Sensitive operation protection

Last updated:2020-07-17 16:22:46

Sensitive operation protection pushes an identity authentication page for a second authentication before permitting a sensitive operation.
This topic describes the protection methods and the procedure for enabling sensitive operation protection.

Sensitive operation protection methods

Log in to the Kingsoft Cloud console and access security settings page Sensitive operation protection. The following table describes the protection methods for sensitive operations:

Protection method Description Remarks
Phone verification Requires you to enter the correct phone verification code. Phone verification is available only if a phone number is bound.
This setting is valid only for a primary user account.
Email verification Requires you to enter the correct email verification code. Email verification is available only if an email address is bound.
This setting is valid only for a primary user account.
MFA verification Requires you to enter the correct MFA security code. MFA verification is available only if an MFA device is bound.
This setting is valid only for a primary user account.
You can access Access Control > Identifies >Details to enable MFA verification for a subuser. Then, a subuser can configure MFA at next login. After MFA is configured, MFA verification will be performed for the subuser.

Enable sensitive operation protection

  1. Log in to the Kingsoft Cloud console. Access security settings. Click the Edit button for Operation Protection.




    image.png



  2. Click Enable operation protection and select a verification method.

  • Phone verification is available only if a phone number is bound.

  • Email verification is available only if an email address is bound.

  • MFA verification is available only if an MFA device is bound. This setting is valid only for a primary user account. For more information, see
    Configure MFA.




    You can access Access Control > Identifies >Details to enable MFA verification for a subuser. Then, a subuser can configure MFA at next login. After MFA is configured, MFA verification will be performed for the subuser.



  1. Click Submit.




    image.png

4、To disable sensitive operation protection, click Disable.

Did you find the above information helpful?

Unhelpful
Mostly Unhelpful
A little helpful
Helpful
Very helpful

What might be the problems?

Insufficient
Outdated
Unclear or awkward
Redundant or clumsy
Lack of context for the complex system or functionality

More suggestions

0/200

Please give us your feedback.

Submitted

Thank you for your feedback.

问题反馈