@@ -4964,49 +4964,17 @@ export interface StartCallAnalyticsJobRequest {
4964
4964
OutputLocation?: string | undefined;
4965
4965
4966
4966
/**
4967
-
* <p>The KMS key you want to use to encrypt your Call Analytics
4968
-
* output.</p>
4969
-
* <p>If using a key located in the <b>current</b>
4970
-
* Amazon Web Services account, you can specify your KMS key in one of four
4971
-
* ways:</p>
4972
-
* <ol>
4973
-
* <li>
4974
-
* <p>Use the KMS key ID itself. For example,
4975
-
* <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4976
-
* </li>
4977
-
* <li>
4978
-
* <p>Use an alias for the KMS key ID. For example,
4979
-
* <code>alias/ExampleAlias</code>.</p>
4980
-
* </li>
4981
-
* <li>
4982
-
* <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
4983
-
* example,
4984
-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4985
-
* </li>
4986
-
* <li>
4987
-
* <p>Use the ARN for the KMS key alias. For example,
4988
-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
4989
-
* </li>
4990
-
* </ol>
4991
-
* <p>If using a key located in a <b>different</b>
4992
-
* Amazon Web Services account than the current Amazon Web Services account, you can specify
4993
-
* your KMS key in one of two ways:</p>
4994
-
* <ol>
4995
-
* <li>
4996
-
* <p>Use the ARN for the KMS key ID. For example,
4997
-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4998
-
* </li>
4999
-
* <li>
5000
-
* <p>Use the ARN for the KMS key alias. For example,
5001
-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5002
-
* </li>
5003
-
* </ol>
4967
+
* <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
4968
+
* encrypt your Call Analytics output.</p>
4969
+
* <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
4970
+
* <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
4971
+
* For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
4972
+
* KMS key ARNs</a>.</p>
5004
4973
* <p>If you do not specify an encryption key, your output is encrypted with the default
5005
-
* Amazon S3 key (SSE-S3).</p>
5006
-
* <p>If you specify a KMS key to encrypt your output, you must also specify
5007
-
* an output location using the <code>OutputLocation</code> parameter.</p>
5008
-
* <p>Note that the role making the request must
5009
-
* have permission to use the specified KMS key.</p>
4974
+
* Amazon S3 key (SSE-S3).</p>
4975
+
* <p>Note that the role making the request and the role specified in
4976
+
* the <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the
4977
+
* specified KMS key.</p>
5010
4978
* @public
5011
4979
*/
5012
4980
OutputEncryptionKMSKeyId?: string | undefined;
@@ -5097,47 +5065,17 @@ export interface StartMedicalScribeJobRequest {
5097
5065
OutputBucketName: string | undefined;
5098
5066
5099
5067
/**
5100
-
* <p>The KMS key you want to use to encrypt your Medical Scribe
5101
-
* output.</p>
5102
-
* <p>If using a key located in the <b>current</b>
5103
-
* Amazon Web Services account, you can specify your KMS key in one of four
5104
-
* ways:</p>
5105
-
* <ol>
5106
-
* <li>
5107
-
* <p>Use the KMS key ID itself. For example,
5108
-
* <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5109
-
* </li>
5110
-
* <li>
5111
-
* <p>Use an alias for the KMS key ID. For example,
5112
-
* <code>alias/ExampleAlias</code>.</p>
5113
-
* </li>
5114
-
* <li>
5115
-
* <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5116
-
* example,
5117
-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5118
-
* </li>
5119
-
* <li>
5120
-
* <p>Use the ARN for the KMS key alias. For example,
5121
-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5122
-
* </li>
5123
-
* </ol>
5124
-
* <p>If using a key located in a <b>different</b>
5125
-
* Amazon Web Services account than the current Amazon Web Services account, you can specify
5126
-
* your KMS key in one of two ways:</p>
5127
-
* <ol>
5128
-
* <li>
5129
-
* <p>Use the ARN for the KMS key ID. For example,
5130
-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5131
-
* </li>
5132
-
* <li>
5133
-
* <p>Use the ARN for the KMS key alias. For example,
5134
-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5135
-
* </li>
5136
-
* </ol>
5068
+
* <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5069
+
* encrypt your Medical Scribe output.</p>
5070
+
* <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5071
+
* <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5072
+
* For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5073
+
* KMS key ARNs</a>.</p>
5137
5074
* <p>If you do not specify an encryption key, your output is encrypted with the default
5138
5075
* Amazon S3 key (SSE-S3).</p>
5139
-
* <p>Note that the role specified in the <code>DataAccessRoleArn</code> request parameter
5140
-
* must have permission to use the specified KMS key.</p>
5076
+
* <p>Note that the role making the request and the role specified in
5077
+
* the <code>DataAccessRoleArn</code> request parameter (if present)
5078
+
* must have permission to use the specified KMS key.</p>
5141
5079
* @public
5142
5080
*/
5143
5081
OutputEncryptionKMSKeyId?: string | undefined;
@@ -5320,49 +5258,17 @@ export interface StartMedicalTranscriptionJobRequest {
5320
5258
OutputKey?: string | undefined;
5321
5259
5322
5260
/**
5323
-
* <p>The KMS key you want to use to encrypt your medical transcription
5324
-
* output.</p>
5325
-
* <p>If using a key located in the <b>current</b>
5326
-
* Amazon Web Services account, you can specify your KMS key in one of four
5327
-
* ways:</p>
5328
-
* <ol>
5329
-
* <li>
5330
-
* <p>Use the KMS key ID itself. For example,
5331
-
* <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5332
-
* </li>
5333
-
* <li>
5334
-
* <p>Use an alias for the KMS key ID. For example,
5335
-
* <code>alias/ExampleAlias</code>.</p>
5336
-
* </li>
5337
-
* <li>
5338
-
* <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5339
-
* example,
5340
-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5341
-
* </li>
5342
-
* <li>
5343
-
* <p>Use the ARN for the KMS key alias. For example,
5344
-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5345
-
* </li>
5346
-
* </ol>
5347
-
* <p>If using a key located in a <b>different</b>
5348
-
* Amazon Web Services account than the current Amazon Web Services account, you can specify
5349
-
* your KMS key in one of two ways:</p>
5350
-
* <ol>
5351
-
* <li>
5352
-
* <p>Use the ARN for the KMS key ID. For example,
5353
-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5354
-
* </li>
5355
-
* <li>
5356
-
* <p>Use the ARN for the KMS key alias. For example,
5357
-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5358
-
* </li>
5359
-
* </ol>
5261
+
* <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5262
+
* encrypt your medical transcription output.</p>
5263
+
* <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5264
+
* <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5265
+
* For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5266
+
* KMS key ARNs</a>.</p>
5360
5267
* <p>If you do not specify an encryption key, your output is encrypted with the default
5361
-
* Amazon S3 key (SSE-S3).</p>
5362
-
* <p>If you specify a KMS key to encrypt your output, you must also specify
5363
-
* an output location using the <code>OutputLocation</code> parameter.</p>
5364
-
* <p>Note that the role making the request must
5365
-
* have permission to use the specified KMS key.</p>
5268
+
* Amazon S3 key (SSE-S3).</p>
5269
+
* <p>Note that the role making the request and the role specified
5270
+
* in the <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the
5271
+
* specified KMS key.</p>
5366
5272
* @public
5367
5273
*/
5368
5274
OutputEncryptionKMSKeyId?: string | undefined;
@@ -5575,49 +5481,17 @@ export interface StartTranscriptionJobRequest {
5575
5481
OutputKey?: string | undefined;
5576
5482
5577
5483
/**
5578
-
* <p>The KMS key you want to use to encrypt your transcription
5579
-
* output.</p>
5580
-
* <p>If using a key located in the <b>current</b>
5581
-
* Amazon Web Services account, you can specify your KMS key in one of four
5582
-
* ways:</p>
5583
-
* <ol>
5584
-
* <li>
5585
-
* <p>Use the KMS key ID itself. For example,
5586
-
* <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5587
-
* </li>
5588
-
* <li>
5589
-
* <p>Use an alias for the KMS key ID. For example,
5590
-
* <code>alias/ExampleAlias</code>.</p>
5591
-
* </li>
5592
-
* <li>
5593
-
* <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5594
-
* example,
5595
-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5596
-
* </li>
5597
-
* <li>
5598
-
* <p>Use the ARN for the KMS key alias. For example,
5599
-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5600
-
* </li>
5601
-
* </ol>
5602
-
* <p>If using a key located in a <b>different</b>
5603
-
* Amazon Web Services account than the current Amazon Web Services account, you can specify
5604
-
* your KMS key in one of two ways:</p>
5605
-
* <ol>
5606
-
* <li>
5607
-
* <p>Use the ARN for the KMS key ID. For example,
5608
-
* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5609
-
* </li>
5610
-
* <li>
5611
-
* <p>Use the ARN for the KMS key alias. For example,
5612
-
* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5613
-
* </li>
5614
-
* </ol>
5484
+
* <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5485
+
* encrypt your transcription output.</p>
5486
+
* <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5487
+
* <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5488
+
* For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5489
+
* KMS key ARNs</a>.</p>
5615
5490
* <p>If you do not specify an encryption key, your output is encrypted with the default
5616
-
* Amazon S3 key (SSE-S3).</p>
5617
-
* <p>If you specify a KMS key to encrypt your output, you must also specify
5618
-
* an output location using the <code>OutputLocation</code> parameter.</p>
5619
-
* <p>Note that the role making the request must
5620
-
* have permission to use the specified KMS key.</p>
5491
+
* Amazon S3 key (SSE-S3).</p>
5492
+
* <p>Note that the role making the request and the role specified in the
5493
+
* <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the specified
5494
+
* KMS key.</p>
5621
5495
* @public
5622
5496
*/
5623
5497
OutputEncryptionKMSKeyId?: string | undefined;
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4