vault.azure.Backend
Explore with Pulumi AI
Example Usage
You can setup the Azure secrets engine with Workload Identity Federation (WIF) for a secret-less configuration:
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const azure = new vault.azure.Backend("azure", {
subscriptionId: "11111111-2222-3333-4444-111111111111",
tenantId: "11111111-2222-3333-4444-222222222222",
clientId: "11111111-2222-3333-4444-333333333333",
identityTokenAudience: "<TOKEN_AUDIENCE>",
identityTokenTtl: "<TOKEN_TTL>",
rotationSchedule: "0 * * * SAT",
rotationWindow: 3600,
});
import pulumi
import pulumi_vault as vault
azure = vault.azure.Backend("azure",
subscription_id="11111111-2222-3333-4444-111111111111",
tenant_id="11111111-2222-3333-4444-222222222222",
client_id="11111111-2222-3333-4444-333333333333",
identity_token_audience="<TOKEN_AUDIENCE>",
identity_token_ttl="<TOKEN_TTL>",
rotation_schedule="0 * * * SAT",
rotation_window=3600)
package main
import (
"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/azure"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := azure.NewBackend(ctx, "azure", &azure.BackendArgs{
SubscriptionId: pulumi.String("11111111-2222-3333-4444-111111111111"),
TenantId: pulumi.String("11111111-2222-3333-4444-222222222222"),
ClientId: pulumi.String("11111111-2222-3333-4444-333333333333"),
IdentityTokenAudience: pulumi.String("<TOKEN_AUDIENCE>"),
IdentityTokenTtl: pulumi.Int("<TOKEN_TTL>"),
RotationSchedule: pulumi.String("0 * * * SAT"),
RotationWindow: pulumi.Int(3600),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var azure = new Vault.Azure.Backend("azure", new()
{
SubscriptionId = "11111111-2222-3333-4444-111111111111",
TenantId = "11111111-2222-3333-4444-222222222222",
ClientId = "11111111-2222-3333-4444-333333333333",
IdentityTokenAudience = "<TOKEN_AUDIENCE>",
IdentityTokenTtl = "<TOKEN_TTL>",
RotationSchedule = "0 * * * SAT",
RotationWindow = 3600,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.azure.Backend;
import com.pulumi.vault.azure.BackendArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var azure = new Backend("azure", BackendArgs.builder()
.subscriptionId("11111111-2222-3333-4444-111111111111")
.tenantId("11111111-2222-3333-4444-222222222222")
.clientId("11111111-2222-3333-4444-333333333333")
.identityTokenAudience("<TOKEN_AUDIENCE>")
.identityTokenTtl("<TOKEN_TTL>")
.rotationSchedule("0 * * * SAT")
.rotationWindow(3600)
.build());
}
}
resources:
azure:
type: vault:azure:Backend
properties:
subscriptionId: 11111111-2222-3333-4444-111111111111
tenantId: 11111111-2222-3333-4444-222222222222
clientId: 11111111-2222-3333-4444-333333333333
identityTokenAudience: <TOKEN_AUDIENCE>
identityTokenTtl: <TOKEN_TTL>
rotationSchedule: 0 * * * SAT
rotationWindow: 3600
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const azure = new vault.azure.Backend("azure", {
subscriptionId: "11111111-2222-3333-4444-111111111111",
tenantId: "11111111-2222-3333-4444-222222222222",
clientId: "11111111-2222-3333-4444-333333333333",
clientSecret: "12345678901234567890",
environment: "AzurePublicCloud",
rotationSchedule: "0 * * * SAT",
rotationWindow: 3600,
});
import pulumi
import pulumi_vault as vault
azure = vault.azure.Backend("azure",
subscription_id="11111111-2222-3333-4444-111111111111",
tenant_id="11111111-2222-3333-4444-222222222222",
client_id="11111111-2222-3333-4444-333333333333",
client_secret="12345678901234567890",
environment="AzurePublicCloud",
rotation_schedule="0 * * * SAT",
rotation_window=3600)
package main
import (
"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/azure"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := azure.NewBackend(ctx, "azure", &azure.BackendArgs{
SubscriptionId: pulumi.String("11111111-2222-3333-4444-111111111111"),
TenantId: pulumi.String("11111111-2222-3333-4444-222222222222"),
ClientId: pulumi.String("11111111-2222-3333-4444-333333333333"),
ClientSecret: pulumi.String("12345678901234567890"),
Environment: pulumi.String("AzurePublicCloud"),
RotationSchedule: pulumi.String("0 * * * SAT"),
RotationWindow: pulumi.Int(3600),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var azure = new Vault.Azure.Backend("azure", new()
{
SubscriptionId = "11111111-2222-3333-4444-111111111111",
TenantId = "11111111-2222-3333-4444-222222222222",
ClientId = "11111111-2222-3333-4444-333333333333",
ClientSecret = "12345678901234567890",
Environment = "AzurePublicCloud",
RotationSchedule = "0 * * * SAT",
RotationWindow = 3600,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.azure.Backend;
import com.pulumi.vault.azure.BackendArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var azure = new Backend("azure", BackendArgs.builder()
.subscriptionId("11111111-2222-3333-4444-111111111111")
.tenantId("11111111-2222-3333-4444-222222222222")
.clientId("11111111-2222-3333-4444-333333333333")
.clientSecret("12345678901234567890")
.environment("AzurePublicCloud")
.rotationSchedule("0 * * * SAT")
.rotationWindow(3600)
.build());
}
}
resources:
azure:
type: vault:azure:Backend
properties:
subscriptionId: 11111111-2222-3333-4444-111111111111
tenantId: 11111111-2222-3333-4444-222222222222
clientId: 11111111-2222-3333-4444-333333333333
clientSecret: '12345678901234567890'
environment: AzurePublicCloud
rotationSchedule: 0 * * * SAT
rotationWindow: 3600
Create Backend Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Backend(name: string, args: BackendArgs, opts?: CustomResourceOptions);
@overload
def Backend(resource_name: str,
args: BackendArgs,
opts: Optional[ResourceOptions] = None)
@overload
def Backend(resource_name: str,
opts: Optional[ResourceOptions] = None,
subscription_id: Optional[str] = None,
tenant_id: Optional[str] = None,
identity_token_ttl: Optional[int] = None,
passthrough_request_headers: Optional[Sequence[str]] = None,
client_id: Optional[str] = None,
client_secret: Optional[str] = None,
default_lease_ttl_seconds: Optional[int] = None,
delegated_auth_accessors: Optional[Sequence[str]] = None,
description: Optional[str] = None,
disable_automated_rotation: Optional[bool] = None,
disable_remount: Optional[bool] = None,
environment: Optional[str] = None,
external_entropy_access: Optional[bool] = None,
force_no_cache: Optional[bool] = None,
identity_token_audience: Optional[str] = None,
identity_token_key: Optional[str] = None,
audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
allowed_managed_keys: Optional[Sequence[str]] = None,
plugin_version: Optional[str] = None,
max_lease_ttl_seconds: Optional[int] = None,
namespace: Optional[str] = None,
options: Optional[Mapping[str, str]] = None,
listing_visibility: Optional[str] = None,
path: Optional[str] = None,
local: Optional[bool] = None,
root_password_ttl: Optional[int] = None,
rotation_period: Optional[int] = None,
rotation_schedule: Optional[str] = None,
rotation_window: Optional[int] = None,
seal_wrap: Optional[bool] = None,
audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
allowed_response_headers: Optional[Sequence[str]] = None)
func NewBackend(ctx *Context, name string, args BackendArgs, opts ...ResourceOption) (*Backend, error)
public Backend(string name, BackendArgs args, CustomResourceOptions? opts = null)
public Backend(String name, BackendArgs args)
public Backend(String name, BackendArgs args, CustomResourceOptions options)
type: vault:azure:Backend
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args BackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args BackendArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args BackendArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args BackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args BackendArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var backendResource = new Vault.Azure.Backend("backendResource", new()
{
SubscriptionId = "string",
TenantId = "string",
IdentityTokenTtl = 0,
PassthroughRequestHeaders = new[]
{
"string",
},
ClientId = "string",
ClientSecret = "string",
DefaultLeaseTtlSeconds = 0,
DelegatedAuthAccessors = new[]
{
"string",
},
Description = "string",
DisableAutomatedRotation = false,
DisableRemount = false,
Environment = "string",
ExternalEntropyAccess = false,
ForceNoCache = false,
IdentityTokenAudience = "string",
IdentityTokenKey = "string",
AuditNonHmacResponseKeys = new[]
{
"string",
},
AllowedManagedKeys = new[]
{
"string",
},
PluginVersion = "string",
MaxLeaseTtlSeconds = 0,
Namespace = "string",
Options =
{
{ "string", "string" },
},
ListingVisibility = "string",
Path = "string",
Local = false,
RootPasswordTtl = 0,
RotationPeriod = 0,
RotationSchedule = "string",
RotationWindow = 0,
SealWrap = false,
AuditNonHmacRequestKeys = new[]
{
"string",
},
AllowedResponseHeaders = new[]
{
"string",
},
});
example, err := azure.NewBackend(ctx, "backendResource", &azure.BackendArgs{
SubscriptionId: pulumi.String("string"),
TenantId: pulumi.String("string"),
IdentityTokenTtl: pulumi.Int(0),
PassthroughRequestHeaders: pulumi.StringArray{
pulumi.String("string"),
},
ClientId: pulumi.String("string"),
ClientSecret: pulumi.String("string"),
DefaultLeaseTtlSeconds: pulumi.Int(0),
DelegatedAuthAccessors: pulumi.StringArray{
pulumi.String("string"),
},
Description: pulumi.String("string"),
DisableAutomatedRotation: pulumi.Bool(false),
DisableRemount: pulumi.Bool(false),
Environment: pulumi.String("string"),
ExternalEntropyAccess: pulumi.Bool(false),
ForceNoCache: pulumi.Bool(false),
IdentityTokenAudience: pulumi.String("string"),
IdentityTokenKey: pulumi.String("string"),
AuditNonHmacResponseKeys: pulumi.StringArray{
pulumi.String("string"),
},
AllowedManagedKeys: pulumi.StringArray{
pulumi.String("string"),
},
PluginVersion: pulumi.String("string"),
MaxLeaseTtlSeconds: pulumi.Int(0),
Namespace: pulumi.String("string"),
Options: pulumi.StringMap{
"string": pulumi.String("string"),
},
ListingVisibility: pulumi.String("string"),
Path: pulumi.String("string"),
Local: pulumi.Bool(false),
RootPasswordTtl: pulumi.Int(0),
RotationPeriod: pulumi.Int(0),
RotationSchedule: pulumi.String("string"),
RotationWindow: pulumi.Int(0),
SealWrap: pulumi.Bool(false),
AuditNonHmacRequestKeys: pulumi.StringArray{
pulumi.String("string"),
},
AllowedResponseHeaders: pulumi.StringArray{
pulumi.String("string"),
},
})
var backendResource = new Backend("backendResource", BackendArgs.builder()
.subscriptionId("string")
.tenantId("string")
.identityTokenTtl(0)
.passthroughRequestHeaders("string")
.clientId("string")
.clientSecret("string")
.defaultLeaseTtlSeconds(0)
.delegatedAuthAccessors("string")
.description("string")
.disableAutomatedRotation(false)
.disableRemount(false)
.environment("string")
.externalEntropyAccess(false)
.forceNoCache(false)
.identityTokenAudience("string")
.identityTokenKey("string")
.auditNonHmacResponseKeys("string")
.allowedManagedKeys("string")
.pluginVersion("string")
.maxLeaseTtlSeconds(0)
.namespace("string")
.options(Map.of("string", "string"))
.listingVisibility("string")
.path("string")
.local(false)
.rootPasswordTtl(0)
.rotationPeriod(0)
.rotationSchedule("string")
.rotationWindow(0)
.sealWrap(false)
.auditNonHmacRequestKeys("string")
.allowedResponseHeaders("string")
.build());
backend_resource = vault.azure.Backend("backendResource",
subscription_id="string",
tenant_id="string",
identity_token_ttl=0,
passthrough_request_headers=["string"],
client_id="string",
client_secret="string",
default_lease_ttl_seconds=0,
delegated_auth_accessors=["string"],
description="string",
disable_automated_rotation=False,
disable_remount=False,
environment="string",
external_entropy_access=False,
force_no_cache=False,
identity_token_audience="string",
identity_token_key="string",
audit_non_hmac_response_keys=["string"],
allowed_managed_keys=["string"],
plugin_version="string",
max_lease_ttl_seconds=0,
namespace="string",
options={
"string": "string",
},
listing_visibility="string",
path="string",
local=False,
root_password_ttl=0,
rotation_period=0,
rotation_schedule="string",
rotation_window=0,
seal_wrap=False,
audit_non_hmac_request_keys=["string"],
allowed_response_headers=["string"])
const backendResource = new vault.azure.Backend("backendResource", {
subscriptionId: "string",
tenantId: "string",
identityTokenTtl: 0,
passthroughRequestHeaders: ["string"],
clientId: "string",
clientSecret: "string",
defaultLeaseTtlSeconds: 0,
delegatedAuthAccessors: ["string"],
description: "string",
disableAutomatedRotation: false,
disableRemount: false,
environment: "string",
externalEntropyAccess: false,
forceNoCache: false,
identityTokenAudience: "string",
identityTokenKey: "string",
auditNonHmacResponseKeys: ["string"],
allowedManagedKeys: ["string"],
pluginVersion: "string",
maxLeaseTtlSeconds: 0,
namespace: "string",
options: {
string: "string",
},
listingVisibility: "string",
path: "string",
local: false,
rootPasswordTtl: 0,
rotationPeriod: 0,
rotationSchedule: "string",
rotationWindow: 0,
sealWrap: false,
auditNonHmacRequestKeys: ["string"],
allowedResponseHeaders: ["string"],
});
type: vault:azure:Backend
properties:
allowedManagedKeys:
- string
allowedResponseHeaders:
- string
auditNonHmacRequestKeys:
- string
auditNonHmacResponseKeys:
- string
clientId: string
clientSecret: string
defaultLeaseTtlSeconds: 0
delegatedAuthAccessors:
- string
description: string
disableAutomatedRotation: false
disableRemount: false
environment: string
externalEntropyAccess: false
forceNoCache: false
identityTokenAudience: string
identityTokenKey: string
identityTokenTtl: 0
listingVisibility: string
local: false
maxLeaseTtlSeconds: 0
namespace: string
options:
string: string
passthroughRequestHeaders:
- string
path: string
pluginVersion: string
rootPasswordTtl: 0
rotationPeriod: 0
rotationSchedule: string
rotationWindow: 0
sealWrap: false
subscriptionId: string
tenantId: string
Backend Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Backend resource accepts the following input properties:
- Subscription
Id string - The subscription id for the Azure Active Directory.
- Tenant
Id string - The tenant id for the Azure Active Directory.
- Allowed
Managed List<string>Keys - List of managed key registry entry names that the mount in question is allowed to access
- Allowed
Response List<string>Headers - List of headers to allow and pass from the request to the plugin
- Audit
Non List<string>Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- Audit
Non List<string>Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- Client
Id string - The OAuth2 client id to connect to Azure.
- Client
Secret string - The OAuth2 client secret to connect to Azure.
- Default
Lease intTtl Seconds - Default lease duration for tokens and secrets in seconds
- Delegated
Auth List<string>Accessors - List of headers to allow and pass from the request to the plugin
- Description string
- Human-friendly description of the mount for the backend.
- Disable
Automated boolRotation - Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- Disable
Remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Environment string
- The Azure environment.
- External
Entropy boolAccess - Enable the secrets engine to access Vault's external entropy source
- Force
No boolCache - If set to true, disables caching.
- Identity
Token stringAudience - The audience claim value. Requires Vault 1.17+. Available only for Vault Enterprise
- Identity
Token stringKey - The key to use for signing identity tokens.
- Identity
Token intTtl - The TTL of generated identity tokens in seconds. Requires Vault 1.17+. Available only for Vault Enterprise
- Listing
Visibility string - Specifies whether to show this mount in the UI-specific listing endpoint
- Local bool
- Local mount flag that can be explicitly set to true to enforce local mount in HA environment
- Max
Lease intTtl Seconds - Maximum possible lease duration for tokens and secrets in seconds
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - Options Dictionary<string, string>
- Specifies mount type specific options that are passed to the backend
- Passthrough
Request List<string>Headers - List of headers to allow and pass from the request to the plugin
- Path string
- The unique path this backend should be mounted at. Defaults to
azure
. - Plugin
Version string - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- Root
Password intTtl - The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
- Rotation
Period int - The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- Rotation
Schedule string - The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- Rotation
Window int - The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is
3600
. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise - Seal
Wrap bool - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- Subscription
Id string - The subscription id for the Azure Active Directory.
- Tenant
Id string - The tenant id for the Azure Active Directory.
- Allowed
Managed []stringKeys - List of managed key registry entry names that the mount in question is allowed to access
- Allowed
Response []stringHeaders - List of headers to allow and pass from the request to the plugin
- Audit
Non []stringHmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- Audit
Non []stringHmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- Client
Id string - The OAuth2 client id to connect to Azure.
- Client
Secret string - The OAuth2 client secret to connect to Azure.
- Default
Lease intTtl Seconds - Default lease duration for tokens and secrets in seconds
- Delegated
Auth []stringAccessors - List of headers to allow and pass from the request to the plugin
- Description string
- Human-friendly description of the mount for the backend.
- Disable
Automated boolRotation - Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- Disable
Remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Environment string
- The Azure environment.
- External
Entropy boolAccess - Enable the secrets engine to access Vault's external entropy source
- Force
No boolCache - If set to true, disables caching.
- Identity
Token stringAudience - The audience claim value. Requires Vault 1.17+. Available only for Vault Enterprise
- Identity
Token stringKey - The key to use for signing identity tokens.
- Identity
Token intTtl - The TTL of generated identity tokens in seconds. Requires Vault 1.17+. Available only for Vault Enterprise
- Listing
Visibility string - Specifies whether to show this mount in the UI-specific listing endpoint
- Local bool
- Local mount flag that can be explicitly set to true to enforce local mount in HA environment
- Max
Lease intTtl Seconds - Maximum possible lease duration for tokens and secrets in seconds
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - Options map[string]string
- Specifies mount type specific options that are passed to the backend
- Passthrough
Request []stringHeaders - List of headers to allow and pass from the request to the plugin
- Path string
- The unique path this backend should be mounted at. Defaults to
azure
. - Plugin
Version string - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- Root
Password intTtl - The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
- Rotation
Period int - The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- Rotation
Schedule string - The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- Rotation
Window int - The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is
3600
. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise - Seal
Wrap bool - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- subscription
Id String - The subscription id for the Azure Active Directory.
- tenant
Id String - The tenant id for the Azure Active Directory.
- allowed
Managed List<String>Keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed
Response List<String>Headers - List of headers to allow and pass from the request to the plugin
- audit
Non List<String>Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit
Non List<String>Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- client
Id String - The OAuth2 client id to connect to Azure.
- client
Secret String - The OAuth2 client secret to connect to Azure.
- default
Lease IntegerTtl Seconds - Default lease duration for tokens and secrets in seconds
- delegated
Auth List<String>Accessors - List of headers to allow and pass from the request to the plugin
- description String
- Human-friendly description of the mount for the backend.
- disable
Automated BooleanRotation - Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- disable
Remount Boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- environment String
- The Azure environment.
- external
Entropy BooleanAccess - Enable the secrets engine to access Vault's external entropy source
- force
No BooleanCache - If set to true, disables caching.
- identity
Token StringAudience - The audience claim value. Requires Vault 1.17+. Available only for Vault Enterprise
- identity
Token StringKey - The key to use for signing identity tokens.
- identity
Token IntegerTtl - The TTL of generated identity tokens in seconds. Requires Vault 1.17+. Available only for Vault Enterprise
- listing
Visibility String - Specifies whether to show this mount in the UI-specific listing endpoint
- local Boolean
- Local mount flag that can be explicitly set to true to enforce local mount in HA environment
- max
Lease IntegerTtl Seconds - Maximum possible lease duration for tokens and secrets in seconds
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - options Map<String,String>
- Specifies mount type specific options that are passed to the backend
- passthrough
Request List<String>Headers - List of headers to allow and pass from the request to the plugin
- path String
- The unique path this backend should be mounted at. Defaults to
azure
. - plugin
Version String - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- root
Password IntegerTtl - The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
- rotation
Period Integer - The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation
Schedule String - The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation
Window Integer - The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is
3600
. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise - seal
Wrap Boolean - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- subscription
Id string - The subscription id for the Azure Active Directory.
- tenant
Id string - The tenant id for the Azure Active Directory.
- allowed
Managed string[]Keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed
Response string[]Headers - List of headers to allow and pass from the request to the plugin
- audit
Non string[]Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit
Non string[]Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- client
Id string - The OAuth2 client id to connect to Azure.
- client
Secret string - The OAuth2 client secret to connect to Azure.
- default
Lease numberTtl Seconds - Default lease duration for tokens and secrets in seconds
- delegated
Auth string[]Accessors - List of headers to allow and pass from the request to the plugin
- description string
- Human-friendly description of the mount for the backend.
- disable
Automated booleanRotation - Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- disable
Remount boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- environment string
- The Azure environment.
- external
Entropy booleanAccess - Enable the secrets engine to access Vault's external entropy source
- force
No booleanCache - If set to true, disables caching.
- identity
Token stringAudience - The audience claim value. Requires Vault 1.17+. Available only for Vault Enterprise
- identity
Token stringKey - The key to use for signing identity tokens.
- identity
Token numberTtl - The TTL of generated identity tokens in seconds. Requires Vault 1.17+. Available only for Vault Enterprise
- listing
Visibility string - Specifies whether to show this mount in the UI-specific listing endpoint
- local boolean
- Local mount flag that can be explicitly set to true to enforce local mount in HA environment
- max
Lease numberTtl Seconds - Maximum possible lease duration for tokens and secrets in seconds
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - options {[key: string]: string}
- Specifies mount type specific options that are passed to the backend
- passthrough
Request string[]Headers - List of headers to allow and pass from the request to the plugin
- path string
- The unique path this backend should be mounted at. Defaults to
azure
. - plugin
Version string - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- root
Password numberTtl - The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
- rotation
Period number - The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation
Schedule string - The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation
Window number - The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is
3600
. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise - seal
Wrap boolean - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- subscription_
id str - The subscription id for the Azure Active Directory.
- tenant_
id str - The tenant id for the Azure Active Directory.
- allowed_
managed_ Sequence[str]keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed_
response_ Sequence[str]headers - List of headers to allow and pass from the request to the plugin
- audit_
non_ Sequence[str]hmac_ request_ keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit_
non_ Sequence[str]hmac_ response_ keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- client_
id str - The OAuth2 client id to connect to Azure.
- client_
secret str - The OAuth2 client secret to connect to Azure.
- default_
lease_ intttl_ seconds - Default lease duration for tokens and secrets in seconds
- delegated_
auth_ Sequence[str]accessors - List of headers to allow and pass from the request to the plugin
- description str
- Human-friendly description of the mount for the backend.
- disable_
automated_ boolrotation - Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- disable_
remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- environment str
- The Azure environment.
- external_
entropy_ boolaccess - Enable the secrets engine to access Vault's external entropy source
- force_
no_ boolcache - If set to true, disables caching.
- identity_
token_ straudience - The audience claim value. Requires Vault 1.17+. Available only for Vault Enterprise
- identity_
token_ strkey - The key to use for signing identity tokens.
- identity_
token_ intttl - The TTL of generated identity tokens in seconds. Requires Vault 1.17+. Available only for Vault Enterprise
- listing_
visibility str - Specifies whether to show this mount in the UI-specific listing endpoint
- local bool
- Local mount flag that can be explicitly set to true to enforce local mount in HA environment
- max_
lease_ intttl_ seconds - Maximum possible lease duration for tokens and secrets in seconds
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - options Mapping[str, str]
- Specifies mount type specific options that are passed to the backend
- passthrough_
request_ Sequence[str]headers - List of headers to allow and pass from the request to the plugin
- path str
- The unique path this backend should be mounted at. Defaults to
azure
. - plugin_
version str - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- root_
password_ intttl - The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
- rotation_
period int - The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation_
schedule str - The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation_
window int - The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is
3600
. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise - seal_
wrap bool - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- subscription
Id String - The subscription id for the Azure Active Directory.
- tenant
Id String - The tenant id for the Azure Active Directory.
- allowed
Managed List<String>Keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed
Response List<String>Headers - List of headers to allow and pass from the request to the plugin
- audit
Non List<String>Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit
Non List<String>Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- client
Id String - The OAuth2 client id to connect to Azure.
- client
Secret String - The OAuth2 client secret to connect to Azure.
- default
Lease NumberTtl Seconds - Default lease duration for tokens and secrets in seconds
- delegated
Auth List<String>Accessors - List of headers to allow and pass from the request to the plugin
- description String
- Human-friendly description of the mount for the backend.
- disable
Automated BooleanRotation - Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- disable
Remount Boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- environment String
- The Azure environment.
- external
Entropy BooleanAccess - Enable the secrets engine to access Vault's external entropy source
- force
No BooleanCache - If set to true, disables caching.
- identity
Token StringAudience - The audience claim value. Requires Vault 1.17+. Available only for Vault Enterprise
- identity
Token StringKey - The key to use for signing identity tokens.
- identity
Token NumberTtl - The TTL of generated identity tokens in seconds. Requires Vault 1.17+. Available only for Vault Enterprise
- listing
Visibility String - Specifies whether to show this mount in the UI-specific listing endpoint
- local Boolean
- Local mount flag that can be explicitly set to true to enforce local mount in HA environment
- max
Lease NumberTtl Seconds - Maximum possible lease duration for tokens and secrets in seconds
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - options Map<String>
- Specifies mount type specific options that are passed to the backend
- passthrough
Request List<String>Headers - List of headers to allow and pass from the request to the plugin
- path String
- The unique path this backend should be mounted at. Defaults to
azure
. - plugin
Version String - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- root
Password NumberTtl - The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
- rotation
Period Number - The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation
Schedule String - The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation
Window Number - The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is
3600
. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise - seal
Wrap Boolean - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
Outputs
All input properties are implicitly available as output properties. Additionally, the Backend resource produces the following output properties:
Look up Existing Backend Resource
Get an existing Backend resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: BackendState, opts?: CustomResourceOptions): Backend
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
accessor: Optional[str] = None,
allowed_managed_keys: Optional[Sequence[str]] = None,
allowed_response_headers: Optional[Sequence[str]] = None,
audit_non_hmac_request_keys: Optional[Sequence[str]] = None,
audit_non_hmac_response_keys: Optional[Sequence[str]] = None,
client_id: Optional[str] = None,
client_secret: Optional[str] = None,
default_lease_ttl_seconds: Optional[int] = None,
delegated_auth_accessors: Optional[Sequence[str]] = None,
description: Optional[str] = None,
disable_automated_rotation: Optional[bool] = None,
disable_remount: Optional[bool] = None,
environment: Optional[str] = None,
external_entropy_access: Optional[bool] = None,
force_no_cache: Optional[bool] = None,
identity_token_audience: Optional[str] = None,
identity_token_key: Optional[str] = None,
identity_token_ttl: Optional[int] = None,
listing_visibility: Optional[str] = None,
local: Optional[bool] = None,
max_lease_ttl_seconds: Optional[int] = None,
namespace: Optional[str] = None,
options: Optional[Mapping[str, str]] = None,
passthrough_request_headers: Optional[Sequence[str]] = None,
path: Optional[str] = None,
plugin_version: Optional[str] = None,
root_password_ttl: Optional[int] = None,
rotation_period: Optional[int] = None,
rotation_schedule: Optional[str] = None,
rotation_window: Optional[int] = None,
seal_wrap: Optional[bool] = None,
subscription_id: Optional[str] = None,
tenant_id: Optional[str] = None) -> Backend
func GetBackend(ctx *Context, name string, id IDInput, state *BackendState, opts ...ResourceOption) (*Backend, error)
public static Backend Get(string name, Input<string> id, BackendState? state, CustomResourceOptions? opts = null)
public static Backend get(String name, Output<String> id, BackendState state, CustomResourceOptions options)
resources: _: type: vault:azure:Backend get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Accessor string
- Accessor of the mount
- Allowed
Managed List<string>Keys - List of managed key registry entry names that the mount in question is allowed to access
- Allowed
Response List<string>Headers - List of headers to allow and pass from the request to the plugin
- Audit
Non List<string>Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- Audit
Non List<string>Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- Client
Id string - The OAuth2 client id to connect to Azure.
- Client
Secret string - The OAuth2 client secret to connect to Azure.
- Default
Lease intTtl Seconds - Default lease duration for tokens and secrets in seconds
- Delegated
Auth List<string>Accessors - List of headers to allow and pass from the request to the plugin
- Description string
- Human-friendly description of the mount for the backend.
- Disable
Automated boolRotation - Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- Disable
Remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Environment string
- The Azure environment.
- External
Entropy boolAccess - Enable the secrets engine to access Vault's external entropy source
- Force
No boolCache - If set to true, disables caching.
- Identity
Token stringAudience - The audience claim value. Requires Vault 1.17+. Available only for Vault Enterprise
- Identity
Token stringKey - The key to use for signing identity tokens.
- Identity
Token intTtl - The TTL of generated identity tokens in seconds. Requires Vault 1.17+. Available only for Vault Enterprise
- Listing
Visibility string - Specifies whether to show this mount in the UI-specific listing endpoint
- Local bool
- Local mount flag that can be explicitly set to true to enforce local mount in HA environment
- Max
Lease intTtl Seconds - Maximum possible lease duration for tokens and secrets in seconds
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - Options Dictionary<string, string>
- Specifies mount type specific options that are passed to the backend
- Passthrough
Request List<string>Headers - List of headers to allow and pass from the request to the plugin
- Path string
- The unique path this backend should be mounted at. Defaults to
azure
. - Plugin
Version string - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- Root
Password intTtl - The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
- Rotation
Period int - The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- Rotation
Schedule string - The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- Rotation
Window int - The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is
3600
. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise - Seal
Wrap bool - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- Subscription
Id string - The subscription id for the Azure Active Directory.
- Tenant
Id string - The tenant id for the Azure Active Directory.
- Accessor string
- Accessor of the mount
- Allowed
Managed []stringKeys - List of managed key registry entry names that the mount in question is allowed to access
- Allowed
Response []stringHeaders - List of headers to allow and pass from the request to the plugin
- Audit
Non []stringHmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- Audit
Non []stringHmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- Client
Id string - The OAuth2 client id to connect to Azure.
- Client
Secret string - The OAuth2 client secret to connect to Azure.
- Default
Lease intTtl Seconds - Default lease duration for tokens and secrets in seconds
- Delegated
Auth []stringAccessors - List of headers to allow and pass from the request to the plugin
- Description string
- Human-friendly description of the mount for the backend.
- Disable
Automated boolRotation - Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- Disable
Remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- Environment string
- The Azure environment.
- External
Entropy boolAccess - Enable the secrets engine to access Vault's external entropy source
- Force
No boolCache - If set to true, disables caching.
- Identity
Token stringAudience - The audience claim value. Requires Vault 1.17+. Available only for Vault Enterprise
- Identity
Token stringKey - The key to use for signing identity tokens.
- Identity
Token intTtl - The TTL of generated identity tokens in seconds. Requires Vault 1.17+. Available only for Vault Enterprise
- Listing
Visibility string - Specifies whether to show this mount in the UI-specific listing endpoint
- Local bool
- Local mount flag that can be explicitly set to true to enforce local mount in HA environment
- Max
Lease intTtl Seconds - Maximum possible lease duration for tokens and secrets in seconds
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - Options map[string]string
- Specifies mount type specific options that are passed to the backend
- Passthrough
Request []stringHeaders - List of headers to allow and pass from the request to the plugin
- Path string
- The unique path this backend should be mounted at. Defaults to
azure
. - Plugin
Version string - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- Root
Password intTtl - The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
- Rotation
Period int - The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- Rotation
Schedule string - The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- Rotation
Window int - The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is
3600
. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise - Seal
Wrap bool - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- Subscription
Id string - The subscription id for the Azure Active Directory.
- Tenant
Id string - The tenant id for the Azure Active Directory.
- accessor String
- Accessor of the mount
- allowed
Managed List<String>Keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed
Response List<String>Headers - List of headers to allow and pass from the request to the plugin
- audit
Non List<String>Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit
Non List<String>Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- client
Id String - The OAuth2 client id to connect to Azure.
- client
Secret String - The OAuth2 client secret to connect to Azure.
- default
Lease IntegerTtl Seconds - Default lease duration for tokens and secrets in seconds
- delegated
Auth List<String>Accessors - List of headers to allow and pass from the request to the plugin
- description String
- Human-friendly description of the mount for the backend.
- disable
Automated BooleanRotation - Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- disable
Remount Boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- environment String
- The Azure environment.
- external
Entropy BooleanAccess - Enable the secrets engine to access Vault's external entropy source
- force
No BooleanCache - If set to true, disables caching.
- identity
Token StringAudience - The audience claim value. Requires Vault 1.17+. Available only for Vault Enterprise
- identity
Token StringKey - The key to use for signing identity tokens.
- identity
Token IntegerTtl - The TTL of generated identity tokens in seconds. Requires Vault 1.17+. Available only for Vault Enterprise
- listing
Visibility String - Specifies whether to show this mount in the UI-specific listing endpoint
- local Boolean
- Local mount flag that can be explicitly set to true to enforce local mount in HA environment
- max
Lease IntegerTtl Seconds - Maximum possible lease duration for tokens and secrets in seconds
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - options Map<String,String>
- Specifies mount type specific options that are passed to the backend
- passthrough
Request List<String>Headers - List of headers to allow and pass from the request to the plugin
- path String
- The unique path this backend should be mounted at. Defaults to
azure
. - plugin
Version String - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- root
Password IntegerTtl - The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
- rotation
Period Integer - The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation
Schedule String - The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation
Window Integer - The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is
3600
. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise - seal
Wrap Boolean - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- subscription
Id String - The subscription id for the Azure Active Directory.
- tenant
Id String - The tenant id for the Azure Active Directory.
- accessor string
- Accessor of the mount
- allowed
Managed string[]Keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed
Response string[]Headers - List of headers to allow and pass from the request to the plugin
- audit
Non string[]Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit
Non string[]Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- client
Id string - The OAuth2 client id to connect to Azure.
- client
Secret string - The OAuth2 client secret to connect to Azure.
- default
Lease numberTtl Seconds - Default lease duration for tokens and secrets in seconds
- delegated
Auth string[]Accessors - List of headers to allow and pass from the request to the plugin
- description string
- Human-friendly description of the mount for the backend.
- disable
Automated booleanRotation - Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- disable
Remount boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- environment string
- The Azure environment.
- external
Entropy booleanAccess - Enable the secrets engine to access Vault's external entropy source
- force
No booleanCache - If set to true, disables caching.
- identity
Token stringAudience - The audience claim value. Requires Vault 1.17+. Available only for Vault Enterprise
- identity
Token stringKey - The key to use for signing identity tokens.
- identity
Token numberTtl - The TTL of generated identity tokens in seconds. Requires Vault 1.17+. Available only for Vault Enterprise
- listing
Visibility string - Specifies whether to show this mount in the UI-specific listing endpoint
- local boolean
- Local mount flag that can be explicitly set to true to enforce local mount in HA environment
- max
Lease numberTtl Seconds - Maximum possible lease duration for tokens and secrets in seconds
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - options {[key: string]: string}
- Specifies mount type specific options that are passed to the backend
- passthrough
Request string[]Headers - List of headers to allow and pass from the request to the plugin
- path string
- The unique path this backend should be mounted at. Defaults to
azure
. - plugin
Version string - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- root
Password numberTtl - The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
- rotation
Period number - The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation
Schedule string - The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation
Window number - The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is
3600
. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise - seal
Wrap boolean - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- subscription
Id string - The subscription id for the Azure Active Directory.
- tenant
Id string - The tenant id for the Azure Active Directory.
- accessor str
- Accessor of the mount
- allowed_
managed_ Sequence[str]keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed_
response_ Sequence[str]headers - List of headers to allow and pass from the request to the plugin
- audit_
non_ Sequence[str]hmac_ request_ keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit_
non_ Sequence[str]hmac_ response_ keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- client_
id str - The OAuth2 client id to connect to Azure.
- client_
secret str - The OAuth2 client secret to connect to Azure.
- default_
lease_ intttl_ seconds - Default lease duration for tokens and secrets in seconds
- delegated_
auth_ Sequence[str]accessors - List of headers to allow and pass from the request to the plugin
- description str
- Human-friendly description of the mount for the backend.
- disable_
automated_ boolrotation - Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- disable_
remount bool - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- environment str
- The Azure environment.
- external_
entropy_ boolaccess - Enable the secrets engine to access Vault's external entropy source
- force_
no_ boolcache - If set to true, disables caching.
- identity_
token_ straudience - The audience claim value. Requires Vault 1.17+. Available only for Vault Enterprise
- identity_
token_ strkey - The key to use for signing identity tokens.
- identity_
token_ intttl - The TTL of generated identity tokens in seconds. Requires Vault 1.17+. Available only for Vault Enterprise
- listing_
visibility str - Specifies whether to show this mount in the UI-specific listing endpoint
- local bool
- Local mount flag that can be explicitly set to true to enforce local mount in HA environment
- max_
lease_ intttl_ seconds - Maximum possible lease duration for tokens and secrets in seconds
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - options Mapping[str, str]
- Specifies mount type specific options that are passed to the backend
- passthrough_
request_ Sequence[str]headers - List of headers to allow and pass from the request to the plugin
- path str
- The unique path this backend should be mounted at. Defaults to
azure
. - plugin_
version str - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- root_
password_ intttl - The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
- rotation_
period int - The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation_
schedule str - The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation_
window int - The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is
3600
. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise - seal_
wrap bool - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- subscription_
id str - The subscription id for the Azure Active Directory.
- tenant_
id str - The tenant id for the Azure Active Directory.
- accessor String
- Accessor of the mount
- allowed
Managed List<String>Keys - List of managed key registry entry names that the mount in question is allowed to access
- allowed
Response List<String>Headers - List of headers to allow and pass from the request to the plugin
- audit
Non List<String>Hmac Request Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the request data object.
- audit
Non List<String>Hmac Response Keys - Specifies the list of keys that will not be HMAC'd by audit devices in the response data object.
- client
Id String - The OAuth2 client id to connect to Azure.
- client
Secret String - The OAuth2 client secret to connect to Azure.
- default
Lease NumberTtl Seconds - Default lease duration for tokens and secrets in seconds
- delegated
Auth List<String>Accessors - List of headers to allow and pass from the request to the plugin
- description String
- Human-friendly description of the mount for the backend.
- disable
Automated BooleanRotation - Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- disable
Remount Boolean - If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- environment String
- The Azure environment.
- external
Entropy BooleanAccess - Enable the secrets engine to access Vault's external entropy source
- force
No BooleanCache - If set to true, disables caching.
- identity
Token StringAudience - The audience claim value. Requires Vault 1.17+. Available only for Vault Enterprise
- identity
Token StringKey - The key to use for signing identity tokens.
- identity
Token NumberTtl - The TTL of generated identity tokens in seconds. Requires Vault 1.17+. Available only for Vault Enterprise
- listing
Visibility String - Specifies whether to show this mount in the UI-specific listing endpoint
- local Boolean
- Local mount flag that can be explicitly set to true to enforce local mount in HA environment
- max
Lease NumberTtl Seconds - Maximum possible lease duration for tokens and secrets in seconds
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespace
is always relative to the provider's configured namespace. Available only for Vault Enterprise. - options Map<String>
- Specifies mount type specific options that are passed to the backend
- passthrough
Request List<String>Headers - List of headers to allow and pass from the request to the plugin
- path String
- The unique path this backend should be mounted at. Defaults to
azure
. - plugin
Version String - Specifies the semantic version of the plugin to use, e.g. 'v1.0.0'
- root
Password NumberTtl - The TTL in seconds of the root password in Azure when rotate-root generates a new client secret
- rotation
Period Number - The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation
Schedule String - The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise
- rotation
Window Number - The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is
3600
. Requires Vault Enterprise 1.19+. Available only for Vault Enterprise - seal
Wrap Boolean - Enable seal wrapping for the mount, causing values stored by the mount to be wrapped by the seal's encryption capability
- subscription
Id String - The subscription id for the Azure Active Directory.
- tenant
Id String - The tenant id for the Azure Active Directory.
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
vault
Terraform Provider.