public interface AWSKMSAsync extends AWSKMS
AsyncHandler
can be used to receive notification when
an asynchronous operation completes.
Note: Do not directly implement this interface, new methods are added to it regularly. Extend from
AbstractAWSKMSAsync
instead.
AWS Key Management Service (AWS KMS) is an encryption and key management web service. This guide describes the AWS KMS operations that you can call programmatically. For general information about AWS KMS, see the AWS Key Management Service Developer Guide.
AWS provides SDKs that consist of libraries and sample code for various programming languages and platforms (Java, Ruby, .Net, iOS, Android, etc.). The SDKs provide a convenient way to create programmatic access to AWS KMS and other AWS services. For example, the SDKs take care of tasks such as signing requests (see below), managing errors, and retrying requests automatically. For more information about the AWS SDKs, including how to download and install them, see Tools for Amazon Web Services.
We recommend that you use the AWS SDKs to make programmatic API calls to AWS KMS.
Clients must support TLS (Transport Layer Security) 1.0. We recommend TLS 1.2. Clients must also support cipher suites with Perfect Forward Secrecy (PFS) such as Ephemeral Diffie-Hellman (DHE) or Elliptic Curve Ephemeral Diffie-Hellman (ECDHE). Most modern systems such as Java 7 and later support these modes.
Signing Requests
Requests must be signed by using an access key ID and a secret access key. We strongly recommend that you do not use your AWS account (root) access key ID and secret key for everyday work with AWS KMS. Instead, use the access key ID and secret access key for an IAM user, or you can use the AWS Security Token Service to generate temporary security credentials that you can use to sign requests.
All AWS KMS operations require Signature Version 4.
Logging API Requests
AWS KMS supports AWS CloudTrail, a service that logs AWS API calls and related events for your AWS account and delivers them to an Amazon S3 bucket that you specify. By using the information collected by CloudTrail, you can determine what requests were made to AWS KMS, who made the request, when it was made, and so on. To learn more about CloudTrail, including how to turn it on and find your log files, see the AWS CloudTrail User Guide.
Additional Resources
For more information about credentials and request signing, see the following:
AWS Security Credentials - This topic provides general information about the types of credentials used for accessing AWS.
Temporary Security Credentials - This section of the IAM User Guide describes how to create and use temporary security credentials.
Signature Version 4 Signing Process - This set of topics walks you through the process of signing a request using an access key ID and a secret access key.
Commonly Used APIs
Of the APIs discussed in this guide, the following will prove the most useful for most applications. You will likely perform actions other than these, such as creating keys and assigning policies, by using the console.
ENDPOINT_PREFIX
Modifier and Type | Method and Description |
---|---|
Future<CancelKeyDeletionResult> |
cancelKeyDeletionAsync(CancelKeyDeletionRequest cancelKeyDeletionRequest)
Cancels the deletion of a customer master key (CMK).
|
Future<CancelKeyDeletionResult> |
cancelKeyDeletionAsync(CancelKeyDeletionRequest cancelKeyDeletionRequest,
AsyncHandler<CancelKeyDeletionRequest,CancelKeyDeletionResult> asyncHandler)
Cancels the deletion of a customer master key (CMK).
|
Future<CreateAliasResult> |
createAliasAsync(CreateAliasRequest createAliasRequest)
Creates a display name for a customer master key.
|
Future<CreateAliasResult> |
createAliasAsync(CreateAliasRequest createAliasRequest,
AsyncHandler<CreateAliasRequest,CreateAliasResult> asyncHandler)
Creates a display name for a customer master key.
|
Future<CreateGrantResult> |
createGrantAsync(CreateGrantRequest createGrantRequest)
Adds a grant to a key to specify who can use the key and under what conditions.
|
Future<CreateGrantResult> |
createGrantAsync(CreateGrantRequest createGrantRequest,
AsyncHandler<CreateGrantRequest,CreateGrantResult> asyncHandler)
Adds a grant to a key to specify who can use the key and under what conditions.
|
Future<CreateKeyResult> |
createKeyAsync()
Simplified method form for invoking the CreateKey operation.
|
Future<CreateKeyResult> |
createKeyAsync(AsyncHandler<CreateKeyRequest,CreateKeyResult> asyncHandler)
Simplified method form for invoking the CreateKey operation with an AsyncHandler.
|
Future<CreateKeyResult> |
createKeyAsync(CreateKeyRequest createKeyRequest)
Creates a customer master key (CMK).
|
Future<CreateKeyResult> |
createKeyAsync(CreateKeyRequest createKeyRequest,
AsyncHandler<CreateKeyRequest,CreateKeyResult> asyncHandler)
Creates a customer master key (CMK).
|
Future<DecryptResult> |
decryptAsync(DecryptRequest decryptRequest)
Decrypts ciphertext.
|
Future<DecryptResult> |
decryptAsync(DecryptRequest decryptRequest,
AsyncHandler<DecryptRequest,DecryptResult> asyncHandler)
Decrypts ciphertext.
|
Future<DeleteAliasResult> |
deleteAliasAsync(DeleteAliasRequest deleteAliasRequest)
Deletes the specified alias.
|
Future<DeleteAliasResult> |
deleteAliasAsync(DeleteAliasRequest deleteAliasRequest,
AsyncHandler<DeleteAliasRequest,DeleteAliasResult> asyncHandler)
Deletes the specified alias.
|
Future<DeleteImportedKeyMaterialResult> |
deleteImportedKeyMaterialAsync(DeleteImportedKeyMaterialRequest deleteImportedKeyMaterialRequest)
Deletes key material that you previously imported and makes the specified customer master key (CMK) unusable.
|
Future<DeleteImportedKeyMaterialResult> |
deleteImportedKeyMaterialAsync(DeleteImportedKeyMaterialRequest deleteImportedKeyMaterialRequest,
AsyncHandler<DeleteImportedKeyMaterialRequest,DeleteImportedKeyMaterialResult> asyncHandler)
Deletes key material that you previously imported and makes the specified customer master key (CMK) unusable.
|
Future<DescribeKeyResult> |
describeKeyAsync(DescribeKeyRequest describeKeyRequest)
Provides detailed information about the specified customer master key.
|
Future<DescribeKeyResult> |
describeKeyAsync(DescribeKeyRequest describeKeyRequest,
AsyncHandler<DescribeKeyRequest,DescribeKeyResult> asyncHandler)
Provides detailed information about the specified customer master key.
|
Future<DisableKeyResult> |
disableKeyAsync(DisableKeyRequest disableKeyRequest)
Sets the state of a customer master key (CMK) to disabled, thereby preventing its use for cryptographic
operations.
|
Future<DisableKeyResult> |
disableKeyAsync(DisableKeyRequest disableKeyRequest,
AsyncHandler<DisableKeyRequest,DisableKeyResult> asyncHandler)
Sets the state of a customer master key (CMK) to disabled, thereby preventing its use for cryptographic
operations.
|
Future<DisableKeyRotationResult> |
disableKeyRotationAsync(DisableKeyRotationRequest disableKeyRotationRequest)
Disables rotation of the specified key.
|
Future<DisableKeyRotationResult> |
disableKeyRotationAsync(DisableKeyRotationRequest disableKeyRotationRequest,
AsyncHandler<DisableKeyRotationRequest,DisableKeyRotationResult> asyncHandler)
Disables rotation of the specified key.
|
Future<EnableKeyResult> |
enableKeyAsync(EnableKeyRequest enableKeyRequest)
Marks a key as enabled, thereby permitting its use.
|
Future<EnableKeyResult> |
enableKeyAsync(EnableKeyRequest enableKeyRequest,
AsyncHandler<EnableKeyRequest,EnableKeyResult> asyncHandler)
Marks a key as enabled, thereby permitting its use.
|
Future<EnableKeyRotationResult> |
enableKeyRotationAsync(EnableKeyRotationRequest enableKeyRotationRequest)
Enables rotation of the specified customer master key.
|
Future<EnableKeyRotationResult> |
enableKeyRotationAsync(EnableKeyRotationRequest enableKeyRotationRequest,
AsyncHandler<EnableKeyRotationRequest,EnableKeyRotationResult> asyncHandler)
Enables rotation of the specified customer master key.
|
Future<EncryptResult> |
encryptAsync(EncryptRequest encryptRequest)
Encrypts plaintext into ciphertext by using a customer master key.
|
Future<EncryptResult> |
encryptAsync(EncryptRequest encryptRequest,
AsyncHandler<EncryptRequest,EncryptResult> asyncHandler)
Encrypts plaintext into ciphertext by using a customer master key.
|
Future<GenerateDataKeyResult> |
generateDataKeyAsync(GenerateDataKeyRequest generateDataKeyRequest)
Returns a data encryption key that you can use in your application to encrypt data locally.
|
Future<GenerateDataKeyResult> |
generateDataKeyAsync(GenerateDataKeyRequest generateDataKeyRequest,
AsyncHandler<GenerateDataKeyRequest,GenerateDataKeyResult> asyncHandler)
Returns a data encryption key that you can use in your application to encrypt data locally.
|
Future<GenerateDataKeyWithoutPlaintextResult> |
generateDataKeyWithoutPlaintextAsync(GenerateDataKeyWithoutPlaintextRequest generateDataKeyWithoutPlaintextRequest)
Returns a data encryption key encrypted under a customer master key (CMK).
|
Future<GenerateDataKeyWithoutPlaintextResult> |
generateDataKeyWithoutPlaintextAsync(GenerateDataKeyWithoutPlaintextRequest generateDataKeyWithoutPlaintextRequest,
AsyncHandler<GenerateDataKeyWithoutPlaintextRequest,GenerateDataKeyWithoutPlaintextResult> asyncHandler)
Returns a data encryption key encrypted under a customer master key (CMK).
|
Future<GenerateRandomResult> |
generateRandomAsync()
Simplified method form for invoking the GenerateRandom operation.
|
Future<GenerateRandomResult> |
generateRandomAsync(AsyncHandler<GenerateRandomRequest,GenerateRandomResult> asyncHandler)
Simplified method form for invoking the GenerateRandom operation with an AsyncHandler.
|
Future<GenerateRandomResult> |
generateRandomAsync(GenerateRandomRequest generateRandomRequest)
Generates an unpredictable byte string.
|
Future<GenerateRandomResult> |
generateRandomAsync(GenerateRandomRequest generateRandomRequest,
AsyncHandler<GenerateRandomRequest,GenerateRandomResult> asyncHandler)
Generates an unpredictable byte string.
|
Future<GetKeyPolicyResult> |
getKeyPolicyAsync(GetKeyPolicyRequest getKeyPolicyRequest)
Retrieves a policy attached to the specified key.
|
Future<GetKeyPolicyResult> |
getKeyPolicyAsync(GetKeyPolicyRequest getKeyPolicyRequest,
AsyncHandler<GetKeyPolicyRequest,GetKeyPolicyResult> asyncHandler)
Retrieves a policy attached to the specified key.
|
Future<GetKeyRotationStatusResult> |
getKeyRotationStatusAsync(GetKeyRotationStatusRequest getKeyRotationStatusRequest)
Retrieves a Boolean value that indicates whether key rotation is enabled for the specified key.
|
Future<GetKeyRotationStatusResult> |
getKeyRotationStatusAsync(GetKeyRotationStatusRequest getKeyRotationStatusRequest,
AsyncHandler<GetKeyRotationStatusRequest,GetKeyRotationStatusResult> asyncHandler)
Retrieves a Boolean value that indicates whether key rotation is enabled for the specified key.
|
Future<GetParametersForImportResult> |
getParametersForImportAsync(GetParametersForImportRequest getParametersForImportRequest)
Returns the items you need in order to import key material into AWS KMS from your existing key management
infrastructure.
|
Future<GetParametersForImportResult> |
getParametersForImportAsync(GetParametersForImportRequest getParametersForImportRequest,
AsyncHandler<GetParametersForImportRequest,GetParametersForImportResult> asyncHandler)
Returns the items you need in order to import key material into AWS KMS from your existing key management
infrastructure.
|
Future<ImportKeyMaterialResult> |
importKeyMaterialAsync(ImportKeyMaterialRequest importKeyMaterialRequest)
Imports key material into an AWS KMS customer master key (CMK) from your existing key management infrastructure.
|
Future<ImportKeyMaterialResult> |
importKeyMaterialAsync(ImportKeyMaterialRequest importKeyMaterialRequest,
AsyncHandler<ImportKeyMaterialRequest,ImportKeyMaterialResult> asyncHandler)
Imports key material into an AWS KMS customer master key (CMK) from your existing key management infrastructure.
|
Future<ListAliasesResult> |
listAliasesAsync()
Simplified method form for invoking the ListAliases operation.
|
Future<ListAliasesResult> |
listAliasesAsync(AsyncHandler<ListAliasesRequest,ListAliasesResult> asyncHandler)
Simplified method form for invoking the ListAliases operation with an AsyncHandler.
|
Future<ListAliasesResult> |
listAliasesAsync(ListAliasesRequest listAliasesRequest)
Lists all of the key aliases in the account.
|
Future<ListAliasesResult> |
listAliasesAsync(ListAliasesRequest listAliasesRequest,
AsyncHandler<ListAliasesRequest,ListAliasesResult> asyncHandler)
Lists all of the key aliases in the account.
|
Future<ListGrantsResult> |
listGrantsAsync(ListGrantsRequest listGrantsRequest)
List the grants for a specified key.
|
Future<ListGrantsResult> |
listGrantsAsync(ListGrantsRequest listGrantsRequest,
AsyncHandler<ListGrantsRequest,ListGrantsResult> asyncHandler)
List the grants for a specified key.
|
Future<ListKeyPoliciesResult> |
listKeyPoliciesAsync(ListKeyPoliciesRequest listKeyPoliciesRequest)
Retrieves a list of policies attached to a key.
|
Future<ListKeyPoliciesResult> |
listKeyPoliciesAsync(ListKeyPoliciesRequest listKeyPoliciesRequest,
AsyncHandler<ListKeyPoliciesRequest,ListKeyPoliciesResult> asyncHandler)
Retrieves a list of policies attached to a key.
|
Future<ListKeysResult> |
listKeysAsync()
Simplified method form for invoking the ListKeys operation.
|
Future<ListKeysResult> |
listKeysAsync(AsyncHandler<ListKeysRequest,ListKeysResult> asyncHandler)
Simplified method form for invoking the ListKeys operation with an AsyncHandler.
|
Future<ListKeysResult> |
listKeysAsync(ListKeysRequest listKeysRequest)
Lists the customer master keys.
|
Future<ListKeysResult> |
listKeysAsync(ListKeysRequest listKeysRequest,
AsyncHandler<ListKeysRequest,ListKeysResult> asyncHandler)
Lists the customer master keys.
|
Future<ListRetirableGrantsResult> |
listRetirableGrantsAsync(ListRetirableGrantsRequest listRetirableGrantsRequest)
Returns a list of all grants for which the grant's
RetiringPrincipal matches the one specified. |
Future<ListRetirableGrantsResult> |
listRetirableGrantsAsync(ListRetirableGrantsRequest listRetirableGrantsRequest,
AsyncHandler<ListRetirableGrantsRequest,ListRetirableGrantsResult> asyncHandler)
Returns a list of all grants for which the grant's
RetiringPrincipal matches the one specified. |
Future<PutKeyPolicyResult> |
putKeyPolicyAsync(PutKeyPolicyRequest putKeyPolicyRequest)
Attaches a key policy to the specified customer master key (CMK).
|
Future<PutKeyPolicyResult> |
putKeyPolicyAsync(PutKeyPolicyRequest putKeyPolicyRequest,
AsyncHandler<PutKeyPolicyRequest,PutKeyPolicyResult> asyncHandler)
Attaches a key policy to the specified customer master key (CMK).
|
Future<ReEncryptResult> |
reEncryptAsync(ReEncryptRequest reEncryptRequest)
Encrypts data on the server side with a new customer master key without exposing the plaintext of the data on the
client side.
|
Future<ReEncryptResult> |
reEncryptAsync(ReEncryptRequest reEncryptRequest,
AsyncHandler<ReEncryptRequest,ReEncryptResult> asyncHandler)
Encrypts data on the server side with a new customer master key without exposing the plaintext of the data on the
client side.
|
Future<RetireGrantResult> |
retireGrantAsync()
Simplified method form for invoking the RetireGrant operation.
|
Future<RetireGrantResult> |
retireGrantAsync(AsyncHandler<RetireGrantRequest,RetireGrantResult> asyncHandler)
Simplified method form for invoking the RetireGrant operation with an AsyncHandler.
|
Future<RetireGrantResult> |
retireGrantAsync(RetireGrantRequest retireGrantRequest)
Retires a grant.
|
Future<RetireGrantResult> |
retireGrantAsync(RetireGrantRequest retireGrantRequest,
AsyncHandler<RetireGrantRequest,RetireGrantResult> asyncHandler)
Retires a grant.
|
Future<RevokeGrantResult> |
revokeGrantAsync(RevokeGrantRequest revokeGrantRequest)
Revokes a grant.
|
Future<RevokeGrantResult> |
revokeGrantAsync(RevokeGrantRequest revokeGrantRequest,
AsyncHandler<RevokeGrantRequest,RevokeGrantResult> asyncHandler)
Revokes a grant.
|
Future<ScheduleKeyDeletionResult> |
scheduleKeyDeletionAsync(ScheduleKeyDeletionRequest scheduleKeyDeletionRequest)
Schedules the deletion of a customer master key (CMK).
|
Future<ScheduleKeyDeletionResult> |
scheduleKeyDeletionAsync(ScheduleKeyDeletionRequest scheduleKeyDeletionRequest,
AsyncHandler<ScheduleKeyDeletionRequest,ScheduleKeyDeletionResult> asyncHandler)
Schedules the deletion of a customer master key (CMK).
|
Future<UpdateAliasResult> |
updateAliasAsync(UpdateAliasRequest updateAliasRequest)
Updates an alias to map it to a different key.
|
Future<UpdateAliasResult> |
updateAliasAsync(UpdateAliasRequest updateAliasRequest,
AsyncHandler<UpdateAliasRequest,UpdateAliasResult> asyncHandler)
Updates an alias to map it to a different key.
|
Future<UpdateKeyDescriptionResult> |
updateKeyDescriptionAsync(UpdateKeyDescriptionRequest updateKeyDescriptionRequest)
Updates the description of a key.
|
Future<UpdateKeyDescriptionResult> |
updateKeyDescriptionAsync(UpdateKeyDescriptionRequest updateKeyDescriptionRequest,
AsyncHandler<UpdateKeyDescriptionRequest,UpdateKeyDescriptionResult> asyncHandler)
Updates the description of a key.
|
cancelKeyDeletion, createAlias, createGrant, createKey, createKey, decrypt, deleteAlias, deleteImportedKeyMaterial, describeKey, disableKey, disableKeyRotation, enableKey, enableKeyRotation, encrypt, generateDataKey, generateDataKeyWithoutPlaintext, generateRandom, generateRandom, getCachedResponseMetadata, getKeyPolicy, getKeyRotationStatus, getParametersForImport, importKeyMaterial, listAliases, listAliases, listGrants, listKeyPolicies, listKeys, listKeys, listRetirableGrants, putKeyPolicy, reEncrypt, retireGrant, retireGrant, revokeGrant, scheduleKeyDeletion, setEndpoint, setRegion, shutdown, updateAlias, updateKeyDescription
Future<CancelKeyDeletionResult> cancelKeyDeletionAsync(CancelKeyDeletionRequest cancelKeyDeletionRequest)
Cancels the deletion of a customer master key (CMK). When this operation is successful, the CMK is set to the
Disabled
state. To enable a CMK, use EnableKey.
For more information about scheduling and canceling deletion of a CMK, see Deleting Customer Master Keys in the AWS Key Management Service Developer Guide.
cancelKeyDeletionRequest
- Future<CancelKeyDeletionResult> cancelKeyDeletionAsync(CancelKeyDeletionRequest cancelKeyDeletionRequest, AsyncHandler<CancelKeyDeletionRequest,CancelKeyDeletionResult> asyncHandler)
Cancels the deletion of a customer master key (CMK). When this operation is successful, the CMK is set to the
Disabled
state. To enable a CMK, use EnableKey.
For more information about scheduling and canceling deletion of a CMK, see Deleting Customer Master Keys in the AWS Key Management Service Developer Guide.
cancelKeyDeletionRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<CreateAliasResult> createAliasAsync(CreateAliasRequest createAliasRequest)
Creates a display name for a customer master key. An alias can be used to identify a key and should be unique. The console enforces a one-to-one mapping between the alias and a key. An alias name can contain only alphanumeric characters, forward slashes (/), underscores (_), and dashes (-). An alias must start with the word "alias" followed by a forward slash (alias/). An alias that begins with "aws" after the forward slash (alias/aws...) is reserved by Amazon Web Services (AWS).
The alias and the key it is mapped to must be in the same AWS account and the same region.
To map an alias to a different key, call UpdateAlias.
createAliasRequest
- Future<CreateAliasResult> createAliasAsync(CreateAliasRequest createAliasRequest, AsyncHandler<CreateAliasRequest,CreateAliasResult> asyncHandler)
Creates a display name for a customer master key. An alias can be used to identify a key and should be unique. The console enforces a one-to-one mapping between the alias and a key. An alias name can contain only alphanumeric characters, forward slashes (/), underscores (_), and dashes (-). An alias must start with the word "alias" followed by a forward slash (alias/). An alias that begins with "aws" after the forward slash (alias/aws...) is reserved by Amazon Web Services (AWS).
The alias and the key it is mapped to must be in the same AWS account and the same region.
To map an alias to a different key, call UpdateAlias.
createAliasRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<CreateGrantResult> createGrantAsync(CreateGrantRequest createGrantRequest)
Adds a grant to a key to specify who can use the key and under what conditions. Grants are alternate permission mechanisms to key policies.
For more information about grants, see Grants in the AWS Key Management Service Developer Guide.
createGrantRequest
- Future<CreateGrantResult> createGrantAsync(CreateGrantRequest createGrantRequest, AsyncHandler<CreateGrantRequest,CreateGrantResult> asyncHandler)
Adds a grant to a key to specify who can use the key and under what conditions. Grants are alternate permission mechanisms to key policies.
For more information about grants, see Grants in the AWS Key Management Service Developer Guide.
createGrantRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<CreateKeyResult> createKeyAsync(CreateKeyRequest createKeyRequest)
Creates a customer master key (CMK).
You can use a CMK to encrypt small amounts of data (4 KiB or less) directly, but CMKs are more commonly used to encrypt data encryption keys (DEKs), which are used to encrypt raw data. For more information about DEKs and the difference between CMKs and DEKs, see the following:
The GenerateDataKey operation
AWS Key Management Service Concepts in the AWS Key Management Service Developer Guide
createKeyRequest
- Future<CreateKeyResult> createKeyAsync(CreateKeyRequest createKeyRequest, AsyncHandler<CreateKeyRequest,CreateKeyResult> asyncHandler)
Creates a customer master key (CMK).
You can use a CMK to encrypt small amounts of data (4 KiB or less) directly, but CMKs are more commonly used to encrypt data encryption keys (DEKs), which are used to encrypt raw data. For more information about DEKs and the difference between CMKs and DEKs, see the following:
The GenerateDataKey operation
AWS Key Management Service Concepts in the AWS Key Management Service Developer Guide
createKeyRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<CreateKeyResult> createKeyAsync()
createKeyAsync(CreateKeyRequest)
Future<CreateKeyResult> createKeyAsync(AsyncHandler<CreateKeyRequest,CreateKeyResult> asyncHandler)
Future<DecryptResult> decryptAsync(DecryptRequest decryptRequest)
Decrypts ciphertext. Ciphertext is plaintext that has been previously encrypted by using any of the following functions:
Note that if a caller has been granted access permissions to all keys (through, for example, IAM user policies
that grant Decrypt
permission on all resources), then ciphertext encrypted by using keys in other
accounts where the key grants access to the caller can be decrypted. To remedy this, we recommend that you do not
grant Decrypt
access in an IAM user policy. Instead grant Decrypt
access only in key
policies. If you must grant Decrypt
access in an IAM user policy, you should scope the resource to
specific keys or to specific trusted accounts.
decryptRequest
- Future<DecryptResult> decryptAsync(DecryptRequest decryptRequest, AsyncHandler<DecryptRequest,DecryptResult> asyncHandler)
Decrypts ciphertext. Ciphertext is plaintext that has been previously encrypted by using any of the following functions:
Note that if a caller has been granted access permissions to all keys (through, for example, IAM user policies
that grant Decrypt
permission on all resources), then ciphertext encrypted by using keys in other
accounts where the key grants access to the caller can be decrypted. To remedy this, we recommend that you do not
grant Decrypt
access in an IAM user policy. Instead grant Decrypt
access only in key
policies. If you must grant Decrypt
access in an IAM user policy, you should scope the resource to
specific keys or to specific trusted accounts.
decryptRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<DeleteAliasResult> deleteAliasAsync(DeleteAliasRequest deleteAliasRequest)
Deletes the specified alias. To map an alias to a different key, call UpdateAlias.
deleteAliasRequest
- Future<DeleteAliasResult> deleteAliasAsync(DeleteAliasRequest deleteAliasRequest, AsyncHandler<DeleteAliasRequest,DeleteAliasResult> asyncHandler)
Deletes the specified alias. To map an alias to a different key, call UpdateAlias.
deleteAliasRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<DeleteImportedKeyMaterialResult> deleteImportedKeyMaterialAsync(DeleteImportedKeyMaterialRequest deleteImportedKeyMaterialRequest)
Deletes key material that you previously imported and makes the specified customer master key (CMK) unusable. For more information about importing key material into AWS KMS, see Importing Key Material in the AWS Key Management Service Developer Guide.
When the specified CMK is in the PendingDeletion
state, this operation does not change the CMK's
state. Otherwise, it changes the CMK's state to PendingImport
.
After you delete key material, you can use ImportKeyMaterial to reimport the same key material into the CMK.
deleteImportedKeyMaterialRequest
- Future<DeleteImportedKeyMaterialResult> deleteImportedKeyMaterialAsync(DeleteImportedKeyMaterialRequest deleteImportedKeyMaterialRequest, AsyncHandler<DeleteImportedKeyMaterialRequest,DeleteImportedKeyMaterialResult> asyncHandler)
Deletes key material that you previously imported and makes the specified customer master key (CMK) unusable. For more information about importing key material into AWS KMS, see Importing Key Material in the AWS Key Management Service Developer Guide.
When the specified CMK is in the PendingDeletion
state, this operation does not change the CMK's
state. Otherwise, it changes the CMK's state to PendingImport
.
After you delete key material, you can use ImportKeyMaterial to reimport the same key material into the CMK.
deleteImportedKeyMaterialRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<DescribeKeyResult> describeKeyAsync(DescribeKeyRequest describeKeyRequest)
Provides detailed information about the specified customer master key.
describeKeyRequest
- Future<DescribeKeyResult> describeKeyAsync(DescribeKeyRequest describeKeyRequest, AsyncHandler<DescribeKeyRequest,DescribeKeyResult> asyncHandler)
Provides detailed information about the specified customer master key.
describeKeyRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<DisableKeyResult> disableKeyAsync(DisableKeyRequest disableKeyRequest)
Sets the state of a customer master key (CMK) to disabled, thereby preventing its use for cryptographic operations. For more information about how key state affects the use of a CMK, see How Key State Affects the Use of a Customer Master Key in the AWS Key Management Service Developer Guide.
disableKeyRequest
- Future<DisableKeyResult> disableKeyAsync(DisableKeyRequest disableKeyRequest, AsyncHandler<DisableKeyRequest,DisableKeyResult> asyncHandler)
Sets the state of a customer master key (CMK) to disabled, thereby preventing its use for cryptographic operations. For more information about how key state affects the use of a CMK, see How Key State Affects the Use of a Customer Master Key in the AWS Key Management Service Developer Guide.
disableKeyRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<DisableKeyRotationResult> disableKeyRotationAsync(DisableKeyRotationRequest disableKeyRotationRequest)
Disables rotation of the specified key.
disableKeyRotationRequest
- Future<DisableKeyRotationResult> disableKeyRotationAsync(DisableKeyRotationRequest disableKeyRotationRequest, AsyncHandler<DisableKeyRotationRequest,DisableKeyRotationResult> asyncHandler)
Disables rotation of the specified key.
disableKeyRotationRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<EnableKeyResult> enableKeyAsync(EnableKeyRequest enableKeyRequest)
Marks a key as enabled, thereby permitting its use.
enableKeyRequest
- Future<EnableKeyResult> enableKeyAsync(EnableKeyRequest enableKeyRequest, AsyncHandler<EnableKeyRequest,EnableKeyResult> asyncHandler)
Marks a key as enabled, thereby permitting its use.
enableKeyRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<EnableKeyRotationResult> enableKeyRotationAsync(EnableKeyRotationRequest enableKeyRotationRequest)
Enables rotation of the specified customer master key.
enableKeyRotationRequest
- Future<EnableKeyRotationResult> enableKeyRotationAsync(EnableKeyRotationRequest enableKeyRotationRequest, AsyncHandler<EnableKeyRotationRequest,EnableKeyRotationResult> asyncHandler)
Enables rotation of the specified customer master key.
enableKeyRotationRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<EncryptResult> encryptAsync(EncryptRequest encryptRequest)
Encrypts plaintext into ciphertext by using a customer master key. The Encrypt
function has two
primary use cases:
You can encrypt up to 4 KB of arbitrary data such as an RSA key, a database password, or other sensitive customer information.
If you are moving encrypted data from one region to another, you can use this API to encrypt in the new region the plaintext data key that was used to encrypt the data in the original region. This provides you with an encrypted copy of the data key that can be decrypted in the new region and used there to decrypt the encrypted data.
Unless you are moving encrypted data from one region to another, you don't use this function to encrypt a
generated data key within a region. You retrieve data keys already encrypted by calling the
GenerateDataKey or GenerateDataKeyWithoutPlaintext function. Data keys don't need to be encrypted
again by calling Encrypt
.
If you want to encrypt data locally in your application, you can use the GenerateDataKey
function to
return a plaintext data encryption key and a copy of the key encrypted under the customer master key (CMK) of
your choosing.
encryptRequest
- Future<EncryptResult> encryptAsync(EncryptRequest encryptRequest, AsyncHandler<EncryptRequest,EncryptResult> asyncHandler)
Encrypts plaintext into ciphertext by using a customer master key. The Encrypt
function has two
primary use cases:
You can encrypt up to 4 KB of arbitrary data such as an RSA key, a database password, or other sensitive customer information.
If you are moving encrypted data from one region to another, you can use this API to encrypt in the new region the plaintext data key that was used to encrypt the data in the original region. This provides you with an encrypted copy of the data key that can be decrypted in the new region and used there to decrypt the encrypted data.
Unless you are moving encrypted data from one region to another, you don't use this function to encrypt a
generated data key within a region. You retrieve data keys already encrypted by calling the
GenerateDataKey or GenerateDataKeyWithoutPlaintext function. Data keys don't need to be encrypted
again by calling Encrypt
.
If you want to encrypt data locally in your application, you can use the GenerateDataKey
function to
return a plaintext data encryption key and a copy of the key encrypted under the customer master key (CMK) of
your choosing.
encryptRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<GenerateDataKeyResult> generateDataKeyAsync(GenerateDataKeyRequest generateDataKeyRequest)
Returns a data encryption key that you can use in your application to encrypt data locally.
You must specify the customer master key (CMK) under which to generate the data key. You must also specify the
length of the data key using either the KeySpec
or NumberOfBytes
field. You must
specify one field or the other, but not both. For common key lengths (128-bit and 256-bit symmetric keys), we
recommend that you use KeySpec
.
This operation returns a plaintext copy of the data key in the Plaintext
field of the response, and
an encrypted copy of the data key in the CiphertextBlob
field. The data key is encrypted under the
CMK specified in the KeyId
field of the request.
We recommend that you use the following pattern to encrypt data locally in your application:
Use this operation (GenerateDataKey
) to retrieve a data encryption key.
Use the plaintext data encryption key (returned in the Plaintext
field of the response) to encrypt
data locally, then erase the plaintext data key from memory.
Store the encrypted data key (returned in the CiphertextBlob
field of the response) alongside the
locally encrypted data.
To decrypt data locally:
Use the Decrypt operation to decrypt the encrypted data key into a plaintext copy of the data key.
Use the plaintext data key to decrypt data locally, then erase the plaintext data key from memory.
To return only an encrypted copy of the data key, use GenerateDataKeyWithoutPlaintext. To return an arbitrary unpredictable byte string, use GenerateRandom.
If you use the optional EncryptionContext
field, you must store at least enough information to be
able to reconstruct the full encryption context when you later send the ciphertext to the Decrypt
operation. It is a good practice to choose an encryption context that you can reconstruct on the fly to better
secure the ciphertext. For more information, see Encryption Context in the
AWS Key Management Service Developer Guide.
generateDataKeyRequest
- Future<GenerateDataKeyResult> generateDataKeyAsync(GenerateDataKeyRequest generateDataKeyRequest, AsyncHandler<GenerateDataKeyRequest,GenerateDataKeyResult> asyncHandler)
Returns a data encryption key that you can use in your application to encrypt data locally.
You must specify the customer master key (CMK) under which to generate the data key. You must also specify the
length of the data key using either the KeySpec
or NumberOfBytes
field. You must
specify one field or the other, but not both. For common key lengths (128-bit and 256-bit symmetric keys), we
recommend that you use KeySpec
.
This operation returns a plaintext copy of the data key in the Plaintext
field of the response, and
an encrypted copy of the data key in the CiphertextBlob
field. The data key is encrypted under the
CMK specified in the KeyId
field of the request.
We recommend that you use the following pattern to encrypt data locally in your application:
Use this operation (GenerateDataKey
) to retrieve a data encryption key.
Use the plaintext data encryption key (returned in the Plaintext
field of the response) to encrypt
data locally, then erase the plaintext data key from memory.
Store the encrypted data key (returned in the CiphertextBlob
field of the response) alongside the
locally encrypted data.
To decrypt data locally:
Use the Decrypt operation to decrypt the encrypted data key into a plaintext copy of the data key.
Use the plaintext data key to decrypt data locally, then erase the plaintext data key from memory.
To return only an encrypted copy of the data key, use GenerateDataKeyWithoutPlaintext. To return an arbitrary unpredictable byte string, use GenerateRandom.
If you use the optional EncryptionContext
field, you must store at least enough information to be
able to reconstruct the full encryption context when you later send the ciphertext to the Decrypt
operation. It is a good practice to choose an encryption context that you can reconstruct on the fly to better
secure the ciphertext. For more information, see Encryption Context in the
AWS Key Management Service Developer Guide.
generateDataKeyRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<GenerateDataKeyWithoutPlaintextResult> generateDataKeyWithoutPlaintextAsync(GenerateDataKeyWithoutPlaintextRequest generateDataKeyWithoutPlaintextRequest)
Returns a data encryption key encrypted under a customer master key (CMK). This operation is identical to GenerateDataKey but returns only the encrypted copy of the data key.
This operation is useful in a system that has multiple components with different degrees of trust. For example,
consider a system that stores encrypted data in containers. Each container stores the encrypted data and an
encrypted copy of the data key. One component of the system, called the control plane, creates new
containers. When it creates a new container, it uses this operation (GenerateDataKeyWithoutPlaintext
) to get an encrypted data key and then stores it in the container. Later, a different component of the system,
called the data plane, puts encrypted data into the containers. To do this, it passes the encrypted data
key to the Decrypt operation, then uses the returned plaintext data key to encrypt data, and finally
stores the encrypted data in the container. In this system, the control plane never sees the plaintext data key.
generateDataKeyWithoutPlaintextRequest
- Future<GenerateDataKeyWithoutPlaintextResult> generateDataKeyWithoutPlaintextAsync(GenerateDataKeyWithoutPlaintextRequest generateDataKeyWithoutPlaintextRequest, AsyncHandler<GenerateDataKeyWithoutPlaintextRequest,GenerateDataKeyWithoutPlaintextResult> asyncHandler)
Returns a data encryption key encrypted under a customer master key (CMK). This operation is identical to GenerateDataKey but returns only the encrypted copy of the data key.
This operation is useful in a system that has multiple components with different degrees of trust. For example,
consider a system that stores encrypted data in containers. Each container stores the encrypted data and an
encrypted copy of the data key. One component of the system, called the control plane, creates new
containers. When it creates a new container, it uses this operation (GenerateDataKeyWithoutPlaintext
) to get an encrypted data key and then stores it in the container. Later, a different component of the system,
called the data plane, puts encrypted data into the containers. To do this, it passes the encrypted data
key to the Decrypt operation, then uses the returned plaintext data key to encrypt data, and finally
stores the encrypted data in the container. In this system, the control plane never sees the plaintext data key.
generateDataKeyWithoutPlaintextRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<GenerateRandomResult> generateRandomAsync(GenerateRandomRequest generateRandomRequest)
Generates an unpredictable byte string.
generateRandomRequest
- Future<GenerateRandomResult> generateRandomAsync(GenerateRandomRequest generateRandomRequest, AsyncHandler<GenerateRandomRequest,GenerateRandomResult> asyncHandler)
Generates an unpredictable byte string.
generateRandomRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<GenerateRandomResult> generateRandomAsync()
Future<GenerateRandomResult> generateRandomAsync(AsyncHandler<GenerateRandomRequest,GenerateRandomResult> asyncHandler)
Future<GetKeyPolicyResult> getKeyPolicyAsync(GetKeyPolicyRequest getKeyPolicyRequest)
Retrieves a policy attached to the specified key.
getKeyPolicyRequest
- Future<GetKeyPolicyResult> getKeyPolicyAsync(GetKeyPolicyRequest getKeyPolicyRequest, AsyncHandler<GetKeyPolicyRequest,GetKeyPolicyResult> asyncHandler)
Retrieves a policy attached to the specified key.
getKeyPolicyRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<GetKeyRotationStatusResult> getKeyRotationStatusAsync(GetKeyRotationStatusRequest getKeyRotationStatusRequest)
Retrieves a Boolean value that indicates whether key rotation is enabled for the specified key.
getKeyRotationStatusRequest
- Future<GetKeyRotationStatusResult> getKeyRotationStatusAsync(GetKeyRotationStatusRequest getKeyRotationStatusRequest, AsyncHandler<GetKeyRotationStatusRequest,GetKeyRotationStatusResult> asyncHandler)
Retrieves a Boolean value that indicates whether key rotation is enabled for the specified key.
getKeyRotationStatusRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<GetParametersForImportResult> getParametersForImportAsync(GetParametersForImportRequest getParametersForImportRequest)
Returns the items you need in order to import key material into AWS KMS from your existing key management infrastructure. For more information about importing key material into AWS KMS, see Importing Key Material in the AWS Key Management Service Developer Guide.
You must specify the key ID of the customer master key (CMK) into which you will import key material. This CMK's
Origin
must be EXTERNAL
. You must also specify the wrapping algorithm and type of
wrapping key (public key) that you will use to encrypt the key material.
This operation returns a public key and an import token. Use the public key to encrypt the key material. Store
the import token to send with a subsequent ImportKeyMaterial request. The public key and import token from
the same response must be used together. These items are valid for 24 hours, after which they cannot be used for
a subsequent ImportKeyMaterial request. To retrieve new ones, send another
GetParametersForImport
request.
getParametersForImportRequest
- Future<GetParametersForImportResult> getParametersForImportAsync(GetParametersForImportRequest getParametersForImportRequest, AsyncHandler<GetParametersForImportRequest,GetParametersForImportResult> asyncHandler)
Returns the items you need in order to import key material into AWS KMS from your existing key management infrastructure. For more information about importing key material into AWS KMS, see Importing Key Material in the AWS Key Management Service Developer Guide.
You must specify the key ID of the customer master key (CMK) into which you will import key material. This CMK's
Origin
must be EXTERNAL
. You must also specify the wrapping algorithm and type of
wrapping key (public key) that you will use to encrypt the key material.
This operation returns a public key and an import token. Use the public key to encrypt the key material. Store
the import token to send with a subsequent ImportKeyMaterial request. The public key and import token from
the same response must be used together. These items are valid for 24 hours, after which they cannot be used for
a subsequent ImportKeyMaterial request. To retrieve new ones, send another
GetParametersForImport
request.
getParametersForImportRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<ImportKeyMaterialResult> importKeyMaterialAsync(ImportKeyMaterialRequest importKeyMaterialRequest)
Imports key material into an AWS KMS customer master key (CMK) from your existing key management infrastructure. For more information about importing key material into AWS KMS, see Importing Key Material in the AWS Key Management Service Developer Guide.
You must specify the key ID of the CMK to import the key material into. This CMK's Origin
must be
EXTERNAL
. You must also send an import token and the encrypted key material. Send the import token
that you received in the same GetParametersForImport response that contained the public key that you used
to encrypt the key material. You must also specify whether the key material expires and if so, when. When the key
material expires, AWS KMS deletes the key material and the CMK becomes unusable. To use the CMK again, you can
reimport the same key material. If you set an expiration date, you can change it only by reimporting the same key
material and specifying a new expiration date.
When this operation is successful, the specified CMK's key state changes to Enabled
, and you can use
the CMK.
After you successfully import key material into a CMK, you can reimport the same key material into that CMK, but you cannot import different key material.
importKeyMaterialRequest
- Future<ImportKeyMaterialResult> importKeyMaterialAsync(ImportKeyMaterialRequest importKeyMaterialRequest, AsyncHandler<ImportKeyMaterialRequest,ImportKeyMaterialResult> asyncHandler)
Imports key material into an AWS KMS customer master key (CMK) from your existing key management infrastructure. For more information about importing key material into AWS KMS, see Importing Key Material in the AWS Key Management Service Developer Guide.
You must specify the key ID of the CMK to import the key material into. This CMK's Origin
must be
EXTERNAL
. You must also send an import token and the encrypted key material. Send the import token
that you received in the same GetParametersForImport response that contained the public key that you used
to encrypt the key material. You must also specify whether the key material expires and if so, when. When the key
material expires, AWS KMS deletes the key material and the CMK becomes unusable. To use the CMK again, you can
reimport the same key material. If you set an expiration date, you can change it only by reimporting the same key
material and specifying a new expiration date.
When this operation is successful, the specified CMK's key state changes to Enabled
, and you can use
the CMK.
After you successfully import key material into a CMK, you can reimport the same key material into that CMK, but you cannot import different key material.
importKeyMaterialRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<ListAliasesResult> listAliasesAsync(ListAliasesRequest listAliasesRequest)
Lists all of the key aliases in the account.
listAliasesRequest
- Future<ListAliasesResult> listAliasesAsync(ListAliasesRequest listAliasesRequest, AsyncHandler<ListAliasesRequest,ListAliasesResult> asyncHandler)
Lists all of the key aliases in the account.
listAliasesRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<ListAliasesResult> listAliasesAsync()
listAliasesAsync(ListAliasesRequest)
Future<ListAliasesResult> listAliasesAsync(AsyncHandler<ListAliasesRequest,ListAliasesResult> asyncHandler)
Future<ListGrantsResult> listGrantsAsync(ListGrantsRequest listGrantsRequest)
List the grants for a specified key.
listGrantsRequest
- Future<ListGrantsResult> listGrantsAsync(ListGrantsRequest listGrantsRequest, AsyncHandler<ListGrantsRequest,ListGrantsResult> asyncHandler)
List the grants for a specified key.
listGrantsRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<ListKeyPoliciesResult> listKeyPoliciesAsync(ListKeyPoliciesRequest listKeyPoliciesRequest)
Retrieves a list of policies attached to a key.
listKeyPoliciesRequest
- Future<ListKeyPoliciesResult> listKeyPoliciesAsync(ListKeyPoliciesRequest listKeyPoliciesRequest, AsyncHandler<ListKeyPoliciesRequest,ListKeyPoliciesResult> asyncHandler)
Retrieves a list of policies attached to a key.
listKeyPoliciesRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<ListKeysResult> listKeysAsync(ListKeysRequest listKeysRequest)
Lists the customer master keys.
listKeysRequest
- Future<ListKeysResult> listKeysAsync(ListKeysRequest listKeysRequest, AsyncHandler<ListKeysRequest,ListKeysResult> asyncHandler)
Lists the customer master keys.
listKeysRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<ListKeysResult> listKeysAsync()
listKeysAsync(ListKeysRequest)
Future<ListKeysResult> listKeysAsync(AsyncHandler<ListKeysRequest,ListKeysResult> asyncHandler)
Future<ListRetirableGrantsResult> listRetirableGrantsAsync(ListRetirableGrantsRequest listRetirableGrantsRequest)
Returns a list of all grants for which the grant's RetiringPrincipal
matches the one specified.
A typical use is to list all grants that you are able to retire. To retire a grant, use RetireGrant.
listRetirableGrantsRequest
- Future<ListRetirableGrantsResult> listRetirableGrantsAsync(ListRetirableGrantsRequest listRetirableGrantsRequest, AsyncHandler<ListRetirableGrantsRequest,ListRetirableGrantsResult> asyncHandler)
Returns a list of all grants for which the grant's RetiringPrincipal
matches the one specified.
A typical use is to list all grants that you are able to retire. To retire a grant, use RetireGrant.
listRetirableGrantsRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<PutKeyPolicyResult> putKeyPolicyAsync(PutKeyPolicyRequest putKeyPolicyRequest)
Attaches a key policy to the specified customer master key (CMK).
For more information about key policies, see Key Policies in the AWS Key Management Service Developer Guide.
putKeyPolicyRequest
- Future<PutKeyPolicyResult> putKeyPolicyAsync(PutKeyPolicyRequest putKeyPolicyRequest, AsyncHandler<PutKeyPolicyRequest,PutKeyPolicyResult> asyncHandler)
Attaches a key policy to the specified customer master key (CMK).
For more information about key policies, see Key Policies in the AWS Key Management Service Developer Guide.
putKeyPolicyRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<ReEncryptResult> reEncryptAsync(ReEncryptRequest reEncryptRequest)
Encrypts data on the server side with a new customer master key without exposing the plaintext of the data on the client side. The data is first decrypted and then encrypted. This operation can also be used to change the encryption context of a ciphertext.
Unlike other actions, ReEncrypt
is authorized twice - once as ReEncryptFrom
on the
source key and once as ReEncryptTo
on the destination key. We therefore recommend that you include
the "action":"kms:ReEncrypt*"
statement in your key policies to permit re-encryption from or to the
key. The statement is included automatically when you authorize use of the key through the console but must be
included manually when you set a policy by using the PutKeyPolicy function.
reEncryptRequest
- Future<ReEncryptResult> reEncryptAsync(ReEncryptRequest reEncryptRequest, AsyncHandler<ReEncryptRequest,ReEncryptResult> asyncHandler)
Encrypts data on the server side with a new customer master key without exposing the plaintext of the data on the client side. The data is first decrypted and then encrypted. This operation can also be used to change the encryption context of a ciphertext.
Unlike other actions, ReEncrypt
is authorized twice - once as ReEncryptFrom
on the
source key and once as ReEncryptTo
on the destination key. We therefore recommend that you include
the "action":"kms:ReEncrypt*"
statement in your key policies to permit re-encryption from or to the
key. The statement is included automatically when you authorize use of the key through the console but must be
included manually when you set a policy by using the PutKeyPolicy function.
reEncryptRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<RetireGrantResult> retireGrantAsync(RetireGrantRequest retireGrantRequest)
Retires a grant. You can retire a grant when you're done using it to clean up. You should revoke a grant when you intend to actively deny operations that depend on it. The following are permitted to call this API:
The account that created the grant
The RetiringPrincipal
, if present
The GranteePrincipal
, if RetireGrant
is a grantee operation
The grant to retire must be identified by its grant token or by a combination of the key ARN and the grant ID. A
grant token is a unique variable-length base64-encoded string. A grant ID is a 64 character unique identifier of
a grant. Both are returned by the CreateGrant
function.
retireGrantRequest
- Future<RetireGrantResult> retireGrantAsync(RetireGrantRequest retireGrantRequest, AsyncHandler<RetireGrantRequest,RetireGrantResult> asyncHandler)
Retires a grant. You can retire a grant when you're done using it to clean up. You should revoke a grant when you intend to actively deny operations that depend on it. The following are permitted to call this API:
The account that created the grant
The RetiringPrincipal
, if present
The GranteePrincipal
, if RetireGrant
is a grantee operation
The grant to retire must be identified by its grant token or by a combination of the key ARN and the grant ID. A
grant token is a unique variable-length base64-encoded string. A grant ID is a 64 character unique identifier of
a grant. Both are returned by the CreateGrant
function.
retireGrantRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<RetireGrantResult> retireGrantAsync()
retireGrantAsync(RetireGrantRequest)
Future<RetireGrantResult> retireGrantAsync(AsyncHandler<RetireGrantRequest,RetireGrantResult> asyncHandler)
Future<RevokeGrantResult> revokeGrantAsync(RevokeGrantRequest revokeGrantRequest)
Revokes a grant. You can revoke a grant to actively deny operations that depend on it.
revokeGrantRequest
- Future<RevokeGrantResult> revokeGrantAsync(RevokeGrantRequest revokeGrantRequest, AsyncHandler<RevokeGrantRequest,RevokeGrantResult> asyncHandler)
Revokes a grant. You can revoke a grant to actively deny operations that depend on it.
revokeGrantRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<ScheduleKeyDeletionResult> scheduleKeyDeletionAsync(ScheduleKeyDeletionRequest scheduleKeyDeletionRequest)
Schedules the deletion of a customer master key (CMK). You may provide a waiting period, specified in days,
before deletion occurs. If you do not provide a waiting period, the default period of 30 days is used. When this
operation is successful, the state of the CMK changes to PendingDeletion
. Before the waiting period
ends, you can use CancelKeyDeletion to cancel the deletion of the CMK. After the waiting period ends, AWS
KMS deletes the CMK and all AWS KMS data associated with it, including all aliases that point to it.
Deleting a CMK is a destructive and potentially dangerous operation. When a CMK is deleted, all data that was encrypted under the CMK is rendered unrecoverable. To restrict the use of a CMK without deleting it, use DisableKey.
For more information about scheduling a CMK for deletion, see Deleting Customer Master Keys in the AWS Key Management Service Developer Guide.
scheduleKeyDeletionRequest
- Future<ScheduleKeyDeletionResult> scheduleKeyDeletionAsync(ScheduleKeyDeletionRequest scheduleKeyDeletionRequest, AsyncHandler<ScheduleKeyDeletionRequest,ScheduleKeyDeletionResult> asyncHandler)
Schedules the deletion of a customer master key (CMK). You may provide a waiting period, specified in days,
before deletion occurs. If you do not provide a waiting period, the default period of 30 days is used. When this
operation is successful, the state of the CMK changes to PendingDeletion
. Before the waiting period
ends, you can use CancelKeyDeletion to cancel the deletion of the CMK. After the waiting period ends, AWS
KMS deletes the CMK and all AWS KMS data associated with it, including all aliases that point to it.
Deleting a CMK is a destructive and potentially dangerous operation. When a CMK is deleted, all data that was encrypted under the CMK is rendered unrecoverable. To restrict the use of a CMK without deleting it, use DisableKey.
For more information about scheduling a CMK for deletion, see Deleting Customer Master Keys in the AWS Key Management Service Developer Guide.
scheduleKeyDeletionRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<UpdateAliasResult> updateAliasAsync(UpdateAliasRequest updateAliasRequest)
Updates an alias to map it to a different key.
An alias is not a property of a key. Therefore, an alias can be mapped to and unmapped from an existing key without changing the properties of the key.
An alias name can contain only alphanumeric characters, forward slashes (/), underscores (_), and dashes (-). An alias must start with the word "alias" followed by a forward slash (alias/). An alias that begins with "aws" after the forward slash (alias/aws...) is reserved by Amazon Web Services (AWS).
The alias and the key it is mapped to must be in the same AWS account and the same region.
updateAliasRequest
- Future<UpdateAliasResult> updateAliasAsync(UpdateAliasRequest updateAliasRequest, AsyncHandler<UpdateAliasRequest,UpdateAliasResult> asyncHandler)
Updates an alias to map it to a different key.
An alias is not a property of a key. Therefore, an alias can be mapped to and unmapped from an existing key without changing the properties of the key.
An alias name can contain only alphanumeric characters, forward slashes (/), underscores (_), and dashes (-). An alias must start with the word "alias" followed by a forward slash (alias/). An alias that begins with "aws" after the forward slash (alias/aws...) is reserved by Amazon Web Services (AWS).
The alias and the key it is mapped to must be in the same AWS account and the same region.
updateAliasRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Future<UpdateKeyDescriptionResult> updateKeyDescriptionAsync(UpdateKeyDescriptionRequest updateKeyDescriptionRequest)
Updates the description of a key.
updateKeyDescriptionRequest
- Future<UpdateKeyDescriptionResult> updateKeyDescriptionAsync(UpdateKeyDescriptionRequest updateKeyDescriptionRequest, AsyncHandler<UpdateKeyDescriptionRequest,UpdateKeyDescriptionResult> asyncHandler)
Updates the description of a key.
updateKeyDescriptionRequest
- asyncHandler
- Asynchronous callback handler for events in the lifecycle of the request. Users can provide an
implementation of the callback methods in this interface to receive notification of successful or
unsuccessful completion of the operation.Copyright © 2013 Amazon Web Services, Inc. All Rights Reserved.