Documentation Index
Fetch the complete documentation index at: https://mintlify.com/lamassuiot/lamassuiot/llms.txt
Use this file to discover all available pages before exploring further.
Introduction
The Key Management Service (KMS) API provides comprehensive cryptographic key lifecycle management for the Lamassu IoT Platform. It enables secure creation, storage, and usage of cryptographic keys across multiple crypto engines.Base URL
Authentication
All KMS API endpoints require Bearer token authentication using JWT tokens.API Groups
The KMS API is organized into three main groups:Crypto Engines
Manage and retrieve information about configured crypto engine providers that store and manage cryptographic keys.Key Lifecycle Management
Complete key lifecycle operations:- Create new cryptographic keys
- Import existing keys
- Retrieve key information
- Update key metadata, names, tags, and aliases
- Delete keys
Cryptographic Operations
Perform cryptographic operations using managed keys:- Sign messages and data
- Verify signatures
Key Features
Multi-Engine Support
Support for multiple crypto engines including software (Golang), AWS KMS, HashiCorp Vault, and more
Algorithm Flexibility
Support for RSA, ECDSA, and Ed25519 algorithms with configurable key sizes
Key Import
Import existing private keys from external sources into the KMS
Rich Metadata
Organize keys with names, aliases, tags, and custom metadata for easy management
Supported Algorithms
The KMS supports the following cryptographic algorithms:- RSA - 2048, 3072, 4096 bits
- ECDSA - P-256, P-384, P-521 curves
- Ed25519 - Edwards-curve Digital Signature Algorithm
Key Organization
Keys can be organized and filtered using:- Name - Human-readable identifier
- Aliases - Alternative names for the same key
- Tags - Labels for categorization (e.g.,
production,signing,encryption) - Metadata - Custom key-value pairs for additional context
- Engine ID - Crypto engine managing the key
Common Use Cases
Certificate Authority Keys
Create and manage keys for Certificate Authorities to sign certificates:Device Signing Keys
Create keys for signing device firmware or data:Key Import
Import existing keys from legacy systems:Next Steps
Crypto Engines
Learn about crypto engine management
Key Operations
Explore key lifecycle operations
Sign & Verify
Perform cryptographic operations
