1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97
|
// Code generated by smithy-go-codegen DO NOT EDIT.
// Package kms provides the API client, operations, and parameter types for AWS
// Key Management Service.
//
// # Key Management Service
//
// Key Management Service (KMS) is an encryption and key management web service.
// This guide describes the KMS operations that you can call programmatically. For
// general information about KMS, see the [Key Management Service Developer Guide].
//
// KMS has replaced the term customer master key (CMK) with KMS key and KMS key.
// The concept has not changed. To prevent breaking changes, KMS is keeping some
// variations of this term.
//
// Amazon Web Services provides SDKs that consist of libraries and sample code for
// various programming languages and platforms (Java, Ruby, .Net, macOS, Android,
// etc.). The SDKs provide a convenient way to create programmatic access to KMS
// and other Amazon Web Services services. For example, the SDKs take care of tasks
// such as signing requests (see below), managing errors, and retrying requests
// automatically. For more information about the Amazon Web Services SDKs,
// including how to download and install them, see [Tools for Amazon Web Services].
//
// We recommend that you use the Amazon Web Services SDKs to make programmatic API
// calls to KMS.
//
// If you need to use FIPS 140-2 validated cryptographic modules when
// communicating with Amazon Web Services, use the FIPS endpoint in your preferred
// Amazon Web Services Region. For more information about the available FIPS
// endpoints, see [Service endpoints]in the Key Management Service topic of the Amazon Web Services
// General Reference.
//
// All KMS API calls must be signed and be transmitted using Transport Layer
// Security (TLS). KMS recommends you always use the latest supported TLS version.
// Clients must also support cipher suites with Perfect Forward Secrecy (PFS) such
// as Ephemeral Diffie-Hellman (DHE) or Elliptic Curve Ephemeral Diffie-Hellman
// (ECDHE). Most modern systems such as Java 7 and later support these modes.
//
// # Signing Requests
//
// Requests must be signed using an access key ID and a secret access key. We
// strongly recommend that you do not use your Amazon Web Services account root
// access key ID and secret access key for everyday work. You can use the access
// key ID and secret access key for an IAM user or you can use the Security Token
// Service (STS) to generate temporary security credentials and use those to sign
// requests.
//
// All KMS requests must be signed with [Signature Version 4].
//
// # Logging API Requests
//
// KMS supports CloudTrail, a service that logs Amazon Web Services API calls and
// related events for your Amazon Web Services account and delivers them to an
// Amazon S3 bucket that you specify. By using the information collected by
// CloudTrail, you can determine what requests were made to KMS, who made the
// request, when it was made, and so on. To learn more about CloudTrail, including
// how to turn it on and find your log files, see the [CloudTrail User Guide].
//
// # Additional Resources
//
// For more information about credentials and request signing, see the following:
//
// [Amazon Web Services Security Credentials]
// - - This topic provides general information about the types of credentials
// used to access Amazon Web Services.
//
// [Temporary Security Credentials]
// - - This section of the IAM User Guide describes how to create and use
// temporary security credentials.
//
// [Signature Version 4 Signing Process]
// - - This set of topics walks you through the process of signing a request
// using an access key ID and a secret access key.
//
// # Commonly Used API Operations
//
// Of the API operations discussed in this guide, the following will prove the
// most useful for most applications. You will likely perform operations other than
// these, such as creating keys and assigning policies, by using the console.
//
// # Encrypt
//
// # Decrypt
//
// # GenerateDataKey
//
// # GenerateDataKeyWithoutPlaintext
//
// [Signature Version 4]: https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html
// [Temporary Security Credentials]: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_temp.html
// [Tools for Amazon Web Services]: http://aws.amazon.com/tools/
// [Amazon Web Services Security Credentials]: https://docs.aws.amazon.com/general/latest/gr/aws-security-credentials.html
// [Key Management Service Developer Guide]: https://docs.aws.amazon.com/kms/latest/developerguide/
// [Service endpoints]: https://docs.aws.amazon.com/general/latest/gr/kms.html#kms_region
// [CloudTrail User Guide]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/
// [Signature Version 4 Signing Process]: https://docs.aws.amazon.com/general/latest/gr/signature-version-4.html
package kms
|