Manual Key Rotation
- Last Updated: May 20, 2026
- 1 minute read
- MarkLogic Server
- Version 12.0
- Documentation
The intermediate fast rotation keys enable immediate envelope key rotation with a minimum of I/O. File level keys can be rotated at any time by forcing a merge. Log rotation and configuration file updates use new keys. Old logs, backups, and configuration files are not re-encrypted.
The internal KMS (the PKCS #11 secured wallet) follows these steps for fast key rotation:
-
User sends rotation key command to MarkLogic Server (for example,
admin:cluster-rotate-data-encryption-key-id()). -
MarkLogic Server requests a new data encryption key (CDKEK, CCKEK, CLKEK - the cluster-level encryption keys) from the internal KMS.
-
Only the fast rotation keys are re-encrypted with the new data encryption keys (CDKEK, CCKEK, CLKEK).
An external KMS follows these steps for fast key rotation:
-
The external KMS creates new KEK key (CDKEK, CCKEK, CLKEK - the cluster-level encryption keys).
-
User updates the UUIDs in MarkLogic Server. See Set Up an External KMIP KMS with MarkLogic Server Encryption for UUID details.
-
MarkLogic Server sends a Fast Rotation Key (FRKEK) to the KMS.
-
The external KMS sends new enveloped key back to MarkLogic Server.
-
The enveloped key is saved to disk, per file.
Note: Expired keys can be used for decryption but not encryption. Expired keys may be needed for decrypting backups.