Check the Prerequisite

  1. Key creation

    1. Create an AES 256 key using pykmip. The below steps are used for key creation.
      $ cd ~/pykmip/
      $ python3.9 ./kmip/demos/pie/create.py -a AES -l 256

      image-20250711-162032.png
      Linux server: key creation command execution
    2. Verify the created logs in ESKM. For the steps to verify ESKM logs, see Log location and interpretation.

image-20250711-162140.png
ESKM server: KMIP logs with key creation
  1. Verify encryption using the created key.
    Encrypt the string utimaco using the created key and store the cipher in $HOME/test.bin.
    printf utimaco | python3.9 /usr/edb/kmip/client/edb_tde_kmip_client.py \
    encrypt \
    --out-file=$HOME/test.bin \
    --pykmip-config-file=/etc/pykmip/pykmip.conf \
    --key-uid='12d8888e-a382-4762-b357-6050fff6f84e' \
    --variant=pykmip

  2.  Verify decryption with the same key.
    Decrypt the cipher in $HOME/test.bin using the same key.
    python3.9 /usr/edb/kmip/client/edb_tde_kmip_client.py decrypt \
    --in-file=$HOME/test.bin \
    --pykmip-config-file=/etc/pykmip/pykmip.conf \
    --key-uid='12d8888e-a382-4762-b357-6050fff6f84e' \
    --variant=pykmip

image-20250711-162402.png


Linux server: verifying encryption and decryption of a string