You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: security/security-design/shared-assets/kms-import-keys/README.md
+26-15Lines changed: 26 additions & 15 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,39 +15,50 @@ This example is for an RSA 2048 Asynchronous Key to be imported in OCI Vault. Th
15
15
16
16
## Prerequisites
17
17
18
-
- Make sure to have a up-to-date version of OpenSSL installed that supports the RSA_OAEP_AES_SHA256 wrapping mechanism. OCI CloudShell is currently based on Oracle Linux 7, which does not have the minimum required version of OpenSSL installed. If you create an OCI Compute based on Oracle Linux 9, it should work immediately.
18
+
- Make sure to have a up-to-date version of OpenSSL installed that supports the RSA_OAEP_AES_SHA256 wrapping mechanism. OCI CloudShell is currently based on Oracle Linux 7, which does not have the minimum required version of OpenSSL installed. If you create an OCI Compute based on Oracle Linux 9, it should work immediately. Below commandline can be used to test if your openssl version is usable.
If the command returns an Error, please use and Oracle Linux 9 compute image or follow this [documentation](https://docs.public.oneportal.content.oci.oraclecloud.com/en-us/iaas/Content/KeyManagement/Tasks/importing_assymetric_keys.htm).
19
23
20
24
- Get a RSA 2048 Key Pair to import and store in the file name ```my_keypair.pem```, or generate one via this command:
21
-
22
-
```openssl genrsa -out my_keypair.pem 2048```
25
+
```
26
+
openssl genrsa -out my_keypair.pem 2048
27
+
```
23
28
24
29
- Create an OCI Vault and copy the Public Wrapping Key. You can find it when creating a new Key in the Vault and enabling the "Import External key" checkbox. For this example store the wrapping key in file called ```pub_wrapping_key.pem```
25
30
26
31
### Manually create the wrapped key material to be imported
27
32
28
33
1. Create a temporary AES key:
29
-
30
-
```openssl rand -out temp_aes.key 32```
34
+
```
35
+
openssl rand -out temp_aes.key 32
36
+
```
31
37
32
38
2. Wrap the temporary AES key with the public wrapping key using RSA-OAEP with SHA-256:
0 commit comments