Skip to content

Commit 436e50b

Browse files
committed
docs(km): fix
1 parent ec654bf commit 436e50b

File tree

4 files changed

+11
-14
lines changed

4 files changed

+11
-14
lines changed

menu/navigation.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -671,6 +671,10 @@
671671
"label": "Creating a data encryption key using the Scaleway API and the Scaleway CLI",
672672
"slug": "create-dek-api-cli"
673673
},
674+
{
675+
"label": "Setting up Tink",
676+
"slug": "configuring-tink"
677+
},
674678
{
675679
"label": "Managing your Key Manager keys using Tink",
676680
"slug": "manage-keys-with-tink"

pages/key-manager/api-cli/configuring-tink.mdx

Lines changed: 0 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -13,8 +13,6 @@ dates:
1313

1414
This page shows you how to configure Tink for encrypting and decrypting data with Scaleway's Key Manager.
1515

16-
Tink is an open-source cryptography library designed for performing secure cryptographic operations, including data encryption and key management. It integrates well with Scaleway’s Key Manager to manage your encryption keys securely and follow best practices.
17-
1816
We recommend using Tink with Scaleway’s Key Manager, especially for Go-based applications.
1917

2018
<Macro id="requirements" />
@@ -30,8 +28,6 @@ The Scaleway Tink extension generates a unique data encryption key for each piec
3028
Tink is a library that helps you perform encryption (securing data) and manage encryption keys. It can work with various key management services (KMS), including Scaleway's Key Manager.
3129
To use Tink with Scaleway Key Manager, you need to install dependencies that let Tink interact with Key Manager.
3230

33-
Tink is an open source cryptography library written by cryptographers and security engineers at Google.
34-
3531
In order to use Tink for data encryption, you need to provide it with a key URI and a configuration file:
3632

3733
- The key URI points to your key encryption key (KEK) in Scaleway Key Manager.

pages/key-manager/quickstart.mdx

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -15,20 +15,20 @@ Scaleway's Key Manager allows you to create key encryption keys from the [Scalew
1515
<Macro id="requirements" />
1616

1717
- A Scaleway account logged into the [console](https://console.scaleway.com)
18-
- [Owner](/identity-and-access-management/iam/concepts/#owner) status or [IAM permissions](/identity-and-access-management/iam/concepts/#permission) allowing you to perform actions in the intended Organization
18+
- [Owner](/iam/concepts/#owner) status or [IAM permissions](/iam/concepts/#permission) allowing you to perform actions in the intended Organization
1919

2020
## How to create a Key Manager key
2121

2222
1. Click Key Manager in the **Security and Identity section** of the [Scaleway console](https://console.scaleway.com) side menu.
2323
2. Click **+ Create key**.
2424
3. Choose the region in which you want to create your key.
2525
4. Enter a name, a description, and optional tags for your key.
26-
5. Select the [encryption method](/identity-and-access-management/key-manager/concepts/#encryption-method) for your key.
26+
5. Select the [encryption method](/key-manager/concepts/#encryption-method) for your key.
2727

2828
<Message type="important">
29-
Key Manager currently only supports the `AES-256 GCM` [symmetric encryption](/identity-and-access-management/key-manager/concepts/#symmetric-encryption) algorithm.
29+
Key Manager currently only supports the `AES-256 GCM` [symmetric encryption](/key-manager/concepts/#symmetric-encryption) algorithm.
3030
</Message>
31-
6. Switch the <Icon name="toggle" /> icon to disable [key protection](/identity-and-access-management/key-manager/concepts/#key-protection) or leave it enabled.
31+
6. Switch the <Icon name="toggle" /> icon to disable [key protection](/key-manager/concepts/#key-protection) or leave it enabled.
3232
<Message type="note">
3333
Key protection allows you to protect your key from accidental deletion.
3434
</Message>
@@ -40,12 +40,12 @@ Scaleway's Key Manager allows you to create key encryption keys from the [Scalew
4040
1. Click Key Manager in the **Security and Identity section** of the [Scaleway console](https://console.scaleway.com) side menu. Your keys display.
4141
2. Click the key for which to create a data encryption key.
4242
3. Scroll down to the **Generate data encryption key** section.
43-
4. Click **Generate data encryption key**. A pop-up displays with the [ciphertext](/identity-and-access-management/key-manager/concepts/#ciphertext) of your DEK.
43+
4. Click **Generate data encryption key**. A pop-up displays with the [ciphertext](/key-manager/concepts/#ciphertext) of your DEK.
4444
5. Copy and store your DEK's ciphertext safely.
4545
<Message type="important">
46-
- We recommend that you **always store the ciphertext** of your data encryption key rather than its [plaintext](/identity-and-access-management/key-manager/concepts/#plaintext).
46+
- We recommend that you **always store the ciphertext** of your data encryption key rather than its [plaintext](/key-manager/concepts/#plaintext).
4747
- While Scaleway Key Manager is responsible for generating, encrypting, and decrypting data encryption keys, it does not store, manage, or monitor them, nor does it engage in cryptographic operations with these keys. **You must use and manage data encryption keys outside of Key Manager**.
48-
- Read our [documentation](/identity-and-access-management/key-manager/reference-content/understanding-key-manager/) to understand Key Manager.
48+
- Read our [documentation](/key-manager/reference-content/understanding-key-manager/) to understand Key Manager.
4949
</Message>
5050
6. Optionally, click **Display plaintext** to make sure that the plaintext does not contain any mistakes.
5151
7. Click **Close**.

pages/key-manager/reference-content/differences-key-and-secret-manager.mdx

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -54,9 +54,6 @@ to carry out encryption operations, but not decryption operations, so it cannot
5454

5555
This would not be possible to achieve with Secret Manager, since both writing and reading applications would need permissions to read the key from Secret Manager, which is sufficient to both encrypt and decrypt the data.
5656

57-
58-
## Additional note
59-
6057
Cryptographic keys are secrets that need special care, and Key Manager is an effective tool to help you manage them securely. Key Manager allows your applications to offload all sensitive cryptographic
6158
operations and keep keys out-of-band for extra security.
6259

0 commit comments

Comments
 (0)