IBM Cloud Docs
Using Hyper Protect Crypto Services with Unified Key Orchestrator to manage keys in Key Protect on Satellite

Using Hyper Protect Crypto Services with Unified Key Orchestrator to manage keys in Key Protect on Satellite

IBM Cloud Satellite provides you with flexibility and scalability to bring your own infrastructures to IBM Cloud. You can run IBM Cloud services anywhere including on your on-prem data centers and other cloud providers. With IBM Cloud Satellite, you can connect your multiple environments to implement distributed cloud solutions to help your enterprise hybrid cloud transformation. Key Protect on Satellite allows you to fully control your encryption keys by using your on-prem hardware security module (HSM). Hyper Protect Crypto Services with Unified Key Orchestrator enables you to manage keys in various key management systems, including Key Protect on Satellite, from a single pane of glass.

In this topic, references to Unified Key Orchestrator refer to Hyper Protect Crypto Services with Unified Key Orchestrator service.

Objectives

This tutorial shows how you can keep complete and exclusive control of your encryption keys by deploying Key Protect in a Satellite location and how you can manage your distributed keys with a unified view by connecting Unified Key Orchestrator to Key Protect on Satellite.

The following diagram illustrates the architecture:

Unified Key Orchestrator connects to Key Protect on Satellite
Figure 1. Unified Key Orchestrator connects to Key Protect on Satellite

Before you begin

To complete this tutorial, you need to meet the following prerequisites:

Currently, Key Protect supports user-owned on-prem Satellite locations associated with the IBM Cloud us-east region only. In this tutorial, to reduce network latency, we create other IBM Cloud services needed also in the us-east region.

Task flow

To complete this solution, let's walk through the following steps:

  1. Deploy Key Protect on Satellite.
  2. Connect Unified Key Orchestrator to Key Protect on Satellite.
  3. Manage Key Protect keys through Unified Key Orchestrator.

Let's start with the deployment of Key Protect on Satellite.

Deploy Key Protect on Satellite

Deploy Key Protect on Satellite by following the instruction.

Connect Unified Key Orchestrator to Key Protect on Satellite

After you deploy Key Protect on Satellite, you can now connect Unified Key Orchestrator to Key Protect to have a unified key management experience.

  1. Log in to the Hyper Protect Crypto Services instance.

  2. Click Keystores from the navigation and click Add keystore.

  3. Under Vault, select a vault for the keystore for access control, and click Next.

    If you want to assign the keystore to a new vault, click Create vault. For more instructions, see Creating vaults.

  4. Under Keystore type, select Key Protect and click Next.

  5. Under Keystore properties, specify the details:

    Table 1. Key store properties
    Property Description
    Keystore name A unique, human-readable name for easy identification of your keystore, with 1–100 characters in length. The first character must be a letter (case-sensitive) or digit (0–9). The rest can also be symbols (.-_) or spaces. For example, kp-satellite-tiger
    Description (Optional) An extended description for your keystore, with up to 200 characters in length. For example, KP on satellite for project Tiger DB encryption.
    Key Protect API endpoint The service endpoint of your Key Protect on Satellite in the format of https://<your-satellite-location>.kms.cloud.ibm.com. For more information, see Obtaining the Key Protect endpoint.
    IBM Cloud Identity and Access Management endpoint The endpoint of IAM, which is https://iam.cloud.ibm.com.
    Service instance ID on IBM Cloud The unique identifier that is assigned to your Key Protect service instance. For more information, see Retrieving your instance ID and cloud resource name.
    Service ID API key A unique code that is passed to an API to identify the calling application. For more information, see Managing service ID API keys.
  6. Optionally, click Test connection to test the connection to the external keystore that you configure. When completed, click Next to continue.

    Test connection is an optional step. You can complete the subsequent steps even if the test fails. To adjust the connection settings in case of a connection failure, check and adjust the connection properties.

  7. Under Summary, view the summary of your Key Protect instance and the total estimated cost.

  8. After you confirm the keystore details, click Connect to keystore to connect to the keystore.

Manage Key Protect keys through Unified Key Orchestrator

Now you can use Unified Key Orchestrator to create and activate keys for Key Protect on Satellite to use. With the Keep Your Own Key (KYOK) feature, these keys are protected by master key within the FIPS 140-2 Level 4 HSM boundary and IBM cannot access your keys with technical assurance.

  1. Log in to the Hyper Protect Crypto Services instance.

  2. Click Managed keys from the navigation and click Create key.

  3. Under Vault, select a vault for the key for access control, and click Next.

    If you want to assign the key to a new vault, click Create vault. For more instructions, see Creating vaults.

  4. Under General, select IBM Key Protect and click Next.

  5. Under Key properties, specify the following details of the key. Click Next to continue when you are done.

    Table 2. Key properties
    Property Description
    Key name A unique, human-readable name for easy identification of your key. For Key Protect keys, it must be 2–50 characters in length. The characters can be letters (case-sensitive), digits (0–9), or spaces. For example, kp satellite tiger key.
    Description (Optional) An extended description for your key, with up to 200 characters in length. For example, KP on satellite keys for project Tiger DB encryption
    Algorithm The encryption algorithm to encrypt data for the key. For example, AES.
    Length The number of bits that represents the encryption strength of the key. For example, 256.
    State Pre-active keys are not to be activatedin keystores until you manually activate them. Active keys are automatically activated in the keystores. Select Active for installation to Key Protect on Satellite.For more information about key states, see Monitoring the lifecycle of encryption keys in Unified Key Orchestrator.
    Activation date Plan a date to activate the Pre-active key. It is for planning purpose only. For this tutorial, you don't need to specify this property as the Active state is selected previously. The key will be activated immediately upon its creation.
    Expiration date Plan a date to deactivate the key. It is for planning purpose only.
    Key tags (Optional) Add pairs of names and values to identify your key. For example, project: tiger.
  6. Under Keystores, select the Key Protect on Satellite keystore that you create in the previous step.

  7. Under Summary, view the summary of your key, and then click Create key to confirm.

Next steps

Now your Key Protect instance is running in an on-prem Satellite location where encryption keys are protected by your local HSMs. You have exclusive control of your keys and can orchestrate these keys across multiple clouds with Unified Key Orchestrator.