Oracle Cloud Infrastructure

v0.5.0 published on Monday, Sep 12, 2022 by Pulumi

EncryptedData

This resource provides the Encrypted Data resource in Oracle Cloud Infrastructure Kms service.

Encrypts data using the given EncryptDataDetails resource. Plaintext included in the example request is a base64-encoded value of a UTF-8 string.

Example Usage

using System.Collections.Generic;
using Pulumi;
using Oci = Pulumi.Oci;

return await Deployment.RunAsync(() => 
{
    var testEncryptedData = new Oci.Kms.EncryptedData("testEncryptedData", new()
    {
        CryptoEndpoint = @var.Encrypted_data_crypto_endpoint,
        KeyId = oci_kms_key.Test_key.Id,
        Plaintext = @var.Encrypted_data_plaintext,
        AssociatedData = @var.Encrypted_data_associated_data,
        EncryptionAlgorithm = @var.Encrypted_data_encryption_algorithm,
        KeyVersionId = oci_kms_key_version.Test_key_version.Id,
        LoggingContext = @var.Encrypted_data_logging_context,
    });

});
package main

import (
	"github.com/pulumi/pulumi-oci/sdk/go/oci/Kms"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		_, err := Kms.NewEncryptedData(ctx, "testEncryptedData", &Kms.EncryptedDataArgs{
			CryptoEndpoint:      pulumi.Any(_var.Encrypted_data_crypto_endpoint),
			KeyId:               pulumi.Any(oci_kms_key.Test_key.Id),
			Plaintext:           pulumi.Any(_var.Encrypted_data_plaintext),
			AssociatedData:      pulumi.Any(_var.Encrypted_data_associated_data),
			EncryptionAlgorithm: pulumi.Any(_var.Encrypted_data_encryption_algorithm),
			KeyVersionId:        pulumi.Any(oci_kms_key_version.Test_key_version.Id),
			LoggingContext:      pulumi.Any(_var.Encrypted_data_logging_context),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.oci.Kms.EncryptedData;
import com.pulumi.oci.Kms.EncryptedDataArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var testEncryptedData = new EncryptedData("testEncryptedData", EncryptedDataArgs.builder()        
            .cryptoEndpoint(var_.encrypted_data_crypto_endpoint())
            .keyId(oci_kms_key.test_key().id())
            .plaintext(var_.encrypted_data_plaintext())
            .associatedData(var_.encrypted_data_associated_data())
            .encryptionAlgorithm(var_.encrypted_data_encryption_algorithm())
            .keyVersionId(oci_kms_key_version.test_key_version().id())
            .loggingContext(var_.encrypted_data_logging_context())
            .build());

    }
}
import pulumi
import pulumi_oci as oci

test_encrypted_data = oci.kms.EncryptedData("testEncryptedData",
    crypto_endpoint=var["encrypted_data_crypto_endpoint"],
    key_id=oci_kms_key["test_key"]["id"],
    plaintext=var["encrypted_data_plaintext"],
    associated_data=var["encrypted_data_associated_data"],
    encryption_algorithm=var["encrypted_data_encryption_algorithm"],
    key_version_id=oci_kms_key_version["test_key_version"]["id"],
    logging_context=var["encrypted_data_logging_context"])
import * as pulumi from "@pulumi/pulumi";
import * as oci from "@pulumi/oci";

const testEncryptedData = new oci.kms.EncryptedData("testEncryptedData", {
    cryptoEndpoint: _var.encrypted_data_crypto_endpoint,
    keyId: oci_kms_key.test_key.id,
    plaintext: _var.encrypted_data_plaintext,
    associatedData: _var.encrypted_data_associated_data,
    encryptionAlgorithm: _var.encrypted_data_encryption_algorithm,
    keyVersionId: oci_kms_key_version.test_key_version.id,
    loggingContext: _var.encrypted_data_logging_context,
});
resources:
  testEncryptedData:
    type: oci:Kms:EncryptedData
    properties:
      #Required
      cryptoEndpoint: ${var.encrypted_data_crypto_endpoint}
      keyId: ${oci_kms_key.test_key.id}
      plaintext: ${var.encrypted_data_plaintext}
      #Optional
      associatedData: ${var.encrypted_data_associated_data}
      encryptionAlgorithm: ${var.encrypted_data_encryption_algorithm}
      keyVersionId: ${oci_kms_key_version.test_key_version.id}
      loggingContext: ${var.encrypted_data_logging_context}

Create EncryptedData Resource

new EncryptedData(name: string, args: EncryptedDataArgs, opts?: CustomResourceOptions);
@overload
def EncryptedData(resource_name: str,
                  opts: Optional[ResourceOptions] = None,
                  associated_data: Optional[Mapping[str, Any]] = None,
                  crypto_endpoint: Optional[str] = None,
                  encryption_algorithm: Optional[str] = None,
                  key_id: Optional[str] = None,
                  key_version_id: Optional[str] = None,
                  logging_context: Optional[Mapping[str, Any]] = None,
                  plaintext: Optional[str] = None)
@overload
def EncryptedData(resource_name: str,
                  args: EncryptedDataArgs,
                  opts: Optional[ResourceOptions] = None)
func NewEncryptedData(ctx *Context, name string, args EncryptedDataArgs, opts ...ResourceOption) (*EncryptedData, error)
public EncryptedData(string name, EncryptedDataArgs args, CustomResourceOptions? opts = null)
public EncryptedData(String name, EncryptedDataArgs args)
public EncryptedData(String name, EncryptedDataArgs args, CustomResourceOptions options)
type: oci:Kms:EncryptedData
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

name string
The unique name of the resource.
args EncryptedDataArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name str
The unique name of the resource.
args EncryptedDataArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name string
The unique name of the resource.
args EncryptedDataArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name string
The unique name of the resource.
args EncryptedDataArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name String
The unique name of the resource.
args EncryptedDataArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

EncryptedData Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

The EncryptedData resource accepts the following input properties:

CryptoEndpoint string

The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.

KeyId string

The OCID of the key to encrypt with.

Plaintext string

The plaintext data to encrypt.

AssociatedData Dictionary<string, object>

Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.

EncryptionAlgorithm string

The encryption algorithm to use to encrypt and decrypt data with a customer-managed key. AES_256_GCM indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM). RSA_OAEP_SHA_1 indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP). RSA_OAEP_SHA_256 indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.

KeyVersionId string

The OCID of the key version used to encrypt the ciphertext.

LoggingContext Dictionary<string, object>

Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.

CryptoEndpoint string

The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.

KeyId string

The OCID of the key to encrypt with.

Plaintext string

The plaintext data to encrypt.

AssociatedData map[string]interface{}

Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.

EncryptionAlgorithm string

The encryption algorithm to use to encrypt and decrypt data with a customer-managed key. AES_256_GCM indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM). RSA_OAEP_SHA_1 indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP). RSA_OAEP_SHA_256 indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.

KeyVersionId string

The OCID of the key version used to encrypt the ciphertext.

LoggingContext map[string]interface{}

Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.

cryptoEndpoint String

The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.

keyId String

The OCID of the key to encrypt with.

plaintext String

The plaintext data to encrypt.

associatedData Map<String,Object>

Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.

encryptionAlgorithm String

The encryption algorithm to use to encrypt and decrypt data with a customer-managed key. AES_256_GCM indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM). RSA_OAEP_SHA_1 indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP). RSA_OAEP_SHA_256 indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.

keyVersionId String

The OCID of the key version used to encrypt the ciphertext.

loggingContext Map<String,Object>

Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.

cryptoEndpoint string

The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.

keyId string

The OCID of the key to encrypt with.

plaintext string

The plaintext data to encrypt.

associatedData {[key: string]: any}

Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.

encryptionAlgorithm string

The encryption algorithm to use to encrypt and decrypt data with a customer-managed key. AES_256_GCM indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM). RSA_OAEP_SHA_1 indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP). RSA_OAEP_SHA_256 indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.

keyVersionId string

The OCID of the key version used to encrypt the ciphertext.

loggingContext {[key: string]: any}

Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.

crypto_endpoint str

The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.

key_id str

The OCID of the key to encrypt with.

plaintext str

The plaintext data to encrypt.

associated_data Mapping[str, Any]

Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.

encryption_algorithm str

The encryption algorithm to use to encrypt and decrypt data with a customer-managed key. AES_256_GCM indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM). RSA_OAEP_SHA_1 indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP). RSA_OAEP_SHA_256 indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.

key_version_id str

The OCID of the key version used to encrypt the ciphertext.

logging_context Mapping[str, Any]

Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.

cryptoEndpoint String

The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.

keyId String

The OCID of the key to encrypt with.

plaintext String

The plaintext data to encrypt.

associatedData Map<Any>

Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.

encryptionAlgorithm String

The encryption algorithm to use to encrypt and decrypt data with a customer-managed key. AES_256_GCM indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM). RSA_OAEP_SHA_1 indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP). RSA_OAEP_SHA_256 indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.

keyVersionId String

The OCID of the key version used to encrypt the ciphertext.

loggingContext Map<Any>

Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.

Outputs

All input properties are implicitly available as output properties. Additionally, the EncryptedData resource produces the following output properties:

Ciphertext string

The encrypted data.

Id string

The provider-assigned unique ID for this managed resource.

Ciphertext string

The encrypted data.

Id string

The provider-assigned unique ID for this managed resource.

ciphertext String

The encrypted data.

id String

The provider-assigned unique ID for this managed resource.

ciphertext string

The encrypted data.

id string

The provider-assigned unique ID for this managed resource.

ciphertext str

The encrypted data.

id str

The provider-assigned unique ID for this managed resource.

ciphertext String

The encrypted data.

id String

The provider-assigned unique ID for this managed resource.

Look up Existing EncryptedData Resource

Get an existing EncryptedData resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: EncryptedDataState, opts?: CustomResourceOptions): EncryptedData
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        associated_data: Optional[Mapping[str, Any]] = None,
        ciphertext: Optional[str] = None,
        crypto_endpoint: Optional[str] = None,
        encryption_algorithm: Optional[str] = None,
        key_id: Optional[str] = None,
        key_version_id: Optional[str] = None,
        logging_context: Optional[Mapping[str, Any]] = None,
        plaintext: Optional[str] = None) -> EncryptedData
func GetEncryptedData(ctx *Context, name string, id IDInput, state *EncryptedDataState, opts ...ResourceOption) (*EncryptedData, error)
public static EncryptedData Get(string name, Input<string> id, EncryptedDataState? state, CustomResourceOptions? opts = null)
public static EncryptedData get(String name, Output<String> id, EncryptedDataState state, CustomResourceOptions options)
Resource lookup is not supported in YAML
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name
The unique name of the resulting resource.
id
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
AssociatedData Dictionary<string, object>

Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.

Ciphertext string

The encrypted data.

CryptoEndpoint string

The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.

EncryptionAlgorithm string

The encryption algorithm to use to encrypt and decrypt data with a customer-managed key. AES_256_GCM indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM). RSA_OAEP_SHA_1 indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP). RSA_OAEP_SHA_256 indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.

KeyId string

The OCID of the key to encrypt with.

KeyVersionId string

The OCID of the key version used to encrypt the ciphertext.

LoggingContext Dictionary<string, object>

Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.

Plaintext string

The plaintext data to encrypt.

AssociatedData map[string]interface{}

Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.

Ciphertext string

The encrypted data.

CryptoEndpoint string

The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.

EncryptionAlgorithm string

The encryption algorithm to use to encrypt and decrypt data with a customer-managed key. AES_256_GCM indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM). RSA_OAEP_SHA_1 indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP). RSA_OAEP_SHA_256 indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.

KeyId string

The OCID of the key to encrypt with.

KeyVersionId string

The OCID of the key version used to encrypt the ciphertext.

LoggingContext map[string]interface{}

Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.

Plaintext string

The plaintext data to encrypt.

associatedData Map<String,Object>

Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.

ciphertext String

The encrypted data.

cryptoEndpoint String

The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.

encryptionAlgorithm String

The encryption algorithm to use to encrypt and decrypt data with a customer-managed key. AES_256_GCM indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM). RSA_OAEP_SHA_1 indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP). RSA_OAEP_SHA_256 indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.

keyId String

The OCID of the key to encrypt with.

keyVersionId String

The OCID of the key version used to encrypt the ciphertext.

loggingContext Map<String,Object>

Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.

plaintext String

The plaintext data to encrypt.

associatedData {[key: string]: any}

Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.

ciphertext string

The encrypted data.

cryptoEndpoint string

The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.

encryptionAlgorithm string

The encryption algorithm to use to encrypt and decrypt data with a customer-managed key. AES_256_GCM indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM). RSA_OAEP_SHA_1 indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP). RSA_OAEP_SHA_256 indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.

keyId string

The OCID of the key to encrypt with.

keyVersionId string

The OCID of the key version used to encrypt the ciphertext.

loggingContext {[key: string]: any}

Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.

plaintext string

The plaintext data to encrypt.

associated_data Mapping[str, Any]

Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.

ciphertext str

The encrypted data.

crypto_endpoint str

The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.

encryption_algorithm str

The encryption algorithm to use to encrypt and decrypt data with a customer-managed key. AES_256_GCM indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM). RSA_OAEP_SHA_1 indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP). RSA_OAEP_SHA_256 indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.

key_id str

The OCID of the key to encrypt with.

key_version_id str

The OCID of the key version used to encrypt the ciphertext.

logging_context Mapping[str, Any]

Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.

plaintext str

The plaintext data to encrypt.

associatedData Map<Any>

Information that can be used to provide an encryption context for the encrypted data. The length of the string representation of the associated data must be fewer than 4096 characters.

ciphertext String

The encrypted data.

cryptoEndpoint String

The service endpoint to perform cryptographic operations against. Cryptographic operations include 'Encrypt,' 'Decrypt,' and 'GenerateDataEncryptionKey' operations. see Vault Crypto endpoint.

encryptionAlgorithm String

The encryption algorithm to use to encrypt and decrypt data with a customer-managed key. AES_256_GCM indicates that the key is a symmetric key that uses the Advanced Encryption Standard (AES) algorithm and that the mode of encryption is the Galois/Counter Mode (GCM). RSA_OAEP_SHA_1 indicates that the key is an asymmetric key that uses the RSA encryption algorithm and uses Optimal Asymmetric Encryption Padding (OAEP). RSA_OAEP_SHA_256 indicates that the key is an asymmetric key that uses the RSA encryption algorithm with a SHA-256 hash and uses OAEP.

keyId String

The OCID of the key to encrypt with.

keyVersionId String

The OCID of the key version used to encrypt the ciphertext.

loggingContext Map<Any>

Information that provides context for audit logging. You can provide this additional data as key-value pairs to include in the audit logs when audit logging is enabled.

plaintext String

The plaintext data to encrypt.

Import

Import is not supported for this resource.

Package Details

Repository
https://github.com/pulumi/pulumi-oci
License
Apache-2.0
Notes

This Pulumi package is based on the oci Terraform Provider.