检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • Others
        8794 results found.
        • Creating a Secret Version - Data Encryption Workshop

          Creating a Secret Version - Data Encryption Workshop

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token. Table 3 Request body parameters Parameter Mandatory Type Description secret_binary No String Value of a new secret.

          Help > Data Encryption Workshop > API Reference > APIs > Secret Management APIs > Secret version management
        • Accessing the page for importing private keys - Data Encryption Workshop

          Accessing the page for importing private keys - Data Encryption Workshop

          Can be obtained by calling the IAM API for obtaining the user token (the value of X-Subject-Token in the response header).

          Help > Data Encryption Workshop > API Reference > APIs > Key Pair Management APIs > Key Pair Management
        • Canceling a Scheduled Secret Deletion Task - Data Encryption Workshop

          Canceling a Scheduled Secret Deletion Task - Data Encryption Workshop

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.

          Help > Data Encryption Workshop > API Reference > APIs > Secret Management APIs > Lifecycle Management
        • Injecting Watermarks into Documents - Data Security Center

          Injecting Watermarks into Documents - Data Security Center

          Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token, which can be obtained by calling the IAM API (value of X-Subject-Token in the response header).

          Help > Data Security Center > API Reference > API Description > Document Watermarking
        • Extracting a Data Watermark - Data Security Center

          Extracting a Data Watermark - Data Security Center

          Request Parameters Table 2 Request header parameters Parameter Mandatory Type Description X-Auth-Token Yes String User token, which can be obtained by calling the IAM API (value of X-Subject-Token in the response header).

          Help > Data Security Center > API Reference > API Description > Data Watermarking
        • Modifying a Private Zone - Domain Name Service

          Modifying a Private Zone - Domain Name Service

          It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token. Table 3 Request body parameters Parameter Mandatory Type Description description No String Zone description.

          Help > Domain Name Service > API Reference > APIs > Private Zone Management
        • Creating an Endpoint - Domain Name Service

          Creating an Endpoint - Domain Name Service

          It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token. Table 2 Request body parameters Parameter Mandatory Type Description name Yes String Endpoint name. It can contain 1 to 64 characters.

          Help > Domain Name Service > API Reference > APIs > Endpoint Management
        • Creating a PTR Record for an EIP - Domain Name Service

          Creating a PTR Record for an EIP - Domain Name Service

          It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.

          Help > Domain Name Service > API Reference > APIs > PTR Record Management (Old Version)
        • Modifying a Public Zone - Domain Name Service

          Modifying a Public Zone - Domain Name Service

          It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token. Table 3 Request body parameters Parameter Mandatory Type Description description No String Zone description.

          Help > Domain Name Service > API Reference > APIs > Public Zone Management
        • Obtaining All Components - ServiceStage

          Obtaining All Components - ServiceStage

          This parameter is mandatory when kind is set to package or image. storage String Storage mode, for example, obs. auth String Authentication mode, for example, iam. repo_auth String Authorization name. repo_namespace String Namespace of the code repository. repo_ref String Code branch

          Help > ServiceStage > API Reference > Application Management V3 APIs > Component
        • Querying the Protection List - Host Security Service

          Querying the Protection List - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token.

          Help > Host Security Service > API Reference > API Description > Web Tamper Protection
        • Querying the Alarm Whitelist - Host Security Service

          Querying the Alarm Whitelist - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token.

          Help > Host Security Service > API Reference > API Description > Whitelist Management
        • Querying the Servers Affected by a Vulnerability - Host Security Service

          Querying the Servers Affected by a Vulnerability - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.

          Help > Host Security Service > API Reference > API Description > Vulnerability Management
        • Querying the List of Servers Corresponding to a Vulnerability Scan Task - Host Security Service

          Querying the List of Servers Corresponding to a Vulnerability Scan Task - Host Security Service

          It can be obtained by calling an IAM API. The value of X-Subject-Token in the response header is the user token.

          Help > Host Security Service > API Reference > API Description > Vulnerability Management
        • Querying Quota Details - Host Security Service

          Querying Quota Details - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token.

          Help > Host Security Service > API Reference > API Description > Quota Management
        • Querying the Checklist of a Security Configuration Item - Host Security Service

          Querying the Checklist of a Security Configuration Item - Host Security Service

          It can be obtained by calling the IAM API used to obtain a user token. The value of X-Subject-Token in the response header is a token.

          Help > Host Security Service > API Reference > API Description > Baseline Management
        • Parallel File System Features - Object Storage Service

          Parallel File System Features - Object Storage Service

          IAM Permission Configuration Examples Example 1: Grant a user the permissions required to download dir_1, excluding its subdirectories. In the following configuration, the resource path ends with a slash (/).

          Help > Object Storage Service > User Guide > Parallel File System
        • Connecting to a Database - GaussDB

          Connecting to a Database - GaussDB

          When accessing the KMS, you need to provide the IAM identity authentication information and KMS project information. iamUser and iamPassword are used to set identity authentication information. kmsDomain, kmsProjectId, and kmsProjectName are used to set KMS project information.

          Help > GaussDB > Developer Guide(Distributed_V2.0-2.x)
        • Creating a Bucket (SDK for Java) - Object Storage Service

          Creating a Bucket (SDK for Java) - Object Storage Service

          IAM is recommended for granting permissions. For details, see IAM Custom Policies. The mapping between OBS regions and endpoints must comply with what is listed in Regions and Endpoints.

          Help > Object Storage Service > Java > Bucket Management (SDK for Java)
        • Uploading an Object - Resumable (SDK for Java) - Object Storage Service

          Uploading an Object - Resumable (SDK for Java) - Object Storage Service

          Restrictions To upload an object, you must be the bucket owner or have the required permission (obs:object:PutObject in IAM or PutObject in a bucket policy). For details, see Introduction to OBS Access Control, IAM Custom Policies, and Configuring an Object Policy.

          Help > Object Storage Service > Java > Object Upload (SDK for Java)
        Total results: 8794
        • Previous
        • 1
        • ...
        • 398
        • 399
        • 400
        • ...
        • 440
        • Next
        • Go
        Load More
        Was this helpful?
        Feedbacks
        /200
        Submit Feedback Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement