diff --git a/docs/kms/umn/.placeholder b/docs/kms/umn/.placeholder
deleted file mode 100644
index e69de29b..00000000
diff --git a/docs/kms/umn/ALL_META.TXT.json b/docs/kms/umn/ALL_META.TXT.json
index 3cdb1be5..048c9757 100644
--- a/docs/kms/umn/ALL_META.TXT.json
+++ b/docs/kms/umn/ALL_META.TXT.json
@@ -1,18 +1,28 @@
[
{
- "uri":"kms_01_0045.html",
+ "uri":"kms_01_0109.html",
"product_code":"kms",
"code":"1",
"des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"doc_type":"usermanual",
- "kw":"About KMS",
- "title":"About KMS",
+ "kw":"Service Overview",
+ "title":"Service Overview",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0045.html",
+ "product_code":"kms",
+ "code":"2",
+ "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
+ "doc_type":"usermanual",
+ "kw":"Key Management",
+ "title":"Key Management",
"githuburl":""
},
{
"uri":"kms_01_0003.html",
"product_code":"kms",
- "code":"2",
+ "code":"3",
"des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"doc_type":"usermanual",
"kw":"Concepts",
@@ -22,7 +32,7 @@
{
"uri":"kms_01_0004.html",
"product_code":"kms",
- "code":"3",
+ "code":"4",
"des":"Key Management Service (KMS) is a secure, reliable, and easy-to-use service that helps users centrally manage and safeguard their Customer Master Keys (CMKs).This service",
"doc_type":"usermanual",
"kw":"KMS,Concepts,User Guide",
@@ -32,7 +42,7 @@
{
"uri":"kms_01_0005.html",
"product_code":"kms",
- "code":"4",
+ "code":"5",
"des":"A Customer Master Key (CMK) is a Key Encryption Key (KEK) created by a user using KMS. It is used to encrypt and protect Data Encryption Keys (DEKs). One CMK can be used ",
"doc_type":"usermanual",
"kw":"CMK,Concepts,User Guide",
@@ -42,7 +52,7 @@
{
"uri":"kms_01_0006.html",
"product_code":"kms",
- "code":"5",
+ "code":"6",
"des":"A Default Master Key is automatically created by another cloud service using KMS, such as Object Storage Service (OBS). The alias of a Default Master Key ends with /defau",
"doc_type":"usermanual",
"kw":"Default Master Key,Concepts,User Guide",
@@ -52,7 +62,7 @@
{
"uri":"kms_01_0007.html",
"product_code":"kms",
- "code":"6",
+ "code":"7",
"des":"Data Encryption Keys (DEKs) are used by users to encrypt data.",
"doc_type":"usermanual",
"kw":"DEK,Concepts,User Guide",
@@ -62,8 +72,8 @@
{
"uri":"kms_01_0008.html",
"product_code":"kms",
- "code":"7",
- "des":"A hardware security module (HSM) is a hardware device that securely produces, stores, manages, and uses CMKs. In addition, it provides encryption processing services.",
+ "code":"8",
+ "des":"A Hardware Security Module (HSM) securely produces, stores, manages, and uses keys and provides encryption services.",
"doc_type":"usermanual",
"kw":"HSM,Concepts,User Guide",
"title":"HSM",
@@ -72,7 +82,7 @@
{
"uri":"kms_01_0009.html",
"product_code":"kms",
- "code":"8",
+ "code":"9",
"des":"Envelope encryption is an encryption method that enables DEKs to be stored, transmitted, and used in \"envelopes.\" As a result, CMKs are not used to directly encrypt and d",
"doc_type":"usermanual",
"kw":"Envelope Encryption,Concepts,User Guide",
@@ -82,7 +92,7 @@
{
"uri":"kms_01_0010.html",
"product_code":"kms",
- "code":"9",
+ "code":"10",
"des":"A true random number generator (TRNG) is a device that generates unpredictable random numbers by physical procedures instead of computer programs.",
"doc_type":"usermanual",
"kw":"TRNG,Concepts,User Guide",
@@ -92,37 +102,47 @@
{
"uri":"kms_01_0012.html",
"product_code":"kms",
- "code":"10",
+ "code":"11",
"des":"A project is used to group and isolate OpenStack resources, including computing, storage, and network resources. A project can be a department or a project team.Multiple ",
"doc_type":"usermanual",
"kw":"Project,Concepts,User Guide",
"title":"Project",
"githuburl":""
},
- {
- "uri":"kms_01_0046.html",
- "product_code":"kms",
- "code":"11",
- "des":"KMS can manage CMKs used for data encryption and decryption in Object Storage Service (OBS), Elastic Volume Service (EVS), Image Management Service (IMS), Scalable File S",
- "doc_type":"usermanual",
- "kw":"Application Scenarios,About KMS,User Guide",
- "title":"Application Scenarios",
- "githuburl":""
- },
{
"uri":"kms_01_0047.html",
"product_code":"kms",
"code":"12",
"des":"KMS provides the following functions:Manages CMKs.Using the KMS console or APIs, you can perform the following operations on CMKs:Creating, querying, enabling, disabling,",
"doc_type":"usermanual",
- "kw":"Functions,About KMS,User Guide",
+ "kw":"Functions,Key Management,User Guide",
"title":"Functions",
"githuburl":""
},
+ {
+ "uri":"kms_01_0100.html",
+ "product_code":"kms",
+ "code":"13",
+ "des":"Extensive Service IntegrationKMS can be integrated with Object Storage Service (OBS), Elastic Volume Service (EVS), and Image Management Service (IMS), to manage keys of ",
+ "doc_type":"usermanual",
+ "kw":"Product Advantages,Key Management,User Guide",
+ "title":"Product Advantages",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0046.html",
+ "product_code":"kms",
+ "code":"14",
+ "des":"KMS can manage CMKs used for data encryption and decryption in Object Storage Service (OBS), Elastic Volume Service (EVS), Image Management Service (IMS), Scalable File S",
+ "doc_type":"usermanual",
+ "kw":"Application Scenarios,Key Management,User Guide",
+ "title":"Application Scenarios",
+ "githuburl":""
+ },
{
"uri":"kms_01_0013.html",
"product_code":"kms",
- "code":"13",
+ "code":"15",
"des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"doc_type":"usermanual",
"kw":"Accessing and Using KMS",
@@ -132,8 +152,8 @@
{
"uri":"kms_01_0014.html",
"product_code":"kms",
- "code":"14",
- "des":"The public cloud provides a web-based service management platform. You can access KMS using HTTPS-compliant APIs or the management console.Management consoleIf you have r",
+ "code":"16",
+ "des":"The cloud service provides a web-based service management platform. You can access KMS using HTTPS-compliant APIs or the management console.Management consoleIf you have ",
"doc_type":"usermanual",
"kw":"How to Access KMS,Accessing and Using KMS,User Guide",
"title":"How to Access KMS",
@@ -142,67 +162,77 @@
{
"uri":"kms_01_0015.html",
"product_code":"kms",
- "code":"15",
+ "code":"17",
"des":"Users can upload objects to and download them from Object Storage Service (OBS) in common mode or server-side encryption mode. When users upload objects in encryption mod",
"doc_type":"usermanual",
"kw":"How to Use KMS,Accessing and Using KMS,User Guide",
"title":"How to Use KMS",
"githuburl":""
},
- {
- "uri":"kms_01_0016.html",
- "product_code":"kms",
- "code":"16",
- "des":"KMS provides central management and control capabilities of CMKs for Object Storage Service (OBS). It is used for server-side encryption with KMS-managed keys (SSE-KMS) f",
- "doc_type":"usermanual",
- "kw":"Related Services,Accessing and Using KMS,User Guide",
- "title":"Related Services",
- "githuburl":""
- },
{
"uri":"kms_01_0017.html",
"product_code":"kms",
- "code":"17",
- "des":"The public cloud system provides two types of permissions by default: user management and resource management. User management refers to the management of users, user gro",
+ "code":"18",
+ "des":"The system provides two types of permissions by default: user management and resource management. User management refers to the management of users, user groups, and user",
"doc_type":"usermanual",
- "kw":"User Permissions,Accessing and Using KMS,User Guide",
+ "kw":"User Permissions,Service Overview,User Guide",
"title":"User Permissions",
"githuburl":""
},
{
"uri":"kms_01_9999.html",
"product_code":"kms",
- "code":"18",
+ "code":"19",
"des":"If you want to assign different access permissions to employees in an enterprise for the KMS resources purchased on the cloud platform, you can use Identity and Access Ma",
"doc_type":"usermanual",
- "kw":"KMS Permissions Management,Accessing and Using KMS,User Guide",
- "title":"KMS Permissions Management",
+ "kw":"Permissions Management,Service Overview,User Guide",
+ "title":"Permissions Management",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0016.html",
+ "product_code":"kms",
+ "code":"20",
+ "des":"Object Storage Service (OBS) is a scalable service that provides secure, reliable, and cost-effective cloud storage for massive amounts of data. KMS provides central mana",
+ "doc_type":"usermanual",
+ "kw":"Related Services,Service Overview,User Guide",
+ "title":"Related Services",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0196.html",
+ "product_code":"kms",
+ "code":"21",
+ "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
+ "doc_type":"usermanual",
+ "kw":"User Guide",
+ "title":"User Guide",
"githuburl":""
},
{
"uri":"kms_01_0018.html",
"product_code":"kms",
- "code":"19",
+ "code":"22",
"des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"doc_type":"usermanual",
- "kw":"Management",
- "title":"Management",
+ "kw":"Key Management",
+ "title":"Key Management",
"githuburl":""
},
{
- "uri":"en-us_topic_0034330265.html",
+ "uri":"kms_01_194.html",
"product_code":"kms",
- "code":"20",
+ "code":"23",
"des":"This section describes how to create a CMK on the KMS management console. You can create up to 100 CMKs, excluding Default Master Keys.The CMK is perfectly suited for but",
"doc_type":"usermanual",
- "kw":"Creating a Key,Management,User Guide",
+ "kw":"Creating a Key,Key Management,User Guide",
"title":"Creating a Key",
"githuburl":""
},
{
"uri":"kms_01_0019.html",
"product_code":"kms",
- "code":"21",
+ "code":"24",
"des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"doc_type":"usermanual",
"kw":"Creating CMKs Using Imported Key Material",
@@ -212,8 +242,8 @@
{
"uri":"kms_01_0054.html",
"product_code":"kms",
- "code":"22",
- "des":"A CMK contains key metadata (key ID, key alias, description, key status, and creation date) and the key material used for encrypting and decrypting data.When a user uses ",
+ "code":"25",
+ "des":"A custom key contains key metadata (key ID, key alias, description, key status, and creation date) and key materials used for encrypting and decrypting data.When a user u",
"doc_type":"usermanual",
"kw":"Overview,Creating CMKs Using Imported Key Material,User Guide",
"title":"Overview",
@@ -222,177 +252,27 @@
{
"uri":"kms_01_0055.html",
"product_code":"kms",
- "code":"23",
+ "code":"26",
"des":"If you want to use your own key material instead of the KMS-generated material, you can use the console to import your key material to KMS. CMKs created using imported ma",
"doc_type":"usermanual",
- "kw":"Importing Key Material,Creating CMKs Using Imported Key Material,User Guide",
- "title":"Importing Key Material",
+ "kw":"Importing a Key Material,Creating CMKs Using Imported Key Material,User Guide",
+ "title":"Importing a Key Material",
"githuburl":""
},
{
"uri":"kms_01_0020.html",
"product_code":"kms",
- "code":"24",
+ "code":"27",
"des":"When importing key material, you can specify the expiration time. After the key material expires, KMS deletes it, and the status of the CMK changes to Pending import. You",
"doc_type":"usermanual",
- "kw":"Deleting Key Material,Creating CMKs Using Imported Key Material,User Guide",
- "title":"Deleting Key Material",
- "githuburl":""
- },
- {
- "uri":"kms_01_0072.html",
- "product_code":"kms",
- "code":"25",
- "des":"This section describes how to use the management console to schedule the deletion of one or multiple unwanted CMKs.If deletion is scheduled for a CMK, the deletion will n",
- "doc_type":"usermanual",
- "kw":"Scheduling the Deletion of One or Multiple CMKs,Management,User Guide",
- "title":"Scheduling the Deletion of One or Multiple CMKs",
- "githuburl":""
- },
- {
- "uri":"kms_01_0021.html",
- "product_code":"kms",
- "code":"26",
- "des":"This section describes how to configure the Simple Message Notification (SMN) function on the Cloud Trace Service (CTS) console.Decryption will fail if the CMK used has b",
- "doc_type":"usermanual",
- "kw":"Configuring SMN,Management,User Guide",
- "title":"Configuring SMN",
- "githuburl":""
- },
- {
- "uri":"kms_01_0023.html",
- "product_code":"kms",
- "code":"27",
- "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
- "doc_type":"usermanual",
- "kw":"Managing Tags",
- "title":"Managing Tags",
- "githuburl":""
- },
- {
- "uri":"kms_01_0024.html",
- "product_code":"kms",
- "code":"28",
- "des":"Tags are used to identify CMKs. You can add tags to CMKs so that you can classify CMKs, trace them, and collect their usage status according to the tags.KMS does not supp",
- "doc_type":"usermanual",
- "kw":"Adding a Tag,Managing Tags,User Guide",
- "title":"Adding a Tag",
- "githuburl":""
- },
- {
- "uri":"kms_01_0025.html",
- "product_code":"kms",
- "code":"29",
- "des":"This section describes how to search for tags through KMS. You can search for tags of all CMKs that meet the search criteria in the current project.You have obtained an a",
- "doc_type":"usermanual",
- "kw":"Searching for Tags,Managing Tags,User Guide",
- "title":"Searching for Tags",
- "githuburl":""
- },
- {
- "uri":"kms_01_0026.html",
- "product_code":"kms",
- "code":"30",
- "des":"This section describes how to modify tag values on the KMS management console.You have obtained an account and its password for logging in to the management console.",
- "doc_type":"usermanual",
- "kw":"Modifying Tag Values,Managing Tags,User Guide",
- "title":"Modifying Tag Values",
- "githuburl":""
- },
- {
- "uri":"kms_01_0027.html",
- "product_code":"kms",
- "code":"31",
- "des":"This section describes how to delete tags on the KMS management console.You have obtained an account and its password for logging in to the management console.",
- "doc_type":"usermanual",
- "kw":"Deleting Tags,Managing Tags,User Guide",
- "title":"Deleting Tags",
- "githuburl":""
- },
- {
- "uri":"kms_01_0028.html",
- "product_code":"kms",
- "code":"32",
- "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
- "doc_type":"usermanual",
- "kw":"Managing a Grant",
- "title":"Managing a Grant",
- "githuburl":""
- },
- {
- "uri":"kms_01_0029.html",
- "product_code":"kms",
- "code":"33",
- "des":"You can create grants for other users to use the CMK. You can create a maximum of 100 grants for a CMK.The owner of a CMK can create a grant for the CMK on the KMS manage",
- "doc_type":"usermanual",
- "kw":"Creating a Grant,Managing a Grant,User Guide",
- "title":"Creating a Grant",
- "githuburl":""
- },
- {
- "uri":"kms_01_0030.html",
- "product_code":"kms",
- "code":"34",
- "des":"This section describes how to view the details about a grant, such as the grant ID, grantee user ID, granted operation, and creation time.You have obtained an account and",
- "doc_type":"usermanual",
- "kw":"Querying a Grant,Managing a Grant,User Guide",
- "title":"Querying a Grant",
- "githuburl":""
- },
- {
- "uri":"kms_01_0031.html",
- "product_code":"kms",
- "code":"35",
- "des":"You can revoke a grant in either of the following scenarios:A grantee does not need the grant. (The grantee can either tell the user who has created the grant to revoke t",
- "doc_type":"usermanual",
- "kw":"Revoking a Grant,Managing a Grant,User Guide",
- "title":"Revoking a Grant",
- "githuburl":""
- },
- {
- "uri":"kms_01_0138.html",
- "product_code":"kms",
- "code":"36",
- "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
- "doc_type":"usermanual",
- "kw":"Rotating CMKs",
- "title":"Rotating CMKs",
- "githuburl":""
- },
- {
- "uri":"kms_01_0094.html",
- "product_code":"kms",
- "code":"37",
- "des":"Security risks exist when a DEK is extensively and repeatedly used. For security purposes, you can configure KMS to create new key materials for the CMK.New key materials",
- "doc_type":"usermanual",
- "kw":"Context,Rotating CMKs,User Guide",
- "title":"Context",
- "githuburl":""
- },
- {
- "uri":"kms_01_0139.html",
- "product_code":"kms",
- "code":"38",
- "des":"This section describes how to enable rotation for a key on the KMS console.By default, automatic key rotation is disabled for a CMK. Every time you enable key rotation, K",
- "doc_type":"usermanual",
- "kw":"Enabling Key Rotation,Rotating CMKs,User Guide",
- "title":"Enabling Key Rotation",
- "githuburl":""
- },
- {
- "uri":"kms_01_0095.html",
- "product_code":"kms",
- "code":"39",
- "des":"This section describes how to disable rotation for a key on the KMS console.You have obtained an account and its password for logging in to the management console.The CMK",
- "doc_type":"usermanual",
- "kw":"Disabling Key Rotation,Rotating CMKs,User Guide",
- "title":"Disabling Key Rotation",
+ "kw":"Deleting a Key Material,Creating CMKs Using Imported Key Material,User Guide",
+ "title":"Deleting a Key Material",
"githuburl":""
},
{
"uri":"kms_01_0032.html",
"product_code":"kms",
- "code":"40",
+ "code":"28",
"des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"doc_type":"usermanual",
"kw":"Managing CMKs",
@@ -402,7 +282,7 @@
{
"uri":"kms_01_0096.html",
"product_code":"kms",
- "code":"41",
+ "code":"29",
"des":"This section describes how to use the management console to view the information about a CMK, such as its alias, status, ID, and creation time. The status of a CMK can be",
"doc_type":"usermanual",
"kw":"Querying a CMK,Managing CMKs,User Guide",
@@ -412,7 +292,7 @@
{
"uri":"kms_01_0033.html",
"product_code":"kms",
- "code":"42",
+ "code":"30",
"des":"The alias of a CMK is a user-friendly name designed to help you locate the CMK easier.This section describes how to change the alias and description of a CMK on the KMS m",
"doc_type":"usermanual",
"kw":"Changing the Alias and Description of a CMK,Managing CMKs,User Guide",
@@ -422,7 +302,7 @@
{
"uri":"kms_01_0034.html",
"product_code":"kms",
- "code":"43",
+ "code":"31",
"des":"This section describes how to use the management console to enable one or multiple CMKs. Only enabled CMKs can be used to encrypt/decrypt data. A new CMK is in the Enable",
"doc_type":"usermanual",
"kw":"Enabling One or Multiple CMKs,Managing CMKs,User Guide",
@@ -432,27 +312,177 @@
{
"uri":"kms_01_0035.html",
"product_code":"kms",
- "code":"44",
+ "code":"32",
"des":"This section describes how to use the management console to disable one or multiple CMKs, thereby protecting data in urgent cases.After being disabled, a CMK cannot be us",
"doc_type":"usermanual",
"kw":"Disabling One or Multiple CMKs,Managing CMKs,User Guide",
"title":"Disabling One or Multiple CMKs",
"githuburl":""
},
+ {
+ "uri":"kms_01_0072.html",
+ "product_code":"kms",
+ "code":"33",
+ "des":"This section describes how to use the management console to schedule the deletion of one or multiple unwanted CMKs.If deletion is scheduled for a CMK, the deletion will n",
+ "doc_type":"usermanual",
+ "kw":"Deleting One or More CMKs,Managing CMKs,User Guide",
+ "title":"Deleting One or More CMKs",
+ "githuburl":""
+ },
{
"uri":"kms_01_0036.html",
"product_code":"kms",
- "code":"45",
- "des":"This section describes how to use the management console to cancel the scheduled deletion of one or multiple CMKs prior to deletion execution.You have obtained an account",
+ "code":"34",
+ "des":"This section describes how to use the management console to cancel the scheduled deletion of one or multiple CMKs prior to deletion execution.The CMK for which you want t",
"doc_type":"usermanual",
"kw":"Canceling the Scheduled Deletion of One or Multiple CMKs,Managing CMKs,User Guide",
"title":"Canceling the Scheduled Deletion of One or Multiple CMKs",
"githuburl":""
},
{
- "uri":"kms_01_9998.html",
+ "uri":"kms_01_0021.html",
+ "product_code":"kms",
+ "code":"35",
+ "des":"This section describes how to configure the Simple Message Notification (SMN) function on the Cloud Trace Service (CTS) console.Decryption will fail if the CMK used has b",
+ "doc_type":"usermanual",
+ "kw":"Configuring SMN,Key Management,User Guide",
+ "title":"Configuring SMN",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0023.html",
+ "product_code":"kms",
+ "code":"36",
+ "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
+ "doc_type":"usermanual",
+ "kw":"Managing Tags",
+ "title":"Managing Tags",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0024.html",
+ "product_code":"kms",
+ "code":"37",
+ "des":"Tags are used to identify CMKs. You can add tags to CMKs so that you can classify CMKs, trace them, and collect their usage status according to the tags.Tags cannot be ad",
+ "doc_type":"usermanual",
+ "kw":"Adding a Tag,Managing Tags,User Guide",
+ "title":"Adding a Tag",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0025.html",
+ "product_code":"kms",
+ "code":"38",
+ "des":"This section describes how to search for tags through KMS. You can search for tags of all CMKs that meet the search criteria in the current project.Tags have been added.M",
+ "doc_type":"usermanual",
+ "kw":"Searching for a CMK by Tag,Managing Tags,User Guide",
+ "title":"Searching for a CMK by Tag",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0026.html",
+ "product_code":"kms",
+ "code":"39",
+ "des":"This section describes how to modify tag values on the KMS management console.",
+ "doc_type":"usermanual",
+ "kw":"Modifying Tag Values,Managing Tags,User Guide",
+ "title":"Modifying Tag Values",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0027.html",
+ "product_code":"kms",
+ "code":"40",
+ "des":"This section describes how to delete tags on the KMS management console.",
+ "doc_type":"usermanual",
+ "kw":"Deleting Tags,Managing Tags,User Guide",
+ "title":"Deleting Tags",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0138.html",
+ "product_code":"kms",
+ "code":"41",
+ "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
+ "doc_type":"usermanual",
+ "kw":"Rotating CMKs",
+ "title":"Rotating CMKs",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0094.html",
+ "product_code":"kms",
+ "code":"42",
+ "des":"Keys that are widely or repeatedly used are insecure. To enhance the security of encryption keys, you are advised to periodically rotate keys and change their key materia",
+ "doc_type":"usermanual",
+ "kw":"Key Rotation Overview,Rotating CMKs,User Guide",
+ "title":"Key Rotation Overview",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0139.html",
+ "product_code":"kms",
+ "code":"43",
+ "des":"This section describes how to enable rotation for a key on the KMS console.By default, automatic key rotation is disabled for a CMK. Every time you enable key rotation, K",
+ "doc_type":"usermanual",
+ "kw":"Enabling Key Rotation,Rotating CMKs,User Guide",
+ "title":"Enabling Key Rotation",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0095.html",
+ "product_code":"kms",
+ "code":"44",
+ "des":"This section describes how to disable rotation for a key on the KMS console.The CMK is in Enabled status.The Origin of the CMK is KMS.Key rotation has been enabled.",
+ "doc_type":"usermanual",
+ "kw":"Disabling Key Rotation,Rotating CMKs,User Guide",
+ "title":"Disabling Key Rotation",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0028.html",
+ "product_code":"kms",
+ "code":"45",
+ "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
+ "doc_type":"usermanual",
+ "kw":"Managing a Grant",
+ "title":"Managing a Grant",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0029.html",
"product_code":"kms",
"code":"46",
+ "des":"You can create grants for other users to use the CMK. You can create a maximum of 100 grants for a CMK.The owner of a CMK can create a grant for the CMK on the KMS manage",
+ "doc_type":"usermanual",
+ "kw":"Creating a Grant,Managing a Grant,User Guide",
+ "title":"Creating a Grant",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0030.html",
+ "product_code":"kms",
+ "code":"47",
+ "des":"This section describes how to view the details about a grant, such as the grant ID, grantee user ID, granted operation, and creation time.You have created a grant.Table 1",
+ "doc_type":"usermanual",
+ "kw":"Querying a Grant,Managing a Grant,User Guide",
+ "title":"Querying a Grant",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0031.html",
+ "product_code":"kms",
+ "code":"48",
+ "des":"You can revoke a grant in either of the following scenarios:A grantee does not need the grant. (The grantee can either tell the user who has created the grant to revoke t",
+ "doc_type":"usermanual",
+ "kw":"Revoking a Grant,Managing a Grant,User Guide",
+ "title":"Revoking a Grant",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_9998.html",
+ "product_code":"kms",
+ "code":"49",
"des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"doc_type":"usermanual",
"kw":"Permissions Management",
@@ -462,7 +492,7 @@
{
"uri":"kms_01_9997.html",
"product_code":"kms",
- "code":"47",
+ "code":"50",
"des":"This section describes IAM's fine-grained permissions management for your KMS resources. With IAM, you can:Create IAM users for employees based on the organizational stru",
"doc_type":"usermanual",
"kw":"Creating a User and Authorizing the User the Permission to Access KMS,Permissions Management,User Gu",
@@ -472,7 +502,7 @@
{
"uri":"kms_01_9996.html",
"product_code":"kms",
- "code":"48",
+ "code":"51",
"des":"Custom policies can be created as a supplement to the system policies of KMS. For details about the actions supported by custom policies, see \"Permissions Policies and Su",
"doc_type":"usermanual",
"kw":"Creating a Custom KMS Policy,Permissions Management,User Guide",
@@ -482,7 +512,7 @@
{
"uri":"kms_01_0037.html",
"product_code":"kms",
- "code":"49",
+ "code":"52",
"des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"doc_type":"usermanual",
"kw":"FAQs",
@@ -492,7 +522,7 @@
{
"uri":"kms_01_0073.html",
"product_code":"kms",
- "code":"50",
+ "code":"53",
"des":"Key Management Service (KMS) is a secure, reliable, and easy-to-use service that helps users centrally manage and safeguard their Customer Master Keys (CMKs).This service",
"doc_type":"usermanual",
"kw":"What Is Key Management Service?,FAQs,User Guide",
@@ -502,37 +532,37 @@
{
"uri":"kms_01_0074.html",
"product_code":"kms",
- "code":"51",
+ "code":"54",
"des":"A Customer Master Key (CMK) is a Key Encryption Key (KEK) created by a user using KMS. It is used to encrypt and protect Data Encryption Keys (DEKs). One CMK can be used ",
"doc_type":"usermanual",
"kw":"What Is a Customer Master Key?,FAQs,User Guide",
"title":"What Is a Customer Master Key?",
"githuburl":""
},
+ {
+ "uri":"kms_01_0101.html",
+ "product_code":"kms",
+ "code":"55",
+ "des":"The following table describes the differences between a custom key and a default key.",
+ "doc_type":"usermanual",
+ "kw":"What Are the Differences Between a Custom Key and a Default Key?,FAQs,User Guide",
+ "title":"What Are the Differences Between a Custom Key and a Default Key?",
+ "githuburl":""
+ },
{
"uri":"kms_01_0038.html",
"product_code":"kms",
- "code":"52",
+ "code":"56",
"des":"A data encryption key (DEK) is used to encrypt data.",
"doc_type":"usermanual",
"kw":"What Is a Data Encryption Key?,FAQs,User Guide",
"title":"What Is a Data Encryption Key?",
"githuburl":""
},
- {
- "uri":"kms_01_0039.html",
- "product_code":"kms",
- "code":"53",
- "des":"The decision to delete a CMK should be taken with caution. Before deletion, confirm that the CMK's encrypted data has all been migrated. Once the CMK is deleted, you will",
- "doc_type":"usermanual",
- "kw":"Why Cannot I Delete a CMK Immediately?,FAQs,User Guide",
- "title":"Why Cannot I Delete a CMK Immediately?",
- "githuburl":""
- },
{
"uri":"kms_01_0040.html",
"product_code":"kms",
- "code":"54",
+ "code":"57",
"des":"Object Storage Service (OBS), Elastic Volume Service (EVS), Image Management Service (IMS), Scalable File Service (SFS), and Relational Database Service (RDS) can use KMS",
"doc_type":"usermanual",
"kw":"Which Cloud Services Can Use KMS for Encryption?,FAQs,User Guide",
@@ -542,17 +572,87 @@
{
"uri":"kms_01_0093.html",
"product_code":"kms",
- "code":"55",
+ "code":"58",
"des":"No.The pending period of a CMK from its scheduling till its deletion is not charged.However, if you cancel the scheduled deletion, the charging resumes from the time when",
"doc_type":"usermanual",
"kw":"Will a CMK Be Charged After It Is Scheduled to Delete?,FAQs,User Guide",
"title":"Will a CMK Be Charged After It Is Scheduled to Delete?",
"githuburl":""
},
+ {
+ "uri":"kms_01_0039.html",
+ "product_code":"kms",
+ "code":"59",
+ "des":"The decision to delete a CMK should be taken with caution. Before deletion, confirm that the CMK's encrypted data has all been migrated. Once the CMK is deleted, you will",
+ "doc_type":"usermanual",
+ "kw":"Why Can't I Delete a CMK Immediately?,FAQs,User Guide",
+ "title":"Why Can't I Delete a CMK Immediately?",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0198.html",
+ "product_code":"kms",
+ "code":"60",
+ "des":"Yes.",
+ "doc_type":"usermanual",
+ "kw":"Is There a Limit on the Number of CMKs That I Can Create on KMS?,FAQs,User Guide",
+ "title":"Is There a Limit on the Number of CMKs That I Can Create on KMS?",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0106.html",
+ "product_code":"kms",
+ "code":"61",
+ "des":"Envelope encryption is the practice of encrypting data with a DEK and then encrypting the DEK with a root key that you can fully manage. In this case, CMKs are not requir",
+ "doc_type":"usermanual",
+ "kw":"What Are the Benefits of Envelope Encryption?,FAQs,User Guide",
+ "title":"What Are the Benefits of Envelope Encryption?",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0102.html",
+ "product_code":"kms",
+ "code":"62",
+ "des":"No.To ensure CMK security, users can only create and use CMKs in KMS.",
+ "doc_type":"usermanual",
+ "kw":"Can I Export a CMK from KMS?,FAQs,User Guide",
+ "title":"Can I Export a CMK from KMS?",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0107.html",
+ "product_code":"kms",
+ "code":"63",
+ "des":"You can use the online tool to encrypt or decrypt data in the following procedures:The key you clicked is used for encryption.To clear your input, click Clear.To copy the",
+ "doc_type":"usermanual",
+ "kw":"How Do I Use the Online Tool to Encrypt or Decrypt Small Volumes of Data?,FAQs,User Guide",
+ "title":"How Do I Use the Online Tool to Encrypt or Decrypt Small Volumes of Data?",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0114.html",
+ "product_code":"kms",
+ "code":"64",
+ "des":"No.Keys created using KMS-generated materials cannot be updated. You can only use KMS to create new CMKs to encrypt and decrypt data.",
+ "doc_type":"usermanual",
+ "kw":"Can I Update CMKs Created by KMS-Generated Key Materials?,FAQs,User Guide",
+ "title":"Can I Update CMKs Created by KMS-Generated Key Materials?",
+ "githuburl":""
+ },
+ {
+ "uri":"kms_01_0193.html",
+ "product_code":"kms",
+ "code":"65",
+ "des":"The mechanism of KMS prevents anyone from accessing your keys in plaintext. KMS relies on hardware security modules (HSMs) that safeguard the confidentiality and integrit",
+ "doc_type":"usermanual",
+ "kw":"How Does KMS Protect My Keys?,FAQs,User Guide",
+ "title":"How Does KMS Protect My Keys?",
+ "githuburl":""
+ },
{
"uri":"kms_01_0043.html",
"product_code":"kms",
- "code":"56",
+ "code":"66",
"des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"doc_type":"usermanual",
"kw":"Change History,User Guide",
@@ -562,7 +662,7 @@
{
"uri":"kms_01_0044.html",
"product_code":"kms",
- "code":"57",
+ "code":"67",
"des":"For details about the glossaries in this document, see Glossary.",
"doc_type":"usermanual",
"kw":"Glossary,User Guide",
diff --git a/docs/kms/umn/CLASS.TXT.json b/docs/kms/umn/CLASS.TXT.json
index 8d587983..1b2aed58 100644
--- a/docs/kms/umn/CLASS.TXT.json
+++ b/docs/kms/umn/CLASS.TXT.json
@@ -2,8 +2,8 @@
{
"desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"product_code":"kms",
- "title":"About KMS",
- "uri":"kms_01_0045.html",
+ "title":"Service Overview",
+ "uri":"kms_01_0109.html",
"doc_type":"usermanual",
"p_code":"",
"code":"1"
@@ -11,20 +11,29 @@
{
"desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"product_code":"kms",
- "title":"Concepts",
- "uri":"kms_01_0003.html",
+ "title":"Key Management",
+ "uri":"kms_01_0045.html",
"doc_type":"usermanual",
"p_code":"1",
"code":"2"
},
+ {
+ "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
+ "product_code":"kms",
+ "title":"Concepts",
+ "uri":"kms_01_0003.html",
+ "doc_type":"usermanual",
+ "p_code":"2",
+ "code":"3"
+ },
{
"desc":"Key Management Service (KMS) is a secure, reliable, and easy-to-use service that helps users centrally manage and safeguard their Customer Master Keys (CMKs).This service",
"product_code":"kms",
"title":"KMS",
"uri":"kms_01_0004.html",
"doc_type":"usermanual",
- "p_code":"2",
- "code":"3"
+ "p_code":"3",
+ "code":"4"
},
{
"desc":"A Customer Master Key (CMK) is a Key Encryption Key (KEK) created by a user using KMS. It is used to encrypt and protect Data Encryption Keys (DEKs). One CMK can be used ",
@@ -32,8 +41,8 @@
"title":"CMK",
"uri":"kms_01_0005.html",
"doc_type":"usermanual",
- "p_code":"2",
- "code":"4"
+ "p_code":"3",
+ "code":"5"
},
{
"desc":"A Default Master Key is automatically created by another cloud service using KMS, such as Object Storage Service (OBS). The alias of a Default Master Key ends with /defau",
@@ -41,8 +50,8 @@
"title":"Default Master Key",
"uri":"kms_01_0006.html",
"doc_type":"usermanual",
- "p_code":"2",
- "code":"5"
+ "p_code":"3",
+ "code":"6"
},
{
"desc":"Data Encryption Keys (DEKs) are used by users to encrypt data.",
@@ -50,17 +59,17 @@
"title":"DEK",
"uri":"kms_01_0007.html",
"doc_type":"usermanual",
- "p_code":"2",
- "code":"6"
+ "p_code":"3",
+ "code":"7"
},
{
- "desc":"A hardware security module (HSM) is a hardware device that securely produces, stores, manages, and uses CMKs. In addition, it provides encryption processing services.",
+ "desc":"A Hardware Security Module (HSM) securely produces, stores, manages, and uses keys and provides encryption services.",
"product_code":"kms",
"title":"HSM",
"uri":"kms_01_0008.html",
"doc_type":"usermanual",
- "p_code":"2",
- "code":"7"
+ "p_code":"3",
+ "code":"8"
},
{
"desc":"Envelope encryption is an encryption method that enables DEKs to be stored, transmitted, and used in \"envelopes.\" As a result, CMKs are not used to directly encrypt and d",
@@ -68,8 +77,8 @@
"title":"Envelope Encryption",
"uri":"kms_01_0009.html",
"doc_type":"usermanual",
- "p_code":"2",
- "code":"8"
+ "p_code":"3",
+ "code":"9"
},
{
"desc":"A true random number generator (TRNG) is a device that generates unpredictable random numbers by physical procedures instead of computer programs.",
@@ -77,8 +86,8 @@
"title":"TRNG",
"uri":"kms_01_0010.html",
"doc_type":"usermanual",
- "p_code":"2",
- "code":"9"
+ "p_code":"3",
+ "code":"10"
},
{
"desc":"A project is used to group and isolate OpenStack resources, including computing, storage, and network resources. A project can be a department or a project team.Multiple ",
@@ -86,16 +95,7 @@
"title":"Project",
"uri":"kms_01_0012.html",
"doc_type":"usermanual",
- "p_code":"2",
- "code":"10"
- },
- {
- "desc":"KMS can manage CMKs used for data encryption and decryption in Object Storage Service (OBS), Elastic Volume Service (EVS), Image Management Service (IMS), Scalable File S",
- "product_code":"kms",
- "title":"Application Scenarios",
- "uri":"kms_01_0046.html",
- "doc_type":"usermanual",
- "p_code":"1",
+ "p_code":"3",
"code":"11"
},
{
@@ -104,26 +104,44 @@
"title":"Functions",
"uri":"kms_01_0047.html",
"doc_type":"usermanual",
- "p_code":"1",
+ "p_code":"2",
"code":"12"
},
+ {
+ "desc":"Extensive Service IntegrationKMS can be integrated with Object Storage Service (OBS), Elastic Volume Service (EVS), and Image Management Service (IMS), to manage keys of ",
+ "product_code":"kms",
+ "title":"Product Advantages",
+ "uri":"kms_01_0100.html",
+ "doc_type":"usermanual",
+ "p_code":"2",
+ "code":"13"
+ },
+ {
+ "desc":"KMS can manage CMKs used for data encryption and decryption in Object Storage Service (OBS), Elastic Volume Service (EVS), Image Management Service (IMS), Scalable File S",
+ "product_code":"kms",
+ "title":"Application Scenarios",
+ "uri":"kms_01_0046.html",
+ "doc_type":"usermanual",
+ "p_code":"2",
+ "code":"14"
+ },
{
"desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"product_code":"kms",
"title":"Accessing and Using KMS",
"uri":"kms_01_0013.html",
"doc_type":"usermanual",
- "p_code":"1",
- "code":"13"
+ "p_code":"2",
+ "code":"15"
},
{
- "desc":"The public cloud provides a web-based service management platform. You can access KMS using HTTPS-compliant APIs or the management console.Management consoleIf you have r",
+ "desc":"The cloud service provides a web-based service management platform. You can access KMS using HTTPS-compliant APIs or the management console.Management consoleIf you have ",
"product_code":"kms",
"title":"How to Access KMS",
"uri":"kms_01_0014.html",
"doc_type":"usermanual",
- "p_code":"13",
- "code":"14"
+ "p_code":"15",
+ "code":"16"
},
{
"desc":"Users can upload objects to and download them from Object Storage Service (OBS) in common mode or server-side encryption mode. When users upload objects in encryption mod",
@@ -131,53 +149,62 @@
"title":"How to Use KMS",
"uri":"kms_01_0015.html",
"doc_type":"usermanual",
- "p_code":"13",
- "code":"15"
+ "p_code":"15",
+ "code":"17"
},
{
- "desc":"KMS provides central management and control capabilities of CMKs for Object Storage Service (OBS). It is used for server-side encryption with KMS-managed keys (SSE-KMS) f",
- "product_code":"kms",
- "title":"Related Services",
- "uri":"kms_01_0016.html",
- "doc_type":"usermanual",
- "p_code":"13",
- "code":"16"
- },
- {
- "desc":"The public cloud system provides two types of permissions by default: user management and resource management. User management refers to the management of users, user gro",
+ "desc":"The system provides two types of permissions by default: user management and resource management. User management refers to the management of users, user groups, and user",
"product_code":"kms",
"title":"User Permissions",
"uri":"kms_01_0017.html",
"doc_type":"usermanual",
- "p_code":"13",
- "code":"17"
+ "p_code":"1",
+ "code":"18"
},
{
"desc":"If you want to assign different access permissions to employees in an enterprise for the KMS resources purchased on the cloud platform, you can use Identity and Access Ma",
"product_code":"kms",
- "title":"KMS Permissions Management",
+ "title":"Permissions Management",
"uri":"kms_01_9999.html",
"doc_type":"usermanual",
- "p_code":"13",
- "code":"18"
+ "p_code":"1",
+ "code":"19"
+ },
+ {
+ "desc":"Object Storage Service (OBS) is a scalable service that provides secure, reliable, and cost-effective cloud storage for massive amounts of data. KMS provides central mana",
+ "product_code":"kms",
+ "title":"Related Services",
+ "uri":"kms_01_0016.html",
+ "doc_type":"usermanual",
+ "p_code":"1",
+ "code":"20"
},
{
"desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"product_code":"kms",
- "title":"Management",
- "uri":"kms_01_0018.html",
+ "title":"User Guide",
+ "uri":"kms_01_0196.html",
"doc_type":"usermanual",
"p_code":"",
- "code":"19"
+ "code":"21"
+ },
+ {
+ "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
+ "product_code":"kms",
+ "title":"Key Management",
+ "uri":"kms_01_0018.html",
+ "doc_type":"usermanual",
+ "p_code":"21",
+ "code":"22"
},
{
"desc":"This section describes how to create a CMK on the KMS management console. You can create up to 100 CMKs, excluding Default Master Keys.The CMK is perfectly suited for but",
"product_code":"kms",
"title":"Creating a Key",
- "uri":"en-us_topic_0034330265.html",
+ "uri":"kms_01_194.html",
"doc_type":"usermanual",
- "p_code":"19",
- "code":"20"
+ "p_code":"22",
+ "code":"23"
},
{
"desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
@@ -185,179 +212,44 @@
"title":"Creating CMKs Using Imported Key Material",
"uri":"kms_01_0019.html",
"doc_type":"usermanual",
- "p_code":"19",
- "code":"21"
+ "p_code":"22",
+ "code":"24"
},
{
- "desc":"A CMK contains key metadata (key ID, key alias, description, key status, and creation date) and the key material used for encrypting and decrypting data.When a user uses ",
+ "desc":"A custom key contains key metadata (key ID, key alias, description, key status, and creation date) and key materials used for encrypting and decrypting data.When a user u",
"product_code":"kms",
"title":"Overview",
"uri":"kms_01_0054.html",
"doc_type":"usermanual",
- "p_code":"21",
- "code":"22"
+ "p_code":"24",
+ "code":"25"
},
{
"desc":"If you want to use your own key material instead of the KMS-generated material, you can use the console to import your key material to KMS. CMKs created using imported ma",
"product_code":"kms",
- "title":"Importing Key Material",
+ "title":"Importing a Key Material",
"uri":"kms_01_0055.html",
"doc_type":"usermanual",
- "p_code":"21",
- "code":"23"
+ "p_code":"24",
+ "code":"26"
},
{
"desc":"When importing key material, you can specify the expiration time. After the key material expires, KMS deletes it, and the status of the CMK changes to Pending import. You",
"product_code":"kms",
- "title":"Deleting Key Material",
+ "title":"Deleting a Key Material",
"uri":"kms_01_0020.html",
"doc_type":"usermanual",
- "p_code":"21",
- "code":"24"
- },
- {
- "desc":"This section describes how to use the management console to schedule the deletion of one or multiple unwanted CMKs.If deletion is scheduled for a CMK, the deletion will n",
- "product_code":"kms",
- "title":"Scheduling the Deletion of One or Multiple CMKs",
- "uri":"kms_01_0072.html",
- "doc_type":"usermanual",
- "p_code":"19",
- "code":"25"
- },
- {
- "desc":"This section describes how to configure the Simple Message Notification (SMN) function on the Cloud Trace Service (CTS) console.Decryption will fail if the CMK used has b",
- "product_code":"kms",
- "title":"Configuring SMN",
- "uri":"kms_01_0021.html",
- "doc_type":"usermanual",
- "p_code":"19",
- "code":"26"
- },
- {
- "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
- "product_code":"kms",
- "title":"Managing Tags",
- "uri":"kms_01_0023.html",
- "doc_type":"usermanual",
- "p_code":"19",
+ "p_code":"24",
"code":"27"
},
- {
- "desc":"Tags are used to identify CMKs. You can add tags to CMKs so that you can classify CMKs, trace them, and collect their usage status according to the tags.KMS does not supp",
- "product_code":"kms",
- "title":"Adding a Tag",
- "uri":"kms_01_0024.html",
- "doc_type":"usermanual",
- "p_code":"27",
- "code":"28"
- },
- {
- "desc":"This section describes how to search for tags through KMS. You can search for tags of all CMKs that meet the search criteria in the current project.You have obtained an a",
- "product_code":"kms",
- "title":"Searching for Tags",
- "uri":"kms_01_0025.html",
- "doc_type":"usermanual",
- "p_code":"27",
- "code":"29"
- },
- {
- "desc":"This section describes how to modify tag values on the KMS management console.You have obtained an account and its password for logging in to the management console.",
- "product_code":"kms",
- "title":"Modifying Tag Values",
- "uri":"kms_01_0026.html",
- "doc_type":"usermanual",
- "p_code":"27",
- "code":"30"
- },
- {
- "desc":"This section describes how to delete tags on the KMS management console.You have obtained an account and its password for logging in to the management console.",
- "product_code":"kms",
- "title":"Deleting Tags",
- "uri":"kms_01_0027.html",
- "doc_type":"usermanual",
- "p_code":"27",
- "code":"31"
- },
- {
- "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
- "product_code":"kms",
- "title":"Managing a Grant",
- "uri":"kms_01_0028.html",
- "doc_type":"usermanual",
- "p_code":"19",
- "code":"32"
- },
- {
- "desc":"You can create grants for other users to use the CMK. You can create a maximum of 100 grants for a CMK.The owner of a CMK can create a grant for the CMK on the KMS manage",
- "product_code":"kms",
- "title":"Creating a Grant",
- "uri":"kms_01_0029.html",
- "doc_type":"usermanual",
- "p_code":"32",
- "code":"33"
- },
- {
- "desc":"This section describes how to view the details about a grant, such as the grant ID, grantee user ID, granted operation, and creation time.You have obtained an account and",
- "product_code":"kms",
- "title":"Querying a Grant",
- "uri":"kms_01_0030.html",
- "doc_type":"usermanual",
- "p_code":"32",
- "code":"34"
- },
- {
- "desc":"You can revoke a grant in either of the following scenarios:A grantee does not need the grant. (The grantee can either tell the user who has created the grant to revoke t",
- "product_code":"kms",
- "title":"Revoking a Grant",
- "uri":"kms_01_0031.html",
- "doc_type":"usermanual",
- "p_code":"32",
- "code":"35"
- },
- {
- "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
- "product_code":"kms",
- "title":"Rotating CMKs",
- "uri":"kms_01_0138.html",
- "doc_type":"usermanual",
- "p_code":"19",
- "code":"36"
- },
- {
- "desc":"Security risks exist when a DEK is extensively and repeatedly used. For security purposes, you can configure KMS to create new key materials for the CMK.New key materials",
- "product_code":"kms",
- "title":"Context",
- "uri":"kms_01_0094.html",
- "doc_type":"usermanual",
- "p_code":"36",
- "code":"37"
- },
- {
- "desc":"This section describes how to enable rotation for a key on the KMS console.By default, automatic key rotation is disabled for a CMK. Every time you enable key rotation, K",
- "product_code":"kms",
- "title":"Enabling Key Rotation",
- "uri":"kms_01_0139.html",
- "doc_type":"usermanual",
- "p_code":"36",
- "code":"38"
- },
- {
- "desc":"This section describes how to disable rotation for a key on the KMS console.You have obtained an account and its password for logging in to the management console.The CMK",
- "product_code":"kms",
- "title":"Disabling Key Rotation",
- "uri":"kms_01_0095.html",
- "doc_type":"usermanual",
- "p_code":"36",
- "code":"39"
- },
{
"desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"product_code":"kms",
"title":"Managing CMKs",
"uri":"kms_01_0032.html",
"doc_type":"usermanual",
- "p_code":"19",
- "code":"40"
+ "p_code":"22",
+ "code":"28"
},
{
"desc":"This section describes how to use the management console to view the information about a CMK, such as its alias, status, ID, and creation time. The status of a CMK can be",
@@ -365,8 +257,8 @@
"title":"Querying a CMK",
"uri":"kms_01_0096.html",
"doc_type":"usermanual",
- "p_code":"40",
- "code":"41"
+ "p_code":"28",
+ "code":"29"
},
{
"desc":"The alias of a CMK is a user-friendly name designed to help you locate the CMK easier.This section describes how to change the alias and description of a CMK on the KMS m",
@@ -374,8 +266,8 @@
"title":"Changing the Alias and Description of a CMK",
"uri":"kms_01_0033.html",
"doc_type":"usermanual",
- "p_code":"40",
- "code":"42"
+ "p_code":"28",
+ "code":"30"
},
{
"desc":"This section describes how to use the management console to enable one or multiple CMKs. Only enabled CMKs can be used to encrypt/decrypt data. A new CMK is in the Enable",
@@ -383,8 +275,8 @@
"title":"Enabling One or Multiple CMKs",
"uri":"kms_01_0034.html",
"doc_type":"usermanual",
- "p_code":"40",
- "code":"43"
+ "p_code":"28",
+ "code":"31"
},
{
"desc":"This section describes how to use the management console to disable one or multiple CMKs, thereby protecting data in urgent cases.After being disabled, a CMK cannot be us",
@@ -392,26 +284,161 @@
"title":"Disabling One or Multiple CMKs",
"uri":"kms_01_0035.html",
"doc_type":"usermanual",
- "p_code":"40",
- "code":"44"
+ "p_code":"28",
+ "code":"32"
},
{
- "desc":"This section describes how to use the management console to cancel the scheduled deletion of one or multiple CMKs prior to deletion execution.You have obtained an account",
+ "desc":"This section describes how to use the management console to schedule the deletion of one or multiple unwanted CMKs.If deletion is scheduled for a CMK, the deletion will n",
+ "product_code":"kms",
+ "title":"Deleting One or More CMKs",
+ "uri":"kms_01_0072.html",
+ "doc_type":"usermanual",
+ "p_code":"28",
+ "code":"33"
+ },
+ {
+ "desc":"This section describes how to use the management console to cancel the scheduled deletion of one or multiple CMKs prior to deletion execution.The CMK for which you want t",
"product_code":"kms",
"title":"Canceling the Scheduled Deletion of One or Multiple CMKs",
"uri":"kms_01_0036.html",
"doc_type":"usermanual",
- "p_code":"40",
+ "p_code":"28",
+ "code":"34"
+ },
+ {
+ "desc":"This section describes how to configure the Simple Message Notification (SMN) function on the Cloud Trace Service (CTS) console.Decryption will fail if the CMK used has b",
+ "product_code":"kms",
+ "title":"Configuring SMN",
+ "uri":"kms_01_0021.html",
+ "doc_type":"usermanual",
+ "p_code":"22",
+ "code":"35"
+ },
+ {
+ "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
+ "product_code":"kms",
+ "title":"Managing Tags",
+ "uri":"kms_01_0023.html",
+ "doc_type":"usermanual",
+ "p_code":"22",
+ "code":"36"
+ },
+ {
+ "desc":"Tags are used to identify CMKs. You can add tags to CMKs so that you can classify CMKs, trace them, and collect their usage status according to the tags.Tags cannot be ad",
+ "product_code":"kms",
+ "title":"Adding a Tag",
+ "uri":"kms_01_0024.html",
+ "doc_type":"usermanual",
+ "p_code":"36",
+ "code":"37"
+ },
+ {
+ "desc":"This section describes how to search for tags through KMS. You can search for tags of all CMKs that meet the search criteria in the current project.Tags have been added.M",
+ "product_code":"kms",
+ "title":"Searching for a CMK by Tag",
+ "uri":"kms_01_0025.html",
+ "doc_type":"usermanual",
+ "p_code":"36",
+ "code":"38"
+ },
+ {
+ "desc":"This section describes how to modify tag values on the KMS management console.",
+ "product_code":"kms",
+ "title":"Modifying Tag Values",
+ "uri":"kms_01_0026.html",
+ "doc_type":"usermanual",
+ "p_code":"36",
+ "code":"39"
+ },
+ {
+ "desc":"This section describes how to delete tags on the KMS management console.",
+ "product_code":"kms",
+ "title":"Deleting Tags",
+ "uri":"kms_01_0027.html",
+ "doc_type":"usermanual",
+ "p_code":"36",
+ "code":"40"
+ },
+ {
+ "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
+ "product_code":"kms",
+ "title":"Rotating CMKs",
+ "uri":"kms_01_0138.html",
+ "doc_type":"usermanual",
+ "p_code":"22",
+ "code":"41"
+ },
+ {
+ "desc":"Keys that are widely or repeatedly used are insecure. To enhance the security of encryption keys, you are advised to periodically rotate keys and change their key materia",
+ "product_code":"kms",
+ "title":"Key Rotation Overview",
+ "uri":"kms_01_0094.html",
+ "doc_type":"usermanual",
+ "p_code":"41",
+ "code":"42"
+ },
+ {
+ "desc":"This section describes how to enable rotation for a key on the KMS console.By default, automatic key rotation is disabled for a CMK. Every time you enable key rotation, K",
+ "product_code":"kms",
+ "title":"Enabling Key Rotation",
+ "uri":"kms_01_0139.html",
+ "doc_type":"usermanual",
+ "p_code":"41",
+ "code":"43"
+ },
+ {
+ "desc":"This section describes how to disable rotation for a key on the KMS console.The CMK is in Enabled status.The Origin of the CMK is KMS.Key rotation has been enabled.",
+ "product_code":"kms",
+ "title":"Disabling Key Rotation",
+ "uri":"kms_01_0095.html",
+ "doc_type":"usermanual",
+ "p_code":"41",
+ "code":"44"
+ },
+ {
+ "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
+ "product_code":"kms",
+ "title":"Managing a Grant",
+ "uri":"kms_01_0028.html",
+ "doc_type":"usermanual",
+ "p_code":"22",
"code":"45"
},
+ {
+ "desc":"You can create grants for other users to use the CMK. You can create a maximum of 100 grants for a CMK.The owner of a CMK can create a grant for the CMK on the KMS manage",
+ "product_code":"kms",
+ "title":"Creating a Grant",
+ "uri":"kms_01_0029.html",
+ "doc_type":"usermanual",
+ "p_code":"45",
+ "code":"46"
+ },
+ {
+ "desc":"This section describes how to view the details about a grant, such as the grant ID, grantee user ID, granted operation, and creation time.You have created a grant.Table 1",
+ "product_code":"kms",
+ "title":"Querying a Grant",
+ "uri":"kms_01_0030.html",
+ "doc_type":"usermanual",
+ "p_code":"45",
+ "code":"47"
+ },
+ {
+ "desc":"You can revoke a grant in either of the following scenarios:A grantee does not need the grant. (The grantee can either tell the user who has created the grant to revoke t",
+ "product_code":"kms",
+ "title":"Revoking a Grant",
+ "uri":"kms_01_0031.html",
+ "doc_type":"usermanual",
+ "p_code":"45",
+ "code":"48"
+ },
{
"desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
"product_code":"kms",
"title":"Permissions Management",
"uri":"kms_01_9998.html",
"doc_type":"usermanual",
- "p_code":"19",
- "code":"46"
+ "p_code":"22",
+ "code":"49"
},
{
"desc":"This section describes IAM's fine-grained permissions management for your KMS resources. With IAM, you can:Create IAM users for employees based on the organizational stru",
@@ -419,8 +446,8 @@
"title":"Creating a User and Authorizing the User the Permission to Access KMS",
"uri":"kms_01_9997.html",
"doc_type":"usermanual",
- "p_code":"46",
- "code":"47"
+ "p_code":"49",
+ "code":"50"
},
{
"desc":"Custom policies can be created as a supplement to the system policies of KMS. For details about the actions supported by custom policies, see \"Permissions Policies and Su",
@@ -428,8 +455,8 @@
"title":"Creating a Custom KMS Policy",
"uri":"kms_01_9996.html",
"doc_type":"usermanual",
- "p_code":"46",
- "code":"48"
+ "p_code":"49",
+ "code":"51"
},
{
"desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
@@ -438,7 +465,7 @@
"uri":"kms_01_0037.html",
"doc_type":"usermanual",
"p_code":"",
- "code":"49"
+ "code":"52"
},
{
"desc":"Key Management Service (KMS) is a secure, reliable, and easy-to-use service that helps users centrally manage and safeguard their Customer Master Keys (CMKs).This service",
@@ -446,8 +473,8 @@
"title":"What Is Key Management Service?",
"uri":"kms_01_0073.html",
"doc_type":"usermanual",
- "p_code":"49",
- "code":"50"
+ "p_code":"52",
+ "code":"53"
},
{
"desc":"A Customer Master Key (CMK) is a Key Encryption Key (KEK) created by a user using KMS. It is used to encrypt and protect Data Encryption Keys (DEKs). One CMK can be used ",
@@ -455,8 +482,17 @@
"title":"What Is a Customer Master Key?",
"uri":"kms_01_0074.html",
"doc_type":"usermanual",
- "p_code":"49",
- "code":"51"
+ "p_code":"52",
+ "code":"54"
+ },
+ {
+ "desc":"The following table describes the differences between a custom key and a default key.",
+ "product_code":"kms",
+ "title":"What Are the Differences Between a Custom Key and a Default Key?",
+ "uri":"kms_01_0101.html",
+ "doc_type":"usermanual",
+ "p_code":"52",
+ "code":"55"
},
{
"desc":"A data encryption key (DEK) is used to encrypt data.",
@@ -464,17 +500,8 @@
"title":"What Is a Data Encryption Key?",
"uri":"kms_01_0038.html",
"doc_type":"usermanual",
- "p_code":"49",
- "code":"52"
- },
- {
- "desc":"The decision to delete a CMK should be taken with caution. Before deletion, confirm that the CMK's encrypted data has all been migrated. Once the CMK is deleted, you will",
- "product_code":"kms",
- "title":"Why Cannot I Delete a CMK Immediately?",
- "uri":"kms_01_0039.html",
- "doc_type":"usermanual",
- "p_code":"49",
- "code":"53"
+ "p_code":"52",
+ "code":"56"
},
{
"desc":"Object Storage Service (OBS), Elastic Volume Service (EVS), Image Management Service (IMS), Scalable File Service (SFS), and Relational Database Service (RDS) can use KMS",
@@ -482,8 +509,8 @@
"title":"Which Cloud Services Can Use KMS for Encryption?",
"uri":"kms_01_0040.html",
"doc_type":"usermanual",
- "p_code":"49",
- "code":"54"
+ "p_code":"52",
+ "code":"57"
},
{
"desc":"No.The pending period of a CMK from its scheduling till its deletion is not charged.However, if you cancel the scheduled deletion, the charging resumes from the time when",
@@ -491,8 +518,71 @@
"title":"Will a CMK Be Charged After It Is Scheduled to Delete?",
"uri":"kms_01_0093.html",
"doc_type":"usermanual",
- "p_code":"49",
- "code":"55"
+ "p_code":"52",
+ "code":"58"
+ },
+ {
+ "desc":"The decision to delete a CMK should be taken with caution. Before deletion, confirm that the CMK's encrypted data has all been migrated. Once the CMK is deleted, you will",
+ "product_code":"kms",
+ "title":"Why Can't I Delete a CMK Immediately?",
+ "uri":"kms_01_0039.html",
+ "doc_type":"usermanual",
+ "p_code":"52",
+ "code":"59"
+ },
+ {
+ "desc":"Yes.",
+ "product_code":"kms",
+ "title":"Is There a Limit on the Number of CMKs That I Can Create on KMS?",
+ "uri":"kms_01_0198.html",
+ "doc_type":"usermanual",
+ "p_code":"52",
+ "code":"60"
+ },
+ {
+ "desc":"Envelope encryption is the practice of encrypting data with a DEK and then encrypting the DEK with a root key that you can fully manage. In this case, CMKs are not requir",
+ "product_code":"kms",
+ "title":"What Are the Benefits of Envelope Encryption?",
+ "uri":"kms_01_0106.html",
+ "doc_type":"usermanual",
+ "p_code":"52",
+ "code":"61"
+ },
+ {
+ "desc":"No.To ensure CMK security, users can only create and use CMKs in KMS.",
+ "product_code":"kms",
+ "title":"Can I Export a CMK from KMS?",
+ "uri":"kms_01_0102.html",
+ "doc_type":"usermanual",
+ "p_code":"52",
+ "code":"62"
+ },
+ {
+ "desc":"You can use the online tool to encrypt or decrypt data in the following procedures:The key you clicked is used for encryption.To clear your input, click Clear.To copy the",
+ "product_code":"kms",
+ "title":"How Do I Use the Online Tool to Encrypt or Decrypt Small Volumes of Data?",
+ "uri":"kms_01_0107.html",
+ "doc_type":"usermanual",
+ "p_code":"52",
+ "code":"63"
+ },
+ {
+ "desc":"No.Keys created using KMS-generated materials cannot be updated. You can only use KMS to create new CMKs to encrypt and decrypt data.",
+ "product_code":"kms",
+ "title":"Can I Update CMKs Created by KMS-Generated Key Materials?",
+ "uri":"kms_01_0114.html",
+ "doc_type":"usermanual",
+ "p_code":"52",
+ "code":"64"
+ },
+ {
+ "desc":"The mechanism of KMS prevents anyone from accessing your keys in plaintext. KMS relies on hardware security modules (HSMs) that safeguard the confidentiality and integrit",
+ "product_code":"kms",
+ "title":"How Does KMS Protect My Keys?",
+ "uri":"kms_01_0193.html",
+ "doc_type":"usermanual",
+ "p_code":"52",
+ "code":"65"
},
{
"desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.",
@@ -501,7 +591,7 @@
"uri":"kms_01_0043.html",
"doc_type":"usermanual",
"p_code":"",
- "code":"56"
+ "code":"66"
},
{
"desc":"For details about the glossaries in this document, see Glossary.",
@@ -510,6 +600,6 @@
"uri":"kms_01_0044.html",
"doc_type":"usermanual",
"p_code":"",
- "code":"57"
+ "code":"67"
}
]
\ No newline at end of file
diff --git a/docs/kms/umn/en-us_image_0000001357372181.png b/docs/kms/umn/en-us_image_0000001357372181.png
new file mode 100644
index 00000000..ccec1bee
Binary files /dev/null and b/docs/kms/umn/en-us_image_0000001357372181.png differ
diff --git a/docs/kms/umn/en-us_image_0000001357411985.png b/docs/kms/umn/en-us_image_0000001357411985.png
new file mode 100644
index 00000000..0434f34e
Binary files /dev/null and b/docs/kms/umn/en-us_image_0000001357411985.png differ
diff --git a/docs/kms/umn/en-us_image_0205545064.png b/docs/kms/umn/en-us_image_0205545064.png
deleted file mode 100644
index af7d8b32..00000000
Binary files a/docs/kms/umn/en-us_image_0205545064.png and /dev/null differ
diff --git a/docs/kms/umn/en-us_topic_0034330265.html b/docs/kms/umn/en-us_topic_0034330265.html
deleted file mode 100644
index fee2e736..00000000
--- a/docs/kms/umn/en-us_topic_0034330265.html
+++ /dev/null
@@ -1,34 +0,0 @@
-
-
-
Creating a Key
-Scenario
This section describes how to create a CMK on the KMS management console. You can create up to 100 CMKs, excluding Default Master Keys.
-
The CMK is perfectly suited for but not limited to the following scenarios:
- Server-side encryption on OBS
- Encryption of data on EVS disks
- Encryption of private images on IMS
- File system encryption on SFS
- Disk encryption for database instances in RDS
- DEK encryption and decryption for user applications
-
-
Aliases of Default Master Keys end with /default. It is not allowed to use aliases ending with /default for your CMKs.
-
-
-
Prerequisites
You have obtained an account and its password for logging in to the management console.
-
-
Procedure
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- Click Create Key in the upper right corner of the page. In the dialog box that is displayed, enter the alias and description of the key.
Figure 1 Create Key dialog box
-- Alias is the alias of the CMK to be created.
- (Optional) Description is the description of the CMK.
- - (Optional) Add tags as needed, and enter the tag key and tag value.
- When a CMK has been created without any tag, you can add a tag to the CMK later as necessary. Click the alias of the CMK. The page with key details is displayed. Then you can add tags to the CMK.
- The same tag (including tag key and tag value) can be used for different CMKs. However, under the same CMK, one tag key can have only one tag value.
- A maximum of 10 tags can be added for one CMK.
- If you want to delete a tag to be added when adding multiple tags, you can click Delete in the row where the tag to be added is located to delete the tag.
-
- - Click OK.
In the CMK list, you can view created CMKs. The default status of a CMK is Enabled.
-
-
-
Related Operations
- For details about how to upload objects with server-side encryption, see section Uploading a File with Server-Side Encryption in the Object Storage Service User Guide.
- For details about how to encrypt data on EVS disks, see section Creating an EVS Disk in the Elastic Volume Service User Guide.
- For details about how to encrypt private images, see section Encrypting an Image in the Image Management Service User Guide.
- For details about how to encrypt the file system on SFS, see section Creating a File System in the Scalable File Service User Guide.
- For details about how to encrypt disks for a database instance in RDS, see section Creating an RDS MySQL DB Instance in the Relational Database Service User Guide.
- For details about how to create a DEK and a plaintext-free DEK, see sections Creating a DEK and Creating a Plaintext-Free DEK in the Key Management Service API Reference.
- For details about how to encrypt and decrypt a DEK for a user application, see sections Encrypting a DEK and Decrypting a DEK in the Key Management Service API Reference.
-
-
-
-
-
-
\ No newline at end of file
diff --git a/docs/kms/umn/kms_01_0003.html b/docs/kms/umn/kms_01_0003.html
index 2ebcdf15..c1f32b65 100644
--- a/docs/kms/umn/kms_01_0003.html
+++ b/docs/kms/umn/kms_01_0003.html
@@ -23,7 +23,7 @@
diff --git a/docs/kms/umn/kms_01_0005.html b/docs/kms/umn/kms_01_0005.html
index 1ef74d58..5448ae42 100644
--- a/docs/kms/umn/kms_01_0005.html
+++ b/docs/kms/umn/kms_01_0005.html
@@ -2,6 +2,7 @@
CMK
A Customer Master Key (CMK) is a Key Encryption Key (KEK) created by a user using KMS. It is used to encrypt and protect Data Encryption Keys (DEKs). One CMK can be used to encrypt one or multiple DEKs.
+
CMKs are categorized into custom keys and default keys.
diff --git a/docs/kms/umn/kms_01_0008.html b/docs/kms/umn/kms_01_0008.html
index 0ad73456..833c416d 100644
--- a/docs/kms/umn/kms_01_0008.html
+++ b/docs/kms/umn/kms_01_0008.html
@@ -1,7 +1,7 @@
HSM
-
A hardware security module (HSM) is a hardware device that securely produces, stores, manages, and uses CMKs. In addition, it provides encryption processing services.
+
A Hardware Security Module (HSM) securely produces, stores, manages, and uses keys and provides encryption services.
diff --git a/docs/kms/umn/kms_01_0014.html b/docs/kms/umn/kms_01_0014.html
index 5a7c4dc1..421f3d9c 100644
--- a/docs/kms/umn/kms_01_0014.html
+++ b/docs/kms/umn/kms_01_0014.html
@@ -1,9 +1,10 @@
How to Access KMS
-
The public cloud provides a web-based service management platform. You can access KMS using HTTPS-compliant APIs or the management console.
-
- Management console
If you have registered with the public cloud, you can log in to the management console directly. In the upper left corner of the console, click
. Select a region or project. Choose .
- - API
You can access KMS using APIs. For details, see the Key Management Service API Reference.
+The cloud service provides a web-based service management platform. You can access KMS using HTTPS-compliant APIs or the management console.
+
- Management console
If you have registered with the cloud service, you can log in to the management console directly. In the upper left corner of the console, click
. Select a region or project. Choose .
+
+ - API
You can access KMS using APIs. For details, see .
diff --git a/docs/kms/umn/kms_01_0016.html b/docs/kms/umn/kms_01_0016.html
index 0e47d43f..57b1afb5 100644
--- a/docs/kms/umn/kms_01_0016.html
+++ b/docs/kms/umn/kms_01_0016.html
@@ -1,211 +1,27 @@
Related Services
-
OBS
KMS provides central management and control capabilities of CMKs for Object Storage Service (OBS). It is used for server-side encryption with KMS-managed keys (SSE-KMS) function of OBS.
+
OBS
Object Storage Service (OBS) is a scalable service that provides secure, reliable, and cost-effective cloud storage for massive amounts of data. KMS provides central management and control capabilities of CMKs for OBS. It is used for server-side encryption with KMS-managed keys (SSE-KMS) on OBS.
-
EVS
KMS provides central management and control capabilities of CMKs for Elastic Volume Service (EVS). It is applied to the encryption function of EVS.
+
EVS
Elastic Volume Service (EVS) offers scalable block storage for cloud servers. With high reliability, high performance, and rich specifications, EVS disks can be used for distributed file systems, development and test environments, data warehouse applications, and high-performance computing (HPC) scenarios to meet diverse service requirements. KMS provides central management and control capabilities of CMKs for EVS. It is used for encryption in EVS.
-
IMS
KMS provides central management and control capabilities of CMKs for Image Management Service (IMS). It is applied to the private image encryption function of IMS.
+
IMS
Image Management Service (IMS) allows you to manage the entire lifecycle of your images. KMS provides central management and control capabilities of CMKs for Image Management Service (IMS). It is used for private image encryption in IMS.
-
SFS
KMS provides central management and control capabilities of CMKs for Scalable File Service (SFS). It is applied to the file system encryption function of SFS.
+
SFS
Scalable File Service (SFS) provides high-performance file storage (NAS) that can be expanded on demand. KMS provides central management and control capabilities of CMKs for SFS. It is used for file system encryption in SFS.
-
RDS
KMS provides central management and control capabilities of CMKs for Relational Database Service (RDS). It is applied to the disk encryption of database instances in RDS.
+
RDS
Relational Database Service (RDS) is a relational database that is reliable, scalable, easy to manage, and immediately ready for use. KMS provides central management and control capabilities of CMKs for RDS. It is used for disk encryption in relational databases.
-
CTS
Cloud Trace Service (CTS) provides you with a history of KMS operations. After enabling CTS, you can view all generated traces to review and audit performed KMS operations. For details, see the Cloud Trace Service User Guide.
-
-
Table 1 KMS operations supported by CTSOperation
- |
-Resource Type
- |
-Trace Name
- |
-
-
-Creating a CMK
- |
-cmk
- |
-createKey
- |
-
-Creating a DEK
- |
-cmk
- |
-createDataKey
- |
-
-Creating a plaintext-free DEK
- |
-cmk
- |
-createDataKeyWithoutPlaintext
- |
-
-Enabling a CMK
- |
-cmk
- |
-enableKey
- |
-
-Disabling a CMK
- |
-cmk
- |
-disableKey
- |
-
-Encrypting a DEK
- |
-cmk
- |
-encryptDataKey
- |
-
-Decrypting a DEK
- |
-cmk
- |
-decryptDataKey
- |
-
-Scheduling the deletion of a CMK
- |
-cmk
- |
-scheduleKeyDeletion
- |
-
-Canceling the scheduled deletion of a CMK
- |
-cmk
- |
-cancelKeyDeletion
- |
-
-Generating random numbers
- |
-rng
- |
-genRandom
- |
-
-Changing the alias of a CMK
- |
-cmk
- |
-updateKeyAlias
- |
-
-Changing the description of a CMK
- |
-cmk
- |
-updateKeyDescription
- |
-
-Prompting risks about CMK deletion
- |
-cmk
- |
-deleteKeyRiskTips
- |
-
-Importing key material
- |
-cmk
- |
-importKeyMaterial
- |
-
-Deleting key material
- |
-cmk
- |
-deleteImportedKeyMaterial
- |
-
-Creating a grant
- |
-cmk
- |
-createGrant
- |
-
-Retiring a grant
- |
-cmk
- |
-retireGrant
- |
-
-Revoking a grant
- |
-cmk
- |
-revokeGrant
- |
-
-Adding a tag
- |
-cmk
- |
-createKeyTag
- |
-
-Deleting a tag
- |
-cmk
- |
-deleteKeyTag
- |
-
-Batch creating tags
- |
-cmk
- |
-batchCreateKeyTags
- |
-
-Batch deleting tags
- |
-cmk
- |
-batchDeleteKeyTags
- |
-
-Enabling key rotation
- |
-cmk
- |
-enableKeyRotation
- |
-
-Modifying the rotation interval
- |
-cmk
- |
-updateKeyRotationInterval
- |
-
-Disabling key rotation
- |
-cmk
- |
-disableKeyRotation
- |
-
-
-
+
ECS
An ECS is a basic computing component that consists of CPUs, memory, OS, and elastic volume service (EVS). After creating an ECS, you can use it like your local computer or physical server.
+
Dedicated HSM can encrypt sensitive data in the service systems on your ECS. You can control the generation, storage, and access authorization of keys to ensure the integrity and confidentiality of data during transmission and storage.
-
-
IAM
Identity and Access Management (IAM) provides the permission management function for KMS. Only users who have KMS Administrator permissions can use KMS. To apply for KMS Administrator permissions, contact a user with Security Administrator permissions. For details, see the Identity and Access Management User Guide.
+
IAM
Identity and Access Management (IAM) provides the permission management function for .
+
Only users who have KMS Administrator permissions can use .
+
To apply for permissions, contact a user with Security Administrator permissions. For details, see the .
diff --git a/docs/kms/umn/kms_01_0017.html b/docs/kms/umn/kms_01_0017.html
index 4ecf89b2..869ac03e 100644
--- a/docs/kms/umn/kms_01_0017.html
+++ b/docs/kms/umn/kms_01_0017.html
@@ -1,12 +1,12 @@
User Permissions
-
The public cloud system provides two types of permissions by default: user management and resource management. User management refers to the management of users, user groups, and user groups' rights. Resource management refers to the control of operations that can be performed by users on cloud service resources.
+
The system provides two types of permissions by default: user management and resource management. User management refers to the management of users, user groups, and user groups' rights. Resource management refers to the control of operations that can be performed by users on cloud service resources.
For further details, see Permissions.
diff --git a/docs/kms/umn/kms_01_0018.html b/docs/kms/umn/kms_01_0018.html
index 438b05c9..de872852 100644
--- a/docs/kms/umn/kms_01_0018.html
+++ b/docs/kms/umn/kms_01_0018.html
@@ -1,27 +1,29 @@
-
Management
+
Key Management
diff --git a/docs/kms/umn/kms_01_0019.html b/docs/kms/umn/kms_01_0019.html
index 746a6e0f..26b0cdeb 100644
--- a/docs/kms/umn/kms_01_0019.html
+++ b/docs/kms/umn/kms_01_0019.html
@@ -6,14 +6,14 @@
diff --git a/docs/kms/umn/kms_01_0020.html b/docs/kms/umn/kms_01_0020.html
index a60e44fa..7993ac6d 100644
--- a/docs/kms/umn/kms_01_0020.html
+++ b/docs/kms/umn/kms_01_0020.html
@@ -1,14 +1,14 @@
-
Deleting Key Material
+
Deleting a Key Material
Scenario
When importing key material, you can specify the expiration time. After the key material expires, KMS deletes it, and the status of the CMK changes to Pending import. You can manually delete the key material as needed. The effect of expiration of the key material is the same as that of manual deletion of the key material.
This section describes how to delete imported key material on the management console.
-
- After the key material is deleted, if you need to re-import the key material, the key material to be imported must be the same as that has been deleted.
- After the same key material is re-imported, you can use the CMK to decrypt all data encrypted using this key before deletion.
+
- After the key material is deleted, if you need to re-import the key material, the key material to be imported must be the same as that has been deleted.
- After the same key material is re-imported, you can use the CMK to decrypt all data encrypted using this key before deletion.
- After the deletion, the CMK will become unavailable and its status will change to Pending import.
-
Prerequisites
- You have obtained an account and its password for logging in to the management console.
- You have imported the key material for a CMK.
- The material source of the CMK is External.
- The CMK status is Enabled or Disabled.
+
Prerequisites
- You have imported the key material for a CMK.
- The material source of the CMK is External.
- The CMK status is Enabled or Disabled.
-
Procedure
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- In the row containing the desired CMK, click Delete Key Material.
- In the dialog box that is displayed, click OK.
After the deletion, the CMK will become unavailable and its status changes to Pending import.
+Procedure
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- In the row containing the desired CMK, click Delete Key Material.
- In the dialog box that is displayed, click OK.
After the deletion, the CMK will become unavailable and its status changes to Pending import.
diff --git a/docs/kms/umn/kms_01_0021.html b/docs/kms/umn/kms_01_0021.html
index f919cc8f..ada0c023 100644
--- a/docs/kms/umn/kms_01_0021.html
+++ b/docs/kms/umn/kms_01_0021.html
@@ -4,9 +4,9 @@
Scenario
This section describes how to configure the Simple Message Notification (SMN) function on the Cloud Trace Service (CTS) console.
Decryption will fail if the CMK used has been scheduled for deletion. You will receive messages about the decryption failure on terminals (SMS, email, HTTP, or HTTPS) if the SMN function has been configured in CTS.
-
Prerequisites
- You have obtained an account and its password for logging in to the management console.
- CTS has been enabled.
- You have subscribed to SMN.
+
Prerequisites
- CTS has been enabled.
- You have subscribed to SMN.
-
Procedure
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose Management & Deployment > Cloud Trace Service to go to the CTS console.
- In the navigation tree on the left, click Tracker.
- If the desired tracker is not enabled, click Enable. In the dialog box that is displayed, click OK to enable the tracker. If the tracker is already enabled, skip this step.
- In the navigation tree on the left, click Key Event Notifications. The Key Event Notifications page is displayed.
- Click Create Key Event Notification at the upper right corner of the page. The creation page is displayed.
- In the Basic Information area, enter a notification name. See Figure 1 for details.
Figure 1 Configuring basic information
+Procedure
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose Management & Deployment > Cloud Trace Service to go to the CTS console.
- In the navigation tree on the left, click Tracker.
- If the desired tracker is not enabled, click Enable. In the dialog box that is displayed, click OK to enable the tracker. If the tracker is already enabled, skip this step.
- In the navigation tree on the left, click Key Event Notifications. The Key Event Notifications page is displayed.
- Click Create Key Event Notification at the upper right corner of the page. The creation page is displayed.
- In the Basic Information area, enter a notification name. See Figure 1 for details.
Figure 1 Configuring basic information
- Select operation types in the Operation area. See Figure 2 for details.
Figure 2 Selecting operation types
@@ -35,7 +35,7 @@
Table 2 Parameters for configuring the SMN notificationParameter
|
-Description
+ | Description
|
Configuration
|
@@ -65,7 +65,7 @@
diff --git a/docs/kms/umn/kms_01_0023.html b/docs/kms/umn/kms_01_0023.html
index 638c3c5b..b9b1e508 100644
--- a/docs/kms/umn/kms_01_0023.html
+++ b/docs/kms/umn/kms_01_0023.html
@@ -6,7 +6,7 @@
diff --git a/docs/kms/umn/kms_01_0024.html b/docs/kms/umn/kms_01_0024.html
index 802d4649..e5dc4b32 100644
--- a/docs/kms/umn/kms_01_0024.html
+++ b/docs/kms/umn/kms_01_0024.html
@@ -2,45 +2,42 @@
Adding a Tag
Scenario
Tags are used to identify CMKs. You can add tags to CMKs so that you can classify CMKs, trace them, and collect their usage status according to the tags.
-
KMS does not support adding tags to Default Master Keys.
-
-
Prerequisites
You have obtained an account and its password for logging in to the management console.
+
Constraints
Tags cannot be added to default keys.
-
Procedure
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- Click the alias of the desired CMK to view its details.
- Click Tags to go to the tag management page.
Figure 1 Managing tags
+Procedure
- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- Click the alias of the desired CMK to view its details.
- Click Tags to go to the tag management page.
Figure 1 Managing tags
- Click Add Tag. In the Add Tag dialog box, enter the tag key and tag value. Table 1 describes the parameters.
Figure 2 Adding a tag
If you want to delete a tag to be added when adding multiple tags, you can click Delete in the row where the tag to be added is located to delete the tag.
-
-Table 1 Tag parametersParameter
+Table 1 Tag parametersParameter
|
-Description
+ | Description
|
-Value
+ | Value
|
-Example Value
+ | Example Value
|
-Tag key
+ | Tag key
|
-Name of a tag.
+ | Name of a tag.
The same tag (including tag key and tag value) can be used for different CMKs. However, under the same CMK, one tag key can have only one tag value.
A maximum of 20 tags can be added for one CMK.
|
-- Mandatory.
- Each tag key must be unique under the same CMK.
- Contains a maximum of 36 characters.
- Only digits, letters, underscores (_), and hyphens (-) are allowed.
+ | - Mandatory.
- Each tag key must be unique under the same CMK.
- Contains a maximum of 36 characters.
- Only digits, letters, underscores (_), and hyphens (-) are allowed.
|
-cost
+ | cost
|
-Tag value
+ | Tag value
|
-Value of the tag
+ | Value of the tag
|
-- This parameter can be empty.
- Can contain a maximum of 43 characters.
- Only digits, letters, underscores (_), and hyphens (-) are allowed.
+ | - This parameter can be empty.
- Can contain a maximum of 43 characters.
- Only digits, letters, underscores (_), and hyphens (-) are allowed.
|
-100
+ | 100
|
diff --git a/docs/kms/umn/kms_01_0025.html b/docs/kms/umn/kms_01_0025.html
index 949330a9..6c35b88f 100644
--- a/docs/kms/umn/kms_01_0025.html
+++ b/docs/kms/umn/kms_01_0025.html
@@ -1,11 +1,11 @@
-Searching for Tags
+Searching for a CMK by Tag
ScenarioThis section describes how to search for tags through KMS. You can search for tags of all CMKs that meet the search criteria in the current project.
- Prerequisites- You have obtained an account and its password for logging in to the management console.
- Tags have been added.
+ PrerequisitesTags have been added.
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- Click Search by Tag to show the search box.
Figure 1 Searching for tags
+Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- Click Search by Tag to show the search box.
Figure 1 Searching for tags
- In the search box, enter the tag key and tag value.
- Click
to add the input to the search criteria, and click Search. The list displays the CMKs that meet the search criteria.Figure 2 Search results
- Multiple tags can be added at one search. A maximum of 20 tags can be added for one search. If multiple tags are searched for at one time, only CMKs meet the combined search criteria will be displayed in the search result.
- If you want to delete an added tag from the search criteria, click
next to the tag. - You can click Reset to reset the search criteria.
diff --git a/docs/kms/umn/kms_01_0026.html b/docs/kms/umn/kms_01_0026.html
index 7856a606..1ec47985 100644
--- a/docs/kms/umn/kms_01_0026.html
+++ b/docs/kms/umn/kms_01_0026.html
@@ -3,9 +3,7 @@
Modifying Tag Values
ScenarioThis section describes how to modify tag values on the KMS management console.
- PrerequisitesYou have obtained an account and its password for logging in to the management console.
-
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- Click the alias of the desired CMK to view its details.
- Click Tags to go to the tag management page.
Figure 1 Managing tags
+Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- Click the alias of the desired CMK to view its details.
- Click Tags to go to the tag management page.
Figure 1 Managing tags
- Click Edit of the target tag, and the Edit Tag dialog box is displayed.
Figure 2 Editing a tag
- In the Edit Tag dialog box, enter a tag value, and click OK to complete the editing.
diff --git a/docs/kms/umn/kms_01_0027.html b/docs/kms/umn/kms_01_0027.html
index a46bc68b..9f648fdd 100644
--- a/docs/kms/umn/kms_01_0027.html
+++ b/docs/kms/umn/kms_01_0027.html
@@ -3,9 +3,7 @@
Deleting Tags
ScenarioThis section describes how to delete tags on the KMS management console.
- PrerequisitesYou have obtained an account and its password for logging in to the management console.
-
-
@@ -15,3 +13,10 @@
+
+
\ No newline at end of file
diff --git a/docs/kms/umn/kms_01_0028.html b/docs/kms/umn/kms_01_0028.html
index 30e24c0c..76851bbe 100644
--- a/docs/kms/umn/kms_01_0028.html
+++ b/docs/kms/umn/kms_01_0028.html
@@ -13,7 +13,7 @@
diff --git a/docs/kms/umn/kms_01_0029.html b/docs/kms/umn/kms_01_0029.html
index ab7a5366..7166f638 100644
--- a/docs/kms/umn/kms_01_0029.html
+++ b/docs/kms/umn/kms_01_0029.html
@@ -4,14 +4,14 @@
ScenarioYou can create grants for other users to use the CMK. You can create a maximum of 100 grants for a CMK.
The owner of a CMK can create a grant for the CMK on the KMS management console or by making the API calls. A user, who has been granted with the grant creation permission by the owner of the CMK, can create grants for the CMK only by making the API calls.
- Prerequisites- You have obtained an account and its password for logging in to the management console.
- You have obtained the user ID of the grantee (user to whom permissions are to be authorized).
- The desired CMK is in Enabled status.
+ Prerequisites- You have obtained the user ID of the grantee (user to whom permissions are to be authorized).
- The desired CMK is in Enabled status.
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- Click the alias of the desired CMK to go to the page displaying its details. You can create grants on the Grants tab page.
Figure 1 Grants tab
+Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- Click the alias of the desired CMK to go to the page displaying its details. You can create grants on the Grants tab page.
Figure 1 Grants tab
- Click Create Grant. The Create Grant dialog box is displayed.
Figure 2 Creating a grant
- In the dialog box that is displayed, enter the ID of the user to be authorized and select permissions to be granted.
A grantee can perform the authorized operations only by calling the necessary API. For details, see the Key Management Service API Reference.
-Table 1 Parameter descriptionParameter
+Table 1 Parameter descriptionParameter
|
Description
|
diff --git a/docs/kms/umn/kms_01_0030.html b/docs/kms/umn/kms_01_0030.html
index a600799e..9e6039f9 100644
--- a/docs/kms/umn/kms_01_0030.html
+++ b/docs/kms/umn/kms_01_0030.html
@@ -3,12 +3,12 @@
Querying a Grant
ScenarioThis section describes how to view the details about a grant, such as the grant ID, grantee user ID, granted operation, and creation time.
- Prerequisites- You have obtained an account and its password for logging in to the management console.
- You have created a grant.
+ PrerequisitesYou have created a grant.
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- Click the alias of the desired CMK to view its details.
- Information about the CMK and grants created on it are displayed, Figure 1 shows example grant information.
Figure 1 Querying a grant
+Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- Click the alias of the desired CMK to view its details.
- Information about the CMK and grants created on it are displayed, Figure 1 shows example grant information.
Figure 1 Querying a grant
Table 1 provides more details.
-Table 1 Parameter descriptionParameter
+Table 1 Parameter descriptionParameter
|
Description
|
@@ -34,6 +34,11 @@
Creation time of the grant
|
+Operation
+ |
+Operations that can be performed on a grant. For example, you can revoke a grant.
+ |
+
diff --git a/docs/kms/umn/kms_01_0031.html b/docs/kms/umn/kms_01_0031.html
index a3571260..9c5528e5 100644
--- a/docs/kms/umn/kms_01_0031.html
+++ b/docs/kms/umn/kms_01_0031.html
@@ -3,12 +3,12 @@
Revoking a Grant
ScenarioYou can revoke a grant in either of the following scenarios:
- A grantee does not need the grant. (The grantee can either tell the user who has created the grant to revoke the grant or call the necessary API to revoke the grant directly.)
- You do not want the grantee to have the grant.
- When a grant is revoked, the grantee does not have the corresponding permission any more. However, if the grantee has created the same grant to another user, permission of that user will not be affected.
+ When a grant is revoked, the grantee does not have the corresponding permission anymore. However, if the grantee has created the same grant to another user, permission of that user will not be affected.
This section describes how to revoke a grant.
- Prerequisites- You have obtained an account and its password for logging in to the management console.
- You have created a grant.
+ PrerequisitesYou have created a grant.
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- Click the alias of the desired CMK to view its details.
- In the row containing the desired grantee, click Revoke Grant in the Operation column.
- In the dialog box that is displayed, click Yes. When Grant grant_ID revoked successfully is displayed in the upper right corner, the grant has been revoked.
+ Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- Click the alias of the desired CMK to view its details.
- In the row containing the desired grantee, click Revoke Grant in the Operation column.
- In the dialog box that is displayed, click Yes. When Grant grant_ID revoked successfully is displayed in the upper right corner, the grant has been revoked.
diff --git a/docs/kms/umn/kms_01_0033.html b/docs/kms/umn/kms_01_0033.html
index c4b7cf78..3aa65df1 100644
--- a/docs/kms/umn/kms_01_0033.html
+++ b/docs/kms/umn/kms_01_0033.html
@@ -6,9 +6,9 @@
- A Default Master Key (the alias suffix of which is /default) does not allow alias and description changes.
- The alias and description of a CMK cannot be changed if the CMK is in Pending deletion status.
- Prerequisites- You have obtained an account and its password for logging in to the management console.
- The CMK is in Enabled, Disabled, or Pending import status.
+ Prerequisites- The CMK is in Enabled, Disabled, or Pending import status.
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- Click the alias of the desired CMK. Details about the CMK are displayed.
- To change the alias or description of the CMK, click
next to the value of Alias or Description.Figure 1 CMK details
+Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- Click the alias of the desired CMK. Details about the CMK are displayed.
- To change the alias or description of the CMK, click
next to the value of Alias or Description.Figure 1 CMK details
- The alias must be 1 to 255 characters in length. Only digits, letters, underscores (_), hyphens (-), colons (:), and forward slashes (/) are allowed.
- Length of the description cannot exceed 255 characters.
- Click
to save the changes.
diff --git a/docs/kms/umn/kms_01_0034.html b/docs/kms/umn/kms_01_0034.html
index 201fa63f..ece3b756 100644
--- a/docs/kms/umn/kms_01_0034.html
+++ b/docs/kms/umn/kms_01_0034.html
@@ -3,10 +3,10 @@
Enabling One or Multiple CMKs
ScenarioThis section describes how to use the management console to enable one or multiple CMKs. Only enabled CMKs can be used to encrypt/decrypt data. A new CMK is in the Enabled state by default.
- Prerequisites- You have obtained an account and its password for logging in to the management console.
- The CMK you want to enable is in Disabled status.
+ PrerequisitesThe CMK you want to enable is in Disabled status.
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- In the row containing the desired CMK, click Enable.
Figure 1 Enabling one CMK
- - In the dialog box that is displayed, click Yes to enable the CMK.
To enable multiple CMKs at a time, select them and click Enable in the upper left corner of the list.
+ Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- In the row containing the desired CMK, click Enable.
Figure 1 Enabling one CMK
+ - In the dialog box that is displayed, click Yes to enable the CMK.
To enable multiple CMKs at a time, select them and click Enable in the upper left corner of the list.
diff --git a/docs/kms/umn/kms_01_0035.html b/docs/kms/umn/kms_01_0035.html
index 11f6e795..6a31b302 100644
--- a/docs/kms/umn/kms_01_0035.html
+++ b/docs/kms/umn/kms_01_0035.html
@@ -6,9 +6,9 @@
Default Master Keys created by KMS cannot be disabled.
- Prerequisites- You have obtained an account and its password for logging in to the management console.
- The CMK you want to disable is in Enabled status.
+ PrerequisitesThe CMK you want to disable is in Enabled status.
-
diff --git a/docs/kms/umn/kms_01_0036.html b/docs/kms/umn/kms_01_0036.html
index a22f0edb..b5f9a8da 100644
--- a/docs/kms/umn/kms_01_0036.html
+++ b/docs/kms/umn/kms_01_0036.html
@@ -3,10 +3,10 @@
Canceling the Scheduled Deletion of One or Multiple CMKs
ScenarioThis section describes how to use the management console to cancel the scheduled deletion of one or multiple CMKs prior to deletion execution.
- Prerequisites- You have obtained an account and its password for logging in to the management console.
- The CMK for which you want to cancel the scheduled deletion is in Pending deletion status.
+ PrerequisitesThe CMK for which you want to cancel the scheduled deletion is in Pending deletion status.
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- In the row containing the desired CMK, click Cancel Deletion.
Figure 1 Canceling the scheduled deletion of one CMK
- - In the displayed dialog box, click OK to cancel the scheduled deletion for the CMK.
- If the CMK is created using imported material, its status becomes Disabled after the cancelation. To enable the CMK, see Enabling One or Multiple CMKs.
- If the CMK is created using imported material and no key material has been imported for it, its status becomes Pending import after the cancelation. To use the CMK, perform Creating CMKs Using Imported Key Material.
+ Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- In the row containing the desired CMK, click Cancel Deletion.
Figure 1 Canceling the scheduled deletion of one CMK
+ - In the displayed dialog box, click Yes to cancel the scheduled deletion for the CMK.
- If the CMK is created using KMS generated material, its status becomes Disabled after the cancelation. To enable the CMK, see Enabling One or Multiple CMKs.
- If the CMK is created using imported material, its status becomes Disabled after the cancelation. To enable the CMK, see Enabling One or Multiple CMKs.
- If the CMK is created using imported material and no key material has been imported for it, its status becomes Pending import after the cancelation. To use the CMK, perform Creating CMKs Using Imported Key Material.
To cancel the deletion of multiple CMKs at a time, select them and click Cancel Deletion in the upper left corner of the list.
diff --git a/docs/kms/umn/kms_01_0037.html b/docs/kms/umn/kms_01_0037.html
index 90ef207f..673e1744 100644
--- a/docs/kms/umn/kms_01_0037.html
+++ b/docs/kms/umn/kms_01_0037.html
@@ -8,14 +8,28 @@
- What Is a Customer Master Key?
-- What Is a Data Encryption Key?
+ - What Are the Differences Between a Custom Key and a Default Key?
-- Why Cannot I Delete a CMK Immediately?
+ - What Is a Data Encryption Key?
- Which Cloud Services Can Use KMS for Encryption?
- Will a CMK Be Charged After It Is Scheduled to Delete?
+- Why Can't I Delete a CMK Immediately?
+
+- Is There a Limit on the Number of CMKs That I Can Create on KMS?
+
+- What Are the Benefits of Envelope Encryption?
+
+- Can I Export a CMK from KMS?
+
+- How Do I Use the Online Tool to Encrypt or Decrypt Small Volumes of Data?
+
+- Can I Update CMKs Created by KMS-Generated Key Materials?
+
+- How Does KMS Protect My Keys?
+
diff --git a/docs/kms/umn/kms_01_0039.html b/docs/kms/umn/kms_01_0039.html
index 9630a672..9c0082cf 100644
--- a/docs/kms/umn/kms_01_0039.html
+++ b/docs/kms/umn/kms_01_0039.html
@@ -1,6 +1,6 @@
- Why Cannot I Delete a CMK Immediately?
+ Why Can't I Delete a CMK Immediately?
The decision to delete a CMK should be taken with caution. Before deletion, confirm that the CMK's encrypted data has all been migrated. Once the CMK is deleted, you will not be able to decrypt data with it. Therefore, KMS offers a waiting period of 7 to 1096 days for the deletion to finally take effect. On the scheduled day of deletion, the CMK will be permanently deleted. However, prior to the scheduled day, you can still cancel the deletion.
diff --git a/docs/kms/umn/kms_01_0043.html b/docs/kms/umn/kms_01_0043.html
index 7e26690c..4156184a 100644
--- a/docs/kms/umn/kms_01_0043.html
+++ b/docs/kms/umn/kms_01_0043.html
@@ -8,7 +8,13 @@
|
-2022-09-30
+ | 2023-06-15
+ |
+This is the nineteenth official release.
+Added section "How Does KMS Protect My Keys?"
+ |
+
+2022-09-30
|
This issue is the eighteenth official release.
Optimized the content in section "Creating a Custom KMS Policy".
diff --git a/docs/kms/umn/kms_01_0045.html b/docs/kms/umn/kms_01_0045.html
index 50744973..95788eb9 100644
--- a/docs/kms/umn/kms_01_0045.html
+++ b/docs/kms/umn/kms_01_0045.html
@@ -1,17 +1,23 @@
-About KMS
+Key Management
diff --git a/docs/kms/umn/kms_01_0046.html b/docs/kms/umn/kms_01_0046.html
index 46b34740..9642d908 100644
--- a/docs/kms/umn/kms_01_0046.html
+++ b/docs/kms/umn/kms_01_0046.html
@@ -4,11 +4,11 @@
KMS can manage CMKs used for data encryption and decryption in Object Storage Service (OBS), Elastic Volume Service (EVS), Image Management Service (IMS), Scalable File Service (SFS), Relational Database Service (RDS), and user applications.
- For OBS, KMS applies to object encryption on OBS.
OBS is an object-based storage service that provides customers with massive, secure, reliable, and cost-effective data storage capabilities, including but not limited to bucket creation, modification, deletion, and management, as well as object upload, download, deletion, and general management. OBS can store all file types, and is suitable for individual subscribers, websites, enterprises, and developers. For more information about OBS, see Object Storage Service User Guide.
- - For EVS, KMS applies to data encryption in EVS disks.
Based on a distributed architecture, an EVS disk is a virtual block storage device that can be elastically scaled up and down. EVS disks can be operated online. Using them is the same as using common server hard disks. Compared with traditional hard disks, EVS disks have higher data reliability and I/O throughput and are easier to use. EVS disks can be used in file systems, databases, and system software applications that require block storage devices. For more information about EVS, see the Elastic Volume Service User Guide.
+ - For EVS, KMS applies to data encryption in EVS disks.
Based on a distributed architecture, an EVS disk is a virtual block storage device that can be elastically scaled up and down. EVS disks can be operated online. Using them is the same as using common server hard disks. Compared with traditional hard disks, EVS disks have higher data reliability and I/O throughput and are easier to use. EVS disks can be used in file systems, databases, and system software applications that require block storage devices. For more information about EVS, see the Elastic Volume Service User Guide.
- - For IMS, KMS applies to the creation of encrypted private images.
IMS provides easy-to-use self-service image management functions. You can apply for a cloud server using either a private image or a public image. You can also create a private image using an existing ECS or an external image file. For more information about IMS, see the Image Management Service User Guide.
+ - For IMS, KMS applies to the creation of encrypted private images.
IMS provides easy-to-use self-service image management functions. You can apply for a cloud server using either a private image or a public image. You can also create a private image using an existing ECS or an external image file. For more information about IMS, see the Image Management Service User Guide.
- - For SFS, KMS applies to data encryption for files in SFS.
SFS provides high-performance file storage that is scalable on demand. It can be shared with multiple cloud servers. For more information, see the Scalable File Service User Guide.
+ - For SFS, KMS applies to data encryption for files in SFS.
SFS provides high-performance file storage that is scalable on demand. It can be shared with multiple cloud servers. For more information, see the Scalable File Service User Guide.
- For RDS, KMS applies to disk encryption in RDS database instances.
RDS is an online relational database service based on the cloud computing platform. RDS is out-of-box, reliable, scalable, and easy to manage. For more information about RDS, see the Relational Database Service User Guide.
@@ -19,7 +19,7 @@
diff --git a/docs/kms/umn/kms_01_0047.html b/docs/kms/umn/kms_01_0047.html
index 1d41a589..f1a0eb44 100644
--- a/docs/kms/umn/kms_01_0047.html
+++ b/docs/kms/umn/kms_01_0047.html
@@ -2,16 +2,16 @@
Functions
KMS provides the following functions:
- - Manages CMKs.
Using the KMS console or APIs, you can perform the following operations on CMKs: - Creating, querying, enabling, disabling, scheduling the deletion of, and canceling the deletion of CMKs
- Importing CMKs and deleting CMK material
- Modifying the aliases and description of CMKs
- Creating, querying, and revoking a grant
- Adding, searching for, editing, and deleting tags
- Enabling key rotation
+ - Manages CMKs.
Using the KMS console or APIs, you can perform the following operations on CMKs: - Creating, querying, enabling, disabling, scheduling the deletion of, and canceling the deletion of CMKs
- Importing CMKs and deleting CMK material
- Modifying the aliases and description of CMKs
- Creates, encrypts, and decrypts DEKs, and retires a grant on a CMK.
By calling APIs, you can create, encrypt, and decrypt DEKs, and retire a grant on a CMK. For details, see the Key Management Service API Reference.
- - Generates hardware true random numbers.
You can generate 512-bit hardware true random numbers using a KMS API. The 512-bit hardware true random numbers can be used as or serve as basis for keys and encryption parameters. For details, see the Key Management Service API Reference.
+ - Generates hardware true random numbers.
You can generate 512-bit hardware true random numbers using a KMS API. The 512-bit hardware true random numbers can be used as or serve as basis for keys and encryption parameters. For details, see the .
diff --git a/docs/kms/umn/kms_01_0054.html b/docs/kms/umn/kms_01_0054.html
index 630e15e9..3242040c 100644
--- a/docs/kms/umn/kms_01_0054.html
+++ b/docs/kms/umn/kms_01_0054.html
@@ -1,34 +1,34 @@
Overview
-A CMK contains key metadata (key ID, key alias, description, key status, and creation date) and the key material used for encrypting and decrypting data.
- - When a user uses the KMS Console to create a CMK, the KMS automatically generates a key material for the CMK.
- If you want to use your own key material, you can use the key import function on KMS Console to create a CMK whose key material is empty, and import the key material to the CMK.
- Important Notes- Security
You need to ensure that random sources meet your security requirements when using them to generate key material. When using the import key function, you need to be responsible for the security of your key material. Save the original backup of the key material so that the backup key material can be imported to the KMS in time when the key material is deleted accidentally.
- - Availability and Durability
Before importing the key material into KMS, you need to ensure the availability and durability of the key material.
-Differences between the imported key material and the key material generated by KMS are shown in Table 1.
+A custom key contains key metadata (key ID, key alias, description, key status, and creation date) and key materials used for encrypting and decrypting data. - When a user uses the KMS console to create a custom key, the KMS automatically generates a key material for the custom key.
- If you want to use your own key material, you can use the key import function on the KMS console to create a custom key whose key material is empty, and import the key material to the custom key.
+
+ Important Notes- Security
You need to ensure that random sources meet your security requirements when using them to generate key materials. When using the import key function, you need to be responsible for the security of your key materials. Save the original backup of the key material so that the backup key material can be imported to the KMS in time when the key material is deleted accidentally.
+ - Availability and Durability
Before importing the key material into KMS, you need to ensure the availability and durability of the key material.
+Differences between the imported key material and the key material generated by KMS are shown in Table 1.
-Table 1 Differences between the imported key material and the key material generated by KMSKey Material Source
+Table 1 Differences between the imported key material and the key material generated by KMSKey Material Source
|
-Difference
+ | Difference
|
-CMKs using the imported key material
+ | Imported keys
|
-- You can delete the key material, but cannot delete the CMK and its metadata.
- When importing the key material, you can set the expiration time of the key material. After the key material expires, the KMS automatically deletes the key material within 24 hours, but does not delete the CMK and its metadata.
It is recommended that you save a copy of the material on your local device because it may be used for re-import in cases of invalid key material or unintended deletion of key material.
+
|
|
-CMKs using KMS generated key material
+ | Keys created in KMS
|
-- The key material cannot be manually deleted.
- You cannot set the expiration time for key material.
+ | - The key material cannot be manually deleted.
- Symmetric keys can be rotated.
- You cannot set the expiration time for key material.
|
-- Association
When a key material is imported to a CMK, the CMK is permanently associated with the key material. Other key material cannot be imported into the CMK.
- - Uniqueness
If you use the CMK created using the imported key material to encrypt data, the encrypted data can be decrypted only by the CMK that has been used to encrypt the data, because the metadata and key material of the CMK must be consistent.
+ - Association
When a key material is imported to a custom key, the custom key is permanently associated with the key material. Other key materials cannot be imported into the custom key.
+ - Uniqueness
If you use the custom key created using the imported key material to encrypt data, the encrypted data can be decrypted only by the custom key that has been used to encrypt the data, because the metadata and key material of the custom key must be consistent.
diff --git a/docs/kms/umn/kms_01_0055.html b/docs/kms/umn/kms_01_0055.html
index b5f89c2e..425a8e8a 100644
--- a/docs/kms/umn/kms_01_0055.html
+++ b/docs/kms/umn/kms_01_0055.html
@@ -1,50 +1,55 @@
-Importing Key Material
+Importing a Key Material
ScenarioIf you want to use your own key material instead of the KMS-generated material, you can use the console to import your key material to KMS. CMKs created using imported material and KMS-generated material are managed together by KMS.
This section describes how to import key material through KMS Console.
- A CMK with imported material works in the same way as one using KMS-generated material, that is, you enable and disable them as well as schedule their deletion and cancel their scheduled deletion in the same way.
- You can only import 256-bit symmetric keys.
- Prerequisites- You have obtained an account and its password for logging in to the management console.
- You have prepared the key material to be imported.
+ Prerequisites- You have prepared the key material to be imported.
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- In the upper right corner, click Import Key.
- In the Import Key dialog box, set the alias and description of the key.
Figure 1 Creating a CMK
- - (Optional) Add tags as needed, and enter the tag key and tag value.
- When a CMK has been created without any tag, you can add a tag to the CMK later as necessary. Click the alias of the CMK. The page with key details is displayed. Then you can add tags to the CMK.
- The same tag (including tag key and tag value) can be used for different CMKs. However, under the same CMK, one tag key can have only one tag value.
- A maximum of 10 tags can be added for one CMK.
- If you want to delete a tag to be added when adding multiple tags, you can click Delete in the row where the tag to be added is located to delete the tag.
+ Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- In the upper right corner, click Import Key.
- In the Import Key dialog box, set the alias and description of the key.
Figure 1 Creating a CMK
+- Alias is the alias of the key to be created.
- You can enter digits, letters, underscores (_), hyphens (-), colons (:), and slashes (/).
- You can enter up to 255 characters.
+ - (Optional) Description is the description of the custom key.
- (Optional) Add tags as needed, and enter the tag key and tag value.
- When a CMK has been created without any tag, you can add a tag to the CMK later as necessary. Click the alias of the CMK. The page with key details is displayed. Then you can add tags to the CMK.
- The same tag (including tag key and tag value) can be used for different CMKs. However, under the same CMK, one tag key can have only one tag value.
- A maximum of 10 tags can be added for one CMK.
- If you want to delete a tag to be added when adding multiple tags, you can click Delete in the row where the tag to be added is located to delete the tag.
+
+
- Click security and durability to read and confirm information regarding the security and durability of the imported key.
- Select I understand the security and durability of using an imported key, and create a CMK whose key material is empty.
- Click Next to go to the Download the Import Items step. Select a key-wrapping algorithm according to Table 1.
Figure 2 Obtaining the wrapping key and import token
-Table 1 Key wrapping algorithmsAlgorithm
+Table 1 Key wrapping algorithmsAlgorithm
|
-Description
+ | Description
|
-Configuration
+ | Configuration
|
-RSAES_OAEP_SHA_256
+ | RSAES_OAEP_SHA_256
|
-RSA encryption algorithm that uses OAEP and has the SHA-256 hash function
+ | RSA encryption algorithm that uses OAEP and has the SHA-256 hash function
|
-Choose an algorithm from the drop-down list box.
+ | Choose an algorithm from the drop-down list box.
- If the HSMs support the RSAES_OAEP_SHA_256 algorithm, use RSAES_OAEP_SHA_256 to encrypt the key material.
- If the HSMs do not support OAEP, use RSAES_PKCS1_V1_5 to encrypt the key material.
NOTICE: The RSAES_OAEP_SHA_1 encryption algorithm is no longer secure. Exercise caution when performing this operation.
|
-RSAES_PKCS1_V1_5
+ | RSAES_PKCS1_V1_5
|
-RSA encryption algorithm (v1.5) of Public-Key Cryptography Standards number 1 (PKCS #1)
+ | RSA encryption algorithm (v1.5) of Public-Key Cryptography Standards number 1 (PKCS #1)
|
-RSAES_OAEP_SHA_1
+ | RSAES_OAEP_SHA_1
|
-RSA encryption algorithm that uses Optimal Asymmetric Encryption Padding (OAEP) and has the SHA-1 hash function
+ | RSA encryption algorithm that uses Optimal Asymmetric Encryption Padding (OAEP) and has the SHA-1 hash function
|
-- Click Download. The following files are downloaded: wrappingKey, importToken, and README. These are displayed in Figure 3.
Figure 3 Downloaded files
+ If you stop a key material import process and want to try again, click Import Key Material in the row of the required CMK, and import key material in the dialog box that is displayed.
+
+ - Click Download. The following files are downloaded: wrappingKey, importToken, and README. These are displayed in Figure 3.
Figure 3 Downloaded files
- wrappingKey_CMK ID_download time is a wrapping key used to encrypt the key material.
- importToken_CMK ID_download time is an import token used to import key material to KMS.
- README_CMK ID_download time is a description file recording information such as a CMK's serial number, wrapping algorithm, wrapping key name, token file name, and the expiration time of the token file and wrapping key.
The wrapping key and import token expire within 24 hours of creation. If they have expired, download them again.
@@ -66,20 +71,20 @@
- Save the import token, copy the content of the import_token token, paste it to a .txt file, and save the file as ImportToken.b64.
-- You use the downloaded wrappingKey file to encrypt the key material to be imported.
- Method 1: Use the downloaded wrapping key to encrypt the key material on your HSM. For details, see the operation guide of your HSM.
- Method 2: Use OpenSSL to encrypt the key material.
If you need to run the openssl pkeyutl command, the OpenSSL version must be 1.0.2 or later.
+ - You use the downloaded wrappingKey file to encrypt the key material to be imported.
- Method 1: Use the downloaded wrapping key to encrypt the key material on your HSM. For details, see the operation guide of your HSM.
- Method 2: Use OpenSSL to encrypt a key material and use the downloaded wrapping key to encrypt the key material.
If you need to run the openssl pkeyutl command, the OpenSSL version must be 1.0.2 or later.
The following example describes how to use the downloaded wrapping key to encrypt the generated key material (256-bit symmetric key). The procedure is as follows: - Run the following command to generate the key material (256-bit symmetric key) and save the generated key material as PlaintextKeyMaterial.bin:
openssl rand -out PlaintextKeyMaterial.bin 32
- - Use the downloaded wrapping key to encrypt the key material and save the encrypted key material as EncryptedKeyMaterial.bin.
Replace PublicKey.bin in the command with the name of the wrapping key wrappingKey_key ID_download time downloaded in 10.
+ - Use the downloaded wrapping key to encrypt the key material and save the encrypted key material as EncryptedKeyMaterial.bin.
Replace PublicKey.bin in the command with the name of the wrapping key wrappingKey_key ID_download time downloaded in 9.
-Table 2 Encrypting the generated key material using the downloaded wrapping keyWrapping Key Algorithm
+Table 2 Encrypting the generated key material using the downloaded wrapping keyWrapping Key Algorithm
|
-Key Materials Encryption
+ | Key Materials Encryption
|
-RSAES_OAEP_SHA_256
+ | RSAES_OAEP_SHA_256
|
-openssl pkeyutl
+ | openssl pkeyutl
-in PlaintextKeyMaterial.bin
-inkey PublicKey.bin
-out EncryptedKeyMaterial.bin
@@ -88,9 +93,9 @@
-pkeyopt rsa_padding_mode:oaep -pkeyopt rsa_oaep_md:sha256
|
-RSAES_PKCS1_V1_5
+ | RSAES_PKCS1_V1_5
|
-openssl rsautl -encrypt
+ | openssl rsautl -encrypt
-in PlaintextKeyMaterial.bin
-pkcs
-inkey PublicKey.bin
@@ -99,9 +104,9 @@
-out EncryptedKeyMaterial.bin
|
-RSAES_OAEP_SHA_1
+ | RSAES_OAEP_SHA_1
|
-openssl pkeyutl
+ | openssl pkeyutl
-in PlaintextKeyMaterial.bin
-inkey PublicKey.bin
-out EncryptedKeyMaterial.bin
@@ -116,48 +121,48 @@
-- Click Next to go to the Import Key Material step. Configure the parameters as described in Table 3.
Figure 4 Importing key material
+ - Click Next. Go to the Import Key Material step. Configure the parameters as described in Table 3.
Figure 4 Importing key material
-Table 3 Parameters for importing key materialParameter
+Table 3 Parameters for importing key materialParameter
|
-Description
+ | Description
|
-Key ID
+ | Key ID
|
-Random ID of a CMK generated during the CMK creation
+ | Random ID of a CMK generated during the CMK creation
|
-Key material
+ | Key material
|
-- Use the key material encrypted by the wrappingKey file downloaded in 10.
- Click Import to import the key material.
+ | - Use the key material encrypted by the wrappingKey file downloaded in 9.
- Click Import to import the key material.
|
-- Click Next to go to the Import Key Token step. Configure the parameters as described in Table 4.
Figure 5 Importing a key token
+ - Click Next to go to the Import Key Token step. Configure the parameters as described in Table 4.
Figure 5 Importing a key token
-Table 4 Parameters for importing a key tokenParameter
+Table 4 Parameters for importing a key tokenParameter
|
-Description
+ | Description
|
-Key ID
+ | Key ID
|
-Random ID of a CMK generated during the CMK creation
+ | Random ID of a CMK generated during the CMK creation
|
-Token
+ | Token
|
-Select the importToken downloaded in 10.
+ | Select the importToken downloaded in 9.
|
-Key material expiration mode
+ | Key material expiration mode
|
-- Key material will never expire: This option specifies that key material will not expire after import.
- Key material expires on: This option specifies the expiration time of the key material. By default, the key material expires in 24 hours after import.
When the key material expires, KMS will delete them in 24 hours, making the CMK unusable and the CMK status Pending import.
+
|
|
diff --git a/docs/kms/umn/kms_01_0072.html b/docs/kms/umn/kms_01_0072.html
index 8d52f043..0657b83c 100644
--- a/docs/kms/umn/kms_01_0072.html
+++ b/docs/kms/umn/kms_01_0072.html
@@ -1,25 +1,25 @@
-Scheduling the Deletion of One or Multiple CMKs
+Deleting One or More CMKs
ScenarioThis section describes how to use the management console to schedule the deletion of one or multiple unwanted CMKs.
If deletion is scheduled for a CMK, the deletion will not take effect immediately. Instead, it will take effect after a waiting period of 7 to 1096 days. Before the specified deletion date, you can cancel the deletion if you want to use the CMK. Once the scheduled deletion has taken effect, the CMK will be deleted permanently and you will not be able to decrypt data encrypted by it. Therefore, you are advised to exercise caution when performing this operation.
Before deleting the CMK, confirm that it is not in use and will not be used.
- - You can configure the SMN notification function to receive notifications when OBS fails to use the CMK to decrypt data before the deletion date. If you want to use the CMK again, cancel its deletion on the console. For SMN configuration instructions, see Configuring SMN.
- You can choose to go to the EVS page. In the search bar, select KMS key ID and enter the CMK ID to check whether the CMK to be deleted is being used by EVS.
- You can choose Computing > Image Management Service to go to the IMS page. Select the Private Image tab. In the search bar, select KMS key ID and enter the CMK ID to check whether the CMK to be deleted is being used by IMS.
- You can choose to go to the SFS page. In the search bar, select KMS key ID and enter the CMK ID to check whether the CMK to be deleted is being used by SFS.
- You can choose Database > Relational Database Service to view the database instance list, and click the name of the target database instance. On the details page of the database instance, check whether the key to be deleted is in use.
+ - You can configure the SMN notification function to receive notifications when OBS fails to use the CMK to decrypt data before the deletion date. If you want to use the CMK again, cancel its deletion on the console. For SMN configuration instructions, see Configuring SMN.
- You can choose to go to the EVS page. In the search bar, select KMS key ID and enter the CMK ID to check whether the CMK to be deleted is being used by EVS.
- You can choose Computing > Image Management Service to go to the IMS page. Select the Private Image tab. In the search bar, select KMS key ID and enter the CMK ID to check whether the CMK to be deleted is being used by IMS.
- You can choose to go to the SFS page. In the search bar, select KMS key ID and enter the CMK ID to check whether the CMK to be deleted is being used by SFS.
- You can choose Database > Relational Database Service to view the database instance list, and click the name of the target database instance. On the details page of the database instance, check whether the key to be deleted is in use.
Default Master Keys created by KMS cannot be scheduled for deletion.
- Prerequisites- You have obtained an account and its password for logging in to the management console.
- The CMK to be deleted is in Enabled, Disabled, or Pending Import status.
+ Prerequisites- The CMK to be deleted is in Enabled, Disabled, or Pending Import status.
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- In the row containing the desired CMK, click Delete.
Figure 1 Scheduling the deletion for one CMK
+Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- In the row containing the desired CMK, click Delete.
Figure 1 Scheduling the deletion for one CMK
- In the dialog box that is displayed, enter the number of days after which you want the deletion to take effect.
Figure 2 Scheduling a deletion time
- - Click Yes to schedule the deletion.
To delete multiple CMKs at a time, select them and click Delete in the upper left corner of the list.
+ - Click Yes to schedule the deletion.
To delete multiple CMKs at a time, select them and click Delete in the upper left corner of the list.
diff --git a/docs/kms/umn/kms_01_0074.html b/docs/kms/umn/kms_01_0074.html
index 4f61f6e4..2e83146c 100644
--- a/docs/kms/umn/kms_01_0074.html
+++ b/docs/kms/umn/kms_01_0074.html
@@ -2,6 +2,41 @@
What Is a Customer Master Key?
A Customer Master Key (CMK) is a Key Encryption Key (KEK) created by a user using KMS. It is used to encrypt and protect Data Encryption Keys (DEKs). One CMK can be used to encrypt one or multiple DEKs.
+ CMKs are categorized into custom keys and default keys. - Custom keys
Keys created or imported by users on the KMS console.
+ - Default keys
When a user uses KMS for encryption in a cloud service for the first time, the cloud service automatically creates a key with the alias suffix /default.
+On the KMS console, you can query Default Master Keys, but can neither disable them nor schedule their deletion.
+
+Table 1 Default Master KeysAlias
+ |
+Cloud Service
+ |
+
+
+obs/default
+ |
+Object Storage Service (OBS)
+ |
+
+evs/default
+ |
+Elastic Volume Service (EVS)
+ |
+
+ims/default
+ |
+Image Management Service (IMS)
+ |
+
+sfs/default
+ |
+Scalable File Service (SFS)
+ |
+
+
+
+
+
+
diff --git a/docs/kms/umn/kms_01_0094.html b/docs/kms/umn/kms_01_0094.html
index b81e4b0f..cf93d351 100644
--- a/docs/kms/umn/kms_01_0094.html
+++ b/docs/kms/umn/kms_01_0094.html
@@ -1,48 +1,68 @@
- Context
- Security risks exist when a DEK is extensively and repeatedly used. For security purposes, you can configure KMS to create new key materials for the CMK.
- New key materials can be created in two methods:
- - Manual key rotation
Create a CMK on the KMS management console to replace the original CMK. If cloud services (such as OBS) use a CMK to encrypt and decrypt data, you need to create a new CMK on the KMS management console and replace the original one used for KMS encryption on OBS Console.
+ Key Rotation Overview
+ Purpose of Key RotationKeys that are widely or repeatedly used are insecure. To enhance the security of encryption keys, you are advised to periodically rotate keys and change their key materials.
+ The purposes of key rotation are:
+ - To reduce the amount of data encrypted by each key.
A key will be insecure if it is used to encrypt a huge number of data. The amount of data encrypted a key refers to the total number of bytes or messages encrypted using the key.
+ - To enhance the capability of responding to security events.
In your initial system security design, you shall design the key rotation function and use it for routine O&M, so that it will be at hand when an emergency occurs.
+ - To enhance the data isolation capability.
The ciphertext data generated before and after key rotation will be isolated. You can identify the impact scope of a security event based on the key involved and take actions accordingly.
+
+
+ Key Rotation MethodsYou can use either of the following key rotation methods:
+ - Manual key rotation
Replace the key in use with a new key. For example, if key A is in use, you can create key B using a new encryption material, and replace key A with key B. This achieves the same outcome as changing the key material of key A.
+
+Take OBS as an example. To manually rotate a key, create a new custom key on the KMS console. Replace the old custom key with the new one on the OBS console.
+Figure 1 Manual key rotation
+ - Automatic key rotation
KMS automatically rotates keys based on the configured rotation period (365 days by default). The system automatically generates a new key to replace the key in use. Automatic key rotation only changes the key material of a CMK. The logical attributes of the key will not change, including its key ID, alias, description, and permissions.
+Automatic key rotation has the following characteristics:
+- Enable rotation for an existing custom key. KMS will automatically generate new key materials for the custom key.
- Data is not re-encrypted in an automatic key rotation. The DEK generated using the CMK is not automatically rotated, and data that has been encrypted using the CMK will not be encrypted again. If a DEK has been leaked, automatic rotation cannot contain the impact of the leakage.
+Figure 2 Key rotation
+
+ KMS retains all versions of a custom key, so that you can decrypt any ciphertext encrypted using the custom key. - KMS uses the latest version of the custom key to encrypt data.
- When decrypting data, KMS uses the custom key version that was used to encrypt the data.
+
- - Automatic key rotation
Enable rotation for an existing CMK so that KMS automatically generates new key material for the CMK.
-Key rotation only changes the key material of a CMK. The CMK's attributes (such as ID, alias, description, and permissions settings) remain unchanged.
-The key rotation function enables KMS to automatically rotate CMKs according to the specified rotation interval (365 days by default). For a CMK with the key rotation function enabled, a new version is generated upon each rotation. See Figure 1 for details.
-Figure 1 Working principle of key rotation
-KMS retains all versions associated of the CMK, so that you can decrypt any ciphertext encrypted using the CMK.
-- KMS uses the latest version of the CMK to encrypt data.
- KMS uses the same version of the CMK to decrypt data as that used to encrypt the data.
-
-Table 1 Key rotation modesKey Type
+Rotation Modes
+ Table 1 Key rotation modesKey Type
|
-Support for Key Rotation
+ | Rotation Mode
|
-Default Master Key
+ | Default master key
|
-Keys cannot be rotated.
+ | Cannot be rotated.
|
-Imported CMK
+ | User-defined key (imported CMK)
|
-Keys can only be rotated manually.
+ | Can only be manually rotated.
+For more information about user-defined keys, see CMK Overview.
|
-Disabled CMK
+ | Symmetric key
|
-KMS does not rotate disabled CMKs and keeps their rotation status unchanged. After a CMK is enabled, if the backup CMK has been used for longer than the rotation period, KMS will immediately rotate keys. If the backup CMK has been used for shorter than the rotation period, KMS will implement the original rotation plan.
+ | Can be automatically or manually rotated.
|
-CMK in pending deletion status
+ | Disabled CMK
|
-KMS does not rotate CMKs in pending deletion status. After you cancel the deletion of a CMK, the previous key rotation status will be restored. If the backup CMK has been used for longer than the rotation period, KMS will immediately rotate keys. If the backup CMK has been used for shorter than the rotation period, KMS will implement the original rotation plan.
+ | Disabled CMKs are not rotated. KMS keeps their rotation status unchanged. After a CMK is enabled, if it has been used for longer than the rotation period, KMS will immediately rotate keys. If the CMK has been used for shorter than the rotation period, KMS will implement the original rotation plan.
+For more information, see Disabling One or More CMKs.
+ |
+
+CMKs in pending deletion state
+ |
+Disabled CMKs are not rotated. KMS keeps their rotation status unchanged. After a CMK is enabled, if it has been used for longer than the rotation period, KMS will immediately rotate keys. If the CMK has been used for shorter than the rotation period, KMS will implement the original rotation plan.
+For more information, see Scheduling the Deletion of One or More Keys.
|
-
+ You can check the rotation details on the Rotation Policy page, including the last rotation time and number of rotations.
+
+
diff --git a/docs/kms/umn/kms_01_0095.html b/docs/kms/umn/kms_01_0095.html
index 04a58b4d..d05e2252 100644
--- a/docs/kms/umn/kms_01_0095.html
+++ b/docs/kms/umn/kms_01_0095.html
@@ -3,9 +3,9 @@
Disabling Key Rotation
ScenarioThis section describes how to disable rotation for a key on the KMS console.
- Prerequisites- You have obtained an account and its password for logging in to the management console.
- The CMK is in Enabled status.
- The Origin of the CMK is KMS.
- Key rotation has been enabled.
+ Prerequisites- The CMK is in Enabled status.
- The Origin of the CMK is KMS.
- Key rotation has been enabled.
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- Click the alias of the desired CMK to view its details.
- Click Rotation Policy. The dialog box is displayed, as shown in Figure 1.
Figure 1 CMK rotation details
+Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- Click the alias of the desired CMK to view its details.
- Click Rotation Policy. The dialog box is displayed, as shown in Figure 1.
Figure 1 CMK rotation details
- Click
to disable key rotation. - In the displayed Disable Rotation Policy dialog box, click Yes.
Figure 2 Disabling key rotation
- Check the rotation status, as shown in Figure 3.
Figure 3 Key rotation
diff --git a/docs/kms/umn/kms_01_0096.html b/docs/kms/umn/kms_01_0096.html
index c492df0c..da14f566 100644
--- a/docs/kms/umn/kms_01_0096.html
+++ b/docs/kms/umn/kms_01_0096.html
@@ -1,29 +1,27 @@
Querying a CMK
- ScenarioThis section describes how to use the management console to view the information about a CMK, such as its alias, status, ID, and creation time. The status of a CMK can be Enabled, Disabled, Pending deletion, or Pending import.
+ ScenarioThis section describes how to use the management console to view the information about a CMK, such as its alias, status, ID, and creation time. The status of a CMK can be Enabled, Disabled, Pending deletion, or Pending import.
- PrerequisitesYou have obtained an account and its password for logging in to the management console.
-
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- In the CMK list you can view details about the CMKs.
Figure 1 CMK list
+Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- In the CMK list you can view details about the CMKs.
Figure 1 CMK list
- Select the CMK status from the drop-down list of All statuses. Then the CMK list displays only the CMKs in the corresponding state.
- Enter the alias of a CMK in the search box on top of the CMK list. Click
or press Enter to search for the specified CMK. - You can click Search Tag to search for the CMK that meets the search criteria.
- You can click
at the upper right corner on top of the CMK list to show or hide columns of the CMK list.
Table 1 describes the parameters of a CMK list.
-Table 1 CMK list parametersParameter
+Table 1 CMK list parametersParameter
|
-Description
+ | Description
|
-Alias
+ | Alias
|
-Alias of a CMK
+ | Alias of a CMK
|
-Status
+ | Status
|
-Status of a CMK, which can be one of the following:
+ | Status of a CMK, which can be one of the following:
|
-ID
+ | ID
|
-Random ID of a CMK generated during the CMK creation
+ | Random ID of a CMK generated during the CMK creation
|
-Creation Time
+ | Creation Time
|
-Creation time of the CMK
+ | Creation time of the CMK
|
-Expiration Time
+ | Expiration Time
|
-Expiration time of the key material. When the material expires, the CMK becomes an empty CMK.
+ | Expiration time of the key material. When the material expires, the CMK becomes an empty CMK.
|
-Origin
+ | Origin
|
-Source of key material, which can be one of the following:
+ | Source of key material, which can be one of the following:
diff --git a/docs/kms/umn/kms_01_0100.html b/docs/kms/umn/kms_01_0100.html
new file mode 100644
index 00000000..51105985
--- /dev/null
+++ b/docs/kms/umn/kms_01_0100.html
@@ -0,0 +1,12 @@
+
+
+Product Advantages
+- Extensive Service Integration
KMS can be integrated with Object Storage Service (OBS), Elastic Volume Service (EVS), and Image Management Service (IMS), to manage keys of these services on the KMS console, and encrypt and decrypt your local data by making the KMS API calls.
+ - Regulatory Compliance
+
+
+
diff --git a/docs/kms/umn/kms_01_0101.html b/docs/kms/umn/kms_01_0101.html
new file mode 100644
index 00000000..7d5221c7
--- /dev/null
+++ b/docs/kms/umn/kms_01_0101.html
@@ -0,0 +1,39 @@
+
+
+What Are the Differences Between a Custom Key and a Default Key?
+The following table describes the differences between a custom key and a default key.
+
+ Table 1 Differences between a custom key and a default keyItem
+ |
+Definition
+ |
+Difference
+ |
+
+
+Custom key
+ |
+A Key Encryption Key (KEK) created using KMS. The key is used to encrypt and protect DEKs.
+A custom key can be used to encrypt multiple DEKs.
+ |
+- It can be disabled and scheduled for deletion.
- It is billed per use after the being created or imported.
+ |
+
+Default key
+ |
+Automatically generated by the system when you use KMS to encrypt data in another cloud service for the first time. The suffix of the key is /default.
+Example: evs/default
+ |
+- It cannot be disabled or scheduled for deletion.
- You are not charged when you use the cloud service automatically generated by the system. If the number of API requests exceeds 20,000, you will be billed.
+ |
+
+
+
+
+
+
+
diff --git a/docs/kms/umn/kms_01_0102.html b/docs/kms/umn/kms_01_0102.html
new file mode 100644
index 00000000..8727239a
--- /dev/null
+++ b/docs/kms/umn/kms_01_0102.html
@@ -0,0 +1,12 @@
+
+
+Can I Export a CMK from KMS?
+No.
+ To ensure CMK security, users can only create and use CMKs in KMS.
+
+
+
diff --git a/docs/kms/umn/kms_01_0106.html b/docs/kms/umn/kms_01_0106.html
new file mode 100644
index 00000000..32a95500
--- /dev/null
+++ b/docs/kms/umn/kms_01_0106.html
@@ -0,0 +1,23 @@
+
+
+What Are the Benefits of Envelope Encryption?
+Envelope encryption is the practice of encrypting data with a DEK and then encrypting the DEK with a root key that you can fully manage. In this case, CMKs are not required for encryption or decryption.
+ Benefits:
+ - Advantages over CMK encryption in KMS
Users can use CMKs to encrypt and decrypt data on the KMS console or by calling KMS APIs.
+A CMK can encrypt and decrypt data no more than 4 KB. An envelope can encrypt and decrypt larger volumes of data.
+Data encrypted using envelopes does not need to be transferred. Only the DEKs need to be transferred to the KMS server.
+ - Advantages over encryption by using cloud services
- Security
Data transferred to the cloud for encryption is exposed to risks such as interception and phishing.
+During envelope encryption, KMS uses Hardware Security Modules (HSMs) to protect keys. All CMKs are protected by root keys in HSMs to avoid key leakage.
+ - Trustworthiness
You will worry about data security on the cloud. It is also difficult for cloud services to prove that they never misuse or disclose such data.
+If you choose envelope encryption, KMS will control access to keys and record all usages of and operations on keys with traceable logs, meeting your audit and regulatory compliance requirements.
+ - Performance and cost
To encrypt or decrypt data using a cloud service, you have to send the data to the encryption server and receive the processed data. This process seriously affects your service performance and incurs high costs.
+Envelope encryption allows you to generate DEKs online by calling KMS cryptographic algorithm APIs, and to encrypt a large amount of local data with the DEKs.
+
+
+
+
+
diff --git a/docs/kms/umn/kms_01_0107.html b/docs/kms/umn/kms_01_0107.html
new file mode 100644
index 00000000..6e8931ee
--- /dev/null
+++ b/docs/kms/umn/kms_01_0107.html
@@ -0,0 +1,21 @@
+
+
+How Do I Use the Online Tool to Encrypt or Decrypt Small Volumes of Data?
+You can use the online tool to encrypt or decrypt data in the following procedures:
+ Encrypting Data- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- Click the alias of the desired CMK to view its details on the online data encryption page.
- Click Encrypt. In the text box on the left, enter the data to be encrypted.
- Click Execute. The data encryption result is displayed in the text box on the right.
- The key you clicked is used for encryption.
- To clear your input, click Clear.
- To copy the encrypted data, click Copy to Clipboard. You can then paste and save it to a local file.
+
+
+
+ Decrypting Data- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- Click the alias of an enabled key (excepting Default Master Keys) to open the online tool page.
- Click Decrypt. In the text box on the left, enter the data to be decrypted.
- The online tool automatically identifies the key used for data encryption, and uses it to decrypt data.
- If the key has been deleted, the decryption will fail.
+
+ - Click Execute. The data decryption result is displayed in plaintext in the text box on the right.
To copy the decrypted data, click Copy to Clipboard. You can then paste and save it to a local file.
+
+
+
+
+
+
diff --git a/docs/kms/umn/kms_01_0109.html b/docs/kms/umn/kms_01_0109.html
new file mode 100644
index 00000000..17d9aac5
--- /dev/null
+++ b/docs/kms/umn/kms_01_0109.html
@@ -0,0 +1,17 @@
+
+
+Service Overview
+
+
+
diff --git a/docs/kms/umn/kms_01_0114.html b/docs/kms/umn/kms_01_0114.html
new file mode 100644
index 00000000..b6766e4d
--- /dev/null
+++ b/docs/kms/umn/kms_01_0114.html
@@ -0,0 +1,12 @@
+
+
+Can I Update CMKs Created by KMS-Generated Key Materials?
+No.
+ Keys created using KMS-generated materials cannot be updated. You can only use KMS to create new CMKs to encrypt and decrypt data.
+
+
+
diff --git a/docs/kms/umn/kms_01_0138.html b/docs/kms/umn/kms_01_0138.html
index 9f8c5684..b32acc6b 100644
--- a/docs/kms/umn/kms_01_0138.html
+++ b/docs/kms/umn/kms_01_0138.html
@@ -1,11 +1,10 @@
Rotating CMKs
-
+
diff --git a/docs/kms/umn/kms_01_0139.html b/docs/kms/umn/kms_01_0139.html
index 0d6b9adc..61039c45 100644
--- a/docs/kms/umn/kms_01_0139.html
+++ b/docs/kms/umn/kms_01_0139.html
@@ -4,9 +4,9 @@
ScenarioThis section describes how to enable rotation for a key on the KMS console.
By default, automatic key rotation is disabled for a CMK. Every time you enable key rotation, KMS automatically rotates CMKs based on the rotation period you set.
- Prerequisites- You have obtained an account and its password for logging in to the management console.
- The CMK is in Enabled status.
- The Origin of the CMK is KMS.
+ Prerequisites- The CMK is in Enabled status.
- The Origin of the CMK is KMS.
- Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The Key Management Service page is displayed.
- Click the alias of the desired CMK to view its details.
- Click Rotation Policy.
Figure 1 Key rotation
+Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- Click the alias of the desired CMK to view its details.
- Click Rotation Policy.
Figure 1 Key rotation
- Click
to enable key rotation. - In the Enable Rotation Policy dialog box, set the rotation period and click OK.
Figure 2 Setting the rotation period
Set the rotation period (unit: day) to an integer in the range 30 to 365. The default value is 365.
After the setting takes effect, the new rotation period starts.
diff --git a/docs/kms/umn/kms_01_0193.html b/docs/kms/umn/kms_01_0193.html
new file mode 100644
index 00000000..f20ab6cc
--- /dev/null
+++ b/docs/kms/umn/kms_01_0193.html
@@ -0,0 +1,11 @@
+
+
+How Does KMS Protect My Keys?
+The mechanism of KMS prevents anyone from accessing your keys in plaintext. KMS relies on hardware security modules (HSMs) that safeguard the confidentiality and integrity of your keys. Plaintext KMS keys are always encrypted by HSMs and are never stored on any disk. These keys are only utilized within the volatile memory of the HSMs for as long as necessary to perform the cryptographic operation you have requested.
+
+
+
diff --git a/docs/kms/umn/kms_01_0196.html b/docs/kms/umn/kms_01_0196.html
new file mode 100644
index 00000000..9cf67c1a
--- /dev/null
+++ b/docs/kms/umn/kms_01_0196.html
@@ -0,0 +1,11 @@
+
+
+User Guide
+
+
+
diff --git a/docs/kms/umn/kms_01_0198.html b/docs/kms/umn/kms_01_0198.html
new file mode 100644
index 00000000..ff440fa8
--- /dev/null
+++ b/docs/kms/umn/kms_01_0198.html
@@ -0,0 +1,11 @@
+
+
+Is There a Limit on the Number of CMKs That I Can Create on KMS?
+
+
+
diff --git a/docs/kms/umn/kms_01_194.html b/docs/kms/umn/kms_01_194.html
new file mode 100644
index 00000000..67823b2d
--- /dev/null
+++ b/docs/kms/umn/kms_01_194.html
@@ -0,0 +1,32 @@
+
+
+Creating a Key
+ScenarioThis section describes how to create a CMK on the KMS management console. You can create up to 100 CMKs, excluding Default Master Keys.
+ The CMK is perfectly suited for but not limited to the following scenarios: - Server-side encryption on OBS
- Encryption of data on EVS disks
- Encryption of private images on IMS
- File system encryption on SFS
- Disk encryption for database instances in RDS
- DEK encryption and decryption for user applications
+
+ Aliases of Default Master Keys end with /default. It is not allowed to use aliases ending with /default for your CMKs.
+
+
+ Procedure- Log in to the management console.
- Click
in the upper left corner of the management console and select a region or project. - Choose . The key management page is displayed.
- Click Create Key in the upper right corner of the page. In the dialog box that is displayed, enter the alias and description of the key.
Figure 1 Create Key dialog box
+- Alias is the alias of the CMK to be created.
- (Optional) Description is the description of the CMK.
+ - (Optional) Add tags as needed, and enter the tag key and tag value.
- When a CMK has been created without any tag, you can add a tag to the CMK later as necessary. Click the alias of the CMK. The page with key details is displayed. Then you can add tags to the CMK.
- The same tag (including tag key and tag value) can be used for different CMKs. However, under the same CMK, one tag key can have only one tag value.
- A maximum of 10 tags can be added for one CMK.
- If you want to delete a tag to be added when adding multiple tags, you can click Delete in the row where the tag to be added is located to delete the tag.
+
+ - Click OK.
In the CMK list, you can view created CMKs. The default status of a CMK is Enabled.
+
+
+ Related Operations- For details about how to upload objects with server-side encryption, see section Uploading a File with Server-Side Encryption in the Object Storage Service User Guide.
- For details about how to encrypt data on EVS disks, see section Creating an EVS Disk in the Elastic Volume Service User Guide.
- For details about how to encrypt private images, see section Encrypting an Image in the Image Management Service User Guide.
- For details about how to encrypt the file system on SFS, see section Creating a File System in the Scalable File Service User Guide.
- For details about how to encrypt disks for a database instance in RDS, see section Creating an RDS MySQL DB Instance in the Relational Database Service User Guide.
- For details about how to create a DEK and a plaintext-free DEK, see sections Creating a DEK and Creating a Plaintext-Free DEK in .
- For details about how to encrypt and decrypt a DEK for a user application, see sections Encrypting a DEK and Decrypting a DEK in .
+
+
+
+
+
+
\ No newline at end of file
diff --git a/docs/kms/umn/kms_01_9997.html b/docs/kms/umn/kms_01_9997.html
index 1a086c73..a76acefe 100644
--- a/docs/kms/umn/kms_01_9997.html
+++ b/docs/kms/umn/kms_01_9997.html
@@ -5,34 +5,28 @@
- Create IAM users for employees based on the organizational structure of your enterprise. Each IAM user has its own security credentials to access KMS resources.
- Grant users only the permissions required to perform a task.
- Entrust an account or cloud service to perform efficient O&M on your KMS resources.
If your account does not need individual IAM users, you may skip over this chapter.
This section describes the procedure for granting permissions (see Figure 1).
-PrerequisitesBefore authorizing permissions to a user group, you need to know which KMS permissions can be added to the user group. Table 1 lists the KMS system policies.
+ PrerequisitesBefore authorizing permissions to a user group, you need to know which KMS permissions can be added to the user group. System-defined roles and policies supported by DEW describes the KMS system policies.
- Table 1 KMS permissionsRole/Policy Name
+Table 1 KMS permissionsRole/Policy Name
|
-Description
+ | Description
|
-Type
- |
-Dependency
+ | Type
|
-KMS Administrator
+ | KMS Administrator
|
-Administrator permissions for the encryption key
+ | Administrator permissions for the encryption key
|
-System role
- |
-None
+ | System role
|
-KMS CMKFullAccess
+ | KMS CMKFullAccess
|
-All permissions for the encryption key
+ | All permissions for the encryption keys
|
-System policy
- |
-None
+ | System policy
|
@@ -42,6 +36,7 @@
Authorization ProcessFigure 1 Authorizing the KMS access permission to a user
Create a user group on the IAM console and grant the user group the KMS CMKFullAccess permission (indicating full permissions for keys).
Create a user on the IAM console and add the user to the user group created in 1.
+Log in to the console as newly created user, and verify that the user only has read permissions for DEW.
diff --git a/docs/kms/umn/kms_01_9998.html b/docs/kms/umn/kms_01_9998.html
index cb191021..6dec60fa 100644
--- a/docs/kms/umn/kms_01_9998.html
+++ b/docs/kms/umn/kms_01_9998.html
@@ -11,7 +11,7 @@
diff --git a/docs/kms/umn/kms_01_9999.html b/docs/kms/umn/kms_01_9999.html
index 770987e8..1a9c9179 100644
--- a/docs/kms/umn/kms_01_9999.html
+++ b/docs/kms/umn/kms_01_9999.html
@@ -1,7 +1,7 @@
-KMS Permissions Management
-If you want to assign different access permissions to employees in an enterprise for the KMS resources purchased on the cloud platform, you can use Identity and Access Management (IAM) to perform refined permission management. IAM provides identity authentication, permissions management, and access control, helping you secure the access to your cloud resources.
+ Permissions Management
+ If you want to assign different access permissions to employees in an enterprise for the KMS resources purchased on the cloud platform, you can use Identity and Access Management (IAM) to perform refined permission management. IAM provides identity authentication, permissions management, and access control, helping you secure access to your resources.
With IAM, you can use your account to create IAM users for your employees, and assign permissions to control their access to specific resource types. For example, if you have software developers and you want to assign them the permission to access KMS but not to delete KMS or its resources, then you can create an IAM policy to assign the developers the permission to access KMS but prevent them from deleting KMS related data.
If the system account has met your requirements and you do not need to create an independent IAM user for permission control, then you can skip this section. This will not affect other functions of KMS.
KMS PermissionsBy default, new IAM users do not have permissions assigned. You need to add a user to one or more groups, and attach permissions policies or roles to these groups. Users inherit permissions from the groups they are added to and can perform specified operations on cloud services based on the permissions.
@@ -10,40 +10,34 @@
- Roles: A type of coarse-grained authorization mechanism that defines permissions related to user responsibilities. This mechanism provides only a limited number of service-level roles for authorization. When using roles to grant permissions, you must also assign other roles that the permissions depend on to take effect. However, roles are not an ideal choice for fine-grained authorization and secure access control.
- Policies: A type of fine-grained authorization mechanism that defines permissions required to perform operations on specific cloud resources under certain conditions. This mechanism allows for more flexible policy-based authorization, meeting requirements for secure access control. For example, you can grant KMS users only the permissions for managing a certain type of cloud servers. Most policies contain permissions for specific APIs, and permissions are defined using API actions.
For more information, see Table 1.
- Table 1 KMS permissionsRole/Policy Name
+Table 1 KMS permissionsRole/Policy Name
|
-Description
+ | Description
|
-Type
- |
-Dependency
+ | Type
|
-KMS Administrator
+ | KMS Administrator
|
-Administrator permissions for the encryption key
+ | Administrator permissions for the encryption key
|
-System role
- |
-None
+ | System role
|
-KMS CMKFullAccess
+ | KMS CMKFullAccess
|
-All permissions for the encryption key
+ | All permissions for the encryption keys
|
-System policy
- |
-None
+ | System policy
|
-Table 2 lists the common operations supported by each system-defined permission of KMS. Select the permissions as needed.
+The following table describes the common operations supported by each system-defined permission of KMS. Select the permissions as needed.
-Table 2 Common operations supported by each system-defined policy or roleOperation
+Table 2 Common operations supported by each system-defined policy or roleOperation
|
KMS Administrator
|
@@ -310,7 +304,7 @@
diff --git a/docs/kms/umn/public_sys-resources/icon-arrowdn.gif b/docs/kms/umn/public_sys-resources/icon-arrowdn.gif
index 84eec9be..37942803 100644
Binary files a/docs/kms/umn/public_sys-resources/icon-arrowdn.gif and b/docs/kms/umn/public_sys-resources/icon-arrowdn.gif differ
diff --git a/docs/kms/umn/public_sys-resources/icon-arrowrt.gif b/docs/kms/umn/public_sys-resources/icon-arrowrt.gif
index 39583d16..6aaaa11c 100644
Binary files a/docs/kms/umn/public_sys-resources/icon-arrowrt.gif and b/docs/kms/umn/public_sys-resources/icon-arrowrt.gif differ
---|
|
---|
|
---|
|
---|
| |
---|
|
---|
|
---|
|
---|
| |
---|
|
---|
|
---|
|
---|
|
---|
|
---|
---|