Identity Authentication and Access Control
IAM Identity Authentication
You can work with KVS using the KVS console, APIs, or SDKs. Whichever access method you use, requests are essentially sent through the REST APIs provided by KVS.
KVS APIs support request authentication. To authenticate, a request must contain a signature calculated based on the request sender's access keys (AK/SK) as the encryption factor and the specific information carried in the request body. AK/SK authentication uses AK/SK-based encryption. For details about access keys and how to obtain them, see Access Keys (AK/SK).
Access Control
KVS resources are isolated by default. Resources created by an IAM user under an account can be accessed only by this IAM user and the account administrator.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot