Querying Permission Details
Function
This API is provided for the administrator to query permission details.
The API can be called using both the global endpoint and region-specific endpoints. For IAM endpoints, see Regions and Endpoints.
URI
GET /v3/roles/{role_id}
| Parameter | Mandatory | Type | Description |
|---|---|---|---|
| role_id | Yes | String | Permission ID. For details about how to obtain a permission ID, see Listing Permissions. |
Request Parameters
| Parameter | Mandatory | Type | Description |
|---|---|---|---|
| Content-Type | Yes | String | Fill application/json;charset=utf8 in this field. |
| X-Auth-Token | Yes | String | Token with Security Administrator permissions. |
Response Parameters
| Parameter | Type | Description |
|---|---|---|
| Object | Permission information. |
| Parameter | Type | Description |
|---|---|---|
| domain_id | String | ID of the account to which the permission belongs. |
| flag | String | If this parameter is set to fine_grained, the permission is a system-defined policy. |
| description_cn | String | Description of the permission in Chinese. |
| catalog | String | Service catalog of the permission. |
| name | String | Permission name for internal use. For example, ccs_user is the internal name of the CCS User role for CCS. This parameter is carried in the token of a user, allowing the system to determine whether the user has permissions to access a specific cloud service. |
| description | String | Description of the permission. |
| Object | Permission resource link. | |
| id | String | Permission ID. |
| display_name | String | Permission name. |
| type | String | Display mode of the permission. NOTE:
|
| Object | Content of the permission. | |
| updated_time | String | Time when the permission was last updated. |
| created_time | String | Time when the permission was created. |
| Parameter | Type | Description |
|---|---|---|
| self | String | Resource link. |
| previous | String | Previous resource link. |
| next | String | Next resource link. |
| Parameter | Type | Description |
|---|---|---|
| Array of objects | Dependent permissions. | |
| Array of objects | Statement of the permission. | |
| Version | String | Policy version. NOTE:
|
| Parameter | Type | Description |
|---|---|---|
| catalog | String | Service catalog of the permission. |
| display_name | String | Display name of the permission. |
| Parameter | Type | Description |
|---|---|---|
| Action | Array of strings | Specific operation permission on a resource. A maximum of 100 actions are allowed. NOTE:
|
| Effect | String | Effect of the permission. The value can be Allow or Deny. If both Allow and Deny statements are found in a policy, the authentication starts from the Deny statements. Options:
|
| Condition | Object | Conditions for the permission to take effect. A maximum of 10 conditions are allowed. For details about the condition parameters, see Creating a Custom Policy. NOTE: Take the condition in the sample request as an example, the values of the condition key (obs:prefix) and string (public) must be equal (StringEquals). "Condition": {
"StringEquals": {
"obs:prefix": [
"public"
]
}
} |
| Resource | Array of strings | Cloud resource. The array can contain a maximum of 10 resource strings, and each string cannot exceed 128 characters. NOTE:
|
Example Request
GET https://iam.myhuaweicloud.com/v3/roles/{role_id} Example Response
Status code: 200
The request is successful.
{
"role": {
"domain_id": null,
"description_cn": "Description of the permission in Chinese",
"catalog": "VulnScan",
"name": "wscn_adm",
"description": "Vulnerability Scan Service administrator of tasks and reports.",
"links": {
"next": null,
"previous": null,
"self": "https://iam.myhuaweicloud.com/v3/roles/0af84c1502f447fa9c2fa18083fbb87e"
},
"id": "0af84c1502f447fa9c2fa18083fbb87e",
"display_name": "VSS Administrator",
"type": "XA",
"policy": {
"Version": "1.0",
"Statement": [
{
"Action": [
"WebScan:*:*"
],
"Effect": "Allow"
}
],
"Depends": [
{
"catalog": "BASE",
"display_name": "Server Administrator"
},
{
"catalog": "BASE",
"display_name": "Tenant Guest"
}
]
}
}
} Status Codes
| Status Code | Description |
|---|---|
| 200 | The request is successful. |
| 400 | Invalid parameters. |
| 401 | Authentication failed. |
| 403 | Access denied. |
| 404 | The requested resource cannot be found. |
Error Codes
None
Last Article: Listing Permissions
Next Article: Querying Permissions of a User Group for the Global Service Project
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.