ProtectionLevel Stay organized with collections Save and categorize content based on your preferences.
ProtectionLevel specifies how cryptographic operations are performed. For more information, seeProtection levels.
| Enums | |
|---|---|
PROTECTION_LEVEL_UNSPECIFIED | Not specified. |
SOFTWARE | Crypto operations are performed in software. |
HSM | Crypto operations are performed in a Hardware Security Module. |
EXTERNAL | Crypto operations are performed by an external key manager. |
EXTERNAL_VPC | Crypto operations are performed in an EKM-over-VPC backend. |
HSM_SINGLE_TENANT | Crypto operations are performed in a single-tenant HSM. |
Except as otherwise noted, the content of this page is licensed under theCreative Commons Attribution 4.0 License, and code samples are licensed under theApache 2.0 License. For details, see theGoogle Developers Site Policies. Java is a registered trademark of Oracle and/or its affiliates.
Last updated 2025-12-24 UTC.