Cette page n'est pas encore disponible dans votre langue. Nous nous efforçons d'ajouter d'autres langues. Nous vous remercions de votre compréhension.

On this page

Show all

Application Scenarios

Updated on 2023-01-31 GMT+08:00

This section uses a basic database username and its password as an example to describe how CSMS works.

Figure 1 Secret-based login process

The procedure is as follows:

  1. Create a secret on the console or via an API to store database information (such as the database address, port, and password).
  2. Use an application to access the database. CSMS will query the secret you created.
  3. CSMS retrieves and decrypts the credential ciphertext, and securely returns the information stored in the credential to the application through the credential management API.
  4. The application obtains the decrypted plaintext secret and uses it to access the database.
Feedback

Feedback

Feedback

0/500

Selected Content

Submit selected content with the feedback