Payment Cryptography Control Plane 2021-09-14
- Client: Aws\PaymentCryptography\PaymentCryptographyClient
- Service ID: payment-cryptography
- Version: 2021-09-14
This page describes the parameters and results for the operations of the Payment Cryptography Control Plane (2021-09-14), and shows how to use the Aws\PaymentCryptography\PaymentCryptographyClient object to call the described operations. This documentation is specific to the 2021-09-14 API version of the service.
Operation Summary
Each of the following operations can be created from a client using
$client->getCommand('CommandName')
, where "CommandName" is the
name of one of the following operations. Note: a command is a value that
encapsulates an operation and the parameters used to create an HTTP request.
You can also create and send a command immediately using the magic methods
available on a client object: $client->commandName(/* parameters */)
.
You can send the command asynchronously (returning a promise) by appending the
word "Async" to the operation name: $client->commandNameAsync(/* parameters */)
.
- CreateAlias ( array $params = [] )
- Creates an alias, or a friendly name, for an Amazon Web Services Payment Cryptography key.
- CreateKey ( array $params = [] )
- Creates an Amazon Web Services Payment Cryptography key, a logical representation of a cryptographic key, that is unique in your account and Amazon Web Services Region.
- DeleteAlias ( array $params = [] )
- Deletes the alias, but doesn't affect the underlying key.
- DeleteKey ( array $params = [] )
- Deletes the key material and metadata associated with Amazon Web Services Payment Cryptography key.
- ExportKey ( array $params = [] )
- Exports a key from Amazon Web Services Payment Cryptography.
- GetAlias ( array $params = [] )
- Gets the Amazon Web Services Payment Cryptography key associated with the alias.
- GetKey ( array $params = [] )
- Gets the key material for an Amazon Web Services Payment Cryptography key, including the immutable and mutable data specified when the key was created.
- GetParametersForExport ( array $params = [] )
- Gets the export token and the signing key certificate to initiate a TR-34 key export from Amazon Web Services Payment Cryptography.
- GetParametersForImport ( array $params = [] )
- Gets the import token and the wrapping key certificate in PEM format (base64 encoded) to initiate a TR-34 WrappedKeyBlock or a RSA WrappedKeyCryptogram import into Amazon Web Services Payment Cryptography.
- GetPublicKeyCertificate ( array $params = [] )
- Gets the public key certificate of the asymmetric key pair that exists within Amazon Web Services Payment Cryptography.
- ImportKey ( array $params = [] )
- Imports symmetric keys and public key certificates in PEM format (base64 encoded) into Amazon Web Services Payment Cryptography.
- ListAliases ( array $params = [] )
- Lists the aliases for all keys in the caller's Amazon Web Services account and Amazon Web Services Region.
- ListKeys ( array $params = [] )
- Lists the keys in the caller's Amazon Web Services account and Amazon Web Services Region.
- ListTagsForResource ( array $params = [] )
- Lists the tags for an Amazon Web Services resource.
- RestoreKey ( array $params = [] )
- Cancels a scheduled key deletion during the waiting period.
- StartKeyUsage ( array $params = [] )
- Enables an Amazon Web Services Payment Cryptography key, which makes it active for cryptographic operations within Amazon Web Services Payment Cryptography Cross-account use: This operation can't be used across different Amazon Web Services accounts.
- StopKeyUsage ( array $params = [] )
- Disables an Amazon Web Services Payment Cryptography key, which makes it inactive within Amazon Web Services Payment Cryptography.
- TagResource ( array $params = [] )
- Adds or edits tags on an Amazon Web Services Payment Cryptography key.
- UntagResource ( array $params = [] )
- Deletes a tag from an Amazon Web Services Payment Cryptography key.
- UpdateAlias ( array $params = [] )
- Associates an existing Amazon Web Services Payment Cryptography alias with a different key.
Paginators
Paginators handle automatically iterating over paginated API results. Paginators are associated with specific API operations, and they accept the parameters that the corresponding API operation accepts. You can get a paginator from a client class using getPaginator($paginatorName, $operationParameters). This client supports the following paginators:
Operations
CreateAlias
$result = $client->createAlias
([/* ... */]); $promise = $client->createAliasAsync
([/* ... */]);
Creates an alias, or a friendly name, for an Amazon Web Services Payment Cryptography key. You can use an alias to identify a key in the console and when you call cryptographic operations such as EncryptData or DecryptData.
You can associate the alias with any key in the same Amazon Web Services Region. Each alias is associated with only one key at a time, but a key can have multiple aliases. You can't create an alias without a key. The alias must be unique in the account and Amazon Web Services Region, but you can create another alias with the same name in a different Amazon Web Services Region.
To change the key that's associated with the alias, call UpdateAlias. To delete the alias, call DeleteAlias. These operations don't affect the underlying key. To get the alias that you created, call ListAliases.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->createAlias([ 'AliasName' => '<string>', // REQUIRED 'KeyArn' => '<string>', ]);
Parameter Details
Members
- AliasName
-
- Required: Yes
- Type: string
A friendly name that you can use to refer to a key. An alias must begin with
alias/
followed by a name, for examplealias/ExampleAlias
. It can contain only alphanumeric characters, forward slashes (/), underscores (_), and dashes (-).Don't include personal, confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.
- KeyArn
-
- Type: string
The
KeyARN
of the key to associate with the alias.
Result Syntax
[ 'Alias' => [ 'AliasName' => '<string>', 'KeyArn' => '<string>', ], ]
Result Details
Members
- Alias
-
- Required: Yes
- Type: Alias structure
The alias for the key.
Errors
- ServiceQuotaExceededException:
This request would cause a service quota to be exceeded.
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
CreateKey
$result = $client->createKey
([/* ... */]); $promise = $client->createKeyAsync
([/* ... */]);
Creates an Amazon Web Services Payment Cryptography key, a logical representation of a cryptographic key, that is unique in your account and Amazon Web Services Region. You use keys for cryptographic functions such as encryption and decryption.
In addition to the key material used in cryptographic operations, an Amazon Web Services Payment Cryptography key includes metadata such as the key ARN, key usage, key origin, creation date, description, and key state.
When you create a key, you specify both immutable and mutable data about the key. The immutable data contains key attributes that define the scope and cryptographic operations that you can perform using the key, for example key class (example: SYMMETRIC_KEY
), key algorithm (example: TDES_2KEY
), key usage (example: TR31_P0_PIN_ENCRYPTION_KEY
) and key modes of use (example: Encrypt
). For information about valid combinations of key attributes, see Understanding key attributes in the Amazon Web Services Payment Cryptography User Guide. The mutable data contained within a key includes usage timestamp and key deletion timestamp and can be modified after creation.
Amazon Web Services Payment Cryptography binds key attributes to keys using key blocks when you store or export them. Amazon Web Services Payment Cryptography stores the key contents wrapped and never stores or transmits them in the clear.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->createKey([ 'Enabled' => true || false, 'Exportable' => true || false, // REQUIRED 'KeyAttributes' => [ // REQUIRED 'KeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', // REQUIRED 'KeyClass' => 'SYMMETRIC_KEY|ASYMMETRIC_KEY_PAIR|PRIVATE_KEY|PUBLIC_KEY', // REQUIRED 'KeyModesOfUse' => [ // REQUIRED 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyUsage' => 'TR31_B0_BASE_DERIVATION_KEY|TR31_C0_CARD_VERIFICATION_KEY|TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY|TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION|TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS|TR31_E1_EMV_MKEY_CONFIDENTIALITY|TR31_E2_EMV_MKEY_INTEGRITY|TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS|TR31_E5_EMV_MKEY_CARD_PERSONALIZATION|TR31_E6_EMV_MKEY_OTHER|TR31_K0_KEY_ENCRYPTION_KEY|TR31_K1_KEY_BLOCK_PROTECTION_KEY|TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT|TR31_M3_ISO_9797_3_MAC_KEY|TR31_M1_ISO_9797_1_MAC_KEY|TR31_M6_ISO_9797_5_CMAC_KEY|TR31_M7_HMAC_KEY|TR31_P0_PIN_ENCRYPTION_KEY|TR31_P1_PIN_GENERATION_KEY|TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE|TR31_V1_IBM3624_PIN_VERIFICATION_KEY|TR31_V2_VISA_PIN_VERIFICATION_KEY|TR31_K2_TR34_ASYMMETRIC_KEY', // REQUIRED ], 'KeyCheckValueAlgorithm' => 'CMAC|ANSI_X9_24', 'Tags' => [ [ 'Key' => '<string>', // REQUIRED 'Value' => '<string>', ], // ... ], ]);
Parameter Details
Members
- Enabled
-
- Type: boolean
Specifies whether to enable the key. If the key is enabled, it is activated for use within the service. If the key is not enabled, then it is created but not activated. The default value is enabled.
- Exportable
-
- Required: Yes
- Type: boolean
Specifies whether the key is exportable from the service.
- KeyAttributes
-
- Required: Yes
- Type: KeyAttributes structure
The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the key is created.
- KeyCheckValueAlgorithm
-
- Type: string
The algorithm that Amazon Web Services Payment Cryptography uses to calculate the key check value (KCV). It is used to validate the key integrity.
For TDES keys, the KCV is computed by encrypting 8 bytes, each with value of zero, with the key to be checked and retaining the 3 highest order bytes of the encrypted result. For AES keys, the KCV is computed using a CMAC algorithm where the input data is 16 bytes of zero and retaining the 3 highest order bytes of the encrypted result.
- Tags
-
- Type: Array of Tag structures
Assigns one or more tags to the Amazon Web Services Payment Cryptography key. Use this parameter to tag a key when it is created. To tag an existing Amazon Web Services Payment Cryptography key, use the TagResource operation.
Each tag consists of a tag key and a tag value. Both the tag key and the tag value are required, but the tag value can be an empty (null) string. You can't have more than one tag on an Amazon Web Services Payment Cryptography key with the same tag key.
Don't include personal, confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.
Tagging or untagging an Amazon Web Services Payment Cryptography key can allow or deny permission to the key.
Result Syntax
[ 'Key' => [ 'CreateTimestamp' => <DateTime>, 'DeletePendingTimestamp' => <DateTime>, 'DeleteTimestamp' => <DateTime>, 'Enabled' => true || false, 'Exportable' => true || false, 'KeyArn' => '<string>', 'KeyAttributes' => [ 'KeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', 'KeyClass' => 'SYMMETRIC_KEY|ASYMMETRIC_KEY_PAIR|PRIVATE_KEY|PUBLIC_KEY', 'KeyModesOfUse' => [ 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyUsage' => 'TR31_B0_BASE_DERIVATION_KEY|TR31_C0_CARD_VERIFICATION_KEY|TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY|TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION|TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS|TR31_E1_EMV_MKEY_CONFIDENTIALITY|TR31_E2_EMV_MKEY_INTEGRITY|TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS|TR31_E5_EMV_MKEY_CARD_PERSONALIZATION|TR31_E6_EMV_MKEY_OTHER|TR31_K0_KEY_ENCRYPTION_KEY|TR31_K1_KEY_BLOCK_PROTECTION_KEY|TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT|TR31_M3_ISO_9797_3_MAC_KEY|TR31_M1_ISO_9797_1_MAC_KEY|TR31_M6_ISO_9797_5_CMAC_KEY|TR31_M7_HMAC_KEY|TR31_P0_PIN_ENCRYPTION_KEY|TR31_P1_PIN_GENERATION_KEY|TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE|TR31_V1_IBM3624_PIN_VERIFICATION_KEY|TR31_V2_VISA_PIN_VERIFICATION_KEY|TR31_K2_TR34_ASYMMETRIC_KEY', ], 'KeyCheckValue' => '<string>', 'KeyCheckValueAlgorithm' => 'CMAC|ANSI_X9_24', 'KeyOrigin' => 'EXTERNAL|AWS_PAYMENT_CRYPTOGRAPHY', 'KeyState' => 'CREATE_IN_PROGRESS|CREATE_COMPLETE|DELETE_PENDING|DELETE_COMPLETE', 'UsageStartTimestamp' => <DateTime>, 'UsageStopTimestamp' => <DateTime>, ], ]
Result Details
Members
- Key
-
- Required: Yes
- Type: Key structure
The key material that contains all the key attributes.
Errors
- ServiceQuotaExceededException:
This request would cause a service quota to be exceeded.
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
DeleteAlias
$result = $client->deleteAlias
([/* ... */]); $promise = $client->deleteAliasAsync
([/* ... */]);
Deletes the alias, but doesn't affect the underlying key.
Each key can have multiple aliases. To get the aliases of all keys, use the UpdateAlias operation. To change the alias of a key, first use DeleteAlias to delete the current alias and then use CreateAlias to create a new alias. To associate an existing alias with a different key, call UpdateAlias.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->deleteAlias([ 'AliasName' => '<string>', // REQUIRED ]);
Parameter Details
Members
- AliasName
-
- Required: Yes
- Type: string
A friendly name that you can use to refer Amazon Web Services Payment Cryptography key. This value must begin with
alias/
followed by a name, such asalias/ExampleAlias
.
Result Syntax
[]
Result Details
Errors
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
DeleteKey
$result = $client->deleteKey
([/* ... */]); $promise = $client->deleteKeyAsync
([/* ... */]);
Deletes the key material and metadata associated with Amazon Web Services Payment Cryptography key.
Key deletion is irreversible. After a key is deleted, you can't perform cryptographic operations using the key. For example, you can't decrypt data that was encrypted by a deleted Amazon Web Services Payment Cryptography key, and the data may become unrecoverable. Because key deletion is destructive, Amazon Web Services Payment Cryptography has a safety mechanism to prevent accidental deletion of a key. When you call this operation, Amazon Web Services Payment Cryptography disables the specified key but doesn't delete it until after a waiting period set using DeleteKeyInDays
. The default waiting period is 7 days. During the waiting period, the KeyState
is DELETE_PENDING
. After the key is deleted, the KeyState
is DELETE_COMPLETE
.
You should delete a key only when you are sure that you don't need to use it anymore and no other parties are utilizing this key. If you aren't sure, consider deactivating it instead by calling StopKeyUsage.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->deleteKey([ 'DeleteKeyInDays' => <integer>, 'KeyIdentifier' => '<string>', // REQUIRED ]);
Parameter Details
Members
- DeleteKeyInDays
-
- Type: int
The waiting period for key deletion. The default value is seven days.
- KeyIdentifier
-
- Required: Yes
- Type: string
The
KeyARN
of the key that is scheduled for deletion.
Result Syntax
[ 'Key' => [ 'CreateTimestamp' => <DateTime>, 'DeletePendingTimestamp' => <DateTime>, 'DeleteTimestamp' => <DateTime>, 'Enabled' => true || false, 'Exportable' => true || false, 'KeyArn' => '<string>', 'KeyAttributes' => [ 'KeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', 'KeyClass' => 'SYMMETRIC_KEY|ASYMMETRIC_KEY_PAIR|PRIVATE_KEY|PUBLIC_KEY', 'KeyModesOfUse' => [ 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyUsage' => 'TR31_B0_BASE_DERIVATION_KEY|TR31_C0_CARD_VERIFICATION_KEY|TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY|TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION|TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS|TR31_E1_EMV_MKEY_CONFIDENTIALITY|TR31_E2_EMV_MKEY_INTEGRITY|TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS|TR31_E5_EMV_MKEY_CARD_PERSONALIZATION|TR31_E6_EMV_MKEY_OTHER|TR31_K0_KEY_ENCRYPTION_KEY|TR31_K1_KEY_BLOCK_PROTECTION_KEY|TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT|TR31_M3_ISO_9797_3_MAC_KEY|TR31_M1_ISO_9797_1_MAC_KEY|TR31_M6_ISO_9797_5_CMAC_KEY|TR31_M7_HMAC_KEY|TR31_P0_PIN_ENCRYPTION_KEY|TR31_P1_PIN_GENERATION_KEY|TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE|TR31_V1_IBM3624_PIN_VERIFICATION_KEY|TR31_V2_VISA_PIN_VERIFICATION_KEY|TR31_K2_TR34_ASYMMETRIC_KEY', ], 'KeyCheckValue' => '<string>', 'KeyCheckValueAlgorithm' => 'CMAC|ANSI_X9_24', 'KeyOrigin' => 'EXTERNAL|AWS_PAYMENT_CRYPTOGRAPHY', 'KeyState' => 'CREATE_IN_PROGRESS|CREATE_COMPLETE|DELETE_PENDING|DELETE_COMPLETE', 'UsageStartTimestamp' => <DateTime>, 'UsageStopTimestamp' => <DateTime>, ], ]
Result Details
Members
- Key
-
- Required: Yes
- Type: Key structure
The
KeyARN
of the key that is scheduled for deletion.
Errors
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
ExportKey
$result = $client->exportKey
([/* ... */]); $promise = $client->exportKeyAsync
([/* ... */]);
Exports a key from Amazon Web Services Payment Cryptography.
Amazon Web Services Payment Cryptography simplifies key exchange by replacing the existing paper-based approach with a modern electronic approach. With ExportKey
you can export symmetric keys using either symmetric and asymmetric key exchange mechanisms. Using this operation, you can share your Amazon Web Services Payment Cryptography generated keys with other service partners to perform cryptographic operations outside of Amazon Web Services Payment Cryptography
For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm and RSA wrap and unwrap key exchange mechanism. Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK). After which you can export working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.
The TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block. With RSA wrap and unwrap, you can exchange both 3DES and AES-128 keys. The keys are imported in a WrappedKeyCryptogram format and you will need to specify the key attributes during import.
You can also use ExportKey
functionality to generate and export an IPEK (Initial Pin Encryption Key) from Amazon Web Services Payment Cryptography using either TR-31 or TR-34 export key exchange. IPEK is generated from BDK (Base Derivation Key) and ExportDukptInitialKey
attribute KSN (KeySerialNumber
). The generated IPEK does not persist within Amazon Web Services Payment Cryptography and has to be re-generated each time during export.
For key exchange using TR-31 or TR-34 key blocks, you can also export optional blocks within the key block header which contain additional attribute information about the key. The KeyVersion
within KeyBlockHeaders
indicates the version of the key within the key block. Furthermore, KeyExportability
within KeyBlockHeaders
can be used to further restrict exportability of the key after export from Amazon Web Services Payment Cryptography.
The OptionalBlocks
contain the additional data related to the key. For information on data type that can be included within optional blocks, refer to ASC X9.143-2022.
Data included in key block headers is signed but transmitted in clear text. Sensitive or confidential information should not be included in optional blocks. Refer to ASC X9.143-2022 standard for information on allowed data type.
To export initial keys (KEK) or IPEK using TR-34
Using this operation, you can export initial key using TR-34 asymmetric key exchange. You can only export KEK generated within Amazon Web Services Payment Cryptography. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Device (KRD). During key export process, KDH is Amazon Web Services Payment Cryptography which initiates key export and KRD is the user receiving the key.
To initiate TR-34 key export, the KRD must obtain an export token by calling GetParametersForExport. This operation also generates a key pair for the purpose of key export, signs the key and returns back the signing public key certificate (also known as KDH signing certificate) and root certificate chain. The KDH uses the private key to sign the the export payload and the signing public key certificate is provided to KRD to verify the signature. The KRD can import the root certificate into its Hardware Security Module (HSM), as required. The export token and the associated KDH signing certificate expires after 7 days.
Next the KRD generates a key pair for the the purpose of encrypting the KDH key and provides the public key cerificate (also known as KRD wrapping certificate) back to KDH. The KRD will also import the root cerificate chain into Amazon Web Services Payment Cryptography by calling ImportKey for RootCertificatePublicKey
. The KDH, Amazon Web Services Payment Cryptography, will use the KRD wrapping cerificate to encrypt (wrap) the key under export and signs it with signing private key to generate a TR-34 WrappedKeyBlock. For more information on TR-34 key export, see section Exporting symmetric keys in the Amazon Web Services Payment Cryptography User Guide.
Set the following parameters:
-
ExportAttributes
: Specify export attributes in case of IPEK export. This parameter is optional for KEK export. -
ExportKeyIdentifier
: TheKeyARN
of the KEK or BDK (in case of IPEK) under export. -
KeyMaterial
: UseTr34KeyBlock
parameters. -
CertificateAuthorityPublicKeyIdentifier
: TheKeyARN
of the certificate chain that signed the KRD wrapping key certificate. -
ExportToken
: Obtained from KDH by calling GetParametersForImport. -
WrappingKeyCertificate
: The public key certificate in PEM format (base64 encoded) of the KRD wrapping key Amazon Web Services Payment Cryptography uses for encryption of the TR-34 export payload. This certificate must be signed by the root certificate (CertificateAuthorityPublicKeyIdentifier) imported into Amazon Web Services Payment Cryptography.
When this operation is successful, Amazon Web Services Payment Cryptography returns the KEK or IPEK as a TR-34 WrappedKeyBlock.
To export initial keys (KEK) or IPEK using RSA Wrap and Unwrap
Using this operation, you can export initial key using asymmetric RSA wrap and unwrap key exchange method. To initiate export, generate an asymmetric key pair on the receiving HSM and obtain the public key certificate in PEM format (base64 encoded) for the purpose of wrapping and the root certifiate chain. Import the root certificate into Amazon Web Services Payment Cryptography by calling ImportKey for RootCertificatePublicKey
.
Next call ExportKey
and set the following parameters:
-
CertificateAuthorityPublicKeyIdentifier
: TheKeyARN
of the certificate chain that signed wrapping key certificate. -
KeyMaterial
: Set toKeyCryptogram
. -
WrappingKeyCertificate
: The public key certificate in PEM format (base64 encoded) obtained by the receiving HSM and signed by the root certificate (CertificateAuthorityPublicKeyIdentifier) imported into Amazon Web Services Payment Cryptography. The receiving HSM uses its private key component to unwrap the WrappedKeyCryptogram.
When this operation is successful, Amazon Web Services Payment Cryptography returns the WrappedKeyCryptogram.
To export working keys or IPEK using TR-31
Using this operation, you can export working keys or IPEK using TR-31 symmetric key exchange. In TR-31, you must use an initial key such as KEK to encrypt or wrap the key under export. To establish a KEK, you can use CreateKey or ImportKey.
Set the following parameters:
-
ExportAttributes
: Specify export attributes in case of IPEK export. This parameter is optional for KEK export. -
ExportKeyIdentifier
: TheKeyARN
of the KEK or BDK (in case of IPEK) under export. -
KeyMaterial
: UseTr31KeyBlock
parameters.
When this operation is successful, Amazon Web Services Payment Cryptography returns the working key or IPEK as a TR-31 WrappedKeyBlock.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->exportKey([ 'ExportAttributes' => [ 'ExportDukptInitialKey' => [ 'KeySerialNumber' => '<string>', // REQUIRED ], 'KeyCheckValueAlgorithm' => 'CMAC|ANSI_X9_24', ], 'ExportKeyIdentifier' => '<string>', // REQUIRED 'KeyMaterial' => [ // REQUIRED 'KeyCryptogram' => [ 'CertificateAuthorityPublicKeyIdentifier' => '<string>', // REQUIRED 'WrappingKeyCertificate' => '<string>', // REQUIRED 'WrappingSpec' => 'RSA_OAEP_SHA_256|RSA_OAEP_SHA_512', ], 'Tr31KeyBlock' => [ 'KeyBlockHeaders' => [ 'KeyExportability' => 'EXPORTABLE|NON_EXPORTABLE|SENSITIVE', 'KeyModesOfUse' => [ 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyVersion' => '<string>', 'OptionalBlocks' => ['<string>', ...], ], 'WrappingKeyIdentifier' => '<string>', // REQUIRED ], 'Tr34KeyBlock' => [ 'CertificateAuthorityPublicKeyIdentifier' => '<string>', // REQUIRED 'ExportToken' => '<string>', // REQUIRED 'KeyBlockFormat' => 'X9_TR34_2012', // REQUIRED 'KeyBlockHeaders' => [ 'KeyExportability' => 'EXPORTABLE|NON_EXPORTABLE|SENSITIVE', 'KeyModesOfUse' => [ 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyVersion' => '<string>', 'OptionalBlocks' => ['<string>', ...], ], 'RandomNonce' => '<string>', 'WrappingKeyCertificate' => '<string>', // REQUIRED ], ], ]);
Parameter Details
Members
- ExportAttributes
-
- Type: ExportAttributes structure
The attributes for IPEK generation during export.
- ExportKeyIdentifier
-
- Required: Yes
- Type: string
The
KeyARN
of the key under export from Amazon Web Services Payment Cryptography. - KeyMaterial
-
- Required: Yes
- Type: ExportKeyMaterial structure
The key block format type, for example, TR-34 or TR-31, to use during key material export.
Result Syntax
[ 'WrappedKey' => [ 'KeyCheckValue' => '<string>', 'KeyCheckValueAlgorithm' => 'CMAC|ANSI_X9_24', 'KeyMaterial' => '<string>', 'WrappedKeyMaterialFormat' => 'KEY_CRYPTOGRAM|TR31_KEY_BLOCK|TR34_KEY_BLOCK', 'WrappingKeyArn' => '<string>', ], ]
Result Details
Members
- WrappedKey
-
- Type: WrappedKey structure
The key material under export as a TR-34 WrappedKeyBlock or a TR-31 WrappedKeyBlock. or a RSA WrappedKeyCryptogram.
Errors
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
GetAlias
$result = $client->getAlias
([/* ... */]); $promise = $client->getAliasAsync
([/* ... */]);
Gets the Amazon Web Services Payment Cryptography key associated with the alias.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->getAlias([ 'AliasName' => '<string>', // REQUIRED ]);
Parameter Details
Members
- AliasName
-
- Required: Yes
- Type: string
The alias of the Amazon Web Services Payment Cryptography key.
Result Syntax
[ 'Alias' => [ 'AliasName' => '<string>', 'KeyArn' => '<string>', ], ]
Result Details
Members
- Alias
-
- Required: Yes
- Type: Alias structure
The alias of the Amazon Web Services Payment Cryptography key.
Errors
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
GetKey
$result = $client->getKey
([/* ... */]); $promise = $client->getKeyAsync
([/* ... */]);
Gets the key material for an Amazon Web Services Payment Cryptography key, including the immutable and mutable data specified when the key was created.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->getKey([ 'KeyIdentifier' => '<string>', // REQUIRED ]);
Parameter Details
Members
- KeyIdentifier
-
- Required: Yes
- Type: string
The
KeyARN
of the Amazon Web Services Payment Cryptography key.
Result Syntax
[ 'Key' => [ 'CreateTimestamp' => <DateTime>, 'DeletePendingTimestamp' => <DateTime>, 'DeleteTimestamp' => <DateTime>, 'Enabled' => true || false, 'Exportable' => true || false, 'KeyArn' => '<string>', 'KeyAttributes' => [ 'KeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', 'KeyClass' => 'SYMMETRIC_KEY|ASYMMETRIC_KEY_PAIR|PRIVATE_KEY|PUBLIC_KEY', 'KeyModesOfUse' => [ 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyUsage' => 'TR31_B0_BASE_DERIVATION_KEY|TR31_C0_CARD_VERIFICATION_KEY|TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY|TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION|TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS|TR31_E1_EMV_MKEY_CONFIDENTIALITY|TR31_E2_EMV_MKEY_INTEGRITY|TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS|TR31_E5_EMV_MKEY_CARD_PERSONALIZATION|TR31_E6_EMV_MKEY_OTHER|TR31_K0_KEY_ENCRYPTION_KEY|TR31_K1_KEY_BLOCK_PROTECTION_KEY|TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT|TR31_M3_ISO_9797_3_MAC_KEY|TR31_M1_ISO_9797_1_MAC_KEY|TR31_M6_ISO_9797_5_CMAC_KEY|TR31_M7_HMAC_KEY|TR31_P0_PIN_ENCRYPTION_KEY|TR31_P1_PIN_GENERATION_KEY|TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE|TR31_V1_IBM3624_PIN_VERIFICATION_KEY|TR31_V2_VISA_PIN_VERIFICATION_KEY|TR31_K2_TR34_ASYMMETRIC_KEY', ], 'KeyCheckValue' => '<string>', 'KeyCheckValueAlgorithm' => 'CMAC|ANSI_X9_24', 'KeyOrigin' => 'EXTERNAL|AWS_PAYMENT_CRYPTOGRAPHY', 'KeyState' => 'CREATE_IN_PROGRESS|CREATE_COMPLETE|DELETE_PENDING|DELETE_COMPLETE', 'UsageStartTimestamp' => <DateTime>, 'UsageStopTimestamp' => <DateTime>, ], ]
Result Details
Members
- Key
-
- Required: Yes
- Type: Key structure
The key material, including the immutable and mutable data for the key.
Errors
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
GetParametersForExport
$result = $client->getParametersForExport
([/* ... */]); $promise = $client->getParametersForExportAsync
([/* ... */]);
Gets the export token and the signing key certificate to initiate a TR-34 key export from Amazon Web Services Payment Cryptography.
The signing key certificate signs the wrapped key under export within the TR-34 key payload. The export token and signing key certificate must be in place and operational before calling ExportKey. The export token expires in 7 days. You can use the same export token to export multiple keys from your service account.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->getParametersForExport([ 'KeyMaterialType' => 'TR34_KEY_BLOCK|TR31_KEY_BLOCK|ROOT_PUBLIC_KEY_CERTIFICATE|TRUSTED_PUBLIC_KEY_CERTIFICATE|KEY_CRYPTOGRAM', // REQUIRED 'SigningKeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', // REQUIRED ]);
Parameter Details
Members
- KeyMaterialType
-
- Required: Yes
- Type: string
The key block format type (for example, TR-34 or TR-31) to use during key material export. Export token is only required for a TR-34 key export,
TR34_KEY_BLOCK
. Export token is not required for TR-31 key export. - SigningKeyAlgorithm
-
- Required: Yes
- Type: string
The signing key algorithm to generate a signing key certificate. This certificate signs the wrapped key under export within the TR-34 key block.
RSA_2048
is the only signing key algorithm allowed.
Result Syntax
[ 'ExportToken' => '<string>', 'ParametersValidUntilTimestamp' => <DateTime>, 'SigningKeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', 'SigningKeyCertificate' => '<string>', 'SigningKeyCertificateChain' => '<string>', ]
Result Details
Members
- ExportToken
-
- Required: Yes
- Type: string
The export token to initiate key export from Amazon Web Services Payment Cryptography. The export token expires after 7 days. You can use the same export token to export multiple keys from the same service account.
- ParametersValidUntilTimestamp
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The validity period of the export token.
- SigningKeyAlgorithm
-
- Required: Yes
- Type: string
The algorithm of the signing key certificate for use in TR-34 key block generation.
RSA_2048
is the only signing key algorithm allowed. - SigningKeyCertificate
-
- Required: Yes
- Type: string
The signing key certificate in PEM format (base64 encoded) of the public key for signature within the TR-34 key block. The certificate expires after 7 days.
- SigningKeyCertificateChain
-
- Required: Yes
- Type: string
The root certificate authority (CA) that signed the signing key certificate in PEM format (base64 encoded).
Errors
- ServiceQuotaExceededException:
This request would cause a service quota to be exceeded.
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
GetParametersForImport
$result = $client->getParametersForImport
([/* ... */]); $promise = $client->getParametersForImportAsync
([/* ... */]);
Gets the import token and the wrapping key certificate in PEM format (base64 encoded) to initiate a TR-34 WrappedKeyBlock or a RSA WrappedKeyCryptogram import into Amazon Web Services Payment Cryptography.
The wrapping key certificate wraps the key under import. The import token and wrapping key certificate must be in place and operational before calling ImportKey. The import token expires in 7 days. You can use the same import token to import multiple keys into your service account.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->getParametersForImport([ 'KeyMaterialType' => 'TR34_KEY_BLOCK|TR31_KEY_BLOCK|ROOT_PUBLIC_KEY_CERTIFICATE|TRUSTED_PUBLIC_KEY_CERTIFICATE|KEY_CRYPTOGRAM', // REQUIRED 'WrappingKeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', // REQUIRED ]);
Parameter Details
Members
- KeyMaterialType
-
- Required: Yes
- Type: string
The method to use for key material import. Import token is only required for TR-34 WrappedKeyBlock (
TR34_KEY_BLOCK
) and RSA WrappedKeyCryptogram (KEY_CRYPTOGRAM
).Import token is not required for TR-31, root public key cerificate or trusted public key certificate.
- WrappingKeyAlgorithm
-
- Required: Yes
- Type: string
The wrapping key algorithm to generate a wrapping key certificate. This certificate wraps the key under import.
At this time,
RSA_2048
is the allowed algorithm for TR-34 WrappedKeyBlock import. Additionally,RSA_2048
,RSA_3072
,RSA_4096
are the allowed algorithms for RSA WrappedKeyCryptogram import.
Result Syntax
[ 'ImportToken' => '<string>', 'ParametersValidUntilTimestamp' => <DateTime>, 'WrappingKeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', 'WrappingKeyCertificate' => '<string>', 'WrappingKeyCertificateChain' => '<string>', ]
Result Details
Members
- ImportToken
-
- Required: Yes
- Type: string
The import token to initiate key import into Amazon Web Services Payment Cryptography. The import token expires after 7 days. You can use the same import token to import multiple keys to the same service account.
- ParametersValidUntilTimestamp
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The validity period of the import token.
- WrappingKeyAlgorithm
-
- Required: Yes
- Type: string
The algorithm of the wrapping key for use within TR-34 WrappedKeyBlock or RSA WrappedKeyCryptogram.
- WrappingKeyCertificate
-
- Required: Yes
- Type: string
The wrapping key certificate in PEM format (base64 encoded) of the wrapping key for use within the TR-34 key block. The certificate expires in 7 days.
- WrappingKeyCertificateChain
-
- Required: Yes
- Type: string
The Amazon Web Services Payment Cryptography root certificate authority (CA) that signed the wrapping key certificate in PEM format (base64 encoded).
Errors
- ServiceQuotaExceededException:
This request would cause a service quota to be exceeded.
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
GetPublicKeyCertificate
$result = $client->getPublicKeyCertificate
([/* ... */]); $promise = $client->getPublicKeyCertificateAsync
([/* ... */]);
Gets the public key certificate of the asymmetric key pair that exists within Amazon Web Services Payment Cryptography.
Unlike the private key of an asymmetric key, which never leaves Amazon Web Services Payment Cryptography unencrypted, callers with GetPublicKeyCertificate
permission can download the public key certificate of the asymmetric key. You can share the public key certificate to allow others to encrypt messages and verify signatures outside of Amazon Web Services Payment Cryptography
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Parameter Syntax
$result = $client->getPublicKeyCertificate([ 'KeyIdentifier' => '<string>', // REQUIRED ]);
Parameter Details
Members
- KeyIdentifier
-
- Required: Yes
- Type: string
The
KeyARN
of the asymmetric key pair.
Result Syntax
[ 'KeyCertificate' => '<string>', 'KeyCertificateChain' => '<string>', ]
Result Details
Members
- KeyCertificate
-
- Required: Yes
- Type: string
The public key component of the asymmetric key pair in a certificate PEM format (base64 encoded). It is signed by the root certificate authority (CA). The certificate expires in 90 days.
- KeyCertificateChain
-
- Required: Yes
- Type: string
The root certificate authority (CA) that signed the public key certificate in PEM format (base64 encoded) of the asymmetric key pair.
Errors
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
ImportKey
$result = $client->importKey
([/* ... */]); $promise = $client->importKeyAsync
([/* ... */]);
Imports symmetric keys and public key certificates in PEM format (base64 encoded) into Amazon Web Services Payment Cryptography.
Amazon Web Services Payment Cryptography simplifies key exchange by replacing the existing paper-based approach with a modern electronic approach. With ImportKey
you can import symmetric keys using either symmetric and asymmetric key exchange mechanisms.
For symmetric key exchange, Amazon Web Services Payment Cryptography uses the ANSI X9 TR-31 norm in accordance with PCI PIN guidelines. And for asymmetric key exchange, Amazon Web Services Payment Cryptography supports ANSI X9 TR-34 norm and RSA wrap and unwrap key exchange mechanisms. Asymmetric key exchange methods are typically used to establish bi-directional trust between the two parties exhanging keys and are used for initial key exchange such as Key Encryption Key (KEK) or Zone Master Key (ZMK). After which you can import working keys using symmetric method to perform various cryptographic operations within Amazon Web Services Payment Cryptography.
The TR-34 norm is intended for exchanging 3DES keys only and keys are imported in a WrappedKeyBlock format. Key attributes (such as KeyUsage, KeyAlgorithm, KeyModesOfUse, Exportability) are contained within the key block. With RSA wrap and unwrap, you can exchange both 3DES and AES-128 keys. The keys are imported in a WrappedKeyCryptogram format and you will need to specify the key attributes during import.
You can also import a root public key certificate, used to sign other public key certificates, or a trusted public key certificate under an already established root public key certificate.
To import a public root key certificate
You can also import a root public key certificate, used to sign other public key certificates, or a trusted public key certificate under an already established root public key certificate.
To import a public root key certificate
Using this operation, you can import the public component (in PEM cerificate format) of your private root key. You can use the imported public root key certificate for digital signatures, for example signing wrapping key or signing key in TR-34, within your Amazon Web Services Payment Cryptography account.
Set the following parameters:
-
KeyMaterial
:RootCertificatePublicKey
-
KeyClass
:PUBLIC_KEY
-
KeyModesOfUse
:Verify
-
KeyUsage
:TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE
-
PublicKeyCertificate
: The public key certificate in PEM format (base64 encoded) of the private root key under import.
To import a trusted public key certificate
The root public key certificate must be in place and operational before you import a trusted public key certificate. Set the following parameters:
-
KeyMaterial
:TrustedCertificatePublicKey
-
CertificateAuthorityPublicKeyIdentifier
:KeyArn
of theRootCertificatePublicKey
. -
KeyModesOfUse
andKeyUsage
: Corresponding to the cryptographic operations such as wrap, sign, or encrypt that you will allow the trusted public key certificate to perform. -
PublicKeyCertificate
: The trusted public key certificate in PEM format (base64 encoded) under import.
To import initial keys (KEK or ZMK or similar) using TR-34
Using this operation, you can import initial key using TR-34 asymmetric key exchange. In TR-34 terminology, the sending party of the key is called Key Distribution Host (KDH) and the receiving party of the key is called Key Receiving Device (KRD). During the key import process, KDH is the user who initiates the key import and KRD is Amazon Web Services Payment Cryptography who receives the key.
To initiate TR-34 key import, the KDH must obtain an import token by calling GetParametersForImport. This operation generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate (also known as KRD wrapping certificate) and the root certificate chain. The KDH must trust and install the KRD wrapping certificate on its HSM and use it to encrypt (wrap) the KDH key during TR-34 WrappedKeyBlock generation. The import token and associated KRD wrapping certificate expires after 7 days.
Next the KDH generates a key pair for the purpose of signing the encrypted KDH key and provides the public certificate of the signing key to Amazon Web Services Payment Cryptography. The KDH will also need to import the root certificate chain of the KDH signing certificate by calling ImportKey
for RootCertificatePublicKey
. For more information on TR-34 key import, see section Importing symmetric keys in the Amazon Web Services Payment Cryptography User Guide.
Set the following parameters:
-
KeyMaterial
: UseTr34KeyBlock
parameters. -
CertificateAuthorityPublicKeyIdentifier
: TheKeyARN
of the certificate chain that signed the KDH signing key certificate. -
ImportToken
: Obtained from KRD by calling GetParametersForImport. -
WrappedKeyBlock
: The TR-34 wrapped key material from KDH. It contains the KDH key under import, wrapped with KRD wrapping certificate and signed by KDH signing private key. This TR-34 key block is typically generated by the KDH Hardware Security Module (HSM) outside of Amazon Web Services Payment Cryptography. -
SigningKeyCertificate
: The public key certificate in PEM format (base64 encoded) of the KDH signing key generated under the root certificate (CertificateAuthorityPublicKeyIdentifier) imported in Amazon Web Services Payment Cryptography.
To import initial keys (KEK or ZMK or similar) using RSA Wrap and Unwrap
Using this operation, you can import initial key using asymmetric RSA wrap and unwrap key exchange method. To initiate import, call GetParametersForImport with KeyMaterial
set to KEY_CRYPTOGRAM
to generate an import token. This operation also generates an encryption keypair for the purpose of key import, signs the key and returns back the wrapping key certificate in PEM format (base64 encoded) and its root certificate chain. The import token and associated KRD wrapping certificate expires after 7 days.
You must trust and install the wrapping certificate and its certificate chain on the sending HSM and use it to wrap the key under export for WrappedKeyCryptogram generation. Next call ImportKey
with KeyMaterial
set to KEY_CRYPTOGRAM
and provide the ImportToken
and KeyAttributes
for the key under import.
To import working keys using TR-31
Amazon Web Services Payment Cryptography uses TR-31 symmetric key exchange norm to import working keys. A KEK must be established within Amazon Web Services Payment Cryptography by using TR-34 key import or by using CreateKey. To initiate a TR-31 key import, set the following parameters:
-
KeyMaterial
: UseTr31KeyBlock
parameters. -
WrappedKeyBlock
: The TR-31 wrapped key material. It contains the key under import, encrypted using KEK. The TR-31 key block is typically generated by a HSM outside of Amazon Web Services Payment Cryptography. -
WrappingKeyIdentifier
: TheKeyArn
of the KEK that Amazon Web Services Payment Cryptography uses to decrypt or unwrap the key under import.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->importKey([ 'Enabled' => true || false, 'KeyCheckValueAlgorithm' => 'CMAC|ANSI_X9_24', 'KeyMaterial' => [ // REQUIRED 'KeyCryptogram' => [ 'Exportable' => true || false, // REQUIRED 'ImportToken' => '<string>', // REQUIRED 'KeyAttributes' => [ // REQUIRED 'KeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', // REQUIRED 'KeyClass' => 'SYMMETRIC_KEY|ASYMMETRIC_KEY_PAIR|PRIVATE_KEY|PUBLIC_KEY', // REQUIRED 'KeyModesOfUse' => [ // REQUIRED 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyUsage' => 'TR31_B0_BASE_DERIVATION_KEY|TR31_C0_CARD_VERIFICATION_KEY|TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY|TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION|TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS|TR31_E1_EMV_MKEY_CONFIDENTIALITY|TR31_E2_EMV_MKEY_INTEGRITY|TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS|TR31_E5_EMV_MKEY_CARD_PERSONALIZATION|TR31_E6_EMV_MKEY_OTHER|TR31_K0_KEY_ENCRYPTION_KEY|TR31_K1_KEY_BLOCK_PROTECTION_KEY|TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT|TR31_M3_ISO_9797_3_MAC_KEY|TR31_M1_ISO_9797_1_MAC_KEY|TR31_M6_ISO_9797_5_CMAC_KEY|TR31_M7_HMAC_KEY|TR31_P0_PIN_ENCRYPTION_KEY|TR31_P1_PIN_GENERATION_KEY|TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE|TR31_V1_IBM3624_PIN_VERIFICATION_KEY|TR31_V2_VISA_PIN_VERIFICATION_KEY|TR31_K2_TR34_ASYMMETRIC_KEY', // REQUIRED ], 'WrappedKeyCryptogram' => '<string>', // REQUIRED 'WrappingSpec' => 'RSA_OAEP_SHA_256|RSA_OAEP_SHA_512', ], 'RootCertificatePublicKey' => [ 'KeyAttributes' => [ // REQUIRED 'KeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', // REQUIRED 'KeyClass' => 'SYMMETRIC_KEY|ASYMMETRIC_KEY_PAIR|PRIVATE_KEY|PUBLIC_KEY', // REQUIRED 'KeyModesOfUse' => [ // REQUIRED 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyUsage' => 'TR31_B0_BASE_DERIVATION_KEY|TR31_C0_CARD_VERIFICATION_KEY|TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY|TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION|TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS|TR31_E1_EMV_MKEY_CONFIDENTIALITY|TR31_E2_EMV_MKEY_INTEGRITY|TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS|TR31_E5_EMV_MKEY_CARD_PERSONALIZATION|TR31_E6_EMV_MKEY_OTHER|TR31_K0_KEY_ENCRYPTION_KEY|TR31_K1_KEY_BLOCK_PROTECTION_KEY|TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT|TR31_M3_ISO_9797_3_MAC_KEY|TR31_M1_ISO_9797_1_MAC_KEY|TR31_M6_ISO_9797_5_CMAC_KEY|TR31_M7_HMAC_KEY|TR31_P0_PIN_ENCRYPTION_KEY|TR31_P1_PIN_GENERATION_KEY|TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE|TR31_V1_IBM3624_PIN_VERIFICATION_KEY|TR31_V2_VISA_PIN_VERIFICATION_KEY|TR31_K2_TR34_ASYMMETRIC_KEY', // REQUIRED ], 'PublicKeyCertificate' => '<string>', // REQUIRED ], 'Tr31KeyBlock' => [ 'WrappedKeyBlock' => '<string>', // REQUIRED 'WrappingKeyIdentifier' => '<string>', // REQUIRED ], 'Tr34KeyBlock' => [ 'CertificateAuthorityPublicKeyIdentifier' => '<string>', // REQUIRED 'ImportToken' => '<string>', // REQUIRED 'KeyBlockFormat' => 'X9_TR34_2012', // REQUIRED 'RandomNonce' => '<string>', 'SigningKeyCertificate' => '<string>', // REQUIRED 'WrappedKeyBlock' => '<string>', // REQUIRED ], 'TrustedCertificatePublicKey' => [ 'CertificateAuthorityPublicKeyIdentifier' => '<string>', // REQUIRED 'KeyAttributes' => [ // REQUIRED 'KeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', // REQUIRED 'KeyClass' => 'SYMMETRIC_KEY|ASYMMETRIC_KEY_PAIR|PRIVATE_KEY|PUBLIC_KEY', // REQUIRED 'KeyModesOfUse' => [ // REQUIRED 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyUsage' => 'TR31_B0_BASE_DERIVATION_KEY|TR31_C0_CARD_VERIFICATION_KEY|TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY|TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION|TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS|TR31_E1_EMV_MKEY_CONFIDENTIALITY|TR31_E2_EMV_MKEY_INTEGRITY|TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS|TR31_E5_EMV_MKEY_CARD_PERSONALIZATION|TR31_E6_EMV_MKEY_OTHER|TR31_K0_KEY_ENCRYPTION_KEY|TR31_K1_KEY_BLOCK_PROTECTION_KEY|TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT|TR31_M3_ISO_9797_3_MAC_KEY|TR31_M1_ISO_9797_1_MAC_KEY|TR31_M6_ISO_9797_5_CMAC_KEY|TR31_M7_HMAC_KEY|TR31_P0_PIN_ENCRYPTION_KEY|TR31_P1_PIN_GENERATION_KEY|TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE|TR31_V1_IBM3624_PIN_VERIFICATION_KEY|TR31_V2_VISA_PIN_VERIFICATION_KEY|TR31_K2_TR34_ASYMMETRIC_KEY', // REQUIRED ], 'PublicKeyCertificate' => '<string>', // REQUIRED ], ], 'Tags' => [ [ 'Key' => '<string>', // REQUIRED 'Value' => '<string>', ], // ... ], ]);
Parameter Details
Members
- Enabled
-
- Type: boolean
Specifies whether import key is enabled.
- KeyCheckValueAlgorithm
-
- Type: string
The algorithm that Amazon Web Services Payment Cryptography uses to calculate the key check value (KCV). It is used to validate the key integrity.
For TDES keys, the KCV is computed by encrypting 8 bytes, each with value of zero, with the key to be checked and retaining the 3 highest order bytes of the encrypted result. For AES keys, the KCV is computed using a CMAC algorithm where the input data is 16 bytes of zero and retaining the 3 highest order bytes of the encrypted result.
- KeyMaterial
-
- Required: Yes
- Type: ImportKeyMaterial structure
The key or public key certificate type to use during key material import, for example TR-34 or RootCertificatePublicKey.
- Tags
-
- Type: Array of Tag structures
Assigns one or more tags to the Amazon Web Services Payment Cryptography key. Use this parameter to tag a key when it is imported. To tag an existing Amazon Web Services Payment Cryptography key, use the TagResource operation.
Each tag consists of a tag key and a tag value. Both the tag key and the tag value are required, but the tag value can be an empty (null) string. You can't have more than one tag on an Amazon Web Services Payment Cryptography key with the same tag key. If you specify an existing tag key with a different tag value, Amazon Web Services Payment Cryptography replaces the current tag value with the specified one.
Don't include personal, confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.
Tagging or untagging an Amazon Web Services Payment Cryptography key can allow or deny permission to the key.
Result Syntax
[ 'Key' => [ 'CreateTimestamp' => <DateTime>, 'DeletePendingTimestamp' => <DateTime>, 'DeleteTimestamp' => <DateTime>, 'Enabled' => true || false, 'Exportable' => true || false, 'KeyArn' => '<string>', 'KeyAttributes' => [ 'KeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', 'KeyClass' => 'SYMMETRIC_KEY|ASYMMETRIC_KEY_PAIR|PRIVATE_KEY|PUBLIC_KEY', 'KeyModesOfUse' => [ 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyUsage' => 'TR31_B0_BASE_DERIVATION_KEY|TR31_C0_CARD_VERIFICATION_KEY|TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY|TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION|TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS|TR31_E1_EMV_MKEY_CONFIDENTIALITY|TR31_E2_EMV_MKEY_INTEGRITY|TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS|TR31_E5_EMV_MKEY_CARD_PERSONALIZATION|TR31_E6_EMV_MKEY_OTHER|TR31_K0_KEY_ENCRYPTION_KEY|TR31_K1_KEY_BLOCK_PROTECTION_KEY|TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT|TR31_M3_ISO_9797_3_MAC_KEY|TR31_M1_ISO_9797_1_MAC_KEY|TR31_M6_ISO_9797_5_CMAC_KEY|TR31_M7_HMAC_KEY|TR31_P0_PIN_ENCRYPTION_KEY|TR31_P1_PIN_GENERATION_KEY|TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE|TR31_V1_IBM3624_PIN_VERIFICATION_KEY|TR31_V2_VISA_PIN_VERIFICATION_KEY|TR31_K2_TR34_ASYMMETRIC_KEY', ], 'KeyCheckValue' => '<string>', 'KeyCheckValueAlgorithm' => 'CMAC|ANSI_X9_24', 'KeyOrigin' => 'EXTERNAL|AWS_PAYMENT_CRYPTOGRAPHY', 'KeyState' => 'CREATE_IN_PROGRESS|CREATE_COMPLETE|DELETE_PENDING|DELETE_COMPLETE', 'UsageStartTimestamp' => <DateTime>, 'UsageStopTimestamp' => <DateTime>, ], ]
Result Details
Members
- Key
-
- Required: Yes
- Type: Key structure
The
KeyARN
of the key material imported within Amazon Web Services Payment Cryptography.
Errors
- ServiceQuotaExceededException:
This request would cause a service quota to be exceeded.
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
ListAliases
$result = $client->listAliases
([/* ... */]); $promise = $client->listAliasesAsync
([/* ... */]);
Lists the aliases for all keys in the caller's Amazon Web Services account and Amazon Web Services Region. You can filter the list of aliases. For more information, see Using aliases in the Amazon Web Services Payment Cryptography User Guide.
This is a paginated operation, which means that each response might contain only a subset of all the aliases. When the response contains only a subset of aliases, it includes a NextToken
value. Use this value in a subsequent ListAliases
request to get more aliases. When you receive a response with no NextToken (or an empty or null value), that means there are no more aliases to get.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->listAliases([ 'MaxResults' => <integer>, 'NextToken' => '<string>', ]);
Parameter Details
Members
- MaxResults
-
- Type: int
Use this parameter to specify the maximum number of items to return. When this value is present, Amazon Web Services Payment Cryptography does not return more than the specified number of items, but it might return fewer.
This value is optional. If you include a value, it must be between 1 and 100, inclusive. If you do not include a value, it defaults to 50.
- NextToken
-
- Type: string
Use this parameter in a subsequent request after you receive a response with truncated results. Set it to the value of
NextToken
from the truncated response you just received.
Result Syntax
[ 'Aliases' => [ [ 'AliasName' => '<string>', 'KeyArn' => '<string>', ], // ... ], 'NextToken' => '<string>', ]
Result Details
Members
- Aliases
-
- Required: Yes
- Type: Array of Alias structures
The list of aliases. Each alias describes the
KeyArn
contained within. - NextToken
-
- Type: string
The token for the next set of results, or an empty or null value if there are no more results.
Errors
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
ListKeys
$result = $client->listKeys
([/* ... */]); $promise = $client->listKeysAsync
([/* ... */]);
Lists the keys in the caller's Amazon Web Services account and Amazon Web Services Region. You can filter the list of keys.
This is a paginated operation, which means that each response might contain only a subset of all the keys. When the response contains only a subset of keys, it includes a NextToken
value. Use this value in a subsequent ListKeys
request to get more keys. When you receive a response with no NextToken (or an empty or null value), that means there are no more keys to get.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->listKeys([ 'KeyState' => 'CREATE_IN_PROGRESS|CREATE_COMPLETE|DELETE_PENDING|DELETE_COMPLETE', 'MaxResults' => <integer>, 'NextToken' => '<string>', ]);
Parameter Details
Members
- KeyState
-
- Type: string
The key state of the keys you want to list.
- MaxResults
-
- Type: int
Use this parameter to specify the maximum number of items to return. When this value is present, Amazon Web Services Payment Cryptography does not return more than the specified number of items, but it might return fewer.
This value is optional. If you include a value, it must be between 1 and 100, inclusive. If you do not include a value, it defaults to 50.
- NextToken
-
- Type: string
Use this parameter in a subsequent request after you receive a response with truncated results. Set it to the value of
NextToken
from the truncated response you just received.
Result Syntax
[ 'Keys' => [ [ 'Enabled' => true || false, 'Exportable' => true || false, 'KeyArn' => '<string>', 'KeyAttributes' => [ 'KeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', 'KeyClass' => 'SYMMETRIC_KEY|ASYMMETRIC_KEY_PAIR|PRIVATE_KEY|PUBLIC_KEY', 'KeyModesOfUse' => [ 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyUsage' => 'TR31_B0_BASE_DERIVATION_KEY|TR31_C0_CARD_VERIFICATION_KEY|TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY|TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION|TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS|TR31_E1_EMV_MKEY_CONFIDENTIALITY|TR31_E2_EMV_MKEY_INTEGRITY|TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS|TR31_E5_EMV_MKEY_CARD_PERSONALIZATION|TR31_E6_EMV_MKEY_OTHER|TR31_K0_KEY_ENCRYPTION_KEY|TR31_K1_KEY_BLOCK_PROTECTION_KEY|TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT|TR31_M3_ISO_9797_3_MAC_KEY|TR31_M1_ISO_9797_1_MAC_KEY|TR31_M6_ISO_9797_5_CMAC_KEY|TR31_M7_HMAC_KEY|TR31_P0_PIN_ENCRYPTION_KEY|TR31_P1_PIN_GENERATION_KEY|TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE|TR31_V1_IBM3624_PIN_VERIFICATION_KEY|TR31_V2_VISA_PIN_VERIFICATION_KEY|TR31_K2_TR34_ASYMMETRIC_KEY', ], 'KeyCheckValue' => '<string>', 'KeyState' => 'CREATE_IN_PROGRESS|CREATE_COMPLETE|DELETE_PENDING|DELETE_COMPLETE', ], // ... ], 'NextToken' => '<string>', ]
Result Details
Members
- Keys
-
- Required: Yes
- Type: Array of KeySummary structures
The list of keys created within the caller's Amazon Web Services account and Amazon Web Services Region.
- NextToken
-
- Type: string
The token for the next set of results, or an empty or null value if there are no more results.
Errors
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
ListTagsForResource
$result = $client->listTagsForResource
([/* ... */]); $promise = $client->listTagsForResourceAsync
([/* ... */]);
Lists the tags for an Amazon Web Services resource.
This is a paginated operation, which means that each response might contain only a subset of all the tags. When the response contains only a subset of tags, it includes a NextToken
value. Use this value in a subsequent ListTagsForResource
request to get more tags. When you receive a response with no NextToken (or an empty or null value), that means there are no more tags to get.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->listTagsForResource([ 'MaxResults' => <integer>, 'NextToken' => '<string>', 'ResourceArn' => '<string>', // REQUIRED ]);
Parameter Details
Members
- MaxResults
-
- Type: int
Use this parameter to specify the maximum number of items to return. When this value is present, Amazon Web Services Payment Cryptography does not return more than the specified number of items, but it might return fewer.
This value is optional. If you include a value, it must be between 1 and 100, inclusive. If you do not include a value, it defaults to 50.
- NextToken
-
- Type: string
Use this parameter in a subsequent request after you receive a response with truncated results. Set it to the value of
NextToken
from the truncated response you just received. - ResourceArn
-
- Required: Yes
- Type: string
The
KeyARN
of the key whose tags you are getting.
Result Syntax
[ 'NextToken' => '<string>', 'Tags' => [ [ 'Key' => '<string>', 'Value' => '<string>', ], // ... ], ]
Result Details
Members
- NextToken
-
- Type: string
The token for the next set of results, or an empty or null value if there are no more results.
- Tags
-
- Required: Yes
- Type: Array of Tag structures
The list of tags associated with a
ResourceArn
. Each tag will list the key-value pair contained within that tag.
Errors
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
RestoreKey
$result = $client->restoreKey
([/* ... */]); $promise = $client->restoreKeyAsync
([/* ... */]);
Cancels a scheduled key deletion during the waiting period. Use this operation to restore a Key
that is scheduled for deletion.
During the waiting period, the KeyState
is DELETE_PENDING
and deletePendingTimestamp
contains the date and time after which the Key
will be deleted. After Key
is restored, the KeyState
is CREATE_COMPLETE
, and the value for deletePendingTimestamp
is removed.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->restoreKey([ 'KeyIdentifier' => '<string>', // REQUIRED ]);
Parameter Details
Members
- KeyIdentifier
-
- Required: Yes
- Type: string
The
KeyARN
of the key to be restored within Amazon Web Services Payment Cryptography.
Result Syntax
[ 'Key' => [ 'CreateTimestamp' => <DateTime>, 'DeletePendingTimestamp' => <DateTime>, 'DeleteTimestamp' => <DateTime>, 'Enabled' => true || false, 'Exportable' => true || false, 'KeyArn' => '<string>', 'KeyAttributes' => [ 'KeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', 'KeyClass' => 'SYMMETRIC_KEY|ASYMMETRIC_KEY_PAIR|PRIVATE_KEY|PUBLIC_KEY', 'KeyModesOfUse' => [ 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyUsage' => 'TR31_B0_BASE_DERIVATION_KEY|TR31_C0_CARD_VERIFICATION_KEY|TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY|TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION|TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS|TR31_E1_EMV_MKEY_CONFIDENTIALITY|TR31_E2_EMV_MKEY_INTEGRITY|TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS|TR31_E5_EMV_MKEY_CARD_PERSONALIZATION|TR31_E6_EMV_MKEY_OTHER|TR31_K0_KEY_ENCRYPTION_KEY|TR31_K1_KEY_BLOCK_PROTECTION_KEY|TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT|TR31_M3_ISO_9797_3_MAC_KEY|TR31_M1_ISO_9797_1_MAC_KEY|TR31_M6_ISO_9797_5_CMAC_KEY|TR31_M7_HMAC_KEY|TR31_P0_PIN_ENCRYPTION_KEY|TR31_P1_PIN_GENERATION_KEY|TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE|TR31_V1_IBM3624_PIN_VERIFICATION_KEY|TR31_V2_VISA_PIN_VERIFICATION_KEY|TR31_K2_TR34_ASYMMETRIC_KEY', ], 'KeyCheckValue' => '<string>', 'KeyCheckValueAlgorithm' => 'CMAC|ANSI_X9_24', 'KeyOrigin' => 'EXTERNAL|AWS_PAYMENT_CRYPTOGRAPHY', 'KeyState' => 'CREATE_IN_PROGRESS|CREATE_COMPLETE|DELETE_PENDING|DELETE_COMPLETE', 'UsageStartTimestamp' => <DateTime>, 'UsageStopTimestamp' => <DateTime>, ], ]
Result Details
Members
- Key
-
- Required: Yes
- Type: Key structure
The key material of the restored key. The
KeyState
will change toCREATE_COMPLETE
and value forDeletePendingTimestamp
gets removed.
Errors
- ServiceQuotaExceededException:
This request would cause a service quota to be exceeded.
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
StartKeyUsage
$result = $client->startKeyUsage
([/* ... */]); $promise = $client->startKeyUsageAsync
([/* ... */]);
Enables an Amazon Web Services Payment Cryptography key, which makes it active for cryptographic operations within Amazon Web Services Payment Cryptography
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->startKeyUsage([ 'KeyIdentifier' => '<string>', // REQUIRED ]);
Parameter Details
Members
- KeyIdentifier
-
- Required: Yes
- Type: string
The
KeyArn
of the key.
Result Syntax
[ 'Key' => [ 'CreateTimestamp' => <DateTime>, 'DeletePendingTimestamp' => <DateTime>, 'DeleteTimestamp' => <DateTime>, 'Enabled' => true || false, 'Exportable' => true || false, 'KeyArn' => '<string>', 'KeyAttributes' => [ 'KeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', 'KeyClass' => 'SYMMETRIC_KEY|ASYMMETRIC_KEY_PAIR|PRIVATE_KEY|PUBLIC_KEY', 'KeyModesOfUse' => [ 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyUsage' => 'TR31_B0_BASE_DERIVATION_KEY|TR31_C0_CARD_VERIFICATION_KEY|TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY|TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION|TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS|TR31_E1_EMV_MKEY_CONFIDENTIALITY|TR31_E2_EMV_MKEY_INTEGRITY|TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS|TR31_E5_EMV_MKEY_CARD_PERSONALIZATION|TR31_E6_EMV_MKEY_OTHER|TR31_K0_KEY_ENCRYPTION_KEY|TR31_K1_KEY_BLOCK_PROTECTION_KEY|TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT|TR31_M3_ISO_9797_3_MAC_KEY|TR31_M1_ISO_9797_1_MAC_KEY|TR31_M6_ISO_9797_5_CMAC_KEY|TR31_M7_HMAC_KEY|TR31_P0_PIN_ENCRYPTION_KEY|TR31_P1_PIN_GENERATION_KEY|TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE|TR31_V1_IBM3624_PIN_VERIFICATION_KEY|TR31_V2_VISA_PIN_VERIFICATION_KEY|TR31_K2_TR34_ASYMMETRIC_KEY', ], 'KeyCheckValue' => '<string>', 'KeyCheckValueAlgorithm' => 'CMAC|ANSI_X9_24', 'KeyOrigin' => 'EXTERNAL|AWS_PAYMENT_CRYPTOGRAPHY', 'KeyState' => 'CREATE_IN_PROGRESS|CREATE_COMPLETE|DELETE_PENDING|DELETE_COMPLETE', 'UsageStartTimestamp' => <DateTime>, 'UsageStopTimestamp' => <DateTime>, ], ]
Result Details
Members
- Key
-
- Required: Yes
- Type: Key structure
The
KeyARN
of the Amazon Web Services Payment Cryptography key activated for use.
Errors
- ServiceQuotaExceededException:
This request would cause a service quota to be exceeded.
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
StopKeyUsage
$result = $client->stopKeyUsage
([/* ... */]); $promise = $client->stopKeyUsageAsync
([/* ... */]);
Disables an Amazon Web Services Payment Cryptography key, which makes it inactive within Amazon Web Services Payment Cryptography.
You can use this operation instead of DeleteKey to deactivate a key. You can enable the key in the future by calling StartKeyUsage.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->stopKeyUsage([ 'KeyIdentifier' => '<string>', // REQUIRED ]);
Parameter Details
Members
- KeyIdentifier
-
- Required: Yes
- Type: string
The
KeyArn
of the key.
Result Syntax
[ 'Key' => [ 'CreateTimestamp' => <DateTime>, 'DeletePendingTimestamp' => <DateTime>, 'DeleteTimestamp' => <DateTime>, 'Enabled' => true || false, 'Exportable' => true || false, 'KeyArn' => '<string>', 'KeyAttributes' => [ 'KeyAlgorithm' => 'TDES_2KEY|TDES_3KEY|AES_128|AES_192|AES_256|RSA_2048|RSA_3072|RSA_4096|ECC_NIST_P256|ECC_NIST_P384', 'KeyClass' => 'SYMMETRIC_KEY|ASYMMETRIC_KEY_PAIR|PRIVATE_KEY|PUBLIC_KEY', 'KeyModesOfUse' => [ 'Decrypt' => true || false, 'DeriveKey' => true || false, 'Encrypt' => true || false, 'Generate' => true || false, 'NoRestrictions' => true || false, 'Sign' => true || false, 'Unwrap' => true || false, 'Verify' => true || false, 'Wrap' => true || false, ], 'KeyUsage' => 'TR31_B0_BASE_DERIVATION_KEY|TR31_C0_CARD_VERIFICATION_KEY|TR31_D0_SYMMETRIC_DATA_ENCRYPTION_KEY|TR31_D1_ASYMMETRIC_KEY_FOR_DATA_ENCRYPTION|TR31_E0_EMV_MKEY_APP_CRYPTOGRAMS|TR31_E1_EMV_MKEY_CONFIDENTIALITY|TR31_E2_EMV_MKEY_INTEGRITY|TR31_E4_EMV_MKEY_DYNAMIC_NUMBERS|TR31_E5_EMV_MKEY_CARD_PERSONALIZATION|TR31_E6_EMV_MKEY_OTHER|TR31_K0_KEY_ENCRYPTION_KEY|TR31_K1_KEY_BLOCK_PROTECTION_KEY|TR31_K3_ASYMMETRIC_KEY_FOR_KEY_AGREEMENT|TR31_M3_ISO_9797_3_MAC_KEY|TR31_M1_ISO_9797_1_MAC_KEY|TR31_M6_ISO_9797_5_CMAC_KEY|TR31_M7_HMAC_KEY|TR31_P0_PIN_ENCRYPTION_KEY|TR31_P1_PIN_GENERATION_KEY|TR31_S0_ASYMMETRIC_KEY_FOR_DIGITAL_SIGNATURE|TR31_V1_IBM3624_PIN_VERIFICATION_KEY|TR31_V2_VISA_PIN_VERIFICATION_KEY|TR31_K2_TR34_ASYMMETRIC_KEY', ], 'KeyCheckValue' => '<string>', 'KeyCheckValueAlgorithm' => 'CMAC|ANSI_X9_24', 'KeyOrigin' => 'EXTERNAL|AWS_PAYMENT_CRYPTOGRAPHY', 'KeyState' => 'CREATE_IN_PROGRESS|CREATE_COMPLETE|DELETE_PENDING|DELETE_COMPLETE', 'UsageStartTimestamp' => <DateTime>, 'UsageStopTimestamp' => <DateTime>, ], ]
Result Details
Members
- Key
-
- Required: Yes
- Type: Key structure
The
KeyARN
of the key.
Errors
- ServiceQuotaExceededException:
This request would cause a service quota to be exceeded.
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
TagResource
$result = $client->tagResource
([/* ... */]); $promise = $client->tagResourceAsync
([/* ... */]);
Adds or edits tags on an Amazon Web Services Payment Cryptography key.
Tagging or untagging an Amazon Web Services Payment Cryptography key can allow or deny permission to the key.
Each tag consists of a tag key and a tag value, both of which are case-sensitive strings. The tag value can be an empty (null) string. To add a tag, specify a new tag key and a tag value. To edit a tag, specify an existing tag key and a new tag value. You can also add tags to an Amazon Web Services Payment Cryptography key when you create it with CreateKey.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->tagResource([ 'ResourceArn' => '<string>', // REQUIRED 'Tags' => [ // REQUIRED [ 'Key' => '<string>', // REQUIRED 'Value' => '<string>', ], // ... ], ]);
Parameter Details
Members
- ResourceArn
-
- Required: Yes
- Type: string
The
KeyARN
of the key whose tags are being updated. - Tags
-
- Required: Yes
- Type: Array of Tag structures
One or more tags. Each tag consists of a tag key and a tag value. The tag value can be an empty (null) string. You can't have more than one tag on an Amazon Web Services Payment Cryptography key with the same tag key. If you specify an existing tag key with a different tag value, Amazon Web Services Payment Cryptography replaces the current tag value with the new one.
Don't include personal, confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.
To use this parameter, you must have TagResource permission in an IAM policy.
Don't include personal, confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.
Result Syntax
[]
Result Details
Errors
- ServiceQuotaExceededException:
This request would cause a service quota to be exceeded.
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
UntagResource
$result = $client->untagResource
([/* ... */]); $promise = $client->untagResourceAsync
([/* ... */]);
Deletes a tag from an Amazon Web Services Payment Cryptography key.
Tagging or untagging an Amazon Web Services Payment Cryptography key can allow or deny permission to the key.
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->untagResource([ 'ResourceArn' => '<string>', // REQUIRED 'TagKeys' => ['<string>', ...], // REQUIRED ]);
Parameter Details
Members
- ResourceArn
-
- Required: Yes
- Type: string
The
KeyARN
of the key whose tags are being removed. - TagKeys
-
- Required: Yes
- Type: Array of strings
One or more tag keys. Don't include the tag values.
If the Amazon Web Services Payment Cryptography key doesn't have the specified tag key, Amazon Web Services Payment Cryptography doesn't throw an exception or return a response. To confirm that the operation succeeded, use the ListTagsForResource operation.
Result Syntax
[]
Result Details
Errors
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
UpdateAlias
$result = $client->updateAlias
([/* ... */]); $promise = $client->updateAliasAsync
([/* ... */]);
Associates an existing Amazon Web Services Payment Cryptography alias with a different key. Each alias is associated with only one Amazon Web Services Payment Cryptography key at a time, although a key can have multiple aliases. The alias and the Amazon Web Services Payment Cryptography key must be in the same Amazon Web Services account and Amazon Web Services Region
Cross-account use: This operation can't be used across different Amazon Web Services accounts.
Related operations:
Parameter Syntax
$result = $client->updateAlias([ 'AliasName' => '<string>', // REQUIRED 'KeyArn' => '<string>', ]);
Parameter Details
Members
- AliasName
-
- Required: Yes
- Type: string
The alias whose associated key is changing.
- KeyArn
-
- Type: string
The
KeyARN
for the key that you are updating or removing from the alias.
Result Syntax
[ 'Alias' => [ 'AliasName' => '<string>', 'KeyArn' => '<string>', ], ]
Result Details
Members
- Alias
-
- Required: Yes
- Type: Alias structure
The alias name.
Errors
- ServiceUnavailableException:
The service cannot complete the request.
- ValidationException:
The request was denied due to an invalid request error.
- ConflictException:
This request can cause an inconsistent state for the resource.
- AccessDeniedException:
You do not have sufficient access to perform this action.
- ResourceNotFoundException:
The request was denied due to an invalid resource error.
- ThrottlingException:
The request was denied due to request throttling.
- InternalServerException:
The request processing has failed because of an unknown error, exception, or failure.
Shapes
AccessDeniedException
Description
You do not have sufficient access to perform this action.
Members
- Message
-
- Type: string
Alias
Description
Contains information about an alias.
Members
- AliasName
-
- Required: Yes
- Type: string
A friendly name that you can use to refer to a key. The value must begin with
alias/
.Do not include confidential or sensitive information in this field. This field may be displayed in plaintext in CloudTrail logs and other output.
- KeyArn
-
- Type: string
The
KeyARN
of the key associated with the alias.
ConflictException
Description
This request can cause an inconsistent state for the resource.
Members
- Message
-
- Type: string
ExportAttributes
Description
The attributes for IPEK generation during export.
Members
- ExportDukptInitialKey
-
- Type: ExportDukptInitialKey structure
Parameter information for IPEK export.
- KeyCheckValueAlgorithm
-
- Type: string
The algorithm that Amazon Web Services Payment Cryptography uses to calculate the key check value (KCV). It is used to validate the key integrity. Specify KCV for IPEK export only.
For TDES keys, the KCV is computed by encrypting 8 bytes, each with value of zero, with the key to be checked and retaining the 3 highest order bytes of the encrypted result. For AES keys, the KCV is computed using a CMAC algorithm where the input data is 16 bytes of zero and retaining the 3 highest order bytes of the encrypted result.
ExportDukptInitialKey
Description
Parameter information for IPEK generation during export.
Members
- KeySerialNumber
-
- Required: Yes
- Type: string
The KSN for IPEK generation using DUKPT.
KSN must be padded before sending to Amazon Web Services Payment Cryptography. KSN hex length should be 20 for a TDES_2KEY key or 24 for an AES key.
ExportKeyCryptogram
Description
Parameter information for key material export using asymmetric RSA wrap and unwrap key exchange method.
Members
- CertificateAuthorityPublicKeyIdentifier
-
- Required: Yes
- Type: string
The
KeyARN
of the certificate chain that signs the wrapping key certificate during RSA wrap and unwrap key export. - WrappingKeyCertificate
-
- Required: Yes
- Type: string
The wrapping key certificate in PEM format (base64 encoded). Amazon Web Services Payment Cryptography uses this certificate to wrap the key under export.
- WrappingSpec
-
- Type: string
The wrapping spec for the key under export.
ExportKeyMaterial
Description
Parameter information for key material export from Amazon Web Services Payment Cryptography using TR-31 or TR-34 or RSA wrap and unwrap key exchange method.
Members
- KeyCryptogram
-
- Type: ExportKeyCryptogram structure
Parameter information for key material export using asymmetric RSA wrap and unwrap key exchange method
- Tr31KeyBlock
-
- Type: ExportTr31KeyBlock structure
Parameter information for key material export using symmetric TR-31 key exchange method.
- Tr34KeyBlock
-
- Type: ExportTr34KeyBlock structure
Parameter information for key material export using the asymmetric TR-34 key exchange method.
ExportTr31KeyBlock
Description
Parameter information for key material export using symmetric TR-31 key exchange method.
Members
- KeyBlockHeaders
-
- Type: KeyBlockHeaders structure
Optional metadata for export associated with the key material. This data is signed but transmitted in clear text.
- WrappingKeyIdentifier
-
- Required: Yes
- Type: string
The
KeyARN
of the the wrapping key. This key encrypts or wraps the key under export for TR-31 key block generation.
ExportTr34KeyBlock
Description
Parameter information for key material export using the asymmetric TR-34 key exchange method.
Members
- CertificateAuthorityPublicKeyIdentifier
-
- Required: Yes
- Type: string
The
KeyARN
of the certificate chain that signs the wrapping key certificate during TR-34 key export. - ExportToken
-
- Required: Yes
- Type: string
The export token to initiate key export from Amazon Web Services Payment Cryptography. It also contains the signing key certificate that will sign the wrapped key during TR-34 key block generation. Call GetParametersForExport to receive an export token. It expires after 7 days. You can use the same export token to export multiple keys from the same service account.
- KeyBlockFormat
-
- Required: Yes
- Type: string
The format of key block that Amazon Web Services Payment Cryptography will use during key export.
- KeyBlockHeaders
-
- Type: KeyBlockHeaders structure
Optional metadata for export associated with the key material. This data is signed but transmitted in clear text.
- RandomNonce
-
- Type: string
A random number value that is unique to the TR-34 key block generated using 2 pass. The operation will fail, if a random nonce value is not provided for a TR-34 key block generated using 2 pass.
- WrappingKeyCertificate
-
- Required: Yes
- Type: string
The
KeyARN
of the wrapping key certificate. Amazon Web Services Payment Cryptography uses this certificate to wrap the key under export.
ImportKeyCryptogram
Description
Parameter information for key material import using asymmetric RSA wrap and unwrap key exchange method.
Members
- Exportable
-
- Required: Yes
- Type: boolean
Specifies whether the key is exportable from the service.
- ImportToken
-
- Required: Yes
- Type: string
The import token that initiates key import using the asymmetric RSA wrap and unwrap key exchange method into AWS Payment Cryptography. It expires after 7 days. You can use the same import token to import multiple keys to the same service account.
- KeyAttributes
-
- Required: Yes
- Type: KeyAttributes structure
The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the key is created.
- WrappedKeyCryptogram
-
- Required: Yes
- Type: string
The RSA wrapped key cryptogram under import.
- WrappingSpec
-
- Type: string
The wrapping spec for the wrapped key cryptogram.
ImportKeyMaterial
Description
Parameter information for key material import into Amazon Web Services Payment Cryptography using TR-31 or TR-34 or RSA wrap and unwrap key exchange method.
Members
- KeyCryptogram
-
- Type: ImportKeyCryptogram structure
Parameter information for key material import using asymmetric RSA wrap and unwrap key exchange method.
- RootCertificatePublicKey
-
- Type: RootCertificatePublicKey structure
Parameter information for root public key certificate import.
- Tr31KeyBlock
-
- Type: ImportTr31KeyBlock structure
Parameter information for key material import using symmetric TR-31 key exchange method.
- Tr34KeyBlock
-
- Type: ImportTr34KeyBlock structure
Parameter information for key material import using the asymmetric TR-34 key exchange method.
- TrustedCertificatePublicKey
-
- Type: TrustedCertificatePublicKey structure
Parameter information for trusted public key certificate import.
ImportTr31KeyBlock
Description
Parameter information for key material import using symmetric TR-31 key exchange method.
Members
- WrappedKeyBlock
-
- Required: Yes
- Type: string
The TR-31 wrapped key block to import.
- WrappingKeyIdentifier
-
- Required: Yes
- Type: string
The
KeyARN
of the key that will decrypt or unwrap a TR-31 key block during import.
ImportTr34KeyBlock
Description
Parameter information for key material import using the asymmetric TR-34 key exchange method.
Members
- CertificateAuthorityPublicKeyIdentifier
-
- Required: Yes
- Type: string
The
KeyARN
of the certificate chain that signs the signing key certificate during TR-34 key import. - ImportToken
-
- Required: Yes
- Type: string
The import token that initiates key import using the asymmetric TR-34 key exchange method into Amazon Web Services Payment Cryptography. It expires after 7 days. You can use the same import token to import multiple keys to the same service account.
- KeyBlockFormat
-
- Required: Yes
- Type: string
The key block format to use during key import. The only value allowed is
X9_TR34_2012
. - RandomNonce
-
- Type: string
A random number value that is unique to the TR-34 key block generated using 2 pass. The operation will fail, if a random nonce value is not provided for a TR-34 key block generated using 2 pass.
- SigningKeyCertificate
-
- Required: Yes
- Type: string
The public key component in PEM certificate format of the private key that signs the KDH TR-34 WrappedKeyBlock.
- WrappedKeyBlock
-
- Required: Yes
- Type: string
The TR-34 wrapped key block to import.
InternalServerException
Description
The request processing has failed because of an unknown error, exception, or failure.
Members
- Message
-
- Type: string
Key
Description
Metadata about an Amazon Web Services Payment Cryptography key.
Members
- CreateTimestamp
-
- Required: Yes
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time when the key was created.
- DeletePendingTimestamp
-
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time after which Amazon Web Services Payment Cryptography will delete the key. This value is present only when
KeyState
isDELETE_PENDING
and the key is scheduled for deletion. - DeleteTimestamp
-
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time after which Amazon Web Services Payment Cryptography will delete the key. This value is present only when when the
KeyState
isDELETE_COMPLETE
and the Amazon Web Services Payment Cryptography key is deleted. - Enabled
-
- Required: Yes
- Type: boolean
Specifies whether the key is enabled.
- Exportable
-
- Required: Yes
- Type: boolean
Specifies whether the key is exportable. This data is immutable after the key is created.
- KeyArn
-
- Required: Yes
- Type: string
The Amazon Resource Name (ARN) of the key.
- KeyAttributes
-
- Required: Yes
- Type: KeyAttributes structure
The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the key is created.
- KeyCheckValue
-
- Required: Yes
- Type: string
The key check value (KCV) is used to check if all parties holding a given key have the same key or to detect that a key has changed.
- KeyCheckValueAlgorithm
-
- Required: Yes
- Type: string
The algorithm that Amazon Web Services Payment Cryptography uses to calculate the key check value (KCV). It is used to validate the key integrity.
For TDES keys, the KCV is computed by encrypting 8 bytes, each with value of zero, with the key to be checked and retaining the 3 highest order bytes of the encrypted result. For AES keys, the KCV is computed using a CMAC algorithm where the input data is 16 bytes of zero and retaining the 3 highest order bytes of the encrypted result.
- KeyOrigin
-
- Required: Yes
- Type: string
The source of the key material. For keys created within Amazon Web Services Payment Cryptography, the value is
AWS_PAYMENT_CRYPTOGRAPHY
. For keys imported into Amazon Web Services Payment Cryptography, the value isEXTERNAL
. - KeyState
-
- Required: Yes
- Type: string
The state of key that is being created or deleted.
- UsageStartTimestamp
-
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time after which Amazon Web Services Payment Cryptography will start using the key material for cryptographic operations.
- UsageStopTimestamp
-
- Type: timestamp (string|DateTime or anything parsable by strtotime)
The date and time after which Amazon Web Services Payment Cryptography will stop using the key material for cryptographic operations.
KeyAttributes
Description
The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the key is created.
Members
- KeyAlgorithm
-
- Required: Yes
- Type: string
The key algorithm to be use during creation of an Amazon Web Services Payment Cryptography key.
For symmetric keys, Amazon Web Services Payment Cryptography supports
AES
andTDES
algorithms. For asymmetric keys, Amazon Web Services Payment Cryptography supportsRSA
andECC_NIST
algorithms. - KeyClass
-
- Required: Yes
- Type: string
The type of Amazon Web Services Payment Cryptography key to create, which determines the classification of the cryptographic method and whether Amazon Web Services Payment Cryptography key contains a symmetric key or an asymmetric key pair.
- KeyModesOfUse
-
- Required: Yes
- Type: KeyModesOfUse structure
The list of cryptographic operations that you can perform using the key.
- KeyUsage
-
- Required: Yes
- Type: string
The cryptographic usage of an Amazon Web Services Payment Cryptography key as defined in section A.5.2 of the TR-31 spec.
KeyBlockHeaders
Description
Optional metadata for export associated with the key material. This data is signed but transmitted in clear text.
Members
- KeyExportability
-
- Type: string
Specifies subsequent exportability of the key within the key block after it is received by the receiving party. It can be used to further restrict exportability of the key after export from Amazon Web Services Payment Cryptography.
When set to
EXPORTABLE
, the key can be subsequently exported by the receiver under a KEK using TR-31 or TR-34 key block export only. When set toNON_EXPORTABLE
, the key cannot be subsequently exported by the receiver. When set toSENSITIVE
, the key can be exported by the receiver under a KEK using TR-31, TR-34, RSA wrap and unwrap cryptogram or using a symmetric cryptogram key export method. For further information refer to ANSI X9.143-2022. - KeyModesOfUse
-
- Type: KeyModesOfUse structure
The list of cryptographic operations that you can perform using the key. The modes of use are defined in section A.5.3 of the TR-31 spec.
- KeyVersion
-
- Type: string
Parameter used to indicate the version of the key carried in the key block or indicate the value carried in the key block is a component of a key.
- OptionalBlocks
-
- Type: Associative array of custom strings keys (OptionalBlockId) to strings
Parameter used to indicate the type of optional data in key block headers. Refer to ANSI X9.143-2022 for information on allowed data type for optional blocks.
Optional block character limit is 112 characters. For each optional block, 2 characters are reserved for optional block ID and 2 characters reserved for optional block length. More than one optional blocks can be included as long as the combined length does not increase 112 characters.
KeyModesOfUse
Description
The list of cryptographic operations that you can perform using the key. The modes of use are defined in section A.5.3 of the TR-31 spec.
Members
- Decrypt
-
- Type: boolean
Specifies whether an Amazon Web Services Payment Cryptography key can be used to decrypt data.
- DeriveKey
-
- Type: boolean
Specifies whether an Amazon Web Services Payment Cryptography key can be used to derive new keys.
- Encrypt
-
- Type: boolean
Specifies whether an Amazon Web Services Payment Cryptography key can be used to encrypt data.
- Generate
-
- Type: boolean
Specifies whether an Amazon Web Services Payment Cryptography key can be used to generate and verify other card and PIN verification keys.
- NoRestrictions
-
- Type: boolean
Specifies whether an Amazon Web Services Payment Cryptography key has no special restrictions other than the restrictions implied by
KeyUsage
. - Sign
-
- Type: boolean
Specifies whether an Amazon Web Services Payment Cryptography key can be used for signing.
- Unwrap
-
- Type: boolean
Specifies whether an Amazon Web Services Payment Cryptography key can be used to unwrap other keys.
- Verify
-
- Type: boolean
Specifies whether an Amazon Web Services Payment Cryptography key can be used to verify signatures.
- Wrap
-
- Type: boolean
Specifies whether an Amazon Web Services Payment Cryptography key can be used to wrap other keys.
KeySummary
Description
Metadata about an Amazon Web Services Payment Cryptography key.
Members
- Enabled
-
- Required: Yes
- Type: boolean
Specifies whether the key is enabled.
- Exportable
-
- Required: Yes
- Type: boolean
Specifies whether the key is exportable. This data is immutable after the key is created.
- KeyArn
-
- Required: Yes
- Type: string
The Amazon Resource Name (ARN) of the key.
- KeyAttributes
-
- Required: Yes
- Type: KeyAttributes structure
The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the key is created.
- KeyCheckValue
-
- Required: Yes
- Type: string
The key check value (KCV) is used to check if all parties holding a given key have the same key or to detect that a key has changed.
- KeyState
-
- Required: Yes
- Type: string
The state of an Amazon Web Services Payment Cryptography that is being created or deleted.
ResourceNotFoundException
Description
The request was denied due to an invalid resource error.
Members
- ResourceId
-
- Type: string
The string for the exception.
RootCertificatePublicKey
Description
Parameter information for root public key certificate import.
Members
- KeyAttributes
-
- Required: Yes
- Type: KeyAttributes structure
The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after the root public key is imported.
- PublicKeyCertificate
-
- Required: Yes
- Type: string
Parameter information for root public key certificate import.
ServiceQuotaExceededException
Description
This request would cause a service quota to be exceeded.
Members
- Message
-
- Type: string
ServiceUnavailableException
Description
The service cannot complete the request.
Members
- Message
-
- Type: string
Tag
Description
A structure that contains information about a tag.
Members
- Key
-
- Required: Yes
- Type: string
The key of the tag.
- Value
-
- Type: string
The value of the tag.
ThrottlingException
Description
The request was denied due to request throttling.
Members
- Message
-
- Type: string
TrustedCertificatePublicKey
Description
Parameter information for trusted public key certificate import.
Members
- CertificateAuthorityPublicKeyIdentifier
-
- Required: Yes
- Type: string
The
KeyARN
of the root public key certificate or certificate chain that signs the trusted public key certificate import. - KeyAttributes
-
- Required: Yes
- Type: KeyAttributes structure
The role of the key, the algorithm it supports, and the cryptographic operations allowed with the key. This data is immutable after a trusted public key is imported.
- PublicKeyCertificate
-
- Required: Yes
- Type: string
Parameter information for trusted public key certificate import.
ValidationException
Description
The request was denied due to an invalid request error.
Members
- Message
-
- Type: string
WrappedKey
Description
Parameter information for generating a WrappedKeyBlock for key exchange.
Members
- KeyCheckValue
-
- Type: string
The key check value (KCV) is used to check if all parties holding a given key have the same key or to detect that a key has changed.
- KeyCheckValueAlgorithm
-
- Type: string
The algorithm that Amazon Web Services Payment Cryptography uses to calculate the key check value (KCV). It is used to validate the key integrity.
For TDES keys, the KCV is computed by encrypting 8 bytes, each with value of zero, with the key to be checked and retaining the 3 highest order bytes of the encrypted result. For AES keys, the KCV is computed using a CMAC algorithm where the input data is 16 bytes of zero and retaining the 3 highest order bytes of the encrypted result.
- KeyMaterial
-
- Required: Yes
- Type: string
Parameter information for generating a wrapped key using TR-31 or TR-34 skey exchange method.
- WrappedKeyMaterialFormat
-
- Required: Yes
- Type: string
The key block format of a wrapped key.
- WrappingKeyArn
-
- Required: Yes
- Type: string
The
KeyARN
of the wrapped key.