You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/account_and_service_management/account_information/iam-policies-api/guide.de-de.md
+71-2Lines changed: 71 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,7 +1,7 @@
1
1
---
2
2
title: Verwendung von IAM-Richtlinien mit der OVHcloud API (EN)
3
3
excerpt: "Find out how to give specific access rights to users from an OVHcloud account"
4
-
updated: 2024-08-21
4
+
updated: 2025-07-17
5
5
---
6
6
7
7
## Objective
@@ -126,6 +126,7 @@ The URNs and actions can end with a `*` wildcard character. This allows referrin
126
126
-**deny**: Array of actions explicitely denied for the identities regarding the resources. A denied action will be prevent no matter what others policies could allow
127
127
-**except**: Extension of the **allow** parameter. Array of actions not to allow even though they are included in the **allow** actions. For instance, this is useful when there is a wildcard allow action but it is necessary to exclude a specific action that otherwise would be included in the wildcard. Contrary to **deny**, **except** is limited to the current policy scope.
128
128
-**permissionsGroups**: List of [permissions groups](/pages/account_and_service_management/account_information/iam-permission-groups) applied to this policy.
129
+
-**conditions**: List conditions applied to the policy
129
130
-**expiredAt**: Date after which the policy will be disabled.
130
131
-**createdAt**: Creation date of the policy.
131
132
-**updateAt**: Last update date of the policy.
@@ -288,6 +289,74 @@ Check it via `GET /iam/policy`:
288
289
289
290
The policies have been created successfully. Now, "***user1***" can **carry out reboots and create snapshots** on the VPS "***urn:v1:eu:resource:vps:vps-5b48d78b.vps.ovh.net***". "***user2***" can **execute any vps action except for the deletion of snapshots** on the VPS "***urn:v1:eu:resource:vps:vps-5b48d78b.vps.ovh.net***".
290
291
292
+
#### Conditions
293
+
294
+
It is possible to add conditions to policies. The policy will only be valid if the conditions are met.
295
+
Conditions are added to an access policy in the following form:
For example, a policy with this condition is valid if the targeted resources are of type **dnsZone** with the tag **"environment:prod"**, except on **Saturday and Sunday** in the Paris time zone.
324
+
325
+
The operator field specifies how the conditions will be evaluated:
326
+
327
+
-**AND**: All conditions must be validated
328
+
-**NOT**: None of the conditions must be validated
329
+
-**OR**: At least one condition must be validated
330
+
-**MATCH**: Condition evaluation operator
331
+
332
+
The available conditions are:
333
+
334
+
| Condition | Operator | Data Type | Description | Example |
| request.IP | EQ <br>IN <br>IN_RANGE | IP v4 | Filter on client source IP | "request.IP.IN_RANGE": "10.23.0.0/16" |
343
+
344
+
Dates use time zones based on [IANA database names](https://en.wikipedia.org/wiki/List_of_tz_database_time_zones). If not specified, the date will be evaluated in UTC time zone.
345
+
346
+
The available operators for condition types are:
347
+
348
+
-**EQ**: The value must exactly match the specified value
349
+
-**BEFORE** or **LT** (less than): The value must be strictly less than
350
+
-**AFTER** or **GE** (greater or equal): The value must be equal to or greater than
351
+
-**GT** (greater than): The value must be strictly greater than
352
+
-**LE** (less or equal): The value must be equal to or less than
353
+
-**IN**: The value must be included in the list
354
+
-**START_WITH**: The value must start with the specified value
355
+
-**END_WITH**: The value must end with the specified value
356
+
-**IN_RANGE**: The value must be in the specified IP subnet
357
+
358
+
If not specified, the default operator is **EQ**.
359
+
291
360
### Identities
292
361
293
362
Policies apply to users, which can be accounts, users or user groups.
@@ -126,6 +126,7 @@ The URNs and actions can end with a `*` wildcard character. This allows referrin
126
126
-**deny**: Array of actions explicitely denied for the identities regarding the resources. A denied action will be prevent no matter what others policies could allow
127
127
-**except**: Extension of the **allow** parameter. Array of actions not to allow even though they are included in the **allow** actions. For instance, this is useful when there is a wildcard allow action but it is necessary to exclude a specific action that otherwise would be included in the wildcard. Contrary to **deny**, **except** is limited to the current policy scope.
128
128
-**permissionsGroups**: List of [permissions groups](/pages/account_and_service_management/account_information/iam-permission-groups) applied to this policy.
129
+
-**conditions**: List conditions applied to the policy
129
130
-**expiredAt**: Date after which the policy will be disabled.
130
131
-**createdAt**: Creation date of the policy.
131
132
-**updateAt**: Last update date of the policy.
@@ -288,6 +289,74 @@ Check it via `GET /iam/policy`:
288
289
289
290
The policies have been created successfully. Now, "***user1***" can **carry out reboots and create snapshots** on the VPS "***urn:v1:eu:resource:vps:vps-5b48d78b.vps.ovh.net***". "***user2***" can **execute any vps action except for the deletion of snapshots** on the VPS "***urn:v1:eu:resource:vps:vps-5b48d78b.vps.ovh.net***".
290
291
292
+
#### Conditions
293
+
294
+
It is possible to add conditions to policies. The policy will only be valid if the conditions are met.
295
+
Conditions are added to an access policy in the following form:
For example, a policy with this condition is valid if the targeted resources are of type **dnsZone** with the tag **"environment:prod"**, except on **Saturday and Sunday** in the Paris time zone.
324
+
325
+
The operator field specifies how the conditions will be evaluated:
326
+
327
+
-**AND**: All conditions must be validated
328
+
-**NOT**: None of the conditions must be validated
329
+
-**OR**: At least one condition must be validated
330
+
-**MATCH**: Condition evaluation operator
331
+
332
+
The available conditions are:
333
+
334
+
| Condition | Operator | Data Type | Description | Example |
| request.IP | EQ <br>IN <br>IN_RANGE | IP v4 | Filter on client source IP | "request.IP.IN_RANGE": "10.23.0.0/16" |
343
+
344
+
Dates use time zones based on [IANA database names](https://en.wikipedia.org/wiki/List_of_tz_database_time_zones). If not specified, the date will be evaluated in UTC time zone.
345
+
346
+
The available operators for condition types are:
347
+
348
+
-**EQ**: The value must exactly match the specified value
349
+
-**BEFORE** or **LT** (less than): The value must be strictly less than
350
+
-**AFTER** or **GE** (greater or equal): The value must be equal to or greater than
351
+
-**GT** (greater than): The value must be strictly greater than
352
+
-**LE** (less or equal): The value must be equal to or less than
353
+
-**IN**: The value must be included in the list
354
+
-**START_WITH**: The value must start with the specified value
355
+
-**END_WITH**: The value must end with the specified value
356
+
-**IN_RANGE**: The value must be in the specified IP subnet
357
+
358
+
If not specified, the default operator is **EQ**.
359
+
291
360
### Identities
292
361
293
362
Policies apply to users, which can be accounts, users or user groups.
@@ -296,7 +365,7 @@ This section describes how to retrieve or create user for the policy.
@@ -126,6 +126,7 @@ The URNs and actions can end with a `*` wildcard character. This allows referrin
126
126
-**deny**: Array of actions explicitely denied for the identities regarding the resources. A denied action will be prevent no matter what others policies could allow
127
127
-**except**: Extension of the **allow** parameter. Array of actions not to allow even though they are included in the **allow** actions. For instance, this is useful when there is a wildcard allow action but it is necessary to exclude a specific action that otherwise would be included in the wildcard. Contrary to **deny**, **except** is limited to the current policy scope.
128
128
-**permissionsGroups**: List of [permissions groups](/pages/account_and_service_management/account_information/iam-permission-groups) applied to this policy.
129
+
-**conditions**: List conditions applied to the policy
129
130
-**expiredAt**: Date after which the policy will be disabled.
130
131
-**createdAt**: Creation date of the policy.
131
132
-**updateAt**: Last update date of the policy.
@@ -288,6 +289,74 @@ Check it via `GET /iam/policy`:
288
289
289
290
The policies have been created successfully. Now, "***user1***" can **carry out reboots and create snapshots** on the VPS "***urn:v1:eu:resource:vps:vps-5b48d78b.vps.ovh.net***". "***user2***" can **execute any vps action except for the deletion of snapshots** on the VPS "***urn:v1:eu:resource:vps:vps-5b48d78b.vps.ovh.net***".
290
291
292
+
#### Conditions
293
+
294
+
It is possible to add conditions to policies. The policy will only be valid if the conditions are met.
295
+
Conditions are added to an access policy in the following form:
For example, a policy with this condition is valid if the targeted resources are of type **dnsZone** with the tag **"environment:prod"**, except on **Saturday and Sunday** in the Paris time zone.
324
+
325
+
The operator field specifies how the conditions will be evaluated:
326
+
327
+
-**AND**: All conditions must be validated
328
+
-**NOT**: None of the conditions must be validated
329
+
-**OR**: At least one condition must be validated
330
+
-**MATCH**: Condition evaluation operator
331
+
332
+
The available conditions are:
333
+
334
+
| Condition | Operator | Data Type | Description | Example |
| request.IP | EQ <br>IN <br>IN_RANGE | IP v4 | Filter on client source IP | "request.IP.IN_RANGE": "10.23.0.0/16" |
343
+
344
+
Dates use time zones based on [IANA database names](https://en.wikipedia.org/wiki/List_of_tz_database_time_zones). If not specified, the date will be evaluated in UTC time zone.
345
+
346
+
The available operators for condition types are:
347
+
348
+
-**EQ**: The value must exactly match the specified value
349
+
-**BEFORE** or **LT** (less than): The value must be strictly less than
350
+
-**AFTER** or **GE** (greater or equal): The value must be equal to or greater than
351
+
-**GT** (greater than): The value must be strictly greater than
352
+
-**LE** (less or equal): The value must be equal to or less than
353
+
-**IN**: The value must be included in the list
354
+
-**START_WITH**: The value must start with the specified value
355
+
-**END_WITH**: The value must end with the specified value
356
+
-**IN_RANGE**: The value must be in the specified IP subnet
357
+
358
+
If not specified, the default operator is **EQ**.
359
+
291
360
### Identities
292
361
293
362
Policies apply to users, which can be accounts, users or user groups.
@@ -296,7 +365,7 @@ This section describes how to retrieve or create user for the policy.
0 commit comments