Identity and Access Management (Class II Node)

Managing Access Keys

2025-11-03 09:37:43

An access key consists of an Access Key ID (AK) and a Secret Access Key (SK). They serve as your long-term credentials in the system, allowing you to sign requests for certain cloud service APIs.

The system uses the AK to identify the user's identity and the SK to sign and verify request data. This ensures the confidentiality, integrity, and authenticity of the request and the requester.

Adding an Access Key

1. Log in to eSurfing Cloud and navigate to the IAM > User page. Click  View.

2. On the IBDisolutionUser page, click Security Setting.

1.      Click Create Access Key, then enter the verification code.

Description:

If you have bound an email or mobile phone number, a verification code is required. If neither is bound, you only need to enter your login password to create a new access key.

2.      Click Confirm to generate and download the access key.

Description:

Up to 2 access keys can be created, and they are permanently valid. To ensure account security, it is recommended that you properly store and regularly rotate your access keys. To update an access key, delete the old one and generate a new one.

Deleting an Access Key

1.On the AccessKey tab, click Delete next to the target key.

2.Enter the verification code and click Confirm to delete the access key.

Description:

l If you have bound an email or phone number, you will need to enter a verification code. If you have not bound an email or phone number, you only need to enter the login password to delete the access key. Unified Scheduling of Common Pooling and Colocation: Provides scheduling capabilities of common pooling and colocation with the ECSs.

l If you find that an access key has been used abnormally (including loss, leakage, etc.), you can delete the access key yourself in My Credentials.


Y3f4ZVfJ2l8r