关于“EMR File System Client-side Encryption Using AWS KMS-managed Keys”的评价
评论
Enrique D. · 评论about 9 years之前
Russell P. · 评论about 9 years之前
Phil S. · 评论about 9 years之前
Aakanksha S. · 评论about 9 years之前
Chung Wing S. · 评论about 9 years之前
In putty my text was not displayed as encrypted
Abhishek S. · 评论about 9 years之前
Tzoori T. · 评论about 9 years之前
Good real world example.
Isaac S. · 评论about 9 years之前
Thomas G. · 评论about 9 years之前
Excellent lab. No issues.
Joe M. · 评论about 9 years之前
Pretty crap
mohammed a. · 评论about 9 years之前
James F. · 评论about 9 years之前
Jeffrey N. · 评论about 9 years之前
Anthony T. · 评论about 9 years之前
mark i. · 评论about 9 years之前
Sergey P. · 评论about 9 years之前
Tetsuhito Y. · 评论about 9 years之前
Mia A. · 评论about 9 years之前
S. V. · 评论about 9 years之前
Jonathan G. · 评论about 9 years之前
Lab didn't function correctly - got error on the confirm encrypted txt retrieval form s3: [hadoop@ip-172-31-13-47 ~]$ aws s3 cp s3://emr-seclab-bucket/outputfile.txt encryptedOutputFile.txt download failed: s3://emr-seclab-bucket/outputfile.txt to ./encryptedOutputFile.txt An error occurred (InvalidArgument) when calling the GetObject operation: Requests specifying Server Side Encryption with AWS KMS managed keys require AWS Signature Version 4. You can enable AWS Signature Version 4 by running the command: aws configure set s3.signature_version s3v4 After executing the requested command, I could read the cleartext, I assume because s3 supports transparent decryption for users who have access to the key.
Dale B. · 评论about 9 years之前
Stephen G. · 评论about 9 years之前
helpful
旭阳 姜. · 评论about 9 years之前
Jerry C. · 评论about 9 years之前
Mark K. · 评论about 9 years之前
我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。