检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Authentication Calling an API can be authenticated using either of the following methods: Authentication using AK/SK: Requests are encrypted using access key ID (AK)/secret access key (SK).
Starting the Database Encryption Instance Function This API is used to start an encrypted database instance. URI POST /v1/{project_id}/db-encrypt/{instance_id}/start Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Definition: Project ID.
Stopping a Database Encryption Instance Function This API is used to stop an encrypted database instance. URI POST /v1/{project_id}/db-encrypt/{instance_id}/stop Table 1 Path Parameters Parameter Mandatory Type Description project_id Yes String Definition: Project ID.
Encryption and Decryption Functions AES_DECRYPT AES_DECRYPT(crypt_str, key_str[, init_vector][, kdf_name][, salt][, info | iterations]) Description: Based on AES algorithm, the encrypted string crypt_str is decrypted using the decryption password key_str, initialization vector init_vector
Progressive Knowledge | HUAWEI CLOUD
using SSE-KMS HTTPS Object encrypted using SSE-KMS Object encrypted using SSE-KMS HTTPS Object encrypted using SSE-OBS Object encrypted using SSE-KMS HTTPS Object encrypted using SSE-C Object encrypted using SSE-KMS HTTPS Non-encrypted object Object encrypted using SSE-C HTTPS Object
Resetting the Password of an Encrypted Database Instance Restarting an Encrypted Database Instance Stopping a Database Encryption Instance Starting the Database Encryption Instance Deleting an Encrypted Database Instance Purchasing an Encrypted Database Instance in Yearly/Monthly
Use the master key selected by KMS users to encrypt the CEK plaintext and import the encrypted CEK ciphertext to DWS. DWS uses the CEK plaintext to encrypt the DEK plaintext and saves the encrypted DEK ciphertext.
An encrypted image will be created. Create an Encrypted Image from an Encrypted ECS When you use an ECS to create a private image, if the system disk of the ECS is encrypted, the private image created from this ECS will also be encrypted.
Flume encrypted transmission configuration: See Configuring the Encrypted Transmission. Flink encrypted transmission configuration: See Encrypted Transmission in Authentication and Encryption.
Snapshots, backups, and images created from encrypted disks are encrypted by default. Managing Encrypted EVS Disks Parent topic: Security
Method 2: Create an encrypted image using an encrypted ECS. When you use an ECS to create a private image, if the system disk of the ECS is encrypted, the private image created using the ECS is also encrypted.
You can create an encrypted or non-encrypted file system, but you cannot change the encryption settings of an existing file system. For details about how to create an encrypted file system, see Create a File System.
As shown in the following figure, the encrypted write process of code data is " repository write > obtain encryption key > encrypted write", and the encrypted read process of code data is "repository read request > decryption key > data decryption > code data return" Each phase of
You can create a file system that is encrypted or not, but you cannot change the encryption settings of an existing file system. For details about how to create an encrypted file system, see Create a File System.
Figure 3 Encryption task After the encryption is complete, only encrypted data can be queried by unauthorized users. Figure 4 Encrypted data Related Operations In the task list, you can manage encrypted tasks.
Server-Side Encryption How Do I Access or Download an Encrypted Object? Why Cannot an Authorized Account or User Upload or Download KMS Encrypted Objects? Are Additional Permissions Required When I Share an Object with SSE-OBS Encrypted? Does OBS Support Encrypted Upload?
If automatic key rotation is used, your existing secrets will still be encrypted with the existing key, but any new secrets will be encrypted with the new key. In this way, new data can be encrypted using the latest key, and old data can still be decrypted.
For details, see Managing Encrypted EVS Disks Rule Logic If an EVS disk is encrypted, this disk is compliant. If an EVS disk is not encrypted, this disk is non-compliant. Parent topic: Elastic Volume Service
Encrypted Communication Encrypted communication is a typical application of asymmetric encryption algorithms. Encrypted communication is similar to symmetric encryption. The difference is that the public key is used for encryption and the private key is used for decryption.