Help Center > Object Storage Service > Quick Start > Related Operations > Creating Access Keys (AKs and SKs)

Creating Access Keys (AKs and SKs)

This section describes how to create access keys (AKs and SKs) on OBS Console. A pair of AK and SK is used to encrypt the signature of a request, ensuring that the request is secure and integral, and that identities of the request sender and receiver are correct.


AKs and SKs support the authentication mechanism of Identity and Access Management (IAM). Detailed explanations are as follows:

  • An Access Key ID (AK) defines a user that accesses the OBS system. An AK belongs to only one user, but one user can have multiple AKs. The OBS system recognizes the users that access the system by their AKs.
  • A Secret Access Key (SK) is the key used by users to access OBS. It is the authentication information generated based on the AK and the request header. SKs and AKs are in one-to-one match.

Restrictions and Limitations

Each user can create up to two valid AK/SK pairs.


You have registered and activated a cloud account.


  1. Log in to OBS Console.
  2. In the upper right corner of the page, click the username and select My Credential.
  3. On the My Credential page, click the Access Keys tab, and then click Add Access Key below the displayed access key list.
  4. In the Add Access Key dialog box that is displayed, enter the password and its verification code.

    • If you have not bound an email address or mobile number, you need to enter only the password.
    • If you have bound an email address and a mobile number, you can select the verification either by email address or mobile number.

  5. Click OK.
  6. In the Download Access Key dialog box that is displayed, click OK to save the access keys to your browser's default download path.


    To prevent the access keys from being leaked, keep it secure. If you click Cancel in the dialog box, the access keys will not be downloaded, and you cannot download them later. You can recreate an access key if you need to use it.

  7. Open the downloaded credentials.csv file to obtain the access keys (AK and SK).

Follow-up Procedure

If the access key is used abnormally (including loss and leakage) or it is no longer needed, click Delete to delete it from the access key list.

When deleting the access keys, you need to enter the login password and either an email or mobile verification code. After the access keys are deleted, it will be permanently deleted and cannot be restored.