检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
          • All
          • Products
          • Solutions
          • Documentation
          • KooGallery
          • Developer
          • Learn
          • More
          2840 results found
          • Creating a Secret - Data Encryption Workshop

            Creating a Secret - Data Encryption Workshop

            Secret values are encrypted and stored in secret versions. A version can have multiple statuses. Versions without any statuses are regarded as deprecated versions and can be automatically deleted by CSMS. The initial version is marked by the SYSCURRENT status tag.

            Help > Data Encryption Workshop > API Reference > APIs > Secret Management APIs > Lifecycle Management
          • What Is DEW? - Data Encryption Workshop

            What Is DEW? - Data Encryption Workshop

            Each enterprise has its core sensitive data, which needs to be encrypted and protected from breach. Data Encryption Workshop (DEW) is a cloud data encryption service.

            Help > Data Encryption Workshop > Service Overview
          • Security Functions - GaussDB

            Security Functions - GaussDB

            Security Functions Security Functions gs_encrypt_aes128(encryptstr,keystr) Description: Encrypts encryptstr strings using the key derived from keystr and returns encrypted strings.

            Help > GaussDB > Developer Guide(Distributed_V2.0-3.x) > SQL Reference > Functions and Operators
          • OBS Buckets Use Server-side Encryption with KMS-Managed Keys - Config

            OBS Buckets Use Server-side Encryption with KMS-Managed Keys - Config

            Application Scenarios You can enable SSE-KMS for an OBS bucket, so that each object uploaded to this bucket can be encrypted using the KMS key you specified before being stored in OBS.

            Help > Config > User Guide > Resource Compliance > Built-In Policies > Object Storage Service
          • Before You Start - Virtual Private Network

            Before You Start - Virtual Private Network

            Before You Start Overview A Virtual Private Network (VPN) establishes an encrypted, Internet-based communication tunnel between your network and a Virtual Private Cloud (VPC).

            Help > Virtual Private Network > API Reference
          • Product Advantages - Virtual Private Network

            Product Advantages - Virtual Private Network

            Product Advantages Enterprise Edition VPN has the following advantages: High security Data is encrypted using IKE/IPsec or SSL, ensuring high data security. A VPN gateway is exclusive to a tenant, isolating tenants from each other.

            Help > Virtual Private Network > Service Overview
          • Virtual Private Network(VPN) - Features

            Virtual Private Network(VPN) - Features

            Function Overview Virtual Private Network (VPN) Rest assured with secure, reliable, and cost-effective encrypted connections between your local network, data center, or terminals and a Huawei Cloud VPC.

            Product
          • Virtual Private Network(VPN)_Get Started

            Virtual Private Network(VPN)_Get Started

            VPN establishes secure, reliable, and cost-effective encrypted connections between your local network or data center and a virtual network on Huawei Cloud.

            Product
          • How Is WebSocket Used? - Elastic Load Balance

            How Is WebSocket Used? - Elastic Load Balance

            For HTTPS listeners, encrypted WebSocket (wss://) is supported by default. Parent topic: Listeners

            Help > Elastic Load Balance > FAQs > Listeners
          • Authentication - TaurusDB

            Authentication - TaurusDB

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK-based authentication: Requests are encrypted using an AK/SK. AK/SK-based authentication is recommended because it is more secure than token-based authentication.

            Help > TaurusDB > API Reference > Calling APIs
          • Authentication - Media Processing Center

            Authentication - Media Processing Center

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Media Processing Center > API Reference > Calling APIs
          • Authentication - Video On Demand

            Authentication - Video On Demand

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Video On Demand > API Reference > Calling APIs
          • Authentication - Dedicated Computing Cluster

            Authentication - Dedicated Computing Cluster

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Dedicated Computing Cluster > API Reference > Calling APIs
          • Authentication - Elastic Load Balance

            Authentication - Elastic Load Balance

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Elastic Load Balance > API Reference > Calling APIs
          • Authentication - Simple Message Notification

            Authentication - Simple Message Notification

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Simple Message Notification > API Reference > Calling APIs
          • Authentication - Cloud Container Instance (CCI)-Cloud Container Instance 1.0 (CCI 1.0)

            Authentication - Cloud Container Instance (CCI)-Cloud Container Instance 1.0 (CCI 1.0)

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Cloud Container Instance (CCI)-Cloud Container Instance 1.0 (CCI 1.0) > API Reference > Calling APIs
          • Authentication - Cloud Data Center

            Authentication - Cloud Data Center

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Cloud Data Center > API Reference > Calling APIs
          • Authentication - Object Storage Migration Service

            Authentication - Object Storage Migration Service

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Object Storage Migration Service > API Reference > Calling APIs
          • Authentication - SparkRTC

            Authentication - SparkRTC

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > SparkRTC > API Reference > Calling APIs
          • Authentication - MetaStudio

            Authentication - MetaStudio

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > MetaStudio > API Reference > Calling APIs
          Total results: 2840
          • Previous
          • 1
          • ...
          • 10
          • 11
          • 12
          • ...
          • 142
          • Next
          • Go
          Load More
          Was this helpful?
          Feedback
          /200
          Submit Cancel
          Contact Sales After-Sales Self Service
          • Site Terms
          • Privacy Statement

          Explore Huawei Cloud

          Why Us Customer Stories Trust Center Legal Press Releases

          Featured Services

          Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

          Service and Support

          Documentation Contact Us Public Notices Support Plans Service Health Dashboard

          Account and Payment

          Top Up Invoices Billing Center My Account Payment Method

          Quick Links

          Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

          © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

          • Site Terms
          • Privacy Statement