检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
          • All
          • Products
          • Solutions
          • Documentation
          • KooGallery
          • Developer
          • Learn
          • More
          2852 results found
          • Updates the auxiliary authentication policy configuration - Workspace

            Updates the auxiliary authentication policy configuration - Workspace

            Status code: 400 Table 6 Response body parameters Parameter Type Description error_code String Error code. error_msg String Error description. encoded_authorization_message String Encrypted detailed reason for rejection.

            Help > Workspace > API Reference > Workspace APIs > Tenant Configuration
          • Features - Image Management Service

            Features - Image Management Service

            Exporting an Image Encrypting images You can create encrypted images to improve data security. KMS envelope encryption is used. Encrypted images can be created from external image files or encrypted ECSs.

            Help > Image Management Service > Service Overview
          • Querying Users - Workspace

            Querying Users - Workspace

            Status code: 400 Table 6 Response body parameters Parameter Type Description error_code String Error code. error_msg String Error message. encoded_authorization_message String Encrypted detailed reason for rejection.

            Help > Workspace > API Reference > Workspace APIs > User
          • Querying Subtasks - Workspace

            Querying Subtasks - Workspace

            Status code: 400 Table 7 Response body parameters Parameter Type Description error_code String Error code. error_msg String Error message. encoded_authorization_message String Encrypted detailed reason for rejection.

            Help > Workspace > API Reference > Workspace APIs > Task
          • Notes and Constraints - Image Management Service

            Notes and Constraints - Image Management Service

            Table 6 Constraints on other image operations Operation Item Constraint Encrypting an image Creating an encrypted image from an encrypted ECS or an external image file An image encrypted using the default key cannot be shared with other tenants.

            Help > Image Management Service > Service Overview
          • Configuring Flink Authentication and Encryption - MapReduce Service

            Configuring Flink Authentication and Encryption - MapReduce Service

            Encrypted Transmission Flink supports three encrypted transmission modes: Encrypted transmission inside Yarn: It is used between the Flink Yarn client and Yarn ResourceManager, as well as Yarn ResourceManager and JobManager.

            Help > MapReduce Service > Component Operation Guide (LTS) > Using Flink > Flink User Permission Management
          • ALTER COLUMN ENCRYPTION KEY - GaussDB

            ALTER COLUMN ENCRYPTION KEY - GaussDB

            The encrypted CMKs are different from those specified before RR encryption. SM algorithm constraints: SM2, SM3, and SM4 are Chinese national cryptography standards. To avoid legal risks, these algorithms must be used together.

            Help > GaussDB > Developer Guide(Distributed_V2.0-8.x) > SQL Reference > SQL Syntax > A
          • ALTER COLUMN ENCRYPTION KEY - GaussDB

            ALTER COLUMN ENCRYPTION KEY - GaussDB

            The encrypted CMKs are different from those specified before RR encryption. The constraints of using SM cryptographic algorithms are as follows: SM2, SM3, and SM4 are Chinese cryptographic algorithms. To avoid legal risks, these algorithms must be used together.

            Help > GaussDB > Developer Guide(Centralized_V2.0-8.x) > SQL Reference > SQL Syntax > A
          • Data Protection - Image Management Service

            Data Protection - Image Management Service

            Image encryption You can create encrypted images to ensure data security. Parent topic: Security

            Help > Image Management Service > Service Overview > Security
          • ALTER COLUMN ENCRYPTION KEY - GaussDB

            ALTER COLUMN ENCRYPTION KEY - GaussDB

            The encrypted CMKs are different from those specified before RR encryption. The constraints of using SM cryptographic algorithms are as follows: SM2, SM3, and SM4 are SM cryptographic algorithms. To avoid legal risks, these algorithms must be used together.

            Help > GaussDB > Developer Guide(Distributed_V2.0-3.x) > SQL Reference > SQL Syntax
          • Key Rotation Has Been Enabled - Config

            Key Rotation Has Been Enabled - Config

            The purposes of key rotation are: Reducing the amount of data encrypted by each key. The security of a key is inversely proportional to the amount of data encrypted by the key.

            Help > Config > User Guide > Resource Compliance > Built-In Policies > Data Encryption Workshop
          • Introduction to Data Security (To Be Removed) - DataArts Studio

            Introduction to Data Security (To Be Removed) - DataArts Studio

            Sensitive data identification, classification, privacy protection, resource permission control, encrypted data transmission, encrypted storage, data risk identification, and compliance audit help users establish a security warning mechanism and enhance the overall security protection

            Help > DataArts Studio > User Guide > DataArts Catalog > Configuring Data Security Policies (To Be Removed)
          • Glossary - Virtual Private Cloud

            Glossary - Virtual Private Cloud

            F-J F-J IPsec VPN IPsec VPN is an encrypted tunneling technology that uses encrypted security services to establish confidential and secure communication tunnels between different networks. K-O K-O NetWork ACL A firewall consists of one or more access control lists (ACLs).

            Help > Virtual Private Cloud > Glossary
          • Glossary - Virtual Private Cloud

            Glossary - Virtual Private Cloud

            F-J F-J IPsec VPN IPsec VPN is an encrypted tunneling technology that uses encrypted security services to establish confidential and secure communication tunnels between different networks. K-O K-O NetWork ACL A firewall consists of one or more access control lists (ACLs).

            Help > Virtual Private Cloud > Glossary
          • Functions - Data Encryption Workshop

            Functions - Data Encryption Workshop

            mode and verifying signature Random data generation in encrypted mode Supported Cryptography Algorithms You can use international common cryptographic algorithms to meet various user requirements.

            Help > Data Encryption Workshop > Service Overview > Dedicated HSM
          • Configures the switch for binding a terminal to a desktop - Workspace

            Configures the switch for binding a terminal to a desktop - Workspace

            Status code: 400 Table 4 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection

            Help > Workspace > API Reference > Workspace APIs > Binds a terminal to a desktop
          • Queries the configuration of the switch for binding a terminal to a desktop - Workspace

            Queries the configuration of the switch for binding a terminal to a desktop - Workspace

            Status code: 400 Table 4 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection

            Help > Workspace > API Reference > Workspace APIs > Binds a terminal to a desktop
          • Adding a System-defined Identity Policy - IAM Identity Center

            Adding a System-defined Identity Policy - IAM Identity Center

            Status code: 403 Table 5 Parameters in the response body Parameter Type Description error_code String Error code. error_msg String Error message. request_id String Unique ID of a request. encoded_authorization_message String Encrypted error message.

            Help > IAM Identity Center > API Reference > API > Permission Set Management
          • Creating a Desktop Name Policy - Workspace

            Creating a Desktop Name Policy - Workspace

            Status code: 400 Table 5 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection

            Help > Workspace > API Reference > Workspace APIs > Desktop Name Policy
          • Querying Ports - Workspace

            Querying Ports - Workspace

            Status code: 401 Table 7 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection

            Help > Workspace > API Reference > Workspace APIs > Network
          Total results: 2852
          • Previous
          • 1
          • ...
          • 25
          • 26
          • 27
          • ...
          • 143
          • Next
          • Go
          Load More
          Was this helpful?
          Feedback
          /200
          Submit Cancel
          Contact Sales After-Sales Self Service
          • Site Terms
          • Privacy Statement

          Explore Huawei Cloud

          Why Us Customer Stories Trust Center Legal Press Releases

          Featured Services

          Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

          Service and Support

          Documentation Contact Us Public Notices Support Plans Service Health Dashboard

          Account and Payment

          Top Up Invoices Billing Center My Account Payment Method

          Quick Links

          Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

          © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

          • Site Terms
          • Privacy Statement