mirror of
				https://github.com/optim-enterprises-bv/vault.git
				synced 2025-10-30 18:17:55 +00:00 
			
		
		
		
	backport of commit 8c9929bed2 (#23863)
				
					
				
			Co-authored-by: Steven Clark <steven.clark@hashicorp.com>
This commit is contained in:
		 hc-github-team-secure-vault-core
					hc-github-team-secure-vault-core
				
			
				
					committed by
					
						 GitHub
						GitHub
					
				
			
			
				
	
			
			
			 GitHub
						GitHub
					
				
			
						parent
						
							bf68bdc8cc
						
					
				
				
					commit
					ccf359899b
				
			| @@ -1851,13 +1851,13 @@ $ curl \ | |||||||
|   }, |   }, | ||||||
| ``` | ``` | ||||||
|  |  | ||||||
| ## Managed keys | ## Managed keys <EnterpriseAlert inline="true" /> | ||||||
|  |  | ||||||
| ~> **Note**: Managed keys are an Enterprise only feature. | Managed Keys can be used with the Transit Secrets Engine to perform cryptographic operations. Currently, | ||||||
|  | [Sign Data](#sign-data) and [Verify Signed Data](#verify-signed-data) are well-supported across all the managed key types. | ||||||
|  |  | ||||||
| Managed Keys can be used with the Transit Secrets Engine to perform cryptographic operations. Currently | Only PKCS#11 managed keys support [Encrypt Data](#encrypt-data) and [Decrypt Data](#decrypt-data) operations at this time. We | ||||||
| [Sign Data](#sign-data) and [Verify Signed Data](#verify-signed-data) are well supported, and in certain | are planning on adding support for AWS, GCP and Azure managed keys at a later time. | ||||||
| configurations, [Encrypt Data](#encrypt-data) and [Decrypt Data](#decrypt-data) are supported. |  | ||||||
|  |  | ||||||
| When a Transit key is created of type `managed_key`, Transit will look up the key by name or ID, and will | When a Transit key is created of type `managed_key`, Transit will look up the key by name or ID, and will | ||||||
| attempt to generate the key when key generation is allowed (as specified when the [Create/Update Managed Key](/vault/api-docs/system/managed-keys#create-update-managed-key) | attempt to generate the key when key generation is allowed (as specified when the [Create/Update Managed Key](/vault/api-docs/system/managed-keys#create-update-managed-key) | ||||||
| @@ -1872,4 +1872,3 @@ Signing and verifying data with a Managed Key through Transit may require pre-ha | |||||||
| can be informed that data is pre-hashed with the `prehashed` parameter of the [Sign Data](#sign-data) and | can be informed that data is pre-hashed with the `prehashed` parameter of the [Sign Data](#sign-data) and | ||||||
| [Verify Signed Data](#verify-signed-data) endpoints. | [Verify Signed Data](#verify-signed-data) endpoints. | ||||||
|  |  | ||||||
| [sys-plugin-reload-backend]: /vault/api-docs/system/plugins-reload-backend#reload-plugins |  | ||||||
|   | |||||||
		Reference in New Issue
	
	Block a user