检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Data Encryption The access information (usernames and passwords) of tenants' data sources is stored in the database of the CDM instance and encrypted using AES-256. The CDM administrators cannot access the database.
Data Encryption The access information (usernames and passwords) of tenants' data sources is stored in the database of the CDM instance and encrypted using AES-256. The CDM administrators cannot access the database.
CDM stores passwords encrypted by AES-256 in the database of the instance to ensure tenant isolation. The database is run by user Ruby and listens to only 127.0.0.1. Therefore, tenants cannot remotely access the database.
CDM stores passwords encrypted by AES-256 in the database of the instance to ensure tenant isolation. The database is run by user Ruby and listens to only 127.0.0.1. Therefore, tenants cannot remotely access the database.
CDM stores passwords encrypted by AES-256 in the database of the instance to ensure tenant isolation. The database is run by user Ruby and listens to only 127.0.0.1. Therefore, tenants cannot remotely access the database.
It specifies whether to decrypt the encrypted file before export, and the decryption method. The options are as follows: NONE: Do not decrypt but directly export the file.
If the source data is encrypted, CDM can decrypt the data before exporting it. Select whether to decrypt the source data and select a decryption algorithm. The options are as follows: NONE: Export data without decrypting it.
After KMS encryption is enabled, objects to be uploaded will be encrypted and stored on OBS. When you download the encrypted objects, the encrypted data will be decrypted on the server and displayed in plaintext to users.
After KMS encryption is enabled, objects to be uploaded will be encrypted and stored on OBS. When you download the encrypted objects, the encrypted data will be decrypted on the server and displayed in plaintext to users.
Select Yes if you want to enable SSL encrypted transmission. Yes Link Attributes (Optional) Click Add to add the JDBC connector attributes of multiple specified data sources. For details, see the JDBC connector document of the corresponding database.
If Kafka SASL_SSL is enabled, data will be encrypted before transmission for higher security, but performance will suffer. NOTE: When SSL authentication is enabled, Kafka continuously parses the Kafka broker connection address as a domain name, which undermines performance.
Links to Redis data encrypted using SSL are not supported. When connecting CDM to an on-premises Redis database, configure the parameters as described in Table 1. Do not change the password or user when the job is running.
Data Transmission Security Your personal data is encrypted using TLS 1.2 or TLS 1.3 during transmission. All the calls made to CDM APIs use HTTPS to encrypt the transmitted data. Parent topic: Security
The default value true is used for cloud databases and false is used for other databases. linkConfig.useSSL No Boolean Whether to enable SSL encrypted transmission for RDS.
If Kafka SASL_SSL is enabled, data will be encrypted before transmission for higher security, but performance will suffer. linkConfig.user No String Username for connecting to DMS Kafka.