检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Symmetric Encrypt/Decrypt The symmetric encrypt/decrypt processor is used to encrypt plaintext and decrypt ciphertext by using the specified symmetric encryption algorithm.
Asymmetric Encrypt/Decrypt The asymmetric encrypt/decrypt processor is used to encrypt plaintext and decrypt ciphertext by using the specified asymmetric encryption algorithm. Configuration Parameters Parameter Description Private Key Base64-encoded, mandatory for decryption.
(java.security.PublicKey publicKey, byte[] source) Encrypt data using the RSA algorithm. static String encrypt(String source, java.security.PublicKey publicKey) Encrypt data using the RSA algorithm (both the source and returned data is encoded using Base64). static String encrypt(
) Encrypt data using the RSA algorithm.
Processors Conditions Parallel Processor Delay EDI Processor Variable Assignment Variable Updater Sorter Data Conversion Splitter Filter Script Message Logger Data Mapper Iterator Error Monitoring End Symmetric Encrypt/Decrypt Asymmetric Encrypt/Decrypt
mode, AesUtils.PAD pad) Encrypt the plaintext using the AES algorithm and a private key with specified mode and length.
Encrypt requests using HTTPS. Before using this method, ensure that the required SSL certificates are available. Parent topic: Service Integration
Encrypt requests using HTTPS. Before using this method, ensure that the required SSL certificates are available. Parent topic: Service Integration
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK are stored in environment variables for identity authentication.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK are stored in environment variables for identity authentication.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK are stored in environment variables for identity authentication.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK are stored in environment variables for identity authentication.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK are stored in environment variables for identity authentication.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK are stored in environment variables for identity authentication.
For security purposes, encrypt your AK and SK and store them in the configuration file or environment variables. In this example, the AK and SK are stored in environment variables.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK are stored in environment variables for identity authentication.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK are stored in environment variables for identity authentication.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK are stored in environment variables for identity authentication.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. # In this example, the AK/SK are stored in environment variables for identity authentication.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK are stored in environment variables for identity authentication.