Help Center/ Video On Demand/ Service Overview/ Security/ Identity Authentication and Access Control
Updated on 2022-11-23 GMT+08:00

Identity Authentication and Access Control

Identity Authentication

You can access VOD through the VOD console, APIs, and SDKs. Regardless of the access method, requests are sent through REST APIs provided by VOD.

VOD APIs can be accessed only after requests are authenticated. You can use either of the following authentication methods to call APIs:

  • Token authentication: Requests are authenticated using tokens.
  • AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

For details about authentication and authorization, see Authentication.

Access Control

VOD supports access control based on IAM permissions and URL validation.

Table 1 VOD access control

Method

Description

Details

IAM permission control for VOD

IAM permissions define which actions on your cloud resources are allowed or denied. After creating an IAM user, the administrator needs to add it to a user group and grant the permissions required by VOD to the user group. Then, all users in this group automatically inherit the granted permissions.

VOD Permissions Management

URL validation

To prevent your data on VOD from being stolen, VOD provides referer validation, URL validation, and IP address blacklist/whitelist authentication to identify and filter out malicious visitors. Only authorized visitors can use VOD.

Configuring Hotlink Protection