Search: "authorize"
Monitoring Service Overview - Blockchain as a Service Documentation
the authorization check fails, you need to authorize the system. After you have authorized the system, go back to the details ...
Have fun with long videos - ApsaraVideo for VOD Documentation
developing an AppServer, you need to authorize permissions to your Alibaba Cloud account. Each time you request to use ...
Alibaba Cloud Galaxy Program: Support Small & Medium Sized ISV - Alibaba Cloud Site
protection Monitoring & Management CloudMonitor Real-time cloud monitoring service Resource Access Management Authorize users' and ...
Online Migration For Linux Forums
, we should authorize root to login to the EC2 instance. One method is to config the /etc/ssh/sshd_config file by uncomment ...
A closer look at Hadoop: Hadoop architecture, features of various components and significant for big Forums
easy to perform statistical processing on HBase. However, HBase also imposes some restrictions to authorize the random storage of ...
Android Development Security - Provider Component Security blog
/5ddf2dbabb37f29f455c641ecbcf91309c6242de.png) 3.4 Authorize Partners' applications to access by checking signatures If there is need to set Providers ...
IOTA – The Future of IoT and Blockchain blog
. Instead, every transaction initiator should authorize other two transactions. There is no miner in tangle, so the transaction ...
Security Authentication Framework in AliOS Things uMesh blog
authenticate and authorize the access devices AES-128 to encrypt and decrypt data Compatible with Port-based Netwok Access ...