All Documents
Current Document

Content is empty

If you don't find the content you expect, please try another search term

Documentation

Sensitive operation protection

Last updated:2020-07-17 16:22:46

Sensitive operation protection pushes an identity authentication page for a second authentication before permitting a sensitive operation. This topic describes the protection methods and the procedure for enabling sensitive operation protection.

Sensitive operation protection methods

Log in to the Kingsoft Cloud console and access security settings page Sensitive operation protection. The following table describes the protection methods for sensitive operations:

Protection method Description Remarks
Phone verification Requires you to enter the correct phone verification code. Phone verification is available only if a phone number is bound.
This setting is valid only for a primary user account.
Email verification Requires you to enter the correct email verification code. Email verification is available only if an email address is bound.
This setting is valid only for a primary user account.
MFA verification Requires you to enter the correct MFA security code. MFA verification is available only if an MFA device is bound.
This setting is valid only for a primary user account.
You can access Access Control > Identifies >Details to enable MFA verification for a subuser. Then, a subuser can configure MFA at next login. After MFA is configured, MFA verification will be performed for the subuser.

Enable sensitive operation protection

  1. Log in to the Kingsoft Cloud console. Access security settings. Click the Edit button for Operation Protection.

    image.png

  2. Click Enable operation protection and select a verification method.
    • Phone verification is available only if a phone number is bound.
    • Email verification is available only if an email address is bound.
    • MFA verification is available only if an MFA device is bound. This setting is valid only for a primary user account. For more information, see Configure MFA.

      You can access Access Control > Identifies >Details to enable MFA verification for a subuser. Then, a subuser can configure MFA at next login. After MFA is configured, MFA verification will be performed for the subuser.

  3. Click Submit.

    image.png


4、To disable sensitive operation protection, click Disable.

On this page
Pure ModeNormal Mode

Pure Mode

Click to preview the document content in full screen
Feedback