public sealed class CustomerManagedEncryption : IMessage<CustomerManagedEncryption>, IEquatable<CustomerManagedEncryption>, IDeepCloneable<CustomerManagedEncryption>, IBufferMessage, IMessage
Configuration for encrypting secret payloads using customer-managed
encryption keys (CMEK).
Required. The resource name of the Cloud KMS CryptoKey used to encrypt secret
payloads.
For secrets using the [UserManaged][google.cloud.secretmanager.v1.Replication.UserManaged] replication
policy type, Cloud KMS CryptoKeys must reside in the same location as the
[replica location][Secret.UserManaged.Replica.location].
For secrets using the [Automatic][google.cloud.secretmanager.v1.Replication.Automatic] replication policy
type, Cloud KMS CryptoKeys must reside in global.
The expected format is projects/*/locations/*/keyRings/*/cryptoKeys/*.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-03-21 UTC."],[[["The `CustomerManagedEncryption` class in the `Google.Cloud.SecretManager.V1` namespace allows for configuring the encryption of secret payloads using customer-managed encryption keys (CMEK)."],["The latest version of the documentation available is 2.5.0, although version 1.6.0 was the one highlighted in the content, and there are versions available between those."],["This class implements several interfaces including `IMessage`, `IEquatable`, `IDeepCloneable`, and `IBufferMessage`, supporting various functionalities related to message handling, equality checks, deep cloning, and buffer management."],["The `KmsKeyName` property, which is a required string, is used to specify the resource name of the Cloud KMS CryptoKey that is used for encrypting the secret payloads."],["The Cloud KMS CryptoKeys must be located in the same location as the replica for user-managed replication or in `global` for automatic replication, adhering to the expected format of `projects/*/locations/*/keyRings/*/cryptoKeys/*`."]]],[]]