检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
When entering a parameter containing sensitive information (for example, login password), add an at sign (@) before the parameter name to encrypt the parameter value. This prevents the sensitive information from being persisted in plaintext.
It is used to encrypt the target object. Value range: See Table 6 or Table 7. Default value: None sourceSseHeader SseCHeader No Explanation: Header for server-side decryption. It is used to decrypt the source object. Value range: See Table 6.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. // In this example, the AK and SK are stored in environment variables for identity authentication.
__system__cmkid No String Specifies the ID of the key used to encrypt the image. You can obtain the ID from the IMS console or by calling the Querying Images API. protected No Boolean Specifies whether the image is protected. The value can be true or false.
You can use these tags to filter function logs in LTS. enable_lts_log Boolean Indicates whether to enable the log feature. user_data_encrypt_kms_key_id String ID of the KMS master key used to encrypt environment variables.
Value range: AES256 (AES256 encryption algorithm) Default value: None ssec_customer_key char * No Explanation: Indicates the key used to encrypt an object. Restrictions: The header is used only in SSE-C mode.
This compromises data security, and public access cannot be enabled. 2.3 Encrypt all non-console administrative access using strong cryptography. dws-enable-ssl Enable SSL for DWS clusters to protect data. 2.3 Encrypt all non-console administrative access using strong cryptography
If the image you selected is not encrypted, you can select Encryption to encrypt the system disk. Disk encryption provides strong security protection for your data.
NOTE: If both template_group_name and workflow_name are specified, template_group_name takes effect. auto_encrypt No Integer Whether to automatically encrypt a file Possible values are: 0: not encrypted 1: encrypted Default value: 0 A file must be encrypted and transcoded at the same
Encrypt the AK/SK in the configuration file or environment variables for storage; // In this example, the AK and SK stored in the environment variables are used for identity authentication.
MD5 MD5(str) You can hash the string str to encrypt data that does not require decryption. Table 4 Numeric functions Function Usage Description ABS ABS(x) Returns the absolute value of x. CEIL CEIL(x) Returns the smallest integer greater than or equal to x.
Its value can be: ENABLED DISABLED PENDING_DELETE FROZEN kms_key_id String ID of the KMS CMK used to encrypt a secret value. description String Description of a secret create_time Long Secret creation time.
Connecting to a DB Instance Through JDBC Although the SSL certificate is optional if you choose to connect to a database through Java database connectivity (JDBC), you are advised to download the SSL certificate to encrypt the connections for security purposes.
Encrypt the AK/SK in the configuration file or environment variables for storage; // In this example, the AK and SK stored in the environment variables are used for identity authentication.
When requesting the API, APIG uses the signature key to encrypt request parameter data and generate a signature. The backend service of the API verifies requests by using the signature. Unauthorized requests will be denied to protect the API against attacks from unknown sources.
The value cannot contain special characters such as ;|&><'$ CAUTION: When entering a parameter containing sensitive information (for example, login password), you can add an at sign (@) before the parameter name to encrypt the parameter value.
Supported Not supported Supported C# Not supported Supported Not supported Supported PHP Supported Supported Not supported Supported Custom runtime Supported Supported Not supported Supported If the code to be uploaded contains sensitive information (such as account passwords), encrypt
KMS Key Yes KMS key used to encrypt and decrypt data source authentication information. Select a default or custom key. NOTE: When you use KMS for encryption through DataArts Studio or KPS for the first time, the default key dlf/default or kps/default is automatically generated.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 CREATE FOREIGN TABLE ORDERS01 ( LIKE orders ) SERVER gsmpp_server OPTIONS ( ENCODING 'utf8', LOCATION 'obs://<obs_bucket_name>/tpch
For security, encrypt your appKey/appSecret and store them in the configuration file or environment variables.