AAD Overview
You can purchase an AAD instance and connect your services to the instance. The widely covering defense rules provided by AAD will protect your services from massive DDoS attacks.
Figure 1 shows the process of connecting services to AAD.
No. |
Procedure |
Description |
---|---|---|
1 |
Use Identity and Access Management (IAM) to grant fine-grained AAD permissions to users. |
|
2 |
Purchase an AAD instance based on service requirements. |
|
3 |
Connect the domain name or IP address to AAD. |
|
4 |
AAD provides abundant and comprehensive protection rules. You can configure protection policies based on your service requirements. |
|
5 |
Performing common security operations |
|
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot