<html><body>
<style>

body, h1, h2, h3, div, span, p, pre, a {
  margin: 0;
  padding: 0;
  border: 0;
  font-weight: inherit;
  font-style: inherit;
  font-size: 100%;
  font-family: inherit;
  vertical-align: baseline;
}

body {
  font-size: 13px;
  padding: 1em;
}

h1 {
  font-size: 26px;
  margin-bottom: 1em;
}

h2 {
  font-size: 24px;
  margin-bottom: 1em;
}

h3 {
  font-size: 20px;
  margin-bottom: 1em;
  margin-top: 1em;
}

pre, code {
  line-height: 1.5;
  font-family: Monaco, 'DejaVu Sans Mono', 'Bitstream Vera Sans Mono', 'Lucida Console', monospace;
}

pre {
  margin-top: 0.5em;
}

h1, h2, h3, p {
  font-family: Arial, sans serif;
}

h1, h2, h3 {
  border-bottom: solid #CCC 1px;
}

.toc_element {
  margin-top: 0.5em;
}

.firstline {
  margin-left: 2 em;
}

.method  {
  margin-top: 1em;
  border: solid 1px #CCC;
  padding: 1em;
  background: #EEE;
}

.details {
  font-weight: bold;
  font-size: 14px;
}

</style>

<h1><a href="gmail_v1.html">Gmail API</a> . <a href="gmail_v1.users.html">users</a> . <a href="gmail_v1.users.settings.html">settings</a> . <a href="gmail_v1.users.settings.cse.html">cse</a> . <a href="gmail_v1.users.settings.cse.keypairs.html">keypairs</a></h1>
<h2>Instance Methods</h2>
<p class="toc_element">
  <code><a href="#close">close()</a></code></p>
<p class="firstline">Close httplib2 connections.</p>
<p class="toc_element">
  <code><a href="#create">create(userId, body=None, x__xgafv=None)</a></code></p>
<p class="firstline">Creates and uploads a client-side encryption S/MIME public key certificate chain and private key metadata for the authenticated user. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.</p>
<p class="toc_element">
  <code><a href="#disable">disable(userId, keyPairId, body=None, x__xgafv=None)</a></code></p>
<p class="firstline">Turns off a client-side encryption key pair. The authenticated user can no longer use the key pair to decrypt incoming CSE message texts or sign outgoing CSE mail. To regain access, use the EnableCseKeyPair to turn on the key pair. After 30 days, you can permanently delete the key pair by using the ObliterateCseKeyPair method. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.</p>
<p class="toc_element">
  <code><a href="#enable">enable(userId, keyPairId, body=None, x__xgafv=None)</a></code></p>
<p class="firstline">Turns on a client-side encryption key pair that was turned off. The key pair becomes active again for any associated client-side encryption identities. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.</p>
<p class="toc_element">
  <code><a href="#get">get(userId, keyPairId, x__xgafv=None)</a></code></p>
<p class="firstline">Retrieves an existing client-side encryption key pair. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.</p>
<p class="toc_element">
  <code><a href="#list">list(userId, pageSize=None, pageToken=None, x__xgafv=None)</a></code></p>
<p class="firstline">Lists client-side encryption key pairs for an authenticated user. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.</p>
<p class="toc_element">
  <code><a href="#list_next">list_next()</a></code></p>
<p class="firstline">Retrieves the next page of results.</p>
<p class="toc_element">
  <code><a href="#obliterate">obliterate(userId, keyPairId, body=None, x__xgafv=None)</a></code></p>
<p class="firstline">Deletes a client-side encryption key pair permanently and immediately. You can only permanently delete key pairs that have been turned off for more than 30 days. To turn off a key pair, use the DisableCseKeyPair method. Gmail can't restore or decrypt any messages that were encrypted by an obliterated key. Authenticated users and Google Workspace administrators lose access to reading the encrypted messages. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.</p>
<h3>Method Details</h3>
<div class="method">
    <code class="details" id="close">close()</code>
  <pre>Close httplib2 connections.</pre>
</div>

<div class="method">
    <code class="details" id="create">create(userId, body=None, x__xgafv=None)</code>
  <pre>Creates and uploads a client-side encryption S/MIME public key certificate chain and private key metadata for the authenticated user. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.

Args:
  userId: string, The requester&#x27;s primary email address. To indicate the authenticated user, you can use the special value `me`. (required)
  body: object, The request body.
    The object takes the form of:

{ # A client-side encryption S/MIME key pair, which is comprised of a public key, its certificate chain, and metadata for its paired private key. Gmail uses the key pair to complete the following tasks: - Sign outgoing client-side encrypted messages. - Save and reopen drafts of client-side encrypted messages. - Save and reopen sent messages. - Decrypt incoming or archived S/MIME messages. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.
  &quot;disableTime&quot;: &quot;A String&quot;, # Output only. If a key pair is set to `DISABLED`, the time that the key pair&#x27;s state changed from `ENABLED` to `DISABLED`. This field is present only when the key pair is in state `DISABLED`.
  &quot;enablementState&quot;: &quot;A String&quot;, # Output only. The current state of the key pair.
  &quot;keyPairId&quot;: &quot;A String&quot;, # Output only. The immutable ID for the client-side encryption S/MIME key pair.
  &quot;pem&quot;: &quot;A String&quot;, # Output only. The public key and its certificate chain, in [PEM](https://en.wikipedia.org/wiki/Privacy-Enhanced_Mail) format.
  &quot;pkcs7&quot;: &quot;A String&quot;, # Input only. The public key and its certificate chain. The chain must be in [PKCS#7](https://en.wikipedia.org/wiki/PKCS_7) format and use PEM encoding and ASCII armor.
  &quot;privateKeyMetadata&quot;: [ # Metadata for instances of this key pair&#x27;s private key.
    { # Metadata for a private key instance.
      &quot;hardwareKeyMetadata&quot;: { # Metadata for hardware keys. If [hardware key encryption](https://support.google.com/a/answer/14153163) is set up for the Google Workspace organization, users can optionally store their private key on their smart card and use it to sign and decrypt email messages in Gmail by inserting their smart card into a reader attached to their Windows device. # Metadata for hardware keys.
        &quot;description&quot;: &quot;A String&quot;, # Description about the hardware key.
      },
      &quot;kaclsKeyMetadata&quot;: { # Metadata for private keys managed by an external key access control list service. For details about managing key access, see [Google Workspace CSE API Reference](https://developers.google.com/workspace/cse/reference). # Metadata for a private key instance managed by an external key access control list service.
        &quot;kaclsData&quot;: &quot;A String&quot;, # Opaque data generated and used by the key access control list service. Maximum size: 8 KiB.
        &quot;kaclsUri&quot;: &quot;A String&quot;, # The URI of the key access control list service that manages the private key.
      },
      &quot;privateKeyMetadataId&quot;: &quot;A String&quot;, # Output only. The immutable ID for the private key metadata instance.
    },
  ],
  &quot;subjectEmailAddresses&quot;: [ # Output only. The email address identities that are specified on the leaf certificate.
    &quot;A String&quot;,
  ],
}

  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    { # A client-side encryption S/MIME key pair, which is comprised of a public key, its certificate chain, and metadata for its paired private key. Gmail uses the key pair to complete the following tasks: - Sign outgoing client-side encrypted messages. - Save and reopen drafts of client-side encrypted messages. - Save and reopen sent messages. - Decrypt incoming or archived S/MIME messages. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.
  &quot;disableTime&quot;: &quot;A String&quot;, # Output only. If a key pair is set to `DISABLED`, the time that the key pair&#x27;s state changed from `ENABLED` to `DISABLED`. This field is present only when the key pair is in state `DISABLED`.
  &quot;enablementState&quot;: &quot;A String&quot;, # Output only. The current state of the key pair.
  &quot;keyPairId&quot;: &quot;A String&quot;, # Output only. The immutable ID for the client-side encryption S/MIME key pair.
  &quot;pem&quot;: &quot;A String&quot;, # Output only. The public key and its certificate chain, in [PEM](https://en.wikipedia.org/wiki/Privacy-Enhanced_Mail) format.
  &quot;pkcs7&quot;: &quot;A String&quot;, # Input only. The public key and its certificate chain. The chain must be in [PKCS#7](https://en.wikipedia.org/wiki/PKCS_7) format and use PEM encoding and ASCII armor.
  &quot;privateKeyMetadata&quot;: [ # Metadata for instances of this key pair&#x27;s private key.
    { # Metadata for a private key instance.
      &quot;hardwareKeyMetadata&quot;: { # Metadata for hardware keys. If [hardware key encryption](https://support.google.com/a/answer/14153163) is set up for the Google Workspace organization, users can optionally store their private key on their smart card and use it to sign and decrypt email messages in Gmail by inserting their smart card into a reader attached to their Windows device. # Metadata for hardware keys.
        &quot;description&quot;: &quot;A String&quot;, # Description about the hardware key.
      },
      &quot;kaclsKeyMetadata&quot;: { # Metadata for private keys managed by an external key access control list service. For details about managing key access, see [Google Workspace CSE API Reference](https://developers.google.com/workspace/cse/reference). # Metadata for a private key instance managed by an external key access control list service.
        &quot;kaclsData&quot;: &quot;A String&quot;, # Opaque data generated and used by the key access control list service. Maximum size: 8 KiB.
        &quot;kaclsUri&quot;: &quot;A String&quot;, # The URI of the key access control list service that manages the private key.
      },
      &quot;privateKeyMetadataId&quot;: &quot;A String&quot;, # Output only. The immutable ID for the private key metadata instance.
    },
  ],
  &quot;subjectEmailAddresses&quot;: [ # Output only. The email address identities that are specified on the leaf certificate.
    &quot;A String&quot;,
  ],
}</pre>
</div>

<div class="method">
    <code class="details" id="disable">disable(userId, keyPairId, body=None, x__xgafv=None)</code>
  <pre>Turns off a client-side encryption key pair. The authenticated user can no longer use the key pair to decrypt incoming CSE message texts or sign outgoing CSE mail. To regain access, use the EnableCseKeyPair to turn on the key pair. After 30 days, you can permanently delete the key pair by using the ObliterateCseKeyPair method. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.

Args:
  userId: string, The requester&#x27;s primary email address. To indicate the authenticated user, you can use the special value `me`. (required)
  keyPairId: string, The identifier of the key pair to turn off. (required)
  body: object, The request body.
    The object takes the form of:

{ # Requests to turn off a client-side encryption key pair.
}

  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    { # A client-side encryption S/MIME key pair, which is comprised of a public key, its certificate chain, and metadata for its paired private key. Gmail uses the key pair to complete the following tasks: - Sign outgoing client-side encrypted messages. - Save and reopen drafts of client-side encrypted messages. - Save and reopen sent messages. - Decrypt incoming or archived S/MIME messages. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.
  &quot;disableTime&quot;: &quot;A String&quot;, # Output only. If a key pair is set to `DISABLED`, the time that the key pair&#x27;s state changed from `ENABLED` to `DISABLED`. This field is present only when the key pair is in state `DISABLED`.
  &quot;enablementState&quot;: &quot;A String&quot;, # Output only. The current state of the key pair.
  &quot;keyPairId&quot;: &quot;A String&quot;, # Output only. The immutable ID for the client-side encryption S/MIME key pair.
  &quot;pem&quot;: &quot;A String&quot;, # Output only. The public key and its certificate chain, in [PEM](https://en.wikipedia.org/wiki/Privacy-Enhanced_Mail) format.
  &quot;pkcs7&quot;: &quot;A String&quot;, # Input only. The public key and its certificate chain. The chain must be in [PKCS#7](https://en.wikipedia.org/wiki/PKCS_7) format and use PEM encoding and ASCII armor.
  &quot;privateKeyMetadata&quot;: [ # Metadata for instances of this key pair&#x27;s private key.
    { # Metadata for a private key instance.
      &quot;hardwareKeyMetadata&quot;: { # Metadata for hardware keys. If [hardware key encryption](https://support.google.com/a/answer/14153163) is set up for the Google Workspace organization, users can optionally store their private key on their smart card and use it to sign and decrypt email messages in Gmail by inserting their smart card into a reader attached to their Windows device. # Metadata for hardware keys.
        &quot;description&quot;: &quot;A String&quot;, # Description about the hardware key.
      },
      &quot;kaclsKeyMetadata&quot;: { # Metadata for private keys managed by an external key access control list service. For details about managing key access, see [Google Workspace CSE API Reference](https://developers.google.com/workspace/cse/reference). # Metadata for a private key instance managed by an external key access control list service.
        &quot;kaclsData&quot;: &quot;A String&quot;, # Opaque data generated and used by the key access control list service. Maximum size: 8 KiB.
        &quot;kaclsUri&quot;: &quot;A String&quot;, # The URI of the key access control list service that manages the private key.
      },
      &quot;privateKeyMetadataId&quot;: &quot;A String&quot;, # Output only. The immutable ID for the private key metadata instance.
    },
  ],
  &quot;subjectEmailAddresses&quot;: [ # Output only. The email address identities that are specified on the leaf certificate.
    &quot;A String&quot;,
  ],
}</pre>
</div>

<div class="method">
    <code class="details" id="enable">enable(userId, keyPairId, body=None, x__xgafv=None)</code>
  <pre>Turns on a client-side encryption key pair that was turned off. The key pair becomes active again for any associated client-side encryption identities. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.

Args:
  userId: string, The requester&#x27;s primary email address. To indicate the authenticated user, you can use the special value `me`. (required)
  keyPairId: string, The identifier of the key pair to turn on. (required)
  body: object, The request body.
    The object takes the form of:

{ # Requests to turn on a client-side encryption key pair.
}

  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    { # A client-side encryption S/MIME key pair, which is comprised of a public key, its certificate chain, and metadata for its paired private key. Gmail uses the key pair to complete the following tasks: - Sign outgoing client-side encrypted messages. - Save and reopen drafts of client-side encrypted messages. - Save and reopen sent messages. - Decrypt incoming or archived S/MIME messages. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.
  &quot;disableTime&quot;: &quot;A String&quot;, # Output only. If a key pair is set to `DISABLED`, the time that the key pair&#x27;s state changed from `ENABLED` to `DISABLED`. This field is present only when the key pair is in state `DISABLED`.
  &quot;enablementState&quot;: &quot;A String&quot;, # Output only. The current state of the key pair.
  &quot;keyPairId&quot;: &quot;A String&quot;, # Output only. The immutable ID for the client-side encryption S/MIME key pair.
  &quot;pem&quot;: &quot;A String&quot;, # Output only. The public key and its certificate chain, in [PEM](https://en.wikipedia.org/wiki/Privacy-Enhanced_Mail) format.
  &quot;pkcs7&quot;: &quot;A String&quot;, # Input only. The public key and its certificate chain. The chain must be in [PKCS#7](https://en.wikipedia.org/wiki/PKCS_7) format and use PEM encoding and ASCII armor.
  &quot;privateKeyMetadata&quot;: [ # Metadata for instances of this key pair&#x27;s private key.
    { # Metadata for a private key instance.
      &quot;hardwareKeyMetadata&quot;: { # Metadata for hardware keys. If [hardware key encryption](https://support.google.com/a/answer/14153163) is set up for the Google Workspace organization, users can optionally store their private key on their smart card and use it to sign and decrypt email messages in Gmail by inserting their smart card into a reader attached to their Windows device. # Metadata for hardware keys.
        &quot;description&quot;: &quot;A String&quot;, # Description about the hardware key.
      },
      &quot;kaclsKeyMetadata&quot;: { # Metadata for private keys managed by an external key access control list service. For details about managing key access, see [Google Workspace CSE API Reference](https://developers.google.com/workspace/cse/reference). # Metadata for a private key instance managed by an external key access control list service.
        &quot;kaclsData&quot;: &quot;A String&quot;, # Opaque data generated and used by the key access control list service. Maximum size: 8 KiB.
        &quot;kaclsUri&quot;: &quot;A String&quot;, # The URI of the key access control list service that manages the private key.
      },
      &quot;privateKeyMetadataId&quot;: &quot;A String&quot;, # Output only. The immutable ID for the private key metadata instance.
    },
  ],
  &quot;subjectEmailAddresses&quot;: [ # Output only. The email address identities that are specified on the leaf certificate.
    &quot;A String&quot;,
  ],
}</pre>
</div>

<div class="method">
    <code class="details" id="get">get(userId, keyPairId, x__xgafv=None)</code>
  <pre>Retrieves an existing client-side encryption key pair. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.

Args:
  userId: string, The requester&#x27;s primary email address. To indicate the authenticated user, you can use the special value `me`. (required)
  keyPairId: string, The identifier of the key pair to retrieve. (required)
  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    { # A client-side encryption S/MIME key pair, which is comprised of a public key, its certificate chain, and metadata for its paired private key. Gmail uses the key pair to complete the following tasks: - Sign outgoing client-side encrypted messages. - Save and reopen drafts of client-side encrypted messages. - Save and reopen sent messages. - Decrypt incoming or archived S/MIME messages. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.
  &quot;disableTime&quot;: &quot;A String&quot;, # Output only. If a key pair is set to `DISABLED`, the time that the key pair&#x27;s state changed from `ENABLED` to `DISABLED`. This field is present only when the key pair is in state `DISABLED`.
  &quot;enablementState&quot;: &quot;A String&quot;, # Output only. The current state of the key pair.
  &quot;keyPairId&quot;: &quot;A String&quot;, # Output only. The immutable ID for the client-side encryption S/MIME key pair.
  &quot;pem&quot;: &quot;A String&quot;, # Output only. The public key and its certificate chain, in [PEM](https://en.wikipedia.org/wiki/Privacy-Enhanced_Mail) format.
  &quot;pkcs7&quot;: &quot;A String&quot;, # Input only. The public key and its certificate chain. The chain must be in [PKCS#7](https://en.wikipedia.org/wiki/PKCS_7) format and use PEM encoding and ASCII armor.
  &quot;privateKeyMetadata&quot;: [ # Metadata for instances of this key pair&#x27;s private key.
    { # Metadata for a private key instance.
      &quot;hardwareKeyMetadata&quot;: { # Metadata for hardware keys. If [hardware key encryption](https://support.google.com/a/answer/14153163) is set up for the Google Workspace organization, users can optionally store their private key on their smart card and use it to sign and decrypt email messages in Gmail by inserting their smart card into a reader attached to their Windows device. # Metadata for hardware keys.
        &quot;description&quot;: &quot;A String&quot;, # Description about the hardware key.
      },
      &quot;kaclsKeyMetadata&quot;: { # Metadata for private keys managed by an external key access control list service. For details about managing key access, see [Google Workspace CSE API Reference](https://developers.google.com/workspace/cse/reference). # Metadata for a private key instance managed by an external key access control list service.
        &quot;kaclsData&quot;: &quot;A String&quot;, # Opaque data generated and used by the key access control list service. Maximum size: 8 KiB.
        &quot;kaclsUri&quot;: &quot;A String&quot;, # The URI of the key access control list service that manages the private key.
      },
      &quot;privateKeyMetadataId&quot;: &quot;A String&quot;, # Output only. The immutable ID for the private key metadata instance.
    },
  ],
  &quot;subjectEmailAddresses&quot;: [ # Output only. The email address identities that are specified on the leaf certificate.
    &quot;A String&quot;,
  ],
}</pre>
</div>

<div class="method">
    <code class="details" id="list">list(userId, pageSize=None, pageToken=None, x__xgafv=None)</code>
  <pre>Lists client-side encryption key pairs for an authenticated user. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.

Args:
  userId: string, The requester&#x27;s primary email address. To indicate the authenticated user, you can use the special value `me`. (required)
  pageSize: integer, The number of key pairs to return. If not provided, the page size will default to 20 entries.
  pageToken: string, Pagination token indicating which page of key pairs to return. If the token is not supplied, then the API will return the first page of results.
  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format

Returns:
  An object of the form:

    {
  &quot;cseKeyPairs&quot;: [ # One page of the list of CSE key pairs installed for the user.
    { # A client-side encryption S/MIME key pair, which is comprised of a public key, its certificate chain, and metadata for its paired private key. Gmail uses the key pair to complete the following tasks: - Sign outgoing client-side encrypted messages. - Save and reopen drafts of client-side encrypted messages. - Save and reopen sent messages. - Decrypt incoming or archived S/MIME messages. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.
      &quot;disableTime&quot;: &quot;A String&quot;, # Output only. If a key pair is set to `DISABLED`, the time that the key pair&#x27;s state changed from `ENABLED` to `DISABLED`. This field is present only when the key pair is in state `DISABLED`.
      &quot;enablementState&quot;: &quot;A String&quot;, # Output only. The current state of the key pair.
      &quot;keyPairId&quot;: &quot;A String&quot;, # Output only. The immutable ID for the client-side encryption S/MIME key pair.
      &quot;pem&quot;: &quot;A String&quot;, # Output only. The public key and its certificate chain, in [PEM](https://en.wikipedia.org/wiki/Privacy-Enhanced_Mail) format.
      &quot;pkcs7&quot;: &quot;A String&quot;, # Input only. The public key and its certificate chain. The chain must be in [PKCS#7](https://en.wikipedia.org/wiki/PKCS_7) format and use PEM encoding and ASCII armor.
      &quot;privateKeyMetadata&quot;: [ # Metadata for instances of this key pair&#x27;s private key.
        { # Metadata for a private key instance.
          &quot;hardwareKeyMetadata&quot;: { # Metadata for hardware keys. If [hardware key encryption](https://support.google.com/a/answer/14153163) is set up for the Google Workspace organization, users can optionally store their private key on their smart card and use it to sign and decrypt email messages in Gmail by inserting their smart card into a reader attached to their Windows device. # Metadata for hardware keys.
            &quot;description&quot;: &quot;A String&quot;, # Description about the hardware key.
          },
          &quot;kaclsKeyMetadata&quot;: { # Metadata for private keys managed by an external key access control list service. For details about managing key access, see [Google Workspace CSE API Reference](https://developers.google.com/workspace/cse/reference). # Metadata for a private key instance managed by an external key access control list service.
            &quot;kaclsData&quot;: &quot;A String&quot;, # Opaque data generated and used by the key access control list service. Maximum size: 8 KiB.
            &quot;kaclsUri&quot;: &quot;A String&quot;, # The URI of the key access control list service that manages the private key.
          },
          &quot;privateKeyMetadataId&quot;: &quot;A String&quot;, # Output only. The immutable ID for the private key metadata instance.
        },
      ],
      &quot;subjectEmailAddresses&quot;: [ # Output only. The email address identities that are specified on the leaf certificate.
        &quot;A String&quot;,
      ],
    },
  ],
  &quot;nextPageToken&quot;: &quot;A String&quot;, # Pagination token to be passed to a subsequent ListCseKeyPairs call in order to retrieve the next page of key pairs. If this value is not returned, then no further pages remain.
}</pre>
</div>

<div class="method">
    <code class="details" id="list_next">list_next()</code>
  <pre>Retrieves the next page of results.

        Args:
          previous_request: The request for the previous page. (required)
          previous_response: The response from the request for the previous page. (required)

        Returns:
          A request object that you can call &#x27;execute()&#x27; on to request the next
          page. Returns None if there are no more items in the collection.
        </pre>
</div>

<div class="method">
    <code class="details" id="obliterate">obliterate(userId, keyPairId, body=None, x__xgafv=None)</code>
  <pre>Deletes a client-side encryption key pair permanently and immediately. You can only permanently delete key pairs that have been turned off for more than 30 days. To turn off a key pair, use the DisableCseKeyPair method. Gmail can&#x27;t restore or decrypt any messages that were encrypted by an obliterated key. Authenticated users and Google Workspace administrators lose access to reading the encrypted messages. For administrators managing identities and keypairs for users in their organization, requests require authorization with a [service account](https://developers.google.com/identity/protocols/OAuth2ServiceAccount) that has [domain-wide delegation authority](https://developers.google.com/identity/protocols/OAuth2ServiceAccount#delegatingauthority) to impersonate users with the `https://www.googleapis.com/auth/gmail.settings.basic` scope. For users managing their own identities and keypairs, requests require [hardware key encryption](https://support.google.com/a/answer/14153163) turned on and configured.

Args:
  userId: string, The requester&#x27;s primary email address. To indicate the authenticated user, you can use the special value `me`. (required)
  keyPairId: string, The identifier of the key pair to obliterate. (required)
  body: object, The request body.
    The object takes the form of:

{ # Request to obliterate a CSE key pair.
}

  x__xgafv: string, V1 error format.
    Allowed values
      1 - v1 error format
      2 - v2 error format
</pre>
</div>

</body></html>