检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Status code: 400 Table 6 Response body parameters Parameter Type Description error_code String Error code. error_msg String Error description. encoded_authorization_message String Encrypted detailed reason for rejection.
Exporting an Image Encrypting images You can create encrypted images to improve data security. KMS envelope encryption is used. Encrypted images can be created from external image files or encrypted ECSs.
Status code: 400 Table 6 Response body parameters Parameter Type Description error_code String Error code. error_msg String Error message. encoded_authorization_message String Encrypted detailed reason for rejection.
Status code: 400 Table 7 Response body parameters Parameter Type Description error_code String Error code. error_msg String Error message. encoded_authorization_message String Encrypted detailed reason for rejection.
Table 6 Constraints on other image operations Operation Item Constraint Encrypting an image Creating an encrypted image from an encrypted ECS or an external image file An image encrypted using the default key cannot be shared with other tenants.
Encrypted Transmission Flink supports three encrypted transmission modes: Encrypted transmission inside Yarn: It is used between the Flink Yarn client and Yarn ResourceManager, as well as Yarn ResourceManager and JobManager.
The encrypted CMKs are different from those specified before RR encryption. SM algorithm constraints: SM2, SM3, and SM4 are Chinese national cryptography standards. To avoid legal risks, these algorithms must be used together.
The encrypted CMKs are different from those specified before RR encryption. The constraints of using SM cryptographic algorithms are as follows: SM2, SM3, and SM4 are Chinese cryptographic algorithms. To avoid legal risks, these algorithms must be used together.
Image encryption You can create encrypted images to ensure data security. Parent topic: Security
The encrypted CMKs are different from those specified before RR encryption. The constraints of using SM cryptographic algorithms are as follows: SM2, SM3, and SM4 are SM cryptographic algorithms. To avoid legal risks, these algorithms must be used together.
The purposes of key rotation are: Reducing the amount of data encrypted by each key. The security of a key is inversely proportional to the amount of data encrypted by the key.
Sensitive data identification, classification, privacy protection, resource permission control, encrypted data transmission, encrypted storage, data risk identification, and compliance audit help users establish a security warning mechanism and enhance the overall security protection
F-J F-J IPsec VPN IPsec VPN is an encrypted tunneling technology that uses encrypted security services to establish confidential and secure communication tunnels between different networks. K-O K-O NetWork ACL A firewall consists of one or more access control lists (ACLs).
F-J F-J IPsec VPN IPsec VPN is an encrypted tunneling technology that uses encrypted security services to establish confidential and secure communication tunnels between different networks. K-O K-O NetWork ACL A firewall consists of one or more access control lists (ACLs).
mode and verifying signature Random data generation in encrypted mode Supported Cryptography Algorithms You can use international common cryptographic algorithms to meet various user requirements.
Status code: 400 Table 4 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection
Status code: 400 Table 4 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection
Status code: 403 Table 5 Parameters in the response body Parameter Type Description error_code String Error code. error_msg String Error message. request_id String Unique ID of a request. encoded_authorization_message String Encrypted error message.
Status code: 400 Table 5 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection
Status code: 401 Table 7 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection