检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn

不再显示此消息

  • Intl-English
    International
    • English
    • Bahasa Indonesia
    • Español
    • Português
    • Türkçe
    • عربي
    • ไทย
    • 简体中文
    • 日本語
    中国站
    • 简体中文
    Europe
    • English
    • Deutsch
    • Español
    • Français
    • Nederlands
  • Huawei Cloud
    • Activities
    • Products
    • Solutions
    • Pricing
    • KooGallery
    • Partners
    • Developers
    • Support
    • About Us
    Hot
    • Free Packages
    • Elastic Cloud Server (ECS)
    • Object Storage Service (OBS)
    • ModelArts
    • Cloud Container Engine (CCE)
      Show more results for “”
      • Contact Us
      • Documentation
      • Console
        • My Account
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Sign In Sign Up
      • Sign In
      • Sign Up
        • My Account Complete Sign Up
        • Billing & Costs
        • Service Tickets
        • Unread Messages
        • Console
        • Partner Center
        • Log Out
      Cancel
      Hot
      • Free Packages
      • Elastic Cloud Server (ECS)
      • Object Storage Service (OBS)
      • ModelArts
      • Cloud Container Engine (CCE)
        • All
        • Products
        • Solutions
        • Documentation
        • KooGallery
        • Developer
        • Learn
        • Others
        583 results found.
        • ALTER COLUMN ENCRYPTION KEY - GaussDB

          ALTER COLUMN ENCRYPTION KEY - GaussDB

          Encrypting the plaintext of CEKs does not change the ciphertext of the encrypted columns. Syntax ALTER COLUMN ENCRYPTION KEY column_encryption_key_name WITH VALUES ( CLIENT_MASTER_KEY = client_master_key_name ); Parameters column_encryption_key_name Specifies the key name.

          Help > GaussDB > Developer Guide(Centralized_V2.0-3.x) > SQL Reference > SQL Syntax
        • Copying a Part (SDK for Go) - Object Storage Service

          Copying a Part (SDK for Go) - Object Storage Service

          parameter Explanation: Key for encrypting the object when SSE-C is used Restrictions: The value is a Base64-encoded 256-bit key, for example, K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw=.

          Help > Object Storage Service > Go > Multipart Uploads (SDK for Go)
        • SSE-C - Object Storage Service

          SSE-C - Object Storage Service

          Table 1 Header fields used for encrypting objects in SSE-C mode Element Description x-obs-server-side-encryption-customer-algorithm Indicates the encryption algorithm for the object when SSE-C is used.

          Help > Object Storage Service > API Reference > APIs > Server-Side Encryption
        • Overview - GaussDB(DWS)

          Overview - GaussDB(DWS)

          Overview Encrypting GaussDB(DWS) Databases In GaussDB(DWS), you can enable database encryption for a cluster to protect static data. After you enable encryption, data of the cluster and its snapshots is encrypted.

          Help > GaussDB(DWS) > User Guide > GaussDB(DWS) Cluster Data Security and Encryption > Using KMS to Encrypt GaussDB(DWS) Clusters
        • Uploading a Part (SDK for Go) - Object Storage Service

          Uploading a Part (SDK for Go) - Object Storage Service

          parameter Explanation: Key for encrypting the object when SSE-C is used Restrictions: The value is a Base64-encoded 256-bit key, for example, K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw=.

          Help > Object Storage Service > Go > Multipart Uploads (SDK for Go)
        • Introduction to Database Encryption and Access Control - Database Security Service

          Introduction to Database Encryption and Access Control - Database Security Service

          Figure 1 Network Mode Encrypting Data The system supports data encryption and integrity verification, meeting the evaluation requirements of graded protection and sub-protection as well as the evaluation requirements of storage data integrity and confidentiality assurance in the application

          Help > Database Security Service > User Guide > Enabling and Using Database Security Encryption
        • FAQs - KooGallery

          FAQs - KooGallery

          If they are the same, check whether the encryptType parameter for encrypting and decrypting sensitive information is correctly transferred to KooGallery. If the algorithm is AES256_CBC_PKCS5Padding, the value must be 1.

          Help > KooGallery > Access Guide > SaaS Access Guide V1.0 (Existing Products)
        • Suggestions on APM Security Configuration - Application Performance Management

          Suggestions on APM Security Configuration - Application Performance Management

          Experience and Security Capabilities Properly Using APM Access Keys and Encrypting Them Keeping APM access keys secure and changing them regularly Access Key ID (AK) and Secret Access Key (SK) are your long-term identity credentials.

          Help > Application Performance Management > Best Practices(2.0)
        • Workflow - Elastic Cloud Server

          Workflow - Elastic Cloud Server

          For example, a data security administrator can create IAM users and grant them the minimum permissions, such as creating encryption keys and encrypting sensitive data.

          Help > Elastic Cloud Server > User Guide > QingTian Enclave Management > Examples of Using QingTian Enclave
        • Function-based Encryption - GaussDB(DWS)

          Function-based Encryption - GaussDB(DWS)

          For details, see Encrypting and Decrypting Data Columns. Parent topic: Data Protection Technologies

          Help > GaussDB(DWS) > Service Overview > Security > Data Protection Technologies
        • Overview of Mutual Trust Between MRS Clusters - MapReduce Service

          Overview of Mutual Trust Between MRS Clusters - MapReduce Service

          The current Kerberos server supports only the aes256-cts-hmac-sha1-96:normal and aes128-cts-hmac-sha1-96:normal encryption types for encrypting cross-domain users, and the encryption types cannot be changed.

          Help > MapReduce Service > User Guide > MRS Cluster O&M > MRS Cluster Security Configuration > Cluster Mutual Trust Management
        • Key Algorithms Supported by KMS - Data Encryption Workshop

          Key Algorithms Supported by KMS - Data Encryption Workshop

          Symmetric keys are suitable for encrypting and decrypting data. Asymmetric key ECC EC_P256 EC_P384 Elliptic curve recommended by NIST Digital signature and signature verification Asymmetric key ML-DSA NOTE: To enable the ML-DSA algorithm, submit a service ticket.

          Help > Data Encryption Workshop > FAQs > KMS Related
        • Data Protection Technologies - Data Encryption Workshop

          Data Protection Technologies - Data Encryption Workshop

          Encrypting or Decrypting a Large Amount of Data Key rotation mechanism Keys that are widely or repeatedly used are insecure. DEW allows you to periodically rotate keys and change the key materials to comply with encryption best practices.

          Help > Data Encryption Workshop > Service Overview > Security
        • Conformance Package for ENISA Requirements - Config

          Conformance Package for ENISA Requirements - Config

          This compromises data security, and public access cannot be enabled. 6_SECURE DEVICES: ENCRYPTION Protect data by encrypting it. SMEs should ensure the data stored on mobile devices such as laptops, smartphones, and tables are encrypted.

          Help > Config > User Guide > Conformance Packages > Conformance Package Templates
        • Signing an Image - SoftWare Repository for Container

          Signing an Image - SoftWare Repository for Container

          and decrypting a small amount of data, or creating digital signatures Asymmetric ECC EC_P256 ECDSA_SHA_256 EC_P384 ECDSA_SHA_384 NIST Elliptic Curve Cryptography (ECC) Creating digital signatures Asymmetric SM2 SM2 SM2 asymmetric key Encrypting and decrypting a small amount of data

          Help > SoftWare Repository for Container > User Guide(Enterprise Edition) > Image Signatures
        • Obtaining Object Metadata (SDK for Go) - Object Storage Service

          Obtaining Object Metadata (SDK for Go) - Object Storage Service

          parameter Explanation: Key for encrypting the object when SSE-C is used Restrictions: The value is a Base64-encoded 256-bit key, for example, K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw=.

          Help > Object Storage Service > Go > Objects (SDK for Go)
        • What's New - Data Encryption Workshop

          What's New - Data Encryption Workshop

          Feature Description Phase Document 1 Key import A CMK contains key metadata (key ID, key alias, description, key status, and creation date) and key materials used for encrypting and decrypting data.

          Help > Data Encryption Workshop > What's New
        • What's New - Data Encryption Workshop

          What's New - Data Encryption Workshop

          Feature Description Phase Document 1 Key import A CMK contains key metadata (key ID, key alias, description, key status, and creation date) and key materials used for encrypting and decrypting data.

          Help > Data Encryption Workshop > What's New
        • Copying an Object (SDK for Go) - Object Storage Service

          Copying an Object (SDK for Go) - Object Storage Service

          parameter Explanation: Key for encrypting the object when SSE-C is used Restrictions: The value is a Base64-encoded 256-bit key, for example, K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw=.

          Help > Object Storage Service > Go > Objects (SDK for Go)
        • Performing a Server-Side Encryption - Relational Database Service

          Performing a Server-Side Encryption - Relational Database Service

          Encrypting Disks Using Server-Side Encryption For server-side encryption, you need to first create a key using DEW or use the default key that DEW comes with. When creating a DB instance, select Enable for Disk Encryption and select or create a key.

          Help > Relational Database Service > User Guide > Working with RDS for SQL Server > Security and Encryption
        Total results: 583
        • Previous
        • 1
        • ...
        • 5
        • 6
        • 7
        • ...
        • 30
        • Next
        • Go
        Load More
        Was this helpful?
        Feedbacks
        /200
        Submit Feedback Cancel
        Contact Sales After-Sales Self Service
        • Site Terms
        • Privacy Statement

        Explore Huawei Cloud

        Why Us Customer Stories Trust Center Legal Press Releases

        Featured Services

        Elastic Cloud Server (ECS) Elastic IP (EIP) RDS for MySQL Elastic Volume Service (EVS) MapReduce Service (MRS)

        Service and Support

        Documentation Contact Us Public Notices Support Plans Service Health Dashboard

        Account and Payment

        Top Up Invoices Billing Center My Account Payment Method

        Quick Links

        Huawei Corporate Huawei Enterprise Huawei Consumer Business Huawei Developers

        © 2025, Huawei Cloud Computing Technologies Co., Ltd. and/or its affiliates. All rights reserved.

        • Site Terms
        • Privacy Statement