- What's New
- Function Overview
- Service Overview
- Billing
- Getting Started
-
User Guide
- Overview
- Enabling and Using Database Audit (by Installing Agents)
- Enabling and Using Database Audit (Without Installing Agents)
- Enabling and Using Database Security Encryption
- Upgrading the Database Audit Instance Version
- Configuring Audit Rules
- Viewing Audit Results
- Notification Settings Management
- Viewing Monitoring Information
- Backing Up and Restoring Database Audit Logs
-
Other Operations
- Managing Database Audit Instances
- Viewing the Instance Overview
- Managing Databases and Agents
- Uninstalling an Agent
- Management an Audit Scope
- Viewing Information About SQL Injection Detection
- Managing Risky Operations
- Managing Privacy Data Protection Rules
- Managing Audit Reports
- Managing Backup Audit Logs
- Viewing Operation Logs
- Key Operations Recorded by CTS
- Monitoring
- Shared VPC
-
Database Security Encryption Management
- Instance Management
- Database Security Encryption Instance Management
-
System administrator operation guide
- Platform Management
- Changing the Security Password
- Initializing a Key
- Adding Data Assets
- Service Test and Analysis
- Sensitive Data Discovery
-
Data Encryption and Decryption
- Setting Encryption Parameters
- Checking the Encryption Algorithm
- Simulated Encryption Test
- Configuring an Encryption Task
- Managing Authorization
- Simulated Decryption Test
- Configuring a Decryption Task
- Encryption Table Management
- Rolling Back the Table Structure
- Installing the Bypass Plug-in
- Querying Application Access Records
- Dynamic Data Masking
- Key Management
- System Management
- Security Administrator Operation Guide
- Operation Guide for Audit Administrators
- Permission Control
-
Best Practices
- Auditing a User-built Database on ECS
- Auditing an RDS DB instance (with Agents)
- Auditing an RDS DB Instance (Without Agents)
- Deploying the Database Audit Agent in a Container
- Checking for Slow SQL Statements
- Checking for Data Reduction
- Checking for Dirty Tables
- Configuring Oracle RAC Cluster Audit
- Meeting Database Audit Compliance Requirements
- Configuring Database Audit Instance Rules
- DBSS Security Best Practices
-
API Reference
- Before You Start
- Calling APIs
-
API
- Querying on the Management Side
- Dashboard
-
Data Reports
- Querying Audit SQL Statements
- Obtaining Details About a Specified SQL Statement
- Obtaining SQL Distribution Statistics in a Specified Period
- Obtaining Statistics on Query Sessions in a Specified Period
- Obtaining the Distribution of Risky Operations in a Specified Period
- Obtaining SQL Injection Distribution Statistics in a Specified Period
- Obtaining the Distribution of SQL Statements in a Specified Period
- Obtaining Risk Distribution Statistics in a Specified Period
- Querying Database User Session Distribution
- Querying Client Session Distribution
- Querying Historical Trend Data
- Report Management
-
Audit Instance
- Creating an Audit Instance in Pay-Per-Use Billing Mode
- Deleting an Audit Instance
- Creating an Audit Instance in Yearly/Monthly Billing Mode
- Querying Account Quota Information
- Querying Information About an Instance Creation Task
- Querying the Audit Instance List
- Querying ECS Specifications
- Modifying a Security Group
- Querying User Operation Logs
- Starting an Audit Instance
- Stopping an Audit Instance
- Restarting an Audit Instance
- Updating Audit Instance Information
- Obtaining Instance Monitoring Data
- Configuring the Time Zone of an Audit Instance
- Trigger the audit instance upgrade.
- Querying Whether a Tenant's Instance Can Be Upgraded
- Alarm information
- Auditing a Database
- Auditing Agent
- Audit Rules - Audit Scope
- Audit Rule - SQL Injection
-
Audit Rules - Privacy Data Protection
- Querying a Privacy Data Masking Rule
- Obtaining Privacy Data Result Set Switch
- Enabling or Disabling Result Set Storage
- Obtaining the Privacy Data Anonymization Switch
- Enabling or Disabling the Privacy Data Masking Function
- Enabling or Disabling a Single Privacy Data Masking Rule
- Deleting a Privacy Data Masking Rule
- Modifying and Editing a Privacy Data Masking Rule
- Adding a Privacy Data Anonymization Rule
- Audit Rule - Risky Operation
- SQL Whitelist
- Backup Management
- Risk Data Export
-
Enhanced O&M Management
- Obtaining Database O&M Cluster Instances
- Changing the Name of a Database O&M Instance
- Unbinding an EIP from a Database O&M Instance
- Binding an EIP to a Database O&M Instance
- Changing the Security Group of a Database O&M Instance
- Resetting the Password of a Database O&M Instance
- Restarting a Database O&M Instance
- Stopping a Database O&M Instance
- Starting a Database O&M Instance
- Deleting a Database O&M Instance
- Buying a Yearly/Monthly Database O&M Instance
-
Encryption Enhancement Management
- Listing Database Encryption Instances
- Changing the Name of a Database Encryption Instance
- Unbinding an EIP from an Encrypted Database Instance
- Binding the EIP of the Database Encryption Instance
- Changing the Security Group of an Encrypted Instance
- Resetting the Password of an Encrypted Database Instance
- Restarting an Encrypted Database Instance
- Stopping a Database Encryption Instance
- Starting the Database Encryption Instance
- Deleting an Encrypted Database Instance
- Purchasing an Encrypted Database Instance in Yearly/Monthly Mode
- TMS Tag
-
APIs to Be Taken Offline
- Deleting an Audit Instance (To Be Brought Offline)
- Querying the Database List (To Be Brought Offline)
- Creating an Audit Instance in Yearly/Monthly Billing Mode (To Be Brought Offline)
- Querying Account Quota Information (To Be Brought Offline)
- Enabling/Disabling Risk Rules (To Be Taken Offline)
- Querying Information About an Instance Creation Task (To Be Brought Offline)
- Querying the Database Agent List (To Be Brought Offline)
- Querying the Audit Instance List (To Be Brought Offline)
- Querying ECS Specifications (To Be Brought Offline)
- Adding an RDS Database (To Be Brought Offline)
- Querying AZ Information (To Be Brought Offline)
- Modifying an Instance Security Group (To Be Brought Offline)
- Adding a Self-Built Database (To Be Brought Offline)
- Querying User Operation Logs (To Be Brought Offline)
- Adding an RDS Database (To Be Brought Offline)
- Enabling an Audit Instance [To Be Brought Offline]
- Querying Audit Alarm Information (To Be Brought Offline)
- Querying Audit SQL Statements (To Be Brought Offline)
- Deleting a Database (To Be Brought Offline)
- Disabling Audit Instances (To Be Brought Offline)
- Enabling and Disabling the Database (To Be Brought Offline)
- Restarting an Audit Instance (To Be Brought Offline)
- Updating Audit Instance Information (To Be Brought Offline)
- Adding an Audit Database Agent (to Be Brought Offline)
- Deleting a Database Agent (To Be Brought Offline)
- Querying the Audit Scope Policy List (To Be Brought Offline)
- Enabling or Disabling the Agent (To Be Brought Offline)
- Downloading the Audit Agent (to Be Brought Offline)
- Querying SQL Injection Rules (To Be Brought Offline)
- Querying Risk Rule Policies (To Be Brought Offline)
- Querying a Risk Rule Policy (To Be Brought Offline)
- Querying Privacy Data Desensitization Rules (To Be Brought Offline)
- Obtaining Instance Alarm Configurations (To Be Brought Offline)
- Setting Instance Alarm Configurations (To Be Brought Offline)
- Appendix
-
FAQs
-
Product Consulting
- What Is Database Audit?
- What Are the Differences Between DBSS Database Audit and RDS SQL Audit?
- What Editions Does DBSS Provide?
- What Databases on Huawei Cloud Does DBSS Protect?
- What Databases Does DBSS Support?
- Why Can't I See the Instance that Is Being Created After I Purchased It?
- Will My Services Be Affected If I Do Not Renew DBSS After It Expires?
- Does Database Audit Support Offline or Non-Huawei Cloud Databases?
- What Are Regions and AZs?
- Does DBSS Support Real-Time Data Masking?
- Can DBSS Audit Databases Across Subnets?
- Is There Any Restriction on the Gateway IP Address of DBSS Audit Instances?
-
Purchase
- Which Subnet Should I Choose When Purchasing an Instance?
- Why Do I Need to Select a VPC When Buying an Instance?
- How Many Database Audit Instances Can I Purchase in the Same Region?
- What Do I Do If a Message Indicating Insufficient Quota Is Displayed During Instance Purchase?
- How Do I Renew Database Audit?
- How Do I Unsubscribe from DBSS?
-
Functions
- Can Database Audit Be Used Across AZs?
- Does Database Audit (in Bypass Mode) Affect My Services?
- Is the Database Audit Function Available to Users Other Than the Buyer?
- What Are the Functions of Database Audit?
- Supported Database Types
- What OSs Can I Install the Database Audit Agent On?
- Does Database Audit Support Bidirectional Audit?
- Can I Audit Databases Across Different VPCs?
- Can Applications Using TLS Connections Be Audited?
- How Long Is the Database Audit Data Stored by Default?
- How Soon Can I Receive an Alarm Notification If an Exception Occurs in Database Audit?
- Is the Total Number Of Alarms Every Day the Same as that of Emails?
- Why I Cannot Preview the Database Security Audit Report Online?
- If I Use Middleware at the Service Side, Will It Affect Database Audit?
- Can DBSS Capture SQL Statements Executed by Third-Party Tools?
- Can DBSS Be Deployed Off the Cloud?
- Can I Change the VPC of a DBSS Instance?
- How Do I Interconnect with DBSS Audit Data Storage?
- What Should I Do If an Alarm of Insufficient DBSS Capacity Is Displayed?
- How Many Database Instances Can Be Audited by a Database Audit Instance?
-
Agent
- Which Functions Do the Database Audit Agent Provide?
- On What Windows Versions Can I Install the Agent?
- On What Linux OSs Can I Install the Agent?
- What Is the Process Name of the Database Audit Agent?
- (Linux OS) What Should I Do If I Lack the Permission to Run the Agent Installation Script?
- (Linux OS) Where Are the Logs of the Database Audit Agent Saved?
- When Should I Select an Existing Agent?
- What Do I Do If the Database Audit Agent Is Hibernating?
- How Do I Deploy the Agent If I Have an RDS Database That Connects to Multiple ECSs?
- How Do I Determine Where to Install an Agent?
- How Do I Run a Database Audit Agent?
- How Do I Check the Status of the Database Audit Agent?
- How Do I Download a Database Audit Agent?
- How Do I Uninstall a Database Audit Agent?
- Can I Modify the CPU and Memory Thresholds of the Agent?
- How Do I Install the Agent (in Linux OS)?
- How Do I Install the Agent (in Windows OS)?
- What Do I Do If the Communication Between the Agent and Database Audit Instance Is Abnormal?
- How Many Resources Are Consumed by an Agent When It Runs on a Node?
- What Do I Do If Agent Installation Fails?
- What Do I Do If the Error Message "unsupport this Linux version, please check your Linux version with install document!" Is Displayed During Agent Installation?
-
Operations
- How Do I Configure Database Audit?
- How Do I Disable SSL for a Database?
- How Do I Set the INSERT Audit Policy for Database Audit?
- How Do I Verify My Database Audit Configuration?
- How Do I Set Database Audit Rules for All Databases?
- How Do I Check the Version of Database Audit?
- How Do I View All Alarms in Database Audit?
- How Do I Audit an RDS Database Accessed through Intranet (by Applications Off the Cloud)?
- How Do I Add an HBase Database and Perform Audit?
-
Troubleshooting
- Database Audit Is Running Properly But Generates No Audit Records
- Database Audit Is Unavailable
- Alarm Notifications Are Abnormal
- Why I Failed to Access the DBSS Purchase Page?
- What Do I Do If I Audit RDS Postgres Database but No Audit Result Is Displayed?
- DBSS Automatic Backup Failed and The Failure Code is "Export backup file failed"
-
Logs
- Can the Operation Logs of Database Audit Be Migrated?
- How Long Are the Operation Logs of Database Audit Saved by Default?
- How Do I Check the Operation Logs of Database Audit?
- How Does Database Audit Process Logs?
- How Do I Back Up the Database Audit Logs?
- Can Database Audit Logs Be Directly Saved to OBS?
- Backup Gets Stuck at the Backup File Uploading Phase
-
Product Consulting
- Videos
-
More Documents
-
User Guide (ME-Abu Dhabi Region)
- Overview
- Process Overview
- Applying for a Database Audit Instance
- Step 1: Add a Database
- Step 2: Add an Agent
- Step 3: Download and Install the Agent
- Step 4: Add a Security Group Rule
- Step 5: Enable Database Audit
- Adding Audit Scope
- Enabling or Disabling SQL Injection Detection
- Adding Risky Operations
- Configuring Privacy Data Protection Rules
- Viewing SQL Statement Details
- Viewing Session Distribution
- Viewing the Audit Dashboard
- Viewing Audit Reports
- Configuring Alarm Notifications
- Viewing the System Monitoring
- Viewing the Alarms
- Managing Database Audit Instances
- Viewing the Instance Overview
- Managing Databases and Agents
- Uninstalling an Agent
- Management an Audit Scope
- Viewing Information About SQL Injection Detection
- Managing Risky Operations
- Managing Privacy Data Protection Rules
- Managing Audit Reports
- Managing Backup Audit Logs
- Viewing Operation Logs
- Viewing Tracing Logs
- Auditable Operations
-
FAQs
- Product Consulting
-
Functions
- Does Database Audit (in Bypass Mode) Affect My Services?
- What Are the Functions of Database Audit?
- Supported Database Types
- What OSs Can I Install the Database Audit Agent On?
- Does Database Audit Support Bidirectional Audit?
- Can I Audit Databases Across Different VPCs?
- Can Applications Using TLS Connections Be Audited?
- How Long Is the Database Audit Data Stored by Default?
- How Soon Can I Receive an Alarm Notification If an Exception Occurs in Database Audit?
- Is the Total Number Of Alarms Every Day the Same as that of Emails?
- Why I Cannot Preview the Database Security Audit Report Online?
- If I Use Middleware at the Service Side, Will It Affect Database Audit?
- What Should I Do If an Alarm of Insufficient DBSS Capacity Is Displayed?
-
Agent
- Which Functions Do the Database Audit Agent Provide?
- On What Windows Versions Can I Install the Agent?
- On What Linux OSs Can I Install the Agent?
- What Is the Process Name of the Database Audit Agent?
- (Linux OS) What Should I Do If I Lack the Permission to Run the Agent Installation Script?
- (Linux OS) Where Are the Logs of the Database Audit Agent Saved?
- When Should I Select an Existing Agent?
- What Do I Do If the Database Audit Agent Is Hibernating?
- How Do I Determine Where to Install an Agent?
- How Do I Download a Database Audit Agent?
- How Do I Uninstall a Database Audit Agent?
- How Do I Install the Agent (in Windows OS)?
- What Do I Do If the Communication Between the Agent and Database Audit Instance Is Abnormal?
- How Many Resources Are Consumed by an Agent When It Runs on a Node?
- Operations
- Troubleshooting
-
Logs
- Can the Operation Logs of Database Audit Be Migrated?
- How Long Are the Operation Logs of Database Audit Saved by Default?
- How Do I Check the Operation Logs of Database Audit?
- How Does Database Audit Process Logs?
- How Do I Back Up the Database Audit Logs?
- Can Database Audit Logs Be Directly Saved to OBS?
- Change History
-
User Guide (Kuala Lumpur Region)
- Overview
- Applying for a Database Audit Instance
- Quick Start
- Step 1: Add a Database
- Step 2: Add an Agent
- Step 3: Add a Security Group Rule
- Step 4: Download and Install the Agent
- Step 5: Enable Database Audit
- Step 6: View Audit Results
- Configuring Audit Rules
- Viewing Monitoring Information
- Backing Up and Restoring Database Audit Logs
-
Other Operations
- Managing Database Audit Instances
- Viewing the Instance Overview
- Managing Databases and Agents
- Uninstalling an Agent
- Management an Audit Scope
- Viewing Information About SQL Injection Detection
- Managing Risky Operations
- Managing Privacy Data Protection Rules
- Managing Audit Reports
- Managing Backup Audit Logs
- Viewing Operation Logs
-
FAQs
- Product Consulting
-
Functions
- Does Database Audit (in Bypass Mode) Affect My Services?
- What Are the Functions of Database Audit?
- Supported Database Types
- What OSs Can I Install the Database Audit Agent On?
- Does Database Audit Support Bidirectional Audit?
- Can I Audit Databases Across Different VPCs?
- Can Applications Using TLS Connections Be Audited?
- How Long Is the Database Audit Data Stored by Default?
- How Soon Can I Receive an Alarm Notification If an Exception Occurs in Database Audit?
- Is the Total Number Of Alarms Every Day the Same as that of Emails?
- Why I Cannot Preview the Database Security Audit Report Online?
- If I Use Middleware at the Service Side, Will It Affect Database Audit?
- What Should I Do If an Alarm of Insufficient DBSS Capacity Is Displayed?
-
Agent
- Which Functions Do the Database Audit Agent Provide?
- On What Linux OSs Can I Install the Agent?
- What Is the Process Name of the Database Audit Agent?
- (Linux OS) What Should I Do If I Lack the Permission to Run the Agent Installation Script?
- (Linux OS) Where Are the Logs of the Database Audit Agent Saved?
- When Should I Select an Existing Agent?
- What Do I Do If the Database Audit Agent Is Hibernating?
- How Do I Determine Where to Install an Agent?
- How Do I Download a Database Audit Agent?
- How Do I Uninstall a Database Audit Agent?
- What Do I Do If the Communication Between the Agent and Database Audit Instance Is Abnormal?
- How Many Resources Are Consumed by an Agent When It Runs on a Node?
- What Do I Do If Agent Installation Fails?
- Operations
- Troubleshooting
-
Logs
- Can the Operation Logs of Database Audit Be Migrated?
- How Long Are the Operation Logs of Database Audit Saved by Default?
- How Do I Check the Operation Logs of Database Audit?
- How Does Database Audit Process Logs?
- How Do I Back Up the Database Audit Logs?
- Can Database Audit Logs Be Directly Saved to OBS?
- Backup Gets Stuck at the Backup File Uploading Phase
- Change History
-
User Guide (Paris and Amsterdam Regions)
- Overview
- Enabling and Using Database Audit (by Installing Agents)
- Enabling and Using Database Audit (Without Installing Agents)
- Adding Audit Scope
- Enabling or Disabling SQL Injection Detection
- Adding Risky Operations
- Configuring Privacy Data Protection Rules
- Viewing SQL Statement Details
- Viewing Session Distribution
- Viewing the Audit Dashboard
- Viewing Audit Reports
- Configuring Alarm Notifications
- Viewing the System Monitoring
- Viewing the Alarms
- Managing Database Audit Instances
- Viewing the Instance Overview
- Managing Databases and Agents
- Uninstalling an Agent
- Management an Audit Scope
- Viewing Information About SQL Injection Detection
- Managing Risky Operations
- Managing Privacy Data Protection Rules
- Managing Audit Reports
- Managing Backup Audit Logs
- Viewing Operation Logs
- Viewing Tracing Logs
- Auditable Operations
-
FAQs
-
Functions
- Does Database Audit (in Bypass Mode) Affect My Services?
- What Are the Functions of Database Audit?
- Supported Database Types
- What OSs Can I Install the Database Audit Agent On?
- Does Database Audit Support Bidirectional Audit?
- Can Applications Using TLS Connections Be Audited?
- How Long Is the Database Audit Data Stored by Default?
- How Soon Can I Receive an Alarm Notification If an Exception Occurs in Database Audit?
- Is the Total Number Of Alarms Every Day the Same as that of Emails?
- Why I Cannot Preview the Database Security Audit Report Online?
- If I Use Middleware at the Service Side, Will It Affect Database Audit?
-
Agent
- Which Functions Do the Database Audit Agent Provide?
- On What Linux OSs Can I Install the Agent?
- What Is the Process Name of the Database Audit Agent?
- (Linux OS) What Should I Do If I Lack the Permission to Run the Agent Installation Script?
- (Linux OS) Where Are the Logs of the Database Audit Agent Saved?
- When Should I Select an Existing Agent?
- What Do I Do If the Database Audit Agent Is Hibernating?
- How Do I Determine Where to Install an Agent?
- How Do I Download a Database Audit Agent?
- How Do I Uninstall a Database Audit Agent?
- What Do I Do If the Communication Between the Agent and Database Audit Instance Is Abnormal?
- Operations
- Troubleshooting
- Logs
-
Functions
- Change History
- API Reference (Paris and Amsterdam Regions)
-
User Guide (ME-Abu Dhabi Region)
- General Reference
Copied.
Making an API Request
This section describes the structure of a REST API request, and uses the IAM API for creating an IAM user as the administrator as an example to demonstrate how to call an API. The obtained token can then be used to authenticate the calling of other APIs.
Request URI
A request URI is in the following format:
{URI-scheme} :// {Endpoint} / {resource-path} ? {query-string}
Although a request URI is included in the request header, most programming languages or frameworks require the request URI to be transmitted separately.
- URI-scheme:
Protocol used to transmit requests. All APIs use HTTPS.
- Endpoint:
Domain name or IP address of the server bearing the REST service. The endpoint varies between services in different regions. It can be obtained from Regions and Endpoints.
For example, the endpoint of IAM in region CN-Hong Kong is iam.ap-southeast-1.myhuaweicloud.com.
- resource-path:
Access path of an API for performing a specified operation. Obtain the path from the URI of an API. For example, the resource-path of the API used to obtain a user token is /v3/auth/tokens.
- query-string:
Query parameter, which is optional. Ensure that a question mark (?) is included before each query parameter that is in the format of "Parameter name=Parameter value". For example, ?limit=10 indicates that a maximum of 10 data records will be displayed.
For example, to obtain an IAM token in the CN-Hong Kong region, obtain the endpoint of IAM (iam.ap-southeast-1.myhuaweicloud.com) for this region and the resource-path (/v3.0/OS-USER/users) in the URI of the API used for creating an IAM user. Then, construct the URI as follows:
https://iam.ap-southeast-1.myhuaweicloud.com/v3.0/OS-USER/users

To simplify the URI display in this document, each API is provided only with a resource-path and a request method. The URI-scheme of all APIs is HTTPS, and the endpoints of all APIs in the same region are identical.
Request Methods
The HTTP protocol defines the following request methods that can be used to send a request to the server:
- GET: requests the server to return specified resources.
- PUT: requests the server to update specified resources.
- POST: requests the server to add resources or perform special operations.
- DELETE: requests the server to delete specified resources, for example, an object.
- HEAD: same as GET except that the server must return only the response header.
- PATCH: requests the server to update partial content of a specified resource. If the resource does not exist, a new resource will be created.
For example, in the case of the API used to obtain a user token, the request method is POST. The request is as follows:
POST https://iam.ap-southeast-1.myhuaweicloud.com/v3.0/OS-USER/users
Request Header
You can also add additional header fields to a request, such as the fields required by a specified URI or HTTP method. For example, to request for the authentication information, add Content-Type, which specifies the request body type.
Common request header fields are as follows:
- Content-Type: specifies the request body type or format. This field is mandatory and its default value is application/json. Other values of this field will be provided for specific APIs if any.
- Authorization: specifies signature authentication information. This field is optional. When AK/SK authentication is enabled, this field is automatically specified when SDK is used to sign the request.
- X-Sdk-Date: specifies the time when a request is sent. This field is optional. When AK/SK authentication is enabled, this field is automatically specified when SDK is used to sign the request.
- X-Auth-Token: specifies a user token only for token-based API authentication. The user token is a response to the API used to obtain a user token. This API is the only one that does not require authentication.
- X-Project-ID: specifies subproject ID. This field is optional and can be used in multi-project scenarios. The X-Project-ID field is mandatory in the request header for accessing resources in a subproject through AK/SK-based authentication.
- X-Domain-ID: account ID, which is optional. When you call APIs of global services using AK/SK-based authentication, X-Domain-ID needs to be configured in the request header.
POST https://iam.ap-southeast-1.myhuaweicloud.com/v3.0/OS-USER/users
Content-Type: application/json
X-Sdk-Date: 20240416T095341Z
Authorization: SDK-HMAC-SHA256 Access=****************, SignedHeaders=content-type;host;x-sdk-date, Signature=****************
In addition to supporting token-based authentication, APIs also support authentication using access key ID/secret access key (AK/SK). During AK/SK-based authentication, an SDK is used to sign the request, and the Authorization (signature information) and X-Sdk-Date (time when the request is sent) header fields are automatically added to the request.
For more information, see AK/SK-based Authentication.
Request Body
The body of a request is often sent in a structured format as specified in the Content-Type header field. The request body transfers content except the request header.
The request body varies between APIs. Some APIs do not require the request body, such as the APIs requested using the GET and DELETE methods.
In the case of the API used to obtain a user token, the request parameters and parameter description can be obtained from the API request. The following provides an example request with a body included. Replace the italic fields in bold with the actual values.
- accountid: ID of the account to which the IAM user belongs.
- username: IAM username to be created.
- email: email address of the IAM user.
- **********: password of the IAM user.
POST https://iam.ap-southeast-1.myhuaweicloud.com/v3.0/OS-USER/users
Content-Type: application/json
X-Sdk-Date: 20240416T095341Z
Authorization: SDK-HMAC-SHA256 Access=****************, SignedHeaders=content-type;host;x-sdk-date, Signature=****************
{
"user": {
"domain_id": "accountid",
"name": "username",
"password": "**********",
"email": "email",
"description": "IAM User Description"
}
}
If all data required for the API request is available, you can send the request to call the API through curl, Postman, or coding.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot