Advantages
- Reinforced Login Security
You can log in to a Linux ECS without entering a password, effectively preventing password interception, cracking, or leakage and improving the Linux ECS security.
- Regulatory Compliance
Random numbers are generated by third-party validated HSMs. Access to key pairs is controlled and all operations involving key pairs are traceable by logs, compliant with Chinese and international laws and regulations.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot