检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Step 2: Binding a Key Pair to an ECS Step 2: Binding a Key Pair to a Shut-down ECS Step 2: Binding a Key Pair to a Running ECS Bind a key pair to the ECS. Step 3: Logging in to an ECS Using a Private Key After the key pair is bound, use the private key to log in to the ECS.
Using a Private Key to Log In to the Linux ECS After you create or import a key pair on the KMS console, set login mode to Key Pair when purchasing an ECS, and select the created or imported key pair.
How Do I Enable the Password Login Mode for an ECS? If you disable the password login mode when binding a key pair to an ECS, you can enable the password login mode again later when you need to.
Clearing the initial password information does not affect ECS operation or login. Once cleared, the password cannot be restored. Before deleting a password, record the password information. For details, see Elastic Cloud Server User Guide.
Encrypting Data in ECS Overview KMS supports one-click encryption for ECS. The images and data disks of ECS can be encrypted.
Procedure Method 1: resetting the password Reset the password on the ECS console and log in to the ECS using the password. For details, see Elastic Cloud Server User Guide.
If you have not set a password for logging in to the ECS, or you have forgotten your password, reset the login password on the ECS management console. For details, see Elastic Cloud Server User Guide.
You can bind a key pair to the ECS again by resetting the password or key pair. For details, see "How Do I Handle the Failure in Logging In to ECS After Unbinding the Key Pair?". Parent topic: KPS Related
Advantages Reinforced Login Security You can log in to a Linux ECS without entering a password, effectively preventing password interception, cracking, or leakage and improving the Linux ECS security.
How It Works You can configure an agency for elastic cloud server (ECS) on Identity and Access Management (IAM) to obtain the temporary access key (AK), thereby protecting the AK and secret key (SK).
Cloud services use KMS for encryption Encryption in ECS KMS supports one-click encryption for Elastic Cloud Server (ECS). The images and data disks of ECS can be encrypted.
ecs:serverKeypairs:delete - √ x Parent Topic: Permissions Policies and Supported Actions
Obtaining the Password for Logging In to a Windows ECS If your ECS runs Windows, you can use the private key of a key pair to log in to the ECS. For details, see Elastic Cloud Server User Guide.
Table 1 Cloud services integrated with KMS Category Service Encryption Mode Computing Elastic Cloud Server (ECS) You can encrypt an image or EVS disk in ECS.
Using a Key Pair Binding a Key Pair to an ECS Using a Private Key to Log In to the Linux ECS Using a Private Key to Obtain the Login Password of Windows ECS Parent Topic: Key Pair Service
The inbound direction of port 22 of the ECS security group is not open to 100.125.0.0/16. SSH configuration of the ECS has been modified. The ECS has been shut down, started, or a disk has been detached during the process of replacing the key pair.
Method 2: Creating an Encrypted Image Using an Encrypted ECS When you use an ECS to create a private image, if the system disk of the ECS is encrypted, the private image created using the ECS is also encrypted.
Failed to check the ECS status. Possible causes: The ECS is not in the ACTIVE state. The ECS is not in the SHUTOFF state. Go to the ECS console and change the ECS status. System volume not found. Failed to check the ECS status.
The inbound direction of port 22 of the ECS security group is not open to 100.125.0.0/16. SSH configuration of the ECS has been modified. The ECS has been shut down, started, or a disk has been detached during the process of unbinding the key pair from the ECS.
Possible Causes The inbound direction of port 22 of the ECS security group is not open to 100.125.0.0/16. The ECS has been shut down, started, or a disk has been detached during the process of resetting the key pair. The network connection is faulty.