检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • Others
        2524 results found.
        • Authentication - Cloud Container Instance (CCI)-Cloud Container Instance 1.0 (CCI 1.0)

          Authentication - Cloud Container Instance (CCI)-Cloud Container Instance 1.0 (CCI 1.0)

          Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

          Help > Cloud Container Instance (CCI)-Cloud Container Instance 1.0 (CCI 1.0) > API Reference > Calling APIs
        • Authentication - Simple Message Notification

          Authentication - Simple Message Notification

          Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication.

          Help > Simple Message Notification > API Reference > Calling APIs
        • Authentication - Organizations

          Authentication - Organizations

          Specifically, requests are encrypted using the access key ID (AK) and secret access key (SK) to provide higher security. AK/SK-based Authentication AK/SK-based authentication supports API requests with a body not larger than 12 MB.

          Help > Organizations > API Reference > Calling APIs
        • Authentication - Resource Access Manager

          Authentication - Resource Access Manager

          Specifically, requests are encrypted using the access key ID (AK) and secret access key (SK) to provide higher security. AK/SK-based Authentication AK/SK-based authentication supports API requests with a body not larger than 12 MB.

          Help > Resource Access Manager > API Reference > Calling APIs
        • Authentication - Distributed Message Service for Kafka

          Authentication - Distributed Message Service for Kafka

          Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK-based authentication is recommended because it is more secure than token-based authentication.

          Help > Distributed Message Service for Kafka > API Reference > Calling APIs
        • Authentication - Distributed Message Service for RabbitMQ

          Authentication - Distributed Message Service for RabbitMQ

          Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK-based authentication is recommended because it is more secure than token-based authentication.

          Help > Distributed Message Service for RabbitMQ > API Reference > Calling APIs
        • Authentication - Cloud Search Service

          Authentication - Cloud Search Service

          Authentication You can use either of the following authentication methods when calling APIs: AK/SK-based authentication: Requests are encrypted using AK/SK pairs. Token authentication: Requests are authenticated using a token.

          Help > Cloud Search Service > API Reference > Calling APIs
        • Authentication - Distributed Message Service for RocketMQ

          Authentication - Distributed Message Service for RocketMQ

          Authentication Requests for calling an API can be authenticated using either of the following methods: AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK-based authentication is recommended because it is more secure than token-based authentication.

          Help > Distributed Message Service for RocketMQ > API Reference > Calling APIs
        • Importing Log Files from OBS to LTS (Beta) - Log Tank Service

          Importing Log Files from OBS to LTS (Beta) - Log Tank Service

          Files in encrypted buckets cannot be imported to LTS. To import such files, delete the buckets' encryption configurations first. For details, see Deleting the Encryption Configuration of a Bucket.

          Help > Log Tank Service > User Guide > Log Ingestion > Ingesting Cloud Service Logs to LTS
        • Authentication - IAM Identity Center

          Authentication - IAM Identity Center

          Specifically, requests are encrypted using the access key (AK) or secret access key (SK) to provide higher security. AK/SK Authentication AK/SK-based authentication supports API requests with a body not greater than 12 MB.

          Help > IAM Identity Center > API Reference > Calling APIs
        • Authentication - Resource Governance Center

          Authentication - Resource Governance Center

          Specifically, requests are encrypted using the access key ID (AK) and secret access key (SK) to provide higher security. AK/SK-based Authentication AK/SK-based authentication supports API requests with a body not larger than 12 MB.

          Help > Resource Governance Center > API Reference > Calling APIs
        • Calculating an SHA256 Value - Server Migration Service

          Calculating an SHA256 Value - Server Migration Service

          The values of the encrypted fields must be in the UUID format. Calling Method For details, see Calling APIs. URI GET /v3/sha256/{key} Table 1 Path parameter Parameter Mandatory Type Description key Yes String The keyword.

          Help > Server Migration Service > API Reference > APIs V3.0 > Historical APIs
        • Using Global Accelerator for S2C VPN Acceleration - Global Accelerator

          Using Global Accelerator for S2C VPN Acceleration - Global Accelerator

          Using Global Accelerator for S2C VPN Acceleration Overview Application: Site-to-Cloud VPN (S2C VPN) establishes secure, reliable, and cost-effective encrypted connections between local networks, data centers, and cloud networks based on the IPsec protocol.

          Help > Global Accelerator > Best Practices
        • Authentication - ServiceStage

          Authentication - ServiceStage

          Requests are encrypted using an access key ID (AK)/secret access key (SK) pair. Token-based authentication: Requests are authenticated using a token. AK/SK-based Authentication AK/SK-based authentication supports API requests with a body not larger than 12 MB.

          Help > ServiceStage > API Reference > Calling APIs
        • Kernel Error Information - GaussDB

          Kernel Error Information - GaussDB

          Kernel Error Information ERRMSG: "unsupported syntax: ENCRYPTED WITH in this operation" SQLSTATE: 42601 CAUSE: "client encryption feature is not supported this operation." ACTION: "Check client encryption feature whether supported this operation."

          Help > GaussDB > Developer Guide(Centralized_V2.0-2.x) > Error Log Reference
        • Kernel Error Information - GaussDB

          Kernel Error Information - GaussDB

          Kernel Error Information ERRMSG: "unsupported syntax: ENCRYPTED WITH in this operation" SQLSTATE: 42601 CAUSE: "client encryption feature is not supported this operation." ACTION: "Check client encryption feature whether supported this operation."

          Help > GaussDB > Developer Guide(Distributed_V2.0-2.x)
        • Kernel Error Information - GaussDB

          Kernel Error Information - GaussDB

          Kernel Error Information ERRMSG: "unsupported syntax: ENCRYPTED WITH in this operation" SQLSTATE: 42601 CAUSE: "client encryption feature is not supported this operation." ACTION: "Check client encryption feature whether supported this operation."

          Help > GaussDB > Developer Guide(Centralized_V2.0-2.x)
        • Kernel Error Information - GaussDB

          Kernel Error Information - GaussDB

          Kernel Error Information ERRMSG: "unsupported syntax: ENCRYPTED WITH in this operation" SQLSTATE: 42601 CAUSE: "client encryption feature is not supported this operation." ACTION: "Check client encryption feature whether supported this operation."

          Help > GaussDB > Developer Guide(Distributed_V2.0-2.x) > Error Log Reference
        • Authentication - Distributed Cache Service

          Authentication - Distributed Cache Service

          Authentication Calling an API can be authenticated using either of the following methods: Authentication using AK/SK: Requests are encrypted using access key ID (AK)/secret access key (SK).

          Help > Distributed Cache Service > API Reference > Calling APIs
        • Progressive Knowledge - Virtual Private Network

          Progressive Knowledge - Virtual Private Network

          Virtual Private Network | Progressive Knowledge - HuaweiCloud Virtual Private Network Virtual Private Network (VPN) establishes a secure, encrypted communications tunnel between your local data center and your VPC on HUAWEI CLOUD.

          Help > Virtual Private Network > Progressive Knowledge
        Total results: 2524
        • Previous
        • 1
        • ...
        • 12
        • 13
        • 14
        • ...
        • 127
        • Next
        • Go
        Load More
        Was this helpful?
        Feedbacks
        /200
        Submit Feedback Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement