检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
The algorithm must be HMACSHA1, HMACSHA256, or HMACSHA512. encrypt(string value, string secret, string transformation) Encrypts the value using the specified JDK and key, and converts the encryption into a readable format using Base64. decrypt(string value, string secret, string algorithm
When requesting the API, ROMA Connect APIC uses the bound signature key to encrypt the request parameters and generate a signature. When a tenant's backend service receives a request, it verifies the signature.
For security, encrypt your AK/SK and store them in the configuration file or environment variables. // In this example, the AK/SK are stored in environment variables for identity authentication.
When requesting the API, APIC uses the bound signature key to encrypt the request parameters and generate a signature. When a tenant's backend service receives a request, it verifies the signature. If the signature verification fails, the request is not sent by APIC.