You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
<pclass="firstline">Deletes a ServiceAccountKey. Deleting a service account key does not revoke short-lived credentials that have been issued based on the service account key.</p>
<pclass="firstline">Disable a ServiceAccountKey. A disabled service account key can be enabled through EnableServiceAccountKey. The API is currently in preview phase.</p>
{ # Represents a service account key. A service account has two sets of key-pairs: user-managed, and system-managed. User-managed key-pairs can be created and deleted by users. Users are responsible for rotating these keys periodically to ensure security of their service accounts. Users retain the private key of these key-pairs, and Google retains ONLY the public key. System-managed keys are automatically rotated by Google, and are used for signing for a maximum of two weeks. The rotation process is probabilistic, and usage of the new key will gradually ramp up and down over the key's lifetime. If you cache the public key set for a service account, we recommend that you update the cache every 15 minutes. User-managed keys can be added and removed at any time, so it is important to update the cache frequently. For Google-managed keys, Google will publish a key at least 6 hours before it is first used for signing and will keep publishing it for at least 6 hours after it was last used for signing. Public keys for all service accounts are also published at the OAuth2 Service Account API.
130
+
"disabled": True or False, # The key status.
124
131
"keyAlgorithm": "A String", # Specifies the algorithm (and possibly key size) for the key.
125
132
"keyOrigin": "A String", # The key origin.
126
133
"keyType": "A String", # The key type.
<pre>Disable a ServiceAccountKey. A disabled service account key can be enabled through EnableServiceAccountKey. The API is currently in preview phase.
164
+
165
+
Args:
166
+
name: string, Required. The resource name of the service account key in the following format: `projects/{PROJECT_ID}/serviceAccounts/{ACCOUNT}/keys/{key}`. Using `-` as a wildcard for the `PROJECT_ID` will infer the project from the account. The `ACCOUNT` value can be the `email` address or the `unique_id` of the service account. (required)
167
+
body: object, The request body.
168
+
The object takes the form of:
169
+
170
+
{ # The service account key disable request.
171
+
}
172
+
173
+
x__xgafv: string, V1 error format.
174
+
Allowed values
175
+
1 - v1 error format
176
+
2 - v2 error format
177
+
178
+
Returns:
179
+
An object of the form:
180
+
181
+
{ # A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance: service Foo { rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty); } The JSON representation for `Empty` is empty JSON object `{}`.
<pre>Enable a ServiceAccountKey. The API is currently in preview phase.
188
+
189
+
Args:
190
+
name: string, Required. The resource name of the service account key in the following format: `projects/{PROJECT_ID}/serviceAccounts/{ACCOUNT}/keys/{key}`. Using `-` as a wildcard for the `PROJECT_ID` will infer the project from the account. The `ACCOUNT` value can be the `email` address or the `unique_id` of the service account. (required)
191
+
body: object, The request body.
192
+
The object takes the form of:
193
+
194
+
{ # The service account key enable request.
195
+
}
196
+
197
+
x__xgafv: string, V1 error format.
198
+
Allowed values
199
+
1 - v1 error format
200
+
2 - v2 error format
201
+
202
+
Returns:
203
+
An object of the form:
204
+
205
+
{ # A generic empty message that you can re-use to avoid defining duplicated empty messages in your APIs. A typical example is to use it as the request or the response type of an API method. For instance: service Foo { rpc Bar(google.protobuf.Empty) returns (google.protobuf.Empty); } The JSON representation for `Empty` is empty JSON object `{}`.
{ # Represents a service account key. A service account has two sets of key-pairs: user-managed, and system-managed. User-managed key-pairs can be created and deleted by users. Users are responsible for rotating these keys periodically to ensure security of their service accounts. Users retain the private key of these key-pairs, and Google retains ONLY the public key. System-managed keys are automatically rotated by Google, and are used for signing for a maximum of two weeks. The rotation process is probabilistic, and usage of the new key will gradually ramp up and down over the key's lifetime. If you cache the public key set for a service account, we recommend that you update the cache every 15 minutes. User-managed keys can be added and removed at any time, so it is important to update the cache frequently. For Google-managed keys, Google will publish a key at least 6 hours before it is first used for signing and will keep publishing it for at least 6 hours after it was last used for signing. Public keys for all service accounts are also published at the OAuth2 Service Account API.
229
+
"disabled": True or False, # The key status.
174
230
"keyAlgorithm": "A String", # Specifies the algorithm (and possibly key size) for the key.
175
231
"keyOrigin": "A String", # The key origin.
176
232
"keyType": "A String", # The key type.
@@ -205,6 +261,7 @@ <h3>Method Details</h3>
205
261
{ # The service account keys list response.
206
262
"keys": [ # The public keys for the service account.
207
263
{ # Represents a service account key. A service account has two sets of key-pairs: user-managed, and system-managed. User-managed key-pairs can be created and deleted by users. Users are responsible for rotating these keys periodically to ensure security of their service accounts. Users retain the private key of these key-pairs, and Google retains ONLY the public key. System-managed keys are automatically rotated by Google, and are used for signing for a maximum of two weeks. The rotation process is probabilistic, and usage of the new key will gradually ramp up and down over the key's lifetime. If you cache the public key set for a service account, we recommend that you update the cache every 15 minutes. User-managed keys can be added and removed at any time, so it is important to update the cache frequently. For Google-managed keys, Google will publish a key at least 6 hours before it is first used for signing and will keep publishing it for at least 6 hours after it was last used for signing. Public keys for all service accounts are also published at the OAuth2 Service Account API.
264
+
"disabled": True or False, # The key status.
208
265
"keyAlgorithm": "A String", # Specifies the algorithm (and possibly key size) for the key.
209
266
"keyOrigin": "A String", # The key origin.
210
267
"keyType": "A String", # The key type.
@@ -241,6 +298,7 @@ <h3>Method Details</h3>
241
298
An object of the form:
242
299
243
300
{ # Represents a service account key. A service account has two sets of key-pairs: user-managed, and system-managed. User-managed key-pairs can be created and deleted by users. Users are responsible for rotating these keys periodically to ensure security of their service accounts. Users retain the private key of these key-pairs, and Google retains ONLY the public key. System-managed keys are automatically rotated by Google, and are used for signing for a maximum of two weeks. The rotation process is probabilistic, and usage of the new key will gradually ramp up and down over the key's lifetime. If you cache the public key set for a service account, we recommend that you update the cache every 15 minutes. User-managed keys can be added and removed at any time, so it is important to update the cache frequently. For Google-managed keys, Google will publish a key at least 6 hours before it is first used for signing and will keep publishing it for at least 6 hours after it was last used for signing. Public keys for all service accounts are also published at the OAuth2 Service Account API.
301
+
"disabled": True or False, # The key status.
244
302
"keyAlgorithm": "A String", # Specifies the algorithm (and possibly key size) for the key.
245
303
"keyOrigin": "A String", # The key origin.
246
304
"keyType": "A String", # The key type.
Copy file name to clipboardexpand all lines: googleapiclient/discovery_cache/documents/iam.v1.json
+73-1
Original file line number
Diff line number
Diff line change
@@ -1483,6 +1483,62 @@
1483
1483
"https://www.googleapis.com/auth/cloud-platform"
1484
1484
]
1485
1485
},
1486
+
"disable": {
1487
+
"description": "Disable a ServiceAccountKey. A disabled service account key can be enabled through EnableServiceAccountKey. The API is currently in preview phase.",
"description": "Required. The resource name of the service account key in the following format: `projects/{PROJECT_ID}/serviceAccounts/{ACCOUNT}/keys/{key}`. Using `-` as a wildcard for the `PROJECT_ID` will infer the project from the account. The `ACCOUNT` value can be the `email` address or the `unique_id` of the service account.",
"description": "Required. The resource name of the service account key in the following format: `projects/{PROJECT_ID}/serviceAccounts/{ACCOUNT}/keys/{key}`. Using `-` as a wildcard for the `PROJECT_ID` will infer the project from the account. The `ACCOUNT` value can be the `email` address or the `unique_id` of the service account.",
"description": "The service account key disable request.",
1972
+
"id": "DisableServiceAccountKeyRequest",
1973
+
"properties": {},
1974
+
"type": "object"
1975
+
},
1914
1976
"DisableServiceAccountRequest": {
1915
1977
"description": "The service account disable request.",
1916
1978
"id": "DisableServiceAccountRequest",
@@ -1923,6 +1985,12 @@
1923
1985
"properties": {},
1924
1986
"type": "object"
1925
1987
},
1988
+
"EnableServiceAccountKeyRequest": {
1989
+
"description": "The service account key enable request.",
1990
+
"id": "EnableServiceAccountKeyRequest",
1991
+
"properties": {},
1992
+
"type": "object"
1993
+
},
1926
1994
"EnableServiceAccountRequest": {
1927
1995
"description": "The service account enable request.",
1928
1996
"id": "EnableServiceAccountRequest",
@@ -2536,6 +2604,10 @@
2536
2604
"description": "Represents a service account key. A service account has two sets of key-pairs: user-managed, and system-managed. User-managed key-pairs can be created and deleted by users. Users are responsible for rotating these keys periodically to ensure security of their service accounts. Users retain the private key of these key-pairs, and Google retains ONLY the public key. System-managed keys are automatically rotated by Google, and are used for signing for a maximum of two weeks. The rotation process is probabilistic, and usage of the new key will gradually ramp up and down over the key's lifetime. If you cache the public key set for a service account, we recommend that you update the cache every 15 minutes. User-managed keys can be added and removed at any time, so it is important to update the cache frequently. For Google-managed keys, Google will publish a key at least 6 hours before it is first used for signing and will keep publishing it for at least 6 hours after it was last used for signing. Public keys for all service accounts are also published at the OAuth2 Service Account API.",
2537
2605
"id": "ServiceAccountKey",
2538
2606
"properties": {
2607
+
"disabled": {
2608
+
"description": "The key status.",
2609
+
"type": "boolean"
2610
+
},
2539
2611
"keyAlgorithm": {
2540
2612
"description": "Specifies the algorithm (and possibly key size) for the key.",
0 commit comments