azure-native.netapp.Account
Explore with Pulumi AI
NetApp account resource Azure REST API version: 2022-11-01. Prior API version in Azure Native 1.x: 2020-12-01.
Other available API versions: 2022-05-01, 2022-11-01-preview, 2023-05-01, 2023-05-01-preview, 2023-07-01, 2023-07-01-preview, 2023-11-01, 2023-11-01-preview, 2024-01-01, 2024-03-01, 2024-03-01-preview, 2024-05-01, 2024-05-01-preview, 2024-07-01, 2024-07-01-preview.
Example Usage
Accounts_CreateOrUpdate
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var account = new AzureNative.NetApp.Account("account", new()
{
AccountName = "account1",
Location = "eastus",
ResourceGroupName = "myRG",
});
});
package main
import (
netapp "github.com/pulumi/pulumi-azure-native-sdk/netapp/v2"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := netapp.NewAccount(ctx, "account", &netapp.AccountArgs{
AccountName: pulumi.String("account1"),
Location: pulumi.String("eastus"),
ResourceGroupName: pulumi.String("myRG"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.netapp.Account;
import com.pulumi.azurenative.netapp.AccountArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var account = new Account("account", AccountArgs.builder()
.accountName("account1")
.location("eastus")
.resourceGroupName("myRG")
.build());
}
}
import pulumi
import pulumi_azure_native as azure_native
account = azure_native.netapp.Account("account",
account_name="account1",
location="eastus",
resource_group_name="myRG")
import * as pulumi from "@pulumi/pulumi";
import * as azure_native from "@pulumi/azure-native";
const account = new azure_native.netapp.Account("account", {
accountName: "account1",
location: "eastus",
resourceGroupName: "myRG",
});
resources:
account:
type: azure-native:netapp:Account
properties:
accountName: account1
location: eastus
resourceGroupName: myRG
Accounts_CreateOrUpdateWithActiveDirectory
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using AzureNative = Pulumi.AzureNative;
return await Deployment.RunAsync(() =>
{
var account = new AzureNative.NetApp.Account("account", new()
{
AccountName = "account1",
ActiveDirectories = new[]
{
new AzureNative.NetApp.Inputs.ActiveDirectoryArgs
{
AesEncryption = true,
Dns = "10.10.10.3",
Domain = "10.10.10.3",
LdapOverTLS = false,
LdapSigning = false,
OrganizationalUnit = "OU=Engineering",
Password = "ad_password",
Site = "SiteName",
SmbServerName = "SMBServer",
Username = "ad_user_name",
},
},
Location = "eastus",
ResourceGroupName = "myRG",
});
});
package main
import (
netapp "github.com/pulumi/pulumi-azure-native-sdk/netapp/v2"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := netapp.NewAccount(ctx, "account", &netapp.AccountArgs{
AccountName: pulumi.String("account1"),
ActiveDirectories: netapp.ActiveDirectoryArray{
&netapp.ActiveDirectoryArgs{
AesEncryption: pulumi.Bool(true),
Dns: pulumi.String("10.10.10.3"),
Domain: pulumi.String("10.10.10.3"),
LdapOverTLS: pulumi.Bool(false),
LdapSigning: pulumi.Bool(false),
OrganizationalUnit: pulumi.String("OU=Engineering"),
Password: pulumi.String("ad_password"),
Site: pulumi.String("SiteName"),
SmbServerName: pulumi.String("SMBServer"),
Username: pulumi.String("ad_user_name"),
},
},
Location: pulumi.String("eastus"),
ResourceGroupName: pulumi.String("myRG"),
})
if err != nil {
return err
}
return nil
})
}
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azurenative.netapp.Account;
import com.pulumi.azurenative.netapp.AccountArgs;
import com.pulumi.azurenative.netapp.inputs.ActiveDirectoryArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var account = new Account("account", AccountArgs.builder()
.accountName("account1")
.activeDirectories(ActiveDirectoryArgs.builder()
.aesEncryption(true)
.dns("10.10.10.3")
.domain("10.10.10.3")
.ldapOverTLS(false)
.ldapSigning(false)
.organizationalUnit("OU=Engineering")
.password("ad_password")
.site("SiteName")
.smbServerName("SMBServer")
.username("ad_user_name")
.build())
.location("eastus")
.resourceGroupName("myRG")
.build());
}
}
import pulumi
import pulumi_azure_native as azure_native
account = azure_native.netapp.Account("account",
account_name="account1",
active_directories=[{
"aes_encryption": True,
"dns": "10.10.10.3",
"domain": "10.10.10.3",
"ldap_over_tls": False,
"ldap_signing": False,
"organizational_unit": "OU=Engineering",
"password": "ad_password",
"site": "SiteName",
"smb_server_name": "SMBServer",
"username": "ad_user_name",
}],
location="eastus",
resource_group_name="myRG")
import * as pulumi from "@pulumi/pulumi";
import * as azure_native from "@pulumi/azure-native";
const account = new azure_native.netapp.Account("account", {
accountName: "account1",
activeDirectories: [{
aesEncryption: true,
dns: "10.10.10.3",
domain: "10.10.10.3",
ldapOverTLS: false,
ldapSigning: false,
organizationalUnit: "OU=Engineering",
password: "ad_password",
site: "SiteName",
smbServerName: "SMBServer",
username: "ad_user_name",
}],
location: "eastus",
resourceGroupName: "myRG",
});
resources:
account:
type: azure-native:netapp:Account
properties:
accountName: account1
activeDirectories:
- aesEncryption: true
dns: 10.10.10.3
domain: 10.10.10.3
ldapOverTLS: false
ldapSigning: false
organizationalUnit: OU=Engineering
password: ad_password
site: SiteName
smbServerName: SMBServer
username: ad_user_name
location: eastus
resourceGroupName: myRG
Create Account Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Account(name: string, args: AccountArgs, opts?: CustomResourceOptions);
@overload
def Account(resource_name: str,
args: AccountArgs,
opts: Optional[ResourceOptions] = None)
@overload
def Account(resource_name: str,
opts: Optional[ResourceOptions] = None,
resource_group_name: Optional[str] = None,
account_name: Optional[str] = None,
active_directories: Optional[Sequence[ActiveDirectoryArgs]] = None,
encryption: Optional[AccountEncryptionArgs] = None,
identity: Optional[ManagedServiceIdentityArgs] = None,
location: Optional[str] = None,
tags: Optional[Mapping[str, str]] = None)
func NewAccount(ctx *Context, name string, args AccountArgs, opts ...ResourceOption) (*Account, error)
public Account(string name, AccountArgs args, CustomResourceOptions? opts = null)
public Account(String name, AccountArgs args)
public Account(String name, AccountArgs args, CustomResourceOptions options)
type: azure-native:netapp:Account
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AccountArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var exampleaccountResourceResourceFromNetapp = new AzureNative.NetApp.Account("exampleaccountResourceResourceFromNetapp", new()
{
ResourceGroupName = "string",
AccountName = "string",
ActiveDirectories = new[]
{
new AzureNative.NetApp.Inputs.ActiveDirectoryArgs
{
ActiveDirectoryId = "string",
AdName = "string",
Administrators = new[]
{
"string",
},
AesEncryption = false,
AllowLocalNfsUsersWithLdap = false,
BackupOperators = new[]
{
"string",
},
Dns = "string",
Domain = "string",
EncryptDCConnections = false,
KdcIP = "string",
LdapOverTLS = false,
LdapSearchScope = new AzureNative.NetApp.Inputs.LdapSearchScopeOptArgs
{
GroupDN = "string",
GroupMembershipFilter = "string",
UserDN = "string",
},
LdapSigning = false,
OrganizationalUnit = "string",
Password = "string",
PreferredServersForLdapClient = "string",
SecurityOperators = new[]
{
"string",
},
ServerRootCACertificate = "string",
Site = "string",
SmbServerName = "string",
Username = "string",
},
},
Encryption = new AzureNative.NetApp.Inputs.AccountEncryptionArgs
{
Identity = new AzureNative.NetApp.Inputs.EncryptionIdentityArgs
{
UserAssignedIdentity = "string",
},
KeySource = "string",
KeyVaultProperties = new AzureNative.NetApp.Inputs.KeyVaultPropertiesArgs
{
KeyName = "string",
KeyVaultResourceId = "string",
KeyVaultUri = "string",
},
},
Identity = new AzureNative.NetApp.Inputs.ManagedServiceIdentityArgs
{
Type = "string",
UserAssignedIdentities = new[]
{
"string",
},
},
Location = "string",
Tags =
{
{ "string", "string" },
},
});
example, err := netapp.NewAccount(ctx, "exampleaccountResourceResourceFromNetapp", &netapp.AccountArgs{
ResourceGroupName: pulumi.String("string"),
AccountName: pulumi.String("string"),
ActiveDirectories: netapp.ActiveDirectoryArray{
&netapp.ActiveDirectoryArgs{
ActiveDirectoryId: pulumi.String("string"),
AdName: pulumi.String("string"),
Administrators: pulumi.StringArray{
pulumi.String("string"),
},
AesEncryption: pulumi.Bool(false),
AllowLocalNfsUsersWithLdap: pulumi.Bool(false),
BackupOperators: pulumi.StringArray{
pulumi.String("string"),
},
Dns: pulumi.String("string"),
Domain: pulumi.String("string"),
EncryptDCConnections: pulumi.Bool(false),
KdcIP: pulumi.String("string"),
LdapOverTLS: pulumi.Bool(false),
LdapSearchScope: &netapp.LdapSearchScopeOptArgs{
GroupDN: pulumi.String("string"),
GroupMembershipFilter: pulumi.String("string"),
UserDN: pulumi.String("string"),
},
LdapSigning: pulumi.Bool(false),
OrganizationalUnit: pulumi.String("string"),
Password: pulumi.String("string"),
PreferredServersForLdapClient: pulumi.String("string"),
SecurityOperators: pulumi.StringArray{
pulumi.String("string"),
},
ServerRootCACertificate: pulumi.String("string"),
Site: pulumi.String("string"),
SmbServerName: pulumi.String("string"),
Username: pulumi.String("string"),
},
},
Encryption: &netapp.AccountEncryptionArgs{
Identity: &netapp.EncryptionIdentityArgs{
UserAssignedIdentity: pulumi.String("string"),
},
KeySource: pulumi.String("string"),
KeyVaultProperties: &netapp.KeyVaultPropertiesArgs{
KeyName: pulumi.String("string"),
KeyVaultResourceId: pulumi.String("string"),
KeyVaultUri: pulumi.String("string"),
},
},
Identity: &netapp.ManagedServiceIdentityArgs{
Type: pulumi.String("string"),
UserAssignedIdentities: pulumi.StringArray{
pulumi.String("string"),
},
},
Location: pulumi.String("string"),
Tags: pulumi.StringMap{
"string": pulumi.String("string"),
},
})
var exampleaccountResourceResourceFromNetapp = new Account("exampleaccountResourceResourceFromNetapp", AccountArgs.builder()
.resourceGroupName("string")
.accountName("string")
.activeDirectories(ActiveDirectoryArgs.builder()
.activeDirectoryId("string")
.adName("string")
.administrators("string")
.aesEncryption(false)
.allowLocalNfsUsersWithLdap(false)
.backupOperators("string")
.dns("string")
.domain("string")
.encryptDCConnections(false)
.kdcIP("string")
.ldapOverTLS(false)
.ldapSearchScope(LdapSearchScopeOptArgs.builder()
.groupDN("string")
.groupMembershipFilter("string")
.userDN("string")
.build())
.ldapSigning(false)
.organizationalUnit("string")
.password("string")
.preferredServersForLdapClient("string")
.securityOperators("string")
.serverRootCACertificate("string")
.site("string")
.smbServerName("string")
.username("string")
.build())
.encryption(AccountEncryptionArgs.builder()
.identity(EncryptionIdentityArgs.builder()
.userAssignedIdentity("string")
.build())
.keySource("string")
.keyVaultProperties(KeyVaultPropertiesArgs.builder()
.keyName("string")
.keyVaultResourceId("string")
.keyVaultUri("string")
.build())
.build())
.identity(ManagedServiceIdentityArgs.builder()
.type("string")
.userAssignedIdentities("string")
.build())
.location("string")
.tags(Map.of("string", "string"))
.build());
exampleaccount_resource_resource_from_netapp = azure_native.netapp.Account("exampleaccountResourceResourceFromNetapp",
resource_group_name="string",
account_name="string",
active_directories=[{
"active_directory_id": "string",
"ad_name": "string",
"administrators": ["string"],
"aes_encryption": False,
"allow_local_nfs_users_with_ldap": False,
"backup_operators": ["string"],
"dns": "string",
"domain": "string",
"encrypt_dc_connections": False,
"kdc_ip": "string",
"ldap_over_tls": False,
"ldap_search_scope": {
"group_dn": "string",
"group_membership_filter": "string",
"user_dn": "string",
},
"ldap_signing": False,
"organizational_unit": "string",
"password": "string",
"preferred_servers_for_ldap_client": "string",
"security_operators": ["string"],
"server_root_ca_certificate": "string",
"site": "string",
"smb_server_name": "string",
"username": "string",
}],
encryption={
"identity": {
"user_assigned_identity": "string",
},
"key_source": "string",
"key_vault_properties": {
"key_name": "string",
"key_vault_resource_id": "string",
"key_vault_uri": "string",
},
},
identity={
"type": "string",
"user_assigned_identities": ["string"],
},
location="string",
tags={
"string": "string",
})
const exampleaccountResourceResourceFromNetapp = new azure_native.netapp.Account("exampleaccountResourceResourceFromNetapp", {
resourceGroupName: "string",
accountName: "string",
activeDirectories: [{
activeDirectoryId: "string",
adName: "string",
administrators: ["string"],
aesEncryption: false,
allowLocalNfsUsersWithLdap: false,
backupOperators: ["string"],
dns: "string",
domain: "string",
encryptDCConnections: false,
kdcIP: "string",
ldapOverTLS: false,
ldapSearchScope: {
groupDN: "string",
groupMembershipFilter: "string",
userDN: "string",
},
ldapSigning: false,
organizationalUnit: "string",
password: "string",
preferredServersForLdapClient: "string",
securityOperators: ["string"],
serverRootCACertificate: "string",
site: "string",
smbServerName: "string",
username: "string",
}],
encryption: {
identity: {
userAssignedIdentity: "string",
},
keySource: "string",
keyVaultProperties: {
keyName: "string",
keyVaultResourceId: "string",
keyVaultUri: "string",
},
},
identity: {
type: "string",
userAssignedIdentities: ["string"],
},
location: "string",
tags: {
string: "string",
},
});
type: azure-native:netapp:Account
properties:
accountName: string
activeDirectories:
- activeDirectoryId: string
adName: string
administrators:
- string
aesEncryption: false
allowLocalNfsUsersWithLdap: false
backupOperators:
- string
dns: string
domain: string
encryptDCConnections: false
kdcIP: string
ldapOverTLS: false
ldapSearchScope:
groupDN: string
groupMembershipFilter: string
userDN: string
ldapSigning: false
organizationalUnit: string
password: string
preferredServersForLdapClient: string
securityOperators:
- string
serverRootCACertificate: string
site: string
smbServerName: string
username: string
encryption:
identity:
userAssignedIdentity: string
keySource: string
keyVaultProperties:
keyName: string
keyVaultResourceId: string
keyVaultUri: string
identity:
type: string
userAssignedIdentities:
- string
location: string
resourceGroupName: string
tags:
string: string
Account Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Account resource accepts the following input properties:
- Resource
Group stringName - The name of the resource group. The name is case insensitive.
- Account
Name string - The name of the NetApp account
- Active
Directories List<Pulumi.Azure Native. Net App. Inputs. Active Directory> - Active Directories
- Encryption
Pulumi.
Azure Native. Net App. Inputs. Account Encryption - Encryption settings
- Identity
Pulumi.
Azure Native. Net App. Inputs. Managed Service Identity - The identity used for the resource.
- Location string
- The geo-location where the resource lives
- Dictionary<string, string>
- Resource tags.
- Resource
Group stringName - The name of the resource group. The name is case insensitive.
- Account
Name string - The name of the NetApp account
- Active
Directories []ActiveDirectory Args - Active Directories
- Encryption
Account
Encryption Args - Encryption settings
- Identity
Managed
Service Identity Args - The identity used for the resource.
- Location string
- The geo-location where the resource lives
- map[string]string
- Resource tags.
- resource
Group StringName - The name of the resource group. The name is case insensitive.
- account
Name String - The name of the NetApp account
- active
Directories List<ActiveDirectory> - Active Directories
- encryption
Account
Encryption - Encryption settings
- identity
Managed
Service Identity - The identity used for the resource.
- location String
- The geo-location where the resource lives
- Map<String,String>
- Resource tags.
- resource
Group stringName - The name of the resource group. The name is case insensitive.
- account
Name string - The name of the NetApp account
- active
Directories ActiveDirectory[] - Active Directories
- encryption
Account
Encryption - Encryption settings
- identity
Managed
Service Identity - The identity used for the resource.
- location string
- The geo-location where the resource lives
- {[key: string]: string}
- Resource tags.
- resource_
group_ strname - The name of the resource group. The name is case insensitive.
- account_
name str - The name of the NetApp account
- active_
directories Sequence[ActiveDirectory Args] - Active Directories
- encryption
Account
Encryption Args - Encryption settings
- identity
Managed
Service Identity Args - The identity used for the resource.
- location str
- The geo-location where the resource lives
- Mapping[str, str]
- Resource tags.
- resource
Group StringName - The name of the resource group. The name is case insensitive.
- account
Name String - The name of the NetApp account
- active
Directories List<Property Map> - Active Directories
- encryption Property Map
- Encryption settings
- identity Property Map
- The identity used for the resource.
- location String
- The geo-location where the resource lives
- Map<String>
- Resource tags.
Outputs
All input properties are implicitly available as output properties. Additionally, the Account resource produces the following output properties:
- Disable
Showmount bool - Shows the status of disableShowmount for all volumes under the subscription, null equals false
- Etag string
- A unique read-only string that changes whenever the resource is updated.
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- The name of the resource
- Provisioning
State string - Azure lifecycle management
- System
Data Pulumi.Azure Native. Net App. Outputs. System Data Response - Azure Resource Manager metadata containing createdBy and modifiedBy information.
- Type string
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- Disable
Showmount bool - Shows the status of disableShowmount for all volumes under the subscription, null equals false
- Etag string
- A unique read-only string that changes whenever the resource is updated.
- Id string
- The provider-assigned unique ID for this managed resource.
- Name string
- The name of the resource
- Provisioning
State string - Azure lifecycle management
- System
Data SystemData Response - Azure Resource Manager metadata containing createdBy and modifiedBy information.
- Type string
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- disable
Showmount Boolean - Shows the status of disableShowmount for all volumes under the subscription, null equals false
- etag String
- A unique read-only string that changes whenever the resource is updated.
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- The name of the resource
- provisioning
State String - Azure lifecycle management
- system
Data SystemData Response - Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type String
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- disable
Showmount boolean - Shows the status of disableShowmount for all volumes under the subscription, null equals false
- etag string
- A unique read-only string that changes whenever the resource is updated.
- id string
- The provider-assigned unique ID for this managed resource.
- name string
- The name of the resource
- provisioning
State string - Azure lifecycle management
- system
Data SystemData Response - Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type string
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- disable_
showmount bool - Shows the status of disableShowmount for all volumes under the subscription, null equals false
- etag str
- A unique read-only string that changes whenever the resource is updated.
- id str
- The provider-assigned unique ID for this managed resource.
- name str
- The name of the resource
- provisioning_
state str - Azure lifecycle management
- system_
data SystemData Response - Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type str
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
- disable
Showmount Boolean - Shows the status of disableShowmount for all volumes under the subscription, null equals false
- etag String
- A unique read-only string that changes whenever the resource is updated.
- id String
- The provider-assigned unique ID for this managed resource.
- name String
- The name of the resource
- provisioning
State String - Azure lifecycle management
- system
Data Property Map - Azure Resource Manager metadata containing createdBy and modifiedBy information.
- type String
- The type of the resource. E.g. "Microsoft.Compute/virtualMachines" or "Microsoft.Storage/storageAccounts"
Supporting Types
AccountEncryption, AccountEncryptionArgs
- Identity
Pulumi.
Azure Native. Net App. Inputs. Encryption Identity - Identity used to authenticate to KeyVault. Applicable if keySource is 'Microsoft.KeyVault'.
- Key
Source string | Pulumi.Azure Native. Net App. Key Source - The encryption keySource (provider). Possible values (case-insensitive): Microsoft.NetApp, Microsoft.KeyVault
- Key
Vault Pulumi.Properties Azure Native. Net App. Inputs. Key Vault Properties - Properties provided by KeVault. Applicable if keySource is 'Microsoft.KeyVault'.
- Identity
Encryption
Identity - Identity used to authenticate to KeyVault. Applicable if keySource is 'Microsoft.KeyVault'.
- Key
Source string | KeySource - The encryption keySource (provider). Possible values (case-insensitive): Microsoft.NetApp, Microsoft.KeyVault
- Key
Vault KeyProperties Vault Properties - Properties provided by KeVault. Applicable if keySource is 'Microsoft.KeyVault'.
- identity
Encryption
Identity - Identity used to authenticate to KeyVault. Applicable if keySource is 'Microsoft.KeyVault'.
- key
Source String | KeySource - The encryption keySource (provider). Possible values (case-insensitive): Microsoft.NetApp, Microsoft.KeyVault
- key
Vault KeyProperties Vault Properties - Properties provided by KeVault. Applicable if keySource is 'Microsoft.KeyVault'.
- identity
Encryption
Identity - Identity used to authenticate to KeyVault. Applicable if keySource is 'Microsoft.KeyVault'.
- key
Source string | KeySource - The encryption keySource (provider). Possible values (case-insensitive): Microsoft.NetApp, Microsoft.KeyVault
- key
Vault KeyProperties Vault Properties - Properties provided by KeVault. Applicable if keySource is 'Microsoft.KeyVault'.
- identity
Encryption
Identity - Identity used to authenticate to KeyVault. Applicable if keySource is 'Microsoft.KeyVault'.
- key_
source str | KeySource - The encryption keySource (provider). Possible values (case-insensitive): Microsoft.NetApp, Microsoft.KeyVault
- key_
vault_ Keyproperties Vault Properties - Properties provided by KeVault. Applicable if keySource is 'Microsoft.KeyVault'.
- identity Property Map
- Identity used to authenticate to KeyVault. Applicable if keySource is 'Microsoft.KeyVault'.
- key
Source String | "Microsoft.Net App" | "Microsoft. Key Vault" - The encryption keySource (provider). Possible values (case-insensitive): Microsoft.NetApp, Microsoft.KeyVault
- key
Vault Property MapProperties - Properties provided by KeVault. Applicable if keySource is 'Microsoft.KeyVault'.
AccountEncryptionResponse, AccountEncryptionResponseArgs
- Identity
Pulumi.
Azure Native. Net App. Inputs. Encryption Identity Response - Identity used to authenticate to KeyVault. Applicable if keySource is 'Microsoft.KeyVault'.
- Key
Source string - The encryption keySource (provider). Possible values (case-insensitive): Microsoft.NetApp, Microsoft.KeyVault
- Key
Vault Pulumi.Properties Azure Native. Net App. Inputs. Key Vault Properties Response - Properties provided by KeVault. Applicable if keySource is 'Microsoft.KeyVault'.
- Identity
Encryption
Identity Response - Identity used to authenticate to KeyVault. Applicable if keySource is 'Microsoft.KeyVault'.
- Key
Source string - The encryption keySource (provider). Possible values (case-insensitive): Microsoft.NetApp, Microsoft.KeyVault
- Key
Vault KeyProperties Vault Properties Response - Properties provided by KeVault. Applicable if keySource is 'Microsoft.KeyVault'.
- identity
Encryption
Identity Response - Identity used to authenticate to KeyVault. Applicable if keySource is 'Microsoft.KeyVault'.
- key
Source String - The encryption keySource (provider). Possible values (case-insensitive): Microsoft.NetApp, Microsoft.KeyVault
- key
Vault KeyProperties Vault Properties Response - Properties provided by KeVault. Applicable if keySource is 'Microsoft.KeyVault'.
- identity
Encryption
Identity Response - Identity used to authenticate to KeyVault. Applicable if keySource is 'Microsoft.KeyVault'.
- key
Source string - The encryption keySource (provider). Possible values (case-insensitive): Microsoft.NetApp, Microsoft.KeyVault
- key
Vault KeyProperties Vault Properties Response - Properties provided by KeVault. Applicable if keySource is 'Microsoft.KeyVault'.
- identity
Encryption
Identity Response - Identity used to authenticate to KeyVault. Applicable if keySource is 'Microsoft.KeyVault'.
- key_
source str - The encryption keySource (provider). Possible values (case-insensitive): Microsoft.NetApp, Microsoft.KeyVault
- key_
vault_ Keyproperties Vault Properties Response - Properties provided by KeVault. Applicable if keySource is 'Microsoft.KeyVault'.
- identity Property Map
- Identity used to authenticate to KeyVault. Applicable if keySource is 'Microsoft.KeyVault'.
- key
Source String - The encryption keySource (provider). Possible values (case-insensitive): Microsoft.NetApp, Microsoft.KeyVault
- key
Vault Property MapProperties - Properties provided by KeVault. Applicable if keySource is 'Microsoft.KeyVault'.
ActiveDirectory, ActiveDirectoryArgs
- Active
Directory stringId - Id of the Active Directory
- Ad
Name string - Name of the active directory machine. This optional parameter is used only while creating kerberos volume
- Administrators List<string>
- Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
- Aes
Encryption bool - If enabled, AES encryption will be enabled for SMB communication.
- Allow
Local boolNfs Users With Ldap - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
- Backup
Operators List<string> - Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
- Dns string
- Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
- Domain string
- Name of the Active Directory domain
- Encrypt
DCConnections bool - If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
- Kdc
IP string - kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
- Ldap
Over boolTLS - Specifies whether or not the LDAP traffic needs to be secured via TLS.
- Ldap
Search Pulumi.Scope Azure Native. Net App. Inputs. Ldap Search Scope Opt - LDAP Search scope options
- Ldap
Signing bool - Specifies whether or not the LDAP traffic needs to be signed.
- Organizational
Unit string - The Organizational Unit (OU) within the Windows Active Directory
- Password string
- Plain text password of Active Directory domain administrator, value is masked in the response
- Preferred
Servers stringFor Ldap Client - Comma separated list of IPv4 addresses of preferred servers for LDAP client. At most two comma separated IPv4 addresses can be passed.
- Security
Operators List<string> - Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
- Server
Root stringCACertificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
- Site string
- The Active Directory site the service will limit Domain Controller discovery to
- Smb
Server stringName - NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
- Username string
- A domain user account with permission to create machine accounts
- Active
Directory stringId - Id of the Active Directory
- Ad
Name string - Name of the active directory machine. This optional parameter is used only while creating kerberos volume
- Administrators []string
- Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
- Aes
Encryption bool - If enabled, AES encryption will be enabled for SMB communication.
- Allow
Local boolNfs Users With Ldap - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
- Backup
Operators []string - Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
- Dns string
- Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
- Domain string
- Name of the Active Directory domain
- Encrypt
DCConnections bool - If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
- Kdc
IP string - kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
- Ldap
Over boolTLS - Specifies whether or not the LDAP traffic needs to be secured via TLS.
- Ldap
Search LdapScope Search Scope Opt - LDAP Search scope options
- Ldap
Signing bool - Specifies whether or not the LDAP traffic needs to be signed.
- Organizational
Unit string - The Organizational Unit (OU) within the Windows Active Directory
- Password string
- Plain text password of Active Directory domain administrator, value is masked in the response
- Preferred
Servers stringFor Ldap Client - Comma separated list of IPv4 addresses of preferred servers for LDAP client. At most two comma separated IPv4 addresses can be passed.
- Security
Operators []string - Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
- Server
Root stringCACertificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
- Site string
- The Active Directory site the service will limit Domain Controller discovery to
- Smb
Server stringName - NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
- Username string
- A domain user account with permission to create machine accounts
- active
Directory StringId - Id of the Active Directory
- ad
Name String - Name of the active directory machine. This optional parameter is used only while creating kerberos volume
- administrators List<String>
- Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
- aes
Encryption Boolean - If enabled, AES encryption will be enabled for SMB communication.
- allow
Local BooleanNfs Users With Ldap - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
- backup
Operators List<String> - Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
- dns String
- Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
- domain String
- Name of the Active Directory domain
- encrypt
DCConnections Boolean - If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
- kdc
IP String - kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
- ldap
Over BooleanTLS - Specifies whether or not the LDAP traffic needs to be secured via TLS.
- ldap
Search LdapScope Search Scope Opt - LDAP Search scope options
- ldap
Signing Boolean - Specifies whether or not the LDAP traffic needs to be signed.
- organizational
Unit String - The Organizational Unit (OU) within the Windows Active Directory
- password String
- Plain text password of Active Directory domain administrator, value is masked in the response
- preferred
Servers StringFor Ldap Client - Comma separated list of IPv4 addresses of preferred servers for LDAP client. At most two comma separated IPv4 addresses can be passed.
- security
Operators List<String> - Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
- server
Root StringCACertificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
- site String
- The Active Directory site the service will limit Domain Controller discovery to
- smb
Server StringName - NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
- username String
- A domain user account with permission to create machine accounts
- active
Directory stringId - Id of the Active Directory
- ad
Name string - Name of the active directory machine. This optional parameter is used only while creating kerberos volume
- administrators string[]
- Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
- aes
Encryption boolean - If enabled, AES encryption will be enabled for SMB communication.
- allow
Local booleanNfs Users With Ldap - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
- backup
Operators string[] - Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
- dns string
- Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
- domain string
- Name of the Active Directory domain
- encrypt
DCConnections boolean - If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
- kdc
IP string - kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
- ldap
Over booleanTLS - Specifies whether or not the LDAP traffic needs to be secured via TLS.
- ldap
Search LdapScope Search Scope Opt - LDAP Search scope options
- ldap
Signing boolean - Specifies whether or not the LDAP traffic needs to be signed.
- organizational
Unit string - The Organizational Unit (OU) within the Windows Active Directory
- password string
- Plain text password of Active Directory domain administrator, value is masked in the response
- preferred
Servers stringFor Ldap Client - Comma separated list of IPv4 addresses of preferred servers for LDAP client. At most two comma separated IPv4 addresses can be passed.
- security
Operators string[] - Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
- server
Root stringCACertificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
- site string
- The Active Directory site the service will limit Domain Controller discovery to
- smb
Server stringName - NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
- username string
- A domain user account with permission to create machine accounts
- active_
directory_ strid - Id of the Active Directory
- ad_
name str - Name of the active directory machine. This optional parameter is used only while creating kerberos volume
- administrators Sequence[str]
- Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
- aes_
encryption bool - If enabled, AES encryption will be enabled for SMB communication.
- allow_
local_ boolnfs_ users_ with_ ldap - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
- backup_
operators Sequence[str] - Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
- dns str
- Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
- domain str
- Name of the Active Directory domain
- encrypt_
dc_ boolconnections - If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
- kdc_
ip str - kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
- ldap_
over_ booltls - Specifies whether or not the LDAP traffic needs to be secured via TLS.
- ldap_
search_ Ldapscope Search Scope Opt - LDAP Search scope options
- ldap_
signing bool - Specifies whether or not the LDAP traffic needs to be signed.
- organizational_
unit str - The Organizational Unit (OU) within the Windows Active Directory
- password str
- Plain text password of Active Directory domain administrator, value is masked in the response
- preferred_
servers_ strfor_ ldap_ client - Comma separated list of IPv4 addresses of preferred servers for LDAP client. At most two comma separated IPv4 addresses can be passed.
- security_
operators Sequence[str] - Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
- server_
root_ strca_ certificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
- site str
- The Active Directory site the service will limit Domain Controller discovery to
- smb_
server_ strname - NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
- username str
- A domain user account with permission to create machine accounts
- active
Directory StringId - Id of the Active Directory
- ad
Name String - Name of the active directory machine. This optional parameter is used only while creating kerberos volume
- administrators List<String>
- Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
- aes
Encryption Boolean - If enabled, AES encryption will be enabled for SMB communication.
- allow
Local BooleanNfs Users With Ldap - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
- backup
Operators List<String> - Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
- dns String
- Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
- domain String
- Name of the Active Directory domain
- encrypt
DCConnections Boolean - If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
- kdc
IP String - kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
- ldap
Over BooleanTLS - Specifies whether or not the LDAP traffic needs to be secured via TLS.
- ldap
Search Property MapScope - LDAP Search scope options
- ldap
Signing Boolean - Specifies whether or not the LDAP traffic needs to be signed.
- organizational
Unit String - The Organizational Unit (OU) within the Windows Active Directory
- password String
- Plain text password of Active Directory domain administrator, value is masked in the response
- preferred
Servers StringFor Ldap Client - Comma separated list of IPv4 addresses of preferred servers for LDAP client. At most two comma separated IPv4 addresses can be passed.
- security
Operators List<String> - Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
- server
Root StringCACertificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
- site String
- The Active Directory site the service will limit Domain Controller discovery to
- smb
Server StringName - NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
- username String
- A domain user account with permission to create machine accounts
ActiveDirectoryResponse, ActiveDirectoryResponseArgs
- Status string
- Status of the Active Directory
- Status
Details string - Any details in regards to the Status of the Active Directory
- Active
Directory stringId - Id of the Active Directory
- Ad
Name string - Name of the active directory machine. This optional parameter is used only while creating kerberos volume
- Administrators List<string>
- Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
- Aes
Encryption bool - If enabled, AES encryption will be enabled for SMB communication.
- Allow
Local boolNfs Users With Ldap - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
- Backup
Operators List<string> - Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
- Dns string
- Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
- Domain string
- Name of the Active Directory domain
- Encrypt
DCConnections bool - If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
- Kdc
IP string - kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
- Ldap
Over boolTLS - Specifies whether or not the LDAP traffic needs to be secured via TLS.
- Ldap
Search Pulumi.Scope Azure Native. Net App. Inputs. Ldap Search Scope Opt Response - LDAP Search scope options
- Ldap
Signing bool - Specifies whether or not the LDAP traffic needs to be signed.
- Organizational
Unit string - The Organizational Unit (OU) within the Windows Active Directory
- Password string
- Plain text password of Active Directory domain administrator, value is masked in the response
- Preferred
Servers stringFor Ldap Client - Comma separated list of IPv4 addresses of preferred servers for LDAP client. At most two comma separated IPv4 addresses can be passed.
- Security
Operators List<string> - Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
- Server
Root stringCACertificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
- Site string
- The Active Directory site the service will limit Domain Controller discovery to
- Smb
Server stringName - NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
- Username string
- A domain user account with permission to create machine accounts
- Status string
- Status of the Active Directory
- Status
Details string - Any details in regards to the Status of the Active Directory
- Active
Directory stringId - Id of the Active Directory
- Ad
Name string - Name of the active directory machine. This optional parameter is used only while creating kerberos volume
- Administrators []string
- Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
- Aes
Encryption bool - If enabled, AES encryption will be enabled for SMB communication.
- Allow
Local boolNfs Users With Ldap - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
- Backup
Operators []string - Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
- Dns string
- Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
- Domain string
- Name of the Active Directory domain
- Encrypt
DCConnections bool - If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
- Kdc
IP string - kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
- Ldap
Over boolTLS - Specifies whether or not the LDAP traffic needs to be secured via TLS.
- Ldap
Search LdapScope Search Scope Opt Response - LDAP Search scope options
- Ldap
Signing bool - Specifies whether or not the LDAP traffic needs to be signed.
- Organizational
Unit string - The Organizational Unit (OU) within the Windows Active Directory
- Password string
- Plain text password of Active Directory domain administrator, value is masked in the response
- Preferred
Servers stringFor Ldap Client - Comma separated list of IPv4 addresses of preferred servers for LDAP client. At most two comma separated IPv4 addresses can be passed.
- Security
Operators []string - Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
- Server
Root stringCACertificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
- Site string
- The Active Directory site the service will limit Domain Controller discovery to
- Smb
Server stringName - NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
- Username string
- A domain user account with permission to create machine accounts
- status String
- Status of the Active Directory
- status
Details String - Any details in regards to the Status of the Active Directory
- active
Directory StringId - Id of the Active Directory
- ad
Name String - Name of the active directory machine. This optional parameter is used only while creating kerberos volume
- administrators List<String>
- Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
- aes
Encryption Boolean - If enabled, AES encryption will be enabled for SMB communication.
- allow
Local BooleanNfs Users With Ldap - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
- backup
Operators List<String> - Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
- dns String
- Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
- domain String
- Name of the Active Directory domain
- encrypt
DCConnections Boolean - If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
- kdc
IP String - kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
- ldap
Over BooleanTLS - Specifies whether or not the LDAP traffic needs to be secured via TLS.
- ldap
Search LdapScope Search Scope Opt Response - LDAP Search scope options
- ldap
Signing Boolean - Specifies whether or not the LDAP traffic needs to be signed.
- organizational
Unit String - The Organizational Unit (OU) within the Windows Active Directory
- password String
- Plain text password of Active Directory domain administrator, value is masked in the response
- preferred
Servers StringFor Ldap Client - Comma separated list of IPv4 addresses of preferred servers for LDAP client. At most two comma separated IPv4 addresses can be passed.
- security
Operators List<String> - Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
- server
Root StringCACertificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
- site String
- The Active Directory site the service will limit Domain Controller discovery to
- smb
Server StringName - NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
- username String
- A domain user account with permission to create machine accounts
- status string
- Status of the Active Directory
- status
Details string - Any details in regards to the Status of the Active Directory
- active
Directory stringId - Id of the Active Directory
- ad
Name string - Name of the active directory machine. This optional parameter is used only while creating kerberos volume
- administrators string[]
- Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
- aes
Encryption boolean - If enabled, AES encryption will be enabled for SMB communication.
- allow
Local booleanNfs Users With Ldap - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
- backup
Operators string[] - Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
- dns string
- Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
- domain string
- Name of the Active Directory domain
- encrypt
DCConnections boolean - If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
- kdc
IP string - kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
- ldap
Over booleanTLS - Specifies whether or not the LDAP traffic needs to be secured via TLS.
- ldap
Search LdapScope Search Scope Opt Response - LDAP Search scope options
- ldap
Signing boolean - Specifies whether or not the LDAP traffic needs to be signed.
- organizational
Unit string - The Organizational Unit (OU) within the Windows Active Directory
- password string
- Plain text password of Active Directory domain administrator, value is masked in the response
- preferred
Servers stringFor Ldap Client - Comma separated list of IPv4 addresses of preferred servers for LDAP client. At most two comma separated IPv4 addresses can be passed.
- security
Operators string[] - Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
- server
Root stringCACertificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
- site string
- The Active Directory site the service will limit Domain Controller discovery to
- smb
Server stringName - NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
- username string
- A domain user account with permission to create machine accounts
- status str
- Status of the Active Directory
- status_
details str - Any details in regards to the Status of the Active Directory
- active_
directory_ strid - Id of the Active Directory
- ad_
name str - Name of the active directory machine. This optional parameter is used only while creating kerberos volume
- administrators Sequence[str]
- Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
- aes_
encryption bool - If enabled, AES encryption will be enabled for SMB communication.
- allow_
local_ boolnfs_ users_ with_ ldap - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
- backup_
operators Sequence[str] - Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
- dns str
- Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
- domain str
- Name of the Active Directory domain
- encrypt_
dc_ boolconnections - If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
- kdc_
ip str - kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
- ldap_
over_ booltls - Specifies whether or not the LDAP traffic needs to be secured via TLS.
- ldap_
search_ Ldapscope Search Scope Opt Response - LDAP Search scope options
- ldap_
signing bool - Specifies whether or not the LDAP traffic needs to be signed.
- organizational_
unit str - The Organizational Unit (OU) within the Windows Active Directory
- password str
- Plain text password of Active Directory domain administrator, value is masked in the response
- preferred_
servers_ strfor_ ldap_ client - Comma separated list of IPv4 addresses of preferred servers for LDAP client. At most two comma separated IPv4 addresses can be passed.
- security_
operators Sequence[str] - Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
- server_
root_ strca_ certificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
- site str
- The Active Directory site the service will limit Domain Controller discovery to
- smb_
server_ strname - NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
- username str
- A domain user account with permission to create machine accounts
- status String
- Status of the Active Directory
- status
Details String - Any details in regards to the Status of the Active Directory
- active
Directory StringId - Id of the Active Directory
- ad
Name String - Name of the active directory machine. This optional parameter is used only while creating kerberos volume
- administrators List<String>
- Users to be added to the Built-in Administrators active directory group. A list of unique usernames without domain specifier
- aes
Encryption Boolean - If enabled, AES encryption will be enabled for SMB communication.
- allow
Local BooleanNfs Users With Ldap - If enabled, NFS client local users can also (in addition to LDAP users) access the NFS volumes.
- backup
Operators List<String> - Users to be added to the Built-in Backup Operator active directory group. A list of unique usernames without domain specifier
- dns String
- Comma separated list of DNS server IP addresses (IPv4 only) for the Active Directory domain
- domain String
- Name of the Active Directory domain
- encrypt
DCConnections Boolean - If enabled, Traffic between the SMB server to Domain Controller (DC) will be encrypted.
- kdc
IP String - kdc server IP addresses for the active directory machine. This optional parameter is used only while creating kerberos volume.
- ldap
Over BooleanTLS - Specifies whether or not the LDAP traffic needs to be secured via TLS.
- ldap
Search Property MapScope - LDAP Search scope options
- ldap
Signing Boolean - Specifies whether or not the LDAP traffic needs to be signed.
- organizational
Unit String - The Organizational Unit (OU) within the Windows Active Directory
- password String
- Plain text password of Active Directory domain administrator, value is masked in the response
- preferred
Servers StringFor Ldap Client - Comma separated list of IPv4 addresses of preferred servers for LDAP client. At most two comma separated IPv4 addresses can be passed.
- security
Operators List<String> - Domain Users in the Active directory to be given SeSecurityPrivilege privilege (Needed for SMB Continuously available shares for SQL). A list of unique usernames without domain specifier
- server
Root StringCACertificate - When LDAP over SSL/TLS is enabled, the LDAP client is required to have base64 encoded Active Directory Certificate Service's self-signed root CA certificate, this optional parameter is used only for dual protocol with LDAP user-mapping volumes.
- site String
- The Active Directory site the service will limit Domain Controller discovery to
- smb
Server StringName - NetBIOS name of the SMB server. This name will be registered as a computer account in the AD and used to mount volumes
- username String
- A domain user account with permission to create machine accounts
EncryptionIdentity, EncryptionIdentityArgs
- User
Assigned stringIdentity - The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities.
- User
Assigned stringIdentity - The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities.
- user
Assigned StringIdentity - The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities.
- user
Assigned stringIdentity - The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities.
- user_
assigned_ stridentity - The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities.
- user
Assigned StringIdentity - The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities.
EncryptionIdentityResponse, EncryptionIdentityResponseArgs
- Principal
Id string - The principal ID (object ID) of the identity used to authenticate with key vault. Read-only.
- User
Assigned stringIdentity - The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities.
- Principal
Id string - The principal ID (object ID) of the identity used to authenticate with key vault. Read-only.
- User
Assigned stringIdentity - The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities.
- principal
Id String - The principal ID (object ID) of the identity used to authenticate with key vault. Read-only.
- user
Assigned StringIdentity - The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities.
- principal
Id string - The principal ID (object ID) of the identity used to authenticate with key vault. Read-only.
- user
Assigned stringIdentity - The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities.
- principal_
id str - The principal ID (object ID) of the identity used to authenticate with key vault. Read-only.
- user_
assigned_ stridentity - The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities.
- principal
Id String - The principal ID (object ID) of the identity used to authenticate with key vault. Read-only.
- user
Assigned StringIdentity - The ARM resource identifier of the user assigned identity used to authenticate with key vault. Applicable if identity.type has 'UserAssigned'. It should match key of identity.userAssignedIdentities.
KeySource, KeySourceArgs
- Microsoft_Net
App - Microsoft.NetAppMicrosoft-managed key encryption
- Microsoft_Key
Vault - Microsoft.KeyVaultCustomer-managed key encryption
- Key
Source_Microsoft_Net App - Microsoft.NetAppMicrosoft-managed key encryption
- Key
Source_Microsoft_Key Vault - Microsoft.KeyVaultCustomer-managed key encryption
- Microsoft_Net
App - Microsoft.NetAppMicrosoft-managed key encryption
- Microsoft_Key
Vault - Microsoft.KeyVaultCustomer-managed key encryption
- Microsoft_Net
App - Microsoft.NetAppMicrosoft-managed key encryption
- Microsoft_Key
Vault - Microsoft.KeyVaultCustomer-managed key encryption
- MICROSOFT_NET_APP
- Microsoft.NetAppMicrosoft-managed key encryption
- MICROSOFT_KEY_VAULT
- Microsoft.KeyVaultCustomer-managed key encryption
- "Microsoft.
Net App" - Microsoft.NetAppMicrosoft-managed key encryption
- "Microsoft.
Key Vault" - Microsoft.KeyVaultCustomer-managed key encryption
KeyVaultProperties, KeyVaultPropertiesArgs
- Key
Name string - The name of KeyVault key.
- Key
Vault stringResource Id - The resource ID of KeyVault.
- Key
Vault stringUri - The Uri of KeyVault.
- Key
Name string - The name of KeyVault key.
- Key
Vault stringResource Id - The resource ID of KeyVault.
- Key
Vault stringUri - The Uri of KeyVault.
- key
Name String - The name of KeyVault key.
- key
Vault StringResource Id - The resource ID of KeyVault.
- key
Vault StringUri - The Uri of KeyVault.
- key
Name string - The name of KeyVault key.
- key
Vault stringResource Id - The resource ID of KeyVault.
- key
Vault stringUri - The Uri of KeyVault.
- key_
name str - The name of KeyVault key.
- key_
vault_ strresource_ id - The resource ID of KeyVault.
- key_
vault_ struri - The Uri of KeyVault.
- key
Name String - The name of KeyVault key.
- key
Vault StringResource Id - The resource ID of KeyVault.
- key
Vault StringUri - The Uri of KeyVault.
KeyVaultPropertiesResponse, KeyVaultPropertiesResponseArgs
- Key
Name string - The name of KeyVault key.
- Key
Vault stringId - UUID v4 used to identify the Azure Key Vault configuration
- Key
Vault stringResource Id - The resource ID of KeyVault.
- Key
Vault stringUri - The Uri of KeyVault.
- Status string
- Status of the KeyVault connection.
- Key
Name string - The name of KeyVault key.
- Key
Vault stringId - UUID v4 used to identify the Azure Key Vault configuration
- Key
Vault stringResource Id - The resource ID of KeyVault.
- Key
Vault stringUri - The Uri of KeyVault.
- Status string
- Status of the KeyVault connection.
- key
Name String - The name of KeyVault key.
- key
Vault StringId - UUID v4 used to identify the Azure Key Vault configuration
- key
Vault StringResource Id - The resource ID of KeyVault.
- key
Vault StringUri - The Uri of KeyVault.
- status String
- Status of the KeyVault connection.
- key
Name string - The name of KeyVault key.
- key
Vault stringId - UUID v4 used to identify the Azure Key Vault configuration
- key
Vault stringResource Id - The resource ID of KeyVault.
- key
Vault stringUri - The Uri of KeyVault.
- status string
- Status of the KeyVault connection.
- key_
name str - The name of KeyVault key.
- key_
vault_ strid - UUID v4 used to identify the Azure Key Vault configuration
- key_
vault_ strresource_ id - The resource ID of KeyVault.
- key_
vault_ struri - The Uri of KeyVault.
- status str
- Status of the KeyVault connection.
- key
Name String - The name of KeyVault key.
- key
Vault StringId - UUID v4 used to identify the Azure Key Vault configuration
- key
Vault StringResource Id - The resource ID of KeyVault.
- key
Vault StringUri - The Uri of KeyVault.
- status String
- Status of the KeyVault connection.
LdapSearchScopeOpt, LdapSearchScopeOptArgs
- Group
DN string - This specifies the group DN, which overrides the base DN for group lookups.
- Group
Membership stringFilter - This specifies the custom LDAP search filter to be used when looking up group membership from LDAP server.
- User
DN string - This specifies the user DN, which overrides the base DN for user lookups.
- Group
DN string - This specifies the group DN, which overrides the base DN for group lookups.
- Group
Membership stringFilter - This specifies the custom LDAP search filter to be used when looking up group membership from LDAP server.
- User
DN string - This specifies the user DN, which overrides the base DN for user lookups.
- group
DN String - This specifies the group DN, which overrides the base DN for group lookups.
- group
Membership StringFilter - This specifies the custom LDAP search filter to be used when looking up group membership from LDAP server.
- user
DN String - This specifies the user DN, which overrides the base DN for user lookups.
- group
DN string - This specifies the group DN, which overrides the base DN for group lookups.
- group
Membership stringFilter - This specifies the custom LDAP search filter to be used when looking up group membership from LDAP server.
- user
DN string - This specifies the user DN, which overrides the base DN for user lookups.
- group_
dn str - This specifies the group DN, which overrides the base DN for group lookups.
- group_
membership_ strfilter - This specifies the custom LDAP search filter to be used when looking up group membership from LDAP server.
- user_
dn str - This specifies the user DN, which overrides the base DN for user lookups.
- group
DN String - This specifies the group DN, which overrides the base DN for group lookups.
- group
Membership StringFilter - This specifies the custom LDAP search filter to be used when looking up group membership from LDAP server.
- user
DN String - This specifies the user DN, which overrides the base DN for user lookups.
LdapSearchScopeOptResponse, LdapSearchScopeOptResponseArgs
- Group
DN string - This specifies the group DN, which overrides the base DN for group lookups.
- Group
Membership stringFilter - This specifies the custom LDAP search filter to be used when looking up group membership from LDAP server.
- User
DN string - This specifies the user DN, which overrides the base DN for user lookups.
- Group
DN string - This specifies the group DN, which overrides the base DN for group lookups.
- Group
Membership stringFilter - This specifies the custom LDAP search filter to be used when looking up group membership from LDAP server.
- User
DN string - This specifies the user DN, which overrides the base DN for user lookups.
- group
DN String - This specifies the group DN, which overrides the base DN for group lookups.
- group
Membership StringFilter - This specifies the custom LDAP search filter to be used when looking up group membership from LDAP server.
- user
DN String - This specifies the user DN, which overrides the base DN for user lookups.
- group
DN string - This specifies the group DN, which overrides the base DN for group lookups.
- group
Membership stringFilter - This specifies the custom LDAP search filter to be used when looking up group membership from LDAP server.
- user
DN string - This specifies the user DN, which overrides the base DN for user lookups.
- group_
dn str - This specifies the group DN, which overrides the base DN for group lookups.
- group_
membership_ strfilter - This specifies the custom LDAP search filter to be used when looking up group membership from LDAP server.
- user_
dn str - This specifies the user DN, which overrides the base DN for user lookups.
- group
DN String - This specifies the group DN, which overrides the base DN for group lookups.
- group
Membership StringFilter - This specifies the custom LDAP search filter to be used when looking up group membership from LDAP server.
- user
DN String - This specifies the user DN, which overrides the base DN for user lookups.
ManagedServiceIdentity, ManagedServiceIdentityArgs
- Type
string | Pulumi.
Azure Native. Net App. Managed Service Identity Type - Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
- User
Assigned List<string>Identities - The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
- Type
string | Managed
Service Identity Type - Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
- User
Assigned []stringIdentities - The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
- type
String | Managed
Service Identity Type - Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
- user
Assigned List<String>Identities - The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
- type
string | Managed
Service Identity Type - Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
- user
Assigned string[]Identities - The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
- type
str | Managed
Service Identity Type - Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
- user_
assigned_ Sequence[str]identities - The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
- type
String | "None" | "System
Assigned" | "User Assigned" | "System Assigned,User Assigned" - Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
- user
Assigned List<String>Identities - The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
ManagedServiceIdentityResponse, ManagedServiceIdentityResponseArgs
- Principal
Id string - The service principal ID of the system assigned identity. This property will only be provided for a system assigned identity.
- Tenant
Id string - The tenant ID of the system assigned identity. This property will only be provided for a system assigned identity.
- Type string
- Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
- User
Assigned Dictionary<string, Pulumi.Identities Azure Native. Net App. Inputs. User Assigned Identity Response> - The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
- Principal
Id string - The service principal ID of the system assigned identity. This property will only be provided for a system assigned identity.
- Tenant
Id string - The tenant ID of the system assigned identity. This property will only be provided for a system assigned identity.
- Type string
- Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
- User
Assigned map[string]UserIdentities Assigned Identity Response - The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
- principal
Id String - The service principal ID of the system assigned identity. This property will only be provided for a system assigned identity.
- tenant
Id String - The tenant ID of the system assigned identity. This property will only be provided for a system assigned identity.
- type String
- Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
- user
Assigned Map<String,UserIdentities Assigned Identity Response> - The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
- principal
Id string - The service principal ID of the system assigned identity. This property will only be provided for a system assigned identity.
- tenant
Id string - The tenant ID of the system assigned identity. This property will only be provided for a system assigned identity.
- type string
- Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
- user
Assigned {[key: string]: UserIdentities Assigned Identity Response} - The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
- principal_
id str - The service principal ID of the system assigned identity. This property will only be provided for a system assigned identity.
- tenant_
id str - The tenant ID of the system assigned identity. This property will only be provided for a system assigned identity.
- type str
- Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
- user_
assigned_ Mapping[str, Useridentities Assigned Identity Response] - The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
- principal
Id String - The service principal ID of the system assigned identity. This property will only be provided for a system assigned identity.
- tenant
Id String - The tenant ID of the system assigned identity. This property will only be provided for a system assigned identity.
- type String
- Type of managed service identity (where both SystemAssigned and UserAssigned types are allowed).
- user
Assigned Map<Property Map>Identities - The set of user assigned identities associated with the resource. The userAssignedIdentities dictionary keys will be ARM resource ids in the form: '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}. The dictionary values can be empty objects ({}) in requests.
ManagedServiceIdentityType, ManagedServiceIdentityTypeArgs
- None
- None
- System
Assigned - SystemAssigned
- User
Assigned - UserAssigned
- System
Assigned_User Assigned - SystemAssigned,UserAssigned
- Managed
Service Identity Type None - None
- Managed
Service Identity Type System Assigned - SystemAssigned
- Managed
Service Identity Type User Assigned - UserAssigned
- Managed
Service Identity Type_System Assigned_User Assigned - SystemAssigned,UserAssigned
- None
- None
- System
Assigned - SystemAssigned
- User
Assigned - UserAssigned
- System
Assigned_User Assigned - SystemAssigned,UserAssigned
- None
- None
- System
Assigned - SystemAssigned
- User
Assigned - UserAssigned
- System
Assigned_User Assigned - SystemAssigned,UserAssigned
- NONE
- None
- SYSTEM_ASSIGNED
- SystemAssigned
- USER_ASSIGNED
- UserAssigned
- SYSTEM_ASSIGNED_USER_ASSIGNED
- SystemAssigned,UserAssigned
- "None"
- None
- "System
Assigned" - SystemAssigned
- "User
Assigned" - UserAssigned
- "System
Assigned,User Assigned" - SystemAssigned,UserAssigned
SystemDataResponse, SystemDataResponseArgs
- Created
At string - The timestamp of resource creation (UTC).
- Created
By string - The identity that created the resource.
- Created
By stringType - The type of identity that created the resource.
- Last
Modified stringAt - The timestamp of resource last modification (UTC)
- Last
Modified stringBy - The identity that last modified the resource.
- Last
Modified stringBy Type - The type of identity that last modified the resource.
- Created
At string - The timestamp of resource creation (UTC).
- Created
By string - The identity that created the resource.
- Created
By stringType - The type of identity that created the resource.
- Last
Modified stringAt - The timestamp of resource last modification (UTC)
- Last
Modified stringBy - The identity that last modified the resource.
- Last
Modified stringBy Type - The type of identity that last modified the resource.
- created
At String - The timestamp of resource creation (UTC).
- created
By String - The identity that created the resource.
- created
By StringType - The type of identity that created the resource.
- last
Modified StringAt - The timestamp of resource last modification (UTC)
- last
Modified StringBy - The identity that last modified the resource.
- last
Modified StringBy Type - The type of identity that last modified the resource.
- created
At string - The timestamp of resource creation (UTC).
- created
By string - The identity that created the resource.
- created
By stringType - The type of identity that created the resource.
- last
Modified stringAt - The timestamp of resource last modification (UTC)
- last
Modified stringBy - The identity that last modified the resource.
- last
Modified stringBy Type - The type of identity that last modified the resource.
- created_
at str - The timestamp of resource creation (UTC).
- created_
by str - The identity that created the resource.
- created_
by_ strtype - The type of identity that created the resource.
- last_
modified_ strat - The timestamp of resource last modification (UTC)
- last_
modified_ strby - The identity that last modified the resource.
- last_
modified_ strby_ type - The type of identity that last modified the resource.
- created
At String - The timestamp of resource creation (UTC).
- created
By String - The identity that created the resource.
- created
By StringType - The type of identity that created the resource.
- last
Modified StringAt - The timestamp of resource last modification (UTC)
- last
Modified StringBy - The identity that last modified the resource.
- last
Modified StringBy Type - The type of identity that last modified the resource.
UserAssignedIdentityResponse, UserAssignedIdentityResponseArgs
- Client
Id string - The client ID of the assigned identity.
- Principal
Id string - The principal ID of the assigned identity.
- Client
Id string - The client ID of the assigned identity.
- Principal
Id string - The principal ID of the assigned identity.
- client
Id String - The client ID of the assigned identity.
- principal
Id String - The principal ID of the assigned identity.
- client
Id string - The client ID of the assigned identity.
- principal
Id string - The principal ID of the assigned identity.
- client_
id str - The client ID of the assigned identity.
- principal_
id str - The principal ID of the assigned identity.
- client
Id String - The client ID of the assigned identity.
- principal
Id String - The principal ID of the assigned identity.
Import
An existing resource can be imported using its type token, name, and identifier, e.g.
$ pulumi import azure-native:netapp:Account account1 /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.NetApp/netAppAccounts/{accountName}
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Azure Native pulumi/pulumi-azure-native
- License
- Apache-2.0