Skip to main content
Customer-Managed Encryption Keys (CMEK) is available on Enterprise plans. Contact support@askparable.com to enable it for your organization.

What is CMEK?

By default, Parable encrypts your data at rest using Google-managed keys. With Customer-Managed Encryption Keys (CMEK), you control the encryption keys used to protect your data — stored in your Google Cloud KMS keyring. This gives you the ability to:

Rotate Keys

Generate new key versions on your schedule. New data is encrypted with the latest version; existing data remains readable under previous versions.

Disable Access

Disable your key to immediately revoke Parable’s ability to decrypt your data — even in an emergency.

Audit Every Operation

Google Cloud Audit Logs record every encrypt and decrypt operation with full identity context.

Schedule Key Destruction

Schedule key versions for destruction after a 24-hour waiting period (GCP-enforced).

What Parable controls vs. what you control

ParableYou
KMS keyring creation✓ Created during provisioning
Keyring locationSet to your data region
Key rotationAutomatic every 90 daysCan manually trigger anytime
Encrypt / decrypt✓ Application service accounts use keys to process your data
Key disable / enableInfrastructure admins retain access for operational purposes but will never act without your written authorization✓ Can disable or enable at any time
Key destructionInfrastructure admins retain access for operational purposes but will never act without your written authorization✓ Can schedule destruction
Audit log accessInternal monitoring✓ Read-only access to your keyring’s audit logs via scoped log view
Disabling your key immediately stops all Parable services from accessing your data. Ingestion jobs will fail, and dashboards will return errors until you re-enable the key. See the Incident Response tab below for the full impact guide.

Your keyring in GCP

When Parable provisions your account, we create a dedicated KMS keyring for you in Parable’s GCP project. You receive IAM access to your keyring only — you cannot see other customers’ keyrings, and they cannot see yours.
  • Keyring name: tenant-{your-slug}-kms
  • Location: Same region as your data (e.g., us-east1)
  • Keys in the keyring:
    • main — Symmetric key for encrypting data at rest (auto-rotates every 90 days)
    • credential-encryption — Asymmetric key for encrypting connector credentials in transit
Parable supports two sign-in methods to reach GCP Console:
  • Corporate SSO (recommended) — Sign in with your existing identity provider (Okta, Azure AD, JumpCloud, etc.) via a federated sign-in link. No Google account needed. Your IT admin controls access through your IdP. See the SSO Setup tab.
  • Google account — If your organization uses Google Workspace, sign in directly with your Google account.
During onboarding, Parable configures your preferred access method and provides direct links to your keyring and audit logs.
During CMEK onboarding, your IT admin creates an SSO application in your identity provider so your team can access GCP Console to manage encryption keys and view audit logs. This tab gives your IT admin everything they need.
Parable provides the values marked from Parable during onboarding. If you don’t have them yet, contact support@askparable.com.

Choose your protocol

Most identity providers support both OIDC and SAML. OIDC is simpler to set up — use it unless your organization requires SAML.

OIDC application setup

Create a new Custom OIDC application in your identity provider with these settings:
SettingValue
App nameParable CMEK Access (or any name your team prefers)
Redirect URIProvided by Parable
Login URLProvided by Parable
Grant typeAuthorization Code
Client authenticationClient Secret Basic
Scopesopenid, profile, email
1

Create the OIDC application

In your IdP admin console, create a new custom OIDC application. Enter the Redirect URI and Login URL provided by Parable.
2

Assign users or groups

Assign the users or groups who should have access to your encryption keys. Anyone assigned to this application can sign in — you can add or remove users at any time without contacting Parable.
3

Send credentials to Parable

Share the following with your Parable contact (via a secure channel such as 1Password or your organization’s preferred method):
  • Client ID
  • Client Secret
  • Issuer URL (e.g. https://your-org.okta.com/ or https://oauth.id.jumpcloud.com/)
4

Parable completes configuration

Parable configures the federation and sends you back:
  • A sign-in link for GCP Console
  • A direct link to your encryption keyring
  • A direct link to your audit logs
Your team can also access GCP Console from the app in your IdP’s portal.
  1. Go to Applications → Create App Integration → OIDC - OpenID Connect → Web Application
  2. Set the Sign-in redirect URI to the Redirect URI from Parable
  3. Under Assignments, assign the relevant users or groups
  4. Copy the Client ID and Client Secret from the app’s General tab
  5. Your Issuer URL is https://your-org.okta.com/
  1. Go to App registrations → New registration
  2. Set the Redirect URI (Web) to the Redirect URI from Parable
  3. Under Certificates & secrets, create a new client secret
  4. Copy the Application (client) ID and the secret value
  5. Your Issuer URL is https://login.microsoftonline.com/{tenant-id}/v2.0
  1. Go to SSO Applications → Add New Application → Custom OIDC App
  2. Set Redirect URI and Login URL from Parable
  3. Set Client Authentication Type to Client Secret Basic
  4. Check Email and Profile under Standard Scopes
  5. Assign your test user or group
  6. Copy the Client ID and Client Secret
  7. Issuer URL is https://oauth.id.jumpcloud.com/

What happens after setup

Once Parable completes the federation:
  • You control access. Add or remove users from the SSO application in your IdP at any time. Changes take effect immediately — no Parable involvement needed.
  • No Google account required. Your team signs in with their existing corporate credentials.
  • No Terms of Service to accept. Federated users are temporary users of Parable’s GCP project, covered by Parable’s existing agreement with Google.
If you need to change your IdP or rotate credentials, contact support@askparable.com.

Questions we haven’t covered? Reach out to support@askparable.com or your Parable account manager.