404

[ Avaa Bypassed ]




Upload:

Command:

botdev@3.149.253.148: ~ $
**Example 1: To get details about an AWS CloudHSM key store**

The following ``describe-custom-key-store`` example displays details about the specified AWS CloudHSM key store. The command is the same for all types of custom key stores, but the output differs with the key store type and, for an external key store, its connectivity option.

By default, this command displays information about all custom key stores in the account and Region. To display information about a particular custom key store, use the ``custom-key-store-name`` or ``custom-key-store-id`` parameter. ::

    aws kms describe-custom-key-stores \
        --custom-key-store-name ExampleCloudHSMKeyStore

The output of this command includes useful details about the AWS CloudHSM key store including its connection state (``ConnectionState``). If the connection state is ``FAILED``, the output includes a ``ConnectionErrorCode`` field that describes the problem. 

Output::

    {
        "CustomKeyStores": [ 
            { 
                "CloudHsmClusterId": "cluster-1a23b4cdefg",
                "ConnectionState": "CONNECTED",
                "CreationDate": "2022-04-05T14:04:55-07:00",
                "CustomKeyStoreId": "cks-1234567890abcdef0",
                "CustomKeyStoreName": "ExampleExternalKeyStore",
                "TrustAnchorCertificate": "<certificate appears here>"
            }
        ]
    }

For more information, see `Viewing an AWS CloudHSM key store <https://docs.aws.amazon.com/kms/latest/developerguide/view-keystore.html>`__ in the *AWS Key Management Service Developer Guide*.

**Example 2: To get details about an external key store with public endpoint connectivity**

The following ``describe-custom-key-store`` example displays details about the specified external key store. The command is the same for all types of custom key stores, but the output differs with the key store type and, for an external key store, its connectivity option.

By default, this command displays information about all custom key stores in the account and Region. To display information about a particular custom key store, use the ``custom-key-store-name`` or ``custom-key-store-id`` parameter. ::

    aws kms describe-custom-key-stores \
        --custom-key-store-id cks-9876543210fedcba9

The output of this command includes useful details about the external key store including its connection state (``ConnectionState``). If the connection state is ``FAILED``, the output includes a ``ConnectionErrorCode`` field that describes the problem. 

Output::

    {
        "CustomKeyStores": [ 
            { 
                "CustomKeyStoreId": "cks-9876543210fedcba9",
                "CustomKeyStoreName": "ExampleXKS",
                "ConnectionState": "CONNECTED",    
                "CreationDate": "2022-12-02T07:48:55-07:00",
                "CustomKeyStoreType": "EXTERNAL_KEY_STORE",
                "XksProxyConfiguration": { 
                    "AccessKeyId": "ABCDE12345670EXAMPLE",
                    "Connectivity": "PUBLIC_ENDPOINT",
                    "UriEndpoint": "https://myproxy.xks.example.com",
                    "UriPath": "/example-prefix/kms/xks/v1"
                }
            }
        ]
    }

For more information, see `Viewing an external key store <https://docs.aws.amazon.com/kms/latest/developerguide/view-xks-keystore.html>`__ in the *AWS Key Management Service Developer Guide*.

**Example 3: To get details about an external key store with VPC endpoint service connectivity**

The following ``describe-custom-key-store`` example displays details about the specified external key store. The command is the same for all types of custom key stores, but the output differs with the key store type and, for an external key store, its connectivity option.

By default, this command displays information about all custom key stores in the account and Region. To display information about a particular custom key store, use the ``custom-key-store-name`` or ``custom-key-store-id`` parameter. ::

    aws kms describe-custom-key-stores \
        --custom-key-store-id cks-2234567890abcdef0

The output of this command includes useful details about the external key store including its connection state (``ConnectionState``). If the connection state is ``FAILED``, the output includes a ``ConnectionErrorCode`` field that describes the problem. 

Output::

    {
        "CustomKeyStores": [ 
            { 
                "CustomKeyStoreId": "cks-3234567890abcdef0",
                "CustomKeyStoreName": "ExampleVPCExternalKeyStore",
                "ConnectionState": "CONNECTED",
                "CreationDate": "2022-12-22T07:48:55-07:00",
                "CustomKeyStoreType": "EXTERNAL_KEY_STORE",
                "XksProxyConfiguration": { 
                    "AccessKeyId": "ABCDE12345670EXAMPLE",
                    "Connectivity": "VPC_ENDPOINT_SERVICE",
                    "UriEndpoint": "https://myproxy-private.xks.example.com",
                    "UriPath": "/kms/xks/v1",
                    "VpcEndpointServiceName": "com.amazonaws.vpce.us-east-1.vpce-svc-example1"
                }
            }
        ]
    }

For more information, see `Viewing an external key store <https://docs.aws.amazon.com/kms/latest/developerguide/view-xks-keystore.html>`__ in the *AWS Key Management Service Developer Guide*.

Filemanager

Name Type Size Permission Actions
cancel-key-deletion.rst File 884 B 0644
connect-custom-key-store.rst File 1.08 KB 0755
create-alias.rst File 729 B 0644
create-custom-key-store.rst File 3.75 KB 0755
create-grant.rst File 1.18 KB 0755
create-key.rst File 12.17 KB 0644
decrypt.rst File 4.44 KB 0644
delete-alias.rst File 502 B 0644
delete-custom-key-store.rst File 1.47 KB 0755
delete-imported-key-material.rst File 656 B 0644
describe-custom-key-stores.rst File 5.32 KB 0755
describe-key.rst File 5.76 KB 0644
disable-key-rotation.rst File 679 B 0644
disable-key.rst File 503 B 0644
disconnect-custom-key-store.rst File 1.25 KB 0644
enable-key-rotation.rst File 708 B 0644
enable-key.rst File 1.02 KB 0644
encrypt.rst File 3.47 KB 0644
generate-data-key-pair-without-plaintext.rst File 1.66 KB 0644
generate-data-key-pair.rst File 1.73 KB 0644
generate-data-key-without-plaintext.rst File 1.35 KB 0644
generate-data-key.rst File 3.17 KB 0644
generate-random.rst File 3.16 KB 0644
get-key-policy.rst File 956 B 0644
get-key-rotation-status.rst File 656 B 0644
get-parameters-for-import.rst File 1.36 KB 0644
get-public-key.rst File 2.31 KB 0644
import-key-material.rst File 1.51 KB 0644
list-aliases.rst File 2.72 KB 0755
list-grants.rst File 2.55 KB 0755
list-key-policies.rst File 926 B 0644
list-keys.rst File 1.04 KB 0644
list-resource-tags.rst File 980 B 0644
list-retirable-grants.rst File 2.92 KB 0644
put-key-policy.rst File 3.44 KB 0755
re-encrypt.rst File 3.82 KB 0644
retire-grant.rst File 810 B 0644
revoke-grant.rst File 776 B 0644
schedule-key-deletion.rst File 1.44 KB 0644
sign.rst File 3.08 KB 0644
tag-resource.rst File 891 B 0644
untag-resource.rst File 836 B 0644
update-alias.rst File 814 B 0644
update-custom-key-store.rst File 6.61 KB 0755
update-key-description.rst File 1.85 KB 0644
verify.rst File 1.38 KB 0644