How Do I Change the Verification Method for Performing Critical Operations?
Symptom
If operation protection is enabled, users under your account can proceed with a critical operation, such as deleting a resource and creating an access key, only after the users or the specified person completes verification.
- To change the verification method from Self-verification to Verification by another person, see The current verification method is Self-verification.
- To change the verification method from Verification by another person to Self-verification or to change the mobile number or email address for verification, see The current verification method is Verification by another person.
Procedure
- Click Console in the upper right corner. Figure 1 Accessing the management console
- On the management console, hover the mouse pointer over the username in the upper right corner, and choose Security Settings from the drop-down list.

- On the Security Settings page, click the Critical Operations tab, and click Change next to Operation Protection.

- On the Operation Protection page, select Verification by another person, enter the mobile number or email address for verification, and enter the verification code.

- Click OK.
- Click Console in the upper right corner. Figure 2 Accessing the management console
- On the management console, hover the mouse pointer over the username in the upper right corner, and choose Security Settings from the drop-down list.

- On the Security Settings page, click the Critical Operations tab, and click Change next to Operation Protection.

- On the Operation Protection page, select Disable and click OK. Enter the verification code and click OK.
- On the Critical Operations tab page, click Enable next to Operation Protection.
- On the Operation Protection page, select Self-verification or Verification by another person.
If you select Verification by another person, complete verification to ensure that the verification method is available.
- Self-verification: You or IAM users themselves perform verification when performing a critical operation.
- Verification by another person: The specified person performs verification when you or an IAM user performs a critical operation. Only SMS and email verification is supported.
- Click OK.
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.