Help Center> Identity and Access Management> User Guide (Ankara Region)> FAQs> Security Settings> How Do I Change the Verification Method for Performing Critical Operations?
Updated on 2024-04-15 GMT+08:00

How Do I Change the Verification Method for Performing Critical Operations?

Symptom

If operation protection is enabled, users under your account can proceed with a critical operation, such as deleting a resource and creating an access key, only after the users or the specified person completes verification.

The verification is valid for 15 minutes and you do not need to be verified again when performing critical operations within the validity period.

  • To change the verification method from Self-verification to Verification by another person, see Self-verification.
  • To change the verification method from Verification by another person to Self-verification or to change the mobile number or email address for verification, see Verification by another person.

Procedure

  • The current verification method is Self-verification.
  1. On the IAM console, choose Security Settings in the navigation pane.
  2. On the Security Settings page, click the Critical Operations tab, and click Change next to Operation Protection.
  3. On the Operation Protection page, select Verification by another person, enter the mobile number or email address for verification, and enter the verification code.
  4. Click OK.
  • The current verification method is Verification by another person.
  1. On the IAM console, choose Security Settings in the navigation pane.
  2. On the Security Settings page, click the Critical Operations tab, and click Change next to Operation Protection.
  3. On the Operation Protection page, select Disable and click OK. Enter the verification code and click OK.
  4. On the Critical Operations tab page, click Enable next to Operation Protection.
  5. On the Operation Protection page, select Self-verification or Verification by another person.

    If you select Verification by another person, complete verification to ensure that the verification method is available.

    • Self-verification: You or IAM users themselves perform verification when performing a critical operation.
    • Verification by another person: The specified person performs verification when you or an IAM user performs a critical operation. Only SMS and email verification is supported.

  6. Click OK.