Navigation

KeyVault.getKeyByAltName()

On this page

New in version 4.2.

beta

Client-Side Field Level Encryption is available as a beta. The contents of this page may change during the beta period.

KeyVault.getKeyByAltName(keyAltName)

Gets all data keys with the specified keyAltName.

getKeyByAltName() has the following syntax:

keyVault = db.getMongo().getKeyVault()

keyVault.getKeyByAltName("keyAltName")
returns:

Document representing a matching data key.

Returns nothing if no data key has the specified keyAltName.

Behavior

Requires Configuring Client-Side Field Level Encryption on Database Connection

The mongo client-side field level encrytion methods require a database connection with client-side field level encryption enabled. If the current database connection was not initiated with client-side field level encryption enabled, either:

  • Use the Mongo() constructor from the mongo shell to establish a connection with the required client-side field level encryption options. The Mongo() method supports both Amazon Web Services and Local Key Management Service (KMS) providers for Customer Master Key (CMK) management.

    or

  • Use the mongo shell command line options to establish a connection with the required options. The command line options only support the AWS KMS provider for CMK management.

Example

Note

To mitigate the risk of the AWS Access Key or AWS Secret Key leaking into logs, consider specifying an environment variable containing the required values as part of the mongo startup. For example, the following operation loads the AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY environment variables into local variables in the mongo shell:

mongo --eval "
    var AWS_ACCESS_KEY_ID = '$AWS_ACCESS_KEY_ID'
    var AWS_SECRET_ACCESS_KEY = '$AWS_SECRET_ACCESS_KEY'
  " \
  --shell
  --nodb

Use the created AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY variables in the shell to reference the AWS credentials.

The following operation issued from the mongo shell:

  • Establishes a connection to the myMongo.example.net cluster with client-side field level encryption enabled.
  • Retrieves the key vault object using the encryption-enabled connection object.
  • Retrieves a data key with the specified keyAltName.
clientSideFLEOptions = {
  "keyVaultNamespace" : "encryption.dataKeys",
  "kmsProviders" : {
    "aws" : {
      "accessKeyId" : "AWS_ACCESS_KEY_ID",
      "secretAccessKey" : "AWS_SECRET_ACCESS_KEY"
    }
  }
}

encryptedClient = Mongo(
  "mongodb://myMongo.example.net:27017/?replSetName=myMongo",
  clientSideFLEOptions
)

keyVault = encryptedClient.getKeyVault();

keyVault.getKeyByAltName("ssn-encryption-key")

getKeyByAltName() returns the following data key:

{
    "_id" : UUID("b4b41b33-5c97-412e-a02b-743498346079"),
    "keyMaterial" : BinData(0,"PXRsLOAYxhzTS/mFQAI8486da7BwZgqA91UI7NKz/T/AjB0uJZxTvhvmQQsKbCJYsWVS/cp5Rqy/FUX2zZwxJOJmI3rosPhzV0OI5y1cuXhAlLWlj03CnTcOSRzE/YIrsCjMB0/NyiZ7MRWUYzLAEQnE30d947XCiiHIb8a0kt2SD0so8vZvSuP2n0Vtz4NYqnzF0CkhZSWFa2e2yA=="),
    "creationDate" : ISODate("2019-08-12T21:21:30.569Z"),
    "updateDate" : ISODate("2019-08-12T21:21:30.569Z"),
    "status" : 0,
    "version" : NumberLong(0),
    "masterKey" : {
        "provider" : "local"
    },
    "keyAltNames" : [
        "ssn-encryption-key"
    ]
}