You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: .github/aws_kms_how_to.md
+11-3Lines changed: 11 additions & 3 deletions
Original file line number
Diff line number
Diff line change
@@ -4,6 +4,17 @@ Web3-API supports AWS KMS for signing & sending transactions over any EVM chain.
4
4
5
5
1. Create IAM user with programmatic access, see [here](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_users_create.html#id_users_create_console) for more details.
6
6
2. Add create, get, read permission to KMS, see [here](https://docs.aws.amazon.com/kms/latest/developerguide/control-access.html) for more details.
7
+
8
+
```
9
+
Minimum Permissions Required:
10
+
---------------------------
11
+
kms:CreateKey
12
+
kms:GetPublicKey
13
+
kms:Sign
14
+
kms:CreateAlias
15
+
kms:Verify
16
+
```
17
+
7
18
3. Create a AWS KMS key, see [here](https://docs.aws.amazon.com/kms/latest/developerguide/create-keys.html) for more details. or, you can use the `/wallet/create` to create a key.
8
19
9
20
NOTE:
@@ -27,7 +38,4 @@ Create a `.env` file in the root directory of the project and add the below deta
Copy file name to clipboardExpand all lines: .github/google_kms_how_to.md
+8-5Lines changed: 8 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -3,15 +3,19 @@ Web3-API supports Google KMS for signing & sending transactions over any EVM cha
3
3
### Steps to set up Google KMS
4
4
5
5
1. Enable Google KMS API for your Google project, see [here](https://cloud.google.com/kms/docs/create-encryption-keys#before-you-begin) for more details.
6
-
2. Create a Service Account (here)[https://cloud.google.com/iam/docs/service-accounts-create] and create a key under this service account and download the JSON file. This JSON file details will be used to authenticate with Google KMS.
7
-
3.Add the below permissions to the service account created in step 2.
6
+
2. Create a Service Account (here)[https://cloud.google.com/iam/docs/service-accounts-create]
7
+
3.Go to IAM & Admin -> IAM. Select the service account created in step 2 and click `Edit Principal` to add the below roles.
8
8
9
9
```
10
+
Minimum Roles:
11
+
10
12
Cloud KMS Admin
11
13
Cloud KMS CryptoKey Signer/Verifier
12
14
```
13
15
14
-
4. Create a keyring in Google KMS, see [here](https://cloud.google.com/kms/docs/create-key-ring) for more details.
16
+
4. Click on the created Service-Account and go to `Keys` tab.
17
+
5. Click `Add Key` -> Create new Key -> select `JSON` & download the JSON file. This JSON file details will be used to authenticate google auth while using Google Cloud KMS.
18
+
6. Create a keyring in Google KMS, see [here](https://cloud.google.com/kms/docs/create-key-ring) for more details.
15
19
16
20
Optional: Create a key in the keyring, see [here](https://cloud.google.com/kms/docs/create-key) for more details. or, you can use the `/wallet/create` to create a key in the keyring.
17
21
@@ -24,9 +28,8 @@ Create a `.env` file in the root directory of the project and add the below deta
0 commit comments