Application/Website developer
Learn all about one of the world's biggest and most exciting cloud companies
Explore our global presence and deployment regions around the world
Learn what the top industry analyst firms are saying about Alibaba Cloud
Learn the basic knowledge about cloud computing
Get Free Hands-on Experience With over 40 Products
SSD Cloud server and data transfer for only $4.50 a month
19.6% IaaS Market Share in Asia Pacific - Gartner IT Service report, 2018
With Anti-DDoS Premium, DDoS Attacks are No Longer Your Worry
1 on 1 presale consultation, 24/7 technical support, faster response, and more tickets
1 on 1 presale consultation, 24/7 technical support, faster response, and more tickets
Deploy more on the cloud at a lower cost with Alibaba Cloud
Leverage the same tools powering the Alibaba Ecosystem
Get a head start on your career in the cloud. $0.99 cloud server and free training course for eligible students
Building successful businesses for small & medium sized Independent Software Vendors (ISVs) globally
Invite friends to join Alibaba Cloud and receive free coupons
Secure, scalable, and high-performing virtual servers
Simple Application Server
Powerful parallel computing capabilities
Adjust and automate computing resources
Distribute traffic across resources
Manage your Dockerized applications
A Certified Kubernetes platform
An agile and secure serverless container instance service
A secure image hosting platform
Simplify operations and management
High-performance public computing service
High-performance elastic bare metal computing service
Powerful parallel computing accelerated on RDMA network
Large-scale batch processing
Your Dedicated Host on the Cloud
Store, backup and archive your data
Table Storage
Speed up file distribution to end-users
File storage service for ECS, HPC, and Container Service
Hybrid Cloud Storage ArrayComing Soon
Manage your Dockerized applications
A BaaS solution that protects customer data on-premises and in the cloud
Cloud Storage Gateway provides both file and block storage services
An introduction to stable networking services
Launch a private cloud network
Physical leased line and VPC interconnection
Public Internet gateway
Distribute traffic across resources
An independent public IP resource
A BaaS solution that protects customer data on-premises and in the cloud
Easy-to-use and cost-effective data transfer plans
An introduction to fully managed database services
In-memory database caching
Based on AliSQL to provide excellent stability and performance
High performing and versatile managed database
Provides rich version control, flexible upgrades, and reduces business costs
Provides high concurrency to maintain low latency
An integrated data management solution
A premium, serverless, and interactive analytics service
Provides easy-to-use tools to reduce costs of migration and usage
ApsaraDB for MongoDB
Distributed memory database
Data migration and data synchronization
A reliable backup service to ensure data security
An online warehousing service
Mitigates single machine scalability problems for large-scale relational databases
Time Series DatabaseBeta
An introduction to intelligent security services
An introduction to intelligent security services
Protect against high volume DDoS attacks
Protect against global DDoS attacks
Secure your web applications
Provides high concurrency to maintain low latency
Comprehensive security detection, response and prevention for hosts
Apply, purchase and manage SSL certificates
Asset-Correlation-Based Vulnerability and Website Threat Detection Service
Managed security service for systems on the cloud
Image and video content moderation service
Comprehensive bot defense reduces automated attacks on your website
A reliable backup service to ensure data security
Security Center provides round the clock security and protection
A customizable network security solution
Real-time cloud monitoring service
Authorize users' and partners' resource access
Create and manage encryption keys
Implement security analytics, resource change tracking, and compliance audits
Do more with your API calls and requests
Use command-line to manage Cloud resources from browser
Big Data processing service
A fast and fully-hosted TB/PB-level data warehousing solution
A highly integrated platform for real-time data processing
A full data warehousing solution with only half the investment
Real-time and Offline Data Synchronization
Intelligent analytics & visualization suite for big data
Powerful and insightful big data visualization
High-precision visual search product solution
Chatbot platform for smart dialogue interactions
Full path intelligent data creation and management platform
An end-to-end platform to meet your machine learning and data mining needs
Elasticsearch-based engine for search and analytics
Customized and high-quality machine translation
A public cloud supported email that provides fast, secure, and stable services
Send messages between applications
Open your data and service to users
An all-in-one service for log-type data
A simple and efficient email service
Secure and stable blockchain platform service on cloud
Application deployment and microservices solutions
Supports reliable message-based asynchronous communication
Easily interact between the cloud and IoT mobile devices
Centralizes management of application configurations
Easily debug and analyze your applications
Build business monitoring capabilities throughout the product lifecycle
Guarantees application high availability
Alibaba Cloud's cloud-based solutions support the demands of your business, website, or application.
Explore helpful resources from the Alibaba Cloud community
Latest cloud insights and developer trends
Step-by-step tutorials and how-to videos
Find events near you
Share and read expert technical content
Build your first app with APIs, SDKs, and tutorials
Research that dives deep into the latest trends, technology and cloud insights.
Technical and business training programs
Gain recognition for community leadership
We help accelerate Internet companies' growth globally
Introduction to fundamental technologies in cloud computing
Join Create@Alibaba Cloud
Get Free Hands-on Experience With over 40 Products
SSD Cloud server and data transfer for only $4.50 a month
19.6% IaaS Market Share in Asia Pacific - Gartner IT Service report, 2018
With Anti-DDoS Premium, DDoS Attacks are No Longer Your Worry
1 on 1 presale consultation, 24/7 technical support, faster response, and more tickets
1 on 1 presale consultation, 24/7 technical support, faster response, and more tickets
Deploy more on the cloud at a lower cost with Alibaba Cloud
Leverage the same tools powering the Alibaba Ecosystem
Get a head start on your career in the cloud. $0.99 cloud server and free training course for eligible students
Building successful businesses for small & medium sized Independent Software Vendors (ISVs) globally
Invite friends to join Alibaba Cloud and receive free coupons
Join a global network of partners
Help to design and manage your system and applications
Join us to grow your business together with Alibaba Cloud
Join us to grow your business together with Alibaba Cloud
Create, delete and manage encryption keys with Alibaba Cloud Key Management Service
Alibaba Cloud Key Management Service (KMS) is a fully managed service to create, delete and manage
encrypted keys to protect your data. For common key management scenarios, you can use APIs or Alibaba
Cloud management console to produce and manage Customer Master Keys (CMKs).
KMS enables you to
protect the confidentiality, integrity, and availability of keys while also saving on costs. You can
integrate KMS with other Alibaba Cloud services such as ApsaraDB for RDS and Object Storage Service,
to encrypt critical information including certificates and keys stored with these services. You can
use these keys securely and conveniently, and focus on developing encryption/decryption function
scenarios.
For common encryption/decryption scenarios, you can use the API to locally
encrypt/decrypt small volumes of data or envelope encryption technology for relatively larger volumes
of data. Also, you can define usage policies for data encryption. You can integrate it with various
Alibaba Cloud storage services to ensure the security of the stored data.
Tab #2 content goes here!
Donec pulvinar neque sed semper lacinia. Curabitur lacinia ullamcorper nibh; quis imperdiet velit eleifend ac. Donec blandit mauris eget aliquet lacinia! Donec pulvinar massa interdum risus ornare mollis. In hac habitasse platea dictumst. Ut euismod tempus hendrerit. Morbi ut adipiscing nisi. Etiam rutrum sodales gravida! Aliquam tellus orci, iaculis vel.
Tab #3 content goes here!
Donec pulvinar neque sed semper lacinia. Curabitur lacinia ullamcorper nibh; quis imperdiet velit eleifend ac. Donec blandit mauris eget aliquet lacinia! Donec pulvinar massa interdum ri.
Tab #4 content goes here!
Donec pulvinar neque sed semper lacinia. Curabitur lacinia ullamcorper nibh; quis imperdiet velit eleifend ac. Donec blandit mauris eget aliquet lacinia! Donec pulvinar massa interdum risus ornare mollis. In hac habitasse platea dictumst. Ut euismod tempus hendrerit. Morbi ut adipiscing nisi. Etiam rutrum sodales gravida! Aliquam tellus orci, iaculis vel.
Application/Website developer
Service developer
Chief Security Officer (CSO)
My program needs to use a key for encryption or a certificate for signature, and I hope the key is managed in a secure and independent manner. I hope I can safely access the key no matter where my application is deployed. I would never allow deploying the plaintext key randomly, which is too risky.
I do not want to be responsible for the security of users’ keys and data. I hope users can manage their keys by themselves and I can use specified keys to encrypt their data with their authorization. In this way, I can devote all energy to developing service functions.
I hope the key management of my company can meet compliance requirements. I need to ensure that keys are reasonably authorized and any use of keys must be audited.
Through the envelop encryption technology, users can store the Customer Master Key (CMK) in KMS and deploy only the encrypted data key, and users can call KMS to decrypt the data key only when they need to use it.
Based on the envelop encryption technology and the open APIs of KMS, service developers can use specified CMKs to encrypt and decrypt data keys, easily satisfying the requirement of not storing the plaintext directly in a storage device; therefore, service developers do not need to worry about how to manage users’ keys.
KMS can be associated with RAM for unified authorization management.
Allows you to create, view, enable, and disable CMKs to encrypt/decrypt data keys.
Enables you to view the whole master key list for all services integrated with KMS.
Enables HTTPS protocol to protect data while using SDKs to access keys.
Supports HMAC-SHA1 signature scheme.
Maintains confidentiality, integrity, and availability of keys used to protect data.
Please refer to Request structure for a complete list of available regions and endpoints.
Easily integrates with other Alibaba Cloud products such as ApsaraDB for RDS to protect the data stored using these services.
Encrypts your static files stored in Object Storage Service ensuring security.
Allows you to store, transfer and use encrypted data by encapsulating its data keys (DKs) in an envelope and stores CMKs in KMS.
Allows users to call KMS to decrypt data key only when needed.
Automatically scales to meet encryption needs as per your business requirement.
Stores multiple copies of encrypted versions of your master keys ensuring high durability and availability.
Potential to deploy in multiple availability zones within a region to ensure high availability of encryption keys.
Saves cost compared to procuring expensive hardware equipment to secure physical environment.
Pay only for resources needed as per your business requirements.
Supports RESTful API and third-party integration.
Integrates with RAM and supports unified authorization management.
Supports easy-to-use API and standard HTTPS protocols.
Allows you to create, view, enable, and disable CMKs to encrypt/decrypt data keys.
Enables you to view the whole master key list for all services integrated with KMS.
Encryption/decryption of small amount of data directly using KMS
Perform local encryption for massive amount of data using Envelope Encryption
Perform local decryption for massive amount of data using Envelope Encryption
Enterprise User Account Management and Permission Allocation
An enterprise has a project for which it has purchased multiple cloud resources like ECS/RDS/SLB instances and OSS buckets. Employees with different responsibilities and permissions need to perform various operations. They can be allocated independent user or operator accounts to perform only those resource operations to which they have permissions. This way the enterprise does not compromise on security and can also grant/revoke permissions for any user account at any time. Also, charges for resource operations are billed collectively to the enterprise that is the primary account.
Recommended configuration for this scenario
RAM-user accounts and authorization management function
Advantages
- Bind the primary account to an MFA device and configure MFA for
the primary account to prevent risks caused by disclosure of primary account
password
- Activate RAM
- Create user accounts and RAM user accounts for different employees (or application
systems) and set logon passwords or create access keys as needed
- Create a group for multiple employees with same responsibilities and add users to
the group
- Create custom authorization policies and grant permissions by binding one or more
policies to groups/users
Temporary Authorization Management for Mobile Apps
An enterprise does not want to allow all apps to use the AppServer to transmit data. However, mobile apps run on mobile devices and controlling these devices is not possible. The enterprise also wants to minimize security risks by giving each app an access token with minimal permissions and reducing the access duration.
Recommended configuration for this scenario
RAM STS-tokens
Advantages
-To complete the authorization process, the enterprise creates a
role and grants permissions to the role by binding it with authorization
policy
-Enterprise creates a RAM-user for AppServer and authorizes this user to assume the
role it created
- AppServer issues STS-tokens for resource access
Resource Operations and Authorization Management Between Enterprises
Enterprise A has purchased multiple cloud resources and granted cloud resource O&M, monitoring management, and other tasks to Enterprise B. Enterprise B can allocate access permissions for A’s resources to one or more of its employees. B needs to precisely control the operations its employees can perform on A’s resources. A needs to revoke B’s permissions at will if the O&M entrustment contract is revoked.
Suggested configuration for this scenario
RAM roles for cross-account authorization
Advantages
-A role is created and permissions are granted for cross-account
authorization
-Cross-account resources can be accessed through the console by creating sub-users
and authorizing them to assume the role
1. What is a Customer Master Key (CMK)?
CMK is the master key created by a user in the Alibaba Cloud Key Management Service (KMS) to encrypt data keys and generate envelopes. It can also be directly used to encrypt a small amount of data.
2. What is envelope encryption technology?
Envelope encryption is an encryption mechanism similar to the digital envelope technology. It allows you to store, transfer and use encrypted data by encapsulating its data keys (DKs) in an envelope, instead of encrypting/decrypting data directly with CMKs.
3. In what regions can KMS be accessed?
The following is the list of regions where KMS is available with their corresponding location ID and public/private network addresses:
| Location | Location Id | Public Network Address | Private Network Address |
| China East 1 (Hangzhou) | cn-hangzhou | kms.cn-hangzhou.aliyuncs.com | kms-vpc.cn-hangzhou.aliyuncs.com |
|---|---|---|---|
| Singapore | ap-southeast-1 | kms.ap-southeast-1.aliyuncs.com | kms-vpc.ap-southeast-1.aliyuncs.com |
| China East 2 (Shanghai) | cn-shanghai | kms.cn-shanghai.aliyuncs.com | kms-vpc.cn-shanghai.aliyuncs.com |
| China North 2 (Beijing) | cn-beijing | kms.cn-beijing.aliyuncs.com | kms-vpc.cn-beijing.aliyuncs.com |
| China South 1 (Shenzhen) | cn-shenzhen | kms.cn-shenzhen.aliyuncs.com | kms-vpc.cn-shenzhen.aliyuncs.com |
| Japan | ap-northeast-1 | kms.ap-northeast-1.aliyuncs.com | kms-vpc.ap-northeast-1.aliyuncs.com |
| Frankfurt | eu-central-1 | kms.eu-central-1.aliyuncs.com | kms-vpc.eu-central-1.aliyuncs.com |
| Dubai | me-east-1 | kms.me-east-1.aliyuncs.com | kms-vpc.me-east-1.aliyuncs.com |
| Sydney | ap-southeast-2 | kms.ap-southeast-2.aliyuncs.com | kms-vpc.ap-southeast-2.aliyuncs.com |
| Hong Kong | cn-hongkong | kms.cn-hongkong.aliyuncs.com | kms-vpc.cn-hongkong.aliyuncs.com |
| China North 3 (Zhangjiakou) | cn-zhangjiakou | kms.cn-zhangjiakou.aliyuncs.com | kms-vpc.cn-zhangjilou.aliyuncs.com |
| China North 1 (Qingdao) | cn-qingdao | kms.cn-qingdao.aliyuncs.com | kms-vpc.cn-qingdao.aliyuncs.com |
| Kuala Lumpur | ap-southeast-3 | kms.ap-southeast-3.aliyuncs.com | kms-vpc.ap-southeast-3.aliyuncs.com |
| China North 5(huhehaote) | cn-huhehaote | kms.cn-huhehaote.aliyuncs.com | kms-vpc.cn-huhehaote.aliyuncs.com |
4. Can the KMS endpoint not be accessed?
To ensure data security, KMS only supports HTTPS protocol when you use SDKs to access it.
5. Why does the error "Forbidden.KeyNotFound" occur during decryption?
The error typically occurs when you try to decrypt data in an incorrect region. KMS is completely independent in each of the regions. You need to ensure that you decrypt data in the same region where the data was encrypted.
6. How can I manage user keys using KMS?
Based on the envelope encryption technology and open APIs of KMS, you can use specified CMKs to encrypt and decrypt data keys. Then you don’t have to store the plain text directly in a storage device. This way, you can easily concentrate on development work without worrying about managing users’ keys.
7. How many CMKs can be created by one user in each region?
Each user can create up to 200 CMKs in each region. In case you need to create more than 200 CMKs, you can submit a request to Alibaba Cloud through its ticket system.
8. What is encryption context?
Encryption context is a JSON string in the String-String format that may be used in KMS APIs including Encrypt, GenerateDataKey, and Decrypt to protect data integrity.
1 on 1 Presale Consultation, 24/7 Technical Support, Faster Response, and More Tickets.
Consulting by experienced cloud experts. Learn
More
Extended service time from 10 hours 5 days a week to 24/7. Learn More
The number of free tickets doubled from 3 to 6 per quarter. Learn More
Shorten after-sale response time from 36 hours to 18 hours. Learn More