@@ -1492,7 +1492,15 @@ def update_user_setting_vacation(user_id, vacation_settings_object = nil, fields
14921492 # Creates and configures a client-side encryption identity that's authorized to
14931493 # send mail from the user account. Google publishes the S/MIME certificate to a
14941494 # shared domain-wide directory so that people within a Google Workspace
1495- # organization can encrypt and send mail to the identity.
1495+ # organization can encrypt and send mail to the identity. For administrators
1496+ # managing identities and keypairs for users in their organization, requests
1497+ # require authorization with a [service account](https://developers.google.com/
1498+ # identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1499+ # authority](https://developers.google.com/identity/protocols/
1500+ # OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1501+ # //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1502+ # their own identities and keypairs, requests require [hardware key encryption](
1503+ # https://support.google.com/a/answer/14153163) turned on and configured.
14961504 # @param [String] user_id
14971505 # The requester's primary email address. To indicate the authenticated user, you
14981506 # can use the special value `me`.
@@ -1529,7 +1537,15 @@ def create_user_setting_cse_identity(user_id, cse_identity_object = nil, fields:
15291537 # Deletes a client-side encryption identity. The authenticated user can no
15301538 # longer use the identity to send encrypted messages. You cannot restore the
15311539 # identity after you delete it. Instead, use the CreateCseIdentity method to
1532- # create another identity with the same configuration.
1540+ # create another identity with the same configuration. For administrators
1541+ # managing identities and keypairs for users in their organization, requests
1542+ # require authorization with a [service account](https://developers.google.com/
1543+ # identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1544+ # authority](https://developers.google.com/identity/protocols/
1545+ # OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1546+ # //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1547+ # their own identities and keypairs, requests require [hardware key encryption](
1548+ # https://support.google.com/a/answer/14153163) turned on and configured.
15331549 # @param [String] user_id
15341550 # The requester's primary email address. To indicate the authenticated user, you
15351551 # can use the special value `me`.
@@ -1562,7 +1578,15 @@ def delete_user_setting_cse_identity(user_id, cse_email_address, fields: nil, qu
15621578 execute_or_queue_command ( command , &block )
15631579 end
15641580
1565- # Retrieves a client-side encryption identity configuration.
1581+ # Retrieves a client-side encryption identity configuration. For administrators
1582+ # managing identities and keypairs for users in their organization, requests
1583+ # require authorization with a [service account](https://developers.google.com/
1584+ # identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1585+ # authority](https://developers.google.com/identity/protocols/
1586+ # OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1587+ # //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1588+ # their own identities and keypairs, requests require [hardware key encryption](
1589+ # https://support.google.com/a/answer/14153163) turned on and configured.
15661590 # @param [String] user_id
15671591 # The requester's primary email address. To indicate the authenticated user, you
15681592 # can use the special value `me`.
@@ -1597,7 +1621,16 @@ def get_user_setting_cse_identity(user_id, cse_email_address, fields: nil, quota
15971621 execute_or_queue_command ( command , &block )
15981622 end
15991623
1600- # Lists the client-side encrypted identities for an authenticated user.
1624+ # Lists the client-side encrypted identities for an authenticated user. For
1625+ # administrators managing identities and keypairs for users in their
1626+ # organization, requests require authorization with a [service account](https://
1627+ # developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
1628+ # domain-wide delegation authority](https://developers.google.com/identity/
1629+ # protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
1630+ # the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
1631+ # managing their own identities and keypairs, requests require [hardware key
1632+ # encryption](https://support.google.com/a/answer/14153163) turned on and
1633+ # configured.
16011634 # @param [String] user_id
16021635 # The requester's primary email address. To indicate the authenticated user, you
16031636 # can use the special value `me`.
@@ -1638,7 +1671,16 @@ def list_user_setting_cse_identities(user_id, page_size: nil, page_token: nil, f
16381671
16391672 # Associates a different key pair with an existing client-side encryption
16401673 # identity. The updated key pair must validate against Google's [S/MIME
1641- # certificate profiles](https://support.google.com/a/answer/7300887).
1674+ # certificate profiles](https://support.google.com/a/answer/7300887). For
1675+ # administrators managing identities and keypairs for users in their
1676+ # organization, requests require authorization with a [service account](https://
1677+ # developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
1678+ # domain-wide delegation authority](https://developers.google.com/identity/
1679+ # protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
1680+ # the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
1681+ # managing their own identities and keypairs, requests require [hardware key
1682+ # encryption](https://support.google.com/a/answer/14153163) turned on and
1683+ # configured.
16421684 # @param [String] user_id
16431685 # The requester's primary email address. To indicate the authenticated user, you
16441686 # can use the special value `me`.
@@ -1676,7 +1718,15 @@ def patch_user_setting_cse_identity(user_id, email_address, cse_identity_object
16761718 end
16771719
16781720 # Creates and uploads a client-side encryption S/MIME public key certificate
1679- # chain and private key metadata for the authenticated user.
1721+ # chain and private key metadata for the authenticated user. For administrators
1722+ # managing identities and keypairs for users in their organization, requests
1723+ # require authorization with a [service account](https://developers.google.com/
1724+ # identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1725+ # authority](https://developers.google.com/identity/protocols/
1726+ # OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1727+ # //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1728+ # their own identities and keypairs, requests require [hardware key encryption](
1729+ # https://support.google.com/a/answer/14153163) turned on and configured.
16801730 # @param [String] user_id
16811731 # The requester's primary email address. To indicate the authenticated user, you
16821732 # can use the special value `me`.
@@ -1714,7 +1764,15 @@ def create_user_setting_cse_keypair(user_id, cse_key_pair_object = nil, fields:
17141764 # longer use the key pair to decrypt incoming CSE message texts or sign outgoing
17151765 # CSE mail. To regain access, use the EnableCseKeyPair to turn on the key pair.
17161766 # After 30 days, you can permanently delete the key pair by using the
1717- # ObliterateCseKeyPair method.
1767+ # ObliterateCseKeyPair method. For administrators managing identities and
1768+ # keypairs for users in their organization, requests require authorization with
1769+ # a [service account](https://developers.google.com/identity/protocols/
1770+ # OAuth2ServiceAccount) that has [domain-wide delegation authority](https://
1771+ # developers.google.com/identity/protocols/OAuth2ServiceAccount#
1772+ # delegatingauthority) to impersonate users with the `https://www.googleapis.com/
1773+ # auth/gmail.settings.basic` scope. For users managing their own identities and
1774+ # keypairs, requests require [hardware key encryption](https://support.google.
1775+ # com/a/answer/14153163) turned on and configured.
17181776 # @param [String] user_id
17191777 # The requester's primary email address. To indicate the authenticated user, you
17201778 # can use the special value `me`.
@@ -1752,7 +1810,16 @@ def disable_keypair_cse_key_pair(user_id, key_pair_id, disable_cse_key_pair_requ
17521810 end
17531811
17541812 # Turns on a client-side encryption key pair that was turned off. The key pair
1755- # becomes active again for any associated client-side encryption identities.
1813+ # becomes active again for any associated client-side encryption identities. For
1814+ # administrators managing identities and keypairs for users in their
1815+ # organization, requests require authorization with a [service account](https://
1816+ # developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
1817+ # domain-wide delegation authority](https://developers.google.com/identity/
1818+ # protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
1819+ # the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
1820+ # managing their own identities and keypairs, requests require [hardware key
1821+ # encryption](https://support.google.com/a/answer/14153163) turned on and
1822+ # configured.
17561823 # @param [String] user_id
17571824 # The requester's primary email address. To indicate the authenticated user, you
17581825 # can use the special value `me`.
@@ -1789,7 +1856,15 @@ def enable_keypair_cse_key_pair(user_id, key_pair_id, enable_cse_key_pair_reques
17891856 execute_or_queue_command ( command , &block )
17901857 end
17911858
1792- # Retrieves an existing client-side encryption key pair.
1859+ # Retrieves an existing client-side encryption key pair. For administrators
1860+ # managing identities and keypairs for users in their organization, requests
1861+ # require authorization with a [service account](https://developers.google.com/
1862+ # identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1863+ # authority](https://developers.google.com/identity/protocols/
1864+ # OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1865+ # //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1866+ # their own identities and keypairs, requests require [hardware key encryption](
1867+ # https://support.google.com/a/answer/14153163) turned on and configured.
17931868 # @param [String] user_id
17941869 # The requester's primary email address. To indicate the authenticated user, you
17951870 # can use the special value `me`.
@@ -1823,7 +1898,16 @@ def get_user_setting_cse_keypair(user_id, key_pair_id, fields: nil, quota_user:
18231898 execute_or_queue_command ( command , &block )
18241899 end
18251900
1826- # Lists client-side encryption key pairs for an authenticated user.
1901+ # Lists client-side encryption key pairs for an authenticated user. For
1902+ # administrators managing identities and keypairs for users in their
1903+ # organization, requests require authorization with a [service account](https://
1904+ # developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
1905+ # domain-wide delegation authority](https://developers.google.com/identity/
1906+ # protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
1907+ # the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
1908+ # managing their own identities and keypairs, requests require [hardware key
1909+ # encryption](https://support.google.com/a/answer/14153163) turned on and
1910+ # configured.
18271911 # @param [String] user_id
18281912 # The requester's primary email address. To indicate the authenticated user, you
18291913 # can use the special value `me`.
@@ -1867,7 +1951,15 @@ def list_user_setting_cse_keypairs(user_id, page_size: nil, page_token: nil, fie
18671951 # days. To turn off a key pair, use the DisableCseKeyPair method. Gmail can't
18681952 # restore or decrypt any messages that were encrypted by an obliterated key.
18691953 # Authenticated users and Google Workspace administrators lose access to reading
1870- # the encrypted messages.
1954+ # the encrypted messages. For administrators managing identities and keypairs
1955+ # for users in their organization, requests require authorization with a [
1956+ # service account](https://developers.google.com/identity/protocols/
1957+ # OAuth2ServiceAccount) that has [domain-wide delegation authority](https://
1958+ # developers.google.com/identity/protocols/OAuth2ServiceAccount#
1959+ # delegatingauthority) to impersonate users with the `https://www.googleapis.com/
1960+ # auth/gmail.settings.basic` scope. For users managing their own identities and
1961+ # keypairs, requests require [hardware key encryption](https://support.google.
1962+ # com/a/answer/14153163) turned on and configured.
18711963 # @param [String] user_id
18721964 # The requester's primary email address. To indicate the authenticated user, you
18731965 # can use the special value `me`.
0 commit comments