Updated on 2025-06-30 GMT+08:00
User Authentication and Access Control
Requests for calling a RESTful API of PanguLM can be authenticated using either of the following methods:
- Token-based authentication: Requests are authenticated using a token.
- Access Key ID/Secret Access Key (AK/SK)-based authentication: Requests are encrypted using an AK/SK. An authenticated request must contain a signature value. The signature value is calculated based on the requestor's access key (AK/SK) as the encryption factor and the specific information carried in the request body. The platform supports authentication using an access key (AK/SK pair). It uses AK/SK-based encryption to authenticate requests.
Parent topic: Security
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot