Configure Key Exchange
-
- UpdatedFeb 1, 2024
- 3 minutes to read
- Washington DC
- Now Platform Security
Key Management Framework (KMF) generates automatic key exchange requests for supported cryptographic modules during the fresh installation or upgrade of the instance. manages the data encryption key locally for the instance.
Before you begin
A cryptographic module with a key must be created in both the target and source instances before using Key Exchange.
Role required: sn_kmf.cryptographic_manager
About this task
Key Exchange requests are initiated from the target instance.
Automatic Key Exchange is active by default when cloning an instance, where the property is cloned to the target instance. Along with KMF, configure system properties to manage how keys are handled during an instance clone:
- Turn off automatic key exchange: Set the glide_encryption.auto_key_exchange.enabled property to false for recurring clone requests.
- Send auto key exchange requests: Set this property to true.
Procedure
Result
After a key exchange is attempted, your non-production instance updates the protected.script.values.kmf.rekeyed system property. This property is visible in the System Properties [sys_properties] table after a key exchange is attempted. If the encryption using the exchanged key is successful, this property has a value of true. Otherwise, the property has a value of false. If the value is false, the instance will attempt to encrypt again the next day.