@@ -5010,49 +5010,17 @@ export interface StartCallAnalyticsJobRequest {
50105010 OutputLocation ?: string | undefined ;
50115011
50125012 /**
5013- * <p>The KMS key you want to use to encrypt your Call Analytics
5014- * output.</p>
5015- * <p>If using a key located in the <b>current</b>
5016- * Amazon Web Services account, you can specify your KMS key in one of four
5017- * ways:</p>
5018- * <ol>
5019- * <li>
5020- * <p>Use the KMS key ID itself. For example,
5021- * <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5022- * </li>
5023- * <li>
5024- * <p>Use an alias for the KMS key ID. For example,
5025- * <code>alias/ExampleAlias</code>.</p>
5026- * </li>
5027- * <li>
5028- * <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5029- * example,
5030- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5031- * </li>
5032- * <li>
5033- * <p>Use the ARN for the KMS key alias. For example,
5034- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5035- * </li>
5036- * </ol>
5037- * <p>If using a key located in a <b>different</b>
5038- * Amazon Web Services account than the current Amazon Web Services account, you can specify
5039- * your KMS key in one of two ways:</p>
5040- * <ol>
5041- * <li>
5042- * <p>Use the ARN for the KMS key ID. For example,
5043- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5044- * </li>
5045- * <li>
5046- * <p>Use the ARN for the KMS key alias. For example,
5047- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5048- * </li>
5049- * </ol>
5013+ * <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5014+ * encrypt your Call Analytics output.</p>
5015+ * <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5016+ * <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5017+ * For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5018+ * KMS key ARNs</a>.</p>
50505019 * <p>If you do not specify an encryption key, your output is encrypted with the default
5051- * Amazon S3 key (SSE-S3).</p>
5052- * <p>If you specify a KMS key to encrypt your output, you must also specify
5053- * an output location using the <code>OutputLocation</code> parameter.</p>
5054- * <p>Note that the role making the request must
5055- * have permission to use the specified KMS key.</p>
5020+ * Amazon S3 key (SSE-S3).</p>
5021+ * <p>Note that the role making the request and the role specified in
5022+ * the <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the
5023+ * specified KMS key.</p>
50565024 * @public
50575025 */
50585026 OutputEncryptionKMSKeyId ?: string | undefined ;
@@ -5143,47 +5111,17 @@ export interface StartMedicalScribeJobRequest {
51435111 OutputBucketName : string | undefined ;
51445112
51455113 /**
5146- * <p>The KMS key you want to use to encrypt your Medical Scribe
5147- * output.</p>
5148- * <p>If using a key located in the <b>current</b>
5149- * Amazon Web Services account, you can specify your KMS key in one of four
5150- * ways:</p>
5151- * <ol>
5152- * <li>
5153- * <p>Use the KMS key ID itself. For example,
5154- * <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5155- * </li>
5156- * <li>
5157- * <p>Use an alias for the KMS key ID. For example,
5158- * <code>alias/ExampleAlias</code>.</p>
5159- * </li>
5160- * <li>
5161- * <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5162- * example,
5163- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5164- * </li>
5165- * <li>
5166- * <p>Use the ARN for the KMS key alias. For example,
5167- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5168- * </li>
5169- * </ol>
5170- * <p>If using a key located in a <b>different</b>
5171- * Amazon Web Services account than the current Amazon Web Services account, you can specify
5172- * your KMS key in one of two ways:</p>
5173- * <ol>
5174- * <li>
5175- * <p>Use the ARN for the KMS key ID. For example,
5176- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5177- * </li>
5178- * <li>
5179- * <p>Use the ARN for the KMS key alias. For example,
5180- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5181- * </li>
5182- * </ol>
5114+ * <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5115+ * encrypt your Medical Scribe output.</p>
5116+ * <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5117+ * <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5118+ * For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5119+ * KMS key ARNs</a>.</p>
51835120 * <p>If you do not specify an encryption key, your output is encrypted with the default
51845121 * Amazon S3 key (SSE-S3).</p>
5185- * <p>Note that the role specified in the <code>DataAccessRoleArn</code> request parameter
5186- * must have permission to use the specified KMS key.</p>
5122+ * <p>Note that the role making the request and the role specified in
5123+ * the <code>DataAccessRoleArn</code> request parameter (if present)
5124+ * must have permission to use the specified KMS key.</p>
51875125 * @public
51885126 */
51895127 OutputEncryptionKMSKeyId ?: string | undefined ;
@@ -5373,49 +5311,17 @@ export interface StartMedicalTranscriptionJobRequest {
53735311 OutputKey ?: string | undefined ;
53745312
53755313 /**
5376- * <p>The KMS key you want to use to encrypt your medical transcription
5377- * output.</p>
5378- * <p>If using a key located in the <b>current</b>
5379- * Amazon Web Services account, you can specify your KMS key in one of four
5380- * ways:</p>
5381- * <ol>
5382- * <li>
5383- * <p>Use the KMS key ID itself. For example,
5384- * <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5385- * </li>
5386- * <li>
5387- * <p>Use an alias for the KMS key ID. For example,
5388- * <code>alias/ExampleAlias</code>.</p>
5389- * </li>
5390- * <li>
5391- * <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5392- * example,
5393- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5394- * </li>
5395- * <li>
5396- * <p>Use the ARN for the KMS key alias. For example,
5397- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5398- * </li>
5399- * </ol>
5400- * <p>If using a key located in a <b>different</b>
5401- * Amazon Web Services account than the current Amazon Web Services account, you can specify
5402- * your KMS key in one of two ways:</p>
5403- * <ol>
5404- * <li>
5405- * <p>Use the ARN for the KMS key ID. For example,
5406- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5407- * </li>
5408- * <li>
5409- * <p>Use the ARN for the KMS key alias. For example,
5410- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5411- * </li>
5412- * </ol>
5314+ * <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5315+ * encrypt your medical transcription output.</p>
5316+ * <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5317+ * <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5318+ * For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5319+ * KMS key ARNs</a>.</p>
54135320 * <p>If you do not specify an encryption key, your output is encrypted with the default
5414- * Amazon S3 key (SSE-S3).</p>
5415- * <p>If you specify a KMS key to encrypt your output, you must also specify
5416- * an output location using the <code>OutputLocation</code> parameter.</p>
5417- * <p>Note that the role making the request must
5418- * have permission to use the specified KMS key.</p>
5321+ * Amazon S3 key (SSE-S3).</p>
5322+ * <p>Note that the role making the request and the role specified
5323+ * in the <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the
5324+ * specified KMS key.</p>
54195325 * @public
54205326 */
54215327 OutputEncryptionKMSKeyId ?: string | undefined ;
@@ -5628,49 +5534,17 @@ export interface StartTranscriptionJobRequest {
56285534 OutputKey ?: string | undefined ;
56295535
56305536 /**
5631- * <p>The KMS key you want to use to encrypt your transcription
5632- * output.</p>
5633- * <p>If using a key located in the <b>current</b>
5634- * Amazon Web Services account, you can specify your KMS key in one of four
5635- * ways:</p>
5636- * <ol>
5637- * <li>
5638- * <p>Use the KMS key ID itself. For example,
5639- * <code>1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5640- * </li>
5641- * <li>
5642- * <p>Use an alias for the KMS key ID. For example,
5643- * <code>alias/ExampleAlias</code>.</p>
5644- * </li>
5645- * <li>
5646- * <p>Use the Amazon Resource Name (ARN) for the KMS key ID. For
5647- * example,
5648- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5649- * </li>
5650- * <li>
5651- * <p>Use the ARN for the KMS key alias. For example,
5652- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5653- * </li>
5654- * </ol>
5655- * <p>If using a key located in a <b>different</b>
5656- * Amazon Web Services account than the current Amazon Web Services account, you can specify
5657- * your KMS key in one of two ways:</p>
5658- * <ol>
5659- * <li>
5660- * <p>Use the ARN for the KMS key ID. For example,
5661- * <code>arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.</p>
5662- * </li>
5663- * <li>
5664- * <p>Use the ARN for the KMS key alias. For example,
5665- * <code>arn:aws:kms:region:account-ID:alias/ExampleAlias</code>.</p>
5666- * </li>
5667- * </ol>
5537+ * <p>The Amazon Resource Name (ARN) of a KMS key that you want to use to
5538+ * encrypt your transcription output.</p>
5539+ * <p>KMS key ARNs have the format <code>arn:partition:kms:region:account:key/key-id</code>. For example:
5540+ * <code>arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab</code>.
5541+ * For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html#key-id-key-ARN">
5542+ * KMS key ARNs</a>.</p>
56685543 * <p>If you do not specify an encryption key, your output is encrypted with the default
5669- * Amazon S3 key (SSE-S3).</p>
5670- * <p>If you specify a KMS key to encrypt your output, you must also specify
5671- * an output location using the <code>OutputLocation</code> parameter.</p>
5672- * <p>Note that the role making the request must
5673- * have permission to use the specified KMS key.</p>
5544+ * Amazon S3 key (SSE-S3).</p>
5545+ * <p>Note that the role making the request and the role specified in the
5546+ * <code>DataAccessRoleArn</code> request parameter (if present) must have permission to use the specified
5547+ * KMS key.</p>
56745548 * @public
56755549 */
56765550 OutputEncryptionKMSKeyId ?: string | undefined ;
0 commit comments