Help Center/
Data Encryption Workshop/
User Guide (Kuala Lumpur Region)/
Service Overview/
CSMS/
Application Scenarios
Updated on 2024-03-27 GMT+08:00
Application Scenarios
This section uses a basic database username and its password as an example to describe how CSMS works.
Figure 1 Secret-based login process
The procedure is as follows:
- Create a secret on the console or via an API to store database information (such as the database address, port, and password).
- Use an application to access the database. CSMS will query the secret you created.
- CSMS retrieves and decrypts the secret ciphertext, and securely returns the information stored in the secret to the application through the secret management API.
- The application obtains the decrypted plaintext secret and uses it to access the database.
Parent topic: CSMS
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.See the reply and handling status in My Cloud VOC.
The system is busy. Please try again later.
For any further questions, feel free to contact us through the chatbot.
Chatbot