Optional
awsConfiguration options for using 'aws' as your KMS provider
The access key used for the AWS KMS provider
The secret access key used for the AWS KMS provider
Optional
sessionAn optional AWS session token that will be used as the X-Amz-Security-Token header for AWS requests.
Optional
azureConfiguration options for using 'azure' as your KMS provider
The client ID to authenticate a registered application
The client secret to authenticate a registered application
Optional
identityIf present, a host with optional port. E.g. "example.com" or "example.com:443". This is optional, and only needed if customer is using a non-commercial Azure instance (e.g. a government or China account, which use different URLs). Defaults to "login.microsoftonline.com"
The tenant ID identifies the organization for the account
If present, an access token to authenticate with Azure.
Optional
gcpConfiguration options for using 'gcp' as your KMS provider
The service account email to authenticate
Optional
endpoint?: stringIf present, a host with optional port. E.g. "example.com" or "example.com:443". Defaults to "oauth2.googleapis.com"
A PKCS#8 encrypted key. This can either be a base64 string or a binary representation
If present, an access token to authenticate with GCP.
Optional
kmipConfiguration options for using 'kmip' as your KMS provider
Optional
endpoint?: stringThe output endpoint string. The endpoint consists of a hostname and port separated by a colon. E.g. "example.com:123". A port is always present.
Optional
localConfiguration options for using 'local' as your KMS provider
The master key used to encrypt/decrypt data keys. A 96-byte long Buffer or base64 encoded string.
Generated using TypeDoc
Configuration options that are used by specific KMS providers during key generation, encryption, and decryption.