Class CustomKeyStoresListEntry
- java.lang.Object
-
- software.amazon.awssdk.services.kms.model.CustomKeyStoresListEntry
-
- All Implemented Interfaces:
Serializable,SdkPojo,ToCopyableBuilder<CustomKeyStoresListEntry.Builder,CustomKeyStoresListEntry>
@Generated("software.amazon.awssdk:codegen") public final class CustomKeyStoresListEntry extends Object implements SdkPojo, Serializable, ToCopyableBuilder<CustomKeyStoresListEntry.Builder,CustomKeyStoresListEntry>
Contains information about each custom key store in the custom key store list.
- See Also:
- Serialized Form
-
-
Nested Class Summary
Nested Classes Modifier and Type Class Description static interfaceCustomKeyStoresListEntry.Builder
-
Method Summary
All Methods Static Methods Instance Methods Concrete Methods Modifier and Type Method Description static CustomKeyStoresListEntry.Builderbuilder()StringcloudHsmClusterId()A unique identifier for the CloudHSM cluster that is associated with an CloudHSM key store.ConnectionErrorCodeTypeconnectionErrorCode()Describes the connection error.StringconnectionErrorCodeAsString()Describes the connection error.ConnectionStateTypeconnectionState()Indicates whether the custom key store is connected to its backing key store.StringconnectionStateAsString()Indicates whether the custom key store is connected to its backing key store.InstantcreationDate()The date and time when the custom key store was created.StringcustomKeyStoreId()A unique identifier for the custom key store.StringcustomKeyStoreName()The user-specified friendly name for the custom key store.CustomKeyStoreTypecustomKeyStoreType()Indicates the type of the custom key store.StringcustomKeyStoreTypeAsString()Indicates the type of the custom key store.booleanequals(Object obj)booleanequalsBySdkFields(Object obj)<T> Optional<T>getValueForField(String fieldName, Class<T> clazz)inthashCode()List<SdkField<?>>sdkFields()static Class<? extends CustomKeyStoresListEntry.Builder>serializableBuilderClass()CustomKeyStoresListEntry.BuildertoBuilder()StringtoString()Returns a string representation of this object.StringtrustAnchorCertificate()The trust anchor certificate of the CloudHSM cluster associated with an CloudHSM key store.XksProxyConfigurationTypexksProxyConfiguration()Configuration settings for the external key store proxy (XKS proxy).-
Methods inherited from class java.lang.Object
clone, finalize, getClass, notify, notifyAll, wait, wait, wait
-
Methods inherited from interface software.amazon.awssdk.utils.builder.ToCopyableBuilder
copy
-
-
-
-
Method Detail
-
customKeyStoreId
public final String customKeyStoreId()
A unique identifier for the custom key store.
- Returns:
- A unique identifier for the custom key store.
-
customKeyStoreName
public final String customKeyStoreName()
The user-specified friendly name for the custom key store.
- Returns:
- The user-specified friendly name for the custom key store.
-
cloudHsmClusterId
public final String cloudHsmClusterId()
A unique identifier for the CloudHSM cluster that is associated with an CloudHSM key store. This field appears only when the
CustomKeyStoreTypeisAWS_CLOUDHSM.- Returns:
- A unique identifier for the CloudHSM cluster that is associated with an CloudHSM key store. This field
appears only when the
CustomKeyStoreTypeisAWS_CLOUDHSM.
-
trustAnchorCertificate
public final String trustAnchorCertificate()
The trust anchor certificate of the CloudHSM cluster associated with an CloudHSM key store. When you initialize the cluster, you create this certificate and save it in the
customerCA.crtfile.This field appears only when the
CustomKeyStoreTypeisAWS_CLOUDHSM.- Returns:
- The trust anchor certificate of the CloudHSM cluster associated with an CloudHSM key store. When you initialize
the cluster, you create this certificate and save it in the
customerCA.crtfile.This field appears only when the
CustomKeyStoreTypeisAWS_CLOUDHSM.
-
connectionState
public final ConnectionStateType connectionState()
Indicates whether the custom key store is connected to its backing key store. For an CloudHSM key store, the
ConnectionStateindicates whether it is connected to its CloudHSM cluster. For an external key store, theConnectionStateindicates whether it is connected to the external key store proxy that communicates with your external key manager.You can create and use KMS keys in your custom key stores only when its
ConnectionStateisCONNECTED.The
ConnectionStatevalue isDISCONNECTEDonly if the key store has never been connected or you use the DisconnectCustomKeyStore operation to disconnect it. If the value isCONNECTEDbut you are having trouble using the custom key store, make sure that the backing key store is reachable and active. For an CloudHSM key store, verify that its associated CloudHSM cluster is active and contains at least one active HSM. For an external key store, verify that the external key store proxy and external key manager are connected and enabled.A value of
FAILEDindicates that an attempt to connect was unsuccessful. TheConnectionErrorCodefield in the response indicates the cause of the failure. For help resolving a connection failure, see Troubleshooting a custom key store in the Key Management Service Developer Guide.If the service returns an enum value that is not available in the current SDK version,
connectionStatewill returnConnectionStateType.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromconnectionStateAsString().- Returns:
- Indicates whether the custom key store is connected to its backing key store. For an CloudHSM key store,
the
ConnectionStateindicates whether it is connected to its CloudHSM cluster. For an external key store, theConnectionStateindicates whether it is connected to the external key store proxy that communicates with your external key manager.You can create and use KMS keys in your custom key stores only when its
ConnectionStateisCONNECTED.The
ConnectionStatevalue isDISCONNECTEDonly if the key store has never been connected or you use the DisconnectCustomKeyStore operation to disconnect it. If the value isCONNECTEDbut you are having trouble using the custom key store, make sure that the backing key store is reachable and active. For an CloudHSM key store, verify that its associated CloudHSM cluster is active and contains at least one active HSM. For an external key store, verify that the external key store proxy and external key manager are connected and enabled.A value of
FAILEDindicates that an attempt to connect was unsuccessful. TheConnectionErrorCodefield in the response indicates the cause of the failure. For help resolving a connection failure, see Troubleshooting a custom key store in the Key Management Service Developer Guide. - See Also:
ConnectionStateType
-
connectionStateAsString
public final String connectionStateAsString()
Indicates whether the custom key store is connected to its backing key store. For an CloudHSM key store, the
ConnectionStateindicates whether it is connected to its CloudHSM cluster. For an external key store, theConnectionStateindicates whether it is connected to the external key store proxy that communicates with your external key manager.You can create and use KMS keys in your custom key stores only when its
ConnectionStateisCONNECTED.The
ConnectionStatevalue isDISCONNECTEDonly if the key store has never been connected or you use the DisconnectCustomKeyStore operation to disconnect it. If the value isCONNECTEDbut you are having trouble using the custom key store, make sure that the backing key store is reachable and active. For an CloudHSM key store, verify that its associated CloudHSM cluster is active and contains at least one active HSM. For an external key store, verify that the external key store proxy and external key manager are connected and enabled.A value of
FAILEDindicates that an attempt to connect was unsuccessful. TheConnectionErrorCodefield in the response indicates the cause of the failure. For help resolving a connection failure, see Troubleshooting a custom key store in the Key Management Service Developer Guide.If the service returns an enum value that is not available in the current SDK version,
connectionStatewill returnConnectionStateType.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromconnectionStateAsString().- Returns:
- Indicates whether the custom key store is connected to its backing key store. For an CloudHSM key store,
the
ConnectionStateindicates whether it is connected to its CloudHSM cluster. For an external key store, theConnectionStateindicates whether it is connected to the external key store proxy that communicates with your external key manager.You can create and use KMS keys in your custom key stores only when its
ConnectionStateisCONNECTED.The
ConnectionStatevalue isDISCONNECTEDonly if the key store has never been connected or you use the DisconnectCustomKeyStore operation to disconnect it. If the value isCONNECTEDbut you are having trouble using the custom key store, make sure that the backing key store is reachable and active. For an CloudHSM key store, verify that its associated CloudHSM cluster is active and contains at least one active HSM. For an external key store, verify that the external key store proxy and external key manager are connected and enabled.A value of
FAILEDindicates that an attempt to connect was unsuccessful. TheConnectionErrorCodefield in the response indicates the cause of the failure. For help resolving a connection failure, see Troubleshooting a custom key store in the Key Management Service Developer Guide. - See Also:
ConnectionStateType
-
connectionErrorCode
public final ConnectionErrorCodeType connectionErrorCode()
Describes the connection error. This field appears in the response only when the
ConnectionStateisFAILED.Many failures can be resolved by updating the properties of the custom key store. To update a custom key store, disconnect it (DisconnectCustomKeyStore), correct the errors (UpdateCustomKeyStore), and try to connect again (ConnectCustomKeyStore). For additional help resolving these errors, see How to Fix a Connection Failure in Key Management Service Developer Guide.
All custom key stores:
-
INTERNAL_ERROR— KMS could not complete the request due to an internal error. Retry the request. ForConnectCustomKeyStorerequests, disconnect the custom key store before trying to connect again. -
NETWORK_ERRORS— Network errors are preventing KMS from connecting the custom key store to its backing key store.
CloudHSM key stores:
-
CLUSTER_NOT_FOUND— KMS cannot find the CloudHSM cluster with the specified cluster ID. -
INSUFFICIENT_CLOUDHSM_HSMS— The associated CloudHSM cluster does not contain any active HSMs. To connect a custom key store to its CloudHSM cluster, the cluster must contain at least one active HSM. -
INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET— At least one private subnet associated with the CloudHSM cluster doesn't have any available IP addresses. A CloudHSM key store connection requires one free IP address in each of the associated private subnets, although two are preferable. For details, see How to Fix a Connection Failure in the Key Management Service Developer Guide. -
INVALID_CREDENTIALS— TheKeyStorePasswordfor the custom key store doesn't match the current password of thekmsusercrypto user in the CloudHSM cluster. Before you can connect your custom key store to its CloudHSM cluster, you must change thekmsuseraccount password and update theKeyStorePasswordvalue for the custom key store. -
SUBNET_NOT_FOUND— A subnet in the CloudHSM cluster configuration was deleted. If KMS cannot find all of the subnets in the cluster configuration, attempts to connect the custom key store to the CloudHSM cluster fail. To fix this error, create a cluster from a recent backup and associate it with your custom key store. (This process creates a new cluster configuration with a VPC and private subnets.) For details, see How to Fix a Connection Failure in the Key Management Service Developer Guide. -
USER_LOCKED_OUT— ThekmsuserCU account is locked out of the associated CloudHSM cluster due to too many failed password attempts. Before you can connect your custom key store to its CloudHSM cluster, you must change thekmsuseraccount password and update the key store password value for the custom key store. -
USER_LOGGED_IN— ThekmsuserCU account is logged into the associated CloudHSM cluster. This prevents KMS from rotating thekmsuseraccount password and logging into the cluster. Before you can connect your custom key store to its CloudHSM cluster, you must log thekmsuserCU out of the cluster. If you changed thekmsuserpassword to log into the cluster, you must also and update the key store password value for the custom key store. For help, see How to Log Out and Reconnect in the Key Management Service Developer Guide. -
USER_NOT_FOUND— KMS cannot find akmsuserCU account in the associated CloudHSM cluster. Before you can connect your custom key store to its CloudHSM cluster, you must create akmsuserCU account in the cluster, and then update the key store password value for the custom key store.
External key stores:
-
INVALID_CREDENTIALS— One or both of theXksProxyAuthenticationCredentialvalues is not valid on the specified external key store proxy. -
XKS_PROXY_ACCESS_DENIED— KMS requests are denied access to the external key store proxy. If the external key store proxy has authorization rules, verify that they permit KMS to communicate with the proxy on your behalf. -
XKS_PROXY_INVALID_CONFIGURATION— A configuration error is preventing the external key store from connecting to its proxy. Verify the value of theXksProxyUriPath. -
XKS_PROXY_INVALID_RESPONSE— KMS cannot interpret the response from the external key store proxy. If you see this connection error code repeatedly, notify your external key store proxy vendor. -
XKS_PROXY_INVALID_TLS_CONFIGURATION— KMS cannot connect to the external key store proxy because the TLS configuration is invalid. Verify that the XKS proxy supports TLS 1.2 or 1.3. Also, verify that the TLS certificate is not expired, and that it matches the hostname in theXksProxyUriEndpointvalue, and that it is signed by a certificate authority included in the Trusted Certificate Authorities list. -
XKS_PROXY_NOT_REACHABLE— KMS can't communicate with your external key store proxy. Verify that theXksProxyUriEndpointandXksProxyUriPathare correct. Use the tools for your external key store proxy to verify that the proxy is active and available on its network. Also, verify that your external key manager instances are operating properly. Connection attempts fail with this connection error code if the proxy reports that all external key manager instances are unavailable. -
XKS_PROXY_TIMED_OUT— KMS can connect to the external key store proxy, but the proxy does not respond to KMS in the time allotted. If you see this connection error code repeatedly, notify your external key store proxy vendor. -
XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION— The Amazon VPC endpoint service configuration doesn't conform to the requirements for an KMS external key store.-
The VPC endpoint service must be an endpoint service for interface endpoints in the caller's Amazon Web Services account.
-
It must have a network load balancer (NLB) connected to at least two subnets, each in a different Availability Zone.
-
The
Allow principalslist must include the KMS service principal for the Region,cks.kms.<region>.amazonaws.com, such ascks.kms.us-east-1.amazonaws.com. -
It must not require acceptance of connection requests.
-
It must have a private DNS name. The private DNS name for an external key store with
VPC_ENDPOINT_SERVICEconnectivity must be unique in its Amazon Web Services Region. -
The domain of the private DNS name must have a verification status of
verified. -
The TLS certificate specifies the private DNS hostname at which the endpoint is reachable.
-
-
XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND— KMS can't find the VPC endpoint service that it uses to communicate with the external key store proxy. Verify that theXksProxyVpcEndpointServiceNameis correct and the KMS service principal has service consumer permissions on the Amazon VPC endpoint service.
If the service returns an enum value that is not available in the current SDK version,
connectionErrorCodewill returnConnectionErrorCodeType.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromconnectionErrorCodeAsString().- Returns:
- Describes the connection error. This field appears in the response only when the
ConnectionStateisFAILED.Many failures can be resolved by updating the properties of the custom key store. To update a custom key store, disconnect it (DisconnectCustomKeyStore), correct the errors (UpdateCustomKeyStore), and try to connect again (ConnectCustomKeyStore). For additional help resolving these errors, see How to Fix a Connection Failure in Key Management Service Developer Guide.
All custom key stores:
-
INTERNAL_ERROR— KMS could not complete the request due to an internal error. Retry the request. ForConnectCustomKeyStorerequests, disconnect the custom key store before trying to connect again. -
NETWORK_ERRORS— Network errors are preventing KMS from connecting the custom key store to its backing key store.
CloudHSM key stores:
-
CLUSTER_NOT_FOUND— KMS cannot find the CloudHSM cluster with the specified cluster ID. -
INSUFFICIENT_CLOUDHSM_HSMS— The associated CloudHSM cluster does not contain any active HSMs. To connect a custom key store to its CloudHSM cluster, the cluster must contain at least one active HSM. -
INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET— At least one private subnet associated with the CloudHSM cluster doesn't have any available IP addresses. A CloudHSM key store connection requires one free IP address in each of the associated private subnets, although two are preferable. For details, see How to Fix a Connection Failure in the Key Management Service Developer Guide. -
INVALID_CREDENTIALS— TheKeyStorePasswordfor the custom key store doesn't match the current password of thekmsusercrypto user in the CloudHSM cluster. Before you can connect your custom key store to its CloudHSM cluster, you must change thekmsuseraccount password and update theKeyStorePasswordvalue for the custom key store. -
SUBNET_NOT_FOUND— A subnet in the CloudHSM cluster configuration was deleted. If KMS cannot find all of the subnets in the cluster configuration, attempts to connect the custom key store to the CloudHSM cluster fail. To fix this error, create a cluster from a recent backup and associate it with your custom key store. (This process creates a new cluster configuration with a VPC and private subnets.) For details, see How to Fix a Connection Failure in the Key Management Service Developer Guide. -
USER_LOCKED_OUT— ThekmsuserCU account is locked out of the associated CloudHSM cluster due to too many failed password attempts. Before you can connect your custom key store to its CloudHSM cluster, you must change thekmsuseraccount password and update the key store password value for the custom key store. -
USER_LOGGED_IN— ThekmsuserCU account is logged into the associated CloudHSM cluster. This prevents KMS from rotating thekmsuseraccount password and logging into the cluster. Before you can connect your custom key store to its CloudHSM cluster, you must log thekmsuserCU out of the cluster. If you changed thekmsuserpassword to log into the cluster, you must also and update the key store password value for the custom key store. For help, see How to Log Out and Reconnect in the Key Management Service Developer Guide. -
USER_NOT_FOUND— KMS cannot find akmsuserCU account in the associated CloudHSM cluster. Before you can connect your custom key store to its CloudHSM cluster, you must create akmsuserCU account in the cluster, and then update the key store password value for the custom key store.
External key stores:
-
INVALID_CREDENTIALS— One or both of theXksProxyAuthenticationCredentialvalues is not valid on the specified external key store proxy. -
XKS_PROXY_ACCESS_DENIED— KMS requests are denied access to the external key store proxy. If the external key store proxy has authorization rules, verify that they permit KMS to communicate with the proxy on your behalf. -
XKS_PROXY_INVALID_CONFIGURATION— A configuration error is preventing the external key store from connecting to its proxy. Verify the value of theXksProxyUriPath. -
XKS_PROXY_INVALID_RESPONSE— KMS cannot interpret the response from the external key store proxy. If you see this connection error code repeatedly, notify your external key store proxy vendor. -
XKS_PROXY_INVALID_TLS_CONFIGURATION— KMS cannot connect to the external key store proxy because the TLS configuration is invalid. Verify that the XKS proxy supports TLS 1.2 or 1.3. Also, verify that the TLS certificate is not expired, and that it matches the hostname in theXksProxyUriEndpointvalue, and that it is signed by a certificate authority included in the Trusted Certificate Authorities list. -
XKS_PROXY_NOT_REACHABLE— KMS can't communicate with your external key store proxy. Verify that theXksProxyUriEndpointandXksProxyUriPathare correct. Use the tools for your external key store proxy to verify that the proxy is active and available on its network. Also, verify that your external key manager instances are operating properly. Connection attempts fail with this connection error code if the proxy reports that all external key manager instances are unavailable. -
XKS_PROXY_TIMED_OUT— KMS can connect to the external key store proxy, but the proxy does not respond to KMS in the time allotted. If you see this connection error code repeatedly, notify your external key store proxy vendor. -
XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION— The Amazon VPC endpoint service configuration doesn't conform to the requirements for an KMS external key store.-
The VPC endpoint service must be an endpoint service for interface endpoints in the caller's Amazon Web Services account.
-
It must have a network load balancer (NLB) connected to at least two subnets, each in a different Availability Zone.
-
The
Allow principalslist must include the KMS service principal for the Region,cks.kms.<region>.amazonaws.com, such ascks.kms.us-east-1.amazonaws.com. -
It must not require acceptance of connection requests.
-
It must have a private DNS name. The private DNS name for an external key store with
VPC_ENDPOINT_SERVICEconnectivity must be unique in its Amazon Web Services Region. -
The domain of the private DNS name must have a verification status of
verified. -
The TLS certificate specifies the private DNS hostname at which the endpoint is reachable.
-
-
XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND— KMS can't find the VPC endpoint service that it uses to communicate with the external key store proxy. Verify that theXksProxyVpcEndpointServiceNameis correct and the KMS service principal has service consumer permissions on the Amazon VPC endpoint service.
-
- See Also:
ConnectionErrorCodeType
-
-
connectionErrorCodeAsString
public final String connectionErrorCodeAsString()
Describes the connection error. This field appears in the response only when the
ConnectionStateisFAILED.Many failures can be resolved by updating the properties of the custom key store. To update a custom key store, disconnect it (DisconnectCustomKeyStore), correct the errors (UpdateCustomKeyStore), and try to connect again (ConnectCustomKeyStore). For additional help resolving these errors, see How to Fix a Connection Failure in Key Management Service Developer Guide.
All custom key stores:
-
INTERNAL_ERROR— KMS could not complete the request due to an internal error. Retry the request. ForConnectCustomKeyStorerequests, disconnect the custom key store before trying to connect again. -
NETWORK_ERRORS— Network errors are preventing KMS from connecting the custom key store to its backing key store.
CloudHSM key stores:
-
CLUSTER_NOT_FOUND— KMS cannot find the CloudHSM cluster with the specified cluster ID. -
INSUFFICIENT_CLOUDHSM_HSMS— The associated CloudHSM cluster does not contain any active HSMs. To connect a custom key store to its CloudHSM cluster, the cluster must contain at least one active HSM. -
INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET— At least one private subnet associated with the CloudHSM cluster doesn't have any available IP addresses. A CloudHSM key store connection requires one free IP address in each of the associated private subnets, although two are preferable. For details, see How to Fix a Connection Failure in the Key Management Service Developer Guide. -
INVALID_CREDENTIALS— TheKeyStorePasswordfor the custom key store doesn't match the current password of thekmsusercrypto user in the CloudHSM cluster. Before you can connect your custom key store to its CloudHSM cluster, you must change thekmsuseraccount password and update theKeyStorePasswordvalue for the custom key store. -
SUBNET_NOT_FOUND— A subnet in the CloudHSM cluster configuration was deleted. If KMS cannot find all of the subnets in the cluster configuration, attempts to connect the custom key store to the CloudHSM cluster fail. To fix this error, create a cluster from a recent backup and associate it with your custom key store. (This process creates a new cluster configuration with a VPC and private subnets.) For details, see How to Fix a Connection Failure in the Key Management Service Developer Guide. -
USER_LOCKED_OUT— ThekmsuserCU account is locked out of the associated CloudHSM cluster due to too many failed password attempts. Before you can connect your custom key store to its CloudHSM cluster, you must change thekmsuseraccount password and update the key store password value for the custom key store. -
USER_LOGGED_IN— ThekmsuserCU account is logged into the associated CloudHSM cluster. This prevents KMS from rotating thekmsuseraccount password and logging into the cluster. Before you can connect your custom key store to its CloudHSM cluster, you must log thekmsuserCU out of the cluster. If you changed thekmsuserpassword to log into the cluster, you must also and update the key store password value for the custom key store. For help, see How to Log Out and Reconnect in the Key Management Service Developer Guide. -
USER_NOT_FOUND— KMS cannot find akmsuserCU account in the associated CloudHSM cluster. Before you can connect your custom key store to its CloudHSM cluster, you must create akmsuserCU account in the cluster, and then update the key store password value for the custom key store.
External key stores:
-
INVALID_CREDENTIALS— One or both of theXksProxyAuthenticationCredentialvalues is not valid on the specified external key store proxy. -
XKS_PROXY_ACCESS_DENIED— KMS requests are denied access to the external key store proxy. If the external key store proxy has authorization rules, verify that they permit KMS to communicate with the proxy on your behalf. -
XKS_PROXY_INVALID_CONFIGURATION— A configuration error is preventing the external key store from connecting to its proxy. Verify the value of theXksProxyUriPath. -
XKS_PROXY_INVALID_RESPONSE— KMS cannot interpret the response from the external key store proxy. If you see this connection error code repeatedly, notify your external key store proxy vendor. -
XKS_PROXY_INVALID_TLS_CONFIGURATION— KMS cannot connect to the external key store proxy because the TLS configuration is invalid. Verify that the XKS proxy supports TLS 1.2 or 1.3. Also, verify that the TLS certificate is not expired, and that it matches the hostname in theXksProxyUriEndpointvalue, and that it is signed by a certificate authority included in the Trusted Certificate Authorities list. -
XKS_PROXY_NOT_REACHABLE— KMS can't communicate with your external key store proxy. Verify that theXksProxyUriEndpointandXksProxyUriPathare correct. Use the tools for your external key store proxy to verify that the proxy is active and available on its network. Also, verify that your external key manager instances are operating properly. Connection attempts fail with this connection error code if the proxy reports that all external key manager instances are unavailable. -
XKS_PROXY_TIMED_OUT— KMS can connect to the external key store proxy, but the proxy does not respond to KMS in the time allotted. If you see this connection error code repeatedly, notify your external key store proxy vendor. -
XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION— The Amazon VPC endpoint service configuration doesn't conform to the requirements for an KMS external key store.-
The VPC endpoint service must be an endpoint service for interface endpoints in the caller's Amazon Web Services account.
-
It must have a network load balancer (NLB) connected to at least two subnets, each in a different Availability Zone.
-
The
Allow principalslist must include the KMS service principal for the Region,cks.kms.<region>.amazonaws.com, such ascks.kms.us-east-1.amazonaws.com. -
It must not require acceptance of connection requests.
-
It must have a private DNS name. The private DNS name for an external key store with
VPC_ENDPOINT_SERVICEconnectivity must be unique in its Amazon Web Services Region. -
The domain of the private DNS name must have a verification status of
verified. -
The TLS certificate specifies the private DNS hostname at which the endpoint is reachable.
-
-
XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND— KMS can't find the VPC endpoint service that it uses to communicate with the external key store proxy. Verify that theXksProxyVpcEndpointServiceNameis correct and the KMS service principal has service consumer permissions on the Amazon VPC endpoint service.
If the service returns an enum value that is not available in the current SDK version,
connectionErrorCodewill returnConnectionErrorCodeType.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromconnectionErrorCodeAsString().- Returns:
- Describes the connection error. This field appears in the response only when the
ConnectionStateisFAILED.Many failures can be resolved by updating the properties of the custom key store. To update a custom key store, disconnect it (DisconnectCustomKeyStore), correct the errors (UpdateCustomKeyStore), and try to connect again (ConnectCustomKeyStore). For additional help resolving these errors, see How to Fix a Connection Failure in Key Management Service Developer Guide.
All custom key stores:
-
INTERNAL_ERROR— KMS could not complete the request due to an internal error. Retry the request. ForConnectCustomKeyStorerequests, disconnect the custom key store before trying to connect again. -
NETWORK_ERRORS— Network errors are preventing KMS from connecting the custom key store to its backing key store.
CloudHSM key stores:
-
CLUSTER_NOT_FOUND— KMS cannot find the CloudHSM cluster with the specified cluster ID. -
INSUFFICIENT_CLOUDHSM_HSMS— The associated CloudHSM cluster does not contain any active HSMs. To connect a custom key store to its CloudHSM cluster, the cluster must contain at least one active HSM. -
INSUFFICIENT_FREE_ADDRESSES_IN_SUBNET— At least one private subnet associated with the CloudHSM cluster doesn't have any available IP addresses. A CloudHSM key store connection requires one free IP address in each of the associated private subnets, although two are preferable. For details, see How to Fix a Connection Failure in the Key Management Service Developer Guide. -
INVALID_CREDENTIALS— TheKeyStorePasswordfor the custom key store doesn't match the current password of thekmsusercrypto user in the CloudHSM cluster. Before you can connect your custom key store to its CloudHSM cluster, you must change thekmsuseraccount password and update theKeyStorePasswordvalue for the custom key store. -
SUBNET_NOT_FOUND— A subnet in the CloudHSM cluster configuration was deleted. If KMS cannot find all of the subnets in the cluster configuration, attempts to connect the custom key store to the CloudHSM cluster fail. To fix this error, create a cluster from a recent backup and associate it with your custom key store. (This process creates a new cluster configuration with a VPC and private subnets.) For details, see How to Fix a Connection Failure in the Key Management Service Developer Guide. -
USER_LOCKED_OUT— ThekmsuserCU account is locked out of the associated CloudHSM cluster due to too many failed password attempts. Before you can connect your custom key store to its CloudHSM cluster, you must change thekmsuseraccount password and update the key store password value for the custom key store. -
USER_LOGGED_IN— ThekmsuserCU account is logged into the associated CloudHSM cluster. This prevents KMS from rotating thekmsuseraccount password and logging into the cluster. Before you can connect your custom key store to its CloudHSM cluster, you must log thekmsuserCU out of the cluster. If you changed thekmsuserpassword to log into the cluster, you must also and update the key store password value for the custom key store. For help, see How to Log Out and Reconnect in the Key Management Service Developer Guide. -
USER_NOT_FOUND— KMS cannot find akmsuserCU account in the associated CloudHSM cluster. Before you can connect your custom key store to its CloudHSM cluster, you must create akmsuserCU account in the cluster, and then update the key store password value for the custom key store.
External key stores:
-
INVALID_CREDENTIALS— One or both of theXksProxyAuthenticationCredentialvalues is not valid on the specified external key store proxy. -
XKS_PROXY_ACCESS_DENIED— KMS requests are denied access to the external key store proxy. If the external key store proxy has authorization rules, verify that they permit KMS to communicate with the proxy on your behalf. -
XKS_PROXY_INVALID_CONFIGURATION— A configuration error is preventing the external key store from connecting to its proxy. Verify the value of theXksProxyUriPath. -
XKS_PROXY_INVALID_RESPONSE— KMS cannot interpret the response from the external key store proxy. If you see this connection error code repeatedly, notify your external key store proxy vendor. -
XKS_PROXY_INVALID_TLS_CONFIGURATION— KMS cannot connect to the external key store proxy because the TLS configuration is invalid. Verify that the XKS proxy supports TLS 1.2 or 1.3. Also, verify that the TLS certificate is not expired, and that it matches the hostname in theXksProxyUriEndpointvalue, and that it is signed by a certificate authority included in the Trusted Certificate Authorities list. -
XKS_PROXY_NOT_REACHABLE— KMS can't communicate with your external key store proxy. Verify that theXksProxyUriEndpointandXksProxyUriPathare correct. Use the tools for your external key store proxy to verify that the proxy is active and available on its network. Also, verify that your external key manager instances are operating properly. Connection attempts fail with this connection error code if the proxy reports that all external key manager instances are unavailable. -
XKS_PROXY_TIMED_OUT— KMS can connect to the external key store proxy, but the proxy does not respond to KMS in the time allotted. If you see this connection error code repeatedly, notify your external key store proxy vendor. -
XKS_VPC_ENDPOINT_SERVICE_INVALID_CONFIGURATION— The Amazon VPC endpoint service configuration doesn't conform to the requirements for an KMS external key store.-
The VPC endpoint service must be an endpoint service for interface endpoints in the caller's Amazon Web Services account.
-
It must have a network load balancer (NLB) connected to at least two subnets, each in a different Availability Zone.
-
The
Allow principalslist must include the KMS service principal for the Region,cks.kms.<region>.amazonaws.com, such ascks.kms.us-east-1.amazonaws.com. -
It must not require acceptance of connection requests.
-
It must have a private DNS name. The private DNS name for an external key store with
VPC_ENDPOINT_SERVICEconnectivity must be unique in its Amazon Web Services Region. -
The domain of the private DNS name must have a verification status of
verified. -
The TLS certificate specifies the private DNS hostname at which the endpoint is reachable.
-
-
XKS_VPC_ENDPOINT_SERVICE_NOT_FOUND— KMS can't find the VPC endpoint service that it uses to communicate with the external key store proxy. Verify that theXksProxyVpcEndpointServiceNameis correct and the KMS service principal has service consumer permissions on the Amazon VPC endpoint service.
-
- See Also:
ConnectionErrorCodeType
-
-
creationDate
public final Instant creationDate()
The date and time when the custom key store was created.
- Returns:
- The date and time when the custom key store was created.
-
customKeyStoreType
public final CustomKeyStoreType customKeyStoreType()
Indicates the type of the custom key store.
AWS_CLOUDHSMindicates a custom key store backed by an CloudHSM cluster.EXTERNAL_KEY_STOREindicates a custom key store backed by an external key store proxy and external key manager outside of Amazon Web Services.If the service returns an enum value that is not available in the current SDK version,
customKeyStoreTypewill returnCustomKeyStoreType.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromcustomKeyStoreTypeAsString().- Returns:
- Indicates the type of the custom key store.
AWS_CLOUDHSMindicates a custom key store backed by an CloudHSM cluster.EXTERNAL_KEY_STOREindicates a custom key store backed by an external key store proxy and external key manager outside of Amazon Web Services. - See Also:
CustomKeyStoreType
-
customKeyStoreTypeAsString
public final String customKeyStoreTypeAsString()
Indicates the type of the custom key store.
AWS_CLOUDHSMindicates a custom key store backed by an CloudHSM cluster.EXTERNAL_KEY_STOREindicates a custom key store backed by an external key store proxy and external key manager outside of Amazon Web Services.If the service returns an enum value that is not available in the current SDK version,
customKeyStoreTypewill returnCustomKeyStoreType.UNKNOWN_TO_SDK_VERSION. The raw value returned by the service is available fromcustomKeyStoreTypeAsString().- Returns:
- Indicates the type of the custom key store.
AWS_CLOUDHSMindicates a custom key store backed by an CloudHSM cluster.EXTERNAL_KEY_STOREindicates a custom key store backed by an external key store proxy and external key manager outside of Amazon Web Services. - See Also:
CustomKeyStoreType
-
xksProxyConfiguration
public final XksProxyConfigurationType xksProxyConfiguration()
Configuration settings for the external key store proxy (XKS proxy). The external key store proxy translates KMS requests into a format that your external key manager can understand. The proxy configuration includes connection information that KMS requires.
This field appears only when the
CustomKeyStoreTypeisEXTERNAL_KEY_STORE.- Returns:
- Configuration settings for the external key store proxy (XKS proxy). The external key store proxy
translates KMS requests into a format that your external key manager can understand. The proxy
configuration includes connection information that KMS requires.
This field appears only when the
CustomKeyStoreTypeisEXTERNAL_KEY_STORE.
-
toBuilder
public CustomKeyStoresListEntry.Builder toBuilder()
- Specified by:
toBuilderin interfaceToCopyableBuilder<CustomKeyStoresListEntry.Builder,CustomKeyStoresListEntry>
-
builder
public static CustomKeyStoresListEntry.Builder builder()
-
serializableBuilderClass
public static Class<? extends CustomKeyStoresListEntry.Builder> serializableBuilderClass()
-
equalsBySdkFields
public final boolean equalsBySdkFields(Object obj)
- Specified by:
equalsBySdkFieldsin interfaceSdkPojo
-
toString
public final String toString()
Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be redacted from this string using a placeholder value.
-
-