You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: pages/key-manager/api-cli/configuring-tink.mdx
-4Lines changed: 0 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,8 +13,6 @@ dates:
13
13
14
14
This page shows you how to configure Tink for encrypting and decrypting data with Scaleway's Key Manager.
15
15
16
-
Tink is an open-source cryptography library designed for performing secure cryptographic operations, including data encryption and key management. It integrates well with Scaleway’s Key Manager to manage your encryption keys securely and follow best practices.
17
-
18
16
We recommend using Tink with Scaleway’s Key Manager, especially for Go-based applications.
19
17
20
18
<Macroid="requirements" />
@@ -30,8 +28,6 @@ The Scaleway Tink extension generates a unique data encryption key for each piec
30
28
Tink is a library that helps you perform encryption (securing data) and manage encryption keys. It can work with various key management services (KMS), including Scaleway's Key Manager.
31
29
To use Tink with Scaleway Key Manager, you need to install dependencies that let Tink interact with Key Manager.
32
30
33
-
Tink is an open source cryptography library written by cryptographers and security engineers at Google.
34
-
35
31
In order to use Tink for data encryption, you need to provide it with a key URI and a configuration file:
36
32
37
33
- The key URI points to your key encryption key (KEK) in Scaleway Key Manager.
Copy file name to clipboardExpand all lines: pages/key-manager/quickstart.mdx
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -15,20 +15,20 @@ Scaleway's Key Manager allows you to create key encryption keys from the [Scalew
15
15
<Macroid="requirements" />
16
16
17
17
- A Scaleway account logged into the [console](https://console.scaleway.com)
18
-
-[Owner](/identity-and-access-management/iam/concepts/#owner) status or [IAM permissions](/identity-and-access-management/iam/concepts/#permission) allowing you to perform actions in the intended Organization
18
+
-[Owner](/iam/concepts/#owner) status or [IAM permissions](/iam/concepts/#permission) allowing you to perform actions in the intended Organization
19
19
20
20
## How to create a Key Manager key
21
21
22
22
1. Click Key Manager in the **Security and Identity section** of the [Scaleway console](https://console.scaleway.com) side menu.
23
23
2. Click **+ Create key**.
24
24
3. Choose the region in which you want to create your key.
25
25
4. Enter a name, a description, and optional tags for your key.
26
-
5. Select the [encryption method](/identity-and-access-management/key-manager/concepts/#encryption-method) for your key.
26
+
5. Select the [encryption method](/key-manager/concepts/#encryption-method) for your key.
27
27
28
28
<Messagetype="important">
29
-
Key Manager currently only supports the `AES-256 GCM`[symmetric encryption](/identity-and-access-management/key-manager/concepts/#symmetric-encryption) algorithm.
29
+
Key Manager currently only supports the `AES-256 GCM`[symmetric encryption](/key-manager/concepts/#symmetric-encryption) algorithm.
30
30
</Message>
31
-
6. Switch the <Iconname="toggle" /> icon to disable [key protection](/identity-and-access-management/key-manager/concepts/#key-protection) or leave it enabled.
31
+
6. Switch the <Iconname="toggle" /> icon to disable [key protection](/key-manager/concepts/#key-protection) or leave it enabled.
32
32
<Messagetype="note">
33
33
Key protection allows you to protect your key from accidental deletion.
34
34
</Message>
@@ -40,12 +40,12 @@ Scaleway's Key Manager allows you to create key encryption keys from the [Scalew
40
40
1. Click Key Manager in the **Security and Identity section** of the [Scaleway console](https://console.scaleway.com) side menu. Your keys display.
41
41
2. Click the key for which to create a data encryption key.
42
42
3. Scroll down to the **Generate data encryption key** section.
43
-
4. Click **Generate data encryption key**. A pop-up displays with the [ciphertext](/identity-and-access-management/key-manager/concepts/#ciphertext) of your DEK.
43
+
4. Click **Generate data encryption key**. A pop-up displays with the [ciphertext](/key-manager/concepts/#ciphertext) of your DEK.
44
44
5. Copy and store your DEK's ciphertext safely.
45
45
<Messagetype="important">
46
-
- We recommend that you **always store the ciphertext** of your data encryption key rather than its [plaintext](/identity-and-access-management/key-manager/concepts/#plaintext).
46
+
- We recommend that you **always store the ciphertext** of your data encryption key rather than its [plaintext](/key-manager/concepts/#plaintext).
47
47
- While Scaleway Key Manager is responsible for generating, encrypting, and decrypting data encryption keys, it does not store, manage, or monitor them, nor does it engage in cryptographic operations with these keys. **You must use and manage data encryption keys outside of Key Manager**.
48
-
- Read our [documentation](/identity-and-access-management/key-manager/reference-content/understanding-key-manager/) to understand Key Manager.
48
+
- Read our [documentation](/key-manager/reference-content/understanding-key-manager/) to understand Key Manager.
49
49
</Message>
50
50
6. Optionally, click **Display plaintext** to make sure that the plaintext does not contain any mistakes.
Copy file name to clipboardExpand all lines: pages/key-manager/reference-content/differences-key-and-secret-manager.mdx
-3Lines changed: 0 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -54,9 +54,6 @@ to carry out encryption operations, but not decryption operations, so it cannot
54
54
55
55
This would not be possible to achieve with Secret Manager, since both writing and reading applications would need permissions to read the key from Secret Manager, which is sufficient to both encrypt and decrypt the data.
56
56
57
-
58
-
## Additional note
59
-
60
57
Cryptographic keys are secrets that need special care, and Key Manager is an effective tool to help you manage them securely. Key Manager allows your applications to offload all sensitive cryptographic
61
58
operations and keep keys out-of-band for extra security.
0 commit comments