检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Feature Description Phase Document 1 API usage examples Examples of using APIs to encrypt and decrypt data, encrypt and decrypt DEKs, and query key information -- Example 1: Encrypting or Decrypting Data Example 2: Encrypting or Decrypting a DEK Example 3: Querying Information About
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
After that, a symmetric key is generated and is used to encrypt the password and data.
Kafka: Set Authentication Mode to SSL and SASL to SCRAM-SHA-512 or SCRAM-SHA-256 to encrypt data transmission and prevent data leakage and tampering. For details about the configuration, see Kafka.
Encrypt sensitive information with encryption component before data transmission. App authentication key is an access credential for real-time services. You must keep the app key properly. Parent topic: Security
For security purposes, encrypt your AK and SK before storing them in the configuration file or environment variables. In this example, the AK and SK are stored in environment variables.
To use SSE-C to encrypt the object you are uploading, you must have the upload permission (obs:object:PutObject in IAM or PutObject in a bucket policy).
Customer master key (CMK): You can select a created key to encrypt the function code. For details about how to create a customer master key, see Creating a Custom Key.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. In this example, the AK and SK are stored in environment variables for identity authentication.
Disk Encryption EVS enables you to encrypt data on newly created disks as required. It uses the industry-standard XTS-AES-256 cryptographic algorithm and keys to encrypt EVS disks.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.
To secure your DCS Redis instances, consider taking the following advice: Network connection configurations Encrypt sensitive data and disable public access. Sensitive data must be encrypted before being stored. Do not use public access unless otherwise required.
An AK is used together with an SK to encrypt and sign a request. For details, see OBS API Reference. SK: a secret access key used together with its AK to verify a request sender and prevent the request from being tampered with. An AK can also identify an IAM user.
Data Transmission Encryption To secure data replication, DRS allows you to encrypt data transmission over a public network, VPN, Direct Connect, or VPC. Permanent Data Deletion When a DRS instance is deleted, the computing and storage resources of the instance are reclaimed.
For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables. In this example, the AK/SK are stored in environment variables for identity authentication.