1. Packages
  2. Packages
  3. Akeyless Provider
  4. API Docs
  5. DynamicSecretLdap
Viewing docs for akeyless 2.0.1
published on Monday, Apr 27, 2026 by akeyless-community
Viewing docs for akeyless 2.0.1
published on Monday, Apr 27, 2026 by akeyless-community

    LDAP dynamic secret resource

    Create DynamicSecretLdap Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new DynamicSecretLdap(name: string, args?: DynamicSecretLdapArgs, opts?: CustomResourceOptions);
    @overload
    def DynamicSecretLdap(resource_name: str,
                          args: Optional[DynamicSecretLdapArgs] = None,
                          opts: Optional[ResourceOptions] = None)
    
    @overload
    def DynamicSecretLdap(resource_name: str,
                          opts: Optional[ResourceOptions] = None,
                          bind_dn: Optional[str] = None,
                          bind_dn_password: Optional[str] = None,
                          custom_username_template: Optional[str] = None,
                          delete_protection: Optional[str] = None,
                          dynamic_secret_ldap_id: Optional[str] = None,
                          external_username: Optional[str] = None,
                          fixed_user_claim_keyname: Optional[str] = None,
                          group_dn: Optional[str] = None,
                          host_provider: Optional[str] = None,
                          item_custom_fields: Optional[Mapping[str, str]] = None,
                          ldap_ca_cert: Optional[str] = None,
                          ldap_url: Optional[str] = None,
                          name: Optional[str] = None,
                          password_length: Optional[str] = None,
                          producer_encryption_key_name: Optional[str] = None,
                          provider_type: Optional[str] = None,
                          secure_access_certificate_issuer: Optional[str] = None,
                          secure_access_delay: Optional[float] = None,
                          secure_access_enable: Optional[str] = None,
                          secure_access_hosts: Optional[Sequence[str]] = None,
                          secure_access_rd_gateway_server: Optional[str] = None,
                          secure_access_rdp_domain: Optional[str] = None,
                          tags: Optional[Sequence[str]] = None,
                          target_name: Optional[str] = None,
                          targets: Optional[Sequence[str]] = None,
                          token_expiration: Optional[str] = None,
                          user_attribute: Optional[str] = None,
                          user_dn: Optional[str] = None,
                          user_ttl: Optional[str] = None)
    func NewDynamicSecretLdap(ctx *Context, name string, args *DynamicSecretLdapArgs, opts ...ResourceOption) (*DynamicSecretLdap, error)
    public DynamicSecretLdap(string name, DynamicSecretLdapArgs? args = null, CustomResourceOptions? opts = null)
    public DynamicSecretLdap(String name, DynamicSecretLdapArgs args)
    public DynamicSecretLdap(String name, DynamicSecretLdapArgs args, CustomResourceOptions options)
    
    type: akeyless:DynamicSecretLdap
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    
    resource "akeyless_dynamicsecretldap" "name" {
        # resource properties
    }

    Parameters

    name string
    The unique name of the resource.
    args DynamicSecretLdapArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args DynamicSecretLdapArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args DynamicSecretLdapArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args DynamicSecretLdapArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args DynamicSecretLdapArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var dynamicSecretLdapResource = new Akeyless.DynamicSecretLdap("dynamicSecretLdapResource", new()
    {
        BindDn = "string",
        BindDnPassword = "string",
        CustomUsernameTemplate = "string",
        DeleteProtection = "string",
        DynamicSecretLdapId = "string",
        ExternalUsername = "string",
        FixedUserClaimKeyname = "string",
        GroupDn = "string",
        HostProvider = "string",
        ItemCustomFields = 
        {
            { "string", "string" },
        },
        LdapCaCert = "string",
        LdapUrl = "string",
        Name = "string",
        PasswordLength = "string",
        ProducerEncryptionKeyName = "string",
        ProviderType = "string",
        SecureAccessCertificateIssuer = "string",
        SecureAccessDelay = 0,
        SecureAccessEnable = "string",
        SecureAccessHosts = new[]
        {
            "string",
        },
        SecureAccessRdGatewayServer = "string",
        SecureAccessRdpDomain = "string",
        Tags = new[]
        {
            "string",
        },
        TargetName = "string",
        Targets = new[]
        {
            "string",
        },
        TokenExpiration = "string",
        UserAttribute = "string",
        UserDn = "string",
        UserTtl = "string",
    });
    
    example, err := akeyless.NewDynamicSecretLdap(ctx, "dynamicSecretLdapResource", &akeyless.DynamicSecretLdapArgs{
    	BindDn:                 pulumi.String("string"),
    	BindDnPassword:         pulumi.String("string"),
    	CustomUsernameTemplate: pulumi.String("string"),
    	DeleteProtection:       pulumi.String("string"),
    	DynamicSecretLdapId:    pulumi.String("string"),
    	ExternalUsername:       pulumi.String("string"),
    	FixedUserClaimKeyname:  pulumi.String("string"),
    	GroupDn:                pulumi.String("string"),
    	HostProvider:           pulumi.String("string"),
    	ItemCustomFields: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	LdapCaCert:                    pulumi.String("string"),
    	LdapUrl:                       pulumi.String("string"),
    	Name:                          pulumi.String("string"),
    	PasswordLength:                pulumi.String("string"),
    	ProducerEncryptionKeyName:     pulumi.String("string"),
    	ProviderType:                  pulumi.String("string"),
    	SecureAccessCertificateIssuer: pulumi.String("string"),
    	SecureAccessDelay:             pulumi.Float64(0),
    	SecureAccessEnable:            pulumi.String("string"),
    	SecureAccessHosts: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	SecureAccessRdGatewayServer: pulumi.String("string"),
    	SecureAccessRdpDomain:       pulumi.String("string"),
    	Tags: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	TargetName: pulumi.String("string"),
    	Targets: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	TokenExpiration: pulumi.String("string"),
    	UserAttribute:   pulumi.String("string"),
    	UserDn:          pulumi.String("string"),
    	UserTtl:         pulumi.String("string"),
    })
    
    resource "akeyless_dynamicsecretldap" "dynamicSecretLdapResource" {
      bind_dn                  = "string"
      bind_dn_password         = "string"
      custom_username_template = "string"
      delete_protection        = "string"
      dynamic_secret_ldap_id   = "string"
      external_username        = "string"
      fixed_user_claim_keyname = "string"
      group_dn                 = "string"
      host_provider            = "string"
      item_custom_fields = {
        "string" = "string"
      }
      ldap_ca_cert                     = "string"
      ldap_url                         = "string"
      name                             = "string"
      password_length                  = "string"
      producer_encryption_key_name     = "string"
      provider_type                    = "string"
      secure_access_certificate_issuer = "string"
      secure_access_delay              = 0
      secure_access_enable             = "string"
      secure_access_hosts              = ["string"]
      secure_access_rd_gateway_server  = "string"
      secure_access_rdp_domain         = "string"
      tags                             = ["string"]
      target_name                      = "string"
      targets                          = ["string"]
      token_expiration                 = "string"
      user_attribute                   = "string"
      user_dn                          = "string"
      user_ttl                         = "string"
    }
    
    var dynamicSecretLdapResource = new DynamicSecretLdap("dynamicSecretLdapResource", DynamicSecretLdapArgs.builder()
        .bindDn("string")
        .bindDnPassword("string")
        .customUsernameTemplate("string")
        .deleteProtection("string")
        .dynamicSecretLdapId("string")
        .externalUsername("string")
        .fixedUserClaimKeyname("string")
        .groupDn("string")
        .hostProvider("string")
        .itemCustomFields(Map.of("string", "string"))
        .ldapCaCert("string")
        .ldapUrl("string")
        .name("string")
        .passwordLength("string")
        .producerEncryptionKeyName("string")
        .providerType("string")
        .secureAccessCertificateIssuer("string")
        .secureAccessDelay(0.0)
        .secureAccessEnable("string")
        .secureAccessHosts("string")
        .secureAccessRdGatewayServer("string")
        .secureAccessRdpDomain("string")
        .tags("string")
        .targetName("string")
        .targets("string")
        .tokenExpiration("string")
        .userAttribute("string")
        .userDn("string")
        .userTtl("string")
        .build());
    
    dynamic_secret_ldap_resource = akeyless.DynamicSecretLdap("dynamicSecretLdapResource",
        bind_dn="string",
        bind_dn_password="string",
        custom_username_template="string",
        delete_protection="string",
        dynamic_secret_ldap_id="string",
        external_username="string",
        fixed_user_claim_keyname="string",
        group_dn="string",
        host_provider="string",
        item_custom_fields={
            "string": "string",
        },
        ldap_ca_cert="string",
        ldap_url="string",
        name="string",
        password_length="string",
        producer_encryption_key_name="string",
        provider_type="string",
        secure_access_certificate_issuer="string",
        secure_access_delay=float(0),
        secure_access_enable="string",
        secure_access_hosts=["string"],
        secure_access_rd_gateway_server="string",
        secure_access_rdp_domain="string",
        tags=["string"],
        target_name="string",
        targets=["string"],
        token_expiration="string",
        user_attribute="string",
        user_dn="string",
        user_ttl="string")
    
    const dynamicSecretLdapResource = new akeyless.DynamicSecretLdap("dynamicSecretLdapResource", {
        bindDn: "string",
        bindDnPassword: "string",
        customUsernameTemplate: "string",
        deleteProtection: "string",
        dynamicSecretLdapId: "string",
        externalUsername: "string",
        fixedUserClaimKeyname: "string",
        groupDn: "string",
        hostProvider: "string",
        itemCustomFields: {
            string: "string",
        },
        ldapCaCert: "string",
        ldapUrl: "string",
        name: "string",
        passwordLength: "string",
        producerEncryptionKeyName: "string",
        providerType: "string",
        secureAccessCertificateIssuer: "string",
        secureAccessDelay: 0,
        secureAccessEnable: "string",
        secureAccessHosts: ["string"],
        secureAccessRdGatewayServer: "string",
        secureAccessRdpDomain: "string",
        tags: ["string"],
        targetName: "string",
        targets: ["string"],
        tokenExpiration: "string",
        userAttribute: "string",
        userDn: "string",
        userTtl: "string",
    });
    
    type: akeyless:DynamicSecretLdap
    properties:
        bindDn: string
        bindDnPassword: string
        customUsernameTemplate: string
        deleteProtection: string
        dynamicSecretLdapId: string
        externalUsername: string
        fixedUserClaimKeyname: string
        groupDn: string
        hostProvider: string
        itemCustomFields:
            string: string
        ldapCaCert: string
        ldapUrl: string
        name: string
        passwordLength: string
        producerEncryptionKeyName: string
        providerType: string
        secureAccessCertificateIssuer: string
        secureAccessDelay: 0
        secureAccessEnable: string
        secureAccessHosts:
            - string
        secureAccessRdGatewayServer: string
        secureAccessRdpDomain: string
        tags:
            - string
        targetName: string
        targets:
            - string
        tokenExpiration: string
        userAttribute: string
        userDn: string
        userTtl: string
    

    DynamicSecretLdap Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The DynamicSecretLdap resource accepts the following input properties:

    BindDn string
    Bind DN
    BindDnPassword string
    Bind DN Password
    CustomUsernameTemplate string
    Customize how temporary usernames are generated using go template
    DeleteProtection string
    Protection from accidental deletion of this object [true/false]
    DynamicSecretLdapId string
    The ID of this resource.
    ExternalUsername string
    Externally provided username [true/false]
    FixedUserClaimKeyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    GroupDn string
    Group DN which the temporary user should be added
    HostProvider string
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    ItemCustomFields Dictionary<string, string>
    Additional custom fields to associate with the item
    LdapCaCert string
    CA Certificate File Content
    LdapUrl string
    LDAP Server URL
    Name string
    Dynamic secret name
    PasswordLength string
    The length of the password to be generated
    ProducerEncryptionKeyName string
    Dynamic producer encryption key
    ProviderType string
    Provider type
    SecureAccessCertificateIssuer string
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    SecureAccessDelay double
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    SecureAccessEnable string
    Enable/Disable secure remote access [true/false]
    SecureAccessHosts List<string>
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    SecureAccessRdGatewayServer string
    RD Gateway server
    SecureAccessRdpDomain string
    Required when the Dynamic Secret is used for a domain user
    Tags List<string>
    Add tags attached to this object
    TargetName string
    Target name
    Targets List<string>
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    TokenExpiration string
    Token expiration
    UserAttribute string
    User Attribute
    UserDn string
    User DN
    UserTtl string
    User TTL
    BindDn string
    Bind DN
    BindDnPassword string
    Bind DN Password
    CustomUsernameTemplate string
    Customize how temporary usernames are generated using go template
    DeleteProtection string
    Protection from accidental deletion of this object [true/false]
    DynamicSecretLdapId string
    The ID of this resource.
    ExternalUsername string
    Externally provided username [true/false]
    FixedUserClaimKeyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    GroupDn string
    Group DN which the temporary user should be added
    HostProvider string
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    ItemCustomFields map[string]string
    Additional custom fields to associate with the item
    LdapCaCert string
    CA Certificate File Content
    LdapUrl string
    LDAP Server URL
    Name string
    Dynamic secret name
    PasswordLength string
    The length of the password to be generated
    ProducerEncryptionKeyName string
    Dynamic producer encryption key
    ProviderType string
    Provider type
    SecureAccessCertificateIssuer string
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    SecureAccessDelay float64
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    SecureAccessEnable string
    Enable/Disable secure remote access [true/false]
    SecureAccessHosts []string
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    SecureAccessRdGatewayServer string
    RD Gateway server
    SecureAccessRdpDomain string
    Required when the Dynamic Secret is used for a domain user
    Tags []string
    Add tags attached to this object
    TargetName string
    Target name
    Targets []string
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    TokenExpiration string
    Token expiration
    UserAttribute string
    User Attribute
    UserDn string
    User DN
    UserTtl string
    User TTL
    bind_dn string
    Bind DN
    bind_dn_password string
    Bind DN Password
    custom_username_template string
    Customize how temporary usernames are generated using go template
    delete_protection string
    Protection from accidental deletion of this object [true/false]
    dynamic_secret_ldap_id string
    The ID of this resource.
    external_username string
    Externally provided username [true/false]
    fixed_user_claim_keyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    group_dn string
    Group DN which the temporary user should be added
    host_provider string
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    item_custom_fields map(string)
    Additional custom fields to associate with the item
    ldap_ca_cert string
    CA Certificate File Content
    ldap_url string
    LDAP Server URL
    name string
    Dynamic secret name
    password_length string
    The length of the password to be generated
    producer_encryption_key_name string
    Dynamic producer encryption key
    provider_type string
    Provider type
    secure_access_certificate_issuer string
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    secure_access_delay number
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secure_access_enable string
    Enable/Disable secure remote access [true/false]
    secure_access_hosts list(string)
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    secure_access_rd_gateway_server string
    RD Gateway server
    secure_access_rdp_domain string
    Required when the Dynamic Secret is used for a domain user
    tags list(string)
    Add tags attached to this object
    target_name string
    Target name
    targets list(string)
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    token_expiration string
    Token expiration
    user_attribute string
    User Attribute
    user_dn string
    User DN
    user_ttl string
    User TTL
    bindDn String
    Bind DN
    bindDnPassword String
    Bind DN Password
    customUsernameTemplate String
    Customize how temporary usernames are generated using go template
    deleteProtection String
    Protection from accidental deletion of this object [true/false]
    dynamicSecretLdapId String
    The ID of this resource.
    externalUsername String
    Externally provided username [true/false]
    fixedUserClaimKeyname String
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    groupDn String
    Group DN which the temporary user should be added
    hostProvider String
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    itemCustomFields Map<String,String>
    Additional custom fields to associate with the item
    ldapCaCert String
    CA Certificate File Content
    ldapUrl String
    LDAP Server URL
    name String
    Dynamic secret name
    passwordLength String
    The length of the password to be generated
    producerEncryptionKeyName String
    Dynamic producer encryption key
    providerType String
    Provider type
    secureAccessCertificateIssuer String
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    secureAccessDelay Double
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secureAccessEnable String
    Enable/Disable secure remote access [true/false]
    secureAccessHosts List<String>
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    secureAccessRdGatewayServer String
    RD Gateway server
    secureAccessRdpDomain String
    Required when the Dynamic Secret is used for a domain user
    tags List<String>
    Add tags attached to this object
    targetName String
    Target name
    targets List<String>
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    tokenExpiration String
    Token expiration
    userAttribute String
    User Attribute
    userDn String
    User DN
    userTtl String
    User TTL
    bindDn string
    Bind DN
    bindDnPassword string
    Bind DN Password
    customUsernameTemplate string
    Customize how temporary usernames are generated using go template
    deleteProtection string
    Protection from accidental deletion of this object [true/false]
    dynamicSecretLdapId string
    The ID of this resource.
    externalUsername string
    Externally provided username [true/false]
    fixedUserClaimKeyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    groupDn string
    Group DN which the temporary user should be added
    hostProvider string
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    itemCustomFields {[key: string]: string}
    Additional custom fields to associate with the item
    ldapCaCert string
    CA Certificate File Content
    ldapUrl string
    LDAP Server URL
    name string
    Dynamic secret name
    passwordLength string
    The length of the password to be generated
    producerEncryptionKeyName string
    Dynamic producer encryption key
    providerType string
    Provider type
    secureAccessCertificateIssuer string
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    secureAccessDelay number
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secureAccessEnable string
    Enable/Disable secure remote access [true/false]
    secureAccessHosts string[]
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    secureAccessRdGatewayServer string
    RD Gateway server
    secureAccessRdpDomain string
    Required when the Dynamic Secret is used for a domain user
    tags string[]
    Add tags attached to this object
    targetName string
    Target name
    targets string[]
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    tokenExpiration string
    Token expiration
    userAttribute string
    User Attribute
    userDn string
    User DN
    userTtl string
    User TTL
    bind_dn str
    Bind DN
    bind_dn_password str
    Bind DN Password
    custom_username_template str
    Customize how temporary usernames are generated using go template
    delete_protection str
    Protection from accidental deletion of this object [true/false]
    dynamic_secret_ldap_id str
    The ID of this resource.
    external_username str
    Externally provided username [true/false]
    fixed_user_claim_keyname str
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    group_dn str
    Group DN which the temporary user should be added
    host_provider str
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    item_custom_fields Mapping[str, str]
    Additional custom fields to associate with the item
    ldap_ca_cert str
    CA Certificate File Content
    ldap_url str
    LDAP Server URL
    name str
    Dynamic secret name
    password_length str
    The length of the password to be generated
    producer_encryption_key_name str
    Dynamic producer encryption key
    provider_type str
    Provider type
    secure_access_certificate_issuer str
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    secure_access_delay float
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secure_access_enable str
    Enable/Disable secure remote access [true/false]
    secure_access_hosts Sequence[str]
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    secure_access_rd_gateway_server str
    RD Gateway server
    secure_access_rdp_domain str
    Required when the Dynamic Secret is used for a domain user
    tags Sequence[str]
    Add tags attached to this object
    target_name str
    Target name
    targets Sequence[str]
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    token_expiration str
    Token expiration
    user_attribute str
    User Attribute
    user_dn str
    User DN
    user_ttl str
    User TTL
    bindDn String
    Bind DN
    bindDnPassword String
    Bind DN Password
    customUsernameTemplate String
    Customize how temporary usernames are generated using go template
    deleteProtection String
    Protection from accidental deletion of this object [true/false]
    dynamicSecretLdapId String
    The ID of this resource.
    externalUsername String
    Externally provided username [true/false]
    fixedUserClaimKeyname String
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    groupDn String
    Group DN which the temporary user should be added
    hostProvider String
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    itemCustomFields Map<String>
    Additional custom fields to associate with the item
    ldapCaCert String
    CA Certificate File Content
    ldapUrl String
    LDAP Server URL
    name String
    Dynamic secret name
    passwordLength String
    The length of the password to be generated
    producerEncryptionKeyName String
    Dynamic producer encryption key
    providerType String
    Provider type
    secureAccessCertificateIssuer String
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    secureAccessDelay Number
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secureAccessEnable String
    Enable/Disable secure remote access [true/false]
    secureAccessHosts List<String>
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    secureAccessRdGatewayServer String
    RD Gateway server
    secureAccessRdpDomain String
    Required when the Dynamic Secret is used for a domain user
    tags List<String>
    Add tags attached to this object
    targetName String
    Target name
    targets List<String>
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    tokenExpiration String
    Token expiration
    userAttribute String
    User Attribute
    userDn String
    User DN
    userTtl String
    User TTL

    Outputs

    All input properties are implicitly available as output properties. Additionally, the DynamicSecretLdap resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing DynamicSecretLdap Resource

    Get an existing DynamicSecretLdap resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: DynamicSecretLdapState, opts?: CustomResourceOptions): DynamicSecretLdap
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            bind_dn: Optional[str] = None,
            bind_dn_password: Optional[str] = None,
            custom_username_template: Optional[str] = None,
            delete_protection: Optional[str] = None,
            dynamic_secret_ldap_id: Optional[str] = None,
            external_username: Optional[str] = None,
            fixed_user_claim_keyname: Optional[str] = None,
            group_dn: Optional[str] = None,
            host_provider: Optional[str] = None,
            item_custom_fields: Optional[Mapping[str, str]] = None,
            ldap_ca_cert: Optional[str] = None,
            ldap_url: Optional[str] = None,
            name: Optional[str] = None,
            password_length: Optional[str] = None,
            producer_encryption_key_name: Optional[str] = None,
            provider_type: Optional[str] = None,
            secure_access_certificate_issuer: Optional[str] = None,
            secure_access_delay: Optional[float] = None,
            secure_access_enable: Optional[str] = None,
            secure_access_hosts: Optional[Sequence[str]] = None,
            secure_access_rd_gateway_server: Optional[str] = None,
            secure_access_rdp_domain: Optional[str] = None,
            tags: Optional[Sequence[str]] = None,
            target_name: Optional[str] = None,
            targets: Optional[Sequence[str]] = None,
            token_expiration: Optional[str] = None,
            user_attribute: Optional[str] = None,
            user_dn: Optional[str] = None,
            user_ttl: Optional[str] = None) -> DynamicSecretLdap
    func GetDynamicSecretLdap(ctx *Context, name string, id IDInput, state *DynamicSecretLdapState, opts ...ResourceOption) (*DynamicSecretLdap, error)
    public static DynamicSecretLdap Get(string name, Input<string> id, DynamicSecretLdapState? state, CustomResourceOptions? opts = null)
    public static DynamicSecretLdap get(String name, Output<String> id, DynamicSecretLdapState state, CustomResourceOptions options)
    resources:  _:    type: akeyless:DynamicSecretLdap    get:      id: ${id}
    import {
      to = akeyless_dynamicsecretldap.example
      id = "${id}"
    }
    
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    BindDn string
    Bind DN
    BindDnPassword string
    Bind DN Password
    CustomUsernameTemplate string
    Customize how temporary usernames are generated using go template
    DeleteProtection string
    Protection from accidental deletion of this object [true/false]
    DynamicSecretLdapId string
    The ID of this resource.
    ExternalUsername string
    Externally provided username [true/false]
    FixedUserClaimKeyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    GroupDn string
    Group DN which the temporary user should be added
    HostProvider string
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    ItemCustomFields Dictionary<string, string>
    Additional custom fields to associate with the item
    LdapCaCert string
    CA Certificate File Content
    LdapUrl string
    LDAP Server URL
    Name string
    Dynamic secret name
    PasswordLength string
    The length of the password to be generated
    ProducerEncryptionKeyName string
    Dynamic producer encryption key
    ProviderType string
    Provider type
    SecureAccessCertificateIssuer string
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    SecureAccessDelay double
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    SecureAccessEnable string
    Enable/Disable secure remote access [true/false]
    SecureAccessHosts List<string>
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    SecureAccessRdGatewayServer string
    RD Gateway server
    SecureAccessRdpDomain string
    Required when the Dynamic Secret is used for a domain user
    Tags List<string>
    Add tags attached to this object
    TargetName string
    Target name
    Targets List<string>
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    TokenExpiration string
    Token expiration
    UserAttribute string
    User Attribute
    UserDn string
    User DN
    UserTtl string
    User TTL
    BindDn string
    Bind DN
    BindDnPassword string
    Bind DN Password
    CustomUsernameTemplate string
    Customize how temporary usernames are generated using go template
    DeleteProtection string
    Protection from accidental deletion of this object [true/false]
    DynamicSecretLdapId string
    The ID of this resource.
    ExternalUsername string
    Externally provided username [true/false]
    FixedUserClaimKeyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    GroupDn string
    Group DN which the temporary user should be added
    HostProvider string
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    ItemCustomFields map[string]string
    Additional custom fields to associate with the item
    LdapCaCert string
    CA Certificate File Content
    LdapUrl string
    LDAP Server URL
    Name string
    Dynamic secret name
    PasswordLength string
    The length of the password to be generated
    ProducerEncryptionKeyName string
    Dynamic producer encryption key
    ProviderType string
    Provider type
    SecureAccessCertificateIssuer string
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    SecureAccessDelay float64
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    SecureAccessEnable string
    Enable/Disable secure remote access [true/false]
    SecureAccessHosts []string
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    SecureAccessRdGatewayServer string
    RD Gateway server
    SecureAccessRdpDomain string
    Required when the Dynamic Secret is used for a domain user
    Tags []string
    Add tags attached to this object
    TargetName string
    Target name
    Targets []string
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    TokenExpiration string
    Token expiration
    UserAttribute string
    User Attribute
    UserDn string
    User DN
    UserTtl string
    User TTL
    bind_dn string
    Bind DN
    bind_dn_password string
    Bind DN Password
    custom_username_template string
    Customize how temporary usernames are generated using go template
    delete_protection string
    Protection from accidental deletion of this object [true/false]
    dynamic_secret_ldap_id string
    The ID of this resource.
    external_username string
    Externally provided username [true/false]
    fixed_user_claim_keyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    group_dn string
    Group DN which the temporary user should be added
    host_provider string
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    item_custom_fields map(string)
    Additional custom fields to associate with the item
    ldap_ca_cert string
    CA Certificate File Content
    ldap_url string
    LDAP Server URL
    name string
    Dynamic secret name
    password_length string
    The length of the password to be generated
    producer_encryption_key_name string
    Dynamic producer encryption key
    provider_type string
    Provider type
    secure_access_certificate_issuer string
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    secure_access_delay number
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secure_access_enable string
    Enable/Disable secure remote access [true/false]
    secure_access_hosts list(string)
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    secure_access_rd_gateway_server string
    RD Gateway server
    secure_access_rdp_domain string
    Required when the Dynamic Secret is used for a domain user
    tags list(string)
    Add tags attached to this object
    target_name string
    Target name
    targets list(string)
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    token_expiration string
    Token expiration
    user_attribute string
    User Attribute
    user_dn string
    User DN
    user_ttl string
    User TTL
    bindDn String
    Bind DN
    bindDnPassword String
    Bind DN Password
    customUsernameTemplate String
    Customize how temporary usernames are generated using go template
    deleteProtection String
    Protection from accidental deletion of this object [true/false]
    dynamicSecretLdapId String
    The ID of this resource.
    externalUsername String
    Externally provided username [true/false]
    fixedUserClaimKeyname String
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    groupDn String
    Group DN which the temporary user should be added
    hostProvider String
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    itemCustomFields Map<String,String>
    Additional custom fields to associate with the item
    ldapCaCert String
    CA Certificate File Content
    ldapUrl String
    LDAP Server URL
    name String
    Dynamic secret name
    passwordLength String
    The length of the password to be generated
    producerEncryptionKeyName String
    Dynamic producer encryption key
    providerType String
    Provider type
    secureAccessCertificateIssuer String
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    secureAccessDelay Double
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secureAccessEnable String
    Enable/Disable secure remote access [true/false]
    secureAccessHosts List<String>
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    secureAccessRdGatewayServer String
    RD Gateway server
    secureAccessRdpDomain String
    Required when the Dynamic Secret is used for a domain user
    tags List<String>
    Add tags attached to this object
    targetName String
    Target name
    targets List<String>
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    tokenExpiration String
    Token expiration
    userAttribute String
    User Attribute
    userDn String
    User DN
    userTtl String
    User TTL
    bindDn string
    Bind DN
    bindDnPassword string
    Bind DN Password
    customUsernameTemplate string
    Customize how temporary usernames are generated using go template
    deleteProtection string
    Protection from accidental deletion of this object [true/false]
    dynamicSecretLdapId string
    The ID of this resource.
    externalUsername string
    Externally provided username [true/false]
    fixedUserClaimKeyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    groupDn string
    Group DN which the temporary user should be added
    hostProvider string
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    itemCustomFields {[key: string]: string}
    Additional custom fields to associate with the item
    ldapCaCert string
    CA Certificate File Content
    ldapUrl string
    LDAP Server URL
    name string
    Dynamic secret name
    passwordLength string
    The length of the password to be generated
    producerEncryptionKeyName string
    Dynamic producer encryption key
    providerType string
    Provider type
    secureAccessCertificateIssuer string
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    secureAccessDelay number
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secureAccessEnable string
    Enable/Disable secure remote access [true/false]
    secureAccessHosts string[]
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    secureAccessRdGatewayServer string
    RD Gateway server
    secureAccessRdpDomain string
    Required when the Dynamic Secret is used for a domain user
    tags string[]
    Add tags attached to this object
    targetName string
    Target name
    targets string[]
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    tokenExpiration string
    Token expiration
    userAttribute string
    User Attribute
    userDn string
    User DN
    userTtl string
    User TTL
    bind_dn str
    Bind DN
    bind_dn_password str
    Bind DN Password
    custom_username_template str
    Customize how temporary usernames are generated using go template
    delete_protection str
    Protection from accidental deletion of this object [true/false]
    dynamic_secret_ldap_id str
    The ID of this resource.
    external_username str
    Externally provided username [true/false]
    fixed_user_claim_keyname str
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    group_dn str
    Group DN which the temporary user should be added
    host_provider str
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    item_custom_fields Mapping[str, str]
    Additional custom fields to associate with the item
    ldap_ca_cert str
    CA Certificate File Content
    ldap_url str
    LDAP Server URL
    name str
    Dynamic secret name
    password_length str
    The length of the password to be generated
    producer_encryption_key_name str
    Dynamic producer encryption key
    provider_type str
    Provider type
    secure_access_certificate_issuer str
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    secure_access_delay float
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secure_access_enable str
    Enable/Disable secure remote access [true/false]
    secure_access_hosts Sequence[str]
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    secure_access_rd_gateway_server str
    RD Gateway server
    secure_access_rdp_domain str
    Required when the Dynamic Secret is used for a domain user
    tags Sequence[str]
    Add tags attached to this object
    target_name str
    Target name
    targets Sequence[str]
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    token_expiration str
    Token expiration
    user_attribute str
    User Attribute
    user_dn str
    User DN
    user_ttl str
    User TTL
    bindDn String
    Bind DN
    bindDnPassword String
    Bind DN Password
    customUsernameTemplate String
    Customize how temporary usernames are generated using go template
    deleteProtection String
    Protection from accidental deletion of this object [true/false]
    dynamicSecretLdapId String
    The ID of this resource.
    externalUsername String
    Externally provided username [true/false]
    fixedUserClaimKeyname String
    For externally provided users, denotes the key-name of IdP claim to extract the username from (relevant only for external-username=true)
    groupDn String
    Group DN which the temporary user should be added
    hostProvider String
    Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret
    itemCustomFields Map<String>
    Additional custom fields to associate with the item
    ldapCaCert String
    CA Certificate File Content
    ldapUrl String
    LDAP Server URL
    name String
    Dynamic secret name
    passwordLength String
    The length of the password to be generated
    producerEncryptionKeyName String
    Dynamic producer encryption key
    providerType String
    Provider type
    secureAccessCertificateIssuer String
    Path to the SSH Certificate Issuer for your Akeyless Secure Access
    secureAccessDelay Number
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secureAccessEnable String
    Enable/Disable secure remote access [true/false]
    secureAccessHosts List<String>
    Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers)
    secureAccessRdGatewayServer String
    RD Gateway server
    secureAccessRdpDomain String
    Required when the Dynamic Secret is used for a domain user
    tags List<String>
    Add tags attached to this object
    targetName String
    Target name
    targets List<String>
    A list of linked targets to be associated, Relevant only for Secure Remote Access for ssh cert issuer, ldap rotated secret and ldap dynamic secret, To specify multiple targets use argument multiple times
    tokenExpiration String
    Token expiration
    userAttribute String
    User Attribute
    userDn String
    User DN
    userTtl String
    User TTL

    Package Details

    Repository
    akeyless akeyless-community/terraform-provider-akeyless
    License
    Notes
    This Pulumi package is based on the akeyless Terraform Provider.
    Viewing docs for akeyless 2.0.1
    published on Monday, Apr 27, 2026 by akeyless-community
      Try Pulumi Cloud free. Your team will thank you.