High-Risk Operations
Risky Operation |
Impact |
---|---|
Disabling the Service |
After the service is disabled, the data resources that are being used or have been stored in the stream are cleared immediately. The details are as follows:
|
Deleting Devices |
After a device is deleted, services enabled for all streams of the device are automatically disabled, and the device is deleted from the device list (including the owner and sharees). |
Dismissing an Enterprise |
After an enterprise is dismissed, all devices under the enterprise are deleted. |
Logout |
After a user is deregistered, its user data is deleted, including personal information, device information, and relationships between personal and enterprise permissions. If a deregistered user belongs to an enterprise, only the permission relationship between the user and the enterprise will be deleted, the normal use of devices under the enterprise will not be affected. |
Unbinding a Device |
You can log in to the device page and unbind the device from the cloud service. After a device is unbound, the services enabled for the device in the cloud service are disabled, and the user binding relationship is deleted. You can bind the device again. |
Deleting an AK/SK. |
After an enterprise developer deletes an AK/SK, all access tokens applied for the original enterprise credential become invalid. |
Applying for an AccessToken |
A single AK/SK maintains only the validity of the latest two access tokens. A newly applied access token automatically overwrites the earlier one. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot