当前位置:网站首页>Account protection and use scheme
Account protection and use scheme
2022-06-23 02:58:00 【Yaoweili】
What is account protection ?
Account protection is divided into login protection 、 Operation protects both modules .
One 、 Login protection
Login protection refers to the login operation , Tencent cloud adds a layer of protection to you . Usually , This protection measure is under the premise of normal login , You also need to enter an additional credential that can prove your identity .
After login protection is enabled , When logging into the official website of Tencent cloud , Need to authenticate . Avoid even if others steal your password , You can't log in to your account , It can guarantee the security of your account to the greatest extent .
Two 、 Operation protection
Operation protection means that when you perform sensitive operations , Tencent cloud adds a layer of protection to you . Usually , After switching on the operation protection , Before you perform sensitive operations , You need to complete authentication first , To ensure that it is you who operate . Common operation scenarios are console sensitive operations , You need to enter the corresponding verification code for secondary confirmation .
What specific operations require secondary verification , It is determined by each product side , It mainly involves some data security 、 restart 、 Release and other sensitive operations .
Solution :
To ensure the security of the account , Ensure the data security under the account , It is recommended to enable login protection 、 Operation protection .
Login protection 、 The operation protection supports three verification methods , Wechat scanning code 、MFA Equipment calibration 、 Verification of mobile phone verification code , You can select one of them as the verification method .
Sign in / Operation protection type | effect |
|---|---|
Enable wechat code scanning verification | After using the non wechat code scanning login method on the login page , Enter the identity confirmation page , You need to use wechat scanning code to confirm your identity , If the code scanning wechat is consistent with the account associated wechat , Then login can be completed , Otherwise, the login cannot be completed . |
Enable MFA Equipment calibration | Enter the account and password in the login box , To get into MFA Password entry page , Enter the correct MFA Password to complete the login . |
Enable mobile verification code verification | Enter the account and password in the login box , To enter the mobile phone verification code input page , Click Get mobile verification code , Enter the correct verification code to complete the login . |
Screenshot of console operation :
Take login protection as an example , Operation path : Console - Account Center - Security Settings - Account Protection , Here's the picture :
Set login protection :
Account related Login protection - Operation guide - Document center - Tencent cloud
Set operation protection :
Account related Operation protection - Operation guide - Document center - Tencent cloud
边栏推荐
- SetTimeout and setinterval execution time
- Deep analysis of time complexity
- How to gracefully solve the problem of platform font adaptation
- Scanning technology (getting started with web security 06)
- Capture passwords of all chrome versions
- Wi Fi 6 is coming - larger capacity, lower latency, faster network speed and more security
- How to generate IATA barcode in batch through TXT file
- Automatically update site statistics with actions
- Golang string comparison
- 3. install and deploy Mgr cluster | explain Mgr in simple terms
猜你喜欢

6. template for integer and real number dichotomy
What is sitelock? What is the function?

5. concept of ruler method

C language series - Section 4 - arrays

Soft exam information system project manager_ Information system comprehensive testing and management - Senior Information System Project Manager of soft test 027

Soft exam information system project manager_ Contract Law_ Copyright_ Implementation Regulations - Senior Information System Project Manager of soft exam 030

How to store, manage and view family photos in an orderly manner?

Vulnhub DC-5

Spark broadcast variables and accumulators (cases attached)

8. greed
随机推荐
Use ES6 new Target to simulate abstract classes
Reading redis source code (IV) command request processing flow
February 1, 2022: painting house II. If there is a row of houses, N in total, each
How to batch print serial and repeated barcode data
DAAS architecture and Implementation (I)
Use of apicloud AVM framework list component list view and flex layout tutorial
Markdown - mark above / below symbol (typora, latex)
Zoom/skype/ nailing / live broadcast / conference / online video real-time subtitle generation and translation, simultaneous interpretation
No error is reported when using the Gorm framework to create a table, but the data cannot be inserted successfully
Related concepts of TTF, TOF, woff and woff2
Biological psychiatry: defining individualized functional neuroanatomy for precision psychiatry
Automatically update site statistics with actions
Easygbs adds websocket message push, which can quickly locate video playback faults
A bit about the state machine (FSM SMR DFSM)
Vs code remote SSH configuration
Direct collection - super easy to use domestic color matching website
New uniapp+uniui background management uniuadmin
February 4, 2022: combined total IV. Give you a number composed of different integers
Section 6: basic configuration I of spingboot
The performance of the new Tokio scheduler is improved by 10 times