Updated on 2026-03-16 GMT+08:00

Security Settings Overview

You can configure the basic information, critical operation protection, login authentication policy, password policy, and access control list (ACL) on the Security Settings page. For details, see Basic Information, Critical Operation Protection, Login Authentication Policy, Password Policy, and ACL. This chapter describes what permissions are required to and how to access the Security Settings page.

Permissions Required for Security Settings

Table 1 lists the permissions required for the operations in different tabs in security settings.
Table 1 Permissions required for security settings

Function

Operation

Permissions

Login password

Query

You do not need to obtain the permissions to query your login password.

Modify

You do not need to obtain the permissions to change your login password.

Mobile number

Query

You do not need to obtain the permissions to query your bound mobile number.

Modify

You do not need to obtain the permissions to change your bound mobile number.

Email address

Query

You do not need to obtain the permissions to query your bound email address.

Modify

You do not need to obtain the permissions to change your bound email address.

Virtual MFA device

Query

You do not need to obtain the permissions to query your virtual MFA device.

Bind

You do not need to obtain the permissions to bind your virtual MFA device.

Unbind

You do not need to obtain the permissions to unbind your virtual MFA device.

Login protection

Query

You do not need to obtain the permissions to query your login protection type.

Operation protection

Query

iam:securitypolicies:getProtectPolicy

Modify

iam:securitypolicies:updateProtectPolicy

Access key protection

Query

iam:securitypolicies:getProtectPolicy

Modify

iam:securitypolicies:updateProtectPolicy

Information self-management

Query

iam:securitypolicies:getProtectPolicy

Modify

iam:securitypolicies:updateProtectPolicy

USB KEY

Query

You do not need to obtain the permissions to query your USB key.

Login authentication policy

Query

iam:securitypolicies:getLoginPolicy

Modify

iam:securitypolicies:updateLoginPolicy

Password policy

Query

iam:securitypolicies:getPasswordPolicy

Modify

iam:securitypolicies:updatePasswordPolicy

Console access

Query

iam:securitypolicies:getConsoleAclPolicy

Modify

iam:securitypolicies:updateConsoleAclPolicy

API access

Query

iam:securitypolicies:getApiAclPolicy

Modify

iam:securitypolicies:updateApiAclPolicy

Accessing the Security Settings Page

  • You and all IAM users created using your account can access the Security Settings page from the management console.
    1. Log in to Huawei Cloud and click Console in the upper right corner.
    2. On the management console, hover the mouse pointer over the username in the upper right corner, and choose Security Settings from the drop-down list.
      Figure 1 Choosing security settings
  • As an administrator or an entrusted identity, you can also access the Security Settings page from the IAM console.
    1. Log in to Huawei Cloud and click Console in the upper right corner.
    2. On the management console, hover over the username in the upper right corner, and choose Identity and Access Management from the drop-down list.
      Figure 2 Accessing the IAM service
    3. On the IAM console, choose Security Settings from the navigation pane.