检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
Encryption and Decryption During File Migration When you migrate files to a file system, CDM can encrypt and decrypt those files. Currently, CDM supports the following encryption modes: AES-256-GCM KMS Encryption AES-256-GCM Currently, only AES-256-GCM (NoPadding) is supported.
All the calls made to DataArts Studio APIs use HTTPS to encrypt the transmitted data. Parent topic: Security
KMS kms:cmk:get kms:cmk:list kms:cmk:create kms:cmk:decrypt kms:cmk:encrypt kms:dek:create kms:dek:encrypt kms:dek:decrypt Encrypt and decrypt data during data connection creation.
ENCRYPT: This algorithm supports all types of data. The selected encryption algorithm is used to encrypt data from a specified source. SET_NULL: This algorithm supports all types of data. It sets the value to null.
It specifies whether to encrypt the uploaded data, and the encryption method. The options are as follows: NONE: Directly write data without encryption. AES-256-GCM: Use the AES 256-bit encryption algorithm to encrypt data.
KMS Key Yes KMS key used to encrypt and decrypt data source authentication information. Select a default or custom key. NOTE: When you use KMS for encryption through DataArts Studio or KPS for the first time, the default key dlf/default or kps/default is automatically generated.
KMS Key Yes KMS key used to encrypt and decrypt the authentication information for the data source Agent Yes As a network proxy, the CDM cluster must be able to communicate with the ClickHouseServer.
Whether to encrypt the uploaded data. The options are as follows: None: Data is written without encryption. AES-256-GCM: The AES 256-bit encryption algorithm is used to encrypt data. Currently, only the AES-256-GCM (NoPadding) encryption algorithm is supported.
You are advised to encrypt and store them in configuration files or environment variables and decrypt them when needed. This example takes environment variables as an example. Method: Specify a request method.
File encryption When files are migrated to a file system, CDM can encrypt the files written to the cloud. MD5 verification MD5 verification is supported to check the file consistency from end to end and output verification result.
KMS Key Yes KMS key used to encrypt and decrypt data source authentication information. Select a default or custom key. NOTE: When you use KMS for encryption through DataArts Studio or KPS for the first time, the default key dlf/default or kps/default is automatically generated.
KMS Key Yes KMS key used to encrypt and decrypt data source authentication information. Select a default or custom key. NOTE: When you use KMS for encryption through DataArts Studio or KPS for the first time, the default key dlf/default or kps/default is automatically generated.
To ensure security, encrypt your AK and SK, store them in configuration files or environment variables, and decrypt them when needed.)
KMS Key Yes KMS key used to encrypt and decrypt data source authentication information. Select a default or custom key. NOTE: When you use KMS for encryption through DataArts Studio or KPS for the first time, the default key dlf/default or kps/default is automatically generated.
You are advised to encrypt and store them in configuration files or environment variables and decrypt them when needed. // In this example, the AK and SK stored in the environment variables are used for identity authentication.
To ensure security, encrypt your AK and SK, store them in configuration files or environment variables, and decrypt them when needed. # In this example, the AK and SK stored in the environment variables are used for identity authentication.
To ensure security, encrypt your AK and SK, store them in configuration files or environment variables, and decrypt them when needed. // In this example, the AK and SK stored in the environment variables are used for identity authentication.
To ensure security, encrypt your AK and SK, store them in configuration files or environment variables, and decrypt them when needed. // In this example, the AK and SK stored in the environment variables are used for identity authentication.
KMS Key Yes KMS key used to encrypt and decrypt data source authentication information. Select a default or custom key. NOTE: When you use KMS for encryption through DataArts Studio or KPS for the first time, the default key dlf/default or kps/default is automatically generated.