Identity Authentication and Access Control
Identity Authentication
You can access Live through the Live console, APIs, and SDKs. Regardless of the access method, requests are sent through REST APIs provided by Live.
Live APIs can be accessed only after requests are authenticated. You can use either of the following authentication methods to call APIs:
- Token authentication: Requests are authenticated using tokens.
- AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.
For details, see Authentication.
Access Control
Live supports access control based on IAM permissions and hotlink protection.
Method |
Description |
Details |
---|---|---|
IAM permissions |
IAM permissions define which actions on your cloud resources are allowed or denied. After creating an IAM user, the administrator needs to add them to a user group and grant the permissions required by Live to the user group. Then, all users in this group automatically inherit the granted permissions. |
|
Hotlink protection |
To prevent your data on Live from being stolen, Live provides referer validation, URL validation, and access control list (ACL) to identify and filter out malicious visitors. Only authorized visitors can use Live. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot