This section describes how to configure security access policies and time verification for the object service to improve access security.