检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
AK/SK-based authentication: Requests are encrypted using an AK/SK pair Token-based Authentication The validity period of a token is 24 hours. If a token is used for authentication, cache it to prevent frequent API calling. Ensure that the token is valid when you use it.
AK/SK authentication: Requests are encrypted using the access key ID and secret access key (AK/SK pair) to provide higher security. AK/SK authentication is recommended because it provides higher security than token authentication.
VPN establishes a secure, encrypted communication tunnel between your on-premises data center and your VPC. Compared with Direct Connect, VPN is cost-effective and can be quickly deployed.
Support SSL encrypted connection. 3.1.0 New features Add filter criteria for Show Processlist and Kill Sessionid. Add keywords related to MySQL 8.0 Online DDL.
AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK-based authentication is recommended because it is more secure than token-based authentication. Token Authentication A token is valid for 24 hours.
The database password is encrypted and used for DAS API calls only. This API does not create database users on the instance. Ensure that the entered username and password are valid. Currently, only MySQL instances are supported.
The value is NULL. encrypted character varying(3) Not supported. The value is NULL. compress_for character varying(30) Not supported. The value is NULL. def_inmemory character varying(8) Not supported. The value is NULL. def_inmemory_priority character varying(8) Not supported.
Functions and Operators Text Search Functions and Operators JSON/JSONB Functions and Operators HLL Functions and Operators SEQUENCE Functions Array Functions and Operators Range Functions and Operators Aggregate Functions Window Functions Security Functions Ledger Database Functions Encrypted
AK/SK authentication: Requests are encrypted using an AK/SK. AK/SK authentication is recommended because it is more secure than token authentication. Constraints AK/SK authentication supports API requests with a body not larger than 12 MB.
AK/SK authentication: Requests are encrypted using an AK/SK. AK/SK-based authentication is recommended because it is more secure than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.
Status code: default Table 4 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for
Status code: default Table 5 Response body parameters Parameter Type Description error_code String Error code, which is returned upon failure. error_msg String Error description. error_detail String Error details. encoded_authorization_message String Encrypted detailed reason for
Its value is NULL. encrypted character varying(3) Not supported. Its value is NULL. compress_for character varying(30) Not supported. Its value is NULL. def_inmemory character varying(8) Not supported. Its value is NULL. def_inmemory_priority character varying(8) Not supported.
The value –1 indicates no limit. rolpassword text N/A Encrypted user password.
Robo 3T can connect to an instance with an unencrypted connection or an encrypted connection (SSL). To improve data transmission security, connect to instances using SSL.
User passwords are encrypted and stored in the system catalog PG_USER_MAPPING. During the encryption, usermapping.key.cipher and usermapping.key.rand are used as the encryption password file and encryption factor.
Hardening LDAP LDAP is hardened as follows after a cluster is installed: In the LDAP configuration file, the password of the administrator account is encrypted using SHA.
-1 means no limit. rolpassword Text Password (possibly encrypted); NULL if no password. rolvalidbegin Timestamp with time zone Account validity start time; NULL if no start time rolvaliduntil Timestamp with time zone Password expiry time; NULL if no expiration rolrespool Name Resource
Its value is NULL. encrypted character varying(3) Not supported. Its value is NULL. compress_for character varying(30) Not supported. Its value is NULL. def_inmemory character varying(8) Not supported. Its value is NULL. def_inmemory_priority character varying(8) Not supported.
The IP addresses, domain names, usernames, and passwords of the source and destination databases are encrypted and stored in the system until a task is deleted. Parent topic: Task Life Cycle