@@ -1492,7 +1492,15 @@ def update_user_setting_vacation(user_id, vacation_settings_object = nil, fields
1492
1492
# Creates and configures a client-side encryption identity that's authorized to
1493
1493
# send mail from the user account. Google publishes the S/MIME certificate to a
1494
1494
# shared domain-wide directory so that people within a Google Workspace
1495
- # organization can encrypt and send mail to the identity.
1495
+ # organization can encrypt and send mail to the identity. For administrators
1496
+ # managing identities and keypairs for users in their organization, requests
1497
+ # require authorization with a [service account](https://developers.google.com/
1498
+ # identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1499
+ # authority](https://developers.google.com/identity/protocols/
1500
+ # OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1501
+ # //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1502
+ # their own identities and keypairs, requests require [hardware key encryption](
1503
+ # https://support.google.com/a/answer/14153163) turned on and configured.
1496
1504
# @param [String] user_id
1497
1505
# The requester's primary email address. To indicate the authenticated user, you
1498
1506
# can use the special value `me`.
@@ -1529,7 +1537,15 @@ def create_user_setting_cse_identity(user_id, cse_identity_object = nil, fields:
1529
1537
# Deletes a client-side encryption identity. The authenticated user can no
1530
1538
# longer use the identity to send encrypted messages. You cannot restore the
1531
1539
# identity after you delete it. Instead, use the CreateCseIdentity method to
1532
- # create another identity with the same configuration.
1540
+ # create another identity with the same configuration. For administrators
1541
+ # managing identities and keypairs for users in their organization, requests
1542
+ # require authorization with a [service account](https://developers.google.com/
1543
+ # identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1544
+ # authority](https://developers.google.com/identity/protocols/
1545
+ # OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1546
+ # //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1547
+ # their own identities and keypairs, requests require [hardware key encryption](
1548
+ # https://support.google.com/a/answer/14153163) turned on and configured.
1533
1549
# @param [String] user_id
1534
1550
# The requester's primary email address. To indicate the authenticated user, you
1535
1551
# can use the special value `me`.
@@ -1562,7 +1578,15 @@ def delete_user_setting_cse_identity(user_id, cse_email_address, fields: nil, qu
1562
1578
execute_or_queue_command ( command , &block )
1563
1579
end
1564
1580
1565
- # Retrieves a client-side encryption identity configuration.
1581
+ # Retrieves a client-side encryption identity configuration. For administrators
1582
+ # managing identities and keypairs for users in their organization, requests
1583
+ # require authorization with a [service account](https://developers.google.com/
1584
+ # identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1585
+ # authority](https://developers.google.com/identity/protocols/
1586
+ # OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1587
+ # //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1588
+ # their own identities and keypairs, requests require [hardware key encryption](
1589
+ # https://support.google.com/a/answer/14153163) turned on and configured.
1566
1590
# @param [String] user_id
1567
1591
# The requester's primary email address. To indicate the authenticated user, you
1568
1592
# can use the special value `me`.
@@ -1597,7 +1621,16 @@ def get_user_setting_cse_identity(user_id, cse_email_address, fields: nil, quota
1597
1621
execute_or_queue_command ( command , &block )
1598
1622
end
1599
1623
1600
- # Lists the client-side encrypted identities for an authenticated user.
1624
+ # Lists the client-side encrypted identities for an authenticated user. For
1625
+ # administrators managing identities and keypairs for users in their
1626
+ # organization, requests require authorization with a [service account](https://
1627
+ # developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
1628
+ # domain-wide delegation authority](https://developers.google.com/identity/
1629
+ # protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
1630
+ # the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
1631
+ # managing their own identities and keypairs, requests require [hardware key
1632
+ # encryption](https://support.google.com/a/answer/14153163) turned on and
1633
+ # configured.
1601
1634
# @param [String] user_id
1602
1635
# The requester's primary email address. To indicate the authenticated user, you
1603
1636
# can use the special value `me`.
@@ -1638,7 +1671,16 @@ def list_user_setting_cse_identities(user_id, page_size: nil, page_token: nil, f
1638
1671
1639
1672
# Associates a different key pair with an existing client-side encryption
1640
1673
# identity. The updated key pair must validate against Google's [S/MIME
1641
- # certificate profiles](https://support.google.com/a/answer/7300887).
1674
+ # certificate profiles](https://support.google.com/a/answer/7300887). For
1675
+ # administrators managing identities and keypairs for users in their
1676
+ # organization, requests require authorization with a [service account](https://
1677
+ # developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
1678
+ # domain-wide delegation authority](https://developers.google.com/identity/
1679
+ # protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
1680
+ # the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
1681
+ # managing their own identities and keypairs, requests require [hardware key
1682
+ # encryption](https://support.google.com/a/answer/14153163) turned on and
1683
+ # configured.
1642
1684
# @param [String] user_id
1643
1685
# The requester's primary email address. To indicate the authenticated user, you
1644
1686
# can use the special value `me`.
@@ -1676,7 +1718,15 @@ def patch_user_setting_cse_identity(user_id, email_address, cse_identity_object
1676
1718
end
1677
1719
1678
1720
# Creates and uploads a client-side encryption S/MIME public key certificate
1679
- # chain and private key metadata for the authenticated user.
1721
+ # chain and private key metadata for the authenticated user. For administrators
1722
+ # managing identities and keypairs for users in their organization, requests
1723
+ # require authorization with a [service account](https://developers.google.com/
1724
+ # identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1725
+ # authority](https://developers.google.com/identity/protocols/
1726
+ # OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1727
+ # //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1728
+ # their own identities and keypairs, requests require [hardware key encryption](
1729
+ # https://support.google.com/a/answer/14153163) turned on and configured.
1680
1730
# @param [String] user_id
1681
1731
# The requester's primary email address. To indicate the authenticated user, you
1682
1732
# can use the special value `me`.
@@ -1714,7 +1764,15 @@ def create_user_setting_cse_keypair(user_id, cse_key_pair_object = nil, fields:
1714
1764
# longer use the key pair to decrypt incoming CSE message texts or sign outgoing
1715
1765
# CSE mail. To regain access, use the EnableCseKeyPair to turn on the key pair.
1716
1766
# After 30 days, you can permanently delete the key pair by using the
1717
- # ObliterateCseKeyPair method.
1767
+ # ObliterateCseKeyPair method. For administrators managing identities and
1768
+ # keypairs for users in their organization, requests require authorization with
1769
+ # a [service account](https://developers.google.com/identity/protocols/
1770
+ # OAuth2ServiceAccount) that has [domain-wide delegation authority](https://
1771
+ # developers.google.com/identity/protocols/OAuth2ServiceAccount#
1772
+ # delegatingauthority) to impersonate users with the `https://www.googleapis.com/
1773
+ # auth/gmail.settings.basic` scope. For users managing their own identities and
1774
+ # keypairs, requests require [hardware key encryption](https://support.google.
1775
+ # com/a/answer/14153163) turned on and configured.
1718
1776
# @param [String] user_id
1719
1777
# The requester's primary email address. To indicate the authenticated user, you
1720
1778
# can use the special value `me`.
@@ -1752,7 +1810,16 @@ def disable_keypair_cse_key_pair(user_id, key_pair_id, disable_cse_key_pair_requ
1752
1810
end
1753
1811
1754
1812
# Turns on a client-side encryption key pair that was turned off. The key pair
1755
- # becomes active again for any associated client-side encryption identities.
1813
+ # becomes active again for any associated client-side encryption identities. For
1814
+ # administrators managing identities and keypairs for users in their
1815
+ # organization, requests require authorization with a [service account](https://
1816
+ # developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
1817
+ # domain-wide delegation authority](https://developers.google.com/identity/
1818
+ # protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
1819
+ # the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
1820
+ # managing their own identities and keypairs, requests require [hardware key
1821
+ # encryption](https://support.google.com/a/answer/14153163) turned on and
1822
+ # configured.
1756
1823
# @param [String] user_id
1757
1824
# The requester's primary email address. To indicate the authenticated user, you
1758
1825
# can use the special value `me`.
@@ -1789,7 +1856,15 @@ def enable_keypair_cse_key_pair(user_id, key_pair_id, enable_cse_key_pair_reques
1789
1856
execute_or_queue_command ( command , &block )
1790
1857
end
1791
1858
1792
- # Retrieves an existing client-side encryption key pair.
1859
+ # Retrieves an existing client-side encryption key pair. For administrators
1860
+ # managing identities and keypairs for users in their organization, requests
1861
+ # require authorization with a [service account](https://developers.google.com/
1862
+ # identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation
1863
+ # authority](https://developers.google.com/identity/protocols/
1864
+ # OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https:
1865
+ # //www.googleapis.com/auth/gmail.settings.basic` scope. For users managing
1866
+ # their own identities and keypairs, requests require [hardware key encryption](
1867
+ # https://support.google.com/a/answer/14153163) turned on and configured.
1793
1868
# @param [String] user_id
1794
1869
# The requester's primary email address. To indicate the authenticated user, you
1795
1870
# can use the special value `me`.
@@ -1823,7 +1898,16 @@ def get_user_setting_cse_keypair(user_id, key_pair_id, fields: nil, quota_user:
1823
1898
execute_or_queue_command ( command , &block )
1824
1899
end
1825
1900
1826
- # Lists client-side encryption key pairs for an authenticated user.
1901
+ # Lists client-side encryption key pairs for an authenticated user. For
1902
+ # administrators managing identities and keypairs for users in their
1903
+ # organization, requests require authorization with a [service account](https://
1904
+ # developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [
1905
+ # domain-wide delegation authority](https://developers.google.com/identity/
1906
+ # protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with
1907
+ # the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users
1908
+ # managing their own identities and keypairs, requests require [hardware key
1909
+ # encryption](https://support.google.com/a/answer/14153163) turned on and
1910
+ # configured.
1827
1911
# @param [String] user_id
1828
1912
# The requester's primary email address. To indicate the authenticated user, you
1829
1913
# can use the special value `me`.
@@ -1867,7 +1951,15 @@ def list_user_setting_cse_keypairs(user_id, page_size: nil, page_token: nil, fie
1867
1951
# days. To turn off a key pair, use the DisableCseKeyPair method. Gmail can't
1868
1952
# restore or decrypt any messages that were encrypted by an obliterated key.
1869
1953
# Authenticated users and Google Workspace administrators lose access to reading
1870
- # the encrypted messages.
1954
+ # the encrypted messages. For administrators managing identities and keypairs
1955
+ # for users in their organization, requests require authorization with a [
1956
+ # service account](https://developers.google.com/identity/protocols/
1957
+ # OAuth2ServiceAccount) that has [domain-wide delegation authority](https://
1958
+ # developers.google.com/identity/protocols/OAuth2ServiceAccount#
1959
+ # delegatingauthority) to impersonate users with the `https://www.googleapis.com/
1960
+ # auth/gmail.settings.basic` scope. For users managing their own identities and
1961
+ # keypairs, requests require [hardware key encryption](https://support.google.
1962
+ # com/a/answer/14153163) turned on and configured.
1871
1963
# @param [String] user_id
1872
1964
# The requester's primary email address. To indicate the authenticated user, you
1873
1965
# can use the special value `me`.
0 commit comments