- What's New
- Service Overview
- Getting Started
- User Guide
-
Best Practices
- Using a Custom Script to Implement Consistent Backup for MySQL
- Using a Custom Script to Implement Consistent Backup for SAP HANA
- Using a Custom Script to Implement Consistent Backup for Other Linux Applications
- Troubleshooting a Custom Script Error
- Verifying the Application-Consistent Backup Result (Linux)
- Verifying the Application-Consistent Backup Result (Windows)
- Protecting SQL Server in Failover Cluster Mode
- Protecting SQL Server in Always on Availability Groups Mode
- Change History
- API Reference
-
FAQs
-
About Concepts
- What Is CSBS?
- What Are Full Backup and Incremental Backup?
- What Is Consistent Backup?
- What Are the Differences Between CSBS and VBS?
- What Is a Backup Policy?
- What Are the Differences Between Backup and Disaster Recovery?
- What Are the Differences Between Backup and Snapshot?
- Why Is the Disk Space Usage Displayed in the File System Different from the Backup Size?
-
About Pricing
- How Is CSBS Billed?
- How Do Yearly/Monthly Resource Packages Function When I Have Bought More Than One?
- Are CSBS and VBS Resource Packages Interoperable Between CSBS and VBS?
- Why Am I Charged in Pay-per-use Mode Although I Have Purchased Resource Package?
- What Exactly Are the Function Package and the Storage Package?
- Will the CSBS Backups Displayed on the VBS Page Be Charged Repeatedly?
- How Do I Query CSBS Pay-Per-Use Billing Details?
- Why Is the Fee Deducted After a Backup Is Deleted?
- How Do I Disable CSBS?
- How Do I Stop CSBS from Charging?
-
About Backup
- Does CSBS Support Backing Up All EVS Disks on an ECS?
- Do I Need to Stop the ECS Before Backing It Up?
- Can an ECS with Application Systems Be Backed Up?
- What Are the Minimum Backup Frequency and Maximum Number of Retained Backups Supported by CSBS?
- How Can I Distinguish Automatic Backups From Manual Backups?
- How Can I Configure a Backup Policy?
- Can I Choose to Back Up Only Some Partitions of a Disk?
- Does CSBS Support Cross-Region Backup for ECSs?
- Which Types of Databases Can Be Backed Up Using Database Server Backup?
- How Do I Select Among Database Server Backup, Cloud Server Backup, and Disk Backup?
- How Do I Migrate ECS Data Across Regions Using CSBS?
- Which Time Zone Is the Automatic Backup Time Based On?
- What Can I Do If a Backup Cannot Be Deleted?
- About Restoration
- Others
-
About Concepts
- Troubleshooting
- Videos
- Glossary
-
More Documents
-
User Guide (Paris and Amsterdam Regions)
- Service Overview
- Getting Started
- Management Operations
-
FAQs
- About Concepts
-
About Backup
- Does CSBS Support Backing Up All EVS Disks on an ECS?
- Do I Need to Stop the ECS Before Backing It Up?
- Can an ECS with Application Systems Be Backed Up?
- What Are the Minimum Backup Frequency and Maximum Number of Retained Backups Supported by CSBS?
- How Can I Distinguish Automatic Backups From Manual Backups?
- Does CSBS Support Cross-Region Backup for ECSs?
- About Restoration
- Others
- Troubleshooting Cases
- Change History
- API Reference (Paris and Amsterdam Regions)
-
User Guide (Paris and Amsterdam Regions)
- General Reference
Show all
Copied.
Permissions Policies and Supported Actions
This section describes fine-grained permissions management for your CSBS. If your HUAWEI CLOUD account does not require individual IAM users, you can skip this section.
By default, new IAM users do not have permissions assigned. You need to add a user to one or more groups, and attach permissions policies or roles to these groups. Users inherit permissions from the groups to which they are added and can perform specified operations on cloud services based on the permissions.
You can grant users permissions by using roles and policies. Roles are a type of coarse-grained authorization mechanism that defines permissions related to user responsibilities. Policies define API-based permissions for operations on specific resources under certain conditions, allowing for more fine-grained, secure access control of cloud resources.
Policy-based authorization is useful if you want to allow or deny the access to an API.
An account has all the permissions required to call all APIs, but IAM users must be assigned the required permissions. The permissions required for calling an API are determined by the actions supported by the API. Only users who have been granted permissions allowing the actions can call the API successfully. For example, if an IAM user queries ECSs using an API, the user must have been granted permissions that allow the ecs:servers:list action.
Supported Actions
CSBS provides system-defined policies that can be directly used in IAM. You can also create custom policies and use them to supplement system-defined policies, implementing more refined access control. Operations supported by policies are specific to APIs. The following are common concepts related to policies:
- Permission: A statement in a policy that allows or denies certain operations.
- Action: Specific operations that are allowed or denied.
- Authorization scope: Type of projects in which policies can be used to grant permissions. A policy can be applied to IAM projects, enterprise projects, or both. Policies that contain actions for both IAM and enterprise projects can be used and take effect for both IAM and Enterprise Management. Policies that only contain actions for IAM projects can be used and only take effect for IAM. For details about the differences between IAM and enterprise projects, see Differences Between IAM and Enterprise Management.
- APIs: REST APIs that can be called by a user who has been granted specific permissions.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot