Search: "accesskeys"
Allow MaxCompute to access Table Store using AccessKeys - Table Store Documentation
In addition to account authorization, you can access data in Table Store using AccessKeys on MaxCompute Allow MaxCompute to access Table Store using AccessKeys Unlike account authorization, you must specify the ...
Access control - Object Storage Service Documentation
AccessKeys Currently, the three types of AccessKey for OSS access are as follows: Alibaba Cloud account AccessKeys These are the AccessKeys of the bucket owners. The AccessKey provided by each Alibaba Cloud account has full access to its ...
Basic concepts - Object Storage Service Documentation
AccessKeySecret must be kept confidential. In OSS, AccessKeys are generated by the following three methods: The bucket owner applies for AccessKeys. The bucket owner uses RAM to authorize a third party to apply for AccessKeys. The ...
RAM best practices - Resource Access Management Documentation
and AccessKeys of users We recommend that you or the RAM users regularly rotate logon passwords or AccessKeys. If a policy to force the RAM users to rotate their logon passwords or AccessKeys in a regular cycle. Account ...
Overview - ApsaraVideo for VoD Documentation
AccessKeys, and grant related permissions. STS temporary AccessKeySecurity Token Service (STS) is an Alibaba Cloud service that recommend that you use RAM user AccessKeys on the server. STS temporary AccessKey Safe Permissions are granted based on the related ...
FAQ - Object Storage Service Documentation
two sources: first, the AccessKeys of the master account; second, the AccessKeys of the subaccount generated by the master: AccessKey ID, AccessKey Secret and a token. But all the three values are temporary AccessKeys and tokens obtained by the server through ...
ListAccessKeys - Resource Access Management Documentation
parametersReturn example XML format ListAccessKeysResponse RequestId4B450CA1-36E8-4AA2-8461-86B42BF4CC4E/RequestId AccessKeys CreateDate2015-03-24T21:12:21Z/CreateDate /AccessKey /AccessKeys/ListAccessKeysResponse JSON format "RequestId" : " ...
RAM and STS - IoT Platform Documentation
users, you can grant them different permissions. AccessKeys of RAM users if exposed do not have the same risk as an account temporary access. By calling the STS API, you can obtain temporary AccessKeys and tokens. You can assign the temporary AccessKeys ...
Best practice of primary account security - General Reference Documentation
creation of an AccessKey for the root account AccessKeys have the same permissions as logon passwords. However, AccessKeys are used for program access while logon passwords are used to log on to the console. Because AccessKeys are generally stored in ...
Best practice of primary account security - Resource Access Management Documentation
creation of an AccessKey for the root account AccessKeys have the same permissions as logon passwords. However, AccessKeys are used for program access while logon passwords are used to log on to the console. Because AccessKeys are generally stored in ...