检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Server-side encryption: You can use server-side encryption to encrypt data uploaded to OBS buckets. WORM: You can configure WORM for your bucket to prevent objects in the bucket from being deleted or tampered with within a specified period.
Server-side encryption: You can use server-side encryption to encrypt data uploaded to OBS buckets. WORM: You can configure WORM for your bucket to prevent objects in the bucket from being deleted or tampered with within a specified period.
The value is obtained from the request signature result and is required when the AK and SK are used to encrypt the signature. Type: string Default value: none This parameter is mandatory for AK/SK-based authentication.
PSK Used to encrypt the transmission channel between the platform and NB-IoT devices or devices integrated with the SDK.
To ensure security, encrypt your passwords, store them in configuration files or environment variables, and decrypt them when needed. Code implementation Import dependencies.
NOTE: This feature is supported in 8.1.2 or later. encrypt Specifies whether data is encrypted. This parameter is available only when type is OBS. The default value is off.
Compatibility Check Item Function Status Solution Data types or functions ENCODE() Encryption Deleted Replaced by AES_ENCRYPT() DECODE() Decryption Deleted Replaced by AES_DECRYPT() ENCRYPT() Encryption Deleted Replaced by SHA2() DES_ENCRYPT() Encryption Deleted Replaced by AES_ENCRYPT
For security, encrypt your AK and SK, store them in the configuration file or as environment variables, and decrypt them during usage.
Redirected to another listener Specifies the HTTPS listener to which HTTP requests are redirected to encrypt the communication and improve service security.
If Custom command is selected, exercise caution when inputting sensitive information in the echo, cat, or debug command, or encrypt sensitive information to avoid information leakage.
AES-256-GCM: The AES 256-bit encryption algorithm is used to encrypt data. Currently, only the AES-256-GCM (NoPadding) encryption algorithm is supported. This parameter is used for encryption at the migration destination and decryption at the migration source.
Skip Advanced attributes Encryption Whether to encrypt the uploaded data and the encryption mode. The options are as follows: None: Data is written without encryption. KMS: KMS in Data Encryption Workshop (DEW) is used for encryption.
KMS Key Yes KMS key used to encrypt and decrypt data source authentication information. Select a default or custom key. NOTE: When you use KMS for encryption through DataArts Studio or KPS for the first time, the default key dlf/default or kps/default is automatically generated.
NONE Encryption Whether to encrypt the uploaded data and the encryption mode. The options are as follows: NONE: Data is written without encryption. KMS: KMS in Data Encryption Workshop (DEW) is used for encryption.
In the YAML file, use Kubernetes Secret to manage and encrypt passwords. When starting PostgreSQL Exporter, the secret key can be directly used but the corresponding password needs to be changed as required.
So, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables. Before running this example, set environment variables HUAWEICLOUD_SDK_AK and HUAWEICLOUD_SDK_SK.
If you have sensitive data, please encrypt it before writing it to DCS. Data Restoration and Disaster Recovery Build restoration and disaster recovery (DR) capabilities in advance to prevent data from being deleted or damaged by mistake in abnormal data processing scenarios.
HTTPS Based on HTTP, HTTPS uses Secure Sockets Layer (SSL) to encrypt data transmission. With SSL, servers are authenticated using certificates, and communications between browsers and servers are encrypted.
Customer master key (CMK): You can select a created key to encrypt the function code. For details about how to create a customer master key, see Creating a Custom Key.
Secret Access Key Secret access key is used together with the access key ID to encrypt the request, identify the sender, and prevent the request from being tempered. Set this parameter to the value of SK in Prerequisites.