检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • More
        1662 results found
        • Disk Encryption - Dedicated Distributed Storage Service

          Disk Encryption - Dedicated Distributed Storage Service

          If you use a custom key to encrypt disks and this custom key is then disabled or scheduled for deletion, data cannot be read from or written to these disks or may never be restored. See Table 1 for more information.

          Help > Dedicated Distributed Storage Service > Service Overview
        • Managing Secret Versions - Data Encryption Workshop

          Managing Secret Versions - Data Encryption Workshop

          You can create a new version of a secret to encrypt and keep a new secret value. By default, The latest secret version in SYSCURRENT state. The previous version is in the SYSPREVIOUS state.

          Help > Data Encryption Workshop > User Guide > Cloud Secret Management Service > Managing Secrets
        • Encrypting Data - Data Encryption Workshop

          Encrypting Data - Data Encryption Workshop

          Java Python Go More Encrypt the plaintext hello world using the CMK whose ID is 0d0466b0-e727-4d9c-b35d-f84bb474a37f and add 123aad as the associated data.

          Help > Data Encryption Workshop > API Reference > APIs > Key Management APIs > Small-Size Data Encryption and Decryption
        • Enabling Disk Encryption for MRS Cluster Nodes - MapReduce Service

          Enabling Disk Encryption for MRS Cluster Nodes - MapReduce Service

          Enabling Disk Encryption for MRS Cluster Nodes When creating an MRS cluster, you can choose whether to encrypt the system and data disks attached to the MRS cluster nodes.

          Help > MapReduce Service > User Guide > Managing Clusters > Managing MRS Cluster Nodes
        • Connecting to a Database in SM-based TLS Mode - GaussDB

          Connecting to a Database in SM-based TLS Mode - GaussDB

          Connecting to a Database in SM-based TLS Mode When connecting to the GaussDB server through JDBC, you can enable SM-based TLS to encrypt the communication between the client and server. This mode provides a highly secure channel for sensitive data transmission on the Internet.

          Help > GaussDB > Developer Guide(Distributed_V2.0-8.x) > Application Development Guide > Development Based on JDBC > Development Process > Connecting to a Database
        • Encryption and Decryption During File Migration - Cloud Data Migration

          Encryption and Decryption During File Migration - Cloud Data Migration

          Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.

          Help > Cloud Data Migration > Best Practices > Advanced Data Migration Guidance
        • Encryption and Decryption During File Migration - Cloud Data Migration

          Encryption and Decryption During File Migration - Cloud Data Migration

          Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.

          Help > Cloud Data Migration > User Guide > Key Operation Guide
        • Encryption and Decryption During File Migration - DataArts Studio

          Encryption and Decryption During File Migration - DataArts Studio

          Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.

          Help > DataArts Studio > Best Practices > Advanced CDM Practices
        • Encryption and Decryption During File Migration - DataArts Studio

          Encryption and Decryption During File Migration - DataArts Studio

          Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.

          Help > DataArts Studio > User Guide > DataArts Migration (CDM Jobs) > Key Operation Guide
        • File System Encryption - Scalable File Service

          File System Encryption - Scalable File Service

          File System Encryption SFS enables you to encrypt data on the new file systems as required. Keys for encrypting file systems are provided by Key Management Service (KMS), which is secure and convenient. You do not need to establish and maintain key management infrastructure.

          Help > Scalable File Service > Service Overview
        • Encrypting an OBS Volume - Cloud Container Engine

          Encrypting an OBS Volume - Cloud Container Engine

          Encrypting an OBS Volume You can use server-side encryption to encrypt data uploaded to OBS, enhancing storage security and compliance. The OBS server encrypts objects before storing them and decrypts them when accessed, returning the decrypted data to the client.

          Help > Cloud Container Engine > User Guide > Storage > OBS
        • Connecting to an RDS for PostgreSQL Instance Through JDBC - Relational Database Service-RDS for PostgreSQL

          Connecting to an RDS for PostgreSQL Instance Through JDBC - Relational Database Service-RDS for PostgreSQL

          Connecting to an RDS for PostgreSQL Instance Through JDBC Although the SSL certificate is optional if you choose to connect to a database through Java database connectivity (JDBC), download an SSL certificate to encrypt the connections for security.

          Help > User Guide > Instance Connection
        • Creating a Configuration File - ServiceStage

          Creating a Configuration File - ServiceStage

          The value can contain up to 128 characters. type Yes String Configuration file format. yaml properties sensitive Yes Boolean Whether to encrypt the configuration file. true: Encrypt. false: Not encrypt. config_encryption No Object Set the encryption key in the configuration file.

          Help > ServiceStage > API Reference > Application Management V3 APIs > Configuration Management
        • Creating a Key for Cloud Service Encryption - Data Encryption Workshop

          Creating a Key for Cloud Service Encryption - Data Encryption Workshop

          For symmetric keys, the same key is used to encrypt and decrypt data, which is fast and efficient, suitable for encrypting a large amount of data. For asymmetric keys, a key pair, that is, a public key and a private key, are used for encryption and decryption.

          Help > Data Encryption Workshop > Getting Started
        • SSE-KMS - Object Storage Service

          SSE-KMS - Object Storage Service

          You can create custom keys on KMS to encrypt your objects. If you do not specify a key, OBS creates a default key the first time you upload an object to the bucket. Custom keys or default keys are used to encrypt and decrypt data encryption keys (DEKs).

          Help > Object Storage Service > API Reference > APIs > Server-Side Encryption
        • Creating a Key - Data Encryption Workshop

          Creating a Key - Data Encryption Workshop

          It can be used to encrypt a small amount of data or DEKs. An asymmetric key is a RSA key or an ECC key pair (including SM2 key pair). It can be used for data encryption and decryption, digital signature, and signature verification.

          Help > Data Encryption Workshop > API Reference > APIs > Key Management APIs > Key Lifecycle Management
        • Advantages - Data Encryption Workshop

          Advantages - Data Encryption Workshop

          Advantages Extensive Service Integration By integrating with OBS, EVS, and IMS, you can use KMS to manage the keys of the services or use KMS APIs to encrypt and decrypt local data.

          Help > Data Encryption Workshop > Service Overview > KMS
        • Data Protection - Scalable File Service Turbo

          Data Protection - Scalable File Service Turbo

          Data Protection Encryption SFS Turbo supports server-side encryption, which allows you to encrypt the data stored in SFS Turbo file systems. When data is accessed, SFS Turbo automatically decrypts the data and returns it to you.

          Help > Scalable File Service Turbo > Service Overview > Security
        • File System Encryption - Scalable File Service Turbo

          File System Encryption - Scalable File Service Turbo

          File System Encryption You can encrypt data on the newly created SFS Turbo file systems if needed. Keys used by encrypted file systems are provided by the Key Management Service (KMS), which is secure and convenient.

          Help > Scalable File Service Turbo > Service Overview
        • Connecting to a Database in SM-based TLS Mode - GaussDB

          Connecting to a Database in SM-based TLS Mode - GaussDB

          Connecting to a Database in SM-based TLS Mode When connecting to a GaussDB server through JDBC, you can enable SM-based TLS to encrypt communication between a client and a server. This mode provides a highly secure channel for sensitive data transmission on the Internet.

          Help > GaussDB > Developer Guide(Centralized_V2.0-8.x) > Application Development Guide > Development Based on JDBC > Development Procedure > Connecting to a Database
        Total results: 1662
        • Previous
        • 1
        • ...
        • 5
        • 6
        • 7
        • ...
        • 84
        • Next
        • Go
        Load More
        Was this helpful?
        Feedback
        /200
        Submit Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement