Data Encryption Workshop
Data Encryption Workshop
All results for "
" in this service
All results for "
" in this service
What's New
What's New
Function Overview
Service Overview
What Is DEW?
KMS
Functions
Product Advantages
Application Scenarios
Using KMS
Cloud Services with KMS Integrated
Encrypting Data in OBS
Encrypting Data in EVS
Encrypting Data in IMS
Encrypting Data in RDS
CSMS
Functions
Product Advantages
Application Scenarios
KPS
Functions
Product Advantages
Application Scenarios
Dedicated HSM
Illustration of Dedicated Encryption Workshop
Functions
Product Advantages
Application Scenarios
Editions
Billing Description
DEW Permission Management
How to Access
Related Services
Personal Data Protection Mechanism
Change History
Getting Started
Performing OBS Server-Side Encryption with KMS Managed Keys
Getting Started with Common Practices
Change History
User Guide
Key Management Service
Key Types
Creating a Key
Creating CMKs Using Imported Key Materials
Overview
Importing Key Materials
Deleting Key Materials
Managing CMKs
Viewing a CMK
Enabling One or More CMKs
Disabling One or More CMKs
Deleting One or More CMKs
Canceling the Scheduled Deletion of One or More CMKs
Adding a Key to a Project
Using the Online Tool to Encrypt and Decrypt Small-Size Data
Managing Tags
Adding a Tag
Modifying Tag Values
Deleting Tags
Rotating CMKs
About Key Rotation
Enabling Key Rotation
Disabling Key Rotation
Managing a Grant
Creating a Grant
Querying a Grant
Revoking a Grant
Cloud Secret Management Service
Creating a Shared Secret
Managing Secrets
Viewing a Secret
Deleting a Secret
Managing Secret Versions
Saving and Viewing Secret Values
Managing Secret Version Statuses
Managing Tags
Adding a Tag
Modifying a Tag Value
Deleting a Tag
Key Pair Service
Creating a Key Pair
Importing a Key Pair
Upgrading a Key Pair
Deleting a Key Pair
Using Key Pairs
Binding a Key Pair
Binding Key Pairs in Batches
Viewing a Key Pair
Resetting a Key Pair
Replacing a Key Pair
Unbinding a Key Pair
Managing Private Keys
Importing a Private Key
Exporting a Private Key
Clearing a Private Key
Using a Private Key to Log In to the Linux ECS
Using a Private Key to Obtain the Login Password of Windows ECS
Dedicated HSM
Operation Guide
Purchasing a Dedicated HSM Instance
Creating a Dedicated HSM Instance
Activating a Dedicated HSM Instance
Viewing Dedicated HSM Instances
Using Dedicated HSM Instances
Managing Tags
Adding a Tag
Searching for a Dedicated HSM Instance by Tag
Modifying a Tag Value
Deleting a Tag
Auditing Logs
Operations supported by CTS
Querying Real-Time Traces
Permission Control
Creating a User and Authorizing the User the Permission to Access DEW
Creating a Custom DEW Policy
Best Practices
Key Management
Using KMS to Encrypt Offline Data
Encrypting or Decrypting Small Volumes of Data
Encrypting or Decrypting a Large Amount of Data
Using KMS to Encrypt and Decrypt Data for Cloud Services
Overview
Encrypting Data in ECS
Encrypting Data in OBS
Encrypting Data in EVS
Encrypting Data in IMS
Encrypting an RDS DB Instance
Encrypting a DDS DB Instance
General
Retrying Failed DEW Requests by Using Exponential Backoff
Change History
API Reference
Before You Start
Overview
API Calling
Constraints
Concepts
Calling APIs
Making an API Request
Authentication
Response
API Overview
APIs
Key Management APIs
API Version Querying
Querying version list
Querying a version
Lifecycle Management
Creating a CMK
Enabling a CMK
Disabling a CMK
Scheduling the Deletion of a CMK
Canceling the Scheduled Deletion of a CMK
Changing the Alias of a CMK
Changing the Description of a CMK
DEK Management
Creating a Random Number
Creating a DEK
Creating a Plaintext-Free DEK
Encrypting a DEK
Decrypting a DEK
CMK Importing Management
Obtaining CMK Import Parameters
Importing CMK Material
Deleting CMK Material
Authorization Management
Creating a Grant
Revoking a Grant
Retiring a Grant
Querying Grants on a CMK
Querying Grants That Can Be Retired
Small Data Encryption & Decryption
Encrypting Data
Decrypting Data
Signature & Verification
Signing Message
Verifying Signature
Rotation Management
Enabling Rotation for a CMK
Changing the Rotation Interval for a CMK
Disabling Rotation for a CMK
Querying the Rotation Status of a CMK
Tag Management
Querying CMK Instances
Querying CMK Tags
Querying Project Tags
Adding or Deleting CMK Tags in Batches
Adding a CMK Tag
Adding or Deleting CMK Tags in Batches
Querying APIs
Querying the List of CMKs
Querying the Information About a CMK
Querying the Public Key About a CMK
Querying the Number of Instances
Querying the Quota of a User
Application Examples
Example 1: Encrypting or Decrypting Small Volumes of Data
Example 2: Encrypting or Decrypting Large Volumes of Data
Example 3: Querying Information About Keys
Permissions Policies and Supported Actions
Introduction
Encryption Key Management
Appendix
Status Codes
Error Code
Obtaining a Project ID
Change History
SDK Reference
SDK Overview
FAQs
KMS Related
What Is Key Management Service?
What Is a Customer Master Key?
What Is a Default Key?
What Are the Differences Between a Custom Key and a Default Key?
What Is a Data Encryption Key?
Why Cannot I Delete a CMK Immediately?
Which Cloud Services Can Use KMS for Encryption?
How Do Huawei Cloud Services Use KMS to Encrypt Data?
What Are the Benefits of Envelope Encryption?
Is There a Limit on the Number of Custom Keys That I Can Create on KMS?
Can I Export a CMK from KMS?
Can I Decrypt My Data if I Permanently Delete My Custom Key?
How Do I Use the Online Tool to Encrypt or Decrypt Small Volumes of Data?
Can I Update CMKs Created by KMS-Generated Key Materials?
How Are Default Keys Generated?
What Should I Do If I Do Not Have the Permissions to Perform Operations on KMS?
Why Can't I Wrap Asymmetric Keys by Using -id-aes256-wrap-pad in OpenSSL?
Key Algorithms Supported by KMS
What Should I Do If KMS Failed to Be Requested and Error Code 401 Is Displayed?
CSMS Related
Why Cannot I Delete the Version Status of a Secret?
KPS Related
How Do I Create a Key Pair?
What Are a Private Key Pair and an Account Key Pair?
How Do I Handle an Import Failure of a Key Pair Created Using PuTTYgen?
What Should I Do When I Fail to Import a Key Pair Using Internet Explorer 9?
How Do I Log In to a Linux ECS with a Private Key?
How Do I Use a Private Key to Obtain the Password to Log In to a Windows ECS?
How Do I Handle the Failure in Binding a Key Pair?
How Do I Handle the Failure in Replacing a Key Pair?
How Do I Handle the Failure in Resetting a Key Pair?
How Do I Handle the Failure in Unbinding a Key Pair?
Do I Need to Restart Servers After Replacing Its Key Pair?
How Do I Enable the Password Login Mode for an ECS?
How Do I Handle the Failure in Logging In to ECS After Unbinding the Key Pair?
What Should I Do If My Private Key Is Lost?
How Do I Convert the Format of a Private Key File?
Can I Change the Key Pair of a Server?
Can a Key Pair Be Shared by Multiple Users?
How Do I Obtain the Public or Private Key File of a Key Pair?
Dedicated HSM Related
What Is Dedicated HSM?
How Does Dedicated HSM Ensure the Security for Key Generation?
Do Equipment Room Personnel Has the Super Administrator Role to Steal Information by Using a Privileged UKey?
What HSMs Are Used for Dedicated HSM?
What APIs Does Dedicated HSM Support?
How Do I Enable Public Access to a Dedicated HSM Instance?
Pricing
How Is DEW Charged?
How Do I Renew DEW?
How Do I Unsubscribe from DEW?
Will a CMK Be Charged After It Is Disabled?
Are Credentials Scheduled to Be Deleted Billed?
Will a CMK Be Charged After It Is Scheduled to Delete?
General
What Functions Does DEW Provide?
What Cryptography Algorithms Does DEW Use?
What Is a Quota?
What Are Regions and AZs?
How Do I Access the Functions of DEW?
Change History
Videos