google-native.privateca/v1beta1.CertificateAuthority
Create a new CertificateAuthority in a given Project and Location. Auto-naming is currently not supported for this resource. Note - this resource’s API doesn’t support deletion. When deleted, the resource will persist on Google Cloud even though it will be deleted from Pulumi state.
Create CertificateAuthority Resource
new CertificateAuthority(name: string, args: CertificateAuthorityArgs, opts?: CustomResourceOptions);
@overload
def CertificateAuthority(resource_name: str,
opts: Optional[ResourceOptions] = None,
certificate_authority_id: Optional[str] = None,
certificate_policy: Optional[CertificateAuthorityPolicyArgs] = None,
config: Optional[CertificateConfigArgs] = None,
gcs_bucket: Optional[str] = None,
issuing_options: Optional[IssuingOptionsArgs] = None,
key_spec: Optional[KeyVersionSpecArgs] = None,
labels: Optional[Mapping[str, str]] = None,
lifetime: Optional[str] = None,
location: Optional[str] = None,
project: Optional[str] = None,
request_id: Optional[str] = None,
subordinate_config: Optional[SubordinateConfigArgs] = None,
tier: Optional[CertificateAuthorityTier] = None,
type: Optional[CertificateAuthorityType] = None)
@overload
def CertificateAuthority(resource_name: str,
args: CertificateAuthorityArgs,
opts: Optional[ResourceOptions] = None)
func NewCertificateAuthority(ctx *Context, name string, args CertificateAuthorityArgs, opts ...ResourceOption) (*CertificateAuthority, error)
public CertificateAuthority(string name, CertificateAuthorityArgs args, CustomResourceOptions? opts = null)
public CertificateAuthority(String name, CertificateAuthorityArgs args)
public CertificateAuthority(String name, CertificateAuthorityArgs args, CustomResourceOptions options)
type: google-native:privateca/v1beta1:CertificateAuthority
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args CertificateAuthorityArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args CertificateAuthorityArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args CertificateAuthorityArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args CertificateAuthorityArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args CertificateAuthorityArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
CertificateAuthority Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
The CertificateAuthority resource accepts the following input properties:
- string
Required. It must be unique within a location and match the regular expression
[a-zA-Z0-9_-]{1,63}
- Config
Pulumi.
Google Native. Privateca. V1Beta1. Inputs. Certificate Config Args Immutable. The config used to create a self-signed X.509 certificate or CSR.
- Key
Spec Pulumi.Google Native. Privateca. V1Beta1. Inputs. Key Version Spec Args Immutable. Used when issuing certificates for this CertificateAuthority. If this CertificateAuthority is a self-signed CertificateAuthority, this key is also used to sign the self-signed CA certificate. Otherwise, it is used to sign a CSR.
- Lifetime string
The desired lifetime of the CA certificate. Used to create the "not_before_time" and "not_after_time" fields inside an X.509 certificate.
- Tier
Pulumi.
Google Native. Privateca. V1Beta1. Certificate Authority Tier Immutable. The Tier of this CertificateAuthority.
- Type
Pulumi.
Google Native. Privateca. V1Beta1. Certificate Authority Type Immutable. The Type of this CertificateAuthority.
- Certificate
Policy Pulumi.Google Native. Privateca. V1Beta1. Inputs. Certificate Authority Policy Args Optional. The CertificateAuthorityPolicy to enforce when issuing Certificates from this CertificateAuthority.
- Gcs
Bucket string Immutable. The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and CRLs. This must be a bucket name, without any prefixes (such as
gs://
) or suffixes (such as.googleapis.com
). For example, to use a bucket namedmy-bucket
, you would simply specifymy-bucket
. If not specified, a managed bucket will be created.- Issuing
Options Pulumi.Google Native. Privateca. V1Beta1. Inputs. Issuing Options Args Optional. The IssuingOptions to follow when issuing Certificates from this CertificateAuthority.
- Labels Dictionary<string, string>
Optional. Labels with user-defined metadata.
- Location string
- Project string
- Request
Id string Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and t he request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
- Subordinate
Config Pulumi.Google Native. Privateca. V1Beta1. Inputs. Subordinate Config Args Optional. If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which describes its issuers. This may be updated, but this CertificateAuthority must continue to validate.
- string
Required. It must be unique within a location and match the regular expression
[a-zA-Z0-9_-]{1,63}
- Config
Certificate
Config Args Immutable. The config used to create a self-signed X.509 certificate or CSR.
- Key
Spec KeyVersion Spec Args Immutable. Used when issuing certificates for this CertificateAuthority. If this CertificateAuthority is a self-signed CertificateAuthority, this key is also used to sign the self-signed CA certificate. Otherwise, it is used to sign a CSR.
- Lifetime string
The desired lifetime of the CA certificate. Used to create the "not_before_time" and "not_after_time" fields inside an X.509 certificate.
- Tier
Certificate
Authority Tier Immutable. The Tier of this CertificateAuthority.
- Type
Certificate
Authority Type Immutable. The Type of this CertificateAuthority.
- Certificate
Policy CertificateAuthority Policy Args Optional. The CertificateAuthorityPolicy to enforce when issuing Certificates from this CertificateAuthority.
- Gcs
Bucket string Immutable. The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and CRLs. This must be a bucket name, without any prefixes (such as
gs://
) or suffixes (such as.googleapis.com
). For example, to use a bucket namedmy-bucket
, you would simply specifymy-bucket
. If not specified, a managed bucket will be created.- Issuing
Options IssuingOptions Args Optional. The IssuingOptions to follow when issuing Certificates from this CertificateAuthority.
- Labels map[string]string
Optional. Labels with user-defined metadata.
- Location string
- Project string
- Request
Id string Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and t he request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
- Subordinate
Config SubordinateConfig Args Optional. If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which describes its issuers. This may be updated, but this CertificateAuthority must continue to validate.
- String
Required. It must be unique within a location and match the regular expression
[a-zA-Z0-9_-]{1,63}
- config
Certificate
Config Args Immutable. The config used to create a self-signed X.509 certificate or CSR.
- key
Spec KeyVersion Spec Args Immutable. Used when issuing certificates for this CertificateAuthority. If this CertificateAuthority is a self-signed CertificateAuthority, this key is also used to sign the self-signed CA certificate. Otherwise, it is used to sign a CSR.
- lifetime String
The desired lifetime of the CA certificate. Used to create the "not_before_time" and "not_after_time" fields inside an X.509 certificate.
- tier
Certificate
Authority Tier Immutable. The Tier of this CertificateAuthority.
- type
Certificate
Authority Type Immutable. The Type of this CertificateAuthority.
- certificate
Policy CertificateAuthority Policy Args Optional. The CertificateAuthorityPolicy to enforce when issuing Certificates from this CertificateAuthority.
- gcs
Bucket String Immutable. The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and CRLs. This must be a bucket name, without any prefixes (such as
gs://
) or suffixes (such as.googleapis.com
). For example, to use a bucket namedmy-bucket
, you would simply specifymy-bucket
. If not specified, a managed bucket will be created.- issuing
Options IssuingOptions Args Optional. The IssuingOptions to follow when issuing Certificates from this CertificateAuthority.
- labels Map<String,String>
Optional. Labels with user-defined metadata.
- location String
- project String
- request
Id String Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and t he request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
- subordinate
Config SubordinateConfig Args Optional. If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which describes its issuers. This may be updated, but this CertificateAuthority must continue to validate.
- string
Required. It must be unique within a location and match the regular expression
[a-zA-Z0-9_-]{1,63}
- config
Certificate
Config Args Immutable. The config used to create a self-signed X.509 certificate or CSR.
- key
Spec KeyVersion Spec Args Immutable. Used when issuing certificates for this CertificateAuthority. If this CertificateAuthority is a self-signed CertificateAuthority, this key is also used to sign the self-signed CA certificate. Otherwise, it is used to sign a CSR.
- lifetime string
The desired lifetime of the CA certificate. Used to create the "not_before_time" and "not_after_time" fields inside an X.509 certificate.
- tier
Certificate
Authority Tier Immutable. The Tier of this CertificateAuthority.
- type
Certificate
Authority Type Immutable. The Type of this CertificateAuthority.
- certificate
Policy CertificateAuthority Policy Args Optional. The CertificateAuthorityPolicy to enforce when issuing Certificates from this CertificateAuthority.
- gcs
Bucket string Immutable. The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and CRLs. This must be a bucket name, without any prefixes (such as
gs://
) or suffixes (such as.googleapis.com
). For example, to use a bucket namedmy-bucket
, you would simply specifymy-bucket
. If not specified, a managed bucket will be created.- issuing
Options IssuingOptions Args Optional. The IssuingOptions to follow when issuing Certificates from this CertificateAuthority.
- labels {[key: string]: string}
Optional. Labels with user-defined metadata.
- location string
- project string
- request
Id string Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and t he request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
- subordinate
Config SubordinateConfig Args Optional. If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which describes its issuers. This may be updated, but this CertificateAuthority must continue to validate.
- str
Required. It must be unique within a location and match the regular expression
[a-zA-Z0-9_-]{1,63}
- config
Certificate
Config Args Immutable. The config used to create a self-signed X.509 certificate or CSR.
- key_
spec KeyVersion Spec Args Immutable. Used when issuing certificates for this CertificateAuthority. If this CertificateAuthority is a self-signed CertificateAuthority, this key is also used to sign the self-signed CA certificate. Otherwise, it is used to sign a CSR.
- lifetime str
The desired lifetime of the CA certificate. Used to create the "not_before_time" and "not_after_time" fields inside an X.509 certificate.
- tier
Certificate
Authority Tier Immutable. The Tier of this CertificateAuthority.
- type
Certificate
Authority Type Immutable. The Type of this CertificateAuthority.
- certificate_
policy CertificateAuthority Policy Args Optional. The CertificateAuthorityPolicy to enforce when issuing Certificates from this CertificateAuthority.
- gcs_
bucket str Immutable. The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and CRLs. This must be a bucket name, without any prefixes (such as
gs://
) or suffixes (such as.googleapis.com
). For example, to use a bucket namedmy-bucket
, you would simply specifymy-bucket
. If not specified, a managed bucket will be created.- issuing_
options IssuingOptions Args Optional. The IssuingOptions to follow when issuing Certificates from this CertificateAuthority.
- labels Mapping[str, str]
Optional. Labels with user-defined metadata.
- location str
- project str
- request_
id str Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and t he request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
- subordinate_
config SubordinateConfig Args Optional. If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which describes its issuers. This may be updated, but this CertificateAuthority must continue to validate.
- String
Required. It must be unique within a location and match the regular expression
[a-zA-Z0-9_-]{1,63}
- config Property Map
Immutable. The config used to create a self-signed X.509 certificate or CSR.
- key
Spec Property Map Immutable. Used when issuing certificates for this CertificateAuthority. If this CertificateAuthority is a self-signed CertificateAuthority, this key is also used to sign the self-signed CA certificate. Otherwise, it is used to sign a CSR.
- lifetime String
The desired lifetime of the CA certificate. Used to create the "not_before_time" and "not_after_time" fields inside an X.509 certificate.
- tier "TIER_UNSPECIFIED" | "ENTERPRISE" | "DEVOPS"
Immutable. The Tier of this CertificateAuthority.
- type "TYPE_UNSPECIFIED" | "SELF_SIGNED" | "SUBORDINATE"
Immutable. The Type of this CertificateAuthority.
- certificate
Policy Property Map Optional. The CertificateAuthorityPolicy to enforce when issuing Certificates from this CertificateAuthority.
- gcs
Bucket String Immutable. The name of a Cloud Storage bucket where this CertificateAuthority will publish content, such as the CA certificate and CRLs. This must be a bucket name, without any prefixes (such as
gs://
) or suffixes (such as.googleapis.com
). For example, to use a bucket namedmy-bucket
, you would simply specifymy-bucket
. If not specified, a managed bucket will be created.- issuing
Options Property Map Optional. The IssuingOptions to follow when issuing Certificates from this CertificateAuthority.
- labels Map<String>
Optional. Labels with user-defined metadata.
- location String
- project String
- request
Id String Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and t he request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
- subordinate
Config Property Map Optional. If this is a subordinate CertificateAuthority, this field will be set with the subordinate configuration, which describes its issuers. This may be updated, but this CertificateAuthority must continue to validate.
Outputs
All input properties are implicitly available as output properties. Additionally, the CertificateAuthority resource produces the following output properties:
- Access
Urls Pulumi.Google Native. Privateca. V1Beta1. Outputs. Access Urls Response URLs for accessing content published by this CA, such as the CA certificate and CRLs.
- Ca
Certificate List<Pulumi.Descriptions Google Native. Privateca. V1Beta1. Outputs. Certificate Description Response> A structured description of this CertificateAuthority's CA certificate and its issuers. Ordered as self-to-root.
- Create
Time string The time at which this CertificateAuthority was created.
- Delete
Time string The time at which this CertificateAuthority will be deleted, if scheduled for deletion.
- Id string
The provider-assigned unique ID for this managed resource.
- Name string
The resource name for this CertificateAuthority in the format
projects/*/locations/*/certificateAuthorities/*
.- Pem
Ca List<string>Certificates This CertificateAuthority's certificate chain, including the current CertificateAuthority's certificate. Ordered such that the root issuer is the final element (consistent with RFC 5246). For a self-signed CA, this will only list the current CertificateAuthority's certificate.
- State string
The State for this CertificateAuthority.
- Update
Time string The time at which this CertificateAuthority was updated.
- Access
Urls AccessUrls Response URLs for accessing content published by this CA, such as the CA certificate and CRLs.
- Ca
Certificate []CertificateDescriptions Description Response A structured description of this CertificateAuthority's CA certificate and its issuers. Ordered as self-to-root.
- Create
Time string The time at which this CertificateAuthority was created.
- Delete
Time string The time at which this CertificateAuthority will be deleted, if scheduled for deletion.
- Id string
The provider-assigned unique ID for this managed resource.
- Name string
The resource name for this CertificateAuthority in the format
projects/*/locations/*/certificateAuthorities/*
.- Pem
Ca []stringCertificates This CertificateAuthority's certificate chain, including the current CertificateAuthority's certificate. Ordered such that the root issuer is the final element (consistent with RFC 5246). For a self-signed CA, this will only list the current CertificateAuthority's certificate.
- State string
The State for this CertificateAuthority.
- Update
Time string The time at which this CertificateAuthority was updated.
- access
Urls AccessUrls Response URLs for accessing content published by this CA, such as the CA certificate and CRLs.
- ca
Certificate List<CertificateDescriptions Description Response> A structured description of this CertificateAuthority's CA certificate and its issuers. Ordered as self-to-root.
- create
Time String The time at which this CertificateAuthority was created.
- delete
Time String The time at which this CertificateAuthority will be deleted, if scheduled for deletion.
- id String
The provider-assigned unique ID for this managed resource.
- name String
The resource name for this CertificateAuthority in the format
projects/*/locations/*/certificateAuthorities/*
.- pem
Ca List<String>Certificates This CertificateAuthority's certificate chain, including the current CertificateAuthority's certificate. Ordered such that the root issuer is the final element (consistent with RFC 5246). For a self-signed CA, this will only list the current CertificateAuthority's certificate.
- state String
The State for this CertificateAuthority.
- update
Time String The time at which this CertificateAuthority was updated.
- access
Urls AccessUrls Response URLs for accessing content published by this CA, such as the CA certificate and CRLs.
- ca
Certificate CertificateDescriptions Description Response[] A structured description of this CertificateAuthority's CA certificate and its issuers. Ordered as self-to-root.
- create
Time string The time at which this CertificateAuthority was created.
- delete
Time string The time at which this CertificateAuthority will be deleted, if scheduled for deletion.
- id string
The provider-assigned unique ID for this managed resource.
- name string
The resource name for this CertificateAuthority in the format
projects/*/locations/*/certificateAuthorities/*
.- pem
Ca string[]Certificates This CertificateAuthority's certificate chain, including the current CertificateAuthority's certificate. Ordered such that the root issuer is the final element (consistent with RFC 5246). For a self-signed CA, this will only list the current CertificateAuthority's certificate.
- state string
The State for this CertificateAuthority.
- update
Time string The time at which this CertificateAuthority was updated.
- access_
urls AccessUrls Response URLs for accessing content published by this CA, such as the CA certificate and CRLs.
- ca_
certificate_ Sequence[Certificatedescriptions Description Response] A structured description of this CertificateAuthority's CA certificate and its issuers. Ordered as self-to-root.
- create_
time str The time at which this CertificateAuthority was created.
- delete_
time str The time at which this CertificateAuthority will be deleted, if scheduled for deletion.
- id str
The provider-assigned unique ID for this managed resource.
- name str
The resource name for this CertificateAuthority in the format
projects/*/locations/*/certificateAuthorities/*
.- pem_
ca_ Sequence[str]certificates This CertificateAuthority's certificate chain, including the current CertificateAuthority's certificate. Ordered such that the root issuer is the final element (consistent with RFC 5246). For a self-signed CA, this will only list the current CertificateAuthority's certificate.
- state str
The State for this CertificateAuthority.
- update_
time str The time at which this CertificateAuthority was updated.
- access
Urls Property Map URLs for accessing content published by this CA, such as the CA certificate and CRLs.
- ca
Certificate List<Property Map>Descriptions A structured description of this CertificateAuthority's CA certificate and its issuers. Ordered as self-to-root.
- create
Time String The time at which this CertificateAuthority was created.
- delete
Time String The time at which this CertificateAuthority will be deleted, if scheduled for deletion.
- id String
The provider-assigned unique ID for this managed resource.
- name String
The resource name for this CertificateAuthority in the format
projects/*/locations/*/certificateAuthorities/*
.- pem
Ca List<String>Certificates This CertificateAuthority's certificate chain, including the current CertificateAuthority's certificate. Ordered such that the root issuer is the final element (consistent with RFC 5246). For a self-signed CA, this will only list the current CertificateAuthority's certificate.
- state String
The State for this CertificateAuthority.
- update
Time String The time at which this CertificateAuthority was updated.
Supporting Types
AccessUrlsResponse
- Ca
Certificate stringAccess Url The URL where this CertificateAuthority's CA certificate is published. This will only be set for CAs that have been activated.
- Crl
Access stringUrl The URL where this CertificateAuthority's CRLs are published. This will only be set for CAs that have been activated.
- Ca
Certificate stringAccess Url The URL where this CertificateAuthority's CA certificate is published. This will only be set for CAs that have been activated.
- Crl
Access stringUrl The URL where this CertificateAuthority's CRLs are published. This will only be set for CAs that have been activated.
- ca
Certificate StringAccess Url The URL where this CertificateAuthority's CA certificate is published. This will only be set for CAs that have been activated.
- crl
Access StringUrl The URL where this CertificateAuthority's CRLs are published. This will only be set for CAs that have been activated.
- ca
Certificate stringAccess Url The URL where this CertificateAuthority's CA certificate is published. This will only be set for CAs that have been activated.
- crl
Access stringUrl The URL where this CertificateAuthority's CRLs are published. This will only be set for CAs that have been activated.
- ca_
certificate_ straccess_ url The URL where this CertificateAuthority's CA certificate is published. This will only be set for CAs that have been activated.
- crl_
access_ strurl The URL where this CertificateAuthority's CRLs are published. This will only be set for CAs that have been activated.
- ca
Certificate StringAccess Url The URL where this CertificateAuthority's CA certificate is published. This will only be set for CAs that have been activated.
- crl
Access StringUrl The URL where this CertificateAuthority's CRLs are published. This will only be set for CAs that have been activated.
AllowedConfigList
- Allowed
Config List<Pulumi.Values Google Native. Privateca. V1Beta1. Inputs. Reusable Config Wrapper> All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper. If a ReusableConfigWrapper has an empty field, any value will be allowed for that field.
- Allowed
Config []ReusableValues Config Wrapper All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper. If a ReusableConfigWrapper has an empty field, any value will be allowed for that field.
- allowed
Config List<ReusableValues Config Wrapper> All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper. If a ReusableConfigWrapper has an empty field, any value will be allowed for that field.
- allowed
Config ReusableValues Config Wrapper[] All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper. If a ReusableConfigWrapper has an empty field, any value will be allowed for that field.
- allowed_
config_ Sequence[Reusablevalues Config Wrapper] All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper. If a ReusableConfigWrapper has an empty field, any value will be allowed for that field.
- allowed
Config List<Property Map>Values All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper. If a ReusableConfigWrapper has an empty field, any value will be allowed for that field.
AllowedConfigListResponse
- Allowed
Config List<Pulumi.Values Google Native. Privateca. V1Beta1. Inputs. Reusable Config Wrapper Response> All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper. If a ReusableConfigWrapper has an empty field, any value will be allowed for that field.
- Allowed
Config []ReusableValues Config Wrapper Response All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper. If a ReusableConfigWrapper has an empty field, any value will be allowed for that field.
- allowed
Config List<ReusableValues Config Wrapper Response> All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper. If a ReusableConfigWrapper has an empty field, any value will be allowed for that field.
- allowed
Config ReusableValues Config Wrapper Response[] All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper. If a ReusableConfigWrapper has an empty field, any value will be allowed for that field.
- allowed_
config_ Sequence[Reusablevalues Config Wrapper Response] All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper. If a ReusableConfigWrapper has an empty field, any value will be allowed for that field.
- allowed
Config List<Property Map>Values All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper. If a ReusableConfigWrapper has an empty field, any value will be allowed for that field.
AllowedSubjectAltNames
- Allow
Custom boolSans Optional. Specifies if to allow custom X509Extension values.
- Allow
Globbing boolDns Wildcards Optional. Specifies if glob patterns used for allowed_dns_names allow wildcard certificates. If this is set, certificate requests with wildcard domains will be permitted to match a glob pattern specified in allowed_dns_names. Otherwise, certificate requests with wildcard domains will be permitted only if allowed_dns_names contains a literal wildcard.
- Allowed
Dns List<string>Names Optional. Contains valid, fully-qualified host names. Glob patterns are also supported. To allow an explicit wildcard certificate, escape with backlash (i.e.
\*
). E.g. for globbed entries:*bar.com
will allowfoo.bar.com
, but not*.bar.com
, unless the allow_globbing_dns_wildcards field is set. E.g. for wildcard entries:\*.bar.com
will allow*.bar.com
, but notfoo.bar.com
.- Allowed
Email List<string>Addresses Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also supported.
- Allowed
Ips List<string> Optional. Contains valid 32-bit IPv4 addresses and subnet ranges or RFC 4291 IPv6 addresses and subnet ranges. Subnet ranges are specified using the '/' notation (e.g. 10.0.0.0/8, 2001:700:300:1800::/64). Glob patterns are supported only for ip address entries (i.e. not for subnet ranges).
- Allowed
Uris List<string> Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To match across path seperators (i.e. '/') use the double star glob pattern (i.e. '**').
- Allow
Custom boolSans Optional. Specifies if to allow custom X509Extension values.
- Allow
Globbing boolDns Wildcards Optional. Specifies if glob patterns used for allowed_dns_names allow wildcard certificates. If this is set, certificate requests with wildcard domains will be permitted to match a glob pattern specified in allowed_dns_names. Otherwise, certificate requests with wildcard domains will be permitted only if allowed_dns_names contains a literal wildcard.
- Allowed
Dns []stringNames Optional. Contains valid, fully-qualified host names. Glob patterns are also supported. To allow an explicit wildcard certificate, escape with backlash (i.e.
\*
). E.g. for globbed entries:*bar.com
will allowfoo.bar.com
, but not*.bar.com
, unless the allow_globbing_dns_wildcards field is set. E.g. for wildcard entries:\*.bar.com
will allow*.bar.com
, but notfoo.bar.com
.- Allowed
Email []stringAddresses Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also supported.
- Allowed
Ips []string Optional. Contains valid 32-bit IPv4 addresses and subnet ranges or RFC 4291 IPv6 addresses and subnet ranges. Subnet ranges are specified using the '/' notation (e.g. 10.0.0.0/8, 2001:700:300:1800::/64). Glob patterns are supported only for ip address entries (i.e. not for subnet ranges).
- Allowed
Uris []string Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To match across path seperators (i.e. '/') use the double star glob pattern (i.e. '**').
- allow
Custom BooleanSans Optional. Specifies if to allow custom X509Extension values.
- allow
Globbing BooleanDns Wildcards Optional. Specifies if glob patterns used for allowed_dns_names allow wildcard certificates. If this is set, certificate requests with wildcard domains will be permitted to match a glob pattern specified in allowed_dns_names. Otherwise, certificate requests with wildcard domains will be permitted only if allowed_dns_names contains a literal wildcard.
- allowed
Dns List<String>Names Optional. Contains valid, fully-qualified host names. Glob patterns are also supported. To allow an explicit wildcard certificate, escape with backlash (i.e.
\*
). E.g. for globbed entries:*bar.com
will allowfoo.bar.com
, but not*.bar.com
, unless the allow_globbing_dns_wildcards field is set. E.g. for wildcard entries:\*.bar.com
will allow*.bar.com
, but notfoo.bar.com
.- allowed
Email List<String>Addresses Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also supported.
- allowed
Ips List<String> Optional. Contains valid 32-bit IPv4 addresses and subnet ranges or RFC 4291 IPv6 addresses and subnet ranges. Subnet ranges are specified using the '/' notation (e.g. 10.0.0.0/8, 2001:700:300:1800::/64). Glob patterns are supported only for ip address entries (i.e. not for subnet ranges).
- allowed
Uris List<String> Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To match across path seperators (i.e. '/') use the double star glob pattern (i.e. '**').
- allow
Custom booleanSans Optional. Specifies if to allow custom X509Extension values.
- allow
Globbing booleanDns Wildcards Optional. Specifies if glob patterns used for allowed_dns_names allow wildcard certificates. If this is set, certificate requests with wildcard domains will be permitted to match a glob pattern specified in allowed_dns_names. Otherwise, certificate requests with wildcard domains will be permitted only if allowed_dns_names contains a literal wildcard.
- allowed
Dns string[]Names Optional. Contains valid, fully-qualified host names. Glob patterns are also supported. To allow an explicit wildcard certificate, escape with backlash (i.e.
\*
). E.g. for globbed entries:*bar.com
will allowfoo.bar.com
, but not*.bar.com
, unless the allow_globbing_dns_wildcards field is set. E.g. for wildcard entries:\*.bar.com
will allow*.bar.com
, but notfoo.bar.com
.- allowed
Email string[]Addresses Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also supported.
- allowed
Ips string[] Optional. Contains valid 32-bit IPv4 addresses and subnet ranges or RFC 4291 IPv6 addresses and subnet ranges. Subnet ranges are specified using the '/' notation (e.g. 10.0.0.0/8, 2001:700:300:1800::/64). Glob patterns are supported only for ip address entries (i.e. not for subnet ranges).
- allowed
Uris string[] Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To match across path seperators (i.e. '/') use the double star glob pattern (i.e. '**').
- allow_
custom_ boolsans Optional. Specifies if to allow custom X509Extension values.
- allow_
globbing_ booldns_ wildcards Optional. Specifies if glob patterns used for allowed_dns_names allow wildcard certificates. If this is set, certificate requests with wildcard domains will be permitted to match a glob pattern specified in allowed_dns_names. Otherwise, certificate requests with wildcard domains will be permitted only if allowed_dns_names contains a literal wildcard.
- allowed_
dns_ Sequence[str]names Optional. Contains valid, fully-qualified host names. Glob patterns are also supported. To allow an explicit wildcard certificate, escape with backlash (i.e.
\*
). E.g. for globbed entries:*bar.com
will allowfoo.bar.com
, but not*.bar.com
, unless the allow_globbing_dns_wildcards field is set. E.g. for wildcard entries:\*.bar.com
will allow*.bar.com
, but notfoo.bar.com
.- allowed_
email_ Sequence[str]addresses Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also supported.
- allowed_
ips Sequence[str] Optional. Contains valid 32-bit IPv4 addresses and subnet ranges or RFC 4291 IPv6 addresses and subnet ranges. Subnet ranges are specified using the '/' notation (e.g. 10.0.0.0/8, 2001:700:300:1800::/64). Glob patterns are supported only for ip address entries (i.e. not for subnet ranges).
- allowed_
uris Sequence[str] Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To match across path seperators (i.e. '/') use the double star glob pattern (i.e. '**').
- allow
Custom BooleanSans Optional. Specifies if to allow custom X509Extension values.
- allow
Globbing BooleanDns Wildcards Optional. Specifies if glob patterns used for allowed_dns_names allow wildcard certificates. If this is set, certificate requests with wildcard domains will be permitted to match a glob pattern specified in allowed_dns_names. Otherwise, certificate requests with wildcard domains will be permitted only if allowed_dns_names contains a literal wildcard.
- allowed
Dns List<String>Names Optional. Contains valid, fully-qualified host names. Glob patterns are also supported. To allow an explicit wildcard certificate, escape with backlash (i.e.
\*
). E.g. for globbed entries:*bar.com
will allowfoo.bar.com
, but not*.bar.com
, unless the allow_globbing_dns_wildcards field is set. E.g. for wildcard entries:\*.bar.com
will allow*.bar.com
, but notfoo.bar.com
.- allowed
Email List<String>Addresses Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also supported.
- allowed
Ips List<String> Optional. Contains valid 32-bit IPv4 addresses and subnet ranges or RFC 4291 IPv6 addresses and subnet ranges. Subnet ranges are specified using the '/' notation (e.g. 10.0.0.0/8, 2001:700:300:1800::/64). Glob patterns are supported only for ip address entries (i.e. not for subnet ranges).
- allowed
Uris List<String> Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To match across path seperators (i.e. '/') use the double star glob pattern (i.e. '**').
AllowedSubjectAltNamesResponse
- Allow
Custom boolSans Optional. Specifies if to allow custom X509Extension values.
- Allow
Globbing boolDns Wildcards Optional. Specifies if glob patterns used for allowed_dns_names allow wildcard certificates. If this is set, certificate requests with wildcard domains will be permitted to match a glob pattern specified in allowed_dns_names. Otherwise, certificate requests with wildcard domains will be permitted only if allowed_dns_names contains a literal wildcard.
- Allowed
Dns List<string>Names Optional. Contains valid, fully-qualified host names. Glob patterns are also supported. To allow an explicit wildcard certificate, escape with backlash (i.e.
\*
). E.g. for globbed entries:*bar.com
will allowfoo.bar.com
, but not*.bar.com
, unless the allow_globbing_dns_wildcards field is set. E.g. for wildcard entries:\*.bar.com
will allow*.bar.com
, but notfoo.bar.com
.- Allowed
Email List<string>Addresses Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also supported.
- Allowed
Ips List<string> Optional. Contains valid 32-bit IPv4 addresses and subnet ranges or RFC 4291 IPv6 addresses and subnet ranges. Subnet ranges are specified using the '/' notation (e.g. 10.0.0.0/8, 2001:700:300:1800::/64). Glob patterns are supported only for ip address entries (i.e. not for subnet ranges).
- Allowed
Uris List<string> Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To match across path seperators (i.e. '/') use the double star glob pattern (i.e. '**').
- Allow
Custom boolSans Optional. Specifies if to allow custom X509Extension values.
- Allow
Globbing boolDns Wildcards Optional. Specifies if glob patterns used for allowed_dns_names allow wildcard certificates. If this is set, certificate requests with wildcard domains will be permitted to match a glob pattern specified in allowed_dns_names. Otherwise, certificate requests with wildcard domains will be permitted only if allowed_dns_names contains a literal wildcard.
- Allowed
Dns []stringNames Optional. Contains valid, fully-qualified host names. Glob patterns are also supported. To allow an explicit wildcard certificate, escape with backlash (i.e.
\*
). E.g. for globbed entries:*bar.com
will allowfoo.bar.com
, but not*.bar.com
, unless the allow_globbing_dns_wildcards field is set. E.g. for wildcard entries:\*.bar.com
will allow*.bar.com
, but notfoo.bar.com
.- Allowed
Email []stringAddresses Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also supported.
- Allowed
Ips []string Optional. Contains valid 32-bit IPv4 addresses and subnet ranges or RFC 4291 IPv6 addresses and subnet ranges. Subnet ranges are specified using the '/' notation (e.g. 10.0.0.0/8, 2001:700:300:1800::/64). Glob patterns are supported only for ip address entries (i.e. not for subnet ranges).
- Allowed
Uris []string Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To match across path seperators (i.e. '/') use the double star glob pattern (i.e. '**').
- allow
Custom BooleanSans Optional. Specifies if to allow custom X509Extension values.
- allow
Globbing BooleanDns Wildcards Optional. Specifies if glob patterns used for allowed_dns_names allow wildcard certificates. If this is set, certificate requests with wildcard domains will be permitted to match a glob pattern specified in allowed_dns_names. Otherwise, certificate requests with wildcard domains will be permitted only if allowed_dns_names contains a literal wildcard.
- allowed
Dns List<String>Names Optional. Contains valid, fully-qualified host names. Glob patterns are also supported. To allow an explicit wildcard certificate, escape with backlash (i.e.
\*
). E.g. for globbed entries:*bar.com
will allowfoo.bar.com
, but not*.bar.com
, unless the allow_globbing_dns_wildcards field is set. E.g. for wildcard entries:\*.bar.com
will allow*.bar.com
, but notfoo.bar.com
.- allowed
Email List<String>Addresses Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also supported.
- allowed
Ips List<String> Optional. Contains valid 32-bit IPv4 addresses and subnet ranges or RFC 4291 IPv6 addresses and subnet ranges. Subnet ranges are specified using the '/' notation (e.g. 10.0.0.0/8, 2001:700:300:1800::/64). Glob patterns are supported only for ip address entries (i.e. not for subnet ranges).
- allowed
Uris List<String> Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To match across path seperators (i.e. '/') use the double star glob pattern (i.e. '**').
- allow
Custom booleanSans Optional. Specifies if to allow custom X509Extension values.
- allow
Globbing booleanDns Wildcards Optional. Specifies if glob patterns used for allowed_dns_names allow wildcard certificates. If this is set, certificate requests with wildcard domains will be permitted to match a glob pattern specified in allowed_dns_names. Otherwise, certificate requests with wildcard domains will be permitted only if allowed_dns_names contains a literal wildcard.
- allowed
Dns string[]Names Optional. Contains valid, fully-qualified host names. Glob patterns are also supported. To allow an explicit wildcard certificate, escape with backlash (i.e.
\*
). E.g. for globbed entries:*bar.com
will allowfoo.bar.com
, but not*.bar.com
, unless the allow_globbing_dns_wildcards field is set. E.g. for wildcard entries:\*.bar.com
will allow*.bar.com
, but notfoo.bar.com
.- allowed
Email string[]Addresses Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also supported.
- allowed
Ips string[] Optional. Contains valid 32-bit IPv4 addresses and subnet ranges or RFC 4291 IPv6 addresses and subnet ranges. Subnet ranges are specified using the '/' notation (e.g. 10.0.0.0/8, 2001:700:300:1800::/64). Glob patterns are supported only for ip address entries (i.e. not for subnet ranges).
- allowed
Uris string[] Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To match across path seperators (i.e. '/') use the double star glob pattern (i.e. '**').
- allow_
custom_ boolsans Optional. Specifies if to allow custom X509Extension values.
- allow_
globbing_ booldns_ wildcards Optional. Specifies if glob patterns used for allowed_dns_names allow wildcard certificates. If this is set, certificate requests with wildcard domains will be permitted to match a glob pattern specified in allowed_dns_names. Otherwise, certificate requests with wildcard domains will be permitted only if allowed_dns_names contains a literal wildcard.
- allowed_
dns_ Sequence[str]names Optional. Contains valid, fully-qualified host names. Glob patterns are also supported. To allow an explicit wildcard certificate, escape with backlash (i.e.
\*
). E.g. for globbed entries:*bar.com
will allowfoo.bar.com
, but not*.bar.com
, unless the allow_globbing_dns_wildcards field is set. E.g. for wildcard entries:\*.bar.com
will allow*.bar.com
, but notfoo.bar.com
.- allowed_
email_ Sequence[str]addresses Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also supported.
- allowed_
ips Sequence[str] Optional. Contains valid 32-bit IPv4 addresses and subnet ranges or RFC 4291 IPv6 addresses and subnet ranges. Subnet ranges are specified using the '/' notation (e.g. 10.0.0.0/8, 2001:700:300:1800::/64). Glob patterns are supported only for ip address entries (i.e. not for subnet ranges).
- allowed_
uris Sequence[str] Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To match across path seperators (i.e. '/') use the double star glob pattern (i.e. '**').
- allow
Custom BooleanSans Optional. Specifies if to allow custom X509Extension values.
- allow
Globbing BooleanDns Wildcards Optional. Specifies if glob patterns used for allowed_dns_names allow wildcard certificates. If this is set, certificate requests with wildcard domains will be permitted to match a glob pattern specified in allowed_dns_names. Otherwise, certificate requests with wildcard domains will be permitted only if allowed_dns_names contains a literal wildcard.
- allowed
Dns List<String>Names Optional. Contains valid, fully-qualified host names. Glob patterns are also supported. To allow an explicit wildcard certificate, escape with backlash (i.e.
\*
). E.g. for globbed entries:*bar.com
will allowfoo.bar.com
, but not*.bar.com
, unless the allow_globbing_dns_wildcards field is set. E.g. for wildcard entries:\*.bar.com
will allow*.bar.com
, but notfoo.bar.com
.- allowed
Email List<String>Addresses Optional. Contains valid RFC 2822 E-mail addresses. Glob patterns are also supported.
- allowed
Ips List<String> Optional. Contains valid 32-bit IPv4 addresses and subnet ranges or RFC 4291 IPv6 addresses and subnet ranges. Subnet ranges are specified using the '/' notation (e.g. 10.0.0.0/8, 2001:700:300:1800::/64). Glob patterns are supported only for ip address entries (i.e. not for subnet ranges).
- allowed
Uris List<String> Optional. Contains valid RFC 3986 URIs. Glob patterns are also supported. To match across path seperators (i.e. '/') use the double star glob pattern (i.e. '**').
CaOptions
- Is
Ca bool Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- Max
Issuer intPath Length Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- Is
Ca bool Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- Max
Issuer intPath Length Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- is
Ca Boolean Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- max
Issuer IntegerPath Length Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- is
Ca boolean Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- max
Issuer numberPath Length Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- is_
ca bool Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- max_
issuer_ intpath_ length Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- is
Ca Boolean Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- max
Issuer NumberPath Length Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
CaOptionsResponse
- Is
Ca bool Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- Max
Issuer intPath Length Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- Is
Ca bool Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- Max
Issuer intPath Length Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- is
Ca Boolean Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- max
Issuer IntegerPath Length Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- is
Ca boolean Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- max
Issuer numberPath Length Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- is_
ca bool Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- max_
issuer_ intpath_ length Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- is
Ca Boolean Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- max
Issuer NumberPath Length Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
CertificateAuthorityPolicy
- Allowed
Common List<string>Names Optional. If any value is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed value. If no value is specified, all values will be allowed for this fied. Glob patterns are also supported.
- Allowed
Config Pulumi.List Google Native. Privateca. V1Beta1. Inputs. Allowed Config List Optional. All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper in the list.
- Allowed
Issuance Pulumi.Modes Google Native. Privateca. V1Beta1. Inputs. Issuance Modes Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- Allowed
Locations List<Pulumi.And Organizations Google Native. Privateca. V1Beta1. Inputs. Subject> Optional. If any Subject is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed Subject. If a Subject has an empty field, any value will be allowed for that field.
- Allowed
Sans Pulumi.Google Native. Privateca. V1Beta1. Inputs. Allowed Subject Alt Names Optional. If a AllowedSubjectAltNames is specified here, then all Certificates issued by the CertificateAuthority must match AllowedSubjectAltNames. If no value or an empty value is specified, any value will be allowed for the SubjectAltNames field.
- Maximum
Lifetime string Optional. The maximum lifetime allowed by the CertificateAuthority. Note that if the any part if the issuing chain expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated.
- Overwrite
Config Pulumi.Values Google Native. Privateca. V1Beta1. Inputs. Reusable Config Wrapper Optional. All Certificates issued by the CertificateAuthority will use the provided configuration values, overwriting any requested configuration values.
- Allowed
Common []stringNames Optional. If any value is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed value. If no value is specified, all values will be allowed for this fied. Glob patterns are also supported.
- Allowed
Config AllowedList Config List Optional. All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper in the list.
- Allowed
Issuance IssuanceModes Modes Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- Allowed
Locations []SubjectAnd Organizations Optional. If any Subject is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed Subject. If a Subject has an empty field, any value will be allowed for that field.
- Allowed
Sans AllowedSubject Alt Names Optional. If a AllowedSubjectAltNames is specified here, then all Certificates issued by the CertificateAuthority must match AllowedSubjectAltNames. If no value or an empty value is specified, any value will be allowed for the SubjectAltNames field.
- Maximum
Lifetime string Optional. The maximum lifetime allowed by the CertificateAuthority. Note that if the any part if the issuing chain expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated.
- Overwrite
Config ReusableValues Config Wrapper Optional. All Certificates issued by the CertificateAuthority will use the provided configuration values, overwriting any requested configuration values.
- allowed
Common List<String>Names Optional. If any value is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed value. If no value is specified, all values will be allowed for this fied. Glob patterns are also supported.
- allowed
Config AllowedList Config List Optional. All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper in the list.
- allowed
Issuance IssuanceModes Modes Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowed
Locations List<Subject>And Organizations Optional. If any Subject is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed Subject. If a Subject has an empty field, any value will be allowed for that field.
- allowed
Sans AllowedSubject Alt Names Optional. If a AllowedSubjectAltNames is specified here, then all Certificates issued by the CertificateAuthority must match AllowedSubjectAltNames. If no value or an empty value is specified, any value will be allowed for the SubjectAltNames field.
- maximum
Lifetime String Optional. The maximum lifetime allowed by the CertificateAuthority. Note that if the any part if the issuing chain expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated.
- overwrite
Config ReusableValues Config Wrapper Optional. All Certificates issued by the CertificateAuthority will use the provided configuration values, overwriting any requested configuration values.
- allowed
Common string[]Names Optional. If any value is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed value. If no value is specified, all values will be allowed for this fied. Glob patterns are also supported.
- allowed
Config AllowedList Config List Optional. All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper in the list.
- allowed
Issuance IssuanceModes Modes Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowed
Locations Subject[]And Organizations Optional. If any Subject is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed Subject. If a Subject has an empty field, any value will be allowed for that field.
- allowed
Sans AllowedSubject Alt Names Optional. If a AllowedSubjectAltNames is specified here, then all Certificates issued by the CertificateAuthority must match AllowedSubjectAltNames. If no value or an empty value is specified, any value will be allowed for the SubjectAltNames field.
- maximum
Lifetime string Optional. The maximum lifetime allowed by the CertificateAuthority. Note that if the any part if the issuing chain expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated.
- overwrite
Config ReusableValues Config Wrapper Optional. All Certificates issued by the CertificateAuthority will use the provided configuration values, overwriting any requested configuration values.
- allowed_
common_ Sequence[str]names Optional. If any value is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed value. If no value is specified, all values will be allowed for this fied. Glob patterns are also supported.
- allowed_
config_ Allowedlist Config List Optional. All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper in the list.
- allowed_
issuance_ Issuancemodes Modes Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowed_
locations_ Sequence[Subject]and_ organizations Optional. If any Subject is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed Subject. If a Subject has an empty field, any value will be allowed for that field.
- allowed_
sans AllowedSubject Alt Names Optional. If a AllowedSubjectAltNames is specified here, then all Certificates issued by the CertificateAuthority must match AllowedSubjectAltNames. If no value or an empty value is specified, any value will be allowed for the SubjectAltNames field.
- maximum_
lifetime str Optional. The maximum lifetime allowed by the CertificateAuthority. Note that if the any part if the issuing chain expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated.
- overwrite_
config_ Reusablevalues Config Wrapper Optional. All Certificates issued by the CertificateAuthority will use the provided configuration values, overwriting any requested configuration values.
- allowed
Common List<String>Names Optional. If any value is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed value. If no value is specified, all values will be allowed for this fied. Glob patterns are also supported.
- allowed
Config Property MapList Optional. All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper in the list.
- allowed
Issuance Property MapModes Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowed
Locations List<Property Map>And Organizations Optional. If any Subject is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed Subject. If a Subject has an empty field, any value will be allowed for that field.
- allowed
Sans Property Map Optional. If a AllowedSubjectAltNames is specified here, then all Certificates issued by the CertificateAuthority must match AllowedSubjectAltNames. If no value or an empty value is specified, any value will be allowed for the SubjectAltNames field.
- maximum
Lifetime String Optional. The maximum lifetime allowed by the CertificateAuthority. Note that if the any part if the issuing chain expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated.
- overwrite
Config Property MapValues Optional. All Certificates issued by the CertificateAuthority will use the provided configuration values, overwriting any requested configuration values.
CertificateAuthorityPolicyResponse
- Allowed
Common List<string>Names Optional. If any value is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed value. If no value is specified, all values will be allowed for this fied. Glob patterns are also supported.
- Allowed
Config Pulumi.List Google Native. Privateca. V1Beta1. Inputs. Allowed Config List Response Optional. All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper in the list.
- Allowed
Issuance Pulumi.Modes Google Native. Privateca. V1Beta1. Inputs. Issuance Modes Response Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- Allowed
Locations List<Pulumi.And Organizations Google Native. Privateca. V1Beta1. Inputs. Subject Response> Optional. If any Subject is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed Subject. If a Subject has an empty field, any value will be allowed for that field.
- Allowed
Sans Pulumi.Google Native. Privateca. V1Beta1. Inputs. Allowed Subject Alt Names Response Optional. If a AllowedSubjectAltNames is specified here, then all Certificates issued by the CertificateAuthority must match AllowedSubjectAltNames. If no value or an empty value is specified, any value will be allowed for the SubjectAltNames field.
- Maximum
Lifetime string Optional. The maximum lifetime allowed by the CertificateAuthority. Note that if the any part if the issuing chain expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated.
- Overwrite
Config Pulumi.Values Google Native. Privateca. V1Beta1. Inputs. Reusable Config Wrapper Response Optional. All Certificates issued by the CertificateAuthority will use the provided configuration values, overwriting any requested configuration values.
- Allowed
Common []stringNames Optional. If any value is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed value. If no value is specified, all values will be allowed for this fied. Glob patterns are also supported.
- Allowed
Config AllowedList Config List Response Optional. All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper in the list.
- Allowed
Issuance IssuanceModes Modes Response Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- Allowed
Locations []SubjectAnd Organizations Response Optional. If any Subject is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed Subject. If a Subject has an empty field, any value will be allowed for that field.
- Allowed
Sans AllowedSubject Alt Names Response Optional. If a AllowedSubjectAltNames is specified here, then all Certificates issued by the CertificateAuthority must match AllowedSubjectAltNames. If no value or an empty value is specified, any value will be allowed for the SubjectAltNames field.
- Maximum
Lifetime string Optional. The maximum lifetime allowed by the CertificateAuthority. Note that if the any part if the issuing chain expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated.
- Overwrite
Config ReusableValues Config Wrapper Response Optional. All Certificates issued by the CertificateAuthority will use the provided configuration values, overwriting any requested configuration values.
- allowed
Common List<String>Names Optional. If any value is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed value. If no value is specified, all values will be allowed for this fied. Glob patterns are also supported.
- allowed
Config AllowedList Config List Response Optional. All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper in the list.
- allowed
Issuance IssuanceModes Modes Response Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowed
Locations List<SubjectAnd Organizations Response> Optional. If any Subject is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed Subject. If a Subject has an empty field, any value will be allowed for that field.
- allowed
Sans AllowedSubject Alt Names Response Optional. If a AllowedSubjectAltNames is specified here, then all Certificates issued by the CertificateAuthority must match AllowedSubjectAltNames. If no value or an empty value is specified, any value will be allowed for the SubjectAltNames field.
- maximum
Lifetime String Optional. The maximum lifetime allowed by the CertificateAuthority. Note that if the any part if the issuing chain expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated.
- overwrite
Config ReusableValues Config Wrapper Response Optional. All Certificates issued by the CertificateAuthority will use the provided configuration values, overwriting any requested configuration values.
- allowed
Common string[]Names Optional. If any value is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed value. If no value is specified, all values will be allowed for this fied. Glob patterns are also supported.
- allowed
Config AllowedList Config List Response Optional. All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper in the list.
- allowed
Issuance IssuanceModes Modes Response Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowed
Locations SubjectAnd Organizations Response[] Optional. If any Subject is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed Subject. If a Subject has an empty field, any value will be allowed for that field.
- allowed
Sans AllowedSubject Alt Names Response Optional. If a AllowedSubjectAltNames is specified here, then all Certificates issued by the CertificateAuthority must match AllowedSubjectAltNames. If no value or an empty value is specified, any value will be allowed for the SubjectAltNames field.
- maximum
Lifetime string Optional. The maximum lifetime allowed by the CertificateAuthority. Note that if the any part if the issuing chain expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated.
- overwrite
Config ReusableValues Config Wrapper Response Optional. All Certificates issued by the CertificateAuthority will use the provided configuration values, overwriting any requested configuration values.
- allowed_
common_ Sequence[str]names Optional. If any value is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed value. If no value is specified, all values will be allowed for this fied. Glob patterns are also supported.
- allowed_
config_ Allowedlist Config List Response Optional. All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper in the list.
- allowed_
issuance_ Issuancemodes Modes Response Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowed_
locations_ Sequence[Subjectand_ organizations Response] Optional. If any Subject is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed Subject. If a Subject has an empty field, any value will be allowed for that field.
- allowed_
sans AllowedSubject Alt Names Response Optional. If a AllowedSubjectAltNames is specified here, then all Certificates issued by the CertificateAuthority must match AllowedSubjectAltNames. If no value or an empty value is specified, any value will be allowed for the SubjectAltNames field.
- maximum_
lifetime str Optional. The maximum lifetime allowed by the CertificateAuthority. Note that if the any part if the issuing chain expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated.
- overwrite_
config_ Reusablevalues Config Wrapper Response Optional. All Certificates issued by the CertificateAuthority will use the provided configuration values, overwriting any requested configuration values.
- allowed
Common List<String>Names Optional. If any value is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed value. If no value is specified, all values will be allowed for this fied. Glob patterns are also supported.
- allowed
Config Property MapList Optional. All Certificates issued by the CertificateAuthority must match at least one listed ReusableConfigWrapper in the list.
- allowed
Issuance Property MapModes Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowed
Locations List<Property Map>And Organizations Optional. If any Subject is specified here, then all Certificates issued by the CertificateAuthority must match at least one listed Subject. If a Subject has an empty field, any value will be allowed for that field.
- allowed
Sans Property Map Optional. If a AllowedSubjectAltNames is specified here, then all Certificates issued by the CertificateAuthority must match AllowedSubjectAltNames. If no value or an empty value is specified, any value will be allowed for the SubjectAltNames field.
- maximum
Lifetime String Optional. The maximum lifetime allowed by the CertificateAuthority. Note that if the any part if the issuing chain expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated.
- overwrite
Config Property MapValues Optional. All Certificates issued by the CertificateAuthority will use the provided configuration values, overwriting any requested configuration values.
CertificateAuthorityTier
- Tier
Unspecified - TIER_UNSPECIFIED
Not specified.
- Enterprise
- ENTERPRISE
Enterprise tier.
- Devops
- DEVOPS
DevOps tier.
- Certificate
Authority Tier Tier Unspecified - TIER_UNSPECIFIED
Not specified.
- Certificate
Authority Tier Enterprise - ENTERPRISE
Enterprise tier.
- Certificate
Authority Tier Devops - DEVOPS
DevOps tier.
- Tier
Unspecified - TIER_UNSPECIFIED
Not specified.
- Enterprise
- ENTERPRISE
Enterprise tier.
- Devops
- DEVOPS
DevOps tier.
- Tier
Unspecified - TIER_UNSPECIFIED
Not specified.
- Enterprise
- ENTERPRISE
Enterprise tier.
- Devops
- DEVOPS
DevOps tier.
- TIER_UNSPECIFIED
- TIER_UNSPECIFIED
Not specified.
- ENTERPRISE
- ENTERPRISE
Enterprise tier.
- DEVOPS
- DEVOPS
DevOps tier.
- "TIER_UNSPECIFIED"
- TIER_UNSPECIFIED
Not specified.
- "ENTERPRISE"
- ENTERPRISE
Enterprise tier.
- "DEVOPS"
- DEVOPS
DevOps tier.
CertificateAuthorityType
- Type
Unspecified - TYPE_UNSPECIFIED
Not specified.
- Self
Signed - SELF_SIGNED
Self-signed CA.
- Subordinate
- SUBORDINATE
Subordinate CA. Could be issued by a Private CA CertificateAuthority or an unmanaged CA.
- Certificate
Authority Type Type Unspecified - TYPE_UNSPECIFIED
Not specified.
- Certificate
Authority Type Self Signed - SELF_SIGNED
Self-signed CA.
- Certificate
Authority Type Subordinate - SUBORDINATE
Subordinate CA. Could be issued by a Private CA CertificateAuthority or an unmanaged CA.
- Type
Unspecified - TYPE_UNSPECIFIED
Not specified.
- Self
Signed - SELF_SIGNED
Self-signed CA.
- Subordinate
- SUBORDINATE
Subordinate CA. Could be issued by a Private CA CertificateAuthority or an unmanaged CA.
- Type
Unspecified - TYPE_UNSPECIFIED
Not specified.
- Self
Signed - SELF_SIGNED
Self-signed CA.
- Subordinate
- SUBORDINATE
Subordinate CA. Could be issued by a Private CA CertificateAuthority or an unmanaged CA.
- TYPE_UNSPECIFIED
- TYPE_UNSPECIFIED
Not specified.
- SELF_SIGNED
- SELF_SIGNED
Self-signed CA.
- SUBORDINATE
- SUBORDINATE
Subordinate CA. Could be issued by a Private CA CertificateAuthority or an unmanaged CA.
- "TYPE_UNSPECIFIED"
- TYPE_UNSPECIFIED
Not specified.
- "SELF_SIGNED"
- SELF_SIGNED
Self-signed CA.
- "SUBORDINATE"
- SUBORDINATE
Subordinate CA. Could be issued by a Private CA CertificateAuthority or an unmanaged CA.
CertificateConfig
- Reusable
Config Pulumi.Google Native. Privateca. V1Beta1. Inputs. Reusable Config Wrapper Describes how some of the technical fields in a certificate should be populated.
- Subject
Config Pulumi.Google Native. Privateca. V1Beta1. Inputs. Subject Config Specifies some of the values in a certificate that are related to the subject.
- Public
Key Pulumi.Google Native. Privateca. V1Beta1. Inputs. Public Key Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR.
- Reusable
Config ReusableConfig Wrapper Describes how some of the technical fields in a certificate should be populated.
- Subject
Config SubjectConfig Specifies some of the values in a certificate that are related to the subject.
- Public
Key PublicKey Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR.
- reusable
Config ReusableConfig Wrapper Describes how some of the technical fields in a certificate should be populated.
- subject
Config SubjectConfig Specifies some of the values in a certificate that are related to the subject.
- public
Key PublicKey Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR.
- reusable
Config ReusableConfig Wrapper Describes how some of the technical fields in a certificate should be populated.
- subject
Config SubjectConfig Specifies some of the values in a certificate that are related to the subject.
- public
Key PublicKey Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR.
- reusable_
config ReusableConfig Wrapper Describes how some of the technical fields in a certificate should be populated.
- subject_
config SubjectConfig Specifies some of the values in a certificate that are related to the subject.
- public_
key PublicKey Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR.
- reusable
Config Property Map Describes how some of the technical fields in a certificate should be populated.
- subject
Config Property Map Specifies some of the values in a certificate that are related to the subject.
- public
Key Property Map Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR.
CertificateConfigResponse
- Public
Key Pulumi.Google Native. Privateca. V1Beta1. Inputs. Public Key Response Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR.
- Reusable
Config Pulumi.Google Native. Privateca. V1Beta1. Inputs. Reusable Config Wrapper Response Describes how some of the technical fields in a certificate should be populated.
- Subject
Config Pulumi.Google Native. Privateca. V1Beta1. Inputs. Subject Config Response Specifies some of the values in a certificate that are related to the subject.
- Public
Key PublicKey Response Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR.
- Reusable
Config ReusableConfig Wrapper Response Describes how some of the technical fields in a certificate should be populated.
- Subject
Config SubjectConfig Response Specifies some of the values in a certificate that are related to the subject.
- public
Key PublicKey Response Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR.
- reusable
Config ReusableConfig Wrapper Response Describes how some of the technical fields in a certificate should be populated.
- subject
Config SubjectConfig Response Specifies some of the values in a certificate that are related to the subject.
- public
Key PublicKey Response Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR.
- reusable
Config ReusableConfig Wrapper Response Describes how some of the technical fields in a certificate should be populated.
- subject
Config SubjectConfig Response Specifies some of the values in a certificate that are related to the subject.
- public_
key PublicKey Response Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR.
- reusable_
config ReusableConfig Wrapper Response Describes how some of the technical fields in a certificate should be populated.
- subject_
config SubjectConfig Response Specifies some of the values in a certificate that are related to the subject.
- public
Key Property Map Optional. The public key that corresponds to this config. This is, for example, used when issuing Certificates, but not when creating a self-signed CertificateAuthority or CertificateAuthority CSR.
- reusable
Config Property Map Describes how some of the technical fields in a certificate should be populated.
- subject
Config Property Map Specifies some of the values in a certificate that are related to the subject.
CertificateDescriptionResponse
- Aia
Issuing List<string>Certificate Urls Describes lists of issuer CA certificate URLs that appear in the "Authority Information Access" extension in the certificate.
- Pulumi.
Google Native. Privateca. V1Beta1. Inputs. Key Id Response Identifies the subject_key_id of the parent certificate, per https://tools.ietf.org/html/rfc5280#section-4.2.1.1
- Cert
Fingerprint Pulumi.Google Native. Privateca. V1Beta1. Inputs. Certificate Fingerprint Response The hash of the x.509 certificate.
- Config
Values Pulumi.Google Native. Privateca. V1Beta1. Inputs. Reusable Config Values Response Describes some of the technical fields in a certificate.
- Crl
Distribution List<string>Points Describes a list of locations to obtain CRL information, i.e. the DistributionPoint.fullName described by https://tools.ietf.org/html/rfc5280#section-4.2.1.13
- Public
Key Pulumi.Google Native. Privateca. V1Beta1. Inputs. Public Key Response The public key that corresponds to an issued certificate.
- Subject
Description Pulumi.Google Native. Privateca. V1Beta1. Inputs. Subject Description Response Describes some of the values in a certificate that are related to the subject and lifetime.
- Subject
Key Pulumi.Id Google Native. Privateca. V1Beta1. Inputs. Key Id Response Provides a means of identifiying certificates that contain a particular public key, per https://tools.ietf.org/html/rfc5280#section-4.2.1.2.
- Aia
Issuing []stringCertificate Urls Describes lists of issuer CA certificate URLs that appear in the "Authority Information Access" extension in the certificate.
- Key
Id Response Identifies the subject_key_id of the parent certificate, per https://tools.ietf.org/html/rfc5280#section-4.2.1.1
- Cert
Fingerprint CertificateFingerprint Response The hash of the x.509 certificate.
- Config
Values ReusableConfig Values Response Describes some of the technical fields in a certificate.
- Crl
Distribution []stringPoints Describes a list of locations to obtain CRL information, i.e. the DistributionPoint.fullName described by https://tools.ietf.org/html/rfc5280#section-4.2.1.13
- Public
Key PublicKey Response The public key that corresponds to an issued certificate.
- Subject
Description SubjectDescription Response Describes some of the values in a certificate that are related to the subject and lifetime.
- Subject
Key KeyId Id Response Provides a means of identifiying certificates that contain a particular public key, per https://tools.ietf.org/html/rfc5280#section-4.2.1.2.
- aia
Issuing List<String>Certificate Urls Describes lists of issuer CA certificate URLs that appear in the "Authority Information Access" extension in the certificate.
- Key
Id Response Identifies the subject_key_id of the parent certificate, per https://tools.ietf.org/html/rfc5280#section-4.2.1.1
- cert
Fingerprint CertificateFingerprint Response The hash of the x.509 certificate.
- config
Values ReusableConfig Values Response Describes some of the technical fields in a certificate.
- crl
Distribution List<String>Points Describes a list of locations to obtain CRL information, i.e. the DistributionPoint.fullName described by https://tools.ietf.org/html/rfc5280#section-4.2.1.13
- public
Key PublicKey Response The public key that corresponds to an issued certificate.
- subject
Description SubjectDescription Response Describes some of the values in a certificate that are related to the subject and lifetime.
- subject
Key KeyId Id Response Provides a means of identifiying certificates that contain a particular public key, per https://tools.ietf.org/html/rfc5280#section-4.2.1.2.
- aia
Issuing string[]Certificate Urls Describes lists of issuer CA certificate URLs that appear in the "Authority Information Access" extension in the certificate.
- Key
Id Response Identifies the subject_key_id of the parent certificate, per https://tools.ietf.org/html/rfc5280#section-4.2.1.1
- cert
Fingerprint CertificateFingerprint Response The hash of the x.509 certificate.
- config
Values ReusableConfig Values Response Describes some of the technical fields in a certificate.
- crl
Distribution string[]Points Describes a list of locations to obtain CRL information, i.e. the DistributionPoint.fullName described by https://tools.ietf.org/html/rfc5280#section-4.2.1.13
- public
Key PublicKey Response The public key that corresponds to an issued certificate.
- subject
Description SubjectDescription Response Describes some of the values in a certificate that are related to the subject and lifetime.
- subject
Key KeyId Id Response Provides a means of identifiying certificates that contain a particular public key, per https://tools.ietf.org/html/rfc5280#section-4.2.1.2.
- aia_
issuing_ Sequence[str]certificate_ urls Describes lists of issuer CA certificate URLs that appear in the "Authority Information Access" extension in the certificate.
- Key
Id Response Identifies the subject_key_id of the parent certificate, per https://tools.ietf.org/html/rfc5280#section-4.2.1.1
- cert_
fingerprint CertificateFingerprint Response The hash of the x.509 certificate.
- config_
values ReusableConfig Values Response Describes some of the technical fields in a certificate.
- crl_
distribution_ Sequence[str]points Describes a list of locations to obtain CRL information, i.e. the DistributionPoint.fullName described by https://tools.ietf.org/html/rfc5280#section-4.2.1.13
- public_
key PublicKey Response The public key that corresponds to an issued certificate.
- subject_
description SubjectDescription Response Describes some of the values in a certificate that are related to the subject and lifetime.
- subject_
key_ Keyid Id Response Provides a means of identifiying certificates that contain a particular public key, per https://tools.ietf.org/html/rfc5280#section-4.2.1.2.
- aia
Issuing List<String>Certificate Urls Describes lists of issuer CA certificate URLs that appear in the "Authority Information Access" extension in the certificate.
- Property Map
Identifies the subject_key_id of the parent certificate, per https://tools.ietf.org/html/rfc5280#section-4.2.1.1
- cert
Fingerprint Property Map The hash of the x.509 certificate.
- config
Values Property Map Describes some of the technical fields in a certificate.
- crl
Distribution List<String>Points Describes a list of locations to obtain CRL information, i.e. the DistributionPoint.fullName described by https://tools.ietf.org/html/rfc5280#section-4.2.1.13
- public
Key Property Map The public key that corresponds to an issued certificate.
- subject
Description Property Map Describes some of the values in a certificate that are related to the subject and lifetime.
- subject
Key Property MapId Provides a means of identifiying certificates that contain a particular public key, per https://tools.ietf.org/html/rfc5280#section-4.2.1.2.
CertificateFingerprintResponse
- Sha256Hash string
The SHA 256 hash, encoded in hexadecimal, of the DER x509 certificate.
- Sha256Hash string
The SHA 256 hash, encoded in hexadecimal, of the DER x509 certificate.
- sha256Hash String
The SHA 256 hash, encoded in hexadecimal, of the DER x509 certificate.
- sha256Hash string
The SHA 256 hash, encoded in hexadecimal, of the DER x509 certificate.
- sha256_
hash str The SHA 256 hash, encoded in hexadecimal, of the DER x509 certificate.
- sha256Hash String
The SHA 256 hash, encoded in hexadecimal, of the DER x509 certificate.
ExtendedKeyUsageOptions
- Client
Auth bool Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- Code
Signing bool Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- Email
Protection bool Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- Ocsp
Signing bool Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- Server
Auth bool Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- Time
Stamping bool Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- Client
Auth bool Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- Code
Signing bool Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- Email
Protection bool Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- Ocsp
Signing bool Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- Server
Auth bool Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- Time
Stamping bool Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- client
Auth Boolean Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- code
Signing Boolean Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- email
Protection Boolean Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocsp
Signing Boolean Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- server
Auth Boolean Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- time
Stamping Boolean Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- client
Auth boolean Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- code
Signing boolean Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- email
Protection boolean Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocsp
Signing boolean Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- server
Auth boolean Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- time
Stamping boolean Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- client_
auth bool Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- code_
signing bool Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- email_
protection bool Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocsp_
signing bool Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- server_
auth bool Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- time_
stamping bool Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- client
Auth Boolean Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- code
Signing Boolean Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- email
Protection Boolean Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocsp
Signing Boolean Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- server
Auth Boolean Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- time
Stamping Boolean Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
ExtendedKeyUsageOptionsResponse
- Client
Auth bool Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- Code
Signing bool Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- Email
Protection bool Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- Ocsp
Signing bool Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- Server
Auth bool Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- Time
Stamping bool Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- Client
Auth bool Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- Code
Signing bool Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- Email
Protection bool Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- Ocsp
Signing bool Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- Server
Auth bool Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- Time
Stamping bool Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- client
Auth Boolean Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- code
Signing Boolean Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- email
Protection Boolean Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocsp
Signing Boolean Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- server
Auth Boolean Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- time
Stamping Boolean Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- client
Auth boolean Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- code
Signing boolean Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- email
Protection boolean Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocsp
Signing boolean Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- server
Auth boolean Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- time
Stamping boolean Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- client_
auth bool Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- code_
signing bool Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- email_
protection bool Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocsp_
signing bool Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- server_
auth bool Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- time_
stamping bool Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- client
Auth Boolean Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- code
Signing Boolean Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- email
Protection Boolean Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocsp
Signing Boolean Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- server
Auth Boolean Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- time
Stamping Boolean Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
IssuanceModes
- Allow
Config boolBased Issuance When true, allows callers to create Certificates by specifying a CertificateConfig.
- Allow
Csr boolBased Issuance When true, allows callers to create Certificates by specifying a CSR.
- Allow
Config boolBased Issuance When true, allows callers to create Certificates by specifying a CertificateConfig.
- Allow
Csr boolBased Issuance When true, allows callers to create Certificates by specifying a CSR.
- allow
Config BooleanBased Issuance When true, allows callers to create Certificates by specifying a CertificateConfig.
- allow
Csr BooleanBased Issuance When true, allows callers to create Certificates by specifying a CSR.
- allow
Config booleanBased Issuance When true, allows callers to create Certificates by specifying a CertificateConfig.
- allow
Csr booleanBased Issuance When true, allows callers to create Certificates by specifying a CSR.
- allow_
config_ boolbased_ issuance When true, allows callers to create Certificates by specifying a CertificateConfig.
- allow_
csr_ boolbased_ issuance When true, allows callers to create Certificates by specifying a CSR.
- allow
Config BooleanBased Issuance When true, allows callers to create Certificates by specifying a CertificateConfig.
- allow
Csr BooleanBased Issuance When true, allows callers to create Certificates by specifying a CSR.
IssuanceModesResponse
- Allow
Config boolBased Issuance When true, allows callers to create Certificates by specifying a CertificateConfig.
- Allow
Csr boolBased Issuance When true, allows callers to create Certificates by specifying a CSR.
- Allow
Config boolBased Issuance When true, allows callers to create Certificates by specifying a CertificateConfig.
- Allow
Csr boolBased Issuance When true, allows callers to create Certificates by specifying a CSR.
- allow
Config BooleanBased Issuance When true, allows callers to create Certificates by specifying a CertificateConfig.
- allow
Csr BooleanBased Issuance When true, allows callers to create Certificates by specifying a CSR.
- allow
Config booleanBased Issuance When true, allows callers to create Certificates by specifying a CertificateConfig.
- allow
Csr booleanBased Issuance When true, allows callers to create Certificates by specifying a CSR.
- allow_
config_ boolbased_ issuance When true, allows callers to create Certificates by specifying a CertificateConfig.
- allow_
csr_ boolbased_ issuance When true, allows callers to create Certificates by specifying a CSR.
- allow
Config BooleanBased Issuance When true, allows callers to create Certificates by specifying a CertificateConfig.
- allow
Csr BooleanBased Issuance When true, allows callers to create Certificates by specifying a CSR.
IssuingOptions
- Include
Ca boolCert Url When true, includes a URL to the issuing CA certificate in the "authority information access" X.509 extension.
- Include
Crl boolAccess Url When true, includes a URL to the CRL corresponding to certificates issued from a CertificateAuthority. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- Include
Ca boolCert Url When true, includes a URL to the issuing CA certificate in the "authority information access" X.509 extension.
- Include
Crl boolAccess Url When true, includes a URL to the CRL corresponding to certificates issued from a CertificateAuthority. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- include
Ca BooleanCert Url When true, includes a URL to the issuing CA certificate in the "authority information access" X.509 extension.
- include
Crl BooleanAccess Url When true, includes a URL to the CRL corresponding to certificates issued from a CertificateAuthority. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- include
Ca booleanCert Url When true, includes a URL to the issuing CA certificate in the "authority information access" X.509 extension.
- include
Crl booleanAccess Url When true, includes a URL to the CRL corresponding to certificates issued from a CertificateAuthority. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- include_
ca_ boolcert_ url When true, includes a URL to the issuing CA certificate in the "authority information access" X.509 extension.
- include_
crl_ boolaccess_ url When true, includes a URL to the CRL corresponding to certificates issued from a CertificateAuthority. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- include
Ca BooleanCert Url When true, includes a URL to the issuing CA certificate in the "authority information access" X.509 extension.
- include
Crl BooleanAccess Url When true, includes a URL to the CRL corresponding to certificates issued from a CertificateAuthority. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
IssuingOptionsResponse
- Include
Ca boolCert Url When true, includes a URL to the issuing CA certificate in the "authority information access" X.509 extension.
- Include
Crl boolAccess Url When true, includes a URL to the CRL corresponding to certificates issued from a CertificateAuthority. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- Include
Ca boolCert Url When true, includes a URL to the issuing CA certificate in the "authority information access" X.509 extension.
- Include
Crl boolAccess Url When true, includes a URL to the CRL corresponding to certificates issued from a CertificateAuthority. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- include
Ca BooleanCert Url When true, includes a URL to the issuing CA certificate in the "authority information access" X.509 extension.
- include
Crl BooleanAccess Url When true, includes a URL to the CRL corresponding to certificates issued from a CertificateAuthority. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- include
Ca booleanCert Url When true, includes a URL to the issuing CA certificate in the "authority information access" X.509 extension.
- include
Crl booleanAccess Url When true, includes a URL to the CRL corresponding to certificates issued from a CertificateAuthority. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- include_
ca_ boolcert_ url When true, includes a URL to the issuing CA certificate in the "authority information access" X.509 extension.
- include_
crl_ boolaccess_ url When true, includes a URL to the CRL corresponding to certificates issued from a CertificateAuthority. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- include
Ca BooleanCert Url When true, includes a URL to the issuing CA certificate in the "authority information access" X.509 extension.
- include
Crl BooleanAccess Url When true, includes a URL to the CRL corresponding to certificates issued from a CertificateAuthority. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
KeyIdResponse
- Key
Id string Optional. The value of this KeyId encoded in lowercase hexadecimal. This is most likely the 160 bit SHA-1 hash of the public key.
- Key
Id string Optional. The value of this KeyId encoded in lowercase hexadecimal. This is most likely the 160 bit SHA-1 hash of the public key.
- key
Id String Optional. The value of this KeyId encoded in lowercase hexadecimal. This is most likely the 160 bit SHA-1 hash of the public key.
- key
Id string Optional. The value of this KeyId encoded in lowercase hexadecimal. This is most likely the 160 bit SHA-1 hash of the public key.
- key_
id str Optional. The value of this KeyId encoded in lowercase hexadecimal. This is most likely the 160 bit SHA-1 hash of the public key.
- key
Id String Optional. The value of this KeyId encoded in lowercase hexadecimal. This is most likely the 160 bit SHA-1 hash of the public key.
KeyUsage
- Base
Key Pulumi.Usage Google Native. Privateca. V1Beta1. Inputs. Key Usage Options Describes high-level ways in which a key may be used.
- Extended
Key Pulumi.Usage Google Native. Privateca. V1Beta1. Inputs. Extended Key Usage Options Detailed scenarios in which a key may be used.
- Unknown
Extended List<Pulumi.Key Usages Google Native. Privateca. V1Beta1. Inputs. Object Id> Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- Base
Key KeyUsage Usage Options Describes high-level ways in which a key may be used.
- Extended
Key ExtendedUsage Key Usage Options Detailed scenarios in which a key may be used.
- Unknown
Extended []ObjectKey Usages Id Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- base
Key KeyUsage Usage Options Describes high-level ways in which a key may be used.
- extended
Key ExtendedUsage Key Usage Options Detailed scenarios in which a key may be used.
- unknown
Extended List<ObjectKey Usages Id> Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- base
Key KeyUsage Usage Options Describes high-level ways in which a key may be used.
- extended
Key ExtendedUsage Key Usage Options Detailed scenarios in which a key may be used.
- unknown
Extended ObjectKey Usages Id[] Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- base_
key_ Keyusage Usage Options Describes high-level ways in which a key may be used.
- extended_
key_ Extendedusage Key Usage Options Detailed scenarios in which a key may be used.
- unknown_
extended_ Sequence[Objectkey_ usages Id] Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- base
Key Property MapUsage Describes high-level ways in which a key may be used.
- extended
Key Property MapUsage Detailed scenarios in which a key may be used.
- unknown
Extended List<Property Map>Key Usages Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
KeyUsageOptions
- Cert
Sign bool The key may be used to sign certificates.
- Content
Commitment bool The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- Crl
Sign bool The key may be used sign certificate revocation lists.
- Data
Encipherment bool The key may be used to encipher data.
- Decipher
Only bool The key may be used to decipher only.
- Digital
Signature bool The key may be used for digital signatures.
- Encipher
Only bool The key may be used to encipher only.
- Key
Agreement bool The key may be used in a key agreement protocol.
- Key
Encipherment bool The key may be used to encipher other keys.
- Cert
Sign bool The key may be used to sign certificates.
- Content
Commitment bool The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- Crl
Sign bool The key may be used sign certificate revocation lists.
- Data
Encipherment bool The key may be used to encipher data.
- Decipher
Only bool The key may be used to decipher only.
- Digital
Signature bool The key may be used for digital signatures.
- Encipher
Only bool The key may be used to encipher only.
- Key
Agreement bool The key may be used in a key agreement protocol.
- Key
Encipherment bool The key may be used to encipher other keys.
- cert
Sign Boolean The key may be used to sign certificates.
- content
Commitment Boolean The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crl
Sign Boolean The key may be used sign certificate revocation lists.
- data
Encipherment Boolean The key may be used to encipher data.
- decipher
Only Boolean The key may be used to decipher only.
- digital
Signature Boolean The key may be used for digital signatures.
- encipher
Only Boolean The key may be used to encipher only.
- key
Agreement Boolean The key may be used in a key agreement protocol.
- key
Encipherment Boolean The key may be used to encipher other keys.
- cert
Sign boolean The key may be used to sign certificates.
- content
Commitment boolean The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crl
Sign boolean The key may be used sign certificate revocation lists.
- data
Encipherment boolean The key may be used to encipher data.
- decipher
Only boolean The key may be used to decipher only.
- digital
Signature boolean The key may be used for digital signatures.
- encipher
Only boolean The key may be used to encipher only.
- key
Agreement boolean The key may be used in a key agreement protocol.
- key
Encipherment boolean The key may be used to encipher other keys.
- cert_
sign bool The key may be used to sign certificates.
- content_
commitment bool The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crl_
sign bool The key may be used sign certificate revocation lists.
- data_
encipherment bool The key may be used to encipher data.
- decipher_
only bool The key may be used to decipher only.
- digital_
signature bool The key may be used for digital signatures.
- encipher_
only bool The key may be used to encipher only.
- key_
agreement bool The key may be used in a key agreement protocol.
- key_
encipherment bool The key may be used to encipher other keys.
- cert
Sign Boolean The key may be used to sign certificates.
- content
Commitment Boolean The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crl
Sign Boolean The key may be used sign certificate revocation lists.
- data
Encipherment Boolean The key may be used to encipher data.
- decipher
Only Boolean The key may be used to decipher only.
- digital
Signature Boolean The key may be used for digital signatures.
- encipher
Only Boolean The key may be used to encipher only.
- key
Agreement Boolean The key may be used in a key agreement protocol.
- key
Encipherment Boolean The key may be used to encipher other keys.
KeyUsageOptionsResponse
- Cert
Sign bool The key may be used to sign certificates.
- Content
Commitment bool The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- Crl
Sign bool The key may be used sign certificate revocation lists.
- Data
Encipherment bool The key may be used to encipher data.
- Decipher
Only bool The key may be used to decipher only.
- Digital
Signature bool The key may be used for digital signatures.
- Encipher
Only bool The key may be used to encipher only.
- Key
Agreement bool The key may be used in a key agreement protocol.
- Key
Encipherment bool The key may be used to encipher other keys.
- Cert
Sign bool The key may be used to sign certificates.
- Content
Commitment bool The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- Crl
Sign bool The key may be used sign certificate revocation lists.
- Data
Encipherment bool The key may be used to encipher data.
- Decipher
Only bool The key may be used to decipher only.
- Digital
Signature bool The key may be used for digital signatures.
- Encipher
Only bool The key may be used to encipher only.
- Key
Agreement bool The key may be used in a key agreement protocol.
- Key
Encipherment bool The key may be used to encipher other keys.
- cert
Sign Boolean The key may be used to sign certificates.
- content
Commitment Boolean The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crl
Sign Boolean The key may be used sign certificate revocation lists.
- data
Encipherment Boolean The key may be used to encipher data.
- decipher
Only Boolean The key may be used to decipher only.
- digital
Signature Boolean The key may be used for digital signatures.
- encipher
Only Boolean The key may be used to encipher only.
- key
Agreement Boolean The key may be used in a key agreement protocol.
- key
Encipherment Boolean The key may be used to encipher other keys.
- cert
Sign boolean The key may be used to sign certificates.
- content
Commitment boolean The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crl
Sign boolean The key may be used sign certificate revocation lists.
- data
Encipherment boolean The key may be used to encipher data.
- decipher
Only boolean The key may be used to decipher only.
- digital
Signature boolean The key may be used for digital signatures.
- encipher
Only boolean The key may be used to encipher only.
- key
Agreement boolean The key may be used in a key agreement protocol.
- key
Encipherment boolean The key may be used to encipher other keys.
- cert_
sign bool The key may be used to sign certificates.
- content_
commitment bool The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crl_
sign bool The key may be used sign certificate revocation lists.
- data_
encipherment bool The key may be used to encipher data.
- decipher_
only bool The key may be used to decipher only.
- digital_
signature bool The key may be used for digital signatures.
- encipher_
only bool The key may be used to encipher only.
- key_
agreement bool The key may be used in a key agreement protocol.
- key_
encipherment bool The key may be used to encipher other keys.
- cert
Sign Boolean The key may be used to sign certificates.
- content
Commitment Boolean The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crl
Sign Boolean The key may be used sign certificate revocation lists.
- data
Encipherment Boolean The key may be used to encipher data.
- decipher
Only Boolean The key may be used to decipher only.
- digital
Signature Boolean The key may be used for digital signatures.
- encipher
Only Boolean The key may be used to encipher only.
- key
Agreement Boolean The key may be used in a key agreement protocol.
- key
Encipherment Boolean The key may be used to encipher other keys.
KeyUsageResponse
- Base
Key Pulumi.Usage Google Native. Privateca. V1Beta1. Inputs. Key Usage Options Response Describes high-level ways in which a key may be used.
- Extended
Key Pulumi.Usage Google Native. Privateca. V1Beta1. Inputs. Extended Key Usage Options Response Detailed scenarios in which a key may be used.
- Unknown
Extended List<Pulumi.Key Usages Google Native. Privateca. V1Beta1. Inputs. Object Id Response> Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- Base
Key KeyUsage Usage Options Response Describes high-level ways in which a key may be used.
- Extended
Key ExtendedUsage Key Usage Options Response Detailed scenarios in which a key may be used.
- Unknown
Extended []ObjectKey Usages Id Response Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- base
Key KeyUsage Usage Options Response Describes high-level ways in which a key may be used.
- extended
Key ExtendedUsage Key Usage Options Response Detailed scenarios in which a key may be used.
- unknown
Extended List<ObjectKey Usages Id Response> Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- base
Key KeyUsage Usage Options Response Describes high-level ways in which a key may be used.
- extended
Key ExtendedUsage Key Usage Options Response Detailed scenarios in which a key may be used.
- unknown
Extended ObjectKey Usages Id Response[] Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- base_
key_ Keyusage Usage Options Response Describes high-level ways in which a key may be used.
- extended_
key_ Extendedusage Key Usage Options Response Detailed scenarios in which a key may be used.
- unknown_
extended_ Sequence[Objectkey_ usages Id Response] Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- base
Key Property MapUsage Describes high-level ways in which a key may be used.
- extended
Key Property MapUsage Detailed scenarios in which a key may be used.
- unknown
Extended List<Property Map>Key Usages Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
KeyVersionSpec
- Algorithm
Pulumi.
Google Native. Privateca. V1Beta1. Key Version Spec Algorithm The algorithm to use for creating a managed Cloud KMS key for a for a simplified experience. All managed keys will be have their ProtectionLevel as
HSM
.- Cloud
Kms stringKey Version The resource name for an existing Cloud KMS CryptoKeyVersion in the format
projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*
. This option enables full flexibility in the key's capabilities and properties.
- Algorithm
Key
Version Spec Algorithm The algorithm to use for creating a managed Cloud KMS key for a for a simplified experience. All managed keys will be have their ProtectionLevel as
HSM
.- Cloud
Kms stringKey Version The resource name for an existing Cloud KMS CryptoKeyVersion in the format
projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*
. This option enables full flexibility in the key's capabilities and properties.
- algorithm
Key
Version Spec Algorithm The algorithm to use for creating a managed Cloud KMS key for a for a simplified experience. All managed keys will be have their ProtectionLevel as
HSM
.- cloud
Kms StringKey Version The resource name for an existing Cloud KMS CryptoKeyVersion in the format
projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*
. This option enables full flexibility in the key's capabilities and properties.
- algorithm
Key
Version Spec Algorithm The algorithm to use for creating a managed Cloud KMS key for a for a simplified experience. All managed keys will be have their ProtectionLevel as
HSM
.- cloud
Kms stringKey Version The resource name for an existing Cloud KMS CryptoKeyVersion in the format
projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*
. This option enables full flexibility in the key's capabilities and properties.
- algorithm
Key
Version Spec Algorithm The algorithm to use for creating a managed Cloud KMS key for a for a simplified experience. All managed keys will be have their ProtectionLevel as
HSM
.- cloud_
kms_ strkey_ version The resource name for an existing Cloud KMS CryptoKeyVersion in the format
projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*
. This option enables full flexibility in the key's capabilities and properties.
- algorithm "SIGN_HASH_ALGORITHM_UNSPECIFIED" | "RSA_PSS_2048_SHA256" | "RSA_PSS_3072_SHA256" | "RSA_PSS_4096_SHA256" | "RSA_PKCS1_2048_SHA256" | "RSA_PKCS1_3072_SHA256" | "RSA_PKCS1_4096_SHA256" | "EC_P256_SHA256" | "EC_P384_SHA384"
The algorithm to use for creating a managed Cloud KMS key for a for a simplified experience. All managed keys will be have their ProtectionLevel as
HSM
.- cloud
Kms StringKey Version The resource name for an existing Cloud KMS CryptoKeyVersion in the format
projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*
. This option enables full flexibility in the key's capabilities and properties.
KeyVersionSpecAlgorithm
- Sign
Hash Algorithm Unspecified - SIGN_HASH_ALGORITHM_UNSPECIFIED
Not specified.
- Rsa
Pss2048Sha256 - RSA_PSS_2048_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_2048_SHA256
- Rsa
Pss3072Sha256 - RSA_PSS_3072_SHA256
maps to CryptoKeyVersionAlgorithm. RSA_SIGN_PSS_3072_SHA256
- Rsa
Pss4096Sha256 - RSA_PSS_4096_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_4096_SHA256
- Rsa
Pkcs12048Sha256 - RSA_PKCS1_2048_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_2048_SHA256
- Rsa
Pkcs13072Sha256 - RSA_PKCS1_3072_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_3072_SHA256
- Rsa
Pkcs14096Sha256 - RSA_PKCS1_4096_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_4096_SHA256
- Ec
P256Sha256 - EC_P256_SHA256
maps to CryptoKeyVersionAlgorithm.EC_SIGN_P256_SHA256
- Ec
P384Sha384 - EC_P384_SHA384
maps to CryptoKeyVersionAlgorithm.EC_SIGN_P384_SHA384
- Key
Version Spec Algorithm Sign Hash Algorithm Unspecified - SIGN_HASH_ALGORITHM_UNSPECIFIED
Not specified.
- Key
Version Spec Algorithm Rsa Pss2048Sha256 - RSA_PSS_2048_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_2048_SHA256
- Key
Version Spec Algorithm Rsa Pss3072Sha256 - RSA_PSS_3072_SHA256
maps to CryptoKeyVersionAlgorithm. RSA_SIGN_PSS_3072_SHA256
- Key
Version Spec Algorithm Rsa Pss4096Sha256 - RSA_PSS_4096_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_4096_SHA256
- Key
Version Spec Algorithm Rsa Pkcs12048Sha256 - RSA_PKCS1_2048_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_2048_SHA256
- Key
Version Spec Algorithm Rsa Pkcs13072Sha256 - RSA_PKCS1_3072_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_3072_SHA256
- Key
Version Spec Algorithm Rsa Pkcs14096Sha256 - RSA_PKCS1_4096_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_4096_SHA256
- Key
Version Spec Algorithm Ec P256Sha256 - EC_P256_SHA256
maps to CryptoKeyVersionAlgorithm.EC_SIGN_P256_SHA256
- Key
Version Spec Algorithm Ec P384Sha384 - EC_P384_SHA384
maps to CryptoKeyVersionAlgorithm.EC_SIGN_P384_SHA384
- Sign
Hash Algorithm Unspecified - SIGN_HASH_ALGORITHM_UNSPECIFIED
Not specified.
- Rsa
Pss2048Sha256 - RSA_PSS_2048_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_2048_SHA256
- Rsa
Pss3072Sha256 - RSA_PSS_3072_SHA256
maps to CryptoKeyVersionAlgorithm. RSA_SIGN_PSS_3072_SHA256
- Rsa
Pss4096Sha256 - RSA_PSS_4096_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_4096_SHA256
- Rsa
Pkcs12048Sha256 - RSA_PKCS1_2048_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_2048_SHA256
- Rsa
Pkcs13072Sha256 - RSA_PKCS1_3072_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_3072_SHA256
- Rsa
Pkcs14096Sha256 - RSA_PKCS1_4096_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_4096_SHA256
- Ec
P256Sha256 - EC_P256_SHA256
maps to CryptoKeyVersionAlgorithm.EC_SIGN_P256_SHA256
- Ec
P384Sha384 - EC_P384_SHA384
maps to CryptoKeyVersionAlgorithm.EC_SIGN_P384_SHA384
- Sign
Hash Algorithm Unspecified - SIGN_HASH_ALGORITHM_UNSPECIFIED
Not specified.
- Rsa
Pss2048Sha256 - RSA_PSS_2048_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_2048_SHA256
- Rsa
Pss3072Sha256 - RSA_PSS_3072_SHA256
maps to CryptoKeyVersionAlgorithm. RSA_SIGN_PSS_3072_SHA256
- Rsa
Pss4096Sha256 - RSA_PSS_4096_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_4096_SHA256
- Rsa
Pkcs12048Sha256 - RSA_PKCS1_2048_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_2048_SHA256
- Rsa
Pkcs13072Sha256 - RSA_PKCS1_3072_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_3072_SHA256
- Rsa
Pkcs14096Sha256 - RSA_PKCS1_4096_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_4096_SHA256
- Ec
P256Sha256 - EC_P256_SHA256
maps to CryptoKeyVersionAlgorithm.EC_SIGN_P256_SHA256
- Ec
P384Sha384 - EC_P384_SHA384
maps to CryptoKeyVersionAlgorithm.EC_SIGN_P384_SHA384
- SIGN_HASH_ALGORITHM_UNSPECIFIED
- SIGN_HASH_ALGORITHM_UNSPECIFIED
Not specified.
- RSA_PSS2048_SHA256
- RSA_PSS_2048_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_2048_SHA256
- RSA_PSS3072_SHA256
- RSA_PSS_3072_SHA256
maps to CryptoKeyVersionAlgorithm. RSA_SIGN_PSS_3072_SHA256
- RSA_PSS4096_SHA256
- RSA_PSS_4096_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_4096_SHA256
- RSA_PKCS12048_SHA256
- RSA_PKCS1_2048_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_2048_SHA256
- RSA_PKCS13072_SHA256
- RSA_PKCS1_3072_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_3072_SHA256
- RSA_PKCS14096_SHA256
- RSA_PKCS1_4096_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_4096_SHA256
- EC_P256_SHA256
- EC_P256_SHA256
maps to CryptoKeyVersionAlgorithm.EC_SIGN_P256_SHA256
- EC_P384_SHA384
- EC_P384_SHA384
maps to CryptoKeyVersionAlgorithm.EC_SIGN_P384_SHA384
- "SIGN_HASH_ALGORITHM_UNSPECIFIED"
- SIGN_HASH_ALGORITHM_UNSPECIFIED
Not specified.
- "RSA_PSS_2048_SHA256"
- RSA_PSS_2048_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_2048_SHA256
- "RSA_PSS_3072_SHA256"
- RSA_PSS_3072_SHA256
maps to CryptoKeyVersionAlgorithm. RSA_SIGN_PSS_3072_SHA256
- "RSA_PSS_4096_SHA256"
- RSA_PSS_4096_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PSS_4096_SHA256
- "RSA_PKCS1_2048_SHA256"
- RSA_PKCS1_2048_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_2048_SHA256
- "RSA_PKCS1_3072_SHA256"
- RSA_PKCS1_3072_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_3072_SHA256
- "RSA_PKCS1_4096_SHA256"
- RSA_PKCS1_4096_SHA256
maps to CryptoKeyVersionAlgorithm.RSA_SIGN_PKCS1_4096_SHA256
- "EC_P256_SHA256"
- EC_P256_SHA256
maps to CryptoKeyVersionAlgorithm.EC_SIGN_P256_SHA256
- "EC_P384_SHA384"
- EC_P384_SHA384
maps to CryptoKeyVersionAlgorithm.EC_SIGN_P384_SHA384
KeyVersionSpecResponse
- Algorithm string
The algorithm to use for creating a managed Cloud KMS key for a for a simplified experience. All managed keys will be have their ProtectionLevel as
HSM
.- Cloud
Kms stringKey Version The resource name for an existing Cloud KMS CryptoKeyVersion in the format
projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*
. This option enables full flexibility in the key's capabilities and properties.
- Algorithm string
The algorithm to use for creating a managed Cloud KMS key for a for a simplified experience. All managed keys will be have their ProtectionLevel as
HSM
.- Cloud
Kms stringKey Version The resource name for an existing Cloud KMS CryptoKeyVersion in the format
projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*
. This option enables full flexibility in the key's capabilities and properties.
- algorithm String
The algorithm to use for creating a managed Cloud KMS key for a for a simplified experience. All managed keys will be have their ProtectionLevel as
HSM
.- cloud
Kms StringKey Version The resource name for an existing Cloud KMS CryptoKeyVersion in the format
projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*
. This option enables full flexibility in the key's capabilities and properties.
- algorithm string
The algorithm to use for creating a managed Cloud KMS key for a for a simplified experience. All managed keys will be have their ProtectionLevel as
HSM
.- cloud
Kms stringKey Version The resource name for an existing Cloud KMS CryptoKeyVersion in the format
projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*
. This option enables full flexibility in the key's capabilities and properties.
- algorithm str
The algorithm to use for creating a managed Cloud KMS key for a for a simplified experience. All managed keys will be have their ProtectionLevel as
HSM
.- cloud_
kms_ strkey_ version The resource name for an existing Cloud KMS CryptoKeyVersion in the format
projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*
. This option enables full flexibility in the key's capabilities and properties.
- algorithm String
The algorithm to use for creating a managed Cloud KMS key for a for a simplified experience. All managed keys will be have their ProtectionLevel as
HSM
.- cloud
Kms StringKey Version The resource name for an existing Cloud KMS CryptoKeyVersion in the format
projects/*/locations/*/keyRings/*/cryptoKeys/*/cryptoKeyVersions/*
. This option enables full flexibility in the key's capabilities and properties.
ObjectId
- Object
Id List<int>Path The parts of an OID path. The most significant parts of the path come first.
- Object
Id []intPath The parts of an OID path. The most significant parts of the path come first.
- object
Id List<Integer>Path The parts of an OID path. The most significant parts of the path come first.
- object
Id number[]Path The parts of an OID path. The most significant parts of the path come first.
- object_
id_ Sequence[int]path The parts of an OID path. The most significant parts of the path come first.
- object
Id List<Number>Path The parts of an OID path. The most significant parts of the path come first.
ObjectIdResponse
- Object
Id List<int>Path The parts of an OID path. The most significant parts of the path come first.
- Object
Id []intPath The parts of an OID path. The most significant parts of the path come first.
- object
Id List<Integer>Path The parts of an OID path. The most significant parts of the path come first.
- object
Id number[]Path The parts of an OID path. The most significant parts of the path come first.
- object_
id_ Sequence[int]path The parts of an OID path. The most significant parts of the path come first.
- object
Id List<Number>Path The parts of an OID path. The most significant parts of the path come first.
PublicKey
- Key string
A public key. When this is specified in a request, the padding and encoding can be any of the options described by the respective 'KeyType' value. When this is generated by the service, it will always be an RFC 5280 SubjectPublicKeyInfo structure containing an algorithm identifier and a key.
- Type
Pulumi.
Google Native. Privateca. V1Beta1. Public Key Type Optional. The type of public key. If specified, it must match the public key used for the
key
field.
- Key string
A public key. When this is specified in a request, the padding and encoding can be any of the options described by the respective 'KeyType' value. When this is generated by the service, it will always be an RFC 5280 SubjectPublicKeyInfo structure containing an algorithm identifier and a key.
- Type
Public
Key Type Optional. The type of public key. If specified, it must match the public key used for the
key
field.
- key String
A public key. When this is specified in a request, the padding and encoding can be any of the options described by the respective 'KeyType' value. When this is generated by the service, it will always be an RFC 5280 SubjectPublicKeyInfo structure containing an algorithm identifier and a key.
- type
Public
Key Type Optional. The type of public key. If specified, it must match the public key used for the
key
field.
- key string
A public key. When this is specified in a request, the padding and encoding can be any of the options described by the respective 'KeyType' value. When this is generated by the service, it will always be an RFC 5280 SubjectPublicKeyInfo structure containing an algorithm identifier and a key.
- type
Public
Key Type Optional. The type of public key. If specified, it must match the public key used for the
key
field.
- key str
A public key. When this is specified in a request, the padding and encoding can be any of the options described by the respective 'KeyType' value. When this is generated by the service, it will always be an RFC 5280 SubjectPublicKeyInfo structure containing an algorithm identifier and a key.
- type
Public
Key Type Optional. The type of public key. If specified, it must match the public key used for the
key
field.
- key String
A public key. When this is specified in a request, the padding and encoding can be any of the options described by the respective 'KeyType' value. When this is generated by the service, it will always be an RFC 5280 SubjectPublicKeyInfo structure containing an algorithm identifier and a key.
- type "KEY_TYPE_UNSPECIFIED" | "PEM_RSA_KEY" | "PEM_EC_KEY"
Optional. The type of public key. If specified, it must match the public key used for the
key
field.
PublicKeyResponse
- Key string
A public key. When this is specified in a request, the padding and encoding can be any of the options described by the respective 'KeyType' value. When this is generated by the service, it will always be an RFC 5280 SubjectPublicKeyInfo structure containing an algorithm identifier and a key.
- Type string
Optional. The type of public key. If specified, it must match the public key used for the
key
field.
- Key string
A public key. When this is specified in a request, the padding and encoding can be any of the options described by the respective 'KeyType' value. When this is generated by the service, it will always be an RFC 5280 SubjectPublicKeyInfo structure containing an algorithm identifier and a key.
- Type string
Optional. The type of public key. If specified, it must match the public key used for the
key
field.
- key String
A public key. When this is specified in a request, the padding and encoding can be any of the options described by the respective 'KeyType' value. When this is generated by the service, it will always be an RFC 5280 SubjectPublicKeyInfo structure containing an algorithm identifier and a key.
- type String
Optional. The type of public key. If specified, it must match the public key used for the
key
field.
- key string
A public key. When this is specified in a request, the padding and encoding can be any of the options described by the respective 'KeyType' value. When this is generated by the service, it will always be an RFC 5280 SubjectPublicKeyInfo structure containing an algorithm identifier and a key.
- type string
Optional. The type of public key. If specified, it must match the public key used for the
key
field.
- key str
A public key. When this is specified in a request, the padding and encoding can be any of the options described by the respective 'KeyType' value. When this is generated by the service, it will always be an RFC 5280 SubjectPublicKeyInfo structure containing an algorithm identifier and a key.
- type str
Optional. The type of public key. If specified, it must match the public key used for the
key
field.
- key String
A public key. When this is specified in a request, the padding and encoding can be any of the options described by the respective 'KeyType' value. When this is generated by the service, it will always be an RFC 5280 SubjectPublicKeyInfo structure containing an algorithm identifier and a key.
- type String
Optional. The type of public key. If specified, it must match the public key used for the
key
field.
PublicKeyType
- Key
Type Unspecified - KEY_TYPE_UNSPECIFIED
Default unspecified value.
- Pem
Rsa Key - PEM_RSA_KEY
A PEM-encoded PKCS#1/RFC 3447 RSAPublicKey structure, or an RFC 5280 SubjectPublicKeyInfo structure containing the former.
- Pem
Ec Key - PEM_EC_KEY
An RFC 5280 SubjectPublicKeyInfo structure containing a PEM-encoded compressed NIST P-256/secp256r1/prime256v1 or P-384 key.
- Public
Key Type Key Type Unspecified - KEY_TYPE_UNSPECIFIED
Default unspecified value.
- Public
Key Type Pem Rsa Key - PEM_RSA_KEY
A PEM-encoded PKCS#1/RFC 3447 RSAPublicKey structure, or an RFC 5280 SubjectPublicKeyInfo structure containing the former.
- Public
Key Type Pem Ec Key - PEM_EC_KEY
An RFC 5280 SubjectPublicKeyInfo structure containing a PEM-encoded compressed NIST P-256/secp256r1/prime256v1 or P-384 key.
- Key
Type Unspecified - KEY_TYPE_UNSPECIFIED
Default unspecified value.
- Pem
Rsa Key - PEM_RSA_KEY
A PEM-encoded PKCS#1/RFC 3447 RSAPublicKey structure, or an RFC 5280 SubjectPublicKeyInfo structure containing the former.
- Pem
Ec Key - PEM_EC_KEY
An RFC 5280 SubjectPublicKeyInfo structure containing a PEM-encoded compressed NIST P-256/secp256r1/prime256v1 or P-384 key.
- Key
Type Unspecified - KEY_TYPE_UNSPECIFIED
Default unspecified value.
- Pem
Rsa Key - PEM_RSA_KEY
A PEM-encoded PKCS#1/RFC 3447 RSAPublicKey structure, or an RFC 5280 SubjectPublicKeyInfo structure containing the former.
- Pem
Ec Key - PEM_EC_KEY
An RFC 5280 SubjectPublicKeyInfo structure containing a PEM-encoded compressed NIST P-256/secp256r1/prime256v1 or P-384 key.
- KEY_TYPE_UNSPECIFIED
- KEY_TYPE_UNSPECIFIED
Default unspecified value.
- PEM_RSA_KEY
- PEM_RSA_KEY
A PEM-encoded PKCS#1/RFC 3447 RSAPublicKey structure, or an RFC 5280 SubjectPublicKeyInfo structure containing the former.
- PEM_EC_KEY
- PEM_EC_KEY
An RFC 5280 SubjectPublicKeyInfo structure containing a PEM-encoded compressed NIST P-256/secp256r1/prime256v1 or P-384 key.
- "KEY_TYPE_UNSPECIFIED"
- KEY_TYPE_UNSPECIFIED
Default unspecified value.
- "PEM_RSA_KEY"
- PEM_RSA_KEY
A PEM-encoded PKCS#1/RFC 3447 RSAPublicKey structure, or an RFC 5280 SubjectPublicKeyInfo structure containing the former.
- "PEM_EC_KEY"
- PEM_EC_KEY
An RFC 5280 SubjectPublicKeyInfo structure containing a PEM-encoded compressed NIST P-256/secp256r1/prime256v1 or P-384 key.
ReusableConfigValues
- Additional
Extensions List<Pulumi.Google Native. Privateca. V1Beta1. Inputs. X509Extension> Optional. Describes custom X.509 extensions.
- Aia
Ocsp List<string>Servers Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- Ca
Options Pulumi.Google Native. Privateca. V1Beta1. Inputs. Ca Options Optional. Describes options in this ReusableConfigValues that are relevant in a CA certificate.
- Key
Usage Pulumi.Google Native. Privateca. V1Beta1. Inputs. Key Usage Optional. Indicates the intended use for keys that correspond to a certificate.
- Policy
Ids List<Pulumi.Google Native. Privateca. V1Beta1. Inputs. Object Id> Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- Additional
Extensions []X509Extension Optional. Describes custom X.509 extensions.
- Aia
Ocsp []stringServers Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- Ca
Options CaOptions Optional. Describes options in this ReusableConfigValues that are relevant in a CA certificate.
- Key
Usage KeyUsage Optional. Indicates the intended use for keys that correspond to a certificate.
- Policy
Ids []ObjectId Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additional
Extensions List<X509Extension> Optional. Describes custom X.509 extensions.
- aia
Ocsp List<String>Servers Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- ca
Options CaOptions Optional. Describes options in this ReusableConfigValues that are relevant in a CA certificate.
- key
Usage KeyUsage Optional. Indicates the intended use for keys that correspond to a certificate.
- policy
Ids List<ObjectId> Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additional
Extensions X509Extension[] Optional. Describes custom X.509 extensions.
- aia
Ocsp string[]Servers Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- ca
Options CaOptions Optional. Describes options in this ReusableConfigValues that are relevant in a CA certificate.
- key
Usage KeyUsage Optional. Indicates the intended use for keys that correspond to a certificate.
- policy
Ids ObjectId[] Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additional_
extensions Sequence[X509Extension] Optional. Describes custom X.509 extensions.
- aia_
ocsp_ Sequence[str]servers Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- ca_
options CaOptions Optional. Describes options in this ReusableConfigValues that are relevant in a CA certificate.
- key_
usage KeyUsage Optional. Indicates the intended use for keys that correspond to a certificate.
- policy_
ids Sequence[ObjectId] Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additional
Extensions List<Property Map> Optional. Describes custom X.509 extensions.
- aia
Ocsp List<String>Servers Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- ca
Options Property Map Optional. Describes options in this ReusableConfigValues that are relevant in a CA certificate.
- key
Usage Property Map Optional. Indicates the intended use for keys that correspond to a certificate.
- policy
Ids List<Property Map> Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
ReusableConfigValuesResponse
- Additional
Extensions List<Pulumi.Google Native. Privateca. V1Beta1. Inputs. X509Extension Response> Optional. Describes custom X.509 extensions.
- Aia
Ocsp List<string>Servers Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- Ca
Options Pulumi.Google Native. Privateca. V1Beta1. Inputs. Ca Options Response Optional. Describes options in this ReusableConfigValues that are relevant in a CA certificate.
- Key
Usage Pulumi.Google Native. Privateca. V1Beta1. Inputs. Key Usage Response Optional. Indicates the intended use for keys that correspond to a certificate.
- Policy
Ids List<Pulumi.Google Native. Privateca. V1Beta1. Inputs. Object Id Response> Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- Additional
Extensions []X509ExtensionResponse Optional. Describes custom X.509 extensions.
- Aia
Ocsp []stringServers Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- Ca
Options CaOptions Response Optional. Describes options in this ReusableConfigValues that are relevant in a CA certificate.
- Key
Usage KeyUsage Response Optional. Indicates the intended use for keys that correspond to a certificate.
- Policy
Ids []ObjectId Response Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additional
Extensions List<X509ExtensionResponse> Optional. Describes custom X.509 extensions.
- aia
Ocsp List<String>Servers Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- ca
Options CaOptions Response Optional. Describes options in this ReusableConfigValues that are relevant in a CA certificate.
- key
Usage KeyUsage Response Optional. Indicates the intended use for keys that correspond to a certificate.
- policy
Ids List<ObjectId Response> Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additional
Extensions X509ExtensionResponse[] Optional. Describes custom X.509 extensions.
- aia
Ocsp string[]Servers Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- ca
Options CaOptions Response Optional. Describes options in this ReusableConfigValues that are relevant in a CA certificate.
- key
Usage KeyUsage Response Optional. Indicates the intended use for keys that correspond to a certificate.
- policy
Ids ObjectId Response[] Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additional_
extensions Sequence[X509ExtensionResponse] Optional. Describes custom X.509 extensions.
- aia_
ocsp_ Sequence[str]servers Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- ca_
options CaOptions Response Optional. Describes options in this ReusableConfigValues that are relevant in a CA certificate.
- key_
usage KeyUsage Response Optional. Indicates the intended use for keys that correspond to a certificate.
- policy_
ids Sequence[ObjectId Response] Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additional
Extensions List<Property Map> Optional. Describes custom X.509 extensions.
- aia
Ocsp List<String>Servers Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- ca
Options Property Map Optional. Describes options in this ReusableConfigValues that are relevant in a CA certificate.
- key
Usage Property Map Optional. Indicates the intended use for keys that correspond to a certificate.
- policy
Ids List<Property Map> Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
ReusableConfigWrapper
- Reusable
Config string A resource path to a ReusableConfig in the format
projects/*/locations/*/reusableConfigs/*
.- Reusable
Config Pulumi.Values Google Native. Privateca. V1Beta1. Inputs. Reusable Config Values A user-specified inline ReusableConfigValues.
- Reusable
Config string A resource path to a ReusableConfig in the format
projects/*/locations/*/reusableConfigs/*
.- Reusable
Config ReusableValues Config Values A user-specified inline ReusableConfigValues.
- reusable
Config String A resource path to a ReusableConfig in the format
projects/*/locations/*/reusableConfigs/*
.- reusable
Config ReusableValues Config Values A user-specified inline ReusableConfigValues.
- reusable
Config string A resource path to a ReusableConfig in the format
projects/*/locations/*/reusableConfigs/*
.- reusable
Config ReusableValues Config Values A user-specified inline ReusableConfigValues.
- reusable_
config str A resource path to a ReusableConfig in the format
projects/*/locations/*/reusableConfigs/*
.- reusable_
config_ Reusablevalues Config Values A user-specified inline ReusableConfigValues.
- reusable
Config String A resource path to a ReusableConfig in the format
projects/*/locations/*/reusableConfigs/*
.- reusable
Config Property MapValues A user-specified inline ReusableConfigValues.
ReusableConfigWrapperResponse
- Reusable
Config string A resource path to a ReusableConfig in the format
projects/*/locations/*/reusableConfigs/*
.- Reusable
Config Pulumi.Values Google Native. Privateca. V1Beta1. Inputs. Reusable Config Values Response A user-specified inline ReusableConfigValues.
- Reusable
Config string A resource path to a ReusableConfig in the format
projects/*/locations/*/reusableConfigs/*
.- Reusable
Config ReusableValues Config Values Response A user-specified inline ReusableConfigValues.
- reusable
Config String A resource path to a ReusableConfig in the format
projects/*/locations/*/reusableConfigs/*
.- reusable
Config ReusableValues Config Values Response A user-specified inline ReusableConfigValues.
- reusable
Config string A resource path to a ReusableConfig in the format
projects/*/locations/*/reusableConfigs/*
.- reusable
Config ReusableValues Config Values Response A user-specified inline ReusableConfigValues.
- reusable_
config str A resource path to a ReusableConfig in the format
projects/*/locations/*/reusableConfigs/*
.- reusable_
config_ Reusablevalues Config Values Response A user-specified inline ReusableConfigValues.
- reusable
Config String A resource path to a ReusableConfig in the format
projects/*/locations/*/reusableConfigs/*
.- reusable
Config Property MapValues A user-specified inline ReusableConfigValues.
Subject
- Country
Code string The country code of the subject.
- Locality string
The locality or city of the subject.
- Organization string
The organization of the subject.
- Organizational
Unit string The organizational_unit of the subject.
- Postal
Code string The postal code of the subject.
- Province string
The province, territory, or regional state of the subject.
- Street
Address string The street address of the subject.
- Country
Code string The country code of the subject.
- Locality string
The locality or city of the subject.
- Organization string
The organization of the subject.
- Organizational
Unit string The organizational_unit of the subject.
- Postal
Code string The postal code of the subject.
- Province string
The province, territory, or regional state of the subject.
- Street
Address string The street address of the subject.
- country
Code String The country code of the subject.
- locality String
The locality or city of the subject.
- organization String
The organization of the subject.
- organizational
Unit String The organizational_unit of the subject.
- postal
Code String The postal code of the subject.
- province String
The province, territory, or regional state of the subject.
- street
Address String The street address of the subject.
- country
Code string The country code of the subject.
- locality string
The locality or city of the subject.
- organization string
The organization of the subject.
- organizational
Unit string The organizational_unit of the subject.
- postal
Code string The postal code of the subject.
- province string
The province, territory, or regional state of the subject.
- street
Address string The street address of the subject.
- country_
code str The country code of the subject.
- locality str
The locality or city of the subject.
- organization str
The organization of the subject.
- organizational_
unit str The organizational_unit of the subject.
- postal_
code str The postal code of the subject.
- province str
The province, territory, or regional state of the subject.
- street_
address str The street address of the subject.
- country
Code String The country code of the subject.
- locality String
The locality or city of the subject.
- organization String
The organization of the subject.
- organizational
Unit String The organizational_unit of the subject.
- postal
Code String The postal code of the subject.
- province String
The province, territory, or regional state of the subject.
- street
Address String The street address of the subject.
SubjectAltNames
- Custom
Sans List<Pulumi.Google Native. Privateca. V1Beta1. Inputs. X509Extension> Contains additional subject alternative name values.
- Dns
Names List<string> Contains only valid, fully-qualified host names.
- Email
Addresses List<string> Contains only valid RFC 2822 E-mail addresses.
- Ip
Addresses List<string> Contains only valid 32-bit IPv4 addresses or RFC 4291 IPv6 addresses.
- Uris List<string>
Contains only valid RFC 3986 URIs.
- Custom
Sans []X509Extension Contains additional subject alternative name values.
- Dns
Names []string Contains only valid, fully-qualified host names.
- Email
Addresses []string Contains only valid RFC 2822 E-mail addresses.
- Ip
Addresses []string Contains only valid 32-bit IPv4 addresses or RFC 4291 IPv6 addresses.
- Uris []string
Contains only valid RFC 3986 URIs.
- custom
Sans List<X509Extension> Contains additional subject alternative name values.
- dns
Names List<String> Contains only valid, fully-qualified host names.
- email
Addresses List<String> Contains only valid RFC 2822 E-mail addresses.
- ip
Addresses List<String> Contains only valid 32-bit IPv4 addresses or RFC 4291 IPv6 addresses.
- uris List<String>
Contains only valid RFC 3986 URIs.
- custom
Sans X509Extension[] Contains additional subject alternative name values.
- dns
Names string[] Contains only valid, fully-qualified host names.
- email
Addresses string[] Contains only valid RFC 2822 E-mail addresses.
- ip
Addresses string[] Contains only valid 32-bit IPv4 addresses or RFC 4291 IPv6 addresses.
- uris string[]
Contains only valid RFC 3986 URIs.
- custom_
sans Sequence[X509Extension] Contains additional subject alternative name values.
- dns_
names Sequence[str] Contains only valid, fully-qualified host names.
- email_
addresses Sequence[str] Contains only valid RFC 2822 E-mail addresses.
- ip_
addresses Sequence[str] Contains only valid 32-bit IPv4 addresses or RFC 4291 IPv6 addresses.
- uris Sequence[str]
Contains only valid RFC 3986 URIs.
- custom
Sans List<Property Map> Contains additional subject alternative name values.
- dns
Names List<String> Contains only valid, fully-qualified host names.
- email
Addresses List<String> Contains only valid RFC 2822 E-mail addresses.
- ip
Addresses List<String> Contains only valid 32-bit IPv4 addresses or RFC 4291 IPv6 addresses.
- uris List<String>
Contains only valid RFC 3986 URIs.
SubjectAltNamesResponse
- Custom
Sans List<Pulumi.Google Native. Privateca. V1Beta1. Inputs. X509Extension Response> Contains additional subject alternative name values.
- Dns
Names List<string> Contains only valid, fully-qualified host names.
- Email
Addresses List<string> Contains only valid RFC 2822 E-mail addresses.
- Ip
Addresses List<string> Contains only valid 32-bit IPv4 addresses or RFC 4291 IPv6 addresses.
- Uris List<string>
Contains only valid RFC 3986 URIs.
- Custom
Sans []X509ExtensionResponse Contains additional subject alternative name values.
- Dns
Names []string Contains only valid, fully-qualified host names.
- Email
Addresses []string Contains only valid RFC 2822 E-mail addresses.
- Ip
Addresses []string Contains only valid 32-bit IPv4 addresses or RFC 4291 IPv6 addresses.
- Uris []string
Contains only valid RFC 3986 URIs.
- custom
Sans List<X509ExtensionResponse> Contains additional subject alternative name values.
- dns
Names List<String> Contains only valid, fully-qualified host names.
- email
Addresses List<String> Contains only valid RFC 2822 E-mail addresses.
- ip
Addresses List<String> Contains only valid 32-bit IPv4 addresses or RFC 4291 IPv6 addresses.
- uris List<String>
Contains only valid RFC 3986 URIs.
- custom
Sans X509ExtensionResponse[] Contains additional subject alternative name values.
- dns
Names string[] Contains only valid, fully-qualified host names.
- email
Addresses string[] Contains only valid RFC 2822 E-mail addresses.
- ip
Addresses string[] Contains only valid 32-bit IPv4 addresses or RFC 4291 IPv6 addresses.
- uris string[]
Contains only valid RFC 3986 URIs.
- custom_
sans Sequence[X509ExtensionResponse] Contains additional subject alternative name values.
- dns_
names Sequence[str] Contains only valid, fully-qualified host names.
- email_
addresses Sequence[str] Contains only valid RFC 2822 E-mail addresses.
- ip_
addresses Sequence[str] Contains only valid 32-bit IPv4 addresses or RFC 4291 IPv6 addresses.
- uris Sequence[str]
Contains only valid RFC 3986 URIs.
- custom
Sans List<Property Map> Contains additional subject alternative name values.
- dns
Names List<String> Contains only valid, fully-qualified host names.
- email
Addresses List<String> Contains only valid RFC 2822 E-mail addresses.
- ip
Addresses List<String> Contains only valid 32-bit IPv4 addresses or RFC 4291 IPv6 addresses.
- uris List<String>
Contains only valid RFC 3986 URIs.
SubjectConfig
- Subject
Pulumi.
Google Native. Privateca. V1Beta1. Inputs. Subject Contains distinguished name fields such as the location and organization.
- Common
Name string Optional. The "common name" of the distinguished name.
- Subject
Alt Pulumi.Name Google Native. Privateca. V1Beta1. Inputs. Subject Alt Names Optional. The subject alternative name fields.
- Subject Subject
Contains distinguished name fields such as the location and organization.
- Common
Name string Optional. The "common name" of the distinguished name.
- Subject
Alt SubjectName Alt Names Optional. The subject alternative name fields.
- subject Subject
Contains distinguished name fields such as the location and organization.
- common
Name String Optional. The "common name" of the distinguished name.
- subject
Alt SubjectName Alt Names Optional. The subject alternative name fields.
- subject Subject
Contains distinguished name fields such as the location and organization.
- common
Name string Optional. The "common name" of the distinguished name.
- subject
Alt SubjectName Alt Names Optional. The subject alternative name fields.
- subject Subject
Contains distinguished name fields such as the location and organization.
- common_
name str Optional. The "common name" of the distinguished name.
- subject_
alt_ Subjectname Alt Names Optional. The subject alternative name fields.
- subject Property Map
Contains distinguished name fields such as the location and organization.
- common
Name String Optional. The "common name" of the distinguished name.
- subject
Alt Property MapName Optional. The subject alternative name fields.
SubjectConfigResponse
- Common
Name string Optional. The "common name" of the distinguished name.
- Subject
Pulumi.
Google Native. Privateca. V1Beta1. Inputs. Subject Response Contains distinguished name fields such as the location and organization.
- Subject
Alt Pulumi.Name Google Native. Privateca. V1Beta1. Inputs. Subject Alt Names Response Optional. The subject alternative name fields.
- Common
Name string Optional. The "common name" of the distinguished name.
- Subject
Subject
Response Contains distinguished name fields such as the location and organization.
- Subject
Alt SubjectName Alt Names Response Optional. The subject alternative name fields.
- common
Name String Optional. The "common name" of the distinguished name.
- subject
Subject
Response Contains distinguished name fields such as the location and organization.
- subject
Alt SubjectName Alt Names Response Optional. The subject alternative name fields.
- common
Name string Optional. The "common name" of the distinguished name.
- subject
Subject
Response Contains distinguished name fields such as the location and organization.
- subject
Alt SubjectName Alt Names Response Optional. The subject alternative name fields.
- common_
name str Optional. The "common name" of the distinguished name.
- subject
Subject
Response Contains distinguished name fields such as the location and organization.
- subject_
alt_ Subjectname Alt Names Response Optional. The subject alternative name fields.
- common
Name String Optional. The "common name" of the distinguished name.
- subject Property Map
Contains distinguished name fields such as the location and organization.
- subject
Alt Property MapName Optional. The subject alternative name fields.
SubjectDescriptionResponse
- Common
Name string The "common name" of the distinguished name.
- Hex
Serial stringNumber The serial number encoded in lowercase hexadecimal.
- Lifetime string
For convenience, the actual lifetime of an issued certificate. Corresponds to 'not_after_time' - 'not_before_time'.
- Not
After stringTime The time at which the certificate expires.
- Not
Before stringTime The time at which the certificate becomes valid.
- Subject
Pulumi.
Google Native. Privateca. V1Beta1. Inputs. Subject Response Contains distinguished name fields such as the location and organization.
- Subject
Alt Pulumi.Name Google Native. Privateca. V1Beta1. Inputs. Subject Alt Names Response The subject alternative name fields.
- Common
Name string The "common name" of the distinguished name.
- Hex
Serial stringNumber The serial number encoded in lowercase hexadecimal.
- Lifetime string
For convenience, the actual lifetime of an issued certificate. Corresponds to 'not_after_time' - 'not_before_time'.
- Not
After stringTime The time at which the certificate expires.
- Not
Before stringTime The time at which the certificate becomes valid.
- Subject
Subject
Response Contains distinguished name fields such as the location and organization.
- Subject
Alt SubjectName Alt Names Response The subject alternative name fields.
- common
Name String The "common name" of the distinguished name.
- hex
Serial StringNumber The serial number encoded in lowercase hexadecimal.
- lifetime String
For convenience, the actual lifetime of an issued certificate. Corresponds to 'not_after_time' - 'not_before_time'.
- not
After StringTime The time at which the certificate expires.
- not
Before StringTime The time at which the certificate becomes valid.
- subject
Subject
Response Contains distinguished name fields such as the location and organization.
- subject
Alt SubjectName Alt Names Response The subject alternative name fields.
- common
Name string The "common name" of the distinguished name.
- hex
Serial stringNumber The serial number encoded in lowercase hexadecimal.
- lifetime string
For convenience, the actual lifetime of an issued certificate. Corresponds to 'not_after_time' - 'not_before_time'.
- not
After stringTime The time at which the certificate expires.
- not
Before stringTime The time at which the certificate becomes valid.
- subject
Subject
Response Contains distinguished name fields such as the location and organization.
- subject
Alt SubjectName Alt Names Response The subject alternative name fields.
- common_
name str The "common name" of the distinguished name.
- hex_
serial_ strnumber The serial number encoded in lowercase hexadecimal.
- lifetime str
For convenience, the actual lifetime of an issued certificate. Corresponds to 'not_after_time' - 'not_before_time'.
- not_
after_ strtime The time at which the certificate expires.
- not_
before_ strtime The time at which the certificate becomes valid.
- subject
Subject
Response Contains distinguished name fields such as the location and organization.
- subject_
alt_ Subjectname Alt Names Response The subject alternative name fields.
- common
Name String The "common name" of the distinguished name.
- hex
Serial StringNumber The serial number encoded in lowercase hexadecimal.
- lifetime String
For convenience, the actual lifetime of an issued certificate. Corresponds to 'not_after_time' - 'not_before_time'.
- not
After StringTime The time at which the certificate expires.
- not
Before StringTime The time at which the certificate becomes valid.
- subject Property Map
Contains distinguished name fields such as the location and organization.
- subject
Alt Property MapName The subject alternative name fields.
SubjectResponse
- Country
Code string The country code of the subject.
- Locality string
The locality or city of the subject.
- Organization string
The organization of the subject.
- Organizational
Unit string The organizational_unit of the subject.
- Postal
Code string The postal code of the subject.
- Province string
The province, territory, or regional state of the subject.
- Street
Address string The street address of the subject.
- Country
Code string The country code of the subject.
- Locality string
The locality or city of the subject.
- Organization string
The organization of the subject.
- Organizational
Unit string The organizational_unit of the subject.
- Postal
Code string The postal code of the subject.
- Province string
The province, territory, or regional state of the subject.
- Street
Address string The street address of the subject.
- country
Code String The country code of the subject.
- locality String
The locality or city of the subject.
- organization String
The organization of the subject.
- organizational
Unit String The organizational_unit of the subject.
- postal
Code String The postal code of the subject.
- province String
The province, territory, or regional state of the subject.
- street
Address String The street address of the subject.
- country
Code string The country code of the subject.
- locality string
The locality or city of the subject.
- organization string
The organization of the subject.
- organizational
Unit string The organizational_unit of the subject.
- postal
Code string The postal code of the subject.
- province string
The province, territory, or regional state of the subject.
- street
Address string The street address of the subject.
- country_
code str The country code of the subject.
- locality str
The locality or city of the subject.
- organization str
The organization of the subject.
- organizational_
unit str The organizational_unit of the subject.
- postal_
code str The postal code of the subject.
- province str
The province, territory, or regional state of the subject.
- street_
address str The street address of the subject.
- country
Code String The country code of the subject.
- locality String
The locality or city of the subject.
- organization String
The organization of the subject.
- organizational
Unit String The organizational_unit of the subject.
- postal
Code String The postal code of the subject.
- province String
The province, territory, or regional state of the subject.
- street
Address String The street address of the subject.
SubordinateConfig
- string
This can refer to a CertificateAuthority that was used to create a subordinate CertificateAuthority. This field is used for information and usability purposes only. The resource name is in the format
projects/*/locations/*/certificateAuthorities/*
.- Pem
Issuer Pulumi.Chain Google Native. Privateca. V1Beta1. Inputs. Subordinate Config Chain Contains the PEM certificate chain for the issuers of this CertificateAuthority, but not pem certificate for this CA itself.
- string
This can refer to a CertificateAuthority that was used to create a subordinate CertificateAuthority. This field is used for information and usability purposes only. The resource name is in the format
projects/*/locations/*/certificateAuthorities/*
.- Pem
Issuer SubordinateChain Config Chain Contains the PEM certificate chain for the issuers of this CertificateAuthority, but not pem certificate for this CA itself.
- String
This can refer to a CertificateAuthority that was used to create a subordinate CertificateAuthority. This field is used for information and usability purposes only. The resource name is in the format
projects/*/locations/*/certificateAuthorities/*
.- pem
Issuer SubordinateChain Config Chain Contains the PEM certificate chain for the issuers of this CertificateAuthority, but not pem certificate for this CA itself.
- string
This can refer to a CertificateAuthority that was used to create a subordinate CertificateAuthority. This field is used for information and usability purposes only. The resource name is in the format
projects/*/locations/*/certificateAuthorities/*
.- pem
Issuer SubordinateChain Config Chain Contains the PEM certificate chain for the issuers of this CertificateAuthority, but not pem certificate for this CA itself.
- str
This can refer to a CertificateAuthority that was used to create a subordinate CertificateAuthority. This field is used for information and usability purposes only. The resource name is in the format
projects/*/locations/*/certificateAuthorities/*
.- pem_
issuer_ Subordinatechain Config Chain Contains the PEM certificate chain for the issuers of this CertificateAuthority, but not pem certificate for this CA itself.
- String
This can refer to a CertificateAuthority that was used to create a subordinate CertificateAuthority. This field is used for information and usability purposes only. The resource name is in the format
projects/*/locations/*/certificateAuthorities/*
.- pem
Issuer Property MapChain Contains the PEM certificate chain for the issuers of this CertificateAuthority, but not pem certificate for this CA itself.
SubordinateConfigChain
- Pem
Certificates List<string> Expected to be in leaf-to-root order according to RFC 5246.
- Pem
Certificates []string Expected to be in leaf-to-root order according to RFC 5246.
- pem
Certificates List<String> Expected to be in leaf-to-root order according to RFC 5246.
- pem
Certificates string[] Expected to be in leaf-to-root order according to RFC 5246.
- pem_
certificates Sequence[str] Expected to be in leaf-to-root order according to RFC 5246.
- pem
Certificates List<String> Expected to be in leaf-to-root order according to RFC 5246.
SubordinateConfigChainResponse
- Pem
Certificates List<string> Expected to be in leaf-to-root order according to RFC 5246.
- Pem
Certificates []string Expected to be in leaf-to-root order according to RFC 5246.
- pem
Certificates List<String> Expected to be in leaf-to-root order according to RFC 5246.
- pem
Certificates string[] Expected to be in leaf-to-root order according to RFC 5246.
- pem_
certificates Sequence[str] Expected to be in leaf-to-root order according to RFC 5246.
- pem
Certificates List<String> Expected to be in leaf-to-root order according to RFC 5246.
SubordinateConfigResponse
- string
This can refer to a CertificateAuthority that was used to create a subordinate CertificateAuthority. This field is used for information and usability purposes only. The resource name is in the format
projects/*/locations/*/certificateAuthorities/*
.- Pem
Issuer Pulumi.Chain Google Native. Privateca. V1Beta1. Inputs. Subordinate Config Chain Response Contains the PEM certificate chain for the issuers of this CertificateAuthority, but not pem certificate for this CA itself.
- string
This can refer to a CertificateAuthority that was used to create a subordinate CertificateAuthority. This field is used for information and usability purposes only. The resource name is in the format
projects/*/locations/*/certificateAuthorities/*
.- Pem
Issuer SubordinateChain Config Chain Response Contains the PEM certificate chain for the issuers of this CertificateAuthority, but not pem certificate for this CA itself.
- String
This can refer to a CertificateAuthority that was used to create a subordinate CertificateAuthority. This field is used for information and usability purposes only. The resource name is in the format
projects/*/locations/*/certificateAuthorities/*
.- pem
Issuer SubordinateChain Config Chain Response Contains the PEM certificate chain for the issuers of this CertificateAuthority, but not pem certificate for this CA itself.
- string
This can refer to a CertificateAuthority that was used to create a subordinate CertificateAuthority. This field is used for information and usability purposes only. The resource name is in the format
projects/*/locations/*/certificateAuthorities/*
.- pem
Issuer SubordinateChain Config Chain Response Contains the PEM certificate chain for the issuers of this CertificateAuthority, but not pem certificate for this CA itself.
- str
This can refer to a CertificateAuthority that was used to create a subordinate CertificateAuthority. This field is used for information and usability purposes only. The resource name is in the format
projects/*/locations/*/certificateAuthorities/*
.- pem_
issuer_ Subordinatechain Config Chain Response Contains the PEM certificate chain for the issuers of this CertificateAuthority, but not pem certificate for this CA itself.
- String
This can refer to a CertificateAuthority that was used to create a subordinate CertificateAuthority. This field is used for information and usability purposes only. The resource name is in the format
projects/*/locations/*/certificateAuthorities/*
.- pem
Issuer Property MapChain Contains the PEM certificate chain for the issuers of this CertificateAuthority, but not pem certificate for this CA itself.
X509Extension
- Critical bool
Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- Object
Id Pulumi.Google Native. Privateca. V1Beta1. Inputs. Object Id The OID for this X.509 extension.
- Value string
The value of this X.509 extension.
- critical Boolean
Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- object
Id Property Map The OID for this X.509 extension.
- value String
The value of this X.509 extension.
X509ExtensionResponse
- Critical bool
Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- Object
Id Pulumi.Google Native. Privateca. V1Beta1. Inputs. Object Id Response The OID for this X.509 extension.
- Value string
The value of this X.509 extension.
- Critical bool
Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- Object
Id ObjectId Response The OID for this X.509 extension.
- Value string
The value of this X.509 extension.
- critical Boolean
Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- object
Id ObjectId Response The OID for this X.509 extension.
- value String
The value of this X.509 extension.
- critical boolean
Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- object
Id ObjectId Response The OID for this X.509 extension.
- value string
The value of this X.509 extension.
- critical bool
Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- object_
id ObjectId Response The OID for this X.509 extension.
- value str
The value of this X.509 extension.
- critical Boolean
Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- object
Id Property Map The OID for this X.509 extension.
- value String
The value of this X.509 extension.
Package Details
- Repository
- Google Cloud Native pulumi/pulumi-google-native
- License
- Apache-2.0