You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<pclass="firstline">Updates the AutokeyConfig for a folder. The caller must have both `cloudkms.autokeyConfigs.update` permission on the parent folder and `cloudkms.cryptoKeys.setIamPolicy` permission on the provided key project. A KeyHandle creation in the folder's descendant projects will use this configuration to determine where to create the resulting CryptoKey.</p>
<pclass="firstline">Updates the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.</p>
86
92
<h3>Method Details</h3>
87
93
<divclass="method">
88
94
<codeclass="details" id="close">close()</code>
@@ -104,12 +110,37 @@ <h3>Method Details</h3>
104
110
An object of the form:
105
111
106
112
{ # Cloud KMS Autokey configuration for a folder.
113
+
"etag": "A String", # Optional. A checksum computed by the server based on the value of other fields. This may be sent on update requests to ensure that the client has an up-to-date value before proceeding. The request will be rejected with an ABORTED error on a mismatched etag.
107
114
"keyProject": "A String", # Optional. Name of the key project, e.g. `projects/{PROJECT_ID}` or `projects/{PROJECT_NUMBER}`, where Cloud KMS Autokey will provision a new CryptoKey when a KeyHandle is created. On UpdateAutokeyConfig, the caller will require `cloudkms.cryptoKeys.setIamPolicy` permission on this key project. Once configured, for Cloud KMS Autokey to function properly, this key project must have the Cloud KMS API activated and the Cloud KMS Service Agent for this key project must be granted the `cloudkms.admin` role (or pertinent permissions). A request with an empty key project field will clear the configuration.
108
115
"name": "A String", # Identifier. Name of the AutokeyConfig resource, e.g. `folders/{FOLDER_NUMBER}/autokeyConfig`.
109
116
"state": "A String", # Output only. The state for the AutokeyConfig.
<pre>Gets the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.
123
+
124
+
Args:
125
+
name: string, Required. The name of the KeyAccessJustificationsPolicyConfig to get. (required)
126
+
x__xgafv: string, V1 error format.
127
+
Allowed values
128
+
1 - v1 error format
129
+
2 - v2 error format
130
+
131
+
Returns:
132
+
An object of the form:
133
+
134
+
{ # A singleton configuration for Key Access Justifications policies.
135
+
"defaultKeyAccessJustificationPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for encrypt, decrypt, and sign operations on a CryptoKey. # Optional. The default key access justification policy used when a CryptoKey is created in this folder. This is only used when a Key Access Justifications policy is not provided in the CreateCryptoKeyRequest. This overrides any default policies in its ancestry.
136
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all encrypt, decrypt, and sign operations for the CryptoKey associated with this policy will fail.
137
+
"A String",
138
+
],
139
+
},
140
+
"name": "A String", # Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of "{organizations|folders|projects}/*/kajPolicyConfig".
<pre>Updates the AutokeyConfig for a folder. The caller must have both `cloudkms.autokeyConfigs.update` permission on the parent folder and `cloudkms.cryptoKeys.setIamPolicy` permission on the provided key project. A KeyHandle creation in the folder's descendant projects will use this configuration to determine where to create the resulting CryptoKey.
@@ -120,6 +151,7 @@ <h3>Method Details</h3>
120
151
The object takes the form of:
121
152
122
153
{ # Cloud KMS Autokey configuration for a folder.
154
+
"etag": "A String", # Optional. A checksum computed by the server based on the value of other fields. This may be sent on update requests to ensure that the client has an up-to-date value before proceeding. The request will be rejected with an ABORTED error on a mismatched etag.
123
155
"keyProject": "A String", # Optional. Name of the key project, e.g. `projects/{PROJECT_ID}` or `projects/{PROJECT_NUMBER}`, where Cloud KMS Autokey will provision a new CryptoKey when a KeyHandle is created. On UpdateAutokeyConfig, the caller will require `cloudkms.cryptoKeys.setIamPolicy` permission on this key project. Once configured, for Cloud KMS Autokey to function properly, this key project must have the Cloud KMS API activated and the Cloud KMS Service Agent for this key project must be granted the `cloudkms.admin` role (or pertinent permissions). A request with an empty key project field will clear the configuration.
124
156
"name": "A String", # Identifier. Name of the AutokeyConfig resource, e.g. `folders/{FOLDER_NUMBER}/autokeyConfig`.
125
157
"state": "A String", # Output only. The state for the AutokeyConfig.
@@ -135,10 +167,48 @@ <h3>Method Details</h3>
135
167
An object of the form:
136
168
137
169
{ # Cloud KMS Autokey configuration for a folder.
170
+
"etag": "A String", # Optional. A checksum computed by the server based on the value of other fields. This may be sent on update requests to ensure that the client has an up-to-date value before proceeding. The request will be rejected with an ABORTED error on a mismatched etag.
138
171
"keyProject": "A String", # Optional. Name of the key project, e.g. `projects/{PROJECT_ID}` or `projects/{PROJECT_NUMBER}`, where Cloud KMS Autokey will provision a new CryptoKey when a KeyHandle is created. On UpdateAutokeyConfig, the caller will require `cloudkms.cryptoKeys.setIamPolicy` permission on this key project. Once configured, for Cloud KMS Autokey to function properly, this key project must have the Cloud KMS API activated and the Cloud KMS Service Agent for this key project must be granted the `cloudkms.admin` role (or pertinent permissions). A request with an empty key project field will clear the configuration.
139
172
"name": "A String", # Identifier. Name of the AutokeyConfig resource, e.g. `folders/{FOLDER_NUMBER}/autokeyConfig`.
140
173
"state": "A String", # Output only. The state for the AutokeyConfig.
<pre>Updates the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.
180
+
181
+
Args:
182
+
name: string, Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of "{organizations|folders|projects}/*/kajPolicyConfig". (required)
183
+
body: object, The request body.
184
+
The object takes the form of:
185
+
186
+
{ # A singleton configuration for Key Access Justifications policies.
187
+
"defaultKeyAccessJustificationPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for encrypt, decrypt, and sign operations on a CryptoKey. # Optional. The default key access justification policy used when a CryptoKey is created in this folder. This is only used when a Key Access Justifications policy is not provided in the CreateCryptoKeyRequest. This overrides any default policies in its ancestry.
188
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all encrypt, decrypt, and sign operations for the CryptoKey associated with this policy will fail.
189
+
"A String",
190
+
],
191
+
},
192
+
"name": "A String", # Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of "{organizations|folders|projects}/*/kajPolicyConfig".
193
+
}
194
+
195
+
updateMask: string, Optional. The list of fields to update.
196
+
x__xgafv: string, V1 error format.
197
+
Allowed values
198
+
1 - v1 error format
199
+
2 - v2 error format
200
+
201
+
Returns:
202
+
An object of the form:
203
+
204
+
{ # A singleton configuration for Key Access Justifications policies.
205
+
"defaultKeyAccessJustificationPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for encrypt, decrypt, and sign operations on a CryptoKey. # Optional. The default key access justification policy used when a CryptoKey is created in this folder. This is only used when a Key Access Justifications policy is not provided in the CreateCryptoKeyRequest. This overrides any default policies in its ancestry.
206
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all encrypt, decrypt, and sign operations for the CryptoKey associated with this policy will fail.
207
+
"A String",
208
+
],
209
+
},
210
+
"name": "A String", # Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of "{organizations|folders|projects}/*/kajPolicyConfig".
<pre>Gets the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.
95
+
96
+
Args:
97
+
name: string, Required. The name of the KeyAccessJustificationsPolicyConfig to get. (required)
98
+
x__xgafv: string, V1 error format.
99
+
Allowed values
100
+
1 - v1 error format
101
+
2 - v2 error format
102
+
103
+
Returns:
104
+
An object of the form:
105
+
106
+
{ # A singleton configuration for Key Access Justifications policies.
107
+
"defaultKeyAccessJustificationPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for encrypt, decrypt, and sign operations on a CryptoKey. # Optional. The default key access justification policy used when a CryptoKey is created in this folder. This is only used when a Key Access Justifications policy is not provided in the CreateCryptoKeyRequest. This overrides any default policies in its ancestry.
108
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all encrypt, decrypt, and sign operations for the CryptoKey associated with this policy will fail.
109
+
"A String",
110
+
],
111
+
},
112
+
"name": "A String", # Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of "{organizations|folders|projects}/*/kajPolicyConfig".
<pre>Updates the KeyAccessJustificationsPolicyConfig for a given organization/folder/projects.
119
+
120
+
Args:
121
+
name: string, Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of "{organizations|folders|projects}/*/kajPolicyConfig". (required)
122
+
body: object, The request body.
123
+
The object takes the form of:
124
+
125
+
{ # A singleton configuration for Key Access Justifications policies.
126
+
"defaultKeyAccessJustificationPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for encrypt, decrypt, and sign operations on a CryptoKey. # Optional. The default key access justification policy used when a CryptoKey is created in this folder. This is only used when a Key Access Justifications policy is not provided in the CreateCryptoKeyRequest. This overrides any default policies in its ancestry.
127
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all encrypt, decrypt, and sign operations for the CryptoKey associated with this policy will fail.
128
+
"A String",
129
+
],
130
+
},
131
+
"name": "A String", # Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of "{organizations|folders|projects}/*/kajPolicyConfig".
132
+
}
133
+
134
+
updateMask: string, Optional. The list of fields to update.
135
+
x__xgafv: string, V1 error format.
136
+
Allowed values
137
+
1 - v1 error format
138
+
2 - v2 error format
139
+
140
+
Returns:
141
+
An object of the form:
142
+
143
+
{ # A singleton configuration for Key Access Justifications policies.
144
+
"defaultKeyAccessJustificationPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for encrypt, decrypt, and sign operations on a CryptoKey. # Optional. The default key access justification policy used when a CryptoKey is created in this folder. This is only used when a Key Access Justifications policy is not provided in the CreateCryptoKeyRequest. This overrides any default policies in its ancestry.
145
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all encrypt, decrypt, and sign operations for the CryptoKey associated with this policy will fail.
146
+
"A String",
147
+
],
148
+
},
149
+
"name": "A String", # Identifier. The resource name for this KeyAccessJustificationsPolicyConfig in the format of "{organizations|folders|projects}/*/kajPolicyConfig".
0 commit comments