Search: "change control"
Modify an IP access control (ModifyIpControl) - API Gateway Documentation
DescriptionModify an existing IP access control. This function is intended for API providersProviders can only change the IP access control name and description but not the access control type.To modify the specific policies, use the Modify an IP access ...
Configure an access control list - Server Load Balancer Documentation
Server Load Balancer (SLB) provides you with the access control function. You can configure different access control rules (access whitelist or blacklist) for different listeners. Before configuring access control for listeners, you must ...
Create an IP access control (CreateIpControl) - API Gateway Documentation
DescriptionAdd an IP access control policy in a region to reject (or permit) API calls from specified IP addresses. This function is intended for API providers.An IP address access control policy is not effective until it is bound to an API. However, it ...
Add an IP access control policy (AddIpControlPolicyItem) - API Gateway Documentation
DescriptionAdd a policy to an existing IP access control. This function is intended for API providers.Once you add a policy, it is immediately effective for all the APIs bound to it.Each IP access control can have a maximum of 100 policies. Request ...
Query the IP access control policy list (DescribeIpControlPolicyItems) - API Gateway Documentation
DescriptionQuery the policy list under an IP access control in multiple pages. This function is intended for API providers.You String Yes IP access control ID, which identifies a unique IP access control policy ...
Query IP access control bound to APIs (DescribeApiIpControls) - API Gateway Documentation
DescriptionQuery IP access control bound to all APIs in a specified group under specified environment. This function is intended for open API users.It is used to query the summary of IP access control bindings of all APIs of a specified group in a ...
Access control - Application Configuration Management (ACM) Documentation
This topic explains how to use the access control functionality of ACM with an example of authorize a RAM user to risk of leakage due to their visibility to all authorized users. Now, ACM provides access control of finer granularity, so ...
Use security groups to control ECS instances' access to public cloud for a VPC - Virtual Private Cloud Documentation
A security group is a virtual firewall that is used to control the ECS outbound and inbound traffic. Within the same VPC, ECS ...
Access control - ApsaraDB for MongoDB Documentation
whitelistApsaraDB for MongoDB provides the IP whitelist to implement network security access control. Each MongoDB instance has ...
MQ client traffic control design - Application Configuration Management (ACM) Documentation
how to use ACM to implement traffic control over MQ. Brief introduction to MQ traffic controlFor MQ calling, a typical traffic control method is to control traffic at the subscription end. Two traffic control methods are supported: Concurrent traffic ...