Data Encryption Workshop
Data Encryption Workshop

    All results for "" in this service

      All results for "" in this service

      • What's New
      • Function Overview
      • Service Overview
        • What Is DEW?
        • KMS
          • Functions
          • Advantages
          • Application Scenarios
          • Example Scenario
        • CSMS
          • Functions
          • Advantages
          • Scenario
        • KPS
          • Functions
          • Advantages
          • Scenario
        • Dedicated HSM
          • Dedicated HSM Infographics
          • Functions
          • Advantages
          • Scenario
          • Editions
        • Personal Data Protection Mechanism
        • Security
          • Shared Responsibilities
          • Asset Identification and Management
          • Identity Authentication and Access Control
          • Data Protection Technologies
          • Audit and Logging
          • Service Resilience
        • Permissions Management
        • Related Services
        • Constraints
        • Basic Concepts
      • Billing
        • Billing Overview
        • Billing Modes
          • Overview
          • Yearly/Monthly Billing
          • Pay-per-use Billing
        • Billing Items
        • Billing Examples
        • Renewing Subscriptions
          • Overview
          • Manually Renewing DEW
          • Auto-renewing DEW
        • Bills
        • Arrears
        • Billing Termination
        • Cost Management
        • Billing FAQs
          • How Is DEW Charged?
          • How Do I Renew DEW?
          • How Do I Unsubscribe from DEW?
          • Will a CMK Be Charged After It Is Disabled?
          • Are Credentials Scheduled to Be Deleted Billed?
          • Will a CMK Be Charged After It Is Scheduled to Delete?
          • How Is RDS Encryption Billed?
      • Getting Started
        • Creating a Key for Cloud Service Encryption
        • Binding a Key Pair and Logging In to an ECS Using a Private Key
        • Using a Key to Encrypt Data in OBS
        • Getting Started with Common Practices
      • User Guide
        • Creating a User and Authorizing the User the Permission to Access DEW
        • Key Management Service
          • Overview
          • Creating a Key
            • Creating a Custom Key
            • Importing a Key
          • Using a Key
            • Using KMS for Encryption
            • Encrypting and Decrypting Small-size Data Online Using a Custom Key
          • Managing Keys
            • Viewing Key Details
            • Creating an Alias for a Custom Key
            • Adding a Tag to a Custom Key
            • Creating a Grant for a Custom Key
            • Adding a Custom Key to an Enterprise Project
            • Viewing the Number of Key Accounting Requests
            • Enabling Key Rotation
        • Key Pair Service
          • Overview
          • Creating a Key Pair
          • Using a Key Pair
            • Binding a Key Pair to an ECS
            • Using a Private Key to Log In to the Linux ECS
            • Using a Private Key to Obtain the Login Password of Windows ECS
          • Managing Key Pairs
            • Upgrading a Private Key Pair to an Account Key Pair
            • Managing Public and Private Keys
        • Cloud Secret Management Service
          • Overview
          • Creating a Secret
          • Managing Secrets
            • Adding a Tag to a Secret
            • Associating a Secret with an Event
            • Managing Secret Versions
        • Dedicated HSM
          • Overview
          • Purchasing a Dedicated HSM Instance
            • Creating a Dedicated HSM Instance
          • Activating and Using a Dedicated HSM Instance
            • Activating a Dedicated HSM Instance
            • Using Dedicated HSM Instances
          • Managing Dedicated HSM Instances
            • Viewing Dedicated HSM Instances
            • Adding a Tag to a Dedicated HSM Instance
        • Tags and Quotas
          • Tag Management
            • Overview
            • Creating a Tag Policy
            • Creating a Tag
            • Searching for a Custom Key by Tag
            • Modifying a Tag Value
            • Deleting a Tag
          • Quota Adjustment
        • Monitoring and Auditing
          • Using Cloud Eye to Monitor DEW
            • Metrics Supported by DEW
            • Events Supported by DEW
            • Creating an Alarm Rule for Metrics and Events
            • Viewing Metric and Event Monitoring Data
          • Using CTS to Audit DEW
            • Operations supported by CTS
            • Viewing CTS Traces in the Trace List
        • Permissions Management
          • Creating a Custom DEW Policy
          • Critical Operation Protection
      • Best Practices
        • Key Management Service
          • Using KMS to Encrypt Offline Data
            • Encrypting or Decrypting a Small Amount of Data
            • Encrypting or Decrypting a Large Amount of Data
          • Using KMS to Encrypt and Decrypt Data for Cloud Services
            • Overview
            • Encrypting Data in ECS
            • Encrypting Data in EVS
            • Encrypting Data in IMS
            • Encrypting Data in OBS
            • Encrypting an RDS DB Instance
            • Encrypting a DDS DB Instance
          • Using the Encryption SDK to Encrypt and Decrypt Local Files
          • Encrypting and Decrypting Data Through Cross-region DR
          • Using KMS to Protect File Integrity
        • Cloud Secret Management Service
          • Using CSMS to Change Hard-coded Database Account Passwords
          • Using CSMS to Prevent AK/SK Leakage
          • Services Using CSMS
            • CCE Servers Using CSMS
        • General
          • Retrying Failed DEW Requests by Using Exponential Backoff
      • API Reference
        • Before You Start
        • Calling APIs
          • Making an API Request
          • Authentication
          • Response
        • API Overview
        • APIs
          • Key Management APIs
            • Key Lifecycle Management
              • Creating a Key
              • Enabling a Key
              • Disabling a Key
              • Scheduling the Deletion for a Key
              • Canceling the Scheduled Deletion for a Key
              • Modifying a Key Alias
              • Modifying a Key Description
            • DEK Management
              • Generating a Random Number
              • Creating a DEK
              • Creating a Plaintext-free DEK
              • Creating an RSA Data Key Pair
              • Creating an EC Data Key Pair
              • Encrypting a DEK
              • Decrypting a DEK
              • Creating a PIN
            • Small-Size Data Encryption and Decryption
              • Encrypting Data
              • Decrypting Data
            • Signature and Verification
              • Signature Data
              • Verifying a Signature
            • Key Tag Management
              • Querying the Key Instance
              • Querying Key Tags
              • Adding Tags to a Key
              • Querying Project Tags
              • Batch Adding or Deleting Key Tags
              • Deleting Key Tags
            • Querying Key API Versions
              • Querying the Version List
              • Querying a Specified Version
            • Multi-Region Key
              • Changing the Primary Region for a Key
              • Copying a Key to a Specified Region
              • Querying the Regions Supported by a Cross-Region Key
            • MAC
              • Generating a MAC
              • Verifying a MAC
            • Alias Management
              • Associating Key Alias
              • Querying the Alias Associated with a Key
              • Creating a Key Alias
              • Deleting a Key Alias
            • Key Import Management
              • Obtaining Key Import Parameters
              • Importing Key Materials
              • Deleting Key Materials
            • Querying Keys
              • Querying the Key List
              • Querying Key Details
              • Querying a Public Key
              • Querying the Instance Quantity
              • Querying Quotas
            • Key Grant Management
              • Creating a Grant
              • Revoking a Grant
              • Retiring a Grant
              • Querying the Grant List
              • Querying Retirable Grants
            • Key Rotation Management
              • Enabling Key Rotatioin
              • Disabling Key Rotation
              • Modifying the Key Rotation Interval
              • Querying the Key Rotation Status
            • Dedicated Keystore Management
              • Creating a Dedicated Keystore
              • Querying the List of Dedicated Keystores
              • Obtaining a Dedicated Keystore
              • Deleting a Dedicated Keystore
              • Enabling a Dedicated Keystore
              • Disabling a Dedicated Keystore
          • Key Pair Management APIs
            • Key Pair Management
              • Creating and Importing an SSH Key Pair
              • Accessing the page for clearing private keys
              • Querying the SSH Key Pair List
              • Querying SSH Key Pair Details
              • Deleting an SSH Key Pair
              • Updating SSH Key Pair Description
              • Accessing the page for importing private keys
              • Exporting a private key
              • Importing SSH Key Pairs in Batches
              • Exporting Private Keys of Key Pairs in Batches
            • Key pair task management
              • Binding an SSH Key Pair
              • Unbind an SSH Key Pair
              • Binding SSH Key Pairs in Batches
              • Querying Task Information
              • Querying Running Tasks
              • Querying Task Failure Information
              • Delete all failed tasks
              • Delete a failed task
          • Secret Management APIs
            • Lifecycle Management
              • Creating a Secret
              • Querying the Secret List
              • Querying a Secret
              • Updating a Secret
              • Deleting a Secret Immediately
              • Restoring a Secret Object
              • Downloading Secret Backup
              • Creating a Scheduled Secret Deletion Task
              • Canceling a Scheduled Secret Deletion Task
              • Rotating a Secret
            • Secret Version Management
              • Creating a Secret Version
              • Querying the Secret Version List
              • Updating the Secret Version
              • Querying the Secret Version and Value
            • Secret Version Status Management
              • Updating the Version Status of a Secret
              • Querying the Version Status of a Secret
              • Deleting the Version Status of a Secret
            • Secret Tag Management
              • Querying a Secret Instance
              • Adding or Deleting Secret Tags in Batches
              • Querying Secret Tags
              • Querying Secret Tags
              • Deleting a Secret Tag
              • Querying Project Tags
            • Event Management
              • Creating an Event
              • Querying Events
              • Querying the Event List
              • Update an Event
              • Deleting an Event Immediately
              • Querying Triggered Event Notification Records
            • Secret Rotation Management
              • Querying the Task List
              • Creating a Service Agency
              • Checking Whether a Service Agency Exists
              • Obtaining the Secret Rotation Function Template
        • Historical APIs
          • Managing SSH Key Pairs (V2.1)
            • Querying the List of SSH Key Pairs (V2.1)
            • Querying Details About an SSH Key Pair (V2.1)
            • Creating and Importing an SSH Key Pair (V2.1)
            • Deleting an SSH Key Pair (V2.1)
            • Modifying the Description of a Key Pair (V2.1)
          • Managing SSH Key Pairs (V2)
            • Querying the List of SSH Key Pairs (V2)
            • Querying Details About an SSH Key Pair (V2)
            • Creating and Importing an SSH Key Pair (V2)
            • Deleting an SSH Key Pair (V2)
            • Copying an SSH Key Pair (V2)
        • Application Examples
          • Example 1: Encrypting or Decrypting Small Volumes of Data
          • Example 2: Encrypting or Decrypting Large Volumes of Data
          • Example 3: Querying Information About Keys
        • Permissions Policies and Supported Actions
          • Introduction
          • Encryption Key Management
          • Key Pair Management
        • Appendix
          • Status Codes
          • Error Code
          • Obtaining a Project ID
      • SDK Reference
        • SDK Overview
      • FAQs
        • About DEW
          1. What Cryptography Algorithms Does DEW Use?
          2. What Is the Resource Allocation Mechanism of DEW?
          3. What Are Regions and AZs?
          4. How Do I Access the Functions of DEW?
          5. Why Do DEW Pemissions Fail to Take Effect Immediately?
        • KMS Related
          1. Which Cloud Services Are Provided with Default Keys by KMS?
          2. What Are the Differences Between a Custom Key and a Default Key?
          3. How Do I Use a DEK?
          4. Why Cannot I Delete a CMK Immediately?
          5. Which Cloud Services Can Use KMS for Encryption?
          6. How Do Huawei Cloud Services Use KMS to Encrypt Data?
          7. What Are the Benefits of Envelope Encryption?
          8. Is There a Limit on the Number of Custom Keys That I Can Create on KMS?
          9. Can I Export a CMK from KMS?
          10. Can I Decrypt My Data if I Permanently Delete My Custom Key?
          11. Can I Update CMKs Created by KMS-Generated Key Materials?
          12. How Are Default Keys Generated?
          13. What Should I Do If I Do Not Have the Permissions to Perform Operations on KMS?
          14. Why Can't I Wrap Asymmetric Keys by Using -id-aes256-wrap-pad in OpenSSL?
          15. Key Algorithms Supported by KMS
          16. What Should I Do If KMS Failed to Be Requested and Error Code 401 Is Displayed?
          17. What Is the Relationship Between the Ciphertext and Plaintext Returned by the encrypt-data API?
          18. How Does KMS Protect My Keys?
          19. How Do I Use an Asymmetric Key to Verify the Signature Result of a Public Key Pair?
          20. Does an Imported Key Support Rotation?
          21. Does KMS Support Offline Data Encryption and Decryption?
          22. How Do I Convert an Original EC Private Key into a Private Key in PKCS8 Format?
        • CSMS Related
          1. Why Cannot I Delete the Version Status of a Secret?
        • KPS Related
          1. How Do I Handle an Import Failure of a Key Pair Created Using PuTTYgen?
          2. What Should I Do When I Fail to Import a Key Pair Using Internet Explorer 9?
          3. How Do I Handle the Failure in Binding a Key Pair?
          4. How Do I Handle the Failure in Replacing a Key Pair?
          5. How Do I Handle the Failure in Resetting a Key Pair?
          6. How Do I Handle the Failure in Unbinding a Key Pair?
          7. Do I Need to Restart Servers After Replacing Its Key Pair?
          8. How Do I Enable the Password Login Mode for an ECS?
          9. How Do I Handle the Failure in Logging In to ECS After Unbinding the Key Pair?
          10. What Should I Do If My Private Key Is Lost?
          11. How Do I Convert the Format of a Private Key File?
          12. Can I Change the Key Pair of a Server?
          13. Can a Key Pair Be Shared by Multiple Users?
          14. How Do I Obtain the Public or Private Key File of a Key Pair?
          15. What Can I Do If an Error Is Reported When an Account Key Is Created or Upgraded for the First Time?
          16. Will the Account Key Pair Quota Be Occupied After a Private Key Pair Is Upgraded to an Account Key Pair?
        • Dedicated HSM Related
          1. How Does Dedicated HSM Ensure the Security for Key Generation?
          2. Do Equipment Room Personnel Has the Super Administrator Role to Steal Information by Using a Privileged UKey?
          3. What HSMs Are Used for Dedicated HSM?
          4. What APIs Does Dedicated HSM Support?
      • Videos