Identity and Access Management
Identity Authentication
You can access OMS through the OMS console, application programming interfaces (APIs), and software development kits (SDKs). No matter which method you choose, you actually use REST APIs to access OMS.
OMS can authenticate API requests using the AK/SK pairs of requesters. An authenticated request must contain a signature value that is calculated based on the encrypted AK/SK pair of the requester and the information carried in the request body. For details about access keys and how to obtain them, see Access Keys.
Access Control
You can use Identity and Access Management (IAM) to securely control access to your OMS resources. For more information, see Creating a User and Assigning OMS Permissions.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot