检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
After user 1 grants permissions, the system automatically creates key evs/default for encrypting EVS disks. When user 1 uses the encryption feature for the first time, the user must grant the KMS access permissions to EVS.
Example of Encryption Encrypting an Object to Be Uploaded Sample code: SSE-C encryption static OBSClient *client; NSString *endPoint = @"your-endpoint"; // Hard-coded or plaintext AK/SK are risky.
Example of Encryption Encrypting an Object to Be Uploaded Sample code: SSE-C encryption static OBSClient *client; NSString *endPoint = @"your-endpoint"; // Hard-coded or plaintext AK/SK are risky.
Encrypting an Object to Be Uploaded Sample code: // Hard-coded or plaintext AK/SK are risky. For security purposes, encrypt your AK/SK and store them in the configuration file or environment variables.
Envelope Encryption Envelope encryption is the practice of encrypting data with a DEK and then encrypting the DEK with a root key that you can fully manage. In this case, CMKs are not required for encryption or decryption. DEK A data encryption key (DEK) is used to encrypt data.
Related operations: Encryption Methods Encrypting an Image Image Encryption FAQ Replicating Images Within a Region You can replicate an image within a region to make encrypted or unencrypted copies or enable some advanced features (such as fast server creation).
For example, a data security administrator can create IAM users and grant them the minimum permissions, such as creating encryption keys and encrypting sensitive data.
SseKms string Explanation: SSE-KMS is used for encrypting objects on the server side. SseKmsKey string Explanation: ID of the KMS master key when SSE-KMS is used. SseC string Explanation: SSE-C is used for encrypting objects on the server side.
SseKms string Explanation: SSE-KMS is used for encrypting objects on the server side. SseKmsKey string Explanation: ID of the KMS master key when SSE-KMS is used. SseC string Explanation: SSE-C is used for encrypting objects on the server side.
SseKms string Explanation: SSE-KMS is used for encrypting objects on the server side. SseKmsKey string Explanation: ID of the KMS master key when SSE-KMS is used. SseC string Explanation: SSE-C is used for encrypting objects on the server side.
parameter Explanation: Key for encrypting the object when SSE-C is used Restrictions: The value is a Base64-encoded 256-bit key, for example, K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw=.
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK. AK/SK-based authentication is recommended as it provides higher security.
EVS Encryption Encrypting Images Cloud Trace Service (CTS) Records ECS-related operations for later query, auditing, and backtracking. Supported CTS Operations Cloud Backup and Recovery (CBR) Backs up EVS disks and ECSs for fault recovery.
Obtain the key file for encrypting the repository and store it on the local computer. Go to the repository directory and right-click Git Bash. Run the decryption command.
SseKms string Explanation: SSE-KMS is used for encrypting objects on the server side. SseKmsKey string Explanation: ID of the KMS master key when SSE-KMS is used. SseC string Explanation: SSE-C is used for encrypting objects on the server side.
parameter Explanation: Key for encrypting the object when SSE-C is used Restrictions: The value is a Base64-encoded 256-bit key, for example, K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw=.
Encrypting an Object to Be Uploaded Sample code: // Import the dependency library. require 'vendor/autoload.php'; // Import the SDK code library during source code installation. // require 'obs-autoloader.php'; // Declare the namespace. use Obs\ObsClient; // Create an instance of
SseKms string Explanation: SSE-KMS is used for encrypting objects on the server side. SseKmsKey string Explanation: ID of the KMS master key when SSE-KMS is used. SseC string Explanation: SSE-C is used for encrypting objects on the server side.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
This parameter must be used with kms_id. kms_id String Key ID used for transferring and encrypting trace files. This key ID is obtained from Key Management Service (KMS).