Fabric master key management mechanism can be integrated with external KMS, since the Fabric v6.5.9 release, as described here.
To define Fabric to work with KMS, the information should first be acquired from KMS and then set in Fabric.
By default, Fabric uses its internal master key mechanism.
From KMS, get the specific customer master key information - region and customer master key ID
Key ID - can be seen in the KMS keys list, for example

Region - the region name where the CMK is created. You can see the region (as well as the ID) also when drilling down into the key page, from the key list page (KMS > Customer Managed Keys):

From AWS, get the user IAM access credentials: access key ID and secret access key.
In Fabric, set the values in config.ini under [encryption_aws_kms] section, according to the KMS information, as follows: 
   [encryption_aws_kms]
   ACCESS_KEY_ID=
   SECRET_ACCESS_KEY=
   REGION=
   CUSTOMER_KEY_ID=
Notes:
- Relevant config.ini parameters are encrypted and are not saved in the file in their clear/plain form.
 - Changes in the config.ini file are performed on all Fabric nodes.
 - In case a Fabric node already has a trust with AWS (with AWS's user who shall connect to KMS), then ACCESS_KEY_ID and SECRET_ACCESS_KEY can be omitted.
 
activatekey name='<name>' generatorType='AWS_KMS' storeType='AWS_KMS'.While Fabric might be deployed across several regions, it can use the same KMS key, which is defined in a specific AWS region. It still may be required to work with AWS multi region keys. In this article, AWS recommends considering this option carefully. This article also explains the process of creating multi-region keys. In such a case, config.ini shall be set differently among the Fabric nodes, i.e., with the relevant region's definitions (key-id is the same).
From KMS, get the specific master key information - product/project ID, location, master key ID, keyring ID

From GCP, get the user's access credentials as a JSON file, which can be achieved when creating the user.
In Fabric:
CREDENTIAL_FILE parameter. Alternatively, the credential file can be set as an environment variable called GOOGLE_APPLICATION_CREDENTIALS.[encryption_gcp_kms] section, according to the KMS information, as follows:  [encryption_gcp_kms]
  PROJECT_ID
  LOCATION_ID
  KEY_ID
  KEY_RING_ID
  CREDENTIAL_FILE
Note:
- Relevant parameters are encrypted and are not saved in the file in their clear/plain form. Additionally, the credential file is encrypted and not stored in its plain form. At runtime, when calling the GCP, Fabric knows how to provide it properly, in its plain form.
 - Changes in the config.ini file are performed on all Fabric nodes.
 - In case a Fabric node already has a trust with GCP (with GCP's user or role who shall connect to KMS), then the CREDENTIAL_FILE parameter can be omitted.
 
In Fabric, run activatekey name='<name>' generatorType='Java_AES' storeType='GCP_KMS'.
From KMS, get the specific master key information - partition ID, master key ID, user, password, KMS server URL
In Fabric, set the values in config.ini under [encryption_kmip_kms] section, according to the KMS information, as follows: 
   [encryption_kmip_kms] 
   USER
   PASSWORD
   PARTITION
   KEY_ID
   BASE_URL_TEMPLATE
Notes:
- The BASE_URL_TEMPLATE, the server URL, shall include the key_id inside the URL with {} wrapping brackets, for example: https://
 /api/keys/{key_id} - Relevant config.ini parameters, like user and password, are encrypted and are not saved in the file in their clear/plain form.
 - Changes in the config.ini file are performed on all Fabric nodes.
 
activatekey name='<name>' generatorType='Java_AES' storeType='KMIP_KMS'.From KMS, get the specific master key information - partition ID, master key ID, user, password, KMS server URL
In Fabric, set the values in config.ini under [encryption_thales_kms] section, according to the KMS information, as follows: 
   [encryption_thales_kms]
   USER
   PASSWORD
   AUTH_DOMAIN
   KEY_ID
   AAD
   BASE_URL_TEMPLATE
Notes:
- The BASE_URL_TEMPLATE, the server URL, shall include the key_id inside the URL with {} wrapping brackets, for example: https://
 /api/keys/{key_id} - Relevant config.ini parameters, like user and password, are encrypted and are not saved in the file in their clear/plain form.
 - Changes in the config.ini file are performed on all Fabric nodes.
 
activatekey name='<name>' generatorType='Java_AES' storeType='KMIP_KMS'.Fortanix's KMS service is part of their Data Security Manager platform.
At config.ini:
Set the following attribute (located at [fabric] section) as following  PACKAGE_NAMES_CLASS_LOADING_FILTER=com.k2view.,com.fasterxml.
Set the values for the following parameters at [encryption_fortanix_kms] section, according to the KMS information
 [encryption_fortanix_kms]
 KEY_ID
 API_KEY
 END_POINT_URL
 ALGORITHM
 MODE
 AD
 TAG_LEN
Notes:
- KEY_ID stands for the Security Object ID at Fortanix KMS.
 - API_KEY - as generated for the app, at Fortanix KMS.
 - AD - Authentication Data - is optional
 - TAG_LEN - when attribute is commented or set to be with value = 0, its actual value will be the default which was defined by Fortanix at its SDK.
 - Attributes which considered as secrets are encrypted and are not saved in the file in their clear/plain form.
 - Changes in the config.ini file are performed on all Fabric nodes.
 
activatekey name='<name>' generatorType='Java_AES' storeType='FORTANIX_KMS'.While KMS providers enable working with either symmetric or asymmetric encryption types, Fabric supports the symmetric key type. This type should be selected in KMS when creating the master key.
Fabric master key management mechanism can be integrated with external KMS, since the Fabric v6.5.9 release, as described here.
To define Fabric to work with KMS, the information should first be acquired from KMS and then set in Fabric.
By default, Fabric uses its internal master key mechanism.
From KMS, get the specific customer master key information - region and customer master key ID
Key ID - can be seen in the KMS keys list, for example

Region - the region name where the CMK is created. You can see the region (as well as the ID) also when drilling down into the key page, from the key list page (KMS > Customer Managed Keys):

From AWS, get the user IAM access credentials: access key ID and secret access key.
In Fabric, set the values in config.ini under [encryption_aws_kms] section, according to the KMS information, as follows: 
   [encryption_aws_kms]
   ACCESS_KEY_ID=
   SECRET_ACCESS_KEY=
   REGION=
   CUSTOMER_KEY_ID=
Notes:
- Relevant config.ini parameters are encrypted and are not saved in the file in their clear/plain form.
 - Changes in the config.ini file are performed on all Fabric nodes.
 - In case a Fabric node already has a trust with AWS (with AWS's user who shall connect to KMS), then ACCESS_KEY_ID and SECRET_ACCESS_KEY can be omitted.
 
activatekey name='<name>' generatorType='AWS_KMS' storeType='AWS_KMS'.While Fabric might be deployed across several regions, it can use the same KMS key, which is defined in a specific AWS region. It still may be required to work with AWS multi region keys. In this article, AWS recommends considering this option carefully. This article also explains the process of creating multi-region keys. In such a case, config.ini shall be set differently among the Fabric nodes, i.e., with the relevant region's definitions (key-id is the same).
From KMS, get the specific master key information - product/project ID, location, master key ID, keyring ID

From GCP, get the user's access credentials as a JSON file, which can be achieved when creating the user.
In Fabric:
CREDENTIAL_FILE parameter. Alternatively, the credential file can be set as an environment variable called GOOGLE_APPLICATION_CREDENTIALS.[encryption_gcp_kms] section, according to the KMS information, as follows:  [encryption_gcp_kms]
  PROJECT_ID
  LOCATION_ID
  KEY_ID
  KEY_RING_ID
  CREDENTIAL_FILE
Note:
- Relevant parameters are encrypted and are not saved in the file in their clear/plain form. Additionally, the credential file is encrypted and not stored in its plain form. At runtime, when calling the GCP, Fabric knows how to provide it properly, in its plain form.
 - Changes in the config.ini file are performed on all Fabric nodes.
 - In case a Fabric node already has a trust with GCP (with GCP's user or role who shall connect to KMS), then the CREDENTIAL_FILE parameter can be omitted.
 
In Fabric, run activatekey name='<name>' generatorType='Java_AES' storeType='GCP_KMS'.
From KMS, get the specific master key information - partition ID, master key ID, user, password, KMS server URL
In Fabric, set the values in config.ini under [encryption_kmip_kms] section, according to the KMS information, as follows: 
   [encryption_kmip_kms] 
   USER
   PASSWORD
   PARTITION
   KEY_ID
   BASE_URL_TEMPLATE
Notes:
- The BASE_URL_TEMPLATE, the server URL, shall include the key_id inside the URL with {} wrapping brackets, for example: https://
 /api/keys/{key_id} - Relevant config.ini parameters, like user and password, are encrypted and are not saved in the file in their clear/plain form.
 - Changes in the config.ini file are performed on all Fabric nodes.
 
activatekey name='<name>' generatorType='Java_AES' storeType='KMIP_KMS'.From KMS, get the specific master key information - partition ID, master key ID, user, password, KMS server URL
In Fabric, set the values in config.ini under [encryption_thales_kms] section, according to the KMS information, as follows: 
   [encryption_thales_kms]
   USER
   PASSWORD
   AUTH_DOMAIN
   KEY_ID
   AAD
   BASE_URL_TEMPLATE
Notes:
- The BASE_URL_TEMPLATE, the server URL, shall include the key_id inside the URL with {} wrapping brackets, for example: https://
 /api/keys/{key_id} - Relevant config.ini parameters, like user and password, are encrypted and are not saved in the file in their clear/plain form.
 - Changes in the config.ini file are performed on all Fabric nodes.
 
activatekey name='<name>' generatorType='Java_AES' storeType='KMIP_KMS'.Fortanix's KMS service is part of their Data Security Manager platform.
At config.ini:
Set the following attribute (located at [fabric] section) as following  PACKAGE_NAMES_CLASS_LOADING_FILTER=com.k2view.,com.fasterxml.
Set the values for the following parameters at [encryption_fortanix_kms] section, according to the KMS information
 [encryption_fortanix_kms]
 KEY_ID
 API_KEY
 END_POINT_URL
 ALGORITHM
 MODE
 AD
 TAG_LEN
Notes:
- KEY_ID stands for the Security Object ID at Fortanix KMS.
 - API_KEY - as generated for the app, at Fortanix KMS.
 - AD - Authentication Data - is optional
 - TAG_LEN - when attribute is commented or set to be with value = 0, its actual value will be the default which was defined by Fortanix at its SDK.
 - Attributes which considered as secrets are encrypted and are not saved in the file in their clear/plain form.
 - Changes in the config.ini file are performed on all Fabric nodes.
 
activatekey name='<name>' generatorType='Java_AES' storeType='FORTANIX_KMS'.While KMS providers enable working with either symmetric or asymmetric encryption types, Fabric supports the symmetric key type. This type should be selected in KMS when creating the master key.