ibm 1.78.0 published on Wednesday, Apr 30, 2025 by ibm-cloud
ibm.getSmConfigurations
Explore with Pulumi AI
Provides a read-only data source for the list of configuration metadata. You can then reference the fields of the data source in other resources within the same configuration using interpolation syntax.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as ibm from "@pulumi/ibm";
const configurations = ibm.getSmConfigurations({
instanceId: ibm_resource_instance.sm_instance.guid,
region: "us-south",
});
import pulumi
import pulumi_ibm as ibm
configurations = ibm.get_sm_configurations(instance_id=ibm_resource_instance["sm_instance"]["guid"],
region="us-south")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/ibm/ibm"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := ibm.GetSmConfigurations(ctx, &ibm.GetSmConfigurationsArgs{
InstanceId: ibm_resource_instance.Sm_instance.Guid,
Region: pulumi.StringRef("us-south"),
}, nil)
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Ibm = Pulumi.Ibm;
return await Deployment.RunAsync(() =>
{
var configurations = Ibm.GetSmConfigurations.Invoke(new()
{
InstanceId = ibm_resource_instance.Sm_instance.Guid,
Region = "us-south",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.ibm.IbmFunctions;
import com.pulumi.ibm.inputs.GetSmConfigurationsArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
final var configurations = IbmFunctions.getSmConfigurations(GetSmConfigurationsArgs.builder()
.instanceId(ibm_resource_instance.sm_instance().guid())
.region("us-south")
.build());
}
}
variables:
configurations:
fn::invoke:
function: ibm:getSmConfigurations
arguments:
instanceId: ${ibm_resource_instance.sm_instance.guid}
region: us-south
Using getSmConfigurations
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getSmConfigurations(args: GetSmConfigurationsArgs, opts?: InvokeOptions): Promise<GetSmConfigurationsResult>
function getSmConfigurationsOutput(args: GetSmConfigurationsOutputArgs, opts?: InvokeOptions): Output<GetSmConfigurationsResult>
def get_sm_configurations(endpoint_type: Optional[str] = None,
groups: Optional[str] = None,
id: Optional[str] = None,
instance_id: Optional[str] = None,
region: Optional[str] = None,
search: Optional[str] = None,
secret_types: Optional[Sequence[str]] = None,
sort: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetSmConfigurationsResult
def get_sm_configurations_output(endpoint_type: Optional[pulumi.Input[str]] = None,
groups: Optional[pulumi.Input[str]] = None,
id: Optional[pulumi.Input[str]] = None,
instance_id: Optional[pulumi.Input[str]] = None,
region: Optional[pulumi.Input[str]] = None,
search: Optional[pulumi.Input[str]] = None,
secret_types: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None,
sort: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetSmConfigurationsResult]
func GetSmConfigurations(ctx *Context, args *GetSmConfigurationsArgs, opts ...InvokeOption) (*GetSmConfigurationsResult, error)
func GetSmConfigurationsOutput(ctx *Context, args *GetSmConfigurationsOutputArgs, opts ...InvokeOption) GetSmConfigurationsResultOutput
> Note: This function is named GetSmConfigurations
in the Go SDK.
public static class GetSmConfigurations
{
public static Task<GetSmConfigurationsResult> InvokeAsync(GetSmConfigurationsArgs args, InvokeOptions? opts = null)
public static Output<GetSmConfigurationsResult> Invoke(GetSmConfigurationsInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetSmConfigurationsResult> getSmConfigurations(GetSmConfigurationsArgs args, InvokeOptions options)
public static Output<GetSmConfigurationsResult> getSmConfigurations(GetSmConfigurationsArgs args, InvokeOptions options)
fn::invoke:
function: ibm:index/getSmConfigurations:getSmConfigurations
arguments:
# arguments dictionary
The following arguments are supported:
- Instance
Id string - The GUID of the Secrets Manager instance.
- Endpoint
Type string - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- Groups string
- Id string
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- Region string
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- Search string
- Obtain a collection of configurations that contain the specified string in one or more of the fields:
name
,config_type
,secret_type
. - Secret
Types List<string> - Filter configurations by secret types:
iam_credentials
,public_cert
orprivate_cert
. You can apply multiple filters by using a comma-separated list of secret types. - Sort string
- Sort a collection of configurations by the specified field in ascending order. To sort in descending order use the
-
character.- Constraints: Allowable values are:
config_type
,secret_type
,name
.
- Constraints: Allowable values are:
- Instance
Id string - The GUID of the Secrets Manager instance.
- Endpoint
Type string - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- Groups string
- Id string
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- Region string
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- Search string
- Obtain a collection of configurations that contain the specified string in one or more of the fields:
name
,config_type
,secret_type
. - Secret
Types []string - Filter configurations by secret types:
iam_credentials
,public_cert
orprivate_cert
. You can apply multiple filters by using a comma-separated list of secret types. - Sort string
- Sort a collection of configurations by the specified field in ascending order. To sort in descending order use the
-
character.- Constraints: Allowable values are:
config_type
,secret_type
,name
.
- Constraints: Allowable values are:
- instance
Id String - The GUID of the Secrets Manager instance.
- endpoint
Type String - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- groups String
- id String
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- region String
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- search String
- Obtain a collection of configurations that contain the specified string in one or more of the fields:
name
,config_type
,secret_type
. - secret
Types List<String> - Filter configurations by secret types:
iam_credentials
,public_cert
orprivate_cert
. You can apply multiple filters by using a comma-separated list of secret types. - sort String
- Sort a collection of configurations by the specified field in ascending order. To sort in descending order use the
-
character.- Constraints: Allowable values are:
config_type
,secret_type
,name
.
- Constraints: Allowable values are:
- instance
Id string - The GUID of the Secrets Manager instance.
- endpoint
Type string - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- groups string
- id string
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- region string
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- search string
- Obtain a collection of configurations that contain the specified string in one or more of the fields:
name
,config_type
,secret_type
. - secret
Types string[] - Filter configurations by secret types:
iam_credentials
,public_cert
orprivate_cert
. You can apply multiple filters by using a comma-separated list of secret types. - sort string
- Sort a collection of configurations by the specified field in ascending order. To sort in descending order use the
-
character.- Constraints: Allowable values are:
config_type
,secret_type
,name
.
- Constraints: Allowable values are:
- instance_
id str - The GUID of the Secrets Manager instance.
- endpoint_
type str - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- groups str
- id str
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- region str
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- search str
- Obtain a collection of configurations that contain the specified string in one or more of the fields:
name
,config_type
,secret_type
. - secret_
types Sequence[str] - Filter configurations by secret types:
iam_credentials
,public_cert
orprivate_cert
. You can apply multiple filters by using a comma-separated list of secret types. - sort str
- Sort a collection of configurations by the specified field in ascending order. To sort in descending order use the
-
character.- Constraints: Allowable values are:
config_type
,secret_type
,name
.
- Constraints: Allowable values are:
- instance
Id String - The GUID of the Secrets Manager instance.
- endpoint
Type String - The endpoint type. If not provided the endpoint type is determined by the
visibility
argument provided in the provider configuration.- Constraints: Allowable values are:
private
,public
.
- Constraints: Allowable values are:
- groups String
- id String
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- region String
- The region of the Secrets Manager instance. If not provided defaults to the region defined in the IBM provider configuration.
- search String
- Obtain a collection of configurations that contain the specified string in one or more of the fields:
name
,config_type
,secret_type
. - secret
Types List<String> - Filter configurations by secret types:
iam_credentials
,public_cert
orprivate_cert
. You can apply multiple filters by using a comma-separated list of secret types. - sort String
- Sort a collection of configurations by the specified field in ascending order. To sort in descending order use the
-
character.- Constraints: Allowable values are:
config_type
,secret_type
,name
.
- Constraints: Allowable values are:
getSmConfigurations Result
The following output properties are available:
- Configurations
List<Get
Sm Configurations Configuration> - (List) A collection of configuration metadata.
- Constraints: The maximum length is
1000
items. The minimum length is0
items. Nested scheme for configurations:
- Constraints: The maximum length is
- Id string
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- Instance
Id string - Region string
- Total
Count double - Endpoint
Type string - Groups string
- Search string
- Secret
Types List<string> - Sort string
- Configurations
[]Get
Sm Configurations Configuration - (List) A collection of configuration metadata.
- Constraints: The maximum length is
1000
items. The minimum length is0
items. Nested scheme for configurations:
- Constraints: The maximum length is
- Id string
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- Instance
Id string - Region string
- Total
Count float64 - Endpoint
Type string - Groups string
- Search string
- Secret
Types []string - Sort string
- configurations
List<Get
Sm Configurations Configuration> - (List) A collection of configuration metadata.
- Constraints: The maximum length is
1000
items. The minimum length is0
items. Nested scheme for configurations:
- Constraints: The maximum length is
- id String
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- instance
Id String - region String
- total
Count Double - endpoint
Type String - groups String
- search String
- secret
Types List<String> - sort String
- configurations
Get
Sm Configurations Configuration[] - (List) A collection of configuration metadata.
- Constraints: The maximum length is
1000
items. The minimum length is0
items. Nested scheme for configurations:
- Constraints: The maximum length is
- id string
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- instance
Id string - region string
- total
Count number - endpoint
Type string - groups string
- search string
- secret
Types string[] - sort string
- configurations
Sequence[Get
Sm Configurations Configuration] - (List) A collection of configuration metadata.
- Constraints: The maximum length is
1000
items. The minimum length is0
items. Nested scheme for configurations:
- Constraints: The maximum length is
- id str
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- instance_
id str - region str
- total_
count float - endpoint_
type str - groups str
- search str
- secret_
types Sequence[str] - sort str
- configurations List<Property Map>
- (List) A collection of configuration metadata.
- Constraints: The maximum length is
1000
items. The minimum length is0
items. Nested scheme for configurations:
- Constraints: The maximum length is
- id String
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- instance
Id String - region String
- total
Count Number - endpoint
Type String - groups String
- search String
- secret
Types List<String> - sort String
Supporting Types
GetSmConfigurationsConfiguration
- string
- (String) The name of the intermediate certificate authority.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/^[A-Za-z0-9][A-Za-z0-9]*(?:_?-?\\.?[A-Za-z0-9]+)*$/
.
- Constraints: The maximum length is
- Common
Name string - (String) The Common Name (AKA CN) represents the server name that is protected by the SSL certificate.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Config
Type string - (String) Th configuration type.
- Constraints: Allowable values are:
public_cert_configuration_ca_lets_encrypt
,public_cert_configuration_dns_classic_infrastructure
,public_cert_configuration_dns_cloud_internet_services
,iam_credentials_configuration
,private_cert_configuration_root_ca
,private_cert_configuration_intermediate_ca
,private_cert_configuration_template
.
- Constraints: Allowable values are:
- Created
At string - (String) The date when a resource was created. The date format follows RFC 3339.
- Created
By string - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- Crl
Distribution boolPoints Encoded - (Boolean) Determines whether to encode the certificate revocation list (CRL) distribution points in the certificates that are issued by this certificate authority.
- Crypto
Keys List<GetSm Configurations Configuration Crypto Key> - (List) The data that is associated with a cryptographic key. Nested scheme for crypto_key:
- Expiration
Date string - (String) The date a secret is expired. The date format follows RFC 3339.
- Issuer string
- (String) The distinguished name that identifies the entity that signed and issued the certificate.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Key
Bits double - (Integer) The number of bits to use to generate the private key.Allowable values for RSA keys are:
2048
and4096
. Allowable values for EC keys are:224
,256
,384
, and521
. The default for RSA keys is2048
. The default for EC keys is256
. - Key
Type string - (String) The type of private key to generate.
- Constraints: Allowable values are:
rsa
,ec
.
- Constraints: Allowable values are:
- Lets
Encrypt stringEnvironment - (String) The configuration of the Let's Encrypt CA environment.
- Constraints: Allowable values are:
production
,staging
.
- Constraints: Allowable values are:
- Lets
Encrypt stringPreferred Chain - (String) Prefer the chain with an issuer matching this Subject Common Name.
- Constraints: The maximum length is
30
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Name string
- (String) The unique name of your configuration.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Secret
Type string - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- Signing
Method string - (String) The signing method to use with this certificate authority to generate private certificates.You can choose between internal or externally signed options. For more information, see the docs.
- Constraints: Allowable values are:
internal
,external
.
- Constraints: Allowable values are:
- Status string
- (String) The status of the certificate authority. The status of a root certificate authority is either
configured
orexpired
. For intermediate certificate authorities, possible statuses includesigning_required
,signed_certificate_required
,certificate_template_required
,configured
,expired
orrevoked
.- Constraints: Allowable values are:
signing_required
,signed_certificate_required
,certificate_template_required
,configured
,expired
,revoked
.
- Constraints: Allowable values are:
- Updated
At string - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- string
- (String) The name of the intermediate certificate authority.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/^[A-Za-z0-9][A-Za-z0-9]*(?:_?-?\\.?[A-Za-z0-9]+)*$/
.
- Constraints: The maximum length is
- Common
Name string - (String) The Common Name (AKA CN) represents the server name that is protected by the SSL certificate.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Config
Type string - (String) Th configuration type.
- Constraints: Allowable values are:
public_cert_configuration_ca_lets_encrypt
,public_cert_configuration_dns_classic_infrastructure
,public_cert_configuration_dns_cloud_internet_services
,iam_credentials_configuration
,private_cert_configuration_root_ca
,private_cert_configuration_intermediate_ca
,private_cert_configuration_template
.
- Constraints: Allowable values are:
- Created
At string - (String) The date when a resource was created. The date format follows RFC 3339.
- Created
By string - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- Crl
Distribution boolPoints Encoded - (Boolean) Determines whether to encode the certificate revocation list (CRL) distribution points in the certificates that are issued by this certificate authority.
- Crypto
Keys []GetSm Configurations Configuration Crypto Key - (List) The data that is associated with a cryptographic key. Nested scheme for crypto_key:
- Expiration
Date string - (String) The date a secret is expired. The date format follows RFC 3339.
- Issuer string
- (String) The distinguished name that identifies the entity that signed and issued the certificate.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Key
Bits float64 - (Integer) The number of bits to use to generate the private key.Allowable values for RSA keys are:
2048
and4096
. Allowable values for EC keys are:224
,256
,384
, and521
. The default for RSA keys is2048
. The default for EC keys is256
. - Key
Type string - (String) The type of private key to generate.
- Constraints: Allowable values are:
rsa
,ec
.
- Constraints: Allowable values are:
- Lets
Encrypt stringEnvironment - (String) The configuration of the Let's Encrypt CA environment.
- Constraints: Allowable values are:
production
,staging
.
- Constraints: Allowable values are:
- Lets
Encrypt stringPreferred Chain - (String) Prefer the chain with an issuer matching this Subject Common Name.
- Constraints: The maximum length is
30
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Name string
- (String) The unique name of your configuration.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- Secret
Type string - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- Signing
Method string - (String) The signing method to use with this certificate authority to generate private certificates.You can choose between internal or externally signed options. For more information, see the docs.
- Constraints: Allowable values are:
internal
,external
.
- Constraints: Allowable values are:
- Status string
- (String) The status of the certificate authority. The status of a root certificate authority is either
configured
orexpired
. For intermediate certificate authorities, possible statuses includesigning_required
,signed_certificate_required
,certificate_template_required
,configured
,expired
orrevoked
.- Constraints: Allowable values are:
signing_required
,signed_certificate_required
,certificate_template_required
,configured
,expired
,revoked
.
- Constraints: Allowable values are:
- Updated
At string - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- String
- (String) The name of the intermediate certificate authority.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/^[A-Za-z0-9][A-Za-z0-9]*(?:_?-?\\.?[A-Za-z0-9]+)*$/
.
- Constraints: The maximum length is
- common
Name String - (String) The Common Name (AKA CN) represents the server name that is protected by the SSL certificate.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- config
Type String - (String) Th configuration type.
- Constraints: Allowable values are:
public_cert_configuration_ca_lets_encrypt
,public_cert_configuration_dns_classic_infrastructure
,public_cert_configuration_dns_cloud_internet_services
,iam_credentials_configuration
,private_cert_configuration_root_ca
,private_cert_configuration_intermediate_ca
,private_cert_configuration_template
.
- Constraints: Allowable values are:
- created
At String - (String) The date when a resource was created. The date format follows RFC 3339.
- created
By String - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- crl
Distribution BooleanPoints Encoded - (Boolean) Determines whether to encode the certificate revocation list (CRL) distribution points in the certificates that are issued by this certificate authority.
- crypto
Keys List<GetSm Configurations Configuration Crypto Key> - (List) The data that is associated with a cryptographic key. Nested scheme for crypto_key:
- expiration
Date String - (String) The date a secret is expired. The date format follows RFC 3339.
- issuer String
- (String) The distinguished name that identifies the entity that signed and issued the certificate.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- key
Bits Double - (Integer) The number of bits to use to generate the private key.Allowable values for RSA keys are:
2048
and4096
. Allowable values for EC keys are:224
,256
,384
, and521
. The default for RSA keys is2048
. The default for EC keys is256
. - key
Type String - (String) The type of private key to generate.
- Constraints: Allowable values are:
rsa
,ec
.
- Constraints: Allowable values are:
- lets
Encrypt StringEnvironment - (String) The configuration of the Let's Encrypt CA environment.
- Constraints: Allowable values are:
production
,staging
.
- Constraints: Allowable values are:
- lets
Encrypt StringPreferred Chain - (String) Prefer the chain with an issuer matching this Subject Common Name.
- Constraints: The maximum length is
30
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- name String
- (String) The unique name of your configuration.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- secret
Type String - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- signing
Method String - (String) The signing method to use with this certificate authority to generate private certificates.You can choose between internal or externally signed options. For more information, see the docs.
- Constraints: Allowable values are:
internal
,external
.
- Constraints: Allowable values are:
- status String
- (String) The status of the certificate authority. The status of a root certificate authority is either
configured
orexpired
. For intermediate certificate authorities, possible statuses includesigning_required
,signed_certificate_required
,certificate_template_required
,configured
,expired
orrevoked
.- Constraints: Allowable values are:
signing_required
,signed_certificate_required
,certificate_template_required
,configured
,expired
,revoked
.
- Constraints: Allowable values are:
- updated
At String - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- string
- (String) The name of the intermediate certificate authority.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/^[A-Za-z0-9][A-Za-z0-9]*(?:_?-?\\.?[A-Za-z0-9]+)*$/
.
- Constraints: The maximum length is
- common
Name string - (String) The Common Name (AKA CN) represents the server name that is protected by the SSL certificate.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- config
Type string - (String) Th configuration type.
- Constraints: Allowable values are:
public_cert_configuration_ca_lets_encrypt
,public_cert_configuration_dns_classic_infrastructure
,public_cert_configuration_dns_cloud_internet_services
,iam_credentials_configuration
,private_cert_configuration_root_ca
,private_cert_configuration_intermediate_ca
,private_cert_configuration_template
.
- Constraints: Allowable values are:
- created
At string - (String) The date when a resource was created. The date format follows RFC 3339.
- created
By string - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- crl
Distribution booleanPoints Encoded - (Boolean) Determines whether to encode the certificate revocation list (CRL) distribution points in the certificates that are issued by this certificate authority.
- crypto
Keys GetSm Configurations Configuration Crypto Key[] - (List) The data that is associated with a cryptographic key. Nested scheme for crypto_key:
- expiration
Date string - (String) The date a secret is expired. The date format follows RFC 3339.
- issuer string
- (String) The distinguished name that identifies the entity that signed and issued the certificate.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- key
Bits number - (Integer) The number of bits to use to generate the private key.Allowable values for RSA keys are:
2048
and4096
. Allowable values for EC keys are:224
,256
,384
, and521
. The default for RSA keys is2048
. The default for EC keys is256
. - key
Type string - (String) The type of private key to generate.
- Constraints: Allowable values are:
rsa
,ec
.
- Constraints: Allowable values are:
- lets
Encrypt stringEnvironment - (String) The configuration of the Let's Encrypt CA environment.
- Constraints: Allowable values are:
production
,staging
.
- Constraints: Allowable values are:
- lets
Encrypt stringPreferred Chain - (String) Prefer the chain with an issuer matching this Subject Common Name.
- Constraints: The maximum length is
30
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- name string
- (String) The unique name of your configuration.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- secret
Type string - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- signing
Method string - (String) The signing method to use with this certificate authority to generate private certificates.You can choose between internal or externally signed options. For more information, see the docs.
- Constraints: Allowable values are:
internal
,external
.
- Constraints: Allowable values are:
- status string
- (String) The status of the certificate authority. The status of a root certificate authority is either
configured
orexpired
. For intermediate certificate authorities, possible statuses includesigning_required
,signed_certificate_required
,certificate_template_required
,configured
,expired
orrevoked
.- Constraints: Allowable values are:
signing_required
,signed_certificate_required
,certificate_template_required
,configured
,expired
,revoked
.
- Constraints: Allowable values are:
- updated
At string - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- str
- (String) The name of the intermediate certificate authority.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/^[A-Za-z0-9][A-Za-z0-9]*(?:_?-?\\.?[A-Za-z0-9]+)*$/
.
- Constraints: The maximum length is
- common_
name str - (String) The Common Name (AKA CN) represents the server name that is protected by the SSL certificate.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- config_
type str - (String) Th configuration type.
- Constraints: Allowable values are:
public_cert_configuration_ca_lets_encrypt
,public_cert_configuration_dns_classic_infrastructure
,public_cert_configuration_dns_cloud_internet_services
,iam_credentials_configuration
,private_cert_configuration_root_ca
,private_cert_configuration_intermediate_ca
,private_cert_configuration_template
.
- Constraints: Allowable values are:
- created_
at str - (String) The date when a resource was created. The date format follows RFC 3339.
- created_
by str - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- crl_
distribution_ boolpoints_ encoded - (Boolean) Determines whether to encode the certificate revocation list (CRL) distribution points in the certificates that are issued by this certificate authority.
- crypto_
keys Sequence[GetSm Configurations Configuration Crypto Key] - (List) The data that is associated with a cryptographic key. Nested scheme for crypto_key:
- expiration_
date str - (String) The date a secret is expired. The date format follows RFC 3339.
- issuer str
- (String) The distinguished name that identifies the entity that signed and issued the certificate.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- key_
bits float - (Integer) The number of bits to use to generate the private key.Allowable values for RSA keys are:
2048
and4096
. Allowable values for EC keys are:224
,256
,384
, and521
. The default for RSA keys is2048
. The default for EC keys is256
. - key_
type str - (String) The type of private key to generate.
- Constraints: Allowable values are:
rsa
,ec
.
- Constraints: Allowable values are:
- lets_
encrypt_ strenvironment - (String) The configuration of the Let's Encrypt CA environment.
- Constraints: Allowable values are:
production
,staging
.
- Constraints: Allowable values are:
- lets_
encrypt_ strpreferred_ chain - (String) Prefer the chain with an issuer matching this Subject Common Name.
- Constraints: The maximum length is
30
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- name str
- (String) The unique name of your configuration.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- secret_
type str - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- signing_
method str - (String) The signing method to use with this certificate authority to generate private certificates.You can choose between internal or externally signed options. For more information, see the docs.
- Constraints: Allowable values are:
internal
,external
.
- Constraints: Allowable values are:
- status str
- (String) The status of the certificate authority. The status of a root certificate authority is either
configured
orexpired
. For intermediate certificate authorities, possible statuses includesigning_required
,signed_certificate_required
,certificate_template_required
,configured
,expired
orrevoked
.- Constraints: Allowable values are:
signing_required
,signed_certificate_required
,certificate_template_required
,configured
,expired
,revoked
.
- Constraints: Allowable values are:
- updated_
at str - (String) The date when a resource was recently modified. The date format follows RFC 3339.
- String
- (String) The name of the intermediate certificate authority.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/^[A-Za-z0-9][A-Za-z0-9]*(?:_?-?\\.?[A-Za-z0-9]+)*$/
.
- Constraints: The maximum length is
- common
Name String - (String) The Common Name (AKA CN) represents the server name that is protected by the SSL certificate.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- config
Type String - (String) Th configuration type.
- Constraints: Allowable values are:
public_cert_configuration_ca_lets_encrypt
,public_cert_configuration_dns_classic_infrastructure
,public_cert_configuration_dns_cloud_internet_services
,iam_credentials_configuration
,private_cert_configuration_root_ca
,private_cert_configuration_intermediate_ca
,private_cert_configuration_template
.
- Constraints: Allowable values are:
- created
At String - (String) The date when a resource was created. The date format follows RFC 3339.
- created
By String - (String) The unique identifier that is associated with the entity that created the secret.
- Constraints: The maximum length is
128
characters. The minimum length is4
characters.
- Constraints: The maximum length is
- crl
Distribution BooleanPoints Encoded - (Boolean) Determines whether to encode the certificate revocation list (CRL) distribution points in the certificates that are issued by this certificate authority.
- crypto
Keys List<Property Map> - (List) The data that is associated with a cryptographic key. Nested scheme for crypto_key:
- expiration
Date String - (String) The date a secret is expired. The date format follows RFC 3339.
- issuer String
- (String) The distinguished name that identifies the entity that signed and issued the certificate.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- key
Bits Number - (Integer) The number of bits to use to generate the private key.Allowable values for RSA keys are:
2048
and4096
. Allowable values for EC keys are:224
,256
,384
, and521
. The default for RSA keys is2048
. The default for EC keys is256
. - key
Type String - (String) The type of private key to generate.
- Constraints: Allowable values are:
rsa
,ec
.
- Constraints: Allowable values are:
- lets
Encrypt StringEnvironment - (String) The configuration of the Let's Encrypt CA environment.
- Constraints: Allowable values are:
production
,staging
.
- Constraints: Allowable values are:
- lets
Encrypt StringPreferred Chain - (String) Prefer the chain with an issuer matching this Subject Common Name.
- Constraints: The maximum length is
30
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- name String
- (String) The unique name of your configuration.
- Constraints: The maximum length is
128
characters. The minimum length is2
characters. The value must match regular expression/(.*?)/
.
- Constraints: The maximum length is
- secret
Type String - (String) The secret type. Supported types are arbitrary, certificates (imported, public, and private), IAM credentials, key-value, and user credentials.
- Constraints: Allowable values are:
arbitrary
,imported_cert
,public_cert
,iam_credentials
,kv
,username_password
,private_cert
.
- Constraints: Allowable values are:
- signing
Method String - (String) The signing method to use with this certificate authority to generate private certificates.You can choose between internal or externally signed options. For more information, see the docs.
- Constraints: Allowable values are:
internal
,external
.
- Constraints: Allowable values are:
- status String
- (String) The status of the certificate authority. The status of a root certificate authority is either
configured
orexpired
. For intermediate certificate authorities, possible statuses includesigning_required
,signed_certificate_required
,certificate_template_required
,configured
,expired
orrevoked
.- Constraints: Allowable values are:
signing_required
,signed_certificate_required
,certificate_template_required
,configured
,expired
,revoked
.
- Constraints: Allowable values are:
- updated
At String - (String) The date when a resource was recently modified. The date format follows RFC 3339.
GetSmConfigurationsConfigurationCryptoKey
- Allow
Generate boolKey - (Boolean) The indication of whether a new key is generated by the crypto provider if the given key name cannot be found. Default is
false
. - Id string
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- Label string
- (String) The label of the key to use. If the key does not exist and generation is enabled, this field is the label that is given to the generated key. If the key exists, and generation is disabled, then this label is used to look up the key. This value or the crypto key ID must be specified.
- Constraints: The maximum length is
255
characters. The minimum length is1
characters. The value must match regular expression/^[A-Za-z0-9._ /-]+$/
.
- Constraints: The maximum length is
- Providers
List<Get
Sm Configurations Configuration Crypto Key Provider> - (List) The data that is associated with a cryptographic provider. Nested scheme for provider:
- Allow
Generate boolKey - (Boolean) The indication of whether a new key is generated by the crypto provider if the given key name cannot be found. Default is
false
. - Id string
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- Label string
- (String) The label of the key to use. If the key does not exist and generation is enabled, this field is the label that is given to the generated key. If the key exists, and generation is disabled, then this label is used to look up the key. This value or the crypto key ID must be specified.
- Constraints: The maximum length is
255
characters. The minimum length is1
characters. The value must match regular expression/^[A-Za-z0-9._ /-]+$/
.
- Constraints: The maximum length is
- Providers
[]Get
Sm Configurations Configuration Crypto Key Provider - (List) The data that is associated with a cryptographic provider. Nested scheme for provider:
- allow
Generate BooleanKey - (Boolean) The indication of whether a new key is generated by the crypto provider if the given key name cannot be found. Default is
false
. - id String
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- label String
- (String) The label of the key to use. If the key does not exist and generation is enabled, this field is the label that is given to the generated key. If the key exists, and generation is disabled, then this label is used to look up the key. This value or the crypto key ID must be specified.
- Constraints: The maximum length is
255
characters. The minimum length is1
characters. The value must match regular expression/^[A-Za-z0-9._ /-]+$/
.
- Constraints: The maximum length is
- providers
List<Get
Sm Configurations Configuration Crypto Key Provider> - (List) The data that is associated with a cryptographic provider. Nested scheme for provider:
- allow
Generate booleanKey - (Boolean) The indication of whether a new key is generated by the crypto provider if the given key name cannot be found. Default is
false
. - id string
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- label string
- (String) The label of the key to use. If the key does not exist and generation is enabled, this field is the label that is given to the generated key. If the key exists, and generation is disabled, then this label is used to look up the key. This value or the crypto key ID must be specified.
- Constraints: The maximum length is
255
characters. The minimum length is1
characters. The value must match regular expression/^[A-Za-z0-9._ /-]+$/
.
- Constraints: The maximum length is
- providers
Get
Sm Configurations Configuration Crypto Key Provider[] - (List) The data that is associated with a cryptographic provider. Nested scheme for provider:
- allow_
generate_ boolkey - (Boolean) The indication of whether a new key is generated by the crypto provider if the given key name cannot be found. Default is
false
. - id str
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- label str
- (String) The label of the key to use. If the key does not exist and generation is enabled, this field is the label that is given to the generated key. If the key exists, and generation is disabled, then this label is used to look up the key. This value or the crypto key ID must be specified.
- Constraints: The maximum length is
255
characters. The minimum length is1
characters. The value must match regular expression/^[A-Za-z0-9._ /-]+$/
.
- Constraints: The maximum length is
- providers
Sequence[Get
Sm Configurations Configuration Crypto Key Provider] - (List) The data that is associated with a cryptographic provider. Nested scheme for provider:
- allow
Generate BooleanKey - (Boolean) The indication of whether a new key is generated by the crypto provider if the given key name cannot be found. Default is
false
. - id String
- (String) The ID of a PKCS#11 key to use. If the key does not exist and generation is enabled, this ID is given to the generated key. If the key exists, and generation is disabled, then this ID is used to look up the key. This value or the crypto key label must be specified.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- label String
- (String) The label of the key to use. If the key does not exist and generation is enabled, this field is the label that is given to the generated key. If the key exists, and generation is disabled, then this label is used to look up the key. This value or the crypto key ID must be specified.
- Constraints: The maximum length is
255
characters. The minimum length is1
characters. The value must match regular expression/^[A-Za-z0-9._ /-]+$/
.
- Constraints: The maximum length is
- providers List<Property Map>
- (List) The data that is associated with a cryptographic provider. Nested scheme for provider:
GetSmConfigurationsConfigurationCryptoKeyProvider
- Instance
Crn string - (String) The HPCS instance CRN.
- Constraints: The maximum length is
512
characters. The minimum length is9
characters. The value must match regular expression^crn:v0-9*+,;=@/]|%[0-9A-Z]{2})*){8}$
.
- Constraints: The maximum length is
- Pin
Iam stringCredentials Secret Id - (String) The secret Id of iam credentials with api key to access HPCS instance.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- Private
Keystore stringId - (String) The HPCS private key store space id.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- Type string
- (String) The type of cryptographic provider.
- Constraints: Allowable values are:
hyper_protect_crypto_services
.
- Constraints: Allowable values are:
- Instance
Crn string - (String) The HPCS instance CRN.
- Constraints: The maximum length is
512
characters. The minimum length is9
characters. The value must match regular expression^crn:v0-9*+,;=@/]|%[0-9A-Z]{2})*){8}$
.
- Constraints: The maximum length is
- Pin
Iam stringCredentials Secret Id - (String) The secret Id of iam credentials with api key to access HPCS instance.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- Private
Keystore stringId - (String) The HPCS private key store space id.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- Type string
- (String) The type of cryptographic provider.
- Constraints: Allowable values are:
hyper_protect_crypto_services
.
- Constraints: Allowable values are:
- instance
Crn String - (String) The HPCS instance CRN.
- Constraints: The maximum length is
512
characters. The minimum length is9
characters. The value must match regular expression^crn:v0-9*+,;=@/]|%[0-9A-Z]{2})*){8}$
.
- Constraints: The maximum length is
- pin
Iam StringCredentials Secret Id - (String) The secret Id of iam credentials with api key to access HPCS instance.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- private
Keystore StringId - (String) The HPCS private key store space id.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- type String
- (String) The type of cryptographic provider.
- Constraints: Allowable values are:
hyper_protect_crypto_services
.
- Constraints: Allowable values are:
- instance
Crn string - (String) The HPCS instance CRN.
- Constraints: The maximum length is
512
characters. The minimum length is9
characters. The value must match regular expression^crn:v0-9*+,;=@/]|%[0-9A-Z]{2})*){8}$
.
- Constraints: The maximum length is
- pin
Iam stringCredentials Secret Id - (String) The secret Id of iam credentials with api key to access HPCS instance.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- private
Keystore stringId - (String) The HPCS private key store space id.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- type string
- (String) The type of cryptographic provider.
- Constraints: Allowable values are:
hyper_protect_crypto_services
.
- Constraints: Allowable values are:
- instance_
crn str - (String) The HPCS instance CRN.
- Constraints: The maximum length is
512
characters. The minimum length is9
characters. The value must match regular expression^crn:v0-9*+,;=@/]|%[0-9A-Z]{2})*){8}$
.
- Constraints: The maximum length is
- pin_
iam_ strcredentials_ secret_ id - (String) The secret Id of iam credentials with api key to access HPCS instance.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- private_
keystore_ strid - (String) The HPCS private key store space id.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- type str
- (String) The type of cryptographic provider.
- Constraints: Allowable values are:
hyper_protect_crypto_services
.
- Constraints: Allowable values are:
- instance
Crn String - (String) The HPCS instance CRN.
- Constraints: The maximum length is
512
characters. The minimum length is9
characters. The value must match regular expression^crn:v0-9*+,;=@/]|%[0-9A-Z]{2})*){8}$
.
- Constraints: The maximum length is
- pin
Iam StringCredentials Secret Id - (String) The secret Id of iam credentials with api key to access HPCS instance.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- private
Keystore StringId - (String) The HPCS private key store space id.
- Constraints: Value length should be 36. The value must match regular expression
/[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}/
.
- Constraints: Value length should be 36. The value must match regular expression
- type String
- (String) The type of cryptographic provider.
- Constraints: Allowable values are:
hyper_protect_crypto_services
.
- Constraints: Allowable values are:
Package Details
- Repository
- ibm ibm-cloud/terraform-provider-ibm
- License
- Notes
- This Pulumi package is based on the
ibm
Terraform Provider.