oci.Kms.EncryptedData
Explore with Pulumi AI
This resource provides the Encrypted Data resource in Oracle Cloud Infrastructure Kms service.
Encrypts data using the given EncryptDataDetails resource. Plaintext included in the example request is a base64-encoded value of a UTF-8 string.
Example Usage
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Oci = Pulumi.Oci;
return await Deployment.RunAsync(() =>
{
var testEncryptedData = new Oci.Kms.EncryptedData("testEncryptedData", new()
{
CryptoEndpoint = @var.Encrypted_data_crypto_endpoint,
KeyId = oci_kms_key.Test_key.Id,
Plaintext = @var.Encrypted_data_plaintext,
AssociatedData = @var.Encrypted_data_associated_data,
EncryptionAlgorithm = @var.Encrypted_data_encryption_algorithm,
KeyVersionId = oci_kms_key_version.Test_key_version.Id,
LoggingContext = @var.Encrypted_data_logging_context,
});
});
package main
import (
"github.com/pulumi/pulumi-oci/sdk/go/oci/Kms"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := Kms.NewEncryptedData(ctx, "testEncryptedData", &Kms.EncryptedDataArgs{
CryptoEndpoint: pulumi.Any(_var.Encrypted_data_crypto_endpoint),
KeyId: pulumi.Any(oci_kms_key.Test_key.Id),
Plaintext: pulumi.Any(_var.Encrypted_data_plaintext),
AssociatedData: pulumi.Any(_var.Encrypted_data_associated_data),
EncryptionAlgorithm: pulumi.Any(_var.Encrypted_data_encryption_algorithm),
KeyVersionId: pulumi.Any(oci_kms_key_version.Test_key_version.Id),
LoggingContext: pulumi.Any(_var.Encrypted_data_logging_context),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Kms.EncryptedData;
import com.pulumi.oci.Kms.EncryptedDataArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var testEncryptedData = new EncryptedData("testEncryptedData", EncryptedDataArgs.builder()
.cryptoEndpoint(var_.encrypted_data_crypto_endpoint())
.keyId(oci_kms_key.test_key().id())
.plaintext(var_.encrypted_data_plaintext())
.associatedData(var_.encrypted_data_associated_data())
.encryptionAlgorithm(var_.encrypted_data_encryption_algorithm())
.keyVersionId(oci_kms_key_version.test_key_version().id())
.loggingContext(var_.encrypted_data_logging_context())
.build());
}
}
import pulumi
import pulumi_oci as oci
test_encrypted_data = oci.kms.EncryptedData("testEncryptedData",
crypto_endpoint=var["encrypted_data_crypto_endpoint"],
key_id=oci_kms_key["test_key"]["id"],
plaintext=var["encrypted_data_plaintext"],
associated_data=var["encrypted_data_associated_data"],
encryption_algorithm=var["encrypted_data_encryption_algorithm"],
key_version_id=oci_kms_key_version["test_key_version"]["id"],
logging_context=var["encrypted_data_logging_context"])
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";
const testEncryptedData = new oci.kms.EncryptedData("testEncryptedData", {
cryptoEndpoint: _var.encrypted_data_crypto_endpoint,
keyId: oci_kms_key.test_key.id,
plaintext: _var.encrypted_data_plaintext,
associatedData: _var.encrypted_data_associated_data,
encryptionAlgorithm: _var.encrypted_data_encryption_algorithm,
keyVersionId: oci_kms_key_version.test_key_version.id,
loggingContext: _var.encrypted_data_logging_context,
});
resources:
testEncryptedData:
type: oci:Kms:EncryptedData
properties:
#Required
cryptoEndpoint: ${var.encrypted_data_crypto_endpoint}
keyId: ${oci_kms_key.test_key.id}
plaintext: ${var.encrypted_data_plaintext}
#Optional
associatedData: ${var.encrypted_data_associated_data}
encryptionAlgorithm: ${var.encrypted_data_encryption_algorithm}
keyVersionId: ${oci_kms_key_version.test_key_version.id}
loggingContext: ${var.encrypted_data_logging_context}
Create EncryptedData Resource
new EncryptedData(name: string, args: EncryptedDataArgs, opts?: CustomResourceOptions);
@overload
def EncryptedData(resource_name: str,
opts: Optional[ResourceOptions] = None,
associated_data: Optional[Mapping[str, Any]] = None,
crypto_endpoint: Optional[str] = None,
encryption_algorithm: Optional[str] = None,
key_id: Optional[str] = None,
key_version_id: Optional[str] = None,
logging_context: Optional[Mapping[str, Any]] = None,
plaintext: Optional[str] = None)
@overload
def EncryptedData(resource_name: str,
args: EncryptedDataArgs,
opts: Optional[ResourceOptions] = None)
func NewEncryptedData(ctx *Context, name string, args EncryptedDataArgs, opts ...ResourceOption) (*EncryptedData, error)
public EncryptedData(string name, EncryptedDataArgs args, CustomResourceOptions? opts = null)
public EncryptedData(String name, EncryptedDataArgs args)
public EncryptedData(String name, EncryptedDataArgs args, CustomResourceOptions options)
type: oci:Kms:EncryptedData
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args EncryptedDataArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args EncryptedDataArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args EncryptedDataArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args EncryptedDataArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args EncryptedDataArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
EncryptedData Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The EncryptedData resource accepts the following input properties:
- Crypto
Endpoint string The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.
- Key
Id string The OCID of the key to encrypt with.
- Plaintext string
The plaintext data to encrypt.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- Associated
Data Dictionary<string, object> Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.
- Encryption
Algorithm string The encryption algorithm to use to encrypt and decrypt data with a customer-managed key.
AES_256_GCM
indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM).RSA_OAEP_SHA_1
indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP).RSA_OAEP_SHA_256
indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.- Key
Version stringId The OCID of the key version used to encrypt the ciphertext.
- Logging
Context Dictionary<string, object> Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.
- Crypto
Endpoint string The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.
- Key
Id string The OCID of the key to encrypt with.
- Plaintext string
The plaintext data to encrypt.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- Associated
Data map[string]interface{} Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.
- Encryption
Algorithm string The encryption algorithm to use to encrypt and decrypt data with a customer-managed key.
AES_256_GCM
indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM).RSA_OAEP_SHA_1
indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP).RSA_OAEP_SHA_256
indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.- Key
Version stringId The OCID of the key version used to encrypt the ciphertext.
- Logging
Context map[string]interface{} Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.
- crypto
Endpoint String The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.
- key
Id String The OCID of the key to encrypt with.
- plaintext String
The plaintext data to encrypt.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- associated
Data Map<String,Object> Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.
- encryption
Algorithm String The encryption algorithm to use to encrypt and decrypt data with a customer-managed key.
AES_256_GCM
indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM).RSA_OAEP_SHA_1
indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP).RSA_OAEP_SHA_256
indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.- key
Version StringId The OCID of the key version used to encrypt the ciphertext.
- logging
Context Map<String,Object> Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.
- crypto
Endpoint string The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.
- key
Id string The OCID of the key to encrypt with.
- plaintext string
The plaintext data to encrypt.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- associated
Data {[key: string]: any} Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.
- encryption
Algorithm string The encryption algorithm to use to encrypt and decrypt data with a customer-managed key.
AES_256_GCM
indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM).RSA_OAEP_SHA_1
indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP).RSA_OAEP_SHA_256
indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.- key
Version stringId The OCID of the key version used to encrypt the ciphertext.
- logging
Context {[key: string]: any} Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.
- crypto_
endpoint str The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.
- key_
id str The OCID of the key to encrypt with.
- plaintext str
The plaintext data to encrypt.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- associated_
data Mapping[str, Any] Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.
- encryption_
algorithm str The encryption algorithm to use to encrypt and decrypt data with a customer-managed key.
AES_256_GCM
indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM).RSA_OAEP_SHA_1
indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP).RSA_OAEP_SHA_256
indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.- key_
version_ strid The OCID of the key version used to encrypt the ciphertext.
- logging_
context Mapping[str, Any] Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.
- crypto
Endpoint String The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.
- key
Id String The OCID of the key to encrypt with.
- plaintext String
The plaintext data to encrypt.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- associated
Data Map<Any> Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.
- encryption
Algorithm String The encryption algorithm to use to encrypt and decrypt data with a customer-managed key.
AES_256_GCM
indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM).RSA_OAEP_SHA_1
indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP).RSA_OAEP_SHA_256
indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.- key
Version StringId The OCID of the key version used to encrypt the ciphertext.
- logging
Context Map<Any> Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.
Outputs
All input properties are implicitly available as output properties. Additionally, the EncryptedData resource produces the following output properties:
- Ciphertext string
The encrypted data.
- Id string
The provider-assigned unique ID for this managed resource.
- Ciphertext string
The encrypted data.
- Id string
The provider-assigned unique ID for this managed resource.
- ciphertext String
The encrypted data.
- id String
The provider-assigned unique ID for this managed resource.
- ciphertext string
The encrypted data.
- id string
The provider-assigned unique ID for this managed resource.
- ciphertext str
The encrypted data.
- id str
The provider-assigned unique ID for this managed resource.
- ciphertext String
The encrypted data.
- id String
The provider-assigned unique ID for this managed resource.
Look up Existing EncryptedData Resource
Get an existing EncryptedData resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: EncryptedDataState, opts?: CustomResourceOptions): EncryptedData
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
associated_data: Optional[Mapping[str, Any]] = None,
ciphertext: Optional[str] = None,
crypto_endpoint: Optional[str] = None,
encryption_algorithm: Optional[str] = None,
key_id: Optional[str] = None,
key_version_id: Optional[str] = None,
logging_context: Optional[Mapping[str, Any]] = None,
plaintext: Optional[str] = None) -> EncryptedData
func GetEncryptedData(ctx *Context, name string, id IDInput, state *EncryptedDataState, opts ...ResourceOption) (*EncryptedData, error)
public static EncryptedData Get(string name, Input<string> id, EncryptedDataState? state, CustomResourceOptions? opts = null)
public static EncryptedData get(String name, Output<String> id, EncryptedDataState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Associated
Data Dictionary<string, object> Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.
- Ciphertext string
The encrypted data.
- Crypto
Endpoint string The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.
- Encryption
Algorithm string The encryption algorithm to use to encrypt and decrypt data with a customer-managed key.
AES_256_GCM
indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM).RSA_OAEP_SHA_1
indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP).RSA_OAEP_SHA_256
indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.- Key
Id string The OCID of the key to encrypt with.
- Key
Version stringId The OCID of the key version used to encrypt the ciphertext.
- Logging
Context Dictionary<string, object> Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.
- Plaintext string
The plaintext data to encrypt.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- Associated
Data map[string]interface{} Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.
- Ciphertext string
The encrypted data.
- Crypto
Endpoint string The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.
- Encryption
Algorithm string The encryption algorithm to use to encrypt and decrypt data with a customer-managed key.
AES_256_GCM
indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM).RSA_OAEP_SHA_1
indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP).RSA_OAEP_SHA_256
indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.- Key
Id string The OCID of the key to encrypt with.
- Key
Version stringId The OCID of the key version used to encrypt the ciphertext.
- Logging
Context map[string]interface{} Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.
- Plaintext string
The plaintext data to encrypt.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- associated
Data Map<String,Object> Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.
- ciphertext String
The encrypted data.
- crypto
Endpoint String The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.
- encryption
Algorithm String The encryption algorithm to use to encrypt and decrypt data with a customer-managed key.
AES_256_GCM
indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM).RSA_OAEP_SHA_1
indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP).RSA_OAEP_SHA_256
indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.- key
Id String The OCID of the key to encrypt with.
- key
Version StringId The OCID of the key version used to encrypt the ciphertext.
- logging
Context Map<String,Object> Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.
- plaintext String
The plaintext data to encrypt.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- associated
Data {[key: string]: any} Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.
- ciphertext string
The encrypted data.
- crypto
Endpoint string The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.
- encryption
Algorithm string The encryption algorithm to use to encrypt and decrypt data with a customer-managed key.
AES_256_GCM
indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM).RSA_OAEP_SHA_1
indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP).RSA_OAEP_SHA_256
indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.- key
Id string The OCID of the key to encrypt with.
- key
Version stringId The OCID of the key version used to encrypt the ciphertext.
- logging
Context {[key: string]: any} Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.
- plaintext string
The plaintext data to encrypt.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- associated_
data Mapping[str, Any] Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.
- ciphertext str
The encrypted data.
- crypto_
endpoint str The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.
- encryption_
algorithm str The encryption algorithm to use to encrypt and decrypt data with a customer-managed key.
AES_256_GCM
indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM).RSA_OAEP_SHA_1
indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP).RSA_OAEP_SHA_256
indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.- key_
id str The OCID of the key to encrypt with.
- key_
version_ strid The OCID of the key version used to encrypt the ciphertext.
- logging_
context Mapping[str, Any] Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.
- plaintext str
The plaintext data to encrypt.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
- associated
Data Map<Any> Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.
- ciphertext String
The encrypted data.
- crypto
Endpoint String The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.
- encryption
Algorithm String The encryption algorithm to use to encrypt and decrypt data with a customer-managed key.
AES_256_GCM
indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM).RSA_OAEP_SHA_1
indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP).RSA_OAEP_SHA_256
indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.- key
Id String The OCID of the key to encrypt with.
- key
Version StringId The OCID of the key version used to encrypt the ciphertext.
- logging
Context Map<Any> Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.
- plaintext String
The plaintext data to encrypt.
** IMPORTANT ** Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
Import
Import is not supported for this resource.
Package Details
- Repository
- oci pulumi/pulumi-oci
- License
- Apache-2.0
- Notes
This Pulumi package is based on the
oci
Terraform Provider.