检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
To prevent any potential data breaches, you are advised to use SSL to encrypt data transmitted on the Internet. For details, see Configuring an SSL Connection. You can also use Direct Connect or VPN to encrypt data transmission. Parent Topic: Network Security
Connecting to the Database (Using SSL) When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.
Connecting to a Database in SSL Mode When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.
Connecting to a Database in SSL Mode When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.
Connecting to a Database in SSL Mode When establishing connections to the GaussDB server using JDBC, you can enable SSL connections to encrypt client and server communications for security of sensitive data transmission on the Internet.
If you use a custom key to encrypt disks and this custom key is then disabled or scheduled for deletion, data cannot be read from or written to these disks or may never be restored. See Table 1 for more information.
Using the MySQL Client to Connect to a Doris Security Cluster You can enable HTTPS to encrypt data transmission. This section describes how to enable HTTPS for a Doris cluster. Constraints Enabling security channel may cause cluster performance deterioration.
You can create a new version of a secret to encrypt and keep a new secret value. By default, The latest secret version in SYSCURRENT state. The previous version is in the SYSPREVIOUS state.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
File System Encryption SFS enables you to encrypt data on the new file systems as required. Keys for encrypting file systems are provided by Key Management Service (KMS), which is secure and convenient. You do not need to establish and maintain key management infrastructure.
Connecting to a Database in SM-based TLS Mode When connecting to the GaussDB server through JDBC, you can enable SM-based TLS to encrypt the communication between the client and server. This mode provides a highly secure channel for sensitive data transmission on the Internet.
Encrypting an OBS Volume You can use server-side encryption to encrypt data uploaded to OBS, enhancing storage security and compliance. The OBS server encrypts objects before storing them and decrypts them when accessed, returning the decrypted data to the client.
Connecting to an RDS for PostgreSQL Instance Through JDBC Although the SSL certificate is optional if you choose to connect to a database through Java database connectivity (JDBC), download an SSL certificate to encrypt the connections for security.
Connecting to an RDS for PostgreSQL Instance Through JDBC Although the SSL certificate is optional if you choose to connect to a database through Java database connectivity (JDBC), download an SSL certificate to encrypt the connections for security.
The value can contain up to 128 characters. type Yes String Configuration file format. yaml properties sensitive Yes Boolean Whether to encrypt the configuration file. true: Encrypt. false: Not encrypt. config_encryption No Object Set the encryption key in the configuration file.
You can create custom keys on KMS to encrypt your objects. If you do not specify a key, OBS creates a default key the first time you upload an object to the bucket. Custom keys or default keys are used to encrypt and decrypt data encryption keys (DEKs).
For symmetric keys, the same key is used to encrypt and decrypt data, which is fast and efficient, suitable for encrypting a large amount of data. For asymmetric keys, a key pair, that is, a public key and a private key, are used for encryption and decryption.