检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
          • All
          • Products
          • Solutions
          • Documentation
          • KooGallery
          • Developer
          • Learn
          • More
          1692 results found
          • Deleting Lifecycle Rules - Object Storage Service

            Deleting Lifecycle Rules - Object Storage Service

            For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.

            Help > Object Storage Service > Android > Lifecycle Management
          • Deleting CORS Rules - Object Storage Service

            Deleting CORS Rules - Object Storage Service

            For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.

            Help > Object Storage Service > Android > CORS
          • SEC08-06 Compliance of Personal Data Disclosure to Third Parties - Well-Architected Framework

            SEC08-06 Compliance of Personal Data Disclosure to Third Parties - Well-Architected Framework

            If high-impact personal data (e.g. passwords, bank accounts, and batch personal data) needs to be transmitted, encrypt it before transmission or transfer it through a secure channel. If cross-border data transfer is involved, comply with local laws and regulations.

            Help > Well-Architected Framework > Well-Architected Framework and Practices > Security Pillar > Data Security and Privacy Protection > SEC08 Data Privacy Protection
          • SQL Server Connection Test Failed (Error Code=0, SQLState=08S01) - Database and Application Migration UGO

            SQL Server Connection Test Failed (Error Code=0, SQLState=08S01) - Database and Application Migration UGO

            Causes Even if SSL is disabled, a certificate can be generated over an underlying protocol of SQL Server to encrypt a login data packet. TLS 1.0 may be used in earlier versions but is disabled by default for security purposes in the current JRE.

            Help > Database and Application Migration UGO > FAQs > Database Connections
          • ALTER COLUMN ENCRYPTION KEY - GaussDB

            ALTER COLUMN ENCRYPTION KEY - GaussDB

            It must comply with the naming convention. client_master_key_name Specifies the CMK used to encrypt the CEK. The value is the CMK name, which is created using the CREATE CLIENT MASTER KEY syntax. The encrypted CMKs are different from those specified before RR encryption.

            Help > GaussDB > Developer Guide(Centralized_V2.0-3.x) > SQL Reference > SQL Syntax
          • Billing - Cloud Trace Service

            Billing - Cloud Trace Service

            Trace file encryption: After enabling trace transfer, you can use Data Encryption Workshop (DEW) to encrypt trace files stored in OBS buckets. Trace analysis: This function is provided by CTS and is free to use.

            Help > Cloud Trace Service > Service Overview
          • Configuring Kafka Data Encryption During Transmission - MapReduce Service

            Configuring Kafka Data Encryption During Transmission - MapReduce Service

            SASL_PLAINTEXT The SSL protocol can be configured for the server or client to encrypt transmission and communication only after ssl.mode.enable is set to true and broker enables the SSL and SASL_SSL protocols. Parent Topic: MRS Cluster Security Hardening

            Help > MapReduce Service > User Guide > MRS Cluster O&M > MRS Cluster Security Configuration > MRS Cluster Security Hardening
          • Overview - Data Warehouse Service

            Overview - Data Warehouse Service

            Run the encryption command to encrypt the login passwords of the source and destination databases. Configure the dbinfo.properties file, including connection details for the source and destination databases, as well as function switch information.

            Help > Data Warehouse Service > Tool Guide > DataCheck > Introduction to DataCheck
          • Listing Versioning Objects - Object Storage Service

            Listing Versioning Objects - Object Storage Service

            For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.

            Help > Object Storage Service > .NET > Versioning Management
          • Creating a Grant - Data Encryption Workshop

            Creating a Grant - Data Encryption Workshop

            Retire the grant. encrypt-data: Encrypt data. decrypt-data: Decrypt data.

            Help > Data Encryption Workshop > API Reference > APIs > Key Management APIs > Key Grant Management
          • What's New - Data Encryption Workshop

            What's New - Data Encryption Workshop

            Feature Description Phase Document 1 API usage examples Examples of using APIs to encrypt and decrypt data, encrypt and decrypt DEKs, and query key information -- Example 1: Encrypting or Decrypting Data Example 2: Encrypting or Decrypting a DEK Example 3: Querying Information About

            Help > Data Encryption Workshop > What's New
          • What's New - Data Encryption Workshop

            What's New - Data Encryption Workshop

            Feature Description Phase Document 1 API usage examples Examples of using APIs to encrypt and decrypt data, encrypt and decrypt DEKs, and query key information -- Example 1: Encrypting or Decrypting Data Example 2: Encrypting or Decrypting a DEK Example 3: Querying Information About

            Help > Data Encryption Workshop > What's New
          • General Examples of ObsClient - Object Storage Service

            General Examples of ObsClient - Object Storage Service

            For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.

            Help > Object Storage Service > .NET > Quick Start
          • Setting or Obtaining a Bucket Quota - Object Storage Service

            Setting or Obtaining a Bucket Quota - Object Storage Service

            For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.

            Help > Object Storage Service > .NET > Bucket Management
          • What Should I Do If I Can't Connect to My RDS for MySQL Instance? - Data Admin Service

            What Should I Do If I Can't Connect to My RDS for MySQL Instance? - Data Admin Service

            After that, a symmetric key is generated and is used to encrypt the password and data.

            Help > Data Admin Service > FAQs > Managing connections
          • ROMA Connect Security Best Practices - ROMA Connect

            ROMA Connect Security Best Practices - ROMA Connect

            Kafka: Set Authentication Mode to SSL and SASL to SCRAM-SHA-512 or SCRAM-SHA-256 to encrypt data transmission and prevent data leakage and tampering. For details about the configuration, see Kafka.

            Help > ROMA Connect > Best Practices
          • Secure Boundaries - ModelArts

            Secure Boundaries - ModelArts

            Encrypt sensitive information with encryption component before data transmission. App authentication key is an access credential for real-time services. You must keep the app key properly. Parent topic: Security

            Help > ModelArts > Service Overview > Security
          • Uploading Function Code from OBS - FunctionGraph

            Uploading Function Code from OBS - FunctionGraph

            Customer master key (CMK): You can select a created key to encrypt the function code. For details about how to create a customer master key, see Creating a Custom Key.

            Help > FunctionGraph > User Guide > Configuring Functions > Configuring Function Code
          • SSE-C - Object Storage Service

            SSE-C - Object Storage Service

            To use SSE-C to encrypt the object you are uploading, you must have the upload permission (obs:object:PutObject in IAM or PutObject in a bucket policy).

            Help > Object Storage Service > User Guide > Data Security > Server-Side Encryption
          • Access Authenticated Using an Application - ModelArts

            Access Authenticated Using an Application - ModelArts

            For security, encrypt and store them in the configuration file or environment variables. # In this example, the app_key and app_secret are stored in environment variables for identity authentication.

            Help > ModelArts > Model Inference (To Be Offline) > Deploying an AI Application as a Service > Deploying AI Applications as Real-Time Services > Accessing Real-Time Services > Authentication Mode
          Total results: 1692
          • Previous
          • 1
          • ...
          • 17
          • 18
          • 19
          • ...
          • 85
          • Next
          • Go
          Load More
          Was this helpful?
          Feedback
          /200
          Submit Cancel
          Contact Sales After-Sales Self Service
          • Site Terms
          • Privacy Statement

          Explore Huawei Cloud

          Why Us Customer Stories Trust Center Legal Press Releases

          Featured Services

          Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

          Service and Support

          Documentation Contact Us Public Notices Support Plans Service Health Dashboard

          Account and Payment

          Top Up Invoices Billing Center My Account Payment Method

          Quick Links

          Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

          © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

          • Site Terms
          • Privacy Statement