

# Verify an AWS CloudHSM key using KMU
<a name="key_mgmt_util-findSingleKey"></a>

Use the **findSingleKey** command in the AWS CloudHSM key\$1mgmt\$1util tool to verify that a key exists on all hardware security modules (HSM) in the AWS CloudHSM cluster.

Before you run any key\$1mgmt\$1util command, you must [start key\$1mgmt\$1util](key_mgmt_util-setup.md#key_mgmt_util-start) and [log in](key_mgmt_util-log-in.md) to the HSM as a crypto user (CU). 

## Syntax
<a name="findSingleKey-syntax"></a>

```
findSingleKey -h

findSingleKey -k <key-handle>
```

## Example
<a name="findSingleKey-examples"></a>

**Example**  
This command verifies that key `252136` exists on all three HSMs in the cluster.  

```
Command: findSingleKey -k 252136
Cfm3FindKey returned: 0x00 : HSM Return: SUCCESS

        Cluster Error Status
        Node id 2 and err state 0x00000000 : HSM Return: SUCCESS
        Node id 1 and err state 0x00000000 : HSM Return: SUCCESS
        Node id 0 and err state 0x00000000 : HSM Return: SUCCESS
```

## Parameters
<a name="findSingleKey-parameters"></a>

**-h**  
Displays help for the command.   
Required: Yes

**-k**  
Specifies the key handle of one key in the HSM. This parameter is required.   
To find key handles, use the [findKey](key_mgmt_util-listUsers.md) command.  
Required: Yes

## Related topics
<a name="findSingleKey-seealso"></a>
+ [findKey](key_mgmt_util-listUsers.md)
+ [getKeyInfo](key_mgmt_util-listUsers.md)
+ [getAttribute](key_mgmt_util-findKey.md)