检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
          • All
          • Products
          • Solutions
          • Documentation
          • KooGallery
          • Developer
          • Learn
          • More
          2852 results found
          • MRS Security Hardening - MapReduce Service

            MRS Security Hardening - MapReduce Service

            Sensitive data can be encrypted and stored after you specify an encryption algorithm during table creation. Encrypted storage and access control of data are used to ensure user data security. HBase can compress service data before storing it to HDFS.

            Help > MapReduce Service > Service Overview > Functions
          • Editing a Configuration File - ServiceStage

            Editing a Configuration File - ServiceStage

            During component deployment, variables' actual values will be encrypted using a DEW key. Insert system variables ServiceStage provides variables related to environments, applications, and components, as shown in Table 1.

            Help > ServiceStage > User Guide > Configuration Management > Managing Configuration Files
          • Enabling Key Rotation - Data Encryption Workshop

            Enabling Key Rotation - Data Encryption Workshop

            The purposes of key rotation are: To reduce the amount of data encrypted by each key. A key will be insecure if it is used to encrypt a huge number of data. The amount of data encrypted a key refers to the total number of bytes or messages encrypted using the key.

            Help > Data Encryption Workshop > User Guide > Key Management Service > Managing Keys
          • Using the Encryption SDK to Encrypt and Decrypt Local Files - Data Encryption Workshop

            Using the Encryption SDK to Encrypt and Decrypt Local Files - Data Encryption Workshop

            Data is encrypted within the SDK by using the DEK generated by KMS. Segmented encryption of files in the memory ensures the security and correctness of file encryption, because it does not require file transfer over the network.

            Help > Data Encryption Workshop > Best Practices > Key Management Service
          • SEC05-05 Certificate Security Management - Well-Architected Framework

            SEC05-05 Certificate Security Management - Well-Architected Framework

            Encrypted transmission: Use encrypted channels, such as SSL and TLS, to transmit certificates to prevent certificates from being tampered with or stolen. Do not transmit certificates on insecure networks for security purposes.

            Help > Well-Architected Framework > Well-Architected Framework and Practices > Security Pillar > Infrastructure Security > SEC05 Runtime Environment Security
          • SEC07-05 Transmission Data Encryption - Well-Architected Framework

            SEC07-05 Transmission Data Encryption - Well-Architected Framework

            Ensure that sensitive data is encrypted when being transmitted between the cloud and the client. In this way, data is difficult to be decrypted even if it is stolen.

            Help > Well-Architected Framework > Well-Architected Framework and Practices > Security Pillar > Data Security and Privacy Protection > SEC07 General Data Security
          • What If I Fail to Transfer Data to an OBS Bucket Authorized with a Key of Another Tenant? - Cloud Trace Service

            What If I Fail to Transfer Data to an OBS Bucket Authorized with a Key of Another Tenant? - Cloud Trace Service

            Go to the tracker transfer configuration page and select the OBS bucket encrypted with the DEW shared key. Parent topic: Trace Transfer

            Help > Cloud Trace Service > FAQs > Trace Transfer
          • PG_SHADOW - GaussDB(DWS)

            PG_SHADOW - GaussDB(DWS)

            Even the system administrator cannot do this unless this column is true. userepl boolean - User can initiate streaming replication and put the system in and out of backup mode. passwd Text - Password (possibly encrypted); null if none.

            Help > GaussDB(DWS) > Developer Guide (9.1.0.x) > GaussDB(DWS) System Catalogs and Views > System Views
          • ALTER COLUMN ENCRYPTION KEY - GaussDB

            ALTER COLUMN ENCRYPTION KEY - GaussDB

            The encrypted CMKs are different from those specified before RR encryption. The constraints of using SM algorithms are as follows: SM2, SM3, and SM4 are Chinese cryptographic algorithms. To avoid legal risks, these algorithms must be used together.

            Help > GaussDB > Developer Guide(Centralized_V2.0-3.x) > SQL Reference > SQL Syntax
          • Querying the Product Package List - Workspace

            Querying the Product Package List - Workspace

            Status code: 400 Table 6 Response body parameters Parameter Type Description error_code String Error code. error_msg String Error message. encoded_authorization_message String Encrypted detailed reason for rejection.

            Help > Workspace > API Reference > Workspace APIs > Product Packages
          • Querying Screen Recording Records - Workspace

            Querying Screen Recording Records - Workspace

            Status code: 400 Table 6 Response body parameters Parameter Type Description error_code String Error code. error_msg String Error message. encoded_authorization_message String Encrypted detailed reason for rejection.

            Help > Workspace > API Reference > Workspace APIs > Screen Recording Audit
          • AesUtils - ROMA Connect

            AesUtils - ROMA Connect

            Returns Encrypted data Parent topic: Developing Custom Function Backends

            Help > ROMA Connect > Developer Guide > Developer Guide for Service Integration > Developing Custom Function Backends
          • Creating a Configuration File - ServiceStage

            Creating a Configuration File - ServiceStage

            During component deployment, variables' actual values will be encrypted using a DEW key. Insert system variables ServiceStage provides variables related to environments, applications, and components, as shown in Table 1.

            Help > ServiceStage > User Guide > Configuration Management > Managing Configuration Files
          • CREATE ROLE - GaussDB

            CREATE ROLE - GaussDB

            If the password string has already been encrypted in the SHA256 format, it is stored encrypted as it was, regardless of whether ENCRYPTED or UNENCRYPTED is specified (since the system cannot decrypt the specified encrypted password string).

            Help > GaussDB > Developer Guide(Distributed_V2.0-2.x) > SQL Reference > SQL Syntax
          • CREATE ROLE - GaussDB

            CREATE ROLE - GaussDB

            If the password string has already been encrypted in the SHA256 format, it is stored encrypted as it was, regardless of whether ENCRYPTED or UNENCRYPTED is specified (since the system cannot decrypt the specified encrypted password string).

            Help > GaussDB > Developer Guide(Centralized_V2.0-2.x) > SQL Reference > SQL Syntax
          • Data Protection Technologies - Enterprise Self-Service Management

            Data Protection Technologies - Enterprise Self-Service Management

            Yes No Storage Mode The ticket system uses encryption algorithms to encrypt the following sensitive data and then stores the encrypted data: The following personal sensitive data is encrypted before storage: Email addresses, mobile numbers, and authorized information.

            Help > Enterprise Self-Service Management > Service Overview > Security
          • Modifies a terminal-desktop binding configuration - Workspace

            Modifies a terminal-desktop binding configuration - Workspace

            Status code: 400 Table 4 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection

            Help > Workspace > API Reference > Workspace APIs > Binds a terminal to a desktop
          • Personal Data Protection - SecMaster

            Personal Data Protection - SecMaster

            No Yes Storage SecMaster uses encryption algorithms to encrypt users' sensitive data and stores encrypted data. Emails are encrypted before storage. Login locations are not sensitive data and stored in plaintext.

            Help > SecMaster > Service Overview
          • Creating a Group - IAM Identity Center

            Creating a Group - IAM Identity Center

            Status code: 403 Table 6 Parameters in the response body Parameter Type Description error_code String Error code. error_msg String Error message. request_id String Request ID. encoded_authorization_message String Encrypted error message.

            Help > IAM Identity Center > API Reference > API > Group Management
          • Adding a Custom Identity Policy - IAM Identity Center

            Adding a Custom Identity Policy - IAM Identity Center

            Status code: 403 Table 5 Parameters in the response body Parameter Type Description error_code String Error code. error_msg String Error message. request_id String Unique ID of a request. encoded_authorization_message String Encrypted error message.

            Help > IAM Identity Center > API Reference > API > Permission Set Management
          Total results: 2852
          • Previous
          • 1
          • ...
          • 26
          • 27
          • 28
          • ...
          • 143
          • Next
          • Go
          Load More
          Was this helpful?
          Feedback
          /200
          Submit Cancel
          Contact Sales After-Sales Self Service
          • Site Terms
          • Privacy Statement

          Explore Huawei Cloud

          Why Us Customer Stories Trust Center Legal Press Releases

          Featured Services

          Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

          Service and Support

          Documentation Contact Us Public Notices Support Plans Service Health Dashboard

          Account and Payment

          Top Up Invoices Billing Center My Account Payment Method

          Quick Links

          Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

          © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

          • Site Terms
          • Privacy Statement