Updated on 2025-05-06 GMT+08:00

Example Scenario

User-Integrated KMS to Applications

Figure 1 Principles of user-integrated KMS to applications

Encrypting and Decrypting a Cloud Service Integrated with KMS

Figure 2 Principles of a cloud service integrated with KMS