Skip to main content

Keys

Manage keys in OTPKI, including keys created in or linked to the configured key storage backends.

Create Key

Use the Create Key page to define the common settings for a key before OTPKI creates it using the selected key storage configuration.

Create key page

Name

Use Name to give the key a clear identifier that operators can recognize later when selecting it for certificate authorities, issuers, or other key management tasks.

Description

Use Description to record the purpose of the key or any notes that help distinguish it from other keys.

Key Type

Use Key Type to choose the cryptographic key type and size that OTPKI will use for the key.

The Create Key workflow exposes the key types defined by OTPKI for key creation.

Supported Key Types

FamilySupported key types
RSARSA 1024, RSA 1536, RSA 2048, RSA 3072, RSA 4096, RSA 6144, RSA 8192
ECDSA NIST primeECDSA P-192, ECDSA P-224, ECDSA P-256, ECDSA P-384, ECDSA P-521
ECDSA NIST binaryECDSA B-163, ECDSA K-163, ECDSA B-233, ECDSA K-233, ECDSA B-283, ECDSA K-283, ECDSA B-409, ECDSA K-409, ECDSA B-571, ECDSA K-571
ECDSA Brainpool TECDSA Brainpool P160t1, ECDSA Brainpool P192t1, ECDSA Brainpool P224t1, ECDSA Brainpool P256t1, ECDSA Brainpool P320t1, ECDSA Brainpool P384t1, ECDSA Brainpool P512t1
ECDSA Brainpool RECDSA Brainpool P160r1, ECDSA Brainpool P192r1, ECDSA Brainpool P224r1, ECDSA Brainpool P256r1, ECDSA Brainpool P320r1, ECDSA Brainpool P384r1, ECDSA Brainpool P512r1
ECDSA SECPECDSA secp192r1, ECDSA secp224r1, ECDSA secp256r1, ECDSA secp384r1, ECDSA secp521r1
ECDSA SECTECDSA sect113r1, ECDSA sect113r2, ECDSA sect131r1, ECDSA sect131r2, ECDSA sect163k1, ECDSA sect163r1, ECDSA sect163r2, ECDSA sect193r1, ECDSA sect193r2, ECDSA sect233k1, ECDSA sect233r1, ECDSA sect239k1, ECDSA sect283k1, ECDSA sect283r1, ECDSA sect409k1, ECDSA sect409r1, ECDSA sect571k1, ECDSA sect571r1
ECDSA ANSI X9.62 primeECDSA prime192v1, ECDSA prime192v2, ECDSA prime192v3, ECDSA prime239v1, ECDSA prime239v2, ECDSA prime239v3, ECDSA prime256v1
ECDSA ANSI X9.62 binaryECDSA c2pnb176w1, ECDSA c2pnb163v1, ECDSA c2pnb163v2, ECDSA c2pnb163v3, ECDSA c2pnb208w1, ECDSA c2tnb191v3, ECDSA c2tnb191v2, ECDSA c2tnb191v1, ECDSA c2tnb239v3, ECDSA c2tnb239v2, ECDSA c2tnb239v1, ECDSA c2pnb272w1, ECDSA c2pnb304w1, ECDSA c2pnb368w1, ECDSA c2tnb359v1, ECDSA c2tnb431r1
ECDSA ANSI X9.63ECDSA ansip224r1, ECDSA ansip384r1, ECDSA ansip521r1, ECDSA ansit163k1, ECDSA ansit163r1, ECDSA ansit163r2, ECDSA ansit193r1, ECDSA ansit193r2, ECDSA ansit233k1, ECDSA ansit233r1, ECDSA ansit239k1, ECDSA ansit283k1, ECDSA ansit283r1, ECDSA ansit409k1, ECDSA ansit409r1, ECDSA ansit571k1, ECDSA ansit571r1
EdwardsEd25519, Ed448
Post-quantum and hybridEdDilithium2, EdDilithium3, Dilithium2, Dilithium3, Dilithium5, ML-DSA-44, ML-DSA-65, ML-DSA-87, SLH-DSA-SHA128S, SLH-DSA-SHAKE128S, SLH-DSA-SHA128F, SLH-DSA-SHAKE128F, SLH-DSA-SHA192S, SLH-DSA-SHAKE192S, SLH-DSA-SHA192F, SLH-DSA-SHAKE192F, SLH-DSA-SHA256S, SLH-DSA-SHAKE256S, SLH-DSA-SHA256F, SLH-DSA-SHAKE256F

Plugin Support

The list above describes the key types OTPKI can represent for key creation, but the selected key storage plugin still has to support the requested type.

For AWS KMS, support depends on the key specs and algorithms that the target AWS KMS configuration allows. For PKCS#11 Proxy, support depends on the capabilities exposed by the connected HSM and its configured PKCS#11 mechanisms.

If an operator selects a key type that the chosen plugin does not support, OTPKI does not create the key. The create operation fails and the operator must choose a compatible key type or a different key storage configuration.

Key Usage

Use Key Usage to define how the key is intended to be used. A key can be configured for signing and verification, encryption and decryption, or both usage types when the selected plugin supports that combination.

Key Storage Config

Use Key Storage Config to select the key storage configuration that OTPKI will use for the key.

Import Key

Use the Import Key workflow when you need to bring an existing key into OTPKI.

Basic Settings

Import key basic settings section

Key Storage

Use Key Storage Config to select the key storage configuration that OTPKI will import the key into.

Import key key storage section

AWS KMS

Use the AWS KMS import flow when the key already exists in AWS KMS and you want OTPKI to link to that remote KMS-backed key.

Key Reference

Use the AWS KMS key reference fields to identify the existing KMS key that OTPKI should import.

Import key AWS KMS key reference section
Remote Key Identifier

Use Remote Key Identifier to provide the AWS KMS key ID for the existing key.

Key Arn

Use Key Arn when you want OTPKI to target the key by full AWS KMS ARN instead of key ID. If both values are provided, OTPKI uses the key ARN.

Region

Use Region to record the AWS region for the imported key reference. OTPKI stores the resolved region from the AWS KMS key metadata after import.

Soft DB KMS

Use the Soft DB KMS import flow when you need OTPKI to import a private key file into the Soft DB backend.

Key Data Bytes

Use Key Data Bytes to upload the private key file that OTPKI should import.

Import key Soft DB KMS key data bytes section

PKCS#11 Proxy

Use the PKCS#11 Proxy import flow when the key already exists in the connected HSM and you want to select the exact key OTPKI should use from the list exposed through the proxy.

Key Label

Use Key Label to choose the exact HSM-backed key that OTPKI should link to for this imported key record.

Import key PKCS11 Proxy key label section
HSM Key List

The Key Label dropdown displays the HSM key list for the configured PKCS#11 Proxy connection and lets operators browse and search the available keys.

The Imported field shows whether a listed HSM key has already been imported into the currently selected key storage configuration. This check applies only to that specific key configuration and does not indicate import status for other PKCS#11 key storage configurations.

Import key PKCS11 Proxy HSM key list section