Data Encryption Workshop
Data Encryption Workshop
All results for "
" in this service
All results for "
" in this service
What's New
Function Overview
Service Overview
What Is DEW?
KMS
Functions
Advantages
Application Scenarios
Example Scenario
Using KMS for Encryption
Cloud Services with KMS Integrated
CSMS
Functions
Advantages
Scenario
KPS
Functions
Advantages
Application Scenarios
Dedicated HSM
Dedicated HSM Infographics
Functions
Advantages
Application Scenarios
Editions
Personal Data Protection Mechanism
Security
Shared Responsibilities
Asset Identification and Management
Identity Authentication and Access Control
Data Protection Technologies
Audit and Logging
Service Resilience
Certificates
Permissions Management
Related Services
Basic Concepts
Billing
Billing Overview
Billing Modes
Overview
Yearly/Monthly Billing
Pay-per-Use Billing
Billing Items
Billing Examples
Renewing Subscriptions
Overview
Manually Renewing DEW
Auto-renewing DEW
Bills
Arrears
Billing Termination
Cost Management
Billing FAQs
How Is DEW Charged?
How Do I Renew DEW?
How Do I Unsubscribe from DEW?
Will a CMK Be Charged After It Is Disabled?
Are Credentials Scheduled to Be Deleted Billed?
Will a CMK Be Charged After It Is Scheduled to Delete?
How Is Rotation Charged for a CMK?
How Is RDS Encryption Billed?
How Is It Charged for Replica Keys?
Getting Started
Creating a Key for Cloud Service Encryption
Creating a Secret for Data Storage Rotation
Binding a Key Pair and Logging In to an ECS Using a Private Key
Using a Key to Encrypt Data in OBS
Getting Started with Common Practices
User Guide
Creating a User and Authorizing the User the Permission to Access DEW
Key Management Service
Overview
Creating a Key
Creating a Custom Key
Importing an External Key
Using a Key
Using KMS for Encryption
Encrypting and Decrypting Small-size Data Online Using a Custom Key
Managing Keys
Viewing Key Details
Creating an Alias for a Custom Key
Adding a Tag to a Custom Key
Creating a Replica Key for a Custom Key
Creating a Grant for a Custom Key
Adding a Custom Key to an Enterprise Project
Viewing the Number of Key Accounting Requests
Enabling Key Rotation
Key Pair Service
Overview
Creating a Key Pair
Using Key Pairs
Binding a Key Pair to an ECS
Using a Private Key to Log In to the Linux ECS
Using a Private Key to Obtain the Login Password of Windows ECS
Managing Key Pairs
Upgrading a Private Key Pair to an Account Key Pair
Managing Public and Private Keys
Cloud Secret Management Service
Overview
Rotation Policy
Creating a Secret
Managing Secrets
Rotating Secret Version
Adding a Tag to a Secret
Associating a Secret with an Event
Managing Secret Versions
Dedicated HSM
Overview
Purchasing a Dedicated HSM Instance
Creating a Dedicated HSM Instance
Activating and Using a Dedicated HSM Instance
Activating a Dedicated HSM Instance
Using Dedicated HSM Instances
Managing Dedicated HSM Instances
Viewing Dedicated HSM Instances
Adding a Tag to a Dedicated HSM Instance
Tags and Quotas
Tag Management
Overview
Creating a Tag Policy
Creating a Tag
Searching for a Custom Key by Tag
Modifying a Tag Value
Deleting a Tag
Quota Adjustment
Monitoring and Auditing
Using CTS to Audit DEW
Operations supported by CTS
Viewing CTS Traces in the Trace List
Using Config to Audit DEW
Permission Control
Creating a Custom DEW Policy
Critical Operation Protection
Sharing
Overview
Shared KMS
Activating a Dedicated HSM Instance Using a Shared VPC
Best Practices
Key Management Service
Using KMS to Encrypt Offline Data
Encrypting or Decrypting Small Volumes of Data
Encrypting or Decrypting a Large Amount of Data
Using KMS to Encrypt and Decrypt Data for Cloud Services
Overview
Encrypting Data in ECS
Encrypting Data in EVS
Encrypting Data in IMS
Encrypting Data in OBS
Encrypting an RDS DB Instance
Encrypting a DDS DB Instance
Using the Encryption SDK to Encrypt and Decrypt Local Files
Encrypting and Decrypting Data Through Cross-region DR
Using KMS to Protect File Integrity
Cloud Secret Management Service
Using CSMS to Change Hard-coded Database Account Passwords
Using CSMS to Prevent AK/SK Leakage
Using CSMS to Automatically Rotate Security Passwords
Rotating Secrets
Overview
Single-User Secret Rotation
Dual-User Secret Rotation
Rotating IAM Secrets Using FunctionGraph
General
Retrying Failed DEW Requests by Using Exponential Backoff
KMS Best Practices
CSMS Best Practices
API Reference
Before You Start
Calling APIs
Making an API Request
Authentication
Response
API Overview
APIs
Key Management APIs
Key Lifecycle Management
Creating a Key
Enabling a Key
Disabling a Key
Scheduling Key Deletion
Canceling Scheduled Key Deletion
Modifying a Key Alias
Modifying Key Description
DEK Management
Generating a Random Number
Creating a DEK
Creating a Plaintext-free DEK
Encrypting a DEK
Decrypting a DEK
Key Import Management
Obtaining Key Import Parameters
Importing Key Materials
Deleting Key Materials
Key Authorization Management
Creating a Grant
Revoking a Grant
Retiring a Grant
Querying the Grant List
Querying Retirable Grants
Small-size Data Encryption and Decryption
Encrypting Data
Decrypting Data
Signature and Verification
Signing Data
Authenticating a Signature
Key Rotation Management
Enabling Key Rotation
Disabling Key Rotation
Modifying the Key Rotation Interval
Querying Key Rotation Status
Key Tag Management
Querying Key Instances
Querying Key Tags
Adding Tags to a Key
Querying Project Tags
Batch Adding or Deleting Key Tags
Deleting Key Tags
Key Query
Querying the Key List
Querying Key Details
Querying a Public Key
Querying the Instance Quantity
Querying Quota
Key API Version Query
Querying the Version List
Querying a Version
Dedicated Keystore Management
Creating a Dedicated Keystore
Obtaining the Dedicated Keystore List
Obtaining a Dedicated Keystore
Deleting a Dedicated Keystore
Enabling a Dedicated Keystore
Disabling a Dedicated Keystore
Key Pair Management APIs
Key Pair Management
Creating and Importing an SSH Key Pair
Accessing the page for clearing private keys
Querying the SSH Key Pair List
Querying SSH Key Pair Details
Deleting an SSH Key Pair
Updating SSH Key Pair Description
Accessing the page for importing private keys
Exporting a private key
Importing SSH Key Pairs in Batches
Exporting Private Keys of Key Pairs in Batches
Key pair task management
Binding an SSH Key Pair
Unbind an SSH Key Pair
Binding SSH Key Pairs in Batches
Querying Task Information
Querying Running Tasks
Querying Task Failure Information
Delete all failed tasks
Delete a failed task
Secret Management APIs
Lifecycle Management
Creating a Secret
Querying the Secret List
Querying a Secret
Updating a Secret
Deleting a Secret Immediately
Restoring a Secret Object
Downloading Secret Backup
Creating a Scheduled Secret Deletion Task
Canceling a Scheduled Secret Deletion Task
Rotating a Secret
Secret Version Management
Updating the Secret Version
Querying the Secret Version and Value
Secret Version Status Management
Updating the Version Status of a Secret
Querying the Version Status of a Secret
Deleting the Version Status of a Secret
Secret Tag Management
Querying a Secret Instance
Adding or Deleting Secret Tags in Batches
Querying Secret Tags
Querying Secret Tags
Deleting a Secret Tag
Querying Project Tags
Event Management
Creating an Event
Querying Events
Querying the Event List
Update an Event
Deleting an Event Immediately
Querying Triggered Event Notification Records
Secret rotation management
Query the task list.
Create a service agency.
Check whether a service agency exists.
Obtain the secret rotation function template.
Secret version management
Creating a Secret Version
Querying the Secret Version List
Historical APIs
Managing SSH Key Pairs (V2.1)
Querying the List of SSH Key Pairs (V2.1)
Querying Details About an SSH Key Pair (V2.1)
Creating and Importing an SSH Key Pair (V2.1)
Deleting an SSH Key Pair (V2.1)
Modifying the Description of a Key Pair (V2.1)
Managing SSH Key Pairs (V2)
Querying the List of SSH Key Pairs (V2)
Querying Details About an SSH Key Pair (V2)
Creating and Importing an SSH Key Pair (V2)
Deleting an SSH Key Pair (V2)
Copying an SSH Key Pair (V2)
Application Examples
Example 1: Encrypting or Decrypting Small Volumes of Data
Example 2: Encrypting or Decrypting Large Volumes of Data
Example 3: Querying Information About Keys
Permissions Policies and Supported Actions
Introduction
Encryption Key Management
Key Pair Management
Appendix
Status Codes
Error Code
Obtaining a Project ID
SDK Reference
SDK Overview
FAQs
About DEW
What Cryptography Algorithms Does DEW Use?
What Is the Resource Allocation Mechanism of DEW?
What Are Regions and AZs?
Can DEW Be Shared Across Accounts?
How Do I Access the Functions of DEW?
Why Do DEW Pemissions Fail to Take Effect Immediately?
KMS Related
Which Cloud Services Are Provided with Default Keys by KMS?
What Are the Differences Between a Custom Key and a Default Key?
How Do I Use a DEK?
Why Cannot I Delete a CMK Immediately?
Which Cloud Services Can Use KMS for Encryption?
How Do Huawei Cloud Services Use KMS to Encrypt Data?
What Are the Benefits of Envelope Encryption?
Is There a Limit on the Number of Custom Keys That I Can Create on KMS?
Can I Export a CMK from KMS?
Can I Decrypt My Data if I Permanently Delete My Custom Key?
Can I Update CMKs Created by KMS-Generated Key Materials?
When Should I Use a CMK Created with Imported Key Materials?
What Should I Do When I Accidentally Delete Key Materials?
How Are Default Keys Generated?
What Should I Do If I Do Not Have the Permissions to Perform Operations on KMS?
Why Can't I Wrap Asymmetric Keys by Using -id-aes256-wrap-pad in OpenSSL?
Key Algorithms Supported by KMS
What Should I Do If KMS Failed to Be Requested and Error Code 401 Is Displayed?
What Is the Relationship Between the Ciphertext and Plaintext Returned by the encrypt-data API?
How Does KMS Protect My Keys?
How Do I Use an Asymmetric Key to Verify the Signature Result of a Public Key Pair?
Does an Imported Key Support Rotation?
Does KMS Support Offline Data Encryption and Decryption?
How Do I Convert an Original EC Private Key into a Private Key in PKCS8 Format?
CSMS Related
Why Cannot I Delete the Version Status of a Secret?
Why Is the Rotation Period Set for RDS Secrets Inconsistent with the Actual Rotation Period?
What Can I Do If "The API does not exist or has not been published in the environment" Is Displayed When I Rotate TaurusDB Secrets?
KPS Related
How Do I Handle an Import Failure of a Key Pair Created Using PuTTYgen?
What Should I Do When I Fail to Import a Key Pair Using Internet Explorer 9?
How Do I Handle the Failure in Binding a Key Pair?
How Do I Handle the Failure in Replacing a Key Pair?
How Do I Handle the Failure in Resetting a Key Pair?
How Do I Handle the Failure in Unbinding a Key Pair?
Do I Need to Restart Servers After Replacing Its Key Pair?
How Do I Enable the Password Login Mode for an ECS?
How Do I Handle the Failure in Logging In to ECS After Unbinding the Key Pair?
What Should I Do If My Private Key Is Lost?
How Do I Convert the Format of a Private Key File?
Can I Change the Key Pair of a Server?
Can a Key Pair Be Shared by Multiple Users?
How Do I Obtain the Public or Private Key File of a Key Pair?
What Can I Do If an Error Is Reported When an Account Key Is Created or Upgraded for the First Time?
Will the Account Key Pair Quota Be Occupied After a Private Key Pair Is Upgraded to an Account Key Pair?
Why Is the Private Key Pair Invisible After It Is Upgraded to an Account Key Pair When Logging in as a Federated User?
Dedicated HSM Related
How Does Dedicated HSM Ensure the Security for Key Generation?
Do Equipment Room Personnel Has the Super Administrator Role to Steal Information by Using a Privileged UKey?
What HSMs Are Used for Dedicated HSM?
What APIs Does Dedicated HSM Support?
How Do I Enable Public Access to a Dedicated HSM Instance?
Videos
More Documents
User Guide (ME-Abu Dhabi Region)
Introduction
Concepts
KMS
CMK
Default Master Key
DEK
HSM
Envelope Encryption
TRNG
Application Scenarios
Functions
Accessing and Using KMS
How to Access KMS
How to Use KMS
Related Services
KMS Permissions Management
Management
Creating a Key
Creating CMKs Using Imported Key Material
Overview
Importing Key Material
Deleting Key Material
Scheduling the Deletion of One or Multiple CMKs
Encrypting and Decrypting Small Data Online
Managing Tags
Adding a Tag
Searching for Tags
Modifying Tag Values
Deleting Tags
Managing CMKs
Querying a CMK
Changing the Alias and Description of a CMK
Enabling One or Multiple CMKs
Disabling One or Multiple CMKs
Canceling the Scheduled Deletion of One or Multiple CMKs
Permissions Management
Creating a User and Authorizing the User the Permission to Access KMS
Creating a Custom Policy
FAQs
What Is Key Management Service?
What Is a Customer Master Key?
What Is a Data Encryption Key?
Why Cannot I Delete a CMK Immediately?
Which Cloud Services Can Use KMS for Encryption?
Change History
User Guide (Paris and Amsterdam Regions)
Introduction
Concepts
KMS
CMK
Default Master Key
DEK
HSM
Envelope Encryption
TRNG
Application Scenarios
Functions
Accessing and Using KMS
How to Access KMS
How to Use KMS
Related Services
User Permissions
Management
Creating a Key
Creating CMKs Using Imported Key Material
Overview
Importing Key Material
Deleting Key Material
Scheduling the Deletion of One or Multiple CMKs
Rotating CMKs
Context
Enabling Key Rotation
Managing CMKs
Querying a CMK
Changing the Alias and Description of a CMK
Enabling One or Multiple CMKs
Disabling One or Multiple CMKs
Canceling the Scheduled Deletion of One or Multiple CMKs
FAQs
What Is Key Management Service?
What Is a Customer Master Key?
What Is a Data Encryption Key?
Why Cannot I Delete a CMK Immediately?
Which Cloud Services Can Use KMS for Encryption?
How Does KMS Charge?
Are Disabled CMKs Billable?
Change History
User Guide (Kuala Lumpur Region)
Service Overview
What Is DEW?
Basic Concepts
KMS
Functions
Advantages
Application Scenarios
Using KMS
Cloud Services with KMS Integrated
Encrypting Data in OBS
Encrypting Data in EVS
Encrypting Data in IMS
Encrypting Data in SFS
Encrypting Data in RDS
Encrypting Data in DDS
CSMS
Functions
Advantages
Application Scenarios
DEW Permission Management
How to Access
Related Services
Personal Data Protection Mechanism
User Guide
Key Management Service
Key Types
Creating a Key
Creating CMKs Using Imported Key Materials
Overview
Importing Key Materials
Deleting Key Materials
Managing CMKs
Viewing a CMK
Enabling One or More CMKs
Disabling One or More CMKs
Deleting One or More CMKs
Canceling the Scheduled Deletion of One or More CMKs
Adding a Key to a Project
Searching for a Key
Using the Online Tool to Encrypt and Decrypt Small-Size Data
Managing Tags
Adding a Tag
Modifying Tag Values
Deleting Tags
Rotating CMKs
About Key Rotation
Enabling Key Rotation
Disabling Key Rotation
Managing a Grant
Creating a Grant
Querying a Grant
Revoking a Grant
Cloud Secret Management Service
Creating a Secret
Creating a Shared Secret
Managing Secrets
Viewing a Secret
Deleting a Secret
Managing Secret Versions
Saving and Viewing Secret Values
Managing Secret Version Statuses
Managing Tags
Adding a Tag
Searching for a Secret by Tag
Modifying a Tag Value
Deleting a Tag
Creating an Event
Managing Events
Viewing Events
Editing an Event
Enabling an Event
Disabling an Event
Deleting an Event
Viewing Notifications
Auditing Logs
Operations supported by CTS
Querying Real-Time Traces
Permission Control
Creating a User and Authorizing the User the Permission to Access DEW
Creating a Custom DEW Policy
FAQs
KMS Related
What Is Key Management Service?
What Is a Customer Master Key?
What Is a Default Key?
What Are the Differences Between a Custom Key and a Default Key?
What Is a Data Encryption Key?
Why Cannot I Delete a CMK Immediately?
Which Cloud Services Can Use KMS for Encryption?
How Do Cloud Services Use KMS to Encrypt Data?
What Are the Benefits of Envelope Encryption?
Is There a Limit on the Number of Custom Keys That I Can Create on KMS?
Can I Export a CMK from KMS?
Can I Decrypt My Data if I Permanently Delete My Custom Key?
How Do I Use the Online Tool to Encrypt or Decrypt Small Volumes of Data?
Can I Update CMKs Created by KMS-Generated Key Materials?
When Should I Use a CMK Created with Imported Key Materials?
What Types of Keys Can I Import?
What Should I Do When I Accidentally Delete Key Materials?
How Are Default Keys Generated?
What Should I Do If I Do Not Have the Permissions to Perform Operations on KMS?
Why Can't I Wrap Asymmetric Keys by Using -id-aes256-wrap-pad in OpenSSL?
Key Algorithms Supported by KMS
What Should I Do If KMS Failed to Be Requested and Error Code 401 Is Displayed?
What Is the Relationship Between the Ciphertext and Plaintext Returned by the encrypt-data API?
How Does KMS Protect My Keys?
Credential Related
Why Cannot I Delete the Version Status of a Secret?
Change History
API Reference (ME-Abu Dhabi Region)
Before You Start
Overview
API Calling
Endpoints
Constraints
Concepts
Calling APIs
Making an API Request
Authentication
Returned Values
API Overview
APIs
Creating a CMK
Enabling a CMK
Disabling a CMK
Scheduling the Deletion of a CMK
Canceling the Scheduled Deletion of a CMK
Querying the List of CMKs
Querying the Information About a CMK
Creating a Random Number
Creating a DEK
Creating a Plaintext-Free DEK
Encrypting a DEK
Decrypting a DEK
Querying the Number of Instances
Querying the Quota of a User
Changing the Alias of a CMK
Changing the Description of a CMK
Encrypting Data
Decrypting Data
Obtaining CMK Import Parameters
Importing CMK Material
Deleting CMK Material
Querying CMK Instances
Querying CMK Tags
Querying Project Tags
Adding or Deleting CMK Tags in Batches
Adding a CMK Tag
Deleting a CMK Tag
Permissions Policies and Supported Actions
Introduction
Encryption Key Management
Appendix
Status Codes
Error Code
Obtaining a Project ID
API Permissions
Encryption Key Management
Change History
API Reference (Paris and Amsterdam Regions)
Before You Start
Overview
API Calling
Endpoints
Constraints
Concepts
Calling APIs
Making an API Request
Authentication
Returned Values
API Overview
APIs
Creating a CMK
Enabling a CMK
Disabling a CMK
Scheduling the Deletion of a CMK
Canceling the Scheduled Deletion of a CMK
Querying the List of CMKs
Querying the Information About a CMK
Creating a Random Number
Creating a DEK
Creating a Plaintext-Free DEK
Encrypting a DEK
Decrypting a DEK
Querying the Number of Instances
Querying the Quota of a User
Changing the Alias of a CMK
Changing the Description of a CMK
Creating a Grant
Revoking a Grant
Retiring a Grant
Querying Grants on a CMK
Querying Grants That Can Be Retired
Encrypting Data
Decrypting Data
Obtaining CMK Import Parameters
Importing CMK Material
Deleting CMK Material
Enabling Rotation for a CMK
Changing the Rotation Interval for a CMK
Disabling Rotation for a CMK
Querying the Rotation Status of a CMK
Appendix
Status Codes
Error Code
Obtaining a Project ID
API Permissions
Encryption Key Management
Change History
API Reference (Kuala Lumpur Region)
Before You Start
Overview
API Calling
Endpoints
Constraints
Concepts
Calling APIs
Making an API Request
Authentication
Returned Values
API Overview
APIs
Creating a CMK
Enabling a CMK
Disabling a CMK
Scheduling the Deletion of a CMK
Canceling the Scheduled Deletion of a CMK
Querying the List of CMKs
Querying the Information About a CMK
Creating a Random Number
Creating a DEK
Creating a Plaintext-Free DEK
Encrypting a DEK
Decrypting a DEK
Querying the Number of Instances
Querying the Quota of a User
Changing the Alias of a CMK
Changing the Description of a CMK
Creating a Grant
Revoking a Grant
Retiring a Grant
Querying Grants on a CMK
Querying Grants That Can Be Retired
Encrypting Data
Decrypting Data
Obtaining CMK Import Parameters
Importing CMK Material
Deleting CMK Material
Enabling Rotation for a CMK
Changing the Rotation Interval for a CMK
Disabling Rotation for a CMK
Querying the Rotation Status of a CMK
Appendix
Status Codes
Error Code
Obtaining a Project ID
API Permissions
Encryption Key Management
Change History
General Reference
Glossary
Service Level Agreement
White Papers
Endpoints
Permissions