Identity Authentication and Control
Credential Authentication
No matter whether you access the Anti-DDoS service through the console or calling APIs, you are required to provide the identity credential and verify the identity validity. In addition, login and login authentication policies are provided to harden identity authentication security. Based on Identity and Access Management (IAM), Anti-DDoS supports three identity authentication modes: username and password, access key, and temporary access key. In addition, login protection and login authentication policies are provided.
Access Control
Anti-DDoS uses IAM to control access, assigning system roles and implementing fine-grained permission management. For details about permission management, see:
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot