Recurring Key Exchange walkthrough
-
- UpdatedJan 30, 2025
- 3 minutes to read
- Yokohama
- Now Platform Security
Use this walkthrough to set up a recurring key exchange in your instance using and Resource Exchange.
Before you begin
Roles required: sn_kmf.cryptographic_manager
About this task
This example shows you how a target instance requests keys from a host instance.
- Before you can perform this procedure, you must clone an instance. See System clone for more information.
- Automatic Key Exchange: The base system property glide_encryption.auto_key_exchange.enabled is true by default, meaning that automatic is activated when cloning an instance. The property is cloned over to the target instance.
- Turn off automatic by setting the property to false.
Procedure
Result
After a key exchange is attempted, your non-production instance updates the protected.script.values.kmf.rekeyed system property. This property is visible in the System Properties [sys_properties] table. If the encryption using the exchanged key is successful, this property has a value of true. Otherwise, the property has a value of false. If the value is false, your instance will attempt to encrypt again the next day.