You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: clients/client-kms/README.md
+2-1Lines changed: 2 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -30,7 +30,8 @@ Services</a>.</p>
30
30
<p>If you need to use FIPS 140-2 validated cryptographic modules when communicating with
31
31
Amazon Web Services, use the FIPS endpoint in your preferred Amazon Web Services Region. For more information about the
32
32
available FIPS endpoints, see <ahref="https://docs.aws.amazon.com/general/latest/gr/kms.html#kms_region">Service endpoints</a> in the Key Management Service topic of the <i>Amazon Web Services General Reference</i>.</p>
33
-
<p>Clients must support TLS (Transport Layer Security) 1.0. We recommend TLS 1.2. Clients
33
+
<p>All KMS API calls must be signed and be transmitted using Transport Layer Security (TLS).
34
+
KMS recommends you always use the latest supported TLS version. Clients
34
35
must also support cipher suites with Perfect Forward Secrecy (PFS) such as Ephemeral
35
36
Diffie-Hellman (DHE) or Elliptic Curve Ephemeral Diffie-Hellman (ECDHE). Most modern systems
* <p>If you need to use FIPS 140-2 validated cryptographic modules when communicating with
431
431
* Amazon Web Services, use the FIPS endpoint in your preferred Amazon Web Services Region. For more information about the
432
432
* available FIPS endpoints, see <a href="https://docs.aws.amazon.com/general/latest/gr/kms.html#kms_region">Service endpoints</a> in the Key Management Service topic of the <i>Amazon Web Services General Reference</i>.</p>
433
-
* <p>Clients must support TLS (Transport Layer Security) 1.0. We recommend TLS 1.2. Clients
433
+
* <p>All KMS API calls must be signed and be transmitted using Transport Layer Security (TLS).
434
+
* KMS recommends you always use the latest supported TLS version. Clients
434
435
* must also support cipher suites with Perfect Forward Secrecy (PFS) such as Ephemeral
435
436
* Diffie-Hellman (DHE) or Elliptic Curve Ephemeral Diffie-Hellman (ECDHE). Most modern systems
436
437
* such as Java 7 and later support these modes.</p>
* <p>Creates a unique customer managed <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#kms-keys">KMS key</a> in your Amazon Web Services account and
24
-
* Region.</p>
24
+
* Region.</p>
25
25
* <p>In addition to the required parameters, you can use the optional parameters to specify a key policy, description, tags, and other useful elements for any key type.</p>
26
26
* <note>
27
27
* <p>KMS is replacing the term <i>customer master key (CMK)</i> with <i>KMS key</i> and <i>KMS key</i>. The concept has not changed. To prevent breaking changes, KMS is keeping some variations of this term.</p>
28
28
* </note>
29
29
*
30
-
*
31
30
* <p>To create different types of KMS keys, use the following guidance:</p>
* to determine whether the KMS key will be used to encrypt and decrypt or sign and verify.
48
47
* You can't change these properties after the KMS key is created.</p>
49
48
* <p>Asymmetric KMS keys contain an RSA key pair or an Elliptic Curve (ECC) key pair. The private key in an asymmetric
50
-
* KMS key never leaves AWS KMS unencrypted. However, you can use the <a>GetPublicKey</a> operation to download the public key
51
-
* so it can be used outside of AWS KMS. KMS keys with RSA key pairs can be used to encrypt or decrypt data or sign and verify messages (but not both).
49
+
* KMS key never leaves KMS unencrypted. However, you can use the <a>GetPublicKey</a> operation to download the public key
50
+
* so it can be used outside of KMS. KMS keys with RSA key pairs can be used to encrypt or decrypt data or sign and verify messages (but not both).
52
51
* KMS keys with ECC key pairs can be used only to sign and verify messages.
53
52
* For information about asymmetric KMS keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Asymmetric KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
* asymmetric encryption KMS key. When the KMS key is asymmetric, you must specify the KMS key and the
54
54
* encryption algorithm that was used to encrypt the ciphertext. For information about asymmetric KMS keys, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">Asymmetric KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
55
55
* <p>The <code>Decrypt</code> operation also decrypts ciphertext that was encrypted outside of KMS by the
56
-
* public key in an KMS asymmetric KMS key. However, it cannot decrypt symmetric ciphertext produced by
56
+
* public key in an KMS asymmetric KMS key. However, it cannot decrypt ciphertext produced by
57
57
* other libraries, such as the <a href="https://docs.aws.amazon.com/encryption-sdk/latest/developer-guide/">Amazon Web Services
58
58
* Encryption SDK</a> or <a href="https://docs.aws.amazon.com/AmazonS3/latest/dev/UsingClientSideEncryption.html">Amazon S3 client-side encryption</a>.
59
59
* These libraries return a ciphertext format that is incompatible with KMS.</p>
* rotation of the key material</a> for the specified symmetric encryption KMS key.</p>
28
-
* <p> You cannot enable automatic rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">asymmetric KMS keys</a>, <a href="https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html">HMAC KMS keys</a>, KMS keys with <a href="https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">imported key material</a>, or KMS keys in a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. To enable or disable automatic rotation of a set of related <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-manage.html#multi-region-rotate">multi-Region keys</a>, set the property on the primary key. </p>
27
+
* rotation of the key material</a> of the specified symmetric encryption KMS key.</p>
28
+
* <p>Automatic key rotation is supported only on symmetric encryption KMS keys.
29
+
* You cannot enable or disable automatic rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">asymmetric KMS keys</a>, <a href="https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html">HMAC KMS keys</a>, KMS keys with <a href="https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">imported key material</a>, or KMS keys in a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. The key rotation status of these KMS keys is always <code>false</code>.
30
+
* To enable or disable automatic rotation of a set of related <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-manage.html#multi-region-rotate">multi-Region keys</a>, set the property on the primary key.</p>
31
+
* <p>You can enable (<a>EnableKeyRotation</a>) and disable automatic rotation of the
32
+
* key material in <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed KMS keys</a>. Key material rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed KMS keys</a> is not
33
+
* configurable. KMS always rotates the key material for every year. Rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-owned-cmk">Amazon Web Services owned KMS
34
+
* keys</a> varies.</p>
35
+
* <note>
36
+
* <p>In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every
37
+
* three years to every year. For details, see <a>EnableKeyRotation</a>.</p>
38
+
* </note>
29
39
* <p>The KMS key that you use for this operation must be in a compatible key state. For
30
40
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
* of the key material</a> for the specified symmetric encryption KMS key.</p>
28
-
* <p>You cannot enable automatic rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">asymmetric KMS keys</a>, <a href="https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html">HMAC KMS keys</a>, KMS keys with <a href="https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">imported key material</a>, or KMS keys in a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. To enable or disable automatic rotation of a set of related <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-manage.html#multi-region-rotate">multi-Region keys</a>, set the property on the primary key.</p>
27
+
* of the key material</a> of the specified symmetric encryption KMS key. </p>
28
+
* <p>When you enable automatic rotation of a<a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#customer-cmk">customer managed KMS key</a>, KMS
29
+
* rotates the key material of the KMS key one year (approximately 365 days) from the enable date
30
+
* and every year thereafter. You can monitor rotation of the key material for your KMS keys in
31
+
* CloudTrail and Amazon CloudWatch. To disable rotation of the key material in a customer
32
+
* managed KMS key, use the <a>DisableKeyRotation</a> operation.</p>
33
+
* <p>Automatic key rotation is supported only on <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#symmetric-cmks">symmetric encryption KMS keys</a>.
34
+
* You cannot enable or disable automatic rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/symmetric-asymmetric.html">asymmetric KMS keys</a>, <a href="https://docs.aws.amazon.com/kms/latest/developerguide/hmac.html">HMAC KMS keys</a>, KMS keys with <a href="https://docs.aws.amazon.com/kms/latest/developerguide/importing-keys.html">imported key material</a>, or KMS keys in a <a href="https://docs.aws.amazon.com/kms/latest/developerguide/custom-key-store-overview.html">custom key store</a>. The key rotation status of these KMS keys is always <code>false</code>.
35
+
* To enable or disable automatic rotation of a set of related <a href="https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-manage.html#multi-region-rotate">multi-Region keys</a>, set the property on the primary key. </p>
36
+
* <p>You cannot enable or disable automatic rotation <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-managed-cmk">Amazon Web Services managed KMS keys</a>. KMS
37
+
* always rotates the key material of Amazon Web Services managed keys every year. Rotation of <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#aws-owned-cmk">Amazon Web Services owned KMS
38
+
* keys</a> varies.</p>
39
+
* <note>
40
+
* <p>In May 2022, KMS changed the rotation schedule for Amazon Web Services managed keys from every three
41
+
* years (approximately 1,095 days) to every year (approximately 365 days).</p>
42
+
* <p>New Amazon Web Services managed keys are automatically rotated one year after they
43
+
* are created, and approximately every year thereafter. </p>
44
+
* <p>Existing Amazon Web Services managed keys are automatically rotated one year after
45
+
* their most recent rotation, and every year thereafter.</p>
46
+
* </note>
29
47
* <p>The KMS key that you use for this operation must be in a compatible key state. For
30
48
* details, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-state.html">Key states of KMS keys</a> in the <i>Key Management Service Developer Guide</i>.</p>
* with the data. When you are ready to decrypt data or sign a message, you can use the <a>Decrypt</a> operation to decrypt the encrypted private key.</p>
39
39
* <p>To generate a data key pair, you must specify a symmetric encryption KMS key to encrypt
40
40
* the private key in a data key pair. You cannot use an asymmetric KMS key or a KMS key in a
41
-
* custom key store. To get the type and origin of your KMS key, use the <a>DescribeKey</a> operation. </p>
41
+
* custom key store. To get the type and origin of your KMS key, use the <a>DescribeKey</a>
42
+
* operation. </p>
42
43
* <p>Use the <code>KeyPairSpec</code> parameter to choose an RSA or Elliptic Curve (ECC) data
43
44
* key pair. KMS recommends that your use ECC key pairs for signing, and use RSA key pairs for
44
45
* either encryption or signing, but not both. However, KMS cannot enforce any restrictions on
0 commit comments