Keys
A key is used to encrypt and decrypt data and ensures different encryption results for the same data. Learn more .
Use this page to
Section titled “Use this page to”Learn about each field
Section titled “Learn about each field”| Name | Description |
|---|---|
| Created On | Date and time when the key was created. |
| Deactivate Key | Click to deactivate the key, which prevents users from accessing data. You will be unable to encrypt or decrypt data if a key is deactivated. Learn more . |
| Key Name | Name of the key used in format-preserving encryption. The key is unique, case sensitive and is 265 or fewer characters. This field is the same as Name. |
| Key Status | Current state of the key. Options are: Active— key is available to be used in format-preserving encryption Deactivated— key is unavailable to be used in format-preserving encryption. Learn more . This field is the same as Status. |
| Last Key Rotation | Date when the key was last rotated. This field is undefined until you rotate the key for the first time. |
| Name | Name of the key used in format-preserving encryption. The key is unique, case sensitive and is 265 or fewer characters. This field is the same as Key Name. |
| Rotate Key | Click to rotate the key as a preventative step to reduce the threat of the key being compromised. Learn more . |
| Status | Current state of the key. Options are: Active— key is available to be used in format-preserving encryption Deactivated— key is unavailable to be used in format-preserving encryption. Learn more . This field is the same as Key Status. |
| Tweaks (tab) | Click to manage tweaks. Learn more. |