Package encryption fields
Protect your content from unauthorized use through content encryption and digital rights management (DRM). AWS Elemental MediaPackage uses the AWS Secure Packager and Encoder Key Exchange (SPEKE) API
Note
To encrypt content, you must have a DRM provider, and be set up to use encryption. For information, see Content encryption and DRM in AWS Elemental MediaPackage.
Define the encryption values.
-
To serve content without copyright protection, keep No encryption selected.
-
To serve content with copyright protection, choose Encrypt content and complete the additional fields as follows:
For Resource ID, enter an identifier for the content. The service sends this to the key server to identify the current endpoint. How unique you make this depends on how fine-grained you want access controls to be. The service does not allow you to use the same ID for two simultaneous encryption processes. The resource ID is also known as the content ID.
The following example shows a resource ID.
MovieNight20171126093045
For System ID, enter unique identifiers for your streaming protocol and DRM system. Provide one system ID. If you do not know your ID, ask your DRM provider.
For URL, enter the URL of the API Gateway proxy that you set up to talk to your key server. The API Gateway proxy must reside in the same AWS Region as MediaPackage.
The following example shows a URL.
https://1wm2dx1f33.execute-api.us-west-2.amazonaws.com/SpekeSample/copyProtection
For Role ARN, enter the Amazon Resource Name (ARN) of the IAM role that provides you access to send your requests through API Gateway. Get this from your DRM solution provider.
The following example shows a role ARN.
arn:aws:iam::444455556666:role/SpekeAccess
Certificate ARN – (Optional) Enter a 2048 RSA certificate ARN to use for content key encryption. Use this option only if your DRM key provider supports content key encryption. If you use this and your key provider doesn't support it, the event fails.
To enter a certificate ARN here, you must have already imported the corresponding certificate into AWS Certificate Manager. Then enter the certificate ARN from ACM here.
For information about content key encryption, see Preparing and managing certificates for use with content keys.
For Encryption method, choose Sample-AES for Apple HLS FairPlay or choose AES-128 for Apple HLS AES-128.
-
(Optional) For Constant initialization vector enter a 128-bit, 16-byte hex value represented by a 32-character string, to be used with the key for encrypting content.
(Optional) For Key rotation interval, enter the frequency, in seconds, of key changes for live workflows, in which content is streamed real time. The service retrieves content keys before the live content begins streaming, and then retrieves them as needed over the lifetime of the workflow. By default, key rotation is set to 60 seconds, which is equivalent to setting it to
60
. To disable key rotation, set this interval to0
(zero).The following example setting causes the service to rotate keys every thirty minutes.
1800
For information about key rotation, see Understanding key rotation behavior.
(Optional) Select Repeat EXT-X-KEY if you want the service to repeat the key before every segment of the manifest. By default, the key is written just once, after the header and before the segments. If you select Repeat EXT-X-KEY, the manifest is written as header, key, segment, key, segment, key, and so on, with every segment preceded by the key. Set this according to the needs of the player. Selecting this option might result in an increase in client requests to the DRM server.