检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • Others
        572 results found.
        • Purchasing an EVS Disk - Elastic Volume Service

          Purchasing an EVS Disk - Elastic Volume Service

          For details, see Encrypting Images. Before using encryption, you need to create an agency to grant KMS access permissions to EVS. If you have the right to grant the permission, grant KMS access permissions to EVS directly.

          Help > Elastic Volume Service > User Guide > Purchasing and Using an EVS Disk
        • Submitting a Flink Jar Job Using DLI - Data Lake Insight

          Submitting a Flink Jar Job Using DLI - Data Lake Insight

          Data Encryption Workshop (DEW) is a secure, reliable, and easy-to-use solution for encrypting and decrypting private data while ensuring its security. This example introduces how to create a shared secret in DEW. Log in to the DEW management console.

          Help > Data Lake Insight > Getting Started
        • Creating a Tracker - Cloud Trace Service

          Creating a Tracker - Cloud Trace Service

          This parameter must be used with kms_id. kms_id No String Key ID used for transferring and encrypting trace files. This key ID is obtained from Key Management Service (KMS). This parameter is valid when tracker_type is set to system.

          Help > Cloud Trace Service > API Reference > V3 APIs (Recommended) > Tracker Management
        • Buying a Primary/Standby GeminiDB Redis Instance - GeminiDB

          Buying a Primary/Standby GeminiDB Redis Instance - GeminiDB

          For details, see Encrypting Data over SSL for a GeminiDB Redis Instance. Rename High-risk Command To prevent data loss, instance restart, and performance jitter caused by misoperations, you can rename high-risk commands of a GeminiDB Redis instance.

          Help > GeminiDB > GeminiDB Redis API > Working with GeminiDB Redis API > Buying a GeminiDB Redis Instance
        • Supported Features - API Gateway

          Supported Features - API Gateway

          breakers No - - - - - content_type_configurable Returning request parameter type (Content-Type) when querying APIs No - - - - - rate_limit_plugin Request throttling plug-ins No - - - - - breakerv2 Circuit breakers for degrading services in case of overload No - - - - - sm_cipher_type Encrypting

          Help > API Gateway > API Reference > Appendix
        • Obtaining Metadata - Elastic Cloud Server

          Obtaining Metadata - Elastic Cloud Server

          Notes If the metadata contains sensitive data, take appropriate measures to protect the sensitive data, for example, controlling access permissions and encrypting the data.

          Help > Elastic Cloud Server > User Guide > Instances > Managing ECS Configurations > Obtaining Metadata and Passing User Data
        • QingTian Enclave Application Development on Linux - Elastic Cloud Server

          QingTian Enclave Application Development on Linux - Elastic Cloud Server

          For details, see Encrypting and Decrypting Small-size Data Online Using a Custom Key. Set the dataInputStr parameter in /home/huawei-qingtian/enclave/qtsm-sdk-java/kms-cms-java/com/huawei/src/test/TestKmsCmsProxy.java to the encrypted ciphertext.

          Help > Elastic Cloud Server > User Guide > QingTian Enclave Management > QingTian Enclave Application Development
        • Copying an Object (SDK for Node.js) - Object Storage Service

          Copying an Object (SDK for Node.js) - Object Storage Service

          Value range: None Default value: None CopySourceSseC string Yes when SSE-C is used Explanation: SSE-C is used for encrypting objects on the server side. Restrictions: Only AES256 is supported.

          Help > Object Storage Service > Node.js > Object Management (SDK for Node.js)
        • Querying a Tracker - Cloud Trace Service

          Querying a Tracker - Cloud Trace Service

          Table 4 TrackerResponseBody Parameter Type Description id String Unique tracker ID. create_time Long Timestamp when the tracker was created. kms_id String Key ID used for transferring and encrypting trace files. This key ID is obtained from Key Management Service (KMS).

          Help > Cloud Trace Service > API Reference > V3 APIs (Recommended) > Tracker Management
        • Buying a GeminiDB Redis Cluster Instance - GeminiDB

          Buying a GeminiDB Redis Cluster Instance - GeminiDB

          For details, see Encrypting Data over SSL for a GeminiDB Redis Instance. Redis Cluster GeminiDB Redis instances do not support SSL. Parameter Template You can use parameters in a parameter template to manage database API configurations.

          Help > GeminiDB > GeminiDB Redis API > Working with GeminiDB Redis API > Buying a GeminiDB Redis Instance
        • Common Methods for Connecting to a DDS Instance - Document Database Service

          Common Methods for Connecting to a DDS Instance - Document Database Service

          Java Mongo How to Use If you are connecting to an instance using Java, an SSL certificate is optional, but downloading an SSL certificate and encrypting the connection will improve the security of your instance.

          Help > Document Database Service > Best Practices
        • Appending an Object - Object Storage Service

          Appending an Object - Object Storage Service

          Example: x-obs-server-side-encryption-customer-algorithm:AES256 Restrictions: None Value range: AES256 Default value: None x-obs-server-side-encryption-customer-key-MD5 String Explanation: Indicates the MD5 value of the key for encrypting objects.

          Help > Object Storage Service > API Reference > APIs > Operations on Objects
        • Initiating a Multipart Upload - Object Storage Service

          Initiating a Multipart Upload - Object Storage Service

          Explanation: The key used for encrypting an object. Example: x-obs-server-side-encryption-customer-key:K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw= Restrictions: This header is used only when SSE-C is used.

          Help > Object Storage Service > API Reference > APIs > Operations on Multipart Upload
        • Creating an ECS That Supports InfiniBand NICs - High Performance Computing

          Creating an ECS That Supports InfiniBand NICs - High Performance Computing

          Xrole Name: EVSAccessKMS: indicates that rights have been granted to EVS to obtain KMS keys for encrypting or decrypting EVS disks. KMS Key ID: specifies the ID of the key used by the encrypted data disk.

          Help > High Performance Computing > User Guide > Typical Applications in the ECS Scenario
        • Creating an ECS That Supports InfiniBand NICs - High Performance Computing

          Creating an ECS That Supports InfiniBand NICs - High Performance Computing

          Xrole Name: EVSAccessKMS: indicates that rights have been granted to EVS to obtain KMS keys for encrypting or decrypting EVS disks. KMS Key ID: specifies the ID of the key used by the encrypted data disk.

          Help > High Performance Computing > User Guide > Typical Applications in the ECS Scenario
        • Creating an Image - Image Management Service

          Creating an Image - Image Management Service

          For details about automatic configuration, see Registering an Image File as a Private Image. cmk_id No String Specifies a custom key used for encrypting an image. For its value, see the Key Management Service User Guide. tags No Array of strings Lists the image tags.

          Help > Image Management Service > API Reference > IMS APIs > Image
        • Create a File System - Scalable File Service

          Create a File System - Scalable File Service

          When SFSAccessKMS is displayed for Agency Name, the KMS access rights have been granted to SFS Capacity-Oriented, and SFS Capacity-Oriented can obtain KMS keys for encrypting or decrypting the file system.

          Help > Scalable File Service > Getting Started
        • Buying a Custom MRS Cluster - MapReduce Service

          Buying a Custom MRS Cluster - MapReduce Service

          - Cryptographic Algorithm Algorithm used for encrypting and decrypting passwords in the cluster system. International: general encryption algorithm Chinese: SM series cryptographic algorithms are compatible with general cryptographic algorithms.

          Help > MapReduce Service > User Guide > Buying MRS Clusters
        • Signature Verification - OneAccess

          Signature Verification - OneAccess

          Encrypting a Plaintext Concatenate plaintext strings, which consist of a 16-byte random characters and a plaintext msg, and are separated by ampersands (&).

          Help > OneAccess > Developer Guide > Synchronizing Data to Applications Through Event Callback > Calling Methods
        • Creating a GaussDB(DWS)Storage-Compute Coupled Cluster - GaussDB(DWS)

          Creating a GaussDB(DWS)Storage-Compute Coupled Cluster - GaussDB(DWS)

          The authorized operations must at least contain Querying key details, Encrypting data, and Decrypting data. Specify whether to enable the IPv6 dual stack for the cluster. If this function is enabled, a client or application can connect to the database using an IPv6 address.

          Help > GaussDB(DWS) > User Guide > Creating a GaussDB(DWS) Cluster > Creating a Dedicated GaussDB(DWS) Cluster
        Total results: 572
        • Previous
        • 1
        • ...
        • 18
        • 19
        • 20
        • ...
        • 29
        • Next
        • Go
        Load More
        Was this helpful?
        Feedbacks
        /200
        Submit Feedback Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement