过期域名预定抢注

 找回密碼
 免费注册

收到Amazon關於APi更改的信息.April 21, 2014

[複製鏈接]
發表於 2014-3-20 14:00:48 | 顯示全部樓層 |閱讀模式
收到Amazon關於APi更改的信息. 好像是要改動Amazon Api ,術語太多 不知理解有沒偏差.
Dear AWS Customer,
% t2 u% ]( o: h9 V+ X' n" J1 C( }
1 W, E5 M4 ^! N+ [4 K- |3 xYou recently used the legacy AWS security credentials page to retrieve secret access keys for your root account #xxxxxxxxxxxx. As part of our ongoing efforts to help keep your resources secure, AWS will remove the ability to retrieve existing secret access keys on April 21, 2014. Just as AWS doesn't reveal your password back to you if you forgot it (you'd have to set a new password), AWS will no longer allow retrieval of secret access keys after their initial creation. However, you can always create a new access key, consisting of an access key ID and secret access key, by following these simple steps. - K  Z! Y4 c3 z% v+ e5 z
* g, U2 ?; x- |! s7 b
As a best practice, we recommend not having root access keys at all. Instead, use AWS Identity and Access Management (IAM), which enables you to securely control access to AWS services and resources for your users. IAM is integrated throughout AWS, so you can rely on IAM users for everyday activity, whether you access AWS via the console, APIs, CLI, or the SDKs.
* H3 H- E6 L( ~- D+ _9 B
+ V6 n2 D: ~# i6 \If you haven't securely stored your secret access key(s), you should do so before April 21, 2014. To learn more about this change and about best practices for managing AWS access keys, please visit the AWS documentation. If you have questions or concerns, please join us on the IAM forum.
" h8 J1 P" G2 x' I
+ m: H  z! P9 s8 z* bSincerely, - o" u  t- J& R+ x  |& t* k' u: e
The AWS Identity and Access Management Team
) K" {2 o" [  k# c9 a
, M4 i8 C  N! z( i
/ D, _! Z% S, m' T. N' h
回復

使用道具 舉報

您需要登錄後才可以回帖 登錄 | 免费注册

本版積分規則

过期高净值品牌域名预定抢注

4um點基跨境網編創業社區

GMT+8, 2024-11-24 22:48

By DZ X3.5

小黑屋

快速回復 返回頂部 返回列表