

# Managed data identifiers for credentials data
<a name="mdis-reference-credentials"></a>

Amazon Macie can detect multiple types of sensitive credentials data by using managed data identifiers. The topics on this page specify each type and provide information about the managed data identifier that's designed to detect the data. Each topic provides the following information:<a name="mdi-ref-fields-singular"></a>
+ **Managed data identifier ID** – Specifies the unique identifier (ID) for the managed data identifier that's designed to detect the data. When you [create a sensitive data discovery job](discovery-jobs-create.md) or [configure settings for automated sensitive data discovery](discovery-asdd-account-configure.md), you can use this ID to specify whether you want Macie to use the managed data identifier when it analyzes data.
+ **Supported countries and regions** – Indicates which countries or regions the applicable managed data identifier is designed for. If the managed data identifier isn't designed for a particular country or region, this value is *Any*.
+ **Keyword required** – Specifies whether detection requires a keyword to be in proximity of the data. If a keyword is required, the topic also provides examples of required keywords. For information about how Macie uses keywords when it analyzes data, see [Keyword requirements](managed-data-identifiers-keywords.md).
+ **Comments** – Provides any relevant details that might affect your choice of managed data identifier or your investigation into reported occurrences of the sensitive data. The details include information such as supported standards, syntax requirements, and exceptions.

The topics are listed in alphabetical order by sensitive data type.

**Topics**
+ [AWS secret access key](#mdis-reference-AWS-CREDENTIALS)
+ [Google Cloud API key](#mdis-reference-GCP-API-key)
+ [HTTP Basic Authorization header](#mdis-reference-HTTP_BASIC_AUTH_HEADER)
+ [JSON Web Token (JWT)](#mdis-reference-JSON_WEB_TOKEN)
+ [OpenSSH private key](#mdis-reference-OPENSSH_PRIVATE_KEY)
+ [PGP private key](#mdis-reference-PGP_PRIVATE_KEY)
+ [Public-Key Cryptography Standard (PKCS) private key](#mdis-reference-PKCS)
+ [PuTTY private key](#mdis-reference-PUTTY_PRIVATE_KEY)
+ [Stripe API key](#mdis-reference-Stripe_API_key)

## AWS secret access key
<a name="mdis-reference-AWS-CREDENTIALS"></a>

**Managed data identifier ID:** AWS\$1CREDENTIALS

**Supported countries and regions:** Any

**Keyword required:** Yes. Keywords include: *aws\$1secret\$1access\$1key, credentials, secret access key, secret key, set-awscredential*

**Comments:** Macie doesn't report occurrences of the following character sequences, which are commonly used as fictitious examples: `je7MtGbClwBF/2Zp9Utk/h3yCo8nvbEXAMPLEKEY` and `wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY`.

## Google Cloud API key
<a name="mdis-reference-GCP-API-key"></a>

**Managed data identifier ID:** GCP\$1API\$1KEY

**Supported countries and regions:** Any

**Keyword required:** Yes. Keywords include: *G\$1PLACES\$1KEY, GCP api key, GCP key, google cloud key, google-api-key, google-cloud-apikeys, GOOGLEKEY, X-goog-api-key*

**Comments:** Macie can detect only the string (`keyString`) component of a Google Cloud API key. Support doesn't include detection of the ID or display name component of a Google Cloud API key.

## HTTP Basic Authorization header
<a name="mdis-reference-HTTP_BASIC_AUTH_HEADER"></a>

**Managed data identifier ID:** HTTP\$1BASIC\$1AUTH\$1HEADER

**Supported countries and regions:** Any

**Keyword required:** No

**Comments:** Detection requires a complete header, including the field name and authentication scheme directive, as specified by [RFC 7617](https://tools.ietf.org/html/rfc7617). For example: `Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==` and `Proxy-Authorization: Basic dGVzdDoxMjPCow==`.

## JSON Web Token (JWT)
<a name="mdis-reference-JSON_WEB_TOKEN"></a>

**Managed data identifier ID:** JSON\$1WEB\$1TOKEN

**Supported countries and regions:** Any

**Keyword required:** No

**Comments:** Macie can detect JSON Web Tokens (JWTs) that comply with the requirements specified by [RFC 7519](https://tools.ietf.org/html/rfc7519) for JSON Web Signature (JWS) structures. The tokens can be signed or unsigned.

## OpenSSH private key
<a name="mdis-reference-OPENSSH_PRIVATE_KEY"></a>

**Managed data identifier ID:** OPENSSH\$1PRIVATE\$1KEY

**Supported countries and regions:** Any

**Keyword required:** No

**Comments:** None

## PGP private key
<a name="mdis-reference-PGP_PRIVATE_KEY"></a>

**Managed data identifier ID:** PGP\$1PRIVATE\$1KEY

**Supported countries and regions:** Any

**Keyword required:** No

**Comments:** None

## Public-Key Cryptography Standard (PKCS) private key
<a name="mdis-reference-PKCS"></a>

**Managed data identifier ID:** PKCS

**Supported countries and regions:** Any

**Keyword required:** No

**Comments:** None

## PuTTY private key
<a name="mdis-reference-PUTTY_PRIVATE_KEY"></a>

**Managed data identifier ID:** PUTTY\$1PRIVATE\$1KEY

**Supported countries and regions:** Any

**Keyword required:** No

**Comments:** Macie can detect PuTTY private keys that use the following standard headers and header sequence: `PuTTY-User-Key-File`, `Encryption`, `Comment`, `Public-Lines`, `Private-Lines`, and `Private-MAC`. The header values can contain alphanumeric characters, hyphens (`‐`), and newline characters (`\n` or `\r`). `Public-Lines` and `Private-Lines` values can also contain forward slashes (`/`), plus signs (`+`), and equal signs (`=`). `Private-MAC` values can also contain plus signs (`+`). Support doesn’t include detection of private keys with header values that contain other characters, such as spaces or underscores (`_`). Support also doesn’t include detection of private keys that include custom headers.

## Stripe API key
<a name="mdis-reference-Stripe_API_key"></a>

**Managed data identifier ID:** STRIPE\$1CREDENTIALS

**Supported countries and regions:** Any

**Keyword required:** No

**Comments:** Macie doesn't report occurrences of the following character sequences, which are commonly used in Stripe code examples: `sk_test_4eC39HqLyjWDarjtT1zdp7dc` and `pk_test_TYooMQauvdEDq54NiTphI7jx`.