You can configure the account settings, critical operation protection, login authentication policy, password policy, and access control list (ACL) on the Security Settings page. For details, see Basic Information, Critical Operation Protection, Login Authentication Policy, Password Policy, and ACL. This chapter describes how to access the Security Settings page and who is the intended audience.
Table 1 lists the intended audience of different functions provided on the Security Settings page and their access permissions for the functions.
Function |
Intended Audience |
---|---|
IAM users: Full access |
|
|
|
|
|
|
|
|