Creates a custom security policy in a region.
Debugging
Authorization information
The following table shows the authorization information corresponding to the API. The authorization information can be used in the Action
policy element to grant a RAM user or RAM role the permissions to call this API operation. Description:
- Operation: the value that you can use in the Action element to specify the operation on a resource.
- Access level: the access level of each operation. The levels are read, write, and list.
- Resource type: the type of the resource on which you can authorize the RAM user or the RAM role to perform the operation. Take note of the following items:
- The required resource types are displayed in bold characters.
- If the permissions cannot be granted at the resource level,
All Resources
is used in the Resource type column of the operation.
- Condition Key: the condition key that is defined by the cloud service.
- Associated operation: other operations that the RAM user or the RAM role must have permissions to perform to complete the operation. To complete the operation, the RAM user or the RAM role must have the permissions to perform the associated operations.
Operation | Access level | Resource type | Condition key | Associated operation |
---|---|---|---|---|
alb:CreateSecurityPolicy | Write |
|
| none |
Request parameters
Parameter | Type | Required | Description | Example |
---|---|---|---|---|
ClientToken | string | No | The client token that is used to ensure the idempotence of the request. You can use the client to generate the token, but you must make sure that the token is unique among different requests. The token can contain only ASCII characters and cannot exceed 64 characters in length. Note
If you do not specify this parameter, the system automatically uses the request ID as the client token. The request ID may be different for each request.
| 593B0448-D13E-4C56-AC0D-FDF0FDE0E9A3 |
DryRun | boolean | No | Specifies whether to perform only a dry run, without performing the actual request. Valid values:
| true |
TLSVersions | array | Yes | The supported Transport Layer Security (TLS) protocol versions. | |
string | Yes | The supported TLS protocol version. Valid values: TLSv1.0, TLSv1.1, TLSv1.2, and TLSv1.3. | TLSv1.0 | |
ResourceGroupId | string | No | The resource group ID. | rg-atstuj3rtop**** |
SecurityPolicyName | string | Yes | The name of the security policy. The name must be 2 to 128 characters in length, and can contain letters, digits, periods (.), underscores (_), and hyphens (-). The name must start with a letter. | test-secrity |
Ciphers | array | Yes | The supported cipher suites. | |
string | Yes | The supported cipher suites are determined by the value of TLSVersions. The specified cipher suites must be supported by at least one TLS protocol version that you specify.**** Note
For example, if you set the TLSVersions parameter to TLSv1.3, you must specify cipher suites that are supported by TLS 1.3.
| ECDHE-ECDSA-AES128-SHA | |
Tag | object [] | No | The tags. | |
Key | string | No | The tag key. The tag key can be up to 128 characters in length and cannot start with | env |
Value | string | No | The tag value. The tag value can be up to 128 characters in length and cannot start with | product |
Response parameters
Examples
Sample success responses
JSON
format
{
"RequestId": "593B0448-D13E-4C56-AC0D-FDF0FDE0E9A3",
"SecurityPolicyId": "scp-bp1bpn0kn9****"
}
Error codes
HTTP status code | Error code | Error message | Description |
---|---|---|---|
400 | QuotaExceeded.SecurityPoliciesNum | The quota of %s is exceeded, usage %s/%s. | The quota of %s is exceeded. Usage: %s/%s. |
For a list of error codes, visit the Service error codes.
Change history
Change time | Summary of changes | Operation | ||||
---|---|---|---|---|---|---|
2024-02-23 | The Error code has changed | see changesets | ||||
|