Help Center> Data Security Center> Service Overview> Security> Identity Authentication and Access Control
Updated on 2024-01-18 GMT+08:00

Identity Authentication and Access Control

  • Identity authentication

    You can access DSC through the DSC console, APIs, or SDK. Regardless of the access method, requests are sent through the REST APIs provided by the DSC.

    DSC APIs can be accessed only after requests are authenticated. DSC supports two authentication modes:

    • Token-based authentication: Requests are authenticated using tokens. By default, token authentication is required to access the DSC console.
    • AK/SK authentication: Requests are encrypted using AK/SK pairs. This method is recommended because it provides higher security than token-based authentication.

      For details about authentication and authorization, see Authentication.

  • Access control

    DSC supports access control through IAM permissions.

    Table 1 DSC access control methods

    Access Control Method

    Description

    Reference

    Permissions management

    IAM permission

    IAM permissions define which actions on your cloud resources are allowed and which actions are denied, to control access to your resources. After creating an IAM user, the administrator adds the user to one or more groups, and assign permissions policies or roles to these groups. The user will inherit permissions from the group to which it is added.

    IAM Service Overview

    Permission Management

    Permissions Management