/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include Allows you to specify additional settings for your streaming Call Analytics
* post-call request, including output locations for your redacted and unredacted
* transcript, which IAM role to use, and, optionally, which encryption key to
* use. ContentRedactionOutput
,
* DataAccessRoleArn
, and OutputLocation
are required
* fields.See Also:
AWS
* API Reference
The Amazon S3 location where you want your Call Analytics post-call * transcription output stored. You can use any of the following formats to specify * the output location:
s3://DOC-EXAMPLE-BUCKET
s3://DOC-EXAMPLE-BUCKET/my-output-folder/
s3://DOC-EXAMPLE-BUCKET/my-output-folder/my-call-analytics-job.json
The Amazon S3 location where you want your Call Analytics post-call * transcription output stored. You can use any of the following formats to specify * the output location:
s3://DOC-EXAMPLE-BUCKET
s3://DOC-EXAMPLE-BUCKET/my-output-folder/
s3://DOC-EXAMPLE-BUCKET/my-output-folder/my-call-analytics-job.json
The Amazon S3 location where you want your Call Analytics post-call * transcription output stored. You can use any of the following formats to specify * the output location:
s3://DOC-EXAMPLE-BUCKET
s3://DOC-EXAMPLE-BUCKET/my-output-folder/
s3://DOC-EXAMPLE-BUCKET/my-output-folder/my-call-analytics-job.json
The Amazon S3 location where you want your Call Analytics post-call * transcription output stored. You can use any of the following formats to specify * the output location:
s3://DOC-EXAMPLE-BUCKET
s3://DOC-EXAMPLE-BUCKET/my-output-folder/
s3://DOC-EXAMPLE-BUCKET/my-output-folder/my-call-analytics-job.json
The Amazon S3 location where you want your Call Analytics post-call * transcription output stored. You can use any of the following formats to specify * the output location:
s3://DOC-EXAMPLE-BUCKET
s3://DOC-EXAMPLE-BUCKET/my-output-folder/
s3://DOC-EXAMPLE-BUCKET/my-output-folder/my-call-analytics-job.json
The Amazon S3 location where you want your Call Analytics post-call * transcription output stored. You can use any of the following formats to specify * the output location:
s3://DOC-EXAMPLE-BUCKET
s3://DOC-EXAMPLE-BUCKET/my-output-folder/
s3://DOC-EXAMPLE-BUCKET/my-output-folder/my-call-analytics-job.json
The Amazon S3 location where you want your Call Analytics post-call * transcription output stored. You can use any of the following formats to specify * the output location:
s3://DOC-EXAMPLE-BUCKET
s3://DOC-EXAMPLE-BUCKET/my-output-folder/
s3://DOC-EXAMPLE-BUCKET/my-output-folder/my-call-analytics-job.json
The Amazon S3 location where you want your Call Analytics post-call * transcription output stored. You can use any of the following formats to specify * the output location:
s3://DOC-EXAMPLE-BUCKET
s3://DOC-EXAMPLE-BUCKET/my-output-folder/
s3://DOC-EXAMPLE-BUCKET/my-output-folder/my-call-analytics-job.json
The Amazon Resource Name (ARN) of an IAM role that has permissions to access * the Amazon S3 bucket that contains your input files. If the role that you * specify doesn’t have the appropriate permissions to access the specified Amazon * S3 location, your request fails.
IAM role ARNs have the format
* arn:partition:iam::account:role/role-name-with-path
. For example:
* arn:aws:iam::111122223333:role/Admin
. For more information, see IAM
* ARNs.
The Amazon Resource Name (ARN) of an IAM role that has permissions to access * the Amazon S3 bucket that contains your input files. If the role that you * specify doesn’t have the appropriate permissions to access the specified Amazon * S3 location, your request fails.
IAM role ARNs have the format
* arn:partition:iam::account:role/role-name-with-path
. For example:
* arn:aws:iam::111122223333:role/Admin
. For more information, see IAM
* ARNs.
The Amazon Resource Name (ARN) of an IAM role that has permissions to access * the Amazon S3 bucket that contains your input files. If the role that you * specify doesn’t have the appropriate permissions to access the specified Amazon * S3 location, your request fails.
IAM role ARNs have the format
* arn:partition:iam::account:role/role-name-with-path
. For example:
* arn:aws:iam::111122223333:role/Admin
. For more information, see IAM
* ARNs.
The Amazon Resource Name (ARN) of an IAM role that has permissions to access * the Amazon S3 bucket that contains your input files. If the role that you * specify doesn’t have the appropriate permissions to access the specified Amazon * S3 location, your request fails.
IAM role ARNs have the format
* arn:partition:iam::account:role/role-name-with-path
. For example:
* arn:aws:iam::111122223333:role/Admin
. For more information, see IAM
* ARNs.
The Amazon Resource Name (ARN) of an IAM role that has permissions to access * the Amazon S3 bucket that contains your input files. If the role that you * specify doesn’t have the appropriate permissions to access the specified Amazon * S3 location, your request fails.
IAM role ARNs have the format
* arn:partition:iam::account:role/role-name-with-path
. For example:
* arn:aws:iam::111122223333:role/Admin
. For more information, see IAM
* ARNs.
The Amazon Resource Name (ARN) of an IAM role that has permissions to access * the Amazon S3 bucket that contains your input files. If the role that you * specify doesn’t have the appropriate permissions to access the specified Amazon * S3 location, your request fails.
IAM role ARNs have the format
* arn:partition:iam::account:role/role-name-with-path
. For example:
* arn:aws:iam::111122223333:role/Admin
. For more information, see IAM
* ARNs.
The Amazon Resource Name (ARN) of an IAM role that has permissions to access * the Amazon S3 bucket that contains your input files. If the role that you * specify doesn’t have the appropriate permissions to access the specified Amazon * S3 location, your request fails.
IAM role ARNs have the format
* arn:partition:iam::account:role/role-name-with-path
. For example:
* arn:aws:iam::111122223333:role/Admin
. For more information, see IAM
* ARNs.
The Amazon Resource Name (ARN) of an IAM role that has permissions to access * the Amazon S3 bucket that contains your input files. If the role that you * specify doesn’t have the appropriate permissions to access the specified Amazon * S3 location, your request fails.
IAM role ARNs have the format
* arn:partition:iam::account:role/role-name-with-path
. For example:
* arn:aws:iam::111122223333:role/Admin
. For more information, see IAM
* ARNs.
Specify whether you want only a redacted transcript or both a redacted and an * unredacted transcript. If you choose redacted and unredacted, two JSON files are * generated and stored in the Amazon S3 output location you specify.
Note
* that to include ContentRedactionOutput
in your request, you must
* enable content redaction (ContentRedactionType
).
Specify whether you want only a redacted transcript or both a redacted and an * unredacted transcript. If you choose redacted and unredacted, two JSON files are * generated and stored in the Amazon S3 output location you specify.
Note
* that to include ContentRedactionOutput
in your request, you must
* enable content redaction (ContentRedactionType
).
Specify whether you want only a redacted transcript or both a redacted and an * unredacted transcript. If you choose redacted and unredacted, two JSON files are * generated and stored in the Amazon S3 output location you specify.
Note
* that to include ContentRedactionOutput
in your request, you must
* enable content redaction (ContentRedactionType
).
Specify whether you want only a redacted transcript or both a redacted and an * unredacted transcript. If you choose redacted and unredacted, two JSON files are * generated and stored in the Amazon S3 output location you specify.
Note
* that to include ContentRedactionOutput
in your request, you must
* enable content redaction (ContentRedactionType
).
Specify whether you want only a redacted transcript or both a redacted and an * unredacted transcript. If you choose redacted and unredacted, two JSON files are * generated and stored in the Amazon S3 output location you specify.
Note
* that to include ContentRedactionOutput
in your request, you must
* enable content redaction (ContentRedactionType
).
Specify whether you want only a redacted transcript or both a redacted and an * unredacted transcript. If you choose redacted and unredacted, two JSON files are * generated and stored in the Amazon S3 output location you specify.
Note
* that to include ContentRedactionOutput
in your request, you must
* enable content redaction (ContentRedactionType
).
The KMS key you want to use to encrypt your Call Analytics post-call * output.
If using a key located in the current Amazon Web Services * account, you can specify your KMS key in one of four ways:
Use
* the KMS key ID itself. For example,
* 1234abcd-12ab-34cd-56ef-1234567890ab
.
Use an
* alias for the KMS key ID. For example, alias/ExampleAlias
.
Use the Amazon Resource Name (ARN) for the KMS key ID. For
* example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
If using a key located in a different Amazon Web Services account than * the current Amazon Web Services account, you can specify your KMS key in one of * two ways:
Use the ARN for the KMS key ID. For example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
Note that the user making the request must have permission to use the * specified KMS key.
*/ inline const Aws::String& GetOutputEncryptionKMSKeyId() const{ return m_outputEncryptionKMSKeyId; } /** *The KMS key you want to use to encrypt your Call Analytics post-call * output.
If using a key located in the current Amazon Web Services * account, you can specify your KMS key in one of four ways:
Use
* the KMS key ID itself. For example,
* 1234abcd-12ab-34cd-56ef-1234567890ab
.
Use an
* alias for the KMS key ID. For example, alias/ExampleAlias
.
Use the Amazon Resource Name (ARN) for the KMS key ID. For
* example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
If using a key located in a different Amazon Web Services account than * the current Amazon Web Services account, you can specify your KMS key in one of * two ways:
Use the ARN for the KMS key ID. For example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
Note that the user making the request must have permission to use the * specified KMS key.
*/ inline bool OutputEncryptionKMSKeyIdHasBeenSet() const { return m_outputEncryptionKMSKeyIdHasBeenSet; } /** *The KMS key you want to use to encrypt your Call Analytics post-call * output.
If using a key located in the current Amazon Web Services * account, you can specify your KMS key in one of four ways:
Use
* the KMS key ID itself. For example,
* 1234abcd-12ab-34cd-56ef-1234567890ab
.
Use an
* alias for the KMS key ID. For example, alias/ExampleAlias
.
Use the Amazon Resource Name (ARN) for the KMS key ID. For
* example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
If using a key located in a different Amazon Web Services account than * the current Amazon Web Services account, you can specify your KMS key in one of * two ways:
Use the ARN for the KMS key ID. For example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
Note that the user making the request must have permission to use the * specified KMS key.
*/ inline void SetOutputEncryptionKMSKeyId(const Aws::String& value) { m_outputEncryptionKMSKeyIdHasBeenSet = true; m_outputEncryptionKMSKeyId = value; } /** *The KMS key you want to use to encrypt your Call Analytics post-call * output.
If using a key located in the current Amazon Web Services * account, you can specify your KMS key in one of four ways:
Use
* the KMS key ID itself. For example,
* 1234abcd-12ab-34cd-56ef-1234567890ab
.
Use an
* alias for the KMS key ID. For example, alias/ExampleAlias
.
Use the Amazon Resource Name (ARN) for the KMS key ID. For
* example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
If using a key located in a different Amazon Web Services account than * the current Amazon Web Services account, you can specify your KMS key in one of * two ways:
Use the ARN for the KMS key ID. For example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
Note that the user making the request must have permission to use the * specified KMS key.
*/ inline void SetOutputEncryptionKMSKeyId(Aws::String&& value) { m_outputEncryptionKMSKeyIdHasBeenSet = true; m_outputEncryptionKMSKeyId = std::move(value); } /** *The KMS key you want to use to encrypt your Call Analytics post-call * output.
If using a key located in the current Amazon Web Services * account, you can specify your KMS key in one of four ways:
Use
* the KMS key ID itself. For example,
* 1234abcd-12ab-34cd-56ef-1234567890ab
.
Use an
* alias for the KMS key ID. For example, alias/ExampleAlias
.
Use the Amazon Resource Name (ARN) for the KMS key ID. For
* example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
If using a key located in a different Amazon Web Services account than * the current Amazon Web Services account, you can specify your KMS key in one of * two ways:
Use the ARN for the KMS key ID. For example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
Note that the user making the request must have permission to use the * specified KMS key.
*/ inline void SetOutputEncryptionKMSKeyId(const char* value) { m_outputEncryptionKMSKeyIdHasBeenSet = true; m_outputEncryptionKMSKeyId.assign(value); } /** *The KMS key you want to use to encrypt your Call Analytics post-call * output.
If using a key located in the current Amazon Web Services * account, you can specify your KMS key in one of four ways:
Use
* the KMS key ID itself. For example,
* 1234abcd-12ab-34cd-56ef-1234567890ab
.
Use an
* alias for the KMS key ID. For example, alias/ExampleAlias
.
Use the Amazon Resource Name (ARN) for the KMS key ID. For
* example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
If using a key located in a different Amazon Web Services account than * the current Amazon Web Services account, you can specify your KMS key in one of * two ways:
Use the ARN for the KMS key ID. For example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
Note that the user making the request must have permission to use the * specified KMS key.
*/ inline PostCallAnalyticsSettings& WithOutputEncryptionKMSKeyId(const Aws::String& value) { SetOutputEncryptionKMSKeyId(value); return *this;} /** *The KMS key you want to use to encrypt your Call Analytics post-call * output.
If using a key located in the current Amazon Web Services * account, you can specify your KMS key in one of four ways:
Use
* the KMS key ID itself. For example,
* 1234abcd-12ab-34cd-56ef-1234567890ab
.
Use an
* alias for the KMS key ID. For example, alias/ExampleAlias
.
Use the Amazon Resource Name (ARN) for the KMS key ID. For
* example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
If using a key located in a different Amazon Web Services account than * the current Amazon Web Services account, you can specify your KMS key in one of * two ways:
Use the ARN for the KMS key ID. For example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
Note that the user making the request must have permission to use the * specified KMS key.
*/ inline PostCallAnalyticsSettings& WithOutputEncryptionKMSKeyId(Aws::String&& value) { SetOutputEncryptionKMSKeyId(std::move(value)); return *this;} /** *The KMS key you want to use to encrypt your Call Analytics post-call * output.
If using a key located in the current Amazon Web Services * account, you can specify your KMS key in one of four ways:
Use
* the KMS key ID itself. For example,
* 1234abcd-12ab-34cd-56ef-1234567890ab
.
Use an
* alias for the KMS key ID. For example, alias/ExampleAlias
.
Use the Amazon Resource Name (ARN) for the KMS key ID. For
* example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
If using a key located in a different Amazon Web Services account than * the current Amazon Web Services account, you can specify your KMS key in one of * two ways:
Use the ARN for the KMS key ID. For example,
* arn:aws:kms:region:account-ID:key/1234abcd-12ab-34cd-56ef-1234567890ab
.
Use the ARN for the KMS key alias. For example,
* arn:aws:kms:region:account-ID:alias/ExampleAlias
.
Note that the user making the request must have permission to use the * specified KMS key.
*/ inline PostCallAnalyticsSettings& WithOutputEncryptionKMSKeyId(const char* value) { SetOutputEncryptionKMSKeyId(value); return *this;} private: Aws::String m_outputLocation; bool m_outputLocationHasBeenSet = false; Aws::String m_dataAccessRoleArn; bool m_dataAccessRoleArnHasBeenSet = false; ContentRedactionOutput m_contentRedactionOutput; bool m_contentRedactionOutputHasBeenSet = false; Aws::String m_outputEncryptionKMSKeyId; bool m_outputEncryptionKMSKeyIdHasBeenSet = false; }; } // namespace Model } // namespace TranscribeStreamingService } // namespace Aws