Google Cloud Native is in preview. Google Cloud Classic is fully supported.
google-native.privateca/v1.CaPool
Explore with Pulumi AI
Google Cloud Native is in preview. Google Cloud Classic is fully supported.
Create a CaPool. Auto-naming is currently not supported for this resource.
Create CaPool Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new CaPool(name: string, args: CaPoolArgs, opts?: CustomResourceOptions);@overload
def CaPool(resource_name: str,
           args: CaPoolArgs,
           opts: Optional[ResourceOptions] = None)
@overload
def CaPool(resource_name: str,
           opts: Optional[ResourceOptions] = None,
           ca_pool_id: Optional[str] = None,
           tier: Optional[CaPoolTier] = None,
           issuance_policy: Optional[IssuancePolicyArgs] = None,
           labels: Optional[Mapping[str, str]] = None,
           location: Optional[str] = None,
           project: Optional[str] = None,
           publishing_options: Optional[PublishingOptionsArgs] = None,
           request_id: Optional[str] = None)func NewCaPool(ctx *Context, name string, args CaPoolArgs, opts ...ResourceOption) (*CaPool, error)public CaPool(string name, CaPoolArgs args, CustomResourceOptions? opts = null)
public CaPool(String name, CaPoolArgs args)
public CaPool(String name, CaPoolArgs args, CustomResourceOptions options)
type: google-native:privateca/v1:CaPool
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args CaPoolArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args CaPoolArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args CaPoolArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args CaPoolArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args CaPoolArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var caPoolResource = new GoogleNative.Privateca.V1.CaPool("caPoolResource", new()
{
    CaPoolId = "string",
    Tier = GoogleNative.Privateca.V1.CaPoolTier.TierUnspecified,
    IssuancePolicy = new GoogleNative.Privateca.V1.Inputs.IssuancePolicyArgs
    {
        AllowedIssuanceModes = new GoogleNative.Privateca.V1.Inputs.IssuanceModesArgs
        {
            AllowConfigBasedIssuance = false,
            AllowCsrBasedIssuance = false,
        },
        AllowedKeyTypes = new[]
        {
            new GoogleNative.Privateca.V1.Inputs.AllowedKeyTypeArgs
            {
                EllipticCurve = new GoogleNative.Privateca.V1.Inputs.EcKeyTypeArgs
                {
                    SignatureAlgorithm = GoogleNative.Privateca.V1.EcKeyTypeSignatureAlgorithm.EcSignatureAlgorithmUnspecified,
                },
                Rsa = new GoogleNative.Privateca.V1.Inputs.RsaKeyTypeArgs
                {
                    MaxModulusSize = "string",
                    MinModulusSize = "string",
                },
            },
        },
        BaselineValues = new GoogleNative.Privateca.V1.Inputs.X509ParametersArgs
        {
            AdditionalExtensions = new[]
            {
                new GoogleNative.Privateca.V1.Inputs.X509ExtensionArgs
                {
                    ObjectId = new GoogleNative.Privateca.V1.Inputs.ObjectIdArgs
                    {
                        ObjectIdPath = new[]
                        {
                            0,
                        },
                    },
                    Value = "string",
                    Critical = false,
                },
            },
            AiaOcspServers = new[]
            {
                "string",
            },
            CaOptions = new GoogleNative.Privateca.V1.Inputs.CaOptionsArgs
            {
                IsCa = false,
                MaxIssuerPathLength = 0,
            },
            KeyUsage = new GoogleNative.Privateca.V1.Inputs.KeyUsageArgs
            {
                BaseKeyUsage = new GoogleNative.Privateca.V1.Inputs.KeyUsageOptionsArgs
                {
                    CertSign = false,
                    ContentCommitment = false,
                    CrlSign = false,
                    DataEncipherment = false,
                    DecipherOnly = false,
                    DigitalSignature = false,
                    EncipherOnly = false,
                    KeyAgreement = false,
                    KeyEncipherment = false,
                },
                ExtendedKeyUsage = new GoogleNative.Privateca.V1.Inputs.ExtendedKeyUsageOptionsArgs
                {
                    ClientAuth = false,
                    CodeSigning = false,
                    EmailProtection = false,
                    OcspSigning = false,
                    ServerAuth = false,
                    TimeStamping = false,
                },
                UnknownExtendedKeyUsages = new[]
                {
                    new GoogleNative.Privateca.V1.Inputs.ObjectIdArgs
                    {
                        ObjectIdPath = new[]
                        {
                            0,
                        },
                    },
                },
            },
            NameConstraints = new GoogleNative.Privateca.V1.Inputs.NameConstraintsArgs
            {
                Critical = false,
                ExcludedDnsNames = new[]
                {
                    "string",
                },
                ExcludedEmailAddresses = new[]
                {
                    "string",
                },
                ExcludedIpRanges = new[]
                {
                    "string",
                },
                ExcludedUris = new[]
                {
                    "string",
                },
                PermittedDnsNames = new[]
                {
                    "string",
                },
                PermittedEmailAddresses = new[]
                {
                    "string",
                },
                PermittedIpRanges = new[]
                {
                    "string",
                },
                PermittedUris = new[]
                {
                    "string",
                },
            },
            PolicyIds = new[]
            {
                new GoogleNative.Privateca.V1.Inputs.ObjectIdArgs
                {
                    ObjectIdPath = new[]
                    {
                        0,
                    },
                },
            },
        },
        IdentityConstraints = new GoogleNative.Privateca.V1.Inputs.CertificateIdentityConstraintsArgs
        {
            AllowSubjectAltNamesPassthrough = false,
            AllowSubjectPassthrough = false,
            CelExpression = new GoogleNative.Privateca.V1.Inputs.ExprArgs
            {
                Description = "string",
                Expression = "string",
                Location = "string",
                Title = "string",
            },
        },
        MaximumLifetime = "string",
        PassthroughExtensions = new GoogleNative.Privateca.V1.Inputs.CertificateExtensionConstraintsArgs
        {
            AdditionalExtensions = new[]
            {
                new GoogleNative.Privateca.V1.Inputs.ObjectIdArgs
                {
                    ObjectIdPath = new[]
                    {
                        0,
                    },
                },
            },
            KnownExtensions = new[]
            {
                GoogleNative.Privateca.V1.CertificateExtensionConstraintsKnownExtensionsItem.KnownCertificateExtensionUnspecified,
            },
        },
    },
    Labels = 
    {
        { "string", "string" },
    },
    Location = "string",
    Project = "string",
    PublishingOptions = new GoogleNative.Privateca.V1.Inputs.PublishingOptionsArgs
    {
        EncodingFormat = GoogleNative.Privateca.V1.PublishingOptionsEncodingFormat.EncodingFormatUnspecified,
        PublishCaCert = false,
        PublishCrl = false,
    },
    RequestId = "string",
});
example, err := privateca.NewCaPool(ctx, "caPoolResource", &privateca.CaPoolArgs{
	CaPoolId: pulumi.String("string"),
	Tier:     privateca.CaPoolTierTierUnspecified,
	IssuancePolicy: &privateca.IssuancePolicyArgs{
		AllowedIssuanceModes: &privateca.IssuanceModesArgs{
			AllowConfigBasedIssuance: pulumi.Bool(false),
			AllowCsrBasedIssuance:    pulumi.Bool(false),
		},
		AllowedKeyTypes: privateca.AllowedKeyTypeArray{
			&privateca.AllowedKeyTypeArgs{
				EllipticCurve: &privateca.EcKeyTypeArgs{
					SignatureAlgorithm: privateca.EcKeyTypeSignatureAlgorithmEcSignatureAlgorithmUnspecified,
				},
				Rsa: &privateca.RsaKeyTypeArgs{
					MaxModulusSize: pulumi.String("string"),
					MinModulusSize: pulumi.String("string"),
				},
			},
		},
		BaselineValues: &privateca.X509ParametersArgs{
			AdditionalExtensions: privateca.X509ExtensionArray{
				&privateca.X509ExtensionArgs{
					ObjectId: &privateca.ObjectIdArgs{
						ObjectIdPath: pulumi.IntArray{
							pulumi.Int(0),
						},
					},
					Value:    pulumi.String("string"),
					Critical: pulumi.Bool(false),
				},
			},
			AiaOcspServers: pulumi.StringArray{
				pulumi.String("string"),
			},
			CaOptions: &privateca.CaOptionsArgs{
				IsCa:                pulumi.Bool(false),
				MaxIssuerPathLength: pulumi.Int(0),
			},
			KeyUsage: &privateca.KeyUsageArgs{
				BaseKeyUsage: &privateca.KeyUsageOptionsArgs{
					CertSign:          pulumi.Bool(false),
					ContentCommitment: pulumi.Bool(false),
					CrlSign:           pulumi.Bool(false),
					DataEncipherment:  pulumi.Bool(false),
					DecipherOnly:      pulumi.Bool(false),
					DigitalSignature:  pulumi.Bool(false),
					EncipherOnly:      pulumi.Bool(false),
					KeyAgreement:      pulumi.Bool(false),
					KeyEncipherment:   pulumi.Bool(false),
				},
				ExtendedKeyUsage: &privateca.ExtendedKeyUsageOptionsArgs{
					ClientAuth:      pulumi.Bool(false),
					CodeSigning:     pulumi.Bool(false),
					EmailProtection: pulumi.Bool(false),
					OcspSigning:     pulumi.Bool(false),
					ServerAuth:      pulumi.Bool(false),
					TimeStamping:    pulumi.Bool(false),
				},
				UnknownExtendedKeyUsages: privateca.ObjectIdArray{
					&privateca.ObjectIdArgs{
						ObjectIdPath: pulumi.IntArray{
							pulumi.Int(0),
						},
					},
				},
			},
			NameConstraints: &privateca.NameConstraintsArgs{
				Critical: pulumi.Bool(false),
				ExcludedDnsNames: pulumi.StringArray{
					pulumi.String("string"),
				},
				ExcludedEmailAddresses: pulumi.StringArray{
					pulumi.String("string"),
				},
				ExcludedIpRanges: pulumi.StringArray{
					pulumi.String("string"),
				},
				ExcludedUris: pulumi.StringArray{
					pulumi.String("string"),
				},
				PermittedDnsNames: pulumi.StringArray{
					pulumi.String("string"),
				},
				PermittedEmailAddresses: pulumi.StringArray{
					pulumi.String("string"),
				},
				PermittedIpRanges: pulumi.StringArray{
					pulumi.String("string"),
				},
				PermittedUris: pulumi.StringArray{
					pulumi.String("string"),
				},
			},
			PolicyIds: privateca.ObjectIdArray{
				&privateca.ObjectIdArgs{
					ObjectIdPath: pulumi.IntArray{
						pulumi.Int(0),
					},
				},
			},
		},
		IdentityConstraints: &privateca.CertificateIdentityConstraintsArgs{
			AllowSubjectAltNamesPassthrough: pulumi.Bool(false),
			AllowSubjectPassthrough:         pulumi.Bool(false),
			CelExpression: &privateca.ExprArgs{
				Description: pulumi.String("string"),
				Expression:  pulumi.String("string"),
				Location:    pulumi.String("string"),
				Title:       pulumi.String("string"),
			},
		},
		MaximumLifetime: pulumi.String("string"),
		PassthroughExtensions: &privateca.CertificateExtensionConstraintsArgs{
			AdditionalExtensions: privateca.ObjectIdArray{
				&privateca.ObjectIdArgs{
					ObjectIdPath: pulumi.IntArray{
						pulumi.Int(0),
					},
				},
			},
			KnownExtensions: privateca.CertificateExtensionConstraintsKnownExtensionsItemArray{
				privateca.CertificateExtensionConstraintsKnownExtensionsItemKnownCertificateExtensionUnspecified,
			},
		},
	},
	Labels: pulumi.StringMap{
		"string": pulumi.String("string"),
	},
	Location: pulumi.String("string"),
	Project:  pulumi.String("string"),
	PublishingOptions: &privateca.PublishingOptionsArgs{
		EncodingFormat: privateca.PublishingOptionsEncodingFormatEncodingFormatUnspecified,
		PublishCaCert:  pulumi.Bool(false),
		PublishCrl:     pulumi.Bool(false),
	},
	RequestId: pulumi.String("string"),
})
var caPoolResource = new CaPool("caPoolResource", CaPoolArgs.builder()
    .caPoolId("string")
    .tier("TIER_UNSPECIFIED")
    .issuancePolicy(IssuancePolicyArgs.builder()
        .allowedIssuanceModes(IssuanceModesArgs.builder()
            .allowConfigBasedIssuance(false)
            .allowCsrBasedIssuance(false)
            .build())
        .allowedKeyTypes(AllowedKeyTypeArgs.builder()
            .ellipticCurve(EcKeyTypeArgs.builder()
                .signatureAlgorithm("EC_SIGNATURE_ALGORITHM_UNSPECIFIED")
                .build())
            .rsa(RsaKeyTypeArgs.builder()
                .maxModulusSize("string")
                .minModulusSize("string")
                .build())
            .build())
        .baselineValues(X509ParametersArgs.builder()
            .additionalExtensions(X509ExtensionArgs.builder()
                .objectId(ObjectIdArgs.builder()
                    .objectIdPath(0)
                    .build())
                .value("string")
                .critical(false)
                .build())
            .aiaOcspServers("string")
            .caOptions(CaOptionsArgs.builder()
                .isCa(false)
                .maxIssuerPathLength(0)
                .build())
            .keyUsage(KeyUsageArgs.builder()
                .baseKeyUsage(KeyUsageOptionsArgs.builder()
                    .certSign(false)
                    .contentCommitment(false)
                    .crlSign(false)
                    .dataEncipherment(false)
                    .decipherOnly(false)
                    .digitalSignature(false)
                    .encipherOnly(false)
                    .keyAgreement(false)
                    .keyEncipherment(false)
                    .build())
                .extendedKeyUsage(ExtendedKeyUsageOptionsArgs.builder()
                    .clientAuth(false)
                    .codeSigning(false)
                    .emailProtection(false)
                    .ocspSigning(false)
                    .serverAuth(false)
                    .timeStamping(false)
                    .build())
                .unknownExtendedKeyUsages(ObjectIdArgs.builder()
                    .objectIdPath(0)
                    .build())
                .build())
            .nameConstraints(NameConstraintsArgs.builder()
                .critical(false)
                .excludedDnsNames("string")
                .excludedEmailAddresses("string")
                .excludedIpRanges("string")
                .excludedUris("string")
                .permittedDnsNames("string")
                .permittedEmailAddresses("string")
                .permittedIpRanges("string")
                .permittedUris("string")
                .build())
            .policyIds(ObjectIdArgs.builder()
                .objectIdPath(0)
                .build())
            .build())
        .identityConstraints(CertificateIdentityConstraintsArgs.builder()
            .allowSubjectAltNamesPassthrough(false)
            .allowSubjectPassthrough(false)
            .celExpression(ExprArgs.builder()
                .description("string")
                .expression("string")
                .location("string")
                .title("string")
                .build())
            .build())
        .maximumLifetime("string")
        .passthroughExtensions(CertificateExtensionConstraintsArgs.builder()
            .additionalExtensions(ObjectIdArgs.builder()
                .objectIdPath(0)
                .build())
            .knownExtensions("KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIED")
            .build())
        .build())
    .labels(Map.of("string", "string"))
    .location("string")
    .project("string")
    .publishingOptions(PublishingOptionsArgs.builder()
        .encodingFormat("ENCODING_FORMAT_UNSPECIFIED")
        .publishCaCert(false)
        .publishCrl(false)
        .build())
    .requestId("string")
    .build());
ca_pool_resource = google_native.privateca.v1.CaPool("caPoolResource",
    ca_pool_id="string",
    tier=google_native.privateca.v1.CaPoolTier.TIER_UNSPECIFIED,
    issuance_policy={
        "allowed_issuance_modes": {
            "allow_config_based_issuance": False,
            "allow_csr_based_issuance": False,
        },
        "allowed_key_types": [{
            "elliptic_curve": {
                "signature_algorithm": google_native.privateca.v1.EcKeyTypeSignatureAlgorithm.EC_SIGNATURE_ALGORITHM_UNSPECIFIED,
            },
            "rsa": {
                "max_modulus_size": "string",
                "min_modulus_size": "string",
            },
        }],
        "baseline_values": {
            "additional_extensions": [{
                "object_id": {
                    "object_id_path": [0],
                },
                "value": "string",
                "critical": False,
            }],
            "aia_ocsp_servers": ["string"],
            "ca_options": {
                "is_ca": False,
                "max_issuer_path_length": 0,
            },
            "key_usage": {
                "base_key_usage": {
                    "cert_sign": False,
                    "content_commitment": False,
                    "crl_sign": False,
                    "data_encipherment": False,
                    "decipher_only": False,
                    "digital_signature": False,
                    "encipher_only": False,
                    "key_agreement": False,
                    "key_encipherment": False,
                },
                "extended_key_usage": {
                    "client_auth": False,
                    "code_signing": False,
                    "email_protection": False,
                    "ocsp_signing": False,
                    "server_auth": False,
                    "time_stamping": False,
                },
                "unknown_extended_key_usages": [{
                    "object_id_path": [0],
                }],
            },
            "name_constraints": {
                "critical": False,
                "excluded_dns_names": ["string"],
                "excluded_email_addresses": ["string"],
                "excluded_ip_ranges": ["string"],
                "excluded_uris": ["string"],
                "permitted_dns_names": ["string"],
                "permitted_email_addresses": ["string"],
                "permitted_ip_ranges": ["string"],
                "permitted_uris": ["string"],
            },
            "policy_ids": [{
                "object_id_path": [0],
            }],
        },
        "identity_constraints": {
            "allow_subject_alt_names_passthrough": False,
            "allow_subject_passthrough": False,
            "cel_expression": {
                "description": "string",
                "expression": "string",
                "location": "string",
                "title": "string",
            },
        },
        "maximum_lifetime": "string",
        "passthrough_extensions": {
            "additional_extensions": [{
                "object_id_path": [0],
            }],
            "known_extensions": [google_native.privateca.v1.CertificateExtensionConstraintsKnownExtensionsItem.KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIED],
        },
    },
    labels={
        "string": "string",
    },
    location="string",
    project="string",
    publishing_options={
        "encoding_format": google_native.privateca.v1.PublishingOptionsEncodingFormat.ENCODING_FORMAT_UNSPECIFIED,
        "publish_ca_cert": False,
        "publish_crl": False,
    },
    request_id="string")
const caPoolResource = new google_native.privateca.v1.CaPool("caPoolResource", {
    caPoolId: "string",
    tier: google_native.privateca.v1.CaPoolTier.TierUnspecified,
    issuancePolicy: {
        allowedIssuanceModes: {
            allowConfigBasedIssuance: false,
            allowCsrBasedIssuance: false,
        },
        allowedKeyTypes: [{
            ellipticCurve: {
                signatureAlgorithm: google_native.privateca.v1.EcKeyTypeSignatureAlgorithm.EcSignatureAlgorithmUnspecified,
            },
            rsa: {
                maxModulusSize: "string",
                minModulusSize: "string",
            },
        }],
        baselineValues: {
            additionalExtensions: [{
                objectId: {
                    objectIdPath: [0],
                },
                value: "string",
                critical: false,
            }],
            aiaOcspServers: ["string"],
            caOptions: {
                isCa: false,
                maxIssuerPathLength: 0,
            },
            keyUsage: {
                baseKeyUsage: {
                    certSign: false,
                    contentCommitment: false,
                    crlSign: false,
                    dataEncipherment: false,
                    decipherOnly: false,
                    digitalSignature: false,
                    encipherOnly: false,
                    keyAgreement: false,
                    keyEncipherment: false,
                },
                extendedKeyUsage: {
                    clientAuth: false,
                    codeSigning: false,
                    emailProtection: false,
                    ocspSigning: false,
                    serverAuth: false,
                    timeStamping: false,
                },
                unknownExtendedKeyUsages: [{
                    objectIdPath: [0],
                }],
            },
            nameConstraints: {
                critical: false,
                excludedDnsNames: ["string"],
                excludedEmailAddresses: ["string"],
                excludedIpRanges: ["string"],
                excludedUris: ["string"],
                permittedDnsNames: ["string"],
                permittedEmailAddresses: ["string"],
                permittedIpRanges: ["string"],
                permittedUris: ["string"],
            },
            policyIds: [{
                objectIdPath: [0],
            }],
        },
        identityConstraints: {
            allowSubjectAltNamesPassthrough: false,
            allowSubjectPassthrough: false,
            celExpression: {
                description: "string",
                expression: "string",
                location: "string",
                title: "string",
            },
        },
        maximumLifetime: "string",
        passthroughExtensions: {
            additionalExtensions: [{
                objectIdPath: [0],
            }],
            knownExtensions: [google_native.privateca.v1.CertificateExtensionConstraintsKnownExtensionsItem.KnownCertificateExtensionUnspecified],
        },
    },
    labels: {
        string: "string",
    },
    location: "string",
    project: "string",
    publishingOptions: {
        encodingFormat: google_native.privateca.v1.PublishingOptionsEncodingFormat.EncodingFormatUnspecified,
        publishCaCert: false,
        publishCrl: false,
    },
    requestId: "string",
});
type: google-native:privateca/v1:CaPool
properties:
    caPoolId: string
    issuancePolicy:
        allowedIssuanceModes:
            allowConfigBasedIssuance: false
            allowCsrBasedIssuance: false
        allowedKeyTypes:
            - ellipticCurve:
                signatureAlgorithm: EC_SIGNATURE_ALGORITHM_UNSPECIFIED
              rsa:
                maxModulusSize: string
                minModulusSize: string
        baselineValues:
            additionalExtensions:
                - critical: false
                  objectId:
                    objectIdPath:
                        - 0
                  value: string
            aiaOcspServers:
                - string
            caOptions:
                isCa: false
                maxIssuerPathLength: 0
            keyUsage:
                baseKeyUsage:
                    certSign: false
                    contentCommitment: false
                    crlSign: false
                    dataEncipherment: false
                    decipherOnly: false
                    digitalSignature: false
                    encipherOnly: false
                    keyAgreement: false
                    keyEncipherment: false
                extendedKeyUsage:
                    clientAuth: false
                    codeSigning: false
                    emailProtection: false
                    ocspSigning: false
                    serverAuth: false
                    timeStamping: false
                unknownExtendedKeyUsages:
                    - objectIdPath:
                        - 0
            nameConstraints:
                critical: false
                excludedDnsNames:
                    - string
                excludedEmailAddresses:
                    - string
                excludedIpRanges:
                    - string
                excludedUris:
                    - string
                permittedDnsNames:
                    - string
                permittedEmailAddresses:
                    - string
                permittedIpRanges:
                    - string
                permittedUris:
                    - string
            policyIds:
                - objectIdPath:
                    - 0
        identityConstraints:
            allowSubjectAltNamesPassthrough: false
            allowSubjectPassthrough: false
            celExpression:
                description: string
                expression: string
                location: string
                title: string
        maximumLifetime: string
        passthroughExtensions:
            additionalExtensions:
                - objectIdPath:
                    - 0
            knownExtensions:
                - KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIED
    labels:
        string: string
    location: string
    project: string
    publishingOptions:
        encodingFormat: ENCODING_FORMAT_UNSPECIFIED
        publishCaCert: false
        publishCrl: false
    requestId: string
    tier: TIER_UNSPECIFIED
CaPool Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The CaPool resource accepts the following input properties:
- CaPool stringId 
- Required. It must be unique within a location and match the regular expression [a-zA-Z0-9_-]{1,63}
- Tier
Pulumi.Google Native. Privateca. V1. Ca Pool Tier 
- Immutable. The Tier of this CaPool.
- IssuancePolicy Pulumi.Google Native. Privateca. V1. Inputs. Issuance Policy 
- Optional. The IssuancePolicy to control how Certificates will be issued from this CaPool.
- Labels Dictionary<string, string>
- Optional. Labels with user-defined metadata.
- Location string
- Project string
- PublishingOptions Pulumi.Google Native. Privateca. V1. Inputs. Publishing Options 
- Optional. The PublishingOptions to follow when issuing Certificates from any CertificateAuthority in this CaPool.
- RequestId string
- Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
- CaPool stringId 
- Required. It must be unique within a location and match the regular expression [a-zA-Z0-9_-]{1,63}
- Tier
CaPool Tier 
- Immutable. The Tier of this CaPool.
- IssuancePolicy IssuancePolicy Args 
- Optional. The IssuancePolicy to control how Certificates will be issued from this CaPool.
- Labels map[string]string
- Optional. Labels with user-defined metadata.
- Location string
- Project string
- PublishingOptions PublishingOptions Args 
- Optional. The PublishingOptions to follow when issuing Certificates from any CertificateAuthority in this CaPool.
- RequestId string
- Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
- caPool StringId 
- Required. It must be unique within a location and match the regular expression [a-zA-Z0-9_-]{1,63}
- tier
CaPool Tier 
- Immutable. The Tier of this CaPool.
- issuancePolicy IssuancePolicy 
- Optional. The IssuancePolicy to control how Certificates will be issued from this CaPool.
- labels Map<String,String>
- Optional. Labels with user-defined metadata.
- location String
- project String
- publishingOptions PublishingOptions 
- Optional. The PublishingOptions to follow when issuing Certificates from any CertificateAuthority in this CaPool.
- requestId String
- Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
- caPool stringId 
- Required. It must be unique within a location and match the regular expression [a-zA-Z0-9_-]{1,63}
- tier
CaPool Tier 
- Immutable. The Tier of this CaPool.
- issuancePolicy IssuancePolicy 
- Optional. The IssuancePolicy to control how Certificates will be issued from this CaPool.
- labels {[key: string]: string}
- Optional. Labels with user-defined metadata.
- location string
- project string
- publishingOptions PublishingOptions 
- Optional. The PublishingOptions to follow when issuing Certificates from any CertificateAuthority in this CaPool.
- requestId string
- Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
- ca_pool_ strid 
- Required. It must be unique within a location and match the regular expression [a-zA-Z0-9_-]{1,63}
- tier
CaPool Tier 
- Immutable. The Tier of this CaPool.
- issuance_policy IssuancePolicy Args 
- Optional. The IssuancePolicy to control how Certificates will be issued from this CaPool.
- labels Mapping[str, str]
- Optional. Labels with user-defined metadata.
- location str
- project str
- publishing_options PublishingOptions Args 
- Optional. The PublishingOptions to follow when issuing Certificates from any CertificateAuthority in this CaPool.
- request_id str
- Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
- caPool StringId 
- Required. It must be unique within a location and match the regular expression [a-zA-Z0-9_-]{1,63}
- tier "TIER_UNSPECIFIED" | "ENTERPRISE" | "DEVOPS"
- Immutable. The Tier of this CaPool.
- issuancePolicy Property Map
- Optional. The IssuancePolicy to control how Certificates will be issued from this CaPool.
- labels Map<String>
- Optional. Labels with user-defined metadata.
- location String
- project String
- publishingOptions Property Map
- Optional. The PublishingOptions to follow when issuing Certificates from any CertificateAuthority in this CaPool.
- requestId String
- Optional. An ID to identify requests. Specify a unique request ID so that if you must retry your request, the server will know to ignore the request if it has already been completed. The server will guarantee that for at least 60 minutes since the first request. For example, consider a situation where you make an initial request and the request times out. If you make the request again with the same request ID, the server can check if original operation with the same request ID was received, and if so, will ignore the second request. This prevents clients from accidentally creating duplicate commitments. The request ID must be a valid UUID with the exception that zero UUID is not supported (00000000-0000-0000-0000-000000000000).
Outputs
All input properties are implicitly available as output properties. Additionally, the CaPool resource produces the following output properties:
Supporting Types
AllowedKeyType, AllowedKeyTypeArgs      
- EllipticCurve Pulumi.Google Native. Privateca. V1. Inputs. Ec Key Type 
- Represents an allowed Elliptic Curve key type.
- Rsa
Pulumi.Google Native. Privateca. V1. Inputs. Rsa Key Type 
- Represents an allowed RSA key type.
- EllipticCurve EcKey Type 
- Represents an allowed Elliptic Curve key type.
- Rsa
RsaKey Type 
- Represents an allowed RSA key type.
- ellipticCurve EcKey Type 
- Represents an allowed Elliptic Curve key type.
- rsa
RsaKey Type 
- Represents an allowed RSA key type.
- ellipticCurve EcKey Type 
- Represents an allowed Elliptic Curve key type.
- rsa
RsaKey Type 
- Represents an allowed RSA key type.
- elliptic_curve EcKey Type 
- Represents an allowed Elliptic Curve key type.
- rsa
RsaKey Type 
- Represents an allowed RSA key type.
- ellipticCurve Property Map
- Represents an allowed Elliptic Curve key type.
- rsa Property Map
- Represents an allowed RSA key type.
AllowedKeyTypeResponse, AllowedKeyTypeResponseArgs        
- EllipticCurve Pulumi.Google Native. Privateca. V1. Inputs. Ec Key Type Response 
- Represents an allowed Elliptic Curve key type.
- Rsa
Pulumi.Google Native. Privateca. V1. Inputs. Rsa Key Type Response 
- Represents an allowed RSA key type.
- EllipticCurve EcKey Type Response 
- Represents an allowed Elliptic Curve key type.
- Rsa
RsaKey Type Response 
- Represents an allowed RSA key type.
- ellipticCurve EcKey Type Response 
- Represents an allowed Elliptic Curve key type.
- rsa
RsaKey Type Response 
- Represents an allowed RSA key type.
- ellipticCurve EcKey Type Response 
- Represents an allowed Elliptic Curve key type.
- rsa
RsaKey Type Response 
- Represents an allowed RSA key type.
- elliptic_curve EcKey Type Response 
- Represents an allowed Elliptic Curve key type.
- rsa
RsaKey Type Response 
- Represents an allowed RSA key type.
- ellipticCurve Property Map
- Represents an allowed Elliptic Curve key type.
- rsa Property Map
- Represents an allowed RSA key type.
CaOptions, CaOptionsArgs    
- IsCa bool
- Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- MaxIssuer intPath Length 
- Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- IsCa bool
- Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- MaxIssuer intPath Length 
- Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- isCa Boolean
- Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- maxIssuer IntegerPath Length 
- Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- isCa boolean
- Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- maxIssuer numberPath Length 
- Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- is_ca bool
- Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- max_issuer_ intpath_ length 
- Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- isCa Boolean
- Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- maxIssuer NumberPath Length 
- Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
CaOptionsResponse, CaOptionsResponseArgs      
- IsCa bool
- Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- MaxIssuer intPath Length 
- Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- IsCa bool
- Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- MaxIssuer intPath Length 
- Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- isCa Boolean
- Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- maxIssuer IntegerPath Length 
- Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- isCa boolean
- Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- maxIssuer numberPath Length 
- Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- is_ca bool
- Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- max_issuer_ intpath_ length 
- Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
- isCa Boolean
- Optional. Refers to the "CA" X.509 extension, which is a boolean value. When this value is missing, the extension will be omitted from the CA certificate.
- maxIssuer NumberPath Length 
- Optional. Refers to the path length restriction X.509 extension. For a CA certificate, this value describes the depth of subordinate CA certificates that are allowed. If this value is less than 0, the request will fail. If this value is missing, the max path length will be omitted from the CA certificate.
CaPoolTier, CaPoolTierArgs      
- TierUnspecified 
- TIER_UNSPECIFIEDNot specified.
- Enterprise
- ENTERPRISEEnterprise tier.
- Devops
- DEVOPSDevOps tier.
- CaPool Tier Tier Unspecified 
- TIER_UNSPECIFIEDNot specified.
- CaPool Tier Enterprise 
- ENTERPRISEEnterprise tier.
- CaPool Tier Devops 
- DEVOPSDevOps tier.
- TierUnspecified 
- TIER_UNSPECIFIEDNot specified.
- Enterprise
- ENTERPRISEEnterprise tier.
- Devops
- DEVOPSDevOps tier.
- TierUnspecified 
- TIER_UNSPECIFIEDNot specified.
- Enterprise
- ENTERPRISEEnterprise tier.
- Devops
- DEVOPSDevOps tier.
- TIER_UNSPECIFIED
- TIER_UNSPECIFIEDNot specified.
- ENTERPRISE
- ENTERPRISEEnterprise tier.
- DEVOPS
- DEVOPSDevOps tier.
- "TIER_UNSPECIFIED"
- TIER_UNSPECIFIEDNot specified.
- "ENTERPRISE"
- ENTERPRISEEnterprise tier.
- "DEVOPS"
- DEVOPSDevOps tier.
CertificateExtensionConstraints, CertificateExtensionConstraintsArgs      
- AdditionalExtensions List<Pulumi.Google Native. Privateca. V1. Inputs. Object Id> 
- Optional. A set of ObjectIds identifying custom X.509 extensions. Will be combined with known_extensions to determine the full set of X.509 extensions.
- KnownExtensions List<Pulumi.Google Native. Privateca. V1. Certificate Extension Constraints Known Extensions Item> 
- Optional. A set of named X.509 extensions. Will be combined with additional_extensions to determine the full set of X.509 extensions.
- AdditionalExtensions []ObjectId 
- Optional. A set of ObjectIds identifying custom X.509 extensions. Will be combined with known_extensions to determine the full set of X.509 extensions.
- KnownExtensions []CertificateExtension Constraints Known Extensions Item 
- Optional. A set of named X.509 extensions. Will be combined with additional_extensions to determine the full set of X.509 extensions.
- additionalExtensions List<ObjectId> 
- Optional. A set of ObjectIds identifying custom X.509 extensions. Will be combined with known_extensions to determine the full set of X.509 extensions.
- knownExtensions List<CertificateExtension Constraints Known Extensions Item> 
- Optional. A set of named X.509 extensions. Will be combined with additional_extensions to determine the full set of X.509 extensions.
- additionalExtensions ObjectId[] 
- Optional. A set of ObjectIds identifying custom X.509 extensions. Will be combined with known_extensions to determine the full set of X.509 extensions.
- knownExtensions CertificateExtension Constraints Known Extensions Item[] 
- Optional. A set of named X.509 extensions. Will be combined with additional_extensions to determine the full set of X.509 extensions.
- additional_extensions Sequence[ObjectId] 
- Optional. A set of ObjectIds identifying custom X.509 extensions. Will be combined with known_extensions to determine the full set of X.509 extensions.
- known_extensions Sequence[CertificateExtension Constraints Known Extensions Item] 
- Optional. A set of named X.509 extensions. Will be combined with additional_extensions to determine the full set of X.509 extensions.
- additionalExtensions List<Property Map>
- Optional. A set of ObjectIds identifying custom X.509 extensions. Will be combined with known_extensions to determine the full set of X.509 extensions.
- knownExtensions List<"KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIED" | "BASE_KEY_USAGE" | "EXTENDED_KEY_USAGE" | "CA_OPTIONS" | "POLICY_IDS" | "AIA_OCSP_SERVERS" | "NAME_CONSTRAINTS">
- Optional. A set of named X.509 extensions. Will be combined with additional_extensions to determine the full set of X.509 extensions.
CertificateExtensionConstraintsKnownExtensionsItem, CertificateExtensionConstraintsKnownExtensionsItemArgs            
- KnownCertificate Extension Unspecified 
- KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIEDNot specified.
- BaseKey Usage 
- BASE_KEY_USAGERefers to a certificate's Key Usage extension, as described in RFC 5280 section 4.2.1.3. This corresponds to the KeyUsage.base_key_usage field.
- ExtendedKey Usage 
- EXTENDED_KEY_USAGERefers to a certificate's Extended Key Usage extension, as described in RFC 5280 section 4.2.1.12. This corresponds to the KeyUsage.extended_key_usage message.
- CaOptions 
- CA_OPTIONSRefers to a certificate's Basic Constraints extension, as described in RFC 5280 section 4.2.1.9. This corresponds to the X509Parameters.ca_options field.
- PolicyIds 
- POLICY_IDSRefers to a certificate's Policy object identifiers, as described in RFC 5280 section 4.2.1.4. This corresponds to the X509Parameters.policy_ids field.
- AiaOcsp Servers 
- AIA_OCSP_SERVERSRefers to OCSP servers in a certificate's Authority Information Access extension, as described in RFC 5280 section 4.2.2.1, This corresponds to the X509Parameters.aia_ocsp_servers field.
- NameConstraints 
- NAME_CONSTRAINTSRefers to Name Constraints extension as described in RFC 5280 section 4.2.1.10
- CertificateExtension Constraints Known Extensions Item Known Certificate Extension Unspecified 
- KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIEDNot specified.
- CertificateExtension Constraints Known Extensions Item Base Key Usage 
- BASE_KEY_USAGERefers to a certificate's Key Usage extension, as described in RFC 5280 section 4.2.1.3. This corresponds to the KeyUsage.base_key_usage field.
- CertificateExtension Constraints Known Extensions Item Extended Key Usage 
- EXTENDED_KEY_USAGERefers to a certificate's Extended Key Usage extension, as described in RFC 5280 section 4.2.1.12. This corresponds to the KeyUsage.extended_key_usage message.
- CertificateExtension Constraints Known Extensions Item Ca Options 
- CA_OPTIONSRefers to a certificate's Basic Constraints extension, as described in RFC 5280 section 4.2.1.9. This corresponds to the X509Parameters.ca_options field.
- CertificateExtension Constraints Known Extensions Item Policy Ids 
- POLICY_IDSRefers to a certificate's Policy object identifiers, as described in RFC 5280 section 4.2.1.4. This corresponds to the X509Parameters.policy_ids field.
- CertificateExtension Constraints Known Extensions Item Aia Ocsp Servers 
- AIA_OCSP_SERVERSRefers to OCSP servers in a certificate's Authority Information Access extension, as described in RFC 5280 section 4.2.2.1, This corresponds to the X509Parameters.aia_ocsp_servers field.
- CertificateExtension Constraints Known Extensions Item Name Constraints 
- NAME_CONSTRAINTSRefers to Name Constraints extension as described in RFC 5280 section 4.2.1.10
- KnownCertificate Extension Unspecified 
- KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIEDNot specified.
- BaseKey Usage 
- BASE_KEY_USAGERefers to a certificate's Key Usage extension, as described in RFC 5280 section 4.2.1.3. This corresponds to the KeyUsage.base_key_usage field.
- ExtendedKey Usage 
- EXTENDED_KEY_USAGERefers to a certificate's Extended Key Usage extension, as described in RFC 5280 section 4.2.1.12. This corresponds to the KeyUsage.extended_key_usage message.
- CaOptions 
- CA_OPTIONSRefers to a certificate's Basic Constraints extension, as described in RFC 5280 section 4.2.1.9. This corresponds to the X509Parameters.ca_options field.
- PolicyIds 
- POLICY_IDSRefers to a certificate's Policy object identifiers, as described in RFC 5280 section 4.2.1.4. This corresponds to the X509Parameters.policy_ids field.
- AiaOcsp Servers 
- AIA_OCSP_SERVERSRefers to OCSP servers in a certificate's Authority Information Access extension, as described in RFC 5280 section 4.2.2.1, This corresponds to the X509Parameters.aia_ocsp_servers field.
- NameConstraints 
- NAME_CONSTRAINTSRefers to Name Constraints extension as described in RFC 5280 section 4.2.1.10
- KnownCertificate Extension Unspecified 
- KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIEDNot specified.
- BaseKey Usage 
- BASE_KEY_USAGERefers to a certificate's Key Usage extension, as described in RFC 5280 section 4.2.1.3. This corresponds to the KeyUsage.base_key_usage field.
- ExtendedKey Usage 
- EXTENDED_KEY_USAGERefers to a certificate's Extended Key Usage extension, as described in RFC 5280 section 4.2.1.12. This corresponds to the KeyUsage.extended_key_usage message.
- CaOptions 
- CA_OPTIONSRefers to a certificate's Basic Constraints extension, as described in RFC 5280 section 4.2.1.9. This corresponds to the X509Parameters.ca_options field.
- PolicyIds 
- POLICY_IDSRefers to a certificate's Policy object identifiers, as described in RFC 5280 section 4.2.1.4. This corresponds to the X509Parameters.policy_ids field.
- AiaOcsp Servers 
- AIA_OCSP_SERVERSRefers to OCSP servers in a certificate's Authority Information Access extension, as described in RFC 5280 section 4.2.2.1, This corresponds to the X509Parameters.aia_ocsp_servers field.
- NameConstraints 
- NAME_CONSTRAINTSRefers to Name Constraints extension as described in RFC 5280 section 4.2.1.10
- KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIED
- KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIEDNot specified.
- BASE_KEY_USAGE
- BASE_KEY_USAGERefers to a certificate's Key Usage extension, as described in RFC 5280 section 4.2.1.3. This corresponds to the KeyUsage.base_key_usage field.
- EXTENDED_KEY_USAGE
- EXTENDED_KEY_USAGERefers to a certificate's Extended Key Usage extension, as described in RFC 5280 section 4.2.1.12. This corresponds to the KeyUsage.extended_key_usage message.
- CA_OPTIONS
- CA_OPTIONSRefers to a certificate's Basic Constraints extension, as described in RFC 5280 section 4.2.1.9. This corresponds to the X509Parameters.ca_options field.
- POLICY_IDS
- POLICY_IDSRefers to a certificate's Policy object identifiers, as described in RFC 5280 section 4.2.1.4. This corresponds to the X509Parameters.policy_ids field.
- AIA_OCSP_SERVERS
- AIA_OCSP_SERVERSRefers to OCSP servers in a certificate's Authority Information Access extension, as described in RFC 5280 section 4.2.2.1, This corresponds to the X509Parameters.aia_ocsp_servers field.
- NAME_CONSTRAINTS
- NAME_CONSTRAINTSRefers to Name Constraints extension as described in RFC 5280 section 4.2.1.10
- "KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIED"
- KNOWN_CERTIFICATE_EXTENSION_UNSPECIFIEDNot specified.
- "BASE_KEY_USAGE"
- BASE_KEY_USAGERefers to a certificate's Key Usage extension, as described in RFC 5280 section 4.2.1.3. This corresponds to the KeyUsage.base_key_usage field.
- "EXTENDED_KEY_USAGE"
- EXTENDED_KEY_USAGERefers to a certificate's Extended Key Usage extension, as described in RFC 5280 section 4.2.1.12. This corresponds to the KeyUsage.extended_key_usage message.
- "CA_OPTIONS"
- CA_OPTIONSRefers to a certificate's Basic Constraints extension, as described in RFC 5280 section 4.2.1.9. This corresponds to the X509Parameters.ca_options field.
- "POLICY_IDS"
- POLICY_IDSRefers to a certificate's Policy object identifiers, as described in RFC 5280 section 4.2.1.4. This corresponds to the X509Parameters.policy_ids field.
- "AIA_OCSP_SERVERS"
- AIA_OCSP_SERVERSRefers to OCSP servers in a certificate's Authority Information Access extension, as described in RFC 5280 section 4.2.2.1, This corresponds to the X509Parameters.aia_ocsp_servers field.
- "NAME_CONSTRAINTS"
- NAME_CONSTRAINTSRefers to Name Constraints extension as described in RFC 5280 section 4.2.1.10
CertificateExtensionConstraintsResponse, CertificateExtensionConstraintsResponseArgs        
- AdditionalExtensions List<Pulumi.Google Native. Privateca. V1. Inputs. Object Id Response> 
- Optional. A set of ObjectIds identifying custom X.509 extensions. Will be combined with known_extensions to determine the full set of X.509 extensions.
- KnownExtensions List<string>
- Optional. A set of named X.509 extensions. Will be combined with additional_extensions to determine the full set of X.509 extensions.
- AdditionalExtensions []ObjectId Response 
- Optional. A set of ObjectIds identifying custom X.509 extensions. Will be combined with known_extensions to determine the full set of X.509 extensions.
- KnownExtensions []string
- Optional. A set of named X.509 extensions. Will be combined with additional_extensions to determine the full set of X.509 extensions.
- additionalExtensions List<ObjectId Response> 
- Optional. A set of ObjectIds identifying custom X.509 extensions. Will be combined with known_extensions to determine the full set of X.509 extensions.
- knownExtensions List<String>
- Optional. A set of named X.509 extensions. Will be combined with additional_extensions to determine the full set of X.509 extensions.
- additionalExtensions ObjectId Response[] 
- Optional. A set of ObjectIds identifying custom X.509 extensions. Will be combined with known_extensions to determine the full set of X.509 extensions.
- knownExtensions string[]
- Optional. A set of named X.509 extensions. Will be combined with additional_extensions to determine the full set of X.509 extensions.
- additional_extensions Sequence[ObjectId Response] 
- Optional. A set of ObjectIds identifying custom X.509 extensions. Will be combined with known_extensions to determine the full set of X.509 extensions.
- known_extensions Sequence[str]
- Optional. A set of named X.509 extensions. Will be combined with additional_extensions to determine the full set of X.509 extensions.
- additionalExtensions List<Property Map>
- Optional. A set of ObjectIds identifying custom X.509 extensions. Will be combined with known_extensions to determine the full set of X.509 extensions.
- knownExtensions List<String>
- Optional. A set of named X.509 extensions. Will be combined with additional_extensions to determine the full set of X.509 extensions.
CertificateIdentityConstraints, CertificateIdentityConstraintsArgs      
- AllowSubject boolAlt Names Passthrough 
- If this is true, the SubjectAltNames extension may be copied from a certificate request into the signed certificate. Otherwise, the requested SubjectAltNames will be discarded.
- AllowSubject boolPassthrough 
- If this is true, the Subject field may be copied from a certificate request into the signed certificate. Otherwise, the requested Subject will be discarded.
- CelExpression Pulumi.Google Native. Privateca. V1. Inputs. Expr 
- Optional. A CEL expression that may be used to validate the resolved X.509 Subject and/or Subject Alternative Name before a certificate is signed. To see the full allowed syntax and some examples, see https://cloud.google.com/certificate-authority-service/docs/using-cel
- AllowSubject boolAlt Names Passthrough 
- If this is true, the SubjectAltNames extension may be copied from a certificate request into the signed certificate. Otherwise, the requested SubjectAltNames will be discarded.
- AllowSubject boolPassthrough 
- If this is true, the Subject field may be copied from a certificate request into the signed certificate. Otherwise, the requested Subject will be discarded.
- CelExpression Expr
- Optional. A CEL expression that may be used to validate the resolved X.509 Subject and/or Subject Alternative Name before a certificate is signed. To see the full allowed syntax and some examples, see https://cloud.google.com/certificate-authority-service/docs/using-cel
- allowSubject BooleanAlt Names Passthrough 
- If this is true, the SubjectAltNames extension may be copied from a certificate request into the signed certificate. Otherwise, the requested SubjectAltNames will be discarded.
- allowSubject BooleanPassthrough 
- If this is true, the Subject field may be copied from a certificate request into the signed certificate. Otherwise, the requested Subject will be discarded.
- celExpression Expr
- Optional. A CEL expression that may be used to validate the resolved X.509 Subject and/or Subject Alternative Name before a certificate is signed. To see the full allowed syntax and some examples, see https://cloud.google.com/certificate-authority-service/docs/using-cel
- allowSubject booleanAlt Names Passthrough 
- If this is true, the SubjectAltNames extension may be copied from a certificate request into the signed certificate. Otherwise, the requested SubjectAltNames will be discarded.
- allowSubject booleanPassthrough 
- If this is true, the Subject field may be copied from a certificate request into the signed certificate. Otherwise, the requested Subject will be discarded.
- celExpression Expr
- Optional. A CEL expression that may be used to validate the resolved X.509 Subject and/or Subject Alternative Name before a certificate is signed. To see the full allowed syntax and some examples, see https://cloud.google.com/certificate-authority-service/docs/using-cel
- allow_subject_ boolalt_ names_ passthrough 
- If this is true, the SubjectAltNames extension may be copied from a certificate request into the signed certificate. Otherwise, the requested SubjectAltNames will be discarded.
- allow_subject_ boolpassthrough 
- If this is true, the Subject field may be copied from a certificate request into the signed certificate. Otherwise, the requested Subject will be discarded.
- cel_expression Expr
- Optional. A CEL expression that may be used to validate the resolved X.509 Subject and/or Subject Alternative Name before a certificate is signed. To see the full allowed syntax and some examples, see https://cloud.google.com/certificate-authority-service/docs/using-cel
- allowSubject BooleanAlt Names Passthrough 
- If this is true, the SubjectAltNames extension may be copied from a certificate request into the signed certificate. Otherwise, the requested SubjectAltNames will be discarded.
- allowSubject BooleanPassthrough 
- If this is true, the Subject field may be copied from a certificate request into the signed certificate. Otherwise, the requested Subject will be discarded.
- celExpression Property Map
- Optional. A CEL expression that may be used to validate the resolved X.509 Subject and/or Subject Alternative Name before a certificate is signed. To see the full allowed syntax and some examples, see https://cloud.google.com/certificate-authority-service/docs/using-cel
CertificateIdentityConstraintsResponse, CertificateIdentityConstraintsResponseArgs        
- AllowSubject boolAlt Names Passthrough 
- If this is true, the SubjectAltNames extension may be copied from a certificate request into the signed certificate. Otherwise, the requested SubjectAltNames will be discarded.
- AllowSubject boolPassthrough 
- If this is true, the Subject field may be copied from a certificate request into the signed certificate. Otherwise, the requested Subject will be discarded.
- CelExpression Pulumi.Google Native. Privateca. V1. Inputs. Expr Response 
- Optional. A CEL expression that may be used to validate the resolved X.509 Subject and/or Subject Alternative Name before a certificate is signed. To see the full allowed syntax and some examples, see https://cloud.google.com/certificate-authority-service/docs/using-cel
- AllowSubject boolAlt Names Passthrough 
- If this is true, the SubjectAltNames extension may be copied from a certificate request into the signed certificate. Otherwise, the requested SubjectAltNames will be discarded.
- AllowSubject boolPassthrough 
- If this is true, the Subject field may be copied from a certificate request into the signed certificate. Otherwise, the requested Subject will be discarded.
- CelExpression ExprResponse 
- Optional. A CEL expression that may be used to validate the resolved X.509 Subject and/or Subject Alternative Name before a certificate is signed. To see the full allowed syntax and some examples, see https://cloud.google.com/certificate-authority-service/docs/using-cel
- allowSubject BooleanAlt Names Passthrough 
- If this is true, the SubjectAltNames extension may be copied from a certificate request into the signed certificate. Otherwise, the requested SubjectAltNames will be discarded.
- allowSubject BooleanPassthrough 
- If this is true, the Subject field may be copied from a certificate request into the signed certificate. Otherwise, the requested Subject will be discarded.
- celExpression ExprResponse 
- Optional. A CEL expression that may be used to validate the resolved X.509 Subject and/or Subject Alternative Name before a certificate is signed. To see the full allowed syntax and some examples, see https://cloud.google.com/certificate-authority-service/docs/using-cel
- allowSubject booleanAlt Names Passthrough 
- If this is true, the SubjectAltNames extension may be copied from a certificate request into the signed certificate. Otherwise, the requested SubjectAltNames will be discarded.
- allowSubject booleanPassthrough 
- If this is true, the Subject field may be copied from a certificate request into the signed certificate. Otherwise, the requested Subject will be discarded.
- celExpression ExprResponse 
- Optional. A CEL expression that may be used to validate the resolved X.509 Subject and/or Subject Alternative Name before a certificate is signed. To see the full allowed syntax and some examples, see https://cloud.google.com/certificate-authority-service/docs/using-cel
- allow_subject_ boolalt_ names_ passthrough 
- If this is true, the SubjectAltNames extension may be copied from a certificate request into the signed certificate. Otherwise, the requested SubjectAltNames will be discarded.
- allow_subject_ boolpassthrough 
- If this is true, the Subject field may be copied from a certificate request into the signed certificate. Otherwise, the requested Subject will be discarded.
- cel_expression ExprResponse 
- Optional. A CEL expression that may be used to validate the resolved X.509 Subject and/or Subject Alternative Name before a certificate is signed. To see the full allowed syntax and some examples, see https://cloud.google.com/certificate-authority-service/docs/using-cel
- allowSubject BooleanAlt Names Passthrough 
- If this is true, the SubjectAltNames extension may be copied from a certificate request into the signed certificate. Otherwise, the requested SubjectAltNames will be discarded.
- allowSubject BooleanPassthrough 
- If this is true, the Subject field may be copied from a certificate request into the signed certificate. Otherwise, the requested Subject will be discarded.
- celExpression Property Map
- Optional. A CEL expression that may be used to validate the resolved X.509 Subject and/or Subject Alternative Name before a certificate is signed. To see the full allowed syntax and some examples, see https://cloud.google.com/certificate-authority-service/docs/using-cel
EcKeyType, EcKeyTypeArgs      
- SignatureAlgorithm Pulumi.Google Native. Privateca. V1. Ec Key Type Signature Algorithm 
- Optional. A signature algorithm that must be used. If this is omitted, any EC-based signature algorithm will be allowed.
- SignatureAlgorithm EcKey Type Signature Algorithm 
- Optional. A signature algorithm that must be used. If this is omitted, any EC-based signature algorithm will be allowed.
- signatureAlgorithm EcKey Type Signature Algorithm 
- Optional. A signature algorithm that must be used. If this is omitted, any EC-based signature algorithm will be allowed.
- signatureAlgorithm EcKey Type Signature Algorithm 
- Optional. A signature algorithm that must be used. If this is omitted, any EC-based signature algorithm will be allowed.
- signature_algorithm EcKey Type Signature Algorithm 
- Optional. A signature algorithm that must be used. If this is omitted, any EC-based signature algorithm will be allowed.
- signatureAlgorithm "EC_SIGNATURE_ALGORITHM_UNSPECIFIED" | "ECDSA_P256" | "ECDSA_P384" | "EDDSA_25519"
- Optional. A signature algorithm that must be used. If this is omitted, any EC-based signature algorithm will be allowed.
EcKeyTypeResponse, EcKeyTypeResponseArgs        
- SignatureAlgorithm string
- Optional. A signature algorithm that must be used. If this is omitted, any EC-based signature algorithm will be allowed.
- SignatureAlgorithm string
- Optional. A signature algorithm that must be used. If this is omitted, any EC-based signature algorithm will be allowed.
- signatureAlgorithm String
- Optional. A signature algorithm that must be used. If this is omitted, any EC-based signature algorithm will be allowed.
- signatureAlgorithm string
- Optional. A signature algorithm that must be used. If this is omitted, any EC-based signature algorithm will be allowed.
- signature_algorithm str
- Optional. A signature algorithm that must be used. If this is omitted, any EC-based signature algorithm will be allowed.
- signatureAlgorithm String
- Optional. A signature algorithm that must be used. If this is omitted, any EC-based signature algorithm will be allowed.
EcKeyTypeSignatureAlgorithm, EcKeyTypeSignatureAlgorithmArgs          
- EcSignature Algorithm Unspecified 
- EC_SIGNATURE_ALGORITHM_UNSPECIFIEDNot specified. Signifies that any signature algorithm may be used.
- EcdsaP256 
- ECDSA_P256Refers to the Elliptic Curve Digital Signature Algorithm over the NIST P-256 curve.
- EcdsaP384 
- ECDSA_P384Refers to the Elliptic Curve Digital Signature Algorithm over the NIST P-384 curve.
- Eddsa25519
- EDDSA_25519Refers to the Edwards-curve Digital Signature Algorithm over curve 25519, as described in RFC 8410.
- EcKey Type Signature Algorithm Ec Signature Algorithm Unspecified 
- EC_SIGNATURE_ALGORITHM_UNSPECIFIEDNot specified. Signifies that any signature algorithm may be used.
- EcKey Type Signature Algorithm Ecdsa P256 
- ECDSA_P256Refers to the Elliptic Curve Digital Signature Algorithm over the NIST P-256 curve.
- EcKey Type Signature Algorithm Ecdsa P384 
- ECDSA_P384Refers to the Elliptic Curve Digital Signature Algorithm over the NIST P-384 curve.
- EcKey Type Signature Algorithm Eddsa25519 
- EDDSA_25519Refers to the Edwards-curve Digital Signature Algorithm over curve 25519, as described in RFC 8410.
- EcSignature Algorithm Unspecified 
- EC_SIGNATURE_ALGORITHM_UNSPECIFIEDNot specified. Signifies that any signature algorithm may be used.
- EcdsaP256 
- ECDSA_P256Refers to the Elliptic Curve Digital Signature Algorithm over the NIST P-256 curve.
- EcdsaP384 
- ECDSA_P384Refers to the Elliptic Curve Digital Signature Algorithm over the NIST P-384 curve.
- Eddsa25519
- EDDSA_25519Refers to the Edwards-curve Digital Signature Algorithm over curve 25519, as described in RFC 8410.
- EcSignature Algorithm Unspecified 
- EC_SIGNATURE_ALGORITHM_UNSPECIFIEDNot specified. Signifies that any signature algorithm may be used.
- EcdsaP256 
- ECDSA_P256Refers to the Elliptic Curve Digital Signature Algorithm over the NIST P-256 curve.
- EcdsaP384 
- ECDSA_P384Refers to the Elliptic Curve Digital Signature Algorithm over the NIST P-384 curve.
- Eddsa25519
- EDDSA_25519Refers to the Edwards-curve Digital Signature Algorithm over curve 25519, as described in RFC 8410.
- EC_SIGNATURE_ALGORITHM_UNSPECIFIED
- EC_SIGNATURE_ALGORITHM_UNSPECIFIEDNot specified. Signifies that any signature algorithm may be used.
- ECDSA_P256
- ECDSA_P256Refers to the Elliptic Curve Digital Signature Algorithm over the NIST P-256 curve.
- ECDSA_P384
- ECDSA_P384Refers to the Elliptic Curve Digital Signature Algorithm over the NIST P-384 curve.
- EDDSA25519
- EDDSA_25519Refers to the Edwards-curve Digital Signature Algorithm over curve 25519, as described in RFC 8410.
- "EC_SIGNATURE_ALGORITHM_UNSPECIFIED"
- EC_SIGNATURE_ALGORITHM_UNSPECIFIEDNot specified. Signifies that any signature algorithm may be used.
- "ECDSA_P256"
- ECDSA_P256Refers to the Elliptic Curve Digital Signature Algorithm over the NIST P-256 curve.
- "ECDSA_P384"
- ECDSA_P384Refers to the Elliptic Curve Digital Signature Algorithm over the NIST P-384 curve.
- "EDDSA_25519"
- EDDSA_25519Refers to the Edwards-curve Digital Signature Algorithm over curve 25519, as described in RFC 8410.
Expr, ExprArgs  
- Description string
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- Expression string
- Textual representation of an expression in Common Expression Language syntax.
- Location string
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- Title string
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- Description string
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- Expression string
- Textual representation of an expression in Common Expression Language syntax.
- Location string
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- Title string
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description String
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression String
- Textual representation of an expression in Common Expression Language syntax.
- location String
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title String
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description string
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression string
- Textual representation of an expression in Common Expression Language syntax.
- location string
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title string
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description str
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression str
- Textual representation of an expression in Common Expression Language syntax.
- location str
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title str
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description String
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression String
- Textual representation of an expression in Common Expression Language syntax.
- location String
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title String
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
ExprResponse, ExprResponseArgs    
- Description string
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- Expression string
- Textual representation of an expression in Common Expression Language syntax.
- Location string
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- Title string
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- Description string
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- Expression string
- Textual representation of an expression in Common Expression Language syntax.
- Location string
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- Title string
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description String
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression String
- Textual representation of an expression in Common Expression Language syntax.
- location String
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title String
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description string
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression string
- Textual representation of an expression in Common Expression Language syntax.
- location string
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title string
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description str
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression str
- Textual representation of an expression in Common Expression Language syntax.
- location str
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title str
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
- description String
- Optional. Description of the expression. This is a longer text which describes the expression, e.g. when hovered over it in a UI.
- expression String
- Textual representation of an expression in Common Expression Language syntax.
- location String
- Optional. String indicating the location of the expression for error reporting, e.g. a file name and a position in the file.
- title String
- Optional. Title for the expression, i.e. a short string describing its purpose. This can be used e.g. in UIs which allow to enter the expression.
ExtendedKeyUsageOptions, ExtendedKeyUsageOptionsArgs        
- ClientAuth bool
- Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- CodeSigning bool
- Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- EmailProtection bool
- Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- OcspSigning bool
- Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- ServerAuth bool
- Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- TimeStamping bool
- Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- ClientAuth bool
- Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- CodeSigning bool
- Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- EmailProtection bool
- Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- OcspSigning bool
- Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- ServerAuth bool
- Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- TimeStamping bool
- Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- clientAuth Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- codeSigning Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- emailProtection Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocspSigning Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- serverAuth Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- timeStamping Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- clientAuth boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- codeSigning boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- emailProtection boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocspSigning boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- serverAuth boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- timeStamping boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- client_auth bool
- Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- code_signing bool
- Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- email_protection bool
- Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocsp_signing bool
- Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- server_auth bool
- Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- time_stamping bool
- Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- clientAuth Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- codeSigning Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- emailProtection Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocspSigning Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- serverAuth Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- timeStamping Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
ExtendedKeyUsageOptionsResponse, ExtendedKeyUsageOptionsResponseArgs          
- ClientAuth bool
- Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- CodeSigning bool
- Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- EmailProtection bool
- Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- OcspSigning bool
- Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- ServerAuth bool
- Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- TimeStamping bool
- Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- ClientAuth bool
- Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- CodeSigning bool
- Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- EmailProtection bool
- Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- OcspSigning bool
- Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- ServerAuth bool
- Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- TimeStamping bool
- Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- clientAuth Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- codeSigning Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- emailProtection Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocspSigning Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- serverAuth Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- timeStamping Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- clientAuth boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- codeSigning boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- emailProtection boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocspSigning boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- serverAuth boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- timeStamping boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- client_auth bool
- Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- code_signing bool
- Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- email_protection bool
- Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocsp_signing bool
- Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- server_auth bool
- Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- time_stamping bool
- Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
- clientAuth Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.2. Officially described as "TLS WWW client authentication", though regularly used for non-WWW TLS.
- codeSigning Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.3. Officially described as "Signing of downloadable executable code client authentication".
- emailProtection Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.4. Officially described as "Email protection".
- ocspSigning Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.9. Officially described as "Signing OCSP responses".
- serverAuth Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.1. Officially described as "TLS WWW server authentication", though regularly used for non-WWW TLS.
- timeStamping Boolean
- Corresponds to OID 1.3.6.1.5.5.7.3.8. Officially described as "Binding the hash of an object to a time".
IssuanceModes, IssuanceModesArgs    
- AllowConfig boolBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
- AllowCsr boolBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CSR.
- AllowConfig boolBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
- AllowCsr boolBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CSR.
- allowConfig BooleanBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
- allowCsr BooleanBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CSR.
- allowConfig booleanBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
- allowCsr booleanBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CSR.
- allow_config_ boolbased_ issuance 
- Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
- allow_csr_ boolbased_ issuance 
- Optional. When true, allows callers to create Certificates by specifying a CSR.
- allowConfig BooleanBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
- allowCsr BooleanBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CSR.
IssuanceModesResponse, IssuanceModesResponseArgs      
- AllowConfig boolBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
- AllowCsr boolBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CSR.
- AllowConfig boolBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
- AllowCsr boolBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CSR.
- allowConfig BooleanBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
- allowCsr BooleanBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CSR.
- allowConfig booleanBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
- allowCsr booleanBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CSR.
- allow_config_ boolbased_ issuance 
- Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
- allow_csr_ boolbased_ issuance 
- Optional. When true, allows callers to create Certificates by specifying a CSR.
- allowConfig BooleanBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CertificateConfig.
- allowCsr BooleanBased Issuance 
- Optional. When true, allows callers to create Certificates by specifying a CSR.
IssuancePolicy, IssuancePolicyArgs    
- AllowedIssuance Pulumi.Modes Google Native. Privateca. V1. Inputs. Issuance Modes 
- Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- AllowedKey List<Pulumi.Types Google Native. Privateca. V1. Inputs. Allowed Key Type> 
- Optional. If any AllowedKeyType is specified, then the certificate request's public key must match one of the key types listed here. Otherwise, any key may be used.
- BaselineValues Pulumi.Google Native. Privateca. V1. Inputs. X509Parameters 
- Optional. A set of X.509 values that will be applied to all certificates issued through this CaPool. If a certificate request includes conflicting values for the same properties, they will be overwritten by the values defined here. If a certificate request uses a CertificateTemplate that defines conflicting predefined_values for the same properties, the certificate issuance request will fail.
- IdentityConstraints Pulumi.Google Native. Privateca. V1. Inputs. Certificate Identity Constraints 
- Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity.
- MaximumLifetime string
- Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it.
- PassthroughExtensions Pulumi.Google Native. Privateca. V1. Inputs. Certificate Extension Constraints 
- Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values.
- AllowedIssuance IssuanceModes Modes 
- Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- AllowedKey []AllowedTypes Key Type 
- Optional. If any AllowedKeyType is specified, then the certificate request's public key must match one of the key types listed here. Otherwise, any key may be used.
- BaselineValues X509Parameters
- Optional. A set of X.509 values that will be applied to all certificates issued through this CaPool. If a certificate request includes conflicting values for the same properties, they will be overwritten by the values defined here. If a certificate request uses a CertificateTemplate that defines conflicting predefined_values for the same properties, the certificate issuance request will fail.
- IdentityConstraints CertificateIdentity Constraints 
- Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity.
- MaximumLifetime string
- Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it.
- PassthroughExtensions CertificateExtension Constraints 
- Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values.
- allowedIssuance IssuanceModes Modes 
- Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowedKey List<AllowedTypes Key Type> 
- Optional. If any AllowedKeyType is specified, then the certificate request's public key must match one of the key types listed here. Otherwise, any key may be used.
- baselineValues X509Parameters
- Optional. A set of X.509 values that will be applied to all certificates issued through this CaPool. If a certificate request includes conflicting values for the same properties, they will be overwritten by the values defined here. If a certificate request uses a CertificateTemplate that defines conflicting predefined_values for the same properties, the certificate issuance request will fail.
- identityConstraints CertificateIdentity Constraints 
- Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity.
- maximumLifetime String
- Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it.
- passthroughExtensions CertificateExtension Constraints 
- Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values.
- allowedIssuance IssuanceModes Modes 
- Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowedKey AllowedTypes Key Type[] 
- Optional. If any AllowedKeyType is specified, then the certificate request's public key must match one of the key types listed here. Otherwise, any key may be used.
- baselineValues X509Parameters
- Optional. A set of X.509 values that will be applied to all certificates issued through this CaPool. If a certificate request includes conflicting values for the same properties, they will be overwritten by the values defined here. If a certificate request uses a CertificateTemplate that defines conflicting predefined_values for the same properties, the certificate issuance request will fail.
- identityConstraints CertificateIdentity Constraints 
- Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity.
- maximumLifetime string
- Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it.
- passthroughExtensions CertificateExtension Constraints 
- Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values.
- allowed_issuance_ Issuancemodes Modes 
- Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowed_key_ Sequence[Allowedtypes Key Type] 
- Optional. If any AllowedKeyType is specified, then the certificate request's public key must match one of the key types listed here. Otherwise, any key may be used.
- baseline_values X509Parameters
- Optional. A set of X.509 values that will be applied to all certificates issued through this CaPool. If a certificate request includes conflicting values for the same properties, they will be overwritten by the values defined here. If a certificate request uses a CertificateTemplate that defines conflicting predefined_values for the same properties, the certificate issuance request will fail.
- identity_constraints CertificateIdentity Constraints 
- Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity.
- maximum_lifetime str
- Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it.
- passthrough_extensions CertificateExtension Constraints 
- Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values.
- allowedIssuance Property MapModes 
- Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowedKey List<Property Map>Types 
- Optional. If any AllowedKeyType is specified, then the certificate request's public key must match one of the key types listed here. Otherwise, any key may be used.
- baselineValues Property Map
- Optional. A set of X.509 values that will be applied to all certificates issued through this CaPool. If a certificate request includes conflicting values for the same properties, they will be overwritten by the values defined here. If a certificate request uses a CertificateTemplate that defines conflicting predefined_values for the same properties, the certificate issuance request will fail.
- identityConstraints Property Map
- Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity.
- maximumLifetime String
- Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it.
- passthroughExtensions Property Map
- Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values.
IssuancePolicyResponse, IssuancePolicyResponseArgs      
- AllowedIssuance Pulumi.Modes Google Native. Privateca. V1. Inputs. Issuance Modes Response 
- Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- AllowedKey List<Pulumi.Types Google Native. Privateca. V1. Inputs. Allowed Key Type Response> 
- Optional. If any AllowedKeyType is specified, then the certificate request's public key must match one of the key types listed here. Otherwise, any key may be used.
- BaselineValues Pulumi.Google Native. Privateca. V1. Inputs. X509Parameters Response 
- Optional. A set of X.509 values that will be applied to all certificates issued through this CaPool. If a certificate request includes conflicting values for the same properties, they will be overwritten by the values defined here. If a certificate request uses a CertificateTemplate that defines conflicting predefined_values for the same properties, the certificate issuance request will fail.
- IdentityConstraints Pulumi.Google Native. Privateca. V1. Inputs. Certificate Identity Constraints Response 
- Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity.
- MaximumLifetime string
- Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it.
- PassthroughExtensions Pulumi.Google Native. Privateca. V1. Inputs. Certificate Extension Constraints Response 
- Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values.
- AllowedIssuance IssuanceModes Modes Response 
- Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- AllowedKey []AllowedTypes Key Type Response 
- Optional. If any AllowedKeyType is specified, then the certificate request's public key must match one of the key types listed here. Otherwise, any key may be used.
- BaselineValues X509ParametersResponse 
- Optional. A set of X.509 values that will be applied to all certificates issued through this CaPool. If a certificate request includes conflicting values for the same properties, they will be overwritten by the values defined here. If a certificate request uses a CertificateTemplate that defines conflicting predefined_values for the same properties, the certificate issuance request will fail.
- IdentityConstraints CertificateIdentity Constraints Response 
- Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity.
- MaximumLifetime string
- Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it.
- PassthroughExtensions CertificateExtension Constraints Response 
- Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values.
- allowedIssuance IssuanceModes Modes Response 
- Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowedKey List<AllowedTypes Key Type Response> 
- Optional. If any AllowedKeyType is specified, then the certificate request's public key must match one of the key types listed here. Otherwise, any key may be used.
- baselineValues X509ParametersResponse 
- Optional. A set of X.509 values that will be applied to all certificates issued through this CaPool. If a certificate request includes conflicting values for the same properties, they will be overwritten by the values defined here. If a certificate request uses a CertificateTemplate that defines conflicting predefined_values for the same properties, the certificate issuance request will fail.
- identityConstraints CertificateIdentity Constraints Response 
- Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity.
- maximumLifetime String
- Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it.
- passthroughExtensions CertificateExtension Constraints Response 
- Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values.
- allowedIssuance IssuanceModes Modes Response 
- Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowedKey AllowedTypes Key Type Response[] 
- Optional. If any AllowedKeyType is specified, then the certificate request's public key must match one of the key types listed here. Otherwise, any key may be used.
- baselineValues X509ParametersResponse 
- Optional. A set of X.509 values that will be applied to all certificates issued through this CaPool. If a certificate request includes conflicting values for the same properties, they will be overwritten by the values defined here. If a certificate request uses a CertificateTemplate that defines conflicting predefined_values for the same properties, the certificate issuance request will fail.
- identityConstraints CertificateIdentity Constraints Response 
- Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity.
- maximumLifetime string
- Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it.
- passthroughExtensions CertificateExtension Constraints Response 
- Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values.
- allowed_issuance_ Issuancemodes Modes Response 
- Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowed_key_ Sequence[Allowedtypes Key Type Response] 
- Optional. If any AllowedKeyType is specified, then the certificate request's public key must match one of the key types listed here. Otherwise, any key may be used.
- baseline_values X509ParametersResponse 
- Optional. A set of X.509 values that will be applied to all certificates issued through this CaPool. If a certificate request includes conflicting values for the same properties, they will be overwritten by the values defined here. If a certificate request uses a CertificateTemplate that defines conflicting predefined_values for the same properties, the certificate issuance request will fail.
- identity_constraints CertificateIdentity Constraints Response 
- Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity.
- maximum_lifetime str
- Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it.
- passthrough_extensions CertificateExtension Constraints Response 
- Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values.
- allowedIssuance Property MapModes 
- Optional. If specified, then only methods allowed in the IssuanceModes may be used to issue Certificates.
- allowedKey List<Property Map>Types 
- Optional. If any AllowedKeyType is specified, then the certificate request's public key must match one of the key types listed here. Otherwise, any key may be used.
- baselineValues Property Map
- Optional. A set of X.509 values that will be applied to all certificates issued through this CaPool. If a certificate request includes conflicting values for the same properties, they will be overwritten by the values defined here. If a certificate request uses a CertificateTemplate that defines conflicting predefined_values for the same properties, the certificate issuance request will fail.
- identityConstraints Property Map
- Optional. Describes constraints on identities that may appear in Certificates issued through this CaPool. If this is omitted, then this CaPool will not add restrictions on a certificate's identity.
- maximumLifetime String
- Optional. The maximum lifetime allowed for issued Certificates. Note that if the issuing CertificateAuthority expires before a Certificate's requested maximum_lifetime, the effective lifetime will be explicitly truncated to match it.
- passthroughExtensions Property Map
- Optional. Describes the set of X.509 extensions that may appear in a Certificate issued through this CaPool. If a certificate request sets extensions that don't appear in the passthrough_extensions, those extensions will be dropped. If a certificate request uses a CertificateTemplate with predefined_values that don't appear here, the certificate issuance request will fail. If this is omitted, then this CaPool will not add restrictions on a certificate's X.509 extensions. These constraints do not apply to X.509 extensions set in this CaPool's baseline_values.
KeyUsage, KeyUsageArgs    
- BaseKey Pulumi.Usage Google Native. Privateca. V1. Inputs. Key Usage Options 
- Describes high-level ways in which a key may be used.
- ExtendedKey Pulumi.Usage Google Native. Privateca. V1. Inputs. Extended Key Usage Options 
- Detailed scenarios in which a key may be used.
- UnknownExtended List<Pulumi.Key Usages Google Native. Privateca. V1. Inputs. Object Id> 
- Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- BaseKey KeyUsage Usage Options 
- Describes high-level ways in which a key may be used.
- ExtendedKey ExtendedUsage Key Usage Options 
- Detailed scenarios in which a key may be used.
- UnknownExtended []ObjectKey Usages Id 
- Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- baseKey KeyUsage Usage Options 
- Describes high-level ways in which a key may be used.
- extendedKey ExtendedUsage Key Usage Options 
- Detailed scenarios in which a key may be used.
- unknownExtended List<ObjectKey Usages Id> 
- Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- baseKey KeyUsage Usage Options 
- Describes high-level ways in which a key may be used.
- extendedKey ExtendedUsage Key Usage Options 
- Detailed scenarios in which a key may be used.
- unknownExtended ObjectKey Usages Id[] 
- Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- base_key_ Keyusage Usage Options 
- Describes high-level ways in which a key may be used.
- extended_key_ Extendedusage Key Usage Options 
- Detailed scenarios in which a key may be used.
- unknown_extended_ Sequence[Objectkey_ usages Id] 
- Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- baseKey Property MapUsage 
- Describes high-level ways in which a key may be used.
- extendedKey Property MapUsage 
- Detailed scenarios in which a key may be used.
- unknownExtended List<Property Map>Key Usages 
- Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
KeyUsageOptions, KeyUsageOptionsArgs      
- CertSign bool
- The key may be used to sign certificates.
- ContentCommitment bool
- The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- CrlSign bool
- The key may be used sign certificate revocation lists.
- DataEncipherment bool
- The key may be used to encipher data.
- DecipherOnly bool
- The key may be used to decipher only.
- DigitalSignature bool
- The key may be used for digital signatures.
- EncipherOnly bool
- The key may be used to encipher only.
- KeyAgreement bool
- The key may be used in a key agreement protocol.
- KeyEncipherment bool
- The key may be used to encipher other keys.
- CertSign bool
- The key may be used to sign certificates.
- ContentCommitment bool
- The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- CrlSign bool
- The key may be used sign certificate revocation lists.
- DataEncipherment bool
- The key may be used to encipher data.
- DecipherOnly bool
- The key may be used to decipher only.
- DigitalSignature bool
- The key may be used for digital signatures.
- EncipherOnly bool
- The key may be used to encipher only.
- KeyAgreement bool
- The key may be used in a key agreement protocol.
- KeyEncipherment bool
- The key may be used to encipher other keys.
- certSign Boolean
- The key may be used to sign certificates.
- contentCommitment Boolean
- The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crlSign Boolean
- The key may be used sign certificate revocation lists.
- dataEncipherment Boolean
- The key may be used to encipher data.
- decipherOnly Boolean
- The key may be used to decipher only.
- digitalSignature Boolean
- The key may be used for digital signatures.
- encipherOnly Boolean
- The key may be used to encipher only.
- keyAgreement Boolean
- The key may be used in a key agreement protocol.
- keyEncipherment Boolean
- The key may be used to encipher other keys.
- certSign boolean
- The key may be used to sign certificates.
- contentCommitment boolean
- The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crlSign boolean
- The key may be used sign certificate revocation lists.
- dataEncipherment boolean
- The key may be used to encipher data.
- decipherOnly boolean
- The key may be used to decipher only.
- digitalSignature boolean
- The key may be used for digital signatures.
- encipherOnly boolean
- The key may be used to encipher only.
- keyAgreement boolean
- The key may be used in a key agreement protocol.
- keyEncipherment boolean
- The key may be used to encipher other keys.
- cert_sign bool
- The key may be used to sign certificates.
- content_commitment bool
- The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crl_sign bool
- The key may be used sign certificate revocation lists.
- data_encipherment bool
- The key may be used to encipher data.
- decipher_only bool
- The key may be used to decipher only.
- digital_signature bool
- The key may be used for digital signatures.
- encipher_only bool
- The key may be used to encipher only.
- key_agreement bool
- The key may be used in a key agreement protocol.
- key_encipherment bool
- The key may be used to encipher other keys.
- certSign Boolean
- The key may be used to sign certificates.
- contentCommitment Boolean
- The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crlSign Boolean
- The key may be used sign certificate revocation lists.
- dataEncipherment Boolean
- The key may be used to encipher data.
- decipherOnly Boolean
- The key may be used to decipher only.
- digitalSignature Boolean
- The key may be used for digital signatures.
- encipherOnly Boolean
- The key may be used to encipher only.
- keyAgreement Boolean
- The key may be used in a key agreement protocol.
- keyEncipherment Boolean
- The key may be used to encipher other keys.
KeyUsageOptionsResponse, KeyUsageOptionsResponseArgs        
- CertSign bool
- The key may be used to sign certificates.
- ContentCommitment bool
- The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- CrlSign bool
- The key may be used sign certificate revocation lists.
- DataEncipherment bool
- The key may be used to encipher data.
- DecipherOnly bool
- The key may be used to decipher only.
- DigitalSignature bool
- The key may be used for digital signatures.
- EncipherOnly bool
- The key may be used to encipher only.
- KeyAgreement bool
- The key may be used in a key agreement protocol.
- KeyEncipherment bool
- The key may be used to encipher other keys.
- CertSign bool
- The key may be used to sign certificates.
- ContentCommitment bool
- The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- CrlSign bool
- The key may be used sign certificate revocation lists.
- DataEncipherment bool
- The key may be used to encipher data.
- DecipherOnly bool
- The key may be used to decipher only.
- DigitalSignature bool
- The key may be used for digital signatures.
- EncipherOnly bool
- The key may be used to encipher only.
- KeyAgreement bool
- The key may be used in a key agreement protocol.
- KeyEncipherment bool
- The key may be used to encipher other keys.
- certSign Boolean
- The key may be used to sign certificates.
- contentCommitment Boolean
- The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crlSign Boolean
- The key may be used sign certificate revocation lists.
- dataEncipherment Boolean
- The key may be used to encipher data.
- decipherOnly Boolean
- The key may be used to decipher only.
- digitalSignature Boolean
- The key may be used for digital signatures.
- encipherOnly Boolean
- The key may be used to encipher only.
- keyAgreement Boolean
- The key may be used in a key agreement protocol.
- keyEncipherment Boolean
- The key may be used to encipher other keys.
- certSign boolean
- The key may be used to sign certificates.
- contentCommitment boolean
- The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crlSign boolean
- The key may be used sign certificate revocation lists.
- dataEncipherment boolean
- The key may be used to encipher data.
- decipherOnly boolean
- The key may be used to decipher only.
- digitalSignature boolean
- The key may be used for digital signatures.
- encipherOnly boolean
- The key may be used to encipher only.
- keyAgreement boolean
- The key may be used in a key agreement protocol.
- keyEncipherment boolean
- The key may be used to encipher other keys.
- cert_sign bool
- The key may be used to sign certificates.
- content_commitment bool
- The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crl_sign bool
- The key may be used sign certificate revocation lists.
- data_encipherment bool
- The key may be used to encipher data.
- decipher_only bool
- The key may be used to decipher only.
- digital_signature bool
- The key may be used for digital signatures.
- encipher_only bool
- The key may be used to encipher only.
- key_agreement bool
- The key may be used in a key agreement protocol.
- key_encipherment bool
- The key may be used to encipher other keys.
- certSign Boolean
- The key may be used to sign certificates.
- contentCommitment Boolean
- The key may be used for cryptographic commitments. Note that this may also be referred to as "non-repudiation".
- crlSign Boolean
- The key may be used sign certificate revocation lists.
- dataEncipherment Boolean
- The key may be used to encipher data.
- decipherOnly Boolean
- The key may be used to decipher only.
- digitalSignature Boolean
- The key may be used for digital signatures.
- encipherOnly Boolean
- The key may be used to encipher only.
- keyAgreement Boolean
- The key may be used in a key agreement protocol.
- keyEncipherment Boolean
- The key may be used to encipher other keys.
KeyUsageResponse, KeyUsageResponseArgs      
- BaseKey Pulumi.Usage Google Native. Privateca. V1. Inputs. Key Usage Options Response 
- Describes high-level ways in which a key may be used.
- ExtendedKey Pulumi.Usage Google Native. Privateca. V1. Inputs. Extended Key Usage Options Response 
- Detailed scenarios in which a key may be used.
- UnknownExtended List<Pulumi.Key Usages Google Native. Privateca. V1. Inputs. Object Id Response> 
- Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- BaseKey KeyUsage Usage Options Response 
- Describes high-level ways in which a key may be used.
- ExtendedKey ExtendedUsage Key Usage Options Response 
- Detailed scenarios in which a key may be used.
- UnknownExtended []ObjectKey Usages Id Response 
- Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- baseKey KeyUsage Usage Options Response 
- Describes high-level ways in which a key may be used.
- extendedKey ExtendedUsage Key Usage Options Response 
- Detailed scenarios in which a key may be used.
- unknownExtended List<ObjectKey Usages Id Response> 
- Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- baseKey KeyUsage Usage Options Response 
- Describes high-level ways in which a key may be used.
- extendedKey ExtendedUsage Key Usage Options Response 
- Detailed scenarios in which a key may be used.
- unknownExtended ObjectKey Usages Id Response[] 
- Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- base_key_ Keyusage Usage Options Response 
- Describes high-level ways in which a key may be used.
- extended_key_ Extendedusage Key Usage Options Response 
- Detailed scenarios in which a key may be used.
- unknown_extended_ Sequence[Objectkey_ usages Id Response] 
- Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
- baseKey Property MapUsage 
- Describes high-level ways in which a key may be used.
- extendedKey Property MapUsage 
- Detailed scenarios in which a key may be used.
- unknownExtended List<Property Map>Key Usages 
- Used to describe extended key usages that are not listed in the KeyUsage.ExtendedKeyUsageOptions message.
NameConstraints, NameConstraintsArgs    
- Critical bool
- Indicates whether or not the name constraints are marked critical.
- ExcludedDns List<string>Names 
- Contains excluded DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- ExcludedEmail List<string>Addresses 
- Contains the excluded email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- ExcludedIp List<string>Ranges 
- Contains the excluded IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- ExcludedUris List<string>
- Contains the excluded URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- PermittedDns List<string>Names 
- Contains permitted DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- PermittedEmail List<string>Addresses 
- Contains the permitted email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- PermittedIp List<string>Ranges 
- Contains the permitted IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- PermittedUris List<string>
- Contains the permitted URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- Critical bool
- Indicates whether or not the name constraints are marked critical.
- ExcludedDns []stringNames 
- Contains excluded DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- ExcludedEmail []stringAddresses 
- Contains the excluded email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- ExcludedIp []stringRanges 
- Contains the excluded IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- ExcludedUris []string
- Contains the excluded URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- PermittedDns []stringNames 
- Contains permitted DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- PermittedEmail []stringAddresses 
- Contains the permitted email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- PermittedIp []stringRanges 
- Contains the permitted IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- PermittedUris []string
- Contains the permitted URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- critical Boolean
- Indicates whether or not the name constraints are marked critical.
- excludedDns List<String>Names 
- Contains excluded DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- excludedEmail List<String>Addresses 
- Contains the excluded email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- excludedIp List<String>Ranges 
- Contains the excluded IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- excludedUris List<String>
- Contains the excluded URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- permittedDns List<String>Names 
- Contains permitted DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- permittedEmail List<String>Addresses 
- Contains the permitted email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- permittedIp List<String>Ranges 
- Contains the permitted IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- permittedUris List<String>
- Contains the permitted URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- critical boolean
- Indicates whether or not the name constraints are marked critical.
- excludedDns string[]Names 
- Contains excluded DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- excludedEmail string[]Addresses 
- Contains the excluded email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- excludedIp string[]Ranges 
- Contains the excluded IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- excludedUris string[]
- Contains the excluded URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- permittedDns string[]Names 
- Contains permitted DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- permittedEmail string[]Addresses 
- Contains the permitted email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- permittedIp string[]Ranges 
- Contains the permitted IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- permittedUris string[]
- Contains the permitted URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- critical bool
- Indicates whether or not the name constraints are marked critical.
- excluded_dns_ Sequence[str]names 
- Contains excluded DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- excluded_email_ Sequence[str]addresses 
- Contains the excluded email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- excluded_ip_ Sequence[str]ranges 
- Contains the excluded IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- excluded_uris Sequence[str]
- Contains the excluded URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- permitted_dns_ Sequence[str]names 
- Contains permitted DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- permitted_email_ Sequence[str]addresses 
- Contains the permitted email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- permitted_ip_ Sequence[str]ranges 
- Contains the permitted IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- permitted_uris Sequence[str]
- Contains the permitted URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- critical Boolean
- Indicates whether or not the name constraints are marked critical.
- excludedDns List<String>Names 
- Contains excluded DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- excludedEmail List<String>Addresses 
- Contains the excluded email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- excludedIp List<String>Ranges 
- Contains the excluded IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- excludedUris List<String>
- Contains the excluded URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- permittedDns List<String>Names 
- Contains permitted DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- permittedEmail List<String>Addresses 
- Contains the permitted email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- permittedIp List<String>Ranges 
- Contains the permitted IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- permittedUris List<String>
- Contains the permitted URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
NameConstraintsResponse, NameConstraintsResponseArgs      
- Critical bool
- Indicates whether or not the name constraints are marked critical.
- ExcludedDns List<string>Names 
- Contains excluded DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- ExcludedEmail List<string>Addresses 
- Contains the excluded email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- ExcludedIp List<string>Ranges 
- Contains the excluded IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- ExcludedUris List<string>
- Contains the excluded URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- PermittedDns List<string>Names 
- Contains permitted DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- PermittedEmail List<string>Addresses 
- Contains the permitted email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- PermittedIp List<string>Ranges 
- Contains the permitted IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- PermittedUris List<string>
- Contains the permitted URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- Critical bool
- Indicates whether or not the name constraints are marked critical.
- ExcludedDns []stringNames 
- Contains excluded DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- ExcludedEmail []stringAddresses 
- Contains the excluded email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- ExcludedIp []stringRanges 
- Contains the excluded IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- ExcludedUris []string
- Contains the excluded URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- PermittedDns []stringNames 
- Contains permitted DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- PermittedEmail []stringAddresses 
- Contains the permitted email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- PermittedIp []stringRanges 
- Contains the permitted IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- PermittedUris []string
- Contains the permitted URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- critical Boolean
- Indicates whether or not the name constraints are marked critical.
- excludedDns List<String>Names 
- Contains excluded DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- excludedEmail List<String>Addresses 
- Contains the excluded email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- excludedIp List<String>Ranges 
- Contains the excluded IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- excludedUris List<String>
- Contains the excluded URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- permittedDns List<String>Names 
- Contains permitted DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- permittedEmail List<String>Addresses 
- Contains the permitted email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- permittedIp List<String>Ranges 
- Contains the permitted IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- permittedUris List<String>
- Contains the permitted URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- critical boolean
- Indicates whether or not the name constraints are marked critical.
- excludedDns string[]Names 
- Contains excluded DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- excludedEmail string[]Addresses 
- Contains the excluded email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- excludedIp string[]Ranges 
- Contains the excluded IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- excludedUris string[]
- Contains the excluded URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- permittedDns string[]Names 
- Contains permitted DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- permittedEmail string[]Addresses 
- Contains the permitted email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- permittedIp string[]Ranges 
- Contains the permitted IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- permittedUris string[]
- Contains the permitted URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- critical bool
- Indicates whether or not the name constraints are marked critical.
- excluded_dns_ Sequence[str]names 
- Contains excluded DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- excluded_email_ Sequence[str]addresses 
- Contains the excluded email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- excluded_ip_ Sequence[str]ranges 
- Contains the excluded IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- excluded_uris Sequence[str]
- Contains the excluded URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- permitted_dns_ Sequence[str]names 
- Contains permitted DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- permitted_email_ Sequence[str]addresses 
- Contains the permitted email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- permitted_ip_ Sequence[str]ranges 
- Contains the permitted IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- permitted_uris Sequence[str]
- Contains the permitted URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- critical Boolean
- Indicates whether or not the name constraints are marked critical.
- excludedDns List<String>Names 
- Contains excluded DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- excludedEmail List<String>Addresses 
- Contains the excluded email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- excludedIp List<String>Ranges 
- Contains the excluded IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- excludedUris List<String>
- Contains the excluded URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
- permittedDns List<String>Names 
- Contains permitted DNS names. Any DNS name that can be constructed by simply adding zero or more labels to the left-hand side of the name satisfies the name constraint. For example, example.com,www.example.com,www.sub.example.comwould satisfyexample.comwhileexample1.comdoes not.
- permittedEmail List<String>Addresses 
- Contains the permitted email addresses. The value can be a particular email address, a hostname to indicate all email addresses on that host or a domain with a leading period (e.g. .example.com) to indicate all email addresses in that domain.
- permittedIp List<String>Ranges 
- Contains the permitted IP ranges. For IPv4 addresses, the ranges are expressed using CIDR notation as specified in RFC 4632. For IPv6 addresses, the ranges are expressed in similar encoding as IPv4 addresses.
- permittedUris List<String>
- Contains the permitted URIs that apply to the host part of the name. The value can be a hostname or a domain with a leading period (like .example.com)
ObjectId, ObjectIdArgs    
- ObjectId List<int>Path 
- The parts of an OID path. The most significant parts of the path come first.
- ObjectId []intPath 
- The parts of an OID path. The most significant parts of the path come first.
- objectId List<Integer>Path 
- The parts of an OID path. The most significant parts of the path come first.
- objectId number[]Path 
- The parts of an OID path. The most significant parts of the path come first.
- object_id_ Sequence[int]path 
- The parts of an OID path. The most significant parts of the path come first.
- objectId List<Number>Path 
- The parts of an OID path. The most significant parts of the path come first.
ObjectIdResponse, ObjectIdResponseArgs      
- ObjectId List<int>Path 
- The parts of an OID path. The most significant parts of the path come first.
- ObjectId []intPath 
- The parts of an OID path. The most significant parts of the path come first.
- objectId List<Integer>Path 
- The parts of an OID path. The most significant parts of the path come first.
- objectId number[]Path 
- The parts of an OID path. The most significant parts of the path come first.
- object_id_ Sequence[int]path 
- The parts of an OID path. The most significant parts of the path come first.
- objectId List<Number>Path 
- The parts of an OID path. The most significant parts of the path come first.
PublishingOptions, PublishingOptionsArgs    
- EncodingFormat Pulumi.Google Native. Privateca. V1. Publishing Options Encoding Format 
- Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM.
- PublishCa boolCert 
- Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates.
- PublishCrl bool
- Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- EncodingFormat PublishingOptions Encoding Format 
- Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM.
- PublishCa boolCert 
- Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates.
- PublishCrl bool
- Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- encodingFormat PublishingOptions Encoding Format 
- Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM.
- publishCa BooleanCert 
- Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates.
- publishCrl Boolean
- Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- encodingFormat PublishingOptions Encoding Format 
- Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM.
- publishCa booleanCert 
- Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates.
- publishCrl boolean
- Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- encoding_format PublishingOptions Encoding Format 
- Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM.
- publish_ca_ boolcert 
- Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates.
- publish_crl bool
- Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- encodingFormat "ENCODING_FORMAT_UNSPECIFIED" | "PEM" | "DER"
- Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM.
- publishCa BooleanCert 
- Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates.
- publishCrl Boolean
- Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
PublishingOptionsEncodingFormat, PublishingOptionsEncodingFormatArgs        
- EncodingFormat Unspecified 
- ENCODING_FORMAT_UNSPECIFIEDNot specified. By default, PEM format will be used.
- Pem
- PEMThe CertificateAuthority's CA certificate and CRLs will be published in PEM format.
- Der
- DERThe CertificateAuthority's CA certificate and CRLs will be published in DER format.
- PublishingOptions Encoding Format Encoding Format Unspecified 
- ENCODING_FORMAT_UNSPECIFIEDNot specified. By default, PEM format will be used.
- PublishingOptions Encoding Format Pem 
- PEMThe CertificateAuthority's CA certificate and CRLs will be published in PEM format.
- PublishingOptions Encoding Format Der 
- DERThe CertificateAuthority's CA certificate and CRLs will be published in DER format.
- EncodingFormat Unspecified 
- ENCODING_FORMAT_UNSPECIFIEDNot specified. By default, PEM format will be used.
- Pem
- PEMThe CertificateAuthority's CA certificate and CRLs will be published in PEM format.
- Der
- DERThe CertificateAuthority's CA certificate and CRLs will be published in DER format.
- EncodingFormat Unspecified 
- ENCODING_FORMAT_UNSPECIFIEDNot specified. By default, PEM format will be used.
- Pem
- PEMThe CertificateAuthority's CA certificate and CRLs will be published in PEM format.
- Der
- DERThe CertificateAuthority's CA certificate and CRLs will be published in DER format.
- ENCODING_FORMAT_UNSPECIFIED
- ENCODING_FORMAT_UNSPECIFIEDNot specified. By default, PEM format will be used.
- PEM
- PEMThe CertificateAuthority's CA certificate and CRLs will be published in PEM format.
- DER
- DERThe CertificateAuthority's CA certificate and CRLs will be published in DER format.
- "ENCODING_FORMAT_UNSPECIFIED"
- ENCODING_FORMAT_UNSPECIFIEDNot specified. By default, PEM format will be used.
- "PEM"
- PEMThe CertificateAuthority's CA certificate and CRLs will be published in PEM format.
- "DER"
- DERThe CertificateAuthority's CA certificate and CRLs will be published in DER format.
PublishingOptionsResponse, PublishingOptionsResponseArgs      
- EncodingFormat string
- Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM.
- PublishCa boolCert 
- Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates.
- PublishCrl bool
- Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- EncodingFormat string
- Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM.
- PublishCa boolCert 
- Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates.
- PublishCrl bool
- Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- encodingFormat String
- Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM.
- publishCa BooleanCert 
- Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates.
- publishCrl Boolean
- Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- encodingFormat string
- Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM.
- publishCa booleanCert 
- Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates.
- publishCrl boolean
- Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- encoding_format str
- Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM.
- publish_ca_ boolcert 
- Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates.
- publish_crl bool
- Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
- encodingFormat String
- Optional. Specifies the encoding format of each CertificateAuthority's CA certificate and CRLs. If this is omitted, CA certificates and CRLs will be published in PEM.
- publishCa BooleanCert 
- Optional. When true, publishes each CertificateAuthority's CA certificate and includes its URL in the "Authority Information Access" X.509 extension in all issued Certificates. If this is false, the CA certificate will not be published and the corresponding X.509 extension will not be written in issued certificates.
- publishCrl Boolean
- Optional. When true, publishes each CertificateAuthority's CRL and includes its URL in the "CRL Distribution Points" X.509 extension in all issued Certificates. If this is false, CRLs will not be published and the corresponding X.509 extension will not be written in issued certificates. CRLs will expire 7 days from their creation. However, we will rebuild daily. CRLs are also rebuilt shortly after a certificate is revoked.
RsaKeyType, RsaKeyTypeArgs      
- MaxModulus stringSize 
- Optional. The maximum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service will not enforce an explicit upper bound on RSA modulus sizes.
- MinModulus stringSize 
- Optional. The minimum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service-level min RSA modulus size will continue to apply.
- MaxModulus stringSize 
- Optional. The maximum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service will not enforce an explicit upper bound on RSA modulus sizes.
- MinModulus stringSize 
- Optional. The minimum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service-level min RSA modulus size will continue to apply.
- maxModulus StringSize 
- Optional. The maximum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service will not enforce an explicit upper bound on RSA modulus sizes.
- minModulus StringSize 
- Optional. The minimum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service-level min RSA modulus size will continue to apply.
- maxModulus stringSize 
- Optional. The maximum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service will not enforce an explicit upper bound on RSA modulus sizes.
- minModulus stringSize 
- Optional. The minimum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service-level min RSA modulus size will continue to apply.
- max_modulus_ strsize 
- Optional. The maximum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service will not enforce an explicit upper bound on RSA modulus sizes.
- min_modulus_ strsize 
- Optional. The minimum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service-level min RSA modulus size will continue to apply.
- maxModulus StringSize 
- Optional. The maximum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service will not enforce an explicit upper bound on RSA modulus sizes.
- minModulus StringSize 
- Optional. The minimum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service-level min RSA modulus size will continue to apply.
RsaKeyTypeResponse, RsaKeyTypeResponseArgs        
- MaxModulus stringSize 
- Optional. The maximum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service will not enforce an explicit upper bound on RSA modulus sizes.
- MinModulus stringSize 
- Optional. The minimum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service-level min RSA modulus size will continue to apply.
- MaxModulus stringSize 
- Optional. The maximum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service will not enforce an explicit upper bound on RSA modulus sizes.
- MinModulus stringSize 
- Optional. The minimum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service-level min RSA modulus size will continue to apply.
- maxModulus StringSize 
- Optional. The maximum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service will not enforce an explicit upper bound on RSA modulus sizes.
- minModulus StringSize 
- Optional. The minimum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service-level min RSA modulus size will continue to apply.
- maxModulus stringSize 
- Optional. The maximum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service will not enforce an explicit upper bound on RSA modulus sizes.
- minModulus stringSize 
- Optional. The minimum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service-level min RSA modulus size will continue to apply.
- max_modulus_ strsize 
- Optional. The maximum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service will not enforce an explicit upper bound on RSA modulus sizes.
- min_modulus_ strsize 
- Optional. The minimum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service-level min RSA modulus size will continue to apply.
- maxModulus StringSize 
- Optional. The maximum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service will not enforce an explicit upper bound on RSA modulus sizes.
- minModulus StringSize 
- Optional. The minimum allowed RSA modulus size (inclusive), in bits. If this is not set, or if set to zero, the service-level min RSA modulus size will continue to apply.
X509Extension, X509ExtensionArgs  
- ObjectId Pulumi.Google Native. Privateca. V1. Inputs. Object Id 
- The OID for this X.509 extension.
- Value string
- The value of this X.509 extension.
- Critical bool
- Optional. Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- objectId Property Map
- The OID for this X.509 extension.
- value String
- The value of this X.509 extension.
- critical Boolean
- Optional. Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
X509ExtensionResponse, X509ExtensionResponseArgs    
- Critical bool
- Optional. Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- ObjectId Pulumi.Google Native. Privateca. V1. Inputs. Object Id Response 
- The OID for this X.509 extension.
- Value string
- The value of this X.509 extension.
- Critical bool
- Optional. Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- ObjectId ObjectId Response 
- The OID for this X.509 extension.
- Value string
- The value of this X.509 extension.
- critical Boolean
- Optional. Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- objectId ObjectId Response 
- The OID for this X.509 extension.
- value String
- The value of this X.509 extension.
- critical boolean
- Optional. Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- objectId ObjectId Response 
- The OID for this X.509 extension.
- value string
- The value of this X.509 extension.
- critical bool
- Optional. Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- object_id ObjectId Response 
- The OID for this X.509 extension.
- value str
- The value of this X.509 extension.
- critical Boolean
- Optional. Indicates whether or not this extension is critical (i.e., if the client does not know how to handle this extension, the client should consider this to be an error).
- objectId Property Map
- The OID for this X.509 extension.
- value String
- The value of this X.509 extension.
X509Parameters, X509ParametersArgs  
- AdditionalExtensions List<Pulumi.Google Native. Privateca. V1. Inputs. X509Extension> 
- Optional. Describes custom X.509 extensions.
- AiaOcsp List<string>Servers 
- Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- CaOptions Pulumi.Google Native. Privateca. V1. Inputs. Ca Options 
- Optional. Describes options in this X509Parameters that are relevant in a CA certificate.
- KeyUsage Pulumi.Google Native. Privateca. V1. Inputs. Key Usage 
- Optional. Indicates the intended use for keys that correspond to a certificate.
- NameConstraints Pulumi.Google Native. Privateca. V1. Inputs. Name Constraints 
- Optional. Describes the X.509 name constraints extension.
- PolicyIds List<Pulumi.Google Native. Privateca. V1. Inputs. Object Id> 
- Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- AdditionalExtensions []X509Extension
- Optional. Describes custom X.509 extensions.
- AiaOcsp []stringServers 
- Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- CaOptions CaOptions 
- Optional. Describes options in this X509Parameters that are relevant in a CA certificate.
- KeyUsage KeyUsage 
- Optional. Indicates the intended use for keys that correspond to a certificate.
- NameConstraints NameConstraints 
- Optional. Describes the X.509 name constraints extension.
- PolicyIds []ObjectId 
- Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additionalExtensions List<X509Extension>
- Optional. Describes custom X.509 extensions.
- aiaOcsp List<String>Servers 
- Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- caOptions CaOptions 
- Optional. Describes options in this X509Parameters that are relevant in a CA certificate.
- keyUsage KeyUsage 
- Optional. Indicates the intended use for keys that correspond to a certificate.
- nameConstraints NameConstraints 
- Optional. Describes the X.509 name constraints extension.
- policyIds List<ObjectId> 
- Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additionalExtensions X509Extension[]
- Optional. Describes custom X.509 extensions.
- aiaOcsp string[]Servers 
- Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- caOptions CaOptions 
- Optional. Describes options in this X509Parameters that are relevant in a CA certificate.
- keyUsage KeyUsage 
- Optional. Indicates the intended use for keys that correspond to a certificate.
- nameConstraints NameConstraints 
- Optional. Describes the X.509 name constraints extension.
- policyIds ObjectId[] 
- Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additional_extensions Sequence[X509Extension]
- Optional. Describes custom X.509 extensions.
- aia_ocsp_ Sequence[str]servers 
- Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- ca_options CaOptions 
- Optional. Describes options in this X509Parameters that are relevant in a CA certificate.
- key_usage KeyUsage 
- Optional. Indicates the intended use for keys that correspond to a certificate.
- name_constraints NameConstraints 
- Optional. Describes the X.509 name constraints extension.
- policy_ids Sequence[ObjectId] 
- Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additionalExtensions List<Property Map>
- Optional. Describes custom X.509 extensions.
- aiaOcsp List<String>Servers 
- Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- caOptions Property Map
- Optional. Describes options in this X509Parameters that are relevant in a CA certificate.
- keyUsage Property Map
- Optional. Indicates the intended use for keys that correspond to a certificate.
- nameConstraints Property Map
- Optional. Describes the X.509 name constraints extension.
- policyIds List<Property Map>
- Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
X509ParametersResponse, X509ParametersResponseArgs    
- AdditionalExtensions List<Pulumi.Google Native. Privateca. V1. Inputs. X509Extension Response> 
- Optional. Describes custom X.509 extensions.
- AiaOcsp List<string>Servers 
- Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- CaOptions Pulumi.Google Native. Privateca. V1. Inputs. Ca Options Response 
- Optional. Describes options in this X509Parameters that are relevant in a CA certificate.
- KeyUsage Pulumi.Google Native. Privateca. V1. Inputs. Key Usage Response 
- Optional. Indicates the intended use for keys that correspond to a certificate.
- NameConstraints Pulumi.Google Native. Privateca. V1. Inputs. Name Constraints Response 
- Optional. Describes the X.509 name constraints extension.
- PolicyIds List<Pulumi.Google Native. Privateca. V1. Inputs. Object Id Response> 
- Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- AdditionalExtensions []X509ExtensionResponse 
- Optional. Describes custom X.509 extensions.
- AiaOcsp []stringServers 
- Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- CaOptions CaOptions Response 
- Optional. Describes options in this X509Parameters that are relevant in a CA certificate.
- KeyUsage KeyUsage Response 
- Optional. Indicates the intended use for keys that correspond to a certificate.
- NameConstraints NameConstraints Response 
- Optional. Describes the X.509 name constraints extension.
- PolicyIds []ObjectId Response 
- Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additionalExtensions List<X509ExtensionResponse> 
- Optional. Describes custom X.509 extensions.
- aiaOcsp List<String>Servers 
- Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- caOptions CaOptions Response 
- Optional. Describes options in this X509Parameters that are relevant in a CA certificate.
- keyUsage KeyUsage Response 
- Optional. Indicates the intended use for keys that correspond to a certificate.
- nameConstraints NameConstraints Response 
- Optional. Describes the X.509 name constraints extension.
- policyIds List<ObjectId Response> 
- Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additionalExtensions X509ExtensionResponse[] 
- Optional. Describes custom X.509 extensions.
- aiaOcsp string[]Servers 
- Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- caOptions CaOptions Response 
- Optional. Describes options in this X509Parameters that are relevant in a CA certificate.
- keyUsage KeyUsage Response 
- Optional. Indicates the intended use for keys that correspond to a certificate.
- nameConstraints NameConstraints Response 
- Optional. Describes the X.509 name constraints extension.
- policyIds ObjectId Response[] 
- Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additional_extensions Sequence[X509ExtensionResponse] 
- Optional. Describes custom X.509 extensions.
- aia_ocsp_ Sequence[str]servers 
- Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- ca_options CaOptions Response 
- Optional. Describes options in this X509Parameters that are relevant in a CA certificate.
- key_usage KeyUsage Response 
- Optional. Indicates the intended use for keys that correspond to a certificate.
- name_constraints NameConstraints Response 
- Optional. Describes the X.509 name constraints extension.
- policy_ids Sequence[ObjectId Response] 
- Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
- additionalExtensions List<Property Map>
- Optional. Describes custom X.509 extensions.
- aiaOcsp List<String>Servers 
- Optional. Describes Online Certificate Status Protocol (OCSP) endpoint addresses that appear in the "Authority Information Access" extension in the certificate.
- caOptions Property Map
- Optional. Describes options in this X509Parameters that are relevant in a CA certificate.
- keyUsage Property Map
- Optional. Indicates the intended use for keys that correspond to a certificate.
- nameConstraints Property Map
- Optional. Describes the X.509 name constraints extension.
- policyIds List<Property Map>
- Optional. Describes the X.509 certificate policy object identifiers, per https://tools.ietf.org/html/rfc5280#section-4.2.1.4.
Package Details
- Repository
- Google Cloud Native pulumi/pulumi-google-native
- License
- Apache-2.0
Google Cloud Native is in preview. Google Cloud Classic is fully supported.