en-us_image_0000001656337241.png new file mode 100644 index 00000000..6b8230c2 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656337241.png differ diff --git a/docs/iam/umn/en-us_image_0000001656340545.png b/docs/iam/umn/en-us_image_0000001656340545.png new file mode 100644 index 00000000..f98876a4 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656340545.png differ diff --git a/docs/iam/umn/en-us_image_0000001656341101.png b/docs/iam/umn/en-us_image_0000001656341101.png new file mode 100644 index 00000000..acf7c27f Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656341101.png differ diff --git a/docs/iam/umn/en-us_image_0000001656344889.png b/docs/iam/umn/en-us_image_0000001656344889.png new file mode 100644 index 00000000..0dd626d0 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656344889.png differ diff --git a/docs/iam/umn/en-us_image_0000001656458721.png b/docs/iam/umn/en-us_image_0000001656458721.png new file mode 100644 index 00000000..c6bbaae6 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656458721.png differ diff --git a/docs/iam/umn/en-us_image_0000001656459361.png b/docs/iam/umn/en-us_image_0000001656459361.png new file mode 100644 index 00000000..96c1014e Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656459361.png differ diff --git a/docs/iam/umn/en-us_image_0000001656493417.png b/docs/iam/umn/en-us_image_0000001656493417.png new file mode 100644 index 00000000..3d60b14b Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656493417.png differ diff --git a/docs/iam/umn/en-us_image_0000001656576929.png b/docs/iam/umn/en-us_image_0000001656576929.png new file mode 100644 index 00000000..876b8483 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656576929.png differ diff --git a/docs/iam/umn/en-us_image_0000001656578205.png b/docs/iam/umn/en-us_image_0000001656578205.png new file mode 100644 index 00000000..df30add2 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656578205.png differ diff --git a/docs/iam/umn/en-us_image_0000001656580725.png b/docs/iam/umn/en-us_image_0000001656580725.png new file mode 100644 index 00000000..d799cda9 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656580725.png differ diff --git a/docs/iam/umn/en-us_image_0000001656582221.png b/docs/iam/umn/en-us_image_0000001656582221.png new file mode 100644 index 00000000..130ed766 Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656582221.png differ diff --git a/docs/iam/umn/en-us_image_0000001656585157.png b/docs/iam/umn/en-us_image_0000001656585157.png new file mode 100644 index 00000000..fefc43eb Binary files /dev/null and b/docs/iam/umn/en-us_image_0000001656585157.png differ diff --git a/docs/iam/umn/en-us_image_0272447834.png b/docs/iam/umn/en-us_image_0272447834.png new file mode 100644 index 00000000..92e75d68 Binary files /dev/null and b/docs/iam/umn/en-us_image_0272447834.png differ diff --git a/docs/iam/umn/en-us_image_0274186850.png b/docs/iam/umn/en-us_image_0274186850.png deleted file mode 100644 index b9fa6e46..00000000 Binary files a/docs/iam/umn/en-us_image_0274186850.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274186858.png b/docs/iam/umn/en-us_image_0274186858.png deleted file mode 100644 index 912ba652..00000000 Binary files a/docs/iam/umn/en-us_image_0274186858.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274187167.png b/docs/iam/umn/en-us_image_0274187167.png deleted file mode 100644 index 1b96313d..00000000 Binary files a/docs/iam/umn/en-us_image_0274187167.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274187171.png b/docs/iam/umn/en-us_image_0274187171.png deleted file mode 100644 index a790ced5..00000000 Binary files a/docs/iam/umn/en-us_image_0274187171.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274187197.png b/docs/iam/umn/en-us_image_0274187197.png deleted file mode 100644 index 99ca885a..00000000 Binary files a/docs/iam/umn/en-us_image_0274187197.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274187199.png b/docs/iam/umn/en-us_image_0274187199.png deleted file mode 100644 index 724d9f76..00000000 Binary files a/docs/iam/umn/en-us_image_0274187199.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274187214.png b/docs/iam/umn/en-us_image_0274187214.png deleted file mode 100644 index 8543c1b6..00000000 Binary files a/docs/iam/umn/en-us_image_0274187214.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274187218.png b/docs/iam/umn/en-us_image_0274187218.png deleted file mode 100644 index 81df9923..00000000 Binary files a/docs/iam/umn/en-us_image_0274187218.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274187226.png b/docs/iam/umn/en-us_image_0274187226.png deleted file mode 100644 index 5bd110cf..00000000 Binary files a/docs/iam/umn/en-us_image_0274187226.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274187229.png b/docs/iam/umn/en-us_image_0274187229.png deleted file mode 100644 index 3f186234..00000000 Binary files a/docs/iam/umn/en-us_image_0274187229.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274187237.png b/docs/iam/umn/en-us_image_0274187237.png deleted file mode 100644 index c6c5afd2..00000000 Binary files a/docs/iam/umn/en-us_image_0274187237.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274187239.png b/docs/iam/umn/en-us_image_0274187239.png deleted file mode 100644 index 4158dfa8..00000000 Binary files a/docs/iam/umn/en-us_image_0274187239.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274187264.png b/docs/iam/umn/en-us_image_0274187264.png deleted file mode 100644 index f6063cb7..00000000 Binary files a/docs/iam/umn/en-us_image_0274187264.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0274187275.png b/docs/iam/umn/en-us_image_0274187275.png deleted file mode 100644 index e233ebe1..00000000 Binary files a/docs/iam/umn/en-us_image_0274187275.png and /dev/null differ diff --git a/docs/iam/umn/en-us_image_0289500726.png b/docs/iam/umn/en-us_image_0289500726.png new file mode 100644 index 00000000..f20088ed Binary files /dev/null and b/docs/iam/umn/en-us_image_0289500726.png differ diff --git a/docs/iam/umn/en-us_topic_0046611269.html b/docs/iam/umn/en-us_topic_0046611269.html index e1b0ee3c..9052e474 100644 --- a/docs/iam/umn/en-us_topic_0046611269.html +++ b/docs/iam/umn/en-us_topic_0046611269.html @@ -1,17 +1,52 @@ -

Creating a User Group

+

Creating a User Group and Assigning Permissions

You can plan user groups based on user responsibilities and grant the required permissions to the user groups. Users inherit permissions from the user groups to which they belong.

-

Procedure

  1. In the navigation pane, choose User Groups.
  2. On the User Groups page, click Create User Group.
  3. Enter a user group name.
  4. (Optional) Enter a description for the user group.

    To enable users to directly view their permissions, set a description for the user group. For example, if you assign the Security Administrator role to a user group, you can set any description in the Description text box. For example: Security Administrator: Permissions for creating, deleting, and modifying users as well as granting permissions to users. For details about the permissions for all cloud services, see Permissions

    +

    Procedure

    1. In the navigation pane, choose User Groups.
    2. On the User Groups page, click Create User Group.
    3. Enter a user group name.
    4. (Optional) Enter a description for the user group.

      To enable users to directly view their permissions, set a description for the user group. For example, if you assign the Security Administrator role to a user group, you can set any description in the Description text box. For example: Security Administrator: Permissions for creating, deleting, and modifying users as well as granting permissions to users. For details about the permissions for all cloud services, see Permissions.

    5. Click OK.

      The user group is displayed in the user group list.

      -

    6. In the row containing the user group, click Manage Permissions.
    7. On the Permissions tab page, click Assign Permissions above the permission list.
    8. Specify the authorization scope. If you select Region-specific projects, select one or more projects in the drop-down list.

      • Global service project: Services deployed without specifying physical regions are called global services, such as Object Storage Service (OBS), Content Delivery Network (CDN), and Tag Management Service (TMS). Permissions for these services must be assigned in the global service project.
      • Region-specific projects: Services deployed in specific regions are called project-level services. Permissions for these services need to be assigned in region-specific projects and take effect only for the corresponding regions. If you want the permissions to take effect for all regions, grant them in all these regions.
      -

    9. Select policies and click OK.
    +

  5. In the row containing the user group, click Authorize in the Operation column.
  6. On the Authorize User Group page, select the permissions to be assigned to the user group. You can also click Go to Old Edition to use the old version for authorization.

    If the system-defined policies do not meet your requirements, you can click Create Policy in the upper right to create custom policies for fine-grained permissions control. For details, see Creating a Custom Policy.

    +
    Figure 1 Selecting permissions
    +

  7. Click Next.
  8. Specify the scope. The system automatically recommends an authorization scope for the permissions you selected. Table 1 describes all the authorization scopes provided by IAM.

    +

    + + + + + + + + + + + + + +
    Table 1 Authorization scopes

    Scope

    +

    Description

    +

    All resources

    +

    IAM users can use the resources in all region-specific projects and the global services in your account based on the assigned permissions.

    +

    Region-specific projects

    +

    IAM users can use the resources in the region-specific projects you select based on the assigned permissions.

    +

    If some of the selected permissions belong to global services, the system automatically sets the authorization scope of these permissions to All resources. Selected permissions for project-level services will apply to the region-specific projects you select.

    +

    Global services

    +

    IAM users can use global services based on the assigned permissions. Global services are deployed with no physical regions specified. IAM users do not need to specify a region when accessing these services, such as Object Storage Service (OBS) and Content Delivery Network (CDN).

    +

    If some of the selected permissions belong to project-level services, the system automatically sets the authorization scope of these permissions to All resources. Selected permissions for global services will apply to the global services.

    +
    +
    +

  9. Click OK.
+ + \ No newline at end of file diff --git a/docs/iam/umn/en-us_topic_0046611300.html b/docs/iam/umn/en-us_topic_0046611300.html index 672f8b0a..f1e62d45 100644 --- a/docs/iam/umn/en-us_topic_0046611300.html +++ b/docs/iam/umn/en-us_topic_0046611300.html @@ -2,16 +2,57 @@

Change History

-
-
Table 1 Change history

Released On

+
- + + + + + + + + + + + + + + + -
Table 1 Change history

Released On

What's New

2022-11-21

+

2023-07-20

+

This release incorporates the following changes:

+ +

2023-07-10

+

This release incorporates the following change:

+

Added content in Table 1.

+

2023-05-26

+

This release incorporates the following changes:

+ +

2023-04-04

+

This release incorporates the following changes:

+ +

2023-02-21

+

This release incorporates the following changes:

+

Adjusted the structure of sections IAM Users, User Groups and Authorization, Security Settings, and Projects.

+

Added section Logging In as an IAM User.

+

Added section Deleting an IAM User.

+

Added section Changing the Login Password of an IAM User.

+

Added section Adding Users to or Removing Users from a User Group.

+

Added section Deleting a User Group.

+

Added section Revoking Permissions of a User Group.

+

Added section Assigning Dependency Roles.

+

Added section Roles.

+

Modified content in section Assigning Permissions to an IAM User.

+

Modified content in section Creating a User Group and Assigning Permissions.

+

Modified content in section Basic Concepts.

+

2022-11-21

This release incorporates the following changes:

- +

2022-10-21

@@ -22,13 +63,13 @@

2020-12-30

This release incorporates the following changes:

- +

2020-11-09

This release incorporates the following changes:

-

Updated Creating a User Group and Assigning Permissions, Managing Projects, Creating a User Group, Viewing and Modifying User Group Information, Creating an Agency (by a Delegating Party), and Assigning Permissions to a User (by a Delegated Party) based on changes to the user group and agency management pages.

+

Updated Creating a User Group and Assigning Permissions, Projects, Creating a User Group and Assigning Permissions, Viewing and Modifying User Group Information, Creating an Agency (by a Delegating Party), and (Optional) Assigning Permissions to an IAM User (by a Delegated Party) based on changes to the user group and agency management pages.

2020-07-21

@@ -58,13 +99,13 @@

2019-03-12

This release incorporates the following changes:

- +

2019-02-26

This release incorporates the following change:

-

Added section Assigning Permissions to a User (by a Delegated Party).

+

Added section (Optional) Assigning Permissions to an IAM User (by a Delegated Party).

2018-11-22

@@ -88,7 +129,7 @@

2018-08-30

This release incorporates the following changes:

-

Added the description about Session Timeout Policy in Account Settings.

+

Added descriptions about session timeout settings in section 3.5 "Account Settings."

2018-08-10

@@ -100,7 +141,7 @@

2018-07-30

This release incorporates the following changes:

-

Added section Fine-Grained Policy Management.

+

Added section Permissions.

2018-06-29

@@ -118,13 +159,13 @@

2018-03-30

This release incorporates the following changes:

-

Added the description for ACL validation conditions in Account Settings.

+

Added descriptions about conditions for an ACL to take effect in section 3.5 "Account Settings."

2018-01-30

This release incorporates the following changes:

- +
  • Added the immediate project deletion function in Projects.
  • Added a note for the "Refined permission management" table in IAM Features.

2018-01-18

@@ -148,34 +189,34 @@

2017-09-15

This release incorporates the following changes:

-
  • Added the following content in Managing Projects:
    • Relationship between users and projects
    • Method of enabling Cloud Trace Service (CTS)
    • A notice that the resources in a project will also be deleted if the project is deleted
    • Naming conventions of a project name
    -
  • Modified descriptions about entering the login password and verification code during project deletion in Managing Projects.
+
  • Added the following content in Projects:
    • Relationship between users and projects
    • Method of enabling Cloud Trace Service (CTS)
    • A notice that the resources in a project will also be deleted if the project is deleted
    • Naming conventions of a project name
    +
  • Modified descriptions about entering the login password and verification code during project deletion in Projects.

2017-08-29

This release incorporates the following changes:

-

Made the following changes in Managing Projects:

+

Made the following changes in Projects:

  • Changed the number of projects that can be created in a region by default from 2 to 10.
  • Deleted the description for the method of creating a project.

2017-08-22

This release incorporates the following changes:

-

Added the following content in Managing Projects:

+

Added the following content in Projects:

  • Method of applying for a higher quota
  • Authorizing projects
  • A note that a project cannot be deleted once it is created

2017-07-27

This release incorporates the following changes:

-
  • Added the description for the CTS Administrator permission.
  • Added the description for automatically extracting metadata and manually configuring metadata in Step 1: Create an Identity Provider.
+
  • Added the description for the CTS Administrator permission.
  • Added the description for automatically extracting metadata and manually configuring metadata in Step 1: Create an IdP Entity.

2017-05-26

This release incorporates the following changes:

-

Added section Establishing a Trust Relationship.

+

Added Step 1: Create an IdP Entity.

2017-05-05

@@ -187,7 +228,7 @@

2017-04-27

This release incorporates the following changes:

- +

2017-03-30

@@ -229,14 +270,14 @@

2016-09-30

This release incorporates the following changes:

-

2016-08-25

This release incorporates the following changes:

-

Added section Account Settings.

+

Added section 3.5 "Account Settings."

2016-03-14

diff --git a/docs/iam/umn/en-us_topic_0046611303.html b/docs/iam/umn/en-us_topic_0046611303.html index 8f7e89eb..42dd6c20 100644 --- a/docs/iam/umn/en-us_topic_0046611303.html +++ b/docs/iam/umn/en-us_topic_0046611303.html @@ -1,7 +1,7 @@

Creating a User

-

If you need to share resources in your account to other users, you can create users by using the console or by calling an API, and set security credentials and required permissions for the users. The users can then access the cloud system through the management console or by calling APIs.

+

If you need to share resources in your account to other users, you can create users by using the console or by calling an API, and set security credentials and required permissions for the users. The users can then access the cloud platform through the management console or by calling APIs.

Procedure

  1. In the navigation pane, choose Users.
  2. On the Users page, click Create User.
  3. Specify the user information on the Create User page. To create more users, click Add User. You can create a maximum of 10 users at a time.

    @@ -11,7 +11,7 @@ - + + +

    Parameter

    Username

    Username that will be used to log in to the cloud system. This field is required.

    +

    Username that will be used to log in to the cloud platform. This field is required.

    Email Address

    @@ -29,6 +29,12 @@

    Additional information about the user. This field is optional.

    External Identity ID

    +

    Identity of an enterprise user in IAM user SSO.

    +

    This parameter (no more than 128 characters) is mandatory for IAM user SSO. For details, see IAM User SSO via SAML.

    +
    @@ -47,7 +53,7 @@

--

If you select this option, after the user is created, you can download the access key (AK/SK) generated for the user. The user can use the access key to access the cloud system through APIs. Each user can have a maximum of two access keys.

+

If you select this option, after the user is created, you can download the access key (AK/SK) generated for the user. The user can use the access key to access the cloud platform through APIs. Each user can have a maximum of two access keys.

Management console access

@@ -93,12 +99,12 @@
  • For security purposes, select only one access type for each user.
    • Programmatic access: Users can access cloud services using development tools (including APIs, CLI, and SDKs) that support key authentication. This access type is recommended for developers.
    • Management console access: Users can log in to the management console using their own usernames and passwords.
    -
  • Users can log in to the cloud system using the username, mobile number, or email address.
  • If users forget their password, they can reset it through email address or mobile number verification. If no email address or mobile number has been bound to users, users need to contact the administrator to reset their password.
  • After you set the access type for IAM users, you cannot change it later. However, you can control their access by enabling or disabling their accounts.
+
  • Users can log in to the cloud platform using the username, mobile number, or email address.
  • If users forget their password, they can reset it through email address or mobile number verification. If no email address or mobile number has been bound to users, users need to contact the administrator to reset their password.
  • After you set the access type for IAM users, you cannot change it later. However, you can control their access by enabling or disabling their accounts.
  • (Optional) Click Next and add the user to one or more user groups.

    • The user will inherit the permissions assigned to the user groups to which the user belongs.
    • You can also create new groups as required.
    • If a user will be an administrator, add the user to the default group admin.
    • You can enter a keyword to quickly find the target user group.
    • You can add a user to multiple user groups.
    -

  • Click Create.

    If you have specified the access type as Programmatic access, you can download the access key on the Finish page.

    +

  • Click Create.

    If you have specified the access type as Programmatic access, download the access key on the Finish page.

  • @@ -107,7 +113,7 @@
    diff --git a/docs/iam/umn/en-us_topic_0046611308.html b/docs/iam/umn/en-us_topic_0046611308.html index 1130bb9d..5edc888e 100644 --- a/docs/iam/umn/en-us_topic_0046611308.html +++ b/docs/iam/umn/en-us_topic_0046611308.html @@ -1,29 +1,26 @@ -

    Account Settings

    -

    Users with Security Administrator permissions can configure a login authentication policy, password policy, and ACL to keep your user information and system secure.

    -

    Procedure

    1. Set the login authentication policy.

      1. In the navigation pane, choose Security Settings > Login Authentication Policy.
      2. In the Account Lockout area, enter the idle duration, maximum number of invalid login attempts, and lockout duration.

        If the number of login attempts reaches the specified upper limit within the specified duration, the user will be locked for a period of time. For example, if a user fails to log in for 3 consecutive times within 10 minutes, the user will be locked for 15 minutes. The user can log in again after 15 minutes.

        -
      3. In the Account Disabling area, select Disable account upon login if it is not used within the validity period, and set the user validity period. If the user does not access the cloud system through the management console or APIs within the validity period, the user will be disabled.

        The account disabling setting is for security purposes. If a user is disabled, resources in the account will not be affected and the user can contact the administrator to enable the user again.

        -
      4. In the Session Timeout area, set the session timeout that will apply if you or users created using your account do not perform any operations within a specific period. The timeout ranges from 15 minutes to 24 hours, and the default value is 15 minutes. If a user does not perform any operation within the specified duration, the user needs to log in again.
      5. In the Recent Login Information area, select Display last login information upon successful login.

        Users will be able to view the login information, such as the time of the last login, on the Login Verification page.

        -
      6. In the Custom Information area, set custom information that will be displayed upon successful login.

        Users will be able to view this custom information on the Login Verification page.

        -
      7. Click Save.
      -

    2. Set the password policy.

      1. In the navigation pane, choose Security Settings > Password Policy.
      2. In the Password Composition & Reuse area, do as follows:
        • Ensure that the password contains at least 2 to 4 of the following character types: uppercase letters, lowercase letters, digits, and special characters. By default, the password must contain at least 2 of these character types.
        • Set Minimum Number of Characters.

          By default, a password must contain at least 6 characters.

          -
          -
        • Select Restrict consecutive identical characters and set the maximum number of consecutive identical characters that can be contained in a password. The value ranges from 1 to 32.
        • Select Disallow previously used passwords and set the number of recent passwords disallowed. The value ranges from 1 to 10.
        -
      3. In the Password Expiration area, select Prompt password change 15 days before expiration and force password change upon expiration, and set the password validity period.

        Users must change their password when the password has expired.

        -
        The password must meet the following requirements:
        • Must contain 6 to 32 characters.
        • Must contain at least two types of the following: uppercase letters, lowercase letters, digits, and special characters (~`!?,.:;-_'"(){}[]/<>@#$%^&*+|\= and spaces).
        • Cannot be the username or the username spelled backwards. For example, if the username is A12345, the password cannot be A12345, a12345, 54321A, or 54321a.
        • Cannot contain the user's mobile number or email address.
        -
        -
        -
      4. In the Minimum Password Age area, select Allow a password to be changed only after it is used for a specified time and set the minimum password age.

        Users can change their password only when the specified period has expired.

        -
      5. Click Save.
      -

    3. Set the ACL.

      1. In the navigation pane, choose Security Settings > ACL.
      2. On the ACL page, enter the allowed IP address ranges or IPv4 CIDR blocks.
        • IP Address Ranges: only allow users to access the system using IP addresses in specified ranges.
        • IPv4 CIDR Blocks: only allow users of specified IPv4 CIDR blocks to access the system. For example: 10.10.10.10/32.
        -
        • The ACL takes effect only for users under your account.
        • You can click Restore Defaults to restore the allowed IP address ranges to the default value, 0.0.0.0-255.255.255.255, and to clear IPv4 CIDR Blocks.
        • If both IP Address Ranges and IPv4 CIDR Blocks are set, users are allowed to access the system if their IP address meets the conditions specified by either of the two parameters.
        -
        -
      3. Click Save.
      -

    -
    -
    + + + +

    Security Settings

    +
    + + diff --git a/docs/iam/umn/en-us_topic_0046613147.html b/docs/iam/umn/en-us_topic_0046613147.html index 010c2378..d9395726 100644 --- a/docs/iam/umn/en-us_topic_0046613147.html +++ b/docs/iam/umn/en-us_topic_0046613147.html @@ -1,41 +1,31 @@

    Creating an Agency (by a Delegating Party)

    -

    By creating an agency, you can share your resources with another account or a cloud service (such as ECS), or delegate an individual or team to manage your resources. You do not need to share your security credentials (the password and access keys) with the delegated party. Instead, the delegated party can log in with its own account credentials and then switches the role to your account and manage your resources.

    -

    Procedure

    1. In the navigation pane, choose Agencies.
    2. On the Agencies page, click Create Agency.
    3. Specify the agency name and type.

      -

      - - - - - - - - - - -
      Table 1 Agency types

      Agency Type

      -

      Description

      -

      Account

      -

      Share resources with another account or delegate an individual or team to manage your resources.

      -

      Cloud service

      -

      Delegate a specific service to access or maintain your data. For example, you can create an agency to delegate ECS to call data maintenance or monitoring APIs with an access key.

      -
      +

      By creating an agency, you can share your resources with another account, or delegate an individual or team to manage your resources. You do not need to share your security credentials (the password and access keys) with the delegated party. Instead, the delegated party can log in with its own account credentials and then switches the role to your account and manage your resources.

      +

      Prerequisites

      Before creating an agency, complete the following operations:

      +
      -
      • If you set Agency Type to Account, enter the domain name of an account to which you want to delegate resource access in Delegated Account.
      • If you set Agency Type to Cloud service, click Select and select a cloud service.
      -

    4. Set the validity period and enter a description about the agency.
    5. In the Permissions area, click Assign Permissions above the permission list. Then attach policies to the agency and click OK.

      For details about the permissions for all cloud services, see Permissions.

      +

      Procedure

      1. Log in to the .
      2. On the IAM console, choose Agencies from the navigation pane, and click Create Agency in the upper right corner.

        Figure 1 Creating an agency
        +

      3. Enter an agency name.

        Figure 2 Setting the agency name
        +

      4. Specify the agency type as Account, and enter the name of a delegated account.

        • Account: Share resources with another account or delegate an individual or team to manage your resources. The delegated account can only be an account, rather than an IAM user or a federated user.
        • Cloud service: Delegate a specific service to access other services. For more information, see Cloud Service Delegation.
        +
        +

      5. Set the validity period and enter a description for the agency.
      6. Click Next.
      7. Select the policies or roles to be attached to the agency, click Next, and select the authorization scope.

        • Assigning permissions to an agency is similar to assigning permissions to a user group. The two operations differ only in the number of available permissions. For details about how to assign permissions to a user group, see Assigning Permissions to an IAM User.
        • Agencies cannot be assigned the Security Administrator role. For account security, grant permissions required to agencies based on the principle of least privilege.
        +
        +

      8. Click OK.

        After creating an agency, provide your domain name, agency name, agency ID, and agency permissions to the delegated party. The delegated party can then switch the role to your account and manage specific resources based on the assigned permissions.

        -

      9. Click OK.

        The agency is displayed in the agency list. The delegated account can manage resources in your account by switching the role.

      -

      Follow-up Operation

      • In the agency list, click Modify in the row that contains the target agency to change the agency type, delegated account, validity period, description, and permissions.
      • In the agency list, click Delete to delete the agency.
      -

      Cloud service agencies cannot be modified.

      -
      -
      + + \ No newline at end of file diff --git a/docs/iam/umn/en-us_topic_0046613148.html b/docs/iam/umn/en-us_topic_0046613148.html index 9e2c76b5..0b660a9d 100644 --- a/docs/iam/umn/en-us_topic_0046613148.html +++ b/docs/iam/umn/en-us_topic_0046613148.html @@ -1,19 +1,22 @@

      Switching Roles (by a Delegated Party)

      -

      When an account establishes a trust relationship between itself and your account, you become a delegated party. You and all the users you have authorized can switch to the delegating account and manage resources under the account based on assigned permissions.

      -

      Prerequisites

      • A trust relationship has been established between another account and your account.
      • You have obtained the name of the delegating account and the agency name.
      +

      When an account establishes a trust relationship with your account, you become a delegated party. You and all the users you have authorized can switch to the delegating account and manage resources under the account based on assigned permissions.

      +

      Prerequisites

      • A trust relationship has been established between your account and another account.
      • You have obtained the delegating account name and agency name.
      -

      Procedure

      1. Log in to the system as the user created in 3 of Assigning Permissions to a User (by a Delegated Party).

        The user created in 3 of Assigning Permissions to a User (by a Delegated Party) can switch roles to manage resources for the delegating party.

        +

        Procedure

        1. Log in to the management console using your account or log in as the IAM user created in 2.

          The IAM user created in 2 of (Optional) Assigning Permissions to an IAM User (by a Delegated Party) can switch roles to manage resources for the delegating party.

          -

        2. Point to the domain name in the upper right corner of the page and choose Switch Role.
        3. On the Switch Role page, enter the domain name of the delegating party.

          If an agency other than the agencies created by the delegating party is displayed, it indicates that you do not have access permissions. Select the correct agency in the Agency Name drop-down list.

          +

        4. Hover the mouse pointer over the username in the upper right corner and choose Switch Role.
        5. On the Switch Role page, enter the domain name of the delegating party.

          After you enter the domain name, the agencies created under this account will be automatically displayed after you click the agency name text box. Select an authorized one from the drop-down list.

          -

        6. Click OK to switch to the delegating account.
        +
        +

      2. Click OK to switch to the delegating account.
      +
      +

      Follow-Up Procedure

      To return to your own account, hover the mouse pointer over the username in the upper right corner, choose Switch Role, and select your account.

      diff --git a/docs/iam/umn/en-us_topic_0046661675.html b/docs/iam/umn/en-us_topic_0046661675.html index 08b5b604..e625ae3e 100644 --- a/docs/iam/umn/en-us_topic_0046661675.html +++ b/docs/iam/umn/en-us_topic_0046661675.html @@ -1,72 +1,33 @@

      Viewing and Modifying User Information

      -

      As an administrator, you can view and modify the basic information, user groups, and logs of each user. In addition, you can change the groups to which a user belongs if the user's responsibilities have changed, or modify the login credentials of a user if the user forgets their password or access key.

      -

      Viewing User Information

      In the user list, view the detailed information about a user, including the basic information, user groups, and logs.

      +

      You can modify the user information, including the status, access type, description, external identity ID, and belonged user group.

      +

      If the job responsibilities of a user are changed, you can change the groups to which the user belongs to modify the user permissions. You can also change the virtual MFA device and access keys of the user by choosing More > Security Settings in the row containing the target user. If a user forgot their password or access keys, you can modify the login credentials of the user.

      +

      As an administrator, you can modify the basic information about an IAM user, change the security settings of the user and the groups to which the user belongs, and view or delete the assigned permissions. To view or modify user information, click Security Settings in the row containing the IAM user.

      +

      To adjust the item columns displayed on the list, click . The Username and Operation columns are displayed by default, and the Status column cannot be removed. You can also select Description, Last Login, Created, Access Type, Virtual MFA Device, Password Age, and Access Key (Status, Age, and AK).

      -

      Modifying User Information

      Click Modify in the Operation column of the row that contains the target user.
      • Status: A user is enabled by default after being created. You can change the status of a user to Disabled if you will no longer use it.
      • Login Authentication
        • Virtual MFA device: Change the login authentication mode to virtual MFA device only if the user has been bound to an MFA device. The user needs to enter an MFA verification code during login.
        • SMS: Change the login authentication mode to SMS only if the user has been bound to a mobile number. The user needs to enter an SMS verification code during login.
        • Email: Change the login authentication mode to email only if the user has been bound to an email address. The user needs to enter an email verification code during login.
        -
      • Email Address, Mobile Number, and Description
      • Virtual MFA Device: Bind an MFA device to or unbind an MFA device from the user.
      • User Groups: Add the user to or remove the user from one or more user groups.

        You can enter a keyword to quickly find the target user group.

        +

        Basic Information

        You can modify the basic information of IAM users, but cannot modify the basic information of your account. The username, user ID, and creation time can be viewed but cannot be modified.

        +
        • Status: New IAM users are enabled by default. You can set Status to Disabled to disable an IAM user. A disabled user is no longer able to log in to the cloud platform through the management console or programmatic access.
        • Access Type: You can change the access type of the IAM user.
          • Pay attention to the following when you set the access type for an IAM user:
            • If you intend to enable the user to access cloud services only by using the management console, select Management console access.
            • If you intend to enable the user to access cloud services only by using programmatic access, select Programmatic access.
            • If the user needs to use a password as the credential for programmatic access to certain APIs, select Programmatic access.
            • If the user needs to perform access key verification when using certain services in the console, select both Programmatic access and Management console access.
            +
          • If the access type of the user is Programmatic access or both Programmatic access and Management console access, deselecting Programmatic access will restrict the user's access to cloud services. Exercise caution when performing this operation.
          +
        • Description: You can modify the description of the IAM user.
        • External Identity ID: Identifies an enterprise user in federated login using SSO.
        +
        +

        User Groups

        An IAM user inherits permissions from the groups to which the user belongs. You can change the permissions assigned for an IAM user by changing the groups to which the user belongs. To modify the permissions of a user group, see Viewing and Modifying User Group Information.

        +

        Your account belongs to the default group admin, which cannot be changed.

        +
        • Click Add to User Groups, and select one or more groups to which the user will belong. The user then inherits permissions of these groups.
        • Click Remove on the right of a user group and click Yes. The user no longer has the permissions assigned to the group.
        +
        +

        Security Settings

        As an administrator, you can modify the MFA device, login credential, login protection, and access keys of an IAM user on this page. If you are an IAM user and need to change your mobile number, email address, or virtual MFA device, see Security Settings.

        +
        • MFA Authentication: You can change the multi-factor authentication (MFA) settings of an IAM user on the Security Settings page.
          • Change the mobile number or email address of the user.

            The mobile number and email address of the IAM user cannot be the same as those of your account or other IAM users.

            +
            +
          • Remove the MFA device from the user. For more information about MFA authentication and virtual MFA device, see MFA Authentication and Virtual MFA Device.
        -
        -
        -

        Setting User Credentials

        In the user list, click Set Credentials in the Operation column of the row that contains the target user to change the password or manage access keys. -
        - - - - - - - - - - - - - - - - - - - - - - - - -

        Credential Type

        -

        Generation Method

        -

        Description

        -

        Application Scenario

        -

        Password

        -

        Set by user

        -

        The user can set a password by clicking on the one-time login URL sent over email.

        -

        Resetting the password of a user who has been associated with an email address and needs to use the password to log in to the management console.

        -

        Automatically generated

        -

        The system automatically generates a 10-character password.

        -
        NOTE:

        You can download the password after clicking OK when the user is created.

        -
        -

        Resetting the password of a user who uses a development tool (such as APIs, CLI, and SDK) that supports password authentication to access the cloud system.

        -

        Set now

        -

        Set password for the user.

        -

        Setting a password for a user.

        -

        Access key

        -

        Created by a user or security administrator

        -

        Create or delete access keys in the Access Keys area.

        -
        NOTE:

        Each user can have a maximum of two access keys, which are valid for 360 days. To ensure account security, keep the access keys properly.

        -
        -

        Creating or deleting access keys of users who access the cloud system using access keys.

        -
        -
        -
        -
        • Password Reset: If you select Automatically generated or Set now, you can choose whether to require password reset when the user logs in. For security purposes, do not deselect this option.
        +
        • Login Credentials: You can change the login password of the IAM user. For more information, see Changing the Login Password of an IAM User.
        • Login Protection: You can change the login verification method of the IAM user. Three verification methods are available: virtual MFA device, SMS, and email.

          This option is disabled by default. If you enable this option, the user will need to enter a verification code in addition to the username and password when logging in to the console.

          +
        • Access Keys: You can manage access keys of the IAM user.
        diff --git a/docs/iam/umn/en-us_topic_0059870089.html b/docs/iam/umn/en-us_topic_0059870089.html index 038713f0..fa1ab5e1 100644 --- a/docs/iam/umn/en-us_topic_0059870089.html +++ b/docs/iam/umn/en-us_topic_0059870089.html @@ -1,14 +1,18 @@ -

        Federated Identity Authentication

        +

        Identity Providers

    --

    If you select this option, after the user is created, you can download the access key (AK/SK) generated for the user. The user can use the access key to access the cloud system through APIs. Each user can have a maximum of two access keys.

    +

    If you select this option, after the user is created, you can download the access key (AK/SK) generated for the user. The user can use the access key to access the cloud platform through APIs. Each user can have a maximum of two access keys.

    Management console access

    diff --git a/docs/iam/umn/iam_01_0032.html b/docs/iam/umn/iam_01_0032.html index 9b49e97e..8bd3531c 100644 --- a/docs/iam/umn/iam_01_0032.html +++ b/docs/iam/umn/iam_01_0032.html @@ -1,8 +1,8 @@ -

    Logging In as a User

    -

    You can log in to the cloud system as a user and access cloud services based on granted permissions.

    -

    Context

    Verify the information displayed on the Login Verification page during login if any of the following settings has been configured:
    • Recent Login Information: enabled on the Login Authentication Policy page
    • Custom Information: set on the Login Authentication Policy page
    • Login Authentication: enabled on the My Credentials page
    +

    Logging In as an IAM User

    +

    You can log in to the cloud platform as an IAM user and access cloud services based on granted permissions.

    +

    Background

    If either of the following has been configured on Security Settings > Login Authentication Policy, you will see the Login Verification page after login:
    • Recent Login Information has been enabled.
    • Custom Information has been configured.

    Procedure

    1. On the Multitenant Login page, enter Domain name, Username/Email address/Mobile number, and Password, and click Log In.

      • Domain Name is a username set in MyWorkplace. It is in the format "ICU + User ID + Contract instance number". ICU stands for identity for customer user.
      • If this is your first login, change your initial password on the First Login page. To ensure account security, change your password periodically.
      • Enter a verification code on the Login Verification page if login authentication has been enabled.
      diff --git a/docs/iam/umn/iam_01_0040.html b/docs/iam/umn/iam_01_0040.html index 983755b8..9c2e05e2 100644 --- a/docs/iam/umn/iam_01_0040.html +++ b/docs/iam/umn/iam_01_0040.html @@ -4,20 +4,24 @@
      diff --git a/docs/iam/umn/iam_01_0054.html b/docs/iam/umn/iam_01_0054.html index 860b2f20..02611a47 100644 --- a/docs/iam/umn/iam_01_0054.html +++ b/docs/iam/umn/iam_01_0054.html @@ -1,26 +1,24 @@ -

      Delegating Resource Access to Another Account

      -

      Agency is a trust relationship between a delegating account and a delegated account. By creating an agency, you can grant permissions to another account or cloud service for resource management.

      -

      This section uses account A and account B as an example to describe how to delegate an account to manage resources under another account.

      -
      1. Account A creates an agency to delegate resource access to account B.

        Figure 1 Creating an agency
        -

        -

      2. Account B grants user Randolph permissions for managing account A's resources.

        1. Create a user group (for example, Agency), and grant resource management permissions to the user group.
        2. Add user Randolph to user group Agency.
        -
        Figure 2 Delegating resource access
        -

      3. User Randolph of account B manages the resources in account A.

        1. Randolph logs in to the cloud system and switches the role to account A.
        2. Job switches to project A.
        3. Job manages the resources in account A based on assigned permissions.
        -
        Figure 3 Managing resources based on agency permissions
        -

      -
      + + + +

      Account Delegation

      +
      - - \ No newline at end of file diff --git a/docs/iam/umn/iam_01_0063.html b/docs/iam/umn/iam_01_0063.html index 2699c982..1aa88480 100644 --- a/docs/iam/umn/iam_01_0063.html +++ b/docs/iam/umn/iam_01_0063.html @@ -1,12 +1,13 @@ -

      Assigning Permissions to a User (by a Delegated Party)

      -

      When a trust relationship is established between another account and your account, you become a delegated party and you can authorize a user to manage resources for the delegating party. If another account has created multiple agencies for you, you can authorize one or more users through custom policies to manage resources specified in all or specific agencies. Each user can only switch to the agency for which the user has been granted permissions.

      -

      Prerequisites

      • A trust relationship has been established between another account and your account.
      • You have obtained the name of the delegating account and the name and ID of the created agency.
      +

      (Optional) Assigning Permissions to an IAM User (by a Delegated Party)

      +

      When a trust relationship is established between your account and another account, you become a delegated party. By default, only your account and the members of the admin group can manage resources for the delegating party. To authorize IAM users to manage these resources, assign permissions to the users.

      +

      You can authorize an IAM user to manage resources for all delegating parties, or authorize the user to manage resources for a specific delegating party.

      +

      Prerequisites

      • A trust relationship has been established between your account and another account.
      • You have obtained the name of the delegating account and the name and ID of the created agency.
      -

      Procedure

      1. Create a custom policy.

        This step is used to create a policy containing permissions required to manage resources for a specific agency. If you want to authorize a user to manage resources for all agencies, go to 2.

        +

        Procedure

        1. Create a user group and grant permissions to it.

          1. On the User Groups page, click Create User Group.
          2. Enter a user group name.
          3. Click OK.
          4. In the row containing the user group, click Authorize.
          5. Create a custom policy.

            This step is used to create a policy containing permissions required to manage resources for a specific agency. If you want to authorize an IAM user to manage resources for all agencies, go to 1.f.

            -
            1. In the navigation pane, choose Policies.
            2. On the Policies page, click Create Custom Policy.
            3. Enter a policy name.
            4. Select Global services for Scope.
            5. Select JSON.
            6. In the Policy Content area, enter the following content:
              {
              +
              1. On the Select Policy/Role page, click Create Policy in the upper right corner of the permission list.
              2. Enter a policy name.
              3. Select JSON for Policy View.
              4. In the Policy Content area, enter the following content:
                {
                         "Version": "1.1",
                         "Statement": [
                                 {
                @@ -22,21 +23,22 @@
                                 }
                         ]
                 }
                -
                • Replace b36b1258b5dc41a4aa8255508xxx... with the agency ID obtained from a delegating party. Do not make any other changes.
                • For more information about fine-grained policies, see Fine-Grained Policy Management.
                +
                • Replace b36b1258b5dc41a4aa8255508xxx... with the agency ID obtained from a delegating party. Do not make any other changes.
                • For more information about permissions, see Permissions.
                -
              5. Click OK.
              -

            7. Create a user group and grant permissions to it.

              1. In the navigation pane, choose User Groups.
              2. On the User Groups page, click Create User Group.
              3. Enter a user group name.
              4. Click OK.

                The user group is displayed in the user group list.

                -
              5. Click Manage Permissions in the Operation column of the row that contains the created user group.
              6. On the Permissions tab page, click Assign Permissions above the permission list.
              7. Specify the authorization scope. If you select Region-specific projects, select one or more projects in the drop-down list.
                • Global service project: Services deployed without specifying physical regions are called global services, such as OBS, CDN, and TMS. Permissions for these services must be assigned in the global service project.
                • Region-specific projects: Services deployed in specific regions are called project-level services. Permissions for these services need to be assigned in region-specific projects and take effect only for the corresponding regions. If you want the permissions to take effect for all regions, grant them in all these regions.
                -
              8. Select the policy created in 1 or the Agent Operator role, and click OK. The authorization is completed.
              -

            8. Create a user and add the user to the user group.

              1. In the navigation pane, choose Users.
              2. On the Users page, click Create User.
              3. Specify the user information, select an access type, and click Next.
              4. In the Available User Groups area, select the user group created in 2.
              5. Click Create.
              +
            9. Click Next.
            +
          6. Select the policy created in the previous step or the Agent Operator role and click Next.
            • Custom policy: Allows a user to manage resources only for a specific agency.
            • Agent Operator role: Allows a user to manage resources for all agencies.
            +
          7. Specify the authorization scope.
          8. Click OK.
          +

        2. Create an IAM user and add the user to the user group.

          1. On the Users page, click Create User.
          2. On the Create User page, enter a username.
          3. For the access type, select Management console access and Set by user.
          4. Enable login protection and click Next.
          5. Select the user group created in 1 and click Create.

            After the authorization is complete, the IAM user can switch to the account of the delegating party and manage specific resources under the account.

            +
            +

        -

        Follow-up Operation

        Point to the delegating account in the upper right corner of the page and choose Switch Role to switch back to your account.

        +

        Related Operations

        The delegated account or the authorized IAM users can switch their roles to the delegating account to view and use its resources.

        diff --git a/docs/iam/umn/iam_01_019.html b/docs/iam/umn/iam_01_019.html index 0b6eeca2..47daa5ba 100644 --- a/docs/iam/umn/iam_01_019.html +++ b/docs/iam/umn/iam_01_019.html @@ -1,13 +1,21 @@ -

        Fine-Grained Policies

        -

        A fine-grained policy is a set of permissions that define operations allowed to be performed on specific cloud services. A policy can contain multiple permission sets. After a policy is attached to a user group, users in the user group inherit the permissions of the policy. IAM implements fine-grained access control based on the permissions defined by policies.

        -

        IAM supports two types of policies:

        -
        • System-defined policies: define the common permissions preset in the cloud system, which are typically read-only or administrator permission for different cloud services such as ECS. System-defined policies can only be used for authorization and cannot be modified.
        • Custom policies: created and managed by users to supplement system-defined policies.
        +

        Basic Concepts

        +

        Permissions

        By default, new IAM users do not have permissions assigned. You need to add a user to one or more groups, and attach permissions policies or roles to these groups. Users inherit permissions from the groups to which they are added and can perform specified operations on cloud services based on the permissions.

        +
        +

        Permission Type

        You can grant permissions by using roles and policies.
        • Roles: A type of coarse-grained authorization mechanism that defines permissions related to user responsibilities. There are only a limited number of roles for granting permissions to users. When using roles to grant permissions, you also need to assign dependency roles. Roles are not ideal for fine-grained authorization and least privilege access.
        • Policies: A type of fine-grained authorization mechanism that defines permissions required to perform operations on specific cloud resources under certain conditions. This mechanism allows for more flexible policy-based authorization and secure access control. For example, you can grant ECS users only the permissions required for managing a certain type of ECS resources.

          IAM supports both system-defined policies and custom policies.

          +
        +
        +
        +

        System-Defined Policy

        A system-defined policy defines the common actions of a cloud service. System-defined policies can be used to assign permissions to user groups, and they cannot be modified. For details about the system-defined policies of all cloud services, see "Permissions".

        +

        If there are no system-defined policies for a specific service, it indicates that IAM does not support this service.

        +
        +

        Custom Policy

        You can create custom policies using the actions supported by cloud services to supplement system-defined policies for more refined access control. You can create custom policies in the visual editor or in JSON view.

        +
        diff --git a/docs/iam/umn/iam_01_0430.html b/docs/iam/umn/iam_01_0430.html new file mode 100644 index 00000000..e0e21a4d --- /dev/null +++ b/docs/iam/umn/iam_01_0430.html @@ -0,0 +1,19 @@ + + + + + +

        Deleting a User Group

        +

        Procedure

        To delete a user group, do the following:

        +
        +
        1. Log in to the . In the navigation pane, choose User Groups.
        2. In the user group list, click Delete in the row that contains the user group to be deleted.
        3. In the displayed dialog box, click Yes.
        +

        Batch Deleting User Groups

        To delete multiple user groups at a time, do the following:

        +
        1. Log in to the . In the navigation pane, choose User Groups.
        2. In the user group list, select the user groups to be deleted and click Delete above the list.
        3. In the displayed dialog box, click Yes.
        +
        +
        +
        + +
        + diff --git a/docs/iam/umn/iam_01_0552.html b/docs/iam/umn/iam_01_0552.html new file mode 100644 index 00000000..0b87079f --- /dev/null +++ b/docs/iam/umn/iam_01_0552.html @@ -0,0 +1,27 @@ + + +

        Logging In as an IAM User

        +

        You can log in to the console as an IAM user or obtain the IAM user login link from the administrator and then use the link to log in.

        +

        Method 1: Logging In by Clicking IAM User Login

        1. On the login page, enter the domain name, username/email address/mobile number, and password.

          • Domain name: The name of the account that was used to create the IAM user. You can obtain the domain name from the administrator.
          • Username/Email address/Mobile number: The username, email address, or mobile number of the IAM user. You can obtain the username and password from the administrator.
          • Password: The password of the IAM user.
          +

        2. Click Log In.

          +
          +

        +
        +

        Method 2: Logging In Using the IAM User Login Link

        You can obtain the IAM user login link from the administrator and then log in using this link. When you visit the link, the system displays the login page and automatically populates the domain name. You only need to enter your username/email address/mobile number and password.

        +
        1. Obtain the IAM user login link from the administrator.

          Figure 1 IAM user login link
          +

        2. Paste the link into the address bar of a browser, press Enter, and enter the IAM username/email address/mobile number and password, and click Log In.
        +
        +
        +
        + +
        + + + \ No newline at end of file diff --git a/docs/iam/umn/iam_01_06.html b/docs/iam/umn/iam_01_06.html index ecc55ceb..b5835706 100644 --- a/docs/iam/umn/iam_01_06.html +++ b/docs/iam/umn/iam_01_06.html @@ -1,25 +1,25 @@ -

        User and User Group Management

        +

        IAM Users

        Currently, only certain cloud services (such as OBS) support resource-based authorization. For services that do not support this function, you cannot create custom policies containing resource types.

        -

        Using Only a Custom Policy

        To grant a user permissions for accessing specific services, you can create a custom policy and attach only the custom policy to the group to which the user belongs.

        +

        Using Only a Custom Policy

        To grant permissions for accessing specific services, you can create a custom policy and attach only the custom policy to the group to which the user belongs.

        • The following is an example policy that allows access only to ECS, EVS, VPC, Application Operations Management (AOM), and ELB.
          {
                   "Version": "1.1",
                   "Statement": [
          @@ -122,7 +122,7 @@
           
        diff --git a/docs/iam/umn/iam_01_0601.html b/docs/iam/umn/iam_01_0601.html new file mode 100644 index 00000000..b424be33 --- /dev/null +++ b/docs/iam/umn/iam_01_0601.html @@ -0,0 +1,98 @@ + + + + + +

        Roles

        +

        Roles are a type of coarse-grained authorization mechanism that defines service-level permissions based on user responsibilities. IAM provides a limited number of roles for permissions management.

        +

        Services on the cloud platform interwork with each other. Roles of some services take effect only if they are assigned along with roles of other services. For more information, see Assigning Dependency Roles.

        +

        Role Content

        When using roles to assign permissions, you can select a role and click to view the details of the role. This section uses the DNS Administrator role as an example to describe the role content.

        +
        {
        +    "Version": "1.0",
        +    "Statement": [
        +        {
        +            "Action": [
        +                "DNS:Zone:*",
        +                "DNS:RecordSet:*",
        +                "DNS:PTRRecord:*"
        +            ],
        +            "Effect": "Allow"
        +        }
        +    ],
        +    "Depends": [
        +        {
        +            "catalog": "BASE",
        +            "display_name": "Tenant Guest"
        +        },
        +        {
        +            "catalog": "VPC",
        +            "display_name": "VPC Administrator"
        +        }
        +    ]
        +}
        +
        +

        Parameter Description

        +
        + + + + + + + + + + + + + + + + + + + + + + + + + + + +
        Table 1 Parameter description

        Parameter

        +

        Description

        +

        Value

        +

        Version

        +

        Role version.

        +

        1.0: indicates role-based access control.

        +

        Statement

        +

        Action

        +

        Operations to be performed on the service.

        +

        Format: "Service name:Resource type:Operation".

        +

        DNS:Zone:*: Permissions for performing all operations on Domain Name Service (DNS) zones.

        +

        Effect

        +

        Determines whether to allow or deny the operations defined in the action.

        +
        • Allow
        • Deny
        +
        NOTE:

        If a role grants both Allow and Deny effects for the same action, the Deny takes precedence.

        +
        +

        Depends

        +

        catalog

        +

        Name of the service to which a dependency role belongs.

        +

        Service name. Example: BASE and VPC.

        +

        display_name

        +

        Name of the dependency role.

        +

        Role name.

        +
        NOTE:

        When you assign the DNS Administrator role to a user group, you also need to assign the Tenant Guest and VPC Administrator roles to the group for the same project.

        +

        For more information about dependencies, see "Permissions".

        +
        +
        +
        +
        +
        +
        + +
        + diff --git a/docs/iam/umn/iam_01_0607.html b/docs/iam/umn/iam_01_0607.html new file mode 100644 index 00000000..aac7208a --- /dev/null +++ b/docs/iam/umn/iam_01_0607.html @@ -0,0 +1,29 @@ + + + + + +

        Password Policy

        +

        The Password Policy tab of the Security Settings page provides the Password Composition & Reuse, Password Expiration, and Minimum Password Age settings.

        +

        Only the administrator can configure the password policy, and IAM users can only view the configurations. If an IAM user needs to modify the configurations, the user can request the administrator to perform the modification or grant the required permissions.

        +

        You can configure the password policy to ensure that IAM users create strong passwords and rotate them periodically. In the password policy, you can define password requirements, such as minimum password length, whether to allow consecutive identical characters in a password, and whether to allow previously used passwords.

        +

        Password Composition & Reuse

        • Ensure that the password contains 2 to 4 of the following character types: uppercase letters, lowercase letters, digits, and special characters. By default, the password must contain at least 2 of these character types.
        • Set the minimum number of characters that a password must contain. The default value is 6 and the value range is from 6 to 32.
        • (Optional) Enable the Restrict consecutive identical characters option and set the maximum number of times that a character is allowed to be consecutively present in a password. For example, value 1 indicates that consecutive identical characters are not allowed in a password.
        • (Optional) Enable the Disallow previously used passwords option and set the number of previously used passwords that are not allowed. For example, value 3 indicates that the user cannot set the last three passwords that the user has previously used when setting a new password.
        +

        Changes to the password policy take effect the next time you or your IAM users change passwords. IAM users created later will also adhere to the updated password policy.

        +
        +

        Password Expiration

        Set a validity period for passwords so that users need to change their passwords periodically. The users will be prompted to change their passwords 15 days before password expiration. Expired passwords cannot be used to log in to the cloud platform.

        +

        This option is disabled by default. The validity period ranges from 1 to 180 days.

        +

        The changes will take effect immediately for your account and all IAM users under your account.

        +
        +

        After the password expires, users need to set a new password through the URL sent by email. The new password must be different from the old password.

        +
        +

        Minimum Password Age

        To prevent password loss due to frequent password changes, you can set a minimum period after which users are allowed to make a password change.

        +

        This option is disabled by default. If you enable this option, you can set a period from 0 to 1440 minutes.

        +

        The changes will take effect immediately for your account and all IAM users under your account.

        +
        +
        +
        + +
        + diff --git a/docs/iam/umn/iam_01_0653.html b/docs/iam/umn/iam_01_0653.html new file mode 100644 index 00000000..ad55d311 --- /dev/null +++ b/docs/iam/umn/iam_01_0653.html @@ -0,0 +1,18 @@ + + + + + +

        Changing the Login Password of an IAM User

        +

        As an administrator, you can reset the password of an IAM user if the user has forgotten the password and no email address or mobile number has been bound to the user.

        +

        To reset the login password of an IAM user, click Security Settings in the row containing the user, click next to Login Password in the Login Credentials area, and select a password type.

        +
        • You can reset the password of an IAM user on the Security Settings page.
        • IAM users can change their passwords on the Basic Information tab.
        +
        +
        • Set by user: A one-time login URL will be emailed to the user. The user can then click on the link to set a password.
        • Automatically generated: A password will be automatically generated and then sent to the user by email.
        • Set now: You set a new password and send the new password to the user.
        +
        +
        + +
        + diff --git a/docs/iam/umn/iam_01_0655.html b/docs/iam/umn/iam_01_0655.html new file mode 100644 index 00000000..c416fa86 --- /dev/null +++ b/docs/iam/umn/iam_01_0655.html @@ -0,0 +1,29 @@ + + + +

        User Groups and Authorization

        + +

        +
        + + + diff --git a/docs/iam/umn/iam_01_0657.html b/docs/iam/umn/iam_01_0657.html new file mode 100644 index 00000000..75e4d3ef --- /dev/null +++ b/docs/iam/umn/iam_01_0657.html @@ -0,0 +1,17 @@ + + + + + +

        Assigning Dependency Roles

        +

        Cloud services interwork with each other. Roles of some services take effect only if they are assigned along with roles of other services.

        +

        Procedure

        1. Log in to the as the administrator.
        2. In the user group list, click Authorize in the row that contains the created user group.
        3. On the displayed page, search for a role in the search box in the upper right corner.
        4. Select the target role. The system automatically selects the dependency roles.
        5. Click next to the role to view the dependencies.

          For example, the DNS Administrator role contains the Depends parameter which specifies the dependency roles. When you assign the DNS Administrator role to a user group, you also need to assign the Tenant Guest and VPC Administrator roles to the group for the same project.

          +

        6. Click OK.
        +
        +
        +
        + +
        + diff --git a/docs/iam/umn/iam_01_0703.html b/docs/iam/umn/iam_01_0703.html new file mode 100644 index 00000000..aae4fa7b --- /dev/null +++ b/docs/iam/umn/iam_01_0703.html @@ -0,0 +1,23 @@ + + + + + +

        Basic Information

        +

        As an account administrator, both you and your IAM users can manage basic information on this page.

        +
        • A mobile number or an email address can be bound only to one account or IAM user.
        • Only one mobile number, email address, and virtual MFA can be bound to an account or IAM user.
        +
        +

        Changing the Login Password, Mobile Number, Virtual MFA Device, or Email Address

        The methods for changing the login password, mobile number, virtual MFA device, and email address are similar. To change the login password, do as follows:

        +
        1. Go to the Security Settings page.
        2. Click the Basic Information tab, and click Change in the Login Password row.
        3. (Optional) Select email address or mobile number verification, and enter the verification code.

          If neither email address nor mobile number is bound, no verification is required.

          +
          +

        4. Enter the old password and new password, and enter the new password again.

          • The password cannot be the username or the username spelled backwards. For example, if the username is A12345, the password cannot be A12345, a12345, 54321A, or 54321a.
          • To prevent password cracking, the administrator can configure the password policy to define password requirements, such as minimum password length. For details, see Password Policy.
          +
          +

        5. Click OK.
        +
        +
        +
        + +
        + diff --git a/docs/iam/umn/iam_01_0704.html b/docs/iam/umn/iam_01_0704.html new file mode 100644 index 00000000..f6239d56 --- /dev/null +++ b/docs/iam/umn/iam_01_0704.html @@ -0,0 +1,35 @@ + + + + + +

        Login Authentication Policy

        +

        The Login Authentication Policy tab of the Security Settings page provides the Session Timeout, Account Lockout, Recent Login Information, Recent Login Information, and Custom Information settings. These settings take effect for both your account and the IAM users created using the account.

        +

        Only the administrator can configure the login authentication policy, and IAM users can only view the configurations. If an IAM user needs to modify the configurations, the user can request the administrator to perform the modification or grant the required permissions.

        +

        Session Timeout

        Set the session timeout that will apply if you or users created using your account do not perform any operations within a specific period.

        +
        Figure 1 Session Timeout
        +

        The timeout ranges from 15 minutes to 24 hours, and the default timeout is 1 hour.

        +
        +

        Account Lockout

        Set a duration to lock users out if a specific number of unsuccessful login attempts has been reached within a certain period. You cannot unlock your own account or an IAM user's account. Wait until the lock time expires.

        +
        Figure 2 Account Lockout
        +

        The administrator can set the time for resetting the account lockout counter, maximum number of unsuccessful login attempts, and account lockout duration.

        +
        • Time for resetting the account lockout counter: The value ranges from 15 to 60 minutes, and the default value is 15 minutes.
        • Maximum number of unsuccessful login attempts: The value ranges from 3 to 10, and the default value is 5.
        • Lockout duration: The value ranges from 15 to 30 minutes, and the default value is 15 minutes.
        +
        +

        Account Disabling

        Set a validity period to disable IAM users if they have not accessed the cloud platform using the console or APIs within a certain period.

        +

        This option is disabled by default. The validity period ranges from 1 to 240 days.

        +

        If you enable this option, the setting will take effect only for IAM users created using your account. If an IAM user is disabled, the user can request the administrator to enable their account again.

        +
        +

        Recent Login Information

        Configure whether you want the system to display the previous login information after you log in. If incorrect login information is displayed on the Login Verification page, change your password immediately.

        +

        This option is disabled by default and can be enabled by the administrator.

        +
        +

        Custom Information

        Set custom information that will be displayed upon successful login. For example, enter the word Welcome.

        +

        No information is displayed by default, and the administrator can set custom information that will be displayed.

        +

        You and all the IAM users created using your account will see the same information upon successful login.

        +
        +
        +
        + +
        + diff --git a/docs/iam/umn/iam_01_0730.html b/docs/iam/umn/iam_01_0730.html new file mode 100644 index 00000000..6e4d3d19 --- /dev/null +++ b/docs/iam/umn/iam_01_0730.html @@ -0,0 +1,33 @@ + + + + + +

        Deleting or Modifying Agencies

        +

        Modifying an Agency

        To modify the permissions, validity period, and description of an agency, click Modify in the row containing the agency you want to modify.

        +
        Figure 1 Modifying an agency
        +
        +
        • You can change the cloud service, validity period, description, and permissions of cloud service agencies, but you cannot change the agency name and type.
        • Modifying the permissions of cloud service agencies may affect the usage of certain functions of cloud services. Exercise caution when performing this operation.
        +
        +

        Deleting an Agency

        To delete an agency, click Delete in the row containing the agency to be deleted and click Yes.

        +
        Figure 2 Deleting an agency
        +
        +

        Batch Deleting Agencies

        To delete multiple agencies, select the agencies to be deleted in the list and click Delete above the list.

        +
        Figure 3 Batch deleting agencies
        +

        After you delete an agency, all permissions granted to the delegated accounts will be revoked.

        +
        +
        +
        +
        + +
        + + + \ No newline at end of file diff --git a/docs/iam/umn/iam_02_0004.html b/docs/iam/umn/iam_02_0004.html new file mode 100644 index 00000000..f27868a2 --- /dev/null +++ b/docs/iam/umn/iam_02_0004.html @@ -0,0 +1,17 @@ + + +

        Deleting an IAM User

        +
        After an IAM user is deleted, they can no longer log in and their username, password, access keys, and authorizations will be cleared and cannot be recovered. +
        +
        +

        Deleting an IAM User

        1. Log in to the IAM console. In the navigation pane, choose Users.
        2. Click Delete in the row containing the IAM user you want to delete, and click Yes.
        +
        +

        Batch Deleting IAM Users

        1. Log in to the IAM console. In the navigation pane, choose Users.
        2. In the user list, select the users to be deleted and click Delete above the user list.
        3. In the displayed dialog box, click Yes.
        +
        +
        +
        + +
        + diff --git a/docs/iam/umn/iam_03_0002.html b/docs/iam/umn/iam_03_0002.html new file mode 100644 index 00000000..a2840b53 --- /dev/null +++ b/docs/iam/umn/iam_03_0002.html @@ -0,0 +1,18 @@ + + + + + +

        Adding Users to or Removing Users from a User Group

        +

        A user inherits permissions from the groups to which the user belongs. To change the permissions of a user, add the user to a new group or remove the user from an existing group.

        +

        Adding Users to a User Group

        1. In the user group list, click Manage User in the row containing the target user group.
        2. In the Manage User dialog box, select the usernames to be added.
        3. Click OK.
        +
        +

        Removing Users from a User Group

        1. In the user group list, click Manage User in the row containing the target user group.
        2. In the Selected Users area, click x in the row containing the usernames to be removed and click OK.
        +
        +
        +
        + +
        + diff --git a/docs/iam/umn/iam_03_0004.html b/docs/iam/umn/iam_03_0004.html new file mode 100644 index 00000000..de73cae5 --- /dev/null +++ b/docs/iam/umn/iam_03_0004.html @@ -0,0 +1,19 @@ + + + + + +

        Revoking Permissions of a User Group

        +

        Procedure

        To revoke a policy or role attached to a user group, do the following:

        +
        +
        1. Log in to the . In the navigation pane, choose User Groups.
        2. Click the name of the user group to go to the group details page.
        3. On the Permissions tab, click Delete in the row that contains the role or policy you want to delete.
        4. In the displayed dialog box, click Yes.
        +

        Batch Revoking Permissions of a User Group

        To revoke multiple policies or roles attached to a user group, do as follows:

        +
        1. Log in to the . In the navigation pane, choose User Groups.
        2. Click the name of the user group to go to the group details page.
        3. On the Permissions page, select the roles or policies you want to delete and click Delete above the list.
        4. In the displayed dialog box, click Yes.
        +
        +
        +
        + +
        + diff --git a/docs/iam/umn/iam_06_0001.html b/docs/iam/umn/iam_06_0001.html new file mode 100644 index 00000000..775f1e9e --- /dev/null +++ b/docs/iam/umn/iam_06_0001.html @@ -0,0 +1,28 @@ + + +

        Delegating Resource Access to Another Account

        +

        The agency function enables you to delegate another account to implement O&M on your resources based on assigned permissions.

        +

        You can delegate resource access only to accounts. The accounts can then delegate access to IAM users under them.

        +
        +

        The following is the procedure for delegating access to resources in one account to another account. Account A is the delegating party and account B is the delegated party.

        +
        1. Account A creates an agency in IAM to delegate resource access to account B.

          Figure 1 (Account A) Creating an agency
          +

          +

        2. (Optional) Account B assigns permissions to an IAM user to manage specific resources for account A.

          1. Create a user group, and grant it permissions required to manage account A's resources.
          2. Create a user and add the user to the user group.
          +
          Figure 2 (Account B) Authorizing an IAM user to manage delegated resources
          +

        3. Account B or the authorized user manages account A's resources.

          1. Log in to account B's account and switch the role to account A.
          2. Switch to region A and manage account A's resources in this region.
          +
          Figure 3 (Account B) Switching the role
          +

        +
        +
        + +
        + + + \ No newline at end of file diff --git a/docs/iam/umn/iam_06_0004.html b/docs/iam/umn/iam_06_0004.html new file mode 100644 index 00000000..4847288e --- /dev/null +++ b/docs/iam/umn/iam_06_0004.html @@ -0,0 +1,29 @@ + + + + + +

        Cloud Service Delegation

        +

        Services on the cloud platform interwork with each other, and some cloud services are dependent on other services. To delegate a cloud service to access other services and perform resource O&M, create an agency for the service.

        +

        IAM provides two methods to create a cloud service agency:

        +
        1. Creating a cloud service agency on the IAM console

          Take an OBS agency as an example. The agency allows OBS to call cloud services, for example, to read monitoring data from AOM.

          +
        2. Automatically creating a cloud service agency to use certain resources

          The following takes Scalable File Service (SFS) as an example to describe the procedure for automatically creating a cloud service agency:

          +
          1. Go to the SFS console.
          2. On the Create File System page, enable static data encryption.
          3. A dialog box is displayed requesting you to confirm the creation of an SFS agency. After you click OK, the system automatically creates an SFS agency with KMS CMKFullAccess permissions for the current project. With the agency, SFS can obtain KMS keys for encrypting or decrypting file systems.
          4. You can view the agency in the agency list on the IAM console.
          +
        +

        Creating a Cloud Service Agency on the IAM Console

        1. Log in to the .
        2. On the IAM console, choose Agencies from the navigation pane, and click Create Agency.
        3. Enter an agency name.

          Figure 1 Cloud service agency name
          +

        4. Select the Cloud service agency type, and then select a service.
        5. Select a validity period.
        6. (Optional) Enter a description for the agency to facilitate identification.
        7. Click Next.
        8. Select the permissions to be assigned to the agency, click Next, and specify the authorization scope.
        9. Click OK.
        +
        +
        +
        + +
        + + + \ No newline at end of file diff --git a/docs/iam/umn/iam_07_0001.html b/docs/iam/umn/iam_07_0001.html new file mode 100644 index 00000000..cf3fea60 --- /dev/null +++ b/docs/iam/umn/iam_07_0001.html @@ -0,0 +1,55 @@ + + + + + +

        Security Settings Overview

        +

        You can configure the account settings, critical operation protection, login authentication policy, password policy, and access control list (ACL) on the Security Settings page. For details, see Basic Information, Critical Operation Protection, Login Authentication Policy, Password Policy, and ACL. This chapter describes how to access the Security Settings page and who is the intended audience.

        +

        Intended Audience

        Table 1 lists the intended audience of different functions provided on the Security Settings page and their access permissions for the functions.

        + +
        + + + + + + + + + + + + + + + + + + + +
        Table 1 Intended audience

        Function

        +

        Intended Audience

        +

        Basic Information

        +

        IAM users: Full access

        +

        Critical Operations

        +
        +

        Login Authentication Policy

        +
        +

        Password Policy

        +
        +

        ACL

        +
        +
        +
        +
        +

        Accessing the Security Settings Page

        1. Log in to the IAM console as an administrator.
        2. In the left navigation pane, choose Security Settings.
        +
        • You and all IAM users created using your account can access the Security Settings page from the management console.
          1. Log in to the IAM console.
          2. In the left navigation pane, choose Security Settings.
          +
        +
        +
        +
        + +
        + diff --git a/docs/iam/umn/iam_07_0002.html b/docs/iam/umn/iam_07_0002.html new file mode 100644 index 00000000..e811d55b --- /dev/null +++ b/docs/iam/umn/iam_07_0002.html @@ -0,0 +1,171 @@ + + + + + +

        Critical Operation Protection

        +

        Only an administrator can configure critical operation protection, and IAM users can only view the configurations. If an IAM user needs to modify the configurations, the user can request the administrator to perform the modification or grant the required permissions.

        +

        Federated users do not need to verify their identity when performing critical operations.

        +
        +

        Virtual MFA Device

        An MFA device generates 6-digit verification codes in compliance with the Time-based One-time Password Algorithm (TOTP). MFA devices can be hardware- or software-based. Currently, only software-based virtual MFA devices are supported, and they are application programs running on smart devices such as mobile phones.

        +

        This section describes how to bind a virtual MFA device. If you have installed another MFA application, add a user by following the on-screen prompts. For details about how to bind or remove a virtual MFA device, see MFA Authentication and Virtual MFA Device.

        +

        Before binding a virtual MFA device, ensure that you have installed an MFA application on your mobile device.

        +
        +
        1. Go to the Security Settings page.
        2. Click the Critical Operations tab, and click Bind in the Virtual MFA Device row.
        3. Set up the MFA application by scanning the QR code or manually entering the secret key.

          You can bind a virtual MFA device to your account by scanning the QR code or entering the secret key.

          +
          • Scanning the QR code

            Open the MFA application on your mobile phone, and use the application to scan the QR code displayed on the Bind Virtual MFA Device page. Your account or IAM user is then added to the application.

            +
          • Manually entering the secret key

            Open the MFA application on your mobile phone, and enter the secret key.

            +

            Your account is manually added using the time-based algorithm. Ensure that automatic time setting has been enabled on your mobile phone.

            +
            +
          +

        4. View the verification codes on the MFA application. The code is automatically updated every 30 seconds.
        5. On the Bind Virtual MFA Device page, enter two consecutive verification codes and click OK.
        +
        +

        Login Protection

        After login protection is enabled, you and IAM users created using your account will need to enter a verification code in addition to the username and password during login. Enable this function for account security.

        +

        For the account, only the account administrator can enable login protection for it. For IAM users, both the account administrator and other administrators can enable this feature for the users.

        +
        • (Administrator) Enabling login protection for an IAM user

          To enable login protection for an IAM user, go to the Users page and choose More > Security Settings in the row that contains the IAM user. In the Login Protection area on the displayed Security Settings tab, click next to Verification Method, and select a verification method from SMS, email, or virtual MFA device.

          +
        • Enabling login protection for your account

          To enable login protection, click the Critical Operations tab on the Security Settings page, click Enable next to Login Protection, select a verification method, enter the verification codes, and click OK.

          +
        +
        +

        Operation Protection

        • Enabling operation protection

          After operation protection is enabled, you and IAM users created using your account need to enter a verification code when performing a critical operation, such as deleting an ECS. This function is enabled by default. To ensure resource security, keep it enabled.

          +

          The verification is valid for 15 minutes and you do not need to be verified again when performing critical operations within the validity period.

          +
        +
        1. Go to the Security Settings page.
        2. On the Critical Operations tab, locate the Operation Protection row and click Enable.
        3. Select Enable and then select Self-verification or Verification by another person.

          If you select Verification by another person, an identity verification is required to ensure that this verification method is available.

          +
          • Self-verification: You or IAM users themselves perform verification when performing a critical operation.
          • Verification by another person: The specified person completes verification when you or IAM users perform a critical operation. Only SMS and email verification are supported.
          +
          +

        4. Click OK.
        +
        • Disabling operation protection
        +

        If operation protection is disabled, you and IAM users created using your account do not need to enter a verification code when performing a critical operation.

        +
        1. Go to the Security Settings page.
        2. On the Critical Operations tab, locate the Operation Protection row and click Change.
        3. Select Disable and click OK.
        4. Enter a verification code.

          • Self-verification: The administrator who wants to disable operation protection completes the verification. SMS, email, and virtual MFA verification are supported.
          • Verification by another person: The specified person completes the verification. Only SMS and email verification are supported.
          +

        5. Click OK.
        +
        • Each cloud service defines its own critical operations.
        • When IAM users created using your account perform a critical operation, they will be prompted to choose a verification method from email, SMS, and virtual MFA device.
          • If a user is only associated with a mobile number, only SMS verification is available.
          • If a user is only associated with an email address, only email verification is available.
          • If a user is not associated with an email address, mobile number, or virtual MFA device, the user will need to associate at least one of them before the user can perform any critical operations.
          +
        • You may not be able to receive email or SMS verification codes due to communication errors. In this case, you are advised to use a virtual MFA device for verification.
        • If operation protection is enabled, IAM users need to enter verification codes when performing a critical operation. The verification codes are sent to the mobile number or email address bound to the IAM users.
        +
        +
        +

        Access Key Management

        • Enabling access key management

          After access key management is enabled, only the administrator can create, enable, disable, or delete access keys of IAM users. This function is disabled by default. To ensure resource security, enable this function.

          +

          To enable access key management, click the Critical Operations tab on the Security Settings page, and click in the Access Key Management row.

          +
        • Disabling access key management

          After access key management is disabled, all IAM users can create, enable, disable, or delete their own access keys.

          +

          To enable access key management, click the Critical Operations tab on the Security Settings page, and click in the Access Key Management row.

          +
        +
        +

        Information Self-Management

        • Enabling information self-management

          By default, information self-management is enabled, indicating that all IAM users can manage their own basic information (login password, mobile number, and email address). Determine whether to allow IAM users to manage their own information and what information they can modify.

          +

          To enable information self-management, click the Critical Operations tab on the Security Settings page, and click Enable next to Information Self-Management. Select Enable, select the information types that IAM users can modify, and click OK.

          +
        • Disabling information self-management

          After you disable information self-management, only administrators can manage their own basic information. If IAM users need to modify their login password, mobile number, or email address, they can contact the administrator. For details, see Viewing and Modifying User Group Information.

          +

          To disable information self-management, click the Critical Operations tab on the Security Settings page, and click Change in the Information Self-Management row. In the displayed pane, select Disable and click OK.

          +
        +
        +

        Critical Operations

        The following tables list the critical operations defined by each cloud service.

        + +
        + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
        Table 1 Critical operations defined by cloud services

        Service Type

        +

        Service

        +

        Critical Operation

        +

        Compute

        +

        +

        Elastic Cloud Server (ECS)

        +
        • Stopping, restarting, or deleting an ECS
        • Resetting the password for logging in to an ECS
        • Detaching a disk
        • Unbinding an EIP
        +

        Bare Metal Server (BMS)

        +
        • Stopping or restarting a BMS
        • Resetting the BMS password
        • Detaching a disk
        • Unbinding an EIP
        +

        Auto Scaling (AS)

        +

        Deleting an AS group

        +

        Storage

        +

        Object Storage Service (OBS)

        +
        • Deleting a bucket
        • Creating, editing, or deleting a bucket policy
        • Configuring an object policy
        • Creating, editing, or deleting a bucket ACL
        • Configuring access logging
        • Configuring URL validation
        • Creating or editing a bucket inventory
        +

        Elastic Volume Service (EVS)

        +

        Deleting an EVS disk

        +

        Cloud Backup and Recovery (CBR)

        +
        • Deleting a vault
        • Deleting a backup
        • Restoring a backup
        • Deleting a policy
        • Dissociating a resource
        • Accepting a backup
        +

        Network

        +

        Domain Name Service (DNS)

        +
        • Modifying, disabling, or deleting a record set
        +

        Virtual Private Cloud (VPC)

        +
        • Releasing or unbinding an EIP
        • Deleting a VPC peering connection
        • Security group operations
          • Deleting an inbound or outbound rule
          • Modifying an inbound or outbound rule
          • Deleting inbound or outbound rules
          +
        +

        Elastic Load Balance (ELB)

        +
        • Classic load balancers
          • Deleting a load balancer
          • Deleting a listener
          • Deleting a certificate
          • Disabling a load balancer
          +
        +
        • Shared load balancers
          • Deleting a load balancer
          • Deleting a listener
          • Deleting a certificate
          • Removing a backend server
          • Unbinding an EIP
          • Unbind a public or private IPv4 address
          • Unbinding an IPv6 address
          • Removing from IPv6 shared bandwidth
          +
        +

        Elastic IP (EIP)

        +
        • Deleting a shared bandwidth
        • Releasing or unbinding an EIP
        • Releasing or unbinding EIPs
        +

        Management & Deployment

        +

        Identity and Access Management (IAM)

        +
        • Disabling operation protection
        • Disabling login protection
        • Changing the mobile number
        • Changing the email address
        • Changing the login password
        • Changing the login authentication method
        • Deleting an IAM user
        • Disabling an IAM user
        • Deleting an agency
        • Deleting a user group
        • Deleting a policy
        • Deleting permissions
        • Creating an access key
        • Deleting an access key
        • Disabling an access key
        • Deleting the project
        • Modifying the status of access key management
        +

        Application

        +

        Distributed Cache Service (DCS)

        +
        • Resetting the password of a DCS instance
        • Deleting a DCS instance
        • Clearing DCS instance data
        +

        Database

        +

        RDS for MySQL

        +
        • Resetting the administrator password
        • Deleting a DB instance
        • Deleting a database backup
        • Switching between primary and standby DB instances
        • Changing the database port
        • Deleting a database account
        • Deleting a database
        • Unbinding an EIP
        • Downloading a full backup
        +

        Databases

        +

        Document Database Service (DDS)

        +
        • Resetting the password
        • Restarting or deleting a DB instance
        • Restarting a node
        • Switching the primary and secondary nodes of a replica set
        • Deleting a security group rule
        • Enabling IP addresses of shard and config nodes
        • Restoring the current DB instance from a backup
        • Restoring an existing DB instance from a backup
        +
        +
        +
        +
        +
        + +
        + + + \ No newline at end of file diff --git a/docs/iam/umn/iam_07_0003.html b/docs/iam/umn/iam_07_0003.html new file mode 100644 index 00000000..69c09c21 --- /dev/null +++ b/docs/iam/umn/iam_07_0003.html @@ -0,0 +1,35 @@ + + + + + +

        ACL

        +

        The ACL tab of the Security Settings page provides the IP Address Ranges, IPv4 CIDR Blocks, and VPC Endpoints settings for allowing user access only from specified IP address ranges, IPv4 CIDR blocks, or VPC endpoints.

        +

        Only the administrator can configure the ACL. If an IAM user needs to configure the ACL, the user can request the administrator to perform the configuration or grant the required permissions.

        +
        Access type:
        • Console Access (recommended): The ACL takes effect only for IAM users who are created using your account and have access to the console.
        • API Access: The ACL controls users' API access through API Gateway and takes effect only for IAM users two hours after you complete the configuration.
        +
        +
        • You can configure a maximum of 200 access control items.
        +
        +

        IP Address Ranges

        Figure 1 IP Address Ranges
        +

        Specify IP address ranges from 0.0.0.0 to 255.255.255.255 to allow access to the cloud platform. The default value is 0.0.0.0–255.255.255.255. If this parameter is left blank or the default value is used, your IAM users can access the management console from anywhere.

        +
        +

        IPv4 CIDR Blocks

        Specify IPv4 CIDR blocks to allow access to the cloud platform. For example, set IPv4 CIDR block to 10.10.10.10/32.

        +
        +

        VPC Endpoints

        Specify VPC endpoints, such as 0ccad098-b8f4-495a-9b10-613e2a5exxxx, to allow API-based access to the cloud platform. If access control is not configured, you can access APIs from all VPC endpoints by default.

        +
        • User access is allowed if any of IP Address Ranges, IPv4 CIDR Blocks, and VPC Endpoints is met.
        • To restore IP Address Ranges to the default settings (0.0.0.0–255.255.255.255) and clear the settings in IPv4 CIDR Blocks and VPC Endpoints, click Restore Defaults.
        +
        +
        +
        +
        + +
        + + + \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0002.html b/docs/iam/umn/iam_08_0002.html index bff6ef61..51ed0a10 100644 --- a/docs/iam/umn/iam_08_0002.html +++ b/docs/iam/umn/iam_08_0002.html @@ -1,44 +1,25 @@ -

        SAML-based Federated Identity Authentication

        -

        This section describes the process and configuration of SAML-based federated identity authentication between an enterprise identity provider and the cloud system.

        -
        • To implement federated identity authentication, ensure that your identity provider server and the cloud system use the same Universal Time Coordinated (UTC) time.
        • Ensure that your identity provider system supports SAML 2.0.
        -
        -

        Configuring Federated Identity Authentication

        To implement federated identity authentication between an identity provider and the cloud system, complete the following configuration:

        -
        -
        1. Establish a trust relationship and create an identity provider: Exchange the metadata files of the identity provider and cloud system (see Figure 1).
          Figure 1 Metadata file exchange model
          -
        2. Configure identity conversion rules: Map the users, user groups, and permissions of the identity provider to the cloud system (see Figure 2).
          Figure 2 User identity conversion model
          -
        3. Configure a login link: Configure a login link (see Figure 3) in the enterprise management system to allow users to access the cloud system through SSO.
          Figure 3 SSO login model
          -
        -

        Process of Federated Identity Authentication

        Figure 4 shows the interaction between an identity provider and the cloud system after a user initiates an SSO request.

        -
        Figure 4 Process of federated identity authentication
        -

        To view interactive requests and assertions with a better experience, you are advised to use the Google Chrome browser and install the SAML Message Decoder plug-in.

        -
        -

        As shown in Figure 4, the process of federated identity authentication is as follows:

        -
        1. A user uses a browser to open the login link obtained from IAM, and then the browser sends an SSO request to the cloud system.
        2. The cloud system searches for a metadata file based on the login link, and sends a SAML request to the browser.
        3. The browser forwards the SAML request to the enterprise identity provider.
        4. The user enters their username and password displayed in the identity provider system. After the identity provider authenticates the user's identity, it constructs a SAML assertion containing the user information, and sends the assertion to the browser as a SAML response.
        5. The browser responds and forwards the SAML response to the cloud system.
        6. The cloud system parses the assertion in the SAML response, and issues a token to the user after identifying the group to which the user is mapped, according to the configured identity conversion rules.
        7. If the login is successful, the user accesses the cloud system successfully.

          The assertion must carry a signature; otherwise, the login will fail.

          -
          -
        -
        -
        +

        Virtual User SSO via SAML

        +
        - - \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0003.html b/docs/iam/umn/iam_08_0003.html index 66e5d27f..6b76b19c 100644 --- a/docs/iam/umn/iam_08_0003.html +++ b/docs/iam/umn/iam_08_0003.html @@ -1,108 +1,146 @@ -

        Step 1: Create an Identity Provider

        -

        To establish a trust relationship between an enterprise identity provider and the cloud system, upload the metadata file of the cloud system to the identity provider, and then create an identity provider and upload the metadata file of the identity provider on the IAM console.

        -

        Prerequisites

        As an enterprise administrator, you have registered an account in the cloud system and created user groups and granted them permissions in IAM.

        -

        The user groups created in IAM will be used to assign permissions to identity provider users mapped to the cloud system.

        -
        +

        Step 1: Create an IdP Entity

        +

        To establish a trust relationship between an enterprise IdP and the cloud platform, upload the metadata file of the cloud platform to the enterprise IdP, and then create an IdP entity and upload the metadata file of the enterprise IdP on the IAM console.

        +

        Prerequisites

        You have read the documentation of the enterprise IdP or have understood how to use the enterprise IdP. Configurations of different enterprise IdPs differ greatly, so they are not described in this document. For details about how to obtain the enterprise IdP's metadata file and how to upload the metadata file of the cloud platform to the enterprise IdP, see the IdP help documentation.

        -

        Establishing a Trust Relationship

        To establish a trust relationship between the enterprise identity provider and the cloud system, exchange their metadata files.

        -
        1. Download the metadata file of the cloud system. If both WebSSO and API calling need to be used, download the metadata files for the two functions.

          • WebSSO: Visit https://auth.otc.t-systems.com/authui/saml/metadata.xml. Right-click, choose Save As, and set a file name, for example, websso-metadata.xml.
          • API calling: Visit "https://Endpoint address of a region/v3-ext/auth/OS-FEDERATION/SSO/metadata", right-click on the page, choose Save As, and set a file name, for example, api-metadata-region.xml.

            The cloud system provides different API gateways for users in different regions to call APIs. To allow users to access resources in multiple regions, download metadata files of all these regions.

            +

            Establishing a Trust Relationship Between the Enterprise IdP and the Cloud Platform

            The metadata file of the cloud platform needs to be configured in the enterprise IdP to establish a trust relationship between the two systems.

            +
            1. Download the metadata file of the cloud platform.

              -

            2. Upload the metadata file to the identity provider server. For details about how to upload the metadata file, see the documentation of your identity provider.
            3. Obtain the metadata file of the enterprise identity provider. For details about how to obtain the metadata file, see the documentation of your identity provider.
            +

          • Upload the metadata file to the enterprise IdP server. For details, see the help documentation of the enterprise IdP.
          • Obtain the metadata file of the enterprise IdP. For details, see the help documentation of the enterprise IdP.
        -

        Creating an Identity Provider

        Create an identity provider and configure the metadata file in IAM.

        -
        1. Log in to the IAM console, and choose Identity Providers from the navigation pane. Then click Create Identity Provider.
        2. On the displayed page, enter an identity provider name, select SAML for Protocol and Enabled for Status. Then, click OK.

          The identity provider name must be unique under your account.

          -
          -

        3. Click OK.
        -
        -

        Configuring the Metadata File

        Configure the metadata file of the enterprise IdP in the cloud system.

        -

        IAM provides preconfigured metadata. You can directly use or modify the preconfigured metadata. If you have obtained the metadata file of your enterprise IdP, upload the file.

        -

        For a metadata file larger than 500 KB, manually configure the metadata. If the metadata has changed, upload the latest metadata file or edit the existing metadata to ensure that the federated users can log in to the cloud system.

        -

        For details about how to obtain the metadata file, see the documentation of the enterprise identity provider.

        -
        -
        • Using preconfigured metadata
          1. Click Modify in the row containing the identity provider.
          2. Click Select next to Use preconfigured metadata. The preconfigured enterprise IdPs and their metadata are displayed.
          3. Select an enterprise IdP, select the metadata, and click OK.
          4. Click Configured Metadata to view or modify the metadata.
          -
        • Uploading a metadata file
          1. click Modify in the row containing the identity provider.
          2. Click Select File and select the metadata file you have obtained.
          3. Click Upload. The metadata extracted from the uploaded file is displayed. Click OK.
            • If the uploaded metadata file contains multiple identity providers, select the identity provider you want to use from the Entity ID drop-down list.
            • If a message is displayed indicating that no entity ID is specified or the signing certificate has expired, check the metadata file and upload it again, or configure the metadata manually.
            -
          4. Click OK.
          -
        • Manually configuring metadata
          1. Click Manually configure.
          2. In the Configure Metadata dialog box, set the metadata parameters, such as the entity ID, signing certificate, and SingleSignOnService. -

            Parameter

            +

            Creating an IdP Entity on the Cloud Platform

            To create an IdP entity on the IAM console, do as follows:

            +
            1. Log in to the IAM console, choose Identity Providers from the navigation pane, and click Create Identity Provider in the upper right corner.

              Figure 1 Creating an IdP entity
              +

            2. Specify the name, protocol, SSO type, status, and description of the IdP entity.

              Figure 2 Setting IdP parameters
              + +
              - - - - - - - - - - - - - - - - - - - - - -
              Table 1 Basic parameters of an IdP

              Parameter

              Mandatory

              -

              Description

              +

              Description

              Entity ID

              +

              Name

              Yes

              -

              The unique identifier of an identity provider. Enter the value of entityID displayed in the identity provider metadata file.

              -

              If the metadata file contains multiple identity providers, choose the one you want to use.

              +

              IdP name, which must be unique globally. You are advised to use the domain name.

              Protocol

              +

              Protocol

              Yes

              -

              The SAML protocol is used for federated identity authentication between an enterprise identity provider and service provider.

              +

              IdP protocol. The cloud platform supports SAML and OpenID Connect protocols. For details about OpenID Connect-based identity federation, see Virtual User SSO via OpenID Connect.

              NameIdFormat

              +

              SSO Type

              No

              -

              Enter the value of NameIdFormat displayed in the metadata file.

              -

              This parameter indicates the username and ID format used for communication between the identity provider and federated users.

              +

              IdP type. An account can have only one type of IdP. The following describes the virtual user type.

              +

              Virtual user SSO: After a federated user logs in to the cloud platform, the system automatically creates a virtual user for the federated user. An account can have multiple IdPs of the virtual user type.

              Signing Certificate

              +

              Status

              Yes

              -

              Enter the value of <X509Certificate> displayed in the metadata file.

              -

              A signing certificate is a public key certificate used for signature verification. For security purposes, enter a public key containing no less than 2048 bits. The signing certificate is used during federated identity authentication to ensure that assertions are credible and complete.

              -

              SingleSignOnService

              -

              Yes

              -

              Enter the value of SingleSignOnService displayed in the metadata file.

              -

              This parameter defines how SAML requests are sent during the SSO process. SingleSignOnService must support HTTP Redirect or HTTP POST.

              -

              SingleLogoutService

              -

              No

              -

              Enter the value of SingleLogoutService displayed in the metadata file.

              -

              This parameter indicates the address to which federated users will be redirected after logging out their sessions. The SingleLogoutService parameter in the metadata file must support HTTP Redirect or HTTP POST.

              +

              IdP status. The default value is Enabled.

              -
            3. Click OK.
            +

          3. Click OK.
          4. +
            +

            Configuring the Metadata File of the Enterprise IdP on the Cloud Platform

            Configure the metadata file of the enterprise IdP in the cloud platform. You can upload or manually edit metadata configurations in IAM. For a metadata file larger than 500 KB, manually configure the metadata. If the metadata has been changed, upload the latest metadata file or edit the existing metadata to ensure that the federated users can log in to the cloud platform successfully.

            +

            For details about how to obtain the metadata file, see the help documentation of the enterprise IdP.

            +
            +
            • Upload a metadata file.
              1. Click Modify in the row containing the IdP.
                Figure 3 Modifying an IdP
                +
              2. Click Select File and select the metadata file of the enterprise IdP.
                Figure 4 Uploading a metadata file
                +
              3. Click Upload. The metadata extracted from the uploaded file is displayed. Click OK.
                • If the uploaded metadata file contains multiple IdPs, select the IdP you want to use from the Entity ID drop-down list.
                • If a message is displayed indicating that no entity ID is specified or the signing certificate has expired, check the metadata file and upload it again, or configure the metadata manually.
                +
              4. Click OK.
            -
            • Click OK to save the settings.
            +
            • Manually configure metadata.
              1. Click Manually configure.
                Figure 5 Manually configuring metadata
                +
              2. In the Configure Metadata dialog box, set the metadata parameters, such as Entity ID, Signing Certificate, and SingleSignOnService. +
                + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

                Parameter

                +

                Mandatory

                +

                Description

                +

                Entity ID

                +

                Yes

                +

                The unique identifier of an IdP. Enter the value of entityID displayed in the enterprise IdP's metadata file.

                +

                If the metadata file contains multiple IdPs, choose the one you want to use.

                +

                Protocol

                +

                Yes

                +

                Protocol used for identity federation between an enterprise IdP and SP.

                +

                The protocol is selected by default.

                +

                NameIdFormat

                +

                No

                +

                Enter the value of NameIdFormat displayed in the IdP metadata file.

                +

                It specifies the username identifier format supported by the IdP, which is used for communication between the IdP and federated user.

                +

                If you configure multiple values, the cloud platform uses the first value by default.

                +

                Signing Certificate

                +

                Yes

                +

                Enter the value of <X509Certificate> displayed in the IdP metadata file.

                +

                A signing certificate is a public key certificate used for signature verification. For security purposes, enter a public key containing at least 2,048 bits. The signing certificate is used during identity federation to ensure that assertions are credible and complete.

                +

                If you configure multiple values, the cloud platform uses the first value by default.

                +

                SingleSignOnService

                +

                Yes

                +

                Enter the value of SingleSignOnService displayed in the IdP metadata file.

                +

                This parameter defines how SAML requests are sent during SSO. It must support HTTP Redirect or HTTP POST.

                +

                If you configure multiple values, the cloud platform uses the first value by default.

                +

                SingleLogoutService

                +

                No

                +

                Enter the value of SingleLogoutService displayed in the IdP metadata file.

                +

                This parameter indicates the address to which federated users will be redirected after logging out their sessions. It must support HTTP Redirect or HTTP POST.

                +

                If you configure multiple values, the cloud platform uses the first value by default.

                +
                -

                Logging In as a Federated User

                1. Click the login link displayed on the identity provider details page to check if the login page of the identity provider server is displayed.

                  1. On the Identity Providers page, click View in the Operation column of the identity provider. Copy the login link displayed on the identity provider details page and visit the link using a browser.
                  2. If the login page is not displayed, check the metadata file and configurations of the identity provider server.
                  -

                2. Enter the username and password of a user that was created in the enterprise management system.

                  • If the login is successful, add the login link to the enterprise's official website.
                  • If the login fails, check the username and password.
                  -

                  Federated users only have read permissions for the cloud system by default. To assign permissions to federated users, configure identity conversion rules for the identity provider. For more information, see Step 2: Configure Identity Conversion Rules.

                  +

                  The following example shows the metadata file of an enterprise IdP and the manually configured metadata.

                  +
                  Figure 6 Metadata file of an enterprise IdP
                  +
                3. Click OK.
                +
            +
            +
            +

            Related Operations

            • Viewing IdP information: In the IdP list, click View in the row containing the IdP, and view its basic information, metadata, and identity conversion rules.

              To modify the configuration of an IdP, click Modify at the bottom of the details page.

              -

            • +
            • Modifying an IdP: In the IdP list, click Modify in the row containing the IdP, and then change its status or modify the description, metadata, or identity conversion rules.
            • Deleting an IdP: In the IdP list, click Delete in the row containing the IdP, and click Yes in the displayed dialog box.
            -

            Related Operations

            • Viewing identity provider information: In the identity provider list, click View in the row containing the identity provider, and view its basic information, metadata, and identity conversion rules.

              To modify the configurations of an identity provider, click Modify at the bottom of the details page.

              -
              -
            • Modifying an identity provider: In the identity provider list, click Modify in the row containing the identity provider, and then change its status and modify the description, metadata, and identity conversion rules.
            • Deleting an identity provider: In the identity provider list, click Delete in the row containing the identity provider, and click Yes.
            -
            -

            Follow-Up Procedure

            +

            Follow-Up Procedure

            • Configure the enterprise IdP: Configure enterprise IdP parameters to determine what information can be sent to the cloud platform
            • Configuring identity conversion rules: In the Identity Conversion Rules area, configure identity conversion rules to establish a mapping between enterprise users and IAM user groups. In this way, enterprise users can obtain the corresponding permissions in the cloud platform. For details, see Step 3: Configure Identity Conversion Rules.
            • Verify the federated login: Check whether the enterprise user can log in to the cloud platform through SSO. For details, see Step 4: Verify the Federated Login.
            + + \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0004.html b/docs/iam/umn/iam_08_0004.html index 9d9f299f..b36543c9 100644 --- a/docs/iam/umn/iam_08_0004.html +++ b/docs/iam/umn/iam_08_0004.html @@ -1,66 +1,67 @@ -

            Step 2: Configure Identity Conversion Rules

            -

            As the enterprise administrator, you can manage identities and permissions of federated users in the enterprise identity provider. By configuring identity conversion rules, you can map the identities and permissions of federated users to the cloud system and control their access to specific resources.

            -
            • Modifications to identity conversion rules will take effect only after the federated users log in again.
            • To modify the permissions of a federated user, modify the permissions of the user group to which the user belongs. Then restart the identity provider system for the modifications to take effect.
            +

            Step 3: Configure Identity Conversion Rules

            +

            After an enterprise IdP user logs in to the cloud platform, the cloud platform authenticates the identity and assigns permissions to the user based on the identity conversion rules. You can customize identity conversion rules based on your service requirements. If you do not configure identity conversion rules, the username of the federated user in the cloud platform is FederationUser by default, and the federated user can only access the cloud platform by default.

            +

            You can configure the following parameters for federated users:

            +
            • Username: Usernames of federated users in the cloud platform.
            • User permissions: Permissions assigned to federated users in the cloud platform. You need to map the federated users to IAM user groups. In this way, the federated users can obtain the permissions of the user groups to use cloud resources. Ensure that user groups have been created. For details about how to create a user group, see Creating a User Group and Assigning Permissions.
            +
            • Modifications to identity conversion rules will take effect the next time federated users log in.
            • To modify the permissions of a user, modify the permissions of the user group to which the user belongs. Then restart the enterprise IdP for the modifications to take effect.
            -

            Prerequisites

            An identity provider has been created in the cloud system, and the login link of the identity provider is accessible. (For details about how to create and verify an identity provider, see Step 1: Create an Identity Provider.)

            +

            Prerequisites

            -

            Procedure

            If you configure identity conversion rules by clicking Create Rule, IAM converts the rule parameters to the JSON format. Alternatively, you can click Edit Rule to configure rules in the JSON format.

            -
            • Creating a Rule
              1. Choose Identity Providers from the navigation pane.
              2. In the identity provider list, click Modify in the row containing the identity provider.
              3. In the Identity Conversion Rules area, click Create Rule. Then, configure the rule in the Create Rule dialog box. -
                Table 1 Parameter description

                Parameter

                +

                Procedure

                If you configure identity conversion rules by clicking Create Rule, IAM will convert your specified parameters to the JSON format. Alternatively, you can click Edit Rule to directly configure rules in the JSON format. For details, see Syntax of Identity Conversion Rules.

                +
                • Creating Rules
                  1. Log in to the IAM console as the administrator. In the navigation pane, choose Identity Providers.
                  2. In the IdP list, click Modify in the row containing the IdP.
                  3. In the Identity Conversion Rules area, click Create Rule. Then, configure the rules in the Create Rule dialog box.
                    +
                    - - - - - - - - - - -
                    Table 1 Parameter description

                    Parameter

                    Description

                    +

                    Description

                    Remarks

                    +

                    Remarks

                    Username

                    +

                    Username

                    Username of federated users to be displayed in the cloud system

                    +

                    Username of federated users in the cloud platform.

                    To distinguish federated users from users of the cloud system, it is recommended that you set the username to "FederationUser-IdP_XXX". IdP indicates an identity provider name, for example, AD FS and Shibboleth. XXX indicates a custom name.

                    -

                    You can also set the federated username to a simple expression, for example, FederationUser-IdP_{email}. After the rule is created successfully, {email} is automatically replaced with the email address of each federated user. The rule takes effect only if a returned assertion contains an email address.

                    -
                    NOTICE:

                    Each federated username must be unique under your account. Identical usernames under one or more identity providers of the same account will be identified as the same federated user in the cloud system.

                    +

                    To distinguish federated users from users in the cloud platform, it is recommended that you set the username to FederationUser-IdP_XXX. IdP indicates an IdP name, for example, AD FS and Shibboleth. XXX indicates a custom name.

                    +
                    NOTICE:
                    • The username of each federated user must be unique in the same IdP. Federated users with the same usernames in the same IdP will be mapped to the same IAM user in the cloud platform.
                    • The username can only contain letters, digits, spaces, hyphens (-), underscores (_), and periods (.). It cannot start with a digit and cannot contain the following special characters: ", \", \\, \n, \r

                    User Group

                    +

                    User Groups

                    User groups to which the federated users will belong in the cloud system

                    +

                    User groups which the federated users belong to in the cloud platform.

                    Federated users will inherit permissions from the groups to which they belong.

                    +

                    The federated users will inherit permissions from the groups to which they belong. You can select a user group that has already been created.

                    Rule Conditions

                    +

                    Rule Conditions

                    Conditions that a federated user must meet to obtain permissions from the selected user groups

                    +

                    Conditions that a federated user must meet to obtain permissions from the selected user groups.

                    Federated users who do not meet these conditions cannot access the cloud system. You can create a maximum of 10 conditions for an identity conversion rule.

                    -
                    NOTE:
                    • An identity conversion rule can have multiple conditions. It takes effect only if all of the conditions are met.
                    • An identity provider can have multiple identity conversion rules. If a federated user does not meet any of the rules, the user will not be allowed to access the cloud system.
                    +

                    Federated users who do not meet these conditions cannot access the cloud platform. You can create a maximum of 10 conditions for an identity conversion rule.

                    +

                    The Attribute and Value parameters are used for the enterprise IdP to transfer user information to the cloud platform through SAML assertions. The Condition parameter can be set to empty, any_one_of, or not_any_of. For details about these parameters, see Syntax of Identity Conversion Rules.

                    +
                    NOTE:
                    • An identity conversion rule can have multiple conditions. It takes effect only if all of the conditions are met.
                    • An IdP can have multiple identity conversion rules. If a federated user does not meet any of the conditions, the user will be denied to access the cloud platform.
                    -

                    For example, set an identity conversion rule for enterprise administrators.

                    -
                    • Username: FederationUser-IdP_admin_{email}
                    • User group: admin
                    • Rule condition: _NAMEID_ (attribute), any_one_of (condition), and ID1;ID2;ID3 (value). Only users with ID1, ID2, or ID3 inherit permissions from the admin user group.
                    -
                  4. In the Create Rule area, click OK.
                  5. On the Modify Identity Provider page, click OK.
                  -
                • Editing a Rule
                  1. Log in to the cloud system as an administrator, and go to the IAM console. Then, choose Identity Providers from the navigation pane.
                  2. In the identity provider list, click Modify in the row containing the identity provider.
                  3. In the Identity Conversion Rules area, click Edit Rule. Then configure the rule in the Edit Rule dialog box.
                  4. Edit the identity conversion rule in the JSON format. For details, see Syntax of Identity Conversion Rules.
                  5. Click Validate to verify the syntax of the rule.
                  6. If the rule is correct, click OK in the Edit Rule dialog box. Then click OK on the Modify Identity Provider page.

                    If a message indicating that the JSON file is incomplete is displayed, modify the statement or click Cancel to cancel the modifications.

                    +
                +

                For example, set an identity conversion rule for administrators in the enterprise management system.

                +
                • Username: FederationUser-IdP_admin
                • User group: admin
                • Rule condition: _NAMEID_ (attribute), any_one_of (condition), and 000000001 (value).

                  Only the user with ID 000000001 is mapped to IAM user FederationUser-IdP_admin and inherits permissions from the admin user group.

                  +
                +
              4. In the Create Rule dialog box, click OK.
              5. On the Modify Identity Provider page, click OK.
              6. +
              7. Editing Rules
                1. Log in to the IAM console as the administrator. In the navigation pane, choose Identity Providers.
                2. In the IdP list, click Modify in the row containing the IdP.
                3. In the Identity Conversion Rules area, click Edit Rule. Then configure the rules in the Edit Rule dialog box.
                4. Edit the identity conversion rules in JSON format. For details, see Syntax of Identity Conversion Rules.
                5. Click Validate to verify the syntax of the rules.
                6. If the rule is correct, click OK in the Edit Rule dialog box, and click OK on the Modify Identity Provider page.

                  If a message indicating that the JSON file is incomplete is displayed, modify the statements or click Cancel to cancel the modifications.

              8. -

                Verifying Federated User Permissions

                After configuring identity conversion rules, verify the permissions of federated users.

                -
                1. Log in to the cloud system as a federated user, such as user ID1.

                  On the Identity Providers page of the IAM console, click View in the row containing the identity provider. Copy the login link displayed on the identity provider details page, open the link using a browser, and then enter the username and password.

                  -

                2. Check that the federated user has the permissions assigned to the user group to which the user belongs.

                  For example, an identity conversion rule has defined full permissions for all cloud services for federated user ID1 in the admin user group. On the management console, select any cloud service, and check if you can access the service.

                  -

                +

                Related Operations

                Viewing identity conversion rules: Click View Rule on the Modify Identity Provider page. The identity conversion rules are displayed in the JSON format. For details about the JSON format, see Syntax of Identity Conversion Rules.

                diff --git a/docs/iam/umn/iam_08_0005.html b/docs/iam/umn/iam_08_0005.html index 08b6c8b8..07e0d23c 100644 --- a/docs/iam/umn/iam_08_0005.html +++ b/docs/iam/umn/iam_08_0005.html @@ -1,16 +1,25 @@ -

                Step 3: Configure Login Link in the Enterprise Management System

                -

                Configure the login link of the identity provider in the enterprise management system so that enterprise users can use this link to access the cloud system.

                -

                Prerequisites

                • An identity provider has been created in the cloud system, and the login link of the identity provider is accessible. (For details about how to create and verify an identity provider, see Step 1: Create an Identity Provider.)
                • A login link to the cloud system has already been configured in the enterprise management system.
                +

                (Optional) Step 5: Configure a Federated Login Entry in the Enterprise IdP

                +

                Configure a federated login entry in the enterprise IdP to enable enterprise users use the login link to access the cloud platform.

                +

                Prerequisites

                • An IdP entity has been created on the cloud platform. For details about how to create an IdP entity, see Step 1: Create an IdP Entity.
                • The login entry for logging in to the cloud platform has been configured in the enterprise management system.
                -

                Procedure

                1. Log in to the IAM console, and choose Identity Providers from the navigation pane.
                2. Click View in the row containing the identity provider.
                3. Click Copy next to the login link.
                4. Add the following statement to the page file of the enterprise management system:

                  <a href="<Login link>"> Login </a>
                  -

                5. Log in to the enterprise management system, and then click the configured login link to access the cloud system.
                +

                Procedure

                1. Log in to the IAM console. In the navigation pane, choose Identity Providers.
                2. Click View in the row containing the IdP.

                  Figure 1 Viewing IdP details
                  +

                3. Copy the login link by clicking in the Login link row.

                  Figure 2 Copying the login link
                  +

                4. Add the following statement to the page file of the enterprise management system:

                  <a href="<Login link>"> Cloud platform login entry </a>
                  +

                5. Log in to the enterprise management system as an enterprise user, and click the configured login link to access the cloud platform.
                + + \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0007.html b/docs/iam/umn/iam_08_0007.html index a89294a7..83f3d7fb 100644 --- a/docs/iam/umn/iam_08_0007.html +++ b/docs/iam/umn/iam_08_0007.html @@ -1,16 +1,25 @@ -

                Step 3: Configure Login Link in the Enterprise Management System

                -

                Configure the login link of the identity provider in the enterprise management system so that enterprise users can use this link to access the cloud system.

                -

                Prerequisites

                • An identity provider has been created in the cloud system, and the login link of the identity provider is accessible. (For details about how to create and verify an identity provider, see Step 1: Create an Identity Provider.)
                • A login link to the cloud system has already been configured in the enterprise management system.
                +

                (Optional) Step 3: Configure Login Link in the Enterprise Management System

                +

                Configure a federated login entry in the enterprise IdP to enable enterprise users use the login link to access the cloud platform.

                +

                Prerequisites

                • An IdP entity has been created on the cloud platform. For details about how to create an IdP entity, see Step 1: Create an IdP Entity.
                • The login entry for logging in to the cloud platform has been configured in the enterprise management system.
                -

                Procedure

                1. Log in to the IAM console, and choose Identity Providers from the navigation pane.
                2. Click View in the row containing the identity provider.
                3. Click Copy next to the login link.
                4. Add the following statement to the page file of the enterprise management system:

                  <a href="<Login link>"> Login </a>
                  -

                5. Log in to the enterprise management system, and then click the configured login link to access the cloud system.
                +

                Procedure

                1. Log in to the IAM console. In the navigation pane, choose Identity Providers.
                2. Click View in the row containing the IdP.

                  Figure 1 Viewing IdP details
                  +

                3. Copy the login link by clicking in the Login link row.

                  Figure 2 Copying the login link
                  +

                4. Add the following statement to the page file of the enterprise management system:

                  <a href="<Login link>"> Cloud platform login entry </a>
                  +

                5. Log in to the enterprise management system as an enterprise user, and click the configured login link to access the cloud platform.
                + + \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0008.html b/docs/iam/umn/iam_08_0008.html index 544639a0..e13b16fb 100644 --- a/docs/iam/umn/iam_08_0008.html +++ b/docs/iam/umn/iam_08_0008.html @@ -1,61 +1,78 @@

                Step 2: Configure Identity Conversion Rules

                -

                As the enterprise administrator, you can manage identities and permissions of federated users in the enterprise identity provider. By configuring identity conversion rules, you can map the identities and permissions of federated users to the cloud system and control their access to specific resources.

                -
                • Modifications to identity conversion rules will take effect only after the federated users log in again.
                • To modify the permissions of a federated user, modify the permissions of the user group to which the user belongs. Then restart the identity provider system for the modifications to take effect.
                +

                Federated users are named FederationUser by default in the cloud platform. These users can only log in to the cloud platform and they do not have any other permissions. You can configure identity conversion rules on the IAM console to achieve the following:

                +
                • Display enterprise management system users with different names in the cloud platform.
                • Assign permissions to enterprise users to use the cloud platform resources by mapping these users to IAM user groups. Ensure that you have created the required user groups. For details, see Creating a User Group and Assigning Permissions.
                +
                • Modifications to identity conversion rules will take effect only after the federated users log in again.
                • To modify the permissions of a user, modify the permissions of the user group to which the user belongs. Then restart the enterprise IdP for the modifications to take effect.
                -

                Prerequisites

                An identity provider has been created in the cloud system, and the login link of the identity provider is accessible. (For details about how to create and verify an identity provider, see Step 1: Create an Identity Provider.)

                +

                Prerequisites

                An IdP has been created, and the login link of the IdP is accessible. (For details about how to create and verify an IdP, see Step 1: Create an IdP Entity.)

                -

                Procedure

                If you configure identity conversion rules by clicking Create Rule, IAM converts the rule parameters to the JSON format. Alternatively, you can click Edit Rule to configure rules in the JSON format.

                -
                • Creating a Rule
                  1. Choose Identity Providers from the navigation pane.
                  2. In the identity provider list, click Modify in the row containing the identity provider.
                  3. In the Identity Conversion Rules area, click Create Rule. Then, configure the rule in the Create Rule dialog box. -
                    Table 1 Parameter description

                    Parameter

                    +

                    Procedure

                    If you configure identity conversion rules by clicking Create Rule, IAM converts the rule parameters to the JSON format. Alternatively, you can click Edit Rule to configure rules in the JSON format. For details, see Syntax of Identity Conversion Rules.

                    +
                    • Creating Rules
                      1. Log in to the IAM console as the administrator. In the navigation pane, choose Identity Providers.
                      2. In the IdP list, click Modify in the row containing the IdP.
                      3. In the Identity Conversion Rules area, click Create Rule. Then, configure the rules in the Create Rule dialog box.
                        Figure 1 Setting parameters
                        +
                        +
                        - - - - - - - - - - -
                        Table 1 Parameter description

                        Parameter

                        Description

                        +

                        Description

                        Remarks

                        +

                        Remarks

                        Username

                        +

                        Username

                        Username of federated users to be displayed in the cloud system

                        +

                        Username of federated users in the cloud platform.

                        To distinguish federated users from users of the cloud system, it is recommended that you set the username to "FederationUser-IdP_XXX". IdP indicates an identity provider name, for example, AD FS and Shibboleth. XXX indicates a custom name.

                        -

                        You can also set the federated username to a simple expression, for example, FederationUser-IdP_{email}. After the rule is created successfully, {email} is automatically replaced with the email address of each federated user.

                        -
                        NOTICE:

                        Each federated username must be unique under your account. Identical usernames under one or more identity providers of the same account will be identified as the same federated user in the cloud system.

                        +

                        To distinguish federated users from users in the cloud platform, it is recommended that you set the username to FederationUser-IdP_XXX. IdP indicates an IdP name, for example, AD FS and Shibboleth. XXX indicates a custom name.

                        +
                        NOTICE:
                        • The username of each federated user must be unique in the same IdP. Federated users with the same usernames in the same IdP will be mapped to the same IAM user in the cloud platform.
                        • The username can only contain letters, digits, spaces, hyphens (-), underscores (_), and periods (.). It cannot start with a digit and cannot contain the following special characters: ", \", \\, \n, \r

                        User Group

                        +

                        User Groups

                        User groups to which the federated users will belong in the cloud system

                        +

                        User groups which the federated users belong to in the cloud platform.

                        Federated users will inherit permissions from the groups to which they belong.

                        +

                        The federated users will inherit permissions from their user groups. You can select a user group that has already been created.

                        Rule Conditions

                        +

                        Rule Conditions

                        Conditions that a federated user must meet to obtain permissions from the selected user groups

                        +

                        Conditions that a federated user must meet to obtain permissions from the selected user groups.

                        Federated users who do not meet these conditions cannot access the cloud system. You can create a maximum of 10 conditions for an identity conversion rule.

                        -
                        NOTE:
                        • An identity conversion rule can have multiple conditions. It takes effect only if all of the conditions are met.
                        • An identity provider can have multiple identity conversion rules. If a federated user does not meet any of the rules, the user will not be allowed to access the cloud system.
                        +

                        Federated users who do not meet these conditions cannot access the cloud platform. You can create a maximum of 10 conditions for an identity conversion rule.

                        +
                        NOTE:
                        • An identity conversion rule can have multiple conditions. It takes effect only if all of the conditions are met.
                        • An IdP can have multiple identity conversion rules. If a federated user does not meet any of the conditions, the user will be denied to access the cloud platform.
                        -

                        For example, set an identity conversion rule for enterprise administrators.

                        -
                        • Username: FederationUser-IdP_admin_{email}
                        • User group: admin
                        • Rule condition: _NAMEID_ (attribute), any_one_of (condition), and ID1;ID2;ID3 (value). Only users with ID1, ID2, or ID3 inherit permissions from the admin user group.
                        -
                      4. In the Create Rule area, click OK.
                      5. On the Modify Identity Provider page, click OK.
                      -
                    • Editing a Rule
                      1. Log in to the cloud system as an administrator, and go to the IAM console. Then, choose Identity Providers from the navigation pane.
                      2. In the identity provider list, click Modify in the row containing the identity provider.
                      3. In the Identity Conversion Rules area, click Edit Rule. Then configure the rule in the Edit Rule dialog box.
                      4. Edit the identity conversion rule in the JSON format. For details, see Syntax of Identity Conversion Rules.
                      5. Click Validate to verify the syntax of the rule.
                      6. If the rule is correct, click OK in the Edit Rule dialog box. Then click OK on the Modify Identity Provider page.

                        If a message indicating that the JSON file is incomplete is displayed, modify the statement or click Cancel to cancel the modifications.

                        +
                    +

                    For example, set an identity conversion rule for administrators in the enterprise management system.

                    +
                    • Username: FederationUser-IdP_admin
                    • User group: admin
                    • Rule condition: _NAMEID_ (attribute), any_one_of (condition), and 000000001 (value).

                      Only the user with ID 000000001 is mapped to IAM user FederationUser-IdP_admin and inherits permissions from the admin user group.

                      +
                    +
                  4. In the Create Rule dialog box, click OK.
                  5. On the Modify Identity Provider page, click OK.
                  6. +
                  7. Editing Rules
                    1. Log in to the IAM console as the administrator. In the navigation pane, choose Identity Providers.
                    2. In the IdP list, click Modify in the row containing the IdP.
                    3. In the Identity Conversion Rules area, click Edit Rule. Then configure the rules in the Edit Rule dialog box.
                    4. Edit the identity conversion rules in JSON format. For details, see Syntax of Identity Conversion Rules.
                    5. Click Validate to verify the syntax of the rules.
                    6. If the rule is correct, click OK in the Edit Rule dialog box, and click OK on the Modify Identity Provider page.

                      If a message indicating that the JSON file is incomplete is displayed, modify the statements or click Cancel to cancel the modifications.

                  8. +

                    Verifying Federated User Permissions

                    After configuring identity conversion rules, verify the permissions of federated users.

                    +
                    1. Log in as a federated user.

                      On the Identity Providers page of the console, click View in the row containing the IdP. Click to copy the login link displayed in the Basic Information area, open the link using a browser, and then enter the username and password used in the enterprise management system.

                      +

                    2. Check that the federated user has the permissions assigned to their user group.

                      For example, an identity conversion rule has defined full permissions for all cloud services for federated user ID1 in the admin user group. On the management console, select a cloud service, and check if you can access the service.

                      +

                    +
                    +

                    Related Operations

                    Viewing identity conversion rules: Click View Rule on the Modify Identity Provider page. The identity conversion rules are displayed in the JSON format. For details about the JSON format, see Syntax of Identity Conversion Rules.

                    +
                    + + \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0009.html b/docs/iam/umn/iam_08_0009.html index 68e28a64..a311b303 100644 --- a/docs/iam/umn/iam_08_0009.html +++ b/docs/iam/umn/iam_08_0009.html @@ -1,116 +1,122 @@ -

                    Step 1: Create an Identity Provider

                    -

                    To establish a trust relationship between an enterprise identity provider and the cloud system, create an identity provider and configure authorization information on the IAM console, and set the user redirect URLs and create OAuth 2.0 credentials in the enterprise identity provider.

                    -

                    Prerequisites

                    As an enterprise administrator, you have registered an account in the cloud system and created user groups and granted them permissions in IAM.

                    -

                    The user groups created in IAM will be used to assign permissions to identity provider users mapped to the cloud system.

                    -
                    +

                    Step 1: Create an IdP Entity

                    +

                    To establish a trust relationship between an enterprise IdP and the cloud platform, set the user redirect URLs and create OAuth 2.0 credentials in the enterprise IdP. On the IAM console, create an IdP entity and configure authorization information.

                    +

                    Prerequisites

                    • The enterprise administrator has created an account in the cloud platform, and has created user groups and assigned them permissions in IAM. For details, see Creating a User Group and Assigning Permissions. The user groups created in IAM will be mapped to federated users so that the federated users can obtain the permissions of the user groups to use cloud resources.
                    • The enterprise administrator has read the help documentation of the enterprise IdP or has understood how to use the enterprise IdP. Configurations of different enterprise IdPs differ greatly, so they are not described in this document. For details about how to obtain the enterprise IdP's OAuth 2.0 credentials, see the IdP help documentation.
                    -

                    Creating OAuth 2.0 Credentials in the Enterprise Identity Provider

                    1. The enterprise IdP redirects users to an OpenID Connect identity provider on the cloud platform through a browser. In the IdP system, set the redirect URLs to the following:

                      https://auth.otc.t-systems.com/authui/oidc/redirect and https://auth.otc.t-systems.com/authui/oidc/post

                      -

                    2. Obtain OAuth 2.0 credentials (see Table 2) of the enterprise IdP. For details, see the documentation of your enterprise IdP.
                    +

                    Creating OAuth 2.0 Credentials in the Enterprise IdP

                    1. Set redirect URLs https:///authui/oidc/redirect and https:///authui/oidc/post in the enterprise IdP so that users can be redirected to the OpenID Connect IdP in the cloud platform.
                    2. Obtain OAuth 2.0 credentials of the enterprise IdP.
                    -

                    Creating an Identity Provider

                    Create an identity provider and configure authorization information in IAM.

                    -
                    1. Log in to the IAM console, and choose Identity Providers from the navigation pane. Then click Create Identity Provider.
                    2. Enter an identity provider name, select OpenID Connect and Enabled, and click OK.

                      The identity provider name must be unique under your account.

                      +

                      Creating an IdP Entity on the Cloud Platform

                      Create an IdP entity and configure authorization information in IAM to establish a trust relationship between the enterprise IdP and IAM

                      +
                      1. Log in to the IAM console, choose Identity Providers from the navigation pane, and click Create Identity Provider in the upper right corner.

                        Figure 1 Creating an IdP entity
                        +

                      2. Enter an IdP name, select OpenID Connect and Enabled, and click OK.

                        Figure 2 Setting IdP parameters
                        +

                        The IdP name must be unique under your account.

                      -

                      Configuring Authorization Information

                      1. Click Modify in the Operation column of the row containing the identity provider you want to modify.
                      2. Select an access type.

                        -

                        Table 1 Access type

                        Access Type

                        +

                        Configuring Authorization Information in the Cloud Platform

                        1. Click Modify in the Operation column of the row containing the IdP you want to modify.

                          Figure 3 Modifying an IdP
                          +

                        2. Select an access type.

                          Figure 4 Access type description
                          + +
                          - - - - -
                          Table 1 Access type description

                          Access Type

                          Description

                          +

                          Description

                          Programmatic access and management console access

                          +

                          Programmatic access and management console access

                          • Programmatic access: Federated users can obtain a token for the cloud system by using an ID token and then use development tools (including APIs, CLI, and SDKs) that support token authentication to access the cloud system.
                          • Management console access: Federated users can log in to the management console by using their own usernames and passwords.

                            Select this access type if you want to access the cloud system using SSO.

                            +
                          • Programmatic access: Federated users can use development tools (including APIs, CLI, and SDKs) that support key authentication to access the cloud platform.
                          • Management console access: Federated users can log in to the cloud platform by using their own usernames and passwords.

                            Select this access type if you want users to access the cloud platform through SSO.

                          Programmatic access

                          +

                          Programmatic access

                          Federated users can only obtain a token for the cloud system by using an ID token and then use development tools (including APIs, CLI, and SDKs) that support token authentication to access the cloud system.

                          +

                          Federated users can only use development tools (including APIs, CLI, and SDKs) that support key authentication to access the cloud platform.

                          -

                        3. Specify the configuration information.

                          -

                          Table 2 Configuration information

                          Parameter

                          +

                        4. Specify the configuration information.

                          +
                          - - - - - - - - - - - - - - -
                          Table 2 Configuration information

                          Parameter

                          Description

                          +

                          Description

                          Identity Provider URL

                          +

                          Identity Provider URL

                          URL of the OpenID Connect identity provider.

                          -

                          Specify this parameter as the value of issuer in the Openid-configuration.

                          -
                          NOTE:

                          Openid-configuration indicates a URL defined in OpenID Connect, containing configurations of an enterprise identity provider. The URL format is https://{base URL}/.well-known/openid-configuration, where base URL is defined by the enterprise identity provider.

                          -

                          For example, the Openid-configuration of Google is https://accounts.google.com/.well-known/openid-configuration. Therefore, the identity provider URL is https://accounts.google.com.

                          +

                          URL of the OpenID Connect IdP.

                          +

                          Specify this parameter as the value of issuer in the Openid-configuration.

                          +
                          NOTE:

                          Openid-configuration indicates a URL defined in OpenID Connect, containing configurations of an enterprise IdP. The URL format is https://{base URL}/.well-known/openid-configuration, where base URL is defined by the enterprise IdP. For example, the Openid-configuration of Google is https://accounts.google.com/.well-known/openid-configuration.

                          Client ID

                          +

                          Client ID

                          ID of a client registered with the OpenID Connect identity provider. that is, an OAuth 2.0 credential created in the enterprise identity provider.

                          +

                          ID of a client registered with the OpenID Connect IdP. The client ID is an OAuth 2.0 credential created in the enterprise IdP.

                          Authorization Endpoint

                          +

                          Authorization Endpoint

                          Authorization endpoint of the OpenID Connect identity provider. Specify this parameter as the value of authorization_endpoint in the Openid-configuration.

                          -

                          This parameter is required only if you set Access Type to Programmatic access and management console access.

                          +

                          Authorization endpoint of the OpenID Connect IdP. Specify this parameter as the value of authorization_endpoint in Openid-configuration.

                          +

                          This parameter is required only if you set Access Type to Programmatic access and management console access.

                          Scopes

                          +

                          Scopes

                          Scopes of authorization requests. openid is selected by default.

                          -

                          This parameter is required only if you set Access Type to Programmatic access and management console access.

                          -

                          Enumerated values:

                          -
                          • openid
                          • email
                          • profile
                          +

                          Scopes of authorization requests. openid is selected by default.

                          +

                          This parameter is required only if you set Access Type to Programmatic access and management console access.

                          +

                          Enumerated values:

                          +
                          • openid
                          • email
                          • profile

                          Response Type

                          +

                          Response Type

                          Response type of authorization requests. The default value is id_token.

                          -

                          This parameter is required only if you set Access Type to Programmatic access and management console access.

                          +

                          Response type of authorization requests. The default value is id_token.

                          +

                          This parameter is required only if you set Access Type to Programmatic access and management console access.

                          Response Mode

                          +

                          Response Mode

                          Response mode of authorization requests. The options include form_post and fragment. form_post is recommended.

                          -
                          • form_post: If this mode is selected, set the redirect URL to http://auth.example.com/authul/oidc/post in the enterprise identity provider.
                          • fragment: If this mode is selected, set the redirect URL to https://auth.example.com/authui/oidc/redirect in the enterprise identity provider.
                          -

                          This parameter is required only if you set Access Type to Programmatic access and management console access.

                          +

                          Response mode of authorization requests. The options include form_post and fragment. form_post is recommended.

                          +

                          This parameter is required only if you set Access Type to Programmatic access and management console access.

                          Signing Key

                          +

                          Signing Key

                          Public key used to sign the ID token of the OpenID Connect identity provider. For example: NqMhxWVZf2PcPQRc6aBlpd3k...

                          -
                          NOTE:

                          For account security purposes, change the signing key periodically.

                          -
                          +

                          Public key used to sign the ID token of the OpenID Connect IdP. For account security purposes, change the signing key periodically.

                          -

                        5. Click OK.
                        6. -

                          Logging In as a Federated User

                          1. Click the login link displayed on the identity provider details page to check if the login page of the IdP server is displayed.

                            1. On the Identity Providers page, click View in the Operation column of the identity provider.
                            2. Copy the login link displayed on the identity provider details page and visit the link using a browser.
                            3. If the identity provider login page is not displayed, check the configurations of the identity provider and the identity provider server.
                            -

                          2. Enter the username and password of a user that was created in the enterprise management system.

                            • If the login is successful, add the login link to the enterprise's official website.
                            • If the login fails, check the username and password.
                            -

                            Federated users only have read permissions for the cloud system by default. To assign permissions to federated users, configure identity conversion rules for the identity provider. For more information, see Step 2: Configure Identity Conversion Rules.

                            +

                          3. Click OK.
                          +
                          +

                          Verifying the Federated Login

                          1. Click the login link displayed on the IdP details page and check if the login page of the enterprise IdP server is displayed.

                            1. On the Identity Providers page, click Modify in the Operation column of the identity provider.
                            2. Copy the login link displayed on the Modify Identity Provider page and visit the link using a browser.
                              Figure 5 Copying the login link
                              +
                            3. If the enterprise IdP login page is not displayed, check the configurations of the IdP and the enterprise IdP server.
                            +

                          2. Enter the username and password of a user that was created in the enterprise management system.

                            • If the login is successful, add the login link to the enterprise management system.
                            • If the login fails, check the username and password.
                            +

                            Federated users only have read permissions for the cloud platform by default. To assign permissions to federated users, configure identity conversion rules for the IdP. For details, see Step 2: Configure Identity Conversion Rules.

                          -

                          Related Operations

                          • Viewing identity provider information: In the identity provider list, click View in the row containing the identity provider, and view its basic information, access type, configurations, and identity conversion rules.

                            To modify the configurations of an identity provider, click Modify at the bottom of the details page.

                            +

                            Related Operations

                            • Viewing IdP information: In the IdP list, click View in the row containing the IdP, and view its basic information, metadata, and identity conversion rules.

                              To modify the configuration of an IdP, click Modify at the bottom of the details page.

                              -
                            • Modifying an identity provider: In the identity provider list, click Modify in the row containing the identity provider, and then change its status and modify the description, access type, configurations, and identity conversion rules.
                            • Deleting an identity provider: In the identity provider list, click Delete in the row containing the identity provider, and click Yes.
                            +
                          • Modifying an IdP: In the IdP list, click Modify in the row containing the IdP, and then change its status or modify the description, metadata, or identity conversion rules.
                          • Deleting an IdP: In the IdP list, click Delete in the row containing the IdP, and click Yes in the displayed dialog box.
                          -

                          Follow-Up Procedure

                          +

                          Follow-Up Procedure

                          + + \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0010.html b/docs/iam/umn/iam_08_0010.html index df38a56a..0ba3b553 100644 --- a/docs/iam/umn/iam_08_0010.html +++ b/docs/iam/umn/iam_08_0010.html @@ -1,28 +1,22 @@ -

                          OpenID Connect–based Federated Identity Authentication

                          -

                          This section describes the process and configuration of OpenID Connect–based federated identity authentication between an enterprise identity provider and the cloud system.

                          -

                          Configuring Federated Identity Authentication

                          To implement federated identity authentication between an identity provider and the cloud system, complete the following configuration:

                          -
                          1. Establish a trust relationship and create an identity provider: Create OAuth 2.0 credentials in the enterprise identity provider, and create an identity provider in the cloud system.
                          2. Configure identity conversion rules: Map the users, user groups, and permissions in the identity provider to the cloud system.
                          3. Configure a login link: Configure a login link in the enterprise management system to allow users to access the cloud system through SSO.
                          + + + +

                          Overview of Virtual User SSO via OpenID Connect

                          +

                          This section describes how to configure identity federation and how identity federation works.

                          +

                          Configuring Identity Federation

                          The following describes how to configure your enterprise IdP and the cloud platform to trust each other.

                          +
                          1. Create an IdP entity and establish a trust relationship: Create OAuth 2.0 credentials in the enterprise IdP. In the cloud platform, create an IdP entity and establish a trust relationship between the two systems.
                          2. Configure identity conversion rules: Configure identity conversion rules in the cloud platform to the users, user groups, and permissions in the enterprise IdP to the cloud platform.
                          3. Configure a login link: Configure a login link to allow enterprise users to be redirected to the cloud platform from your enterprise management system.
                          -

                          Process of Federated Identity Authentication

                          Figure 1 shows the interaction between an identity provider and the cloud system after a user initiates an SSO request.

                          -
                          Figure 1 Process of federated identity authentication
                          -

                          As shown in the preceding figure, the process of federated identity authentication is as follows:

                          -
                          1. A user uses a browser to open the login link obtained from IAM, and then the browser sends an SSO request to the cloud system.
                          2. The cloud system searches for identity provider configurations based on the login link, and sends an OpenID Connect authorization request to the browser.
                          3. The browser forwards the authorization request to the enterprise identity provider.
                          4. The user enters their username and password on the login page displayed in the identity provider system. After the identity provider authenticates the user's identity, it constructs an ID token containing the user information, and sends the ID token to the browser as an OpenID Connect authorization response.
                          5. The browser responds and forwards the authorization response to the cloud system.
                          6. The cloud system parses the ID token in the authorization response, and issues a token to the user after identifying the group the user is mapped to, according to the configured identity conversion rules.
                          7. If the login is successful, the user accesses the cloud system successfully.
                          +

                          How Identity Federation Works

                          Figure 1 shows the identity federation process between an enterprise management system and the cloud platform.

                          +
                          Figure 1 How identity federation works
                          +

                          The process of identity federation is as follows:

                          +
                          1. A user opens the login link obtained from the IAM console in the browser. The browser sends an SSO request to the cloud platform.
                          2. The cloud platform authenticates the user against the configuration of the enterprise IdP and constructs an OpenID Connect request to the browser.
                          3. The browser forwards the OpenID Connect request to the enterprise IdP.
                          4. The user enters their username and password on the login page displayed in the enterprise IdP. After the enterprise IdP authenticates the user's identity, it constructs an ID token containing the user information, and sends the ID token to the browser as an OpenID Connect authorization response.
                          5. The browser responds and forwards the OpenID Connect response to the cloud platform.
                          6. The cloud platform parses the ID token in the OpenID Connect response, identifies the IAM user group mapping to the user based on the identity conversion rules, and issues a token to the user.
                          7. The user logs in to the cloud platform through SSO.
                          diff --git a/docs/iam/umn/iam_08_0021.html b/docs/iam/umn/iam_08_0021.html new file mode 100644 index 00000000..07a579a6 --- /dev/null +++ b/docs/iam/umn/iam_08_0021.html @@ -0,0 +1,39 @@ + + + + + +

                          Overview of Virtual User SSO via SAML

                          +

                          The cloud platform supports identity federation with Security Assertion Markup Language (SAML), which is an open standard that many identity providers (IdPs) use. During identity federation, the cloud platform functions as a service provider (SP) and enterprises function as IdPs. This section describes how to configure identity federation and how identity federation works.

                          +

                          Ensure that your enterprise IdP supports SAML 2.0.

                          +
                          +

                          Configuring Identity Federation

                          The following describes how to configure your enterprise IdP and the cloud platform to trust each other.

                          +
                          Figure 1 Configuration of virtual user SSO via SAML
                          +
                          1. Create an IdP entity and establish a trust relationship: Create an IdP entity for your enterprise on the cloud platform. Then, upload the cloud platform metadata file to the enterprise IdP, and upload the metadata file of the enterprise IdP to the cloud platform.
                            Figure 2 Exchanging metadata files
                            +
                          2. Configure the enterprise IdP: Configure enterprise IdP parameters to determine what information can be sent to the cloud platform.
                          3. Configure identity conversion rules: Configure identity conversion rules to determine the IdP user identities and permissions on the cloud platform.
                            Figure 3 Mapping external identities to virtual users
                            +
                          4. Verify the federated login: Check whether the enterprise user can log in to the cloud platform through SSO.
                          5. (Optional) Configure a login link: Configure a login link (see Figure 4) to allow enterprise users to be redirected to the cloud platform from your enterprise management system.
                            Figure 4 SSO login model
                            +
                          +
                          +

                          How Identity Federation Works

                          Figure 5 shows the identity federation process between an enterprise management system and the cloud platform.

                          +
                          Figure 5 How identity federation works
                          +

                          To view interactive requests and assertions with a better experience, you are advised to use Google Chrome and install SAML Message Decoder.

                          +
                          +

                          As shown in Figure 5, the process of identity federation is as follows:

                          +
                          1. A user opens the login link generated after the IdP creation in the browser. The browser sends an SSO request to the cloud platform.
                          2. The cloud platform authenticates the user against the metadata file of the enterprise IdP and constructs a SAML request to the browser.
                          3. The browser forwards the SAML request to the enterprise IdP.
                          4. The user enters their username and password on the login page. After the enterprise IdP authenticates the user's identity, it constructs a SAML assertion containing the user details and sends the assertion to the browser as a SAML response.
                          5. The browser responds and forwards the SAML response to the cloud platform.
                          6. The cloud platform parses the assertion in the SAML response, identifies the IAM user group mapping to the user based on the identity conversion rules, and issues a token to the user.
                          7. The user logs in to the cloud platform through SSO.

                            The assertion must carry a signature; otherwise, the login will fail.

                            +
                            +
                          +
                          +
                          +
                          + +
                          + + + \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0022.html b/docs/iam/umn/iam_08_0022.html new file mode 100644 index 00000000..5ac0d79b --- /dev/null +++ b/docs/iam/umn/iam_08_0022.html @@ -0,0 +1,21 @@ + + +

                          Virtual User SSO via OpenID Connect

                          +
                          + + diff --git a/docs/iam/umn/iam_08_0025.html b/docs/iam/umn/iam_08_0025.html new file mode 100644 index 00000000..f232cf75 --- /dev/null +++ b/docs/iam/umn/iam_08_0025.html @@ -0,0 +1,33 @@ + + + + + +

                          Step 4: Verify the Federated Login

                          +

                          Verifying the Federated Login

                          Federated users can initiate a login from the IdP or SP.

                          +
                          • Initiating a login from an IdP, for example, Microsoft Active Directory Federation Services (AD FS) or Shibboleth.
                          • Initiating a login from the SP. You can obtain the login link from the IdP details page on the IAM console.
                          +

                          The IdP-initiated login method depends on the IdP. For details, see the IdP help documentation. This section describes how to initiate a login from the SP.

                          +
                          1. Log in as a federated user.

                            On the Identity Providers page of the console, click View in the row containing the IdP. Click to copy the login link displayed in the Basic Information area, open the link using a browser, and then enter the username and password used in the enterprise management system.

                            +

                            +
                            Figure 1 Login link
                            +

                          2. Check that the federated user has the permissions assigned to their user group.
                          +
                          +

                          Redirecting to a Specified Region or Service

                          You can specify the target page which the federated user will be redirected to after login.

                          +
                          • Configuring the login link on the SP

                            Combine the login link obtained from the console with the specified URL using the format Login link&service=Specified URL.

                            +
                          • Configuring the login link on the IdP

                            Configure the IAM_SAML_Attributes_redirect_url assertion (the URL to be redirected to) in the SAML assertion of the enterprise IdP.

                            +
                          +
                          +
                          +
                          + +
                          + + + \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0251.html b/docs/iam/umn/iam_08_0251.html new file mode 100644 index 00000000..a14a73fb --- /dev/null +++ b/docs/iam/umn/iam_08_0251.html @@ -0,0 +1,25 @@ + + + + + +

                          Application Scenarios of Virtual User SSO and IAM User SSO

                          +

                          IAM supports two SSO types: virtual user SSO and IAM user SSO. This section describes the two SSO types and their differences, helping you to choose an appropriate type for your business.

                          +

                          Virtual User SSO

                          After a federated user logs in to the cloud platform, the system automatically creates a virtual user and assigns permissions to the user based on identity conversion rules. Virtual user SSO is recommended if:

                          +
                          +
                          • To reduce management costs, you do not want to create and manage IAM users on the cloud platform.
                          • You want to separate permissions on the cloud platform based on the user groups or attributes in your local enterprise IdP. Permission changes in the local enterprise IdP can be synchronized to the cloud platform by adjusting the user groups or attributes locally.
                          • Your enterprise has branches and each branch has multiple enterprise IdPs. These IdPs need to access the same cloud account. You need to configure multiple IdPs in the cloud platform for identity federation.
                          +

                          IAM User SSO

                          After a federated user logs in to the cloud platform, the system automatically maps the external identity ID to an IAM user so that the federated user has the permissions of the mapped IAM user. IAM user SSO is recommended if:

                          +
                          +
                          • Your cloud products do not support virtual user SSO.
                          • You do not need virtual user SSO and want to simplify the IdP configuration.
                          +

                          Differences Between Virtual User SSO and IAM User SSO

                          They differences between virtual user SSO and IAM user SSO are described as follows:

                          +

                          1. Identity conversion mode: Virtual user SSO uses identity conversion rules to convert the identities of IdP users and IAM users. IAM user SSO uses the external identity ID for identity conversion. The IAM_SAML_Attributes_xUserId value of the IdP user is the same as the external identity ID of the IAM user. The IdP user is mapped to the corresponding IAM user. When you use IAM user SSO, make sure that you have set IAM_SAML_Attributes_xUserId in the IdP and External Identity ID in the SP to the same value.

                          +

                          2. User identity in IAM: In virtual user SSO, the IdP user does not have a corresponding IAM user in the IAM user list. After the IdP user logs in, the system automatically creates a virtual user for it. In IAM user SSO, the IdP user has a IAM user mapped by external identity ID on the IAM console.

                          +

                          3. Permissions assignment in IAM: In virtual user SSO, the permissions of the IdP user are defined by the identity conversion rule. In IAM user SSO, the IdP user inherits the permissions of the user group which the mapped IAM user belongs to.

                          +
                          +
                          +
                          + +
                          + diff --git a/docs/iam/umn/iam_08_0252.html b/docs/iam/umn/iam_08_0252.html new file mode 100644 index 00000000..6d632f03 --- /dev/null +++ b/docs/iam/umn/iam_08_0252.html @@ -0,0 +1,56 @@ + + + + + +

                          Step 2: Configure the Enterprise IdP

                          +

                          You can configure parameters in the enterprise IdP to determine what information will be sent to the cloud platform. The cloud platform authenticates the federated identity and assigns permissions based on the received information and identity conversion rules.

                          +

                          Common parameters in enterprise IdP

                          +
                          + + + + + + + + + + + + + + + + + + + + + +
                          Table 1 Common parameters in enterprise IdP

                          Parameter

                          +

                          Description

                          +

                          Scenario

                          +

                          IAM_SAML_Attributes_redirect_url

                          +

                          Target URL which the federated user will be redirected to

                          +

                          During SSO login, the federated user will be redirected to a page on the cloud platform .

                          +

                          IAM_SAML_Attributes_xUserId

                          +

                          ID of an enterprise IdP user (federated user).

                          +

                          This parameter is mandatory when the SSO type is IAM user.

                          +

                          Each federated user is mapped to an IAM user. The IAM_SAML_Attributes_xUserId of the federated user is the same as the external identity ID of the corresponding IAM user.

                          +

                          IAM_SAML_Attributes_domain_id

                          +

                          Account ID of the cloud platform to be federated with the enterprise IdP

                          +

                          This parameter is mandatory in the enterprise IdP-initiated federation.

                          +

                          IAM_SAML_Attributes_idp_id

                          +

                          Name of the IdP entity created on the cloud platform

                          +

                          This parameter is mandatory in the enterprise IdP-initiated federation.

                          +
                          +
                          +
                          +
                          +
                          + +
                          + diff --git a/docs/iam/umn/iam_08_0253.html b/docs/iam/umn/iam_08_0253.html new file mode 100644 index 00000000..af28a4f0 --- /dev/null +++ b/docs/iam/umn/iam_08_0253.html @@ -0,0 +1,28 @@ + + + + + +

                          IAM User SSO via SAML

                          +
                          + + diff --git a/docs/iam/umn/iam_08_0254.html b/docs/iam/umn/iam_08_0254.html new file mode 100644 index 00000000..200b36ca --- /dev/null +++ b/docs/iam/umn/iam_08_0254.html @@ -0,0 +1,40 @@ + + + + + +

                          Overview of IAM User SSO via SAML

                          +

                          The cloud platform supports identity federation with Security Assertion Markup Language (SAML), which is an open standard that many identity providers (IdPs) use. During identity federation, the cloud platform functions as a service provider (SP) and enterprises function as IdPs. SAML-based federation enables single sign-on (SSO), so employees in your enterprise can log in to the cloud platform as IAM users.

                          +

                          This section describes how to configure identity federation and how identity federation works.

                          +

                          Ensure that your enterprise IdP supports SAML 2.0.

                          +
                          +

                          Configuring Identity Federation

                          The following describes how to configure your enterprise IdP and the cloud platform to trust each other.

                          +
                          Figure 1 Configuration of IAM user SSO via SAML
                          +
                          1. Create an IdP entity and establish a trust relationship: Create an IdP entity for your enterprise on the cloud platform. Then, upload the cloud platform metadata file to the enterprise IdP, and upload the metadata file of the enterprise IdP to the cloud platform.
                            Figure 2 Exchanging metadata files
                            +
                          2. Configure the enterprise IdP: Configure enterprise IdP parameters to determine what information can be sent to the cloud platform.
                          3. Configure an external identity ID on IAM: Establish a mapping between an IAM user and an enterprise user. When your enterprise IdP establishes SSO access to the cloud platform, the enterprise user can log in to the cloud platform as the IAM user with the specified external identity ID. For example, if an enterprise user IdP_Test_User is mapped to the IAM user Alice, the enterprise user IdP_Test_User will log in to the cloud platform as the IAM user Alice.
                            Figure 3 Mapping external identities to IAM users
                            +
                          4. Verify the federated login: Check whether the enterprise user can log in to the cloud platform through SSO.
                          5. (Optional) Configure a login link: Configure a login link (see Figure 4) to allow enterprise users to be redirected to the cloud platform from your enterprise management system.
                            Figure 4 SSO login model
                            +
                          +
                          +

                          How Identity Federation Works

                          Figure 5 shows the identity federation process between an enterprise management system and the cloud platform.

                          +
                          Figure 5 How identity federation works
                          +

                          To view interactive requests and assertions with a better experience, you are advised to use Google Chrome and install SAML Message Decoder.

                          +
                          +
                          As shown in Figure 5, the process of identity federation is as follows:
                          1. A user opens the login link generated after the IdP creation in the browser. The browser sends an SSO request to the cloud platform.
                          2. The cloud platform authenticates the user against the metadata file of the enterprise IdP and constructs a SAML request to the browser.
                          3. The browser forwards the SAML request to the enterprise IdP.
                          4. The user enters their username and password on the login page. After the enterprise IdP authenticates the user's identity, it constructs a SAML assertion containing the user details and sends the assertion to the browser as a SAML response.
                          5. The browser responds and forwards the SAML response to the cloud platform.
                          6. The cloud platform parses the assertion in the SAML response, identifies the IAM user group mapping to the user based on the identity conversion rules, and issues a token to the user.
                          7. The user logs in to the cloud platform through SSO.
                          +

                          The assertion must carry a signature; otherwise, the login will fail.

                          +
                          +
                          +
                          +
                          +
                          + +
                          + + + \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0255.html b/docs/iam/umn/iam_08_0255.html new file mode 100644 index 00000000..d028b1ea --- /dev/null +++ b/docs/iam/umn/iam_08_0255.html @@ -0,0 +1,141 @@ + + + + + +

                          Step 1: Create an IdP Entity

                          +

                          To establish a trust relationship between an enterprise IdP and the cloud platform, upload the metadata file of the cloud platform to the enterprise IdP, and then create an IdP entity and upload the metadata file of the enterprise IdP on the IAM console.

                          +

                          Establishing a Trust Relationship Between the Enterprise IdP and the Cloud Platform

                          Configure the metadata file of the cloud platform on the enterprise IdP to establish a trust.

                          +
                          1. Download the metadata file of the cloud platform.

                            +

                          2. Upload the metadata file to the enterprise IdP server. For details, see the help documentation of the enterprise IdP.
                          3. Obtain the metadata file of the enterprise IdP. For details, see the help documentation of the enterprise IdP.
                          +
                          +

                          Creating an IdP Entity on the Cloud Platform

                          To create an IdP entity on the IAM console, do as follows:

                          +
                          1. Log in to the IAM console, choose Identity Providers from the navigation pane, and click Create Identity Provider in the upper right corner.

                            Figure 1 Creating an IdP entity
                            +

                          2. Specify the name, protocol, SSO type, status, and description of the IdP entity.

                            Figure 2 Setting IdP parameters
                            + +
                            + + + + + + + + + + + + + + + + +
                            Table 1 Basic parameters of an IdP

                            Parameter

                            +

                            Description

                            +

                            Name

                            +

                            IdP name, which must be unique globally. You are advised to use the domain name.

                            +

                            Protocol

                            +

                            IdP protocol. The cloud platform supports SAML and OpenID Connect protocols. For details about OpenID Connect-based identity federation, see Virtual User SSO via OpenID Connect.

                            +

                            SSO Type

                            +

                            IdP type. An account can have only one type of IdP. The following describes the IAM user type.

                            +

                            IAM user SSO: After a federated user logs in to the cloud platform, the system automatically maps the external identity ID to an IAM user so that the federated user has the permissions of the mapped IAM user. An account can have only one IdP of the IAM user type. If you select the IAM user type, ensure that you have created an IAM user and set the external identity ID. For details, see Creating an IAM User.

                            +

                            Status

                            +

                            IdP status. The default value is Enabled.

                            +
                            +
                            +

                          3. Click OK.
                          +
                          +

                          Configuring the Metadata File of the Enterprise IdP on the Cloud Platform

                          You can upload or manually edit metadata on the IAM console. For a metadata file larger than 500 KB, manually configure the metadata. If the metadata has been changed, upload the latest metadata file or edit the existing metadata to ensure that the federated users can log in to the cloud platform successfully.

                          +

                          For details about how to obtain the metadata file of the enterprise IdP, see the help documentation of the enterprise IdP.

                          +
                          +
                          • Upload a metadata file.
                            1. Click Modify in the row containing the IdP.
                              Figure 3 Modifying an IdP
                              +
                            2. Click Select File and select the metadata file of the enterprise IdP.
                              Figure 4 Uploading a metadata file
                              +
                            3. Click Upload. The metadata extracted from the uploaded file is displayed. Click OK.
                              • If the uploaded metadata file contains multiple IdPs, select the IdP you want to use from the Entity ID drop-down list.
                              • If a message is displayed indicating that no entity ID is specified or the signing certificate has expired, check the metadata file and upload it again, or configure the metadata manually.
                              +
                            4. Click OK to save the settings.
                            +
                          +
                          • Manually configure metadata.
                            1. Click Manually configure.
                              Figure 5 Manually configuring metadata
                              +
                            2. In the Configure Metadata dialog box, set the metadata parameters, such as Entity ID, Signing Certificate, and SingleSignOnService. +
                              + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +

                              Parameter

                              +

                              Mandatory

                              +

                              Description

                              +

                              Entity ID

                              +

                              Yes

                              +

                              The unique identifier of an IdP. Enter the value of entityID displayed in the enterprise IdP's metadata file.

                              +

                              If the metadata file contains multiple IdPs, choose the one you want to use.

                              +

                              Protocol

                              +

                              Yes

                              +

                              Protocol used for identity federation between an enterprise IdP and SP.

                              +

                              The protocol is selected by default.

                              +

                              NameIdFormat

                              +

                              No

                              +

                              Enter the value of NameIdFormat displayed in the IdP metadata file.

                              +

                              It specifies the username identifier format supported by the IdP, which is used for communication between the IdP and federated user.

                              +

                              If you configure multiple values, the cloud platform uses the first value by default.

                              +

                              Signing Certificate

                              +

                              Yes

                              +

                              Enter the value of <X509Certificate> displayed in the IdP metadata file.

                              +

                              A signing certificate is a public key certificate used for signature verification. For security purposes, enter a public key containing at least 2,048 bits. The signing certificate is used during identity federation to ensure that assertions are credible and complete.

                              +

                              If you configure multiple values, the cloud platform uses the first value by default.

                              +

                              SingleSignOnService

                              +

                              Yes

                              +

                              Enter the value of SingleSignOnService displayed in the IdP metadata file.

                              +

                              This parameter defines how SAML requests are sent during SSO. It must support HTTP Redirect or HTTP POST.

                              +

                              If you configure multiple values, the cloud platform uses the first value by default.

                              +

                              SingleLogoutService

                              +

                              No

                              +

                              Enter the value of SingleLogoutService displayed in the IdP metadata file.

                              +

                              This parameter indicates the address to which federated users will be redirected after logging out their sessions. It must support HTTP Redirect or HTTP POST.

                              +

                              If you configure multiple values, the cloud platform uses the first value by default.

                              +
                              +
                              +

                              The following example shows the metadata file of an enterprise IdP and the manually configured metadata.

                              +
                              Figure 6 Metadata file of an enterprise IdP
                              +
                            3. Click OK to save the settings.
                            +
                          +
                          +
                          +
                          +
                          + +
                          + + + \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0256.html b/docs/iam/umn/iam_08_0256.html new file mode 100644 index 00000000..761fcc26 --- /dev/null +++ b/docs/iam/umn/iam_08_0256.html @@ -0,0 +1,58 @@ + + + + + +

                          Step 2: Configure the Enterprise IdP

                          +

                          You can configure parameters in the enterprise IdP to determine what information will be sent to the cloud platform. The cloud platform authenticates the federated identity and assigns permissions based on the received information.

                          +

                          If the SSO type is IAM user, the enterprise IdP must have the IAM_SAML_Attributes_xUserId assertion configured.

                          +
                          +

                          Common Parameters in Enterprise IdP

                          +
                          + + + + + + + + + + + + + + + + + + + + + +
                          Table 1 Common parameters in enterprise IdP

                          Parameter

                          +

                          Description

                          +

                          Scenario

                          +

                          IAM_SAML_Attributes_xUserId

                          +

                          ID of an enterprise IdP user (federated user).

                          +

                          This parameter is mandatory when the SSO type is IAM user.

                          +

                          Each federated user is mapped to an IAM user. The IAM_SAML_Attributes_xUserId of the federated user is the same as the external identity ID of the corresponding IAM user.

                          +

                          IAM_SAML_Attributes_redirect_url

                          +

                          Target URL which the federated user will be redirected to

                          +

                          During SSO login, the federated user will be redirected to a page on the cloud platform .

                          +

                          IAM_SAML_Attributes_domain_id

                          +

                          Account ID of the cloud platform to be federated with the enterprise IdP

                          +

                          This parameter is mandatory in the enterprise IdP-initiated federation.

                          +

                          IAM_SAML_Attributes_idp_id

                          +

                          Name of the IdP entity created on the cloud platform

                          +

                          This parameter is mandatory in the enterprise IdP-initiated federation.

                          +
                          +
                          +
                          +
                          +
                          + +
                          + diff --git a/docs/iam/umn/iam_08_0257.html b/docs/iam/umn/iam_08_0257.html new file mode 100644 index 00000000..021a7beb --- /dev/null +++ b/docs/iam/umn/iam_08_0257.html @@ -0,0 +1,28 @@ + + + + + +

                          Step 3: Configure an External Identity ID

                          +

                          For the IAM user SSO type, you must configure an external identity ID for the IAM user which the federated user maps to on the cloud platform. The external identity ID must be the same as the IAM_SAML_Attributes_xUserId value of the enterprise IdP user (federated user). You can create an IAM user and configure an external identity ID for it, or change the external identity ID of an existing IAM user.

                          + +

                          Creating an IAM User and Configuring an External Identity ID

                          1. Log in to the IAM console as an administrator.
                          2. On the IAM console, choose Users from the navigation pane, and click Create User in the upper right corner.
                          3. In the User Details area, configure an external identity ID. For details about other settings, see Creating a User.

                            Figure 1 Configuring an external identity ID
                            +

                          +
                          +

                          Changing the External Identity ID of an Existing IAM User

                          In the IAM user list, click a username or choose More > Security Settings in the row containing the user and change the external identity ID.

                          +
                          Figure 2 Changing the external identity ID of an existing IAM user
                          +
                          +
                          +
                          + +
                          + + + \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0258.html b/docs/iam/umn/iam_08_0258.html new file mode 100644 index 00000000..3a5be85d --- /dev/null +++ b/docs/iam/umn/iam_08_0258.html @@ -0,0 +1,33 @@ + + + + + +

                          Step 4: Verify the Federated Login

                          +

                          Verifying the Federated Login

                          Federated users can initiate a login from the IdP or SP.

                          +
                          • Initiating a login from an IdP, for example, Microsoft Active Directory Federation Services (AD FS) or Shibboleth.
                          • Initiating a login from the SP (the cloud platform). You can obtain the login link from the IdP details page on the IAM console.
                          +

                          The IdP-initiated login method depends on the IdP. For details, see the IdP help documentation. This section describes how to initiate a login from the SP.

                          +
                          1. Log in as a federated user.

                            On the Identity Providers page of the console, click View in the row containing the IdP. Click to copy the login link displayed in the Basic Information area, open the link using a browser, and then enter the username and password used in the enterprise management system.

                            +

                            +
                            Figure 1 Login link
                            +

                          2. Check whether the federated user is logging in as an IAM user.
                          +
                          +

                          Redirecting to a Specified Region or Service

                          You can specify the target page which the federated user will be redirected to after login.

                          +
                          • Configuring the login link on the SP

                            Combine the login link obtained from the console with the specified URL using the format Login link&service=Specified URL.

                            +
                          • Configuring the login link on the IdP

                            Configure the IAM_SAML_Attributes_redirect_url assertion (the URL to be redirected to) in the SAML assertion of the enterprise IdP.

                            +
                          +
                          +
                          +
                          + +
                          + + + \ No newline at end of file diff --git a/docs/iam/umn/iam_08_0259.html b/docs/iam/umn/iam_08_0259.html new file mode 100644 index 00000000..44be1bd1 --- /dev/null +++ b/docs/iam/umn/iam_08_0259.html @@ -0,0 +1,28 @@ + + + + + +

                          (Optional) Step 5: Configure a Federated Login Entry in the Enterprise IdP

                          +

                          Configure a federated login entry in the enterprise IdP to enable enterprise users use the login link to access the cloud platform.

                          +

                          Prerequisites

                          • An IdP entity has been created on the cloud platform, and the login link for the IdP is available. For details, see Step 1: Create an IdP Entity.
                          • The login entry for logging in to the cloud platform has been configured in the enterprise management system.
                          +
                          +

                          Procedure

                          1. Log in to the IAM console. In the navigation pane, choose Identity Providers.
                          2. Click View in the row containing the IdP.

                            Figure 1 Viewing IdP details
                            +

                          3. Copy the login link by clicking in the Login link row.

                            Figure 2 Copying the login link
                            +

                          4. Add the following statement to the page file of the enterprise management system:

                            <a href="<Login link>"> Cloud platform login entry </a>
                            +

                          5. Log in to the enterprise management system as an enterprise user, and click the configured login link to access the cloud platform.
                          +
                          +
                          +
                          + +
                          + + + \ No newline at end of file