Stay organized with collections
Save and categorize content based on your preferences.
Introduction to Key Access Justifications
Key Access Justifications provides a justification for every request to access keys stored in
an external key manager. It lets you approve or deny the access request based on
the provided justification. Using Key Access Justifications with Cloud External Key Manager
provides visibility into requests for encryption keys that allows data to
change state from at-rest to in-use.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eKey Access Justifications validates each request for accessing keys in an external key manager.\u003c/p\u003e\n"],["\u003cp\u003eRequests are approved or denied based on the provided justification.\u003c/p\u003e\n"],["\u003cp\u003eUsing Key Access Justifications with Cloud External Key Manager provides insights into requests for encryption keys.\u003c/p\u003e\n"],["\u003cp\u003eKey Access Justifications offers the ability to review requests for keys used in transitioning data from an at-rest to in-use state.\u003c/p\u003e\n"]]],[],null,[]]