Reference documentation and code samples for the Secret Manager V1BETA2 API class Google::Cloud::SecretManager::V1beta2::CustomerManagedEncryption.
Configuration for encrypting secret payloads using customer-managed encryption keys (CMEK).
Inherits
- Object
Extended By
- Google::Protobuf::MessageExts::ClassMethods
Includes
- Google::Protobuf::MessageExts
Methods
#kms_key_name
def kms_key_name() -> ::String
-
(::String) — Required. The resource name of the Cloud KMS CryptoKey used to encrypt
secret payloads.
For secrets using the UserManaged replication policy type, Cloud KMS CryptoKeys must reside in the same location as the [replica location][Secret.UserManaged.Replica.location].
For secrets using the Automatic replication policy type, Cloud KMS CryptoKeys must reside in
global
.The expected format is
projects/*/locations/*/keyRings/*/cryptoKeys/*
.
#kms_key_name=
def kms_key_name=(value) -> ::String
-
value (::String) — Required. The resource name of the Cloud KMS CryptoKey used to encrypt
secret payloads.
For secrets using the UserManaged replication policy type, Cloud KMS CryptoKeys must reside in the same location as the [replica location][Secret.UserManaged.Replica.location].
For secrets using the Automatic replication policy type, Cloud KMS CryptoKeys must reside in
global
.The expected format is
projects/*/locations/*/keyRings/*/cryptoKeys/*
.
-
(::String) — Required. The resource name of the Cloud KMS CryptoKey used to encrypt
secret payloads.
For secrets using the UserManaged replication policy type, Cloud KMS CryptoKeys must reside in the same location as the [replica location][Secret.UserManaged.Replica.location].
For secrets using the Automatic replication policy type, Cloud KMS CryptoKeys must reside in
global
.The expected format is
projects/*/locations/*/keyRings/*/cryptoKeys/*
.