- What's New
- Service Overview
- Billing
- Getting Started
-
User Guide
- Buying a Cloud Phone Server
- Accessing the Cloud Phone
- Cloud Phone Management
- Cloud Phone Server Management
-
Using AOSP
- Overview
- Automatic Application Authorization
- Loading Pictures
- Rooting
- Startup Script
- Automatic Installation of Applications
- Hiding Virtual Keys
- Hiding the Status Bar
- Disabling the Notification System
- Disabling Screenshot Protection
- Simulating Location Information
- App Installation Whitelist
- App Installation Blacklist
- Forcibly Installing a 32-Bit Application
- Dynamically Changing the System Language
- Background Process Management
- Texture Compression
- Restarting a Cloud Phone
- Device Emulation
- Cloud Phone Audio and Video
- Configuring a Route
- Permission Management
- Adjusting Resource Quotas
- Monitoring
- CTS
- Appendix
-
Best Practices
- Best Practices of Connecting to General-Purpose Cloud Phones
-
Best Practices of Cloud Phone Application Sharing
- Overview of Application Sharing
-
Usage Guide to Application Sharing
- Purchasing a Cloud Phone Server That Supports Application Sharing
- Preparing the TAR Package of an Application
- Pushing the TAR Package of an Application to a Cloud Phone Server
- Using the appctrl Command to Manage Shared Applications
- Deleting an Application
- Presetting Configuration Files by Sharing Applications
- appctrl Commands
- Installing an Application on Cloud Phones in Batches
- Modifying the Cloud Phone GPS Location
- Using the Cloud Phone Camera
- Using STF to Manage Cloud Phones in Batches
- Allowing a Cloud Phone Server to Access a Public Network Outside the Chinese Mainland
- Delegating CPH to Operate OBS Buckets
- Changing the AOSP Version of a Cloud Phone
- Change History
-
API Reference
- Before You Start
- API Overview
- Calling APIs
- Getting Started
-
Cloud Phone Server APIs
-
Cloud Phone Servers
- Querying cloud phone servers
- Querying the Details of a Cloud Phone Server
- Querying Flavors of Cloud Phone Servers
- Purchasing a Cloud Phone Server
- Restarting Cloud Phone Servers
- Changing the Cloud Phone Server for a Cloud Phone
- Pushing Shared Storage Files
- Querying Shared Storage Files
- Deleting Shared Storage Files
- Pushing Shared Applications
- Deleting a Shared Application
- Changing the Flavor of a Cloud Phone Server
- Modifying the Name of a Cloud Phone Server
- Bandwidth
-
Cloud Phones
- Querying Cloud Phones
- Querying Cloud Phone Details
- Obtaining the Cloud Phone Access Information
- Querying Cloud Phone Flavors
- Querying the Image of a Cloud Phone
- Resetting Cloud Phones
- Restarting Cloud Phones
- Stopping Cloud Phones
- Editing the Name of a Cloud Phone
- Updating Properties of Cloud Phones
- Exporting Data from Cloud Phones
- Restoring Data of Cloud Phones
- Diverting Cloud Phone Traffic
- Expanding the Data Disk of a Cloud Phone
- Tasks
- Keys
- Encoding Services
- ADB Commands
- Tags
- Images
-
Cloud Phone Servers
- Permissions Policies and Supported Actions
- Common Parameters
- Appendix
-
FAQs
-
Consulting
- What Are the Advantages of Huawei Cloud Phone Compared with Other Similar Solutions?
- Does Cloud Phone Support iOS?
- Are There Cloud Phone Root Permissions?
- Does Each Cloud Phone Has an Independent Public IP Address?
- How Is CPH Billed?
- How Do I Obtain the Project ID?
- How Do I Install Applications on a Cloud Phone?
- How Long Does It Take to Activate a Server After I Purchase It?
- What Should I Do If I Can't Find My Cloud Phone Server on the CPH Console?
- How Long Will Resources Be Released After My Cloud Phone Server Expires?
- What Can I Do If the Private Key File Is Lost?
- How Can I Know Whether the SSH Service Has Been Installed on My Local Device?
- What Are Common ADB Commands?
- Does the Cloud Phone Support Cameras?
- Does the Cloud Phone Support Facial Recognition?
- What Are the Security Group Authorization Rules for Cloud Phones Using Custom Networks?
-
SSH Tunnel Faults
- What Can I Do If the SSH Tunnel Fails to Be Established When I Access the Cloud Phone over the Public Network?
- What Does Message "Authorized users only. All activities may be monitored and reported." Indicate?
- What Can I Do If Message "too open" Is Displayed When I Am Establishing the SSH Tunnel?
- What Can I Do If Message "Permission denied" Is Displayed When I Am Establishing the SSH Tunnel?
- What Can I Do If Message "no match mac found" Is Displayed When I Am Establishing the SSH Tunnel?
- What Can I Do If Message "no matching key exchange method found" Is Displayed When I Am Establishing the SSH Tunnel?
- How Do I Keep an SSH Session Uninterrupted?
- What Can I Do If I Failed to Establish an SSH Tunnel?
- What Can I Do If an Error Occurs When I Invoke the Cloud Phone Query API?
- ADB Connection Faults
-
Consulting
- General Reference
Copied.
Before You Start
Welcome to Cloud Phone Host API Reference. Cloud Phone Host (CPH) provides you with cloud phone servers that are virtualized from Huawei Cloud Bare Metal Servers (BMSs). They run native Android and have the functions of virtual phones.
You can use APIs described in this document to manage cloud phone servers and cloud phones, such as purchasing a cloud phone server, querying cloud phones, querying applications deployed on cloud phones, modifying shared bandwidth, and restarting cloud phones. For details about all supported operations, see API Overview.
If you plan to access CPH through an API, ensure that you are familiar with CPH concepts. For details, see Service Overview.
Endpoints
An endpoint is the request address for calling an API. Endpoints vary depending on services and regions. For the endpoints of CPH, see Regions and Endpoints.
Concepts
- Account
An account is created upon successful registration with Huawei Cloud. The account has full access permissions for all of its cloud services and resources. It can be used to reset user passwords and grant user permissions. The account is a payment entity, which should not be used to perform routine management. For security purposes, create Identity and Access Management (IAM) users and grant them permissions for routine management.
- User
An IAM user is created by an account in IAM to use cloud services. Each IAM user has its own identity credentials (password and access keys).
API authentication requires information such as the account name, username, and password.
- Region
Regions are divided based on geographical location and network latency. Public services, such as Elastic Cloud Server (ECS), Elastic Volume Service (EVS), Object Storage Service (OBS), Virtual Private Cloud (VPC), Elastic IP (EIP), and Image Management Service (IMS), are shared within the same region. Regions are classified into universal regions and dedicated regions. A universal region provides universal cloud services for common tenants. A dedicated region provides specific services for specific tenants.
For details, see Region and AZ.
- AZ
An AZ comprises of one or more physical data centers equipped with independent cooling, fire extinguishing, moisture-proof, and electricity facilities. Computing, network, storage, and other resources in an AZ are logically divided into multiple clusters. AZs within a region are interconnected using high-speed optical fibers to allow you to build cross-AZ high-availability systems.
- Project
A project corresponds to a region. Default projects are defined to group and physically isolate resources (including computing, storage, and network resources) across regions. Users can be granted permissions in a default project to access all resources under their accounts in the region associated with the project. If you need more refined access control, create subprojects under a default project and create resources in subprojects. Then you can assign users the permissions required to access only the resources in the specific subprojects.
Figure 1 Project isolating model - Enterprise Project
Enterprise projects group and manage resources across regions. Resources in different enterprise projects are logically isolated. An enterprise project can contain resources of multiple regions, and resources can be added to or removed from enterprise projects.
For details about enterprise projects and about how to obtain enterprise project IDs, see Enterprise Management User Guide.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot