1.0 Introduction
This article describes how to integrate Fortanix-Data-Security-Manager (DSM) with the MongoDB Client-Side Field-Level Encryption (CSFLE) to securely manage encryption keys and protect sensitive data before storing it in MongoDB.
CSFLE ensures that data is encrypted on the client-side before being sent to the database, so that MongoDB never has access to unencrypted data. In MongoDB Enterprise, a Customer Master Key (CMK) is the encryption key. It encrypts the Data Encryption Key (DEK), which is used to encrypt required fields in a client-side document. By default, this CMK is created by the libmongocryptd
library as a 96-byte secret and stored in Fortanix DSM.
This integration allows users to implement encryption at the field level within their MongoDB databases while maintaining centralized control over encryption keys. When using this integrated solution, sensitive information is encrypted directly on the client side before ever reaching MongoDB servers. This approach ensures that the protected fields remain fully encrypted and inaccessible even if the database is compromised, without proper authorization.
2.0 Prerequisites
Ensure the following:
MongoDB Enterprise version 4.2 or later is installed.
Administrator access to the Fortanix DSM. For more information, refer to Section 5.1: Signing Up and Section 5.2: Creating an Account.
Sample code is provided as part of this integration guide to assist with implementation and testing. Download the sample code from the GitHub repository, which includes the following files:
FortanixMongodbCSFLE.java
RotateCMK.java
3.0 Product Tested Version
This integration has been tested on the following versions:
Fortanix DSM version 4.35
MongoDB Enterprise version 8.0.4
MongoDB Java Driver version 5.0.0
MongoDB Crypt version 1.8.0
Mongosh version 2.3.7
4.0 Architecture Diagram

Figure 1: Architecture Diagram of Fortanix DSM with MongoDB CSFLE
This diagram illustrates the integration of MongoDB CSFLE with Fortanix DSM for secure encryption key management using the Key Management Interoperability Protocol (KMIP).
MongoDB CSFLE ensures that sensitive data is encrypted on the client side before being sent to the database, ensuring that MongoDB never processes unencrypted data. Fortanix DSM securely generates, stores, and manages encryption keys, ensuring encryption and decryption operations remain secure and controlled.
When a client application needs to encrypt data, it calls libmongocryptd
to generate the CMK and stores the CMK in Fortanix DSM. The client app fetches the CMK from DSM and calls libmongocryptd
to generate a DEK, which encrypts specific fields in the client’s document before insertion into MongoDB. The DEK is itself encrypted using the CMK and stored securely in the MongoDB Key Vault collection. MongoDB stores a unique Base64-encoded ID, along with the encrypted DEK, which serves as a reference for retrieving the DEK when needed.
When a client requests to decrypt a document, MongoDB retrieves the encrypted DEK from the Key Vault collection using its Base64-encoded ID and contacts Fortanix DSM using KMIP to access the CMK required to decrypt the DEK. Once decrypted, the DEK is used to decrypt the specific fields in the document so that the sensitive information is accessible only to authorized applications.
KMIP plays a crucial role by standardizing secure communication between MongoDB encryption libraries and Fortanix DSM by allowing automated key retrieval, storage, and rotation without manual intervention.
In the event of a MongoDB breach, attackers cannot access plaintext data because encryption keys are stored separately in Fortanix DSM. Even if an attacker gains access to the Base64-encoded DEK ID, they cannot decrypt the data without the CMK, which remains securely managed by Fortanix DSM.
This integration provides strong encryption, centralized key management, and enhanced security compliance, making Fortanix DSM a critical component of MongoDB’s client-side encryption strategy.
5.0 Configure Fortanix DSM
A Fortanix DSM service must be configured, and the URL must be accessible. To create a Fortanix DSM account and group, refer to the following sections:
5.1 Signing Up
To get started with the Fortanix Data Security Manager (DSM) cloud service, you must register an account at <Your_DSM_Service_URL>. For example, https://eu.smartkey.io.
For detailed steps on how to set up the Fortanix DSM, refer to the User's Guide: Sign Up for Fortanix Data Security Manager SaaS documentation.
5.2 Creating an Account
Access the <Your_DSM_Service_URL> on the web browser and enter your credentials to log in to the Fortanix DSM.

Figure 2: Logging In
5.3 Creating a Group
Perform the following steps to create a group in the Fortanix DSM:
Click the Groups menu item in the DSM left navigation panel and click the + button on the Groups page to add a new group.
Figure 3: Add Groups
On the Adding new group page, enter the following details:
Title: Enter a title for your group.
Description (optional): Enter a short description for the group.
Click the SAVE button to create the new group.
The new group has been added to the Fortanix DSM successfully.
5.4 Creating an Application
Perform the following steps to create an application (app) in the Fortanix DSM:
Click the Apps menu item in the DSM left navigation panel and click the + button on the Apps page to add a new app.
Figure 4: Add Application
On the Adding new app page, enter the following details:
App name: Enter the name of your application.
ADD DESCRIPTION (optional): Enter a short description for the application.
Authentication method: Select the default API Key as the method of authentication from the drop down menu. For more information on app authentication methods, refer to the User's Guide: Authentication documentation.
Assigning the new app to groups: Select the group created in Section 5.3: Creating a Group from the list.
Click the SAVE button to add the new application.
The new application has been added to the Fortanix DSM successfully.
5.5 Copying the App UUID
Perform the following steps to copy the app UUID from the Fortanix DSM:
Click the Apps menu item in the DSM left navigation panel and click the app created in Section 5.4: Creating an Application to go to the detailed view of the app.
From the top of the app’s page, copy the app UUID to be used in Section 5.6: Generating a Certificate as the value of Common Name (CN) to generate the certificate.
5.6 Generating a Certificate
Run the following OpenSSL command to generate a self-signed certificate. This certificate will be used later to authenticate the Fortanix DSM with the MongoDB client and HTTP client:
openssl req -newkey rsa:2048 -nodes -keyout private.key -x509 -days 365 -out certificate.crt
When prompted, enter the app UUID as the CN, as copied in Section 5.5: Copying the App UUID.
A properly generated certificate should appear as follows:
Certificate:
Data:
Version: 3 (0x2)
Serial Number: 11285796284824083476 (0x9c9f33ed245cdc14)
Signature Algorithm: sha256WithRSAEncryption
Issuer: C=US, ST=CA, L=Mountain View, O=Fortanix, OU=Test, CN=da7f2800-4122-4681-aebf-90beb779b73f/[email protected]
Validity
Not Before: Aug 8 23:31:20 2018 GMT
Not After : Aug 8 23:31:20 2019 GMT
Subject: C=US, ST=CA, L=Mountain View, O=Fortanix, OU=Test, CN=da7f2800-4122-4681-aebf-90beb779b73f/[email protected]
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
Public-Key: (2048 bit)
Modulus:
00:d2:ae:15:66:bf:78:d4:98:f4:4d:a5:57:bf:04:
08:76:83:1f:40:e8:8b:c4:da:8a:a0:71:22:43:84:
6d:c9:05:f2:81:91:83:04:75:bd:c9:83:86:92:bf:
ff:a0:e4:b4:e4:ee:56:09:10:2a:dc:e2:f4:0c:65:
43:96:a1:31:0d:15:92:49:87:ee:46:91:5d:f1:8c:
61:b3:ca:4a:9f:be:01:00:d5:30:5f:ee:56:35:75:
3c:e1:0d:a6:34:66:7f:3b:26:69:97:33:6d:2e:c7:
fd:c9:42:7d:14:f7:12:18:4a:5b:a6:90:52:7a:4b:
1b:45:b3:79:33:31:99:03:1d:a4:ed:51:dc:7b:43:
20:02:bb:08:22:27:27:8c:51:6a:5f:59:87:45:95:
d7:f3:ca:fa:30:3d:d5:a6:50:77:03:e3:de:eb:30:
17:45:48:fe:5b:76:d4:c1:03:3f:b8:99:73:ae:ad:
ae:e2:69:95:e2:14:1e:42:b1:ac:72:cd:0b:c6:01:
e3:20:8d:5a:6a:5d:19:79:17:f0:80:5f:75:fc:d5:
da:9c:af:07:d8:c7:96:02:a5:94:19:64:d7:9a:e4:
56:f1:cf:54:b9:a7:29:28:22:52:f2:c4:8a:97:04:
45:b1:9b:b5:4f:c0:18:53:ff:08:3f:3b:81:bd:f1:
d1:e9
Exponent: 65537 (0x10001)
X509v3 extensions:
X509v3 Subject Key Identifier:
87:65:C6:B6:B6:3A:0A:A6:30:BA:CB:D2:27:9E:C4:E6:2E:7F:2F:6D
X509v3 Authority Key Identifier:
keyid:87:65:C6:B6:B6:3A:0A:A6:30:BA:CB:D2:27:9E:C4:E6:2E:7F:2F:6D
X509v3 Basic Constraints:
CA:TRUE
Signature Algorithm: sha256WithRSAEncryption
71:da:8c:da:ab:9d:6d:8a:f1:9c:56:a9:7d:e2:e2:1b:fd:90:
b7:5e:45:db:d4:69:47:ca:98:2f:b0:3b:2c:1f:49:3a:75:dd:
1d:96:b3:bd:11:a6:d7:06:60:4f:18:11:e1:cf:db:5c:52:03:
29:78:47:6e:36:c0:64:d8:4d:34:00:d9:94:55:48:a9:d4:b2:
b2:ed:b8:13:fc:3d:c6:b4:61:a3:56:aa:9d:73:80:62:38:da:
0c:94:b0:4a:e6:86:da:6a:f9:aa:f3:a4:3c:48:32:93:f7:d3:
27:f9:2c:77:b4:91:9c:84:62:96:86:7d:d2:c8:20:79:d1:12:
ef:f0:cc:15:31:ea:86:e9:b4:02:00:55:83:0f:6a:c6:5b:d2:
19:67:9b:b2:44:f8:3b:36:f9:b0:02:b2:98:7d:1e:fa:95:58:
92:92:57:68:f8:56:bb:43:db:01:08:bb:d6:ab:52:e6:c7:88:
7a:1c:8d:f4:31:90:70:0a:dd:d2:96:7c:8b:93:8f:1f:4a:80:
fe:3a:f8:df:82:a7:99:ac:2f:e8:02:e5:8b:fe:ec:3b:3b:0a:
a3:c0:82:4d:f7:93:66:a1:76:6f:fa:c2:19:8e:d8:b6:b4:27:
8c:57:22:a4:f7:e6:45:61:27:af:fc:5f:51:88:eb:32:
NOTE
Ensure that the subject in the certificate matches the app ID as CN to confirm proper validation and secure integration.
5.7 Updating the Authentication Method
Perform the following steps to update the authentication method of the app in the Fortanix DSM:
Go to the detailed view of the app created in Section 5.4: Creating an Application and click the Change the authentication method button and select the Certificate option to change the authentication method to Certificate.
Click the SAVE button.
On the Add certificate dialog box, click the UPLOAD NEW CERTIFICATE button to upload the certificate file or paste the content of the
certificate.crt
file generated in Section 5.6: Generating a Certificate.Select both check boxes to confirm your understanding of the action.
Click the UPDATE button to save the changes.
6.0 Set Up MongoDB CSFLE with Fortanix DSM
This section outlines the necessary steps to configure MongoDB CSFLE with Fortanix DSM.
6.1 Setting Up SSL Certificates
This section illustrates the steps to configure Secure Sockets Layer (SSL) certificates using a TrustStore
and KeyStore
for secure communication with Fortanix DSM.
6.1.1 Configuring Keystore
Run the following command to create a certificate PKCS#12 file (certificate.p12
) using the certificate and private key as generated in Section 5.6: Generating a Certificate:
openssl pkcs12 -export -out certificate.p12 -inkey <path_to_your_private_key> -in <path_to_your_certificate.crt>
Where,
<path_to_your_private_key>
refers to the path to your private key file as generated in Section 5.6: Generating a Certificate.<path_to_your_certificate.crt>
refers to the path to your self-signed certificate file as generated in Section 5.6: Generating a Certificate.
The KeyStore
contains the private key and signed certificate necessary for client-side authentication with the DSM application. The KeyStore
is typically stored in the PKCS#12 format (.p12
), which is a secure, portable format for both keys and certificates.
KeyStore Path: Specify the path to your PKCS#12 (
.p12
) file, which includes the private key and signed certificate. For example, /path/to/keystore.p12.KeyStore Password: Provide the password that unlocks the
KeyStore
file to access the private key and certificate. For example, keyStorePassword.
System.setProperty("javax.net.ssl.keyStoreType", KEYSTORE_TYPE);
System.setProperty("javax.net.ssl.keyStore", KEYSTORE_PATH);
System.setProperty("javax.net.ssl.keyStorePassword", KEYSTORE_PASSWORD);
6.1.2 Configuring Truststore
Run the following command to convert the DSM root CA certificate into a Java KeyStore (JKS) file:
keytool -storetype JKS -importcert -file <dsm_root_ca.pem> -keystore dsm_root_ca.jks
Where,
<dsm_root_ca.pem>
refers to the path to the DSM root CA certificate on your system. For more information on how to download the certificate, refer to Where to find DSM root CA certificates.
The TrustStore
is responsible for storing the DSM root certificate authority (CA) file to verify the DSM endpoint’s identity. This file is in the Java KeyStore (.jks
) format.
TrustStore Path: Specify the path to your root CA certificate file in the
.jks
format. For example, /path/to/rootCA.jks.TrustStore Password: Provide the password associated with the
TrustStore
to unlock the store and access the CA certificates. For example, trustStorePassword.
System.setProperty("javax.net.ssl.trustStoreType", TRUSTSTORE_TYPE);
System.setProperty("javax.net.ssl.trustStore", TRUSTSTORE_PATH);
System.setProperty("javax.net.ssl.trustStorePassword", TRUSTSTORE_PASSWORD);
6.2 Specifying the KMS Provider
To configure MongoDB to use Fortanix DSM as the KMS provider, the FortanixMongodbCSFLE.java
file includes a pre-defined configuration that securely manages encryption keys.
Map<String, Map<String, Object>> kmsProviders = new HashMap<String, Map<String, Object>>();
Map<String, Object> providerDetails = new HashMap<>();
providerDetails.put("endpoint", <KMS_ENDPOINT>);
kmsProviders.put(<KMS_PROVIDER>, providerDetails);
Where,
<KMS_ENDPOINT>
refers to the Fortanix DSM API endpoint URL that MongoDB will communicate with.<KMS_PROVIDER>
refers to the name of the KMS provider you are using. For example, kmip.
6.3 Generating a Data Encryption Key and a Customer Master Key
To generate a Data Encryption Key (DEK) for encrypting sensitive data in MongoDB, the FortanixMongodbCSFLE.java
file includes a pre-defined configuration that utilizes MongoDB’s clientEncryption
object. The DEK is encrypted using the CMK stored in Fortanix DSM if the CMK ID is provided. If not provided, libmongocryptd
will create a 96-byte secret and import it into Fortanix DSM, which will act as the CMK.
ClientEncryptionSettings clientEncryptionSettings = ClientEncryptionSettings.builder()
.keyVaultMongoClientSettings(MongoClientSettings.builder()
.applyConnectionString(new ConnectionString(MONGO_CONNECTION_STRING))
.build())
.keyVaultNamespace(KEY_VAULT_NAMESPACE)
.kmsProviders(kmsProviders)
.build();
ClientEncryption clientEncryption = ClientEncryptions.create(clientEncryptionSettings);
Document masterKeyProperties = new Document();
BsonBinary dataKeyId = clientEncryption.createDataKey(KMS_PROVIDER, new DataKeyOptions().masterKey(masterKeyProperties.toBsonDocument()));
<MONGO_CONNECTION_STRING>
refers to the connection string for your MongoDB instance. For example, mongodb://localhost:27017.<KEY_VAULT_NAMESPACE>
refers to the namespace where your key vault is configured. For example, admin.keyvault.<KMS_PROVIDER>
refers to the name of the KMS provider you are using. For example, kmip.
You can select the encryption algorithms such as:
For fields requiring deterministic encryption:
AEAD_AES_256_CBC_HMAC_SHA_512-Deterministic
For fields requiring random encryption:
AEAD_AES_256_CBC_HMAC_SHA_512-Random
NOTE
Ensure that the DEK ID is saved as a base64-encoded string in a secure location within the application configuration file or client application server. This will allow it to be retrieved later for schema validation, data encryption and decryption, and CMK Key ID retrieval.
6.4 Setting Up MongoDB Clients
To set up MongoDB clients with encrypted fields, the FortanixMongodbCSFLE.java
file includes a pre-defined configuration that applies strong encryption algorithms to selected fields.
Regular Client: MongoDB connects without encryption or decryption, allowing access to data in its stored form.
// client settings builder without KMIP MongoClientSettings clientSettingsRegular = MongoClientSettings.builder() .applyConnectionString(new ConnectionString(<MONGO_CONNECTION_STRING>)) .build(); MongoClient mongoClientRegular = MongoClients.create(clientSettingsRegular);
Secure Client: MongoDB connects with automatic encryption and decryption using the DEK so that the data is stored in an encrypted form.
// client settings builder with KMIP MongoClientSettings clientSettings = MongoClientSettings.builder() .applyConnectionString(new ConnectionString(<MONGO_CONNECTION_STRING>)) .autoEncryptionSettings(AutoEncryptionSettings.builder() .keyVaultNamespace(<KEY_VAULT_NAMESPACE>) .kmsProviders(kmsProviders) .schemaMap(schemaMap) .build()) .build(); MongoClient mongoClientSecure = MongoClients.create(clientSettings);
Where,
<MONGO_CONNECTION_STRING>
refers to the MongoDB connection string, including credentials and the database to connect to.<KEY_VAULT_NAMESPACE>
refers to the namespace, the MongoDB database and collection, where your encryption keys are stored. For example, encryption.keys.
After the variables are updated, the Secure Client will automatically handle encryption and decryption based on the provided schema.
6.5 Selecting Encryption Methods and Fields to Encrypt
To specify encryption methods and fields for encryption, the FortanixMongodbCSFLE.java
file includes a pre-defined configuration that ensures only sensitive data is encrypted using strong encryption algorithms.
// start-schema
Document jsonSchema = new Document().append("bsonType", "object").append("encryptMetadata",
new Document().append("keyId", new ArrayList<>((Arrays.asList(new Document().append("$binary", new Document()
.append("base64", base64DataKeyId)
.append("subType", "04")))))))
.append("properties", new Document()
.append("<FIELDS_TO_ENCRYPT>", new Document().append("encrypt", new Document()
.append("bsonType", "int")
.append("algorithm", "<ENCRYPTION_ALGORITHM>")))
.append("<FIELDS_TO_ENCRYPT>", new Document().append("encrypt", new Document()
.append("bsonType", "string")
.append("algorithm", "<ENCRYPTION_ALGORITHM>"))));
HashMap<String, BsonDocument> schemaMap = new HashMap<String, BsonDocument>();
Where ,
ENCRYPTION_ALGORITHM
refers to the encryption method selected, such as AEAD_AES_256_CBC_HMAC_SHA_512-Deterministic or AEAD_AES_256_CBC_HMAC_SHA_512-Random.FIELDS_TO_ENCRYPT
refers to the fields you choose to encrypt, such as employeeID.
6.6 Inserting the Encrypted Document
To insert an encrypted document, the FortanixMongodbCSFLE.java
file includes a pre-defined configuration that fetches the CMK from DSM to decrypt the DEK stored in the MongoDB Key Vault collection. The decrypted DEK then encrypts the specified fields before the document is inserted into the database.
For example,
{
"name": "Alice",
"employeeID": 12345,
"city": "Bengaluru"
}
6.7 Querying the Encrypted Document
To retrieve encrypted documents, the FortanixMongodbCSFLE.java
file includes a pre-defined configuration where the Regular Client fetches data in its encrypted form, while the Secure Client automatically decrypts the specified fields for seamless execution.
The Regular Client queries the encrypted document in MongoDB. The data will remain encrypted when retrieved.
Document docRegular = mongoClientRegular.getDatabase(DB_NAME).getCollection(COLLECTION_NAME).find(eq("name", EMPLOYEE_NAME)).first();
The Secure Client queries the encrypted document in MongoDB. The data will be decrypted automatically by the secure client.
Document docSecure = mongoClientSecure.getDatabase(DB_NAME).getCollection(COLLECTION_NAME).find(eq("name", EMPLOYEE_NAME)).first();
Where,
<DB_NAME>
refers to the name of your database.<COLLECTION_NAME>
refers to the collection storing the encrypted data.<EMPLOYEE_NAME>
refers to the query criteria for searching the document.
6.8 Closing the MongoDB Client
To properly close the MongoDB connection after completing operations, the FortanixMongodbCSFLE.java
file includes a predefined configuration to close the Secure Client using the following command:
// Close the clients
mongoClientRegular.close();
mongoClientSecure.close();
6.9 Verifying the DSM Audit Logs
After successfully executing the FortanixMongodbCSFLE.java
file, a CMK will be automatically generated and securely stored within your Fortanix DSM group as created in Section 5.3: Creating a Group.
This key serves as the root of trust for encrypting and decrypting data within your MongoDB CSFLE setup. You can navigate to the Fortanix DSM UI → Audit Log to verify the creation and usage of the CMK.
.png?sv=2022-11-02&spr=https&st=2025-05-18T10%3A37%3A51Z&se=2025-05-18T11%3A05%3A51Z&sr=c&sp=r&sig=pNcx4aWv1tNOCEeGv7FoYQzqtrPtCnTzTMXMIVcx0fI%3D)
Figure 5: Verify Audit Log
7.0 Key Rotation and Rewrapping

Figure 6: Rotating the CMK and Rewrapping the DEK Workflow
This diagram illustrates the process of rotating the CMK and rewrapping the DEK to secure the key lifecycle management in Fortanix DSM.
7.1 Rotating the CMK
To enhance security and follow key management best practices, the RotateCMK.java
file includes a predefined configuration to rotate the CMK stored in Fortanix DSM.
NOTE
To rotate a CMK that is used to encrypt your DEK, the base64 key ID of the DEK should be set as a System Property before running the
RotateCMK.java
file.
To rotate the CMK, a 96-byte secret will be generated on the client application that will be used to invoke the rekey
API call to Fortanix DSM. This is done by sending an HTTP request using the HttpClient
, which communicates with the Fortanix DSM endpoint. After successful execution, a new CMK UUID is returned, replacing the old key while maintaining secure access to encrypted data.
private static String sendRotateRequest(String <oldCMKId>) throws Exception {
SecureRandom secureRandom = new SecureRandom();
// Generate 96 random bytes
byte[] secret = new byte[96];
secureRandom.nextBytes(secret);
String base64Secret = Base64.getEncoder().encodeToString(secret);
// Build HTTP client to communicate with DSM API
HttpClient client = HttpClient.newBuilder().build();
// GET Sobject Request
HttpRequest getOldCMKData = HttpRequest.newBuilder()
.uri(URI.create(<FORTANIX_API_ENDPOINT> + "/crypto/v1/keys/" + oldCMKId))
.header("Content-Type", "application/json")
.header("Authorization", <AUTH_HEADER>)
.GET().build();
HttpResponse<String> oldCMKDataResponse = client.send(getOldCMKData, HttpResponse.BodyHandlers.ofString());
String oldCmkName = null;
if (oldCMKDataResponse.statusCode() == 200) {
JSONObject oldCmkData = new JSONObject(oldCMKDataResponse.body());
oldCmkName = oldCmkData.getString("name");
} else {
System.out.println("Request failed with status code: " + oldCMKDataResponse.statusCode() + "\nError: " + oldCMKDataResponse.body());
return null;
}
// POST Rotate Sobject Request
HttpRequest postRekeyRequest = HttpRequest.newBuilder()
.uri(URI.create(<FORTANIX_API_ENDPOINT> + "/crypto/v1/keys/rekey"))
.header("Content-Type", "application/json")
.header("Authorization", <AUTH_HEADER>)
.POST(HttpRequest.BodyPublishers.ofString("{\n" +
" \"value\": \"" + base64Secret + "\",\n" +
" \"name\": \"" + oldCmkName + "\"\n" +
"}"))
.build();
HttpResponse<String> rekeyResponse = client.send(postRekeyRequest, HttpResponse.BodyHandlers.ofString());
if (rekeyResponse.statusCode() == 201) {
JSONObject newCMKData = new JSONObject(rekeyResponse.body());
System.out.println("CMK successfully rotated. New Master Key UUID: " + newCMKData.getString("kid"));
return newCMKData.getString("kid");
} else {
System.out.println("Request failed with status code: " + rekeyResponse.statusCode() + "\nError: " + rekeyResponse.body());
return null;
}
}
Where,
<FORTANIX_API_ENDPOINT>
refers to the Fortanix DSM API endpoint URL. For example, https://eu.smartkey.io.<AUTH_HEADER>
refers to the authorization token used for authentication.<oldCMKId>
refers to the existing CMK ID as returned in Section 6.3: Generating a Data Encryption Key and a Customer Master Key that needs to be rotated.
7.2 Rewrapping the Data Encryption Key
To enhance security and follow key management best practices, the RotateCMK.java
file includes a predefined configuration to rewrap the DEKs after rotating the CMK.
The rewrapping process involves invoking MongoDB’s rewrapManyDataKey
function with the new CMK ID to update the encryption of existing DEKs. This is done by establishing a connection with MongoDB and executing the rewrap operation using the specified KMS provider. After successful execution, the DEKs are securely rewrapped with the new CMK, ensuring continued protection of encrypted data.
try (MongoClient mongoClient = MongoClients.create(<MONGO_CONNECTION_STRING>);
ClientEncryption clientEncryption = ClientEncryptions.create(clientEncryptionSettings)) {
Bson filter = new Document();
Document masterKeyProperties = new Document().append("keyId", <newCMKId>);
RewrapManyDataKeyOptions rewrapManyDataKeyOptions = new RewrapManyDataKeyOptions()
.masterKey(masterKeyProperties.toBsonDocument())
.provider(<KMS_PROVIDER>);
RewrapManyDataKeyResult result = clientEncryption.rewrapManyDataKey(filter, rewrapManyDataKeyOptions);
System.out.println("Rewrapped Data Keys: " + result.getBulkWriteResult().getModifiedCount());
}
Where,
<MONGO_CONNECTION_STRING>
refers to the connection string for the MongoDB instance.<newCMKId>
refers to the newly rotated CMK ID used for rewrapping the DEK as returned in Section 7.1: Rotating the CMK.<KMS_PROVIDER>
refers to the name of the KMS provider you are using. For example, kmip.