关于“EMR File System Client-side Encryption Using AWS KMS-managed Keys”的评价

评论

Enrique D. · 评论about 9 years之前

Russell P. · 评论about 9 years之前

Phil S. · 评论about 9 years之前

Aakanksha S. · 评论about 9 years之前

Chung Wing S. · 评论about 9 years之前

In putty my text was not displayed as encrypted

Abhishek S. · 评论about 9 years之前

Tzoori T. · 评论about 9 years之前

Good real world example.

Isaac S. · 评论about 9 years之前

Thomas G. · 评论about 9 years之前

Excellent lab. No issues.

Joe M. · 评论about 9 years之前

Pretty crap

mohammed a. · 评论about 9 years之前

James F. · 评论about 9 years之前

Jeffrey N. · 评论about 9 years之前

Anthony T. · 评论about 9 years之前

mark i. · 评论about 9 years之前

Sergey P. · 评论about 9 years之前

Tetsuhito Y. · 评论about 9 years之前

Mia A. · 评论about 9 years之前

S. V. · 评论about 9 years之前

Jonathan G. · 评论about 9 years之前

Lab didn't function correctly - got error on the confirm encrypted txt retrieval form s3: [hadoop@ip-172-31-13-47 ~]$ aws s3 cp s3://emr-seclab-bucket/outputfile.txt encryptedOutputFile.txt download failed: s3://emr-seclab-bucket/outputfile.txt to ./encryptedOutputFile.txt An error occurred (InvalidArgument) when calling the GetObject operation: Requests specifying Server Side Encryption with AWS KMS managed keys require AWS Signature Version 4. You can enable AWS Signature Version 4 by running the command: aws configure set s3.signature_version s3v4 After executing the requested command, I could read the cleartext, I assume because s3 supports transparent decryption for users who have access to the key.

Dale B. · 评论about 9 years之前

Stephen G. · 评论about 9 years之前

helpful

旭阳 姜. · 评论about 9 years之前

Jerry C. · 评论about 9 years之前

Mark K. · 评论about 9 years之前

我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。