How-to guides
Creating an access key
Access keys are used to authenticate with the CipherStash API. We'll use an access key to authenticate with the CipherStash API when we deploy CipherStash Proxy. This enables us to deploy CipherStash Proxy as a machine user.
Creating an access key
You can create an access key using the Dashboard or using CipherStash CLI.
Using the Dashboard
Log in to the CipherStash Dashboard.
Click on
Manage Workspace
next to the workspace you want to create an access key for.In the navigation bar click on
Settings
.In the
Access Keys
section click onCreate Key
.Enter a name for the access key and click
Create key
.
The maximum length of an access key name is 42 characters.
Using CipherStash CLI
When you create an access key you'll need to provide a name and a workspace ID. The workspace ID is the ID of the workspace you want to associate this access key with. An access key belongs to a single workspace, but a workspace can have multiple access keys.
If you don't have the CLI installed, follow the installation guide.
1stash access-keys create --workspace-id $CS_WORKSPACE_ID cipherstash-proxy-tutorial
This will generate an access key and display the access key for programmatic access. Make sure you copy the access key and save it for deployment.
Login if required
If you are unable to modify the provider or encounter an authentication error (403 Forbidden)
- you may need to login:
1stash login
Login opens your browser - follow the prompts to authenticate.
Using with CipherStash Proxy
CipherStash Proxy uses an access key as a machine-to-machine authentication method with CipherStash Cloud to pull down a dataset configuration. CipherStash Proxy will ingest the access key as an environment variable. The access key is only one of the environment variables that CipherStash Proxy needs to authenticate with CipherStash Cloud.
Asking for help
We highly recommend setting up a call with one of our Solutions Engineers to help you get started. We're happy to help!