Onboarding External KMS

Steps to onboard users to External Key Management System.

The External KMS onboarding process includes details about setting up network components, setting up new user account, providing user permissions, configuring private endpoint, and configuring network policies and IAM policies for accessing vault and keys.

The following diagram is a workflow showing the steps involved in onboarding the External KMS feature:


External Key Management System Onboarding

The External KMS onboarding process involves a series of steps to be completed. You must complete these steps to set up your network configuration.

Once you have deployed the third-party key management system, you must complete the following tasks to onboard into OCI external KMS feature:

Deploying Cipher Trust Manager

Deploy Thales Cipher Trust Manager

To set up Cipher Trust Manager, as a prerequisite you must first complete the Thales CipherTrust Manager (CM) deployment steps.

For more information about Thales CM deployment, see CipherTrust Manager Deployment