• OMS Advantages

    Encrypted StorageOMS encrypts data upon migration to HUAWEI CLOUD to make your data more secure.

  • JDBC Package, Driver Class, and Environment Class

    This driver package contains the dependent libraries related to encryption and decryption that need to be loaded to the encrypted database. You are advised to use this driver package in encrypted scenarios.

  • Functions

    Trace file encryption: Trace files are encrypted using keys provided by Data Encryption Workshop (DEW) during transfer. Parent topic: Service Overview

  • Advantages

    Advantages High SecurityGaussDB provides a wide range of features to let you enjoy the security of top-level commercial databases at a low cost: dynamic data masking, transparent data encryption (TDE), row-level access control, and encrypted computing.

  • Connection Parameters

    To sort encrypted data on clients, set this parameter to 2. When the value is changed to 3, only the basic capability of encrypted equality query is supported.

  • Connecting to the Database (Using SSL)

    When you connect to the server in SSL mode in a process, do not use multiple sets of certificates, encrypted or not. If you set multiple sets of them, the first valid set is used.

  • Establishing Secure TCP/IP Connections in SSL Mode

    verify-ca on The connection is encrypted and the server certificate is verified. verify-ca off The connection is encrypted and the server certificate is verified.

  • Configuring a Data Source in the Windows OS

    sha256 indicates that the password of user omm is encrypted using the SHA-256 algorithm.

  • Developing an MQTT-based Smart Street Light Online

    Password Yes String(256) Encrypted device secret. The value of this parameter is the device secret encrypted by using the HMAC-SHA256 algorithm with the timestamp as the key.

  • UCloud US3

    The current configuration file can be encrypted only when it is created for the first time. When entering the proxy address, you only need to specify ip:port.

  • Modifying Database Parameters

    with MD5. 1 indicates that passwords are encrypted with SHA-256, which is compatible with the MD5 user authentication method of the PostgreSQL client. 2 indicates that passwords are encrypted with SHA-256.

  • Uploading Data by Using Agent

    /dis-encrypt.sh {key} {ak} to obtained the encrypted AK. Then configure the encrypted AK in the agent.yml file. Encrypt the SK in the same way. Then configure the encrypted AK/SK and key in the agent.yml file.

  • Connecting to a Database

    is supported based on the encrypted equality query capability.

  • Connecting to a Database

    The new password will be encrypted using the hash algorithm and stored for authentication in the next connection.

  • Creating a Migration Task Group

    If KMS is selected, all migrated objects will be encrypted before they are stored in the destination bucket. Using KMS to encrypt migrated data may decrease the migration speed by about 10%.

  • Creating a Migration Task

    If KMS is selected, all migrated objects will be encrypted before they are stored in the destination bucket. Using KMS to encrypt migrated data may decrease the migration speed by about 10%.

  • Configuring a Data Source in the Linux OS

    prefer Probably The SSL secure encrypted connection is used as a preferred mode if supported by the database, but does not check the authenticity of the server.

  • Creating an Elasticsearch Cluster (Non-Security Mode)

    Using encrypted disks does not affect cluster operations, such as accessing the cluster and importing data to the cluster. Disk encryption deteriorates operation performance by about 10%.

  • Procedure

    To ensure the security of your custom parameters that need to be encrypted for storage, the system anonymizes the parameter values you enter. The entered characters are displayed as asterisks (****) after you press Enter.

  • Migrating a Custom Topic to the Cloud

    Password Yes Encrypted device secret. The value of this parameter is the device secret encrypted by using the HMAC-SHA256 algorithm with the timestamp as the key.

Total results: 35