Skip to content

Latest commit

 

History

History
98 lines (68 loc) · 6.15 KB

File metadata and controls

98 lines (68 loc) · 6.15 KB
copyright lastupdated keywords subcollection
years
2017, 2025
2025-10-30
monitoring schematics services, monitoring, integration services
schematics

{{site.data.keyword.attribute-definition-list}}

KMS integration for BYOK or KYOK

{: #kms-integration}

{{site.data.keyword.bpfull}} integrates to fully manage enterprise-grade key management to manage the lifecycle of your encryption keys that are used in your Cloud resources, services, and applications. {: shortdesc}

Launching key management

{: #key-mgt-ui}

By default the data that you store in {{site.data.keyword.bpshort}} workspaces using the Enterprise plan is encrypted by using randomly generated keys. If you need to control the encryption keys, you can use the {{site.data.keyword.keymanagementservicelong_notm}} to create, import, and manage encryption root keys and standard keys. Then, you can associate those keys with your {{site.data.keyword.bpshort}} resource deployment to encrypt your resources. {: shortdesc}

You can use your encryption keys from key management services (KMS), {{site.data.keyword.keymanagementservicelong_notm}}(BYOK), and {{site.data.keyword.cloud_notm}} {{site.data.keyword.hscrypto}} (KYOK) to encrypt and secure data stored in {{site.data.keyword.bpshort}}. For more information about how to protect sensitive data in {{site.data.keyword.bpshort}}, see protecting your sensitive data in {{site.data.keyword.bpshort}}.

Before you begin

{: #kms-key-prerequisites}

The key management system lists the instance that are created from your specific location and region. Following prerequisites are followed to perform the KMS activity.

  • You should have your KYOK, or BYOK. To create the {{site.data.keyword.keymanagementservicelong_notm}} keys, see create BYOK. To create an {{site.data.keyword.cloud_notm}} {{site.data.keyword.hscrypto}} keys, see create KYOK.

  • You need to add root key to your KYOK, or BYOK instance.

  • You need to configure service to service authorization to integrate BYOK, and KYOK in {{site.data.keyword.bpshort}} service. Follow these steps to grant service to service authorization {{site.data.keyword.keymanagementserviceshort}} access to {{site.data.keyword.bpshort}} service.

    1. In the {{site.data.keyword.cloud_notm}} console, click Manage > Access (IAM), and select Authorizations > Create.
    2. Select a Source Service as {{site.data.keyword.bpshort}}.
    3. Select Target Service as {{site.data.keyword.keymanagementserviceshort}} or {{site.data.keyword.hscrypto}}. Select the instance you want to provide authorization.
    4. Select the Role as Reader.
    5. Click Authorize.

For more information, see IAM authorization to create by using CLI, and API. {: note}

KMS setting is a one time settings. You need to open the support ticket to update KMS settings. {: note}

Enabling {{site.data.keyword.keymanagementservicelong_notm}} through UI

{: #integrate-byok-ui} {: ui}

Follow these steps to launch key management system and encrypt your keys with {{site.data.keyword.bpshort}}.

  1. Log in to {{site.data.keyword.cloud_notm}} console{: external}.

  2. Click the Menu icon hamburger icon > Platform Automation > Schematics > Extensions{: external}.

  3. Click Connect > Key Management from the drop down.

  4. Select Service as {{site.data.keyword.keymanagementserviceshort}}, or {{site.data.keyword.hscrypto}}.

  5. Select an Choose existing instance instance. If your instance not created, select an Create a new instance to create {{site.data.keyword.keymanagementservicelong_notm}}, or {{site.data.keyword.cloud_notm}} {{site.data.keyword.hscrypto}}. For more information, see Create a key protect instance.

    You can view your instance in the service list, when the prerequisites are met. Or you can see a message No Keys found. {: note}

  6. Select your Service and Root key that is configured for BYOK or KYOK.

  7. Click Update to complete the integration of your keys with your {{site.data.keyword.bpshort}} resource deployment.

  8. Click Launch icon to view your enabled keys in the Resource list.

Enabling {{site.data.keyword.keymanagementservicelong_notm}} through CLI

{: #integrate-byok-cli} {: cli}

Follow the steps to integrate root keys with {{site.data.keyword.bpshort}} to encrypt the data through command-line.

  1. Download and install command-line.

  2. List all the KMS instance in your {{site.data.keyword.cloud_notm}} account to find your {{site.data.keyword.keymanagementserviceshort}} or {{site.data.keyword.hscrypto}} instances.

    ibmcloud schematics kms instances ls --location LOCATION_NAME --scheme ENCRYPTION_SCHEME

    {: pre}

  3. Integrate the root key with {{site.data.keyword.bpshort}} to encrypt your data in the specified location.

    ibmcloud schematics kms enable --location LOCATION_NAME --scheme ENCRYPTION_SCHEME --group RESOURCE_GROUP --primary_name PRIMARY_KMS_NAME --primary_crn PRIMARY_KEY_CRN --primary_endpoint PRIMARY_KMSPRIVATEENDPOINT --secondary_name SECONDARY_KMS_NAME --secondary_crn SECONDARY_KEY_CRN --secondary_endpoint SECONDARY_KMSPRIVATEENDPOINT

    {: pre}

  4. Get current root key information.

    ibmcloud schematics kms info --location LOCATION_NAME

    {: pre}

    For more information about enabling the BYOK or KYOK commands, see Enable BYOK or KYOK commands. {: note}