If using the latest SDK version series, use CloudHSM CLI to manage the keys in your AWS CloudHSM cluster. For more details, see the topics below.
-
Using trusted keys describes how to use CloudHSM CLI to create trusted keys to secure data.
-
Generating keys includes instructions on creating keys, including symmetric keys, RSA keys, and EC keys.
-
Deleting keys describes how key owners delete keys.
-
Sharing and unsharing keys details how key owners share and unshare keys.
-
Filtering keys offers guidelines on how to use filters to find keys.
-
Manage key quorum authentication (M of N) offers guidelines on how to setup and use quorum authentication with keys.