关于“EMR File System Client-side Encryption Using AWS KMS-managed Keys”的评价
1597 条评价
Enrique D. · 已于 about 9 years前审核
Russell P. · 已于 about 9 years前审核
Phil S. · 已于 about 9 years前审核
Aakanksha S. · 已于 about 9 years前审核
Chung Wing S. · 已于 about 9 years前审核
In putty my text was not displayed as encrypted
Abhishek S. · 已于 about 9 years前审核
Tzoori T. · 已于 about 9 years前审核
Good real world example.
Isaac S. · 已于 about 9 years前审核
Thomas G. · 已于 about 9 years前审核
Excellent lab. No issues.
Joe M. · 已于 about 9 years前审核
Pretty crap
mohammed a. · 已于 about 9 years前审核
James F. · 已于 about 9 years前审核
Jeffrey N. · 已于 about 9 years前审核
Anthony T. · 已于 about 9 years前审核
mark i. · 已于 about 9 years前审核
Sergey P. · 已于 about 9 years前审核
Tetsuhito Y. · 已于 about 9 years前审核
Mia A. · 已于 about 9 years前审核
S. V. · 已于 about 9 years前审核
Jonathan G. · 已于 about 9 years前审核
Lab didn't function correctly - got error on the confirm encrypted txt retrieval form s3: [hadoop@ip-172-31-13-47 ~]$ aws s3 cp s3://emr-seclab-bucket/outputfile.txt encryptedOutputFile.txt download failed: s3://emr-seclab-bucket/outputfile.txt to ./encryptedOutputFile.txt An error occurred (InvalidArgument) when calling the GetObject operation: Requests specifying Server Side Encryption with AWS KMS managed keys require AWS Signature Version 4. You can enable AWS Signature Version 4 by running the command: aws configure set s3.signature_version s3v4 After executing the requested command, I could read the cleartext, I assume because s3 supports transparent decryption for users who have access to the key.
Dale B. · 已于 about 9 years前审核
Stephen G. · 已于 about 9 years前审核
helpful
旭阳 姜. · 已于 about 9 years前审核
Jerry C. · 已于 about 9 years前审核
Mark K. · 已于 about 9 years前审核
我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。