Skip to content

Commit 6db9c65

Browse files
(DOCSP-20564)+(DOCSP-20596) KMIP Update (#791)
1 parent a8c390c commit 6db9c65

File tree

4 files changed

+44
-23
lines changed

4 files changed

+44
-23
lines changed
155 KB
Loading

source/includes/steps-fle-convert-to-a-remote-master-key-kmip.yaml

Lines changed: 20 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,20 +1,20 @@
1-
title: Configure Your KMIP KMS
2-
ref: configure-kmip-kms
1+
title: Configure Your KMIP Provider
2+
ref: configure-kmip-provider
33
content: |
44
5-
To connect a MongoDB driver client to your KMIP KMS, you must configure your KMS
6-
such that it accepts your client's TLS certificate.
5+
To connect a MongoDB driver client to your KMIP provider, you must configure
6+
your KMIP provider such that it accepts your client's TLS certificate.
77
8-
Consult the documentation for your KMIP KMS for information on how
9-
to accept your client certificate with your specific KMS.
8+
Consult the documentation for your KMIP provider for information on how
9+
to accept your client certificate.
1010
1111
---
1212
title: Specify your Certificates
1313
ref: specify-certificates
1414
content: |
1515
16-
Your client must connect to your KMIP KMS through TLS and present
17-
a client certificate accepted by your KMS server.
16+
Your client must connect to your KMIP provider through TLS and present
17+
a client certificate that your KMIP provider accepts.
1818
1919
.. tabs-drivers::
2020
@@ -32,7 +32,7 @@ content: |
3232
3333
.. note:: Configure Client With SSLContext
3434
35-
If you would rather configure your KMIP client using an SSL context, use the
35+
If you would rather configure your KMIP provider-client using an SSL context, use the
3636
`kmsProviderSslContextMap <{+java-api+}/apidocs/mongodb-driver-core/com/mongodb/ClientEncryptionSettings.Builder.html#kmsProviderSslContextMap(java.util.Map)>`__
3737
method.
3838
@@ -41,12 +41,12 @@ title: Create a New Data Encryption Key
4141
ref: create-a-new-data-key
4242
content: |
4343
To encrypt your data, you need a data encryption key generated from your
44-
KMS-hosted **master key**. The following diagram shows the requests you need
44+
KMIP provider-hosted **master key**. The following diagram shows the requests you need
4545
to make from the client application to create and store a new **data
4646
encryption key**:
4747
48-
.. image:: /figures/CSFLE_Data_Key_KMS.png
49-
:alt: Diagram that describes creating a data encryption key when using a KMS provider
48+
.. image:: /figures/CSFLE_Data_Key_KMIP.png
49+
:alt: Diagram that describes creating a data encryption key when using a KMIP provider
5050
5151
1. First, specify the following information to access the master key:
5252
@@ -63,23 +63,23 @@ content: |
6363
- No
6464
- The ``keyId`` field of a 96 byte
6565
`Secret Data managed object <http://docs.oasis-open.org/kmip/spec/v1.4/os/kmip-spec-v1.4-os.html#_Toc490660780>`__
66-
stored in your KMIP KMS.
66+
stored in your KMIP provider.
6767
6868
.. note:: Create a New Master Key
6969
7070
If you do not specify the ``keyId`` field in the ``masterKey`` document
71-
you send to your KMIP KMS, the driver creates a new
72-
96 Byte Secret Data managed object in your KMS to act as your
71+
you send to your KMIP provider, the driver creates a new
72+
96 Byte Secret Data managed object in your KMIP provider to act as your
7373
master key.
7474
7575
* - endpoint
7676
- Yes
77-
- The URI of your KMIP KMS.
77+
- The URI of your KMIP provider.
7878
7979
2. Once you have the required information, update and run the following code
8080
to generate the new data encryption key:
8181
82-
.. include:: /includes/substitute-placeholders.rst
82+
.. include:: /includes/substitute-placeholders-kmip.rst
8383
8484
.. tabs-drivers::
8585
@@ -90,7 +90,7 @@ content: |
9090
9191
Map<String, Map<String, Object>> kmsProviderProperties = new HashMap<>();
9292
Map<String, Object> providerDetails = new HashMap<>();
93-
providerDetails.put("endpoint", "<KMIP KMS URI>");
93+
providerDetails.put("endpoint", "<KMIP provider URI>");
9494
kmsProviderProperties.put(kmsProvider, providerDetails);
9595
String keyVaultCollection = "<MongoDB namespace where you store your keys>"
9696
@@ -112,7 +112,7 @@ content: |
112112
113113
.. note::
114114
115-
To use a KMIP KMS, you must use `mongodb-crypt <https://mvnrepository.com/artifact/org.mongodb/mongodb-crypt>`__
115+
To use a KMIP provider, you must use `mongodb-crypt <https://mvnrepository.com/artifact/org.mongodb/mongodb-crypt>`__
116116
version 1.3 or later in your application's environment.
117117
118118
---
@@ -124,4 +124,4 @@ content: |
124124
with your new data encryption key ID.
125125
126126
Your client application is now ready to automatically encrypt your data
127-
using the master key on your KMS provider.
127+
using the master key on your KMIP provider.
Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,21 @@
1+
.. note:: Placeholder Text
2+
3+
You must substitute all text in quotes and angle brackets with
4+
your KMIP provider configuration values.
5+
6+
For example, the Java code prompts you to include a KMIP provider URI
7+
as follows:
8+
9+
.. code-block:: java
10+
:copyable: false
11+
12+
providerDetails.put("endpoint", "<KMIP provider URI>");
13+
14+
If your KMIP provider URI is "localhost:5696", substitute
15+
the text as follows:
16+
17+
.. code-block:: java
18+
:copyable: false
19+
20+
providerDetails.put("endpoint", "localhost:5696");
21+

source/security/client-side-field-level-encryption-local-key-to-kms.txt

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,7 +25,7 @@ Currently, MongoDB drivers support the following Key Management Providers:
2525
- `Amazon Web Services KMS <https://aws.amazon.com/kms/>`__
2626
- `Azure Key Vault <https://azure.microsoft.com/en-us/services/key-vault/>`__
2727
- `Google Cloud Platform Key Management <https://cloud.google.com/security-key-management>`__
28-
- `Any KMIP Compliant KMS <https://docs.oasis-open.org/kmip/spec/v1.0/os/kmip-spec-1.0-os.html>`__
28+
- `Any KMIP provider <https://docs.oasis-open.org/kmip/spec/v1.0/os/kmip-spec-1.0-os.html>`__
2929
- Local KMS provider
3030

3131
Once you complete the steps in this guide, you should have:
@@ -93,8 +93,8 @@ provider:
9393

9494
.. include:: /includes/steps/fle-convert-to-a-remote-master-key-gcp.rst
9595

96-
.. tab:: KMIP KMS
97-
:tabid: kmip-kms
96+
.. tab:: KMIP Provider
97+
:tabid: kmip-provider
9898

9999
.. include:: /includes/steps/fle-convert-to-a-remote-master-key-kmip.rst
100100

0 commit comments

Comments
 (0)