检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
You are advised to use HTTPS to encrypt data to prevent man-in-the-middle attacks and prevent sensitive data from being stolen. Exercise caution when granting access permissions to anonymous users.
You can encrypt bucket inventory files in SSE-KMS mode. You can set the frequency (daily or weekly) for generating bucket inventory files. You can also specify a bucket to store the generated bucket inventory files.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
The following table lists headers that are required when you use SSE-C to encrypt objects.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
SseC: 'AES256', SseCKey: 'your sse-c key generated by AES-256 algorithm' }; // Upload and encrypt the object.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. In this example, the AK and SK are stored in environment variables for identity authentication.
Definition: The MD5 value of the key used to encrypt a target object. The MD5 value is used to check whether any error occurs during the transmission of the key.
Value range: AES256, indicating AES is used to encrypt the object in SSE-C. For details, see Table 4. Default value: None sseAlgorithm SSEAlgorithmEnum No Explanation: Encryption algorithm. Restrictions: Only AES256 is supported. Value range: See Table 5.
If a custom key in a non-default IAM project is used to encrypt objects, only the key owner can upload or download the encrypted objects.
This configuration is later used to encrypt newly uploaded objects. Obtaining Bucket Encryption Configuration Queries the server-side encryption configuration of a bucket.
Server-side encryption: You can use server-side encryption to encrypt data uploaded to OBS buckets. WORM: You can configure WORM for your bucket to prevent objects in the bucket from being deleted or tampered with within a specified period.
Server-side encryption: You can use server-side encryption to encrypt data uploaded to OBS buckets. WORM: You can configure WORM for your bucket to prevent objects in the bucket from being deleted or tampered with within a specified period.
Server-side encryption: You can use server-side encryption to encrypt data uploaded to OBS buckets. WORM: You can configure WORM for your bucket to prevent objects in the bucket from being deleted or tampered with within a specified period.