获取基线策略的详情。
调试
您可以在OpenAPI Explorer中直接运行该接口,免去您计算签名的困扰。运行成功后,OpenAPI Explorer可以自动生成SDK代码示例。
授权信息
当前API暂无授权信息透出。
请求参数
名称 | 类型 | 必填 | 描述 | 示例值 |
---|---|---|---|---|
SourceIp | string | 否 | 访问源的 IP 地址。 | 192.168.XX.XX |
Lang | string | 否 | 设置请求和接收消息的语言类型,默认为 zh。取值:
| zh |
Id | string | 是 | 基线策略 ID。 | 123456 |
返回参数
示例
正常返回示例
JSON
格式
{
"RequestId": "C5B28F65-9245-5DC1-B3CF-5F2756A756A8",
"Strategy": {
"Type": 1,
"CycleDays": 3,
"Name": "TestStrategy",
"Id": 123,
"CycleStartTime": 0,
"RiskTypeWhiteListQueryResultList": [
{
"TypeName": "hc_exploit",
"Alias": "Unauthorized Access",
"On": false,
"SubTypes": [
{
"TypeName": "hc_exploit_redis",
"Alias": "Redis unauthorized access high exploit vulnerability risk",
"On": false,
"CheckDetails": [
{
"CheckId": 206,
"CheckItem": "Ensure password expiration period is set.",
"CheckDesc": "Set password expiration time, force regular modification of password, reduce password leakage and guess risk.Use non-password login (e.g. key pair) please ignore this item.",
"Rules": [
{
"Optional": 1,
"RuleDesc": "Please customize the password expiration time detection standard as",
"DefaultValue": 2,
"RuleId": "login_unlock_deny_pam_faillock.must.cus",
"ParamList": [
{
"ParamDefaultValue": 7,
"Value": 7,
"ParamName": "range_val",
"MaxValue": 999,
"ParamType": 1,
"ParamDesc": "The setting value is 0 means no definition, 1 means success, 2 means failure, 3 means success and failure",
"MinValue": 1,
"EnumValue": "0,1,2,3"
}
]
}
]
}
],
"SupportedOs": "windows"
}
]
}
],
"StartTime": "02:00:00",
"EndTime": "03:00:00",
"CustomType": "common",
"TargetType": "groupId",
"RiskSubTypeName": "hc_nginx_linux,tomcat7,hc_mysql_ali,hc_docker"
}
}
错误码
HTTP status code | 错误码 | 错误信息 | 描述 |
---|---|---|---|
403 | NoPermission | caller has no permission | 当前操作未被授权,请联系主账号在RAM控制台进行授权后再执行操作。 |
500 | ServerError | ServerError | 服务故障,请稍后重试! |
访问错误中心查看更多错误码。
变更历史
变更时间 | 变更内容概要 | 操作 |
---|---|---|
2023-12-07 | OpenAPI 返回结构发生变更 | 查看变更详情 |