This document provides information about the Encryption keys report screen, which allows you to view, filter, and manage encryption keys in Segura.
Path to access
- In Segura, in the navigation bar, hover over the Product Menu and select DevOps Secret Manager.
- On the side menu, select Encryption > Encryption keys.
Actions menu
Item |
Type |
Description |
Add |
Button |
Directs to the Add encryption key screen. |
Actions |
Dropdown menu |
Displays the Print Report, Export CSV, and Schedule Report options. |
Search fields
Item |
Type |
Description |
ID |
Text field |
Filters the keys by the identifier code. |
Name |
Text field |
Filters keys by name. |
Algorithm |
Dropdown menu |
Filters the keys by the cryptographic algorithm. The default option is All. |
Expiration date |
Date field |
Filters keys by expiration date. |
Version |
Text field |
Filters keys by version. |
Status |
Dropdown menu |
Filters the keys by their activation state. |
Report fields
- ID.
- Name.
- Algorithm.
- Expiration date.
- Version.
- Status.
- Actions:
- Details: directs to the Encryption key screen with details about the cryptographic key.
- Edit: directs to the Encryption key screen in edit mode.
- This screen is the same as the Add encryption key screen.
- History: directs to the Encryption key history screen with the history of the cryptographic key.
- Disable: disables the cryptographic key.
- Operate: directs to the Operate encryption key screen, where you can use the key in question to encrypt or decrypt text.
Add encryption key screen
This screen is used to create new encryption keys, allowing the configuration of essential parameters such as the algorithm used, validity period and detailed description of the key purpose.
Item |
Type |
Mandatory |
Description |
Name |
Text field |
Yes |
Defines the identifier name of the encryption key. |
Encryption algorithm |
Dropdown menu |
Yes |
Allows you to select the encryption algorithm to be used by the key. |
Expiration date |
Date and time fields |
No |
Sets the expiration period of the key. |
Status |
Toggle button |
No |
Enables or disables the encryption key. |
Description |
Text area |
No |
Allows you to add detailed information about the key and its purpose. |
Algorithm information table
The screen displays a table with detailed information about the selected algorithm, including:
Item |
Description |
Encryption algorithm |
Shows the name of the selected algorithm. |
Common use case |
Indicates the typical applications for the chosen algorithm. |
Description |
Provides details on how the algorithm works. |
Security level |
Displays information about the degree of security offered by the algorithm. |
Encryption key screen - read mode
This screen is used to query the details of a specific encryption key, view its properties, and perform key-related actions such as comparing with other keys or performing cryptographic operations.
Item |
Type |
Description |
Name |
Text field |
Displays the identifier name of the encryption key. |
Version |
Text field |
Shows the current version of the key. |
Encryption algorithm |
Text field |
Displays the algorithm used by the key. For example, rsa-3072. |
Expiration date |
Text field |
Indicates the expiration date and time of the key. |
Status |
Text field |
Shows the current state of the key (Active/Inactive). |
Description |
Text field |
Displays additional information about the key and its purpose. |
Compare |
Button |
Directs to the Version comparison screen, which allows you to compare the current key with other versions or system keys. |
Operate |
Button |
Directs to the Operate encryption key screen that allows the execution of cryptographic operations using the displayed key. |
Version compare screen
Item |
Type |
Mandatory |
Description |
From |
Dropdown menu |
Yes |
Allows you to select the source version for comparison. |
To |
Dropdown menu |
Yes |
Allows you to select the target version for comparison. |
Compare |
Button |
No |
Performs the comparison between the selected versions. |
# Operate encryption key
This screen is used to perform practical cryptographic operations using the selected key, allowing you to encrypt and decrypt data as needed. The interface presents detailed information about the algorithm in use, helping to understand its capabilities and recommended applications.
Algorithm information
Item |
Description |
Encryption algorithm |
Displays the algorithm used by the key. |
Common use case |
It presents a description of the typical use of the selected algorithm, highlighting its characteristics. |
Description |
Provides an algorithm strength rating (Very strong). |
Security level |
Describes the appropriate scenarios for using this encryption algorithm. |
Operation fields
There are two tabs in this section: Encryption and Decrypt.
Encryption tab
Item |
Type |
Description |
Value to encrypt |
Text area |
Field to enter text or data that will be encrypted. |
Encrypted value |
Text area |
Displays the result of the encryption operation. |
Encrypt |
Button |
Performs the encryption operation with the given data. |
Decrypt tab
Item |
Type |
Description |
Value to decrypt |
Text area |
Field to enter text or data that will be decrypted. |
Decrypted value |
Text area |
Displays the result of the decryption operation. |
Decrypt |
Button |
Performs the encryption operation with the given data. |
Encryption key history screen
This screen is used to track the modification history of an encryption key, allowing you to view when different versions have been created and perform actions such as querying details or restoring previous versions when necessary.
Key information
Item |
Description |
Name |
Displays the identifier name of the encryption key. |
Algorithm |
Shows the algorithm used by the key. |
Version |
Displays the version number of the key. |
Date |
Shows the date and time the version was created. |
Actions |
Displays buttons for actions available for each version. The available options are Details and Compare. |