Modules

Structs

Account approval policy.

Request to perform key agreement.

App credential response.

Authentication requirements for approval request reviewers.

Approval policy.

Quorum approval policy.

Account authentication settings.

LDAP authentication settings.

OAuth single sign-on authentication settings.

Password authentication settings.

Signed JWT authentication settings.

Arbitrary binary data that is serialized/deserialized to/from base 64 string.

Request to start configuring U2F.

Finalize a multi-part decryption.

Final result of a multi-part decryption.

Initialize multi-part decryption. AEAD ciphers are not currently supported in this mode.

Result of initializing multi-part decryption.

A request to decrypt data using a symmetric or asymmetric key.

Result of a decryption.

Multi-part decryption request.

Result of multi-part decryption.

Request to derive a key.

Request to compute the hash of arbitrary data.

Result of a hash operation.

Finalize a multi-part encryption.

Final result of a multi-part encryption.

Initialize multi-part encryption. AEAD ciphers are not currently supported in this mode.

Result of initializing multi-part encryption.

A request to encrypt data using a symmetric or asymmetric key.

Result of an encryption.

Multi-part encryption request.

Result of multi-part encryption.

Initiate password reset sequence.

FPE-specific options.

A Google service account key object. See https://cloud.google.com/video-intelligence/docs/common/auth.

Linked security objects.

LDAP authorization settings.

Credentials used by the service to authenticate itself to an LDAP server.

Request for HMAC or CMAC operation.

Result of HMAC or CMAC operation.

A challenge used for multi-factor authentication.

Counts of objects of various types in an account.

Request to compute digest of a key.

Digest of a key.

Request to change user’s password.

Request to perform a password reset.

Request to persist a transient key.

Accept/reject invitations to join account.

Request to authenticate using U2F recovery code.

U2F recovery codes.

Reviewer of an approval request.

Reason for revoking a key.

Constraints on RSA encryption parameters. In general, if a constraint is not specified, anything is allowed.

RSA-specific options.

Constraints on RSA signature parameters. In general, if a constraint is not specified, anything is allowed.

Request to select an account.

Response to select account request.

A request to sign data (or hash value) using an asymmetric key.

Result of sign operation.

Request to signup a new user.

Splunk logging configuration.

Stackdriver logging configuration.

A request to update subscription type.

Time stores the number of seconds since Unix epoch.

A trusted CA for app authentication.

Description of a U2F device to add for two factor authentication.

Request for second factor authentication with a U2f device.

Request to delete a U2F device.

A U2f device that may be used for second factor authentication.

Description of a registered U2F device.

Request to rename a U2F device.

Request to perform key unwrapping.

Rquest to verify a MAC value.

Request to verify a signature using an asymmetric key.

Result of verifying a signature or MAC.

Information about the service version.

Request to perform key wrapping.

Result of key wrapping operation.

Enums

Mechanism to use for key agreement.

A cryptographic algorithm.

Authentication method of an app.

App authentication mechanisms.

OAuth settings for an app. If enabled, an app can request to act on behalf of a user.

Approval request status.

Identifies an object acted upon by an approval request.

CA settings.

Predefined CA sets.

Cipher mode used for symmetric key algorithms.

CipherMode or RsaEncryptionPadding, depending on the encryption algorithm.

Encodes the mechanism to be used when deriving a new key from an existing key. Currently, the only supported mechanism is encrypting data to derive the new key. Other mechanisms may be added in the future.

A hash algorithm.

Identifies a standardized elliptic curve.

Type of an external role.

Signing keys used to validate signed JWT tokens.

Language of plugin code.

Distinguished Name (DN) resolution method. Given a user’s email address, a DN resolution method is used to find the user’s DN in an LDAP directory.

Specifies the Mask Generating Function (MGF) to use.

MGF policy.

Notification preferences.

OAuth scope.

The origin of a security object - where it was created / generated.

Type of security object.

Plugin code that will be executed inside SGX enclave.

Type of a plugin.

A security principal.

If enabled, the public key will be available publicly (without authentication) through the GetPublicKey API.

A Principal who can approve or deny an approval request.

Reasons to revoke a security object.

Type of padding to use for RSA encryption. The use of PKCS#1 v1.5 padding is strongly discouraged, because of its susceptibility to Bleichenbacher’s attack. The padding specified must adhere to the key’s encryption policy. If not specified, the default based on the key’s policy will be used.

RSA encryption padding policy.

Type of padding to use for RSA signatures. The padding specified must adhere to the key’s signature policy. If not specified, the default based on the key’s policy will be used.

RSA signature padding policy.

Server mode.

Signature mode.

Uniquely identifies a persisted or transient sobject.

Type of subscription.

Syslog facility.

TLS settings.

User’s role in a group.

Type Definitions