Encryption keys

Prev Next

This document provides information about the Encryption keys report screen, which allows you to view, filter, and manage encryption keys in Segura.

Path to access

  1. In Segura, in the navigation bar, hover over the Product Menu and select DevOps Secret Manager.
  2. On the side menu, select Encryption > Encryption keys.

Actions menu

Item Type Description
Add Button Directs to the Add encryption key screen.
Actions Dropdown menu Displays the Print Report, Export CSV, and Schedule Report options.

Search fields

Item Type Description
ID Text field Filters the keys by the identifier code.
Name Text field Filters keys by name.
Algorithm Dropdown menu Filters the keys by the cryptographic algorithm. The default option is All.
Expiration date Date field Filters keys by expiration date.
Version Text field Filters keys by version.
Status Dropdown menu Filters the keys by their activation state.

Report fields

  • ID.
  • Name.
  • Algorithm.
  • Expiration date.
  • Version.
  • Status.
  • Actions:
    1. Details: directs to the Encryption key screen with details about the cryptographic key.
    2. Edit: directs to the Encryption key screen in edit mode.
      1. This screen is the same as the Add encryption key screen.
    3. History: directs to the Encryption key history screen with the history of the cryptographic key.
    4. Disable: disables the cryptographic key.
    5. Operate: directs to the Operate encryption key screen, where you can use the key in question to encrypt or decrypt text.

Add encryption key screen

This screen is used to create new encryption keys, allowing the configuration of essential parameters such as the algorithm used, validity period and detailed description of the key purpose.

Item Type Mandatory Description
Name Text field Yes Defines the identifier name of the encryption key.
Encryption algorithm Dropdown menu Yes Allows you to select the encryption algorithm to be used by the key.
Expiration date Date and time fields No Sets the expiration period of the key.
Status Toggle button No Enables or disables the encryption key.
Description Text area No Allows you to add detailed information about the key and its purpose.

Algorithm information table

The screen displays a table with detailed information about the selected algorithm, including:

Item Description
Encryption algorithm Shows the name of the selected algorithm.
Common use case Indicates the typical applications for the chosen algorithm.
Description Provides details on how the algorithm works.
Security level Displays information about the degree of security offered by the algorithm.

Encryption key screen - read mode

This screen is used to query the details of a specific encryption key, view its properties, and perform key-related actions such as comparing with other keys or performing cryptographic operations.

Item Type Description
Name Text field Displays the identifier name of the encryption key.
Version Text field Shows the current version of the key.
Encryption algorithm Text field Displays the algorithm used by the key. For example, rsa-3072.
Expiration date Text field Indicates the expiration date and time of the key.
Status Text field Shows the current state of the key (Active/Inactive).
Description Text field Displays additional information about the key and its purpose.
Compare Button Directs to the Version comparison screen, which allows you to compare the current key with other versions or system keys.
Operate Button Directs to the Operate encryption key screen that allows the execution of cryptographic operations using the displayed key.

Version compare screen

Item Type Mandatory Description
From Dropdown menu Yes Allows you to select the source version for comparison.
To Dropdown menu Yes Allows you to select the target version for comparison.
Compare Button No Performs the comparison between the selected versions.

# Operate encryption key

This screen is used to perform practical cryptographic operations using the selected key, allowing you to encrypt and decrypt data as needed. The interface presents detailed information about the algorithm in use, helping to understand its capabilities and recommended applications.

Algorithm information

Item Description
Encryption algorithm Displays the algorithm used by the key.
Common use case It presents a description of the typical use of the selected algorithm, highlighting its characteristics.
Description Provides an algorithm strength rating (Very strong).
Security level Describes the appropriate scenarios for using this encryption algorithm.

Operation fields

There are two tabs in this section: Encryption and Decrypt.

Encryption tab

Item Type Description
Value to encrypt Text area Field to enter text or data that will be encrypted.
Encrypted value Text area Displays the result of the encryption operation.
Encrypt Button Performs the encryption operation with the given data.

Decrypt tab

Item Type Description
Value to decrypt Text area Field to enter text or data that will be decrypted.
Decrypted value Text area Displays the result of the decryption operation.
Decrypt Button Performs the encryption operation with the given data.

Encryption key history screen

This screen is used to track the modification history of an encryption key, allowing you to view when different versions have been created and perform actions such as querying details or restoring previous versions when necessary.

Key information

Item Description
Name Displays the identifier name of the encryption key.
Algorithm Shows the algorithm used by the key.
Version Displays the version number of the key.
Date Shows the date and time the version was created.
Actions Displays buttons for actions available for each version. The available options are Details and Compare.