Access control. Numerous authentication and authorization mechanisms are available to control access to or vary content. These include distributed mechanisms (such as validating cookies or client certificates at the edge) as well as centralized mechanisms that can query an origin authentication server.
Response to origin server failure. In the
event of origin server failure, customers may indicate whether or not to deliver (potentially stale)
content from cache,
to use a backup origin server, or to serve static content from the Akamai storage system. Timeout lengths and back-off parameters are configurable as well.
Share with your friends: