Verify
These examples show AWS CloudTrail log entries for the Verify operation.
The following example shows an CloudTrail log entry for a Verify operation that uses an asymmetric RSA KMS key to verify a digital signature.
{ "eventVersion": "1.08", "userIdentity": { "type": "IAMUser", "principalId": "EX_PRINCIPAL_ID", "arn": "arn:aws:iam::111122223333:user/Alice", "accountId": "111122223333", "accessKeyId": "EXAMPLE_KEY_ID", "userName": "Alice" }, "eventTime": "2022-03-07T22:50:41Z", "eventSource": "kms.amazonaws.com", "eventName": "Verify", "awsRegion": "us-west-2", "sourceIPAddress": "192.0.2.0", "userAgent": "AWS Internal", "requestParameters": { "signingAlgorithm": "RSASSA_PKCS1_V1_5_SHA_256", "keyId": "0987dcba-09fe-87dc-65ba-ab0987654321", "messageType": "RAW" }, "responseElements": null, "requestID": "c73ab82a-af82-4750-ae2c-b6bb790e9c28", "eventID": "3b4331cd-5b7b-4de5-bf5f-82ec22f0dac0", "readOnly": true, "resources": [ { "accountId": "111122223333", "type": "AWS::KMS::Key", "ARN": "arn:aws:kms:us-west-2:111122223333:key/0987dcba-09fe-87dc-65ba-ab0987654321" } ], "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "111122223333", "eventCategory": "Management" }