diff --git a/docs/obs/perms-cfg/ALL_META.TXT.json b/docs/obs/perms-cfg/ALL_META.TXT.json index 8a537316..ffad1a61 100644 --- a/docs/obs/perms-cfg/ALL_META.TXT.json +++ b/docs/obs/perms-cfg/ALL_META.TXT.json @@ -1,411 +1,742 @@ [ + { + "dockw":"Permission Configuration Guide" + }, { "uri":"obs_40_0001.html", + "node_id":"obs_40_0001.xml", "product_code":"obs", "code":"1", - "des":"By default, OBS resources (buckets and objects) are private. Only resource owners can access their OBS resources. Without authorization, other users cannot access OBS. OB", + "des":"By default, OBS resources (buckets and objects) are private. Only resource owners can access their OBS resources. Other users cannot access such resources without authori", "doc_type":"perms-cfg", - "kw":"Introduction to OBS Access Control,Permission Configuration Guide", - "title":"Introduction to OBS Access Control", + "kw":"Differences Between OBS Permissions Control Methods,Permission Configuration Guide", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Differences Between OBS Permissions Control Methods", "githuburl":"" }, { "uri":"obs_40_0002.html", + "node_id":"obs_40_0002.xml", "product_code":"obs", "code":"2", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"perms-cfg", - "kw":"Permission Control Mechanisms", - "title":"Permission Control Mechanisms", + "kw":"Permission Control Methods", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Permission Control Methods", "githuburl":"" }, { "uri":"obs_40_0003.html", + "node_id":"obs_40_0003.xml", "product_code":"obs", "code":"3", "des":"By default, newly created IAM users do not have any permissions. You need to add the user to one or more groups, and attach permission policies or roles to these groups. ", "doc_type":"perms-cfg", - "kw":"IAM Permissions,Permission Control Mechanisms,Permission Configuration Guide", + "kw":"IAM Permissions,Permission Control Methods,Permission Configuration Guide", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"IAM Permissions", "githuburl":"" }, { "uri":"obs_40_0004.html", + "node_id":"obs_40_0004.xml", "product_code":"obs", "code":"4", - "des":"A bucket policy applies to an OBS bucket and objects in the bucket. By leveraging bucket policies, the owner of a bucket can authorize IAM users or other accounts the per", + "des":"A bucket policy applies to an OBS bucket and the objects in the bucket. Bucket policies let a bucket owner grant IAM users or other accounts permissions on the bucket and", "doc_type":"perms-cfg", - "kw":"Bucket Policies,Permission Control Mechanisms,Permission Configuration Guide", + "kw":"Bucket Policies,Permission Control Methods,Permission Configuration Guide", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Bucket Policies", "githuburl":"" }, { "uri":"obs_40_0005.html", + "node_id":"obs_40_0005.xml", "product_code":"obs", "code":"5", - "des":"An ACL is a list that defines grantees and their granted permissions.Bucket and object ACLs are attached to accounts. By default, an ACL is created when a bucket or objec", + "des":"An access control list (ACL) is a list of rules that specifies which users or systems are granted or denied access to a particular bucket or object.Bucket and object ACLs", "doc_type":"perms-cfg", - "kw":"ACLs,Permission Control Mechanisms,Permission Configuration Guide", + "kw":"ACLs,Permission Control Methods,Permission Configuration Guide", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"ACLs", "githuburl":"" }, { "uri":"obs_40_0006.html", + "node_id":"obs_40_0006.xml", "product_code":"obs", "code":"6", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"perms-cfg", "kw":"Access Requests", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Access Requests", "githuburl":"" }, { "uri":"obs_40_0007.html", + "node_id":"obs_40_0007.xml", "product_code":"obs", "code":"7", - "des":"OBS provides REST APIs that supports authenticated requests and anonymous requests. Anonymous requests are typically used for scenarios that require public access, such a", + "des":"OBS REST APIs support authenticated requests and anonymous requests. Anonymous requests are typically used for public access, such as accessing hosted static websites. In", "doc_type":"perms-cfg", "kw":"Accessing OBS Using Permanent Access Keys,Access Requests,Permission Configuration Guide", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Accessing OBS Using Permanent Access Keys", "githuburl":"" }, { "uri":"obs_40_0008.html", + "node_id":"obs_40_0008.xml", "product_code":"obs", "code":"8", - "des":"OBS can be accessed through temporary access keys and the security token, which can be obtained on IAM. You can assign the temporary access keys (including the security t", + "des":"You can assign temporary security credentials (including an AK, an SK, and a security token) to a third-party application or an IAM user, so that they can access OBS only", "doc_type":"perms-cfg", "kw":"Accessing OBS Using Temporary Access Keys,Access Requests,Permission Configuration Guide", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Accessing OBS Using Temporary Access Keys", "githuburl":"" }, { "uri":"obs_40_0009.html", + "node_id":"obs_40_0009.xml", "product_code":"obs", "code":"9", - "des":"You can use a temporary URL to access OBS and perform operations such as bucket creation or object upload and download. This section describes how to share objects using ", + "des":"You can share a temporary URL to allow other users to access OBS to create buckets and upload and download objects. This section describes how to share a temporary URL to", "doc_type":"perms-cfg", "kw":"Accessing OBS Using a Temporary URL,Access Requests,Permission Configuration Guide", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Accessing OBS Using a Temporary URL", "githuburl":"" }, { "uri":"obs_40_0010.html", + "node_id":"obs_40_0010.xml", "product_code":"obs", "code":"10", - "des":"The IAM agency is a function of Identity and Access Management (IAM). In some OBS application scenarios (such as CDN private bucket retrieval and cross-region replication", + "des":"The IAM agency is a function of Identity and Access Management (IAM). In scenarios such as CDN private bucket retrieval and cross-region replication, IAM agencies are req", "doc_type":"perms-cfg", "kw":"Accessing OBS Using an IAM Agency,Access Requests,Permission Configuration Guide", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Accessing OBS Using an IAM Agency", "githuburl":"" }, { - "uri":"obs_40_0011.html", + "uri":"obs_40_0012.html", + "node_id":"obs_40_0012.xml", "product_code":"obs", "code":"11", - "des":"The following typical scenarios are provided to help you better configure OBS permission control.Factors to consider before configuring permission control:Who are granted", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"perms-cfg", - "kw":"Typical Permission Control Scenarios,Permission Configuration Guide", - "title":"Typical Permission Control Scenarios", + "kw":"Permission Configuration in Typical Scenarios", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Permission Configuration in Typical Scenarios", "githuburl":"" }, { - "uri":"obs_40_0012.html", + "uri":"obs_40_0011.html", + "node_id":"obs_40_0011.xml", "product_code":"obs", "code":"12", - "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "des":"The permissions settings for typical scenarios are provided to facilitate permissions management.You need to consider the following factors before configuring permissions", "doc_type":"perms-cfg", - "kw":"Configuration Cases in Typical Permission Control Scenarios", - "title":"Configuration Cases in Typical Permission Control Scenarios", + "kw":"Typical Permissions Scenarios,Permission Configuration in Typical Scenarios,Permission Configuration", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Typical Permissions Scenarios", "githuburl":"" }, { "uri":"obs_40_0013.html", + "node_id":"obs_40_0013.xml", "product_code":"obs", "code":"13", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"perms-cfg", "kw":"Granting Permissions to an IAM User Under the Account", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Granting Permissions to an IAM User Under the Account", "githuburl":"" }, { "uri":"obs_40_0014.html", + "node_id":"obs_40_0014.xml", "product_code":"obs", "code":"14", - "des":"This topic describes how to grant an IAM user the permissions required to create and list buckets. An IAM user with this permission can create buckets. The created bucket", + "des":"This topic describes how to grant an IAM user the permissions to create and list buckets. An IAM user with this permission can create and list buckets. The created bucket", "doc_type":"perms-cfg", - "kw":"Granting an IAM User the Permissions Required to List and Create Buckets,Granting Permissions to an ", - "title":"Granting an IAM User the Permissions Required to List and Create Buckets", + "kw":"Granting an IAM User the Permissions to Create and List Buckets,Granting Permissions to an IAM User ", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting an IAM User the Permissions to Create and List Buckets", "githuburl":"" }, { "uri":"obs_40_0015.html", + "node_id":"obs_40_0015.xml", "product_code":"obs", "code":"15", - "des":"This topic describes how to grant an IAM user the read and write permissions on an OBS bucket.You are advised to use bucket policies to grant resource-level permissions t", + "des":"This topic describes how to grant an IAM user the read/write permission on an OBS bucket.To grant resource-level permissions to an IAM user, use a bucket policy.After con", "doc_type":"perms-cfg", - "kw":"Granting an IAM User the Read and Write Permissions on a Bucket,Granting Permissions to an IAM User ", - "title":"Granting an IAM User the Read and Write Permissions on a Bucket", + "kw":"Granting an IAM User the Read/Write Permission on a Bucket,Granting Permissions to an IAM User Under", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting an IAM User the Read/Write Permission on a Bucket", "githuburl":"" }, { "uri":"obs_40_0016.html", + "node_id":"obs_40_0016.xml", "product_code":"obs", "code":"16", - "des":"This topic describes how to grant an IAM user the permissions required to perform specific operations on an OBS bucket. Below describes how to grant the bucket deletion p", + "des":"This topic describes how to grant an IAM user the permissions required to delete a bucket.To grant other permissions, select required actions from Action Name in the buck", "doc_type":"perms-cfg", - "kw":"Granting an IAM User the Permissions Required to Perform Specific Operations on a Specific Bucket,Gr", - "title":"Granting an IAM User the Permissions Required to Perform Specific Operations on a Specific Bucket", + "kw":"Granting an IAM User the Specified Permissions for a Bucket,Granting Permissions to an IAM User Unde", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting an IAM User the Specified Permissions for a Bucket", "githuburl":"" }, { "uri":"obs_40_0017.html", + "node_id":"obs_40_0017.xml", "product_code":"obs", "code":"17", - "des":"This topic describes how to grant an IAM user the read permission on an object or a set of objects in an OBS bucket.You are advised to use bucket policies to grant resour", + "des":"This topic describes how to grant an IAM user the read permissions on an object or a set of objects in an OBS bucket.To grant resource-level permissions to an IAM user, u", "doc_type":"perms-cfg", - "kw":"Granting an IAM User the Read Permission on a Specific Object,Granting Permissions to an IAM User Un", - "title":"Granting an IAM User the Read Permission on a Specific Object", + "kw":"Granting an IAM User the Read Permissions on Specific Objects,Granting Permissions to an IAM User Un", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting an IAM User the Read Permissions on Specific Objects", "githuburl":"" }, { "uri":"obs_40_0018.html", + "node_id":"obs_40_0018.xml", "product_code":"obs", "code":"18", - "des":"This topic describes how to grant an IAM user certain permissions on specific objects in a bucket. Below explains how to grant the object download permission.If you need ", + "des":"This topic describes how to grant an IAM user the permissions to download specific objects from a bucket.To grant other permissions, select required actions from Action N", "doc_type":"perms-cfg", - "kw":"Granting an IAM User the Permissions Required to Perform Specific Operations on Certain Objects,Gran", - "title":"Granting an IAM User the Permissions Required to Perform Specific Operations on Certain Objects", + "kw":"Granting an IAM User the Specific Permissions on Specific Objects,Granting Permissions to an IAM Use", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting an IAM User the Specific Permissions on Specific Objects", "githuburl":"" }, { "uri":"obs_40_0019.html", + "node_id":"obs_40_0019.xml", "product_code":"obs", "code":"19", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"perms-cfg", "kw":"Granting Permissions to Multiple IAM Users or User Groups Under the Account", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Granting Permissions to Multiple IAM Users or User Groups Under the Account", "githuburl":"" }, { "uri":"obs_40_0020.html", + "node_id":"obs_40_0020.xml", "product_code":"obs", "code":"20", - "des":"This topic describes how to grant multiple IAM users or user groups all permissions on all OBS resources. Users with this permission can perform any OBS operation.IAM cus", + "des":"This topic describes how to grant multiple IAM users or user groups all permissions on all OBS resources. Users with this permission can perform any operations on OBS.Use", "doc_type":"perms-cfg", "kw":"Granting IAM User Groups All Permissions on All OBS Resources,Granting Permissions to Multiple IAM U", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Granting IAM User Groups All Permissions on All OBS Resources", "githuburl":"" }, { "uri":"obs_40_0021.html", + "node_id":"obs_40_0021.xml", "product_code":"obs", "code":"21", - "des":"This topic describes how to use the OBS-related system roles and policies preset in IAM to grant basic operation permissions on all OBS resources to multiple IAM users or", + "des":"This topic describes how to use OBS system roles and policies preset in IAM to grant basic operation permissions for all OBS resources to multiple IAM users or user group", "doc_type":"perms-cfg", "kw":"Granting IAM User Groups Basic Permissions on All OBS Resources,Granting Permissions to Multiple IAM", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Granting IAM User Groups Basic Permissions on All OBS Resources", "githuburl":"" }, { "uri":"obs_40_0022.html", + "node_id":"obs_40_0022.xml", "product_code":"obs", "code":"22", - "des":"This topic describes how to grant multiple IAM users or user groups specific permissions on all OBS resources.IAM custom policiesAfter the configuration is complete, you ", + "des":"This topic describes how to grant multiple IAM users or user groups specified permissions for all OBS resources.Use an IAM custom policy to configure the permissions.Afte", "doc_type":"perms-cfg", - "kw":"Granting IAM User Groups Specified Permissions on All OBS Resources,Granting Permissions to Multiple", - "title":"Granting IAM User Groups Specified Permissions on All OBS Resources", + "kw":"Granting IAM User Groups Specific Permissions for All OBS Resources,Granting Permissions to Multiple", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting IAM User Groups Specific Permissions for All OBS Resources", "githuburl":"" }, { "uri":"obs_40_0023.html", + "node_id":"obs_40_0023.xml", "product_code":"obs", "code":"23", - "des":"This topic describes how to grant certain operation permissions on specific OBS resources (can be a bucket or an object) to multiple IAM users or user groups.IAM custom p", + "des":"This topic describes how to grant specific operation permissions on specific OBS resources (a bucket or an object) to multiple IAM users or user groups.Use an IAM custom ", "doc_type":"perms-cfg", - "kw":"Granting IAM User Groups Specified Permissions on Certain OBS Resources,Granting Permissions to Mult", - "title":"Granting IAM User Groups Specified Permissions on Certain OBS Resources", + "kw":"Granting IAM User Groups Specific Permissions on Specific OBS Resources,Granting Permissions to Mult", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting IAM User Groups Specific Permissions on Specific OBS Resources", "githuburl":"" }, { "uri":"obs_40_0044.html", + "node_id":"obs_40_0044.xml", "product_code":"obs", "code":"24", - "des":"This topic describes how to grant certain operation permissions on specific folders in an OBS bucket to multiple IAM users or user groups.IAM custom policiesAfter the con", + "des":"This topic describes how to grant specified permissions for a folder in an OBS bucket to multiple IAM users or user groups.Use an IAM custom policy to configure the permi", "doc_type":"perms-cfg", - "kw":"Granting IAM User Groups Specified Permissions on Certain OBS Folders,Granting Permissions to Multip", - "title":"Granting IAM User Groups Specified Permissions on Certain OBS Folders", + "kw":"Granting IAM User Groups Specific Permissions on a Folder,Granting Permissions to Multiple IAM Users", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting IAM User Groups Specific Permissions on a Folder", "githuburl":"" }, { "uri":"obs_40_0024.html", + "node_id":"obs_40_0024.xml", "product_code":"obs", "code":"25", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"perms-cfg", "kw":"Granting Permissions to Other Accounts", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Granting Permissions to Other Accounts", "githuburl":"" }, { "uri":"obs_40_0025.html", + "node_id":"obs_40_0025.xml", "product_code":"obs", "code":"26", - "des":"This topic describes how to grant other accounts (excluding the IAM users under them) the read and write permissions on OBS buckets. For details about how to grant permis", + "des":"This topic describes how to grant other accounts (excluding the IAM users under them) the read/write permission for OBS buckets. For details about how to grant permission", "doc_type":"perms-cfg", - "kw":"Granting an Account the Read and Write Permissions on a Bucket,Granting Permissions to Other Account", - "title":"Granting an Account the Read and Write Permissions on a Bucket", + "kw":"Granting Other Accounts the Read/Write Permission for a Bucket,Granting Permissions to Other Account", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting Other Accounts the Read/Write Permission for a Bucket", "githuburl":"" }, { "uri":"obs_40_0026.html", + "node_id":"obs_40_0026.xml", "product_code":"obs", "code":"27", - "des":"This topic describes how to grant other accounts (excluding the IAM users under them) specific operation permissions on OBS buckets. For details about how to grant permis", + "des":"This topic describes how to grant other accounts (excluding the IAM users under them) specific permissions for OBS buckets. For details about how to grant permissions to ", "doc_type":"perms-cfg", - "kw":"Granting an Account the Specified Permissions on a Bucket,Granting Permissions to Other Accounts,Per", - "title":"Granting an Account the Specified Permissions on a Bucket", + "kw":"Granting Other Accounts the Specified Permissions for a Bucket,Granting Permissions to Other Account", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting Other Accounts the Specified Permissions for a Bucket", "githuburl":"" }, { "uri":"obs_40_0027.html", + "node_id":"obs_40_0027.xml", "product_code":"obs", "code":"28", "des":"This topic describes how to grant IAM users the permissions to access OBS buckets and resources in them.The following describes how to grant the permissions to upload and", "doc_type":"perms-cfg", - "kw":"Granting IAM Users Under an Account the Access to a Bucket and Resources in the Bucket,Granting Perm", - "title":"Granting IAM Users Under an Account the Access to a Bucket and Resources in the Bucket", + "kw":"Granting IAM Users Under an Account the Access to a Bucket and the Resources in It,Granting Permissi", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting IAM Users Under an Account the Access to a Bucket and the Resources in It", "githuburl":"" }, { "uri":"obs_40_0028.html", + "node_id":"obs_40_0028.xml", "product_code":"obs", "code":"29", "des":"This case describes how to grant other accounts (excluding IAM users under the account) the read permission for an object or a type of objects in an OBS bucket. For detai", "doc_type":"perms-cfg", - "kw":"Granting an Account Read Permissions on Certain Objects,Granting Permissions to Other Accounts,Permi", - "title":"Granting an Account Read Permissions on Certain Objects", + "kw":"Granting Other Accounts the Read Permission for Certain Objects,Granting Permissions to Other Accoun", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting Other Accounts the Read Permission for Certain Objects", "githuburl":"" }, { "uri":"obs_40_0029.html", + "node_id":"obs_40_0029.xml", "product_code":"obs", "code":"30", - "des":"This case describes how to grant other accounts the specified operation permission on a specified object in an OBS bucket. The following describes how to grant the permis", + "des":"This section describes how to grant other accounts the permissions to download an object from a bucket.To grant other permissions, select required actions from Action Nam", "doc_type":"perms-cfg", - "kw":"Granting an Account the Specified Permissions on Certain Objects,Granting Permissions to Other Accou", - "title":"Granting an Account the Specified Permissions on Certain Objects", + "kw":"Granting Other Accounts Specific Permissions for Specific Objects,Granting Permissions to Other Acco", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting Other Accounts Specific Permissions for Specific Objects", "githuburl":"" }, { "uri":"obs_40_0030.html", + "node_id":"obs_40_0030.xml", "product_code":"obs", "code":"31", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"perms-cfg", "kw":"Granting Permissions to Anonymous Users", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Granting Permissions to Anonymous Users", "githuburl":"" }, { "uri":"obs_40_0031.html", + "node_id":"obs_40_0031.xml", "product_code":"obs", "code":"32", "des":"If a bucket needs to be accessed by anonymous users, you can configure a bucket policy and bucket ACL to grant the access permission to anonymous users. The following use", "doc_type":"perms-cfg", - "kw":"Granting Anonymous Users Public Read Permissions on a Bucket,Granting Permissions to Anonymous Users", - "title":"Granting Anonymous Users Public Read Permissions on a Bucket", + "kw":"Granting Anonymous Users the Public Read Permission for a Bucket,Granting Permissions to Anonymous U", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting Anonymous Users the Public Read Permission for a Bucket", "githuburl":"" }, { "uri":"obs_40_0032.html", + "node_id":"obs_40_0032.xml", "product_code":"obs", "code":"33", - "des":"If all objects in a folder need to be accessible to anonymous users, you can configure a bucket policy to grant anonymous users the permission to access the folder.The pr", + "des":"If all objects in a folder need to be accessible to anonymous users, you can configure a bucket policy to grant anonymous users the permission to access the folder.After ", "doc_type":"perms-cfg", - "kw":"Granting Anonymous Users Public Read Permissions on a Directory,Granting Permissions to Anonymous Us", - "title":"Granting Anonymous Users Public Read Permissions on a Directory", + "kw":"Granting Anonymous Users the Read Permission for a Directory,Granting Permissions to Anonymous Users", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting Anonymous Users the Read Permission for a Directory", "githuburl":"" }, { "uri":"obs_40_0033.html", + "node_id":"obs_40_0033.xml", "product_code":"obs", "code":"34", "des":"Enterprise A stores a large volume of map data in OBS, and offers the data for public query. This enterprise sets a read permission for anonymous users, and provides the ", "doc_type":"perms-cfg", - "kw":"Granting Anonymous Users Public Read Permissions on Certain Objects,Granting Permissions to Anonymou", - "title":"Granting Anonymous Users Public Read Permissions on Certain Objects", + "kw":"Granting Anonymous Users the Read Permission for Certain Objects,Granting Permissions to Anonymous U", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Granting Anonymous Users the Read Permission for Certain Objects", "githuburl":"" }, { "uri":"obs_40_0034.html", + "node_id":"obs_40_0034.xml", "product_code":"obs", "code":"35", "des":"If you want to open an object to all users for a limited period of time, you can use the object sharing function.Once the Share File dialog box is opened, the URL is effe", "doc_type":"perms-cfg", "kw":"Temporarily Sharing Objects with Anonymous Users,Granting Permissions to Anonymous Users,Permission ", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Temporarily Sharing Objects with Anonymous Users", "githuburl":"" }, { "uri":"obs_40_0037.html", + "node_id":"obs_40_0037.xml", "product_code":"obs", "code":"36", - "des":"This case describes how to use temporary access keys (temporary AK/SK and security token) to access OBS in temporary authorization mode.Assume that you want to enable an ", + "des":"This case describes how to use temporary access keys (temporary AK/SK and security token) to access OBS.Assume that you want to enable an IAM user (user name: APPServer) ", "doc_type":"perms-cfg", - "kw":"Granting Temporary Access to OBS,Configuration Cases in Typical Permission Control Scenarios,Permiss", + "kw":"Granting Temporary Access to OBS,Permission Configuration in Typical Scenarios,Permission Configurat", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Granting Temporary Access to OBS", "githuburl":"" }, { "uri":"obs_40_0036.html", + "node_id":"obs_40_0036.xml", "product_code":"obs", "code":"37", "des":"This case describes how to restrict the source IP addresses that can access an OBS bucket. The following shows how to deny a client access whose source IP address is with", "doc_type":"perms-cfg", - "kw":"Preventing Specific IP Addresses from Accessing a Bucket,Configuration Cases in Typical Permission C", - "title":"Preventing Specific IP Addresses from Accessing a Bucket", + "kw":"Restricting Access to a Bucket for Specific IP Addresses,Permission Configuration in Typical Scenari", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Restricting Access to a Bucket for Specific IP Addresses", "githuburl":"" }, { "uri":"obs_40_0042.html", + "node_id":"obs_40_0042.xml", "product_code":"obs", "code":"38", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"perms-cfg", "kw":"Appendix", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Appendix", "githuburl":"" }, { "uri":"obs_40_0041.html", + "node_id":"obs_40_0041.xml", "product_code":"obs", "code":"39", - "des":"A policy in JSON format is described as follows:Example:{ \n\"Statement\" : [{\n \"Sid\": \"ExampleStatementID1\",\n \"Principal\": \"*\",\n \"Effect\": \"Allow\", \n \"Act", + "des":"A bucket policy in JSON format:Example:{ \n\"Statement\" : [{\n \"Sid\": \"ExampleStatementID1\",\n \"Principal\": \"*\",\n \"Effect\": \"Allow\", \n \"Action\": [\"ListBucke", "doc_type":"perms-cfg", "kw":"Bucket Policy Parameters,Appendix,Permission Configuration Guide", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Bucket Policy Parameters", "githuburl":"" }, { "uri":"obs_40_0043.html", + "node_id":"obs_40_0043.xml", "product_code":"obs", "code":"40", - "des":"Bucket ACLs are used to control basic read and write access to buckets. Custom settings of bucket policies support more actions that can be performed on buckets. Bucket A", + "des":"Bucket ACLs control read and write permissions on buckets. Custom bucket policies can control more actions on buckets. Bucket ACLs are a supplement to bucket policies, bu", "doc_type":"perms-cfg", - "kw":"Relationship Between Bucket Policies and Bucket ACLs,Appendix,Permission Configuration Guide", - "title":"Relationship Between Bucket Policies and Bucket ACLs", + "kw":"Relationship Between Bucket ACLs and Bucket Policies,Appendix,Permission Configuration Guide", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], + "title":"Relationship Between Bucket ACLs and Bucket Policies", "githuburl":"" }, { "uri":"obs_40_0039.html", + "node_id":"obs_40_0039.xml", "product_code":"obs", "code":"41", "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "doc_type":"perms-cfg", "kw":"Change History,Permission Configuration Guide", + "search_title":"", + "metedata":[ + { + "prodname":"obs", + "documenttype":"perms-cfg" + } + ], "title":"Change History", "githuburl":"" } diff --git a/docs/obs/perms-cfg/CLASS.TXT.json b/docs/obs/perms-cfg/CLASS.TXT.json index 67210c45..5f7be312 100644 --- a/docs/obs/perms-cfg/CLASS.TXT.json +++ b/docs/obs/perms-cfg/CLASS.TXT.json @@ -1,8 +1,8 @@ [ { - "desc":"By default, OBS resources (buckets and objects) are private. Only resource owners can access their OBS resources. Without authorization, other users cannot access OBS. OB", + "desc":"By default, OBS resources (buckets and objects) are private. Only resource owners can access their OBS resources. Other users cannot access such resources without authori", "product_code":"obs", - "title":"Introduction to OBS Access Control", + "title":"Differences Between OBS Permissions Control Methods", "uri":"obs_40_0001.html", "doc_type":"perms-cfg", "p_code":"", @@ -11,7 +11,7 @@ { "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"obs", - "title":"Permission Control Mechanisms", + "title":"Permission Control Methods", "uri":"obs_40_0002.html", "doc_type":"perms-cfg", "p_code":"", @@ -27,7 +27,7 @@ "code":"3" }, { - "desc":"A bucket policy applies to an OBS bucket and objects in the bucket. By leveraging bucket policies, the owner of a bucket can authorize IAM users or other accounts the per", + "desc":"A bucket policy applies to an OBS bucket and the objects in the bucket. Bucket policies let a bucket owner grant IAM users or other accounts permissions on the bucket and", "product_code":"obs", "title":"Bucket Policies", "uri":"obs_40_0004.html", @@ -36,7 +36,7 @@ "code":"4" }, { - "desc":"An ACL is a list that defines grantees and their granted permissions.Bucket and object ACLs are attached to accounts. By default, an ACL is created when a bucket or objec", + "desc":"An access control list (ACL) is a list of rules that specifies which users or systems are granted or denied access to a particular bucket or object.Bucket and object ACLs", "product_code":"obs", "title":"ACLs", "uri":"obs_40_0005.html", @@ -54,7 +54,7 @@ "code":"6" }, { - "desc":"OBS provides REST APIs that supports authenticated requests and anonymous requests. Anonymous requests are typically used for scenarios that require public access, such a", + "desc":"OBS REST APIs support authenticated requests and anonymous requests. Anonymous requests are typically used for public access, such as accessing hosted static websites. In", "product_code":"obs", "title":"Accessing OBS Using Permanent Access Keys", "uri":"obs_40_0007.html", @@ -63,7 +63,7 @@ "code":"7" }, { - "desc":"OBS can be accessed through temporary access keys and the security token, which can be obtained on IAM. You can assign the temporary access keys (including the security t", + "desc":"You can assign temporary security credentials (including an AK, an SK, and a security token) to a third-party application or an IAM user, so that they can access OBS only", "product_code":"obs", "title":"Accessing OBS Using Temporary Access Keys", "uri":"obs_40_0008.html", @@ -72,7 +72,7 @@ "code":"8" }, { - "desc":"You can use a temporary URL to access OBS and perform operations such as bucket creation or object upload and download. This section describes how to share objects using ", + "desc":"You can share a temporary URL to allow other users to access OBS to create buckets and upload and download objects. This section describes how to share a temporary URL to", "product_code":"obs", "title":"Accessing OBS Using a Temporary URL", "uri":"obs_40_0009.html", @@ -81,7 +81,7 @@ "code":"9" }, { - "desc":"The IAM agency is a function of Identity and Access Management (IAM). In some OBS application scenarios (such as CDN private bucket retrieval and cross-region replication", + "desc":"The IAM agency is a function of Identity and Access Management (IAM). In scenarios such as CDN private bucket retrieval and cross-region replication, IAM agencies are req", "product_code":"obs", "title":"Accessing OBS Using an IAM Agency", "uri":"obs_40_0010.html", @@ -90,21 +90,21 @@ "code":"10" }, { - "desc":"The following typical scenarios are provided to help you better configure OBS permission control.Factors to consider before configuring permission control:Who are granted", + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", "product_code":"obs", - "title":"Typical Permission Control Scenarios", - "uri":"obs_40_0011.html", + "title":"Permission Configuration in Typical Scenarios", + "uri":"obs_40_0012.html", "doc_type":"perms-cfg", "p_code":"", "code":"11" }, { - "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "desc":"The permissions settings for typical scenarios are provided to facilitate permissions management.You need to consider the following factors before configuring permissions", "product_code":"obs", - "title":"Configuration Cases in Typical Permission Control Scenarios", - "uri":"obs_40_0012.html", + "title":"Typical Permissions Scenarios", + "uri":"obs_40_0011.html", "doc_type":"perms-cfg", - "p_code":"", + "p_code":"11", "code":"12" }, { @@ -113,49 +113,49 @@ "title":"Granting Permissions to an IAM User Under the Account", "uri":"obs_40_0013.html", "doc_type":"perms-cfg", - "p_code":"12", + "p_code":"11", "code":"13" }, { - "desc":"This topic describes how to grant an IAM user the permissions required to create and list buckets. An IAM user with this permission can create buckets. The created bucket", + "desc":"This topic describes how to grant an IAM user the permissions to create and list buckets. An IAM user with this permission can create and list buckets. The created bucket", "product_code":"obs", - "title":"Granting an IAM User the Permissions Required to List and Create Buckets", + "title":"Granting an IAM User the Permissions to Create and List Buckets", "uri":"obs_40_0014.html", "doc_type":"perms-cfg", "p_code":"13", "code":"14" }, { - "desc":"This topic describes how to grant an IAM user the read and write permissions on an OBS bucket.You are advised to use bucket policies to grant resource-level permissions t", + "desc":"This topic describes how to grant an IAM user the read/write permission on an OBS bucket.To grant resource-level permissions to an IAM user, use a bucket policy.After con", "product_code":"obs", - "title":"Granting an IAM User the Read and Write Permissions on a Bucket", + "title":"Granting an IAM User the Read/Write Permission on a Bucket", "uri":"obs_40_0015.html", "doc_type":"perms-cfg", "p_code":"13", "code":"15" }, { - "desc":"This topic describes how to grant an IAM user the permissions required to perform specific operations on an OBS bucket. Below describes how to grant the bucket deletion p", + "desc":"This topic describes how to grant an IAM user the permissions required to delete a bucket.To grant other permissions, select required actions from Action Name in the buck", "product_code":"obs", - "title":"Granting an IAM User the Permissions Required to Perform Specific Operations on a Specific Bucket", + "title":"Granting an IAM User the Specified Permissions for a Bucket", "uri":"obs_40_0016.html", "doc_type":"perms-cfg", "p_code":"13", "code":"16" }, { - "desc":"This topic describes how to grant an IAM user the read permission on an object or a set of objects in an OBS bucket.You are advised to use bucket policies to grant resour", + "desc":"This topic describes how to grant an IAM user the read permissions on an object or a set of objects in an OBS bucket.To grant resource-level permissions to an IAM user, u", "product_code":"obs", - "title":"Granting an IAM User the Read Permission on a Specific Object", + "title":"Granting an IAM User the Read Permissions on Specific Objects", "uri":"obs_40_0017.html", "doc_type":"perms-cfg", "p_code":"13", "code":"17" }, { - "desc":"This topic describes how to grant an IAM user certain permissions on specific objects in a bucket. Below explains how to grant the object download permission.If you need ", + "desc":"This topic describes how to grant an IAM user the permissions to download specific objects from a bucket.To grant other permissions, select required actions from Action N", "product_code":"obs", - "title":"Granting an IAM User the Permissions Required to Perform Specific Operations on Certain Objects", + "title":"Granting an IAM User the Specific Permissions on Specific Objects", "uri":"obs_40_0018.html", "doc_type":"perms-cfg", "p_code":"13", @@ -167,11 +167,11 @@ "title":"Granting Permissions to Multiple IAM Users or User Groups Under the Account", "uri":"obs_40_0019.html", "doc_type":"perms-cfg", - "p_code":"12", + "p_code":"11", "code":"19" }, { - "desc":"This topic describes how to grant multiple IAM users or user groups all permissions on all OBS resources. Users with this permission can perform any OBS operation.IAM cus", + "desc":"This topic describes how to grant multiple IAM users or user groups all permissions on all OBS resources. Users with this permission can perform any operations on OBS.Use", "product_code":"obs", "title":"Granting IAM User Groups All Permissions on All OBS Resources", "uri":"obs_40_0020.html", @@ -180,7 +180,7 @@ "code":"20" }, { - "desc":"This topic describes how to use the OBS-related system roles and policies preset in IAM to grant basic operation permissions on all OBS resources to multiple IAM users or", + "desc":"This topic describes how to use OBS system roles and policies preset in IAM to grant basic operation permissions for all OBS resources to multiple IAM users or user group", "product_code":"obs", "title":"Granting IAM User Groups Basic Permissions on All OBS Resources", "uri":"obs_40_0021.html", @@ -189,27 +189,27 @@ "code":"21" }, { - "desc":"This topic describes how to grant multiple IAM users or user groups specific permissions on all OBS resources.IAM custom policiesAfter the configuration is complete, you ", + "desc":"This topic describes how to grant multiple IAM users or user groups specified permissions for all OBS resources.Use an IAM custom policy to configure the permissions.Afte", "product_code":"obs", - "title":"Granting IAM User Groups Specified Permissions on All OBS Resources", + "title":"Granting IAM User Groups Specific Permissions for All OBS Resources", "uri":"obs_40_0022.html", "doc_type":"perms-cfg", "p_code":"19", "code":"22" }, { - "desc":"This topic describes how to grant certain operation permissions on specific OBS resources (can be a bucket or an object) to multiple IAM users or user groups.IAM custom p", + "desc":"This topic describes how to grant specific operation permissions on specific OBS resources (a bucket or an object) to multiple IAM users or user groups.Use an IAM custom ", "product_code":"obs", - "title":"Granting IAM User Groups Specified Permissions on Certain OBS Resources", + "title":"Granting IAM User Groups Specific Permissions on Specific OBS Resources", "uri":"obs_40_0023.html", "doc_type":"perms-cfg", "p_code":"19", "code":"23" }, { - "desc":"This topic describes how to grant certain operation permissions on specific folders in an OBS bucket to multiple IAM users or user groups.IAM custom policiesAfter the con", + "desc":"This topic describes how to grant specified permissions for a folder in an OBS bucket to multiple IAM users or user groups.Use an IAM custom policy to configure the permi", "product_code":"obs", - "title":"Granting IAM User Groups Specified Permissions on Certain OBS Folders", + "title":"Granting IAM User Groups Specific Permissions on a Folder", "uri":"obs_40_0044.html", "doc_type":"perms-cfg", "p_code":"19", @@ -221,22 +221,22 @@ "title":"Granting Permissions to Other Accounts", "uri":"obs_40_0024.html", "doc_type":"perms-cfg", - "p_code":"12", + "p_code":"11", "code":"25" }, { - "desc":"This topic describes how to grant other accounts (excluding the IAM users under them) the read and write permissions on OBS buckets. For details about how to grant permis", + "desc":"This topic describes how to grant other accounts (excluding the IAM users under them) the read/write permission for OBS buckets. For details about how to grant permission", "product_code":"obs", - "title":"Granting an Account the Read and Write Permissions on a Bucket", + "title":"Granting Other Accounts the Read/Write Permission for a Bucket", "uri":"obs_40_0025.html", "doc_type":"perms-cfg", "p_code":"25", "code":"26" }, { - "desc":"This topic describes how to grant other accounts (excluding the IAM users under them) specific operation permissions on OBS buckets. For details about how to grant permis", + "desc":"This topic describes how to grant other accounts (excluding the IAM users under them) specific permissions for OBS buckets. For details about how to grant permissions to ", "product_code":"obs", - "title":"Granting an Account the Specified Permissions on a Bucket", + "title":"Granting Other Accounts the Specified Permissions for a Bucket", "uri":"obs_40_0026.html", "doc_type":"perms-cfg", "p_code":"25", @@ -245,7 +245,7 @@ { "desc":"This topic describes how to grant IAM users the permissions to access OBS buckets and resources in them.The following describes how to grant the permissions to upload and", "product_code":"obs", - "title":"Granting IAM Users Under an Account the Access to a Bucket and Resources in the Bucket", + "title":"Granting IAM Users Under an Account the Access to a Bucket and the Resources in It", "uri":"obs_40_0027.html", "doc_type":"perms-cfg", "p_code":"25", @@ -254,16 +254,16 @@ { "desc":"This case describes how to grant other accounts (excluding IAM users under the account) the read permission for an object or a type of objects in an OBS bucket. For detai", "product_code":"obs", - "title":"Granting an Account Read Permissions on Certain Objects", + "title":"Granting Other Accounts the Read Permission for Certain Objects", "uri":"obs_40_0028.html", "doc_type":"perms-cfg", "p_code":"25", "code":"29" }, { - "desc":"This case describes how to grant other accounts the specified operation permission on a specified object in an OBS bucket. The following describes how to grant the permis", + "desc":"This section describes how to grant other accounts the permissions to download an object from a bucket.To grant other permissions, select required actions from Action Nam", "product_code":"obs", - "title":"Granting an Account the Specified Permissions on Certain Objects", + "title":"Granting Other Accounts Specific Permissions for Specific Objects", "uri":"obs_40_0029.html", "doc_type":"perms-cfg", "p_code":"25", @@ -275,22 +275,22 @@ "title":"Granting Permissions to Anonymous Users", "uri":"obs_40_0030.html", "doc_type":"perms-cfg", - "p_code":"12", + "p_code":"11", "code":"31" }, { "desc":"If a bucket needs to be accessed by anonymous users, you can configure a bucket policy and bucket ACL to grant the access permission to anonymous users. The following use", "product_code":"obs", - "title":"Granting Anonymous Users Public Read Permissions on a Bucket", + "title":"Granting Anonymous Users the Public Read Permission for a Bucket", "uri":"obs_40_0031.html", "doc_type":"perms-cfg", "p_code":"31", "code":"32" }, { - "desc":"If all objects in a folder need to be accessible to anonymous users, you can configure a bucket policy to grant anonymous users the permission to access the folder.The pr", + "desc":"If all objects in a folder need to be accessible to anonymous users, you can configure a bucket policy to grant anonymous users the permission to access the folder.After ", "product_code":"obs", - "title":"Granting Anonymous Users Public Read Permissions on a Directory", + "title":"Granting Anonymous Users the Read Permission for a Directory", "uri":"obs_40_0032.html", "doc_type":"perms-cfg", "p_code":"31", @@ -299,7 +299,7 @@ { "desc":"Enterprise A stores a large volume of map data in OBS, and offers the data for public query. This enterprise sets a read permission for anonymous users, and provides the ", "product_code":"obs", - "title":"Granting Anonymous Users Public Read Permissions on Certain Objects", + "title":"Granting Anonymous Users the Read Permission for Certain Objects", "uri":"obs_40_0033.html", "doc_type":"perms-cfg", "p_code":"31", @@ -315,21 +315,21 @@ "code":"35" }, { - "desc":"This case describes how to use temporary access keys (temporary AK/SK and security token) to access OBS in temporary authorization mode.Assume that you want to enable an ", + "desc":"This case describes how to use temporary access keys (temporary AK/SK and security token) to access OBS.Assume that you want to enable an IAM user (user name: APPServer) ", "product_code":"obs", "title":"Granting Temporary Access to OBS", "uri":"obs_40_0037.html", "doc_type":"perms-cfg", - "p_code":"12", + "p_code":"11", "code":"36" }, { "desc":"This case describes how to restrict the source IP addresses that can access an OBS bucket. The following shows how to deny a client access whose source IP address is with", "product_code":"obs", - "title":"Preventing Specific IP Addresses from Accessing a Bucket", + "title":"Restricting Access to a Bucket for Specific IP Addresses", "uri":"obs_40_0036.html", "doc_type":"perms-cfg", - "p_code":"12", + "p_code":"11", "code":"37" }, { @@ -342,7 +342,7 @@ "code":"38" }, { - "desc":"A policy in JSON format is described as follows:Example:{ \n\"Statement\" : [{\n \"Sid\": \"ExampleStatementID1\",\n \"Principal\": \"*\",\n \"Effect\": \"Allow\", \n \"Act", + "desc":"A bucket policy in JSON format:Example:{ \n\"Statement\" : [{\n \"Sid\": \"ExampleStatementID1\",\n \"Principal\": \"*\",\n \"Effect\": \"Allow\", \n \"Action\": [\"ListBucke", "product_code":"obs", "title":"Bucket Policy Parameters", "uri":"obs_40_0041.html", @@ -351,9 +351,9 @@ "code":"39" }, { - "desc":"Bucket ACLs are used to control basic read and write access to buckets. Custom settings of bucket policies support more actions that can be performed on buckets. Bucket A", + "desc":"Bucket ACLs control read and write permissions on buckets. Custom bucket policies can control more actions on buckets. Bucket ACLs are a supplement to bucket policies, bu", "product_code":"obs", - "title":"Relationship Between Bucket Policies and Bucket ACLs", + "title":"Relationship Between Bucket ACLs and Bucket Policies", "uri":"obs_40_0043.html", "doc_type":"perms-cfg", "p_code":"38", diff --git a/docs/obs/perms-cfg/en-us_image_0000001436265909.png b/docs/obs/perms-cfg/en-us_image_0000001436265909.png deleted file mode 100644 index e6587d49..00000000 Binary files a/docs/obs/perms-cfg/en-us_image_0000001436265909.png and /dev/null differ diff --git a/docs/obs/perms-cfg/en-us_image_0000001335934590.png b/docs/obs/perms-cfg/en-us_image_0000001664558420.png similarity index 100% rename from docs/obs/perms-cfg/en-us_image_0000001335934590.png rename to docs/obs/perms-cfg/en-us_image_0000001664558420.png diff --git a/docs/obs/perms-cfg/obs_40_0001.html b/docs/obs/perms-cfg/obs_40_0001.html index 306635ff..54c0c78c 100644 --- a/docs/obs/perms-cfg/obs_40_0001.html +++ b/docs/obs/perms-cfg/obs_40_0001.html @@ -1,11 +1,11 @@ -
By default, OBS resources (buckets and objects) are private. Only resource owners can access their OBS resources. Without authorization, other users cannot access OBS. OBS permission control refers to granting permissions to other accounts or IAM users by editing access policies. For example, if you have a bucket, you can authorize another IAM user to upload objects to your bucket. You can also open buckets to non-public cloud users, so that anyone can access your buckets as public resources over the Internet. OBS offers different methods to help resource owners grant resource permissions to others as required, keeping data secure.
-OBS provides multiple permission control mechanisms, including IAM permissions, bucket policies, object ACLs, and bucket ACLs. Table 1 describes the mechanisms and application scenarios.
-By default, OBS resources (buckets and objects) are private. Only resource owners can access their OBS resources. Other users cannot access such resources without authorization. OBS permission control helps you control access from other accounts or IAM users. For example, you can authorize another IAM user to upload objects to your bucket. You can also grant permissions to non-public cloud users, so that they can access your bucket over the Internet. OBS provides different methods for resource owners to grant permissions to others as needed.
+OBS provides multiple permission control methods, including IAM permissions, bucket policies, object ACLs, and bucket ACLs. Table 1 describes the methods and their application scenarios.
+Method +
Relationship Between OBS Permissions and IAM PermissionsOBS provides multiple permission control mechanisms, including time-limited access to objects, object ACLs, bucket ACLs, and bucket policies. Some service-level permissions (for example, creating a bucket and listing all buckets) cannot be configured through OBS and can only be configured on IAM. OBS permissions apply only to resources (buckets and objects). To grant both OBS service-level and resource-level permissions, you must use IAM permissions or both IAM and OBS permissions. -Figure 2 Relationship between OBS permissions and IAM permissions
+![]() Relationships Between OBS Permissions and IAM PermissionsOBS provides multiple permission control methods, including time-limited access to objects, object ACLs, bucket ACLs, and bucket policies. Some service-level permissions (for example, creating a bucket and listing all buckets) cannot be configured through OBS and can only be configured on IAM. OBS permissions apply only to resources (buckets and objects). To grant both OBS service-level and resource-level permissions, you must use IAM permissions or both IAM and OBS permissions. +Figure 2 Relationships between OBS permissions and IAM permissions
![]() OBS Permission Control ElementsThe following factors determine the authorization result: -
For details about elements, see Bucket Policy Parameters. -Table 2 describes elements in different permission control mechanisms. +OBS Permission Control ElementsAuthorization is determined by: +
For details about these elements, see Bucket Policy Parameters. +Table 2 describes the elements in different permission control methods. -
The following table lists the common operations supported by each system-defined policy or role of OBS. Select the policies or roles as required. +The following table lists the common operations supported by system-defined permissions for OBS. You can refer to this table to select the permissions as required. -
Configuring IAM Permissions+Configuring IAM PermissionsExample Custom Policies
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Action |
-Actions which a statement applies to. This parameter specifies a set of all the operations supported by OBS. Its values are case insensitive. The value supports a wildcard character (*) that indicates all actions, for example, "Action":["List*", "Get*"]. + | Actions which a statement applies to. This parameter specifies a set of all the operations supported by OBS. Its values are case insensitive. You can use a wildcard character (*) to indicate all actions, for example, "Action":["List*", "Get*"]. |
Optional. Select either Action or NotAction. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
NotAction |
-An exception to a list of actions in the statement. All actions are performed except the one specified in NotAction. The value of this element is similar to Action. + | An exception to a list of actions in the statement. All actions are performed except the ones specified in NotAction. The value of this element is similar to Action. |
Optional. Select either Action or NotAction. |
@@ -198,7 +198,7 @@
Principal +
Bucket ACLTable 2 lists the access permissions of a bucket ACL. +Bucket ACLTable 2 lists the permissions of a bucket ACL. -
|
---|