I have services running on GCP where the service needs to authenticate itself (as a client) to another non GCP server. This server provides X.509 certificate based authentication. The only requirement is that the client certificate is signed by a (any) CA. It seems like the Service Account Keys (managed by Google) are not signed by anybody. It's just a pair of private- and public-keys.
Is there any option to enable signing those keys? A google managed/provided CA would be sufficient.
I looked into the docs (like https://cloud.google.com/iam/docs/service-account-creds#key-types), but I couldn't find anything helpful.
Edit - add more context to the question: I want to use this with MongoDB Atlas x.509 based authentication. In MongoDB we can limit the access to exactly one CA, and additionally, we have to list down the CN for every client (service account). With this, we can limit access very precisely.