Creates an HSM configuration that contains the information required by an Amazon Redshift cluster to store and use database encryption keys in a Hardware Security Module (HSM). After creating the HSM configuration, you can specify it as a parameter when creating a cluster. The cluster will then store its encryption keys in the HSM.
redshift_create_hsm_configuration(HsmConfigurationIdentifier,
Description, HsmIpAddress, HsmPartitionName, HsmPartitionPassword,
HsmServerPublicCertificate, Tags)[required] The identifier to be assigned to the new Amazon Redshift HSM configuration.
[required] A text description of the HSM configuration to be created.
[required] The IP address that the Amazon Redshift cluster must use to access the HSM.
[required] The name of the partition in the HSM where the Amazon Redshift clusters will store their database encryption keys.
[required] The password required to access the HSM partition.
[required] The HSMs public certificate file. When using Cloud HSM, the file name is server.pem.
A list of tag instances.
svc$create_hsm_configuration(
HsmConfigurationIdentifier = "string",
Description = "string",
HsmIpAddress = "string",
HsmPartitionName = "string",
HsmPartitionPassword = "string",
HsmServerPublicCertificate = "string",
Tags = list(
list(
Key = "string",
Value = "string"
)
)
)
In addition to creating an HSM configuration, you must also create an HSM client certificate. For more information, go to Hardware Security Modules in the Amazon Redshift Cluster Management Guide.