Data Encryption Workshop
Data Encryption Workshop
All results for "
" in this service
All results for "
" in this service
What's New
Function Overview
Service Overview
What Is DEW?
KMS
Functions
Advantages
Application Scenarios
Using KMS
Cloud Services with KMS Integrated
Encrypting Data in OBS
Encrypting Data in EVS
Encrypting Data in IMS
Encrypting Data in SFS
Encrypting Data in RDS
Encrypting Data in DDS
CSMS
Functions
Advantages
Application Scenarios
KPS
Functions
Advantages
Application Scenarios
Dedicated HSM
Dedicated HSM Infographics
Functions
Advantages
Application Scenarios
Editions
Security
Shared Responsibilities
Asset Identification and Management
Identity Authentication and Access Control
Data Protection Technologies
Audit and Logging
Service Resilience
Certificates
Billing Description
DEW Permission Management
How to Access
Related Services
Personal Data Protection Mechanism
Change History
Billing
Billing Overview
Billing Modes
Overview
Yearly/Monthly Billing
Pay-per-Use Billing
Billing Items
Billing Examples
Renewing Subscriptions
Overview
Manually Renewing DEW
Auto-renewing DEW
Bills
Arrears
Billing Termination
Cost Management
Billing FAQs
How Is DEW Charged?
How Do I Renew DEW?
How Do I Unsubscribe from DEW?
Will a CMK Be Charged After It Is Disabled?
Are Credentials Scheduled to Be Deleted Billed?
Will a CMK Be Charged After It Is Scheduled to Delete?
Change History
Getting Started
Creating a Key for Cloud Service Encryption
Creating a Secret for Data Storage Rotation
Binding a Key Pair and Logging In to an ECS Using a Private Key
Using a Key to Encrypt Data in OBS
Logging In to a Linux ECS Using a Private Key
Getting Started with Common Practices
User Guide
Key Management Service
Key Types
Creating a Key
Creating CMKs Using Imported Key Materials
Overview
Importing Key Materials
Deleting Key Materials
Managing CMKs
Viewing a Key
Enabling a Key
Disabling a Key
Deleting a Key
Canceling the Scheduled Deletion of One or More CMKs
Adding a Key to a Project
Viewing the Number of Key Accounting Requests
Using the Online Tool to Encrypt and Decrypt Small-Size Data
Key Alias
Adding a Tag
Rotating CMKs
About Key Rotation
Enabling Key Rotation
Disabling Key Rotation
Managing a Grant
Creating a Grant
Querying a Grant
Revoking a Grant
Cloud Secret Management Service
Secret Overview
Rotation Policy
Creating a Secret
Creating a Shared Secret
Creating a Rotation Secret
Managing Secrets
Viewing a Secret
Deleting a Secret
Managing Secret Versions
Saving and Viewing Secret Values
Critical Operation Protection
Managing Secret Version Statuses
Setting the Version Expiration Time
Rotation Secret Version
Managing Tags
Adding a Tag
Searching for a Secret by Tag
Modifying a Tag Value
Deleting a Tag
Creating an Event
Managing Events
Viewing Events
Editing an Event
Enabling an Event
Disabling an Event
Deleting an Event
Viewing Notifications
Key Pair Service
Creating a Key Pair
Importing a Key Pair
Upgrading a Key Pair
Deleting a Key Pair
Using Key Pairs
Binding a Key Pair
Binding Key Pairs in Batches
Viewing a Key Pair
Resetting a Key Pair
Replacing a Key Pair
Unbinding a Key Pair
Downloading a Public Key
Managing Private Keys
Importing a Private Key
Exporting a Private Key
Clearing a Private Key
Using a Private Key to Log In to the Linux ECS
Using a Private Key to Obtain the Login Password of Windows ECS
Dedicated HSM
Operation Guide
Purchasing a Dedicated HSM Instance
Creating a Dedicated HSM Instance
Activating a Dedicated HSM Instance
Viewing Dedicated HSM Instances
Using Dedicated HSM Instances
Tag Management
Overview
Creating a Tag Policy
Creating a Tag
Searching for a Custom Key by Tag
Modifying a Tag Value
Deleting a Tag
Auditing Logs
Operations supported by CTS
Viewing CTS Traces in the Trace List
Activating a Dedicated HSM Instance Using a Shared VPC
Updating a Resource Share
Leaving a Resource Share
Permission Control
Creating a User and Authorizing the User the Permission to Access DEW
Creating a Custom DEW Policy
Best Practices
Key Management Service
Using KMS to Encrypt Offline Data
Encrypting or Decrypting Small Volumes of Data
Encrypting or Decrypting a Large Amount of Data
Using KMS to Encrypt and Decrypt Data for Cloud Services
Overview
Encrypting Data in ECS
Encrypting Data in OBS
Encrypting Data in EVS
Encrypting Data in IMS
Encrypting an RDS DB Instance
Encrypting a DDS DB Instance
Using the Encryption SDK to Encrypt and Decrypt Local Files
Encrypting and Decrypting Data Through Cross-region DR
Using KMS to Protect File Integrity
Cloud Secret Management Service
Using CSMS to Change Hard-coded Database Account Passwords
Using CSMS to Prevent AK and SK Leakage
Using CSMS to Automatically Rotate Security Passwords
Rotating Secrets
Overview
Rotating a Secret for a User
Rotating a Secret for Two Users
Rotating IAM Secrets Using FunctionGraph
General
Retrying Failed DEW Requests by Using Exponential Backoff
API Reference
Before You Start
Overview
API Calling
Endpoints
Constraints
Concepts
Selecting an API Type
Calling APIs
Making an API Request
Authentication
Response
API Overview
APIs
Key Management APIs
Key Lifecycle Management
Create a key
Enable a key
Disable a key
Schedule the deletion of a key
Cancel the scheduled deletion of a key
Modify a key alias
Modify CMK description
DEK Management
Generate a random number
Create a DEK
Create a plaintext-free DEK
Encrypt a DEK
Decrypt a DEK
Small-Size Data Encryption and Decryption
Encrypt data
Decrypt data
Signature and Verification
Signing Data
Key Tag Management
Query key instances
Query key tags
Add tags to a key
Query project tags
Batch add or delete key tags
Delete key tags
Key API Version Query
Query a version
Querying Key API Versions
Query version list
Key Import Management
Obtain parameters for importing a key
Import key materials
Delete key materials
Querying Keys
Query the key list
Query key details
Querying a Public Key
Query instance quantity
Query quotas
Key Grant Management
Create a grant
Revoke a grant
Retire a grant
Query the grant list
Query grants that can be retired
Key Rotation Management
Enable key rotation
Disable key rotation
Modify key rotation interval
Query key rotation status
Dedicated Keystore Management
Creating a Dedicated Keystore
Querying the List of Dedicated Keystores
Obtaining a Dedicated Keystore
Deleting a Dedicated Keystore
Enabling a Dedicated Keystore
Disabling a Dedicated Keystore
Signature Verification
Verifying a Signature
Key Pair Management APIs
Key Pair Management
Creating and Importing an SSH Key Pair
Accessing the page for clearing private keys
Querying the SSH Key Pair List
Querying SSH Key Pair Details
Deleting an SSH Key Pair
Updating SSH Key Pair Description
Accessing the page for importing private keys
Exporting a private key
Key pair task management
Binding an SSH Key Pair
Unbind an SSH Key Pair
Binding SSH Key Pairs in Batches
Querying Task Information
Querying Running Tasks
Querying Task Failure Information
Delete all failed tasks
Delete a failed task
Secret Management APIs
Lifecycle Management
Creating a Secret
Querying the Secret List
Querying a Secret
Updating a Secret
Deleting a Secret Immediately
Restoring a Secret Object
Downloading Secret Backup
Creating a Scheduled Secret Deletion Task
Canceling a Scheduled Secret Deletion Task
Rotating a Secret
Secret Version Management
Updating the Secret Version
Querying the Secret Version and Value
Secret Version Status Management
Updating the Version Status of a Secret
Querying the Version Status of a Secret
Deleting the Version Status of a Secret
Secret Tag Management
Querying a Secret Instance
Adding or Deleting Secret Tags in Batches
Querying Secret Tags
Querying Secret Tags
Deleting a Secret Tag
Querying Project Tags
Event Management
Creating an Event
Querying Events
Querying the Event List
Update an Event
Deleting an Event Immediately
Querying Triggered Event Notification Records
Secret version management
Creating a Secret Version
Querying the Secret Version List
Historical APIs
Managing SSH Key Pairs (V2.1)
Querying the List of SSH Key Pairs (V2.1)
Querying Details About an SSH Key Pair (V2.1)
Creating and Importing an SSH Key Pair (V2.1)
Deleting an SSH Key Pair (V2.1)
Modifying the Description of a Key Pair (V2.1)
Managing SSH Key Pairs (V2)
Querying the List of SSH Key Pairs (V2)
Querying Details About an SSH Key Pair (V2)
Creating and Importing an SSH Key Pair (V2)
Deleting an SSH Key Pair (V2)
Copying an SSH Key Pair (V2)
Application Examples
Example 1: Encrypting or Decrypting Small Volumes of Data
Example 2: Encrypting or Decrypting Large Volumes of Data
Example 3: Querying Information About Keys
Permissions Policies and Supported Actions
Introduction
Encryption Key Management
Key Pair Management
Appendix
Status Codes
Error Code
Obtaining a Project ID
SDK Reference
SDK Overview
FAQs
KMS Related
What Is Key Management Service?
What Is a Customer Master Key?
What Is a Default Key?
What Are the Differences Between a Custom Key and a Default Key?
What Is a Data Encryption Key?
Why Cannot I Delete a CMK Immediately?
Which Cloud Services Can Use KMS for Encryption?
How Do Huawei Cloud Services Use KMS to Encrypt Data?
What Are the Benefits of Envelope Encryption?
Is There a Limit on the Number of Custom Keys That I Can Create on KMS?
Can I Export a CMK from KMS?
Can I Decrypt My Data if I Permanently Delete My Custom Key?
How Do I Use the Online Tool to Encrypt or Decrypt Small Volumes of Data?
Can I Update CMKs Created by KMS-Generated Key Materials?
When Should I Use a CMK Created with Imported Key Materials?
What Should I Do When I Accidentally Delete Key Materials?
How Are Default Keys Generated?
What Should I Do If I Do Not Have the Permissions to Perform Operations on KMS?
Why Can't I Wrap Asymmetric Keys by Using -id-aes256-wrap-pad in OpenSSL?
Key Algorithms Supported by KMS
What Should I Do If KMS Failed to Be Requested and Error Code 401 Is Displayed?
What Is the Relationship Between the Ciphertext and Plaintext Returned by the encrypt-data API?
CSMS Related
Why Cannot I Delete the Version Status of a Secret?
KPS Related
How Do I Create a Key Pair?
What Are a Private Key Pair and an Account Key Pair?
How Do I Handle an Import Failure of a Key Pair Created Using PuTTYgen?
What Should I Do When I Fail to Import a Key Pair Using Internet Explorer 9?
How Do I Log In to a Linux ECS with a Private Key?
How Do I Use a Private Key to Obtain the Password to Log In to a Windows ECS?
How Do I Handle the Failure in Binding a Key Pair?
How Do I Handle the Failure in Replacing a Key Pair?
How Do I Handle the Failure in Resetting a Key Pair?
How Do I Handle the Failure in Unbinding a Key Pair?
Do I Need to Restart Servers After Replacing Its Key Pair?
How Do I Enable the Password Login Mode for an ECS?
How Do I Handle the Failure in Logging In to ECS After Unbinding the Key Pair?
What Should I Do If My Private Key Is Lost?
How Do I Convert the Format of a Private Key File?
Can I Change the Key Pair of a Server?
Can a Key Pair Be Shared by Multiple Users?
How Do I Obtain the Public or Private Key File of a Key Pair?
What Can I Do If an Error Is Reported When an Account Key Is Created or Upgraded for the First Time?
Will the Account Key Pair Quota Be Occupied After a Private Key Pair Is Upgraded to an Account Key Pair?
Dedicated HSM Related
What Is Dedicated HSM?
How Does Dedicated HSM Ensure the Security for Key Generation?
Do Equipment Room Personnel Has the Super Administrator Role to Steal Information by Using a Privileged UKey?
What HSMs Are Used for Dedicated HSM?
What APIs Does Dedicated HSM Support?
How Do I Enable Public Access to a Dedicated HSM Instance?
Pricing
How Is DEW Charged?
How Do I Renew DEW?
How Do I Unsubscribe from DEW?
Will a CMK Be Charged After It Is Disabled?
Are Credentials Scheduled to Be Deleted Billed?
Will a CMK Be Charged After It Is Scheduled to Delete?
General
What Functions Does DEW Provide?
What Cryptography Algorithms Does DEW Use?
In Which Regions Are DEW Services Available?
What Is a Quota?
What Is the Resource Allocation Mechanism of DEW?
What Are Regions and AZs?
Can DEW Be Shared Across Accounts?
How Do I Access the Functions of DEW?
Change History
Videos
More Documents
User Guide (ME-Abu Dhabi Region)
Introduction
Concepts
KMS
CMK
Default Master Key
DEK
HSM
Envelope Encryption
TRNG
Application Scenarios
Functions
Accessing and Using KMS
How to Access KMS
How to Use KMS
Related Services
KMS Permissions Management
Management
Creating a Key
Creating CMKs Using Imported Key Material
Overview
Importing Key Material
Deleting Key Material
Scheduling the Deletion of One or Multiple CMKs
Encrypting and Decrypting Small Data Online
Managing Tags
Adding a Tag
Searching for Tags
Modifying Tag Values
Deleting Tags
Managing CMKs
Querying a CMK
Changing the Alias and Description of a CMK
Enabling One or Multiple CMKs
Disabling One or Multiple CMKs
Canceling the Scheduled Deletion of One or Multiple CMKs
Permissions Management
Creating a User and Authorizing the User the Permission to Access KMS
Creating a Custom Policy
FAQs
What Is Key Management Service?
What Is a Customer Master Key?
What Is a Data Encryption Key?
Why Cannot I Delete a CMK Immediately?
Which Cloud Services Can Use KMS for Encryption?
Change History
User Guide (Paris and Amsterdam Regions)
Introduction
Concepts
KMS
CMK
Default Master Key
DEK
HSM
Envelope Encryption
TRNG
Application Scenarios
Functions
Accessing and Using KMS
How to Access KMS
How to Use KMS
Related Services
User Permissions
Management
Creating a Key
Creating CMKs Using Imported Key Material
Overview
Importing Key Material
Deleting Key Material
Scheduling the Deletion of One or Multiple CMKs
Rotating CMKs
Context
Enabling Key Rotation
Managing CMKs
Querying a CMK
Changing the Alias and Description of a CMK
Enabling One or Multiple CMKs
Disabling One or Multiple CMKs
Canceling the Scheduled Deletion of One or Multiple CMKs
FAQs
What Is Key Management Service?
What Is a Customer Master Key?
What Is a Data Encryption Key?
Why Cannot I Delete a CMK Immediately?
Which Cloud Services Can Use KMS for Encryption?
How Does KMS Charge?
Are Disabled CMKs Billable?
Change History
User Guide (Kuala Lumpur Region)
Service Overview
What Is DEW?
Basic Concepts
KMS
Functions
Advantages
Application Scenarios
Using KMS
Cloud Services with KMS Integrated
Encrypting Data in OBS
Encrypting Data in EVS
Encrypting Data in IMS
Encrypting Data in SFS
Encrypting Data in RDS
Encrypting Data in DDS
CSMS
Functions
Advantages
Application Scenarios
DEW Permission Management
How to Access
Related Services
Personal Data Protection Mechanism
User Guide
Key Management Service
Key Types
Creating a Key
Creating CMKs Using Imported Key Materials
Overview
Importing Key Materials
Deleting Key Materials
Managing CMKs
Viewing a CMK
Enabling One or More CMKs
Disabling One or More CMKs
Deleting One or More CMKs
Canceling the Scheduled Deletion of One or More CMKs
Adding a Key to a Project
Searching for a Key
Using the Online Tool to Encrypt and Decrypt Small-Size Data
Managing Tags
Adding a Tag
Modifying Tag Values
Deleting Tags
Rotating CMKs
About Key Rotation
Enabling Key Rotation
Disabling Key Rotation
Managing a Grant
Creating a Grant
Querying a Grant
Revoking a Grant
Cloud Secret Management Service
Creating a Secret
Creating a Shared Secret
Managing Secrets
Viewing a Secret
Deleting a Secret
Managing Secret Versions
Saving and Viewing Secret Values
Managing Secret Version Statuses
Managing Tags
Adding a Tag
Searching for a Secret by Tag
Modifying a Tag Value
Deleting a Tag
Creating an Event
Managing Events
Viewing Events
Editing an Event
Enabling an Event
Disabling an Event
Deleting an Event
Viewing Notifications
Auditing Logs
Operations supported by CTS
Querying Real-Time Traces
Permission Control
Creating a User and Authorizing the User the Permission to Access DEW
Creating a Custom DEW Policy
FAQs
KMS Related
What Is Key Management Service?
What Is a Customer Master Key?
What Is a Default Key?
What Are the Differences Between a Custom Key and a Default Key?
What Is a Data Encryption Key?
Why Cannot I Delete a CMK Immediately?
Which Cloud Services Can Use KMS for Encryption?
How Do Cloud Services Use KMS to Encrypt Data?
What Are the Benefits of Envelope Encryption?
Is There a Limit on the Number of Custom Keys That I Can Create on KMS?
Can I Export a CMK from KMS?
Can I Decrypt My Data if I Permanently Delete My Custom Key?
How Do I Use the Online Tool to Encrypt or Decrypt Small Volumes of Data?
Can I Update CMKs Created by KMS-Generated Key Materials?
When Should I Use a CMK Created with Imported Key Materials?
What Types of Keys Can I Import?
What Should I Do When I Accidentally Delete Key Materials?
How Are Default Keys Generated?
What Should I Do If I Do Not Have the Permissions to Perform Operations on KMS?
Why Can't I Wrap Asymmetric Keys by Using -id-aes256-wrap-pad in OpenSSL?
Key Algorithms Supported by KMS
What Should I Do If KMS Failed to Be Requested and Error Code 401 Is Displayed?
What Is the Relationship Between the Ciphertext and Plaintext Returned by the encrypt-data API?
How Does KMS Protect My Keys?
Credential Related
Why Cannot I Delete the Version Status of a Secret?
Change History
API Reference (ME-Abu Dhabi Region)
Before You Start
Overview
API Calling
Endpoints
Constraints
Concepts
Calling APIs
Making an API Request
Authentication
Returned Values
API Overview
APIs
Creating a CMK
Enabling a CMK
Disabling a CMK
Scheduling the Deletion of a CMK
Canceling the Scheduled Deletion of a CMK
Querying the List of CMKs
Querying the Information About a CMK
Creating a Random Number
Creating a DEK
Creating a Plaintext-Free DEK
Encrypting a DEK
Decrypting a DEK
Querying the Number of Instances
Querying the Quota of a User
Changing the Alias of a CMK
Changing the Description of a CMK
Encrypting Data
Decrypting Data
Obtaining CMK Import Parameters
Importing CMK Material
Deleting CMK Material
Querying CMK Instances
Querying CMK Tags
Querying Project Tags
Adding or Deleting CMK Tags in Batches
Adding a CMK Tag
Deleting a CMK Tag
Permissions Policies and Supported Actions
Introduction
Encryption Key Management
Appendix
Status Codes
Error Code
Obtaining a Project ID
API Permissions
Encryption Key Management
Change History
API Reference (Paris and Amsterdam Regions)
Before You Start
Overview
API Calling
Endpoints
Constraints
Concepts
Calling APIs
Making an API Request
Authentication
Returned Values
API Overview
APIs
Creating a CMK
Enabling a CMK
Disabling a CMK
Scheduling the Deletion of a CMK
Canceling the Scheduled Deletion of a CMK
Querying the List of CMKs
Querying the Information About a CMK
Creating a Random Number
Creating a DEK
Creating a Plaintext-Free DEK
Encrypting a DEK
Decrypting a DEK
Querying the Number of Instances
Querying the Quota of a User
Changing the Alias of a CMK
Changing the Description of a CMK
Creating a Grant
Revoking a Grant
Retiring a Grant
Querying Grants on a CMK
Querying Grants That Can Be Retired
Encrypting Data
Decrypting Data
Obtaining CMK Import Parameters
Importing CMK Material
Deleting CMK Material
Enabling Rotation for a CMK
Changing the Rotation Interval for a CMK
Disabling Rotation for a CMK
Querying the Rotation Status of a CMK
Appendix
Status Codes
Error Code
Obtaining a Project ID
API Permissions
Encryption Key Management
Change History
API Reference (Kuala Lumpur Region)
Before You Start
Overview
API Calling
Endpoints
Constraints
Concepts
Calling APIs
Making an API Request
Authentication
Returned Values
API Overview
APIs
Creating a CMK
Enabling a CMK
Disabling a CMK
Scheduling the Deletion of a CMK
Canceling the Scheduled Deletion of a CMK
Querying the List of CMKs
Querying the Information About a CMK
Creating a Random Number
Creating a DEK
Creating a Plaintext-Free DEK
Encrypting a DEK
Decrypting a DEK
Querying the Number of Instances
Querying the Quota of a User
Changing the Alias of a CMK
Changing the Description of a CMK
Creating a Grant
Revoking a Grant
Retiring a Grant
Querying Grants on a CMK
Querying Grants That Can Be Retired
Encrypting Data
Decrypting Data
Obtaining CMK Import Parameters
Importing CMK Material
Deleting CMK Material
Enabling Rotation for a CMK
Changing the Rotation Interval for a CMK
Disabling Rotation for a CMK
Querying the Rotation Status of a CMK
Appendix
Status Codes
Error Code
Obtaining a Project ID
API Permissions
Encryption Key Management
Change History
General Reference
Glossary
Service Level Agreement
White Papers
Endpoints
Permissions