检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Encrypting AK/SK for Deploying an APM Agent in a CCE Container Background When an APM Agent is deployed in a CCE container, the AK/SK must be encrypted for security purposes. Procedure Generate a JAR package that contains the decryption method.
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an Access Key ID/Secret Access Key (AK/SK) pair. Token-based Authentication The validity period of a token is 24 hours.
Encrypting AK/SK for Deploying an APM Agent in a CCE Container Encrypt the AK/SK when deploying an APM Agent on CCE. Suggestions on APM Security Configuration This document provides guidance for enhancing the overall security of APM.
Experience and Security Capabilities Properly Using APM Access Keys and Encrypting Them Keeping APM access keys secure and changing them regularly Access Key ID (AK) and Secret Access Key (SK) are your long-term identity credentials.