public sealed class CustomerManagedEncryption : IMessage<CustomerManagedEncryption>, IEquatable<CustomerManagedEncryption>, IDeepCloneable<CustomerManagedEncryption>, IBufferMessage, IMessage
Configuration for encrypting secret payloads using customer-managed
encryption keys (CMEK).
Required. The resource name of the Cloud KMS CryptoKey used to encrypt secret
payloads.
For secrets using the [UserManaged][google.cloud.secretmanager.v1.Replication.UserManaged] replication
policy type, Cloud KMS CryptoKeys must reside in the same location as the
[replica location][Secret.UserManaged.Replica.location].
For secrets using the [Automatic][google.cloud.secretmanager.v1.Replication.Automatic] replication policy
type, Cloud KMS CryptoKeys must reside in global.
The expected format is projects/*/locations/*/keyRings/*/cryptoKeys/*.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe \u003ccode\u003eCustomerManagedEncryption\u003c/code\u003e class in the \u003ccode\u003eGoogle.Cloud.SecretManager.V1\u003c/code\u003e namespace allows for configuring the encryption of secret payloads using customer-managed encryption keys (CMEK).\u003c/p\u003e\n"],["\u003cp\u003eThe latest version of the documentation available is 2.5.0, although version 1.6.0 was the one highlighted in the content, and there are versions available between those.\u003c/p\u003e\n"],["\u003cp\u003eThis class implements several interfaces including \u003ccode\u003eIMessage\u003c/code\u003e, \u003ccode\u003eIEquatable\u003c/code\u003e, \u003ccode\u003eIDeepCloneable\u003c/code\u003e, and \u003ccode\u003eIBufferMessage\u003c/code\u003e, supporting various functionalities related to message handling, equality checks, deep cloning, and buffer management.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eKmsKeyName\u003c/code\u003e property, which is a required string, is used to specify the resource name of the Cloud KMS CryptoKey that is used for encrypting the secret payloads.\u003c/p\u003e\n"],["\u003cp\u003eThe Cloud KMS CryptoKeys must be located in the same location as the replica for user-managed replication or in \u003ccode\u003eglobal\u003c/code\u003e for automatic replication, adhering to the expected format of \u003ccode\u003eprojects/*/locations/*/keyRings/*/cryptoKeys/*\u003c/code\u003e.\u003c/p\u003e\n"]]],[],null,[]]