Manage KMS using the GUI | 4.2 | W E K A (2024)

Explore procedures for managing Key Management System (KMS) integration with the WEKA system using the GUI.

Using the GUI, you can:

Configure a KMS

Configure the KMS of either HashiCorp Vault or KMIP within the WEKA system to encrypt filesystem keys securely.

Before you begin

Ensure that the KMS is preconfigured, and both the key and a valid token are readily available.

Procedure

  1. From the menu, select Configure > Cluster Settings.

  2. From the left pane, select Security.

  3. On the Security page, select Configure KMS.

  4. On the Configure KMS dialog, select the KMS type to deploy: HashiCorp Vault or KMIP.

  5. Set the connection properties according to the selected KMS type. Select the relevant tab for details:

For the HashiCorp Vault type, set the following:

  • Address: The KMS address.

  • Key Identifier: Key name to secure the filesystem keys (encryption-as-a-service).

  • Token: The authentication API token you obtain from the vault to access the KMS.

  • Namespace: The namespace name that identifies the logical partition within the vault. It is used to organize and isolate data, policies, and configurations. Namespace names must not end with "/", avoid spaces, and refrain from using reserved names like root, sys, audit, auth, cubbyhole, and identity.

For the KMIP type, set the following:

  • Address: The address of the KMS in hostname:port format.

  • KMS Identifier: Key UID to secure the filesystem keys (encryption-as-a-service).

  • Client Certificate: The client certificate content of the PEM file.

  • Client Key: The client key content of the PEM file.

  • CA Certificate: (Optional) The CA certificate content of the PEM file.

  1. Click Save.

Related topics

Obtain an API token from the vault

Obtain a certificate for a KMIP-based KMS

View the KMS configuration

Procedure

  1. From the menu, select Configure > Cluster Settings.

  2. From the left pane, select Security.The Security page displays the configured KMS.

Update the KMS configuration

Update the KMS configuration in the WEKA system when changes occur in the KMS server details or cryptographic keys, ensuring seamless integration and continued secure filesystem key encryption.

Procedure

  1. From the menu, select Configure > Cluster Settings.

  2. From the left pane, select Security.

  3. The Security page displays the configured KMS.

  4. Select Update KMS, and update its settings.

  5. Select Save.

Remove the KMS configuration

Removing a KMS configuration is possible only if no encrypted filesystems exist.

Procedure

  1. From the menu, select Configure > Cluster Settings.

  2. From the left pane, select Security.

  3. The Security page displays the configured KMS.

  4. Select Reset KMS.

  5. In the message that appears, select Yes to confirm the KMS configuration reset.

Last updated

Manage KMS using the GUI | 4.2 | W E K A (2024)

FAQs

Does KMS have a GUI? ›

Using the GUI, you can: Configure a KMS. View the KMS configuration. Update the KMS configuration.

How does KMS work? ›

AWS KMS generates the data key. Then it encrypts a copy of the data key under a symmetric encryption KMS key that you specify. The operation returns a plaintext copy of the data key and the copy of the data key encrypted under the KMS key.

Which functions can users perform using AWS KMS? ›

You can use your KMS keys in cryptographic operations. For examples, see Programming the AWS KMS API. Encrypt, decrypt, and re-encrypt data with symmetric or asymmetric KMS keys. Sign and verify messages with asymmetric KMS keys.

What encryption algorithm does AWS KMS use? ›

For instance, AWS Key Management Service uses the Advanced Encryption Standard (AES) algorithm in Galois/Counter Mode (GCM) with 256-bit secret keys. An encryption scheme is called symmetric if it uses the same key to both encrypt and decrypt a message.

Is KMS server legal? ›

Activation servers (KMS) through an organization or educational institution is legal, and should be used for those intents and purposes.

Is KMS tool legal? ›

Unauthorized Activation: Activating software through an unknown KMS host server may involve using unauthorized methods or tools. This can violate the terms of service set by Microsoft and may be considered as piracy or illegal activity [3].

What is the difference between KMS and secrets manager? ›

AWS KMS returns a plaintext data key and a copy of that data key encrypted under the KMS key. Secrets Manager uses the plaintext data key and the Advanced Encryption Standard (AES) algorithm to encrypt the secret value outside of AWS KMS. It removes the plaintext key from memory as soon as possible after using it.

Do KMS keys expire? ›

Yes. Once you import your key to an AWS KMS key, you will receive a CloudWatch Metric every few minutes that counts down the time to expiration of the imported key. You will also receive a CloudWatch Event once the imported key under your AWS KMS key expires.

Is KMS activation permanent? ›

KMS activations are valid for 180 days (the activation validity interval). To remain activated, KMS client computers must renew their activation by connecting to the KMS host at least once every 180 days.

What is the difference between data key and KMS key? ›

AWS KMS does not store or manage data keys, and you cannot use AWS KMS to encrypt or decrypt with data keys. To use data keys to encrypt and decrypt, use the AWS Encryption SDK. KMS keys are backed by FIPS-validated hardware service modules (HSMs) that AWS KMS manages.

Who has access to KMS keys? ›

KMS keys belong to the AWS account in which they were created. However, no identity or principal, including the AWS account root user, has permission to use or manage a KMS key unless that permission is explicitly provided in a key policy, IAM policy or grant.

When to use AWS KMS? ›

Key Management Service is used to encrypt data in AWS. The main purpose of the AWS KMS is to store and manage those encryption keys. Data encryption is vital if you have sensitive data that must not be accessed by unauthorized users. Implement data encryption for both data at rest and data in transit.

What is the difference between S3 and KMS encryption? ›

SSE-KMS is similar to SSE-S3 but comes with some additional benefits over SSE-S3. Unlike SSE-S3 you can create and manage encryption keys yourself or you can use a default CMK key that is unique to you for the service that is being used (S3 in this case) and the region you are working in.

What is the size limit for KMS? ›

Encrypts plaintext of up to 4,096 bytes using a KMS key.

How to decrypt KMS key? ›

Example 1: To decrypt an encrypted message with a symmetric KMS key (Linux and macOS)
  1. Specify the KMS key to decrypt the ciphertext. The --key-id parameter is not required when decrypting with a symmetric KMS key. ...
  2. Request the plaintext output as a text value. ...
  3. Base64-decode the plaintext and save it in a file.

What is the difference between KMS and ADBA? ›

Flexibility: ADBA is more flexible than KMS because it can activate products across multiple domains and forests. This means that you can use ADBA to activate products for users in different parts of your organization without having to set up separate activation servers for each domain.

Is KMS Windows safe? ›

KMS is a legitimate way to activate Windows licenses in client computers, especially en masse (volume activation). There is even a Microsoft document on creating a KMS activation host. A KMS client connects to a KMS server (the activation host), which contains the host key the client uses for activation.

Can KMS activate Windows? ›

A KMS host running on a Windows Server operating system can activate computers running both server and client operating systems. However, a KMS host running on a Windows client operating system can only activate computers also running client operating systems.

How do I open the KMS server console? ›

Here are the steps to find your KMS server:
  1. Open a Command Prompt window with administrative privileges. ...
  2. Type the following command and press Enter:slmgr /dlvThis will open the Software Licensing Management Tool (slmgr), which displays detailed information about the current licensing status of Windows.
Apr 15, 2023

Top Articles
Latest Posts
Article information

Author: Pres. Carey Rath

Last Updated:

Views: 6387

Rating: 4 / 5 (41 voted)

Reviews: 88% of readers found this page helpful

Author information

Name: Pres. Carey Rath

Birthday: 1997-03-06

Address: 14955 Ledner Trail, East Rodrickfort, NE 85127-8369

Phone: +18682428114917

Job: National Technology Representative

Hobby: Sand art, Drama, Web surfing, Cycling, Brazilian jiu-jitsu, Leather crafting, Creative writing

Introduction: My name is Pres. Carey Rath, I am a faithful, funny, vast, joyous, lively, brave, glamorous person who loves writing and wants to share my knowledge and understanding with you.