检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
          • All
          • Products
          • Solutions
          • Documentation
          • KooGallery
          • Developer
          • Learn
          • More
          • OMS Advantages

            OMS Advantages

            Encrypted StorageOMS encrypts data upon migration to HUAWEI CLOUD to make your data more secure.

            Developer
          • JDBC Package, Driver Class, and Environment Class

            JDBC Package, Driver Class, and Environment Class

            This driver package contains the dependent libraries related to encryption and decryption that need to be loaded to the encrypted database. You are advised to use this driver package in encrypted scenarios.

            Developer
          • Functions

            Functions

            Trace file encryption: Trace files are encrypted using keys provided by Data Encryption Workshop (DEW) during transfer. Parent topic: Service Overview

            Developer
          • Advantages

            Advantages

            Advantages High SecurityGaussDB provides a wide range of features to let you enjoy the security of top-level commercial databases at a low cost: dynamic data masking, transparent data encryption (TDE), row-level access control, and encrypted computing.

            Developer
          • Connection Parameters

            Connection Parameters

            To sort encrypted data on clients, set this parameter to 2. When the value is changed to 3, only the basic capability of encrypted equality query is supported.

            Developer
          • Connecting to the Database (Using SSL)

            Connecting to the Database (Using SSL)

            When you connect to the server in SSL mode in a process, do not use multiple sets of certificates, encrypted or not. If you set multiple sets of them, the first valid set is used.

            Developer
          • Establishing Secure TCP/IP Connections in SSL Mode

            Establishing Secure TCP/IP Connections in SSL Mode

            verify-ca on The connection is encrypted and the server certificate is verified. verify-ca off The connection is encrypted and the server certificate is verified.

            Developer
          • Configuring a Data Source in the Windows OS

            Configuring a Data Source in the Windows OS

            sha256 indicates that the password of user omm is encrypted using the SHA-256 algorithm.

            Developer
          • Developing an MQTT-based Smart Street Light Online

            Developing an MQTT-based Smart Street Light Online

            Password Yes String(256) Encrypted device secret. The value of this parameter is the device secret encrypted by using the HMAC-SHA256 algorithm with the timestamp as the key.

            Developer
          • UCloud US3

            UCloud US3

            The current configuration file can be encrypted only when it is created for the first time. When entering the proxy address, you only need to specify ip:port.

            Developer
          • Modifying Database Parameters

            Modifying Database Parameters

            with MD5. 1 indicates that passwords are encrypted with SHA-256, which is compatible with the MD5 user authentication method of the PostgreSQL client. 2 indicates that passwords are encrypted with SHA-256.

            Developer
          • Uploading Data by Using Agent

            Uploading Data by Using Agent

            /dis-encrypt.sh {key} {ak} to obtained the encrypted AK. Then configure the encrypted AK in the agent.yml file. Encrypt the SK in the same way. Then configure the encrypted AK/SK and key in the agent.yml file.

            Developer
          • Connecting to a Database

            Connecting to a Database

            is supported based on the encrypted equality query capability.

            Developer
          • Connecting to a Database

            Connecting to a Database

            The new password will be encrypted using the hash algorithm and stored for authentication in the next connection.

            Developer
          • Creating a Migration Task Group

            Creating a Migration Task Group

            If KMS is selected, all migrated objects will be encrypted before they are stored in the destination bucket. Using KMS to encrypt migrated data may decrease the migration speed by about 10%.

            Developer
          • Creating a Migration Task

            Creating a Migration Task

            If KMS is selected, all migrated objects will be encrypted before they are stored in the destination bucket. Using KMS to encrypt migrated data may decrease the migration speed by about 10%.

            Developer
          • Configuring a Data Source in the Linux OS

            Configuring a Data Source in the Linux OS

            prefer Probably The SSL secure encrypted connection is used as a preferred mode if supported by the database, but does not check the authenticity of the server.

            Developer
          • Creating an Elasticsearch Cluster (Non-Security Mode)

            Creating an Elasticsearch Cluster (Non-Security Mode)

            Using encrypted disks does not affect cluster operations, such as accessing the cluster and importing data to the cluster. Disk encryption deteriorates operation performance by about 10%.

            Developer
          • Procedure

            Procedure

            To ensure the security of your custom parameters that need to be encrypted for storage, the system anonymizes the parameter values you enter. The entered characters are displayed as asterisks (****) after you press Enter.

            Developer
          • Migrating a Custom Topic to the Cloud

            Migrating a Custom Topic to the Cloud

            Password Yes Encrypted device secret. The value of this parameter is the device secret encrypted by using the HMAC-SHA256 algorithm with the timestamp as the key.

            Developer
          Total results: 35
          • Previous
          • 1
          • 2
          • Next
          • Go
          Load More
          Was this helpful?
          Feedback
          /200
          Submit Cancel
          Contact Sales After-Sales Self Service
          • Site Terms
          • Privacy Statement

          Explore Huawei Cloud

          Why Us Customer Stories Trust Center Legal Press Releases

          Featured Services

          Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

          Service and Support

          Documentation Contact Us Public Notices Support Plans Service Health Dashboard

          Account and Payment

          Top Up Invoices Billing Center My Account Payment Method

          Quick Links

          Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

          © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

          • Site Terms
          • Privacy Statement