describe_key
(**kwargs)¶Provides detailed information about a KMS key. You can run DescribeKey
on a customer managed key or an Amazon Web Services managed key.
This detailed information includes the key ARN, creation date (and deletion date, if applicable), the key state, and the origin and expiration date (if any) of the key material. It includes fields, like KeySpec
, that help you distinguish different types of KMS keys. It also displays the key usage (encryption, signing, or generating and verifying MACs) and the algorithms that the KMS key supports.
For multi-Region keys, DescribeKey
displays the primary key and all related replica keys. For KMS keys in CloudHSM key stores, it includes information about the key store, such as the key store ID and the CloudHSM cluster ID. For KMS keys in external key stores, it includes the custom key store ID and the ID of the external key.
DescribeKey
does not return the following information:
In general, DescribeKey
is a non-mutating operation. It returns data about KMS keys, but doesn't change them. However, Amazon Web Services services use DescribeKey
to create Amazon Web Services managed keys from a predefined Amazon Web Services alias with no key ID.
Cross-account use : Yes. To perform this operation with a KMS key in a different Amazon Web Services account, specify the key ARN or alias ARN in the value of the
KeyId
parameter.Required permissions : kms:DescribeKey (key policy)
Related operations:
See also: AWS API Documentation
Request Syntax
response = client.describe_key(
KeyId='string',
GrantTokens=[
'string',
]
)
[REQUIRED]
Describes the specified KMS key.
If you specify a predefined Amazon Web Services alias (an Amazon Web Services alias with no key ID), KMS associates the alias with an Amazon Web Services managed key and returns its KeyId
and Arn
in the response.
To specify a KMS key, use its key ID, key ARN, alias name, or alias ARN. When using an alias name, prefix it with "alias/"
. To specify a KMS key in a different Amazon Web Services account, you must use the key ARN or alias ARN.
For example:
1234abcd-12ab-34cd-56ef-1234567890ab
arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab
alias/ExampleAlias
arn:aws:kms:us-east-2:111122223333:alias/ExampleAlias
To get the key ID and key ARN for a KMS key, use ListKeys or DescribeKey. To get the alias name and alias ARN, use ListAliases.
A list of grant tokens.
Use a grant token when your permission to call this operation comes from a new grant that has not yet achieved eventual consistency . For more information, see Grant token and Using a grant token in the Key Management Service Developer Guide .
dict
Response Syntax
{
'KeyMetadata': {
'AWSAccountId': 'string',
'KeyId': 'string',
'Arn': 'string',
'CreationDate': datetime(2015, 1, 1),
'Enabled': True|False,
'Description': 'string',
'KeyUsage': 'SIGN_VERIFY'|'ENCRYPT_DECRYPT'|'GENERATE_VERIFY_MAC',
'KeyState': 'Creating'|'Enabled'|'Disabled'|'PendingDeletion'|'PendingImport'|'PendingReplicaDeletion'|'Unavailable'|'Updating',
'DeletionDate': datetime(2015, 1, 1),
'ValidTo': datetime(2015, 1, 1),
'Origin': 'AWS_KMS'|'EXTERNAL'|'AWS_CLOUDHSM'|'EXTERNAL_KEY_STORE',
'CustomKeyStoreId': 'string',
'CloudHsmClusterId': 'string',
'ExpirationModel': 'KEY_MATERIAL_EXPIRES'|'KEY_MATERIAL_DOES_NOT_EXPIRE',
'KeyManager': 'AWS'|'CUSTOMER',
'CustomerMasterKeySpec': 'RSA_2048'|'RSA_3072'|'RSA_4096'|'ECC_NIST_P256'|'ECC_NIST_P384'|'ECC_NIST_P521'|'ECC_SECG_P256K1'|'SYMMETRIC_DEFAULT'|'HMAC_224'|'HMAC_256'|'HMAC_384'|'HMAC_512'|'SM2',
'KeySpec': 'RSA_2048'|'RSA_3072'|'RSA_4096'|'ECC_NIST_P256'|'ECC_NIST_P384'|'ECC_NIST_P521'|'ECC_SECG_P256K1'|'SYMMETRIC_DEFAULT'|'HMAC_224'|'HMAC_256'|'HMAC_384'|'HMAC_512'|'SM2',
'EncryptionAlgorithms': [
'SYMMETRIC_DEFAULT'|'RSAES_OAEP_SHA_1'|'RSAES_OAEP_SHA_256'|'SM2PKE',
],
'SigningAlgorithms': [
'RSASSA_PSS_SHA_256'|'RSASSA_PSS_SHA_384'|'RSASSA_PSS_SHA_512'|'RSASSA_PKCS1_V1_5_SHA_256'|'RSASSA_PKCS1_V1_5_SHA_384'|'RSASSA_PKCS1_V1_5_SHA_512'|'ECDSA_SHA_256'|'ECDSA_SHA_384'|'ECDSA_SHA_512'|'SM2DSA',
],
'MultiRegion': True|False,
'MultiRegionConfiguration': {
'MultiRegionKeyType': 'PRIMARY'|'REPLICA',
'PrimaryKey': {
'Arn': 'string',
'Region': 'string'
},
'ReplicaKeys': [
{
'Arn': 'string',
'Region': 'string'
},
]
},
'PendingDeletionWindowInDays': 123,
'MacAlgorithms': [
'HMAC_SHA_224'|'HMAC_SHA_256'|'HMAC_SHA_384'|'HMAC_SHA_512',
],
'XksKeyConfiguration': {
'Id': 'string'
}
}
}
Response Structure
(dict) --
KeyMetadata (dict) --
Metadata associated with the key.
AWSAccountId (string) --
The twelve-digit account ID of the Amazon Web Services account that owns the KMS key.
KeyId (string) --
The globally unique identifier for the KMS key.
Arn (string) --
The Amazon Resource Name (ARN) of the KMS key. For examples, see Key Management Service (KMS) in the Example ARNs section of the Amazon Web Services General Reference .
CreationDate (datetime) --
The date and time when the KMS key was created.
Enabled (boolean) --
Specifies whether the KMS key is enabled. When KeyState
is Enabled
this value is true, otherwise it is false.
Description (string) --
The description of the KMS key.
KeyUsage (string) --
The cryptographic operations for which you can use the KMS key.
KeyState (string) --
The current status of the KMS key.
For more information about how key state affects the use of a KMS key, see Key states of KMS keys in the Key Management Service Developer Guide .
DeletionDate (datetime) --
The date and time after which KMS deletes this KMS key. This value is present only when the KMS key is scheduled for deletion, that is, when its KeyState
is PendingDeletion
.
When the primary key in a multi-Region key is scheduled for deletion but still has replica keys, its key state is PendingReplicaDeletion
and the length of its waiting period is displayed in the PendingDeletionWindowInDays
field.
ValidTo (datetime) --
The time at which the imported key material expires. When the key material expires, KMS deletes the key material and the KMS key becomes unusable. This value is present only for KMS keys whose Origin
is EXTERNAL
and whose ExpirationModel
is KEY_MATERIAL_EXPIRES
, otherwise this value is omitted.
Origin (string) --
The source of the key material for the KMS key. When this value is AWS_KMS
, KMS created the key material. When this value is EXTERNAL
, the key material was imported or the KMS key doesn't have any key material. When this value is AWS_CLOUDHSM
, the key material was created in the CloudHSM cluster associated with a custom key store.
CustomKeyStoreId (string) --
A unique identifier for the custom key store that contains the KMS key. This field is present only when the KMS key is created in a custom key store.
CloudHsmClusterId (string) --
The cluster ID of the CloudHSM cluster that contains the key material for the KMS key. When you create a KMS key in an CloudHSM custom key store, KMS creates the key material for the KMS key in the associated CloudHSM cluster. This field is present only when the KMS key is created in an CloudHSM key store.
ExpirationModel (string) --
Specifies whether the KMS key's key material expires. This value is present only when Origin
is EXTERNAL
, otherwise this value is omitted.
KeyManager (string) --
The manager of the KMS key. KMS keys in your Amazon Web Services account are either customer managed or Amazon Web Services managed. For more information about the difference, see KMS keys in the Key Management Service Developer Guide .
CustomerMasterKeySpec (string) --
Instead, use the KeySpec
field.
The KeySpec
and CustomerMasterKeySpec
fields have the same value. We recommend that you use the KeySpec
field in your code. However, to avoid breaking changes, KMS supports both fields.
KeySpec (string) --
Describes the type of key material in the KMS key.
EncryptionAlgorithms (list) --
The encryption algorithms that the KMS key supports. You cannot use the KMS key with other encryption algorithms within KMS.
This value is present only when the KeyUsage
of the KMS key is ENCRYPT_DECRYPT
.
SigningAlgorithms (list) --
The signing algorithms that the KMS key supports. You cannot use the KMS key with other signing algorithms within KMS.
This field appears only when the KeyUsage
of the KMS key is SIGN_VERIFY
.
MultiRegion (boolean) --
Indicates whether the KMS key is a multi-Region ( True
) or regional ( False
) key. This value is True
for multi-Region primary and replica keys and False
for regional KMS keys.
For more information about multi-Region keys, see Multi-Region keys in KMS in the Key Management Service Developer Guide .
MultiRegionConfiguration (dict) --
Lists the primary and replica keys in same multi-Region key. This field is present only when the value of the MultiRegion
field is True
.
For more information about any listed KMS key, use the DescribeKey operation.
MultiRegionKeyType
indicates whether the KMS key is a PRIMARY
or REPLICA
key.PrimaryKey
displays the key ARN and Region of the primary key. This field displays the current KMS key if it is the primary key.ReplicaKeys
displays the key ARNs and Regions of all replica keys. This field includes the current KMS key if it is a replica key.MultiRegionKeyType (string) --
Indicates whether the KMS key is a PRIMARY
or REPLICA
key.
PrimaryKey (dict) --
Displays the key ARN and Region of the primary key. This field includes the current KMS key if it is the primary key.
Arn (string) --
Displays the key ARN of a primary or replica key of a multi-Region key.
Region (string) --
Displays the Amazon Web Services Region of a primary or replica key in a multi-Region key.
ReplicaKeys (list) --
displays the key ARNs and Regions of all replica keys. This field includes the current KMS key if it is a replica key.
(dict) --
Describes the primary or replica key in a multi-Region key.
Arn (string) --
Displays the key ARN of a primary or replica key of a multi-Region key.
Region (string) --
Displays the Amazon Web Services Region of a primary or replica key in a multi-Region key.
PendingDeletionWindowInDays (integer) --
The waiting period before the primary key in a multi-Region key is deleted. This waiting period begins when the last of its replica keys is deleted. This value is present only when the KeyState
of the KMS key is PendingReplicaDeletion
. That indicates that the KMS key is the primary key in a multi-Region key, it is scheduled for deletion, and it still has existing replica keys.
When a single-Region KMS key or a multi-Region replica key is scheduled for deletion, its deletion date is displayed in the DeletionDate
field. However, when the primary key in a multi-Region key is scheduled for deletion, its waiting period doesn't begin until all of its replica keys are deleted. This value displays that waiting period. When the last replica key in the multi-Region key is deleted, the KeyState
of the scheduled primary key changes from PendingReplicaDeletion
to PendingDeletion
and the deletion date appears in the DeletionDate
field.
MacAlgorithms (list) --
The message authentication code (MAC) algorithm that the HMAC KMS key supports.
This value is present only when the KeyUsage
of the KMS key is GENERATE_VERIFY_MAC
.
XksKeyConfiguration (dict) --
Information about the external key that is associated with a KMS key in an external key store.
For more information, see External key in the Key Management Service Developer Guide .
Id (string) --
The ID of the external key in its external key manager. This is the ID that the external key store proxy uses to identify the external key.
Exceptions
KMS.Client.exceptions.NotFoundException
KMS.Client.exceptions.InvalidArnException
KMS.Client.exceptions.DependencyTimeoutException
KMS.Client.exceptions.KMSInternalException
Examples
The following example gets metadata for a symmetric encryption KMS key.
response = client.describe_key(
# An identifier for the KMS key. You can use the key ID, key ARN, alias name, alias ARN of the KMS key.
KeyId='1234abcd-12ab-34cd-56ef-1234567890ab',
)
print(response)
Expected Output:
{
# An object that contains information about the specified KMS key.
'KeyMetadata': {
'AWSAccountId': '111122223333',
'Arn': 'arn:aws:kms:us-east-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab',
'CreationDate': datetime(2017, 7, 5, 14, 4, 55, 2, 186, 0),
'CustomerMasterKeySpec': 'SYMMETRIC_DEFAULT',
'Description': '',
'Enabled': True,
'EncryptionAlgorithms': [
'SYMMETRIC_DEFAULT',
],
'KeyId': '1234abcd-12ab-34cd-56ef-1234567890ab',
'KeyManager': 'CUSTOMER',
'KeySpec': 'SYMMETRIC_DEFAULT',
'KeyState': 'Enabled',
'KeyUsage': 'ENCRYPT_DECRYPT',
'MultiRegion': False,
'Origin': 'AWS_KMS',
},
'ResponseMetadata': {
'...': '...',
},
}
The following example gets metadata for an asymmetric RSA KMS key used for signing and verification.
response = client.describe_key(
# An identifier for the KMS key. You can use the key ID, key ARN, alias name, alias ARN of the KMS key.
KeyId='1234abcd-12ab-34cd-56ef-1234567890ab',
)
print(response)
Expected Output:
{
# An object that contains information about the specified KMS key.
'KeyMetadata': {
'AWSAccountId': '111122223333',
'Arn': 'arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab',
'CreationDate': 1571767572.317,
'CustomerMasterKeySpec': 'RSA_2048',
'Description': '',
'Enabled': False,
'KeyId': '1234abcd-12ab-34cd-56ef-1234567890ab',
'KeyManager': 'CUSTOMER',
'KeySpec': 'RSA_2048',
'KeyState': 'Disabled',
'KeyUsage': 'SIGN_VERIFY',
'MultiRegion': False,
'Origin': 'AWS_KMS',
'SigningAlgorithms': [
'RSASSA_PKCS1_V1_5_SHA_256',
'RSASSA_PKCS1_V1_5_SHA_384',
'RSASSA_PKCS1_V1_5_SHA_512',
'RSASSA_PSS_SHA_256',
'RSASSA_PSS_SHA_384',
'RSASSA_PSS_SHA_512',
],
},
'ResponseMetadata': {
'...': '...',
},
}
The following example gets metadata for a multi-Region replica key. This multi-Region key is a symmetric encryption key. DescribeKey returns information about the primary key and all of its replicas.
response = client.describe_key(
# An identifier for the KMS key. You can use the key ID, key ARN, alias name, alias ARN of the KMS key.
KeyId='arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab',
)
print(response)
Expected Output:
{
# An object that contains information about the specified KMS key.
'KeyMetadata': {
'AWSAccountId': '111122223333',
'Arn': 'arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab',
'CreationDate': 1586329200.918,
'CustomerMasterKeySpec': 'SYMMETRIC_DEFAULT',
'Description': '',
'Enabled': True,
'EncryptionAlgorithms': [
'SYMMETRIC_DEFAULT',
],
'KeyId': 'mrk-1234abcd12ab34cd56ef1234567890ab',
'KeyManager': 'CUSTOMER',
'KeyState': 'Enabled',
'KeyUsage': 'ENCRYPT_DECRYPT',
'MultiRegion': True,
'MultiRegionConfiguration': {
'MultiRegionKeyType': 'PRIMARY',
'PrimaryKey': {
'Arn': 'arn:aws:kms:us-west-2:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab',
'Region': 'us-west-2',
},
'ReplicaKeys': [
{
'Arn': 'arn:aws:kms:eu-west-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab',
'Region': 'eu-west-1',
},
{
'Arn': 'arn:aws:kms:ap-northeast-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab',
'Region': 'ap-northeast-1',
},
{
'Arn': 'arn:aws:kms:sa-east-1:111122223333:key/mrk-1234abcd12ab34cd56ef1234567890ab',
'Region': 'sa-east-1',
},
],
},
'Origin': 'AWS_KMS',
},
'ResponseMetadata': {
'...': '...',
},
}
The following example gets the metadata of an HMAC KMS key.
response = client.describe_key(
# An identifier for the KMS key. You can use the key ID, key ARN, alias name, alias ARN of the KMS key.
KeyId='arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab',
)
print(response)
Expected Output:
{
# An object that contains information about the specified KMS key.
'KeyMetadata': {
'AWSAccountId': '123456789012',
'Arn': 'arn:aws:kms:us-west-2:123456789012:key/1234abcd-12ab-34cd-56ef-1234567890ab',
'CreationDate': 1566160362.664,
'CustomerMasterKeySpec': 'HMAC_256',
'Description': 'Development test key',
'Enabled': True,
'KeyId': '1234abcd-12ab-34cd-56ef-1234567890ab',
'KeyManager': 'CUSTOMER',
'KeyState': 'Enabled',
'KeyUsage': 'GENERATE_VERIFY_MAC',
'MacAlgorithms': [
'HMAC_SHA_256',
],
'MultiRegion': False,
'Origin': 'AWS_KMS',
},
'ResponseMetadata': {
'...': '...',
},
}