The key is PEM-encoded as defined in RFC
7468. It can be any of the
following: a PEM-encoded PKCS#1/RFC 3447 RSAPublicKey
structure, an RFC 5280
SubjectPublicKeyInfo
or a PEM-encoded X.509 certificate signing request (CSR). If a
SubjectPublicKeyInfo
is specified, it can contain a A PEM-encoded PKCS#1/RFC 3447 RSAPublicKey
or a NIST P-256/secp256r1/prime256v1 or P-384 key. If a CSR is specified,
it will used solely for the purpose of extracting the public key. When
generated by the service, it will always be an RFC 5280
SubjectPublicKeyInfo
structure containing an algorithm identifier and a key.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis documentation page provides reference information for the \u003ccode\u003ePublicKey.Types.KeyFormat\u003c/code\u003e enum within the Google Cloud Security Private CA V1 API, spanning versions from 1.0.0 to the latest 3.9.0.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003ePublicKey.Types.KeyFormat\u003c/code\u003e enum defines the supported public key formats, which, as of now, primarily includes the \u003ccode\u003ePem\u003c/code\u003e format, as detailed within the description.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003ePem\u003c/code\u003e key format can be a PEM-encoded PKCS#1, an RFC 5280 SubjectPublicKeyInfo, or a PEM-encoded X.509 CSR, with the service generating RFC 5280 SubjectPublicKeyInfo structures.\u003c/p\u003e\n"],["\u003cp\u003eThe enum also contains \u003ccode\u003eUnspecified\u003c/code\u003e which is the default value.\u003c/p\u003e\n"]]],[],null,[]]