- Resource: CryptoKey
- Methods
Resource: CryptoKey
A CryptoKey
represents a logical key that can be used for cryptographic operations.
A CryptoKey
is made up of zero or more versions
, which represent the actual key material used in cryptographic operations.
JSON representation |
---|
{ "name": string, "primary": { object ( |
Fields | |
---|---|
name |
Output only. The resource name for this |
primary |
Output only. A copy of the "primary" The Keys with |
purpose |
Immutable. The immutable purpose of this |
createTime |
Output only. The time at which this A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
nextRotationTime |
At
Key rotations performed manually via [CreateCryptoKeyVersion][KeyManagementService.CreateCryptoKeyVersion] and [UpdateCryptoKeyPrimaryVersion][KeyManagementService.UpdateCryptoKeyPrimaryVersion] do not affect Keys with A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
versionTemplate |
A template describing settings for new |
labels |
Labels with user-defined metadata. For more information, see Labeling Keys. |
importOnly |
Immutable. Whether this key may contain imported versions only. |
destroyScheduledDuration |
Immutable. The period of time that versions of this key spend in the A duration in seconds with up to nine fractional digits, ending with ' |
cryptoKeyBackend |
Immutable. The resource name of the backend environment where the key material for all |
Union field rotation_schedule . Controls the rate of automatic rotation. rotation_schedule can be only one of the following: |
|
rotationPeriod |
If Keys with A duration in seconds with up to nine fractional digits, ending with ' |
CryptoKeyVersion
A CryptoKeyVersion
represents an individual cryptographic key, and the associated key material.
An ENABLED
version can be used for cryptographic operations.
For security reasons, the raw cryptographic key material represented by a CryptoKeyVersion
can never be viewed or exported. It can only be used to encrypt, decrypt, or sign data when an authorized user or application invokes Cloud KMS.
JSON representation |
---|
{ "name": string, "state": enum ( |
Fields | |
---|---|
name |
Output only. The resource name for this |
state |
The current state of the |
protectionLevel |
Output only. The |
algorithm |
Output only. The |
attestation |
Output only. Statement that was generated and signed by the HSM at key creation time. Use this statement to verify attributes of the key as stored on the HSM, independently of Google. Only provided for key versions with |
createTime |
Output only. The time at which this A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
generateTime |
Output only. The time this A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
destroyTime |
Output only. The time this A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
destroyEventTime |
Output only. The time this CryptoKeyVersion's key material was destroyed. Only present if A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
importJob |
Output only. The name of the |
importTime |
Output only. The time at which this A timestamp in RFC3339 UTC "Zulu" format, with nanosecond resolution and up to nine fractional digits. Examples: |
importFailureReason |
Output only. The root cause of the most recent import failure. Only present if |
generationFailureReason |
Output only. The root cause of the most recent generation failure. Only present if |
externalDestructionFailureReason |
Output only. The root cause of the most recent external destruction failure. Only present if |
externalProtectionLevelOptions |
ExternalProtectionLevelOptions stores a group of additional fields for configuring a |
reimportEligible |
Output only. Whether or not this key version is eligible for reimport, by being specified as a target in [ImportCryptoKeyVersionRequest.crypto_key_version][]. |
CryptoKeyVersionState
The state of a CryptoKeyVersion
, indicating if it can be used.
Enums | |
---|---|
CRYPTO_KEY_VERSION_STATE_UNSPECIFIED |
Not specified. |
PENDING_GENERATION |
This version is still being generated. It may not be used, enabled, disabled, or destroyed yet. Cloud KMS will automatically mark this version ENABLED as soon as the version is ready. |
ENABLED |
This version may be used for cryptographic operations. |
DISABLED |
This version may not be used, but the key material is still available, and the version can be placed back into the ENABLED state. |
DESTROYED |
This version is destroyed, and the key material is no longer stored. This version may only become ENABLED again if this version is reimportEligible and the original key material is reimported with a call to [KeyManagementService.ImportCryptoKeyVersion][]. |
DESTROY_SCHEDULED |
This version is scheduled for destruction, and will be destroyed soon. Call [RestoreCryptoKeyVersion][KeyManagementService.RestoreCryptoKeyVersion] to put it back into the DISABLED state. |
PENDING_IMPORT |
This version is still being imported. It may not be used, enabled, disabled, or destroyed yet. Cloud KMS will automatically mark this version ENABLED as soon as the version is ready. |
IMPORT_FAILED |
This version was not imported successfully. It may not be used, enabled, disabled, or destroyed. The submitted key material has been discarded. Additional details can be found in CryptoKeyVersion.import_failure_reason . |
GENERATION_FAILED |
This version was not generated successfully. It may not be used, enabled, disabled, or destroyed. Additional details can be found in CryptoKeyVersion.generation_failure_reason . |
PENDING_EXTERNAL_DESTRUCTION |
This version was destroyed, and it may not be used or enabled again. Cloud KMS is waiting for the corresponding key material residing in an external key manager to be destroyed. |
EXTERNAL_DESTRUCTION_FAILED |
This version was destroyed, and it may not be used or enabled again. However, Cloud KMS could not confirm that the corresponding key material residing in an external key manager was destroyed. Additional details can be found in CryptoKeyVersion.external_destruction_failure_reason . |
ProtectionLevel
ProtectionLevel
specifies how cryptographic operations are performed. For more information, see Protection levels.
Enums | |
---|---|
PROTECTION_LEVEL_UNSPECIFIED |
Not specified. |
SOFTWARE |
Crypto operations are performed in software. |
HSM |
Crypto operations are performed in a Hardware Security Module. |
EXTERNAL |
Crypto operations are performed by an external key manager. |
EXTERNAL_VPC |
Crypto operations are performed in an EKM-over-VPC backend. |
CryptoKeyVersionAlgorithm
The algorithm of the CryptoKeyVersion
, indicating what parameters must be used for each cryptographic operation.
The GOOGLE_SYMMETRIC_ENCRYPTION
algorithm is usable with CryptoKey.purpose
ENCRYPT_DECRYPT
.
Algorithms beginning with "RSA_SIGN_" are usable with CryptoKey.purpose
ASYMMETRIC_SIGN
.
The fields in the name after "RSA_SIGN_" correspond to the following parameters: padding algorithm, modulus bit length, and digest algorithm.
For PSS, the salt length used is equal to the length of digest algorithm. For example, RSA_SIGN_PSS_2048_SHA256
will use PSS with a salt length of 256 bits or 32 bytes.
Algorithms beginning with "RSA_DECRYPT_" are usable with CryptoKey.purpose
ASYMMETRIC_DECRYPT
.
The fields in the name after "RSA_DECRYPT_" correspond to the following parameters: padding algorithm, modulus bit length, and digest algorithm.
Algorithms beginning with "EC_SIGN_" are usable with CryptoKey.purpose
ASYMMETRIC_SIGN
.
The fields in the name after "EC_SIGN_" correspond to the following parameters: elliptic curve, digest algorithm.
Algorithms beginning with "HMAC_" are usable with CryptoKey.purpose
MAC
.
The suffix following "HMAC_" corresponds to the hash algorithm being used (eg. SHA256).
For more information, see Key purposes and algorithms.
Enums | |
---|---|
CRYPTO_KEY_VERSION_ALGORITHM_UNSPECIFIED |
Not specified. |
GOOGLE_SYMMETRIC_ENCRYPTION |
Creates symmetric encryption keys. |
RSA_SIGN_PSS_2048_SHA256 |
RSASSA-PSS 2048 bit key with a SHA256 digest. |
RSA_SIGN_PSS_3072_SHA256 |
RSASSA-PSS 3072 bit key with a SHA256 digest. |
RSA_SIGN_PSS_4096_SHA256 |
RSASSA-PSS 4096 bit key with a SHA256 digest. |
RSA_SIGN_PSS_4096_SHA512 |
RSASSA-PSS 4096 bit key with a SHA512 digest. |
RSA_SIGN_PKCS1_2048_SHA256 |
RSASSA-PKCS1-v1_5 with a 2048 bit key and a SHA256 digest. |
RSA_SIGN_PKCS1_3072_SHA256 |
RSASSA-PKCS1-v1_5 with a 3072 bit key and a SHA256 digest. |
RSA_SIGN_PKCS1_4096_SHA256 |
RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA256 digest. |
RSA_SIGN_PKCS1_4096_SHA512 |
RSASSA-PKCS1-v1_5 with a 4096 bit key and a SHA512 digest. |
RSA_SIGN_RAW_PKCS1_2048 |
RSASSA-PKCS1-v1_5 signing without encoding, with a 2048 bit key. |
RSA_SIGN_RAW_PKCS1_3072 |
RSASSA-PKCS1-v1_5 signing without encoding, with a 3072 bit key. |
RSA_SIGN_RAW_PKCS1_4096 |
RSASSA-PKCS1-v1_5 signing without encoding, with a 4096 bit key. |
RSA_DECRYPT_OAEP_2048_SHA256 |
RSAES-OAEP 2048 bit key with a SHA256 digest. |
RSA_DECRYPT_OAEP_3072_SHA256 |
RSAES-OAEP 3072 bit key with a SHA256 digest. |
RSA_DECRYPT_OAEP_4096_SHA256 |
RSAES-OAEP 4096 bit key with a SHA256 digest. |
RSA_DECRYPT_OAEP_4096_SHA512 |
RSAES-OAEP 4096 bit key with a SHA512 digest. |
RSA_DECRYPT_OAEP_2048_SHA1 |
RSAES-OAEP 2048 bit key with a SHA1 digest. |
RSA_DECRYPT_OAEP_3072_SHA1 |
RSAES-OAEP 3072 bit key with a SHA1 digest. |
RSA_DECRYPT_OAEP_4096_SHA1 |
RSAES-OAEP 4096 bit key with a SHA1 digest. |
EC_SIGN_P256_SHA256 |
ECDSA on the NIST P-256 curve with a SHA256 digest. Other hash functions can also be used: https://cloud.google.com/kms/docs/create-validate-signatures#ecdsa_support_for_other_hash_algorithms |
EC_SIGN_P384_SHA384 |
ECDSA on the NIST P-384 curve with a SHA384 digest. Other hash functions can also be used: https://cloud.google.com/kms/docs/create-validate-signatures#ecdsa_support_for_other_hash_algorithms |
EC_SIGN_SECP256K1_SHA256 |
ECDSA on the non-NIST secp256k1 curve. This curve is only supported for HSM protection level. Other hash functions can also be used: https://cloud.google.com/kms/docs/create-validate-signatures#ecdsa_support_for_other_hash_algorithms |
HMAC_SHA256 |
HMAC-SHA256 signing with a 256 bit key. |
HMAC_SHA1 |
HMAC-SHA1 signing with a 160 bit key. |
HMAC_SHA384 |
HMAC-SHA384 signing with a 384 bit key. |
HMAC_SHA512 |
HMAC-SHA512 signing with a 512 bit key. |
HMAC_SHA224 |
HMAC-SHA224 signing with a 224 bit key. |
EXTERNAL_SYMMETRIC_ENCRYPTION |
Algorithm representing symmetric encryption by an external key manager. |
KeyOperationAttestation
Contains an HSM-generated attestation about a key operation. For more information, see Verifying attestations.
JSON representation |
---|
{ "format": enum ( |
Fields | |
---|---|
format |
Output only. The format of the attestation data. |
content |
Output only. The attestation data provided by the HSM when the key operation was performed. A base64-encoded string. |
certChains |
Output only. The certificate chains needed to validate the attestation |
AttestationFormat
Attestation formats provided by the HSM.
Enums | |
---|---|
ATTESTATION_FORMAT_UNSPECIFIED |
Not specified. |
CAVIUM_V1_COMPRESSED |
Cavium HSM attestation compressed with gzip. Note that this format is defined by Cavium and subject to change at any time. See https://www.marvell.com/products/security-solutions/nitrox-hs-adapters/software-key-attestation.html. |
CAVIUM_V2_COMPRESSED |
Cavium HSM attestation V2 compressed with gzip. This is a new format introduced in Cavium's version 3.2-08. |
CertificateChains
Certificate chains needed to verify the attestation. Certificates in chains are PEM-encoded and are ordered based on https://tools.ietf.org/html/rfc5246#section-7.4.2.
JSON representation |
---|
{ "caviumCerts": [ string ], "googleCardCerts": [ string ], "googlePartitionCerts": [ string ] } |
Fields | |
---|---|
caviumCerts[] |
Cavium certificate chain corresponding to the attestation. |
googleCardCerts[] |
Google card certificate chain corresponding to the attestation. |
googlePartitionCerts[] |
Google partition certificate chain corresponding to the attestation. |
ExternalProtectionLevelOptions
ExternalProtectionLevelOptions stores a group of additional fields for configuring a CryptoKeyVersion
that are specific to the EXTERNAL
protection level and EXTERNAL_VPC
protection levels.
JSON representation |
---|
{ "externalKeyUri": string, "ekmConnectionKeyPath": string } |
Fields | |
---|---|
externalKeyUri |
The URI for an external resource that this |
ekmConnectionKeyPath |
The path to the external key material on the EKM when using [EkmConnection][] e.g., "v0/my/key". Set this field instead of externalKeyUri when using an [EkmConnection][]. |
CryptoKeyPurpose
CryptoKeyPurpose
describes the cryptographic capabilities of a CryptoKey
. A given key can only be used for the operations allowed by its purpose. For more information, see Key purposes.
Enums | |
---|---|
CRYPTO_KEY_PURPOSE_UNSPECIFIED |
Not specified. |
ENCRYPT_DECRYPT |
CryptoKeys with this purpose may be used with [Encrypt][KeyManagementService.Encrypt] and [Decrypt][KeyManagementService.Decrypt]. |
ASYMMETRIC_SIGN |
CryptoKeys with this purpose may be used with [AsymmetricSign][KeyManagementService.AsymmetricSign] and [GetPublicKey][KeyManagementService.GetPublicKey]. |
ASYMMETRIC_DECRYPT |
CryptoKeys with this purpose may be used with [AsymmetricDecrypt][KeyManagementService.AsymmetricDecrypt] and [GetPublicKey][KeyManagementService.GetPublicKey]. |
MAC |
CryptoKeys with this purpose may be used with [MacSign][KeyManagementService.MacSign]. |
CryptoKeyVersionTemplate
A CryptoKeyVersionTemplate
specifies the properties to use when creating a new CryptoKeyVersion
, either manually with [CreateCryptoKeyVersion][KeyManagementService.CreateCryptoKeyVersion] or automatically as a result of auto-rotation.
JSON representation |
---|
{ "protectionLevel": enum ( |
Fields | |
---|---|
protectionLevel |
|
algorithm |
Required. For backwards compatibility, GOOGLE_SYMMETRIC_ENCRYPTION is implied if both this field is omitted and |
Methods |
|
---|---|
|
Returns cryptographic keys managed by Cloud KMS in a given Cloud project. |