< Previous | Contents | Next >

3

 

Access and authenticationNotes:Targeting a tenant (the service point)Targeting a bucketTargeting an objectUsing SSL securityUsing a hosts fileHostname mappingsHostname mapping considerationsSample hosts fileURL considerationsCase sensitivity in URLsQuotation marks with URLs in command linesDisabling SSL certificate verificationAWS authenticationAuthorization headerPresigned URLsSignaturesAnonymous accessInvalid credentialsChanging your password