gcloud beta kms - manage cryptographic keys in the cloud
gcloud beta kms GROUP | COMMAND [GCLOUD_WIDE_FLAG ...]
(BETA) The gcloud kms command group lets you generate, use, rotate and destroy Google Cloud KMS keys.
Cloud KMS is a cloud-hosted key management service that lets you manage encryption for your cloud services the same way you do on-premises. You can generate, use, rotate and destroy AES256 encryption keys. Cloud KMS is integrated with IAM and Cloud Audit Logging so that you can manage permissions on individual keys, and monitor how these are used. Use Cloud KMS to protect secrets and other sensitive data which you need to store in Google Cloud Platform.
More information on Cloud KMS can be found here: https://cloud.google.com/kms/ and detailed documentation can be found here: https://cloud.google.com/kms/docs/
These flags are available to all commands: --help.
Run $ gcloud help for details.
GROUP is one of the following:
- ekm-connections
(BETA) Create and manage ekm connections.
- import-jobs
(BETA) Create and manage import jobs.
- keyrings
(BETA) Create and manage keyrings.
- keys
(BETA) Create and manage keys.
- locations
(BETA) View locations available for a project.
COMMAND is one of the following:
- asymmetric-decrypt
(BETA) Decrypt an input file using an asymmetric-encryption key version.
- asymmetric-sign
(BETA) Sign a user input file using an asymmetric-signing key version.
- decrypt
(BETA) Decrypt a ciphertext file using a Cloud KMS key.
- encrypt
(BETA) Encrypt a plaintext file using a key.
- mac-sign
(BETA) Sign a user input file using a MAC key version.
- mac-verify
(BETA) Verify a user signature file using a MAC key version.
This command is currently in beta and might change without notice. These variants are also available:
$ gcloud kms
$ gcloud alpha kms