@@ -4964,49 +4964,17 @@ export interface StartCallAnalyticsJobRequest {
4964
4964
OutputLocation ?: string | undefined ;
4965
4965
4966
4966
/**
4967
- * <p>The KMS key you want to use to encrypt your Call Analytics
4968
- * output.</p>
4969
- * <p>If using a key located in the <b>current</b>
4970
- * Amazon Web Services account, you can specify your KMS key in one of four
4971
- * ways:</p>
4972
- * <ol>
4973
- * <li>
4974
- * <p>Use the KMS key ID itself. For example,
4975
- * <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4976
- * </li>
4977
- * <li>
4978
- * <p>Use an alias for the KMS key ID. For example,
4979
- * <code>alias/ExampleAlias</code>.</p>
4980
- * </li>
4981
- * <li>
4982
- * <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
4983
- * example,
4984
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4985
- * </li>
4986
- * <li>
4987
- * <p>Use the ARN for the KMS key alias. For example,
4988
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
4989
- * </li>
4990
- * </ol>
4991
- * <p>If using a key located in a <b>different</b>
4992
- * Amazon Web Services account than the current Amazon Web Services account, you can specify
4993
- * your KMS key in one of two ways:</p>
4994
- * <ol>
4995
- * <li>
4996
- * <p>Use the ARN for the KMS key ID. For example,
4997
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
4998
- * </li>
4999
- * <li>
5000
- * <p>Use the ARN for the KMS key alias. For example,
5001
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5002
- * </li>
5003
- * </ol>
4967
+ * <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
4968
+ * encrypt your Call Analytics output.</p>
4969
+ * <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
4970
+ * <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
4971
+ * For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
4972
+ * KMS key ARNs</a>.</p>
5004
4973
* <p>If you do not specify an encryption key, your output is encrypted with the default
5005
- * Amazon S3 key (SSE-S3).</p>
5006
- * <p>If you specify a KMS key to encrypt your output, you must also specify
5007
- * an output location using the <code>OutputLocation</code> parameter.</p>
5008
- * <p>Note that the role making the request must
5009
- * have permission to use the specified KMS key.</p>
4974
+ * Amazon S3 key (SSE-S3).</p>
4975
+ * <p>Note that the role making the request and the role specified in
4976
+ * the <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the
4977
+ * specified KMS key.</p>
5010
4978
* @public
5011
4979
*/
5012
4980
OutputEncryptionKMSKeyId ?: string | undefined ;
@@ -5097,47 +5065,17 @@ export interface StartMedicalScribeJobRequest {
5097
5065
OutputBucketName : string | undefined ;
5098
5066
5099
5067
/**
5100
- * <p>The KMS key you want to use to encrypt your Medical Scribe
5101
- * output.</p>
5102
- * <p>If using a key located in the <b>current</b>
5103
- * Amazon Web Services account, you can specify your KMS key in one of four
5104
- * ways:</p>
5105
- * <ol>
5106
- * <li>
5107
- * <p>Use the KMS key ID itself. For example,
5108
- * <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5109
- * </li>
5110
- * <li>
5111
- * <p>Use an alias for the KMS key ID. For example,
5112
- * <code>alias/ExampleAlias</code>.</p>
5113
- * </li>
5114
- * <li>
5115
- * <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5116
- * example,
5117
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5118
- * </li>
5119
- * <li>
5120
- * <p>Use the ARN for the KMS key alias. For example,
5121
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5122
- * </li>
5123
- * </ol>
5124
- * <p>If using a key located in a <b>different</b>
5125
- * Amazon Web Services account than the current Amazon Web Services account, you can specify
5126
- * your KMS key in one of two ways:</p>
5127
- * <ol>
5128
- * <li>
5129
- * <p>Use the ARN for the KMS key ID. For example,
5130
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5131
- * </li>
5132
- * <li>
5133
- * <p>Use the ARN for the KMS key alias. For example,
5134
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5135
- * </li>
5136
- * </ol>
5068
+ * <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5069
+ * encrypt your Medical Scribe output.</p>
5070
+ * <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5071
+ * <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5072
+ * For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5073
+ * KMS key ARNs</a>.</p>
5137
5074
* <p>If you do not specify an encryption key, your output is encrypted with the default
5138
5075
* Amazon S3 key (SSE-S3).</p>
5139
- * <p>Note that the role specified in the <code>DataAccessRoleArn</code> request parameter
5140
- * must have permission to use the specified KMS key.</p>
5076
+ * <p>Note that the role making the request and the role specified in
5077
+ * the <code>DataAccessRoleArn</code> request parameter (if present)
5078
+ * must have permission to use the specified KMS key.</p>
5141
5079
* @public
5142
5080
*/
5143
5081
OutputEncryptionKMSKeyId ?: string | undefined ;
@@ -5320,49 +5258,17 @@ export interface StartMedicalTranscriptionJobRequest {
5320
5258
OutputKey ?: string | undefined ;
5321
5259
5322
5260
/**
5323
- * <p>The KMS key you want to use to encrypt your medical transcription
5324
- * output.</p>
5325
- * <p>If using a key located in the <b>current</b>
5326
- * Amazon Web Services account, you can specify your KMS key in one of four
5327
- * ways:</p>
5328
- * <ol>
5329
- * <li>
5330
- * <p>Use the KMS key ID itself. For example,
5331
- * <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5332
- * </li>
5333
- * <li>
5334
- * <p>Use an alias for the KMS key ID. For example,
5335
- * <code>alias/ExampleAlias</code>.</p>
5336
- * </li>
5337
- * <li>
5338
- * <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5339
- * example,
5340
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5341
- * </li>
5342
- * <li>
5343
- * <p>Use the ARN for the KMS key alias. For example,
5344
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5345
- * </li>
5346
- * </ol>
5347
- * <p>If using a key located in a <b>different</b>
5348
- * Amazon Web Services account than the current Amazon Web Services account, you can specify
5349
- * your KMS key in one of two ways:</p>
5350
- * <ol>
5351
- * <li>
5352
- * <p>Use the ARN for the KMS key ID. For example,
5353
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5354
- * </li>
5355
- * <li>
5356
- * <p>Use the ARN for the KMS key alias. For example,
5357
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5358
- * </li>
5359
- * </ol>
5261
+ * <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5262
+ * encrypt your medical transcription output.</p>
5263
+ * <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5264
+ * <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5265
+ * For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5266
+ * KMS key ARNs</a>.</p>
5360
5267
* <p>If you do not specify an encryption key, your output is encrypted with the default
5361
- * Amazon S3 key (SSE-S3).</p>
5362
- * <p>If you specify a KMS key to encrypt your output, you must also specify
5363
- * an output location using the <code>OutputLocation</code> parameter.</p>
5364
- * <p>Note that the role making the request must
5365
- * have permission to use the specified KMS key.</p>
5268
+ * Amazon S3 key (SSE-S3).</p>
5269
+ * <p>Note that the role making the request and the role specified
5270
+ * in the <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the
5271
+ * specified KMS key.</p>
5366
5272
* @public
5367
5273
*/
5368
5274
OutputEncryptionKMSKeyId ?: string | undefined ;
@@ -5575,49 +5481,17 @@ export interface StartTranscriptionJobRequest {
5575
5481
OutputKey ?: string | undefined ;
5576
5482
5577
5483
/**
5578
- * <p>The KMS key you want to use to encrypt your transcription
5579
- * output.</p>
5580
- * <p>If using a key located in the <b>current</b>
5581
- * Amazon Web Services account, you can specify your KMS key in one of four
5582
- * ways:</p>
5583
- * <ol>
5584
- * <li>
5585
- * <p>Use the KMS key ID itself. For example,
5586
- * <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5587
- * </li>
5588
- * <li>
5589
- * <p>Use an alias for the KMS key ID. For example,
5590
- * <code>alias/ExampleAlias</code>.</p>
5591
- * </li>
5592
- * <li>
5593
- * <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5594
- * example,
5595
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5596
- * </li>
5597
- * <li>
5598
- * <p>Use the ARN for the KMS key alias. For example,
5599
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5600
- * </li>
5601
- * </ol>
5602
- * <p>If using a key located in a <b>different</b>
5603
- * Amazon Web Services account than the current Amazon Web Services account, you can specify
5604
- * your KMS key in one of two ways:</p>
5605
- * <ol>
5606
- * <li>
5607
- * <p>Use the ARN for the KMS key ID. For example,
5608
- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5609
- * </li>
5610
- * <li>
5611
- * <p>Use the ARN for the KMS key alias. For example,
5612
- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5613
- * </li>
5614
- * </ol>
5484
+ * <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5485
+ * encrypt your transcription output.</p>
5486
+ * <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5487
+ * <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5488
+ * For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5489
+ * KMS key ARNs</a>.</p>
5615
5490
* <p>If you do not specify an encryption key, your output is encrypted with the default
5616
- * Amazon S3 key (SSE-S3).</p>
5617
- * <p>If you specify a KMS key to encrypt your output, you must also specify
5618
- * an output location using the <code>OutputLocation</code> parameter.</p>
5619
- * <p>Note that the role making the request must
5620
- * have permission to use the specified KMS key.</p>
5491
+ * Amazon S3 key (SSE-S3).</p>
5492
+ * <p>Note that the role making the request and the role specified in the
5493
+ * <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the specified
5494
+ * KMS key.</p>
5621
5495
* @public
5622
5496
*/
5623
5497
OutputEncryptionKMSKeyId ?: string | undefined ;
0 commit comments