检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
AK/SK authentication: Requests are encrypted using AK/SK pairs. This method is recommended because it provides higher security than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.
No Yes Storage Mode HSS uses encryption algorithms to encrypt users' sensitive data and stores encrypted data. Mobile phone number are encrypted before storage. Login locations are not sensitive data and stored in plaintext.
Measure Description Transmission encryption (HTTPS) Data is encrypted when it is transmitted between microservices to prevent leakage or tampering during transmission. Your configurations are kept secure when transmitted over HTTPS.
Password Password of the login user. login_auth The value of this parameter is the encrypted value of the image repository username and image repository password.
Using HSS to Handle Mining Attacks Scenario Mining, also called cryptocurrency mining, is a process of obtaining encrypted currencies through intensive computational operations. The process occupies victims' system and network resources and obtaining digital currency.
The ClientAliveInterval parameter sets a timeout interval in seconds after which if no data has been received from the client, sshd will send a message through the encrypted channel to request a response from the client.
The ClientAliveInterval parameter sets a timeout interval in seconds after which if no data has been received from the client, sshd will send a message through the encrypted channel to request a response from the client.