backport of commit 8c9929bed2 (#23863)

Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
This commit is contained in:
hc-github-team-secure-vault-core
2023-10-26 13:50:53 -04:00
committed by GitHub
parent bf68bdc8cc
commit ccf359899b

View File

@@ -1851,15 +1851,15 @@ $ curl \
},
```
## Managed keys
## Managed keys <EnterpriseAlert inline="true" />
~> **Note**: Managed keys are an Enterprise only feature.
Managed Keys can be used with the Transit Secrets Engine to perform cryptographic operations. Currently,
[Sign Data](#sign-data) and [Verify Signed Data](#verify-signed-data) are well-supported across all the managed key types.
Managed Keys can be used with the Transit Secrets Engine to perform cryptographic operations. Currently
[Sign Data](#sign-data) and [Verify Signed Data](#verify-signed-data) are well supported, and in certain
configurations, [Encrypt Data](#encrypt-data) and [Decrypt Data](#decrypt-data) are supported.
Only PKCS#11 managed keys support [Encrypt Data](#encrypt-data) and [Decrypt Data](#decrypt-data) operations at this time. We
are planning on adding support for AWS, GCP and Azure managed keys at a later time.
When a Transit key is created of type `managed_key`, Transit will lookup the key by name or ID, and will
When a Transit key is created of type `managed_key`, Transit will look up the key by name or ID, and will
attempt to generate the key when key generation is allowed (as specified when the [Create/Update Managed Key](/vault/api-docs/system/managed-keys#create-update-managed-key)
endpoint is called). Key generation is currently supported for cloud KMSes and for certain PKCS#11 mechanisms
on HSMs. This is a best effort operation, so certain KMS/HSM/key configurations will require the key to exist
@@ -1872,4 +1872,3 @@ Signing and verifying data with a Managed Key through Transit may require pre-ha
can be informed that data is pre-hashed with the `prehashed` parameter of the [Sign Data](#sign-data) and
[Verify Signed Data](#verify-signed-data) endpoints.
[sys-plugin-reload-backend]: /vault/api-docs/system/plugins-reload-backend#reload-plugins