检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication. Token Authentication The validity period of a token is 24 hours.
If the device attribute values are encrypted, you need to decrypt them. Tags: Tags are used to classify end devices. You can quickly search for desired devices by tag. Tags also facilitate end device management by category. Click Create. Parent topic: End Device Management
If the device attribute values are encrypted, you need to decrypt them. Tags: Tags are used to classify end devices. You can quickly search for desired devices by tag. Tags also facilitate end device management by category. Click Create. Parent topic: End Device Management
data √ x √ View encrypted data √ √ √ Creating, deleting, or modifying a system subscription √ x √ Viewing a system subscription √ √ √ Creating, deleting, or modifying a plug-in √ x √ Viewing a plug-in √ √ √ Helpful Links IAM Service Overview Create a user group and users.
Edge-cloud synergy communication security Edge Agent initiates a request to IEF for establishing a bidirectional encrypted channel. Messages exchanged between devices and IEF are authenticated and encrypted by certificates.
Edge-cloud synergy communication security Edge Agent initiates a request to IEF for establishing a bidirectional encrypted channel. Messages exchanged between devices and IEF are authenticated and encrypted by certificates.