检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Authentication using AK/SK is recommended because it is more secure than authentication using tokens. Token Authentication The validity period of a token is 24 hours.
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Authentication using AK/SK is recommended because it is more secure than authentication using tokens. Token-based Authentication The validity period of a token is 24 hours.
For details about how to disable SSL, see Encrypting Data over SSL for a GeminiDB Redis Instance. Prerequisites An ECS has been created. The following uses a Linux ECS as an example. For details, see Purchasing an ECS in Getting Started with Elastic Cloud Server.
Default value: None crypto_iv str or bytes No Explanation: Initial value used for encrypting data Restrictions: Length: 16 bytes If crypto_iv is specified, all objects are encrypted using the specified initial value.
SseKms string Explanation: SSE-KMS is used for encrypting objects on the server side. SseKmsKey string Explanation: ID of the KMS master key when SSE-KMS is used. SseC string Explanation: SSE-C is used for encrypting objects on the server side.
For details, see Encrypting the Database. After a normal cluster is created, you can convert it to an encrypted cluster. After Encrypt DataStore is enabled, the key cannot be disabled, deleted, or frozen when being used.
For details about how to encrypt and decrypt a DEK for a user application, see sections "Encrypting a DEK" and "Decrypting a DEK" in Data Encryption Workshop API Conference. Parent Topic: Creating a Key
KMS Key Yes Key created on Key Management Service (KMS) and used for encrypting and decrypting user passwords and key pairs. You can select a created key from KMS. Host Connection Description No Descriptive information about the host connection.
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Token-based Authentication A token specifies temporary permissions in a computer system. A token specifies temporary permissions in a computer system.
KMS Key Yes Key created on Key Management Service (KMS) and used for encrypting and decrypting user passwords and key pairs. You can select a created key from KMS. Host Connection Description No Descriptive information about the host connection.
Access Key ID/Secret Access Key (AK/SK) authentication: Requests are authenticated by encrypting the request body using an AK/SK. AK/SK Authentication AK/SK authentication supports API requests with a body no larger than 12 MB.
The authorized operations must at least contain Querying key details, Encrypting data, and Decrypting data. After the conversion, you can click the cluster name to go to the Cluster Details page to view the cluster details.
Encrypting Parameters Account Management
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. This method is recommended because it provides higher security than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. This method is recommended because it is more secure than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.
For details, see Encrypting Data over SSL. Enabling Static Data Encryption Static data encryption improves data security. For details, see the description about static data encryption in Buying a GeminiDB Redis Instance.
For details, see Encrypting Data over SSL. Enabling Disk Encryption Disk encryption improves data security. For details, see the description about disk encryption in Buying a GeminiDB Influx Instance.
SseKms string Explanation: SSE-KMS is used for encrypting objects on the server side. SseKmsKey string Explanation: ID of the KMS master key when SSE-KMS is used. SseC string Explanation: SSE-C is used for encrypting objects on the server side.
Encrypting an Object to Be Uploaded Sample code: // Initialize configuration parameters. ObsConfig config = new ObsConfig(); config.Endpoint = "https://your-endpoint"; // Hard-coded or plaintext AK/SK are risky.
SseKms string Explanation: SSE-KMS is used for encrypting objects on the server side. SseKmsKey string Explanation: ID of the KMS master key when SSE-KMS is used. SseC string Explanation: SSE-C is used for encrypting objects on the server side.