检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Password Password of the login user. login_auth The value of this parameter is the encrypted value of the image repository username and image repository password.
Status code: 400 Table 15 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection
Enable: If you select this option, your data will be encrypted on disks and stored in ciphertext after you create an instance. When you download encrypted objects, the ciphertext will be decrypted into plain text and then sent to you.
Enable: Your data will be encrypted on disks and stored in ciphertext after you create an instance. When you download encrypted objects, the ciphertext will be decrypted into plain text and then sent to you.
e.printStackTrace(); } } } When you download an object encrypted with SSE-OBS or obtain the metadata of such an object, the object is automatically decrypted and no encryption-related headers are required.
The MqttConnectOptions parameter is passed. 1 client.connect(options, null, new IMqttActionListener() The password passed by calling options.setPassword() is encrypted during creation of MqttConnectOptions. getPassword() is used to obtain the encrypted password. 1 2 3 4 5 6
- -k, --with-key=KEY Uses gsql to decrypt imported encrypted files.
Value range: 0, 1, 2, or 3 0 indicates that passwords are encrypted with MD5. 1 indicates that passwords are encrypted with SHA-256 and MD5. 2 indicates that passwords are encrypted with SHA-256. 3 indicates that the passwords are encrypted in sm3 mode.
This parameter is applicable when type is set to 0. iv String IV of the encrypted file.
Status code: 400 Table 15 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for rejection
Encrypted Whether data is encrypted for transmission. Click in the upper part of the data access page, set the data access label and name, and click the save button. Table 11 Parameters Parameter Description Label Label name of the data access, which is displayed on the page.
Storage Pool Management Expanding a Storage Pool Disk Management Attaching an Existing Disk Detaching a Disk Deleting a Disk Expanding the Capacity of a Disk Managing an Encrypted Disk Managing a Shared Disk 02 Purchase ECS billing modes and configurations are available for you to
X-signature Yes String In the encrypted data session_token=xxx×tamp=xxx&nonce=xxx, session_token indicates the session token, timestamp indicates the current timestamp, nonce indicates the timestamp's hexadecimal value, and the encryption mode is RSA.
Requirements Data such as user identities must be encrypted to protect the information against brute force attack. Quick information queries based on identities must be supported.
AK/SK authentication: Requests are encrypted using an AK/SK. Token-based Authentication The validity period of a token is 24 hours.
Requests are encrypted using an access key ID (AK)/secret access key (SK) pair. Token-based Authentication The validity period of a token is 24 hours. If a token is used for authentication, cache it to prevent frequent API calling.
Storage Pool Management Expanding a Storage Pool Disk Management Attaching an Existing Disk Detaching a Disk Deleting a Disk Expanding the Capacity of a Disk Managing an Encrypted Disk Managing a Shared Disk 02 Purchase ECS billing modes and configurations are available for you to
Description applyer String Applicant identifier. applyerName String Applicant name. provider String Authorizer identifier. providerName String Authorizer name. service String Service name of the authorizer. price Integer Price. applyTime String Application time. encryptedABEKey String Encrypted
The encrypted balance amount is added to the users' ledgers. A storage structure is defined in the demo.
AK/SK authentication: Requests are encrypted using AK/SK pairs. Token-based Authentication The validity period of a token is 24 hours. If a token is used for authentication, cache it to prevent frequent API calls. A token specifies certain permissions in a computer system.