diff options
| author | KK Sriramadhesikan <kksriram@users.noreply.github.com> | 2017-10-05 08:42:39 -0700 |
|---|---|---|
| committer | KK Sriramadhesikan <kksriram@users.noreply.github.com> | 2017-10-05 08:44:08 -0700 |
| commit | 526cd08e2297bfd6cabf9fc672d93a65306e0ad4 (patch) | |
| tree | b409a4afa58d7b75f235e3539e0a2bcd6122d400 | |
| parent | 65648f210eb4f3fb53d70f8500673a26cf6f8ab1 (diff) | |
Typos addressing @ericchiang comments
| -rw-r--r-- | contributors/design-proposals/vault-based-kms-provider.md | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/contributors/design-proposals/vault-based-kms-provider.md b/contributors/design-proposals/vault-based-kms-provider.md index 86c123b2..097e2f13 100644 --- a/contributors/design-proposals/vault-based-kms-provider.md +++ b/contributors/design-proposals/vault-based-kms-provider.md @@ -182,7 +182,7 @@ minimum: 2. ``key-names`` list of names of the keys in Vault to be used. eg: key-name: kube-secret-enc-key. -Note : key name does not need to be changed if key is rotated in Vault, the +Note : key name does not need to be changed if the key is rotated in Vault, the rotated key is identified by key version which is prefix to ciphertext. A new key can be added in the list. Encryption will be done using the first key @@ -250,7 +250,7 @@ Here's a sample configuration file using a Vault AppRole for authentication. The KEK is generated in Vault and rotated using direct API call or CLI to Vault itself. The Key never leaves the vault. -Note that when a key is rotated, Vault does not allow to choose a different +Note that when a key is rotated, Vault does not allow choosing a different encryption algorithm or key size. If a key for different encryption algorithm or a different key size is desired, new key needs to be generated in Vault and the corresponding key name be added in the configuration. Subsequent encryption will |
