{"_id":"588fecd0c85e4f0f0092c8ee","__v":0,"version":{"_id":"588f722bbcace50f0052b9e1","project":"565f5fa26bafd40d0030a064","__v":1,"createdAt":"2017-01-30T17:04:43.410Z","releaseDate":"2017-01-30T17:04:43.410Z","categories":["588f722bbcace50f0052b9e2","588f722bbcace50f0052b9e3","588f722bbcace50f0052b9e4","588f722bbcace50f0052b9e5","588f722bbcace50f0052b9e6","588f722bbcace50f0052b9e7"],"is_deprecated":false,"is_hidden":false,"is_beta":false,"is_stable":true,"codename":"","version_clean":"5.3.0","version":"5.3.0"},"category":{"_id":"588f722bbcace50f0052b9e3","version":"588f722bbcace50f0052b9e1","project":"565f5fa26bafd40d0030a064","__v":0,"sync":{"url":"","isSync":false},"reference":false,"createdAt":"2015-12-09T21:22:52.427Z","from_sync":false,"order":1,"slug":"user-guide","title":"Reference"},"project":"565f5fa26bafd40d0030a064","parentDoc":null,"user":"588f6dbe6bc3360f0068d2a1","updates":[],"next":{"pages":[],"description":""},"createdAt":"2017-01-31T01:48:00.309Z","link_external":false,"link_url":"","githubsync":"","sync_unique":"","hidden":false,"api":{"results":{"codes":[]},"settings":"","auth":"required","params":[],"url":""},"isReference":false,"order":17,"body":"Upload certificates and keys to nanoscale.io's keystore to be used for encrypting and decrypting data as part of the Proxy endpoint workflow. \n\nThe name provided is what is referenced in the Javascript helper functions to reference which key to use to encrypt or decrypt the data.\n\nYou can also create your keys on the fly and store them in the keystore. To do this, you must first create a Cryptographic key Remote endpoint.  For help on how to create a Cryptographic key Remote endpoint, click [here](http://devhub.nanoscale.io/docs/remote-endpoints#cryptographic-keys).\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/5cf4a71-certs-keys.png\",\n        \"certs-keys.png\",\n        1260,\n        565,\n        \"#f4f4f4\"\n      ]\n    }\n  ]\n}\n[/block]\nTo delete a key, highlight the record and select the delete icon on the right side of the row.\n[block:image]\n{\n  \"images\": [\n    {\n      \"image\": [\n        \"https://files.readme.io/c0f566a-edit-certs-keys.png\",\n        \"edit-certs-keys.png\",\n        1259,\n        397,\n        \"#f7f5f3\"\n      ]\n    }\n  ]\n}\n[/block]\n\n[block:callout]\n{\n  \"type\": \"info\",\n  \"body\": \"Only if you need to dynamically generate or create keys do you need to setup a Cryptographic key Remote endpoint. If you manage your keys using the nanoscale.io Admin interface to encrypt or decrypt data within your Proxy endpoint, then you can simply reference the Javascript helper functions to encrypt or decrypt the data.\",\n  \"title\": \"Generating/Creating Keys versus Encrypting/Decrypting Data\"\n}\n[/block]","excerpt":"","slug":"certs-and-keys","type":"basic","title":"Certs and Keys"}
Upload certificates and keys to nanoscale.io's keystore to be used for encrypting and decrypting data as part of the Proxy endpoint workflow. The name provided is what is referenced in the Javascript helper functions to reference which key to use to encrypt or decrypt the data. You can also create your keys on the fly and store them in the keystore. To do this, you must first create a Cryptographic key Remote endpoint. For help on how to create a Cryptographic key Remote endpoint, click [here](http://devhub.nanoscale.io/docs/remote-endpoints#cryptographic-keys). [block:image] { "images": [ { "image": [ "https://files.readme.io/5cf4a71-certs-keys.png", "certs-keys.png", 1260, 565, "#f4f4f4" ] } ] } [/block] To delete a key, highlight the record and select the delete icon on the right side of the row. [block:image] { "images": [ { "image": [ "https://files.readme.io/c0f566a-edit-certs-keys.png", "edit-certs-keys.png", 1259, 397, "#f7f5f3" ] } ] } [/block] [block:callout] { "type": "info", "body": "Only if you need to dynamically generate or create keys do you need to setup a Cryptographic key Remote endpoint. If you manage your keys using the nanoscale.io Admin interface to encrypt or decrypt data within your Proxy endpoint, then you can simply reference the Javascript helper functions to encrypt or decrypt the data.", "title": "Generating/Creating Keys versus Encrypting/Decrypting Data" } [/block]