[−][src]Struct rusoto_glue::ConnectionPasswordEncryption
The data structure used by the Data Catalog to encrypt the password as part of CreateConnection
or UpdateConnection
and store it in the ENCRYPTED_PASSWORD
field in the connection properties. You can enable catalog encryption or only password encryption.
When a CreationConnection
request arrives containing a password, the Data Catalog first encrypts the password using your AWS KMS key. It then encrypts the whole connection object again if catalog encryption is also enabled.
This encryption requires that you set AWS KMS key permissions to enable or restrict access on the password key according to your security requirements. For example, you might want only administrators to have decrypt permission on the password key.
Fields
aws_kms_key_id: Option<String>
An AWS KMS key that is used to encrypt the connection password.
If connection password protection is enabled, the caller of CreateConnection
and UpdateConnection
needs at least kms:Encrypt
permission on the specified AWS KMS key, to encrypt passwords before storing them in the Data Catalog.
You can set the decrypt permission to enable or restrict access on the password key according to your security requirements.
return_connection_password_encrypted: bool
When the ReturnConnectionPasswordEncrypted
flag is set to "true", passwords remain encrypted in the responses of GetConnection
and GetConnections
. This encryption takes effect independently from catalog encryption.
Trait Implementations
impl Clone for ConnectionPasswordEncryption
[src]
pub fn clone(&self) -> ConnectionPasswordEncryption
[src]
pub fn clone_from(&mut self, source: &Self)
1.0.0[src]
impl Debug for ConnectionPasswordEncryption
[src]
impl Default for ConnectionPasswordEncryption
[src]
pub fn default() -> ConnectionPasswordEncryption
[src]
impl<'de> Deserialize<'de> for ConnectionPasswordEncryption
[src]
pub fn deserialize<__D>(__deserializer: __D) -> Result<Self, __D::Error> where
__D: Deserializer<'de>,
[src]
__D: Deserializer<'de>,
impl PartialEq<ConnectionPasswordEncryption> for ConnectionPasswordEncryption
[src]
pub fn eq(&self, other: &ConnectionPasswordEncryption) -> bool
[src]
pub fn ne(&self, other: &ConnectionPasswordEncryption) -> bool
[src]
impl Serialize for ConnectionPasswordEncryption
[src]
pub fn serialize<__S>(&self, __serializer: __S) -> Result<__S::Ok, __S::Error> where
__S: Serializer,
[src]
__S: Serializer,
impl StructuralPartialEq for ConnectionPasswordEncryption
[src]
Auto Trait Implementations
impl RefUnwindSafe for ConnectionPasswordEncryption
[src]
impl Send for ConnectionPasswordEncryption
[src]
impl Sync for ConnectionPasswordEncryption
[src]
impl Unpin for ConnectionPasswordEncryption
[src]
impl UnwindSafe for ConnectionPasswordEncryption
[src]
Blanket Implementations
impl<T> Any for T where
T: 'static + ?Sized,
[src]
T: 'static + ?Sized,
impl<T> Borrow<T> for T where
T: ?Sized,
[src]
T: ?Sized,
impl<T> BorrowMut<T> for T where
T: ?Sized,
[src]
T: ?Sized,
pub fn borrow_mut(&mut self) -> &mut T
[src]
impl<T> DeserializeOwned for T where
T: for<'de> Deserialize<'de>,
[src]
T: for<'de> Deserialize<'de>,
impl<T> From<T> for T
[src]
impl<T> Instrument for T
[src]
pub fn instrument(self, span: Span) -> Instrumented<Self>
[src]
pub fn in_current_span(self) -> Instrumented<Self>
[src]
impl<T, U> Into<U> for T where
U: From<T>,
[src]
U: From<T>,
impl<T> Same<T> for T
type Output = T
Should always be Self
impl<T> ToOwned for T where
T: Clone,
[src]
T: Clone,
type Owned = T
The resulting type after obtaining ownership.
pub fn to_owned(&self) -> T
[src]
pub fn clone_into(&self, target: &mut T)
[src]
impl<T, U> TryFrom<U> for T where
U: Into<T>,
[src]
U: Into<T>,
type Error = Infallible
The type returned in the event of a conversion error.
pub fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>
[src]
impl<T, U> TryInto<U> for T where
U: TryFrom<T>,
[src]
U: TryFrom<T>,