Class | Description |
---|---|
BackupKeyRequest |
Example: Click here to see how to use BackupKeyRequest.
|
BackupKeyRequest.Builder | |
BackupVaultRequest |
Example: Click here to see how to use BackupVaultRequest.
|
BackupVaultRequest.Builder | |
CancelHsmClusterDeletionRequest |
Example: Click here to see how to use
CancelHsmClusterDeletionRequest.
|
CancelHsmClusterDeletionRequest.Builder | |
CancelKeyDeletionRequest |
Example: Click here to see how to use CancelKeyDeletionRequest.
|
CancelKeyDeletionRequest.Builder | |
CancelKeyVersionDeletionRequest |
Example: Click here to see how to use
CancelKeyVersionDeletionRequest.
|
CancelKeyVersionDeletionRequest.Builder | |
CancelVaultDeletionRequest |
Example: Click here to see how to use CancelVaultDeletionRequest.
|
CancelVaultDeletionRequest.Builder | |
ChangeHsmClusterCompartmentRequest |
Example: Click here to see how to use
ChangeHsmClusterCompartmentRequest.
|
ChangeHsmClusterCompartmentRequest.Builder | |
ChangeKeyCompartmentRequest |
Example: Click here to see how to use ChangeKeyCompartmentRequest.
|
ChangeKeyCompartmentRequest.Builder | |
ChangeVaultCompartmentRequest |
Example: Click here to see how to use
ChangeVaultCompartmentRequest.
|
ChangeVaultCompartmentRequest.Builder | |
CreateEkmsPrivateEndpointRequest |
Example: Click here to see how to use
CreateEkmsPrivateEndpointRequest.
|
CreateEkmsPrivateEndpointRequest.Builder | |
CreateHsmClusterRequest |
Example: Click here to see how to use CreateHsmClusterRequest.
|
CreateHsmClusterRequest.Builder | |
CreateKeyRequest |
Example: Click here to see how to use CreateKeyRequest.
|
CreateKeyRequest.Builder | |
CreateKeyVersionRequest |
Example: Click here to see how to use CreateKeyVersionRequest.
|
CreateKeyVersionRequest.Builder | |
CreateVaultReplicaRequest |
Example: Click here to see how to use CreateVaultReplicaRequest.
|
CreateVaultReplicaRequest.Builder | |
CreateVaultRequest |
Example: Click here to see how to use CreateVaultRequest.
|
CreateVaultRequest.Builder | |
DecryptRequest |
Example: Click here to see how to use DecryptRequest.
|
DecryptRequest.Builder | |
DeleteEkmsPrivateEndpointRequest |
Example: Click here to see how to use
DeleteEkmsPrivateEndpointRequest.
|
DeleteEkmsPrivateEndpointRequest.Builder | |
DeleteVaultReplicaRequest |
Example: Click here to see how to use DeleteVaultReplicaRequest.
|
DeleteVaultReplicaRequest.Builder | |
DisableKeyRequest |
Example: Click here to see how to use DisableKeyRequest.
|
DisableKeyRequest.Builder | |
DownloadCertificateSigningRequestRequest |
Example: Click here to see how to use
DownloadCertificateSigningRequestRequest.
|
DownloadCertificateSigningRequestRequest.Builder | |
EnableKeyRequest |
Example: Click here to see how to use EnableKeyRequest.
|
EnableKeyRequest.Builder | |
EncryptRequest |
Example: Click here to see how to use EncryptRequest.
|
EncryptRequest.Builder | |
ExportKeyRequest |
Example: Click here to see how to use ExportKeyRequest.
|
ExportKeyRequest.Builder | |
GenerateDataEncryptionKeyRequest |
Example: Click here to see how to use
GenerateDataEncryptionKeyRequest.
|
GenerateDataEncryptionKeyRequest.Builder | |
GetEkmsPrivateEndpointRequest |
Example: Click here to see how to use
GetEkmsPrivateEndpointRequest.
|
GetEkmsPrivateEndpointRequest.Builder | |
GetHsmClusterRequest |
Example: Click here to see how to use GetHsmClusterRequest.
|
GetHsmClusterRequest.Builder | |
GetHsmPartitionRequest |
Example: Click here to see how to use GetHsmPartitionRequest.
|
GetHsmPartitionRequest.Builder | |
GetKeyRequest |
Example: Click here to see how to use GetKeyRequest.
|
GetKeyRequest.Builder | |
GetKeyVersionRequest |
Example: Click here to see how to use GetKeyVersionRequest.
|
GetKeyVersionRequest.Builder | |
GetPreCoUserCredentialsRequest |
Example: Click here to see how to use
GetPreCoUserCredentialsRequest.
|
GetPreCoUserCredentialsRequest.Builder | |
GetReplicationStatusRequest |
Example: Click here to see how to use GetReplicationStatusRequest.
|
GetReplicationStatusRequest.Builder | |
GetVaultRequest |
Example: Click here to see how to use GetVaultRequest.
|
GetVaultRequest.Builder | |
GetVaultUsageRequest |
Example: Click here to see how to use GetVaultUsageRequest.
|
GetVaultUsageRequest.Builder | |
GetWrappingKeyRequest |
Example: Click here to see how to use GetWrappingKeyRequest.
|
GetWrappingKeyRequest.Builder | |
ImportKeyRequest |
Example: Click here to see how to use ImportKeyRequest.
|
ImportKeyRequest.Builder | |
ImportKeyVersionRequest |
Example: Click here to see how to use ImportKeyVersionRequest.
|
ImportKeyVersionRequest.Builder | |
ListEkmsPrivateEndpointsRequest |
Example: Click here to see how to use
ListEkmsPrivateEndpointsRequest.
|
ListEkmsPrivateEndpointsRequest.Builder | |
ListHsmClustersRequest |
Example: Click here to see how to use ListHsmClustersRequest.
|
ListHsmClustersRequest.Builder | |
ListHsmPartitionsRequest |
Example: Click here to see how to use ListHsmPartitionsRequest.
|
ListHsmPartitionsRequest.Builder | |
ListKeysRequest |
Example: Click here to see how to use ListKeysRequest.
|
ListKeysRequest.Builder | |
ListKeyVersionsRequest |
Example: Click here to see how to use ListKeyVersionsRequest.
|
ListKeyVersionsRequest.Builder | |
ListVaultReplicasRequest |
Example: Click here to see how to use ListVaultReplicasRequest.
|
ListVaultReplicasRequest.Builder | |
ListVaultsRequest |
Example: Click here to see how to use ListVaultsRequest.
|
ListVaultsRequest.Builder | |
RestoreKeyFromFileRequest |
Example: Click here to see how to use RestoreKeyFromFileRequest.
|
RestoreKeyFromFileRequest.Builder | |
RestoreKeyFromObjectStoreRequest |
Example: Click here to see how to use
RestoreKeyFromObjectStoreRequest.
|
RestoreKeyFromObjectStoreRequest.Builder | |
RestoreVaultFromFileRequest |
Example: Click here to see how to use RestoreVaultFromFileRequest.
|
RestoreVaultFromFileRequest.Builder | |
RestoreVaultFromObjectStoreRequest |
Example: Click here to see how to use
RestoreVaultFromObjectStoreRequest.
|
RestoreVaultFromObjectStoreRequest.Builder | |
ScheduleHsmClusterDeletionRequest |
Example: Click here to see how to use
ScheduleHsmClusterDeletionRequest.
|
ScheduleHsmClusterDeletionRequest.Builder | |
ScheduleKeyDeletionRequest |
Example: Click here to see how to use ScheduleKeyDeletionRequest.
|
ScheduleKeyDeletionRequest.Builder | |
ScheduleKeyVersionDeletionRequest |
Example: Click here to see how to use
ScheduleKeyVersionDeletionRequest.
|
ScheduleKeyVersionDeletionRequest.Builder | |
ScheduleVaultDeletionRequest |
Example: Click here to see how to use
ScheduleVaultDeletionRequest.
|
ScheduleVaultDeletionRequest.Builder | |
SignRequest |
Example: Click here to see how to use SignRequest.
|
SignRequest.Builder | |
UpdateEkmsPrivateEndpointRequest |
Example: Click here to see how to use
UpdateEkmsPrivateEndpointRequest.
|
UpdateEkmsPrivateEndpointRequest.Builder | |
UpdateHsmClusterRequest |
Example: Click here to see how to use UpdateHsmClusterRequest.
|
UpdateHsmClusterRequest.Builder | |
UpdateKeyRequest |
Example: Click here to see how to use UpdateKeyRequest.
|
UpdateKeyRequest.Builder | |
UpdateVaultRequest |
Example: Click here to see how to use UpdateVaultRequest.
|
UpdateVaultRequest.Builder | |
UploadPartitionCertificatesRequest |
Example: Click here to see how to use
UploadPartitionCertificatesRequest.
|
UploadPartitionCertificatesRequest.Builder | |
VerifyRequest |
Example: Click here to see how to use VerifyRequest.
|
VerifyRequest.Builder |
Enum | Description |
---|---|
ListEkmsPrivateEndpointsRequest.SortBy |
The field to sort by.
|
ListEkmsPrivateEndpointsRequest.SortOrder |
The sort order to use, either ascending (
ASC ) or descending (DESC ). |
ListHsmClustersRequest.SortBy |
The field to sort by.
|
ListHsmClustersRequest.SortOrder |
The sort order to use, either ascending (
ASC ) or descending (DESC ). |
ListHsmPartitionsRequest.SortBy |
The field to sort by.
|
ListHsmPartitionsRequest.SortOrder |
The sort order to use, either ascending (
ASC ) or descending (DESC ). |
ListKeysRequest.Algorithm |
The algorithm used by a key’s key versions to encrypt or decrypt data.
|
ListKeysRequest.CurveId |
The curve ID of the keys.
|
ListKeysRequest.ProtectionMode |
A key’s protection mode indicates how the key persists and where cryptographic operations
that use the key are performed.
|
ListKeysRequest.SortBy |
The field to sort by.
|
ListKeysRequest.SortOrder |
The sort order to use, either ascending (
ASC ) or descending (DESC ). |
ListKeyVersionsRequest.SortBy |
The field to sort by.
|
ListKeyVersionsRequest.SortOrder |
The sort order to use, either ascending (
ASC ) or descending (DESC ). |
ListVaultReplicasRequest.SortBy |
The field to sort by.
|
ListVaultReplicasRequest.SortOrder |
The sort order to use, either ascending (
ASC ) or descending (DESC ). |
ListVaultsRequest.SortBy |
The field to sort by.
|
ListVaultsRequest.SortOrder |
The sort order to use, either ascending (
ASC ) or descending (DESC ). |
Copyright © 2016–2024. All rights reserved.