Security Settings Overview¶
You can configure the account settings, critical operation protection, login authentication policy, password policy, and access control list (ACL) on the Security Settings page. For details, see Basic Information, Critical Operation Protection, Login Authentication Policy, Password Policy, and ACL. This chapter describes how to access the Security Settings page and who is the intended audience.
Intended Audience¶
Table 1 lists the intended audience of different functions provided on the Security Settings page and their access permissions for the functions.
Function | Intended Audience |
---|---|
IAM users: Full access | |
| |
| |
| |
|
Accessing the Security Settings Page¶
Log in to the IAM console as an administrator.
In the left navigation pane, choose Security Settings.
You and all IAM users created using your account can access the Security Settings page from the management console.
Log in to the IAM console.
In the left navigation pane, choose Security Settings.