检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • Others
        1668 results found.
        • Encryption Data - Intelligent EdgeFabric

          Encryption Data - Intelligent EdgeFabric

          Encryption Data Encryption data is used to store and encrypt sensitive information. Edge applications can access plaintext data through MQTT server. Creating Encryption Data Log in to the IEF console. In the navigation pane, choose Edge Applications > Application Configuration.

          Help > Intelligent EdgeFabric > User Guide > User Guide (Professional) > Containerized Application Management
        • Configuring TLS - Edge Data Center Management

          Configuring TLS - Edge Data Center Management

          Configuring TLS Context TLS is designed to ensure data confidentiality and integrity between two communication application programs. In the multi-tenant deployment scenario, you need to contact the system administrator to configure the TLS certificate. Procedure Choose System > About

          Help > User Guide > System > About > Certificate Authority Service > Global Configuration
        • Enabling or Disabling Encrypted Backup - TaurusDB

          Enabling or Disabling Encrypted Backup - TaurusDB

          Enabling or Disabling Encrypted Backup Scenarios TaurusDB can encrypt backups. After encrypted backup is enabled, a key is required, which is generated and managed by Data Encryption Workshop (DEW).

          Help > TaurusDB > User Guide > Data Backups
        • Are Additional Permissions Required When I Share an Object with SSE-OBS Encrypted? - Object Storage Service

          Are Additional Permissions Required When I Share an Object with SSE-OBS Encrypted? - Object Storage Service

          SSE-OBS uses a data key derived from the OBS root key to encrypt or decrypt an object. OBS does not need to interact with KMS. Therefore, you do not need to grant special permissions when sharing objects. Parent topic: Server-Side Encryption

          Help > Object Storage Service > FAQs > Server-Side Encryption
        • Example 1: Encrypting or Decrypting Small Volumes of Data - Data Encryption Workshop

          Example 1: Encrypting or Decrypting Small Volumes of Data - Data Encryption Workshop

          This section describes how to call a KMS API and use a CMK to encrypt or decrypt data. Process: Create a CMK in KMS. Call the encrypt-data API of KMS to encrypt plaintext data by using a CMK. Deploy ciphertext certificates on your servers.

          Help > Data Encryption Workshop > API Reference > Application Examples
        • Connecting to an HBase Security Cluster Using the HBase Shell - CloudTable Service

          Connecting to an HBase Security Cluster Using the HBase Shell - CloudTable Service

          Connecting to an HBase Security Cluster Using the HBase Shell You can enable security channel encryption to encrypt data transmission. This section describes how to enable a secure channel for an HBase cluster.

          Help > CloudTable Service > User Guide > Using HBase > Connecting to an HBase Cluster
        • Connecting to a Database in SSL Mode - GaussDB

          Connecting to a Database in SSL Mode - GaussDB

          Connecting to a Database in SSL Mode When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.

          Help > GaussDB > Developer Guide(Distributed_V2.0-8.x) > Application Development Guide > Development Based on JDBC > Development Process > Connecting to a Database
        • Connecting to a Database in SSL Mode - GaussDB

          Connecting to a Database in SSL Mode - GaussDB

          Connecting to a Database in SSL Mode When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.

          Help > GaussDB > Developer Guide(Centralized_V2.0-8.x) > Application Development Guide > Development Based on JDBC > Development Procedure > Connecting to a Database
        • Privacy and Sensitive Information Protection Statement - Application Operations Management

          Privacy and Sensitive Information Protection Statement - Application Operations Management

          If necessary, encrypt such data. Collector Deployment When you manually install the ICAgent on an Elastic Cloud Server (ECS), your AK/SK will be used as an input parameter in the installation command.

          Help > Application Operations Management > Service Overview (1.0)
        • Replacing an HA Certificate - MapReduce Service

          Replacing an HA Certificate - MapReduce Service

          Replacing an HA Certificate HA certificates are used to encrypt the communication between active/standby processes and HA processes to ensure the communication security.

          Help > MapReduce Service > User Guide > MRS Cluster O&M > MRS Cluster Security Configuration > Replacing MRS Cluster Certificates
        • HFile and WAL Encryption - MapReduce Service

          HFile and WAL Encryption - MapReduce Service

          To encrypt them, perform the operations provided in this topic. Setting the HFile and WAL encryption mode to SMS4 or AES has a great impact on the system and will cause data loss in case of any misoperation. You are not advised to perform this operation.

          Help > MapReduce Service > User Guide > MRS Cluster O&M > MRS Cluster Security Configuration > MRS Cluster Security Hardening
        • What Are the Relationships Between a Public Key, Private Key, and Digital Certificate? - Cloud Certificate Manager

          What Are the Relationships Between a Public Key, Private Key, and Digital Certificate? - Cloud Certificate Manager

          According to the principle of asymmetric cryptography, each certificate holder has a pair of public and private keys, which can be used to encrypt and decrypt each other. The public key is public and does not need to be kept confidential.

          Help > Cloud Certificate Manager > FAQs > Certificate Consulting
        • AES - Data Security Center

          AES - Data Security Center

          AES Encrypt the character string using the AES encryption algorithm. AES algorithm configurations: The initial vector (IV) is a 16-byte random number. The encryption mode is GCM. PKCS7-Padding (CMS-Padding) is recommended.

          Help > Data Security Center > API Reference > Appendixes > Configuring a Dynamic Sensitive Data Masking Policy
        • Data Protection - Auto Scaling

          Data Protection - Auto Scaling

          Data Protection User encryption allows you to use the encryption feature provided on the cloud platform to encrypt ECS resources, improving data security. If you use an encrypted ECS to create an AS configuration, the AS configuration is encrypted as the ECS.

          Help > Auto Scaling > Service Overview > Security
        • Obtaining a Permanent AK/SK - Koo Command Line Interface

          Obtaining a Permanent AK/SK - Koo Command Line Interface

          They are used to encrypt the signature of a request, ensuring that the request is secure and integral, and that identities of the request sender and receiver are correct. AK: a unique ID associated with an SK. It is used together with the SK to sign requests.

          Help > Koo Command Line Interface > User Guide > Obtaining Authentication Information
        • Do I Need to Configure a Certificate for the Origin Server After Adding a Security Certificate to CDN? - Content Delivery Network

          Do I Need to Configure a Certificate for the Origin Server After Adding a Security Certificate to CDN? - Content Delivery Network

          If you want to encrypt transmission from CDN to your origin server, configure a security certificate on the origin server for full-link HTTPS.

          Help > Content Delivery Network > FAQs > Domain Name Settings
        • Creating a Secret Version - Data Encryption Workshop

          Creating a Secret Version - Data Encryption Workshop

          Creating a Secret Version Function Creates a new secret version in the specified secret to encrypt and keep the new secret value. By default, The latest secret version in SYSCURRENT state. The previous version is in the SYSPREVIOUS state.

          Help > Data Encryption Workshop > API Reference > APIs > Secret Management APIs > Secret version management
        • How Can Secure Data Transmission Be Ensured When I Access an RDS for SQL Server Instance Through an EIP? - Relational Database Service-RDS for SQL Server

          How Can Secure Data Transmission Be Ensured When I Access an RDS for SQL Server Instance Through an EIP? - Relational Database Service-RDS for SQL Server

          To prevent any potential data breaches, you are advised to use SSL to encrypt data transmitted on the Internet. You can also use Direct Connect or VPN to encrypt data transmission. Parent Topic: Network Security

          Help > FAQs > Network Security
        • Data Protection - Scalable File Service

          Data Protection - Scalable File Service

          Data Protection Encryption SFS supports server-side encryption, which allows you to encrypt the data stored in SFS file systems. When data is accessed, SFS automatically decrypts the data and then returns it to you. To use the encryption function, see File System Encryption.

          Help > Scalable File Service > Service Overview > Security
        • How Can Data Security Be Ensured During Transmission When I Access an RDS Instance Through an EIP? - Relational Database Service

          How Can Data Security Be Ensured During Transmission When I Access an RDS Instance Through an EIP? - Relational Database Service

          To prevent any potential data breaches, you are advised to use SSL to encrypt data transmitted on the Internet. For details, see Configuring an SSL Connection. You can also use Direct Connect or VPN to encrypt data transmission. Parent topic: Network Security

          Help > Relational Database Service > FAQs > Network Security
        Total results: 1668
        • Previous
        • 1
        • ...
        • 4
        • 5
        • 6
        • ...
        • 84
        • Next
        • Go
        Load More
        Was this helpful?
        Feedbacks
        /200
        Submit Feedback Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement