| Package | Description |
|---|---|
| com.amazonaws.services.voiceid |
Amazon Connect Voice ID provides real-time caller authentication and fraud risk detection, which make voice
interactions in contact centers more secure and efficient.
|
| com.amazonaws.services.voiceid.model |
| Modifier and Type | Method and Description |
|---|---|
StartFraudsterRegistrationJobRequest |
StartFraudsterRegistrationJobRequest.clone() |
StartFraudsterRegistrationJobRequest |
StartFraudsterRegistrationJobRequest.withClientToken(String clientToken)
A unique, case-sensitive identifier that you provide to ensure the idempotency of the request.
|
StartFraudsterRegistrationJobRequest |
StartFraudsterRegistrationJobRequest.withDataAccessRoleArn(String dataAccessRoleArn)
The IAM role Amazon Resource Name (ARN) that grants Voice ID permissions to access customer's buckets to read the
input manifest file and write the Job output file.
|
StartFraudsterRegistrationJobRequest |
StartFraudsterRegistrationJobRequest.withDomainId(String domainId)
The identifier of the domain that contains the fraudster registration job and in which the fraudsters are
registered.
|
StartFraudsterRegistrationJobRequest |
StartFraudsterRegistrationJobRequest.withInputDataConfig(InputDataConfig inputDataConfig)
The input data config containing an S3 URI for the input manifest file that contains the list of fraudster
registration requests.
|
StartFraudsterRegistrationJobRequest |
StartFraudsterRegistrationJobRequest.withJobName(String jobName)
The name of the new fraudster registration job.
|
StartFraudsterRegistrationJobRequest |
StartFraudsterRegistrationJobRequest.withOutputDataConfig(OutputDataConfig outputDataConfig)
The output data config containing the S3 location where Voice ID writes the job output file; you must also
include a KMS key ID to encrypt the file.
|
StartFraudsterRegistrationJobRequest |
StartFraudsterRegistrationJobRequest.withRegistrationConfig(RegistrationConfig registrationConfig)
The registration config containing details such as the action to take when a duplicate fraudster is detected, and
the similarity threshold to use for detecting a duplicate fraudster.
|
Copyright © 2024. All rights reserved.