检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
This parameter must be used with kms_id. kms_id No String Key ID used for transferring and encrypting trace files. This key ID is obtained from Key Management Service (KMS).
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Token-based Authentication The validity period of a token is 24 hours.
Table 1 Key algorithms supported by SWR Key Algorithm Specifications Description Used For Asymmetric ECC EC_P256 ECDSA_SHA_256 EC_P384 ECDSA_SHA_384 NIST Elliptic Curve Cryptography (ECC) Creating digital signatures Asymmetric SM2 SM2 SM2 asymmetric key Encrypting and decrypting a
SseC String Algorithm used in SSE-C SseCKeyMd5 String MD5 value of the key for encrypting objects when SSE-C is used. This value is used to check whether any error occurs during the transmission of the key.
For details, see Encrypting Data over SSL. Enabling SSL and Setting the CCM PCA or SSL Certificate Since April 2017, GeminiDB has offered a new root certificate that has a 20-year validation period. The new certificate takes effect after DB instances are rebooted.
Default value: None sseKms str Explanation: SSE-KMS is used for encrypting objects on the server side.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
SseKms string Explanation: SSE-KMS is used for encrypting objects on the server side. SseKmsKey string Explanation: ID of the KMS master key when SSE-KMS is used. SseC string Explanation: SSE-C is used for encrypting objects on the server side.
Feature Description Phase Document 1 Ransomware prevention HSS monitors critical files stored on your servers and prevents unauthorized applications from encrypting or modifying the files, protecting your servers from ransomware.
The public key is used only for encrypting data during the agreement. Decipher only: Select this usage if Key agreement is selected. The public key is used only deciphering data during the key agreement. Extended key usage Extended usage of the certificate key.
This parameter must be used with kms_id. kms_id String Key ID used for transferring and encrypting trace files. This key ID is obtained from Key Management Service (KMS).
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an Access Key ID/Secret Access Key (AK/SK) pair. Token Authentication A token is a character string generated by the server and is used as a token for a client to send a request.
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair.
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair.
HTTPS enhances cluster security by encrypting all communication over the public network. User permissions can be configured to ensure proper isolation.
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair.
For details about the example code, see ISV Server Encrypting the Username and Password After Resource Enabling. ip No String 64 IP address of the website. memo No String 1,024 Remarks. For details about how to obtain accessKey, see Obtaining the Key.
Example: "expiry-date=\"Mon, 11 Sep 2023 00:00:00 GMT\"" Default value: None sseKms str Explanation: SSE-KMS is used for encrypting objects on the server side.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
HTTPS enhances cluster security by encrypting all communication over the public network. User permissions can be configured to ensure proper isolation.