Use Customer-Managed Encryption Key Located in a Remote Tenancy
Shows the steps to select customer-managed master encryption keys from a Vault on a remote tenancy.
When you use customer-managed master encryption keys with a Vault in a remote tenancy, the Vault and the Autonomous AI Database instance must be in the same region. To change the tenancy, on the sign-on page click Change tenancy. After you change the tenancy, make sure to select the same region for both the Vault and the Autonomous AI Database instance.
The Lifecycle state changes to Updating. When the request completes, the Lifecycle state shows Available.
After the request completes, on the Oracle Cloud Infrastructure Console, the key information shows on the Autonomous Database Information page under the heading Encryption. This area shows the Encryption Key field with a link to the Master Encryption Key and the Encryption Key OCID field with the Master Encryption Key OCID.
- Use Bring Your Own Keys (BYOK) in Vault Service
When you create a customer-managed key using the OCI Vault service, you can also import your own key material (Bring Your Own Key or BYOK) instead of having the Vault service generate the key material internally.
Parent topic: Manage Master Encryption Keys in OCI Vault
Use Bring Your Own Keys (BYOK) in Vault Service
When you create a customer-managed key using the OCI Vault service, you can also import your own key material (Bring Your Own Key or BYOK) instead of having the Vault service generate the key material internally.
- Create a vault in the Vault service by following
the instructions in To create
a new vault.
After creating the vault, you can create at least one master encryption key in the vault by following the instructions in To create a new master encryption key. You can also import a customer encryption key into an existing vault. When following these instructions, make these choices:
- Create in Compartment: Oracle recommends that you create the master encryption key in the same compartment as its vault; that is, the compartment created specifically to contain the vaults containing customer-managed keys.
- Protection Mode: Choose an appropriate value from the drop-down
list:
- HSM to create a master encryption key that is stored and processed on a hardware security module (HSM).
- Software to create a master encryption key that is stored in a software file system in the Vault service. Software-protected keys are protected at rest using an HSM-based root key. You may export software keys to other key management devices or to a different OCI cloud region. Unlike HSM keys, software-protected keys are free of cost.
- Key Shape Algorithm: AES
- Key Shape Length: 256 bits
- Import External Key: To use a customer encryption key (BYOK),
select Import External Key and provide the following
details:
- Wrapping Key Information. This section is read-only, but you can view the public wrapping key details.
- Wrapping Algorithm. Select a wrapping algorithm from the drop-down list.
- External Key Data Source. Upload the file that contains the wrapped RSA key material.
Note:
You can either import the key material as a new external key version or click the name of an existing master encryption key and rotate it to a new key version. - Use the IAM service to create a dynamic group and define a policy that gives your Autonomous AI Database instance access to the master encryption key you created.
See Importing Key Material as an External Key Version for more details.
