Access Control for CPH
IAM Identity Authentication
IAM provides fine-grained permissions management, user identity authentication, and resource access control.
You can use your account to create IAM users, and assign permissions to the IAM users to control their access to specific resources. IAM permissions define which actions on your cloud resources are allowed or denied.
- For details about permission management, see Permissions Management.
- For details about how to authorize CPH, see Creating a User and Granting CPH Permissions.
- For details about custom policies, see Example Permission Configuration.
- For details about policies and supported actions, see Permissions and Supported Actions.
Access Control
- Virtual Private Cloud (VPC)
VPC allows you to create logically isolated virtual networks for your cloud phone servers. You can define security groups, virtual private networks (VPNs), IP address segments, and bandwidth for a VPC. This facilitates internal network configuration and management and allows you to change your network in a secure and convenient manner. You can also define rules to control access between cloud phone servers in the same security group or across different security groups to strength security.
- Security Groups
A security group is a collection of access control rules for cloud phone servers that have the same security requirements and are mutually trusted. After a security group is created, you can add different access rules to the security group, and these rules will apply to all cloud phone servers added to this security group.
For details about how to create a VPC and security group, see Table 2 Configuring a custom network.
Key Pairs
A key pair, or SSH key pair, is an authentication method used when you remotely log in to Linux instances. A key pair is generated using an encryption algorithm. It contains a public key, and a private key reserved for you. The public key is used to encrypt data (for example, a password), and the private key is used to decrypt the data.
Huawei Cloud stores the public key, and you need to store the private key. Do not share your private key with anyone. Keep your private key secure.
For details about how to create and use a key pair, see Table 3 Parameters for advanced settings.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot