Search: "permission"
What is Crowdsourced Security Testing - Crowdsourced Security Testing Documentation
loopholes and access permission issues, which cannot be detected by automated vulnerability scanning tools. The early detection of ...
ListPoliciesForUser - Resource Access Management Documentation
PolicyNameReadOnlyAccess/PolicyName PolicyTypeSystem/PolicyType DescriptionRead-only permission/Description ...
Request signature - Log Service Documentation
can use this key pair to confirm the user's identity and then perform access permission management. Confirm whether or ...
Authentication rules - Log Service Documentation
, Log Service backend performs RAM permission inspection to make sure the resource owner has granted relevant permissions to the ...
Terms - ApsaraVideo for Media Processing Documentation
output bucket write permission to Media Processing in the bucket authorization channel on the resource management page of the ...
SubmitSnapshotJob - ApsaraVideo for Media Processing Documentation
Python-Snapshot PHP-Snapshot The bucket permission must be granted to Media Transcoding ...
Glossary - API Gateway Documentation
The API service provider grants an app permission to call an API. Only authorized apps can call APIs. API ...
Create an app - API Gateway Documentation
An app is your identity to call an API. The identity and permission verification during API calling is specific to apps. In the ...
What is Web Hosting - Web Hosting Documentation
space has an independent FTP and web access permission, but all spaces share the hardware resources of the ECS instance. Web ...
What is IoT Platform? - IoT Platform Documentation
hardware resources are insufficient, and devices are sensitive to power consumption. Security level: medium. Permission ...