Prevention Deidentify Template Deidentify Config Record Transformations Field Transformation Primitive Transformation Crypto Deterministic Config Crypto Key Args
Constructors
Properties
KMS wrapped key. Include to use an existing data crypto key wrapped by KMS. The wrapped key must be a 128-, 192-, or 256-bit key. Authorization requires the following IAM permissions when sending a request to perform a crypto transformation using a KMS-wrapped crypto key: dlp.kms.encrypt For more information, see Creating a wrapped key. Only one of this, transient
or unwrapped
must be specified. Note: When you use Cloud KMS for cryptographic operations, charges apply. Structure is documented below.
Transient crypto key. Use this to have a random data crypto key generated. It will be discarded after the request finishes. Only one of this, unwrapped
or kms_wrapped
must be specified. Structure is documented below.
Unwrapped crypto key. Using raw keys is prone to security risks due to accidentally leaking the key. Choose another type of key if possible. Only one of this, transient
or kms_wrapped
must be specified. Structure is documented below.