HSM user permissions table for CloudHSM CLI
The following table lists hardware security module (HSM) operations sorted by the type of HSM user or session that can perform the operation in AWS CloudHSM.
Admin | Crypto User (CU) | Appliance User (AU) | Unauthenticated Session | |
---|---|---|---|---|
Get basic cluster info¹ | ||||
Change own password | Not applicable | |||
Change any user's password | ||||
Add, remove users | ||||
Get sync status² | ||||
Extract, insert masked objects³ | ||||
Key management functions⁴ | ||||
Encrypt, decrypt | ||||
Sign, verify | ||||
Generate digests and HMACs |
-
[1] Basic cluster information includes the number of HSMs in the cluster and each HSM's IP address, model, serial number, device ID, firmware ID, etc.
-
[2] The user can get a set of digests (hashes) that correspond to the keys on the HSM. An application can compare these sets of digests to understand the synchronization status of HSMs in a cluster.
-
[3] Masked objects are keys that are encrypted before they leave the HSM. They cannot be decrypted outside of the HSM. They are only decrypted after they are inserted into an HSM that is in the same cluster as the HSM from which they were extracted. An application can extract and insert masked objects to synchronize the HSMs in a cluster.
-
[4] Key management functions include creating, deleting, wrapping, unwrapping, and modifying the attributes of keys.