Updated on 2024-04-19 GMT+08:00

Identity and Access Management

Identity Authentication

You can access OMS through the OMS console, application programming interfaces (APIs), and software development kits (SDKs). No matter which method you choose, you actually use REST APIs to access OMS.

OMS can authenticate API requests using the AK/SK pairs of requesters. An authenticated request must contain a signature value that is calculated based on the encrypted AK/SK pair of the requester and the information carried in the request body. For details about access keys and how to obtain them, see Access Keys.

Access Control

You can use Identity and Access Management (IAM) to securely control access to your OMS resources. For more information, see Creating a User and Assigning OMS Permissions.