Creates an HSM configuration that contains the information required by an Amazon Redshift cluster to store and use database encryption keys in a Hardware Security Module (HSM). After creating the HSM configuration, you can specify it as a parameter when creating a cluster. The cluster will then store its encryption keys in the HSM.
redshift_create_hsm_configuration(HsmConfigurationIdentifier,
Description, HsmIpAddress, HsmPartitionName, HsmPartitionPassword,
HsmServerPublicCertificate, Tags)
[required] The identifier to be assigned to the new Amazon Redshift HSM configuration.
[required] A text description of the HSM configuration to be created.
[required] The IP address that the Amazon Redshift cluster must use to access the HSM.
[required] The name of the partition in the HSM where the Amazon Redshift clusters will store their database encryption keys.
[required] The password required to access the HSM partition.
[required] The HSMs public certificate file. When using Cloud HSM, the file name is server.pem.
A list of tag instances.
svc$create_hsm_configuration( HsmConfigurationIdentifier = "string", Description = "string", HsmIpAddress = "string", HsmPartitionName = "string", HsmPartitionPassword = "string", HsmServerPublicCertificate = "string", Tags = list( list( Key = "string", Value = "string" ) ) )
In addition to creating an HSM configuration, you must also create an HSM client certificate. For more information, go to Hardware Security Modules in the Amazon Redshift Cluster Management Guide.