Help Center/ Cloud Operations Center/ Service Overview/ Security/ Identity Authentication and Access Control
Updated on 2024-07-09 GMT+08:00

Identity Authentication and Access Control

Identity authentication

You can access COC through the COC console, application programming interfaces (APIs), and software development kits (SDKs). No matter which method you choose, you actually use REST APIs to access COC.

COC APIs can authenticate requests. An authenticated request must contain a signature value. The signature value is calculated based on the access key (AK/SK) of the requester and the specific information carried in the request body. COC supports authentication using an Access Key ID (AK)/Secret Access Key (SK) pair. This means it can use AK/SK-based encryption to authenticate a request sender. For more information about access keys and how to obtain them, see Access Keys/Secret Keys.

Access control

You can use IAM to securely control access to your COC resources. For more information about IAM and COC permissions management, see Permissions Management.