Index
-  Autokey(interface)
-  AutokeyAdmin(interface)
-  EkmService(interface)
-  KeyAccessJustificationsConfig(interface)
-  KeyManagementService(interface)
-  AccessReason(enum)
-  AsymmetricDecryptRequest(message)
-  AsymmetricDecryptResponse(message)
-  AsymmetricSignRequest(message)
-  AsymmetricSignResponse(message)
-  AutokeyConfig(message)
-  AutokeyConfig.State(enum)
-  Certificate(message)
-  ChecksummedData(message)
-  CreateCryptoKeyRequest(message)
-  CreateCryptoKeyVersionRequest(message)
-  CreateEkmConnectionRequest(message)
-  CreateImportJobRequest(message)
-  CreateKeyHandleMetadata(message)
-  CreateKeyHandleRequest(message)
-  CreateKeyRingRequest(message)
-  CryptoKey(message)
-  CryptoKey.CryptoKeyPurpose(enum)
-  CryptoKeyVersion(message)
-  CryptoKeyVersion.CryptoKeyVersionAlgorithm(enum)
-  CryptoKeyVersion.CryptoKeyVersionState(enum)
-  CryptoKeyVersion.CryptoKeyVersionView(enum)
-  CryptoKeyVersionTemplate(message)
-  DecapsulateRequest(message)
-  DecapsulateResponse(message)
-  DecryptRequest(message)
-  DecryptResponse(message)
-  DestroyCryptoKeyVersionRequest(message)
-  Digest(message)
-  EkmConfig(message)
-  EkmConnection(message)
-  EkmConnection.KeyManagementMode(enum)
-  EkmConnection.ServiceResolver(message)
-  EncryptRequest(message)
-  EncryptResponse(message)
-  ExternalProtectionLevelOptions(message)
-  GenerateRandomBytesRequest(message)
-  GenerateRandomBytesResponse(message)
-  GetAutokeyConfigRequest(message)
-  GetCryptoKeyRequest(message)
-  GetCryptoKeyVersionRequest(message)
-  GetEkmConfigRequest(message)
-  GetEkmConnectionRequest(message)
-  GetImportJobRequest(message)
-  GetKeyAccessJustificationsPolicyConfigRequest(message)
-  GetKeyHandleRequest(message)
-  GetKeyRingRequest(message)
-  GetPublicKeyRequest(message)
-  ImportCryptoKeyVersionRequest(message)
-  ImportJob(message)
-  ImportJob.ImportJobState(enum)
-  ImportJob.ImportMethod(enum)
-  ImportJob.WrappingPublicKey(message)
-  KeyAccessJustificationsEnrollmentConfig(message)
-  KeyAccessJustificationsPolicy(message)
-  KeyAccessJustificationsPolicyConfig(message)
-  KeyHandle(message)
-  KeyOperationAttestation(message)
-  KeyOperationAttestation.AttestationFormat(enum)
-  KeyOperationAttestation.CertificateChains(message)
-  KeyRing(message)
-  ListCryptoKeyVersionsRequest(message)
-  ListCryptoKeyVersionsResponse(message)
-  ListCryptoKeysRequest(message)
-  ListCryptoKeysResponse(message)
-  ListEkmConnectionsRequest(message)
-  ListEkmConnectionsResponse(message)
-  ListImportJobsRequest(message)
-  ListImportJobsResponse(message)
-  ListKeyHandlesRequest(message)
-  ListKeyHandlesResponse(message)
-  ListKeyRingsRequest(message)
-  ListKeyRingsResponse(message)
-  LocationMetadata(message)
-  MacSignRequest(message)
-  MacSignResponse(message)
-  MacVerifyRequest(message)
-  MacVerifyResponse(message)
-  ProtectionLevel(enum)
-  PublicKey(message)
-  PublicKey.PublicKeyFormat(enum)
-  RawDecryptRequest(message)
-  RawDecryptResponse(message)
-  RawEncryptRequest(message)
-  RawEncryptResponse(message)
-  RestoreCryptoKeyVersionRequest(message)
-  ShowEffectiveAutokeyConfigRequest(message)
-  ShowEffectiveAutokeyConfigResponse(message)
-  ShowEffectiveKeyAccessJustificationsEnrollmentConfigRequest(message)
-  ShowEffectiveKeyAccessJustificationsEnrollmentConfigResponse(message)
-  ShowEffectiveKeyAccessJustificationsPolicyConfigRequest(message)
-  ShowEffectiveKeyAccessJustificationsPolicyConfigResponse(message)
-  UpdateAutokeyConfigRequest(message)
-  UpdateCryptoKeyPrimaryVersionRequest(message)
-  UpdateCryptoKeyRequest(message)
-  UpdateCryptoKeyVersionRequest(message)
-  UpdateEkmConfigRequest(message)
-  UpdateEkmConnectionRequest(message)
-  UpdateKeyAccessJustificationsPolicyConfigRequest(message)
-  VerifyConnectivityRequest(message)
-  VerifyConnectivityResponse(message)
Autokey
Provides interfaces for using Cloud KMS Autokey 
to provision new  CryptoKeys 
 
, ready for Customer Managed Encryption Key (CMEK) use, on-demand. To support certain client tooling, this feature is modeled around a  KeyHandle 
 
resource: creating a  KeyHandle 
 
in a resource project and given location triggers Cloud KMS Autokey to provision a  CryptoKey 
 
in the configured key project and the same location.
Prior to use in a given resource project,  UpdateAutokeyConfig 
 
should have been called on an ancestor folder, setting the key project where Cloud KMS Autokey should create new  CryptoKeys 
 
. See documentation for additional prerequisites. To check what key project, if any, is currently configured on a resource project's ancestor folder, see  ShowEffectiveAutokeyConfig 
 
.
 rpc CreateKeyHandle(  
 CreateKeyHandleRequest 
 
) returns (  Operation 
 
)
Creates a new  KeyHandle 
 
, triggering the provisioning of a new  CryptoKey 
 
for CMEK use with the given resource type in the configured key project and the same location.  GetOperation 
 
should be used to resolve the resulting long-running operation and get the resulting  KeyHandle 
 
and  CryptoKey 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
- IAM Permissions
-  Requires the following IAM permission on the parentresource:-  cloudkms.keyHandles.create
 For more information, see the IAM documentation . 
-  
 rpc GetKeyHandle(  
 GetKeyHandleRequest 
 
) returns (  KeyHandle 
 
)
Returns the  KeyHandle 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
- IAM Permissions
-  Requires the following IAM permission on the nameresource:-  cloudkms.keyHandles.get
 For more information, see the IAM documentation . 
-  
 rpc ListKeyHandles(  
 ListKeyHandlesRequest 
 
) returns (  ListKeyHandlesResponse 
 
)
Lists  KeyHandles 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
- IAM Permissions
-  Requires the following IAM permission on the parentresource:-  cloudkms.keyHandles.list
 For more information, see the IAM documentation . 
-  
AutokeyAdmin
Provides interfaces for managing Cloud KMS Autokey 
folder-level configurations. A configuration is inherited by all descendent projects. A configuration at one folder overrides any other configurations in its ancestry. Setting a configuration on a folder is a prerequisite for Cloud KMS Autokey, so that users working in a descendant project can request provisioned  CryptoKeys 
 
, ready for Customer Managed Encryption Key (CMEK) use, on-demand.
 rpc GetAutokeyConfig(  
 GetAutokeyConfigRequest 
 
) returns (  AutokeyConfig 
 
)
Returns the  AutokeyConfig 
 
for a folder or project.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
- IAM Permissions
-  Requires the following IAM permission on the nameresource:-  cloudkms.autokeyConfigs.get
 For more information, see the IAM documentation . 
-  
 rpc ShowEffectiveAutokeyConfig(  
 ShowEffectiveAutokeyConfigRequest 
 
) returns (  ShowEffectiveAutokeyConfigResponse 
 
)
Returns the effective Cloud KMS Autokey configuration for a given project.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
- IAM Permissions
-  Requires the following IAM permission on the parentresource:-  cloudkms.projects.showEffectiveAutokeyConfig
 For more information, see the IAM documentation . 
-  
 rpc UpdateAutokeyConfig(  
 UpdateAutokeyConfigRequest 
 
) returns (  AutokeyConfig 
 
)
Updates the  AutokeyConfig 
 
for a folder. The caller must have both cloudkms.autokeyConfigs.update 
permission on the parent folder and cloudkms.cryptoKeys.setIamPolicy 
permission on the provided key project. A  KeyHandle 
 
creation in the folder's descendant projects will use this configuration to determine where to create the resulting  CryptoKey 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
- IAM Permissions
-  Requires the following IAM permission on the nameresource:-  cloudkms.autokeyConfigs.update
 For more information, see the IAM documentation . 
-  
EkmService
Google Cloud Key Management EKM Service
Manages external cryptographic keys and operations using those keys. Implements a REST model with the following objects: *  EkmConnection 
 
 rpc CreateEkmConnection(  
 CreateEkmConnectionRequest 
 
) returns (  EkmConnection 
 
)
Creates a new  EkmConnection 
 
in a given Project and Location.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc GetEkmConfig(  
 GetEkmConfigRequest 
 
) returns (  EkmConfig 
 
)
Returns the  EkmConfig 
 
singleton resource for a given project and location.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc GetEkmConnection(  
 GetEkmConnectionRequest 
 
) returns (  EkmConnection 
 
)
Returns metadata for a given  EkmConnection 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc ListEkmConnections(  
 ListEkmConnectionsRequest 
 
) returns (  ListEkmConnectionsResponse 
 
)
Lists  EkmConnections 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc UpdateEkmConfig(  
 UpdateEkmConfigRequest 
 
) returns (  EkmConfig 
 
)
Updates the  EkmConfig 
 
singleton resource for a given project and location.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc UpdateEkmConnection(  
 UpdateEkmConnectionRequest 
 
) returns (  EkmConnection 
 
)
Updates an  EkmConnection 
 
's metadata.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc VerifyConnectivity(  
 VerifyConnectivityRequest 
 
) returns (  VerifyConnectivityResponse 
 
)
Verifies that Cloud KMS can successfully connect to the external key manager specified by an  EkmConnection 
 
. If there is an error connecting to the EKM, this method returns a FAILED_PRECONDITION status containing structured information as described at https://cloud.google.com/kms/docs/reference/ekm_errors 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
KeyAccessJustificationsConfig
Service for managing Key Access Justifications policy settings for Cloud Key Management Service keys.
 rpc GetKeyAccessJustificationsPolicyConfig(  
 GetKeyAccessJustificationsPolicyConfigRequest 
 
) returns (  KeyAccessJustificationsPolicyConfig 
 
)
Gets the  KeyAccessJustificationsPolicyConfig 
 
for a given organization, folder, or project.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc ShowEffectiveKeyAccessJustificationsEnrollmentConfig(  
 ShowEffectiveKeyAccessJustificationsEnrollmentConfigRequest 
 
) returns (  ShowEffectiveKeyAccessJustificationsEnrollmentConfigResponse 
 
)
Returns the  KeyAccessJustificationsEnrollmentConfig 
 
of the resource closest to the given project in hierarchy.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc ShowEffectiveKeyAccessJustificationsPolicyConfig(  
 ShowEffectiveKeyAccessJustificationsPolicyConfigRequest 
 
) returns (  ShowEffectiveKeyAccessJustificationsPolicyConfigResponse 
 
)
Returns the  KeyAccessJustificationsPolicyConfig 
 
of the resource closest to the given project in hierarchy.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc UpdateKeyAccessJustificationsPolicyConfig(  
 UpdateKeyAccessJustificationsPolicyConfigRequest 
 
) returns (  KeyAccessJustificationsPolicyConfig 
 
)
Updates the  KeyAccessJustificationsPolicyConfig 
 
for a given organization, folder, or project.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
KeyManagementService
Google Cloud Key Management Service
Manages cryptographic keys and operations using those keys. Implements a REST model with the following objects:
If you are using manual gRPC libraries, see Using gRPC with Cloud KMS .
 rpc AsymmetricDecrypt(  
 AsymmetricDecryptRequest 
 
) returns (  AsymmetricDecryptResponse 
 
)
Decrypts data that was encrypted with a public key retrieved from  GetPublicKey 
 
corresponding to a  CryptoKeyVersion 
 
with  CryptoKey.purpose 
 
ASYMMETRIC_DECRYPT.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc AsymmetricSign(  
 AsymmetricSignRequest 
 
) returns (  AsymmetricSignResponse 
 
)
Signs data using a  CryptoKeyVersion 
 
with  CryptoKey.purpose 
 
ASYMMETRIC_SIGN, producing a signature that can be verified with the public key retrieved from  GetPublicKey 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc CreateCryptoKey(  
 CreateCryptoKeyRequest 
 
) returns (  CryptoKey 
 
)
Create a new  CryptoKey 
 
within a  KeyRing 
 
.
  CryptoKey.purpose 
 
and  CryptoKey.version_template.algorithm 
 
are required.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc CreateCryptoKeyVersion(  
 CreateCryptoKeyVersionRequest 
 
) returns (  CryptoKeyVersion 
 
)
Create a new  CryptoKeyVersion 
 
in a  CryptoKey 
 
.
The server will assign the next sequential id. If unset,  state 
 
will be set to  ENABLED 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc CreateImportJob(  
 CreateImportJobRequest 
 
) returns (  ImportJob 
 
)
Create a new  ImportJob 
 
within a  KeyRing 
 
.
  ImportJob.import_method 
 
is required.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc CreateKeyRing(  
 CreateKeyRingRequest 
 
) returns (  KeyRing 
 
)
Create a new  KeyRing 
 
in a given Project and Location.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc Decapsulate(  
 DecapsulateRequest 
 
) returns (  DecapsulateResponse 
 
)
Decapsulates data that was encapsulated with a public key retrieved from  GetPublicKey 
 
corresponding to a  CryptoKeyVersion 
 
with  CryptoKey.purpose 
 
KEY_ENCAPSULATION.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc Decrypt(  
 DecryptRequest 
 
) returns (  DecryptResponse 
 
)
Decrypts data that was protected by  Encrypt 
 
. The  CryptoKey.purpose 
 
must be  ENCRYPT_DECRYPT 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc DestroyCryptoKeyVersion(  
 DestroyCryptoKeyVersionRequest 
 
) returns (  CryptoKeyVersion 
 
)
Schedule a  CryptoKeyVersion 
 
for destruction.
Upon calling this method,  CryptoKeyVersion.state 
 
will be set to  DESTROY_SCHEDULED 
 
, and  destroy_time 
 
will be set to the time  destroy_scheduled_duration 
 
in the future. At that time, the  state 
 
will automatically change to  DESTROYED 
 
, and the key material will be irrevocably destroyed.
Before the  destroy_time 
 
is reached,  RestoreCryptoKeyVersion 
 
may be called to reverse the process.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc Encrypt(  
 EncryptRequest 
 
) returns (  EncryptResponse 
 
)
Encrypts data, so that it can only be recovered by a call to  Decrypt 
 
. The  CryptoKey.purpose 
 
must be  ENCRYPT_DECRYPT 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc GenerateRandomBytes(  
 GenerateRandomBytesRequest 
 
) returns (  GenerateRandomBytesResponse 
 
)
Generate random bytes using the Cloud KMS randomness source in the provided location.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc GetCryptoKey(  
 GetCryptoKeyRequest 
 
) returns (  CryptoKey 
 
)
Returns metadata for a given  CryptoKey 
 
, as well as its  primary 
 
  CryptoKeyVersion 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc GetCryptoKeyVersion(  
 GetCryptoKeyVersionRequest 
 
) returns (  CryptoKeyVersion 
 
)
Returns metadata for a given  CryptoKeyVersion 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc GetImportJob(  
 GetImportJobRequest 
 
) returns (  ImportJob 
 
)
Returns metadata for a given  ImportJob 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc GetKeyRing(  
 GetKeyRingRequest 
 
) returns (  KeyRing 
 
)
Returns metadata for a given  KeyRing 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc GetPublicKey(  
 GetPublicKeyRequest 
 
) returns (  PublicKey 
 
)
Returns the public key for the given  CryptoKeyVersion 
 
. The  CryptoKey.purpose 
 
must be  ASYMMETRIC_SIGN 
 
or  ASYMMETRIC_DECRYPT 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc ImportCryptoKeyVersion(  
 ImportCryptoKeyVersionRequest 
 
) returns (  CryptoKeyVersion 
 
)
Import wrapped key material into a  CryptoKeyVersion 
 
.
All requests must specify a  CryptoKey 
 
. If a  CryptoKeyVersion 
 
is additionally specified in the request, key material will be reimported into that version. Otherwise, a new version will be created, and will be assigned the next sequential id within the  CryptoKey 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc ListCryptoKeyVersions(  
 ListCryptoKeyVersionsRequest 
 
) returns (  ListCryptoKeyVersionsResponse 
 
)
Lists  CryptoKeyVersions 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc ListCryptoKeys(  
 ListCryptoKeysRequest 
 
) returns (  ListCryptoKeysResponse 
 
)
Lists  CryptoKeys 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc ListImportJobs(  
 ListImportJobsRequest 
 
) returns (  ListImportJobsResponse 
 
)
Lists  ImportJobs 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc ListKeyRings(  
 ListKeyRingsRequest 
 
) returns (  ListKeyRingsResponse 
 
)
Lists  KeyRings 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc MacSign(  
 MacSignRequest 
 
) returns (  MacSignResponse 
 
)
Signs data using a  CryptoKeyVersion 
 
with  CryptoKey.purpose 
 
MAC, producing a tag that can be verified by another source with the same key.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc MacVerify(  
 MacVerifyRequest 
 
) returns (  MacVerifyResponse 
 
)
Verifies MAC tag using a  CryptoKeyVersion 
 
with  CryptoKey.purpose 
 
MAC, and returns a response that indicates whether or not the verification was successful.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc RawDecrypt(  
 RawDecryptRequest 
 
) returns (  RawDecryptResponse 
 
)
Decrypts data that was originally encrypted using a raw cryptographic mechanism. The  CryptoKey.purpose 
 
must be  RAW_ENCRYPT_DECRYPT 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc RawEncrypt(  
 RawEncryptRequest 
 
) returns (  RawEncryptResponse 
 
)
Encrypts data using portable cryptographic primitives. Most users should choose  Encrypt 
 
and  Decrypt 
 
rather than their raw counterparts. The  CryptoKey.purpose 
 
must be  RAW_ENCRYPT_DECRYPT 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc RestoreCryptoKeyVersion(  
 RestoreCryptoKeyVersionRequest 
 
) returns (  CryptoKeyVersion 
 
)
Restore a  CryptoKeyVersion 
 
in the  DESTROY_SCHEDULED 
 
state.
Upon restoration of the CryptoKeyVersion,  state 
 
will be set to  DISABLED 
 
, and  destroy_time 
 
will be cleared.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc UpdateCryptoKey(  
 UpdateCryptoKeyRequest 
 
) returns (  CryptoKey 
 
)
Update a  CryptoKey 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc UpdateCryptoKeyPrimaryVersion(  
 UpdateCryptoKeyPrimaryVersionRequest 
 
) returns (  CryptoKey 
 
)
Update the version of a  CryptoKey 
 
that will be used in  Encrypt 
 
.
Returns an error if called on a key whose purpose is not  ENCRYPT_DECRYPT 
 
.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
 rpc UpdateCryptoKeyVersion(  
 UpdateCryptoKeyVersionRequest 
 
) returns (  CryptoKeyVersion 
 
)
Update a  CryptoKeyVersion 
 
's metadata.
  state 
 
may be changed between  ENABLED 
 
and  DISABLED 
 
using this method. See  DestroyCryptoKeyVersion 
 
and  RestoreCryptoKeyVersion 
 
to move between other states.
- Authorization scopes
-  Requires one of the following OAuth scopes: -  https://www.googleapis.com/auth/cloudkms
-  https://www.googleapis.com/auth/cloud-platform
 For more information, see the Authentication Overview . 
-  
AccessReason
Describes the reason for a data access. Please refer to https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes for the detailed semantic meaning of justification reason codes.
REASON_UNSPECIFIED 
CUSTOMER_INITIATED_SUPPORT 
GOOGLE_INITIATED_SERVICE 
THIRD_PARTY_DATA_REQUEST 
GOOGLE_INITIATED_REVIEW 
CUSTOMER_INITIATED_ACCESS 
GOOGLE_INITIATED_SYSTEM_OPERATION 
REASON_NOT_EXPECTED 
MODIFIED_CUSTOMER_INITIATED_ACCESS 
Customer uses their account to perform any access to their own data which their IAM policy authorizes, and one of the following is true:
- A Google administrator has reset the root-access account associated with the user's organization within the past 7 days.
- A Google-initiated emergency access operation has interacted with a resource in the same project or folder as the currently accessed resource within the past 7 days.
MODIFIED_GOOGLE_INITIATED_SYSTEM_OPERATION 
Google systems access customer data to help optimize the structure of the data or quality for future uses by the customer, and one of the following is true:
- A Google administrator has reset the root-access account associated with the user's organization within the past 7 days.
- A Google-initiated emergency access operation has interacted with a resource in the same project or folder as the currently accessed resource within the past 7 days.
GOOGLE_RESPONSE_TO_PRODUCTION_ALERT 
CUSTOMER_AUTHORIZED_WORKFLOW_SERVICING 
One of the following operations is being executed while simultaneously encountering an internal technical issue which prevented a more precise justification code from being generated:
- Your account has been used to perform any access to your own data which your IAM policy authorizes.
- An automated Google system operates on encrypted customer data which your IAM policy authorizes.
- Customer-initiated Google support access.
- Google-initiated support access to protect system reliability.
AsymmetricDecryptRequest
Request message for  KeyManagementService.AsymmetricDecrypt 
 
.
name 
 string 
Required. The resource name of the  CryptoKeyVersion 
 
to use for decryption.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.cryptoKeyVersions.useToDecrypt
ciphertext 
 bytes 
Required. The data encrypted with the named  CryptoKeyVersion 
 
's public key using OAEP.
ciphertext_crc32c 
Optional. An optional CRC32C checksum of the  AsymmetricDecryptRequest.ciphertext 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received  AsymmetricDecryptRequest.ciphertext 
 
using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(  AsymmetricDecryptRequest.ciphertext 
 
) is equal to  AsymmetricDecryptRequest.ciphertext_crc32c 
 
, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
AsymmetricDecryptResponse
Response message for  KeyManagementService.AsymmetricDecrypt 
 
.
| Fields | |
|---|---|
| plaintext |   The decrypted data originally encrypted with the matching public key. | 
| plaintext_crc32c | Integrity verification field. A CRC32C checksum of the returned  | 
| verified_ciphertext_crc32c |   Integrity verification field. A flag indicating whether  | 
| protection_level | The  | 
AsymmetricSignRequest
Request message for  KeyManagementService.AsymmetricSign 
 
.
name 
 string 
Required. The resource name of the  CryptoKeyVersion 
 
to use for signing.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.cryptoKeyVersions.useToSign
digest 
Optional. The digest of the data to sign. The digest must be produced with the same digest algorithm as specified by the key version's  algorithm 
 
.
This field may not be supplied if  AsymmetricSignRequest.data 
 
is supplied.
digest_crc32c 
Optional. An optional CRC32C checksum of the  AsymmetricSignRequest.digest 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received  AsymmetricSignRequest.digest 
 
using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(  AsymmetricSignRequest.digest 
 
) is equal to  AsymmetricSignRequest.digest_crc32c 
 
, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
data 
 bytes 
Optional. The data to sign. It can't be supplied if  AsymmetricSignRequest.digest 
 
is supplied.
data_crc32c 
Optional. An optional CRC32C checksum of the  AsymmetricSignRequest.data 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received  AsymmetricSignRequest.data 
 
using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(  AsymmetricSignRequest.data 
 
) is equal to  AsymmetricSignRequest.data_crc32c 
 
, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
AsymmetricSignResponse
Response message for  KeyManagementService.AsymmetricSign 
 
.
| Fields | |
|---|---|
| signature |   The created signature. | 
| signature_crc32c | Integrity verification field. A CRC32C checksum of the returned  | 
| verified_digest_crc32c |   Integrity verification field. A flag indicating whether  | 
| name |   The resource name of the  | 
| verified_data_crc32c |   Integrity verification field. A flag indicating whether  | 
| protection_level | The  | 
AutokeyConfig
Cloud KMS Autokey configuration for a folder or project.
| Fields | |
|---|---|
| name |   Identifier. Name of the  | 
| key_project |   Optional. Name of the key project, e.g.  | 
| state | Output only. The state for the AutokeyConfig. | 
| etag |   Optional. A checksum computed by the server based on the value of other fields. This may be sent on update requests to ensure that the client has an up-to-date value before proceeding. The request will be rejected with an ABORTED error on a mismatched etag. | 
State
The states AutokeyConfig can be in.
| Enums | |
|---|---|
| STATE_UNSPECIFIED | The state of the AutokeyConfig is unspecified. | 
| ACTIVE | The AutokeyConfig is currently active. | 
| KEY_PROJECT_DELETED | A previously configured key project has been deleted and the current AutokeyConfig is unusable. | 
| UNINITIALIZED | The AutokeyConfig is not yet initialized or has been reset to its default uninitialized state. | 
Certificate
A  Certificate 
 
represents an X.509 certificate used to authenticate HTTPS connections to EKM replicas.
| Fields | |
|---|---|
| raw_der |   Required. The raw certificate bytes in DER format. | 
| parsed |   Output only. True if the certificate was parsed successfully. | 
| issuer |   Output only. The issuer distinguished name in RFC 2253 format. Only present if  | 
| subject |   Output only. The subject distinguished name in RFC 2253 format. Only present if  | 
| subject_alternative_dns_names[] |   Output only. The subject Alternative DNS names. Only present if  | 
| not_before_time | Output only. The certificate is not valid before this time. Only present if  | 
| not_after_time | Output only. The certificate is not valid after this time. Only present if  | 
| serial_number |   Output only. The certificate serial number as a hex string. Only present if  | 
| sha256_fingerprint |   Output only. The SHA-256 certificate fingerprint as a hex string. Only present if  | 
ChecksummedData
Data with integrity verification field.
| Fields | |
|---|---|
| data |   Raw Data. | 
| crc32c_checksum | Integrity verification field. A CRC32C checksum of the returned  | 
CreateCryptoKeyRequest
Request message for  KeyManagementService.CreateCryptoKey 
 
.
parent 
 string 
Required. The  name 
 
of the KeyRing associated with the  CryptoKeys 
 
.
Authorization requires the following IAM 
permission on the specified resource parent 
:
-  cloudkms.cryptoKeys.create
crypto_key_id 
 string 
Required. It must be unique within a KeyRing and match the regular expression [a-zA-Z0-9_-]{1,63} 
skip_initial_version_creation 
 bool 
If set to true, the request will create a  CryptoKey 
 
without any  CryptoKeyVersions 
 
. You must manually call  CreateCryptoKeyVersion 
 
or  ImportCryptoKeyVersion 
 
before you can use this  CryptoKey 
 
.
CreateCryptoKeyVersionRequest
Request message for  KeyManagementService.CreateCryptoKeyVersion 
 
.
parent 
 string 
Required. The  name 
 
of the  CryptoKey 
 
associated with the  CryptoKeyVersions 
 
.
Authorization requires the following IAM 
permission on the specified resource parent 
:
-  cloudkms.cryptoKeyVersions.create
crypto_key_version 
Required. A  CryptoKeyVersion 
 
with initial field values.
CreateEkmConnectionRequest
Request message for  EkmService.CreateEkmConnection 
 
.
parent 
 string 
Required. The resource name of the location associated with the  EkmConnection 
 
, in the format projects/*/locations/* 
.
Authorization requires the following IAM 
permission on the specified resource parent 
:
-  cloudkms.ekmConnections.create
ekm_connection_id 
 string 
Required. It must be unique within a location and match the regular expression [a-zA-Z0-9_-]{1,63} 
.
ekm_connection 
Required. An  EkmConnection 
 
with initial field values.
CreateImportJobRequest
Request message for  KeyManagementService.CreateImportJob 
 
.
parent 
 string 
Required. The  name 
 
of the  KeyRing 
 
associated with the  ImportJobs 
 
.
Authorization requires the following IAM 
permission on the specified resource parent 
:
-  cloudkms.importJobs.create
import_job_id 
 string 
Required. It must be unique within a KeyRing and match the regular expression [a-zA-Z0-9_-]{1,63} 
CreateKeyHandleMetadata
This type has no fields.
Metadata message for  CreateKeyHandle 
 
long-running operation response.
CreateKeyHandleRequest
Request message for  Autokey.CreateKeyHandle 
 
.
| Fields | |
|---|---|
| parent |   Required. Name of the resource project and location to create the  | 
| key_handle_id |   Optional. Id of the  | 
| key_handle | Required.  | 
CreateKeyRingRequest
Request message for  KeyManagementService.CreateKeyRing 
 
.
parent 
key_ring_id 
 string 
Required. It must be unique within a location and match the regular expression [a-zA-Z0-9_-]{1,63} 
CryptoKey
A  CryptoKey 
 
represents a logical key that can be used for cryptographic operations.
A  CryptoKey 
 
is made up of zero or more  versions 
 
, which represent the actual key material used in cryptographic operations.
name 
 string 
Output only. The resource name for this  CryptoKey 
 
in the format projects/*/locations/*/keyRings/*/cryptoKeys/* 
.
primary 
Output only. A copy of the "primary"  CryptoKeyVersion 
 
that will be used by  Encrypt 
 
when this  CryptoKey 
 
is given in  EncryptRequest.name 
 
.
The  CryptoKey 
 
's primary version can be updated via  UpdateCryptoKeyPrimaryVersion 
 
.
Keys with  purpose 
 
  ENCRYPT_DECRYPT 
 
may have a primary. For other keys, this field will be omitted.
purpose 
Immutable. The immutable purpose of this  CryptoKey 
 
.
next_rotation_time 
At  next_rotation_time 
 
, the Key Management Service will automatically:
- Create a new version of this CryptoKey.
- Mark the new version as primary.
Key rotations performed manually via  CreateCryptoKeyVersion 
 
and  UpdateCryptoKeyPrimaryVersion 
 
do not affect  next_rotation_time 
 
.
Keys with  purpose 
 
  ENCRYPT_DECRYPT 
 
support automatic rotation. For other keys, this field must be omitted.
version_template 
A template describing settings for new  CryptoKeyVersion 
 
instances. The properties of new  CryptoKeyVersion 
 
instances created by either  CreateCryptoKeyVersion 
 
or auto-rotation are controlled by this template.
labels 
 map<string, string> 
Labels with user-defined metadata. For more information, see Labeling Keys .
import_only 
 bool 
Immutable. Whether this key may contain imported versions only.
destroy_scheduled_duration 
Immutable. The period of time that versions of this key spend in the  DESTROY_SCHEDULED 
 
state before transitioning to  DESTROYED 
 
. If not specified at creation time, the default duration is 30 days.
crypto_key_backend 
 string 
Immutable. The resource name of the backend environment where the key material for all  CryptoKeyVersions 
 
associated with this  CryptoKey 
 
reside and where all related cryptographic operations are performed. Only applicable if  CryptoKeyVersions 
 
have a  ProtectionLevel 
 
of  EXTERNAL_VPC 
 
, with the resource name in the format projects/*/locations/*/ekmConnections/* 
. Note, this list is non-exhaustive and may apply to additional  ProtectionLevels 
 
in the future.
key_access_justifications_policy 
Optional. The policy used for Key Access Justifications Policy Enforcement. If this field is present and this key is enrolled in Key Access Justifications Policy Enforcement, the policy will be evaluated in encrypt, decrypt, and sign operations, and the operation will fail if rejected by the policy. The policy is defined by specifying zero or more allowed justification codes. https://cloud.google.com/assured-workloads/key-access-justifications/docs/justification-codes By default, this field is absent, and all justification codes are allowed.
rotation_schedule 
. Controls the rate of automatic rotation. rotation_schedule 
can be only one of the following:rotation_period 
  next_rotation_time 
 
will be advanced by this period when the service automatically rotates a key. Must be at least 24 hours and at most 876,000 hours.
If  rotation_period 
 
is set,  next_rotation_time 
 
must also be set.
Keys with  purpose 
 
  ENCRYPT_DECRYPT 
 
support automatic rotation. For other keys, this field must be omitted.
CryptoKeyPurpose
  CryptoKeyPurpose 
 
describes the cryptographic capabilities of a  CryptoKey 
 
. A given key can only be used for the operations allowed by its purpose. For more information, see Key purposes 
.
| Enums | |
|---|---|
| CRYPTO_KEY_PURPOSE_UNSPECIFIED | Not specified. | 
| ENCRYPT_DECRYPT |  CryptoKeys 
with this purpose may be used with Encrypt 
and Decrypt 
. | 
| ASYMMETRIC_SIGN |  CryptoKeys 
with this purpose may be used with AsymmetricSign 
and GetPublicKey 
. | 
| ASYMMETRIC_DECRYPT |  CryptoKeys 
with this purpose may be used with AsymmetricDecrypt 
and GetPublicKey 
. | 
| RAW_ENCRYPT_DECRYPT |  CryptoKeys 
with this purpose may be used with RawEncrypt 
and RawDecrypt 
. This purpose is meant to be used for interoperable symmetric encryption and does not support automatic CryptoKey rotation. | 
| MAC |  CryptoKeys 
with this purpose may be used with MacSign 
. | 
| KEY_ENCAPSULATION |  CryptoKeys 
with this purpose may be used with GetPublicKey 
and Decapsulate 
. | 
CryptoKeyVersion
A  CryptoKeyVersion 
 
represents an individual cryptographic key, and the associated key material.
An  ENABLED 
 
version can be used for cryptographic operations.
For security reasons, the raw cryptographic key material represented by a  CryptoKeyVersion 
 
can never be viewed or exported. It can only be used to encrypt, decrypt, or sign data when an authorized user or application invokes Cloud KMS.
| Fields | |
|---|---|
| name |   Output only. The resource name for this  | 
| state | The current state of the  | 
| protection_level | Output only. The  | 
| algorithm | Output only. The  | 
| attestation | Output only. Statement that was generated and signed by the HSM at key creation time. Use this statement to verify attributes of the key as stored on the HSM, independently of Google. Only provided for key versions with  | 
| create_time | Output only. The time at which this  | 
| generate_time | Output only. The time this  | 
| destroy_time | Output only. The time this  | 
| destroy_event_time | Output only. The time this CryptoKeyVersion's key material was destroyed. Only present if  | 
| import_job |   Output only. The name of the  | 
| import_time | Output only. The time at which this  | 
| import_failure_reason |   Output only. The root cause of the most recent import failure. Only present if  | 
| generation_failure_reason |   Output only. The root cause of the most recent generation failure. Only present if  | 
| external_destruction_failure_reason |   Output only. The root cause of the most recent external destruction failure. Only present if  | 
| external_protection_level_options |   ExternalProtectionLevelOptions stores a group of additional fields for configuring a  | 
| reimport_eligible |   Output only. Whether or not this key version is eligible for reimport, by being specified as a target in  | 
CryptoKeyVersionAlgorithm
The algorithm of the  CryptoKeyVersion 
 
, indicating what parameters must be used for each cryptographic operation.
The  GOOGLE_SYMMETRIC_ENCRYPTION 
 
algorithm is usable with  CryptoKey.purpose 
 
  ENCRYPT_DECRYPT 
 
.
Algorithms beginning with RSA_SIGN_ 
are usable with  CryptoKey.purpose 
 
  ASYMMETRIC_SIGN 
 
.
The fields in the name after RSA_SIGN_ 
correspond to the following parameters: padding algorithm, modulus bit length, and digest algorithm.
For PSS, the salt length used is equal to the length of digest algorithm. For example,  RSA_SIGN_PSS_2048_SHA256 
 
will use PSS with a salt length of 256 bits or 32 bytes.
Algorithms beginning with RSA_DECRYPT_ 
are usable with  CryptoKey.purpose 
 
  ASYMMETRIC_DECRYPT 
 
.
The fields in the name after RSA_DECRYPT_ 
correspond to the following parameters: padding algorithm, modulus bit length, and digest algorithm.
Algorithms beginning with EC_SIGN_ 
are usable with  CryptoKey.purpose 
 
  ASYMMETRIC_SIGN 
 
.
The fields in the name after EC_SIGN_ 
correspond to the following parameters: elliptic curve, digest algorithm.
Algorithms beginning with HMAC_ 
are usable with  CryptoKey.purpose 
 
  MAC 
 
.
The suffix following HMAC_ 
corresponds to the hash algorithm being used (eg. SHA256).
Algorithms beginning with PQ_ 
are post-quantum.
For more information, see Key purposes and algorithms .
| Enums | |
|---|---|
| CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED | Not specified. | 
| GOOGLE_SYMMETRIC_ENCRYPTION | Creates symmetric encryption keys. | 
| AES_128_GCM | AES-GCM (Galois Counter Mode) using 128-bit keys. | 
| AES_256_GCM | AES-GCM (Galois Counter Mode) using 256-bit keys. | 
| AES_128_CBC | AES-CBC (Cipher Block Chaining Mode) using 128-bit keys. | 
| AES_256_CBC | AES-CBC (Cipher Block Chaining Mode) using 256-bit keys. | 
| AES_128_CTR | AES-CTR (Counter Mode) using 128-bit keys. | 
| AES_256_CTR | AES-CTR (Counter Mode) using 256-bit keys. | 
| RSA_SIGN_PSS_2048_SHA256 | RSASSA-PSS 2048 bit key with a SHA256 digest. | 
| RSA_SIGN_PSS_3072_SHA256 | RSASSA-PSS 3072 bit key with a SHA256 digest. | 
| RSA_SIGN_PSS_4096_SHA256 | RSASSA-PSS 4096 bit key with a SHA256 digest. | 
| RSA_SIGN_PSS_4096_SHA512 | RSASSA-PSS 4096 bit key with a SHA512 digest. | 
| RSA_SIGN_PKCS1_2048_SHA256 | RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest. | 
| RSA_SIGN_PKCS1_3072_SHA256 | RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest. | 
| RSA_SIGN_PKCS1_4096_SHA256 | RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest. | 
| RSA_SIGN_PKCS1_4096_SHA512 | RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest. | 
| RSA_SIGN_RAW_PKCS1_2048 | RSASSA-PKCS1-v1_5 signing without encoding, with a 2048 bit key. | 
| RSA_SIGN_RAW_PKCS1_3072 | RSASSA-PKCS1-v1_5 signing without encoding, with a 3072 bit key. | 
| RSA_SIGN_RAW_PKCS1_4096 | RSASSA-PKCS1-v1_5 signing without encoding, with a 4096 bit key. | 
| RSA_DECRYPT_OAEP_2048_SHA256 | RSAES-OAEP 2048 bit key with a SHA256 digest. | 
| RSA_DECRYPT_OAEP_3072_SHA256 | RSAES-OAEP 3072 bit key with a SHA256 digest. | 
| RSA_DECRYPT_OAEP_4096_SHA256 | RSAES-OAEP 4096 bit key with a SHA256 digest. | 
| RSA_DECRYPT_OAEP_4096_SHA512 | RSAES-OAEP 4096 bit key with a SHA512 digest. | 
| RSA_DECRYPT_OAEP_2048_SHA1 | RSAES-OAEP 2048 bit key with a SHA1 digest. | 
| RSA_DECRYPT_OAEP_3072_SHA1 | RSAES-OAEP 3072 bit key with a SHA1 digest. | 
| RSA_DECRYPT_OAEP_4096_SHA1 | RSAES-OAEP 4096 bit key with a SHA1 digest. | 
| EC_SIGN_P256_SHA256 | ECDSA on the NIST P-256 curve with a SHA256 digest. Other hash functions can also be used: https://cloud.google.com/kms/docs/create-validate-signatures#ecdsa_support_for_other_hash_algorithms | 
| EC_SIGN_P384_SHA384 | ECDSA on the NIST P-384 curve with a SHA384 digest. Other hash functions can also be used: https://cloud.google.com/kms/docs/create-validate-signatures#ecdsa_support_for_other_hash_algorithms | 
| EC_SIGN_SECP256K1_SHA256 | ECDSA on the non-NIST secp256k1 curve. This curve is only supported for HSM protection level. Other hash functions can also be used: https://cloud.google.com/kms/docs/create-validate-signatures#ecdsa_support_for_other_hash_algorithms | 
| EC_SIGN_ED25519 | EdDSA on the Curve25519 in pure mode (taking data as input). | 
| HMAC_SHA256 | HMAC-SHA256 signing with a 256 bit key. | 
| HMAC_SHA1 | HMAC-SHA1 signing with a 160 bit key. | 
| HMAC_SHA384 | HMAC-SHA384 signing with a 384 bit key. | 
| HMAC_SHA512 | HMAC-SHA512 signing with a 512 bit key. | 
| HMAC_SHA224 | HMAC-SHA224 signing with a 224 bit key. | 
| EXTERNAL_SYMMETRIC_ENCRYPTION | Algorithm representing symmetric encryption by an external key manager. | 
| ML_KEM_768 | ML-KEM-768 (FIPS 203) | 
| ML_KEM_1024 | ML-KEM-1024 (FIPS 203) | 
| KEM_XWING | X-Wing hybrid KEM combining ML-KEM-768 with X25519. | 
| PQ_SIGN_ML_DSA_65 | The post-quantum Module-Lattice-Based Digital Signature Algorithm, at security level 3. Randomized version. | 
| PQ_SIGN_SLH_DSA_SHA2_128S | The post-quantum stateless hash-based digital signature algorithm, at security level 1. Randomized version. | 
| PQ_SIGN_HASH_SLH_DSA_SHA2_128S_SHA256 | The post-quantum stateless hash-based digital signature algorithm, at security level 1. Randomized pre-hash version supporting SHA256 digests. | 
CryptoKeyVersionState
The state of a  CryptoKeyVersion 
 
, indicating if it can be used.
| Enums | |
|---|---|
| CRYPTO_KEY_VERSION_STATE_UNSPECIFIED | Not specified. | 
| PENDING_GENERATION | This version is still being generated. It may not be used, enabled, disabled, or destroyed yet. Cloud KMS will automatically mark this version  ENABLED 
as soon as the version is ready. | 
| ENABLED | This version may be used for cryptographic operations. | 
| DISABLED | This version may not be used, but the key material is still available, and the version can be placed back into the  ENABLED 
state. | 
| DESTROYED | The key material of this version is destroyed and no longer stored. This version may only become  ENABLED 
again if this version is reimport_eligible 
and the original key material is reimported with a call to KeyManagementService.ImportCryptoKeyVersion 
. | 
| DESTROY_SCHEDULED | This version is scheduled for destruction, and will be destroyed soon. Call  RestoreCryptoKeyVersion 
to put it back into the DISABLED 
state. | 
| PENDING_IMPORT | This version is still being imported. It may not be used, enabled, disabled, or destroyed yet. Cloud KMS will automatically mark this version  ENABLED 
as soon as the version is ready. | 
| IMPORT_FAILED | This version was not imported successfully. It may not be used, enabled, disabled, or destroyed. The submitted key material has been discarded. Additional details can be found in  CryptoKeyVersion.import_failure_reason 
. | 
| GENERATION_FAILED | This version was not generated successfully. It may not be used, enabled, disabled, or destroyed. Additional details can be found in  CryptoKeyVersion.generation_failure_reason 
. | 
| PENDING_EXTERNAL_DESTRUCTION | This version was destroyed, and it may not be used or enabled again. Cloud KMS is waiting for the corresponding key material residing in an external key manager to be destroyed. | 
| EXTERNAL_DESTRUCTION_FAILED | This version was destroyed, and it may not be used or enabled again. However, Cloud KMS could not confirm that the corresponding key material residing in an external key manager was destroyed. Additional details can be found in  CryptoKeyVersion.external_destruction_failure_reason 
. | 
CryptoKeyVersionView
A view for  CryptoKeyVersion 
 
s. Controls the level of detail returned for  CryptoKeyVersions 
 
in  KeyManagementService.ListCryptoKeyVersions 
 
and  KeyManagementService.ListCryptoKeys 
 
.
| Enums | |
|---|---|
| CRYPTO_KEY_VERSION_VIEW_UNSPECIFIED | Default view for each  CryptoKeyVersion 
. Does not include the attestation 
field. | 
| FULL | Provides all fields in each  CryptoKeyVersion 
, including the attestation 
. | 
CryptoKeyVersionTemplate
A  CryptoKeyVersionTemplate 
 
specifies the properties to use when creating a new  CryptoKeyVersion 
 
, either manually with  CreateCryptoKeyVersion 
 
or automatically as a result of auto-rotation.
| Fields | |
|---|---|
| protection_level |   | 
| algorithm | Required.  For backwards compatibility, GOOGLE_SYMMETRIC_ENCRYPTION is implied if both this field is omitted and  | 
DecapsulateRequest
Request message for  KeyManagementService.Decapsulate 
 
.
name 
 string 
Required. The resource name of the  CryptoKeyVersion 
 
to use for decapsulation.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.cryptoKeyVersions.useToDecapsulate
ciphertext 
 bytes 
Required. The ciphertext produced from encapsulation with the named  CryptoKeyVersion 
 
public key(s).
ciphertext_crc32c 
Optional. A CRC32C checksum of the  DecapsulateRequest.ciphertext 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received  DecapsulateRequest.ciphertext 
 
using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(  DecapsulateRequest.ciphertext 
 
) is equal to  DecapsulateRequest.ciphertext_crc32c 
 
, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
DecapsulateResponse
Response message for  KeyManagementService.Decapsulate 
 
.
| Fields | |
|---|---|
| name |   The resource name of the  | 
| shared_secret |   The decapsulated shared_secret originally encapsulated with the matching public key. | 
| verified_ciphertext_crc32c |   Integrity verification field. A flag indicating whether  | 
| protection_level | The  | 
| shared_secret_crc32c |   Integrity verification field. A CRC32C checksum of the returned  | 
DecryptRequest
Request message for  KeyManagementService.Decrypt 
 
.
name 
ciphertext 
 bytes 
Required. The encrypted data originally returned in  EncryptResponse.ciphertext 
 
.
additional_authenticated_data 
 bytes 
Optional. Optional data that must match the data originally supplied in  EncryptRequest.additional_authenticated_data 
 
.
ciphertext_crc32c 
Optional. An optional CRC32C checksum of the  DecryptRequest.ciphertext 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received  DecryptRequest.ciphertext 
 
using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(  DecryptRequest.ciphertext 
 
) is equal to  DecryptRequest.ciphertext_crc32c 
 
, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
additional_authenticated_data_crc32c 
Optional. An optional CRC32C checksum of the  DecryptRequest.additional_authenticated_data 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received  DecryptRequest.additional_authenticated_data 
 
using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(  DecryptRequest.additional_authenticated_data 
 
) is equal to  DecryptRequest.additional_authenticated_data_crc32c 
 
, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
DecryptResponse
Response message for  KeyManagementService.Decrypt 
 
.
| Fields | |
|---|---|
| plaintext |   The decrypted data originally supplied in  | 
| plaintext_crc32c | Integrity verification field. A CRC32C checksum of the returned  | 
| used_primary |   Whether the Decryption was performed using the primary key version. | 
| protection_level | The  | 
DestroyCryptoKeyVersionRequest
Request message for  KeyManagementService.DestroyCryptoKeyVersion 
 
.
name 
 string 
Required. The resource name of the  CryptoKeyVersion 
 
to destroy.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.cryptoKeyVersions.destroy
Digest
A  Digest 
 
holds a cryptographic message digest.
digest 
. Required. The message digest. digest 
can be only one of the following:sha256 
 bytes 
A message digest produced with the SHA-256 algorithm.
sha384 
 bytes 
A message digest produced with the SHA-384 algorithm.
sha512 
 bytes 
A message digest produced with the SHA-512 algorithm.
EkmConfig
An  EkmConfig 
 
is a singleton resource that represents configuration parameters that apply to all  CryptoKeys 
 
and  CryptoKeyVersions 
 
with a  ProtectionLevel 
 
of  EXTERNAL_VPC 
 
in a given project and location.
| Fields | |
|---|---|
| name |   Output only. The resource name for the  | 
| default_ekm_connection |   Optional. Resource name of the default  | 
EkmConnection
An  EkmConnection 
 
represents an individual EKM connection. It can be used for creating  CryptoKeys 
 
and  CryptoKeyVersions 
 
with a  ProtectionLevel 
 
of  EXTERNAL_VPC 
 
, as well as performing cryptographic operations using keys created within the  EkmConnection 
 
.
| Fields | |
|---|---|
| name |   Output only. The resource name for the  | 
| create_time | Output only. The time at which the  | 
| service_resolvers[] | Optional. A list of  | 
| etag |   Optional. Etag of the currently stored  | 
| key_management_mode | Optional. Describes who can perform control plane operations on the EKM. If unset, this defaults to  | 
| crypto_space_path |   Optional. Identifies the EKM Crypto Space that this  | 
KeyManagementMode
  KeyManagementMode 
 
describes who can perform control plane cryptographic operations using this  EkmConnection 
 
.
KEY_MANAGEMENT_MODE_UNSPECIFIED 
MANUAL 
 CryptoKeys 
 
created with this  EkmConnection 
 
must be initiated from the EKM directly and cannot be performed from Cloud KMS. This means that: * When creating a  CryptoKeyVersion 
 
associated with this  EkmConnection 
 
, the caller must supply the key path of pre-existing  external key material that will be linked to the  CryptoKeyVersion 
 
. * Destruction of external key material cannot be requested via the  Cloud KMS API and must be performed directly in the EKM. * Automatic rotation of key material is not supported.CLOUD_KMS 
All  CryptoKeys 
 
created with this  EkmConnection 
 
use EKM-side key management operations initiated from Cloud KMS. This means that:
- When a CryptoKeyVersionassociated with thisEkmConnectionis created, the EKM automatically generates new key material and a new key path. The caller cannot supply the key path of pre-existing external key material.
- Destruction of external key material associated with this EkmConnectioncan be requested by callingDestroyCryptoKeyVersion.
- Automatic rotation of key material is supported.
ServiceResolver
A  ServiceResolver 
 
represents an EKM replica that can be reached within an  EkmConnection 
 
.
| Fields | |
|---|---|
| service_directory_service |   Required. The resource name of the Service Directory service pointing to an EKM replica, in the format  | 
| endpoint_filter |   Optional. The filter applied to the endpoints of the resolved service. If no filter is specified, all endpoints will be considered. An endpoint will be chosen arbitrarily from the filtered list for each request. For endpoint filter syntax and examples, see https://cloud.google.com/service-directory/docs/reference/rpc/google.cloud.servicedirectory.v1#resolveservicerequest . | 
| hostname |   Required. The hostname of the EKM replica used at TLS and HTTP layers. | 
| server_certificates[] | Required. A list of leaf server certificates used to authenticate HTTPS connections to the EKM replica. Currently, a maximum of 10  | 
EncryptRequest
Request message for  KeyManagementService.Encrypt 
 
.
name 
 string 
Required. The resource name of the  CryptoKey 
 
or  CryptoKeyVersion 
 
to use for encryption.
If a  CryptoKey 
 
is specified, the server will use its  primary version 
 
.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.cryptoKeyVersions.useToEncrypt
plaintext 
 bytes 
Required. The data to encrypt. Must be no larger than 64KiB.
The maximum size depends on the key version's  protection_level 
 
. For  SOFTWARE 
 
,  EXTERNAL 
 
, and  EXTERNAL_VPC 
 
keys, the plaintext must be no larger than 64KiB. For  HSM 
 
keys, the combined length of the plaintext and additional_authenticated_data fields must be no larger than 8KiB.
additional_authenticated_data 
 bytes 
Optional. Optional data that, if specified, must also be provided during decryption through  DecryptRequest.additional_authenticated_data 
 
.
The maximum size depends on the key version's  protection_level 
 
. For  SOFTWARE 
 
,  EXTERNAL 
 
, and  EXTERNAL_VPC 
 
keys the AAD must be no larger than 64KiB. For  HSM 
 
keys, the combined length of the plaintext and additional_authenticated_data fields must be no larger than 8KiB.
plaintext_crc32c 
Optional. An optional CRC32C checksum of the  EncryptRequest.plaintext 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received  EncryptRequest.plaintext 
 
using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(  EncryptRequest.plaintext 
 
) is equal to  EncryptRequest.plaintext_crc32c 
 
, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
additional_authenticated_data_crc32c 
Optional. An optional CRC32C checksum of the  EncryptRequest.additional_authenticated_data 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received  EncryptRequest.additional_authenticated_data 
 
using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(  EncryptRequest.additional_authenticated_data 
 
) is equal to  EncryptRequest.additional_authenticated_data_crc32c 
 
, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
EncryptResponse
Response message for  KeyManagementService.Encrypt 
 
.
| Fields | |
|---|---|
| name |   The resource name of the  | 
| ciphertext |   The encrypted data. | 
| ciphertext_crc32c | Integrity verification field. A CRC32C checksum of the returned  | 
| verified_plaintext_crc32c |   Integrity verification field. A flag indicating whether  | 
| verified_additional_authenticated_data_crc32c |   Integrity verification field. A flag indicating whether  | 
| protection_level | The  | 
ExternalProtectionLevelOptions
ExternalProtectionLevelOptions stores a group of additional fields for configuring a  CryptoKeyVersion 
 
that are specific to the  EXTERNAL 
 
protection level and  EXTERNAL_VPC 
 
protection levels.
| Fields | |
|---|---|
| external_key_uri |   The URI for an external resource that this  | 
| ekm_connection_key_path |   The path to the external key material on the EKM when using  | 
GenerateRandomBytesRequest
Request message for  KeyManagementService.GenerateRandomBytes 
 
.
| Fields | |
|---|---|
| location |   The project-specific location in which to generate random bytes. For example, "projects/my-project/locations/us-central1". | 
| length_bytes |   The length in bytes of the amount of randomness to retrieve. Minimum 8 bytes, maximum 1024 bytes. | 
| protection_level | The  | 
GenerateRandomBytesResponse
Response message for  KeyManagementService.GenerateRandomBytes 
 
.
| Fields | |
|---|---|
| data |   The generated data. | 
| data_crc32c | Integrity verification field. A CRC32C checksum of the returned  | 
GetAutokeyConfigRequest
Request message for  GetAutokeyConfig 
 
.
| Fields | |
|---|---|
| name |   Required. Name of the  | 
GetCryptoKeyRequest
Request message for  KeyManagementService.GetCryptoKey 
 
.
GetCryptoKeyVersionRequest
Request message for  KeyManagementService.GetCryptoKeyVersion 
 
.
name 
 string 
Required. The  name 
 
of the  CryptoKeyVersion 
 
to get.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.cryptoKeyVersions.get
GetEkmConfigRequest
Request message for  EkmService.GetEkmConfig 
 
.
GetEkmConnectionRequest
Request message for  EkmService.GetEkmConnection 
 
.
name 
 string 
Required. The  name 
 
of the  EkmConnection 
 
to get.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.ekmConnections.get
GetImportJobRequest
Request message for  KeyManagementService.GetImportJob 
 
.
GetKeyAccessJustificationsPolicyConfigRequest
Request message for  KeyAccessJustificationsConfig.GetKeyAccessJustificationsPolicyConfig 
 
.
| Fields | |
|---|---|
| name |   Required. The  | 
GetKeyHandleRequest
Request message for  GetKeyHandle 
 
.
| Fields | |
|---|---|
| name |   Required. Name of the  | 
GetKeyRingRequest
Request message for  KeyManagementService.GetKeyRing 
 
.
GetPublicKeyRequest
Request message for  KeyManagementService.GetPublicKey 
 
.
name 
 string 
Required. The  name 
 
of the  CryptoKeyVersion 
 
public key to get.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.cryptoKeyVersions.viewPublicKey
public_key_format 
Optional. The  PublicKey 
 
format specified by the user. This field is required for PQC algorithms. If specified, the public key will be exported through the  public_key 
 
field in the requested format. Otherwise, the  pem 
 
field will be populated for non-PQC algorithms, and an error will be returned for PQC algorithms.
ImportCryptoKeyVersionRequest
Request message for  KeyManagementService.ImportCryptoKeyVersion 
 
.
parent 
 string 
Required. The  name 
 
of the  CryptoKey 
 
to be imported into.
The create permission is only required on this key when creating a new  CryptoKeyVersion 
 
.
Authorization requires the following IAM 
permission on the specified resource parent 
:
-  cloudkms.cryptoKeyVersions.create
crypto_key_version 
 string 
Optional. The optional  name 
 
of an existing  CryptoKeyVersion 
 
to target for an import operation. If this field is not present, a new  CryptoKeyVersion 
 
containing the supplied key material is created.
If this field is present, the supplied key material is imported into the existing  CryptoKeyVersion 
 
. To import into an existing  CryptoKeyVersion 
 
, the  CryptoKeyVersion 
 
must be a child of  ImportCryptoKeyVersionRequest.parent 
 
, have been previously created via  ImportCryptoKeyVersion 
 
, and be in  DESTROYED 
 
or  IMPORT_FAILED 
 
state. The key material and algorithm must match the previous  CryptoKeyVersion 
 
exactly if the  CryptoKeyVersion 
 
has ever contained key material.
Authorization requires the following IAM 
permission on the specified resource cryptoKeyVersion 
:
-  cloudkms.cryptoKeyVersions.update
algorithm 
Required. The  algorithm 
 
of the key being imported. This does not need to match the  version_template 
 
of the  CryptoKey 
 
this version imports into.
import_job 
wrapped_key 
 bytes 
Optional. The wrapped key material to import.
Before wrapping, key material must be formatted. If importing symmetric key material, the expected key material format is plain bytes. If importing asymmetric key material, the expected key material format is PKCS#8-encoded DER (the PrivateKeyInfo structure from RFC 5208).
When wrapping with import methods (  RSA_OAEP_3072_SHA1_AES_256 
 
or  RSA_OAEP_4096_SHA1_AES_256 
 
or  RSA_OAEP_3072_SHA256_AES_256 
 
or  RSA_OAEP_4096_SHA256_AES_256 
 
),
this field must contain the concatenation of:
- An ephemeral AES-256 wrapping key wrapped with the public_keyusing RSAES-OAEP with SHA-1/SHA-256, MGF1 with SHA-1/SHA-256, and an empty label.
- The formatted key to be imported, wrapped with the ephemeral AES-256 key using AES-KWP (RFC 5649).
This format is the same as the format produced by PKCS#11 mechanism CKM_RSA_AES_KEY_WRAP.
When wrapping with import methods (  RSA_OAEP_3072_SHA256 
 
or  RSA_OAEP_4096_SHA256 
 
),
this field must contain the formatted key to be imported, wrapped with the  public_key 
 
using RSAES-OAEP with SHA-256, MGF1 with SHA-256, and an empty label.
wrapped_key_material 
. This field is legacy. Use the field  wrapped_key 
 
instead. wrapped_key_material 
can be only one of the following:rsa_aes_wrapped_key 
 bytes 
Optional. This field has the same meaning as  wrapped_key 
 
. Prefer to use that field in new work. Either that field or this field (but not both) must be specified.
ImportJob
An  ImportJob 
 
can be used to create  CryptoKeys 
 
and  CryptoKeyVersions 
 
using pre-existing key material, generated outside of Cloud KMS.
When an  ImportJob 
 
is created, Cloud KMS will generate a "wrapping key", which is a public/private key pair. You use the wrapping key to encrypt (also known as wrap) the pre-existing key material to protect it during the import process. The nature of the wrapping key depends on the choice of  import_method 
 
. When the wrapping key generation is complete, the  state 
 
will be set to  ACTIVE 
 
and the  public_key 
 
can be fetched. The fetched public key can then be used to wrap your pre-existing key material.
Once the key material is wrapped, it can be imported into a new  CryptoKeyVersion 
 
in an existing  CryptoKey 
 
by calling  ImportCryptoKeyVersion 
 
. Multiple  CryptoKeyVersions 
 
can be imported with a single  ImportJob 
 
. Cloud KMS uses the private key portion of the wrapping key to unwrap the key material. Only Cloud KMS has access to the private key.
An  ImportJob 
 
expires 3 days after it is created. Once expired, Cloud KMS will no longer be able to import or unwrap any key material that was wrapped with the  ImportJob 
 
's public key.
For more information, see Importing a key .
| Fields | |
|---|---|
| name |   Output only. The resource name for this  | 
| import_method | Required. Immutable. The wrapping method to be used for incoming key material. | 
| protection_level | Required. Immutable. The protection level of the  | 
| create_time | Output only. The time at which this  | 
| generate_time | Output only. The time this  | 
| expire_time | Output only. The time at which this  | 
| expire_event_time | Output only. The time this  | 
| state | Output only. The current state of the  | 
| public_key | Output only. The public key with which to wrap key material prior to import. Only returned if  | 
| attestation | Output only. Statement that was generated and signed by the key creator (for example, an HSM) at key creation time. Use this statement to verify attributes of the key as stored on the HSM, independently of Google. Only present if the chosen  | 
ImportJobState
The state of the  ImportJob 
 
, indicating if it can be used.
| Enums | |
|---|---|
| IMPORT_JOB_STATE_UNSPECIFIED | Not specified. | 
| PENDING_GENERATION | The wrapping key for this job is still being generated. It may not be used. Cloud KMS will automatically mark this job as  ACTIVE 
as soon as the wrapping key is generated. | 
| ACTIVE | This job may be used in  CreateCryptoKey 
and CreateCryptoKeyVersion 
requests. | 
| EXPIRED | This job can no longer be used and may not leave this state once entered. | 
ImportMethod
  ImportMethod 
 
describes the key wrapping method chosen for this  ImportJob 
 
.
| Enums | |
|---|---|
| IMPORT_METHOD_UNSPECIFIED | Not specified. | 
| RSA_OAEP_3072_SHA1_AES_256 | This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism . | 
| RSA_OAEP_4096_SHA1_AES_256 | This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism . | 
| RSA_OAEP_3072_SHA256_AES_256 | This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 3072 bit RSA key. For more details, see RSA AES key wrap mechanism . | 
| RSA_OAEP_4096_SHA256_AES_256 | This ImportMethod represents the CKM_RSA_AES_KEY_WRAP key wrapping scheme defined in the PKCS #11 standard. In summary, this involves wrapping the raw key with an ephemeral AES key, and wrapping the ephemeral AES key with a 4096 bit RSA key. For more details, see RSA AES key wrap mechanism . | 
| RSA_OAEP_3072_SHA256 | This ImportMethod represents RSAES-OAEP with a 3072 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import. | 
| RSA_OAEP_4096_SHA256 | This ImportMethod represents RSAES-OAEP with a 4096 bit RSA key. The key material to be imported is wrapped directly with the RSA key. Due to technical limitations of RSA wrapping, this method cannot be used to wrap RSA keys for import. | 
WrappingPublicKey
The public key component of the wrapping key. For details of the type of key this public key corresponds to, see the  ImportMethod 
 
.
| Fields | |
|---|---|
| pem |   The public key, encoded in PEM format. For more information, see the RFC 7468 sections for General Considerations and Textual Encoding of Subject Public Key Info . | 
KeyAccessJustificationsEnrollmentConfig
The configuration of a protection level for a project's Key Access Justifications enrollment.
| Fields | |
|---|---|
| audit_logging |   Whether the project has KAJ logging enabled. | 
| policy_enforcement |   Whether the project is enrolled in KAJ policy enforcement. | 
KeyAccessJustificationsPolicy
A  KeyAccessJustificationsPolicy 
 
specifies zero or more allowed  AccessReason 
 
values for encrypt, decrypt, and sign operations on a  CryptoKey 
 
.
| Fields | |
|---|---|
| allowed_access_reasons[] | The list of allowed reasons for access to a  | 
KeyAccessJustificationsPolicyConfig
A singleton configuration for Key Access Justifications policies.
| Fields | |
|---|---|
| name |   Identifier. The resource name for this  | 
| default_key_access_justification_policy | Optional. The default key access justification policy used when a  | 
KeyHandle
Resource-oriented representation of a request to Cloud KMS Autokey and the resulting provisioning of a  CryptoKey 
 
.
| Fields | |
|---|---|
| name |   Identifier. Name of the  | 
| kms_key |   Output only. Name of a  | 
| resource_type_selector |   Required. Indicates the resource type that the resulting  | 
KeyOperationAttestation
Contains an HSM-generated attestation about a key operation. For more information, see Verifying attestations .
| Fields | |
|---|---|
| format | Output only. The format of the attestation data. | 
| content |   Output only. The attestation data provided by the HSM when the key operation was performed. | 
| cert_chains | Output only. The certificate chains needed to validate the attestation | 
AttestationFormat
Attestation formats provided by the HSM.
| Enums | |
|---|---|
| ATTESTATION_FORMAT_UNSPECIFIED | Not specified. | 
| CAVIUM_V1_COMPRESSED | Cavium HSM attestation compressed with gzip. Note that this format is defined by Cavium and subject to change at any time. See https://www.marvell.com/products/security-solutions/nitrox-hs-adapters/software-key-attestation.html . | 
| CAVIUM_V2_COMPRESSED | Cavium HSM attestation V2 compressed with gzip. This is a new format introduced in Cavium's version 3.2-08. | 
CertificateChains
Certificate chains needed to verify the attestation. Certificates in chains are PEM-encoded and are ordered based on https://tools.ietf.org/html/rfc5246#section-7.4.2 .
| Fields | |
|---|---|
| cavium_certs[] |   Cavium certificate chain corresponding to the attestation. | 
| google_card_certs[] |   Google card certificate chain corresponding to the attestation. | 
| google_partition_certs[] |   Google partition certificate chain corresponding to the attestation. | 
KeyRing
A  KeyRing 
 
is a toplevel logical grouping of  CryptoKeys 
 
.
| Fields | |
|---|---|
| name |   Output only. The resource name for the  | 
| create_time | Output only. The time at which this  | 
ListCryptoKeyVersionsRequest
Request message for  KeyManagementService.ListCryptoKeyVersions 
 
.
parent 
page_size 
 int32 
Optional. Optional limit on the number of  CryptoKeyVersions 
 
to include in the response. Further  CryptoKeyVersions 
 
can subsequently be obtained by including the  ListCryptoKeyVersionsResponse.next_page_token 
 
in a subsequent request. If unspecified, the server will pick an appropriate default.
page_token 
 string 
Optional. Optional pagination token, returned earlier via  ListCryptoKeyVersionsResponse.next_page_token 
 
.
view 
The fields to include in the response.
filter 
 string 
Optional. Only include resources that match the filter in the response. For more information, see Sorting and filtering list results .
order_by 
 string 
Optional. Specify how the results should be sorted. If not specified, the results will be sorted in the default order. For more information, see Sorting and filtering list results .
ListCryptoKeyVersionsResponse
Response message for  KeyManagementService.ListCryptoKeyVersions 
 
.
| Fields | |
|---|---|
| crypto_key_versions[] | The list of  | 
| next_page_token |   A token to retrieve next page of results. Pass this value in  | 
| total_size |   The total number of  This field is not populated if  | 
ListCryptoKeysRequest
Request message for  KeyManagementService.ListCryptoKeys 
 
.
parent 
page_size 
 int32 
Optional. Optional limit on the number of  CryptoKeys 
 
to include in the response. Further  CryptoKeys 
 
can subsequently be obtained by including the  ListCryptoKeysResponse.next_page_token 
 
in a subsequent request. If unspecified, the server will pick an appropriate default.
page_token 
 string 
Optional. Optional pagination token, returned earlier via  ListCryptoKeysResponse.next_page_token 
 
.
version_view 
The fields of the primary version to include in the response.
filter 
 string 
Optional. Only include resources that match the filter in the response. For more information, see Sorting and filtering list results .
order_by 
 string 
Optional. Specify how the results should be sorted. If not specified, the results will be sorted in the default order. For more information, see Sorting and filtering list results .
ListCryptoKeysResponse
Response message for  KeyManagementService.ListCryptoKeys 
 
.
| Fields | |
|---|---|
| crypto_keys[] | The list of  | 
| next_page_token |   A token to retrieve next page of results. Pass this value in  | 
| total_size |   The total number of  This field is not populated if  | 
ListEkmConnectionsRequest
Request message for  EkmService.ListEkmConnections 
 
.
parent 
 string 
Required. The resource name of the location associated with the  EkmConnections 
 
to list, in the format projects/*/locations/* 
.
Authorization requires the following IAM 
permission on the specified resource parent 
:
-  cloudkms.ekmConnections.list
page_size 
 int32 
Optional. Optional limit on the number of  EkmConnections 
 
to include in the response. Further  EkmConnections 
 
can subsequently be obtained by including the  ListEkmConnectionsResponse.next_page_token 
 
in a subsequent request. If unspecified, the server will pick an appropriate default.
page_token 
 string 
Optional. Optional pagination token, returned earlier via  ListEkmConnectionsResponse.next_page_token 
 
.
filter 
 string 
Optional. Only include resources that match the filter in the response. For more information, see Sorting and filtering list results .
order_by 
 string 
Optional. Specify how the results should be sorted. If not specified, the results will be sorted in the default order. For more information, see Sorting and filtering list results .
ListEkmConnectionsResponse
Response message for  EkmService.ListEkmConnections 
 
.
| Fields | |
|---|---|
| ekm_connections[] | The list of  | 
| next_page_token |   A token to retrieve next page of results. Pass this value in  | 
| total_size |   The total number of  This field is not populated if  | 
ListImportJobsRequest
Request message for  KeyManagementService.ListImportJobs 
 
.
parent 
page_size 
 int32 
Optional. Optional limit on the number of  ImportJobs 
 
to include in the response. Further  ImportJobs 
 
can subsequently be obtained by including the  ListImportJobsResponse.next_page_token 
 
in a subsequent request. If unspecified, the server will pick an appropriate default.
page_token 
 string 
Optional. Optional pagination token, returned earlier via  ListImportJobsResponse.next_page_token 
 
.
filter 
 string 
Optional. Only include resources that match the filter in the response. For more information, see Sorting and filtering list results .
order_by 
 string 
Optional. Specify how the results should be sorted. If not specified, the results will be sorted in the default order. For more information, see Sorting and filtering list results .
ListImportJobsResponse
Response message for  KeyManagementService.ListImportJobs 
 
.
| Fields | |
|---|---|
| import_jobs[] | The list of  | 
| next_page_token |   A token to retrieve next page of results. Pass this value in  | 
| total_size |   The total number of  This field is not populated if  | 
ListKeyHandlesRequest
Request message for  Autokey.ListKeyHandles 
 
.
| Fields | |
|---|---|
| parent |   Required. Name of the resource project and location from which to list  | 
| page_size |   Optional. Optional limit on the number of  | 
| page_token |   Optional. Optional pagination token, returned earlier via  | 
| filter |   Optional. Filter to apply when listing  | 
ListKeyHandlesResponse
Response message for  Autokey.ListKeyHandles 
 
.
| Fields | |
|---|---|
| key_handles[] | Resulting  | 
| next_page_token |   A token to retrieve next page of results. Pass this value in  | 
ListKeyRingsRequest
Request message for  KeyManagementService.ListKeyRings 
 
.
parent 
page_size 
 int32 
Optional. Optional limit on the number of  KeyRings 
 
to include in the response. Further  KeyRings 
 
can subsequently be obtained by including the  ListKeyRingsResponse.next_page_token 
 
in a subsequent request. If unspecified, the server will pick an appropriate default.
page_token 
 string 
Optional. Optional pagination token, returned earlier via  ListKeyRingsResponse.next_page_token 
 
.
filter 
 string 
Optional. Only include resources that match the filter in the response. For more information, see Sorting and filtering list results .
order_by 
 string 
Optional. Specify how the results should be sorted. If not specified, the results will be sorted in the default order. For more information, see Sorting and filtering list results .
ListKeyRingsResponse
Response message for  KeyManagementService.ListKeyRings 
 
.
| Fields | |
|---|---|
| key_rings[] | The list of  | 
| next_page_token |   A token to retrieve next page of results. Pass this value in  | 
| total_size |   The total number of  This field is not populated if  | 
LocationMetadata
Cloud KMS metadata for the given  google.cloud.location.Location 
 
.
| Fields | |
|---|---|
| hsm_available |   Indicates whether  | 
| ekm_available |   Indicates whether  | 
MacSignRequest
Request message for  KeyManagementService.MacSign 
 
.
name 
 string 
Required. The resource name of the  CryptoKeyVersion 
 
to use for signing.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.cryptoKeyVersions.useToSign
data 
 bytes 
Required. The data to sign. The MAC tag is computed over this data field based on the specific algorithm.
data_crc32c 
Optional. An optional CRC32C checksum of the  MacSignRequest.data 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received  MacSignRequest.data 
 
using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(  MacSignRequest.data 
 
) is equal to  MacSignRequest.data_crc32c 
 
, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
MacSignResponse
Response message for  KeyManagementService.MacSign 
 
.
| Fields | |
|---|---|
| name |   The resource name of the  | 
| mac |   The created signature. | 
| mac_crc32c | Integrity verification field. A CRC32C checksum of the returned  | 
| verified_data_crc32c |   Integrity verification field. A flag indicating whether  | 
| protection_level | The  | 
MacVerifyRequest
Request message for  KeyManagementService.MacVerify 
 
.
name 
 string 
Required. The resource name of the  CryptoKeyVersion 
 
to use for verification.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.cryptoKeyVersions.useToVerify
data 
 bytes 
Required. The data used previously as a  MacSignRequest.data 
 
to generate the MAC tag.
data_crc32c 
Optional. An optional CRC32C checksum of the  MacVerifyRequest.data 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received  MacVerifyRequest.data 
 
using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(  MacVerifyRequest.data 
 
) is equal to  MacVerifyRequest.data_crc32c 
 
, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
mac 
 bytes 
Required. The signature to verify.
mac_crc32c 
Optional. An optional CRC32C checksum of the  MacVerifyRequest.mac 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received  MacVerifyRequest.mac 
 
using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(  MacVerifyRequest.mac 
 
) is equal to  MacVerifyRequest.mac_crc32c 
 
, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
MacVerifyResponse
Response message for  KeyManagementService.MacVerify 
 
.
| Fields | |
|---|---|
| name |   The resource name of the  | 
| success |   This field indicates whether or not the verification operation for  | 
| verified_data_crc32c |   Integrity verification field. A flag indicating whether  | 
| verified_mac_crc32c |   Integrity verification field. A flag indicating whether  | 
| verified_success_integrity |   Integrity verification field. This value is used for the integrity verification of [MacVerifyResponse.success]. If the value of this field contradicts the value of [MacVerifyResponse.success], discard the response and perform a limited number of retries. | 
| protection_level | The  | 
ProtectionLevel
  ProtectionLevel 
 
specifies how cryptographic operations are performed. For more information, see Protection levels 
.
| Enums | |
|---|---|
| PROTECTION_LEVEL_UNSPECIFIED | Not specified. | 
| SOFTWARE | Crypto operations are performed in software. | 
| HSM | Crypto operations are performed in a Hardware Security Module. | 
| EXTERNAL | Crypto operations are performed by an external key manager. | 
| EXTERNAL_VPC | Crypto operations are performed in an EKM-over-VPC backend. | 
PublicKey
The public keys for a given  CryptoKeyVersion 
 
. Obtained via  GetPublicKey 
 
.
| Fields | |
|---|---|
| pem |   The public key, encoded in PEM format. For more information, see the RFC 7468 sections for General Considerations and Textual Encoding of Subject Public Key Info . | 
| algorithm | The  | 
| pem_crc32c | Integrity verification field. A CRC32C checksum of the returned  NOTE: This field is in Beta. | 
| name |   The  NOTE: This field is in Beta. | 
| protection_level | The  | 
| public_key_format | The  | 
| public_key | This field contains the public key (with integrity verification), formatted according to the  | 
PublicKeyFormat
The supported  PublicKey 
 
formats.
| Enums | |
|---|---|
| PUBLIC_KEY_FORMAT_UNSPECIFIED | If the  Otherwise, the public key will be exported through the  | 
| PEM | The returned public key will be encoded in PEM format. See the RFC7468 sections for General Considerations and Textual Encoding of Subject Public Key Info for more information. | 
| DER | The returned public key will be encoded in DER format (the PrivateKeyInfo structure from RFC 5208). | 
| NIST_PQC | This is supported only for PQC algorithms. The key material is returned in the format defined by NIST PQC standards (FIPS 203, FIPS 204, and FIPS 205). | 
| XWING_RAW_BYTES | The returned public key is in raw bytes format defined in its standard https://datatracker.ietf.org/doc/draft-connolly-cfrg-xwing-kem . | 
RawDecryptRequest
Request message for  KeyManagementService.RawDecrypt 
 
.
name 
 string 
Required. The resource name of the  CryptoKeyVersion 
 
to use for decryption.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.cryptoKeyVersions.useToDecrypt
ciphertext 
 bytes 
Required. The encrypted data originally returned in  RawEncryptResponse.ciphertext 
 
.
additional_authenticated_data 
 bytes 
Optional. Optional data that must match the data originally supplied in  RawEncryptRequest.additional_authenticated_data 
 
.
initialization_vector 
 bytes 
Required. The initialization vector (IV) used during encryption, which must match the data originally provided in  RawEncryptResponse.initialization_vector 
 
.
tag_length 
 int32 
The length of the authentication tag that is appended to the end of the ciphertext. If unspecified (0), the default value for the key's algorithm will be used (for AES-GCM, the default value is 16).
ciphertext_crc32c 
Optional. An optional CRC32C checksum of the  RawDecryptRequest.ciphertext 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received ciphertext using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(ciphertext) is equal to ciphertext_crc32c, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
additional_authenticated_data_crc32c 
Optional. An optional CRC32C checksum of the  RawDecryptRequest.additional_authenticated_data 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received additional_authenticated_data using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(additional_authenticated_data) is equal to additional_authenticated_data_crc32c, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
initialization_vector_crc32c 
Optional. An optional CRC32C checksum of the  RawDecryptRequest.initialization_vector 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received initialization_vector using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(initialization_vector) is equal to initialization_vector_crc32c, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
RawDecryptResponse
Response message for  KeyManagementService.RawDecrypt 
 
.
| Fields | |
|---|---|
| plaintext |   The decrypted data. | 
| plaintext_crc32c | Integrity verification field. A CRC32C checksum of the returned  | 
| protection_level | The  | 
| verified_ciphertext_crc32c |   Integrity verification field. A flag indicating whether  | 
| verified_additional_authenticated_data_crc32c |   Integrity verification field. A flag indicating whether  | 
| verified_initialization_vector_crc32c |   Integrity verification field. A flag indicating whether  | 
RawEncryptRequest
Request message for  KeyManagementService.RawEncrypt 
 
.
name 
 string 
Required. The resource name of the  CryptoKeyVersion 
 
to use for encryption.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.cryptoKeyVersions.useToEncrypt
plaintext 
 bytes 
Required. The data to encrypt. Must be no larger than 64KiB.
The maximum size depends on the key version's  protection_level 
 
. For  SOFTWARE 
 
keys, the plaintext must be no larger than 64KiB. For  HSM 
 
keys, the combined length of the plaintext and additional_authenticated_data fields must be no larger than 8KiB.
additional_authenticated_data 
 bytes 
Optional. Optional data that, if specified, must also be provided during decryption through  RawDecryptRequest.additional_authenticated_data 
 
.
This field may only be used in conjunction with an  algorithm 
 
that accepts additional authenticated data (for example, AES-GCM).
The maximum size depends on the key version's  protection_level 
 
. For  SOFTWARE 
 
keys, the plaintext must be no larger than 64KiB. For  HSM 
 
keys, the combined length of the plaintext and additional_authenticated_data fields must be no larger than 8KiB.
plaintext_crc32c 
Optional. An optional CRC32C checksum of the  RawEncryptRequest.plaintext 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received plaintext using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(plaintext) is equal to plaintext_crc32c, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
additional_authenticated_data_crc32c 
Optional. An optional CRC32C checksum of the  RawEncryptRequest.additional_authenticated_data 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received additional_authenticated_data using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(additional_authenticated_data) is equal to additional_authenticated_data_crc32c, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
initialization_vector 
 bytes 
Optional. A customer-supplied initialization vector that will be used for encryption. If it is not provided for AES-CBC and AES-CTR, one will be generated. It will be returned in  RawEncryptResponse.initialization_vector 
 
.
initialization_vector_crc32c 
Optional. An optional CRC32C checksum of the  RawEncryptRequest.initialization_vector 
 
. If specified,  KeyManagementService 
 
will verify the integrity of the received initialization_vector using this checksum.  KeyManagementService 
 
will report an error if the checksum verification fails. If you receive a checksum error, your client should verify that CRC32C(initialization_vector) is equal to initialization_vector_crc32c, and if so, perform a limited number of retries. A persistent mismatch may indicate an issue in your computation of the CRC32C checksum. Note: This field is defined as int64 for reasons of compatibility across different languages. However, it is a non-negative integer, which will never exceed 2^32-1, and can be safely downconverted to uint32 in languages that support this type.
RawEncryptResponse
Response message for  KeyManagementService.RawEncrypt 
 
.
| Fields | |
|---|---|
| ciphertext |   The encrypted data. In the case of AES-GCM, the authentication tag is the  | 
| initialization_vector |   The initialization vector (IV) generated by the service during encryption. This value must be stored and provided in  | 
| tag_length |   The length of the authentication tag that is appended to the end of the ciphertext. | 
| ciphertext_crc32c | Integrity verification field. A CRC32C checksum of the returned  | 
| initialization_vector_crc32c | Integrity verification field. A CRC32C checksum of the returned  | 
| verified_plaintext_crc32c |   Integrity verification field. A flag indicating whether  | 
| verified_additional_authenticated_data_crc32c |   Integrity verification field. A flag indicating whether  | 
| verified_initialization_vector_crc32c |   Integrity verification field. A flag indicating whether  | 
| name |   The resource name of the  | 
| protection_level | The  | 
RestoreCryptoKeyVersionRequest
Request message for  KeyManagementService.RestoreCryptoKeyVersion 
 
.
name 
 string 
Required. The resource name of the  CryptoKeyVersion 
 
to restore.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.cryptoKeyVersions.restore
ShowEffectiveAutokeyConfigRequest
Request message for  ShowEffectiveAutokeyConfig 
 
.
| Fields | |
|---|---|
| parent |   Required. Name of the resource project to the show effective Cloud KMS Autokey configuration for. This may be helpful for interrogating the effect of nested folder configurations on a given resource project. | 
ShowEffectiveAutokeyConfigResponse
Response message for  ShowEffectiveAutokeyConfig 
 
.
| Fields | |
|---|---|
| key_project |   Name of the key project configured in the resource project's folder ancestry. | 
ShowEffectiveKeyAccessJustificationsEnrollmentConfigRequest
Request message for  KeyAccessJustificationsConfig.ShowEffectiveKeyAccessJustificationsEnrollmentConfig 
 
| Fields | |
|---|---|
| project |   Required. The number or id of the project to get the effective  | 
ShowEffectiveKeyAccessJustificationsEnrollmentConfigResponse
Response message for  KeyAccessJustificationsConfig.ShowEffectiveKeyAccessJustificationsEnrollmentConfig 
 
| Fields | |
|---|---|
| hardware_config |   The effective  | 
| software_config |   The effective  | 
| external_config |   The effective  | 
ShowEffectiveKeyAccessJustificationsPolicyConfigRequest
Request message for  KeyAccessJustificationsConfig.ShowEffectiveKeyAccessJustificationsPolicyConfig 
 
.
| Fields | |
|---|---|
| project |   Required. The number or id of the project to get the effective  | 
ShowEffectiveKeyAccessJustificationsPolicyConfigResponse
Response message for  KeyAccessJustificationsConfig.ShowEffectiveKeyAccessJustificationsPolicyConfig 
 
.
| Fields | |
|---|---|
| effective_kaj_policy |   The effective  | 
UpdateAutokeyConfigRequest
Request message for  UpdateAutokeyConfig 
 
.
| Fields | |
|---|---|
| autokey_config | Required.  | 
| update_mask | Required. Masks which fields of the  | 
UpdateCryptoKeyPrimaryVersionRequest
Request message for  KeyManagementService.UpdateCryptoKeyPrimaryVersion 
 
.
name 
crypto_key_version_id 
 string 
Required. The id of the child  CryptoKeyVersion 
 
to use as primary.
UpdateCryptoKeyRequest
Request message for  KeyManagementService.UpdateCryptoKey 
 
.
UpdateCryptoKeyVersionRequest
Request message for  KeyManagementService.UpdateCryptoKeyVersion 
 
.
crypto_key_version 
Required.  CryptoKeyVersion 
 
with updated values.
Authorization requires the following IAM 
permission on the specified resource cryptoKeyVersion 
:
-  cloudkms.cryptoKeyVersions.update
update_mask 
Required. List of fields to be updated in this request.
UpdateEkmConfigRequest
Request message for  EkmService.UpdateEkmConfig 
 
.
UpdateEkmConnectionRequest
Request message for  EkmService.UpdateEkmConnection 
 
.
ekm_connection 
Required.  EkmConnection 
 
with updated values.
Authorization requires the following IAM 
permission on the specified resource ekmConnection 
:
-  cloudkms.ekmConnections.update
update_mask 
Required. List of fields to be updated in this request.
UpdateKeyAccessJustificationsPolicyConfigRequest
Request message for  KeyAccessJustificationsConfig.UpdateKeyAccessJustificationsPolicyConfig 
 
.
| Fields | |
|---|---|
| key_access_justifications_policy_config |   Required.  | 
| update_mask | Optional. The list of fields to update. | 
VerifyConnectivityRequest
Request message for  EkmService.VerifyConnectivity 
 
.
name 
 string 
Required. The  name 
 
of the  EkmConnection 
 
to verify.
Authorization requires the following IAM 
permission on the specified resource name 
:
-  cloudkms.ekmConnections.verifyConnectivity
VerifyConnectivityResponse
This type has no fields.
Response message for  EkmService.VerifyConnectivity 
 
.

