统一身份认证服务 IAM
云服务在IAM预置了常用的权限,称为系统身份策略。如果IAM系统身份策略无法满足授权要求,管理员可以根据各服务支持的授权项,创建IAM自定义身份策略来进行精细的访问控制,IAM自定义身份策略是对系统身份策略的扩展和补充。
除IAM服务外,Organizations服务中的服务控制策略(Service Control Policy,以下简称SCP)也可以使用这些授权项元素设置访问控制策略。
SCP不直接进行授权,只划定权限边界。将SCP绑定到组织单元或者成员账号时,并没有直接对组织单元或成员账号授予操作权限,而是规定了成员账号或组织单元包含的成员账号的授权范围。IAM身份策略授予权限的有效性受SCP限制,只有在SCP允许范围内的权限才能生效。
IAM服务与Organizations服务在使用这些元素进行访问控制时,存在着一些区别,详情请参见:IAM服务与Organizations服务权限访问控制的区别。
本章节介绍IAM服务身份策略授权场景中自定义身份策略和组织服务中SCP使用的元素,这些元素包含了操作(Action)、资源(Resource)和条件(Condition)。
操作(Action)
操作(Action)即为身份策略中支持的授权项。
- “访问级别”列描述如何对操作进行分类(List、Read和Write等)。此分类可帮助您了解在身份策略中相应操作对应的访问级别。
- “资源类型”列指每个操作是否支持资源级权限。
- 资源类型支持通配符号*表示所有。如果此列没有值(-),则必须在身份策略语句的Resource元素中指定所有资源类型(“*”)。
- 如果该列包含资源类型,则必须在具有该操作的语句中指定该资源的URN。
- 资源类型列中必需资源在表中用星号(*)标识,表示使用此操作必须指定该资源类型。
关于IAM定义的资源类型的详细信息请参见资源类型(Resource)。
- “条件键”列包括了可以在身份策略语句的Condition元素中支持指定的键值。
- 如果该授权项资源类型列存在值,则表示条件键仅对列举的资源类型生效。
- 如果该授权项资源类型列没有值(-),则表示条件键对整个授权项生效。
- 如果此列条件键没有值(-),表示此操作不支持指定条件键。
关于IAM定义的条件键的详细信息请参见条件(Condition)。
- “别名”列包括了可以在身份策略中配置的策略授权项。通过这些授权项,可以控制支持策略授权的API访问。详细信息请参见身份策略兼容性说明。
您可以在身份策略语句的Action元素中指定以下IAM的相关操作。
授权项 | 描述 | 访问级别 | 资源类型(*为必须) | 条件键 | 别名 |
|---|---|---|---|---|---|
iam::listAccessKeys | 授予列举永久访问密钥的权限。 | List | - | - |
|
iam::createAccessKey | 授予创建永久访问密钥的权限。 | Write | - | - |
|
iam::getAccessKey | 授予查询永久访问密钥的权限。 | Read | - | - |
|
iam::updateAccessKey | 授予修改永久访问密钥的权限。 | Write | - | - |
|
iam::deleteAccessKey | 授予删除永久访问密钥的权限。 | Write | - | - |
|
iam:projects:list | 授予列举项目的权限。 | List | - | - |
|
iam:projects:create | 授予创建项目的权限。 | Write | - | - |
|
iam:projects:listForUser | 授予列举指定用户项目的权限。 | List | - | - |
|
iam:projects:update | 授予修改项目的权限。 | Write | - | - |
|
iam:groups:list | 授予列举用户组的权限。 | List | - | - |
|
iam:groups:create | 授予创建用户组的权限。 | Write | - | - |
|
iam:groups:get | 授予查询用户组的权限。 | Read | - | - |
|
iam:groups:delete | 授予删除用户组的权限。 | Write | - | - |
|
iam:groups:update | 授予修改用户组的权限。 | Write | - | - |
|
iam:groups:removeUser | 授予从用户组中移除用户的权限。 | Write | - | - |
|
iam:groups:listUsers | 授予列举指定用户组中用户的权限。 | List | - | - |
|
iam:groups:checkUser | 授予查询用户是否在用户组中的权限。 | Read | - | - |
|
iam:groups:addUser | 授予添加用户到用户组的权限。 | Write | - | - |
|
iam:users:create | 授予创建用户的权限。 | Write | - | - |
|
iam:users:get | 授予查询用户的权限。 | Read | - | - |
|
iam:users:update | 授予修改用户的权限。 | Write | - | - |
|
iam:users:list | 授予列举用户的权限。 | List | - | - |
|
iam:users:delete | 授予删除用户的权限。 | Write | - | - |
|
iam:users:listGroups | 授予列举指定用户所属用户组的权限。 | List | - | - |
|
iam:users:listVirtualMFADevices | 授予列举指定用户所属虚拟MFA设备的权限。 | List | - | - |
|
iam:users:createVirtualMFADevice | 授予创建虚拟MFA设备密钥的权限。 | Write | - | - |
|
iam:users:deleteVirtualMFADevice | 授予删除虚拟MFA设备的权限。 | Write | - | - |
|
iam:users:getVirtualMFADevice | 授予查询虚拟MFA设备的权限。 | Read | - | - |
|
iam:users:bindVirtualMFADevice | 授予绑定虚拟MFA设备的权限。 | Write | - | - |
|
iam:users:unbindVirtualMFADevice | 授予解绑虚拟MFA设备的权限。 | Write | - | - |
|
iam:identityProviders:list | 授予列举身份提供商的权限。 | List | - | - |
|
iam:identityProviders:get | 授予查询身份提供商的权限。 | Read | - | - |
|
iam:identityProviders:create | 授予创建身份提供商的权限。 | Write | - | - |
|
iam:identityProviders:delete | 授予删除身份提供商的权限。 | Write | - | - |
|
iam:identityProviders:update | 授予修改身份提供商的权限。 | Write | - | - |
|
iam:identityProviders:listMappings | 授予列举身份提供商映射关系的权限。 | List | - | - | - |
iam:identityProviders:getMapping | 授予查询身份提供商映射关系的权限。 | Read | - | - | - |
iam:identityProviders:createMapping | 授予创建身份提供商映射关系的权限。 | Write | - | - | - |
iam:identityProviders:deleteMapping | 授予删除身份提供商映射关系的权限。 | Write | - | - | - |
iam:identityProviders:updateMapping | 授予修改身份提供商映射关系的权限。 | Write | - | - | - |
iam:identityProviders:listProtocols | 授予列举身份提供商协议的权限。 | List | - | - | - |
iam:identityProviders:getProtocol | 授予查询身份提供商协议的权限。 | Read | - | - | - |
iam:identityProviders:createProtocol | 授予创建身份提供商协议的权限。 | Write | - | - | - |
iam:identityProviders:deleteProtocol | 授予删除身份提供商协议的权限。 | Write | - | - | - |
iam:identityProviders:updateProtocol | 授予修改身份提供商协议的权限。 | Write | - | - | - |
iam:identityProviders:getSAMLMetadata | 授予查询身份提供商SAML metadata文件的权限。 | Read | - | - |
|
iam:identityProviders:createSAMLMetadata | 授予创建身份提供商SAML metadata文件的权限。 | Write | - | - |
|
iam:identityProviders:getOIDCConfig | 授予查询身份提供商OIDC配置的权限。 | Read | - | - |
|
iam:identityProviders:createOIDCConfig | 授予创建身份提供商OIDC配置的权限。 | Write | - | - |
|
iam:identityProviders:updateOIDCConfig | 授予修改身份提供商OIDC配置的权限。 | Write | - | - |
|
iam:securityPolicies:getProtectPolicy | 授予查询操作保护策略的权限。 | Read | - | - | - |
iam:securityPolicies:updateProtectPolicy | 授予修改操作保护策略的权限。 | Write | - | - | - |
iam:securityPolicies:getPasswordPolicy | 授予查询密码策略的权限。 | Read | - | - | - |
iam:securityPolicies:updatePasswordPolicy | 授予修改密码策略的权限。 | Write | - | - | - |
iam:securityPolicies:getLoginPolicy | 授予查询登录策略的权限。 | Read | - | - | - |
iam:securityPolicies:updateLoginPolicy | 授予修改登录策略的权限。 | Write | - | - | - |
iam:securityPolicies:getConsoleAclPolicy | 授予查询控制台访问策略的权限。 | Read | - | - | - |
iam:securityPolicies:updateConsoleAclPolicy | 授予修改控制台访问策略的权限。 | Write | - | - | - |
iam:securityPolicies:getApiAclPolicy | 授予查询接口访问策略的权限。 | Read | - | - | - |
iam:securityPolicies:updateApiAclPolicy | 授予修改接口访问策略的权限。 | Write | - | - | - |
iam:securityPolicies:getPrivacyTransferPolicy | 授予查询账号信息跨境传输策略的权限。 | Read | - | - | - |
iam:securityPolicies:updatePrivacyTransferPolicy | 授予修改账号信息跨境传输策略的权限。 | Write | - | - | - |
iam:users:listLoginProtectSettings | 授予列举租户下用户登录保护设置的权限。 | List | - | - |
|
iam:users:getLoginProtectSetting | 授予查询登录保护设置的权限。 | Read | - | - |
|
iam:users:updateLoginProtectSetting | 授予修改登录保护设置的权限。 | Write | - | - |
|
iam:quotas:list | 授予列举配额的权限。 | List | - | - |
|
iam:quotas:listForProject | 授予查询项目配额的权限。 | List | - | - |
|
iam:agencies:pass | 授予向云服务传递委托的权限。 | Permission_management | agency * | - | - |
iam:roles:list | 授予查询权限列表的权限。 | List | - | - |
|
iam:roles:get | 授予查询权限详情的权限。 | Read | - | - |
|
iam::listRoleAssignments | 授予查询租户授权记录的权限。 | List | - | - |
|
iam:groups:listRolesOnDomain | 授予查询全局服务中用户组权限的权限。 | List | - | - |
|
iam:groups:listRolesOnProject | 授予查询项目服务中用户组权限的权限。 | List | - | - |
|
iam:groups:grantRoleOnDomain | 授予为用户组授予全局服务权限的权限。 | Write | - | - |
|
iam:groups:grantRoleOnProject | 授予为用户组授予项目级服务权限的权限。 | Write | - | - |
|
iam:groups:checkRoleOnDomain | 授予查询用户组是否拥有全局服务权限的权限。 | Read | - | - |
|
iam:groups:checkRoleOnProject | 授予查询用户组是否拥有项目服务权限的权限。 | Read | - | - |
|
iam:groups:listRoles | 授予查询用户组的所有权限的权限。 | List | - | - |
|
iam:groups:checkRole | 授予查询用户组是否拥有指定权限的权限。 | Read | - | - |
|
iam:groups:revokeRole | 授予移除用户组指定权限的权限。 | Write | - | - |
|
iam:groups:revokeRoleOnDomain | 授予移除用户组的全局服务权限的权限。 | Write | - | - |
|
iam:groups:revokeRoleOnProject | 授予移除用户组的项目服务权限的权限。 | Write | - | - |
|
iam:groups:grantRole | 授予为用户组授予指定权限的权限。 | Write | - | - |
|
iam:roles:create | 授予创建自定义策略的权限。 | Write | - | - |
|
iam:roles:update | 授予修改自定义策略的权限。 | Write | - | - |
|
iam:roles:delete | 授予删除自定义策略的权限。 | Write | - | - |
|
iam:agencies:list | 授予列出委托的权限。 | List | - | - |
|
iam:agencies:listSwitchAgencyHistories | 授予列出切换委托历史的权限。 | List | - | - | - |
iam:agencies:get | 授予查询指定委托详情的权限。 | Read | - | - |
|
iam:agencies:create | 授予创建委托的权限。 | Write | - | - |
|
iam:agencies:update | 授予修改委托的权限。 | Write | - | - |
|
iam:agencies:delete | 授予删除委托的权限。 | Write | - | - |
|
iam:agencies:listRolesOnDomain | 授予查询委托拥有的全局服务权限的权限。 | List | - | - |
|
iam:agencies:listRolesOnProject | 授予查询委托拥有的指定项目权限的权限。 | List | - | - |
|
iam:agencies:grantRoleOnDomain | 授予为委托授予全局服务权限的权限。 | Write | - | - |
|
iam:agencies:grantRoleOnProject | 授予为委托授予项目服务权限的权限。 | Write | - | - |
|
iam:agencies:checkRoleOnDomain | 授予查询委托是否拥有全局服务权限的权限。 | Read | - | - |
|
iam:agencies:checkRoleOnProject | 授予查询委托是否拥有项目服务权限的权限。 | Read | - | - |
|
iam:agencies:revokeRoleOnDomain | 授予移除委托的全局服务权限的权限。 | Write | - | - |
|
iam:agencies:revokeRoleOnProject | 授予移除委托的项目服务权限的权限。 | Write | - | - |
|
iam:agencies:listRoles | 授予查询委托的所有权限的权限。 | List | - | - |
|
iam:agencies:grantRole | 授予为委托授予指定权限的权限。 | Write | - | - |
|
iam:agencies:checkRole | 授予查询委托是否拥有指定权限的权限。 | Read | - | - |
|
iam:agencies:revokeRole | 授予移除委托的指定权限的权限。 | Write | - | - |
|
iam::listGroupsAssignedEnterpriseProject | 授予查询企业项目关联的用户组的权限。 | List | - | - |
|
iam:groups:listRolesOnEnterpriseProject | 授予查询企业项目已关联用户组的权限的权限。 | List | - | - |
|
iam:groups:grantRoleOnEnterpriseProject | 授予基于用户组为企业项目授权的权限。 | Write | - | - |
|
iam:groups:revokeRoleOnEnterpriseProject | 授予删除企业项目关联的用户组权限的权限。 | Write | - | - |
|
iam:groups:listAssignedEnterpriseProjects | 授予查询用户组直接关联的企业项目的权限。 | List | - | - |
|
iam:users:listAssignedEnterpriseProjects | 授予查询用户直接关联的企业项目的权限。 | List | - | - |
|
iam::listUsersAssignedEnterpriseProject | 授予查询企业项目直接关联用户的权限。 | List | - | - |
|
iam:users:listRolesOnEnterpriseProject | 授予查询企业项目直接关联用户权限的权限。 | List | - | - |
|
iam:users:grantRoleOnEnterpriseProject | 授予基于用户为企业项目授权的权限。 | Write | - | - |
|
iam:users:revokeRoleOnEnterpriseProject | 授予删除企业项目直接关联用户的权限的权限。 | Write | - | - |
|
iam:agencies:grantRoleOnEnterpriseProject | 授予基于委托为企业项目授权的权限。 | Write | - | - |
|
iam:agencies:revokeRoleOnEnterpriseProject | 授予删除企业项目关联的委托的权限的权限。 | Write | - | - |
|
iam:mfa:listMFADevicesV5 | 授予列举MFA设备的权限。 | List | mfa * | - | - |
iam:mfa:createVirtualMFADeviceV5 | 授予创建虚拟MFA设备的权限。 | Write | mfa * | - | - |
iam:mfa:deleteVirtualMFADeviceV5 | 授予删除虚拟MFA设备的权限。 | Write | mfa * | - | - |
iam:mfa:enableV5 | 授予启用MFA设备的权限。 | Write | mfa * | - | - |
iam:mfa:disableV5 | 授予禁用MFA设备的权限。 | Write | mfa * | - | - |
iam:securitypolicies:getPasswordPolicyV5 | 授予获取密码策略信息的权限。 | Read | - | - | - |
iam:securitypolicies:updatePasswordPolicyV5 | 授予修改密码策略的权限。 | Write | - | - | - |
iam:securitypolicies:getLoginPolicyV5 | 授予获取登录策略信息的权限。 | Read | - | - | - |
iam:securitypolicies:updateLoginPolicyV5 | 授予修改登录策略的权限。 | Write | - | - | - |
iam:credentials:listCredentialsV5 | 授予权限以列举IAM用户的永久访问密钥。 | List | user * | - | |
iam:credentials:showAccessKeyLastUsedV5 | 授予获取指定永久访问密钥最后一次使用时间的权限。 | Read | user * | - | |
iam:credentials:createCredentialV5 | 授予为IAM用户创建永久访问密钥的权限。 | Write | user * | - | |
iam:credentials:updateCredentialV5 | 授予为IAM用户修改永久访问密钥的权限。 | Write | user * | - | |
iam:credentials:deleteCredentialV5 | 授予为IAM用户删除永久访问密钥的权限。 | Write | user * | - | |
iam:users:changePasswordV5 | 授予IAM用户修改自己密码的权限。 | Write | user * | - | |
iam:users:showLoginProfileV5 | 授予获取IAM用户登录信息的权限。 | Read | user * | - | |
iam:users:createLoginProfileV5 | 授予为IAM用户创建登录信息的权限。 | Write | user * | - | |
iam:users:updateLoginProfileV5 | 授予为IAM用户修改登录信息的权限。 | Write | user * | - | |
iam:users:deleteLoginProfileV5 | 授予为IAM用户删除登录信息的权限。 | Write | user * | - | |
iam:users:listUsersV5 | 授予列举IAM用户的权限。 | List | user * | - | - |
iam:users:getUserV5 | 授予获取IAM用户信息的权限。 | Read | user * | - | |
iam:users:showUserLastLoginV5 | 授予获取IAM用户最后一次登录时间的权限。 | Read | user * | - | |
iam:users:createUserV5 | 授予创建IAM用户的权限。 | Write | user * | - | - |
iam:users:updateUserV5 | 授予修改IAM用户的权限。 | Write | user * | - | |
iam:users:deleteUserV5 | 授予删除IAM用户的权限。 | Write | user * | - | |
iam:groups:listGroupsV5 | 授予列举用户组的权限。 | List | group * | - | - |
iam:groups:getGroupV5 | 授予获取用户组信息的权限。 | Read | group * | - | - |
iam:groups:createGroupV5 | 授予创建用户组的权限。 | Write | group * | - | - |
iam:groups:updateGroupV5 | 授予修改用户组的权限。 | Write | group * | - | - |
iam:groups:deleteGroupV5 | 授予删除用户组的权限。 | Write | group * | - | - |
iam:permissions:addUserToGroupV5 | 授予添加IAM用户到用户组的权限。 | Write | group * | - | - |
iam:permissions:removeUserFromGroupV5 | 授予从用户组中移除IAM用户的权限。 | Write | group * | - | - |
iam:policies:listV5 | 授予列举身份策略的权限。 | List | policy * | - | - |
iam:policies:getV5 | 授予获取身份策略信息的权限。 | Read | policy * | - | - |
iam:policies:createV5 | 授予创建自定义身份策略的权限。 | Permission_management | policy * | - | - |
iam:policies:deleteV5 | 授予删除自定义身份策略的权限。 | Permission_management | policy * | - | - |
iam:policies:listVersionsV5 | 授予列举身份策略版本的权限。 | List | policy * | - | - |
iam:policies:getVersionV5 | 授予获取身份策略版本信息的权限。 | Read | policy * | - | - |
iam:policies:createVersionV5 | 授予为自定义身份策略创建新版本的权限。 | Permission_management | policy * | - | - |
iam:policies:deleteVersionV5 | 授予为自定义身份策略删除版本的权限。 | Permission_management | policy * | - | - |
iam:policies:setDefaultVersionV5 | 授予设置自定义身份策略默认版本的权限。 | Permission_management | policy * | - | - |
iam:agencies:attachPolicyV5 | 授予为委托或信任委托附加身份策略的权限。 | Permission_management | agency * | - | |
- | |||||
iam:groups:attachPolicyV5 | 授予为用户组附加身份策略的权限。 | Permission_management | group * | - | - |
- | |||||
iam:users:attachPolicyV5 | 授予为IAM用户附加身份策略的权限。 | Permission_management | user * | - | |
- | |||||
iam:agencies:detachPolicyV5 | 授予为委托或信任委托分离身份策略的权限。 | Permission_management | agency * | - | |
- | |||||
iam:groups:detachPolicyV5 | 授予为用户组分离身份策略的权限。 | Permission_management | group * | - | - |
- | |||||
iam:users:detachPolicyV5 | 授予为IAM用户分离身份策略的权限。 | Permission_management | user * | - | |
- | |||||
iam:policies:listEntitiesV5 | 授予权限以列举附加在身份策略上的所有实体。 | List | policy * | - | - |
iam:agencies:listAttachedPoliciesV5 | 授予权限以列举委托或信任委托附加的身份策略。 | List | agency * | - | |
iam:groups:listAttachedPoliciesV5 | 授予权限以列举用户组附加的身份策略。 | List | group * | - | - |
iam:users:listAttachedPoliciesV5 | 授予权限以列举IAM用户附加的身份策略。 | List | user * | - | |
iam:agencies:createServiceLinkedAgencyV5 | 授予创建服务关联委托的权限以允许云服务代表您执行操作。 | Write | agency * | - | - |
- | |||||
iam:agencies:deleteServiceLinkedAgencyV5 | 授予删除服务关联委托的权限。 | Write | agency * | - | |
- | |||||
iam:agencies:getServiceLinkedAgencyDeletionStatusV5 | 授予获取服务关联委托删除状态的权限。 | Read | agency * | - | - |
iam:agencies:listV5 | 授予列举委托及信任委托的权限。 | List | agency * | - | - |
iam:agencies:getV5 | 授予获取委托或信任委托信息的权限。 | Read | agency * | - | |
iam:agencies:createV5 | 授予创建信任委托的权限。 | Write | agency * | - | - |
iam:agencies:updateV5 | 授予修改信任委托的权限。 | Write | agency * | - | |
iam:agencies:deleteV5 | 授予删除信任委托的权限。 | Write | agency * | - | |
iam:agencies:updateTrustPolicyV5 | 授予修改信任委托信任策略的权限。 | Write | agency * | - | |
iam::listTagsForResourceV5 | 授予列举资源标签的权限。 | List | agency | - | |
user | |||||
iam::tagForResourceV5 | 授予设置资源标签的权限。 | Tagging | agency | - | |
user | |||||
- | |||||
iam::untagForResourceV5 | 授予删除资源标签的权限。 | Tagging | agency | - | |
user | |||||
- | |||||
iam::getAccountSummaryV5 | 授予获取此账号中IAM实体使用情况和IAM配额的摘要信息的权限。 | List | - | - | - |
iam::getAsymmetricSignatureSwitchV5 | 授予获取临时令牌非对称签名开关状态的权限。 | Read | - | - | - |
iam::setAsymmetricSignatureSwitchV5 | 授予设置临时令牌非对称签名开关状态的权限。 | Write | - | - | - |
IAM的API通常对应着一个或多个授权项。表2展示了API与授权项的关系,以及该API需要依赖的授权项。
API | 对应的授权项 | 依赖的授权项 |
|---|---|---|
GET /v3.0/OS-CREDENTIAL/credentials | iam::listAccessKeys | - |
POST /v3.0/OS-CREDENTIAL/credentials | iam::createAccessKey | - |
GET /v3.0/OS-CREDENTIAL/credentials/{access_key} | iam::getAccessKey | - |
PUT /v3.0/OS-CREDENTIAL/credentials/{access_key} | iam::updateAccessKey | - |
DELETE /v3.0/OS-CREDENTIAL/credentials/{access_key} | iam::deleteAccessKey | - |
GET /v3.0/OS-QUOTA/domains/{domain_id} | iam:quotas:list | - |
GET /v3.0/OS-QUOTA/projects/{project_id} | iam:quotas:listForProject | - |
GET /v3/projects | iam:projects:list | - |
POST /v3/projects | iam:projects:create | - |
GET /v3/users/{user_id}/projects | iam:projects:listForUser | - |
PATCH /v3/projects/{project_id} | iam:projects:update | - |
PUT /v3-ext/projects/{project_id} | iam:projects:update | - |
GET /v3/groups | iam:groups:list | - |
POST /v3/groups | iam:groups:create | - |
GET /v3/groups/{group_id} | iam:groups:get | - |
DELETE /v3/groups/{group_id} | iam:groups:delete | - |
PATCH /v3/groups/{group_id} | iam:groups:update | - |
GET /v3/groups/{group_id}/users | iam:groups:listUsers | - |
HEAD /v3/groups/{group_id}/users/{user_id} | iam:groups:checkUser | - |
PUT /v3/groups/{group_id}/users/{user_id} | iam:groups:addUser | - |
DELETE /v3/groups/{group_id}/users/{user_id} | iam:groups:removeUser | - |
POST /v3.0/OS-USER/users | iam:users:create | - |
GET /v3.0/OS-USER/users/{user_id} | iam:users:get | - |
PUT /v3.0/OS-USER/users/{user_id} | iam:users:update | - |
PUT /v3.0/OS-USER/users/{user_id}/info | iam:users:update | - |
GET /v3/users | iam:users:list | - |
POST /v3/users | iam:users:create | - |
GET /v3/users/{user_id} | iam:users:get | - |
DELETE /v3/users/{user_id} | iam:users:delete | - |
PATCH /v3/users/{user_id} | iam:users:update | - |
GET /v3/users/{user_id}/groups | iam:users:listGroups | - |
GET /v3.0/OS-MFA/virtual-mfa-devices | iam:users:listVirtualMFADevices | - |
POST /v3.0/OS-MFA/virtual-mfa-devices | iam:users:createVirtualMFADevice | - |
DELETE /v3.0/OS-MFA/virtual-mfa-devices | iam:users:deleteVirtualMFADevice | - |
GET /v3.0/OS-MFA/users/{user_id}/virtual-mfa-device | iam:users:getVirtualMFADevice | - |
PUT /v3.0/OS-MFA/mfa-devices/bind | iam:users:bindVirtualMFADevice | - |
PUT /v3.0/OS-MFA/mfa-devices/unbind | iam:users:unbindVirtualMFADevice | - |
GET /v3.0/OS-USER/login-protects | iam:users:listLoginProtectSettings | - |
GET /v3.0/OS-USER/users/{user_id}/login-protect | iam:users:getLoginProtectSetting | - |
PUT /v3.0/OS-USER/users/{user_id}/login-protect | iam:users:updateLoginProtectSetting | - |
GET /v3/OS-FEDERATION/identity_providers | iam:identityProviders:list | - |
GET /v3/OS-FEDERATION/identity_providers/{id} | iam:identityProviders:get | - |
PUT /v3/OS-FEDERATION/identity_providers/{id} | iam:identityProviders:create | - |
DELETE /v3/OS-FEDERATION/identity_providers/{id} | iam:identityProviders:delete | - |
PATCH /v3/OS-FEDERATION/identity_providers/{id} | iam:identityProviders:update | - |
GET /v3/OS-FEDERATION/mappings | iam:identityProviders:listMappings | - |
GET /v3/OS-FEDERATION/mappings/{id} | iam:identityProviders:getMapping | - |
PUT /v3/OS-FEDERATION/mappings/{id} | iam:identityProviders:createMapping | - |
DELETE /v3/OS-FEDERATION/mappings/{id} | iam:identityProviders:deleteMapping | - |
PATCH /v3/OS-FEDERATION/mappings/{id} | iam:identityProviders:updateMapping | - |
GET /v3/OS-FEDERATION/identity_providers/{idp_id}/protocols | iam:identityProviders:listProtocols | - |
GET /v3/OS-FEDERATION/identity_providers/{idp_id}/protocols/{protocol_id} | iam:identityProviders:getProtocol | - |
PUT /v3/OS-FEDERATION/identity_providers/{idp_id}/protocols/{protocol_id} | iam:identityProviders:createProtocol | - |
DELETE /v3/OS-FEDERATION/identity_providers/{idp_id}/protocols/{protocol_id} | iam:identityProviders:deleteProtocol | - |
PATCH /v3/OS-FEDERATION/identity_providers/{idp_id}/protocols/{protocol_id} | iam:identityProviders:updateProtocol | - |
GET /v3-ext/OS-FEDERATION/identity_providers/{idp_id}/protocols/{protocol_id}/metadata | iam:identityProviders:getSAMLMetadata | - |
POST /v3-ext/OS-FEDERATION/identity_providers/{idp_id}/protocols/{protocol_id}/metadata | iam:identityProviders:createSAMLMetadata | - |
GET /v3.0/OS-FEDERATION/identity-providers/{idp_id}/openid-connect-config | iam:identityProviders:getOIDCConfig | - |
POST /v3.0/OS-FEDERATION/identity-providers/{idp_id}/openid-connect-config | iam:identityProviders:createOIDCConfig | - |
PUT /v3.0/OS-FEDERATION/identity-providers/{idp_id}/openid-connect-config | iam:identityProviders:updateOIDCConfig | - |
GET /v3.0/OS-SECURITYPOLICY/domains/{domain_id}/protect-policy | iam:securityPolicies:getProtectPolicy | - |
PUT /v3.0/OS-SECURITYPOLICY/domains/{domain_id}/protect-policy | iam:securityPolicies:updateProtectPolicy | - |
GET /v3.0/OS-SECURITYPOLICY/domains/{domain_id}/password-policy | iam:securityPolicies:getPasswordPolicy | - |
PUT /v3.0/OS-SECURITYPOLICY/domains/{domain_id}/password-policy | iam:securityPolicies:updatePasswordPolicy | - |
GET /v3.0/OS-SECURITYPOLICY/domains/{domain_id}/login-policy | iam:securityPolicies:getLoginPolicy | - |
PUT /v3.0/OS-SECURITYPOLICY/domains/{domain_id}/login-policy | iam:securityPolicies:updateLoginPolicy | - |
GET /v3.0/OS-SECURITYPOLICY/domains/{domain_id}/console-acl-policy | iam:securityPolicies:getConsoleAclPolicy | - |
PUT /v3.0/OS-SECURITYPOLICY/domains/{domain_id}/console-acl-policy | iam:securityPolicies:updateConsoleAclPolicy | - |
GET /v3.0/OS-SECURITYPOLICY/domains/{domain_id}/api-acl-policy | iam:securityPolicies:getApiAclPolicy | - |
PUT /v3.0/OS-SECURITYPOLICY/domains/{domain_id}/api-acl-policy | iam:securityPolicies:updateApiAclPolicy | - |
GET /v3/roles | iam:roles:list | - |
GET /v3/roles/{role_id} | iam:roles:get | - |
GET /v3.0/OS-PERMISSION/role-assignments | iam::listRoleAssignments | - |
GET /v3/domains/{domain_id}/groups/{group_id}/roles | iam:groups:listRolesOnDomain | - |
GET /v3/projects/{project_id}/groups/{group_id}/roles | iam:groups:listRolesOnProject | - |
PUT /v3/domains/{domain_id}/groups/{group_id}/roles/{role_id} | iam:groups:grantRoleOnDomain | - |
PUT /v3/projects/{project_id}/groups/{group_id}/roles/{role_id} | iam:groups:grantRoleOnProject | - |
HEAD /v3/domains/{domain_id}/groups/{group_id}/roles/{role_id} | iam:groups:checkRoleOnDomain | - |
HEAD /v3/projects/{project_id}/groups/{group_id}/roles/{role_id} | iam:groups:checkRoleOnProject | - |
GET /v3/OS-INHERIT/domains/{domain_id}/groups/{group_id}/roles/inherited_to_projects | iam:groups:listRoles | - |
HEAD /v3/OS-INHERIT/domains/{domain_id}/groups/{group_id}/roles/{role_id}/inherited_to_projects | iam:groups:checkRole | - |
DELETE /v3/OS-INHERIT/domains/{domain_id}/groups/{group_id}/roles/{role_id}/inherited_to_projects | iam:groups:revokeRole | - |
DELETE /v3/domains/{domain_id}/groups/{group_id}/roles/{role_id} | iam:groups:revokeRoleOnDomain | - |
DELETE /v3/projects/{project_id}/groups/{group_id}/roles/{role_id} | iam:groups:revokeRoleOnProject | - |
PUT /v3/OS-INHERIT/domains/{domain_id}/groups/{group_id}/roles/{role_id}/inherited_to_projects | iam:groups:grantRole | - |
GET /v3.0/OS-ROLE/roles | iam:roles:list | - |
GET /v3.0/OS-ROLE/roles/{role_id} | iam:roles:get | - |
POST /v3.0/OS-ROLE/roles | iam:roles:create | - |
POST /v3.0/OS-ROLE/roles | iam:roles:create | - |
PATCH /v3.0/OS-ROLE/roles/{role_id} | iam:roles:update | - |
PATCH /v3.0/OS-ROLE/roles/{role_id} | iam:roles:update | - |
DELETE /v3.0/OS-ROLE/roles/{role_id} | iam:roles:delete | - |
GET /v3.0/OS-AGENCY/agencies | iam:agencies:list | - |
GET /v3.0/OS-AGENCY/agencies/{agency_id} | iam:agencies:get | - |
POST /v3.0/OS-AGENCY/agencies | iam:agencies:create | - |
PUT /v3.0/OS-AGENCY/agencies/{agency_id} | iam:agencies:update | - |
DELETE /v3.0/OS-AGENCY/agencies/{agency_id} | iam:agencies:delete | - |
GET /v3.0/OS-AGENCY/domains/{domain_id}/agencies/{agency_id}/roles | iam:agencies:listRolesOnDomain | - |
GET /v3.0/OS-AGENCY/projects/{project_id}/agencies/{agency_id}/roles | iam:agencies:listRolesOnProject | - |
PUT /v3.0/OS-AGENCY/domains/{domain_id}/agencies/{agency_id}/roles/{role_id} | iam:agencies:grantRoleOnDomain | - |
PUT /v3.0/OS-AGENCY/projects/{project_id}/agencies/{agency_id}/roles/{role_id} | iam:agencies:grantRoleOnProject | - |
HEAD /v3.0/OS-AGENCY/domains/{domain_id}/agencies/{agency_id}/roles/{role_id} | iam:agencies:checkRoleOnDomain | - |
HEAD /v3.0/OS-AGENCY/projects/{project_id}/agencies/{agency_id}/roles/{role_id} | iam:agencies:checkRoleOnProject | - |
DELETE /v3.0/OS-AGENCY/domains/{domain_id}/agencies/{agency_id}/roles/{role_id} | iam:agencies:revokeRoleOnDomain | - |
DELETE /v3.0/OS-AGENCY/projects/{project_id}/agencies/{agency_id}/roles/{role_id} | iam:agencies:revokeRoleOnProject | - |
GET /v3.0/OS-INHERIT/domains/{domain_id}/agencies/{agency_id}/roles/inherited_to_projects | iam:agencies:listRoles | - |
PUT /v3.0/OS-INHERIT/domains/{domain_id}/agencies/{agency_id}/roles/{role_id}/inherited_to_projects | iam:agencies:grantRole | - |
HEAD /v3.0/OS-INHERIT/domains/{domain_id}/agencies/{agency_id}/roles/{role_id}/inherited_to_projects | iam:agencies:checkRole | - |
DELETE /v3.0/OS-INHERIT/domains/{domain_id}/agencies/{agency_id}/roles/{role_id}/inherited_to_projects | iam:agencies:revokeRole | - |
GET /v3.0/OS-PERMISSION/enterprise-projects/{enterprise_project_id}/groups | iam::listGroupsAssignedEnterpriseProject | - |
GET /v3.0/OS-PERMISSION/enterprise-projects/{enterprise_project_id}/groups/{group_id}/roles | iam:groups:listRolesOnEnterpriseProject | - |
PUT /v3.0/OS-PERMISSION/enterprise-projects/{enterprise_project_id}/groups/{group_id}/roles/{role_id} | iam:groups:grantRoleOnEnterpriseProject | - |
DELETE /v3.0/OS-PERMISSION/enterprise-projects/{enterprise_project_id}/groups/{group_id}/roles/{role_id} | iam:groups:revokeRoleOnEnterpriseProject | - |
GET /v3.0/OS-PERMISSION/groups/{group_id}/enterprise-projects | iam:groups:listAssignedEnterpriseProjects | - |
GET /v3.0/OS-PERMISSION/users/{user_id}/enterprise-projects | iam:users:listAssignedEnterpriseProjects | - |
GET /v3.0/OS-PERMISSION/enterprise-projects/{enterprise_project_id}/users | iam::listUsersAssignedEnterpriseProject | - |
GET /v3.0/OS-PERMISSION/enterprise-projects/{enterprise_project_id}/users/{user_id}/roles | iam:users:listRolesOnEnterpriseProject | - |
PUT /v3.0/OS-PERMISSION/enterprise-projects/{enterprise_project_id}/users/{user_id}/roles/{role_id} | iam:users:grantRoleOnEnterpriseProject | - |
DELETE /v3.0/OS-PERMISSION/enterprise-projects/{enterprise_project_id}/users/{user_id}/roles/{role_id} | iam:users:revokeRoleOnEnterpriseProject | - |
PUT /v3.0/OS-PERMISSION/subjects/agency/scopes/enterprise-project/role-assignments | iam:agencies:grantRoleOnEnterpriseProject | - |
DELETE /v3.0/OS-PERMISSION/subjects/agency/scopes/enterprise-project/role-assignments | iam:agencies:revokeRoleOnEnterpriseProject | - |
GET /v5/asymmetric-signature-switch | iam::getAsymmetricSignatureSwitchV5 | - |
PUT /v5/asymmetric-signature-switch | iam::setAsymmetricSignatureSwitchV5 | - |
GET /v5/mfa-devices | iam:mfa:listMFADevicesV5 | - |
POST /v5/virtual-mfa-devices | iam:mfa:createVirtualMFADeviceV5 | - |
DELETE /v5/virtual-mfa-devices | iam:mfa:deleteVirtualMFADeviceV5 | - |
POST /v5/mfa-devices/enable | iam:mfa:enableV5 | - |
POST /v5/mfa-devices/disable | iam:mfa:disableV5 | - |
GET /v5/password-policy | iam:securitypolicies:getPasswordPolicyV5 | - |
PUT /v5/password-policy | iam:securitypolicies:updatePasswordPolicyV5 | - |
GET /v5/login-policy | iam:securitypolicies:getLoginPolicyV5 | - |
PUT /v5/login-policy | iam:securitypolicies:updateLoginPolicyV5 | - |
GET /v5/users/{user_id}/access-keys | iam:credentials:listCredentialsV5 | - |
GET /v5/users/{user_id}/access-keys/{access_key_id}/last-used | iam:credentials:showAccessKeyLastUsedV5 | - |
POST /v5/users/{user_id}/access-keys | iam:credentials:createCredentialV5 | - |
PUT /v5/users/{user_id}/access-keys/{access_key_id} | iam:credentials:updateCredentialV5 | - |
DELETE /v5/users/{user_id}/access-keys/{access_key_id} | iam:credentials:deleteCredentialV5 | - |
POST /v5/caller-password | iam:users:changePasswordV5 | - |
GET /v5/users/{user_id}/login-profile | iam:users:showLoginProfileV5 | - |
POST /v5/users/{user_id}/login-profile | iam:users:createLoginProfileV5 | - |
PUT /v5/users/{user_id}/login-profile | iam:users:updateLoginProfileV5 | - |
DELETE /v5/users/{user_id}/login-profile | iam:users:deleteLoginProfileV5 | - |
GET /v5/users | iam:users:listUsersV5 | - |
GET /v5/users/{user_id} | iam:users:getUserV5 | - |
GET /v5/users/{user_id}/last-login | iam:users:showUserLastLoginV5 | - |
POST /v5/users | iam:users:createUserV5 | - |
PUT /v5/users/{user_id} | iam:users:updateUserV5 | - |
DELETE /v5/users/{user_id} | iam:users:deleteUserV5 | - |
GET /v5/groups | iam:groups:listGroupsV5 | - |
GET /v5/groups/{group_id} | iam:groups:getGroupV5 | - |
POST /v5/groups | iam:groups:createGroupV5 | - |
PUT /v5/groups/{group_id} | iam:groups:updateGroupV5 | - |
DELETE /v5/groups/{group_id} | iam:groups:deleteGroupV5 | - |
POST /v5/groups/{group_id}/add-user | iam:permissions:addUserToGroupV5 | - |
POST /v5/groups/{group_id}/remove-user | iam:permissions:removeUserFromGroupV5 | - |
GET /v5/policies | iam:policies:listV5 | - |
GET /v5/policies/{policy_id} | iam:policies:getV5 | - |
POST /v5/policies | iam:policies:createV5 | - |
DELETE /v5/policies/{policy_id} | iam:policies:deleteV5 | - |
GET /v5/policies/{policy_id}/versions | iam:policies:listVersionsV5 | - |
GET /v5/policies/{policy_id}/versions/{version_id} | iam:policies:getVersionV5 | - |
POST /v5/policies/{policy_id}/versions | iam:policies:createVersionV5 | - |
DELETE /v5/policies/{policy_id}/versions/{version_id} | iam:policies:deleteVersionV5 | - |
POST /v5/policies/{policy_id}/versions/{version_id}/set-default | iam:policies:setDefaultVersionV5 | - |
POST /v5/policies/{policy_id}/attach-agency | iam:agencies:attachPolicyV5 | - |
POST /v5/policies/{policy_id}/attach-group | iam:groups:attachPolicyV5 | - |
POST /v5/policies/{policy_id}/attach-user | iam:users:attachPolicyV5 | - |
POST /v5/policies/{policy_id}/detach-agency | iam:agencies:detachPolicyV5 | - |
POST /v5/policies/{policy_id}/detach-group | iam:groups:detachPolicyV5 | - |
POST /v5/policies/{policy_id}/detach-user | iam:users:detachPolicyV5 | - |
GET /v5/policies/{policy_id}/attached-entities | iam:policies:listEntitiesV5 | - |
GET /v5/agencies/{agency_id}/attached-policies | iam:agencies:listAttachedPoliciesV5 | - |
GET /v5/groups/{group_id}/attached-policies | iam:groups:listAttachedPoliciesV5 | - |
GET /v5/users/{user_id}/attached-policies | iam:users:listAttachedPoliciesV5 | - |
PUT /v5/service-linked-agencies | iam:agencies:createServiceLinkedAgencyV5 | - |
DELETE /v5/service-linked-agencies/{agency_id} | iam:agencies:deleteServiceLinkedAgencyV5 | - |
GET /v5/service-linked-agencies/deletion-task/{deletion_task_id} | iam:agencies:getServiceLinkedAgencyDeletionStatusV5 | - |
GET /v5/agencies | iam:agencies:listV5 | - |
GET /v5/agencies/{agency_id} | iam:agencies:getV5 | - |
POST /v5/agencies | iam:agencies:createV5 | - |
PUT /v5/agencies/{agency_id} | iam:agencies:updateV5 | - |
DELETE /v5/agencies/{agency_id} | iam:agencies:deleteV5 | - |
PUT /v5/agencies/{agency_id}/trust-policy | iam:agencies:updateTrustPolicyV5 | - |
GET /v5/{resource_type}/{resource_id}/tags | iam::listTagsForResourceV5 | - |
POST /v5/{resource_type}/{resource_id}/tags/create | iam::tagForResourceV5 | - |
DELETE /v5/{resource_type}/{resource_id}/tags/delete | iam::untagForResourceV5 | - |
GET /v5/account-summary | iam::getAccountSummaryV5 | - |
资源类型(Resource)
资源类型(Resource)表示身份策略所作用的资源。如表3中的某些操作指定了可以在该操作指定的资源类型,则必须在具有该操作的身份策略语句中指定该资源的URN,身份策略仅作用于此资源;如未指定,Resource默认为“*”,则身份策略将应用到所有资源。您也可以在身份策略中设置条件,从而指定资源类型。
IAM定义了以下可以在自定义身份策略的Resource元素中使用的资源类型。
条件(Condition)
条件键概述
条件(Condition)是身份策略生效的特定条件,包括条件键和运算符。
- 条件键表示身份策略语句的Condition元素中的键值。根据适用范围,分为全局级条件键和服务级条件键。
- 全局级条件键(前缀为g:)适用于所有操作,在鉴权过程中,云服务不需要提供用户身份信息,系统将自动获取并鉴权。详情请参见:全局条件键。
- 服务级条件键(前缀通常为服务缩写,如iam:)仅适用于对应服务的操作,详情请参见表4。
- 单值/多值表示API调用时请求中与条件关联的值数。单值条件键在API调用时的请求中最多包含一个值,多值条件键在API调用时请求可以包含多个值。例如:g:SourceVpce是单值条件键,表示仅允许通过某个VPC终端节点发起请求访问某资源,一个请求最多包含一个VPC终端节点ID值。g:TagKeys是多值条件键,表示请求中携带的所有标签的key组成的列表,当用户在调用API请求时传入标签可以传入多个值。
- 运算符与条件键、条件值一起构成完整的条件判断语句,当请求信息满足该条件时,身份策略才能生效。支持的运算符请参见:运算符。
IAM支持的服务级条件键
IAM定义了以下可以在自定义身份策略的Condition元素中使用的条件键,您可以使用这些条件键进一步细化身份策略语句应用的条件。

