kes key dek
Overview
Generate a new data encryption key (DEK) from a secret key on the KES server.
The output of the command includes both a plaintext key and a ciphertext representation. The output resembles the following:
plaintext: kk/+NxO1LHb9ilbai7B9qo60649zNPmSVuJ2akEJFQ4=
ciphertext: lbFBRVMyNTYtR0NNX1NIQTI1NtkgMTRlYjE3YWVjMTBjZDMxYTZiYzAwNmJhODFkNjM1ODnEEKOclQFBMYNZ3dVJPCrldAHEDLkZD9YgLpFW77+8b8Qw7Tn/6tFhyYUoFzS4+jYv8ty/Y5bqKzU6lPUEq/O8xEnYs92wEyvdSfTpTDEH8a8Q
To encrypt or decrypt the keys, use kes key encrypt
or kes key decrypt
.
Syntax
key key dek
<name> \
[<context>] \
[--insecure, -k]
Parameters
name
Required
The short identifier for the key to use for the data encryption key.
context
Optional
The context value to scope the request for a data encryption key.
You create contexts in the kubeconfig
file of a Kubernetes deployment to define a set of cluster, namespace, and user configuration to use.
--insecure, -k
Optional
Directs the command to skip x.509 certificate validation during the TLS handshake with the KES server. This allows connections to KES servers using untrusted certificates (i.e. self-signed or issued by an unknown Certificate Authority).
MinIO strongly recommends against using this option in production environments.
Examples
kes key dek my-key