检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
If encrypted transmission or data security is required, you can select an encrypted protocol when selecting an inbound or outbound rule. The protocol can be SSH, RDP, SFTP, SCP, or Rlogin.
AK/SK authentication: Requests are encrypted using AK/SK pairs. This method is recommended because it provides higher security than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.
Storage Mode CBH uses advanced encryption algorithms to encrypt users' sensitive data and stores encrypted data. Login names are not sensitive data and stored in plaintext. Passwords, email addresses, and mobile numbers are encrypted for storage.
System Data Security Login security: Image encryption, SSH remote login security hardening, kernel parameter security hardening, strong passwords for system accounts, and lockout of login after three consecutive login failures Data security: Encrypted sensitive information and independently
If the email address is not encrypted, select Null. You can obtain the encryption mode from the official website or the unified administrator of the enterprise that the email address belongs to. Port Set this parameter when SMTP is selected.
Encrypted signature verification ensures the confidentiality and integrity of requests and the identity of the requester. If you select a cloud platform for Cloud Vendor on the Import Host page, you can manage your access keys on the My Credential page.
Storage Mode CBH uses encryption algorithms to encrypt users' sensitive data and stores encrypted data. Login names are not sensitive data and stored in plaintext. Passwords, email addresses, and mobile numbers are encrypted for storage.
If you set a password, the downloaded password change log is an encrypted .zip file. User Password: This parameter is mandatory. You need to enter the login password of the current user and then the password change log can be downloaded only after the verification is successful.
In addition, the file cannot be encrypted so that it can be opened after the upload. Otherwise, host resources fail to be imported. By importing hosts in batches, you can configure automatic login during host information entering to avoid the generation of Empty account.