Modifies role-based access control (RBAC) permissions.
Debugging
Request parameters
| Parameter | Type | Required | Example | Description |
|---|---|---|---|---|
| Action | String | Yes | GrantUserPermissions |
The operation that you want to perform. Set the value to GrantUserPermissions. |
| SubAccountUserId | String | Yes | 27852573609480**** |
The ID of the RAM user or RAM role. |
| Permissions | String | No | [{"IsCustom":true,"RoleName":"istio-ops","Cluster":"c57b848115458460583a4260cb713****","RoleType":"custom","IsRamRole":false},{"IsCustom":true,"RoleName":"istio-ops","Cluster":"c4ec191f4e12145c09286ea3e2b8f****","RoleType":"custom","IsRamRole":false}] |
The permissions that are granted to an entity. The content is a string that consists of JSON arrays. You must specify all permissions that you want to grant to an entity. You can add or remove permissions by modifying the content. Field definition of the sample code:
|
Response parameters
| Parameter | Type | Example | Description |
|---|---|---|---|
| RequestId | String | 5A7C9E37-C171-584F-9A99-869B48C4**** |
The ID of the request. |
Examples
Sample requests
http(s)://[Endpoint]/?Action=GrantUserPermissions
&SubAccountUserId=27852573609480****
&Permissions=[{"IsCustom":true,"RoleName":"istio-ops","Cluster":"c57b848115458460583a4260cb713****","RoleType":"custom","IsRamRole":false},{"IsCustom":true,"RoleName":"istio-ops","Cluster":"c4ec191f4e12145c09286ea3e2b8f****","RoleType":"custom","IsRamRole":false}]
&<Common request parameters>
Sample responses
XML format
HTTP/1.1 200 OK
Content-Type:application/xml
<GrantUserPermissionsResponse>
<RequestId>5A7C9E37-C171-584F-9A99-869B48C4****</RequestId>
</GrantUserPermissionsResponse>
JSON format
HTTP/1.1 200 OK
Content-Type:application/json
{
"RequestId" : "5A7C9E37-C171-584F-9A99-869B48C4****"
}
Error codes
For a list of error codes, visit the API Error Center.