Optional awsConfiguration options for using 'aws' as your KMS provider
The access key used for the AWS KMS provider
The secret access key used for the AWS KMS provider
Optional sessionAn optional AWS session token that will be used as the X-Amz-Security-Token header for AWS requests.
Optional azureConfiguration options for using 'azure' as your KMS provider
The client ID to authenticate a registered application
The client secret to authenticate a registered application
Optional identityIf present, a host with optional port. E.g. "example.com" or "example.com:443". This is optional, and only needed if customer is using a non-commercial Azure instance (e.g. a government or China account, which use different URLs). Defaults to "login.microsoftonline.com"
The tenant ID identifies the organization for the account
If present, an access token to authenticate with Azure.
Optional gcpConfiguration options for using 'gcp' as your KMS provider
The service account email to authenticate
Optional endpoint?: stringIf present, a host with optional port. E.g. "example.com" or "example.com:443". Defaults to "oauth2.googleapis.com"
A PKCS#8 encrypted key. This can either be a base64 string or a binary representation
If present, an access token to authenticate with GCP.
Optional kmipConfiguration options for using 'kmip' as your KMS provider
Optional endpoint?: stringThe output endpoint string. The endpoint consists of a hostname and port separated by a colon. E.g. "example.com:123". A port is always present.
Optional localConfiguration options for using 'local' as your KMS provider
The master key used to encrypt/decrypt data keys. A 96-byte long Buffer or base64 encoded string.
Generated using TypeDoc
Configuration options that are used by specific KMS providers during key generation, encryption, and decryption.