检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • Others
        576 results found.
        • Authentication - Content Moderation

          Authentication - Content Moderation

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Token-based Authentication The validity period of a token is 24 hours.

          Help > Content Moderation > API Reference > Calling APIs
        • Authentication - Data Security Center

          Authentication - Data Security Center

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. This method is recommended because it provides higher security than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.

          Help > Data Security Center > API Reference > Calling APIs
        • Authentication - Data Admin Service

          Authentication - Data Admin Service

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. AK/SK-based authentication is recommended because it is more secure than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.

          Help > Data Admin Service > API Reference > Calling APIs
        • API Reference - Cloud Certificate Manager

          API Reference - Cloud Certificate Manager

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. This method is recommended because it provides higher security than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.

          Help > Cloud Certificate Manager > API Reference
        • Authentication - NAT Gateway

          Authentication - NAT Gateway

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. AK/SK-based authentication is recommended because it is more secure than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.

          Help > NAT Gateway > API Reference > Calling APIs
        • Authentication - Web Application Firewall

          Authentication - Web Application Firewall

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. This method is recommended because it provides higher security than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.

          Help > Web Application Firewall > API Reference > API Calling
        • Authentication - CodeArts Req

          Authentication - CodeArts Req

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Token-based Authentication The validity period of a token is 24 hours.

          Help > CodeArts Req > API Reference > Calling APIs
        • Replicating Images Within a Region - Image Management Service

          Replicating Images Within a Region - Image Management Service

          Keys for encrypting the images cannot be changed. If you want to change the key of an encrypted image, you can replicate this image to a new one and encrypt the new image using an encryption key. Replicate an unencrypted image to an encrypted one.

          Help > Image Management Service > User Guide > Managing Private Images
        • Authentication - Content Delivery Network

          Authentication - Content Delivery Network

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. AK/SK-based authentication is recommended because it is more secure than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.

          Help > Content Delivery Network > API Reference > Calling APIs
        • ECS and Other Services - Elastic Cloud Server

          ECS and Other Services - Elastic Cloud Server

          Managing Encrypted EVS Disks Encrypting Images Creating a Key Pair Cloud Trace Service (CTS) Records ECS-related operations for later query, auditing, and backtracking.

          Help > Elastic Cloud Server > Service Overview
        • Connecting to an Instance Using a Private IP Address - GeminiDB

          Connecting to an Instance Using a Private IP Address - GeminiDB

          For details about how to disable SSL, see Encrypting Data over SSL for a GeminiDB Redis Instance. Prerequisites An ECS has been created. The following uses a Linux ECS as an example. For details, see Purchasing an ECS in Getting Started with Elastic Cloud Server.

          Help > GeminiDB > GeminiDB Redis API > Working with GeminiDB Redis API > Instance Connection and Management > Connecting to a GeminiDB Redis Instance Over a Private Network
        • Copying an Object Version (SDK for Java) - Object Storage Service

          Copying an Object Version (SDK for Java) - Object Storage Service

          Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.

          Help > Object Storage Service > Java > Versioning (SDK for Java)
        • Creating a Tracker - Cloud Trace Service

          Creating a Tracker - Cloud Trace Service

          This parameter must be used with kms_id. kms_id String Key ID used for transferring and encrypting trace files. This key ID is obtained from Key Management Service (KMS).

          Help > Cloud Trace Service > API Reference > Out-of-Date APIs > Tracker Management
        • Querying the Grant List - Data Encryption Workshop

          Querying the Grant List - Data Encryption Workshop

          a DEK decrypt-datakey: Decrypting a DEK describe-key: Querying Key Details retire-grant: Creating a Grant encrypt-data: Encrypting Data decrypt-data: Decrypting Data issuing_principal String Indicates the ID of the user who created the grant.

          Help > Data Encryption Workshop > API Reference > APIs > Key Management APIs > Key Authorization Management
        • Querying Retirable Grants - Data Encryption Workshop

          Querying Retirable Grants - Data Encryption Workshop

          a DEK decrypt-datakey: Decrypting a DEK describe-key: Querying Key Details retire-grant: Creating a Grant encrypt-data: Encrypting Data decrypt-data: Decrypting Data issuing_principal String Indicates the ID of the user who created the grant.

          Help > Data Encryption Workshop > API Reference > APIs > Key Management APIs > Key Authorization Management
        • Cloud Search Service Security Best Practices - Cloud Search Service

          Cloud Search Service Security Best Practices - Cloud Search Service

          Encrypting Data at Rest When creating a CSS cluster, you are advised to enable disk encryption, which uses the Key Management Service (KMS) to encrypt data before storing it on disks.

          Help > Cloud Search Service > Best Practices
        • SMIME Secure Email Solution

          SMIME Secure Email Solution

          Secure your email by digitally signing and encrypting communications with our Email certificates, also called Personal ID certificates.

          KooGallery
          Sold by: NETWORK SECURITY SOLUTIONS LIMITED
          Delivery Methods: Consulting Service
        • Copying an Object - Multipart (SDK for Java) - Object Storage Service

          Copying an Object - Multipart (SDK for Java) - Object Storage Service

          Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.

          Help > Object Storage Service > Java > Object Management (SDK for Java)
        • Using an SFS File System Through a Dynamic PV - Cloud Container Engine-Autopilot

          Using an SFS File System Through a Dynamic PV - Cloud Container Engine-Autopilot

          Mandatory for encrypting volumes. everest.io/crypt-domain-id: <your_domain_id> # (Optional) ID of the tenant to which an encrypted volume belongs. Mandatory for encrypting volumes.

          Help > Cloud Container Engine-Autopilot > User Guide > Storage > SFS
        • Authentication - ROMA Connect

          Authentication - ROMA Connect

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an Access Key ID/Secret Access Key (AK/SK) pair. Token-based Authentication The validity period of a token is 24 hours.

          Help > ROMA Connect > API Reference > Calling APIs
        Total results: 576
        • Previous
        • 1
        • ...
        • 9
        • 10
        • 11
        • ...
        • 29
        • Next
        • Go
        Load More
        Was this helpful?
        Feedbacks
        /200
        Submit Feedback Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement