检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Default value: off encrypt_algo Specifies the algorithm for encrypting indexes. This parameter must be used together with enable_tde. Value range: a string. The value can be AES_128_CTR or SM4_CTR.
Data Encryption Workshop (DEW) is a secure, reliable, and easy-to-use solution for encrypting and decrypting private data while ensuring its security. This example introduces how to create a shared secret in DEW. Log in to the DEW management console.
For details, see Encrypting and Decrypting Data Columns. Viewing Audit Logs to Check the Users Who Have Modified Service Data Database audit logs record users' daily activities, including accessing and modifying service data.
For details, see Encrypting Images. Before using encryption, you need to create an agency to grant KMS access permissions to EVS. If you have the right to grant the permission, grant KMS access permissions to EVS directly.
If there is no such a default master key, OBS will create one and use it by default. sseC str Explanation: SSE-C algorithm Value range: AES256 Default value: None sseCKeyMd5 str Explanation: MD5 value of the key for encrypting objects when SSE-C is used.
This parameter must be used with kms_id. kms_id No String Key ID used for transferring and encrypting trace files. This key ID is obtained from Key Management Service (KMS). This parameter is valid when tracker_type is set to system.
For details, see Encrypting and Decrypting Small-size Data Online Using a Custom Key. Set the dataInputStr parameter in /home/huawei-qingtian/enclave/qtsm-sdk-java/kms-cms-java/com/huawei/src/test/TestKmsCmsProxy.java to the encrypted ciphertext.
For details, see Encrypting Data over SSL for a GeminiDB Redis Instance. Rename High-risk Command To prevent data loss, instance restart, and performance jitter caused by misoperations, you can rename high-risk commands of a GeminiDB Redis instance.
Value range: None Default value: None CopySourceSseC string Yes when SSE-C is used Explanation: SSE-C is used for encrypting objects on the server side. Restrictions: Only AES256 is supported.
Table 4 TrackerResponseBody Parameter Type Description id String Unique tracker ID. create_time Long Timestamp when the tracker was created. kms_id String Key ID used for transferring and encrypting trace files. This key ID is obtained from Key Management Service (KMS).
Notes If the metadata contains sensitive data, take appropriate measures to protect the sensitive data, for example, controlling access permissions and encrypting the data.
The authorized operations must at least contain Querying key details, Encrypting data, and Decrypting data. Specify whether to enable the IPv6 dual stack for the cluster. If this function is enabled, a client or application can connect to the database using an IPv6 address.
breakers No - - - - - content_type_configurable Returning request parameter type (Content-Type) when querying APIs No - - - - - rate_limit_plugin Request throttling plug-ins No - - - - - breakerv2 Circuit breakers for degrading services in case of overload No - - - - - sm_cipher_type Encrypting
For details, see Encrypting Data over SSL for a GeminiDB Redis Instance. Parameter Template You can use parameters in a parameter template to manage database API configurations.
Java Mongo How to Use If you are connecting to an instance using Java, an SSL certificate is optional, but downloading an SSL certificate and encrypting the connection will improve the security of your instance.
Example: x-obs-server-side-encryption-customer-algorithm:AES256 Constraints: None Range: AES256 Default value: None x-obs-server-side-encryption-customer-key-MD5 String Definition: Indicates the MD5 value of the key for encrypting objects.
Definition: The key used for encrypting an object. Example: x-obs-server-side-encryption-customer-key:K7QkYpBkM5+hca27fsNkUnNVaobncnLht/rCB2o/9Cw= Constraints: This header is used only when SSE-C is used.
Encrypting Data The data encryption module manages encryption and decryption tasks, authorizes client and database users to restrict user access, views and downloads encryption logs, rolls back table structures, manages encryption tables, and downloads bypass plug-ins.
Xrole Name: EVSAccessKMS: indicates that rights have been granted to EVS to obtain KMS keys for encrypting or decrypting EVS disks. KMS Key ID: specifies the ID of the key used by the encrypted data disk.
Xrole Name: EVSAccessKMS: indicates that rights have been granted to EVS to obtain KMS keys for encrypting or decrypting EVS disks. KMS Key ID: specifies the ID of the key used by the encrypted data disk.