Updated on 2022-02-10 GMT+08:00

Viewing My Credentials

You need to use security credentials when you access the system through the management console or APIs, or perform service interconnection in the system. You can view security credentials on the My Credentials page.

Procedure

  1. On the console page, click the username in the upper right corner and select My Credentials from the drop-down list.
  2. On the My Credentials page, view the basic information.

    Table 1 Basic information

    Parameter

    Description

    Username

    Username used for logging in to the system.

    User ID

    Unique identifier for a user in the system. It is automatically generated by the system.

    Domain Name

    Name of your domain. The domain name is automatically created upon successful registration. Cloud resources of different domains are isolated from each other.

    The name is required when you log in to the system.

    Domain ID

    Unique identifier for a domain in the system. The domain ID is automatically generated by the system.

    Email Address

    Email address bound to your account. You can use your email address to log in to the system, reset your passwords, and receive verification codes and other push notifications.

    Mobile Number

    Mobile number bound to your account. You can use your mobile number to receive verification codes and other push notifications.

    API Password Strength

    Login password configured in the system.

    Login Authentication

    IAM provides SMS-based, virtual MFA-based, and email-based login authentication. After login authentication is enabled, you need to enter an SMS verification code, MFA verification code, or email verification code on the Login Verification page in addition to the username and password when logging in to the system.

    Virtual MFA Device

    You can enable virtual MFA-based login authentication only when a virtual MFA device is bound to your account.

    Projects

    Projects are used to group and isolate OpenStack resources, including compute, storage, and network resources. Your resources must be mounted under projects. A project can be a department or a project team. You can create projects in a region for isolated management of resources.

    Project list

    List of projects that can be accessed. The project ID needs to be specified for calling some APIs.

    Access Keys

    Access key ID/Secret access key (AK/SK) pairs used for API access. You can create a maximum of two access keys.