- What's New
- Function Overview
- Service Overview
- Getting Started
-
User Guide
-
Instances
- Permissions Management
- Assigning Permissions Using IAM
- Creating a CBH Instance
- Checking Instance Details
- Resetting the Login Method for User admin
- Resetting the Password of User Admin
- Upgrading the CBH System Version
- Starting a CBH Instance
- Stopping a CBH Instance
- Restarting a CBH Instance
- Changing a VPC for a CBH Instance
- Changing Security Groups
- Binding an EIP to a CBH Instance
- Unbinding an EIP from a CBH Instance
- Allowing Access to Cloud Assets
- Managing Tags
- Key CBH Instance Operations Recorded by CTS
-
Logging In to the CBH System
- Overview
- Using a Web Browser to Log In to Your Bastion Host
- Using a Client to Log In to Your Bastion Host
- Configuring Multifactor Verification
-
Managing Login Security
- Configuring User Login Lockout
- Configuring the Login Password Policies
- Configuring Web Login Timeout and Authentication
- Updating a System Web Certificate
- Configuring the Mobile OTP Type
- Configuring the USB Key Vendor
- Configuring Policies to Disable Zombie Users (Available in V3.3.30.0 and Later Versions)
- Configuring the RDP Resource Client Proxy (Available in 3.3.26.0 and Later Versions)
- Enabling API Configuration (Included in V3.3.34.0 and Later Versions Only).
- Configuring Automatic Inspection (Available in V3.3.36.0 and Later)
- Configuring a Resource Account
- Configuring Client Login
- Configuring a User Expiration Reminder
- Configuring Session Limit
- Dashboard of the CBH System
- Department
- User
- Resource
- Policy
- Ticket
-
Operation
-
Host Operation
- Viewing the Host Resource List and Setting Resource Labels
- Logging In to Managed Resources Using a Web Browser for O&M
- Logging In to Resources Using an SSH Client for O&M
- Logging In to File Transfer Resources Using an FTP or SFTP Client
- Logging In to and Maintaining Database Resources Using an SSO Client
- Logging In to Hosts in Batches for O&M
- File Transmission
- Cooperation
- Enabling Forcible RDP Connections
- Application Operation
-
Host Operation
- Audit
- System Management
- Installing an Application Server
- Monitoring
-
Instances
- API Reference
- Best Practices
-
FAQs
-
Product Consulting
- What Are the Differences Between a CBH Instance and a CBH System?
- Which Security Hardening Measures Does CBH Provide?
- What Is the Number of Assets?
- What Is the Number of Concurrent Requests?
- Can I Use a CBH System to Centrally Manage My Cloud ERP or SAP Services?
- What Does Automatic O&M Include?
- How Do I Obtain an Enterprise Agreement Number?
- How Can I Configure Ports for a CBH Instance?
- Can CBH Manage Resources Under Multiple Subnets?
- Which Types of Databases Can I Manage in a CBH System?
- Regions and AZs
- About Purchase
- License
- About Backup, Specification Change, and Upgrade
-
About File Transfer
- What File Transfer Methods Can be Used in a CBH System?
- How Do I Use FTP/SFTP to Transfer Files to or From an SSH Host?
- How Do I Upload or Download Files When I Log In to Managed Hosts Using a Web Browser?
- What Is the Netdisk of a CBH System?
- How Do I Clear the Personal Net Disk Space?
- How Do I Configure File Management Permissions?
- Does CBH Check Security of Uploaded Files?
-
Billing, Renewals, and Unsubscriptions
- How Do I Renew a CBH Instance and Update the Mapped System Authorization?
- How Is CBH Billed?
- Can I Unsubscribe from a CBH Instance?
- How Is the CBH Instance Billed After I Change Specifications of the Instance?
- Will I Be Billed for Upgrading the CBH Software Version?
- How Do I Increase the CBH Instance Quota?
- How Do I Purchase a CBH Instance When the System Prompts that Resources Are Sold Out?
-
About CBH System Login
- Login Methods and Password Issues
-
Multifactor Verification
- How Can I Install an OTP Authentication Application on the Mobile Phone?
- Why Does the Mobile OTP Application Binding Operation Fail?
- How Do I Enable Mobile SMS Authentication For Logging In to the CBH System?
- How Do I Cancel Mobile SMS Authentication?
- How Can I Cancel Mobile OTP Authentication If No Mobile OTP Application is Bound to My Account?
- Why Does Login Fail When an Account That Has Mobile OTP Application Bound Is Used to Log In?
- Login Security Management
-
User, Resource, and Policy Configuration in a CBH System
- Users
-
Adding Resources to a CBH System
- How Do I Change the Password of a Managed Resource Account?
- How Do I Set a Sudo Privilege Escalation Account for the Managed Resource?
- How Do I Add a Label to Resources Managed in a CBH System?
- How Do I Import or Export Information of Host Resources in Batches?
- What Are the AK and SK of an Imported Host? How Can I Obtain Them?
- What Are the Statuses of a Managed Resource Account in a CBH System?
- Can I Share Labels of Managed Resources with Other System Users?
- Can I Manually Enter a Password to Log In to a Managed Resource Through the CBH System?
- Why Does the CBH System Fail to Identify Hosts Imported in Batches?
- How Do I Access Services Provided by the Intranet Through a CBH Instance?
- How Do I Add a Server with an IPv6 Address to a CBH Instance?
- What is an Empty Account?
- Policy Management
- System Configuration
-
Resources Managed in a CBH System
- Operation Management
-
O&M Operations
- What Login Methods Does CBH Provide?
- How Do I Create a Collaborative O&M Session?
- How Do I Use Resource Labels in the CBH System?
- How Do I Set the Resolution of the O&M Session Window When I Use a Web Browser for O&M?
- How Can I Use Shortcut Keys to Copy and Paste Text When a Web Browser Is Used for O&M?
- What Are the Shortcut Keys for O&M in CBH?
-
O&M Log Audit
- What Audit Logs Does CBH Provide?
- Can I Download Operation Recordings?
- Can I Delete CBH O&M Data for a Specific Day?
- Can I Back Up System Audit Logs to an OBS Bucket?
- How Long Can I Store Audit Logs in the CBH System?
- How Are Audit Logs in the CBH System Processed?
- Can I Audit User Operations If a User Logs In to Server A Through the CBH System and Then Logs In to Server B from Server A?
- Why Is the Playable Duration Shorter Than the Total Duration of a Session?
- Why Is There No Login Record in History Sessions While I Received a Resource Login Message?
-
Troubleshooting
-
CBH System Login Failures
- What Does a Login Exception Occur?
- Why Is the IP Address or MAC Address Blocked When I Log In to the CBH System?
- Why Am I Seeing Error Code 404 When I Log In to the CBH System?
- Why Am Seeing Error Code 499 When I Log In to the CBH System?
- What Are Possible Faults If I Log In to the CBH System as an Intranet User?
- Why Is a Host Inaccessible Through CBH?
- Why Does CBH Login Fail Through an ECS in a New VPC Connected with the VPC Where CBH Is via VPN or a VPC Peering Connection
-
CBH Managed Resource Login Failures
- Why Does an Exception Occur When I Log In to My Resources Managed in CBH?
- Why Am I Seeing Login Errors of Code: T_514 When I Use a Web Browser for Resource O&M?
- Why Am I Seeing Login Errors of Code: T_1006 When I Use a Web Browser for Resource O&M?
- Why Am I Seeing Login Errors of Code: C_515 When I Use a Web Browser for Resource O&M?
- Why Am I Seeing Login Errors of Code: C_519 When I Use a Web Browser for Resource O&M?
- Why Am I Seeing Login Errors of Code: C_769 When I Use a Web Browser for Resource O&M?
- Why Cannot I See the Accessible Resources in the Resource List?
- Why Does the Session Page Fail to Load When I Log In to the Managed Host Using a Web Browser?
- Why Is the Application Resource Inaccessible through CBH?
- Why Are Databases Managed in CBH Inaccessible with an SSO Tool?
- Why Does the Number of Concurrent Sessions Reach the Limit When I Use CBH to Log In to a Host Resource?
- Why a Black Block Is Displayed on the Mouse When the MSTSC Client Is Used to Access a Server Resource?
-
Maintenance Issues
- Why Does SMS Verification Code Fail to Send When I Log In to a CBH Instance?
- Why Am I Seeing a Message Indicating that the Number of Resources Has Reached the Limit When I Add a Resource to CBH?
- Why Does Verification of An Account for a Managed Host Fail?
- Why Am I Seeing Garbled Characters When I Open a System Data File?
- Why Does Login Timeout Frequently Occur During an O&M Session?
- Why Does the PL/SQL Client Display Garbled Characters During Application O&M?
- Why Is the Requested Session Denied After I Log In to a Managed Host?
- Why Does the CBH Traffic Bandwidth Exceed the Threshold?
- Why Text Cannot Be Copied When I Perform O&M Through a Web Browser?
- Which Types of Failures May Occur During the O&M?
- What Do I Do If an Exception Occurs When I Enter Chinese Characters Using WPS During the O&M of a Windows Server?
-
CBH System Login Failures
-
Product Consulting
- Videos
Permissions Management of CBH Instances
If you need to assign different permissions to employees in your enterprise to access your CBH instances, IAM is a good choice for fine-grained permissions management. IAM provides identity authentication, permissions management, and access control, helping you securely manage access to your HUAWEI CLOUD resources.
With IAM, you can create IAM users under your account for your employees, and assign permissions to the users to control their access to specific resource types. For example, you can create IAM users for the software developers and assign specific permissions to allow them to only use CBH instances but not to create, change specifications of, or upgrade CBH instances.
If your HUAWEI CLOUD account does not need individual IAM users for permissions management, then you may skip over this section.
IAM is free. You pay only for the resources in your account. For more information about IAM, see IAM Service Overview.
CBH Instance Permissions
By default, new IAM users do not have any permissions assigned. You can add a user to one or more groups to allow them to inherit the permissions from the groups to which they are added.
CBH is a project-level service deployed and accessed in specific physical regions. To assign CBH permissions to a user group, specify the scope as region-specific projects and select projects for the permissions to take effect. If All projects is selected, the permissions will take effect for the user group in all region-specific projects. When accessing a CBH instance, switch to a region where they have been authorized to use the CBH instance.
You can grant users permissions by using roles and policies.
- Roles: A type of coarse-grained authorization mechanism that defines permissions related to users responsibilities. Only a limited number of service-level roles for authorization are available. You need to also assign other dependent roles for the permission control to take effect. Roles are not ideal for fine-grained authorization and secure access control.
- Policies: A fine-grained authorization mechanism that defines permissions required to perform operations on specific cloud resources under certain conditions. This mechanism allows for more flexible policy-based authorization and meets secure access control requirements. For example, you can grant CBH users only the permissions for managing a certain type of resources. For details about the actions supported by CBH, see Permissions and Supported Actions.
Table 1 lists all the system-defined roles and policies supported by CBH instances.
Role/Policy Name |
Description |
Type |
Dependency |
---|---|---|---|
CBH FullAccess |
All permissions on CBH instances. |
System-defined policy |
None |
CBH ReadOnlyAccess |
Read-only permissions for CBH instances. Users who have read-only permissions granted can only view CBH instances but not configure services. |
System-defined policy |
None |
Table 2 lists the common operations for each system-defined policy or role of CBH instances. Select the policies or roles as required.
Operation |
CBH FullAccess |
CBH ReadOnlyAccess |
---|---|---|
Creating a CBH instance |
√ |
x |
Changing CBH instance specifications (changing specifications) |
√ |
x |
Querying the CBH instance list |
√ |
√ |
Upgrading the CBH system version |
√ |
x |
Querying total ECS quota |
√ |
x |
Binding or unbinding an EIP |
√ |
x |
Restarting a CBH instance |
√ |
x |
Starting a CBH instance |
√ |
x |
Stopping a CBH instance |
√ |
x |
Querying the AZ of a CBH instance |
√ |
x |
Checking whether an IPv6 CBH instance can be created |
√ |
x |
Checking network connection between the CBH instance and the license center |
√ |
x |
Modifying the network of the CBH instance to ensure that the CBH instance can communicate with the license center |
√ |
x |
Related Topics
CBH FullAccess Policy Content
{ "Version": "1.1", "Statement": [ { "Effect": "Allow", "Action": [ "cbh:*:*", "vpc:subnets:get", "vpc:publicIps:list", "vpc:vpcs:list", "vpc:securityGroups:get", "vpc:firewallGroups:get", "vpc:firewallPolicies:get", "vpc:firewallRules:get", "vpc:ports:get", "vpc:publicips:update", "vpc:securityGroups:create", "vpc:firewallRules:create", "vpc:firewallPolicies:addRule" "ecs:cloudServerFlavors:get", "evs:types:get" ] } ] }
CBH ReadOnlyAccess Policy Content
{ "Version": "1.1", "Statement": [ { "Effect": "Allow", "Action": [ "cbh:*:list*", "vpc:publicIps:list", "vpc:vpcs:list", "vpc:securityGroups:get", "vpc:subnets:get" ] } ] }
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.