404

[ Avaa Bypassed ]




Upload:

Command:

botdev@3.140.188.79: ~ $
**Example 1: To list all aliases in an AWS account and Region**

The following example uses the ``list-aliases`` command to list all aliases in the default Region of the AWS account. The output includes aliases associated with AWS managed KMS keys and customer managed KMS keys. ::

    aws kms list-aliases

Output::

    {
        "Aliases": [
            {
                "AliasArn": "arn:aws:kms:us-west-2:111122223333:alias/testKey",
                "AliasName": "alias/testKey",
                "TargetKeyId": "1234abcd-12ab-34cd-56ef-1234567890ab"
            },
            {
                "AliasArn": "arn:aws:kms:us-west-2:111122223333:alias/FinanceDept",
                "AliasName": "alias/FinanceDept",
                "TargetKeyId": "0987dcba-09fe-87dc-65ba-ab0987654321"
            },
            {
                "AliasArn": "arn:aws:kms:us-west-2:111122223333:alias/aws/dynamodb",
                "AliasName": "alias/aws/dynamodb",
                "TargetKeyId": "1a2b3c4d-5e6f-1a2b-3c4d-5e6f1a2b3c4d"
            },
            {
                "AliasArn": "arn:aws:kms:us-west-2:111122223333:alias/aws/ebs",
                "AliasName": "alias/aws/ebs",
                "TargetKeyId": "0987ab65-43cd-21ef-09ab-87654321cdef"
            },
            ...
        ]
    }

**Example 2: To list all aliases for a particular KMS key**

The following example uses the ``list-aliases`` command and its ``key-id`` parameter to list all aliases that are associated with a particular KMS key.

Each alias is associated with only one KMS key, but a KMS key can have multiple aliases. This command is very useful because the AWS KMS console lists only one alias for each KMS key. To find all aliases for a KMS key, you must use the ``list-aliases`` command.

This example uses the key ID of the KMS key for the ``--key-id`` parameter, but you can use a key ID, key ARN, alias name, or alias ARN in this command. ::

    aws kms list-aliases --key-id 1234abcd-12ab-34cd-56ef-1234567890ab

Output::

    {
        "Aliases": [
            {
                "TargetKeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
                "AliasArn": "arn:aws:kms:us-west-2:111122223333:alias/oregon-test-key",
                "AliasName": "alias/oregon-test-key"
            },
            {
                "TargetKeyId": "1234abcd-12ab-34cd-56ef-1234567890ab",
                "AliasArn": "arn:aws:kms:us-west-2:111122223333:alias/project121-test",
                "AliasName": "alias/project121-test"
            }
        ]
    }

For more information, see `Working with Aliases <https://docs.aws.amazon.com/kms/latest/developerguide/programming-aliases.html>`__ in the *AWS Key Management Service Developer Guide*.

Filemanager

Name Type Size Permission Actions
cancel-key-deletion.rst File 884 B 0644
connect-custom-key-store.rst File 1.08 KB 0755
create-alias.rst File 729 B 0644
create-custom-key-store.rst File 3.75 KB 0755
create-grant.rst File 1.18 KB 0755
create-key.rst File 12.17 KB 0644
decrypt.rst File 4.44 KB 0644
delete-alias.rst File 502 B 0644
delete-custom-key-store.rst File 1.47 KB 0755
delete-imported-key-material.rst File 656 B 0644
describe-custom-key-stores.rst File 5.32 KB 0755
describe-key.rst File 5.76 KB 0644
disable-key-rotation.rst File 679 B 0644
disable-key.rst File 503 B 0644
disconnect-custom-key-store.rst File 1.25 KB 0644
enable-key-rotation.rst File 708 B 0644
enable-key.rst File 1.02 KB 0644
encrypt.rst File 3.47 KB 0644
generate-data-key-pair-without-plaintext.rst File 1.66 KB 0644
generate-data-key-pair.rst File 1.73 KB 0644
generate-data-key-without-plaintext.rst File 1.35 KB 0644
generate-data-key.rst File 3.17 KB 0644
generate-random.rst File 3.16 KB 0644
get-key-policy.rst File 956 B 0644
get-key-rotation-status.rst File 656 B 0644
get-parameters-for-import.rst File 1.36 KB 0644
get-public-key.rst File 2.31 KB 0644
import-key-material.rst File 1.51 KB 0644
list-aliases.rst File 2.72 KB 0755
list-grants.rst File 2.55 KB 0755
list-key-policies.rst File 926 B 0644
list-keys.rst File 1.04 KB 0644
list-resource-tags.rst File 980 B 0644
list-retirable-grants.rst File 2.92 KB 0644
put-key-policy.rst File 3.44 KB 0755
re-encrypt.rst File 3.82 KB 0644
retire-grant.rst File 810 B 0644
revoke-grant.rst File 776 B 0644
schedule-key-deletion.rst File 1.44 KB 0644
sign.rst File 3.08 KB 0644
tag-resource.rst File 891 B 0644
untag-resource.rst File 836 B 0644
update-alias.rst File 814 B 0644
update-custom-key-store.rst File 6.61 KB 0755
update-key-description.rst File 1.85 KB 0644
verify.rst File 1.38 KB 0644