Help Center/ Intelligent EdgeFabric/ API Reference/ Permissions and Supported Actions/ Actions Supported by Identity Policy-based Authorization
Updated on 2026-02-03 GMT+08:00

Actions Supported by Identity Policy-based Authorization

IAM provides system-defined identity policies to define typical cloud service permissions. You can also create custom identity policies using the actions supported by cloud services for more refined access control.

In addition to IAM, the Organizations service also provides Service Control Policies (SCPs) to set access control policies.

SCPs do not actually grant any permissions to an entity. They only set the permissions boundary for the entity. When SCPs are attached to an organizational unit (OU) or a member account, the SCPs do not directly grant permissions to that OU or member account. Instead, the SCPs only determine what permissions are available for that member account or those member accounts under that OU. The granted permissions can be applied only if they are allowed by the SCPs.

To learn more about how IAM is different from Organizations for access control, see How IAM Is Different from Organizations for Access Control?.

This section describes the elements used by IAM custom identity policies and Organizations SCPs. The elements include actions, resources, and conditions.

Actions

Actions are specific operations that are allowed or denied in an identity policy.

  • The Access Level column describes how the action is classified (List, Read, or Write). This classification helps you understand the level of access that an action grants when you use it in an identity policy.
  • The Resource Type column indicates whether the action supports resource-level permissions.
    • You can use a wildcard (*) to indicate all resource types. If this column is empty (-), the action does not support resource-level permissions and you must specify all resources ("*") in your identity policy statements.
    • If this column includes a resource type, you must specify the URN in the Resource element of your identity policy statements.
    • Required resources are marked with asterisks (*) in the table. If you specify a resource in a statement using this action, then it must be of this type.

    For details about the resource types defined by IEF, see Resources.

  • The Condition Key column contains keys that you can specify in the Condition element of an identity policy statement.
    • If the Resource Type column has values for an action, the condition key takes effect only for the listed resource types.
    • If the Resource Type column is empty (-) for an action, the condition key takes effect for all resources that action supports.
    • If the Condition Key column is empty (-) for an action, the action does not support any condition keys.

    For details about the condition keys defined by IEF, see Conditions.

  • The Alias column lists the policy actions that are configured in identity policies. With these actions, you can use APIs for policy-based authorization. For details, see Policies and Identity Policies.

The following table lists the actions that you can define in identity policy statements for IEF.

Table 1 Actions supported by IEF

Action

Description

Access Level

Resource Type (*: required)

Condition Key

Alias

ief:application:create

Grants permission to create application.

Write

application *

-

-

-

ief:IefInstanceId

ief:application:delete

Grants permission to delete application.

Write

application *

-

-

-

ief:IefInstanceId

ief:application:get

Grants permission to return details of the specified application.

Read

application *

-

-

-

ief:IefInstanceId

ief:application:list

Grants permission to return list of the applications.

List

application *

-

-

-

ief:IefInstanceId

ief:application:update

Grants permission to update application.

Write

application *

-

-

-

ief:IefInstanceId

ief:appversion:create

Grants permission to create application version.

Write

appversion *

-

-

-

ief:IefInstanceId

ief:appversion:delete

Grants permission to delete application version.

Write

appversion *

-

-

-

ief:IefInstanceId

ief:appversion:get

Grants permission to return details of the specified application version.

Read

appversion *

-

-

-

ief:IefInstanceId

ief:appversion:list

Grants permission to return list of the application versions.

List

appversion *

-

-

-

ief:IefInstanceId

ief:appversion:update

Grants permission to delete application version.

Write

appversion *

-

-

-

ief:IefInstanceId

ief:batchjob:create

Grants permission to create batchjob.

Write

batchjob *

-

-

-

ief:IefInstanceId

ief:batchjob:delete

Grants permission to delete batchjob.

Write

batchjob *

-

-

-

ief:IefInstanceId

ief:batchjob:get

Grants permission to return details of the specified batchjob.

Read

batchjob *

-

-

-

ief:IefInstanceId

ief:batchjob:list

Grants permission to return list of the batchjob.

List

batchjob *

-

-

-

ief:IefInstanceId

ief:batchjob:pause

Grants permission to stop batchjob.

Write

batchjob *

-

-

-

ief:IefInstanceId

ief:batchjob:restore

Grants permission to restore batchjob.

Write

batchjob *

-

-

-

ief:IefInstanceId

ief:batchjob:retry

Grants permission to retry batchjob.

Write

batchjob *

-

-

-

ief:IefInstanceId

ief:configmap:create

Grants permission to create configmap.

Write

iefinstance *

-

-

ief:configmap:delete

Grants permission to delete configmap.

Write

iefinstance *

-

-

ief:configmap:get

Grants permission to return details of the specified configmap.

Read

iefinstance *

-

-

ief:configmap:list

Grants permission to return list of the configmap.

List

iefinstance *

-

-

ief:configmap:update

Grants permission to update configmap.

Write

iefinstance *

-

-

ief:service:create

Grants permission to create service.

Write

iefinstance *

-

-

ief:service:delete

Grants permission to delete service.

Write

iefinstance *

-

-

ief:service:list

Grants permission to return list of the service.

List

iefinstance *

-

-

ief:service:get

Grants permission to return details of the specified service.

Read

iefinstance *

-

-

ief:service:update

Grants permission to update service.

Write

iefinstance *

-

-

ief:device:create

Grants permission to create device.

Write

iefinstance *

-

-

ief:device:delete

Grants permission to delete device.

Write

iefinstance *

-

-

ief:device:get

Grants permission to return details of the specified device.

Read

iefinstance *

-

-

ief:device:list

Grants permission to return list of the device.

List

iefinstance *

-

-

ief:device:update

Grants permission to update device.

Write

iefinstance *

-

-

ief:device:createTemplate

Grants permission to create device template.

Write

iefinstance *

-

ief:devicetemplate:create

ief:device:deleteTemplate

Grants permission to delete device template.

Write

iefinstance *

-

ief:devicetemplate:delete

ief:device:listTemplate

Grants permission to return list of the device template.

List

iefinstance *

-

ief:devicetemplate:list

ief:device:getTemplate

Grants permission to return details of the specified device template.

Read

iefinstance *

-

ief:devicetemplate:get

ief:device:updateTemplate

Grants permission to update device template.

Write

iefinstance *

-

ief:devicetemplate:update

ief:endpoint:create

Grants permission to create endpoint.

Write

iefinstance *

-

-

ief:endpoint:delete

Grants permission to delete endpoint.

Write

iefinstance *

-

-

ief:endpoint:get

Grants permission to return details of the specified endpoint.

Read

iefinstance *

-

-

ief:endpoint:list

Grants permission to return list of the endpoint.

List

iefinstance *

-

-

ief:agency:create

Grants permission to create service agency.

Write

iefinstance *

-

-

ief:quota:get

Grants permission to get quota.

Read

iefinstance *

-

ief:quota:get

ief:plugin:getVersion

Grants permission to return details of the specified plugin version template.

Read

iefinstance *

-

-

ief:rule:create

Grants permission to create rule.

Write

iefinstance *

-

-

ief:rule:delete

Grants permission to delete rule.

Write

iefinstance *

-

-

ief:iefinstance:create

Grants permission to create iefinstance.

Write

iefinstance *

-

-

ief:iefinstance:delete

Grants permission to delete iefinstance.

Write

iefinstance *

-

-

ief:iefinstance:get

Grants permission to return details of the specified iefinstance.

Read

iefinstance *

-

-

ief:iefinstance:list

Grants permission to return list of the iefinstance.

List

iefinstance *

-

-

ief:rule:listError

Grants permission to query the message routing error list.

List

iefinstance *

-

ief:rule:list

ief:rule:get

Grants permission to return details of the specified rule.

Read

iefinstance *

-

-

ief:rule:listRule

Grants permission to return list of the rule.

List

iefinstance *

-

ief:rule:list

ief:rule:stop

Grants permission to stop rule.

Write

iefinstance *

-

ief:rule:update

ief:rule:start

Grants permission to start rule.

Write

iefinstance *

-

ief:rule:update

ief:systemEvent:create

Grants permission to create system event.

Write

iefinstance *

-

-

ief:systemEvent:delete

Grants permission to delete system event.

Write

iefinstance *

-

-

ief:systemEvent:get

Grants permission to return details of the specified system event.

Read

iefinstance *

-

-

ief:systemEvent:list

Grants permission to return list of the system event.

List

iefinstance *

-

-

ief:systemEvent:stop

Grants permission to stop system event.

Write

iefinstance *

-

ief:systemEvent:update

ief:systemEvent:start

Grants permission to start system event.

Write

iefinstance *

-

ief:systemEvent:update

ief:secret:create

Grants permission to create secret.

Write

iefinstance *

-

-

ief:secret:delete

Grants permission to delete secret.

Write

iefinstance *

-

-

ief:secret:get

Grants permission to return details of the specified secret.

Read

iefinstance *

-

-

ief:secret:list

Grants permission to return list of the secret.

List

iefinstance *

-

-

ief:secret:update

Grants permission to update secret.

Write

iefinstance *

-

-

ief:secureSecret:create

Grants permission to create encrypt data.

Write

iefinstance *

-

-

ief:secureSecret:delete

Grants permission to delete encrypt data.

Write

iefinstance *

-

-

ief:secureSecret:list

Grants permission to return list of the encrypt data.

List

iefinstance *

-

-

ief:secureSecret:get

Grants permission to return details of the specified encrypt data.

Read

iefinstance *

-

-

ief:secureSecret:update

Grants permission to update encrypt data.

Write

iefinstance *

-

-

ief::tagResource

Grants permission to create tag for the resource.

Tagging

node *

g:ResourceTag/<tag-key>

ief:tag:batchAction

-

ief::unTagResource

Grants permission to delete tag for the resource.

Tagging

node *

g:ResourceTag/<tag-key>

ief:tag:delete

-

ief::listTagsForResource

Grants permission to return details of the specified tag for the resource.

List

node *

g:ResourceTag/<tag-key>

ief:tag:get

-

ief:IefInstanceId

ief::listResourcesByTag

Grants permission to return list of resource.

List

node *

-

ief:tag:listResourceInstance

-

ief::listTags

Grants permission to return list of tag for the resource.

List

node *

-

ief:tag:list

-

ief:IefInstanceId

ief:group:bindNode

Grants permission to bind/unbind edge node to edge node group.

Write

group *

-

-

-

ief:IefInstanceId

ief:group:createNodeGroup

Grants permission to create edge node group.

Write

group *

-

ief:group:create

-

ief:IefInstanceId

ief:group:deleteNodeGroup

Grants permission to delete edge node group.

Write

group *

-

ief:group:delete

-

ief:IefInstanceId

ief:group:updateNodeGroup

Grants permission to bind/unbind device to edge node group.

Write

group *

-

ief:group:update

-

ief:IefInstanceId

ief:group:getNodeGroup

Grants permission to return details of the specified edge node grou[.

Read

group *

-

ief:group:get

-

ief:IefInstanceId

ief:group:listNodeGroup

Grants permission to return list of edge node group.

List

group *

-

ief:group:list

-

ief:IefInstanceId

ief:group:listGroupInstanceState

Grants permission to return state of the specified edge node group.

List

group *

-

-

-

ief:IefInstanceId

ief:group:createCert

Grants permission to create cert of edge node group.

Write

group *

-

ief:group:create

-

ief:IefInstanceId

ief:group:deleteCert

Grants permission to delete cert of edge node group.

Write

group *

-

ief:group:delete

-

ief:IefInstanceId

ief:group:listCert

Grants permission to return list of cert binding to the edge node group.

List

group *

-

ief:group:list

-

ief:IefInstanceId

ief:group:getCert

Grants permission to return details of the specified cert binding to the edge node group.

Read

group *

-

ief:group:get

-

ief:IefInstanceId

ief:deployment:create

Grants permission to create deployment.

Write

deployment *

-

-

-

ief:IefInstanceId

ief:deployment:delete

Grants permission to delete deployment.

Write

deployment *

-

-

-

ief:IefInstanceId

ief:deployment:get

Grants permission to return details of the specified deployment.

Read

deployment *

-

-

-

ief:IefInstanceId

ief:deployment:list

Grants permission to return list of pod.

List

deployment *

-

-

-

ief:IefInstanceId

ief:deployment:update

Grants permission to update deployment.

Write

deployment *

-

-

-

ief:IefInstanceId

ief:node:action

Grants permission to stop/start edge node.

Write

node *

g:ResourceTag/<tag-key>

-

-

ief:IefInstanceId

ief:node:bindDevices

Grants permission to bind device to edge node.

Write

node *

g:ResourceTag/<tag-key>

-

-

ief:IefInstanceId

ief:node:create

Grants permission to create edge node.

Write

node *

-

-

-

ief:node:createNodeCert

Grants permission to create cert of edge node.

Write

node *

-

-

-

ief:node:delete

Grants permission to delete edge node.

Write

node *

g:ResourceTag/<tag-key>

-

-

ief:IefInstanceId

ief:node:deleteNodeCert

Grants permission to delete cert of edge node.

Write

node *

g:ResourceTag/<tag-key>

-

-

ief:IefInstanceId

ief:node:get

Grants permission to return details of the specified edge node.

Read

node *

g:ResourceTag/<tag-key>

-

-

ief:IefInstanceId

ief:node:list

Grants permission to return list of edge node.

List

node *

g:ResourceTag/<tag-key>

-

-

ief:IefInstanceId

ief:node:listNodeCert

Grants permission to return list of cert of edge node.

List

node *

g:ResourceTag/<tag-key>

-

-

ief:IefInstanceId

ief:node:maintain

Grants permission to maintain the specified edge node.

Write

node *

g:ResourceTag/<tag-key>

-

-

ief:IefInstanceId

ief:node:update

Grants permission to update the configuration of the specified edge node.

Write

node *

g:ResourceTag/<tag-key>

-

-

ief:IefInstanceId

ief:node:upgrade

Grants permission to upgrade edge node.

Write

node *

g:ResourceTag/<tag-key>

-

-

ief:IefInstanceId

ief:product:create

Grants permission to create product.

Write

product *

-

-

-

ief:IefInstanceId

ief:product:delete

Grants permission to delete product.

Write

product *

-

-

-

ief:IefInstanceId

ief:product:get

Grants permission to return details of the specified product.

Read

product *

-

-

-

ief:IefInstanceId

ief:product:list

Grants permission to return list of product.

List

product *

-

-

-

ief:IefInstanceId

Each API of IEF usually supports one or more actions. Table 2 lists the supported actions and dependencies.

Table 2 Actions and dependencies supported by IEF APIs

API

Action

Dependencies

POST /v2/{project_id}/edgemgr/apps

ief:application:create

-

DELETE /v2/{project_id}/edgemgr/apps/{app_id}

ief:application:delete

-

GET /v2/{project_id}/edgemgr/apps/{app_id}

ief:application:get

-

GET /v2/{project_id}/edgemgr/apps

ief:application:list

-

PUT /v2/{project_id}/edgemgr/apps/{app_id}

ief:application:update

-

POST /v2/{project_id}/edgemgr/apps/{app_id}/versions

ief:appversion:create

-

DELETE /v2/{project_id}/edgemgr/apps/{app_id}/versions/{version_id}

ief:appversion:delete

-

GET /v2/{project_id}/edgemgr/apps/{app_id}/versions/{version_id}

ief:appversion:get

-

GET /v2/{project_id}/edgemgr/apps/{app_id}/versions

ief:appversion:list

-

PUT /v2/{project_id}/edgemgr/apps/{app_id}/versions/{version_id}

ief:appversion:update

-

POST /v2/{project_id}/productmgr/jobs

ief:batchjob:create

-

DELETE /v2/{project_id}/productmgr/jobs/{job_id}

ief:batchjob:delete

-

GET /v2/{project_id}/productmgr/jobs/{job_id}

ief:batchjob:get

-

GET /v2/{project_id}/productmgr/jobs

ief:batchjob:list

-

POST /v2/{project_id}/productmgr/jobs/{job_id}/pause

ief:batchjob:pause

-

POST /v2/{project_id}/productmgr/jobs/{job_id}/restore

ief:batchjob:restore

-

POST /v2/{project_id}/productmgr/jobs/{job_id}/retry

ief:batchjob:retry

-

POST /v2/{project_id}/edgemgr/configmaps

ief:configmap:create

-

DELETE /v2/{project_id}/edgemgr/configmaps/{configmap_id}

ief:configmap:delete

-

GET /v2/{project_id}/edgemgr/configmaps/{configmap_id}

ief:configmap:get

-

GET /v2/{project_id}/edgemgr/configmaps

ief:configmap:list

-

PUT /v2/{project_id}/edgemgr/configmaps/{configmap_id}

ief:configmap:update

-

POST /v2/{project_id}/edgemgr/services

ief:service:create

-

DELETE /v2/{project_id}/edgemgr/services/{service_id}

ief:service:delete

-

GET /v2/{project_id}/edgemgr/services

ief:service:list

-

GET /v2/{project_id}/edgemgr/services/{service_id}

ief:service:get

-

PUT /v2/{project_id}/edgemgr/services/{service_id}

ief:service:update

-

POST /v2/{project_id}/edgemgr/devices

ief:device:create

-

DELETE /v2/{project_id}/edgemgr/devices/{device_id}

ief:device:delete

-

GET /v2/{project_id}/edgemgr/devices/{device_id}

ief:device:get

-

GET /v2/{project_id}/edgemgr/devices

ief:device:list

-

PUT /v2/{project_id}/edgemgr/devices/{device_id}

ief:device:update

-

GET /v2/{project_id}/edgemgr/devices/{device_id}/twin

ief:device:get

-

PUT /v2/{project_id}/edgemgr/devices/{device_id}/twin

ief:device:update

-

PUT /v2/{project_id}/edgemgr/devices/{device_id}/nodes

ief:device:update

-

POST /v2/{project_id}/edgemgr/device-templates

ief:device:createTemplate

-

DELETE /v2/{project_id}/edgemgr/device-templates/{device_template_id}

ief:device:deleteTemplate

-

GET /v2/{project_id}/edgemgr/device-templates

ief:device:listTemplate

-

GET /v2/{project_id}/edgemgr/device-templates/{device_template_id}

ief:device:getTemplate

-

PUT /v2/{project_id}/edgemgr/device-templates/{device_template_id}

ief:device:updateTemplate

-

POST /v2/{project_id}/routemgr/endpoints

ief:endpoint:create

-

DELETE /v2/{project_id}/routemgr/endpoints/{endpoint_id}

ief:endpoint:delete

-

GET /v2/{project_id}/routemgr/endpoints/{endpoint_id}

ief:endpoint:get

-

GET /v2/{project_id}/routemgr/endpoints

ief:endpoint:list

-

-

ief:agency:create

-

GET /v2/{project_id}/edgemgr/quotas

ief:quota:get

-

-

ief:plugin:getVersion

-

POST /v2/{project_id}/routemgr/rules

ief:rule:create

-

DELETE /v2/{project_id}/routemgr/rules/{rule_id}

ief:rule:delete

-

POST /v2/{project_id}/edgemgr/ief-instances

ief:iefinstance:create

  • ecs:availabilityZones:list
  • ecs:cloudServerFlavors:get
  • vpc:subnets:get
  • vpc:subnets:list
  • vpc:vpcs:get
  • vpc:vpcs:list
  • vpc:securityGroups:get
  • vpc:securityGroups:list
  • vpcep:endpoints:get
  • vpcep:endpoints:list
  • vpcep:endpointServices:get
  • vpcep:endpointServices:list
  • elb:loadbalancers:list
  • elb:loadbalancers:show
  • cce:node:list
  • cce:node:get
  • cce:cluster:get
  • vpc:subnets:create
  • vpc:vpcs:create
  • vpc:publicIps:create
  • vpc:securityGroups:create
  • vpcep:endpoints:create
  • vpcep:endpointServices:create
  • elb:loadbalancers:create
  • cce:cluster:create
  • cce:node:create

DELETE /v2/{project_id}/edgemgr/ief-instances/{ief_instance_id}

ief:iefinstance:delete

  • ecs:availabilityZones:list
  • ecs:cloudServerFlavors:get
  • vpc:subnets:get
  • vpc:subnets:list
  • vpc:vpcs:get
  • vpc:vpcs:list
  • vpc:securityGroups:get
  • vpc:securityGroups:list
  • vpcep:endpoints:get
  • vpcep:endpoints:list
  • vpcep:endpointServices:get
  • vpcep:endpointServices:list
  • elb:loadbalancers:list
  • elb:loadbalancers:show
  • cce:node:list
  • cce:node:get
  • cce:cluster:get
  • vpc:subnets:delete
  • vpc:vpcs:delete
  • vpc:publicIps:delete
  • vpc:securityGroups:delete
  • vpcep:endpoints:delete
  • vpcep:endpointServices:delete
  • elb:loadbalancers:delete
  • cce:cluster:delete
  • cce:node:delete

GET /v2/{project_id}/edgemgr/ief-instances/{ief_instance_id}

ief:iefinstance:get

-

GET /v2/{project_id}/edgemgr/ief-instances

ief:iefinstance:list

-

GET /v2/{project_id}/routemgr/rules/{rule_id}/errors

ief:rule:listError

-

GET /v2/{project_id}/routemgr/rules/{rule_id}

ief:rule:get

-

GET /v2/{project_id}/routemgr/rules

ief:rule:listRule

-

POST /v2/{project_id}/routemgr/rules/{rule_id}/stop

ief:rule:stop

-

POST /v2/{project_id}/routemgr/rules/{rule_id}/start

ief:rule:start

-

POST /v2/{project_id}/routemgr/exchanger/systemevents

ief:systemEvent:create

-

DELETE /v2/{project_id}/routemgr/exchanger/systemevents/{event_id}

ief:systemEvent:delete

-

GET /v2/{project_id}/routemgr/exchanger/systemevents/{event_id}

ief:systemEvent:get

-

GET /v2/{project_id}/routemgr/exchanger/systemevents

ief:systemEvent:list

-

POST /v2/{project_id}/routemgr/exchanger/systemevents/{event_id}/stop

ief:systemEvent:stop

-

POST /v2/{project_id}/routemgr/exchanger/systemevents/{event_id}/start

ief:systemEvent:start

-

POST /v2/{project_id}/edgemgr/secrets

ief:secret:create

-

DELETE /v2/{project_id}/edgemgr/secrets/{secret_id}

ief:secret:delete

-

GET /v2/{project_id}/edgemgr/secrets/{secret_id}

ief:secret:get

-

GET /v2/{project_id}/edgemgr/secrets

ief:secret:list

-

PUT /v2/{project_id}/edgemgr/secrets/{secret_id}

ief:secret:update

-

POST /v2/{project_id}/edm/nodes/{node_id}/encryptdatas

ief:secureSecret:create

-

DELETE /v2/{project_id}/edm/nodes/{node_id}/encryptdatas/{encryptdata_id}

ief:secureSecret:delete

-

POST /v2/{project_id}/edm/encryptdatas

ief:secureSecret:create

-

DELETE /v2/{project_id}/edm/encryptdatas/{encryptdata_id}

ief:secureSecret:delete

-

GET /v2/{project_id}/edm/encryptdatas

ief:secureSecret:list

-

GET /v2/{project_id}/edm/encryptdatas/{encryptdata_id}

ief:secureSecret:get

-

GET /v2/{project_id}/edm/nodes/{node_id}/encryptdatas

ief:secureSecret:list

-

GET /v2/{project_id}/edm/encryptdatas/{encryptdata_id}/nodes

ief:secureSecret:list

-

PUT /v2/{project_id}/edm/encryptdatas/{encryptdata_id}

ief:secureSecret:update

-

POST /v2/{project_id}/{resource_type}/{resource_id}/tags/action

ief::tagResource

-

POST /v2/{project_id}/{resource_type}/{resource_id}/tags

ief::tagResource

-

DELETE /v2/{project_id}/{resource_type}/{resource_id}/tags/{key}

ief::unTagResource

-

GET /v2/{project_id}/{resource_type}/{resource_id}/tags

ief::listTagsForResource

-

POST /v2/{project_id}/{resource_type}/resource_instances/action

ief::listResourcesByTag

-

GET /v2/{project_id}/{resource_type}/tags

ief::listTags

-

PUT /v2/{project_id}/edgemgr/groups/{group_id}/nodes

ief:group:bindNode

-

POST /v2/{project_id}/edgemgr/groups

ief:group:createNodeGroup

-

DELETE /v2/{project_id}/edgemgr/groups/{group_id}

ief:group:deleteNodeGroup

-

GET /v2/{project_id}/edgemgr/groups/{group_id}

ief:group:getNodeGroup

-

GET /v2/{project_id}/edgemgr/groups

ief:group:listNodeGroup

-

-

ief:group:listGroupInstanceState

-

POST /v2/{project_id}/edgemgr/groups/{group_id}/certs

ief:group:createCert

-

DELETE /v2/{project_id}/edgemgr/groups/{group_id}/certs/{group_cert_id}

ief:group:deleteCert

-

GET /v2/{project_id}/edgemgr/groups/{group_id}/certs

ief:group:listCert

-

GET /v2/{project_id}/edgemgr/groups/{group_id}/certs/{group_cert_id}

ief:group:getCert

-

PUT /v2/{project_id}/edgemgr/groups/{group_id}

ief:group:updateNodeGroup

-

POST /v3/{project_id}/edgemgr/deployments

ief:deployment:create

-

DELETE /v3/{project_id}/edgemgr/deployments/{deployment_id}

ief:deployment:delete

-

GET /v3/{project_id}/edgemgr/deployments/{deployment_id}

ief:deployment:get

-

GET /v3/{project_id}/edgemgr/pods

ief:deployment:list

-

GET /v3/{project_id}/edgemgr/deployments

ief:deployment:list

-

PUT /v3/{project_id}/edgemgr/deployments/{deployment_id}

ief:deployment:update

-

POST /v3/{project_id}/edgemgr/deployments/{deployment_id}/pods/{pod_name}/restart

ief:deployment:update

-

DELETE /v3/{project_id}/edgemgr/deployments/{deployment_id}/pods/{pod_name}

ief:deployment:update

-

POST /v2/{project_id}/edgemgr/nodes/{node_id}/action

ief:node:action

-

PUT /v2/{project_id}/edgemgr/nodes/{node_id}/devices

ief:node:bindDevices

-

POST /v2/{project_id}/edgemgr/nodes

ief:node:create

-

POST /v2/{project_id}/edgemgr/nodes/{node_id}/certs

ief:node:createNodeCert

-

DELETE /v2/{project_id}/edgemgr/nodes/{node_id}

ief:node:delete

-

DELETE /v2/{project_id}/edgemgr/nodes/{node_id}/certs/{cert_id}

ief:node:deleteNodeCert

-

GET /v2/{project_id}/edgemgr/nodes/{node_id}

ief:node:get

-

GET /v2/{project_id}/edgemgr/nodes

ief:node:list

-

GET /v2/{project_id}/edgemgr/nodes/{node_id}/certs

ief:node:listNodeCert

-

-

ief:node:maintain

-

PUT /v2/{project_id}/edgemgr/nodes/{node_id}

ief:node:update

-

-

ief:node:upgrade

-

POST /v2/{project_id}/edgemgr/nodes/{node_id}/upgrade

ief:node:upgrade

-

POST /v2/{project_id}/productmgr/products

ief:product:create

-

DELETE /v2/{project_id}/productmgr/products/{product_id}

ief:product:delete

-

GET /v2/{project_id}/productmgr/products/{product_id}

ief:product:get

-

GET /v2/{project_id}/productmgr/products

ief:product:list

-

Resources

A resource type indicates the resources that an identity policy applies to. If you specify a resource type for any action in Table 3, the resource URN must be specified in the identity policy statements using that action, and the identity policy applies only to resources of this type. If no resource type is specified, the Resource element is marked with an asterisk (*) and the identity policy applies to all resources. You can also set condition keys in an identity policy to define resource types.

The following table lists the resource types that you can define in identity policy statements for IEF.

Table 3 Resource types supported by IEF

Resource Type

URN

appversion

ief:<region>:<account-id>:appversion:<appversion-name>

product

ief:<region>:<account-id>:product:<product-name>

group

ief:<region>:<account-id>:group:<group-name>

node

ief:<region>:<account-id>:node:<node-name>

application

ief:<region>:<account-id>:application:<app-name>

iefinstance

ief:<region>:<account-id>:iefinstance:<cluster-name>

batchjob

ief:<region>:<account-id>:batchjob:<job-name>

deployment

ief:<region>:<account-id>:deployment:<deployment-name>

Conditions

Condition Key Overview

A Condition element lets you specify conditions for when an identity policy is in effect. It contains condition keys and operators.

  • The condition key that you specify can be a global condition key or a service-specific condition key.
    • Global condition keys (with the g: prefix) apply to all actions. Cloud services do not need to provide user identity information. Instead, the system automatically obtains such information and authenticates users. For details, see Global Condition Keys.
    • Service-specific condition keys (with the abbreviation of a service name plus a colon as the prefix, for example, ief) apply only to operations of the xx service. For details, see Table 4.
    • The number of values associated with a condition key in the request context of an API call makes the condition key single-valued or multivalued. Single-valued condition keys have at most one value in the request context of an API call. Multivalued condition keys can have multiple values in the request context of an API call. For example, a request can originate from at most one VPC endpoint, so g:SourceVpce is a single-valued condition key. You can tag resources and include multiple tag key-value pairs in a request, so g:TagKeys is a multivalued condition key.
  • A condition operator, condition key, and a condition value together constitute a complete condition statement. An identity policy can be applied only when its request conditions are met. For supported condition operators, see operators.

Service-specific condition keys supported by IEF

The following table lists the condition keys that you can define in identity policies for IEF. You can include these condition keys to specify conditions for when your identity policy is in effect.

Table 4 Service-specific condition keys supported by IEF

Service-specific Condition Key

Type

Single-valued/Multivalued

Description

ief:IefInstanceId

string

Single-valued

Filters access by the ief instance ID that is passed in the request.