检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • Others
        574 results found.
        • Simulated Encryption Test - Database Security Service

          Simulated Encryption Test - Database Security Service

          Simulated Encryption Test Before configuring the encryption task, you are advised to perform a simulated encryption test to check whether the encryption is normal. Procedure Log in to a database encryption and access control instance as the sysadmin user. In the navigation tree, choose

          Help > Database Security Service > User Guide > Database Security Encryption Management > System administrator operation guide > Data Encryption and Decryption
        • Encryption Table Management - Database Security Service

          Encryption Table Management - Database Security Service

          Encryption Table Management For encrypted tables, functions such as Edit Index and Edit Non-encrypted Column are supported on the web page. Editing Index When the data volume is large (for example, more than 10 million rows), querying encrypted columns is time-consuming. You can add

          Help > Database Security Service > User Guide > Database Security Encryption Management > System administrator operation guide > Data Encryption and Decryption
        • Will I Be Billed for the Encryption Provided by OBS Server-Side Encryption? - Object Storage Service

          Will I Be Billed for the Encryption Provided by OBS Server-Side Encryption? - Object Storage Service

          Will I Be Billed for the Encryption Provided by OBS Server-Side Encryption? When using SSE-KMS, you are billed for both storage and KMS key requests. When using SSE-OBS and SSE-C, you are only billed for storage. To learn the billing for KMS key requests, see How Is DEW Charged? To

          Help > Object Storage Service > FAQs > Server-Side Encryption
        • CREATE COLUMN ENCRYPTION KEY - GaussDB

          CREATE COLUMN ENCRYPTION KEY - GaussDB

          CREATE COLUMN ENCRYPTION KEY Function CREATE COLUMN ENCRYPTION KEY creates a CEK that can be used to encrypt a specified column in a table. Precautions This syntax is specific to a fully-encrypted database. When using gsql to connect to a database server, you need to use the -C parameter

          Help > GaussDB > Developer Guide(Distributed_V2.0-2.x)
        • Obtaining Bucket Encryption Configuration - Object Storage Service

          Obtaining Bucket Encryption Configuration - Object Storage Service

          Obtaining Bucket Encryption Configuration Functions OBS uses the GET method to obtain the encryption configuration of a specified bucket. To perform this operation, you must have the GetEncryptionConfiguration permission. By default, only the bucket owner can delete the tags of a

          Help > Object Storage Service > API Reference > APIs > Advanced Bucket Settings
        • Deleting the Encryption Configuration of a Bucket - Object Storage Service

          Deleting the Encryption Configuration of a Bucket - Object Storage Service

          Deleting the Encryption Configuration of a Bucket Functions OBS uses the DELETE method to delete the encryption configuration of a specified bucket. To perform this operation, you must have the PutEncryptionConfiguration permission. By default, only the bucket owner can delete the

          Help > Object Storage Service > API Reference > APIs > Advanced Bucket Settings
        • DROP COLUMN ENCRYPTION KEY - GaussDB

          DROP COLUMN ENCRYPTION KEY - GaussDB

          DROP COLUMN ENCRYPTION KEY Function CREATE COLUMN ENCRYPTION KEY deletes a column encryption key (CEK). Precautions Only the CEK owner or a user who has been granted the DROP permission can run this command. By default, the system administrator has this permission. Syntax 1 DROP COLUMN

          Help > GaussDB > Developer Guide(Distributed_V2.0-2.x)
        • Configuring the Hive Column Encryption - MapReduce Service

          Configuring the Hive Column Encryption - MapReduce Service

          Configuring the Hive Column Encryption Scenario Hive supports encryption of one or multiple columns in a table. When creating a Hive table, you can specify the column to be encrypted and encryption algorithm. When data is inserted into the table using the insert statement, the related

          Help > MapReduce Service > Component Operation Guide (Normal) > Using Hive > Configuring Hive Data Storage and Encryption
        • Configuring Flink Authentication and Encryption - MapReduce Service

          Configuring Flink Authentication and Encryption - MapReduce Service

          Configuring Flink Authentication and Encryption Security Authentication Flink supports the following authentication modes: Kerberos authentication: It is used between the Flink Yarn client and Yarn ResourceManager, JobManager and ZooKeeper, JobManager and HDFS, TaskManager and HDFS

          Help > MapReduce Service > Component Operation Guide (Normal) > Using Flink > Flink User Permission Management
        • Configuring the Hive Column Encryption - MapReduce Service

          Configuring the Hive Column Encryption - MapReduce Service

          Configuring the Hive Column Encryption Scenario Hive supports encryption of one or multiple columns in a table. When creating a Hive table, you can specify the column to be encrypted and encryption algorithm. When data is inserted into the table using the insert statement, the related

          Help > MapReduce Service > Component Operation Guide (LTS) > Using Hive > Configuring Hive Data Storage and Encryption
        • Configuring Flink Authentication and Encryption - MapReduce Service

          Configuring Flink Authentication and Encryption - MapReduce Service

          Configuring Flink Authentication and Encryption Security Authentication Flink supports the following authentication modes: Kerberos authentication: It is used between the Flink Yarn client and Yarn ResourceManager, JobManager and ZooKeeper, JobManager and HDFS, TaskManager and HDFS

          Help > MapReduce Service > Component Operation Guide (LTS) > Using Flink > Flink User Permission Management
        • Using the Homomorphic Encryption Library - Blockchain Service

          Using the Homomorphic Encryption Library - Blockchain Service

          Using the Homomorphic Encryption Library This section describes how to use the homomorphic encryption library. Procedure Buy a BCS instance and downloading files. When buying a BCS instance, select ECDSA for Security Mechanism. After the subscription, download the homomorphic encryption

          Help > Blockchain Service > Developer Guide > Appendix > Homomorphic Encryption
        • Attribute-based Encryption Key Management - Blockchain Service

          Attribute-based Encryption Key Management - Blockchain Service

          Attribute-based Encryption Key Management Initializing an ABE Master Key Updating an ABE Master Key Querying an ABE Master Key Applying for an ABE User Key Authorizing an ABE User Key Querying an ABE User Key Application Decrypting Data with ABE User Keys Parent topic: Trusted Data

          Help > Blockchain Service > Developer Guide > Blockchain Middleware APIs > Trusted Data Exchange (OBT)
        • Protecting Videos with HLS Encryption - Video On Demand

          Protecting Videos with HLS Encryption - Video On Demand

          Protecting Videos with HLS Encryption Environment Preparation You have downloaded the SDK. Scenario Description Hotlink protection prevents unauthorized users from downloading or playing VOD content. However, this cannot prevent malicious paid users from downloading the content to

          Help > Video On Demand > Best Practices
        • Enabling HTTPS Encryption for Websites - Cloud Certificate Manager

          Enabling HTTPS Encryption for Websites - Cloud Certificate Manager

          Enabling HTTPS Encryption for Websites An SSL certificate secures the communication between the website and the client and authenticates the identity of the website. This topic walks you through how to enable HTTPS-encrypted communication with SSL certificates from the scratch. Figure

          Help > Cloud Certificate Manager > Best Practices > Best Practices for SSL Certificate Manager
        • Compatibility Check of Secret Encryption - Cloud Container Engine

          Compatibility Check of Secret Encryption - Cloud Container Engine

          Compatibility Check of Secret Encryption Check Items Check whether the target version supports secret encryption. If it does not, clusters that have this feature enabled cannot be upgraded to the target version. Solution Secret encryption is supported in CCE clusters of v1.27 or later

          Help > Cloud Container Engine > User Guide (ME-Abu Dhabi Region) > Clusters > Upgrading a Cluster > Troubleshooting for Pre-upgrade Check Exceptions
        • HBase Secure Channel Encryption - CloudTable Service

          HBase Secure Channel Encryption - CloudTable Service

          HBase Secure Channel Encryption You can enable secure channel encryption to encrypt data transmission. This section describes how to enable the security channel for an HBase cluster. Enabling security channel may cause performance deterioration in a cluster. Enabling Channel Encryption

          Help > CloudTable Service > User Guide > Using HBase > HBase Cluster Management
        • Compatibility Check of Secret Encryption - Cloud Container Engine

          Compatibility Check of Secret Encryption - Cloud Container Engine

          Compatibility Check of Secret Encryption Check Items Check whether the target version supports secret encryption. If it does not, clusters that have this feature enabled cannot be upgraded to the target version. Solution Secret encryption is supported in CCE clusters of v1.27 or later

          Help > Cloud Container Engine > User Guide > Clusters > Upgrading a Cluster > Troubleshooting for Pre-upgrade Check Exceptions
        • SEC07-04 Static Data Encryption - Well-Architected Framework

          SEC07-04 Static Data Encryption - Well-Architected Framework

          SEC07-04 Static Data Encryption Encryption prevents unauthorized users from accessing and stealing data. Sensitive static data should be encrypted by default to ensure confidentiality even if the data is accessed or disclosed without authorization. Risk level High Key strategies Enable

          Help > Well-Architected Framework > Well-Architected Framework and Practices > Security Pillar > Data Security and Privacy Protection > SEC07 General Data Security
        • SEC07-05 Transmission Data Encryption - Well-Architected Framework

          SEC07-05 Transmission Data Encryption - Well-Architected Framework

          SEC07-05 Transmission Data Encryption Encrypt data during transmission to prevent data from being stolen, tampered with, or viewed by unauthorized users. Risk level High Key strategies Using encryption protocols: Ensure that secure encryption protocols are used to encrypt data and

          Help > Well-Architected Framework > Well-Architected Framework and Practices > Security Pillar > Data Security and Privacy Protection > SEC07 General Data Security
        Total results: 574
        • Previous
        • 1
        • ...
        • 23
        • 24
        • 25
        • ...
        • 29
        • Next
        • Go
        Load More
        Was this helpful?
        Feedbacks
        /200
        Submit Feedback Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement