检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Algorithm Method of encrypting connections between the user and the server. Global Permissions Permissions granted to the user to perform operations on all databases in the current instance. For details about the global permissions that can be configured, see Table 2.
You can use this tool to obtain the encrypted value. timeStamp Timestamp used for encrypting the password. The time format is YYYYMMDDHH. Figure 2 Example Initiating a Pressure Test In the JMeter directory on the left, choose Thread Group, set Number of Threads to 10000.
If the metadata contains sensitive data, take appropriate measures to protect the sensitive data, for example, controlling access permissions and encrypting the data. Constraints N/A Range A maximum of 10 key-value pairs can be injected.
Certificate Source: source of a certificate for encrypting and authenticating HTTPS data transmission. If you select a TLS key, you must create a key certificate of the IngressTLS or kubernetes.io/tls type beforehand. For details, see Creating a Secret.
String Definition: Indicates the MD5 value of the key for encrypting the part when SSE-C is used. The MD5 value is used to ensure data integrity during key transmission.
Default value: None Table 2 SseCHeader Parameter Type Mandatory (Yes/No) Description encryption str Yes Explanation: SSE-C used for encrypting objects Value range: AES256 Default value: None key str Yes Explanation: Key used in SSE-C encryption.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in bytes. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
Example: "expiry-date=\"Mon, 11 Sep 2023 00:00:00 GMT\"" Default value: None sseKms str Explanation: SSE-KMS is used for encrypting objects on the server side.
If there is no such a default master key, OBS will create one and use it by default. sseC str Explanation: SSE-C algorithm Value range: AES256 Default value: None sseCKeyMd5 str Explanation: MD5 value of the key for encrypting objects when SSE-C is used.
If there is no such a default master key, the system will create one and use it by default. sseC str Explanation: SSE-C algorithm Value range: AES256 Default value: None sseCKeyMd5 str Explanation: MD5 value of the key for encrypting objects when SSE-C is used.
Default value: None sseCKey byte[] Yes Explanation: Original key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded original key used for encrypting the object when SSE-C is used.
Data Security Encrypting and Decrypting Data Columns Data encryption is widely used in information systems to prevent unauthorized access and data leakage.
Symmetric keys are suitable for encrypting and decrypting data. Asymmetric key ECC EC_P256 EC_P384 Elliptic curve recommended by NIST Digital signature and signature verification Asymmetric key ML-DSA NOTE: To enable the ML-DSA algorithm, submit a service ticket.
Default value: None cryptoKeyBytes byte[] Yes Explanation: Data key used for encrypting data. Restrictions: The value must be 32 bytes long. Default value: None cryptoIvBytes byte[] No Explanation: Initial value used for encrypting data.
Default value: None sseCKey byte[] Yes Explanation: Key used for encrypting the object when SSE-C is used, in byte[] format. Default value: None sseCKeyBase64 String No Explanation: Base64-encoded key used for encrypting the object when SSE-C is used.
SseC: 'AES256', // Specify the same key you used for encrypting the object during the upload. SseCKey: 'your sse-c key generated by AES-256 algorithm' }; // Download the encrypted object.
If the metadata contains sensitive data, take appropriate measures to protect the sensitive data, for example, controlling access permissions and encrypting the data. Constraints N/A Range A maximum of 10 key-value pairs can be injected.
Encrypting disks EVS DEW To use the disk encryption function, an IAM user must be granted SMS FullAccess and EVS KMSAccess. Viewing the migration progress / No other roles or policies are required. To view the migration progress, an IAM user must be granted SMS ReadOnlyAccess.
AK/SK-based authentication: Requests are authenticated by encrypting the request body using an AK/SK pair. Token-based Authentication A token specifies temporary permissions in a computer system.
authorization policy is as follows: { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "kms:Decrypt", "Resource": "arn:huaweicloud:kms:REGION:ACCOUNT_ID:keyring/kms-ring-123456/key/kms-key-123456" } ] } Add the KMS SDK code snippet to obtain the key for encrypting