×
Resource Access Management

Efficient, Effective, Intelligent, and Secure O&M – Part 1: The Need

This article discusses the needs and practices surrounding O&M, along with additional information about Bastionhost and Operation Orchestration Service.

Efficient, Effective, Intelligent, and Secure O&M – Part 4: Alibaba Cloud Operation Orchestration Service

This article introduces Operation Orchestration Service, discusses different usage scenarios and benefits, and how it can help you achieve business goals.

Efficient, Effective, Intelligent, and Secure O&M – Part 3: Attaining O&M Perfection with Bastionhost

This article explores the architecture and operational intricacies of Alibaba Cloud Bastionhost.

Efficient, Effective, Intelligent, and Secure O&M – Part 2: Results and Key Findings

This article discusses ways to benefit from an intelligent O&M system and the key findings associated with it.

An Overview of How to Integrate 2FA in a VPN Gateway with iDaaS and Active Directory

This article gives step-by-step directions about setting up a VPN Gateway with iDaaS and Active Directory.

Alibaba Cloud RAM – Part 2: Overcoming IAM Challenges with Alibaba Cloud RAM

This article discusses the real-world challenges that enterprises face with Identity and Access Management and how to overcome these challenges using Alibaba Cloud RAM.

Alibaba Cloud RAM – Part 1: An Overview of Resource and Access Management

This article gives an overview of Alibaba Cloud Resource and Access Management (RAM).

Alibaba Cloud RAM – Part 3: Usage Scenarios

This article discusses all of the usage scenarios and product scope associated with Alibaba Cloud RAM.

Connect Environments with Alibaba Cloud Express Connect – Part 1

This article examines Alibaba Cloud Express Connect and how it can help connect multiple environments.

Alibaba Cloud Bastionhost and Azure AD Integration

This article demonstrates how to integrate Alibaba Cloud Bastionhost to Azure AD so that users can log in to Bastionhost using accounts from Azure AD.

Security and Monitoring Practices – Alibaba Cloud Storage Solutions – Part 1

In this article, we will describe how you can implement a secure cloud storage solution using the Alibaba Cloud Resource Access Management (RAM) service.

API Gateway: Use-Case Scenarios & Industry Specific Modeling

This article discusses the different industry models used by the API Gateway Service and related use-case scenarios.

Best Practice for Creating and Managing User Access Permissions

User access management is used by system administrators to control user access to network resources, and is implemented by granting users and groups access to specific objects.

Controlling User Permissions in the Cloud Era

This blog introduces Alibaba Cloud Resource Access Management (RAM) service and provides some references for you to get started.

Getting Started with User Permission Management on Alibaba Cloud

Follow the steps in this article to learn how to create and manage users by using Alibaba Cloud Resource Access Management (RAM) service.

How to Secure Your Data on Alibaba Cloud?

In this blog, we'll introduce several security concepts, such as the CIA model and AAA framework, and discuss how you can leverage them to secure your data on Alibaba Cloud.

How Alibaba Cloud SMS Provides Enterprise-level Security Awareness

Alibaba Cloud SMS improves the overall management capabilities and convenience of enterprise-level cloud communication.

How to Set Up Disk Quota on Ubuntu 18.04 server

In this article, we will show you how to set up a disk quota for different users on your Ubuntu 18.04 server hosted on Alibaba Cloud ECS.

Limiting Access for a DataWorks UDF to Specific Accounts

In this article, we will explore how to implement permission control in DataWorks so that a specific resource, table, or UDF can only be used by a specified user.

Six Key Elements of an Off-Premises Data Security System

This article enumerates six elements of an off-premises data security system, highlighted by Xiao Li, General Manager of Alibaba Cloud Intelligent Security division at the 2nd Data Security Summit.