Public key for the ECDSA algorithm using P-256 and SHA-256, encoded in
base64, and wrapped by -----BEGIN PUBLIC KEY----- and -----END
PUBLIC KEY-----. This can be used to verify JWT tokens with the ES256
algorithm (RFC7518). This curve is
defined in OpenSSL as the prime256v1 curve.
Es256X509Pem
As ES256_PEM, but wrapped in an X.509v3 certificate (RFC5280), encoded in base64, and wrapped by
-----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----.
RsaPem
An RSA public key encoded in base64, and wrapped by
-----BEGIN PUBLIC KEY----- and -----END PUBLIC KEY-----. This can be
used to verify RS256 signatures in JWT tokens (RFC7518).
RsaX509Pem
As RSA_PEM, but wrapped in an X.509v3 certificate (RFC5280), encoded in base64, and wrapped by
-----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----.
UnspecifiedPublicKeyFormat
The format has not been specified. This is an invalid default value and
must not be used.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThe \u003ccode\u003ePublicKeyFormat\u003c/code\u003e enum defines the supported formats for public keys used in the Google Cloud IoT service.\u003c/p\u003e\n"],["\u003cp\u003eVersion 2.2.0 is the latest release, with other versions available, including 1.2.0, which is the current version described on the page.\u003c/p\u003e\n"],["\u003cp\u003eSupported formats include \u003ccode\u003eEs256Pem\u003c/code\u003e and \u003ccode\u003eEs256X509Pem\u003c/code\u003e for ECDSA, and \u003ccode\u003eRsaPem\u003c/code\u003e and \u003ccode\u003eRsaX509Pem\u003c/code\u003e for RSA, each with specific encoding and certificate wrapping options.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eUnspecifiedPublicKeyFormat\u003c/code\u003e field is designated as an invalid default value and should not be used in actual implementations.\u003c/p\u003e\n"],["\u003cp\u003ePublic key formats for ECDSA and RSA can be used to verify JWT tokens, following RFC7518 for algorithm specifications and RFC5280 for X.509v3 certificate details.\u003c/p\u003e\n"]]],[],null,[]]