Skip to content

Commit c1a4728

Browse files
committed
docs(record-encryption): pull out key creation to the top-level of the guide.
why: key creation is a day two operation and not really related to KMS setup Signed-off-by: Keith Wall <[email protected]>
1 parent 6969f76 commit c1a4728

File tree

10 files changed

+92
-12
lines changed

10 files changed

+92
-12
lines changed
Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,18 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
3+
// record-encryption-guide/index.adoc
4+
5+
[id='assembly-kms-key-creation-{context}']
6+
= Creating Keys
7+
8+
[role="_abstract"]
9+
This section assumes that you already have a supported KMS instance up and running and have configured the Record Encryption filter.
10+
It describes how to create the keys in the KMS that will be used to encrypt records sent to the topics.
11+
12+
include::hashicorp-vault/assembly-key-creation-hashicorp-vault.adoc[leveloffset=+1]
13+
include::aws-kms/assembly-key-creation-aws-kms.adoc[leveloffset=+1]
14+
include::azure-key-vault/assembly-key-creation-azure-key-vault.adoc[leveloffset=+1]
15+
ifdef::include-fortanix-dsm-kms[]
16+
include::fortanix-dsm/assembly-key-creation-fortanix-dsm.adoc[leveloffset=+1]
17+
endif::[]
18+
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
3+
// file included in the following:
4+
//
5+
// assembly-kms-key-creation.adoc
6+
7+
[id='assembly-key-creation-aws-kms-{context}']
8+
= Creating keys in AWS KMS
9+
10+
[role="_abstract"]
11+
To create a key in AWS Key Management Service for use with the Record Encryption filter, use the following procedure.
12+
13+
You'll need a privileged AWS user that is capable of creating keys.
14+
15+
include::../../../_modules/record-encryption/aws-kms/proc-aws-kms-key-creation.adoc[leveloffset=+1]

kroxylicious-docs/docs/_assemblies/record-encryption/aws-kms/assembly-preparing-aws-kms.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
// file included in the following:
44
//
5-
// assembly-record-encryption-filter.adoc
5+
// assembly-kms-preparing.adoc
66

77
[id='assembly-preparing-aws-kms-{context}']
88
= Preparing AWS KMS
@@ -11,9 +11,9 @@
1111
To prepare {aws}/kms/latest/developerguide/overview.html[AWS Key Management Service] for use with the Record Encryption filter, use the following setup:
1212

1313
* Establish an AWS KMS aliasing convention for keys
14-
* Create AWS KMS keys
14+
* Create a policies giving permissions to the key aliases
15+
* Create a user for use by the filter and attach the policies to it.
1516

1617
You'll need a privileged AWS user that is capable of creating users and policies to perform the set-up.
1718

1819
include::../../../_modules/record-encryption/aws-kms/con-aws-kms-setup.adoc[leveloffset=+1]
19-
include::../../../_modules/record-encryption/aws-kms/proc-aws-kms-key-creation.adoc[leveloffset=+1]
Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
3+
// file included in the following:
4+
//
5+
// assembly-kms-key-creation.adoc
6+
7+
[id='assembly-key-creation-azure-key-vault-{context}']
8+
= Creating keys in Azure Key Vault
9+
10+
[role="_abstract"]
11+
To create a key in Azure Key Vault for use with the Record Encryption filter, use the following procedure.
12+
13+
You'll need a privileged Azure user that is capable of creating key resources to perform the set-up.
14+
15+
include::../../../_modules/record-encryption/azure-key-vault/proc-azure-key-vault-key-creation.adoc[leveloffset=+1]
16+
17+
[role="_additional-resources"]
18+
.Additional resources
19+
20+
* link:https://learn.microsoft.com/en-us/azure/key-vault/general/overview[Azure Key Vault overview^]
21+
* link:https://learn.microsoft.com/en-us/azure/key-vault/general/best-practices[Azure Key Vault security best practices^]
22+
* link:https://learn.microsoft.com/en-us/azure/key-vault/keys/about-keys[Azure Key Vault keys^]
23+
* link:https://learn.microsoft.com/en-us/azure/key-vault/general/rbac-access-policy[Azure Key Vault access control using RBAC^]
24+
* link:https://learn.microsoft.com/en-us/azure/role-based-access-control/scope-overview[Azure role-based access control scopes^]

kroxylicious-docs/docs/_assemblies/record-encryption/azure-key-vault/assembly-preparing-azure-key-vault.adoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
// file included in the following:
44
//
5-
// assembly-record-encryption-filter.adoc
5+
// assembly-kms-preparing.adoc
66

77
[id='assembly-preparing-azure-key-vault-{context}']
88
= Preparing Azure Key Vault
@@ -12,12 +12,10 @@ To prepare Azure Key Vault for use with the Record Encryption filter, use the fo
1212

1313
* Setup Azure resources
1414
* Establish a naming convention for keys
15-
* Create Azure Key Vault keys
1615

1716
You'll need a privileged Azure user that is capable of creating users and resources to perform the set-up.
1817

1918
include::../../../_modules/record-encryption/azure-key-vault/proc-azure-key-vault-setup.adoc[leveloffset=+1]
20-
include::../../../_modules/record-encryption/azure-key-vault/proc-azure-key-vault-key-creation.adoc[leveloffset=+1]
2119

2220
[role="_additional-resources"]
2321
.Additional resources
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
3+
// file included in the following:
4+
//
5+
// assembly-kms-key-creation.adoc
6+
7+
[id='assembly-key-creation-fortanix-dsm-{context}']
8+
= Creating keys in Fortanix Data Security Manager (DSM)
9+
10+
[role="_abstract"]
11+
To create a key in Fortanix Data Security Manager (DSM) for use with the Record Encryption filter, use the following procedure.
12+
13+
include::../../../_modules/record-encryption/fortanix-dsm/proc-fortanix-dsm-key-creation.adoc[leveloffset=+1]

kroxylicious-docs/docs/_assemblies/record-encryption/fortanix-dsm/assembly-preparing-fortanix-dsm.adoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
// file included in the following:
44
//
5-
// assembly-record-encryption-filter.adoc
5+
// assembly-kms-preparing.adoc
66

77
[id='assembly-preparing-fortanix-dsm-{context}']
88
= Preparing Fortanix Data Security Manager (DSM)
@@ -12,7 +12,5 @@ To prepare Fortanix Data Security Manager (DSM) for use with the Record Encrypti
1212

1313
* Establish a naming convention for keys and choose a Fortanix group where the keys will reside.
1414
* Create an application identity, with an API key, for the Record Encryption filter.
15-
* Create Fortanix DSM keys.
1615

1716
include::../../../_modules/record-encryption/fortanix-dsm/con-fortanix-dsm-setup.adoc[leveloffset=+1]
18-
include::../../../_modules/record-encryption/fortanix-dsm/proc-fortanix-dsm-key-creation.adoc[leveloffset=+1]
Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,13 @@
1+
:_mod-docs-content-type: ASSEMBLY
2+
3+
// file included in the following:
4+
//
5+
// assembly-kms-key-creation.adoc
6+
7+
[id='assembly-key-creation-hashicorp-vault-{context}']
8+
= Creating keys in HashiCorp Vault
9+
10+
[role="_abstract"]
11+
To create a key in HashiCorp Vault for use with the Record Encryption filter, use the following procedure.
12+
13+
include::../../../_modules/record-encryption/hashicorp-vault/proc-vault-key-creation.adoc[leveloffset=+1]

kroxylicious-docs/docs/_assemblies/record-encryption/hashicorp-vault/assembly-preparing-hashicorp-vault.adoc

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22

33
// file included in the following:
44
//
5-
// assembly-record-encryption-filter.adoc
5+
// assembly-kms-preparing.adoc
66

77
[id='assembly-preparing-hashicorp-vault-{context}']
88
= Preparing HashiCorp Vault
@@ -15,5 +15,3 @@ To use HashiCorp Vault with the Record Encryption filter, use the following setu
1515
* Obtain a Vault token that includes the filter policy.
1616

1717
include::../../../_modules/record-encryption/hashicorp-vault/con-vault-setup.adoc[leveloffset=+1]
18-
19-
include::../../../_modules/record-encryption/hashicorp-vault/proc-vault-key-creation.adoc[leveloffset=+1]

kroxylicious-docs/docs/record-encryption-guide/index.adoc

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -43,6 +43,9 @@ include::_assemblies/record-encryption/assembly-kms-preparing.adoc[leveloffset=+
4343
//configuring the record encryption filter
4444
include::_assemblies/record-encryption/assembly-configuring-record-encryption-filter.adoc[leveloffset=+1]
4545

46+
// key creation (might be done by a KMS key manager)
47+
include::_assemblies/record-encryption/assembly-kms-key-creation.adoc[leveloffset=+1]
48+
4649
//monitoring the record encryption filter
4750
include::_assemblies/record-encryption/assembly-monitoring-record-encryption-filter.adoc[leveloffset=+1]
4851

0 commit comments

Comments
 (0)