Prevention Deidentify Template Deidentify Config Record Transformations Field Transformation Primitive Transformation Crypto Hash Config Crypto Key
Constructors
Properties
KMS wrapped key. Include to use an existing data crypto key wrapped by KMS. The wrapped key must be a 128-, 192-, or 256-bit key. Authorization requires the following IAM permissions when sending a request to perform a crypto transformation using a KMS-wrapped crypto key: dlp.kms.encrypt For more information, see Creating a wrapped key. Only one of this, transient or unwrapped must be specified. Note: When you use Cloud KMS for cryptographic operations, charges apply. Structure is documented below.
Transient crypto key. Use this to have a random data crypto key generated. It will be discarded after the request finishes. Only one of this, unwrapped or kms_wrapped must be specified. Structure is documented below.
Unwrapped crypto key. Using raw keys is prone to security risks due to accidentally leaking the key. Choose another type of key if possible. Only one of this, transient or kms_wrapped must be specified. Structure is documented below.