Skip to content

Commit 95b9516

Browse files
committed
docs(key-manager): change schema
1 parent 914e676 commit 95b9516

File tree

3 files changed

+3
-3
lines changed

3 files changed

+3
-3
lines changed
53.9 KB
Loading
Binary file not shown.

identity-and-access-management/key-manager/reference-content/understanding-key-manager.mdx

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ content:
77
paragraph: Learn how Scaleway Key Manager secures your data with encryption hierarchies, key lifecycle management, and support for advanced cryptographic operations.
88
tags: key-manager encryption data key
99
dates:
10-
validation: 2025-01-06
11-
posted: 2025-01-06
10+
validation: 2025-01-15
11+
posted: 2025-01-15
1212
categories:
1313
- identity-and-access-management
1414
---
@@ -19,7 +19,7 @@ You will find a diagram in the box below on best practices for how Key Manager w
1919

2020
It is recommended to use keys stored in Key Manager as [key encryption keys (KEK)](/identity-and-access-management/key-manager/concepts/#key-encryption-key-kek), which are used to encrypt and decrypt [data encryption keys (DEKs)](/identity-and-access-management/key-manager/concepts/#data-encryption-key-dek) stored on the client side.
2121

22-
<Lightbox src="scaleway-key-manager.webp" alt="Key Manager hierarchy diagram showing how Key Manager works. Key Manager encrypts data through a hierarchical process: internally, a root encryption key encrypts the key encryption key, which then encrypts the data encryption key. Users can then encrypt their payload using the data encryption key generated in Key Manager." />
22+
<Lightbox src="scaleway-key-manager-schema.webp" alt="Key Manager hierarchy diagram showing how Key Manager works. Key Manager encrypts data through a hierarchical process: internally, a root encryption key encrypts the key encryption key, which then encrypts a data encryption key either generated by Key Manager or users. Users can then encrypt their payload using the data encryption key." />
2323

2424
## Why use data encryption keys?
2525

0 commit comments

Comments
 (0)