@@ -56,12 +56,21 @@ namespace Model
56
56
* principal might not be immediately visible to KMS. For more information, see <a
57
57
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/troubleshoot_general.html#troubleshoot_general_eventual-consistency">Changes
58
58
* that I make are not always immediately visible</a> in the <i>Amazon Web Services
59
- * Identity and Access Management User Guide</i>.</p> </li> </ul> <p>If you do not
60
- * provide a key policy, KMS attaches a default key policy to the KMS key. For more
61
- * information, see <a
62
- * href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policies.html#key-policy-default">Default
63
- * key policy</a> in the <i>Key Management Service Developer Guide</i>. </p> <p>The
64
- * key policy size quota is 32 kilobytes (32768 bytes).</p> <p>For help writing and
59
+ * Identity and Access Management User Guide</i>.</p> </li> </ul> <p>If
60
+ * either of the required <code>Resource</code> or <code>Action</code> elements are
61
+ * missing from a key policy statement, the policy statement has no effect. When a
62
+ * key policy statement is missing one of these elements, the KMS console correctly
63
+ * reports an error, but the <code>CreateKey</code> and <code>PutKeyPolicy</code>
64
+ * API requests succeed, even though the policy statement is ineffective.</p>
65
+ * <p>For more information on required key policy elements, see <a
66
+ * href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-overview.html#key-policy-elements">Elements
67
+ * in a key policy</a> in the <i>Key Management Service Developer Guide</i>.</p>
68
+ * <p>If you do not provide a key policy, KMS attaches a default key policy
69
+ * to the KMS key. For more information, see <a
70
+ * href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-default.html">Default
71
+ * key policy</a> in the <i>Key Management Service Developer Guide</i>. </p>
72
+ * <p>If the key policy exceeds the length constraint, KMS returns a
73
+ * <code>LimitExceededException</code>.</p> <p>For help writing and
65
74
* formatting a JSON policy document, see the <a
66
75
* href="https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies.html">IAM
67
76
* JSON Policy Reference</a> in the <i> <i>Identity and Access Management User
@@ -95,7 +104,7 @@ namespace Model
95
104
// /@{
96
105
/* *
97
106
* <p>Determines the <a
98
- * href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts .html#cryptographic-operations">cryptographic
107
+ * href="https://docs.aws.amazon.com/kms/latest/developerguide/kms-cryptography .html#cryptographic-operations">cryptographic
99
108
* operations</a> for which you can use the KMS key. The default value is
100
109
* <code>ENCRYPT_DECRYPT</code>. This parameter is optional when you are creating a
101
110
* symmetric encryption KMS key; otherwise, it is required. You can't change the
@@ -123,28 +132,29 @@ namespace Model
123
132
* <p>Specifies the type of KMS key to create. The default value,
124
133
* <code>SYMMETRIC_DEFAULT</code>, creates a KMS key with a 256-bit AES-GCM key
125
134
* that is used for encryption and decryption, except in China Regions, where it
126
- * creates a 128-bit symmetric key that uses SM4 encryption. For help choosing a
127
- * key spec for your KMS key, see <a
128
- * href="https://docs.aws.amazon.com/kms/latest/developerguide/key-types.html# symm-asymm-choose">Choosing
129
- * a KMS key type </a> in the <i> <i>Key Management Service Developer Guide</i>
135
+ * creates a 128-bit symmetric key that uses SM4 encryption. For a detailed
136
+ * description of all supported key specs , see <a
137
+ * href="https://docs.aws.amazon.com/kms/latest/developerguide/symm-asymm-choose-key-spec.html">Key
138
+ * spec reference </a> in the <i> <i>Key Management Service Developer Guide</i>
130
139
* </i>.</p> <p>The <code>KeySpec</code> determines whether the KMS key contains a
131
140
* symmetric key or an asymmetric key pair. It also determines the algorithms that
132
141
* the KMS key supports. You can't change the <code>KeySpec</code> after the KMS
133
142
* key is created. To further restrict the algorithms that can be used with the KMS
134
143
* key, use a condition key in its key policy or IAM policy. For more information,
135
144
* see <a
136
- * href="https://docs.aws.amazon.com/kms/latest/developerguide/policy- conditions.html#conditions-kms-encryption-algorithm">kms:EncryptionAlgorithm</a>,
145
+ * href="https://docs.aws.amazon.com/kms/latest/developerguide/conditions-kms .html#conditions-kms-encryption-algorithm">kms:EncryptionAlgorithm</a>,
137
146
* <a
138
- * href="https://docs.aws.amazon.com/kms/latest/developerguide/policy-conditions.html#conditions-kms-mac-algorithm">kms:MacAlgorithm</a>
147
+ * href="https://docs.aws.amazon.com/kms/latest/developerguide/conditions-kms.html#conditions-kms-mac-algorithm">kms:MacAlgorithm</a>,
148
+ * <a
149
+ * href="https://docs.aws.amazon.com/kms/latest/developerguide/conditions-kms.html#conditions-kms-key-agreement-algorithm">kms:KeyAgreementAlgorithm</a>,
139
150
* or <a
140
- * href="https://docs.aws.amazon.com/kms/latest/developerguide/policy-conditions.html#conditions-kms-signing-algorithm">kms:Signing
141
- * Algorithm</a> in the <i> <i>Key Management Service Developer Guide</i> </i>.</p>
142
- * <p> <a
143
- * href="http://aws.amazon.com/kms/features/#AWS_Service_Integration">Amazon Web
144
- * Services services that are integrated with KMS</a> use symmetric encryption KMS
145
- * keys to protect your data. These services do not support asymmetric KMS keys or
146
- * HMAC KMS keys.</p> <p>KMS supports the following key specs for KMS
147
- * keys:</p> <ul> <li> <p>Symmetric encryption key (default)</p> <ul> <li> <p>
151
+ * href="https://docs.aws.amazon.com/kms/latest/developerguide/conditions-kms.html#conditions-kms-signing-algorithm">kms:SigningAlgorithm</a>
152
+ * in the <i> <i>Key Management Service Developer Guide</i> </i>.</p>
153
+ * <p> <a href="http://aws.amazon.com/kms/features/#AWS_Service_Integration">Amazon
154
+ * Web Services services that are integrated with KMS</a> use symmetric encryption
155
+ * KMS keys to protect your data. These services do not support asymmetric KMS keys
156
+ * or HMAC KMS keys.</p> <p>KMS supports the following key specs for
157
+ * KMS keys:</p> <ul> <li> <p>Symmetric encryption key (default)</p> <ul> <li> <p>
148
158
* <code>SYMMETRIC_DEFAULT</code> </p> </li> </ul> </li> <li> <p>HMAC keys
149
159
* (symmetric)</p> <ul> <li> <p> <code>HMAC_224</code> </p> </li> <li> <p>
150
160
* <code>HMAC_256</code> </p> </li> <li> <p> <code>HMAC_384</code> </p> </li> <li>
@@ -203,7 +213,7 @@ namespace Model
203
213
// /@{
204
214
/* *
205
215
* <p>Creates the KMS key in the specified <a
206
- * href="https://docs.aws.amazon.com/kms/latest/developerguide/custom- key-store-overview.html">custom
216
+ * href="https://docs.aws.amazon.com/kms/latest/developerguide/key-store-overview.html">custom
207
217
* key store</a>. The <code>ConnectionState</code> of the custom key store must be
208
218
* <code>CONNECTED</code>. To find the CustomKeyStoreID and ConnectionState use the
209
219
* <a>DescribeCustomKeyStores</a> operation.</p> <p>This parameter is valid only
@@ -263,8 +273,8 @@ namespace Model
263
273
* to an Amazon Web Services resource, Amazon Web Services generates a cost
264
274
* allocation report with usage and costs aggregated by tags. Tags can also be used
265
275
* to control access to a KMS key. For details, see <a
266
- * href="https://docs.aws.amazon.com/kms/latest/developerguide/tagging-keys.html">Tagging
267
- * Keys </a>.</p>
276
+ * href="https://docs.aws.amazon.com/kms/latest/developerguide/tagging-keys.html">Tags
277
+ * in KMS </a>.</p>
268
278
*/
269
279
inline const Aws::Vector<Tag>& GetTags () const { return m_tags; }
270
280
inline bool TagsHasBeenSet () const { return m_tagsHasBeenSet; }
@@ -322,7 +332,7 @@ namespace Model
322
332
* <code>CustomKeyStoreId</code> parameter. This key must be enabled and configured
323
333
* to perform encryption and decryption. Each KMS key in an external key store must
324
334
* use a different external key. For details, see <a
325
- * href="https://docs.aws.amazon.com/create-xks-keys.html#xks-key-requirements">Requirements
335
+ * href="https://docs.aws.amazon.com/kms/latest/developerguide/ create-xks-keys.html#xks-key-requirements">Requirements
326
336
* for a KMS key in an external key store</a> in the <i>Key Management Service
327
337
* Developer Guide</i>.</p> <p>Each KMS key in an external key store is associated
328
338
* two backing keys. One is key material that KMS generates. The other is the
0 commit comments