Help Center/ Live/ Service Overview/ Security/ Identity Authentication and Access Control
Updated on 2024-08-05 GMT+08:00

Identity Authentication and Access Control

Identity Authentication

You can access Live through the Live console, APIs, and SDKs. Regardless of the access method, requests are sent through REST APIs provided by Live.

Live APIs can be accessed only after requests are authenticated. You can use either of the following authentication methods to call APIs:

  • Token authentication: Requests are authenticated using tokens.
  • AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

For details, see Authentication.

Access Control

Live supports access control based on IAM permissions and hotlink protection.

Table 1 Live access control

Method

Description

Details

IAM permissions

IAM permissions define which actions on your cloud resources are allowed or denied. After creating an IAM user, the administrator needs to add them to a user group and grant the permissions required by Live to the user group. Then, all users in this group automatically inherit the granted permissions.

Permissions Management

Hotlink protection

To prevent your data on Live from being stolen, Live provides referer validation, URL validation, and access control list (ACL) to identify and filter out malicious visitors. Only authorized visitors can use Live.

Hotlink Protection