Before You Start
Data Encryption Workshop (DEW) is a comprehensive cloud data encryption service. It provides Key Management Service (KMS), Cloud Secret Management Service (CSMS), and Key Pair Service (KPS), helping you secure your data and keys and simplify key management. DEW uses hardware security modules (HSMs) to protect your keys. It can be integrated with other cloud services to address data security, key security, and key management issues. Additionally, DEW allows you to develop customized encryption applications.
Endpoints
An endpoint is the request address for calling an API. Endpoints vary depending on services and regions. Obtain the regions and endpoints from the enterprise administrator.
Concepts
- Account
An account has full access permissions for all the resources and cloud services under it. It can reset user passwords and grant users permissions. The account is a payment entity and should not be used to perform routine management. For security purposes, create IAM users and grant them permissions for routine management.
- User
An IAM user is created by an account to use cloud services. Each IAM user has its own identity credentials (password and access keys).
The username, and password will be required for API authentication.
- Region
Regions are divided based on geographical location and network latency. Public services, such as Elastic Cloud Server (ECS), Elastic Volume Service (EVS), Object Storage Service (OBS), Virtual Private Cloud (VPC), Elastic IP (EIP), and Image Management Service (IMS), are shared within the same region. Regions are classified as universal regions and dedicated regions. A universal region provides universal cloud services for common tenants. A dedicated region provides services of the same type only or for specific tenants.
- Availability zone (AZ)
An AZ comprises one or multiple physical data centers equipped with independent ventilation, fire, water, and electricity facilities. Compute, network, storage, and other resources in an AZ are logically divided into multiple clusters. AZs within a region are interconnected using high-speed optical fibers to support cross-AZ high-availability systems.
- Project
Projects group and isolate resources (including compute, storage, and network resources) across physical regions. A default project is provided for each region, and subprojects can be created under each default project. Users can be granted permissions to access all resources in a specific project. For more refined access control, create subprojects under a project and create resources in the subprojects. Users can then be assigned permissions to access only specific resources in the subprojects.
Figure 1 Project isolation model
- Enterprise project
Enterprise projects group and manage resources across regions. Resources in enterprise projects are logically isolated from each other. An enterprise project can contain resources in multiple regions, and resources can be directly transferred between enterprise projects.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
For any further questions, feel free to contact us through the chatbot.
Chatbot