diff --git a/alsdkdefs/apis/otis/otis.v3.yaml b/alsdkdefs/apis/otis/otis.v3.yaml
index 16f209e..aa523a9 100644
--- a/alsdkdefs/apis/otis/otis.v3.yaml
+++ b/alsdkdefs/apis/otis/otis.v3.yaml
@@ -114,6 +114,7 @@ info:
A client is allowed to specify the following options:
* [abs_follow_internal_scan_schedules](#abs_follow_internal_scan_schedules)
+ * [agent_assisted_decryption](#agent_assisted_decryption)
* [cross_network_protection](#cross_network_protection)
* [discovery_scan_frequency](#discovery_scan_frequency)
* [external_scan_frequency](#external_scan_frequency)
@@ -156,7 +157,25 @@ info:
By default, agent configurations are generated out of agent-based scanning
schedules, and the assumed value is `false` if the option is undefined.
-
+
+
+
+ This option allows IDS agent to capture TLS session keys for supported libraries,
+ enabling decryption of captured TLS traffic for threat analysis.
+ Warning: May expose otherwise hidden sensitive data to Fortra back end.
+
+ For example:
+
+ ```
+ {
+ "name": "agent_assisted_decryption",
+ "scope": {
+ "deployment_id": "AAAAAAAA-AAAA-AAAA-AAAA-AAAAAAAAAAAA"
+ },
+ "value": true
+ }
+ ```
+
### cross_network_protection