Skip to content

Commit 000d0f7

Browse files
authored
docs(add): doc in menu (#5016)
1 parent 2d66012 commit 000d0f7

File tree

2 files changed

+10
-7
lines changed

2 files changed

+10
-7
lines changed

menu/navigation.json

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -510,6 +510,10 @@
510510
"label": "Understanding Key Manager",
511511
"slug": "understanding-key-manager"
512512
},
513+
{
514+
"label": "Understanding Key Manager cryptography",
515+
"slug": "cryptographic-details-key-manager"
516+
},
513517
{
514518
"label": "Differences between Key Manager and Secret Manager",
515519
"slug": "differences-key-and-secret-manager"

pages/key-manager/reference-content/cryptographic-details-key-manager.mdx

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
11
---
22
meta:
3-
title: Cryptographic details of Scaleway Key Manager
3+
title: Understanding Key Manager cryptography
44
description: This page describes the cryptographic mechanisms used by Scaleway Key Manager, in accordance with ANSSI-PA-079 recommendations.
55
content:
6-
h1: Cryptographic details of Scaleway Key Manager
6+
h1: Understanding Key Manager cryptography
77
paragraph: This page describes the cryptographic mechanisms used by Scaleway Key Manager, in accordance with ANSSI-PA-079 recommendations.
88
tags: key-manager security
99
categories:
1010
- identity-and-access-management
1111
dates:
12-
validation: 2025-05-12
13-
posted: 2025-05-12
12+
validation: 2025-05-23
13+
posted: 2025-05-23
1414
---
1515

1616
## Cryptographic primitives in Scaleway Key Manager
@@ -25,7 +25,7 @@ Scaleway Key Manager uses a **C**ryptographically **S**ecure **P**seudorandom **
2525

2626
This CSPRNG is based on the ChaCha-based pseudorandom number generator provided by modern Linux kernels. It is seeded with high-entropy, unpredictable sources, such as:
2727

28-
- Timing variations from hardware events
28+
- Timing variations from hardware events
2929
- True Random Number Generators (TRNGs), including the `RDSEED` and `RDRAND` instructions available on AMD64 processors
3030

3131
<Message type="note">
@@ -57,8 +57,7 @@ To reduce the risk of key overuse, plaintext payloads are limited to a maximum s
5757
While Key Manager internally uses AES-256-GCM, this does not restrict users to the same algorithm for their data encryption keys (DEKs).
5858
We recommend using cryptographic libraries like Tink, which handle DEK management with robust and reviewed algorithms.
5959
Scaleway provides Tink integrations for Go and Python, which is the preferred integration method.
60-
60+
6161
- [Tink Python integration](https://github.com/scaleway/tink-py-scwkms)
6262
- [Ting Go integration](https://github.com/scaleway/tink-go-scwkms)
63-
6463
</Message>

0 commit comments

Comments
 (0)