Service Access Control
- Identity authentication
You can access DSC through the DSC console, APIs, or SDK. Regardless of the access method, requests are sent through the REST APIs provided by the DSC.
DSC APIs can be accessed only after requests are authenticated. DSC supports two authentication modes:
- Token-based authentication: Requests are authenticated using tokens. By default, token authentication is required to access the DSC console.
- AK/SK authentication: Requests are encrypted using AK/SK pairs. This method is recommended because it provides higher security than token-based authentication.
For details about authentication and authorization, see Authentication.
- Access control
DSC supports access control through IAM permissions.
Table 1 DSC access control methods Access Control Method
Description
Reference
Permissions management
IAM permission
IAM permissions define which actions on your cloud resources are allowed and which actions are denied, to control access to your resources. After creating an IAM user, the administrator adds the user to one or more groups, and assign permissions policies or roles to these groups. The user will inherit permissions from the group to which it is added.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot