gcloud alpha kms keys versions import Stay organized with collections Save and categorize content based on your preferences.
- NAME
- gcloud alpha kms keys versions import - import a version into an existing crypto key
- SYNOPSIS
gcloud alpha kms keys versions import--algorithm=ALGORITHM--import-job=IMPORT_JOB[--key=KEY][--keyring=KEYRING][--location=LOCATION][--public-key-file=PUBLIC_KEY_FILE][--target-key-file=TARGET_KEY_FILE][--version=VERSION][--wrapped-key-file=WRAPPED_KEY_FILE][GCLOUD_WIDE_FLAG …]
- DESCRIPTION
(ALPHA)Imports wrapped key material into a new version within anexisting crypto key following the import procedure documented athttps://cloud.google.com/kms/docs/importing-a-key.- EXAMPLES
- The following command will read the files 'path/to/ephemeral/key' and'path/to/target/key' and use them to create a new version with algorithm'google-symmetric-encryption' within the 'frodo' crypto key, 'fellowship'keyring, and 'us-central1' location using import job 'strider' to unwrap theprovided key material.
gcloudalphakmskeysversionsimport--location=global--keyring=fellowship--key=frodo--import-job=strider--wrapped-key-file=path/to/target/key--algorithm=google-symmetric-encryption - REQUIRED FLAGS
--algorithm=ALGORITHM- The algorithm to assign to the new key version. For more information aboutsupported algorithms, seehttps://cloud.google.com/kms/docs/algorithms.
ALGORITHMmust be one of:aes-128-cbc,aes-128-ctr,aes-128-gcm,aes-256-cbc,aes-256-ctr,aes-256-gcm,ec-sign-ed25519,ec-sign-p256-sha256,ec-sign-p384-sha384,ec-sign-secp256k1-sha256,google-symmetric-encryption,hmac-sha1,hmac-sha224,hmac-sha256,hmac-sha384,hmac-sha512,kem-xwing,ml-kem-1024,ml-kem-768,pq-sign-hash-slh-dsa-sha2-128s-sha256,pq-sign-ml-dsa-65,pq-sign-slh-dsa-sha2-128s,rsa-decrypt-oaep-2048-sha1,rsa-decrypt-oaep-2048-sha256,rsa-decrypt-oaep-3072-sha1,rsa-decrypt-oaep-3072-sha256,rsa-decrypt-oaep-4096-sha1,rsa-decrypt-oaep-4096-sha256,rsa-decrypt-oaep-4096-sha512,rsa-sign-pkcs1-2048-sha256,rsa-sign-pkcs1-3072-sha256,rsa-sign-pkcs1-4096-sha256,rsa-sign-pkcs1-4096-sha512,rsa-sign-pss-2048-sha256,rsa-sign-pss-3072-sha256,rsa-sign-pss-4096-sha256,rsa-sign-pss-4096-sha512,rsa-sign-raw-pkcs1-2048,rsa-sign-raw-pkcs1-3072,rsa-sign-raw-pkcs1-4096. --import-job=IMPORT_JOB- Name of the import job to import from.
- OPTIONAL FLAGS
--key=KEY- The containing key to import into.
--keyring=KEYRING- Key ring of the key.
--location=LOCATION- Location of the keyring.
--public-key-file=PUBLIC_KEY_FILE- Path to the public key of the ImportJob, used to wrap the key for import. Ifmissing, the public key will be fetched on your behalf.
--target-key-file=TARGET_KEY_FILE- Path to the unwrapped target key to import into a Cloud KMS key version. Ifspecified, the key will be securely wrapped before transmission to Google.
--version=VERSION- Version to re-import into. Omit this field for first-time import.
--wrapped-key-file=WRAPPED_KEY_FILE- Path to the RSA/RSA+AES wrapped key file to import.
- GCLOUD WIDE FLAGS
- These flags are available to all commands:
--access-token-file,--account,--billing-project,--configuration,--flags-file,--flatten,--format,--help,--impersonate-service-account,--log-http,--project,--quiet,--trace-token,--user-output-enabled,--verbosity.Run
$gcloud helpfor details. - NOTES
- This command is currently in alpha and might change without notice. If thiscommand fails with API permission errors despite specifying the correct project,you might be trying to access an API with an invitation-only early accessallowlist. These variants are also available:
gcloudkmskeysversionsimportgcloudbetakmskeysversionsimport
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-09-16 UTC.