检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Algorithm Method of encrypting connections between the user and the server. Global Permissions Permissions granted to the user to perform operations on all databases in the current instance. For details about the global permissions that can be configured, see Table 3.
Algorithm Method of encrypting connections between the user and the server. Global Permissions Permissions granted to the user to perform operations on all databases in the current instance. For details about the global permissions that can be configured, see Table 2.
Algorithm Method of encrypting connections between the user and the server. Global Permissions Permissions granted to the user to perform operations on all databases in the current instance. For details about the global permissions that can be configured, see Table 3.
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. AK/SK-based authentication is recommended because it is more secure than token-based authentication. Token-based Authentication The validity period of a token is 24 hours.