Stay organized with collections
Save and categorize content based on your preferences.
Introduction to Key Access Justifications
Key Access Justifications provides a justification for every request to access keys stored in
an external key manager. It lets you approve or deny the access request based on
the provided justification. Using Key Access Justifications with Cloud External Key Manager
provides visibility into requests for encryption keys that allows data to
change state from at-rest to in-use.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-25 UTC."],[[["\u003cp\u003eKey Access Justifications allows for the approval or denial of requests to access keys stored in an external key manager, based on the provided justification.\u003c/p\u003e\n"],["\u003cp\u003eUtilizing Key Access Justifications with Cloud External Key Manager gives insight into requests for encryption keys that transition data from at-rest to in-use.\u003c/p\u003e\n"],["\u003cp\u003eKey Access Justifications ensures that every access request for keys stored externally includes a specific justification.\u003c/p\u003e\n"]]],[],null,[]]