KeyModesOfUse

The list of cryptographic operations that you can perform using the key. The modes of use are defined in section A.5.3 of the TR-31 spec.

AWSCryptographyFinancial ServicesPayment ProcessingPCI

Properties

Name Type Description
Decrypt object
DeriveKey object
Encrypt object
Generate object
NoRestrictions object
Sign object
Unwrap object
Verify object
Wrap object
View JSON Schema on GitHub