edit-icon download-icon

User authentication

Last Updated: Apr 11, 2018

Table Store uses the symmetric signature to verify that a request is sent by its owner and a response is returned by Table Store.

After you register an account, you can obtain an AccessKeyID and AccessKeySecret. The AccessKeyID represents your identity, and the AccessKeySecret is used to sign and verify requests and responses. The AccessKeySecret must be kept confidential.

When you send a request to Table Store, the request must contain the request plaintext, your AccessKeyID, and the verification code that is generated when the AccessKeySecret is used to sign information in the request plaintext.

After receiving the request, Table Store finds the AccessKeySecret corresponding to the AccessKeyID and signs the information in the plaintext. A request is considered valid if the calculated verification code is the same as the provided one.

To verify a response from Table Store, you must perform the same calculation. A response is valid if the calculated verification code is the same as the provided one.

Thank you! We've received your feedback.