Features
<p class="shortdesc"></p>
<p class="p">Ping An Cloud
KMS
offers the following features: </p>
<ul class="ul" id="function__ul_jyd_y3t_3lb">
<li class="li"><strong class="ph b">Key Creation</strong><p class="p">Ping An Cloud KMS provides two types of keys: customer master keys (CMKs) and data keys (DKs). </p></li>
<li class="li"><strong class="ph b">Customer Master Keys</strong><p class="p">You can create CMKs using the console or API calls. You can use CMKs to encrypt data keys and generate envelops or to directly encrypt or decrypt small amounts of data (less than 4KB). </p></li>
<li class="li"><strong class="ph b">Data Keys</strong><p class="p">You can create DKs with API calls, and use them to encrypt large amounts of data locally. </p></li>
<li class="li"><strong class="ph b">Data Encryption</strong><p class="p">Data encryption is the core feature of KMS, mainly serving for the protection of sensitive data stored on server hard drives in practice. </p></li>
<li class="li"><strong class="ph b">Envelope Encryption</strong><p class="p">Envelope encryption offers a security solution for businesses with vast amounts of data. KMS can ensure the security of data keys, therefore enhancing business data security. </p></li>
<li class="li"><strong class="ph b">Key Management</strong><p class="p">Apart from creating keys, encryption, and decryption, KMS also provides other management functions, including disabling and enabling keys, scheduling key deletion, canceling key deletion, viewing keys, etc. </p></li>
<li class="li"><strong class="ph b">External Key Material Import</strong><p class="p">You can create a key with an external key material origin, and then import the key material that meets the requirements for use. </p></li>
<li class="li"><strong class="ph b">Password Safe</strong><p class="p">You can import your passwords into the password safe for management. When you need to use the passwords, you can obtain them using API calls. In this way, you can ensure the security and reliability of your passwords. </p></li>
<li class="li"><strong class="ph b">Asymmetric Key Management</strong><p class="p">You can create asymmetric keys with KMS, and also schedule key deletion, cancel key deletion, download public keys, and upgrade key pairs. Moreover, you can use APIs to get private keys to decrypt data encrypted by corresponding public keys. </p></li>
</ul>
Did the above content solve your problem?
Yes
No
Submitted successfully! Thank you for your feedback, we will try our best to do better and better!