Help Center/ Key-Value Storage Service/ Service Overview/ Security/ Identity Authentication and Access Control
Updated on 2025-04-14 GMT+08:00

Identity Authentication and Access Control

IAM Identity Authentication

You can work with KVS using the KVS console, APIs, or SDKs. Whichever access method you use, requests are essentially sent through the REST APIs provided by KVS.

KVS APIs support request authentication. To authenticate, a request must contain a signature calculated based on the request sender's access keys (AK/SK) as the encryption factor and the specific information carried in the request body. AK/SK authentication uses AK/SK-based encryption. For details about access keys and how to obtain them, see Access Keys (AK/SK).

Access Control

KVS resources are isolated by default. Resources created by an IAM user under an account can be accessed only by this IAM user and the account administrator.