A specific construction for calculating a message authentication code (MAC) involving a cryptographic hash function in combination with a secret key. You can use it to verify both the data integrity and the authenticity of a message at the same time. AWS calculates the HMAC using a standard, cryptographic hash algorithm, such as SHA-256.
- Browse Related Terms: 100-continue, access identifiers, access key rotation, certificate, credentials, Hash-based Message Authentication Code (HMAC), key pair, mapper, Sandbox, user
Also listed in: