8000 WIP · arangodb/docs@6812e92 · GitHub
[go: up one dir, main page]

Skip to content
This repository was archived by the owner on Dec 13, 2023. It is now read-only.

Commit 6812e92

Browse files
committed
WIP
1 parent 3fca620 commit 6812e92

File tree

1 file changed

+9
-4
lines changed

1 file changed

+9
-4
lines changed

3.7/security-encryption.md

Lines changed: 9 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -116,9 +116,14 @@ servers) and directly store them in your secret management tool.
116116

117117
## Rotating encryption keys
118118

119-
It is possible to rotate the user supplied encryption key by sending a POST
119+
<!-- TODO: What are we talking about here? Encryption at rest or transport encryption? -->
120+
121+
It is possible to rotate the user supplied encryption key(s) by sending a POST
120122
request to the `/_admin/server/jwt` endpoint. The file supplied via
121-
`--rocksdb.encryption-keyfile` will be reloaded and the internal encryption
122-
key will be re-encrypted with the new user key.
123+
`--server.jwt-secret-keyfile` or the secrets in the folder supplied via
124+
`--server.jwt-secret-folder` will be reloaded and the internal encryption
125+
key(s) will be re-encrypted with the new user key(s).
123126

124-
Also see [Hot-Reload of JWT Secrets](http/general.html#hot-reload-of-jwt-secrets).
127+
Also see:
128+
- [Hot-Reload of JWT Secrets](http/general.html#hot-reload-of-jwt-secrets).
129+
- [Trigger a reload of the TLS data](http/administration-and-monitoring.html#trigger-a-reload-of-the-tls-data-and-return-a-summary).

0 commit comments

Comments
 (0)
0