检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
          • All
          • Products
          • Solutions
          • Documentation
          • KooGallery
          • Developer
          • Learn
          • More
          2839 results found
          • Authentication - Intelligent EdgeFabric

            Authentication - Intelligent EdgeFabric

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Intelligent EdgeFabric > API Reference > Calling APIs
          • Authentication - Auto Scaling

            Authentication - Auto Scaling

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Auto Scaling > API Reference > Calling APIs
          • Authentication - Live

            Authentication - Live

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Live > Cloud Live API Reference > Calling APIs
          • Authentication - Domain Name Service

            Authentication - Domain Name Service

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Domain Name Service > API Reference > Calling APIs
          • Authentication - Cloud Search Service

            Authentication - Cloud Search Service

            Authentication You can use either of the following authentication methods when calling APIs: AK/SK-based authentication: Requests are encrypted using AK/SK pairs. Token authentication: Requests are authenticated using a token.

            Help > Cloud Search Service > API Reference > Calling APIs
          • Authentication - Distributed Message Service for Kafka

            Authentication - Distributed Message Service for Kafka

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK-based authentication is recommended because it is more secure than token-based authentication.

            Help > Distributed Message Service for Kafka > API Reference > Calling APIs
          • Authentication - MetaStudio

            Authentication - MetaStudio

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > MetaStudio > API Reference > Calling APIs
          • Authentication - SparkRTC

            Authentication - SparkRTC

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > SparkRTC > API Reference > Calling APIs
          • Authentication - Live

            Authentication - Live

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Live > Media Live API Reference > Calling APIs
          • Authentication - Direct Connect

            Authentication - Direct Connect

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Direct Connect > API Reference > Calling APIs
          • Authentication - Cloud Connect

            Authentication - Cloud Connect

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Cloud Connect > API Reference > Calling APIs
          • Authentication - Image Management Service

            Authentication - Image Management Service

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > Image Management Service > API Reference > Calling APIs
          • Authentication - VPC Endpoint

            Authentication - VPC Endpoint

            Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

            Help > VPC Endpoint > API Reference > Calling APIs
          • Authentication - Organizations

            Authentication - Organizations

            Specifically, requests are encrypted using the access key ID (AK) and secret access key (SK) to provide higher security. AK/SK-based Authentication AK/SK-based authentication supports API requests with a body not larger than 12 MB.

            Help > Organizations > API Reference > Calling APIs
          • Authentication - Resource Access Manager

            Authentication - Resource Access Manager

            Specifically, requests are encrypted using the access key ID (AK) and secret access key (SK) to provide higher security. AK/SK-based Authentication AK/SK-based authentication supports API requests with a body not larger than 12 MB.

            Help > Resource Access Manager > API Reference > Calling APIs
          • Importing Log Files from OBS to LTS (Beta) - Log Tank Service

            Importing Log Files from OBS to LTS (Beta) - Log Tank Service

            Files in encrypted buckets cannot be imported to LTS. To import such files, delete the buckets' encryption configuration first. For details, see Deleting the Encryption Configuration of a Bucket.

            Help > Log Tank Service > User Guide > Log Ingestion > Ingesting Cloud Service Logs to LTS
          • Authentication - IAM Identity Center

            Authentication - IAM Identity Center

            Specifically, requests are encrypted using the access key (AK) or secret access key (SK) to provide higher security. AK/SK Authentication AK/SK-based authentication supports API requests with a body not greater than 12 MB.

            Help > IAM Identity Center > API Reference > Calling APIs
          • Authentication - Resource Governance Center

            Authentication - Resource Governance Center

            Specifically, requests are encrypted using the access key ID (AK) and secret access key (SK) to provide higher security. AK/SK-based Authentication AK/SK-based authentication supports API requests with a body not larger than 12 MB.

            Help > Resource Governance Center > API Reference > Calling APIs
          • Calculating an SHA256 Value - Server Migration Service

            Calculating an SHA256 Value - Server Migration Service

            The values of the encrypted fields must be in the UUID format. Calling Method For details, see Calling APIs. URI GET /v3/sha256/{key} Table 1 Path parameter Parameter Mandatory Type Description key Yes String The keyword.

            Help > Server Migration Service > API Reference > APIs V3.0 > Historical APIs
          • Using Global Accelerator for S2C VPN Acceleration - Global Accelerator

            Using Global Accelerator for S2C VPN Acceleration - Global Accelerator

            Using Global Accelerator for S2C VPN Acceleration Overview Application: Site-to-Cloud VPN (S2C VPN) establishes secure, reliable, and cost-effective encrypted connections between local networks, data centers, and cloud networks based on the IPsec protocol.

            Help > Global Accelerator > Best Practices
          Total results: 2839
          • Previous
          • 1
          • ...
          • 11
          • 12
          • 13
          • ...
          • 142
          • Next
          • Go
          Load More
          Was this helpful?
          Feedback
          /200
          Submit Cancel
          Contact Sales After-Sales Self Service
          • Site Terms
          • Privacy Statement

          Explore Huawei Cloud

          Why Us Customer Stories Trust Center Legal Press Releases

          Featured Services

          Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

          Service and Support

          Documentation Contact Us Public Notices Support Plans Service Health Dashboard

          Account and Payment

          Top Up Invoices Billing Center My Account Payment Method

          Quick Links

          Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

          © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

          • Site Terms
          • Privacy Statement