FAQs | TWSC Portal
Q1. Which browsers are supported for TWSC ?
It is recommended to use the following supported browsers for the best user experience:
Windows7 | Windows10+ | Mac OS 10+ | Ubuntu 16.04+(Linux) | |
---|---|---|---|---|
Chrome 70+ | ||||
Firefox 62+ | ||||
Safari 12+ | ||||
Edge 62+ | - | - | ||
IE9/IE10 | - | - |
Q2. Why is the screen blank after sign-in?
After TWSC update the new version, a blank screen will be displayed after signing in if your browser stores the previous version cache. Clear the cache to sign in normally.
Q3. What will happen if the password is entered incorrectly continuously?
If you enter the password incorrectly for 3 consecutive times, you will not be able to sign in for 15 minutes. Please try again later.
Q4. What is the difference between Tenant Admin and Tenant User in using TWSC services?
The differences between Tenant Admin and Tenant User are role permissions, please refer to this document for the differences between the two roles.
Q5. How to check the limit of GPU usage of the project?
Please refer to "Quota" of this document.
Q6. An error when creating resource:`[i-service] no quota to request resource.user`?
If the following error messages occur when you're using services/resources of TWSC, (e.g., create or start a VCS instance, detach the data disk or use container services...etc.):
error code:401(Unauthorized)
error message:[i-service] no quota to request resource.user
They indicate that the credit of the project is insufficient. Please check whether the main wallet or the user's sub wallet of your project is still enough for using services.
Q7. What are the security development procedures and practices used by the TWSC services website?
In accordance with the Cyber Security Management Act - Regulations on Classification of Cyber Security Responsibility Levels, the Defense Standards of Information and Communication System specified in Schedule 10. If any software is added or modified, measures for security requirements (including confidentiality, availability, and integrity) at a higher level should be implemented in the following system development life cycle according to the information and communication system level assessed by the TWSC. All of our services abide by this principle during the development process. Before going online, they have undergone source code testing and vulnerability scanning, and regular penetration testing after going online to protect system security.