1. Packages
  2. Cyral Provider
  3. API Docs
  4. RepositoryUserAccount
cyral 4.16.3 published on Monday, Apr 14, 2025 by cyralinc

cyral.RepositoryUserAccount

Explore with Pulumi AI

cyral logo
cyral 4.16.3 published on Monday, Apr 14, 2025 by cyralinc

    # cyral.RepositoryUserAccount (Resource)

    Warning When referring to the user account ID in other resources, like cyral.RepositoryAccessRules for example, use the read-only attribute user_account_id instead of id.

    Import ID syntax is {repository_id}/{user_account_id}, where {user_account_id} is the ID of the user account in the Cyral Control Plane.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as cyral from "@pulumi/cyral";
    
    // Test Repo to use in examples.
    const tfTestRepo = new cyral.Repository("tfTestRepo", {
        type: "postgresql",
        repoNodes: [{
            host: "postgresql.mycompany.com",
            port: 5432,
        }],
    });
    // cyral_repository_user_account with auth scheme aws_iam
    const awsIam = new cyral.RepositoryUserAccount("awsIam", {
        repositoryId: tfTestRepo.id,
        authScheme: {
            awsIam: {
                roleArn: "role_arn",
            },
        },
    });
    // cyral_repository_user_account with auth scheme aws_secrets will be created
    const awsSecrets = new cyral.RepositoryUserAccount("awsSecrets", {
        repositoryId: tfTestRepo.id,
        authScheme: {
            awsSecretsManager: {
                secretArn: "secret_arn",
            },
        },
    });
    // cyral_repository_user_account with auth scheme env_var will be created
    const envVar = new cyral.RepositoryUserAccount("envVar", {
        repositoryId: tfTestRepo.id,
        authScheme: {
            environmentVariable: {
                variableName: "some-env-var",
            },
        },
    });
    // cyral_repository_user_account with auth scheme gcp_secrets will be created
    const gcpSecrets = new cyral.RepositoryUserAccount("gcpSecrets", {
        repositoryId: tfTestRepo.id,
        authScheme: {
            gcpSecretsManager: {
                secretName: "secret_name",
            },
        },
    });
    // cyral_repository_user_account with auth scheme azure_key_vault will be created
    const azureKeyVault = new cyral.RepositoryUserAccount("azureKeyVault", {
        repositoryId: tfTestRepo.id,
        authScheme: {
            azureKeyVault: {
                secretUrl: "https://vaultName.vault.azure.net/secrets/secretName",
            },
        },
    });
    // cyral_repository_user_account with auth scheme hashicorp will be created
    const hashicorp = new cyral.RepositoryUserAccount("hashicorp", {
        repositoryId: tfTestRepo.id,
        authScheme: {
            hashicorpVault: {
                path: "some-path",
                isDynamicUserAccount: false,
            },
        },
    });
    // cyral_repository_user_account with auth scheme kubernetes will be created
    const kubernetes = new cyral.RepositoryUserAccount("kubernetes", {
        repositoryId: tfTestRepo.id,
        authScheme: {
            kubernetesSecret: {
                secretKey: "secret_key",
                secretName: "secret_name",
            },
        },
    });
    
    import pulumi
    import pulumi_cyral as cyral
    
    # Test Repo to use in examples.
    tf_test_repo = cyral.Repository("tfTestRepo",
        type="postgresql",
        repo_nodes=[{
            "host": "postgresql.mycompany.com",
            "port": 5432,
        }])
    # cyral_repository_user_account with auth scheme aws_iam
    aws_iam = cyral.RepositoryUserAccount("awsIam",
        repository_id=tf_test_repo.id,
        auth_scheme={
            "aws_iam": {
                "role_arn": "role_arn",
            },
        })
    # cyral_repository_user_account with auth scheme aws_secrets will be created
    aws_secrets = cyral.RepositoryUserAccount("awsSecrets",
        repository_id=tf_test_repo.id,
        auth_scheme={
            "aws_secrets_manager": {
                "secret_arn": "secret_arn",
            },
        })
    # cyral_repository_user_account with auth scheme env_var will be created
    env_var = cyral.RepositoryUserAccount("envVar",
        repository_id=tf_test_repo.id,
        auth_scheme={
            "environment_variable": {
                "variable_name": "some-env-var",
            },
        })
    # cyral_repository_user_account with auth scheme gcp_secrets will be created
    gcp_secrets = cyral.RepositoryUserAccount("gcpSecrets",
        repository_id=tf_test_repo.id,
        auth_scheme={
            "gcp_secrets_manager": {
                "secret_name": "secret_name",
            },
        })
    # cyral_repository_user_account with auth scheme azure_key_vault will be created
    azure_key_vault = cyral.RepositoryUserAccount("azureKeyVault",
        repository_id=tf_test_repo.id,
        auth_scheme={
            "azure_key_vault": {
                "secret_url": "https://vaultName.vault.azure.net/secrets/secretName",
            },
        })
    # cyral_repository_user_account with auth scheme hashicorp will be created
    hashicorp = cyral.RepositoryUserAccount("hashicorp",
        repository_id=tf_test_repo.id,
        auth_scheme={
            "hashicorp_vault": {
                "path": "some-path",
                "is_dynamic_user_account": False,
            },
        })
    # cyral_repository_user_account with auth scheme kubernetes will be created
    kubernetes = cyral.RepositoryUserAccount("kubernetes",
        repository_id=tf_test_repo.id,
        auth_scheme={
            "kubernetes_secret": {
                "secret_key": "secret_key",
                "secret_name": "secret_name",
            },
        })
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-terraform-provider/sdks/go/cyral/v4/cyral"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		// Test Repo to use in examples.
    		tfTestRepo, err := cyral.NewRepository(ctx, "tfTestRepo", &cyral.RepositoryArgs{
    			Type: pulumi.String("postgresql"),
    			RepoNodes: cyral.RepositoryRepoNodeArray{
    				&cyral.RepositoryRepoNodeArgs{
    					Host: pulumi.String("postgresql.mycompany.com"),
    					Port: pulumi.Float64(5432),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		// cyral_repository_user_account with auth scheme aws_iam
    		_, err = cyral.NewRepositoryUserAccount(ctx, "awsIam", &cyral.RepositoryUserAccountArgs{
    			RepositoryId: tfTestRepo.ID(),
    			AuthScheme: &cyral.RepositoryUserAccountAuthSchemeArgs{
    				AwsIam: &cyral.RepositoryUserAccountAuthSchemeAwsIamArgs{
    					RoleArn: pulumi.String("role_arn"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		// cyral_repository_user_account with auth scheme aws_secrets will be created
    		_, err = cyral.NewRepositoryUserAccount(ctx, "awsSecrets", &cyral.RepositoryUserAccountArgs{
    			RepositoryId: tfTestRepo.ID(),
    			AuthScheme: &cyral.RepositoryUserAccountAuthSchemeArgs{
    				AwsSecretsManager: &cyral.RepositoryUserAccountAuthSchemeAwsSecretsManagerArgs{
    					SecretArn: pulumi.String("secret_arn"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		// cyral_repository_user_account with auth scheme env_var will be created
    		_, err = cyral.NewRepositoryUserAccount(ctx, "envVar", &cyral.RepositoryUserAccountArgs{
    			RepositoryId: tfTestRepo.ID(),
    			AuthScheme: &cyral.RepositoryUserAccountAuthSchemeArgs{
    				EnvironmentVariable: &cyral.RepositoryUserAccountAuthSchemeEnvironmentVariableArgs{
    					VariableName: pulumi.String("some-env-var"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		// cyral_repository_user_account with auth scheme gcp_secrets will be created
    		_, err = cyral.NewRepositoryUserAccount(ctx, "gcpSecrets", &cyral.RepositoryUserAccountArgs{
    			RepositoryId: tfTestRepo.ID(),
    			AuthScheme: &cyral.RepositoryUserAccountAuthSchemeArgs{
    				GcpSecretsManager: &cyral.RepositoryUserAccountAuthSchemeGcpSecretsManagerArgs{
    					SecretName: pulumi.String("secret_name"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		// cyral_repository_user_account with auth scheme azure_key_vault will be created
    		_, err = cyral.NewRepositoryUserAccount(ctx, "azureKeyVault", &cyral.RepositoryUserAccountArgs{
    			RepositoryId: tfTestRepo.ID(),
    			AuthScheme: &cyral.RepositoryUserAccountAuthSchemeArgs{
    				AzureKeyVault: &cyral.RepositoryUserAccountAuthSchemeAzureKeyVaultArgs{
    					SecretUrl: pulumi.String("https://vaultName.vault.azure.net/secrets/secretName"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		// cyral_repository_user_account with auth scheme hashicorp will be created
    		_, err = cyral.NewRepositoryUserAccount(ctx, "hashicorp", &cyral.RepositoryUserAccountArgs{
    			RepositoryId: tfTestRepo.ID(),
    			AuthScheme: &cyral.RepositoryUserAccountAuthSchemeArgs{
    				HashicorpVault: &cyral.RepositoryUserAccountAuthSchemeHashicorpVaultArgs{
    					Path:                 pulumi.String("some-path"),
    					IsDynamicUserAccount: pulumi.Bool(false),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		// cyral_repository_user_account with auth scheme kubernetes will be created
    		_, err = cyral.NewRepositoryUserAccount(ctx, "kubernetes", &cyral.RepositoryUserAccountArgs{
    			RepositoryId: tfTestRepo.ID(),
    			AuthScheme: &cyral.RepositoryUserAccountAuthSchemeArgs{
    				KubernetesSecret: &cyral.RepositoryUserAccountAuthSchemeKubernetesSecretArgs{
    					SecretKey:  pulumi.String("secret_key"),
    					SecretName: pulumi.String("secret_name"),
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Cyral = Pulumi.Cyral;
    
    return await Deployment.RunAsync(() => 
    {
        // Test Repo to use in examples.
        var tfTestRepo = new Cyral.Repository("tfTestRepo", new()
        {
            Type = "postgresql",
            RepoNodes = new[]
            {
                new Cyral.Inputs.RepositoryRepoNodeArgs
                {
                    Host = "postgresql.mycompany.com",
                    Port = 5432,
                },
            },
        });
    
        // cyral_repository_user_account with auth scheme aws_iam
        var awsIam = new Cyral.RepositoryUserAccount("awsIam", new()
        {
            RepositoryId = tfTestRepo.Id,
            AuthScheme = new Cyral.Inputs.RepositoryUserAccountAuthSchemeArgs
            {
                AwsIam = new Cyral.Inputs.RepositoryUserAccountAuthSchemeAwsIamArgs
                {
                    RoleArn = "role_arn",
                },
            },
        });
    
        // cyral_repository_user_account with auth scheme aws_secrets will be created
        var awsSecrets = new Cyral.RepositoryUserAccount("awsSecrets", new()
        {
            RepositoryId = tfTestRepo.Id,
            AuthScheme = new Cyral.Inputs.RepositoryUserAccountAuthSchemeArgs
            {
                AwsSecretsManager = new Cyral.Inputs.RepositoryUserAccountAuthSchemeAwsSecretsManagerArgs
                {
                    SecretArn = "secret_arn",
                },
            },
        });
    
        // cyral_repository_user_account with auth scheme env_var will be created
        var envVar = new Cyral.RepositoryUserAccount("envVar", new()
        {
            RepositoryId = tfTestRepo.Id,
            AuthScheme = new Cyral.Inputs.RepositoryUserAccountAuthSchemeArgs
            {
                EnvironmentVariable = new Cyral.Inputs.RepositoryUserAccountAuthSchemeEnvironmentVariableArgs
                {
                    VariableName = "some-env-var",
                },
            },
        });
    
        // cyral_repository_user_account with auth scheme gcp_secrets will be created
        var gcpSecrets = new Cyral.RepositoryUserAccount("gcpSecrets", new()
        {
            RepositoryId = tfTestRepo.Id,
            AuthScheme = new Cyral.Inputs.RepositoryUserAccountAuthSchemeArgs
            {
                GcpSecretsManager = new Cyral.Inputs.RepositoryUserAccountAuthSchemeGcpSecretsManagerArgs
                {
                    SecretName = "secret_name",
                },
            },
        });
    
        // cyral_repository_user_account with auth scheme azure_key_vault will be created
        var azureKeyVault = new Cyral.RepositoryUserAccount("azureKeyVault", new()
        {
            RepositoryId = tfTestRepo.Id,
            AuthScheme = new Cyral.Inputs.RepositoryUserAccountAuthSchemeArgs
            {
                AzureKeyVault = new Cyral.Inputs.RepositoryUserAccountAuthSchemeAzureKeyVaultArgs
                {
                    SecretUrl = "https://vaultName.vault.azure.net/secrets/secretName",
                },
            },
        });
    
        // cyral_repository_user_account with auth scheme hashicorp will be created
        var hashicorp = new Cyral.RepositoryUserAccount("hashicorp", new()
        {
            RepositoryId = tfTestRepo.Id,
            AuthScheme = new Cyral.Inputs.RepositoryUserAccountAuthSchemeArgs
            {
                HashicorpVault = new Cyral.Inputs.RepositoryUserAccountAuthSchemeHashicorpVaultArgs
                {
                    Path = "some-path",
                    IsDynamicUserAccount = false,
                },
            },
        });
    
        // cyral_repository_user_account with auth scheme kubernetes will be created
        var kubernetes = new Cyral.RepositoryUserAccount("kubernetes", new()
        {
            RepositoryId = tfTestRepo.Id,
            AuthScheme = new Cyral.Inputs.RepositoryUserAccountAuthSchemeArgs
            {
                KubernetesSecret = new Cyral.Inputs.RepositoryUserAccountAuthSchemeKubernetesSecretArgs
                {
                    SecretKey = "secret_key",
                    SecretName = "secret_name",
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.cyral.Repository;
    import com.pulumi.cyral.RepositoryArgs;
    import com.pulumi.cyral.inputs.RepositoryRepoNodeArgs;
    import com.pulumi.cyral.RepositoryUserAccount;
    import com.pulumi.cyral.RepositoryUserAccountArgs;
    import com.pulumi.cyral.inputs.RepositoryUserAccountAuthSchemeArgs;
    import com.pulumi.cyral.inputs.RepositoryUserAccountAuthSchemeAwsIamArgs;
    import com.pulumi.cyral.inputs.RepositoryUserAccountAuthSchemeAwsSecretsManagerArgs;
    import com.pulumi.cyral.inputs.RepositoryUserAccountAuthSchemeEnvironmentVariableArgs;
    import com.pulumi.cyral.inputs.RepositoryUserAccountAuthSchemeGcpSecretsManagerArgs;
    import com.pulumi.cyral.inputs.RepositoryUserAccountAuthSchemeAzureKeyVaultArgs;
    import com.pulumi.cyral.inputs.RepositoryUserAccountAuthSchemeHashicorpVaultArgs;
    import com.pulumi.cyral.inputs.RepositoryUserAccountAuthSchemeKubernetesSecretArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            // Test Repo to use in examples.
            var tfTestRepo = new Repository("tfTestRepo", RepositoryArgs.builder()
                .type("postgresql")
                .repoNodes(RepositoryRepoNodeArgs.builder()
                    .host("postgresql.mycompany.com")
                    .port(5432)
                    .build())
                .build());
    
            // cyral_repository_user_account with auth scheme aws_iam
            var awsIam = new RepositoryUserAccount("awsIam", RepositoryUserAccountArgs.builder()
                .repositoryId(tfTestRepo.id())
                .authScheme(RepositoryUserAccountAuthSchemeArgs.builder()
                    .awsIam(RepositoryUserAccountAuthSchemeAwsIamArgs.builder()
                        .roleArn("role_arn")
                        .build())
                    .build())
                .build());
    
            // cyral_repository_user_account with auth scheme aws_secrets will be created
            var awsSecrets = new RepositoryUserAccount("awsSecrets", RepositoryUserAccountArgs.builder()
                .repositoryId(tfTestRepo.id())
                .authScheme(RepositoryUserAccountAuthSchemeArgs.builder()
                    .awsSecretsManager(RepositoryUserAccountAuthSchemeAwsSecretsManagerArgs.builder()
                        .secretArn("secret_arn")
                        .build())
                    .build())
                .build());
    
            // cyral_repository_user_account with auth scheme env_var will be created
            var envVar = new RepositoryUserAccount("envVar", RepositoryUserAccountArgs.builder()
                .repositoryId(tfTestRepo.id())
                .authScheme(RepositoryUserAccountAuthSchemeArgs.builder()
                    .environmentVariable(RepositoryUserAccountAuthSchemeEnvironmentVariableArgs.builder()
                        .variableName("some-env-var")
                        .build())
                    .build())
                .build());
    
            // cyral_repository_user_account with auth scheme gcp_secrets will be created
            var gcpSecrets = new RepositoryUserAccount("gcpSecrets", RepositoryUserAccountArgs.builder()
                .repositoryId(tfTestRepo.id())
                .authScheme(RepositoryUserAccountAuthSchemeArgs.builder()
                    .gcpSecretsManager(RepositoryUserAccountAuthSchemeGcpSecretsManagerArgs.builder()
                        .secretName("secret_name")
                        .build())
                    .build())
                .build());
    
            // cyral_repository_user_account with auth scheme azure_key_vault will be created
            var azureKeyVault = new RepositoryUserAccount("azureKeyVault", RepositoryUserAccountArgs.builder()
                .repositoryId(tfTestRepo.id())
                .authScheme(RepositoryUserAccountAuthSchemeArgs.builder()
                    .azureKeyVault(RepositoryUserAccountAuthSchemeAzureKeyVaultArgs.builder()
                        .secretUrl("https://vaultName.vault.azure.net/secrets/secretName")
                        .build())
                    .build())
                .build());
    
            // cyral_repository_user_account with auth scheme hashicorp will be created
            var hashicorp = new RepositoryUserAccount("hashicorp", RepositoryUserAccountArgs.builder()
                .repositoryId(tfTestRepo.id())
                .authScheme(RepositoryUserAccountAuthSchemeArgs.builder()
                    .hashicorpVault(RepositoryUserAccountAuthSchemeHashicorpVaultArgs.builder()
                        .path("some-path")
                        .isDynamicUserAccount(false)
                        .build())
                    .build())
                .build());
    
            // cyral_repository_user_account with auth scheme kubernetes will be created
            var kubernetes = new RepositoryUserAccount("kubernetes", RepositoryUserAccountArgs.builder()
                .repositoryId(tfTestRepo.id())
                .authScheme(RepositoryUserAccountAuthSchemeArgs.builder()
                    .kubernetesSecret(RepositoryUserAccountAuthSchemeKubernetesSecretArgs.builder()
                        .secretKey("secret_key")
                        .secretName("secret_name")
                        .build())
                    .build())
                .build());
    
        }
    }
    
    resources:
      # Test Repo to use in examples.
      tfTestRepo:
        type: cyral:Repository
        properties:
          type: postgresql
          repoNodes:
            - host: postgresql.mycompany.com
              port: 5432
      # cyral_repository_user_account with auth scheme aws_iam
      awsIam:
        type: cyral:RepositoryUserAccount
        properties:
          repositoryId: ${tfTestRepo.id}
          authScheme:
            awsIam:
              roleArn: role_arn
      # cyral_repository_user_account with auth scheme aws_secrets will be created
      awsSecrets:
        type: cyral:RepositoryUserAccount
        properties:
          repositoryId: ${tfTestRepo.id}
          authScheme:
            awsSecretsManager:
              secretArn: secret_arn
      # cyral_repository_user_account with auth scheme env_var will be created
      envVar:
        type: cyral:RepositoryUserAccount
        properties:
          repositoryId: ${tfTestRepo.id}
          authScheme:
            environmentVariable:
              variableName: some-env-var
      # cyral_repository_user_account with auth scheme gcp_secrets will be created
      gcpSecrets:
        type: cyral:RepositoryUserAccount
        properties:
          repositoryId: ${tfTestRepo.id}
          authScheme:
            gcpSecretsManager:
              secretName: secret_name
      # cyral_repository_user_account with auth scheme azure_key_vault will be created
      azureKeyVault:
        type: cyral:RepositoryUserAccount
        properties:
          repositoryId: ${tfTestRepo.id}
          authScheme:
            azureKeyVault:
              secretUrl: https://vaultName.vault.azure.net/secrets/secretName
      # cyral_repository_user_account with auth scheme hashicorp will be created
      hashicorp:
        type: cyral:RepositoryUserAccount
        properties:
          repositoryId: ${tfTestRepo.id}
          authScheme:
            hashicorpVault:
              path: some-path
              isDynamicUserAccount: false
      # cyral_repository_user_account with auth scheme kubernetes will be created
      kubernetes:
        type: cyral:RepositoryUserAccount
        properties:
          repositoryId: ${tfTestRepo.id}
          authScheme:
            kubernetesSecret:
              secretKey: secret_key
              secretName: secret_name
    

    Create RepositoryUserAccount Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new RepositoryUserAccount(name: string, args: RepositoryUserAccountArgs, opts?: CustomResourceOptions);
    @overload
    def RepositoryUserAccount(resource_name: str,
                              args: RepositoryUserAccountArgs,
                              opts: Optional[ResourceOptions] = None)
    
    @overload
    def RepositoryUserAccount(resource_name: str,
                              opts: Optional[ResourceOptions] = None,
                              auth_scheme: Optional[RepositoryUserAccountAuthSchemeArgs] = None,
                              repository_id: Optional[str] = None,
                              approval_config: Optional[RepositoryUserAccountApprovalConfigArgs] = None,
                              auth_database_name: Optional[str] = None,
                              name: Optional[str] = None)
    func NewRepositoryUserAccount(ctx *Context, name string, args RepositoryUserAccountArgs, opts ...ResourceOption) (*RepositoryUserAccount, error)
    public RepositoryUserAccount(string name, RepositoryUserAccountArgs args, CustomResourceOptions? opts = null)
    public RepositoryUserAccount(String name, RepositoryUserAccountArgs args)
    public RepositoryUserAccount(String name, RepositoryUserAccountArgs args, CustomResourceOptions options)
    
    type: cyral:RepositoryUserAccount
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args RepositoryUserAccountArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args RepositoryUserAccountArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args RepositoryUserAccountArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args RepositoryUserAccountArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args RepositoryUserAccountArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var repositoryUserAccountResource = new Cyral.RepositoryUserAccount("repositoryUserAccountResource", new()
    {
        AuthScheme = new Cyral.Inputs.RepositoryUserAccountAuthSchemeArgs
        {
            AwsIam = new Cyral.Inputs.RepositoryUserAccountAuthSchemeAwsIamArgs
            {
                RoleArn = "string",
                AuthenticateAsIamRole = false,
            },
            AwsSecretsManager = new Cyral.Inputs.RepositoryUserAccountAuthSchemeAwsSecretsManagerArgs
            {
                SecretArn = "string",
            },
            AzureKeyVault = new Cyral.Inputs.RepositoryUserAccountAuthSchemeAzureKeyVaultArgs
            {
                SecretUrl = "string",
            },
            CyralStorage = new Cyral.Inputs.RepositoryUserAccountAuthSchemeCyralStorageArgs
            {
                Password = "string",
            },
            EnvironmentVariable = new Cyral.Inputs.RepositoryUserAccountAuthSchemeEnvironmentVariableArgs
            {
                VariableName = "string",
            },
            GcpSecretsManager = new Cyral.Inputs.RepositoryUserAccountAuthSchemeGcpSecretsManagerArgs
            {
                SecretName = "string",
            },
            HashicorpVault = new Cyral.Inputs.RepositoryUserAccountAuthSchemeHashicorpVaultArgs
            {
                IsDynamicUserAccount = false,
                Path = "string",
            },
            KubernetesSecret = new Cyral.Inputs.RepositoryUserAccountAuthSchemeKubernetesSecretArgs
            {
                SecretKey = "string",
                SecretName = "string",
            },
        },
        RepositoryId = "string",
        ApprovalConfig = new Cyral.Inputs.RepositoryUserAccountApprovalConfigArgs
        {
            AutomaticGrant = false,
            MaxAutoGrantDuration = "string",
        },
        AuthDatabaseName = "string",
        Name = "string",
    });
    
    example, err := cyral.NewRepositoryUserAccount(ctx, "repositoryUserAccountResource", &cyral.RepositoryUserAccountArgs{
    	AuthScheme: &cyral.RepositoryUserAccountAuthSchemeArgs{
    		AwsIam: &cyral.RepositoryUserAccountAuthSchemeAwsIamArgs{
    			RoleArn:               pulumi.String("string"),
    			AuthenticateAsIamRole: pulumi.Bool(false),
    		},
    		AwsSecretsManager: &cyral.RepositoryUserAccountAuthSchemeAwsSecretsManagerArgs{
    			SecretArn: pulumi.String("string"),
    		},
    		AzureKeyVault: &cyral.RepositoryUserAccountAuthSchemeAzureKeyVaultArgs{
    			SecretUrl: pulumi.String("string"),
    		},
    		CyralStorage: &cyral.RepositoryUserAccountAuthSchemeCyralStorageArgs{
    			Password: pulumi.String("string"),
    		},
    		EnvironmentVariable: &cyral.RepositoryUserAccountAuthSchemeEnvironmentVariableArgs{
    			VariableName: pulumi.String("string"),
    		},
    		GcpSecretsManager: &cyral.RepositoryUserAccountAuthSchemeGcpSecretsManagerArgs{
    			SecretName: pulumi.String("string"),
    		},
    		HashicorpVault: &cyral.RepositoryUserAccountAuthSchemeHashicorpVaultArgs{
    			IsDynamicUserAccount: pulumi.Bool(false),
    			Path:                 pulumi.String("string"),
    		},
    		KubernetesSecret: &cyral.RepositoryUserAccountAuthSchemeKubernetesSecretArgs{
    			SecretKey:  pulumi.String("string"),
    			SecretName: pulumi.String("string"),
    		},
    	},
    	RepositoryId: pulumi.String("string"),
    	ApprovalConfig: &cyral.RepositoryUserAccountApprovalConfigArgs{
    		AutomaticGrant:       pulumi.Bool(false),
    		MaxAutoGrantDuration: pulumi.String("string"),
    	},
    	AuthDatabaseName: pulumi.String("string"),
    	Name:             pulumi.String("string"),
    })
    
    var repositoryUserAccountResource = new RepositoryUserAccount("repositoryUserAccountResource", RepositoryUserAccountArgs.builder()
        .authScheme(RepositoryUserAccountAuthSchemeArgs.builder()
            .awsIam(RepositoryUserAccountAuthSchemeAwsIamArgs.builder()
                .roleArn("string")
                .authenticateAsIamRole(false)
                .build())
            .awsSecretsManager(RepositoryUserAccountAuthSchemeAwsSecretsManagerArgs.builder()
                .secretArn("string")
                .build())
            .azureKeyVault(RepositoryUserAccountAuthSchemeAzureKeyVaultArgs.builder()
                .secretUrl("string")
                .build())
            .cyralStorage(RepositoryUserAccountAuthSchemeCyralStorageArgs.builder()
                .password("string")
                .build())
            .environmentVariable(RepositoryUserAccountAuthSchemeEnvironmentVariableArgs.builder()
                .variableName("string")
                .build())
            .gcpSecretsManager(RepositoryUserAccountAuthSchemeGcpSecretsManagerArgs.builder()
                .secretName("string")
                .build())
            .hashicorpVault(RepositoryUserAccountAuthSchemeHashicorpVaultArgs.builder()
                .isDynamicUserAccount(false)
                .path("string")
                .build())
            .kubernetesSecret(RepositoryUserAccountAuthSchemeKubernetesSecretArgs.builder()
                .secretKey("string")
                .secretName("string")
                .build())
            .build())
        .repositoryId("string")
        .approvalConfig(RepositoryUserAccountApprovalConfigArgs.builder()
            .automaticGrant(false)
            .maxAutoGrantDuration("string")
            .build())
        .authDatabaseName("string")
        .name("string")
        .build());
    
    repository_user_account_resource = cyral.RepositoryUserAccount("repositoryUserAccountResource",
        auth_scheme={
            "aws_iam": {
                "role_arn": "string",
                "authenticate_as_iam_role": False,
            },
            "aws_secrets_manager": {
                "secret_arn": "string",
            },
            "azure_key_vault": {
                "secret_url": "string",
            },
            "cyral_storage": {
                "password": "string",
            },
            "environment_variable": {
                "variable_name": "string",
            },
            "gcp_secrets_manager": {
                "secret_name": "string",
            },
            "hashicorp_vault": {
                "is_dynamic_user_account": False,
                "path": "string",
            },
            "kubernetes_secret": {
                "secret_key": "string",
                "secret_name": "string",
            },
        },
        repository_id="string",
        approval_config={
            "automatic_grant": False,
            "max_auto_grant_duration": "string",
        },
        auth_database_name="string",
        name="string")
    
    const repositoryUserAccountResource = new cyral.RepositoryUserAccount("repositoryUserAccountResource", {
        authScheme: {
            awsIam: {
                roleArn: "string",
                authenticateAsIamRole: false,
            },
            awsSecretsManager: {
                secretArn: "string",
            },
            azureKeyVault: {
                secretUrl: "string",
            },
            cyralStorage: {
                password: "string",
            },
            environmentVariable: {
                variableName: "string",
            },
            gcpSecretsManager: {
                secretName: "string",
            },
            hashicorpVault: {
                isDynamicUserAccount: false,
                path: "string",
            },
            kubernetesSecret: {
                secretKey: "string",
                secretName: "string",
            },
        },
        repositoryId: "string",
        approvalConfig: {
            automaticGrant: false,
            maxAutoGrantDuration: "string",
        },
        authDatabaseName: "string",
        name: "string",
    });
    
    type: cyral:RepositoryUserAccount
    properties:
        approvalConfig:
            automaticGrant: false
            maxAutoGrantDuration: string
        authDatabaseName: string
        authScheme:
            awsIam:
                authenticateAsIamRole: false
                roleArn: string
            awsSecretsManager:
                secretArn: string
            azureKeyVault:
                secretUrl: string
            cyralStorage:
                password: string
            environmentVariable:
                variableName: string
            gcpSecretsManager:
                secretName: string
            hashicorpVault:
                isDynamicUserAccount: false
                path: string
            kubernetesSecret:
                secretKey: string
                secretName: string
        name: string
        repositoryId: string
    

    RepositoryUserAccount Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The RepositoryUserAccount resource accepts the following input properties:

    AuthScheme RepositoryUserAccountAuthScheme
    RepositoryId string
    ID of the repository.
    ApprovalConfig RepositoryUserAccountApprovalConfig
    Configurations related to Approvals.
    AuthDatabaseName string
    The database name that this User Account is scoped to, for cyral.Repository types that support multiple databases.
    Name string
    The name of the User Account.
    AuthScheme RepositoryUserAccountAuthSchemeArgs
    RepositoryId string
    ID of the repository.
    ApprovalConfig RepositoryUserAccountApprovalConfigArgs
    Configurations related to Approvals.
    AuthDatabaseName string
    The database name that this User Account is scoped to, for cyral.Repository types that support multiple databases.
    Name string
    The name of the User Account.
    authScheme RepositoryUserAccountAuthScheme
    repositoryId String
    ID of the repository.
    approvalConfig RepositoryUserAccountApprovalConfig
    Configurations related to Approvals.
    authDatabaseName String
    The database name that this User Account is scoped to, for cyral.Repository types that support multiple databases.
    name String
    The name of the User Account.
    authScheme RepositoryUserAccountAuthScheme
    repositoryId string
    ID of the repository.
    approvalConfig RepositoryUserAccountApprovalConfig
    Configurations related to Approvals.
    authDatabaseName string
    The database name that this User Account is scoped to, for cyral.Repository types that support multiple databases.
    name string
    The name of the User Account.
    auth_scheme RepositoryUserAccountAuthSchemeArgs
    repository_id str
    ID of the repository.
    approval_config RepositoryUserAccountApprovalConfigArgs
    Configurations related to Approvals.
    auth_database_name str
    The database name that this User Account is scoped to, for cyral.Repository types that support multiple databases.
    name str
    The name of the User Account.
    authScheme Property Map
    repositoryId String
    ID of the repository.
    approvalConfig Property Map
    Configurations related to Approvals.
    authDatabaseName String
    The database name that this User Account is scoped to, for cyral.Repository types that support multiple databases.
    name String
    The name of the User Account.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the RepositoryUserAccount resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    UserAccountId string
    ID of the user account.
    Id string
    The provider-assigned unique ID for this managed resource.
    UserAccountId string
    ID of the user account.
    id String
    The provider-assigned unique ID for this managed resource.
    userAccountId String
    ID of the user account.
    id string
    The provider-assigned unique ID for this managed resource.
    userAccountId string
    ID of the user account.
    id str
    The provider-assigned unique ID for this managed resource.
    user_account_id str
    ID of the user account.
    id String
    The provider-assigned unique ID for this managed resource.
    userAccountId String
    ID of the user account.

    Look up Existing RepositoryUserAccount Resource

    Get an existing RepositoryUserAccount resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: RepositoryUserAccountState, opts?: CustomResourceOptions): RepositoryUserAccount
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            approval_config: Optional[RepositoryUserAccountApprovalConfigArgs] = None,
            auth_database_name: Optional[str] = None,
            auth_scheme: Optional[RepositoryUserAccountAuthSchemeArgs] = None,
            name: Optional[str] = None,
            repository_id: Optional[str] = None,
            user_account_id: Optional[str] = None) -> RepositoryUserAccount
    func GetRepositoryUserAccount(ctx *Context, name string, id IDInput, state *RepositoryUserAccountState, opts ...ResourceOption) (*RepositoryUserAccount, error)
    public static RepositoryUserAccount Get(string name, Input<string> id, RepositoryUserAccountState? state, CustomResourceOptions? opts = null)
    public static RepositoryUserAccount get(String name, Output<String> id, RepositoryUserAccountState state, CustomResourceOptions options)
    resources:  _:    type: cyral:RepositoryUserAccount    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    ApprovalConfig RepositoryUserAccountApprovalConfig
    Configurations related to Approvals.
    AuthDatabaseName string
    The database name that this User Account is scoped to, for cyral.Repository types that support multiple databases.
    AuthScheme RepositoryUserAccountAuthScheme
    Name string
    The name of the User Account.
    RepositoryId string
    ID of the repository.
    UserAccountId string
    ID of the user account.
    ApprovalConfig RepositoryUserAccountApprovalConfigArgs
    Configurations related to Approvals.
    AuthDatabaseName string
    The database name that this User Account is scoped to, for cyral.Repository types that support multiple databases.
    AuthScheme RepositoryUserAccountAuthSchemeArgs
    Name string
    The name of the User Account.
    RepositoryId string
    ID of the repository.
    UserAccountId string
    ID of the user account.
    approvalConfig RepositoryUserAccountApprovalConfig
    Configurations related to Approvals.
    authDatabaseName String
    The database name that this User Account is scoped to, for cyral.Repository types that support multiple databases.
    authScheme RepositoryUserAccountAuthScheme
    name String
    The name of the User Account.
    repositoryId String
    ID of the repository.
    userAccountId String
    ID of the user account.
    approvalConfig RepositoryUserAccountApprovalConfig
    Configurations related to Approvals.
    authDatabaseName string
    The database name that this User Account is scoped to, for cyral.Repository types that support multiple databases.
    authScheme RepositoryUserAccountAuthScheme
    name string
    The name of the User Account.
    repositoryId string
    ID of the repository.
    userAccountId string
    ID of the user account.
    approval_config RepositoryUserAccountApprovalConfigArgs
    Configurations related to Approvals.
    auth_database_name str
    The database name that this User Account is scoped to, for cyral.Repository types that support multiple databases.
    auth_scheme RepositoryUserAccountAuthSchemeArgs
    name str
    The name of the User Account.
    repository_id str
    ID of the repository.
    user_account_id str
    ID of the user account.
    approvalConfig Property Map
    Configurations related to Approvals.
    authDatabaseName String
    The database name that this User Account is scoped to, for cyral.Repository types that support multiple databases.
    authScheme Property Map
    name String
    The name of the User Account.
    repositoryId String
    ID of the repository.
    userAccountId String
    ID of the user account.

    Supporting Types

    RepositoryUserAccountApprovalConfig, RepositoryUserAccountApprovalConfigArgs

    AutomaticGrant bool
    If true, approvals can be automatically granted.
    MaxAutoGrantDuration string
    The maximum duration in seconds for approvals can be automatically granted. E.g.: "2000s", `"3000.5s"
    AutomaticGrant bool
    If true, approvals can be automatically granted.
    MaxAutoGrantDuration string
    The maximum duration in seconds for approvals can be automatically granted. E.g.: "2000s", `"3000.5s"
    automaticGrant Boolean
    If true, approvals can be automatically granted.
    maxAutoGrantDuration String
    The maximum duration in seconds for approvals can be automatically granted. E.g.: "2000s", `"3000.5s"
    automaticGrant boolean
    If true, approvals can be automatically granted.
    maxAutoGrantDuration string
    The maximum duration in seconds for approvals can be automatically granted. E.g.: "2000s", `"3000.5s"
    automatic_grant bool
    If true, approvals can be automatically granted.
    max_auto_grant_duration str
    The maximum duration in seconds for approvals can be automatically granted. E.g.: "2000s", `"3000.5s"
    automaticGrant Boolean
    If true, approvals can be automatically granted.
    maxAutoGrantDuration String
    The maximum duration in seconds for approvals can be automatically granted. E.g.: "2000s", `"3000.5s"

    RepositoryUserAccountAuthScheme, RepositoryUserAccountAuthSchemeArgs

    AwsIam RepositoryUserAccountAuthSchemeAwsIam
    Credential option to set the repository user account from AWS IAM.
    AwsSecretsManager RepositoryUserAccountAuthSchemeAwsSecretsManager
    Credential option to set the repository user account from AWS Secrets Manager.
    AzureKeyVault RepositoryUserAccountAuthSchemeAzureKeyVault
    Credential option to set the repository user account from Azure Key Vault.
    CyralStorage RepositoryUserAccountAuthSchemeCyralStorage
    Credential option to set the repository user account from Cyral Storage.
    EnvironmentVariable RepositoryUserAccountAuthSchemeEnvironmentVariable
    Credential option to set the repository user account from Environment Variable.
    GcpSecretsManager RepositoryUserAccountAuthSchemeGcpSecretsManager
    Credential option to set the repository user account from GCP Secrets Manager.
    HashicorpVault RepositoryUserAccountAuthSchemeHashicorpVault
    KubernetesSecret RepositoryUserAccountAuthSchemeKubernetesSecret
    Credential option to set the repository user account from a Kubernetes secret.
    AwsIam RepositoryUserAccountAuthSchemeAwsIam
    Credential option to set the repository user account from AWS IAM.
    AwsSecretsManager RepositoryUserAccountAuthSchemeAwsSecretsManager
    Credential option to set the repository user account from AWS Secrets Manager.
    AzureKeyVault RepositoryUserAccountAuthSchemeAzureKeyVault
    Credential option to set the repository user account from Azure Key Vault.
    CyralStorage RepositoryUserAccountAuthSchemeCyralStorage
    Credential option to set the repository user account from Cyral Storage.
    EnvironmentVariable RepositoryUserAccountAuthSchemeEnvironmentVariable
    Credential option to set the repository user account from Environment Variable.
    GcpSecretsManager RepositoryUserAccountAuthSchemeGcpSecretsManager
    Credential option to set the repository user account from GCP Secrets Manager.
    HashicorpVault RepositoryUserAccountAuthSchemeHashicorpVault
    KubernetesSecret RepositoryUserAccountAuthSchemeKubernetesSecret
    Credential option to set the repository user account from a Kubernetes secret.
    awsIam RepositoryUserAccountAuthSchemeAwsIam
    Credential option to set the repository user account from AWS IAM.
    awsSecretsManager RepositoryUserAccountAuthSchemeAwsSecretsManager
    Credential option to set the repository user account from AWS Secrets Manager.
    azureKeyVault RepositoryUserAccountAuthSchemeAzureKeyVault
    Credential option to set the repository user account from Azure Key Vault.
    cyralStorage RepositoryUserAccountAuthSchemeCyralStorage
    Credential option to set the repository user account from Cyral Storage.
    environmentVariable RepositoryUserAccountAuthSchemeEnvironmentVariable
    Credential option to set the repository user account from Environment Variable.
    gcpSecretsManager RepositoryUserAccountAuthSchemeGcpSecretsManager
    Credential option to set the repository user account from GCP Secrets Manager.
    hashicorpVault RepositoryUserAccountAuthSchemeHashicorpVault
    kubernetesSecret RepositoryUserAccountAuthSchemeKubernetesSecret
    Credential option to set the repository user account from a Kubernetes secret.
    awsIam RepositoryUserAccountAuthSchemeAwsIam
    Credential option to set the repository user account from AWS IAM.
    awsSecretsManager RepositoryUserAccountAuthSchemeAwsSecretsManager
    Credential option to set the repository user account from AWS Secrets Manager.
    azureKeyVault RepositoryUserAccountAuthSchemeAzureKeyVault
    Credential option to set the repository user account from Azure Key Vault.
    cyralStorage RepositoryUserAccountAuthSchemeCyralStorage
    Credential option to set the repository user account from Cyral Storage.
    environmentVariable RepositoryUserAccountAuthSchemeEnvironmentVariable
    Credential option to set the repository user account from Environment Variable.
    gcpSecretsManager RepositoryUserAccountAuthSchemeGcpSecretsManager
    Credential option to set the repository user account from GCP Secrets Manager.
    hashicorpVault RepositoryUserAccountAuthSchemeHashicorpVault
    kubernetesSecret RepositoryUserAccountAuthSchemeKubernetesSecret
    Credential option to set the repository user account from a Kubernetes secret.
    aws_iam RepositoryUserAccountAuthSchemeAwsIam
    Credential option to set the repository user account from AWS IAM.
    aws_secrets_manager RepositoryUserAccountAuthSchemeAwsSecretsManager
    Credential option to set the repository user account from AWS Secrets Manager.
    azure_key_vault RepositoryUserAccountAuthSchemeAzureKeyVault
    Credential option to set the repository user account from Azure Key Vault.
    cyral_storage RepositoryUserAccountAuthSchemeCyralStorage
    Credential option to set the repository user account from Cyral Storage.
    environment_variable RepositoryUserAccountAuthSchemeEnvironmentVariable
    Credential option to set the repository user account from Environment Variable.
    gcp_secrets_manager RepositoryUserAccountAuthSchemeGcpSecretsManager
    Credential option to set the repository user account from GCP Secrets Manager.
    hashicorp_vault RepositoryUserAccountAuthSchemeHashicorpVault
    kubernetes_secret RepositoryUserAccountAuthSchemeKubernetesSecret
    Credential option to set the repository user account from a Kubernetes secret.
    awsIam Property Map
    Credential option to set the repository user account from AWS IAM.
    awsSecretsManager Property Map
    Credential option to set the repository user account from AWS Secrets Manager.
    azureKeyVault Property Map
    Credential option to set the repository user account from Azure Key Vault.
    cyralStorage Property Map
    Credential option to set the repository user account from Cyral Storage.
    environmentVariable Property Map
    Credential option to set the repository user account from Environment Variable.
    gcpSecretsManager Property Map
    Credential option to set the repository user account from GCP Secrets Manager.
    hashicorpVault Property Map
    kubernetesSecret Property Map
    Credential option to set the repository user account from a Kubernetes secret.

    RepositoryUserAccountAuthSchemeAwsIam, RepositoryUserAccountAuthSchemeAwsIamArgs

    RoleArn string
    The AWS IAM roleARN to gain access to the database.
    AuthenticateAsIamRole bool
    Indicates whether to access as an AWS IAM role (true)or a native database user (false). Defaults to false.
    RoleArn string
    The AWS IAM roleARN to gain access to the database.
    AuthenticateAsIamRole bool
    Indicates whether to access as an AWS IAM role (true)or a native database user (false). Defaults to false.
    roleArn String
    The AWS IAM roleARN to gain access to the database.
    authenticateAsIamRole Boolean
    Indicates whether to access as an AWS IAM role (true)or a native database user (false). Defaults to false.
    roleArn string
    The AWS IAM roleARN to gain access to the database.
    authenticateAsIamRole boolean
    Indicates whether to access as an AWS IAM role (true)or a native database user (false). Defaults to false.
    role_arn str
    The AWS IAM roleARN to gain access to the database.
    authenticate_as_iam_role bool
    Indicates whether to access as an AWS IAM role (true)or a native database user (false). Defaults to false.
    roleArn String
    The AWS IAM roleARN to gain access to the database.
    authenticateAsIamRole Boolean
    Indicates whether to access as an AWS IAM role (true)or a native database user (false). Defaults to false.

    RepositoryUserAccountAuthSchemeAwsSecretsManager, RepositoryUserAccountAuthSchemeAwsSecretsManagerArgs

    SecretArn string
    The AWS Secrets Manager secretARN to gain access to the database.
    SecretArn string
    The AWS Secrets Manager secretARN to gain access to the database.
    secretArn String
    The AWS Secrets Manager secretARN to gain access to the database.
    secretArn string
    The AWS Secrets Manager secretARN to gain access to the database.
    secret_arn str
    The AWS Secrets Manager secretARN to gain access to the database.
    secretArn String
    The AWS Secrets Manager secretARN to gain access to the database.

    RepositoryUserAccountAuthSchemeAzureKeyVault, RepositoryUserAccountAuthSchemeAzureKeyVaultArgs

    SecretUrl string
    The URL of the secret in the Azure Key Vault.
    SecretUrl string
    The URL of the secret in the Azure Key Vault.
    secretUrl String
    The URL of the secret in the Azure Key Vault.
    secretUrl string
    The URL of the secret in the Azure Key Vault.
    secret_url str
    The URL of the secret in the Azure Key Vault.
    secretUrl String
    The URL of the secret in the Azure Key Vault.

    RepositoryUserAccountAuthSchemeCyralStorage, RepositoryUserAccountAuthSchemeCyralStorageArgs

    Password string
    The Cyral Storage password to gain access to the database.
    Password string
    The Cyral Storage password to gain access to the database.
    password String
    The Cyral Storage password to gain access to the database.
    password string
    The Cyral Storage password to gain access to the database.
    password str
    The Cyral Storage password to gain access to the database.
    password String
    The Cyral Storage password to gain access to the database.

    RepositoryUserAccountAuthSchemeEnvironmentVariable, RepositoryUserAccountAuthSchemeEnvironmentVariableArgs

    VariableName string
    Name of the environment variable that will store credentials.
    VariableName string
    Name of the environment variable that will store credentials.
    variableName String
    Name of the environment variable that will store credentials.
    variableName string
    Name of the environment variable that will store credentials.
    variable_name str
    Name of the environment variable that will store credentials.
    variableName String
    Name of the environment variable that will store credentials.

    RepositoryUserAccountAuthSchemeGcpSecretsManager, RepositoryUserAccountAuthSchemeGcpSecretsManagerArgs

    SecretName string
    The unique identifier of the secret in GCP Secrets Manager.
    SecretName string
    The unique identifier of the secret in GCP Secrets Manager.
    secretName String
    The unique identifier of the secret in GCP Secrets Manager.
    secretName string
    The unique identifier of the secret in GCP Secrets Manager.
    secret_name str
    The unique identifier of the secret in GCP Secrets Manager.
    secretName String
    The unique identifier of the secret in GCP Secrets Manager.

    RepositoryUserAccountAuthSchemeHashicorpVault, RepositoryUserAccountAuthSchemeHashicorpVaultArgs

    IsDynamicUserAccount bool
    Some Vault engines allow the dynamic creation of user accounts, meaning the username used to log in to the database may change from time to time.
    Path string
    The location in the Vault where the database username and password may be retrieved.
    IsDynamicUserAccount bool
    Some Vault engines allow the dynamic creation of user accounts, meaning the username used to log in to the database may change from time to time.
    Path string
    The location in the Vault where the database username and password may be retrieved.
    isDynamicUserAccount Boolean
    Some Vault engines allow the dynamic creation of user accounts, meaning the username used to log in to the database may change from time to time.
    path String
    The location in the Vault where the database username and password may be retrieved.
    isDynamicUserAccount boolean
    Some Vault engines allow the dynamic creation of user accounts, meaning the username used to log in to the database may change from time to time.
    path string
    The location in the Vault where the database username and password may be retrieved.
    is_dynamic_user_account bool
    Some Vault engines allow the dynamic creation of user accounts, meaning the username used to log in to the database may change from time to time.
    path str
    The location in the Vault where the database username and password may be retrieved.
    isDynamicUserAccount Boolean
    Some Vault engines allow the dynamic creation of user accounts, meaning the username used to log in to the database may change from time to time.
    path String
    The location in the Vault where the database username and password may be retrieved.

    RepositoryUserAccountAuthSchemeKubernetesSecret, RepositoryUserAccountAuthSchemeKubernetesSecretArgs

    SecretKey string
    The key of the credentials JSON blob within the secret.
    SecretName string
    The unique identifier of the secret in Kubernetes.
    SecretKey string
    The key of the credentials JSON blob within the secret.
    SecretName string
    The unique identifier of the secret in Kubernetes.
    secretKey String
    The key of the credentials JSON blob within the secret.
    secretName String
    The unique identifier of the secret in Kubernetes.
    secretKey string
    The key of the credentials JSON blob within the secret.
    secretName string
    The unique identifier of the secret in Kubernetes.
    secret_key str
    The key of the credentials JSON blob within the secret.
    secret_name str
    The unique identifier of the secret in Kubernetes.
    secretKey String
    The key of the credentials JSON blob within the secret.
    secretName String
    The unique identifier of the secret in Kubernetes.

    Package Details

    Repository
    cyral cyralinc/terraform-provider-cyral
    License
    Notes
    This Pulumi package is based on the cyral Terraform Provider.
    cyral logo
    cyral 4.16.3 published on Monday, Apr 14, 2025 by cyralinc