Help Center/
Identity and Access Management/
User Guide (Kuala Lumpur Region)/
User Guide/
Permissions Management/
Policies/
Authentication Process
Updated on 2024-07-26 GMT+08:00
Authentication Process
When a user initiates an access request, the system authenticates the request based on the actions in the policies that have been attached to the group to which the user belongs. The following diagram shows the authentication process.
Figure 1 Authentication process
- A user initiates an access request.
- The system looks for a Deny among the applicable actions of the policies from which the user gets permissions. If the system finds an applicable Deny, it returns a decision of Deny, and the authentication ends.
- If no Deny is found applicable, the system looks for an Allow that would apply to the request. If the system finds an applicable Allow, it returns a decision of Allow, and the authentication ends.
- If no Allow is found applicable, the system returns a decision of Deny, and the authentication ends.
Parent topic: Policies
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot