检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
AK/SK: Requests are encrypted using an AK/SK. This method is recommended because it provides higher security than token-based authentication. For more authentication details and how to obtain tokens and signatures, see Authentication.
Database password: encrypted for storage. Access Permission Control Users can view only logs related to their own services. Log Records DSC records logs for all operations, such as modifying, querying, and deleting, performed on personal data.
AK/SK authentication: Requests are encrypted using AK/SK pairs. This method is recommended because it provides higher security than token-based authentication. For details about authentication and authorization, see Authentication.
AK/SK authentication: Requests are encrypted using the access key (AK) and secret key (SK) to provide higher security. For details, see AK/SK Authentication in the ImageSearch API Reference. (Optional) Authorize OBS.
Encrypted objects cannot be shared. Procedure In the navigation pane of OBS Console, choose Object Storage. In the bucket list, click the bucket you want to operate. The Objects page is displayed. Click the object to be shared.
VPN VPN establishes a secure, encrypted communication tunnel between the VPN gateway of the VPC on HUAWEI CLOUD and the VPN gateway of your local data center, allowing you to directly use resources in the VPC through the VPN.
Status code: 403 Table 2 Response body parameters Parameter Type Description error_code String Error code. error_msg String Error message. request_id String Unique ID of the request. encoded_authorization_message String Encrypted error message. details Array of ForbiddenErrorDetail
Status code: 403 Table 2 Response body parameters Parameter Type Description error_code String Error code. error_msg String Error message. request_id String Unique ID of the request. encoded_authorization_message String Encrypted error message. details Array of ForbiddenErrorDetail
Status code: 403 Table 2 Response body parameters Parameter Type Description error_code String Error code. error_msg String Error message. request_id String Unique ID of the request. encoded_authorization_message String Encrypted error message. details Array of ForbiddenErrorDetail
An authenticated request must contain a signature value that is calculated based on the encrypted AK/SK pair of the requester and the specific information carried in the request body.
These mechanisms include encrypted transmission, access authentication, fine-grained permissions control, data access control, and dynamic control of service interactions.
Image replication Replicate images within a region for conversion between encrypted and non-encrypted images. Replicate images across regions to migrate services between regions. Image quota Query the number of private images in the current region.
If the key is disabled, data encrypted using the key cannot be decrypted, and the data will be permanently unavailable. Solution Create related alarm rules. Rule Logic If there are no alarm rules configured for disabling KMS or deleting keys, this rule is non-compliant.
For example, you can check if the configurations (public IPs attached or disks encrypted) of your resources meet security requirements. Optimize costs. For example, you can list all EVS disks that have not been attached to any ECS to avoid unnecessary expenditures.
The SSL and TLS protocols are used for encrypted transmission. Constrained Application Protocol (CoAP) CoAP is a software protocol designed to enable simple devices to perform interactive communication on the Internet. CoAPS refers to CoAP over DTLS.
If you scale up a DB instance with disks encrypted, the expanded storage space will be encrypted using the original encryption key.
You need to set HANA_USER, HANA_PASSWORD, and INSTANCE_NUMBER DB_SID based on your actual conditions, where HANA_PASSWORD should be the encrypted password obtained in step 1. You can also run the sed commands to modify the configuration: sed -i 's/^HANA_USER=.
Status code: 400 Table 7 Parameters in the response body Parameter Type Description error_code String Error code. error_msg String Error message. request_id String Unique ID of a request. encoded_authorization_message String Encrypted error message.
HTTPS has the following advantages over HTTP: HTTPS is a network protocol constructed based on SSL and HTTP for encrypted transmission and identity authentication.
HTTPS has the following advantages over HTTP: HTTPS is a network protocol constructed based on SSL and HTTP for encrypted transmission and identity authentication.