A RetroSearch Logo

Home - News ( United States | United Kingdom | Italy | Germany ) - Football scores

Search Query:

Showing content from https://github.com/aws/aws-sdk-js-v3/commit/aa5d9f03130d8d3f2971bce6387de37888adf6d1 below:

Update documentation to use key ARN only in … · aws/aws-sdk-js-v3@aa5d9f0 · GitHub

@@ -4964,49 +4964,17 @@ export interface StartCallAnalyticsJobRequest {

4964 4964

OutputLocation?: string | undefined;

4965 4965 4966 4966

/**

4967 -

* <p>The KMS key you want to use to encrypt your Call Analytics

4968 -

* output.</p>

4969 -

* <p>If using a key located in the <b>current</b>

4970 -

* Amazon Web Services account, you can specify your KMS key in one of four

4971 -

* ways:</p>

4972 -

* <ol>

4973 -

* <li>

4974 -

* <p>Use the KMS key ID itself. For example,

4975 -

* <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>

4976 -

* </li>

4977 -

* <li>

4978 -

* <p>Use an alias for the KMS key ID. For example,

4979 -

* <code>alias/ExampleAlias</code>.</p>

4980 -

* </li>

4981 -

* <li>

4982 -

* <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For

4983 -

* example,

4984 -

* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>

4985 -

* </li>

4986 -

* <li>

4987 -

* <p>Use the ARN for the KMS key alias. For example,

4988 -

* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>

4989 -

* </li>

4990 -

* </ol>

4991 -

* <p>If using a key located in a <b>different</b>

4992 -

* Amazon Web Services account than the current Amazon Web Services account, you can specify

4993 -

* your KMS key in one of two ways:</p>

4994 -

* <ol>

4995 -

* <li>

4996 -

* <p>Use the ARN for the KMS key ID. For example,

4997 -

* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>

4998 -

* </li>

4999 -

* <li>

5000 -

* <p>Use the ARN for the KMS key alias. For example,

5001 -

* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>

5002 -

* </li>

5003 -

* </ol>

4967 +

* <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to

4968 +

* encrypt your Call Analytics output.</p>

4969 +

* <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:

4970 +

* <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.

4971 +

* For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">

4972 +

* KMS key ARNs</a>.</p>

5004 4973

* <p>If you do not specify an encryption key, your output is encrypted with the default

5005 -

* Amazon S3 key (SSE-S3).</p>

5006 -

* <p>If you specify a KMS key to encrypt your output, you must also specify

5007 -

* an output location using the <code>OutputLocation</code> parameter.</p>

5008 -

* <p>Note that the role making the request must

5009 -

* have permission to use the specified KMS key.</p>

4974 +

* Amazon S3 key (SSE-S3).</p>

4975 +

* <p>Note that the role making the request and the role specified in

4976 +

* the <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the

4977 +

* specified KMS key.</p>

5010 4978

* @public

5011 4979

*/

5012 4980

OutputEncryptionKMSKeyId?: string | undefined;

@@ -5097,47 +5065,17 @@ export interface StartMedicalScribeJobRequest {

5097 5065

OutputBucketName: string | undefined;

5098 5066 5099 5067

/**

5100 -

* <p>The KMS key you want to use to encrypt your Medical Scribe

5101 -

* output.</p>

5102 -

* <p>If using a key located in the <b>current</b>

5103 -

* Amazon Web Services account, you can specify your KMS key in one of four

5104 -

* ways:</p>

5105 -

* <ol>

5106 -

* <li>

5107 -

* <p>Use the KMS key ID itself. For example,

5108 -

* <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>

5109 -

* </li>

5110 -

* <li>

5111 -

* <p>Use an alias for the KMS key ID. For example,

5112 -

* <code>alias/ExampleAlias</code>.</p>

5113 -

* </li>

5114 -

* <li>

5115 -

* <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For

5116 -

* example,

5117 -

* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>

5118 -

* </li>

5119 -

* <li>

5120 -

* <p>Use the ARN for the KMS key alias. For example,

5121 -

* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>

5122 -

* </li>

5123 -

* </ol>

5124 -

* <p>If using a key located in a <b>different</b>

5125 -

* Amazon Web Services account than the current Amazon Web Services account, you can specify

5126 -

* your KMS key in one of two ways:</p>

5127 -

* <ol>

5128 -

* <li>

5129 -

* <p>Use the ARN for the KMS key ID. For example,

5130 -

* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>

5131 -

* </li>

5132 -

* <li>

5133 -

* <p>Use the ARN for the KMS key alias. For example,

5134 -

* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>

5135 -

* </li>

5136 -

* </ol>

5068 +

* <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to

5069 +

* encrypt your Medical Scribe output.</p>

5070 +

* <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:

5071 +

* <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.

5072 +

* For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">

5073 +

* KMS key ARNs</a>.</p>

5137 5074

* <p>If you do not specify an encryption key, your output is encrypted with the default

5138 5075

* Amazon S3 key (SSE-S3).</p>

5139 -

* <p>Note that the role specified in the <code>DataAccessRoleArn</code> request parameter

5140 -

* must have permission to use the specified KMS key.</p>

5076 +

* <p>Note that the role making the request and the role specified in

5077 +

* the <code>DataAccessRoleArn</code> request parameter (if present)

5078 +

* must have permission to use the specified KMS key.</p>

5141 5079

* @public

5142 5080

*/

5143 5081

OutputEncryptionKMSKeyId?: string | undefined;

@@ -5320,49 +5258,17 @@ export interface StartMedicalTranscriptionJobRequest {

5320 5258

OutputKey?: string | undefined;

5321 5259 5322 5260

/**

5323 -

* <p>The KMS key you want to use to encrypt your medical transcription

5324 -

* output.</p>

5325 -

* <p>If using a key located in the <b>current</b>

5326 -

* Amazon Web Services account, you can specify your KMS key in one of four

5327 -

* ways:</p>

5328 -

* <ol>

5329 -

* <li>

5330 -

* <p>Use the KMS key ID itself. For example,

5331 -

* <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>

5332 -

* </li>

5333 -

* <li>

5334 -

* <p>Use an alias for the KMS key ID. For example,

5335 -

* <code>alias/ExampleAlias</code>.</p>

5336 -

* </li>

5337 -

* <li>

5338 -

* <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For

5339 -

* example,

5340 -

* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>

5341 -

* </li>

5342 -

* <li>

5343 -

* <p>Use the ARN for the KMS key alias. For example,

5344 -

* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>

5345 -

* </li>

5346 -

* </ol>

5347 -

* <p>If using a key located in a <b>different</b>

5348 -

* Amazon Web Services account than the current Amazon Web Services account, you can specify

5349 -

* your KMS key in one of two ways:</p>

5350 -

* <ol>

5351 -

* <li>

5352 -

* <p>Use the ARN for the KMS key ID. For example,

5353 -

* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>

5354 -

* </li>

5355 -

* <li>

5356 -

* <p>Use the ARN for the KMS key alias. For example,

5357 -

* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>

5358 -

* </li>

5359 -

* </ol>

5261 +

* <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to

5262 +

* encrypt your medical transcription output.</p>

5263 +

* <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:

5264 +

* <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.

5265 +

* For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">

5266 +

* KMS key ARNs</a>.</p>

5360 5267

* <p>If you do not specify an encryption key, your output is encrypted with the default

5361 -

* Amazon S3 key (SSE-S3).</p>

5362 -

* <p>If you specify a KMS key to encrypt your output, you must also specify

5363 -

* an output location using the <code>OutputLocation</code> parameter.</p>

5364 -

* <p>Note that the role making the request must

5365 -

* have permission to use the specified KMS key.</p>

5268 +

* Amazon S3 key (SSE-S3).</p>

5269 +

* <p>Note that the role making the request and the role specified

5270 +

* in the <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the

5271 +

* specified KMS key.</p>

5366 5272

* @public

5367 5273

*/

5368 5274

OutputEncryptionKMSKeyId?: string | undefined;

@@ -5575,49 +5481,17 @@ export interface StartTranscriptionJobRequest {

5575 5481

OutputKey?: string | undefined;

5576 5482 5577 5483

/**

5578 -

* <p>The KMS key you want to use to encrypt your transcription

5579 -

* output.</p>

5580 -

* <p>If using a key located in the <b>current</b>

5581 -

* Amazon Web Services account, you can specify your KMS key in one of four

5582 -

* ways:</p>

5583 -

* <ol>

5584 -

* <li>

5585 -

* <p>Use the KMS key ID itself. For example,

5586 -

* <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>

5587 -

* </li>

5588 -

* <li>

5589 -

* <p>Use an alias for the KMS key ID. For example,

5590 -

* <code>alias/ExampleAlias</code>.</p>

5591 -

* </li>

5592 -

* <li>

5593 -

* <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For

5594 -

* example,

5595 -

* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>

5596 -

* </li>

5597 -

* <li>

5598 -

* <p>Use the ARN for the KMS key alias. For example,

5599 -

* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>

5600 -

* </li>

5601 -

* </ol>

5602 -

* <p>If using a key located in a <b>different</b>

5603 -

* Amazon Web Services account than the current Amazon Web Services account, you can specify

5604 -

* your KMS key in one of two ways:</p>

5605 -

* <ol>

5606 -

* <li>

5607 -

* <p>Use the ARN for the KMS key ID. For example,

5608 -

* <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>

5609 -

* </li>

5610 -

* <li>

5611 -

* <p>Use the ARN for the KMS key alias. For example,

5612 -

* <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>

5613 -

* </li>

5614 -

* </ol>

5484 +

* <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to

5485 +

* encrypt your transcription output.</p>

5486 +

* <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:

5487 +

* <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.

5488 +

* For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">

5489 +

* KMS key ARNs</a>.</p>

5615 5490

* <p>If you do not specify an encryption key, your output is encrypted with the default

5616 -

* Amazon S3 key (SSE-S3).</p>

5617 -

* <p>If you specify a KMS key to encrypt your output, you must also specify

5618 -

* an output location using the <code>OutputLocation</code> parameter.</p>

5619 -

* <p>Note that the role making the request must

5620 -

* have permission to use the specified KMS key.</p>

5491 +

* Amazon S3 key (SSE-S3).</p>

5492 +

* <p>Note that the role making the request and the role specified in the

5493 +

* <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the specified

5494 +

* KMS key.</p>

5621 5495

* @public

5622 5496

*/

5623 5497

OutputEncryptionKMSKeyId?: string | undefined;


RetroSearch is an open source project built by @garambo | Open a GitHub Issue

Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo

HTML: 3.2 | Encoding: UTF-8 | Version: 0.7.4