检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Batch Operations on FlexusL Instances Chaos Drills Data Encryption Workshop (DEW) Enables you to create encrypted parameters during resource O&M. To use this function, purchase keys on DEW first. During account management, you can use keys to protect your account passwords.
AK/SK authentication: Requests are encrypted using AK/SK pairs. Token-based Authentication The validity period of a token is 24 hours. When using a token for authentication, cache it to prevent frequently calling the corresponding API for obtaining a user token.
If the parameter type is encrypted text, click next to the parameter value to view the sensitive parameter value, and click Viewing Decrypted Data to view the parameter values of all versions. Parent Topic: Parameter Center
However, in actual operations, if no keys are created in DEW in advance, passwords cannot be encrypted for storage. As a result, O&M security and efficiency are affected. In this case, the storage and management of host accounts and passwords cannot be guaranteed.
The data transmission process is encrypted and isolated to prevent permissions confusion or information leakage.
Sensitive: Parameters are anonymized and encrypted for storage. (Optional) Set Advanced Settings. Manual Review: If this parameter is enabled, the script needs to be reviewed. For details about how to review, see Approving a Custom Script. Reviewer: Shift or Individual.
Cause Analysis To view a password, you must have the coc:account:getPassword and kms:dek:decrypt permissions to obtain the encrypted password and decrypt the password. Therefore, ensure that the account used to log in to the console has been granted the required permissions.
Describe the input parameters. - Parameter Type The options are Plain text and Encrypted text. Plain text Encryption Mode This parameter is required only when Parameter Type is set to Encrypted text. The encryption mode cannot be changed.
Core Value Parameter Center brings the following benefits: Low security risks: Centralized encrypted storage and permissions control reduce data leakage risks and meet compliance requirements.