Class CustomerManagedEncryption (2.25.0)
Stay organized with collections
Save and categorize content based on your preferences.
CustomerManagedEncryption(mapping=None, *, ignore_unknown_fields=False, **kwargs)
Configuration for encrypting secret payloads using
customer-managed encryption keys (CMEK).
Attribute |
Name |
Description |
kms_key_name |
str
Required. The resource name of the Cloud KMS CryptoKey used
to encrypt secret payloads.
For secrets using the
UserManaged
replication policy type, Cloud KMS CryptoKeys must reside in
the same location as the [replica
location][Secret.UserManaged.Replica.location].
For secrets using the
Automatic
replication policy type, Cloud KMS CryptoKeys must reside in
global .
The expected format is
projects/*/locations/*/keyRings/*/cryptoKeys/* .
|
Except as otherwise noted, the content of this page is licensed under the Creative Commons Attribution 4.0 License, and code samples are licensed under the Apache 2.0 License. For details, see the Google Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-10-14 UTC.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-10-14 UTC."],[],[]]