Skip to main content

Overview

The Key Manager service separates the API layer from the secret store backend, allowing the encryption backend to be swapped or scaled independently. Secret payloads are never stored in the metadata database — only encrypted references. The actual ciphertext resides exclusively in the configured secret store backend.

Service Topology


Component Descriptions

ComponentRolePort
Key Manager APIREST API for secrets, containers, orders, ACLs9311
Key Manager WorkerOrchestrates secret lifecycle and CA plugin communicationInternal
Metadata DBStores secret references, container metadata, ACLs — no secret payloadsInternal
Secret Store BackendStores encrypted secret ciphertextVaries by backend
CA PluginIntegrates with Certificate Authorities for automated certificate issuanceInternal

Secret Storage Flow


Security Separation

The metadata database contains only encrypted references and ACL metadata — never plaintext secret payloads. Even if the metadata database is compromised, secret payloads cannot be extracted without also compromising the secret store backend.
DataLocationContains
Secret metadataMetadata DBName, type, content type, expiration, ACLs
Secret payloadSecret store backendEncrypted ciphertext only
Encryption keysSecret store backendMaster wrapping keys (HSM) or key files (simple)

Next Steps

Backend Configuration

Configure simple crypto, PKCS#11, and KMIP backends

Secret Stores

Manage multiple backends and per-project store assignments

Security

Harden the Key Manager service and protect master keys

Troubleshooting

Diagnose and resolve Key Manager platform issues