Enabling Key for Rotation Job
Use the post /v1/cckm/aws/keys/{id}/enable-rotation-job
API to enable an AWS key for scheduled rotation job. To use this API, first create a new rotation job configuration, the job_config_id
is required to call this API. Refer to Scheduling Key Rotation for details.
Syntax
Here, {id}
represents the key ID.
Request Parameters
Parameter | Type | Description |
---|---|---|
AUTHTOKEN | string | Authorization token. |
auto_rotate_domain_id | string | ID of the domain in which the DSM key will be created. |
auto_rotate_key_source | string | Source of the key material. Possible options are: • local for CipherTrust Manager (default)• dsm for Data Security Manager• hsm-luna for Luna HSM (FM-enabled Luna HSM is not supported as a key source).• external-cm for external CipherTrust Manager |
job_config_id | string | ID of the scheduler configuration job that will schedule the key rotation. |
auto_rotate_disable_encrypt | boolean | Flag to disable encryption on the old key. |
auto_rotate_external_cm_domain_id (optional) | string | ID of the external CipherTrust Manager domain in which the external CipherTrust Manager key will be created. |
auto_rotate_disable_encrypt_on_all_accounts (optional) | boolean | Disable encryption permissions on the old key for all the accounts. Parameters auto_rotate_disable_encrypt and auto_rotate_disable_encrypt_on_all_accounts are mutually exclusive. Specify either auto_rotate_disable_encrypt or auto_rotate_disable_encrypt_on_all_accounts. |
Example Request
Example Response
The sample output shows that the key (with ID a22742b4-2ad9-4f4a-9103-3507bed1420e
) is enabled for the scheduled key rotation.
To know more about response parameters, refer to Response Parameters of Key Life Cycle Management APIs.
Response Codes
Response Code | Description |
---|---|
2xx | Success |
4xx | Client errors |
5xx | Server errors |
Refer to HTTP status codes for details.