更新时间:2025-09-26 GMT+08:00
分享

Web应用防火墙 WAF

云服务在IAM预置了常用授权项,称为系统身份策略。如果IAM系统身份策略无法满足授权要求,管理员可以根据各服务支持的授权项,创建IAM自定义身份策略来进行精细的访问控制,IAM自定义身份策略是对系统身份策略的扩展和补充。

除IAM服务外,Organizations服务中的服务控制策略(Service Control Policy,以下简称SCP)也可以使用这些授权项元素设置访问控制策略。

SCP不直接进行授权,只划定权限边界。将SCP绑定到组织单元或者成员账号时,并没有直接对组织单元或成员账号授予操作权限,而是规定了成员账号或组织单元包含的成员账号的授权范围。IAM身份策略授予权限的有效性受SCP限制,只有在SCP允许范围内的权限才能生效。

IAM服务与Organizations服务在使用这些元素进行访问控制时,存在着一些区别,详情请参见:IAM服务与Organizations服务权限访问控制的区别

本章节介绍IAM服务身份策略授权场景中自定义身份策略和组织服务中SCP使用的元素,这些元素包含了操作(Action)、资源(Resource)和条件(Condition)。

操作(Action)

操作(Action)即为身份策略中支持的授权项。

  • “访问级别”列描述如何对操作进行分类(List、Read和Write等)。此分类可帮助您了解在身份策略中相应操作对应的访问级别。
  • “资源类型”列指每个操作是否支持资源级权限。
    • 资源类型支持通配符号*表示所有。如果此列没有值(-),则必须在身份策略语句的Resource元素中指定所有资源类型(“*”)。
    • 如果该列包含资源类型,则必须在具有该操作的语句中指定该资源的URN。
    • 资源类型列中必需资源在表中用星号(*)标识,表示使用此操作必须指定该资源类型。

    关于WAF定义的资源类型的详细信息请参见资源类型(Resource)

  • “条件键”列包括了可以在身份策略语句的Condition元素中支持指定的键值。
    • 如果该授权项资源类型列存在值,则表示条件键仅对列举的资源类型生效。
    • 如果该授权项资源类型列没有值(-),则表示条件键对整个授权项生效。
    • 如果此列条件键没有值(-),表示此操作不支持指定条件键。

    关于WAF定义的条件键的详细信息请参见条件(Condition)

  • “别名”列包括了可以在身份策略中配置的策略授权项。通过这些授权项,可以控制支持策略授权的API访问。详细信息请参见身份策略兼容性说明

您可以在身份策略语句的Action元素中指定以下WAF的相关操作。

表1 WAF支持的授权项

授权项

描述

访问级别

资源类型(*为必须)

条件键

别名

waf:host:list

授予查询防护域名列表的权限。

List

host *

-

waf:instance:list

-

g:EnterpriseProjectId

waf:host:create

授予创建防护域名的权限。

Write

host *

-

waf:instance:create

policy

-

certificate

-

-

g:EnterpriseProjectId

waf:host:get

授予查询防护域名的权限。

Read

host *

g:EnterpriseProjectId

waf:instance:get

waf:host:put

授予更新防护域名的权限。

Write

host *

g:EnterpriseProjectId

waf:instance:put

certificate

-

waf:host:delete

授予删除防护域名的权限。

Write

host *

g:EnterpriseProjectId

waf:instance:delete

waf:sourceIp:get

授予查询回源IP信息的权限。

Read

-

-

-

waf:policy:list

授予查询防护策略列表的权限。

List

policy *

-

-

-

g:EnterpriseProjectId

waf:policy:create

授予创建防护策略的权限。

Write

policy *

-

-

-

g:EnterpriseProjectId

waf:policy:get

授予查询防护策略的权限。

Read

policy *

g:EnterpriseProjectId

-

waf:policy:put

授予更新防护策略的权限。

Write

policy *

g:EnterpriseProjectId

-

host

-

waf:policy:delete

授予删除防护策略的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:ccRule:list

授予查询cc规则列表的权限。

List

policy *

-

waf:ccRuleRule:list

-

g:EnterpriseProjectId

waf:ccRule:create

授予创建cc规则的权限。

Write

policy *

-

-

-

g:EnterpriseProjectId

waf:ccRule:get

授予查询cc规则的权限。

Read

policy *

g:EnterpriseProjectId

-

waf:ccRule:put

授予更新cc规则的权限。

Write

policy *

g:EnterpriseProjectId

waf:ccRuleRule:put

waf:ccRule:delete

授予删除cc规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:preciseProtectionRule:list

授予查询精准防护规则列表的权限。

List

policy *

-

-

-

g:EnterpriseProjectId

waf:preciseProtectionRule:create

授予创建精准防护规则的权限。

Write

policy *

-

-

-

g:EnterpriseProjectId

waf:preciseProtectionRule:get

授予查询精准防护规则的权限。

Read

policy *

g:EnterpriseProjectId

-

waf:preciseProtectionRule:put

授予更新精准防护规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:preciseProtectionRule:delete

授予删除精准防护规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:whiteBlackIpRule:list

授予查询黑白名单规则列表的权限。

List

policy *

-

-

-

g:EnterpriseProjectId

waf:whiteBlackIpRule:create

授予创建黑白名单规则的权限。

Write

policy *

-

-

-

g:EnterpriseProjectId

waf:whiteBlackIpRule:get

授予查询黑白名单规则的权限。

Read

policy *

g:EnterpriseProjectId

-

waf:whiteBlackIpRule:put

授予更新黑白名单规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:whiteBlackIpRule:delete

授予删除黑白名单规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:privacyRule:list

授予查询隐私屏蔽规则列表的权限。

List

policy *

-

-

-

g:EnterpriseProjectId

waf:privacyRule:create

授予创建隐私屏蔽规则的权限。

Write

policy *

-

-

-

g:EnterpriseProjectId

waf:privacyRule:get

授予查询隐私屏蔽规则的权限。

Read

policy *

g:EnterpriseProjectId

-

waf:privacyRule:put

授予更新隐私屏蔽规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:privacyRule:delete

授予删除隐私屏蔽规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:falseAlarmMaskRule:list

授予查询误报屏蔽规则列表的权限。

List

policy *

-

-

-

g:EnterpriseProjectId

waf:falseAlarmMaskRule:create

授予创建误报屏蔽规则的权限。

Write

policy *

-

-

-

g:EnterpriseProjectId

waf:falseAlarmMaskRule:get

授予查询误报屏蔽规则的权限。

Read

policy *

g:EnterpriseProjectId

-

waf:falseAlarmMaskRule:put

授予更新误报屏蔽规则的权限。

Write

policy *

g:EnterpriseProjectId

waf:falseAlarmMaskRule:recount

waf:falseAlarmMaskRule:delete

授予删除误报屏蔽规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:geoIpRule:list

授予查询地理位置封禁规则列表的权限。

List

policy *

-

-

-

g:EnterpriseProjectId

waf:geoIpRule:create

授予创建地理位置封禁规则的权限。

Write

policy *

-

-

-

g:EnterpriseProjectId

waf:geoIpRule:get

授予查询地理位置封禁规则的权限。

Read

policy *

g:EnterpriseProjectId

-

waf:geoIpRule:put

授予更新地理位置封禁规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:geoIpRule:delete

授予删除地理位置封禁规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:antiTamperRule:list

授予查询网页防篡改规则列表的权限。

List

policy *

-

-

-

g:EnterpriseProjectId

waf:antiTamperRule:create

授予创建网页防篡改规则的权限。

Write

policy *

-

-

-

g:EnterpriseProjectId

waf:antiTamperRule:get

授予查询网页防篡改规则的权限。

Read

policy *

g:EnterpriseProjectId

-

waf:antiTamperRule:put

授予更新网页防篡改规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:antiTamperRule:delete

授予删除网页防篡改规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:antiLeakageRule:list

授予查询反敏感信息泄漏规则列表的权限。

List

policy *

-

-

-

g:EnterpriseProjectId

waf:antiLeakageRule:create

授予创建反敏感信息泄漏规则的权限。

Write

policy *

-

-

-

g:EnterpriseProjectId

waf:antiLeakageRule:get

授予查询反敏感信息泄漏规则的权限。

Read

policy *

g:EnterpriseProjectId

-

waf:antiLeakageRule:put

授予更新反敏感信息泄漏规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:antiLeakageRule:delete

授予删除反敏感信息泄漏规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:anticrawlerRule:list

授予查询反爬虫规则列表的权限。

List

policy *

-

-

-

g:EnterpriseProjectId

waf:anticrawlerRule:create

授予创建反爬虫规则的权限。

Write

policy *

-

-

-

g:EnterpriseProjectId

waf:anticrawlerRule:get

授予查询反爬虫规则的权限。

Read

policy *

g:EnterpriseProjectId

-

waf:anticrawlerRule:put

授予更新反爬虫规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:anticrawlerRule:delete

授予删除反爬虫规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:punishmentRule:list

授予查询攻击惩罚规则列表的权限。

List

policy *

-

-

-

g:EnterpriseProjectId

waf:punishmentRule:create

授予创建攻击惩罚规则的权限。

Write

policy *

-

-

-

g:EnterpriseProjectId

waf:punishmentRule:get

授予查询攻击惩罚规则的权限。

Read

policy *

g:EnterpriseProjectId

-

waf:punishmentRule:put

授予更新攻击惩罚规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:punishmentRule:delete

授予删除攻击惩罚规则的权限。

Write

policy *

g:EnterpriseProjectId

-

waf:valueList:list

授予查询引用表列表的权限。

List

-

g:EnterpriseProjectId

-

waf:valueList:create

授予创建引用表的权限。

Write

-

g:EnterpriseProjectId

-

waf:valueList:get

授予查询引用表的权限。

Read

-

g:EnterpriseProjectId

-

waf:valueList:put

授予更新引用表的权限。

Write

-

g:EnterpriseProjectId

-

waf:valueList:delete

授予删除引用表的权限。

Write

-

g:EnterpriseProjectId

-

waf:ipgroup:list

授予查询IP地址组列表的权限。

List

-

g:EnterpriseProjectId

-

waf:ipgroup:create

授予创建IP地址组的权限。

Write

-

g:EnterpriseProjectId

-

waf:ipgroup:get

授予查询IP地址组的权限。

Read

-

g:EnterpriseProjectId

-

waf:ipgroup:put

授予修改IP地址组的权限。

Write

-

g:EnterpriseProjectId

-

waf:ipgroup:delete

授予删除IP地址组的权限。

Write

-

g:EnterpriseProjectId

-

waf:certificate:list

授予查看证书列表的权限。

List

certificate *

-

-

-

g:EnterpriseProjectId

waf:certificate:create

授予创建证书的权限。

Write

certificate *

-

-

-

g:EnterpriseProjectId

waf:certificate:get

授予查询证书的权限。

Read

certificate *

g:EnterpriseProjectId

-

waf:certificate:put

授予修改WAF证书的权限。

Write

certificate *

g:EnterpriseProjectId

-

waf:certificate:delete

授予删除证书的权限。

Write

certificate *

g:EnterpriseProjectId

-

waf:certificate:apply

授予应用证书到域名的权限。

Write

certificate *

g:EnterpriseProjectId

-

host *

-

waf:premiumInstance:list

授予查询独享引擎实例列表的权限。

List

premiumInstance *

-

-

-

g:EnterpriseProjectId

waf:premiumInstance:create

授予创建独享引擎实例的权限。

Write

premiumInstance *

-

-

-

waf:premiumInstance:get

授予查询独享引擎实例的权限。

Read

premiumInstance *

-

waf:premiumInstance:put

授予更新独享引擎实例的权限。

Write

premiumInstance *

-

waf:premiumInstance:delete

授予删除独享引擎实例的权限。

Write

premiumInstance *

-

waf:event:get

授予查询防护事件的权限。

Read

-

g:EnterpriseProjectId

-

waf:ltsConfig:get

授予查询对接云日志的配置的权限。

List

-

g:EnterpriseProjectId

-

waf:ltsConfig:put

授予更新对接云日志配置的权限。

Write

-

g:EnterpriseProjectId

-

waf:prepaid:create

授予创建包周期订单的权限。

Write

-

-

waf:subscription:get

授予查询云模式订购信息的权限。

Read

-

-

-

waf:alert:get

授予查询告警通知的配置的权限。

List

-

-

-

waf:alert:put

授予更新告警通知配置的权限。

Write

-

-

-

waf:consoleConfig:get

授予查询页面配置信息的权限。

Read

-

-

-

WAF的API通常对应着一个或多个授权项。表2展示了API与授权项的关系,以及该API需要依赖的授权项。

表2 API与授权项的关系

API

对应的授权项

依赖的授权项

POST /v1/{project_id}/waf/instance

waf:host:create

-

DELETE /v1/{project_id}/waf/instance/{instance_id}

waf:host:delete

-

GET /v1/{project_id}/waf/instance

waf:host:list

-

GET /v1/{project_id}/waf/instance/{instance_id}/route

waf:host:get

-

GET /v1/{project_id}/waf/instance/{instance_id}

waf:host:get

-

PATCH /v1/{project_id}/waf/instance/{instance_id}

waf:host:put

-

PUT /v1/{project_id}/waf/instance/{instance_id}/protect-status

waf:host:put

-

POST /v1/{project_id}/premium-waf/host

waf:host:create

-

DELETE /v1/{project_id}/premium-waf/host/{host_id}

waf:host:delete

-

GET /v1/{project_id}/premium-waf/host

waf:host:list

-

GET /v1/{project_id}/premium-waf/host/{host_id}

waf:host:get

-

PUT /v1/{project_id}/premium-waf/host/{host_id}

waf:host:put

-

PUT /v1/{project_id}/premium-waf/host/{host_id}/protect-status

waf:host:put

-

POST /v1/{project_id}/waf/policy

waf:policy:create

-

DELETE /v1/{project_id}/waf/policy/{policy_id}

waf:policy:delete

-

GET /v1/{project_id}/waf/policy

waf:policy:list

-

GET /v1/{project_id}/waf/policy/{policy_id}

waf:policy:get

-

PATCH /v1/{project_id}/waf/policy/{policy_id}

waf:policy:put

-

PUT /v1/{project_id}/waf/policy/{policy_id}

waf:policy:put

-

POST /v1/{project_id}/waf/policy/{policy_id}/cc

waf:ccRule:create

-

POST /v1/{project_id}/waf/policy/{policy_id}/custom

waf:preciseProtectionRule:create

-

POST /v1/{project_id}/waf/policy/{policy_id}/antitamper

waf:antiTamperRule:create

-

POST /v1/{project_id}/waf/policy/{policy_id}/antileakage

waf:antiLeakageRule:create

-

POST /v1/{project_id}/waf/policy/{policy_id}/anticrawler

waf:anticrawlerRule:create

-

POST /v1/{project_id}/waf/policy/{policy_id}/punishment

waf:punishmentRule:create

-

POST /v1/{project_id}/waf/policy/{policy_id}/geoip

waf:geoIpRule:create

-

POST /v1/{project_id}/waf/policy/{policy_id}/ignore

waf:falseAlarmMaskRule:create

-

POST /v1/{project_id}/waf/policy/{policy_id}/privacy

waf:privacyRule:create

-

POST /v1/{project_id}/waf/valuelist

waf:valueList:create

-

POST /v1/{project_id}/waf/policy/{policy_id}/whiteblackip

waf:whiteBlackIpRule:create

-

DELETE /v1/{project_id}/waf/policy/{policy_id}/cc/{rule_id}

waf:ccRule:delete

-

DELETE /v1/{project_id}/waf/policy/{policy_id}/custom/{rule_id}

waf:preciseProtectionRule:delete

-

DELETE /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id}

waf:antiTamperRule:delete

-

DELETE /v1/{project_id}/waf/policy/{policy_id}/antileakage/{rule_id}

waf:antiLeakageRule:delete

-

DELETE /v1/{project_id}/waf/policy/{policy_id}/anticrawler/{rule_id}

waf:anticrawlerRule:delete

-

DELETE /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id}

waf:punishmentRule:delete

-

DELETE /v1/{project_id}/waf/policy/{policy_id}/geoip/{rule_id}

waf:geoIpRule:delete

-

DELETE /v1/{project_id}/waf/policy/{policy_id}/ignore/{rule_id}

waf:falseAlarmMaskRule:delete

-

DELETE /v1/{project_id}/waf/policy/{policy_id}/privacy/{rule_id}

waf:privacyRule:delete

-

DELETE /v1/{project_id}/waf/valuelist/{valuelistid}

waf:valueList:delete

-

DELETE /v1/{project_id}/waf/policy/{policy_id}/whiteblackip/{rule_id}

waf:whiteBlackIpRule:delete

-

GET /v1/{project_id}/waf/policy/{policy_id}/custom

waf:preciseProtectionRule:list

-

GET /v1/{project_id}/waf/policy/{policy_id}/cc

waf:ccRule:list

-

GET /v1/{project_id}/waf/policy/{policy_id}/antitamper

waf:antiTamperRule:list

-

GET /v1/{project_id}/waf/policy/{policy_id}/antileakage

waf:antiLeakageRule:list

-

GET /v1/{project_id}/waf/policy/{policy_id}/anticrawler

waf:anticrawlerRule:list

-

GET /v1/{project_id}/waf/policy/{policy_id}/punishment

waf:punishmentRule:list

-

GET /v1/{project_id}/waf/policy/{policy_id}/geoip

waf:geoIpRule:list

-

GET /v1/{project_id}/waf/policy/{policy_id}/ignore

waf:falseAlarmMaskRule:list

-

GET /v1/{project_id}/waf/policy/{policy_id}/privacy

waf:privacyRule:list

-

GET /v1/{project_id}/waf/valuelist

waf:valueList:list

-

GET /v1/{project_id}/waf/policy/{policy_id}/whiteblackip

waf:whiteBlackIpRule:list

-

PUT /v1/{project_id}/waf/policy/{policy_id}/cc/{rule_id}

waf:ccRule:put

-

PUT /v1/{project_id}/waf/policy/{policy_id}/custom/{rule_id}

waf:preciseProtectionRule:put

-

PUT /v1/{project_id}/waf/policy/{policy_id}/geoip/{rule_id}

waf:geoIpRule:put

-

POST /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id}/refresh

waf:antiTamperRule:put

-

PUT /v1/{project_id}/waf/policy/{policy_id}/antileakage/{rule_id}

waf:antiLeakageRule:put

-

PUT /v1/{project_id}/waf/policy/{policy_id}/anticrawler/{rule_id}

waf:anticrawlerRule:put

-

PUT /v1/{project_id}/waf/policy/{policy_id}/anticrawler

waf:anticrawlerRule:put

-

PUT /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id}

waf:punishmentRule:put

-

PUT /v1/{project_id}/waf/policy/{policy_id}/{ruletype}/{rule_id}/status

waf:whiteBlackIpRule:put

-

PUT /v1/{project_id}/waf/policy/{policy_id}/privacy/{rule_id}

waf:privacyRule:put

-

PUT /v1/{project_id}/waf/valuelist/{valuelistid}

waf:valueList:put

-

PUT /v1/{project_id}/waf/policy/{policy_id}/whiteblackip/{rule_id}

waf:whiteBlackIpRule:put

-

PUT /v1/{project_id}/waf/policy/{policy_id}/ignore/{rule_id}

waf:falseAlarmMaskRule:put

-

GET /v1/{project_id}/waf/policy/{policy_id}/cc/{rule_id}

waf:ccRule:get

-

GET /v1/{project_id}/waf/policy/{policy_id}/custom/{rule_id}

waf:preciseProtectionRule:get

-

GET /v1/{project_id}/waf/policy/{policy_id}/whiteblackip/{rule_id}

waf:whiteBlackIpRule:get

-

GET /v1/{project_id}/waf/policy/{policy_id}/privacy/{rule_id}

waf:privacyRule:get

-

GET /v1/{project_id}/waf/policy/{policy_id}/ignore/{rule_id}

waf:falseAlarmMaskRule:get

-

GET /v1/{project_id}/waf/policy/{policy_id}/geoip/{rule_id}

waf:geoIpRule:get

-

GET /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id}

waf:antiTamperRule:get

-

GET /v1/{project_id}/waf/policy/{policy_id}/antileakage/{rule_id}

waf:antiLeakageRule:get

-

GET /v1/{project_id}/waf/policy/{policy_id}/anticrawler/{rule_id}

waf:anticrawlerRule:get

-

GET /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id}

waf:punishmentRule:get

-

GET /v1/{project_id}/waf/valuelist/{valuelistid}

waf:valueList:get

-

POST /v1/{project_id}/waf/ip-groups

waf:ipgroup:create

-

DELETE /v1/{project_id}/waf/ip-group/{id}

waf:ipgroup:delete

-

GET /v1/{project_id}/waf/ip-groups

waf:ipgroup:list

-

GET /v1/{project_id}/waf/ip-group/{id}

waf:ipgroup:get

-

PUT /v1/{project_id}/waf/ip-group/{id}

waf:ipgroup:put

-

POST /v1/{project_id}/waf/certificate/{certificate_id}/apply-to-hosts

waf:certificate:apply

-

POST /v1/{project_id}/waf/certificate

waf:certificate:create

-

DELETE /v1/{project_id}/waf/certificate/{certificate_id}

waf:certificate:delete

-

GET /v1/{project_id}/waf/certificate

waf:certificate:list

-

GET /v1/{project_id}/waf/certificate/{certificate_id}

waf:certificate:get

-

PUT /v1/{project_id}/waf/certificate/{certificate_id}

waf:certificate:put

-

GET /v1/{project_id}/waf/event

waf:event:get

-

GET /v1/{project_id}/waf/event/{eventid}

waf:event:get

-

GET /v1/{project_id}/waf/overviews/bandwidth/timeline

waf:event:get

-

GET /v1/{project_id}/waf/overviews/classification

waf:event:get

-

GET /v1/{project_id}/waf/overviews/qps/timeline

waf:event:get

-

GET /v1/{project_id}/waf/overviews/request/timeline

waf:event:get

-

GET /v1/{project_id}/waf/overviews/statistics

waf:event:get

-

GET /v1/{project_id}/waf/overviews/abnormal

waf:event:get

-

GET /v1/{project_id}/waf/config/console

waf:consoleConfig:get

-

POST /v1/{project_id}/premium-waf/instance

waf:premiumInstance:create

-

DELETE /v1/{project_id}/premium-waf/instance/{instance_id}

waf:premiumInstance:delete

-

GET /v1/{project_id}/premium-waf/instance

waf:premiumInstance:list

-

PUT /v1/{project_id}/premium-waf/instance/{instance_id}

waf:premiumInstance:put

-

GET /v1/{project_id}/premium-waf/instance/{instance_id}

waf:premiumInstance:get

-

GET /v1/{project_id}/waf/config/lts

waf:ltsConfig:get

-

PUT /v1/{project_id}/waf/config/lts/{ltsconfig_id}

waf:ltsConfig:put

-

POST /v1/{project_id}/waf/subscription/batchalter/prepaid-cloud-waf

waf:prepaid:create

-

POST /v1/{project_id}/waf/subscription/purchase/prepaid-cloud-waf

waf:prepaid:create

-

GET /v1/{project_id}/waf/subscription

waf:subscription:get

-

GET /v2/{project_id}/waf/alerts

waf:alert:get

-

PUT /v2/{project_id}/waf/alert/{alert_id}

waf:alert:put

-

GET /v1/{project_id}/waf/config/source-ip

waf:sourceIp:get

-

POST /v1/{project_id}/composite-waf/hosts/migration

waf:host:create

-

GET /v1/{project_id}/composite-waf/host

waf:host:list

-

GET /v1/{project_id}/composite-waf/host/{host_id}

waf:host:get

-

资源类型(Resource)

资源类型(Resource)表示身份策略所作用的资源。如表3中的某些操作指定了可以在该操作指定的资源类型,则必须在具有该操作的身份策略语句中指定该资源的URN,身份策略仅作用于此资源;如未指定,Resource默认为“*”,则身份策略将应用到所有资源。您也可以在身份策略中设置条件,从而指定资源类型。

WAF定义了以下可以在自定义身份策略的Resource元素中使用的资源类型。

表3 WAF支持的资源类型

资源类型

URN

policy

waf:<region>:<account-id>:policy:<policy-id>

host

waf:<region>:<account-id>:host:<host-id>

premiumInstance

waf:<region>:<account-id>:premiumInstance:<instance-id>

certificate

waf:<region>:<account-id>:certificate:<certificate-id>

条件(Condition)

WAF服务不支持在身份策略中的条件键中配置服务级的条件键。WAF可以使用适用于所有服务的全局条件键,请参考全局条件键

相关文档