How-to guides

Creating an access key

Access keys are used to authenticate with the CipherStash API. We'll use an access key to authenticate with the CipherStash API when we deploy CipherStash Proxy. This enables us to deploy CipherStash Proxy as a machine user.

Creating an access key

When you create an access key you'll need to provide a name and a workspace ID. The workspace ID is the ID of the workspace you want to associate this access key with. An access key belongs to a single workspace, but a workspace can have multiple access keys.

You will need the CipherStash CLI installed to create an access key. If you don't have the CLI installed, follow the installation guide.

1stash access-keys create --workspace-id $CS_WORKSPACE_ID cipherstash-proxy-tutorial

This will generate an access key and display the access key for programmatic access. Make sure you copy the access key and save it for deployment.

Using with CipherStash Proxy

CipherStash Proxy uses an access key as a machine-to-machine authentication method with CipherStash Cloud to pull down a dataset configuration. CipherStash Proxy will ingest the access key as an environment variable. The access key is only one of the environment variables that CipherStash Proxy needs to authenticate with CipherStash Cloud.

Asking for help

We highly recommend setting up a call with one of our Solutions Engineers to help you get started. We're happy to help!

Creating clients