检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • Others
        574 results found.
        • Authentication - ROMA Connect

          Authentication - ROMA Connect

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an Access Key ID/Secret Access Key (AK/SK) pair. Token-based Authentication The validity period of a token is 24 hours.

          Help > ROMA Connect > API Reference > Calling APIs
        • Authentication - Database Security Service

          Authentication - Database Security Service

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. This method is recommended because it provides higher security than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.

          Help > Database Security Service > API Reference > Calling APIs
        • Authentication - Huawei Cloud Flexus-Huawei Cloud Flexus RDS

          Authentication - Huawei Cloud Flexus-Huawei Cloud Flexus RDS

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Authentication using AK/SK is recommended because it is more secure than authentication using tokens. Token-based Authentication The validity period of a token is 24 hours.

          Help > API Reference > Calling APIs
        • Authentication - Anti-DDoS Service

          Authentication - Anti-DDoS Service

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. This method is recommended because it provides higher security than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.

          Help > Anti-DDoS Service > API Reference > API Calling
        • Authentication - Distributed Message Service

          Authentication - Distributed Message Service

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. AK/SK-based authentication is recommended because it provides higher security than token authentication.

          Help > Distributed Message Service > API Reference > Calling APIs
        • Authentication - Relational Database Service

          Authentication - Relational Database Service

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Authentication using AK/SK is recommended because it is more secure than authentication using tokens. Token-based Authentication The validity period of a token is 24 hours.

          Help > Relational Database Service > API Reference > Calling APIs
        • Authentication - GaussDB

          Authentication - GaussDB

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Authentication using AK/SK is recommended because it is more secure than authentication using tokens. Token Authentication The validity period of a token is 24 hours.

          Help > GaussDB > API Reference > Calling APIs
        • Authentication - FunctionGraph

          Authentication - FunctionGraph

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK. Token-based Authentication The validity period of a token is 24 hours.

          Help > FunctionGraph > API Reference > Calling APIs
        • Authentication - Face Recognition Service

          Authentication - Face Recognition Service

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Token-based Authentication The validity period of a token is 24 hours.

          Help > Face Recognition Service > API Reference > Calling APIs
        • Authentication - Document Database Service

          Authentication - Document Database Service

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Authentication using AK/SK is recommended because it is more secure than authentication using tokens. Token Authentication The validity period of a token is 24 hours.

          Help > Document Database Service > API Reference > Calling APIs
        • What Is DEW? - Data Encryption Workshop

          What Is DEW? - Data Encryption Workshop

          Creating a Key Pair Dedicated Hardware Security Module (Dedicated HSM) Dedicated HSM enables data encryption on the cloud, specifically, encrypting and decrypting data, verifying signature, generating keys, and storing keys.

          Help > Data Encryption Workshop > Service Overview
        • Authentication - Identity and Access Management

          Authentication - Identity and Access Management

          (Recommended) AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Token-based Authentication The validity period of a token is 24 hours.

          Help > Identity and Access Management > API Reference > Calling APIs
        • Example of Encryption - Object Storage Service

          Example of Encryption - Object Storage Service

          Encrypting an Object to Be Uploaded Sample code: // Create an instance of ObsClient. var obsClient = new ObsClient({ // Hard-coded or plaintext AK/SK are risky. For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables.

          Help > Object Storage Service > BrowserJS > Server-Side Encryption
        • Client-Side Encryption (SDK for Python) - Object Storage Service

          Client-Side Encryption (SDK for Python) - Object Storage Service

          Default value: None crypto_iv str or bytes No Explanation: Initial value used for encrypting data Restrictions: Length: 16 bytes If crypto_iv is specified, all objects are encrypted using the specified initial value.

          Help > Object Storage Service > Python > Client-Side Encryption APIs (SDK for Python)
        • Managing Host Connections - Data Lake Factory

          Managing Host Connections - Data Lake Factory

          KMS Key Yes Key created on Key Management Service (KMS) and used for encrypting and decrypting user passwords and key pairs. You can select a created key from KMS. Host Connection Description No Descriptive information about the host connection.

          Help > Data Lake Factory > User Guide > Configuration and Management
        • Managing Host Connections - Data Lake Factory

          Managing Host Connections - Data Lake Factory

          KMS Key Yes Key created on Key Management Service (KMS) and used for encrypting and decrypting user passwords and key pairs. You can select a created key from KMS. Host Connection Description No Descriptive information about the host connection.

          Help > Data Lake Factory > User Guide > Configuration and Management
        • Authentication - Conversational Bot Service

          Authentication - Conversational Bot Service

          AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Token-based Authentication A token specifies temporary permissions in a computer system. A token specifies temporary permissions in a computer system.

          Help > Conversational Bot Service > API Reference > Calling APIs
        • Authentication - Workspace

          Authentication - Workspace

          Access Key ID/Secret Access Key (AK/SK)-based authentication: Requests are authenticated by encrypting the request body using an AK/SK. Token Authentication The validity period of a token is 24 hours.

          Help > Workspace > API Reference > Calling APIs
        • COC and Other Services - Cloud Operations Center

          COC and Other Services - Cloud Operations Center

          Encrypting Parameters Account Management

          Help > Cloud Operations Center > Service Overview
        • Connecting to an Instance Using an EIP - GeminiDB

          Connecting to an Instance Using an EIP - GeminiDB

          For details about how to disable SSL, see Encrypting Data over SSL for a GeminiDB Redis Instance. You need to estimate the bandwidth required by services and purchase an EIP with sufficient bandwidth resources.

          Help > GeminiDB > GeminiDB Redis API > Working with GeminiDB Redis API > Instance Connection and Management > Connecting to a GeminiDB Redis Instance Over a Public Network
        Total results: 574
        • Previous
        • 1
        • ...
        • 10
        • 11
        • 12
        • ...
        • 29
        • Next
        • Go
        Load More
        Was this helpful?
        Feedbacks
        /200
        Submit Feedback Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement