Updated on 2024-05-16 GMT+08:00

High-Risk Operations

Table 1 High-risk operations

Risky Operation

Impact

Disabling the Service

After the service is disabled, the data resources that are being used or have been stored in the stream are cleared immediately. The details are as follows:

  • Management service: All media-related services of the stream, such as live video viewing and recording playback.
  • Ingesting service: The cloud-based recording plan of the stream will be stopped and the stored cloud-based recording files will be deleted.
  • Industry data flow service: The industry data flow data storage and forwarding capabilities of the stream will be stopped and the stored industry data flow data will be deleted.

Deleting Devices

After a device is deleted, services enabled for all streams of the device are automatically disabled, and the device is deleted from the device list (including the owner and sharees).

Dismissing an Enterprise

After an enterprise is dismissed, all devices under the enterprise are deleted.

Logout

After a user is deregistered, its user data is deleted, including personal information, device information, and relationships between personal and enterprise permissions.

If a deregistered user belongs to an enterprise, only the permission relationship between the user and the enterprise will be deleted, the normal use of devices under the enterprise will not be affected.

Unbinding a Device

You can log in to the device page and unbind the device from the cloud service.

After a device is unbound, the services enabled for the device in the cloud service are disabled, and the user binding relationship is deleted. You can bind the device again.

Deleting an AK/SK.

After an enterprise developer deletes an AK/SK, all access tokens applied for the original enterprise credential become invalid.

Applying for an AccessToken

A single AK/SK maintains only the validity of the latest two access tokens. A newly applied access token automatically overwrites the earlier one.