Identity Authentication and Access Control
Identity Authentication
You can access VOD through the VOD console, APIs, and SDKs. Regardless of the access method, requests are sent through REST APIs provided by VOD.
VOD APIs can be accessed only after requests are authenticated. You can use either of the following authentication methods to call APIs:
- Token authentication: Requests are authenticated using tokens.
- AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.
For details about authentication and authorization, see Authentication.
Access Control
VOD supports access control based on IAM permissions and URL validation.
Method |
Description |
Details |
---|---|---|
IAM permission control for VOD |
IAM permissions define which actions on your cloud resources are allowed or denied. After creating an IAM user, the administrator needs to add it to a user group and grant the permissions required by VOD to the user group. Then, all users in this group automatically inherit the granted permissions. |
|
URL validation |
To prevent your data on VOD from being stolen, VOD provides referer validation, URL validation, and IP address blacklist/whitelist authentication to identify and filter out malicious visitors. Only authorized visitors can use VOD. |
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot