gcloud privateca templates update Stay organized with collections Save and categorize content based on your preferences.
- NAME
- gcloud privateca templates update - update a certificate template
- SYNOPSIS
gcloud privateca templates update(CERTIFICATE_TEMPLATE:--location=LOCATION)[--copy-sans][--copy-subject][--description=DESCRIPTION][--identity-cel-expression=IDENTITY_CEL_EXPRESSION][--predefined-values-file=PREDEFINED_VALUES_FILE][--update-labels=[KEY=VALUE,…]][--clear-labels|--remove-labels=[KEY,…]][--copy-all-requested-extensions|--copy-extensions-by-oid=[OBJECT_ID,…] |--drop-oid-extensions--copy-known-extensions=[KNOWN_EXTENSIONS,…] |--drop-known-extensions][GCLOUD_WIDE_FLAG …]
- DESCRIPTION
- Update a certificate template.
- EXAMPLES
- To update a template named "dns-restricted" with new default x509 extensions:
gcloudprivatecatemplatesupdatedns-restricted--location=us-west1--predefined-values-file=x509_parameters.yamlTo update a template named "dns-restricted" to allow requestors to specifysubject:
gcloudprivatecatemplatesupdatedns-restricted--location=us-west1--copy-subjectTo update a template named "dns-restricted" with allowed extension'base-key-usage' to allow requestors to specify additional x509 extension'extended-key-usage':
gcloudprivatecatemplatesupdatedns-restricted--location=us-west1--copy-known-extensions=base-key-usage,extended-key-usageTo update a template named "mtls-restricted" with allowed OID '1.1' to allowrequestors to specify alternative OIDS '2.2,3.3':
gcloudprivatecatemplatesupdatemtls-restricted--location=us-west1--copy-extensions-by-oid=2.2,3.3 - POSITIONAL ARGUMENTS
- CERTIFICATE TEMPLATE resource - The template to update. The arguments in thisgroup can be used to specify the attributes of this resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.
To set the
projectattribute:- provide the argument
CERTIFICATE_TEMPLATEon the command line witha fully specified name; - provide the argument
--projecton the command line; - set the property
core/project.
This must be specified.
CERTIFICATE_TEMPLATE- ID of the CERTIFICATE_TEMPLATE or fully qualified identifier for theCERTIFICATE_TEMPLATE.
To set the
certificate templateattribute:- provide the argument
CERTIFICATE_TEMPLATEon the command line.
This positional argument must be specified if any of the other arguments in thisgroup are specified.
- provide the argument
--location=LOCATION- The location of the CERTIFICATE_TEMPLATE.
To set the
locationattribute:- provide the argument
CERTIFICATE_TEMPLATEon the command line witha fully specified name; - provide the argument
--locationon the command line; - set the property
privateca/location.
- provide the argument
- provide the argument
- CERTIFICATE TEMPLATE resource - The template to update. The arguments in thisgroup can be used to specify the attributes of this resource. (NOTE) Someattributes are not given arguments in this group but can be set in other ways.
- FLAGS
--copy-sans- If this is specified, the Subject Alternative Name extension from thecertificate request will be copied into the signed certificate. Specify--no-copy-sans to drop any caller-specified SANs in the certificate request.
--copy-subject- If this is specified, the Subject from the certificate request will be copiedinto the signed certificate. Specify --no-copy-subject to drop anycaller-specified subjects from the certificate request.
--description=DESCRIPTION- A text description for the Certificate Template.
--identity-cel-expression=IDENTITY_CEL_EXPRESSION- A CEL expression that will be evaluated against the identity in the certificatebefore it is issued, and returns a boolean signifying whether the request shouldbe allowed.
--predefined-values-file=PREDEFINED_VALUES_FILE- A YAML file describing any predefined X.509 values set by this template. Theprovided extensions will be copied over to any certificate requests that usethis template, taking precedent over any allowed extensions in the certificaterequest. The format of this file should be a YAML representation of theX509Parameters message, which is defined here:https://cloud.google.com/certificate-authority-service/docs/reference/rest/v1/X509Parameters.Some examples can be found here:https://cloud.google.com/certificate-authority-service/docs/creating-certificate-template
--update-labels=[KEY=VALUE,…]- List of label KEY=VALUE pairs to update. If a label exists, its value ismodified. Otherwise, a new label is created.
Keys must start with a lowercase character and contain only hyphens(
-), underscores (_), lowercase characters, andnumbers. Values must contain only hyphens (-), underscores(_), lowercase characters, and numbers. - At most one of these can be specified:
--clear-labels- Remove all labels. If
--update-labelsis also specified then--clear-labelsis applied first.For example, to remove all labels:
gcloudprivatecatemplatesupdate--clear-labelsTo remove all existing labels and create two new labels,
andfoo:bazgcloudprivatecatemplatesupdate--clear-labels--update-labelsfoo=bar,baz=qux --remove-labels=[KEY,…]- List of label keys to remove. If a label does not exist it is silently ignored.If
--update-labelsis also specified then--update-labelsis applied first.
- Constraints on requested X.509 extensions.
At most one of these can be specified:
--copy-all-requested-extensions- If this is set, all extensions, whether known or specified by OID, that arespecified in the certificate request will be copied into the signed certificate.
- Or at least one of these can be specified:
- Specify exact x509 extensions to copy by OID or known extension.
- Constraints on unknown extensions by their OIDs.
At most one of these can be specified:
--copy-extensions-by-oid=[OBJECT_ID,…]- If this is set, then extensions with the given OIDs will be copied from thecertificate request into the signed certificate.
--drop-oid-extensions- If this is set, then all existing OID extensions will be removed from thetemplate, prohibiting any extensions specified by OIDs to be specified by therequester.
- Constraints on known extensions.
At most one of these can be specified:
--copy-known-extensions=[KNOWN_EXTENSIONS,…]- If this is set, then the given extensions will be copied from the certificaterequest into the signed certificate.
KNOWN_EXTENSIONSmust be one of:base-key-usage,extended-key-usage,ca-options,policy-ids,aia-ocsp-servers. --drop-known-extensions- If this is set, then all known extensions will be removed from the template,prohibiting any known x509 extensions to be specified by the requester.
- GCLOUD WIDE FLAGS
- These flags are available to all commands:
--access-token-file,--account,--billing-project,--configuration,--flags-file,--flatten,--format,--help,--impersonate-service-account,--log-http,--project,--quiet,--trace-token,--user-output-enabled,--verbosity.Run
$gcloud helpfor details.
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2026-01-21 UTC.