web应用防火墙 waf-j9九游会登录
云服务在iam预置了常用的权限,称为系统身份策略。如果iam系统身份策略无法满足授权要求,管理员可以根据各j9九游会登录的服务支持的授权项,创建iam自定义身份策略来进行精细的访问控制,iam自定义身份策略是对系统身份策略的扩展和补充。
除iam服务外,organizations服务中的服务控制策略(service control policy,以下简称scp)也可以使用这些授权项元素设置访问控制策略。
scp不直接进行授权,只划定权限边界。将scp绑定到组织单元或者成员账号时,并没有直接对组织单元或成员账号授予操作权限,而是规定了成员账号或组织单元包含的成员账号的授权范围。iam身份策略授予权限的有效性受scp限制,只有在scp允许范围内的权限才能生效。
iam服务与organizations服务在使用这些元素进行访问控制时,存在着一些区别,详情请参见:iam服务与organizations服务权限访问控制的区别。
本章节介绍iam服务身份策略授权场景中自定义身份策略和组织服务中scp使用的元素,这些元素包含了操作(action)、资源(resource)和条件(condition)。
操作(action)
操作(action)即为身份策略中支持的授权项。
- “访问级别”列描述如何对操作进行分类(list、read和write等)。此分类可帮助您了解在身份策略中相应操作对应的访问级别。
- “资源类型”列指每个操作是否支持资源级权限。
- 资源类型支持通配符号*表示所有。如果此列没有值(-),则必须在身份策略语句的resource元素中指定所有资源类型(“*”)。
- 如果该列包含资源类型,则必须在具有该操作的语句中指定该资源的urn。
- 资源类型列中必需资源在表中用星号(*)标识,表示使用此操作必须指定该资源类型。
关于waf定义的资源类型的详细信息请参见资源类型(resource)。
- “条件键”列包括了可以在身份策略语句的condition元素中支持指定的键值。
- 如果该授权项资源类型列存在值,则表示条件键仅对列举的资源类型生效。
- 如果该授权项资源类型列没有值(-),则表示条件键对整个授权项生效。
- 如果此列条件键没有值(-),表示此操作不支持指定条件键。
关于waf定义的条件键的详细信息请参见条件(condition)。
- “别名”列包括了可以在身份策略中配置的策略授权项。通过这些授权项,可以控制支持策略授权的api访问。详细信息请参见身份策略兼容性说明。
您可以在身份策略语句的action元素中指定以下waf的相关操作。
|
授权项 |
描述 |
访问级别 |
资源类型(*为必须) |
条件键 |
别名 |
|---|---|---|---|---|---|
|
waf:host:list |
授予查询防护域名列表的权限。 |
list |
host * |
- |
|
|
- |
|||||
|
waf:host:create |
授予创建防护域名的权限。 |
write |
host * |
- |
|
|
policy |
- |
||||
|
certificate |
- |
||||
|
- |
|||||
|
waf:host:get |
授予查询防护域名的权限。 |
read |
host * |
|
|
|
waf:host:put |
授予更新防护域名的权限。 |
write |
host * |
|
|
|
certificate |
- |
||||
|
waf:host:delete |
授予删除防护域名的权限。 |
write |
host * |
|
|
|
waf:sourceip:get |
授予查询回源ip信息的权限。 |
read |
- |
- |
- |
|
waf:policy:list |
授予查询防护策略列表的权限。 |
list |
policy * |
- |
- |
|
- |
|||||
|
waf:policy:create |
授予创建防护策略的权限。 |
write |
policy * |
- |
- |
|
- |
|||||
|
waf:policy:get |
授予查询防护策略的权限。 |
read |
policy * |
- |
|
|
waf:policy:put |
授予更新防护策略的权限。 |
write |
policy * |
- |
|
|
host |
- |
||||
|
waf:policy:delete |
授予删除防护策略的权限。 |
write |
policy * |
- |
|
|
waf:ccrule:list |
授予查询cc规则列表的权限。 |
list |
policy * |
- |
|
|
- |
|||||
|
waf:ccrule:create |
授予创建cc规则的权限。 |
write |
policy * |
- |
- |
|
- |
|||||
|
waf:ccrule:get |
授予查询cc规则的权限。 |
read |
policy * |
- |
|
|
waf:ccrule:put |
授予更新cc规则的权限。 |
write |
policy * |
|
|
|
waf:ccrule:delete |
授予删除cc规则的权限。 |
write |
policy * |
- |
|
|
waf:preciseprotectionrule:list |
授予查询精准防护规则列表的权限。 |
list |
policy * |
- |
- |
|
- |
|||||
|
waf:preciseprotectionrule:create |
授予创建精准防护规则的权限。 |
write |
policy * |
- |
- |
|
- |
|||||
|
waf:preciseprotectionrule:get |
授予查询精准防护规则的权限。 |
read |
policy * |
- |
|
|
waf:preciseprotectionrule:put |
授予更新精准防护规则的权限。 |
write |
policy * |
- |
|
|
waf:preciseprotectionrule:delete |
授予删除精准防护规则的权限。 |
write |
policy * |
- |
|
|
waf:whiteblackiprule:list |
授予查询黑白名单规则列表的权限。 |
list |
policy * |
- |
- |
|
- |
|||||
|
waf:whiteblackiprule:create |
授予创建黑白名单规则的权限。 |
write |
policy * |
- |
- |
|
- |
|||||
|
waf:whiteblackiprule:get |
授予查询黑白名单规则的权限。 |
read |
policy * |
- |
|
|
waf:whiteblackiprule:put |
授予更新黑白名单规则的权限。 |
write |
policy * |
- |
|
|
waf:whiteblackiprule:delete |
授予删除黑白名单规则的权限。 |
write |
policy * |
- |
|
|
waf:privacyrule:list |
授予查询隐私屏蔽规则列表的权限。 |
list |
policy * |
- |
- |
|
- |
|||||
|
waf:privacyrule:create |
授予创建隐私屏蔽规则的权限。 |
write |
policy * |
- |
- |
|
- |
|||||
|
waf:privacyrule:get |
授予查询隐私屏蔽规则的权限。 |
read |
policy * |
- |
|
|
waf:privacyrule:put |
授予更新隐私屏蔽规则的权限。 |
write |
policy * |
- |
|
|
waf:privacyrule:delete |
授予删除隐私屏蔽规则的权限。 |
write |
policy * |
- |
|
|
waf:falsealarmmaskrule:list |
授予查询误报屏蔽规则列表的权限。 |
list |
policy * |
- |
- |
|
- |
|||||
|
waf:falsealarmmaskrule:create |
授予创建误报屏蔽规则的权限。 |
write |
policy * |
- |
- |
|
- |
|||||
|
waf:falsealarmmaskrule:get |
授予查询误报屏蔽规则的权限。 |
read |
policy * |
- |
|
|
waf:falsealarmmaskrule:put |
授予更新误报屏蔽规则的权限。 |
write |
policy * |
|
|
|
waf:falsealarmmaskrule:delete |
授予删除误报屏蔽规则的权限。 |
write |
policy * |
- |
|
|
waf:geoiprule:list |
授予查询地理位置封禁规则列表的权限。 |
list |
policy * |
- |
- |
|
- |
|||||
|
waf:geoiprule:create |
授予创建地理位置封禁规则的权限。 |
write |
policy * |
- |
- |
|
- |
|||||
|
waf:geoiprule:get |
授予查询地理位置封禁规则的权限。 |
read |
policy * |
- |
|
|
waf:geoiprule:put |
授予更新地理位置封禁规则的权限。 |
write |
policy * |
- |
|
|
waf:geoiprule:delete |
授予删除地理位置封禁规则的权限。 |
write |
policy * |
- |
|
|
waf:antitamperrule:list |
授予查询网页防篡改规则列表的权限。 |
list |
policy * |
- |
- |
|
- |
|||||
|
waf:antitamperrule:create |
授予创建网页防篡改规则的权限。 |
write |
policy * |
- |
- |
|
- |
|||||
|
waf:antitamperrule:get |
授予查询网页防篡改规则的权限。 |
read |
policy * |
- |
|
|
waf:antitamperrule:put |
授予更新网页防篡改规则的权限。 |
write |
policy * |
- |
|
|
waf:antitamperrule:delete |
授予删除网页防篡改规则的权限。 |
write |
policy * |
- |
|
|
waf:antileakagerule:list |
授予查询反敏感信息泄漏规则列表的权限。 |
list |
policy * |
- |
- |
|
- |
|||||
|
waf:antileakagerule:create |
授予创建反敏感信息泄漏规则的权限。 |
write |
policy * |
- |
- |
|
- |
|||||
|
waf:antileakagerule:get |
授予查询反敏感信息泄漏规则的权限。 |
read |
policy * |
- |
|
|
waf:antileakagerule:put |
授予更新反敏感信息泄漏规则的权限。 |
write |
policy * |
- |
|
|
waf:antileakagerule:delete |
授予删除反敏感信息泄漏规则的权限。 |
write |
policy * |
- |
|
|
waf:anticrawlerrule:list |
授予查询反爬虫规则列表的权限。 |
list |
policy * |
- |
- |
|
- |
|||||
|
waf:anticrawlerrule:create |
授予创建反爬虫规则的权限。 |
write |
policy * |
- |
- |
|
- |
|||||
|
waf:anticrawlerrule:get |
授予查询反爬虫规则的权限。 |
read |
policy * |
- |
|
|
waf:anticrawlerrule:put |
授予更新反爬虫规则的权限。 |
write |
policy * |
- |
|
|
waf:anticrawlerrule:delete |
授予删除反爬虫规则的权限。 |
write |
policy * |
- |
|
|
waf:punishmentrule:list |
授予查询攻击惩罚规则列表的权限。 |
list |
policy * |
- |
- |
|
- |
|||||
|
waf:punishmentrule:create |
授予创建攻击惩罚规则的权限。 |
write |
policy * |
- |
- |
|
- |
|||||
|
waf:punishmentrule:get |
授予查询攻击惩罚规则的权限。 |
read |
policy * |
- |
|
|
waf:punishmentrule:put |
授予更新攻击惩罚规则的权限。 |
write |
policy * |
- |
|
|
waf:punishmentrule:delete |
授予删除攻击惩罚规则的权限。 |
write |
policy * |
- |
|
|
waf:valuelist:list |
授予查询引用表列表的权限。 |
list |
- |
- |
|
|
waf:valuelist:create |
授予创建引用表的权限。 |
write |
- |
- |
|
|
waf:valuelist:get |
授予查询引用表的权限。 |
read |
- |
- |
|
|
waf:valuelist:put |
授予更新引用表的权限。 |
write |
- |
- |
|
|
waf:valuelist:delete |
授予删除引用表的权限。 |
write |
- |
- |
|
|
waf:ipgroup:list |
授予查询ip地址组列表的权限。 |
list |
- |
- |
|
|
waf:ipgroup:create |
授予创建ip地址组的权限。 |
write |
- |
- |
|
|
waf:ipgroup:get |
授予查询ip地址组的权限。 |
read |
- |
- |
|
|
waf:ipgroup:put |
授予修改ip地址组的权限。 |
write |
- |
- |
|
|
waf:ipgroup:delete |
授予删除ip地址组的权限。 |
write |
- |
- |
|
|
waf:certificate:list |
授予查看证书列表的权限。 |
list |
certificate * |
- |
- |
|
- |
|||||
|
waf:certificate:create |
授予创建证书的权限。 |
write |
certificate * |
- |
- |
|
- |
|||||
|
waf:certificate:get |
授予查询证书的权限。 |
read |
certificate * |
- |
|
|
waf:certificate:put |
授予修改waf证书的权限。 |
write |
certificate * |
- |
|
|
waf:certificate:delete |
授予删除证书的权限。 |
write |
certificate * |
- |
|
|
waf:certificate:apply |
授予应用证书到域名的权限。 |
write |
certificate * |
- |
|
|
host * |
- |
||||
|
waf:premiuminstance:list |
授予查询独享引擎实例列表的权限。 |
list |
premiuminstance * |
- |
- |
|
- |
|||||
|
waf:premiuminstance:create |
授予创建独享引擎实例的权限。 |
write |
premiuminstance * |
- |
- |
|
- |
|||||
|
waf:premiuminstance:get |
授予查询独享引擎实例的权限。 |
read |
premiuminstance * |
- |
|
|
waf:premiuminstance:put |
授予更新独享引擎实例的权限。 |
write |
premiuminstance * |
- |
|
|
waf:premiuminstance:delete |
授予删除独享引擎实例的权限。 |
write |
premiuminstance * |
- |
|
|
waf:event:get |
授予查询防护事件的权限。 |
read |
- |
- |
|
|
waf:ltsconfig:get |
授予查询对接云日志的配置的权限。 |
list |
- |
- |
|
|
waf:ltsconfig:put |
授予更新对接云日志配置的权限。 |
write |
- |
- |
|
|
waf:prepaid:create |
授予创建包周期订单的权限。 |
write |
- |
- |
|
|
waf:subscription:get |
授予查询云模式订购信息的权限。 |
read |
- |
- |
- |
|
waf:alert:get |
授予查询告警通知的配置的权限。 |
list |
- |
- |
- |
|
waf:alert:put |
授予更新告警通知配置的权限。 |
write |
- |
- |
- |
|
waf:consoleconfig:get |
授予查询页面配置信息的权限。 |
read |
- |
- |
- |
|
waf:bundle:get |
授予查询用户套餐信息的权限。 |
read |
- |
- |
|
|
waf:securityreportsubscription:list |
授予查询安全报告列表的权限。 |
read |
- |
- |
|
|
waf:tmsprojecttags:get |
授予查询tms项目标签的权限。 |
read |
- |
- |
waf的api通常对应着一个或多个授权项。表2展示了api与授权项的关系,以及该api需要依赖的授权项。
|
api |
对应的授权项 |
依赖的授权项 |
|---|---|---|
|
post /v1/{project_id}/waf/instance |
waf:host:create |
- |
|
delete /v1/{project_id}/waf/instance/{instance_id} |
waf:host:delete |
- |
|
get /v1/{project_id}/waf/instance |
waf:host:list |
- |
|
get /v1/{project_id}/waf/instance/{instance_id}/route |
waf:host:get |
- |
|
get /v1/{project_id}/waf/instance/{instance_id} |
waf:host:get |
- |
|
patch /v1/{project_id}/waf/instance/{instance_id} |
waf:host:put |
- |
|
put /v1/{project_id}/waf/instance/{instance_id}/protect-status |
waf:host:put |
- |
|
post /v1/{project_id}/premium-waf/host |
waf:host:create |
- |
|
delete /v1/{project_id}/premium-waf/host/{host_id} |
waf:host:delete |
- |
|
get /v1/{project_id}/premium-waf/host |
waf:host:list |
- |
|
get /v1/{project_id}/premium-waf/host/{host_id} |
waf:host:get |
- |
|
put /v1/{project_id}/premium-waf/host/{host_id} |
waf:host:put |
- |
|
put /v1/{project_id}/premium-waf/host/{host_id}/protect-status |
waf:host:put |
- |
|
post /v1/{project_id}/waf/policy |
waf:policy:create |
- |
|
delete /v1/{project_id}/waf/policy/{policy_id} |
waf:policy:delete |
- |
|
get /v1/{project_id}/waf/policy |
waf:policy:list |
- |
|
get /v1/{project_id}/waf/policy/{policy_id} |
waf:policy:get |
- |
|
patch /v1/{project_id}/waf/policy/{policy_id} |
waf:policy:put |
- |
|
put /v1/{project_id}/waf/policy/{policy_id} |
waf:policy:put |
- |
|
post /v1/{project_id}/waf/policy/{policy_id}/cc |
waf:ccrule:create |
- |
|
post /v1/{project_id}/waf/policy/{policy_id}/custom |
waf:preciseprotectionrule:create |
- |
|
post /v1/{project_id}/waf/policy/{policy_id}/antitamper |
waf:antitamperrule:create |
- |
|
post /v1/{project_id}/waf/policy/{policy_id}/antileakage |
waf:antileakagerule:create |
- |
|
post /v1/{project_id}/waf/policy/{policy_id}/anticrawler |
waf:anticrawlerrule:create |
- |
|
post /v1/{project_id}/waf/policy/{policy_id}/punishment |
waf:punishmentrule:create |
- |
|
post /v1/{project_id}/waf/policy/{policy_id}/geoip |
waf:geoiprule:create |
- |
|
post /v1/{project_id}/waf/policy/{policy_id}/ignore |
waf:falsealarmmaskrule:create |
- |
|
post /v1/{project_id}/waf/policy/{policy_id}/privacy |
waf:privacyrule:create |
- |
|
post /v1/{project_id}/waf/valuelist |
waf:valuelist:create |
- |
|
post /v1/{project_id}/waf/policy/{policy_id}/whiteblackip |
waf:whiteblackiprule:create |
- |
|
delete /v1/{project_id}/waf/policy/{policy_id}/cc/{rule_id} |
waf:ccrule:delete |
- |
|
delete /v1/{project_id}/waf/policy/{policy_id}/custom/{rule_id} |
waf:preciseprotectionrule:delete |
- |
|
delete /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id} |
waf:antitamperrule:delete |
- |
|
delete /v1/{project_id}/waf/policy/{policy_id}/antileakage/{rule_id} |
waf:antileakagerule:delete |
- |
|
delete /v1/{project_id}/waf/policy/{policy_id}/anticrawler/{rule_id} |
waf:anticrawlerrule:delete |
- |
|
delete /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id} |
waf:punishmentrule:delete |
- |
|
delete /v1/{project_id}/waf/policy/{policy_id}/geoip/{rule_id} |
waf:geoiprule:delete |
- |
|
delete /v1/{project_id}/waf/policy/{policy_id}/ignore/{rule_id} |
waf:falsealarmmaskrule:delete |
- |
|
delete /v1/{project_id}/waf/policy/{policy_id}/privacy/{rule_id} |
waf:privacyrule:delete |
- |
|
delete /v1/{project_id}/waf/valuelist/{valuelistid} |
waf:valuelist:delete |
- |
|
delete /v1/{project_id}/waf/policy/{policy_id}/whiteblackip/{rule_id} |
waf:whiteblackiprule:delete |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/custom |
waf:preciseprotectionrule:list |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/cc |
waf:ccrule:list |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/antitamper |
waf:antitamperrule:list |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/antileakage |
waf:antileakagerule:list |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/anticrawler |
waf:anticrawlerrule:list |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/punishment |
waf:punishmentrule:list |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/geoip |
waf:geoiprule:list |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/ignore |
waf:falsealarmmaskrule:list |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/privacy |
waf:privacyrule:list |
- |
|
get /v1/{project_id}/waf/valuelist |
waf:valuelist:list |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/whiteblackip |
waf:whiteblackiprule:list |
- |
|
put /v1/{project_id}/waf/policy/{policy_id}/cc/{rule_id} |
waf:ccrule:put |
- |
|
put /v1/{project_id}/waf/policy/{policy_id}/custom/{rule_id} |
waf:preciseprotectionrule:put |
- |
|
put /v1/{project_id}/waf/policy/{policy_id}/geoip/{rule_id} |
waf:geoiprule:put |
- |
|
post /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id}/refresh |
waf:antitamperrule:put |
- |
|
put /v1/{project_id}/waf/policy/{policy_id}/antileakage/{rule_id} |
waf:antileakagerule:put |
- |
|
put /v1/{project_id}/waf/policy/{policy_id}/anticrawler/{rule_id} |
waf:anticrawlerrule:put |
- |
|
put /v1/{project_id}/waf/policy/{policy_id}/anticrawler |
waf:anticrawlerrule:put |
- |
|
put /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id} |
waf:punishmentrule:put |
- |
|
put /v1/{project_id}/waf/policy/{policy_id}/{ruletype}/{rule_id}/status |
waf:whiteblackiprule:put |
- |
|
put /v1/{project_id}/waf/policy/{policy_id}/privacy/{rule_id} |
waf:privacyrule:put |
- |
|
put /v1/{project_id}/waf/valuelist/{valuelistid} |
waf:valuelist:put |
- |
|
put /v1/{project_id}/waf/policy/{policy_id}/whiteblackip/{rule_id} |
waf:whiteblackiprule:put |
- |
|
put /v1/{project_id}/waf/policy/{policy_id}/ignore/{rule_id} |
waf:falsealarmmaskrule:put |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/cc/{rule_id} |
waf:ccrule:get |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/custom/{rule_id} |
waf:preciseprotectionrule:get |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/whiteblackip/{rule_id} |
waf:whiteblackiprule:get |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/privacy/{rule_id} |
waf:privacyrule:get |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/ignore/{rule_id} |
waf:falsealarmmaskrule:get |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/geoip/{rule_id} |
waf:geoiprule:get |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/antitamper/{rule_id} |
waf:antitamperrule:get |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/antileakage/{rule_id} |
waf:antileakagerule:get |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/anticrawler/{rule_id} |
waf:anticrawlerrule:get |
- |
|
get /v1/{project_id}/waf/policy/{policy_id}/punishment/{rule_id} |
waf:punishmentrule:get |
- |
|
get /v1/{project_id}/waf/valuelist/{valuelistid} |
waf:valuelist:get |
- |
|
post /v1/{project_id}/waf/ip-groups |
waf:ipgroup:create |
- |
|
delete /v1/{project_id}/waf/ip-group/{id} |
waf:ipgroup:delete |
- |
|
get /v1/{project_id}/waf/ip-groups |
waf:ipgroup:list |
- |
|
get /v1/{project_id}/waf/ip-group/{id} |
waf:ipgroup:get |
- |
|
put /v1/{project_id}/waf/ip-group/{id} |
waf:ipgroup:put |
- |
|
post /v1/{project_id}/waf/certificate/{certificate_id}/apply-to-hosts |
waf:certificate:apply |
- |
|
post /v1/{project_id}/waf/certificate |
waf:certificate:create |
- |
|
delete /v1/{project_id}/waf/certificate/{certificate_id} |
waf:certificate:delete |
- |
|
get /v1/{project_id}/waf/certificate |
waf:certificate:list |
- |
|
get /v1/{project_id}/waf/certificate/{certificate_id} |
waf:certificate:get |
- |
|
put /v1/{project_id}/waf/certificate/{certificate_id} |
waf:certificate:put |
- |
|
get /v1/{project_id}/waf/event |
waf:event:get |
- |
|
get /v1/{project_id}/waf/event/{eventid} |
waf:event:get |
- |
|
get /v1/{project_id}/waf/overviews/bandwidth/timeline |
waf:event:get |
- |
|
get /v1/{project_id}/waf/overviews/classification |
waf:event:get |
- |
|
get /v1/{project_id}/waf/overviews/qps/timeline |
waf:event:get |
- |
|
get /v1/{project_id}/waf/overviews/request/timeline |
waf:event:get |
- |
|
get /v1/{project_id}/waf/overviews/statistics |
waf:event:get |
- |
|
get /v1/{project_id}/waf/overviews/abnormal |
waf:event:get |
- |
|
get /v1/{project_id}/waf/config/console |
waf:consoleconfig:get |
- |
|
post /v1/{project_id}/premium-waf/instance |
waf:premiuminstance:create |
- |
|
delete /v1/{project_id}/premium-waf/instance/{instance_id} |
waf:premiuminstance:delete |
- |
|
get /v1/{project_id}/premium-waf/instance |
waf:premiuminstance:list |
- |
|
put /v1/{project_id}/premium-waf/instance/{instance_id} |
waf:premiuminstance:put |
- |
|
get /v1/{project_id}/premium-waf/instance/{instance_id} |
waf:premiuminstance:get |
- |
|
get /v1/{project_id}/waf/config/lts |
waf:ltsconfig:get |
- |
|
put /v1/{project_id}/waf/config/lts/{ltsconfig_id} |
waf:ltsconfig:put |
- |
|
post /v1/{project_id}/waf/subscription/batchalter/prepaid-cloud-waf |
waf:prepaid:create |
- |
|
post /v1/{project_id}/waf/subscription/purchase/prepaid-cloud-waf |
waf:prepaid:create |
- |
|
get /v1/{project_id}/waf/subscription |
waf:subscription:get |
- |
|
get /v2/{project_id}/waf/alerts |
waf:alert:get |
- |
|
put /v2/{project_id}/waf/alert/{alert_id} |
waf:alert:put |
- |
|
get /v1/{project_id}/waf/config/source-ip |
waf:sourceip:get |
- |
|
post /v1/{project_id}/composite-waf/hosts/migration |
waf:host:create |
- |
|
get /v1/{project_id}/composite-waf/host |
waf:host:list |
- |
|
get /v1/{project_id}/composite-waf/host/{host_id} |
waf:host:get |
- |
|
get /v1/{project_id}/waf/bundle |
waf:bundle:get |
- |
|
get /v1/{project_id}/waf/security-report/subscriptions |
waf:securityreportsubscription:list |
- |
|
get /v1/{project_id}/waf/overviews/attack/action-types |
waf:event:get |
- |
|
get /v1/{project_id}/waf/policy/basic-protection/default-rules |
waf:policy:get |
- |
|
get /v1/{project_id}/waf/tag/geoip/map |
waf:geoiprule:get |
- |
|
- |
waf:policy:get |
- |
|
- |
waf:policy:get |
- |
|
- |
waf:policy:get |
- |
|
- |
waf:policy:get |
- |
|
- |
waf:policy:get |
- |
|
- |
waf:policy:get |
- |
|
- |
waf:policy:get |
- |
资源类型(resource)
资源类型(resource)表示身份策略所作用的资源。如表3中的某些操作指定了可以在该操作指定的资源类型,则必须在具有该操作的身份策略语句中指定该资源的urn,身份策略仅作用于此资源;如未指定,resource默认为“*”,则身份策略将应用到所有资源。您也可以在身份策略中设置条件,从而指定资源类型。
waf定义了以下可以在自定义身份策略的resource元素中使用的资源类型。
|
资源类型 |
urn |
|---|---|
|
policy |
waf: |
|
host |
waf: |
|
premiuminstance |
waf: |
|
certificate |
waf: |
条件(condition)
waf服务不支持在身份策略中的条件键中配置服务级的条件键。waf可以使用适用于所有服务的全局条件键,请参考全局条件键。
相关文档
意见反馈
文档内容是否对您有帮助?
如您有其它疑问,您也可以通过华为云社区问答频道来与我们联系探讨