Encryption
Encryption Service
The response to a decryption request will have the same structure as the input.
The response to a decryption request will have the same structure as the input.
A Sign request containing tenant id and the string value to be signed.
The key used for signing will be determined based on tenant id.
The value to be signed.
Response contains the value that has been signed and the value of signature.
Response to sign api containing the actual value and its corresponding signature.
The value that came with request.
The signature generated for the above value.
Response contains the value that has been signed and the value of signature.
A Verify request containing the value and its corresponding signature.
The claim to be verified
The signature for the claim
Response returns if the provided signature is correct for the given value.
Response to the verify api containing if the signature was correct for the input claim
This will be true if the signature is correct according to the claim, otherwise false.
Response returns if the provided signature is correct for the given value.
Deactivate the keys for the given tenant and generate new keys. It will deactivate both symmetric and asymmetric keys for the provided tenant.
A request to rotate key for a given tenant
The tenantId for which the key needs to be changed.
Acknowldgement if the operation was successful.
An acknowledgement if the key rotation request was successful.
Acknowledgement if the operation was successful.
Acknowldgement if the operation was successful.
A request to rotate key for a given tenant
The tenantId for which the key needs to be changed.
OK
An acknowledgement if the key rotation request was successful.
Acknowledgement if the operation was successful.
Created
Unauthorized
Forbidden
Not Found
Last updated
Was this helpful?