检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Enabling or Disabling Encrypted Backup Scenarios TaurusDB can encrypt backups. After encrypted backup is enabled, a key is required, which is generated and managed by Data Encryption Workshop (DEW).
Connecting to a Database in SSL Mode When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.
Connecting to a Database in SSL Mode When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.
Replacing an HA Certificate HA certificates are used to encrypt the communication between active/standby processes and HA processes to ensure the communication security.
If necessary, encrypt such data. Collector Deployment When you manually install the ICAgent on an Elastic Cloud Server (ECS), your AK/SK will be used as an input parameter in the installation command.
To encrypt them, perform the operations provided in this topic. Setting the HFile and WAL encryption mode to SMS4 or AES has a great impact on the system and will cause data loss in case of any misoperation. You are not advised to perform this operation.
According to the principle of asymmetric cryptography, each certificate holder has a pair of public and private keys, which can be used to encrypt and decrypt each other. The public key is public and does not need to be kept confidential.
AES Encrypt the character string using the AES encryption algorithm. AES algorithm configurations: The initial vector (IV) is a 16-byte random number. The encryption mode is GCM. PKCS7-Padding (CMS-Padding) is recommended.
They are used to encrypt the signature of a request, ensuring that the request is secure and integral, and that identities of the request sender and receiver are correct. AK: a unique ID associated with an SK. It is used together with the SK to sign requests.
Configuring SSL Function This API is used to configure SSL to encrypt connections. Before calling this API, learn how to authenticate it. Before calling this API, learn about request header parameters.
Data Protection User encryption allows you to use the encryption feature provided on the cloud platform to encrypt ECS resources, improving data security. If you use an encrypted ECS to create an AS configuration, the AS configuration is encrypted as the ECS.
Creating a Secret Version Function Creates a new secret version in the specified secret to encrypt and keep the new secret value. By default, The latest secret version in SYSCURRENT state. The previous version is in the SYSPREVIOUS state.
If you want to encrypt transmission from CDN to your origin server, configure a security certificate on the origin server for full-link HTTPS.
Data Protection Encryption SFS supports server-side encryption, which allows you to encrypt the data stored in SFS file systems. When data is accessed, SFS automatically decrypts the data and then returns it to you. To use the encryption function, see File System Encryption.
Connecting to a Database in SSL Mode When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.
Connecting to the Database (Using SSL) When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.
Connecting to a Database in SSL Mode When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.
Connecting to a Database in SSL Mode When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.
To prevent any potential data breaches, you are advised to use SSL to encrypt data transmitted on the Internet. You can also use Direct Connect or VPN to encrypt data transmission. Parent Topic: Network Security
To prevent any potential data breaches, you are advised to use SSL to encrypt data transmitted on the Internet. For details, see Configuring an SSL Connection. You can also use Direct Connect or VPN to encrypt data transmission. Parent Topic: Network Security