@@ -30,7 +30,7 @@ MongoDB uses the following components to perform {+csfle+}:
30
30
- {+kms-long+} ({+kms-abbr+})
31
31
32
32
To learn more about keys and key vaults, see
33
- :ref:`csfle -reference-keys-key-vaults`.
33
+ :ref:`qe -reference-keys-key-vaults`.
34
34
35
35
Supported Key Management Services
36
36
---------------------------------
@@ -47,31 +47,7 @@ Supported Key Management Services
47
47
48
48
To learn more about these providers, including diagrams that show how
49
49
your application uses them to perform {+csfle+}, see
50
- :ref:`csfle-reference-kms-providers`.
51
-
52
- .. _csfle-reasons-to-use-remote-kms:
53
-
54
- Reasons to Use a Remote Key Management System
55
- ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
56
-
57
- Using a remote {+kms-long+} to manage your {+cmk-long+}
58
- has the following advantages over using your local filesystem to host
59
- the {+cmk-abbr+}:
60
-
61
- - Secure storage of the key with access auditing
62
- - Reduced risk of access permission issues
63
- - Availability and distribution of the key to remote clients
64
- - Automated key backup and recovery
65
- - Centralized encryption key lifecycle management
66
-
67
- Additionally, for the following {+kms-abbr+} providers, your
68
- {+kms-abbr+} remotely encrypts and decrypts your {+dek-long+}, ensuring
69
- your {+cmk-long+} is never exposed to your {+csfle-abbrev+}-enabled
70
- application:
71
-
72
- - {+aws-long+} KMS
73
- - {+azure-kv+}
74
- - {+gcp-kms-abbr+}
50
+ :ref:`qe-fundamentals-kms-providers`.
75
51
76
52
Manage a {+dek-long+}'s Alternate Name
77
53
---------------------------------------------
@@ -147,7 +123,7 @@ Select the tab that corresponds to your driver language:
147
123
:language: javascript
148
124
149
125
To learn more about ``dataKeyOpts`` and ``kmsProviders`` objects, see
150
- :ref:`csfle-reference -kms-providers`.
126
+ :ref:`qe-fundamentals -kms-providers`.
151
127
152
128
Use Key Alternate Names in an Automatic Encryption Schema
153
129
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
@@ -286,7 +262,7 @@ The ``rewrapManyDataKey`` uses the following syntax:
286
262
)
287
263
288
264
To learn more about the ``dataKeyOpts`` object for your KMS provider, see
289
- :ref:`csfle-reference -kms-providers-supported-kms`.
265
+ :ref:`qe-fundamentals -kms-providers-supported-kms`.
290
266
291
267
.. _field-level-encryption-data-key-delete:
292
268
@@ -307,7 +283,7 @@ You can delete a {+dek-long+} from your {+key-vault-long+} using standard CRUD
307
283
keyVault = db.getKeyVault()
308
284
keyVault.deleteKey(UUID("<UUID String>"))
309
285
310
- To learn more about {+key-vault-long+}s see :ref:`csfle -reference-key-vault `.
286
+ To learn more about {+key-vault-long+}s see :ref:`qe -reference-keys- key-vaults `.
311
287
312
288
Learn More
313
289
----------
0 commit comments