检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
If the information is sensitive, you are advised to use vars_structure to change the information to a variable and set the encryption field to enable encrypted transmission.
Enable: If you select this option, your data will be encrypted on disks and stored in ciphertext after you create an instance. When you download encrypted objects, the ciphertext will be decrypted into plain text and then sent to you.
Value range: 0, 1, 2, or 3 0 indicates that passwords are encrypted with MD5. 1 indicates that passwords are encrypted with SHA-256 and MD5. 2 indicates that passwords are encrypted with SHA-256. 3 indicates that the passwords are encrypted in sm3 mode.
The DEK is encrypted using the CEK and stored in the GaussDB(DWS) cluster. Keys are applied for, encrypted, and decrypted through the KMS service. The cryptographic algorithm is configured using configuration items. Currently, AES and SM4 algorithms are supported.
Password Yes String(256) Encrypted device secret. The value of this parameter is the device secret encrypted by using the HMAC-SHA256 algorithm with the timestamp as the key. The device secret is returned by IoTDA upon successful device registration.
The tenant ID is the same as the project ID. enterprise_project_id String The ID of the enterprise project to which the snapshot belongs. encrypted Boolean Whether the snapshot is encrypted. cmk_id String The ID of the key used by the snapshot's source disk. category String The snapshot
Replicate KMS encrypted objects OBS will try to copy KMS encrypted objects no matter whether this option is selected or not.
AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication. Token Authentication The validity period of a token is 24 hours.
NOTE: The information is encrypted using AES128-CBC and transmitted through the TLS1.2 encryption channel. This field contains sensitive data.
Capacity (GB) Snapshot capacity Encrypted Indicates whether the snapshot is encrypted. The value can be Yes or No.
AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication. Token Authentication The validity period of a token is 24 hours.
AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication. Token Authentication The validity period of a token is 24 hours.
AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication. Token Authentication The validity period of a token is 24 hours.
The value can also be nodeId entered during device registration with the IoT platform when the device uses nodeId to access the IoT platform. password Mandatory String(256) The value of this parameter is the value of the device secret encrypted by using the HMACSHA256 algorithm with
AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication. Token-based Authentication The validity period of a token is 24 hours.
Capacity (GB) Snapshot capacity Encrypted Indicates whether the snapshot is encrypted. The value can be Yes or No.
AK/SK-based authentication: Requests are encrypted using an AK/SK. Token-based Authentication The validity period of a token is 24 hours. When using a token for authentication, you may cache it so there is no need to call the IAM API frequently.
Table 2 Parameter description of message Parameter Type Description content String Message body content, which is encrypted using Base64.
AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication. Token Authentication The validity period of a token is 24 hours.
AK/SK authentication: Requests are encrypted using AK/SK pairs. AK/SK authentication is recommended because it is more secure than token authentication. Token Authentication The validity period of a token is 24 hours.