You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#### cloudkms:v1
The following keys were added:
- schemas.CryptoKey.properties.keyAccessJustificationsPolicy.$ref (Total Keys: 1)
- schemas.KeyAccessJustificationsPolicy (Total Keys: 4)
The following keys were changed:
- endpoints (Total Keys: 1)
Copy file name to clipboardExpand all lines: docs/dyn/cloudkms_v1.projects.locations.keyRings.cryptoKeys.html
+35Lines changed: 35 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -135,6 +135,11 @@ <h3>Method Details</h3>
135
135
"cryptoKeyBackend": "A String", # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
136
136
"destroyScheduledDuration": "A String", # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
137
137
"importOnly": True or False, # Immutable. Whether this key may contain imported versions only.
138
+
"keyAccessJustificationsPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
139
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
140
+
"A String",
141
+
],
142
+
},
138
143
"labels": { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
139
144
"a_key": "A String",
140
145
},
@@ -198,6 +203,11 @@ <h3>Method Details</h3>
198
203
"cryptoKeyBackend": "A String", # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
199
204
"destroyScheduledDuration": "A String", # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
200
205
"importOnly": True or False, # Immutable. Whether this key may contain imported versions only.
206
+
"keyAccessJustificationsPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
207
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
208
+
"A String",
209
+
],
210
+
},
201
211
"labels": { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
202
212
"a_key": "A String",
203
213
},
@@ -332,6 +342,11 @@ <h3>Method Details</h3>
332
342
"cryptoKeyBackend": "A String", # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
333
343
"destroyScheduledDuration": "A String", # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
334
344
"importOnly": True or False, # Immutable. Whether this key may contain imported versions only.
345
+
"keyAccessJustificationsPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
346
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
347
+
"A String",
348
+
],
349
+
},
335
350
"labels": { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
336
351
"a_key": "A String",
337
352
},
@@ -458,6 +473,11 @@ <h3>Method Details</h3>
458
473
"cryptoKeyBackend": "A String", # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
459
474
"destroyScheduledDuration": "A String", # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
460
475
"importOnly": True or False, # Immutable. Whether this key may contain imported versions only.
476
+
"keyAccessJustificationsPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
477
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
478
+
"A String",
479
+
],
480
+
},
461
481
"labels": { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
462
482
"a_key": "A String",
463
483
},
@@ -539,6 +559,11 @@ <h3>Method Details</h3>
539
559
"cryptoKeyBackend": "A String", # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
540
560
"destroyScheduledDuration": "A String", # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
541
561
"importOnly": True or False, # Immutable. Whether this key may contain imported versions only.
562
+
"keyAccessJustificationsPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
563
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
564
+
"A String",
565
+
],
566
+
},
542
567
"labels": { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
543
568
"a_key": "A String",
544
569
},
@@ -601,6 +626,11 @@ <h3>Method Details</h3>
601
626
"cryptoKeyBackend": "A String", # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
602
627
"destroyScheduledDuration": "A String", # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
603
628
"importOnly": True or False, # Immutable. Whether this key may contain imported versions only.
629
+
"keyAccessJustificationsPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
630
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
631
+
"A String",
632
+
],
633
+
},
604
634
"labels": { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
605
635
"a_key": "A String",
606
636
},
@@ -791,6 +821,11 @@ <h3>Method Details</h3>
791
821
"cryptoKeyBackend": "A String", # Immutable. The resource name of the backend environment where the key material for all CryptoKeyVersions associated with this CryptoKey reside and where all related cryptographic operations are performed. Only applicable if CryptoKeyVersions have a ProtectionLevel of EXTERNAL_VPC, with the resource name in the format `projects/*/locations/*/ekmConnections/*`. Note, this list is non-exhaustive and may apply to additional ProtectionLevels in the future.
792
822
"destroyScheduledDuration": "A String", # Immutable. The period of time that versions of this key spend in the DESTROY_SCHEDULED state before transitioning to DESTROYED. If not specified at creation time, the default duration is 24 hours.
793
823
"importOnly": True or False, # Immutable. Whether this key may contain imported versions only.
824
+
"keyAccessJustificationsPolicy": { # A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey. # Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
825
+
"allowedAccessReasons": [ # The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.
826
+
"A String",
827
+
],
828
+
},
794
829
"labels": { # Labels with user-defined metadata. For more information, see [Labeling Keys](https://cloud.google.com/kms/docs/labeling-keys).
"description": "Immutable. Whether this key may contain imported versions only.",
2382
2387
"type": "boolean"
2383
2388
},
2389
+
"keyAccessJustificationsPolicy": {
2390
+
"$ref": "KeyAccessJustificationsPolicy",
2391
+
"description": "Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in Encrypt, Decrypt, and Sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed."
2392
+
},
2384
2393
"labels": {
2385
2394
"additionalProperties": {
2386
2395
"type": "string"
@@ -3270,6 +3279,48 @@
3270
3279
},
3271
3280
"type": "object"
3272
3281
},
3282
+
"KeyAccessJustificationsPolicy": {
3283
+
"description": "A KeyAccessJustificationsPolicy specifies zero or more allowed AccessReason values for Encrypt, Decrypt, and Sign requests on a CryptoKey.",
3284
+
"id": "KeyAccessJustificationsPolicy",
3285
+
"properties": {
3286
+
"allowedAccessReasons": {
3287
+
"description": "The list of allowed reasons for access to a CryptoKey. Zero allowed access reasons means all Encrypt, Decrypt, and Sign requests for the CryptoKey associated with this policy will fail.",
3288
+
"items": {
3289
+
"enum": [
3290
+
"REASON_UNSPECIFIED",
3291
+
"CUSTOMER_INITIATED_SUPPORT",
3292
+
"GOOGLE_INITIATED_SERVICE",
3293
+
"THIRD_PARTY_DATA_REQUEST",
3294
+
"GOOGLE_INITIATED_REVIEW",
3295
+
"CUSTOMER_INITIATED_ACCESS",
3296
+
"GOOGLE_INITIATED_SYSTEM_OPERATION",
3297
+
"REASON_NOT_EXPECTED",
3298
+
"MODIFIED_CUSTOMER_INITIATED_ACCESS",
3299
+
"MODIFIED_GOOGLE_INITIATED_SYSTEM_OPERATION",
3300
+
"GOOGLE_RESPONSE_TO_PRODUCTION_ALERT",
3301
+
"CUSTOMER_AUTHORIZED_WORKFLOW_SERVICING"
3302
+
],
3303
+
"enumDescriptions": [
3304
+
"Unspecified access reason.",
3305
+
"Customer-initiated support.",
3306
+
"Google-initiated access for system management and troubleshooting.",
3307
+
"Google-initiated access in response to a legal request or legal process.",
3308
+
"Google-initiated access for security, fraud, abuse, or compliance purposes.",
3309
+
"Customer uses their account to perform any access to their own data which their IAM policy authorizes.",
3310
+
"Google systems access customer data to help optimize the structure of the data or quality for future uses by the customer.",
3311
+
"No reason is expected for this key request.",
3312
+
"Customer uses their account to perform any access to their own data which their IAM policy authorizes, and one of the following is true: * A Google administrator has reset the root-access account associated with the user's organization within the past 7 days. * A Google-initiated emergency access operation has interacted with a resource in the same project or folder as the currently accessed resource within the past 7 days.",
3313
+
"Google systems access customer data to help optimize the structure of the data or quality for future uses by the customer, and one of the following is true: * A Google administrator has reset the root-access account associated with the user's organization within the past 7 days. * A Google-initiated emergency access operation has interacted with a resource in the same project or folder as the currently accessed resource within the past 7 days.",
3314
+
"Google-initiated access to maintain system reliability.",
3315
+
"One of the following operations is being executed while simultaneously encountering an internal technical issue which prevented a more precise justification code from being generated: * Your account has been used to perform any access to your own data which your IAM policy authorizes. * An automated Google system operates on encrypted customer data which your IAM policy authorizes. * Customer-initiated Google support access. * Google-initiated support access to protect system reliability."
3316
+
],
3317
+
"type": "string"
3318
+
},
3319
+
"type": "array"
3320
+
}
3321
+
},
3322
+
"type": "object"
3323
+
},
3273
3324
"KeyHandle": {
3274
3325
"description": "Resource-oriented representation of a request to Cloud KMS Autokey and the resulting provisioning of a CryptoKey.",
0 commit comments