تتيح لك واجهة برمجة التطبيقات لميزة "التشفير من جهة العميل" في Google Workspace امتلاك
مفاتيح التشفير المستخدَمة لتشفير بيانات Google Workspace بشكلٍ أكبر.
تاريخ التعديل الأخير: 2025-03-18 (حسب التوقيت العالمي المتفَّق عليه)
[[["يسهُل فهم المحتوى.","easyToUnderstand","thumb-up"],["ساعَدني المحتوى في حلّ مشكلتي.","solvedMyProblem","thumb-up"],["غير ذلك","otherUp","thumb-up"]],[["لا يحتوي على المعلومات التي أحتاج إليها.","missingTheInformationINeed","thumb-down"],["الخطوات معقدة للغاية / كثيرة جدًا.","tooComplicatedTooManySteps","thumb-down"],["المحتوى قديم.","outOfDate","thumb-down"],["ثمة مشكلة في الترجمة.","translationIssue","thumb-down"],["مشكلة في العيّنات / التعليمات البرمجية","samplesCodeIssue","thumb-down"],["غير ذلك","otherDown","thumb-down"]],["تاريخ التعديل الأخير: 2025-03-18 (حسب التوقيت العالمي المتفَّق عليه)"],[[["The Google Workspace Client-side Encryption (CSE) API empowers you to manage your own encryption keys for enhanced security of Google Workspace data."],["This API provides a comprehensive suite of methods for key management, including wrapping, unwrapping, encryption, decryption, and signing, offering granular control over your data protection."],["You can leverage methods such as `wrap` and `unwrap` to encrypt and decrypt data encryption keys (DEKs), while `privatekeydecrypt` allows for decryption using your private keys."],["Authentication and authorization are handled through JWTs, ensuring secure access control to your encrypted data."],["Explore detailed documentation on methods, tokens, and error handling to effectively integrate the CSE API into your workflows."]]],["The Google Workspace CSE API enables key ownership for encrypting Workspace data. Key actions include: `digest` to return checksums, `privatekeydecrypt` to decrypt keys, `privatekeysign` to sign digests, `unwrap`/`wrap` to decrypt/encrypt DEKs, `rewrap` to re-encrypt DEKs, `privileged` methods for special decryption/wrapping, `wrapprivatekey` to wrap a user's private key and `status` to check the Key Access Control List Service. It uses `Authorization` and `Authentication` JWT tokens and details structured error handling.\n"]]