Reference documentation and code samples for the Google Cloud Key Management Service v1 API enum EkmConnection.Types.KeyManagementMode.
[KeyManagementMode][google.cloud.kms.v1.EkmConnection.KeyManagementMode]
describes who can perform control plane cryptographic operations using this
[EkmConnection][google.cloud.kms.v1.EkmConnection].
All [CryptoKeys][google.cloud.kms.v1.CryptoKey] created with this
[EkmConnection][google.cloud.kms.v1.EkmConnection] use EKM-side key
management operations initiated from Cloud KMS. This means that:
When a [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion]
associated with this [EkmConnection][google.cloud.kms.v1.EkmConnection]
is
created, the EKM automatically generates new key material and a new
key path. The caller cannot supply the key path of pre-existing
external key material.
Destruction of external key material associated with this
[EkmConnection][google.cloud.kms.v1.EkmConnection] can be requested by
calling [DestroyCryptoKeyVersion][EkmService.DestroyCryptoKeyVersion].
Automatic rotation of key material is supported.
Manual
EKM-side key management operations on
[CryptoKeys][google.cloud.kms.v1.CryptoKey] created with this
[EkmConnection][google.cloud.kms.v1.EkmConnection] must be initiated from
the EKM directly and cannot be performed from Cloud KMS. This means that:
When creating a
[CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion] associated with
this
[EkmConnection][google.cloud.kms.v1.EkmConnection], the caller must
supply the key path of pre-existing external key material that will be
linked to the [CryptoKeyVersion][google.cloud.kms.v1.CryptoKeyVersion].
Destruction of external key material cannot be requested via the
Cloud KMS API and must be performed directly in the EKM.
Automatic rotation of key material is not supported.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe latest version available for the Google Cloud Key Management Service v1 API is 3.16.0, with several previous versions also listed, down to version 2.2.0.\u003c/p\u003e\n"],["\u003cp\u003eThis documentation details the \u003ccode\u003eEkmConnection.Types.KeyManagementMode\u003c/code\u003e enum, which controls who can manage cryptographic operations for a given \u003ccode\u003eEkmConnection\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eKeyManagementMode\u003c/code\u003e enum has three possible values: \u003ccode\u003eCloudKms\u003c/code\u003e (Cloud KMS initiates EKM-side key management), \u003ccode\u003eManual\u003c/code\u003e (key management must be performed directly in the EKM), and \u003ccode\u003eUnspecified\u003c/code\u003e (not specified).\u003c/p\u003e\n"],["\u003cp\u003eIn \u003ccode\u003eCloudKms\u003c/code\u003e mode, Cloud KMS manages the creation, rotation, and destruction of key material, whereas in \u003ccode\u003eManual\u003c/code\u003e mode, the caller is responsible for these operations directly within the EKM.\u003c/p\u003e\n"],["\u003cp\u003eThere is information for users on the namespace, assembly and the description for the available fields, as well as the current version.\u003c/p\u003e\n"]]],[],null,[]]