• Cloud Container Engine

cce
  1. Help Center
  2. Cloud Container Engine
  3. API Reference
  4. APIs
  5. Authenticating Requests

Authenticating Requests

There are two methods for authenticating API requests. You can use either of the methods as needed.

  • Token Authentication

    Common requests are authenticated using Tokens. Open APIs typically use Token authentication.

  • AK/SK Authentication

    Requests are encrypted using the Access Key ID (AK) and Secret Access Key (SK). This authentication mode is more secure than token authentication and is recommended for proprietary APIs.