cbr api update1020

Reviewed-by: Muller, Martin <martin.muller@t-systems.com>
Co-authored-by: Zaoxu, Li <lizaoxu@huawei.com>
Co-committed-by: Zaoxu, Li <lizaoxu@huawei.com>
This commit is contained in:
Zaoxu, Li 2023-10-23 07:46:18 +00:00 committed by zuul
parent 1670b8dc07
commit 179f08707a
7 changed files with 506 additions and 52 deletions

File diff suppressed because it is too large Load Diff

View File

@ -423,7 +423,7 @@
"code":"47"
},
{
"desc":"You can use Identity and Access Management (IAM) for fine-grained permissions management of your CBR resources. If your account does not need individual IAM users, you ca",
"desc":"You can use Identity and Access Management (IAM) for fine-grained permissions management of your CBR resources. If your cloud account does not need individual IAM users, ",
"product_code":"cbr",
"title":"Introduction",
"uri":"cbr_04_0017.html",

View File

@ -88,7 +88,7 @@
</td>
<td class="cellrowborder" valign="top" width="23.400000000000002%" headers="mcps1.3.1.1.6.1.4 "><p id="ErrorCode__p13300958195313">A terminated ECS cannot be restored.</p>
</td>
<td class="cellrowborder" valign="top" width="25.66%" headers="mcps1.3.1.1.6.1.5 "><p id="ErrorCode__p230025813538">Perform backups when the ECS status is Available.</p>
<td class="cellrowborder" valign="top" width="25.66%" headers="mcps1.3.1.1.6.1.5 "><p id="ErrorCode__p230025813538">Ensure that the ECS status is available and then perform backups.</p>
</td>
</tr>
<tr id="ErrorCode__row966023752419"><td class="cellrowborder" valign="top" width="10.9%" headers="mcps1.3.1.1.6.1.1 "><p id="ErrorCode__p130085813534">400</p>

File diff suppressed because it is too large Load Diff

View File

@ -1,7 +1,7 @@
<a name="cbr_04_0017"></a><a name="cbr_04_0017"></a>
<h1 class="topictitle1">Introduction</h1>
<div id="body1560824244020"><p id="cbr_04_0017__p1773914613588">You can use Identity and Access Management (IAM) for fine-grained permissions management of your CBR resources. If your account does not need individual IAM users, you can skip this section.</p>
<div id="body1560824244020"><p id="cbr_04_0017__p1773914613588">You can use Identity and Access Management (IAM) for fine-grained permissions management of your CBR resources. If your cloud account does not need individual IAM users, you can skip this section.</p>
<p id="cbr_04_0017__p373917464584">New IAM users do not have any permissions assigned by default. You need to first add them to one or more groups and attach policies or roles to these groups. The users then inherit permissions from the groups and can perform specified operations on cloud services based on the permissions they have been assigned.</p>
<p id="cbr_04_0017__p1673974695813">You can grant users permissions using roles and policies. Roles are provided by IAM to define service-based permissions that match user's job responsibilities. Policies define API-based permissions for operations on specific resources under certain conditions, allowing for more fine-grained, secure access control of cloud resources.</p>
<div class="note" id="cbr_04_0017__note123212015590"><img src="public_sys-resources/note_3.0-en-us.png"><span class="notetitle"> </span><div class="notebody"><p id="cbr_04_0017__p14302113443017">If you want to allow or deny the access to an API, use policy-based authorization.</p>

View File

@ -0,0 +1 @@
D:\02CBR\13gitea\doc-exports\docs\ecs\umn

View File

@ -0,0 +1 @@
D:\02CBR\13gitea\doc-exports\docs\ecs\umn