Updated on 2024-12-05 GMT+08:00

Access Control for CPH

IAM Identity Authentication

IAM provides fine-grained permissions management, user identity authentication, and resource access control.

You can use your account to create IAM users and assign permissions to the IAM users to control their access to specific resources. IAM permissions define which actions on your cloud resources are allowed or denied.

Access Control

  • Virtual Private Cloud (VPC)

    VPC allows you to create logically isolated virtual networks for your cloud phone servers. You can define security groups, virtual private networks (VPNs), IP address segments, and bandwidth for a VPC. This facilitates internal network configuration and management and allows you to change your network in a secure and convenient manner. You can also define rules to control access between cloud phone servers in the same security group or across different security groups to strength security.

  • Security Groups

    A security group is a collection of access control rules for cloud phone servers that have the same security requirements and are mutually trusted. After a security group is created, you can add different access rules to the security group, and these rules will apply to all cloud phone servers added to this security group.

For details about how to create a VPC and security group, see Table 2 Configuring a custom network.

Key Pairs

A key pair, or SSH key pair, is an authentication method used when you remotely log in to Linux instances. A key pair is generated using an encryption algorithm. It contains a public key and a private key reserved for you. The public key is used to encrypt data (for example, a password), and the private key is used to decrypt the data.

Huawei Cloud stores the public key, and you need to store the private key. Do not share your private key with anyone. Keep your private key secure.

For details about how to create and use a key pair, see Table 3 Parameters for advanced settings.