Stay organized with collectionsSave and categorize content based on your preferences.
Introduction to Key Access Justifications
Key Access Justifications provides a justification for every request to access keys stored in
an external key manager. It lets you approve or deny the access request based on
the provided justification. Using Key Access Justifications withCloud External Key Managerprovides visibility into requests for encryption keys that allows data to
change state from at-rest to in-use.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[[["\u003cp\u003eKey Access Justifications allows for the approval or denial of requests to access keys stored in an external key manager, based on the provided justification.\u003c/p\u003e\n"],["\u003cp\u003eUtilizing Key Access Justifications with Cloud External Key Manager gives insight into requests for encryption keys that transition data from at-rest to in-use.\u003c/p\u003e\n"],["\u003cp\u003eKey Access Justifications ensures that every access request for keys stored externally includes a specific justification.\u003c/p\u003e\n"]]],[],null,["# Introduction to Key Access Justifications\n=========================================\n\nKey Access Justifications provides a justification for every request to access keys stored in\nan external key manager. It lets you approve or deny the access request based on\nthe provided justification. Using Key Access Justifications with [Cloud External Key Manager](/kms/docs/ekm)\nprovides visibility into requests for encryption keys that allows data to\nchange state from at-rest to in-use.\n\nFor more information, see [Overview of Key Access Justifications](/assured-workloads/key-access-justifications/docs/overview).\n\nTo learn about the core principles upon which controls that prevent unauthorized\nadministrative access are based, see [Overview of administrative access controls](/assured-workloads/cloud-provider-access-management/docs/administrative-access)."]]