Audit

Invoke the hmac operation

Sensitive data is encoded using a HMAC. In order to search for some specific sensitive data in the audit log, first calculate the HMAC for the data, then search for that HMAC in the logs.

SecurityaccessToken
Request
Request Body schema:
plaintext
required
string <plaintext>
key-version
integer <uint32>
base64-encoded
boolean
Default: false
Responses
200

OK

400

Bad Request

401

Unauthorized

403

Forbidden

404

Not Found

503

Service Unavailable (strongbox sealed)

post/v1/state/strongbox/audit/hmac
Request samples
plaintext: the quick brown fox
key-version: 1
base64-encoded: false
Response samples
hmac: sbox:hashed:v1:oSoTBSIbKvBZT6wpRQLqFHXhUYE5Cg2IErx0kOyaIQc=