Skip to content

Latest commit

 

History

History
35 lines (28 loc) · 1.47 KB

task_setting_up_gcp_encryption.adoc

File metadata and controls

35 lines (28 loc) · 1.47 KB
sidebar permalink keywords summary
sidebar
task_setting_up_gcp_encryption.html
encryption, gcp, encryption key, permissions, customer-managed, gcpencryption
While Google Cloud Storage always encrypts your data before it’s written to disk, you can use Cloud Manager APIs to create a Cloud Volumes ONTAP system that uses customer-managed encryption keys. These are keys that you generate and manage in GCP using the Cloud Key Management Service.

Using customer-managed encryption keys with Cloud Volumes ONTAP

While Google Cloud Storage always encrypts your data before it’s written to disk, you can use Cloud Manager APIs to create a Cloud Volumes ONTAP system that uses customer-managed encryption keys. These are keys that you generate and manage in GCP using the Cloud Key Management Service.

Steps
  1. Give the Connector service account permission to use the encryption key.

    screenshot gcp key

  2. Obtain the "id" of the key by invoking the get command for the /gcp/vsa/metadata/gcp-encryption-keys API.

  3. Use the "GcpEncryption" parameter with your API request when creating a working environment.

    Example

    "gcpEncryptionParameters": {
        "key": "projects/tlv-support/locations/us-east4/keyRings/Nikiskeys/cryptoKeys/generatedkey1"
      }

Refer to the API Developer Guide for more details about using the "GcpEncryption" parameter.