cancel
Showing results for 
Search instead for 
Did you mean: 

S3 File Storage Configuration

Pam_Thomas
Star Contributor
Star Contributor
We are attempting to set up an S3 storage option within our OnBase test environment using AWS to help with our file storage.  We're testing this in response to our storage growing exponentially on site and some of that has to do with the fact that we do conversion within the scan queue process converting PDF's to Image File Format.  I have forced bitonal conversion to help with the size conversion, but it's still larger size files using vast amounts of file storage space.  Could someone help explain how the encryption settings within OnBase work compared to those within the S3 provider?  Does the setting within OnBase provide additional encryption on our side, or during retrieval or transit that the S3 bucket isn't providing, or are the settings other than non for an S3 provider that doesn't provide encryption?  I see the settings shown in the Platter Management MRG, but I don't see an explanation of what the encryption pertains to specifically, or vs. the S3 provider settings.
ee0cf0011786472fbbd7f1bb9ba2a328
 
In testing, we are currently using the Default (SSE-S3) S3-managed keys option for encrypting files in the S3 bucket dedicated to Onbase.  Could you please clarify if we need to create a dedicated key in AWS KMS and switch the encryption to AWS Key Management Service Key (SSE-KMS) in our bucket, or is the default encryption and an encryption setting of "none" acceptable? 
 
The goal is to verify that files are adequately encrypted at rest and while in transit. Here are the current encryption settings for the S3 bucket.
bf16e164ec564a859c76d7c67fa43232
 
   Has anyone else set this up with AWS and would be willing to share their knowledge about the configuration or encryption settings?   I was also wondering about the retrieval times, although we'll see that once we have the test connection set. 
 
Thanks!
Pam
1 ACCEPTED ANSWER

Michael_Reindel
Content Contributor
Content Contributor

Hi Pam,

 

The OnBase S3 connector is compatible with many S3 offerings, not just AWS. In the case where a local device is used for say a test environment, you may not need or want to encrypt the bucket. The 128-bit setting is for backwards compatibilty to older buckets. 

 

In the case of AWS, the encryption type specified at the bucket level when configuring your AWS bucket is the choice you'll make when connecting OnBase to the bucket. So if your bucket is set for S3 Managed Keys (SSE-S3), then you'll choose AES256v2. If your bucket is using SSE-KMS, then you would choose S3 KMS. You will need to enter the KMS key when configuring SSE-KMS.

 

These encryption settings are indepedent of OnBase Disk Group Encryption. These are only at the bucket level.

 

Hope that helps!

Mike

View answer in original post

2 REPLIES 2

Michael_Reindel
Content Contributor
Content Contributor

Hi Pam,

 

The OnBase S3 connector is compatible with many S3 offerings, not just AWS. In the case where a local device is used for say a test environment, you may not need or want to encrypt the bucket. The 128-bit setting is for backwards compatibilty to older buckets. 

 

In the case of AWS, the encryption type specified at the bucket level when configuring your AWS bucket is the choice you'll make when connecting OnBase to the bucket. So if your bucket is set for S3 Managed Keys (SSE-S3), then you'll choose AES256v2. If your bucket is using SSE-KMS, then you would choose S3 KMS. You will need to enter the KMS key when configuring SSE-KMS.

 

These encryption settings are indepedent of OnBase Disk Group Encryption. These are only at the bucket level.

 

Hope that helps!

Mike

Thank you for the information, @Michael Reindel!

Getting started

Find what you came for

We want to make your experience in Hyland Connect as valuable as possible, so we put together some helpful links.