The key is PEM-encoded as defined in RFC
7468. It can be any of the
following: a PEM-encoded PKCS#1/RFC 3447 RSAPublicKey
structure, an RFC 5280
SubjectPublicKeyInfo
or a PEM-encoded X.509 certificate signing request (CSR). If a
SubjectPublicKeyInfo
is specified, it can contain a A PEM-encoded PKCS#1/RFC 3447 RSAPublicKey
or a NIST P-256/secp256r1/prime256v1 or P-384 key. If a CSR is specified,
it will used solely for the purpose of extracting the public key. When
generated by the service, it will always be an RFC 5280
SubjectPublicKeyInfo
structure containing an algorithm identifier and a key.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Missing the information I need","missingTheInformationINeed","thumb-down"],["Too complicated / too many steps","tooComplicatedTooManySteps","thumb-down"],["Out of date","outOfDate","thumb-down"],["Samples / code issue","samplesCodeIssue","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eThis document provides reference documentation for the \u003ccode\u003ePublicKey.Types.KeyFormat\u003c/code\u003e enum within the Google Cloud Security Private CA v1 API.\u003c/p\u003e\n"],["\u003cp\u003eThe latest version of the API documented here is 3.9.0, with versions ranging down to 1.0.0 available for review.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003eKeyFormat\u003c/code\u003e enum defines the supported public key formats, and currently \u003ccode\u003ePem\u003c/code\u003e is the only supported format.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003ePem\u003c/code\u003e key format is detailed as being PEM-encoded and can represent various structures like PKCS#1/RFC 3447 RSAPublicKey, RFC 5280 SubjectPublicKeyInfo, or an X.509 certificate signing request.\u003c/p\u003e\n"],["\u003cp\u003eAn \u003ccode\u003eUnspecified\u003c/code\u003e value is defined as the default.\u003c/p\u003e\n"]]],[],null,[]]