- gcloud alpha kms - manage cryptographic keys in the cloud
gcloud alpha kms GROUP | COMMAND [GCLOUD_WIDE_FLAG ...]
(ALPHA) The gcloud kms command group lets you generate, use, rotate and
Cloud KMS is a cloud-hosted key management service that lets you manage encryption for your cloud services the same way you do on-premises. You can generate, use, rotate and destroy AES256 encryption keys. Cloud KMS is integrated with IAM and Cloud Audit Logging so that you can manage permissions on individual keys, and monitor how these are used. Use Cloud KMS to protect secrets and other sensitive data which you need to store in Google Cloud Platform.
More information on Cloud KMS can be found here: cloud.google.com/kms and detailed documentation can be found here: cloud.google.com/kms/docs
GCLOUD WIDE FLAGS
These flags are available to all commands: --account, --configuration, --flags-file, --flatten, --format, --help, --log-http, --project, --quiet, --trace-token, --user-output-enabled, --verbosity. Run $ gcloud help for details.
GROUP is one of the following:
(ALPHA) Create and manage keyrings.
(ALPHA) Create and manage keys.
(ALPHA) View locations available for a project.
COMMAND is one of the following:
(ALPHA) Decrypt an input file using an asymmetric-encryption key version.
(ALPHA) Sign a user input file using an asymmetric-signing key version.
(ALPHA) Decrypt a ciphertext file using a Cloud KMS key.
(ALPHA) Encrypt a plaintext file using a key.
This command is currently in ALPHA and may change without notice. If this command fails with API permission errors despite specifying the right project, you will have to apply for early access and have your projects registered on the API whitelist to use it. To do so, contact Support at cloud.google.com/support These variants are also available:
- $ gcloud kms $ gcloud beta kms