Updated on 2025-11-06 GMT+08:00

Elastic IP

IAM provides system-defined identity policies to define common actions supported by cloud services. You can also create custom identity policies using the actions supported by cloud services for more refined access control.

In addition to IAM, the Organizations service also provides Service Control Policies (SCPs) to set access control policies.

SCPs do not actually grant any permissions to an entity. They only set the permissions boundary for the entity. When SCPs are attached to an organizational unit (OU) or a member account, the SCPs do not directly grant permissions to that OU or member account. Instead, the SCPs only determine what permissions are available for that member account or those member accounts under that OU. The granted permissions can be applied only if they are allowed by the SCPs.

To learn more about how IAM is different from Organizations for access control, see How IAM Is Different from Organizations for Access Control?.

This section describes the elements used by IAM custom identity policies and Organizations SCPs. The elements include actions, resources, and conditions.

Actions

Actions are specific operations that are allowed or denied in an identity policy.

  • The Access Level column describes how the action is classified (List, Read, or Write). This classification helps you understand the level of access that an action grants when you use it in an identity policy.
  • The Resource Type column indicates whether the action supports resource-level permissions.
    • You can use a wildcard (*) to indicate all resource types. If this column is empty (-), the action does not support resource-level permissions and you must specify all resources ("*") in your identity policy statements.
    • If this column includes a resource type, you must specify the URN in the Resource element of your identity policy statements.
    • Required resources are marked with asterisks (*) in the table. If you specify a resource in a statement using this action, then it must be of this type.

    For details about the resource types defined by EIP, see Resources.

  • The Condition Key column contains keys that you can specify in the Condition element of an identity policy statement.
    • If the Resource Type column has values for an action, the condition key takes effect only for the listed resource types.
    • If the Resource Type column is empty (-) for an action, the condition key takes effect for all resources that action supports.
    • If the Condition Key column is empty (-) for an action, the action does not support any condition keys.

    For details about the condition keys defined by EIP, see Conditions.

  • The Alias column lists the policy actions that are configured in identity policies. With these actions, you can use APIs for policy-based authorization. For details, see Policies and Identity Policies.

The following table lists the actions that you can define in identity policy statements for EIP.

Table 1 Actions supported by EIP

Action

Description

Access Level

Resource Type (*: required)

Condition Key

Alias

eip:publicIps:createTags

Grants permission to create a tag for an EIP.

Tagging

publicip *

vpc:publicipTags:create

-

eip:publicIps:listTags

Grants permission to query tags of a specified EIP.

List

publicip *

-

vpc:publicipTags:get

eip:publicIps:deleteTags

Grants permission to delete an EIP tag.

Tagging

publicip *

vpc:publicipTags:delete

-

g:TagKeys

eip:publicIps:count

Grants permission to count EIPs.

List

publicip *

-

vpc:publicIps:list

eip:bandwidths:create

Grants permission to create shared bandwidth.

Write

bandwidth *

-

vpc:bandwidths:create

-

g:EnterpriseProjectId

eip:bandwidths:batchCreate

Grants permission to batch assign shared bandwidth.

Write

bandwidth *

-

-

eip:bandwidths:list

Grants permission to query shared bandwidths using search criteria.

List

bandwidth *

-

vpc:bandwidths:list

-

g:EnterpriseProjectId

eip:bandwidths:update

Grants permission to update information about shared bandwidth.

Write

bandwidth *

vpc:bandwidths:update

eip:bandwidths:get

Grants permission to query details about a shared bandwidth.

Read

bandwidth *

vpc:bandwidths:get

eip:bandwidths:delete

Grants permission to delete shared bandwidth.

Write

bandwidth *

vpc:bandwidths:delete

eip:bandwidthPkgs:list

Grants permission to query bandwidth add-on packages using search criteria.

List

bandwidthPkg *

-

vpc:bandwidths:get

eip:bandwidthPkgs:update

Grants permission to update information about bandwidth add-on package.

Write

bandwidthPkg *

-

vpc:bandwidths:update

eip:publicIps:create

Grants permission to assign EIP.

Write

publicip *

-

vpc:publicIps:create

-

g:EnterpriseProjectId

eip:publicIps:batchCreate

Grants permission to batch assign EIPs.

Write

publicip *

-

vpc:publicIps:create

-

eip:publicIps:list

Grants permission to query EIPs.

List

publicip *

-

vpc:publicIps:list

-

g:EnterpriseProjectId

eip:publicIps:get

Grants permission to query a specific EIP.

Read

publicip *

vpc:publicIps:get

eip:publicIps:update

Grants permission to update an EIP.

Write

publicip *

vpc:publicIps:update

eip:publicIps:disassociateInstance

Grants permission to disassociate an instance from an EIP.

Write

publicip *

vpc:publicIps:update

eip:publicIps:delete

Grants permission to release an EIP.

Write

publicip *

vpc:publicIps:delete

eip:publicIps:create

Grants permission to assign EIP.

Write

publicip *

-

vpc:publicIps:create

-

g:EnterpriseProjectId

eip:publicIps:batchCreate

Grants permission to batch assign EIPs.

Write

publicip *

-

vpc:publicIps:create

-

eip:publicIps:list

Grants permission to query EIPs.

List

publicip *

-

vpc:publicIps:list

-

g:EnterpriseProjectId

eip:publicIps:count

Grants permission to count EIPs.

List

publicip *

-

vpc:publicIps:list

eip:publicIps:get

Grants permission to query a specific EIP.

Read

publicip *

vpc:publicIps:get

eip:publicIps:update

Grants permission to update an EIP.

Write

publicip *

vpc:publicIps:update

eip:publicIps:enableNat64

Grants permission to enable nat64 of EIP.

Write

publicip *

vpc:publicIps:update

eip:publicIps:disableNat64

Grants permission to enable nat64 of an EIP.

Write

publicip *

vpc:publicIps:update

eip:publicIps:associateInstance

Grants permission to associate an instance on an EIP.

Write

publicip *

vpc:publicIps:update

eip:publicIps:disassociateInstance

Grants permission to disassociate an instance from an EIP.

Write

publicip *

vpc:publicIps:update

eip:publicIps:attachBandwidth

Grants permission to attach an EIP to a share bandwidth.

Write

publicip *

vpc:publicIps:update

bandwidth *

eip:publicIps:detachBandwidth

Grants permission to detach an EIP from share bandwidth.

Write

publicip *

vpc:publicIps:update

bandwidth *

eip:publicIps:delete

Grants permission to release an EIP.

Write

publicip *

vpc:publicIps:delete

eip:publicIps:createTags

Grants permission to create a tag for an EIP.

Tagging

publicip *

vpc:publicipTags:create

-

eip:publicIps:listTags

Grants permission to query tags of a specified EIP.

List

publicip *

-

vpc:publicipTags:get

eip:publicIps:deleteTags

Grants permission to delete an EIP tag.

Tagging

publicip *

vpc:publicipTags:delete

-

g:TagKeys

eip:bandwidths:insertPublicIps

Grants permission to add an EIP to a shared bandwidth.

Write

bandwidth *

vpc:publicIps:insert

eip:bandwidths:removePublicIps

Grants permission to remove an EIP from a shared bandwidth.

Write

bandwidth *

vpc:publicIps:insert

eip:bandwidths:create

Grants permission to create shared bandwidth.

Write

bandwidth *

-

vpc:bandwidths:create

-

g:EnterpriseProjectId

eip:bandwidths:batchCreate

Grants permission to batch assign shared bandwidth.

Write

bandwidth *

-

-

eip:bandwidths:list

Grants permission to query shared bandwidths using search criteria.

List

bandwidth *

-

vpc:bandwidths:list

-

g:EnterpriseProjectId

eip:bandwidths:update

Grants permission to update information about shared bandwidth.

Write

bandwidth *

vpc:bandwidths:update

eip:bandwidths:get

Grants permission to query details about a shared bandwidth.

Read

bandwidth *

vpc:bandwidths:get

eip:bandwidths:delete

Grants permission to delete shared bandwidth.

Write

bandwidth *

vpc:bandwidths:delete

eip:bandwidthRules:list

Grants permission to query bandwidth rules using search criteria.

List

bandwidth *

vpc:bandwidths:get

bandwidthRule *

-

eip:bandwidthRules:get

Grants permission to query details about a bandwidth rule.

Read

bandwidth *

vpc:bandwidths:get

bandwidthRule *

-

eip:bandwidthRules:update

Grants permission to update information about a bandwidth rule.

Write

bandwidth *

vpc:bandwidths:update

bandwidthRule *

-

eip:bandwidthRules:delete

Grants permission to delete bandwidth rule.

Write

bandwidth *

vpc:bandwidths:delete

bandwidthRule *

-

eip:bandwidthRules:create

Grants permission to create a bandwidth rule.

Write

bandwidth *

vpc:bandwidths:update

bandwidthRule *

-

eip:bandwidthPkgs:list

Grants permission to query bandwidth add-on packages using search criteria.

List

bandwidthPkg *

-

vpc:bandwidths:get

eip:bandwidthPkgs:get

Grants permission to query details about a bandwidth add-on package.

Read

bandwidthPkg *

-

vpc:bandwidths:get

eip:bandwidthPkgs:update

Grants permission to update information about bandwidth add-on package.

Write

bandwidthPkg *

-

vpc:bandwidths:update

eip:bandwidthPkgs:create

Grants permission to create a bandwidth add-on package.

Write

bandwidthPkg *

-

vpc:bandwidths:update

eip:publicipPools:create

Grants permission to create an EIP pool.

Write

publicipPool *

-

vpc:publicIps:create

eip:publicipPools:update

Grants permission to update information about EIP pool.

Write

publicipPool *

-

vpc:publicIps:update

eip:globalEips:list

Grants permission to query global elastic IPs.

List

globalEip *

-

-

-

g:EnterpriseProjectId

eip:globalEips:count

Grants permission to count global elastic IPs.

List

globalEip *

-

eip:globalEips:list

eip:globalEips:get

Grants permission to query a specific global elastic IP.

Read

globalEip *

-

eip:globalEips:create

Grants permission to assign global elastic IP.

Write

globalEip *

-

-

-

eip:globalEips:updateGeip

Grants permission to update a global elasticIP.

Write

globalEip *

eip:globalEips:update

eip:globalEips:disassociateInstance

Grants permission to disassociate an instance from a global elastic IP.

Write

globalEip *

eip:globalEips:update

eip:globalEips:associateInstance

Grants permission to associate an instance on a global elastic IP.

Write

globalEip *

eip:globalEips:update

eip:globalEips:delete

Grants permission to release a global elastic IP.

Write

globalEip *

-

eip:globalEips:attachBandwidth

Grants permission to attach a global elastic IP to a global internet bandwidth.

Write

globalEip *

eip:globalEips:insert

internetBandwidth *

eip:globalEips:detachBandwidth

Grants permission to dettach a global elastic IP from a global internet bandwidth.

Write

globalEip *

eip:globalEips:remove

internetBandwidth *

eip:globalEips:createTags

Grants permission to create a tag for a global elastic IP.

Tagging

globalEip *

-

-

eip:globalEips:getTags

Grants permission to query tags of a specified global elastic IP.

Read

globalEip *

-

-

eip:globalEips:listTags

Grants permission to list tags of global elastic IPs in project.

List

globalEip *

-

-

eip:globalEips:deleteTags

Grants permission to delete a global elastic IP tag.

Tagging

globalEip *

-

-

g:TagKeys

eip:internetBandwidths:createTags

Grants permission to create a tag for a global internet bandwidth.

Tagging

internetBandwidth *

-

-

eip:internetBandwidths:getTags

Grants permission to query tags of a specified global internet bandwidth.

Read

internetBandwidth *

-

-

eip:internetBandwidths:listTags

Grants permission to list tags of global internet bandwidths in project.

List

internetBandwidth *

-

-

eip:internetBandwidths:deleteTags

Grants permission to delete a global internet bandwidth tag.

Tagging

internetBandwidth *

-

-

g:TagKeys

eip:internetBandwidths:list

Grants permission to query global internet bandwidths.

List

internetBandwidth *

-

-

-

g:EnterpriseProjectId

eip:internetBandwidths:count

Grants permission to count global internet bandwidths.

List

internetBandwidth *

-

eip:internetBandwidths:list

eip:internetBandwidths:get

Grants permission to query a specific global internet bandwidth.

Read

internetBandwidth *

-

eip:internetBandwidths:create

Grants permission to create global internet bandwidth.

Write

internetBandwidth *

-

-

-

g:EnterpriseProjectId

eip:internetBandwidths:update

Grants permission to update a global internet bandwidth.

Write

internetBandwidth *

-

eip:internetBandwidths:delete

Grants permission to delete global internet bandwidth.

Write

internetBandwidth *

-

eip:geipSegments:list

Grants permission to query global elastic IP segments.

List

geipSegment *

-

-

-

g:EnterpriseProjectId

eip:geipSegments:count

Grants permission to count global elastic IP segments.

List

geipSegment *

-

-

eip:geipSegments:get

Grants permission to query a specific global elastic IP segment.

Read

geipSegment *

-

eip:geipSegments:create

Grants permission to assign global elastic IP segment.

Write

geipSegment *

-

-

-

eip:geipSegments:update

Grants permission to update a global elastic IP segment.

Write

geipSegment *

-

eip:geipSegments:disassociateInstance

Grants permission to disassociate an instance from a global elastic IP segment.

Write

geipSegment *

-

eip:geipSegments:associateInstance

Grants permission to associate an instance on a global elastic IP segment.

Write

geipSegment *

-

eip:geipSegments:delete

Grants permission to release a global elastic IP segment.

Write

geipSegment *

-

eip:geipSegments:attachBandwidth

Grants permission to attach a global elastic IP segment to a global internet bandwidth.

Write

geipSegment *

-

internetBandwidth *

eip:geipSegments:detachBandwidth

Grants permission to dettach a global elastic IP segment from a global internet bandwidth.

Write

geipSegment *

-

internetBandwidth *

eip:geipSegments:createTags

Grants permission to create a tag for a global elastic IP segment.

Tagging

geipSegment *

-

-

eip:geipSegments:getTags

Grants permission to query tags of a specified global elastic IP segment.

Read

geipSegment *

-

-

eip:geipSegments:listTags

Grants permission to list tags of global elastic IP segments in project.

List

geipSegment *

-

-

eip:geipSegments:deleteTags

Grants permission to delete a global elastic IP segment tag.

Tagging

geipSegment *

-

-

g:TagKeys

eip:userDisclaimer:sign

Grants permission to sign a user disclaimer record.

Write

-

-

-

eip:userDisclaimer:cancel

Grants permission to cancel a user disclaimer record.

Write

-

-

-

Each API of EIP usually supports one or more actions. Table 2 lists the supported actions and dependencies.

Table 2 Actions and dependencies supported by EIP APIs

API

Action

Dependencies

GET /v2/{project_id}/elasticips

eip:publicIps:count

-

GET /v2/{project_id}/publicip/instances

eip:publicIps:count

-

POST /v2.0/{project_id}/publicips/{publicip_id}/tags/action

eip:publicIps:createTags

-

POST 01 /v2.0/{project_id}/publicips/{publicip_id}/tags/action

eip:publicIps:deleteTags

-

POST /v2.0/{project_id}/publicips/{publicip_id}/tags

eip:publicIps:createTags

-

DELETE /v2.0/{project_id}/publicips/{publicip_id}/tags/{key}

eip:publicIps:deleteTags

-

POST /v2.0/{project_id}/publicips/resource_instances/action

eip:publicIps:listTags

-

GET /v2.0/{project_id}/publicips/tags

eip:publicIps:listTags

-

GET /v2.0/{project_id}/publicips/{publicip_id}/tags

eip:publicIps:listTags

-

POST /v2.0/{project_id}/bandwidths

eip:bandwidths:create

-

POST /v2.0/{project_id}/batch-bandwidths

eip:bandwidths:batchCreate

-

GET /v1/{project_id}/bandwidths

eip:bandwidths:list

-

DELETE /v2.0/{project_id}/bandwidths/{bandwidth_id}

eip:bandwidths:delete

-

GET /v1/{project_id}/bandwidths/{bandwidth_id}

eip:bandwidths:get

-

PUT /v1/{project_id}/bandwidths/{bandwidth_id}

eip:bandwidths:update

-

PUT /v2.0/{project_id}/bandwidths/{bandwidth_id}

eip:bandwidths:update

-

POST /v2.0/{project_id}/bandwidths/change-to-period

eip:bandwidths:update

bss:renewal:update

GET /v2/{project_id}/bandwidthpkgs

eip:bandwidthPkgs:list

-

PUT /v2/{project_id}/bandwidthpkgs/{id}

eip:bandwidthPkgs:update

-

PUT /v2/{project_id}/batch-bandwidths/modify

eip:bandwidths:update

-

POST /v2.0/{project_id}/bandwidths/{bandwidth_id}/insert

eip:bandwidths:insertPublicIps

-

POST /v2.0/{project_id}/bandwidths/{bandwidth_id}/remove

eip:bandwidths:removePublicIps

-

POST /v1/{project_id}/publicips

eip:publicIps:create

-

POST /v2/{project_id}/batchpublicips

eip:publicIps:batchCreate

-

GET /v1/{project_id}/publicips

eip:publicIps:list

-

GET /v1/{project_id}/publicips/{publicip_id}

eip:publicIps:get

-

PUT /v1/{project_id}/publicips/{publicip_id}

eip:publicIps:update

-

POST /v2.0/{project_id}/publicips/change-to-period

eip:publicIps:update

bss:renewal:update

PATCH /v2/{project_id}/batchpublicips

eip:publicIps:disassociateInstance

-

DELETE /v1/{project_id}/publicips/{publicip_id}

eip:publicIps:delete

-

DELETE /v2/{project_id}/batchpublicips

eip:publicIps:delete

-

POST /v3/{project_id}/eip/publicips/{publicip_id}/associate-instance

eip:publicIps:associateInstance

-

POST /v3/{project_id}/eip/publicips/{publicip_id}/disassociate-instance

eip:publicIps:disassociateInstance

-

POST /v3/{project_id}/eip/publicips/attach-share-bandwidth

eip:publicIps:attachBandwidth

-

POST /v3/{project_id}/eip/publicips/{publicip_id}/attach-share-bandwidth

eip:publicIps:attachBandwidth

-

POST /v3/{project_id}/eip/publicips/detach-share-bandwidth

eip:publicIps:detachBandwidth

-

POST /v3/{project_id}/eip/publicips/{publicip_id}/detach-share-bandwidth

eip:publicIps:detachBandwidth

-

POST /v3/{project_id}/eip/bandwidths

eip:bandwidths:create

-

GET /v3/{project_id}/eip/bandwidths/{bandwidth_id}/bandwidth-rules

eip:bandwidthRules:list

-

GET /v3/{project_id}/eip/bandwidths/{bandwidth_id}/bandwidth-rule/{bandwidth_rules_id}

eip:bandwidthRules:get

-

PUT /v3/{project_id}/eip/bandwidths/{bandwidth_id}/bandwidth-rule/{bandwidth_rules_id}

eip:bandwidthRules:update

-

POST /v3/{project_id}/eip/bandwidths/{bandwidth_id}/bandwidth-rules

eip:bandwidthRules:create

-

DELETE /v3/{project_id}/eip/bandwidths/{bandwidth_id}/bandwidth-rule/{bandwidth_rules_id}

eip:bandwidthRules:delete

-

POST /v3/{project_id}/eip/publicips/{publicip_id}/enable-nat64

eip:publicIps:enableNat64

-

POST /v3/{project_id}/eip/publicips/{publicip_id}/disable-nat64

eip:publicIps:disableNat64

-

GET /v3/{project_id}/eip-bandwidths

eip:bandwidths:list

-

GET /v3/{project_id}/eip/bandwidths

eip:bandwidths:list

-

GET /v3/{project_id}/eip/publicips

eip:publicIps:list

-

GET /v3/{project_id}/eip/publicips/{publicip_id}

eip:publicIps:get

-

Resources

A resource type indicates the resources that an identity policy applies to. If you specify a resource type for any action in Table 3, the resource URN must be specified in the identity policy statements using that action, and the identity policy applies only to resources of this type. If no resource type is specified, the Resource element is marked with an asterisk (*) and the identity policy applies to all resources. You can also set condition keys in an identity policy to define resource types.

The following table lists the resource types that you can define in identity policy statements for EIP.

Table 3 Resource types supported by EIP

Resource Type

URN

bandwidthRule

eip:<region>:<account-id>:bandwidthRule:<bandwidthRule-id>

bandwidth

vpc:<region>:<account-id>:bandwidth:<bandwidth-id>

bandwidthPkg

eip:<region>:<account-id>:bandwidthPkg:<bandwidthPkg-id>

publicipPool

eip:<region>:<account-id>:publicipPool:<publicipPool-id>

geipSegment

eip:<region>:<account-id>:geipSegment:<geipSegment-id>

vpcIgw

eip:<region>:<account-id>:vpcIgw:<vpcIgw-id>

internetBandwidth

eip:<region>:<account-id>:internetBandwidth:<internetBandwidth-id>

publicip

vpc:<region>:<account-id>:publicip:<publicip-id>

globalEip

eip:<region>:<account-id>:globalEip:<globalEip-id>

Conditions

EIP does not support service-specific condition keys in identity policies.It can only use global condition keys applicable to all services. For details, see Global Condition Keys.