@aws-sdk/client-kms 3.218.0 → 3.220.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +12 -11
- package/dist-cjs/endpoint/ruleset.js +1 -1
- package/dist-cjs/models/models_0.js +206 -3
- package/dist-cjs/protocols/Aws_json1_1.js +284 -0
- package/dist-es/endpoint/ruleset.js +1 -1
- package/dist-es/models/models_0.js +187 -0
- package/dist-es/protocols/Aws_json1_1.js +285 -1
- package/dist-types/KMS.d.ts +457 -312
- package/dist-types/KMSClient.d.ts +12 -11
- package/dist-types/commands/CancelKeyDeletionCommand.d.ts +1 -2
- package/dist-types/commands/ConnectCustomKeyStoreCommand.d.ts +43 -17
- package/dist-types/commands/CreateAliasCommand.d.ts +1 -1
- package/dist-types/commands/CreateCustomKeyStoreCommand.d.ts +51 -13
- package/dist-types/commands/CreateGrantCommand.d.ts +1 -2
- package/dist-types/commands/CreateKeyCommand.d.ts +76 -35
- package/dist-types/commands/DecryptCommand.d.ts +16 -17
- package/dist-types/commands/DeleteAliasCommand.d.ts +1 -1
- package/dist-types/commands/DeleteCustomKeyStoreCommand.d.ts +21 -16
- package/dist-types/commands/DescribeCustomKeyStoresCommand.d.ts +22 -17
- package/dist-types/commands/DescribeKeyCommand.d.ts +7 -3
- package/dist-types/commands/DisableKeyCommand.d.ts +3 -2
- package/dist-types/commands/DisableKeyRotationCommand.d.ts +4 -6
- package/dist-types/commands/DisconnectCustomKeyStoreCommand.d.ts +12 -12
- package/dist-types/commands/EnableKeyCommand.d.ts +1 -2
- package/dist-types/commands/EnableKeyRotationCommand.d.ts +6 -8
- package/dist-types/commands/EncryptCommand.d.ts +11 -9
- package/dist-types/commands/GenerateDataKeyCommand.d.ts +1 -2
- package/dist-types/commands/GenerateDataKeyPairCommand.d.ts +8 -10
- package/dist-types/commands/GenerateDataKeyPairWithoutPlaintextCommand.d.ts +4 -6
- package/dist-types/commands/GenerateDataKeyWithoutPlaintextCommand.d.ts +9 -2
- package/dist-types/commands/GenerateMacCommand.d.ts +14 -14
- package/dist-types/commands/GenerateRandomCommand.d.ts +6 -3
- package/dist-types/commands/GetKeyRotationStatusCommand.d.ts +3 -3
- package/dist-types/commands/GetParametersForImportCommand.d.ts +3 -3
- package/dist-types/commands/GetPublicKeyCommand.d.ts +5 -4
- package/dist-types/commands/ImportKeyMaterialCommand.d.ts +8 -8
- package/dist-types/commands/ReEncryptCommand.d.ts +5 -5
- package/dist-types/commands/ReplicateKeyCommand.d.ts +5 -4
- package/dist-types/commands/ScheduleKeyDeletionCommand.d.ts +11 -8
- package/dist-types/commands/SignCommand.d.ts +8 -6
- package/dist-types/commands/TagResourceCommand.d.ts +1 -1
- package/dist-types/commands/UntagResourceCommand.d.ts +1 -1
- package/dist-types/commands/UpdateAliasCommand.d.ts +6 -6
- package/dist-types/commands/UpdateCustomKeyStoreCommand.d.ts +58 -38
- package/dist-types/commands/UpdateKeyDescriptionCommand.d.ts +1 -2
- package/dist-types/commands/VerifyCommand.d.ts +5 -6
- package/dist-types/commands/VerifyMacCommand.d.ts +6 -6
- package/dist-types/endpoint/EndpointParameters.d.ts +1 -1
- package/dist-types/models/models_0.d.ts +925 -224
- package/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +1 -1
- package/dist-types/ts3.4/models/models_0.d.ts +166 -0
- package/package.json +1 -1
|
@@ -180,7 +180,7 @@ export interface KMSClientResolvedConfig extends KMSClientResolvedConfigType {
|
|
|
180
180
|
* <i>Key Management Service Developer Guide</i>
|
|
181
181
|
* </a>.</p>
|
|
182
182
|
* <note>
|
|
183
|
-
* <p>KMS
|
|
183
|
+
* <p>KMS has replaced the term <i>customer master key (CMK)</i> with <i>KMS key</i> and <i>KMS key</i>. The concept has not changed. To prevent breaking changes, KMS is keeping some variations of this term.</p>
|
|
184
184
|
* <p>Amazon Web Services provides SDKs that consist of libraries and sample code for various programming
|
|
185
185
|
* languages and platforms (Java, Ruby, .Net, macOS, Android, etc.). The SDKs provide a
|
|
186
186
|
* convenient way to create programmatic access to KMS and other Amazon Web Services services. For example,
|
|
@@ -189,23 +189,24 @@ export interface KMSClientResolvedConfig extends KMSClientResolvedConfigType {
|
|
|
189
189
|
* download and install them, see <a href="http://aws.amazon.com/tools/">Tools for Amazon Web
|
|
190
190
|
* Services</a>.</p>
|
|
191
191
|
* </note>
|
|
192
|
-
* <p>We recommend that you use the Amazon Web Services SDKs to make programmatic API calls to KMS
|
|
192
|
+
* <p>We recommend that you use the Amazon Web Services SDKs to make programmatic API calls to KMS.</p>
|
|
193
193
|
* <p>If you need to use FIPS 140-2 validated cryptographic modules when communicating with
|
|
194
194
|
* Amazon Web Services, use the FIPS endpoint in your preferred Amazon Web Services Region. For more information about the
|
|
195
|
-
* available FIPS endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/kms.html#kms_region">Service endpoints</a> in the Key Management Service topic of
|
|
196
|
-
*
|
|
197
|
-
*
|
|
198
|
-
*
|
|
199
|
-
*
|
|
200
|
-
*
|
|
195
|
+
* available FIPS endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/kms.html#kms_region">Service endpoints</a> in the Key Management Service topic of
|
|
196
|
+
* the <i>Amazon Web Services General Reference</i>.</p>
|
|
197
|
+
* <p>All KMS API calls must be signed and be transmitted using Transport Layer Security
|
|
198
|
+
* (TLS). KMS recommends you always use the latest supported TLS version. Clients must also
|
|
199
|
+
* support cipher suites with Perfect Forward Secrecy (PFS) such as Ephemeral Diffie-Hellman
|
|
200
|
+
* (DHE) or Elliptic Curve Ephemeral Diffie-Hellman (ECDHE). Most modern systems such as Java 7
|
|
201
|
+
* and later support these modes.</p>
|
|
201
202
|
* <p>
|
|
202
203
|
* <b>Signing Requests</b>
|
|
203
204
|
* </p>
|
|
204
205
|
* <p>Requests must be signed by using an access key ID and a secret access key. We strongly
|
|
205
206
|
* recommend that you <i>do not</i> use your Amazon Web Services account (root) access key ID and
|
|
206
|
-
* secret key for everyday work with KMS. Instead, use the access key ID and secret
|
|
207
|
-
* for an IAM user. You can also use the Amazon Web Services Security Token Service to generate
|
|
208
|
-
* security credentials that you can use to sign requests.</p>
|
|
207
|
+
* secret access key for everyday work with KMS. Instead, use the access key ID and secret
|
|
208
|
+
* access key for an IAM user. You can also use the Amazon Web Services Security Token Service to generate
|
|
209
|
+
* temporary security credentials that you can use to sign requests.</p>
|
|
209
210
|
* <p>All KMS operations require <a href="https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html">Signature Version 4</a>.</p>
|
|
210
211
|
* <p>
|
|
211
212
|
* <b>Logging API Requests</b>
|
|
@@ -15,8 +15,7 @@ export interface CancelKeyDeletionCommandOutput extends CancelKeyDeletionRespons
|
|
|
15
15
|
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
16
16
|
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
17
17
|
* <p>
|
|
18
|
-
* <b>Cross-account
|
|
19
|
-
* use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account.</p>
|
|
18
|
+
* <b>Cross-account use</b>: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account.</p>
|
|
20
19
|
* <p>
|
|
21
20
|
* <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:CancelKeyDeletion</a> (key policy)</p>
|
|
22
21
|
* <p>
|
|
@@ -8,24 +8,21 @@ export interface ConnectCustomKeyStoreCommandInput extends ConnectCustomKeyStore
|
|
|
8
8
|
export interface ConnectCustomKeyStoreCommandOutput extends ConnectCustomKeyStoreResponse, __MetadataBearer {
|
|
9
9
|
}
|
|
10
10
|
/**
|
|
11
|
-
* <p>Connects or reconnects a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a> to its
|
|
11
|
+
* <p>Connects or reconnects a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a> to its backing key store. For an CloudHSM key
|
|
12
|
+
* store, <code>ConnectCustomKeyStore</code> connects the key store to its associated CloudHSM
|
|
13
|
+
* cluster. For an external key store, <code>ConnectCustomKeyStore</code> connects the key store
|
|
14
|
+
* to the external key store proxy that communicates with your external key manager.</p>
|
|
12
15
|
* <p>The custom key store must be connected before you can create KMS keys in the key store or
|
|
13
16
|
* use the KMS keys it contains. You can disconnect and reconnect a custom key store at any
|
|
14
17
|
* time.</p>
|
|
15
|
-
* <p>
|
|
16
|
-
*
|
|
17
|
-
*
|
|
18
|
-
*
|
|
19
|
-
*
|
|
20
|
-
*
|
|
21
|
-
*
|
|
22
|
-
*
|
|
23
|
-
* succeeds, this operation quickly returns an HTTP 200 response and a JSON object with no
|
|
24
|
-
* properties. However, this response does not indicate that the custom key store is connected.
|
|
25
|
-
* To get the connection state of the custom key store, use the <a>DescribeCustomKeyStores</a> operation.</p>
|
|
26
|
-
* <p>During the connection process, KMS finds the CloudHSM cluster that is associated with the
|
|
27
|
-
* custom key store, creates the connection infrastructure, connects to the cluster, logs into
|
|
28
|
-
* the CloudHSM client as the <code>kmsuser</code> CU, and rotates its password.</p>
|
|
18
|
+
* <p>The connection process for a custom key store can take an extended amount of time to
|
|
19
|
+
* complete. This operation starts the connection process, but it does not wait for it to
|
|
20
|
+
* complete. When it succeeds, this operation quickly returns an HTTP 200 response and a JSON
|
|
21
|
+
* object with no properties. However, this response does not indicate that the custom key store
|
|
22
|
+
* is connected. To get the connection state of the custom key store, use the <a>DescribeCustomKeyStores</a> operation.</p>
|
|
23
|
+
* <p> This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key stores</a> feature in KMS, which
|
|
24
|
+
* combines the convenience and extensive integration of KMS with the isolation and control of a
|
|
25
|
+
* key store that you own and manage.</p>
|
|
29
26
|
* <p>The <code>ConnectCustomKeyStore</code> operation might fail for various reasons. To find
|
|
30
27
|
* the reason, use the <a>DescribeCustomKeyStores</a> operation and see the
|
|
31
28
|
* <code>ConnectionErrorCode</code> in the response. For help interpreting the
|
|
@@ -33,8 +30,37 @@ export interface ConnectCustomKeyStoreCommandOutput extends ConnectCustomKeyStor
|
|
|
33
30
|
* <p>To fix the failure, use the <a>DisconnectCustomKeyStore</a> operation to
|
|
34
31
|
* disconnect the custom key store, correct the error, use the <a>UpdateCustomKeyStore</a> operation if necessary, and then use
|
|
35
32
|
* <code>ConnectCustomKeyStore</code> again.</p>
|
|
36
|
-
* <p>
|
|
37
|
-
*
|
|
33
|
+
* <p>
|
|
34
|
+
* <b>CloudHSM key store</b>
|
|
35
|
+
* </p>
|
|
36
|
+
* <p>During the connection process for an CloudHSM key store, KMS finds the CloudHSM cluster that
|
|
37
|
+
* is associated with the custom key store, creates the connection infrastructure, connects to
|
|
38
|
+
* the cluster, logs into the CloudHSM client as the <code>kmsuser</code> CU, and rotates its
|
|
39
|
+
* password.</p>
|
|
40
|
+
* <p>To connect an CloudHSM key store, its associated CloudHSM cluster must have at least one active
|
|
41
|
+
* HSM. To get the number of active HSMs in a cluster, use the <a href="https://docs.aws.amazon.com/cloudhsm/latest/APIReference/API_DescribeClusters.html">DescribeClusters</a> operation. To add HSMs
|
|
42
|
+
* to the cluster, use the <a href="https://docs.aws.amazon.com/cloudhsm/latest/APIReference/API_CreateHsm.html">CreateHsm</a> operation. Also, the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-store-concepts.html#concept-kmsuser">
|
|
43
|
+
* <code>kmsuser</code> crypto
|
|
44
|
+
* user</a> (CU) must not be logged into the cluster. This prevents KMS from using this
|
|
45
|
+
* account to log in.</p>
|
|
46
|
+
* <p>If you are having trouble connecting or disconnecting a CloudHSM key store, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/fix-keystore.html">Troubleshooting an CloudHSM key
|
|
47
|
+
* store</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
48
|
+
* <p>
|
|
49
|
+
* <b>External key store</b>
|
|
50
|
+
* </p>
|
|
51
|
+
* <p>When you connect an external key store that uses public endpoint connectivity, KMS tests
|
|
52
|
+
* its ability to communicate with your external key manager by sending a request via the
|
|
53
|
+
* external key store proxy.</p>
|
|
54
|
+
* <p>When you connect to an external key store that uses VPC endpoint service connectivity,
|
|
55
|
+
* KMS establishes the networking elements that it needs to communicate with your external key
|
|
56
|
+
* manager via the external key store proxy. This includes creating an interface endpoint to the
|
|
57
|
+
* VPC endpoint service and a private hosted zone for traffic between KMS and the VPC endpoint
|
|
58
|
+
* service.</p>
|
|
59
|
+
* <p>To connect an external key store, KMS must be able to connect to the external key store
|
|
60
|
+
* proxy, the external key store proxy must be able to communicate with your external key
|
|
61
|
+
* manager, and the external key manager must be available for cryptographic operations.</p>
|
|
62
|
+
* <p>If you are having trouble connecting or disconnecting an external key store, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/xks-troubleshooting.html">Troubleshooting an external
|
|
63
|
+
* key store</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
38
64
|
* <p>
|
|
39
65
|
* <b>Cross-account use</b>: No. You cannot perform this operation on a custom key store in a different Amazon Web Services account.</p>
|
|
40
66
|
*
|
|
@@ -10,7 +10,7 @@ export interface CreateAliasCommandOutput extends __MetadataBearer {
|
|
|
10
10
|
/**
|
|
11
11
|
* <p>Creates a friendly name for a KMS key. </p>
|
|
12
12
|
* <note>
|
|
13
|
-
* <p>Adding, deleting, or updating an alias can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC
|
|
13
|
+
* <p>Adding, deleting, or updating an alias can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC for KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
14
14
|
* </note>
|
|
15
15
|
* <p>You can use an alias to identify a KMS key in the KMS console, in the <a>DescribeKey</a> operation and in <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a>, such as <a>Encrypt</a> and
|
|
16
16
|
* <a>GenerateDataKey</a>. You can also change the KMS key that's associated with
|
|
@@ -8,21 +8,59 @@ export interface CreateCustomKeyStoreCommandInput extends CreateCustomKeyStoreRe
|
|
|
8
8
|
export interface CreateCustomKeyStoreCommandOutput extends CreateCustomKeyStoreResponse, __MetadataBearer {
|
|
9
9
|
}
|
|
10
10
|
/**
|
|
11
|
-
* <p>Creates a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>
|
|
12
|
-
*
|
|
13
|
-
*
|
|
11
|
+
* <p>Creates a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a> backed by a key store that you own and manage. When you use a
|
|
12
|
+
* KMS key in a custom key store for a cryptographic operation, the cryptographic operation is
|
|
13
|
+
* actually performed in your key store using your keys. KMS supports <a href="https://docs.aws.amazon.com/kms/latest/developerguide/keystore-cloudhsm.html">CloudHSM key stores</a>
|
|
14
|
+
* backed by an <a href="https://docs.aws.amazon.com/cloudhsm/latest/userguide/clusters.html">CloudHSM cluster</a>
|
|
15
|
+
* and <a href="https://docs.aws.amazon.com/kms/latest/developerguide/keystore-external.html">external key stores</a> backed by an external key store proxy and
|
|
16
|
+
* external key manager outside of Amazon Web Services.</p>
|
|
17
|
+
* <p> This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key stores</a> feature in KMS, which
|
|
14
18
|
* combines the convenience and extensive integration of KMS with the isolation and control of a
|
|
15
|
-
*
|
|
16
|
-
* <p>Before you create the custom key store,
|
|
17
|
-
*
|
|
18
|
-
* key store. For details about the required elements
|
|
19
|
-
*
|
|
19
|
+
* key store that you own and manage.</p>
|
|
20
|
+
* <p>Before you create the custom key store, the required elements must be in place and
|
|
21
|
+
* operational. We recommend that you use the test tools that KMS provides to verify the
|
|
22
|
+
* configuration your external key store proxy. For details about the required elements and
|
|
23
|
+
* verification tests, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/create-keystore.html#before-keystore">Assemble the prerequisites (for
|
|
24
|
+
* CloudHSM key stores)</a> or <a href="https://docs.aws.amazon.com/kms/latest/developerguide/create-xks-keystore.html#xks-requirements">Assemble the prerequisites (for
|
|
25
|
+
* external key stores)</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
26
|
+
* <p>To create a custom key store, use the following parameters.</p>
|
|
27
|
+
* <ul>
|
|
28
|
+
* <li>
|
|
29
|
+
* <p>To create an CloudHSM key store, specify the <code>CustomKeyStoreName</code>,
|
|
30
|
+
* <code>CloudHsmClusterId</code>, <code>KeyStorePassword</code>, and
|
|
31
|
+
* <code>TrustAnchorCertificate</code>. The <code>CustomKeyStoreType</code> parameter is
|
|
32
|
+
* optional for CloudHSM key stores. If you include it, set it to the default value,
|
|
33
|
+
* <code>AWS_CLOUDHSM</code>. For help with failures, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/fix-keystore.html">Troubleshooting an CloudHSM key store</a> in the
|
|
34
|
+
* <i>Key Management Service Developer Guide</i>.</p>
|
|
35
|
+
* </li>
|
|
36
|
+
* <li>
|
|
37
|
+
* <p>To create an external key store, specify the <code>CustomKeyStoreName</code> and a
|
|
38
|
+
* <code>CustomKeyStoreType</code> of <code>EXTERNAL_KEY_STORE</code>. Also, specify values
|
|
39
|
+
* for <code>XksProxyConnectivity</code>, <code>XksProxyAuthenticationCredential</code>,
|
|
40
|
+
* <code>XksProxyUriEndpoint</code>, and <code>XksProxyUriPath</code>. If your
|
|
41
|
+
* <code>XksProxyConnectivity</code> value is <code>VPC_ENDPOINT_SERVICE</code>, specify
|
|
42
|
+
* the <code>XksProxyVpcEndpointServiceName</code> parameter. For help with failures, see
|
|
43
|
+
* <a href="https://docs.aws.amazon.com/kms/latest/developerguide/xks-troubleshooting.html">Troubleshooting
|
|
44
|
+
* an external key store</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
45
|
+
* </li>
|
|
46
|
+
* </ul>
|
|
47
|
+
* <note>
|
|
48
|
+
* <p>For external key stores:</p>
|
|
49
|
+
* <p>Some external key managers provide a simpler method for creating an external key store.
|
|
50
|
+
* For details, see your external key manager documentation.</p>
|
|
51
|
+
* <p>When creating an external key store in the KMS console, you can upload a JSON-based
|
|
52
|
+
* proxy configuration file with the desired values. You cannot use a proxy configuration
|
|
53
|
+
* with the <code>CreateCustomKeyStore</code> operation. However, you can use the values in
|
|
54
|
+
* the file to help you determine the correct values for the <code>CreateCustomKeyStore</code>
|
|
55
|
+
* parameters.</p>
|
|
56
|
+
* </note>
|
|
20
57
|
* <p>When the operation completes successfully, it returns the ID of the new custom key store.
|
|
21
|
-
* Before you can use your new custom key store, you need to use the <a>ConnectCustomKeyStore</a> operation to connect
|
|
22
|
-
* cluster
|
|
23
|
-
*
|
|
24
|
-
* to
|
|
25
|
-
*
|
|
58
|
+
* Before you can use your new custom key store, you need to use the <a>ConnectCustomKeyStore</a> operation to connect a new CloudHSM key store to its CloudHSM
|
|
59
|
+
* cluster, or to connect a new external key store to the external key store proxy for your
|
|
60
|
+
* external key manager. Even if you are not going to use your custom key store immediately, you
|
|
61
|
+
* might want to connect it to verify that all settings are correct and then disconnect it until
|
|
62
|
+
* you are ready to use it.</p>
|
|
63
|
+
* <p>For help with failures, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/fix-keystore.html">Troubleshooting a custom key store</a> in the
|
|
26
64
|
* <i>Key Management Service Developer Guide</i>.</p>
|
|
27
65
|
* <p>
|
|
28
66
|
* <b>Cross-account use</b>: No. You cannot perform this operation on a custom key store in a different Amazon Web Services account.</p>
|
|
@@ -41,8 +41,7 @@ export interface CreateGrantCommandOutput extends CreateGrantResponse, __Metadat
|
|
|
41
41
|
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
42
42
|
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
43
43
|
* <p>
|
|
44
|
-
* <b>Cross-account use</b>: Yes.
|
|
45
|
-
* To perform this operation on a KMS key in a different Amazon Web Services account, specify the key
|
|
44
|
+
* <b>Cross-account use</b>: Yes. To perform this operation on a KMS key in a different Amazon Web Services account, specify the key
|
|
46
45
|
* ARN in the value of the <code>KeyId</code> parameter. </p>
|
|
47
46
|
* <p>
|
|
48
47
|
* <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:CreateGrant</a> (key policy)</p>
|
|
@@ -8,25 +8,41 @@ export interface CreateKeyCommandInput extends CreateKeyRequest {
|
|
|
8
8
|
export interface CreateKeyCommandOutput extends CreateKeyResponse, __MetadataBearer {
|
|
9
9
|
}
|
|
10
10
|
/**
|
|
11
|
-
* <p>Creates a unique customer managed <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms-keys">KMS key</a> in your Amazon Web Services account and
|
|
12
|
-
*
|
|
13
|
-
*
|
|
11
|
+
* <p>Creates a unique customer managed <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms-keys">KMS key</a> in your Amazon Web Services account and Region.
|
|
12
|
+
* You can use a KMS key in cryptographic operations, such as encryption and signing. Some Amazon Web Services
|
|
13
|
+
* services let you use KMS keys that you create and manage to protect your service
|
|
14
|
+
* resources.</p>
|
|
15
|
+
* <p>A KMS key is a logical representation of a cryptographic key. In addition to the key
|
|
16
|
+
* material used in cryptographic operations, a KMS key includes metadata, such as the key ID,
|
|
17
|
+
* key policy, creation date, description, and key state. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/getting-started.html">Managing keys</a> in the
|
|
18
|
+
* <i>Key Management Service Developer Guide</i>
|
|
19
|
+
* </p>
|
|
20
|
+
* <p>Use the parameters of <code>CreateKey</code> to specify the type of KMS key, the source of
|
|
21
|
+
* its key material, its key policy, description, tags, and other properties.</p>
|
|
14
22
|
* <note>
|
|
15
|
-
* <p>KMS
|
|
23
|
+
* <p>KMS has replaced the term <i>customer master key (CMK)</i> with <i>KMS key</i> and <i>KMS key</i>. The concept has not changed. To prevent breaking changes, KMS is keeping some variations of this term.</p>
|
|
16
24
|
* </note>
|
|
17
25
|
*
|
|
26
|
+
*
|
|
18
27
|
* <p>To create different types of KMS keys, use the following guidance:</p>
|
|
19
28
|
*
|
|
20
29
|
* <dl>
|
|
21
30
|
* <dt>Symmetric encryption KMS key</dt>
|
|
22
31
|
* <dd>
|
|
23
|
-
* <p>
|
|
24
|
-
*
|
|
25
|
-
*
|
|
26
|
-
*
|
|
27
|
-
*
|
|
28
|
-
*
|
|
29
|
-
*
|
|
32
|
+
* <p>By default, <code>CreateKey</code> creates a symmetric encryption KMS key with key
|
|
33
|
+
* material that KMS generates. This is the basic and most widely used type of KMS key, and
|
|
34
|
+
* provides the best performance.</p>
|
|
35
|
+
* <p>To create a symmetric encryption KMS key, you don't need to specify any parameters.
|
|
36
|
+
* The default value for <code>KeySpec</code>, <code>SYMMETRIC_DEFAULT</code>, the default
|
|
37
|
+
* value for <code>KeyUsage</code>, <code>ENCRYPT_DECRYPT</code>, and the default value for
|
|
38
|
+
* <code>Origin</code>, <code>AWS_KMS</code>, create a symmetric encryption KMS key with
|
|
39
|
+
* KMS key material.</p>
|
|
40
|
+
* <p>If you need a key for basic encryption and decryption or you are creating a KMS key
|
|
41
|
+
* to protect your resources in an Amazon Web Services service, create a symmetric encryption KMS key.
|
|
42
|
+
* The key material in a symmetric encryption key never leaves KMS unencrypted. You can
|
|
43
|
+
* use a symmetric encryption KMS key to encrypt and decrypt data up to 4,096 bytes, but
|
|
44
|
+
* they are typically used to generate data keys and data keys pairs. For details, see
|
|
45
|
+
* <a>GenerateDataKey</a> and <a>GenerateDataKeyPair</a>.</p>
|
|
30
46
|
* <p> </p>
|
|
31
47
|
* </dd>
|
|
32
48
|
* <dt>Asymmetric KMS keys</dt>
|
|
@@ -44,11 +60,11 @@ export interface CreateKeyCommandOutput extends CreateKeyResponse, __MetadataBea
|
|
|
44
60
|
* </dd>
|
|
45
61
|
* <dt>HMAC KMS key</dt>
|
|
46
62
|
* <dd>
|
|
47
|
-
* <p>To create an HMAC KMS key, set the <code>KeySpec</code> parameter to a
|
|
48
|
-
*
|
|
49
|
-
*
|
|
50
|
-
*
|
|
51
|
-
*
|
|
63
|
+
* <p>To create an HMAC KMS key, set the <code>KeySpec</code> parameter to a key spec
|
|
64
|
+
* value for HMAC KMS keys. Then set the <code>KeyUsage</code> parameter to
|
|
65
|
+
* <code>GENERATE_VERIFY_MAC</code>. You must set the key usage even though
|
|
66
|
+
* <code>GENERATE_VERIFY_MAC</code> is the only valid key usage value for HMAC KMS keys.
|
|
67
|
+
* You can't change these properties after the KMS key is created.</p>
|
|
52
68
|
* <p>HMAC KMS keys are symmetric keys that never leave KMS unencrypted. You can use
|
|
53
69
|
* HMAC keys to generate (<a>GenerateMac</a>) and verify (<a>VerifyMac</a>) HMAC codes for messages up to 4096 bytes.</p>
|
|
54
70
|
* <p>HMAC KMS keys are not supported in all Amazon Web Services Regions. If you try to create an HMAC
|
|
@@ -79,34 +95,59 @@ export interface CreateKeyCommandOutput extends CreateKeyResponse, __MetadataBea
|
|
|
79
95
|
* <p> </p>
|
|
80
96
|
* </dd>
|
|
81
97
|
* <dd>
|
|
82
|
-
* <p>To import your own key material, begin by creating a symmetric
|
|
83
|
-
* material. To do this, use the <code>Origin</code>
|
|
84
|
-
* with a value of <code>EXTERNAL</code>. Next, use
|
|
85
|
-
*
|
|
86
|
-
*
|
|
98
|
+
* <p>To import your own key material into a KMS key, begin by creating a symmetric
|
|
99
|
+
* encryption KMS key with no key material. To do this, use the <code>Origin</code>
|
|
100
|
+
* parameter of <code>CreateKey</code> with a value of <code>EXTERNAL</code>. Next, use
|
|
101
|
+
* <a>GetParametersForImport</a> operation to get a public key and import
|
|
102
|
+
* token, and use the public key to encrypt your key material. Then, use <a>ImportKeyMaterial</a> with your import token to import the key material. For
|
|
103
|
+
* step-by-step instructions, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">Importing Key Material</a> in the <i>
|
|
87
104
|
* <i>Key Management Service Developer Guide</i>
|
|
88
105
|
* </i>.</p>
|
|
89
|
-
* <p>This feature supports only symmetric encryption KMS keys, including multi-Region
|
|
90
|
-
* material into any other type of KMS
|
|
106
|
+
* <p>This feature supports only symmetric encryption KMS keys, including multi-Region
|
|
107
|
+
* symmetric encryption KMS keys. You cannot import key material into any other type of KMS
|
|
108
|
+
* key.</p>
|
|
91
109
|
* <p>To create a multi-Region primary key with imported key material, use the
|
|
92
110
|
* <code>Origin</code> parameter of <code>CreateKey</code> with a value of
|
|
93
111
|
* <code>EXTERNAL</code> and the <code>MultiRegion</code> parameter with a value of
|
|
94
|
-
* <code>True</code>. To create replicas of the multi-Region primary key, use the <a>ReplicateKey</a> operation. For
|
|
112
|
+
* <code>True</code>. To create replicas of the multi-Region primary key, use the <a>ReplicateKey</a> operation. For instructions, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-import.html ">Importing key material into
|
|
113
|
+
* multi-Region keys</a>. For more information about multi-Region keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html">Multi-Region keys in KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
95
114
|
* <p> </p>
|
|
96
115
|
* </dd>
|
|
97
116
|
* <dt>Custom key store</dt>
|
|
98
117
|
* <dd>
|
|
99
|
-
* <p>
|
|
100
|
-
*
|
|
101
|
-
*
|
|
102
|
-
*
|
|
103
|
-
*
|
|
104
|
-
*
|
|
105
|
-
*
|
|
106
|
-
*
|
|
107
|
-
* the
|
|
108
|
-
*
|
|
109
|
-
*
|
|
118
|
+
* <p>A <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a> lets you protect your Amazon Web Services resources using keys in a backing key
|
|
119
|
+
* store that you own and manage. When you request a cryptographic operation with a KMS key
|
|
120
|
+
* in a custom key store, the operation is performed in the backing key store using its
|
|
121
|
+
* cryptographic keys.</p>
|
|
122
|
+
* <p>KMS supports <a href="https://docs.aws.amazon.com/kms/latest/developerguide/keystore-cloudhsm.html">CloudHSM key stores</a> backed by an CloudHSM cluster and <a href="https://docs.aws.amazon.com/kms/latest/developerguide/keystore-external.html">external key stores</a> backed by an
|
|
123
|
+
* external key manager outside of Amazon Web Services. When you create a KMS key in an CloudHSM key store,
|
|
124
|
+
* KMS generates an encryption key in the CloudHSM cluster and associates it with the KMS
|
|
125
|
+
* key. When you create a KMS key in an external key store, you specify an existing
|
|
126
|
+
* encryption key in the external key manager.</p>
|
|
127
|
+
* <note>
|
|
128
|
+
* <p>Some external key managers provide a simpler method for creating a KMS key in an
|
|
129
|
+
* external key store. For details, see your external key manager documentation.</p>
|
|
130
|
+
* </note>
|
|
131
|
+
* <p>Before you create a KMS key in a custom key store, the <code>ConnectionState</code>
|
|
132
|
+
* of the key store must be <code>CONNECTED</code>. To connect the custom key store, use
|
|
133
|
+
* the <a>ConnectCustomKeyStore</a> operation. To find the
|
|
134
|
+
* <code>ConnectionState</code>, use the <a>DescribeCustomKeyStores</a>
|
|
135
|
+
* operation.</p>
|
|
136
|
+
* <p>To create a KMS key in a custom key store, use the <code>CustomKeyStoreId</code>.
|
|
137
|
+
* Use the default <code>KeySpec</code> value, <code>SYMMETRIC_DEFAULT</code>, and the
|
|
138
|
+
* default <code>KeyUsage</code> value, <code>ENCRYPT_DECRYPT</code> to create a symmetric
|
|
139
|
+
* encryption key. No other key type is supported in a custom key store.</p>
|
|
140
|
+
* <p>To create a KMS key in an <a href="https://docs.aws.amazon.com/kms/latest/developerguide/keystore-cloudhsm.html">CloudHSM key store</a>, use the
|
|
141
|
+
* <code>Origin</code> parameter with a value of <code>AWS_CLOUDHSM</code>. The CloudHSM
|
|
142
|
+
* cluster that is associated with the custom key store must have at least two active HSMs
|
|
143
|
+
* in different Availability Zones in the Amazon Web Services Region.</p>
|
|
144
|
+
* <p>To create a KMS key in an <a href="https://docs.aws.amazon.com/kms/latest/developerguide/keystore-external.html">external key store</a>, use the <code>Origin</code> parameter
|
|
145
|
+
* with a value of <code>EXTERNAL_KEY_STORE</code> and an <code>XksKeyId</code> parameter
|
|
146
|
+
* that identifies an existing external key.</p>
|
|
147
|
+
* <note>
|
|
148
|
+
* <p>Some external key managers provide a simpler method for creating a KMS key in an
|
|
149
|
+
* external key store. For details, see your external key manager documentation.</p>
|
|
150
|
+
* </note>
|
|
110
151
|
* </dd>
|
|
111
152
|
* </dl>
|
|
112
153
|
* <p>
|
|
@@ -37,22 +37,22 @@ export interface DecryptCommandOutput extends DecryptResponse, __MetadataBearer
|
|
|
37
37
|
* </p>
|
|
38
38
|
* </li>
|
|
39
39
|
* </ul>
|
|
40
|
-
* <p>You can use this operation to decrypt ciphertext that was encrypted under a symmetric
|
|
41
|
-
* asymmetric encryption KMS key. When the KMS key is asymmetric, you
|
|
42
|
-
* encryption algorithm that was used to encrypt the ciphertext.
|
|
43
|
-
*
|
|
44
|
-
*
|
|
45
|
-
*
|
|
46
|
-
*
|
|
40
|
+
* <p>You can use this operation to decrypt ciphertext that was encrypted under a symmetric
|
|
41
|
+
* encryption KMS key or an asymmetric encryption KMS key. When the KMS key is asymmetric, you
|
|
42
|
+
* must specify the KMS key and the encryption algorithm that was used to encrypt the ciphertext.
|
|
43
|
+
* For information about asymmetric KMS keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Asymmetric KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
44
|
+
* <p>The <code>Decrypt</code> operation also decrypts ciphertext that was encrypted outside of
|
|
45
|
+
* KMS by the public key in an KMS asymmetric KMS key. However, it cannot decrypt symmetric
|
|
46
|
+
* ciphertext produced by other libraries, such as the <a href="https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/">Amazon Web Services Encryption SDK</a> or <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingClientSideEncryption.html">Amazon S3 client-side encryption</a>.
|
|
47
47
|
* These libraries return a ciphertext format that is incompatible with KMS.</p>
|
|
48
|
-
* <p>If the ciphertext was encrypted under a symmetric encryption KMS key, the
|
|
49
|
-
*
|
|
50
|
-
* symmetric ciphertext blob. This feature adds durability to your implementation
|
|
51
|
-
* that authorized users can decrypt ciphertext decades after it was encrypted, even
|
|
52
|
-
* lost track of the key ID. However, specifying the KMS key is always recommended as
|
|
53
|
-
* practice. When you use the <code>KeyId</code> parameter to specify a KMS key, KMS
|
|
54
|
-
* the KMS key you specify. If the ciphertext was encrypted under a different KMS key,
|
|
55
|
-
*
|
|
48
|
+
* <p>If the ciphertext was encrypted under a symmetric encryption KMS key, the
|
|
49
|
+
* <code>KeyId</code> parameter is optional. KMS can get this information from metadata that
|
|
50
|
+
* it adds to the symmetric ciphertext blob. This feature adds durability to your implementation
|
|
51
|
+
* by ensuring that authorized users can decrypt ciphertext decades after it was encrypted, even
|
|
52
|
+
* if they've lost track of the key ID. However, specifying the KMS key is always recommended as
|
|
53
|
+
* a best practice. When you use the <code>KeyId</code> parameter to specify a KMS key, KMS
|
|
54
|
+
* only uses the KMS key you specify. If the ciphertext was encrypted under a different KMS key,
|
|
55
|
+
* the <code>Decrypt</code> operation fails. This practice ensures that you use the KMS key that
|
|
56
56
|
* you intend.</p>
|
|
57
57
|
* <p>Whenever possible, use key policies to give users permission to call the
|
|
58
58
|
* <code>Decrypt</code> operation on a particular KMS key, instead of using IAM policies.
|
|
@@ -66,8 +66,7 @@ export interface DecryptCommandOutput extends DecryptResponse, __MetadataBearer
|
|
|
66
66
|
* <p>The KMS key that you use for this operation must be in a compatible key state. For
|
|
67
67
|
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
68
68
|
* <p>
|
|
69
|
-
* <b>Cross-account
|
|
70
|
-
* use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
|
|
69
|
+
* <b>Cross-account use</b>: Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify
|
|
71
70
|
* the key ARN or alias ARN in the value of the <code>KeyId</code> parameter. </p>
|
|
72
71
|
*
|
|
73
72
|
* <p>
|
|
@@ -10,7 +10,7 @@ export interface DeleteAliasCommandOutput extends __MetadataBearer {
|
|
|
10
10
|
/**
|
|
11
11
|
* <p>Deletes the specified alias. </p>
|
|
12
12
|
* <note>
|
|
13
|
-
* <p>Adding, deleting, or updating an alias can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC
|
|
13
|
+
* <p>Adding, deleting, or updating an alias can allow or deny permission to the KMS key. For details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/abac.html">ABAC for KMS</a> in the <i>Key Management Service Developer Guide</i>.</p>
|
|
14
14
|
* </note>
|
|
15
15
|
* <p>Because an alias is not a property of a KMS key, you can delete and change the aliases of
|
|
16
16
|
* a KMS key without affecting the KMS key. Also, aliases do not appear in the response from the
|
|
@@ -8,28 +8,33 @@ export interface DeleteCustomKeyStoreCommandInput extends DeleteCustomKeyStoreRe
|
|
|
8
8
|
export interface DeleteCustomKeyStoreCommandOutput extends DeleteCustomKeyStoreResponse, __MetadataBearer {
|
|
9
9
|
}
|
|
10
10
|
/**
|
|
11
|
-
* <p>Deletes a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. This operation does not
|
|
12
|
-
*
|
|
11
|
+
* <p>Deletes a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. This operation does not affect any backing elements of the
|
|
12
|
+
* custom key store. It does not delete the CloudHSM cluster that is associated with an CloudHSM key
|
|
13
|
+
* store, or affect any users or keys in the cluster. For an external key store, it does not
|
|
14
|
+
* affect the external key store proxy, external key manager, or any external keys.</p>
|
|
15
|
+
* <p> This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key stores</a> feature in KMS, which
|
|
16
|
+
* combines the convenience and extensive integration of KMS with the isolation and control of a
|
|
17
|
+
* key store that you own and manage.</p>
|
|
13
18
|
* <p>The custom key store that you delete cannot contain any <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms_keys">KMS keys</a>. Before deleting the key store,
|
|
14
19
|
* verify that you will never need to use any of the KMS keys in the key store for any
|
|
15
20
|
* <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#cryptographic-operations">cryptographic operations</a>. Then, use <a>ScheduleKeyDeletion</a> to delete the KMS keys from the
|
|
16
|
-
* key store.
|
|
17
|
-
*
|
|
18
|
-
*
|
|
19
|
-
*
|
|
20
|
-
*
|
|
21
|
-
*
|
|
22
|
-
*
|
|
23
|
-
*
|
|
24
|
-
*
|
|
21
|
+
* key store. After the required waiting period expires and all KMS keys are deleted from the
|
|
22
|
+
* custom key store, use <a>DisconnectCustomKeyStore</a> to disconnect the key store
|
|
23
|
+
* from KMS. Then, you can delete the custom key store.</p>
|
|
24
|
+
* <p>For keys in an CloudHSM key store, the <code>ScheduleKeyDeletion</code> operation makes a
|
|
25
|
+
* best effort to delete the key material from the associated cluster. However, you might need to
|
|
26
|
+
* manually <a href="https://docs.aws.amazon.com/kms/latest/developerguide/fix-keystore.html#fix-keystore-orphaned-key">delete the orphaned key
|
|
27
|
+
* material</a> from the cluster and its backups. KMS never creates, manages, or deletes
|
|
28
|
+
* cryptographic keys in the external key manager associated with an external key store. You must
|
|
29
|
+
* manage them using your external key manager tools.</p>
|
|
30
|
+
* <p>Instead of deleting the custom key store, consider using the <a>DisconnectCustomKeyStore</a> operation to disconnect the custom key store from its
|
|
31
|
+
* backing key store. While the key store is disconnected, you cannot create or use the KMS keys
|
|
32
|
+
* in the key store. But, you do not need to delete KMS keys and you can reconnect a disconnected
|
|
33
|
+
* custom key store at any time.</p>
|
|
25
34
|
* <p>If the operation succeeds, it returns a JSON object with no
|
|
26
35
|
* properties.</p>
|
|
27
|
-
* <p>This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store feature</a> feature in KMS, which
|
|
28
|
-
* combines the convenience and extensive integration of KMS with the isolation and control of a
|
|
29
|
-
* single-tenant key store.</p>
|
|
30
36
|
* <p>
|
|
31
|
-
* <b>Cross-account use</b>: No.
|
|
32
|
-
* You cannot perform this operation on a custom key store in a different Amazon Web Services account.</p>
|
|
37
|
+
* <b>Cross-account use</b>: No. You cannot perform this operation on a custom key store in a different Amazon Web Services account.</p>
|
|
33
38
|
*
|
|
34
39
|
* <p>
|
|
35
40
|
* <b>Required permissions</b>: <a href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-api-permissions-reference.html">kms:DeleteCustomKeyStore</a> (IAM policy)</p>
|
|
@@ -9,25 +9,30 @@ export interface DescribeCustomKeyStoresCommandOutput extends DescribeCustomKeyS
|
|
|
9
9
|
}
|
|
10
10
|
/**
|
|
11
11
|
* <p>Gets information about <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key stores</a> in the account and Region.</p>
|
|
12
|
-
* <p>This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key
|
|
12
|
+
* <p> This operation is part of the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key stores</a> feature in KMS, which
|
|
13
13
|
* combines the convenience and extensive integration of KMS with the isolation and control of a
|
|
14
|
-
*
|
|
15
|
-
* <p>By default, this operation returns information about all custom key
|
|
16
|
-
*
|
|
17
|
-
*
|
|
18
|
-
*
|
|
19
|
-
* <p>To determine whether the custom key store is connected to its CloudHSM cluster
|
|
20
|
-
*
|
|
21
|
-
* key store failed, the <code>ConnectionState</code> value is
|
|
22
|
-
* <code>ConnectionErrorCode</code> element in the response
|
|
23
|
-
* For help interpreting the
|
|
14
|
+
* key store that you own and manage.</p>
|
|
15
|
+
* <p>By default, this operation returns information about all custom key stores in the account
|
|
16
|
+
* and Region. To get only information about a particular custom key store, use either the
|
|
17
|
+
* <code>CustomKeyStoreName</code> or <code>CustomKeyStoreId</code> parameter (but not
|
|
18
|
+
* both).</p>
|
|
19
|
+
* <p>To determine whether the custom key store is connected to its CloudHSM cluster or external
|
|
20
|
+
* key store proxy, use the <code>ConnectionState</code> element in the response. If an attempt
|
|
21
|
+
* to connect the custom key store failed, the <code>ConnectionState</code> value is
|
|
22
|
+
* <code>FAILED</code> and the <code>ConnectionErrorCode</code> element in the response
|
|
23
|
+
* indicates the cause of the failure. For help interpreting the
|
|
24
|
+
* <code>ConnectionErrorCode</code>, see <a>CustomKeyStoresListEntry</a>.</p>
|
|
24
25
|
* <p>Custom key stores have a <code>DISCONNECTED</code> connection state if the key store has
|
|
25
|
-
* never been connected or you
|
|
26
|
-
* disconnect it.
|
|
27
|
-
*
|
|
28
|
-
*
|
|
29
|
-
*
|
|
30
|
-
*
|
|
26
|
+
* never been connected or you used the <a>DisconnectCustomKeyStore</a> operation to
|
|
27
|
+
* disconnect it. Otherwise, the connection state is CONNECTED. If your custom key store
|
|
28
|
+
* connection state is <code>CONNECTED</code> but you are having trouble using it, verify that
|
|
29
|
+
* the backing store is active and available. For an CloudHSM key store, verify that the associated
|
|
30
|
+
* CloudHSM cluster is active and contains the minimum number of HSMs required for the operation, if
|
|
31
|
+
* any. For an external key store, verify that the external key store proxy and its associated
|
|
32
|
+
* external key manager are reachable and enabled.</p>
|
|
33
|
+
* <p> For help repairing your CloudHSM key store, see the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/fix-keystore.html">Troubleshooting CloudHSM key stores</a>. For help
|
|
34
|
+
* repairing your external key store, see the <a href="https://docs.aws.amazon.com/kms/latest/developerguide/xks-troubleshooting.html">Troubleshooting external key stores</a>. Both
|
|
35
|
+
* topics are in the <i>Key Management Service Developer Guide</i>.</p>
|
|
31
36
|
* <p>
|
|
32
37
|
* <b>Cross-account use</b>: No. You cannot perform this operation on a custom key store in a different Amazon Web Services account.</p>
|
|
33
38
|
* <p>
|