1. Packages
  2. HashiCorp Vault Provider
  3. API Docs
  4. pkiSecret
  5. BackendConfigScep
HashiCorp Vault v7.1.0 published on Thursday, Jul 10, 2025 by Pulumi

vault.pkiSecret.BackendConfigScep

Explore with Pulumi AI

vault logo
HashiCorp Vault v7.1.0 published on Thursday, Jul 10, 2025 by Pulumi

    Allows setting the SCEP configuration on a PKI Secret Backend.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as vault from "@pulumi/vault";
    
    const scep = new vault.AuthBackend("scep", {
        path: "scep-auth",
        type: "scep",
    });
    const scepChallenge = new vault.ScepAuthBackendRole("scep_challenge", {
        backend: scep.id,
        name: "scep-auth",
        displayName: "Static challenge for SCEP clients",
        authType: "static-challenge",
        challenge: "ac7e4ada-c8ef-4393-9098-d69d08736833",
    });
    const pki = new vault.Mount("pki", {
        path: "pki_scep",
        type: "pki",
        description: "PKI secret engine mount",
    });
    const test = new vault.pkisecret.BackendConfigScep("test", {
        backend: pki.path,
        enabled: true,
        defaultPathPolicy: "sign-verbatim",
        restrictCaChainToIssuer: true,
        authenticators: {
            scep: {
                accessor: scep.accessor,
                scep_role: scepChallenge.name,
            },
        },
    });
    
    import pulumi
    import pulumi_vault as vault
    
    scep = vault.AuthBackend("scep",
        path="scep-auth",
        type="scep")
    scep_challenge = vault.ScepAuthBackendRole("scep_challenge",
        backend=scep.id,
        name="scep-auth",
        display_name="Static challenge for SCEP clients",
        auth_type="static-challenge",
        challenge="ac7e4ada-c8ef-4393-9098-d69d08736833")
    pki = vault.Mount("pki",
        path="pki_scep",
        type="pki",
        description="PKI secret engine mount")
    test = vault.pki_secret.BackendConfigScep("test",
        backend=pki.path,
        enabled=True,
        default_path_policy="sign-verbatim",
        restrict_ca_chain_to_issuer=True,
        authenticators={
            "scep": {
                "accessor": scep.accessor,
                "scep_role": scep_challenge.name,
            },
        })
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-vault/sdk/v7/go/vault"
    	"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/pkisecret"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		scep, err := vault.NewAuthBackend(ctx, "scep", &vault.AuthBackendArgs{
    			Path: pulumi.String("scep-auth"),
    			Type: pulumi.String("scep"),
    		})
    		if err != nil {
    			return err
    		}
    		scepChallenge, err := vault.NewScepAuthBackendRole(ctx, "scep_challenge", &vault.ScepAuthBackendRoleArgs{
    			Backend:     scep.ID(),
    			Name:        pulumi.String("scep-auth"),
    			DisplayName: pulumi.String("Static challenge for SCEP clients"),
    			AuthType:    pulumi.String("static-challenge"),
    			Challenge:   pulumi.String("ac7e4ada-c8ef-4393-9098-d69d08736833"),
    		})
    		if err != nil {
    			return err
    		}
    		pki, err := vault.NewMount(ctx, "pki", &vault.MountArgs{
    			Path:        pulumi.String("pki_scep"),
    			Type:        pulumi.String("pki"),
    			Description: pulumi.String("PKI secret engine mount"),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = pkisecret.NewBackendConfigScep(ctx, "test", &pkisecret.BackendConfigScepArgs{
    			Backend:                 pki.Path,
    			Enabled:                 pulumi.Bool(true),
    			DefaultPathPolicy:       pulumi.String("sign-verbatim"),
    			RestrictCaChainToIssuer: pulumi.Bool(true),
    			Authenticators: &pkisecret.BackendConfigScepAuthenticatorsArgs{
    				Scep: pulumi.StringMap{
    					"accessor":  scep.Accessor,
    					"scep_role": scepChallenge.Name,
    				},
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Vault = Pulumi.Vault;
    
    return await Deployment.RunAsync(() => 
    {
        var scep = new Vault.AuthBackend("scep", new()
        {
            Path = "scep-auth",
            Type = "scep",
        });
    
        var scepChallenge = new Vault.ScepAuthBackendRole("scep_challenge", new()
        {
            Backend = scep.Id,
            Name = "scep-auth",
            DisplayName = "Static challenge for SCEP clients",
            AuthType = "static-challenge",
            Challenge = "ac7e4ada-c8ef-4393-9098-d69d08736833",
        });
    
        var pki = new Vault.Mount("pki", new()
        {
            Path = "pki_scep",
            Type = "pki",
            Description = "PKI secret engine mount",
        });
    
        var test = new Vault.PkiSecret.BackendConfigScep("test", new()
        {
            Backend = pki.Path,
            Enabled = true,
            DefaultPathPolicy = "sign-verbatim",
            RestrictCaChainToIssuer = true,
            Authenticators = new Vault.PkiSecret.Inputs.BackendConfigScepAuthenticatorsArgs
            {
                Scep = 
                {
                    { "accessor", scep.Accessor },
                    { "scep_role", scepChallenge.Name },
                },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.vault.AuthBackend;
    import com.pulumi.vault.AuthBackendArgs;
    import com.pulumi.vault.ScepAuthBackendRole;
    import com.pulumi.vault.ScepAuthBackendRoleArgs;
    import com.pulumi.vault.Mount;
    import com.pulumi.vault.MountArgs;
    import com.pulumi.vault.pkiSecret.BackendConfigScep;
    import com.pulumi.vault.pkiSecret.BackendConfigScepArgs;
    import com.pulumi.vault.pkiSecret.inputs.BackendConfigScepAuthenticatorsArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var scep = new AuthBackend("scep", AuthBackendArgs.builder()
                .path("scep-auth")
                .type("scep")
                .build());
    
            var scepChallenge = new ScepAuthBackendRole("scepChallenge", ScepAuthBackendRoleArgs.builder()
                .backend(scep.id())
                .name("scep-auth")
                .displayName("Static challenge for SCEP clients")
                .authType("static-challenge")
                .challenge("ac7e4ada-c8ef-4393-9098-d69d08736833")
                .build());
    
            var pki = new Mount("pki", MountArgs.builder()
                .path("pki_scep")
                .type("pki")
                .description("PKI secret engine mount")
                .build());
    
            var test = new BackendConfigScep("test", BackendConfigScepArgs.builder()
                .backend(pki.path())
                .enabled(true)
                .defaultPathPolicy("sign-verbatim")
                .restrictCaChainToIssuer(true)
                .authenticators(BackendConfigScepAuthenticatorsArgs.builder()
                    .scep(Map.ofEntries(
                        Map.entry("accessor", scep.accessor()),
                        Map.entry("scep_role", scepChallenge.name())
                    ))
                    .build())
                .build());
    
        }
    }
    
    resources:
      scep:
        type: vault:AuthBackend
        properties:
          path: scep-auth
          type: scep
      scepChallenge:
        type: vault:ScepAuthBackendRole
        name: scep_challenge
        properties:
          backend: ${scep.id}
          name: scep-auth
          displayName: Static challenge for SCEP clients
          authType: static-challenge
          challenge: ac7e4ada-c8ef-4393-9098-d69d08736833
      pki:
        type: vault:Mount
        properties:
          path: pki_scep
          type: pki
          description: PKI secret engine mount
      test:
        type: vault:pkiSecret:BackendConfigScep
        properties:
          backend: ${pki.path}
          enabled: true
          defaultPathPolicy: sign-verbatim
          restrictCaChainToIssuer: true
          authenticators:
            scep:
              accessor: ${scep.accessor}
              scep_role: ${scepChallenge.name}
    

    Create BackendConfigScep Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new BackendConfigScep(name: string, args: BackendConfigScepArgs, opts?: CustomResourceOptions);
    @overload
    def BackendConfigScep(resource_name: str,
                          args: BackendConfigScepArgs,
                          opts: Optional[ResourceOptions] = None)
    
    @overload
    def BackendConfigScep(resource_name: str,
                          opts: Optional[ResourceOptions] = None,
                          backend: Optional[str] = None,
                          allowed_digest_algorithms: Optional[Sequence[str]] = None,
                          allowed_encryption_algorithms: Optional[Sequence[str]] = None,
                          authenticators: Optional[BackendConfigScepAuthenticatorsArgs] = None,
                          default_path_policy: Optional[str] = None,
                          enabled: Optional[bool] = None,
                          external_validations: Optional[Sequence[BackendConfigScepExternalValidationArgs]] = None,
                          namespace: Optional[str] = None,
                          restrict_ca_chain_to_issuer: Optional[bool] = None)
    func NewBackendConfigScep(ctx *Context, name string, args BackendConfigScepArgs, opts ...ResourceOption) (*BackendConfigScep, error)
    public BackendConfigScep(string name, BackendConfigScepArgs args, CustomResourceOptions? opts = null)
    public BackendConfigScep(String name, BackendConfigScepArgs args)
    public BackendConfigScep(String name, BackendConfigScepArgs args, CustomResourceOptions options)
    
    type: vault:pkiSecret:BackendConfigScep
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args BackendConfigScepArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args BackendConfigScepArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args BackendConfigScepArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args BackendConfigScepArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args BackendConfigScepArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var backendConfigScepResource = new Vault.PkiSecret.BackendConfigScep("backendConfigScepResource", new()
    {
        Backend = "string",
        AllowedDigestAlgorithms = new[]
        {
            "string",
        },
        AllowedEncryptionAlgorithms = new[]
        {
            "string",
        },
        Authenticators = new Vault.PkiSecret.Inputs.BackendConfigScepAuthenticatorsArgs
        {
            Cert = 
            {
                { "string", "string" },
            },
            Scep = 
            {
                { "string", "string" },
            },
        },
        DefaultPathPolicy = "string",
        Enabled = false,
        ExternalValidations = new[]
        {
            new Vault.PkiSecret.Inputs.BackendConfigScepExternalValidationArgs
            {
                Intune = 
                {
                    { "string", "string" },
                },
            },
        },
        Namespace = "string",
        RestrictCaChainToIssuer = false,
    });
    
    example, err := pkisecret.NewBackendConfigScep(ctx, "backendConfigScepResource", &pkisecret.BackendConfigScepArgs{
    	Backend: pulumi.String("string"),
    	AllowedDigestAlgorithms: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	AllowedEncryptionAlgorithms: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	Authenticators: &pkisecret.BackendConfigScepAuthenticatorsArgs{
    		Cert: pulumi.StringMap{
    			"string": pulumi.String("string"),
    		},
    		Scep: pulumi.StringMap{
    			"string": pulumi.String("string"),
    		},
    	},
    	DefaultPathPolicy: pulumi.String("string"),
    	Enabled:           pulumi.Bool(false),
    	ExternalValidations: pkisecret.BackendConfigScepExternalValidationArray{
    		&pkisecret.BackendConfigScepExternalValidationArgs{
    			Intune: pulumi.StringMap{
    				"string": pulumi.String("string"),
    			},
    		},
    	},
    	Namespace:               pulumi.String("string"),
    	RestrictCaChainToIssuer: pulumi.Bool(false),
    })
    
    var backendConfigScepResource = new BackendConfigScep("backendConfigScepResource", BackendConfigScepArgs.builder()
        .backend("string")
        .allowedDigestAlgorithms("string")
        .allowedEncryptionAlgorithms("string")
        .authenticators(BackendConfigScepAuthenticatorsArgs.builder()
            .cert(Map.of("string", "string"))
            .scep(Map.of("string", "string"))
            .build())
        .defaultPathPolicy("string")
        .enabled(false)
        .externalValidations(BackendConfigScepExternalValidationArgs.builder()
            .intune(Map.of("string", "string"))
            .build())
        .namespace("string")
        .restrictCaChainToIssuer(false)
        .build());
    
    backend_config_scep_resource = vault.pkisecret.BackendConfigScep("backendConfigScepResource",
        backend="string",
        allowed_digest_algorithms=["string"],
        allowed_encryption_algorithms=["string"],
        authenticators={
            "cert": {
                "string": "string",
            },
            "scep": {
                "string": "string",
            },
        },
        default_path_policy="string",
        enabled=False,
        external_validations=[{
            "intune": {
                "string": "string",
            },
        }],
        namespace="string",
        restrict_ca_chain_to_issuer=False)
    
    const backendConfigScepResource = new vault.pkisecret.BackendConfigScep("backendConfigScepResource", {
        backend: "string",
        allowedDigestAlgorithms: ["string"],
        allowedEncryptionAlgorithms: ["string"],
        authenticators: {
            cert: {
                string: "string",
            },
            scep: {
                string: "string",
            },
        },
        defaultPathPolicy: "string",
        enabled: false,
        externalValidations: [{
            intune: {
                string: "string",
            },
        }],
        namespace: "string",
        restrictCaChainToIssuer: false,
    });
    
    type: vault:pkiSecret:BackendConfigScep
    properties:
        allowedDigestAlgorithms:
            - string
        allowedEncryptionAlgorithms:
            - string
        authenticators:
            cert:
                string: string
            scep:
                string: string
        backend: string
        defaultPathPolicy: string
        enabled: false
        externalValidations:
            - intune:
                string: string
        namespace: string
        restrictCaChainToIssuer: false
    

    BackendConfigScep Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The BackendConfigScep resource accepts the following input properties:

    Backend string
    The path to the PKI secret backend to read the SCEP configuration from, with no leading or trailing /s.
    AllowedDigestAlgorithms List<string>
    List of allowed digest algorithms for SCEP requests.
    AllowedEncryptionAlgorithms List<string>
    List of allowed encryption algorithms for SCEP requests.
    Authenticators BackendConfigScepAuthenticators
    Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
    DefaultPathPolicy string
    Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
    Enabled bool
    Specifies whether SCEP is enabled.
    ExternalValidations List<BackendConfigScepExternalValidation>
    Lists the 3rd party validation of SCEP requests (see below for nested schema).
    Namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    RestrictCaChainToIssuer bool

    If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.

    Backend string
    The path to the PKI secret backend to read the SCEP configuration from, with no leading or trailing /s.
    AllowedDigestAlgorithms []string
    List of allowed digest algorithms for SCEP requests.
    AllowedEncryptionAlgorithms []string
    List of allowed encryption algorithms for SCEP requests.
    Authenticators BackendConfigScepAuthenticatorsArgs
    Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
    DefaultPathPolicy string
    Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
    Enabled bool
    Specifies whether SCEP is enabled.
    ExternalValidations []BackendConfigScepExternalValidationArgs
    Lists the 3rd party validation of SCEP requests (see below for nested schema).
    Namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    RestrictCaChainToIssuer bool

    If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.

    backend String
    The path to the PKI secret backend to read the SCEP configuration from, with no leading or trailing /s.
    allowedDigestAlgorithms List<String>
    List of allowed digest algorithms for SCEP requests.
    allowedEncryptionAlgorithms List<String>
    List of allowed encryption algorithms for SCEP requests.
    authenticators BackendConfigScepAuthenticators
    Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
    defaultPathPolicy String
    Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
    enabled Boolean
    Specifies whether SCEP is enabled.
    externalValidations List<BackendConfigScepExternalValidation>
    Lists the 3rd party validation of SCEP requests (see below for nested schema).
    namespace String
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    restrictCaChainToIssuer Boolean

    If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.

    backend string
    The path to the PKI secret backend to read the SCEP configuration from, with no leading or trailing /s.
    allowedDigestAlgorithms string[]
    List of allowed digest algorithms for SCEP requests.
    allowedEncryptionAlgorithms string[]
    List of allowed encryption algorithms for SCEP requests.
    authenticators BackendConfigScepAuthenticators
    Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
    defaultPathPolicy string
    Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
    enabled boolean
    Specifies whether SCEP is enabled.
    externalValidations BackendConfigScepExternalValidation[]
    Lists the 3rd party validation of SCEP requests (see below for nested schema).
    namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    restrictCaChainToIssuer boolean

    If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.

    backend str
    The path to the PKI secret backend to read the SCEP configuration from, with no leading or trailing /s.
    allowed_digest_algorithms Sequence[str]
    List of allowed digest algorithms for SCEP requests.
    allowed_encryption_algorithms Sequence[str]
    List of allowed encryption algorithms for SCEP requests.
    authenticators BackendConfigScepAuthenticatorsArgs
    Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
    default_path_policy str
    Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
    enabled bool
    Specifies whether SCEP is enabled.
    external_validations Sequence[BackendConfigScepExternalValidationArgs]
    Lists the 3rd party validation of SCEP requests (see below for nested schema).
    namespace str
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    restrict_ca_chain_to_issuer bool

    If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.

    backend String
    The path to the PKI secret backend to read the SCEP configuration from, with no leading or trailing /s.
    allowedDigestAlgorithms List<String>
    List of allowed digest algorithms for SCEP requests.
    allowedEncryptionAlgorithms List<String>
    List of allowed encryption algorithms for SCEP requests.
    authenticators Property Map
    Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
    defaultPathPolicy String
    Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
    enabled Boolean
    Specifies whether SCEP is enabled.
    externalValidations List<Property Map>
    Lists the 3rd party validation of SCEP requests (see below for nested schema).
    namespace String
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    restrictCaChainToIssuer Boolean

    If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the BackendConfigScep resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    LastUpdated string
    A read-only timestamp representing the last time the configuration was updated.
    Id string
    The provider-assigned unique ID for this managed resource.
    LastUpdated string
    A read-only timestamp representing the last time the configuration was updated.
    id String
    The provider-assigned unique ID for this managed resource.
    lastUpdated String
    A read-only timestamp representing the last time the configuration was updated.
    id string
    The provider-assigned unique ID for this managed resource.
    lastUpdated string
    A read-only timestamp representing the last time the configuration was updated.
    id str
    The provider-assigned unique ID for this managed resource.
    last_updated str
    A read-only timestamp representing the last time the configuration was updated.
    id String
    The provider-assigned unique ID for this managed resource.
    lastUpdated String
    A read-only timestamp representing the last time the configuration was updated.

    Look up Existing BackendConfigScep Resource

    Get an existing BackendConfigScep resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: BackendConfigScepState, opts?: CustomResourceOptions): BackendConfigScep
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            allowed_digest_algorithms: Optional[Sequence[str]] = None,
            allowed_encryption_algorithms: Optional[Sequence[str]] = None,
            authenticators: Optional[BackendConfigScepAuthenticatorsArgs] = None,
            backend: Optional[str] = None,
            default_path_policy: Optional[str] = None,
            enabled: Optional[bool] = None,
            external_validations: Optional[Sequence[BackendConfigScepExternalValidationArgs]] = None,
            last_updated: Optional[str] = None,
            namespace: Optional[str] = None,
            restrict_ca_chain_to_issuer: Optional[bool] = None) -> BackendConfigScep
    func GetBackendConfigScep(ctx *Context, name string, id IDInput, state *BackendConfigScepState, opts ...ResourceOption) (*BackendConfigScep, error)
    public static BackendConfigScep Get(string name, Input<string> id, BackendConfigScepState? state, CustomResourceOptions? opts = null)
    public static BackendConfigScep get(String name, Output<String> id, BackendConfigScepState state, CustomResourceOptions options)
    resources:  _:    type: vault:pkiSecret:BackendConfigScep    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AllowedDigestAlgorithms List<string>
    List of allowed digest algorithms for SCEP requests.
    AllowedEncryptionAlgorithms List<string>
    List of allowed encryption algorithms for SCEP requests.
    Authenticators BackendConfigScepAuthenticators
    Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
    Backend string
    The path to the PKI secret backend to read the SCEP configuration from, with no leading or trailing /s.
    DefaultPathPolicy string
    Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
    Enabled bool
    Specifies whether SCEP is enabled.
    ExternalValidations List<BackendConfigScepExternalValidation>
    Lists the 3rd party validation of SCEP requests (see below for nested schema).
    LastUpdated string
    A read-only timestamp representing the last time the configuration was updated.
    Namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    RestrictCaChainToIssuer bool

    If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.

    AllowedDigestAlgorithms []string
    List of allowed digest algorithms for SCEP requests.
    AllowedEncryptionAlgorithms []string
    List of allowed encryption algorithms for SCEP requests.
    Authenticators BackendConfigScepAuthenticatorsArgs
    Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
    Backend string
    The path to the PKI secret backend to read the SCEP configuration from, with no leading or trailing /s.
    DefaultPathPolicy string
    Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
    Enabled bool
    Specifies whether SCEP is enabled.
    ExternalValidations []BackendConfigScepExternalValidationArgs
    Lists the 3rd party validation of SCEP requests (see below for nested schema).
    LastUpdated string
    A read-only timestamp representing the last time the configuration was updated.
    Namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    RestrictCaChainToIssuer bool

    If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.

    allowedDigestAlgorithms List<String>
    List of allowed digest algorithms for SCEP requests.
    allowedEncryptionAlgorithms List<String>
    List of allowed encryption algorithms for SCEP requests.
    authenticators BackendConfigScepAuthenticators
    Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
    backend String
    The path to the PKI secret backend to read the SCEP configuration from, with no leading or trailing /s.
    defaultPathPolicy String
    Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
    enabled Boolean
    Specifies whether SCEP is enabled.
    externalValidations List<BackendConfigScepExternalValidation>
    Lists the 3rd party validation of SCEP requests (see below for nested schema).
    lastUpdated String
    A read-only timestamp representing the last time the configuration was updated.
    namespace String
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    restrictCaChainToIssuer Boolean

    If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.

    allowedDigestAlgorithms string[]
    List of allowed digest algorithms for SCEP requests.
    allowedEncryptionAlgorithms string[]
    List of allowed encryption algorithms for SCEP requests.
    authenticators BackendConfigScepAuthenticators
    Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
    backend string
    The path to the PKI secret backend to read the SCEP configuration from, with no leading or trailing /s.
    defaultPathPolicy string
    Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
    enabled boolean
    Specifies whether SCEP is enabled.
    externalValidations BackendConfigScepExternalValidation[]
    Lists the 3rd party validation of SCEP requests (see below for nested schema).
    lastUpdated string
    A read-only timestamp representing the last time the configuration was updated.
    namespace string
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    restrictCaChainToIssuer boolean

    If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.

    allowed_digest_algorithms Sequence[str]
    List of allowed digest algorithms for SCEP requests.
    allowed_encryption_algorithms Sequence[str]
    List of allowed encryption algorithms for SCEP requests.
    authenticators BackendConfigScepAuthenticatorsArgs
    Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
    backend str
    The path to the PKI secret backend to read the SCEP configuration from, with no leading or trailing /s.
    default_path_policy str
    Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
    enabled bool
    Specifies whether SCEP is enabled.
    external_validations Sequence[BackendConfigScepExternalValidationArgs]
    Lists the 3rd party validation of SCEP requests (see below for nested schema).
    last_updated str
    A read-only timestamp representing the last time the configuration was updated.
    namespace str
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    restrict_ca_chain_to_issuer bool

    If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.

    allowedDigestAlgorithms List<String>
    List of allowed digest algorithms for SCEP requests.
    allowedEncryptionAlgorithms List<String>
    List of allowed encryption algorithms for SCEP requests.
    authenticators Property Map
    Lists the mount accessors SCEP should delegate authentication requests towards (see below for nested schema).
    backend String
    The path to the PKI secret backend to read the SCEP configuration from, with no leading or trailing /s.
    defaultPathPolicy String
    Specifies the policy to be used for non-role-qualified SCEP requests; valid values are 'sign-verbatim', or "role:<role_name>" to specify a role to use as this policy.
    enabled Boolean
    Specifies whether SCEP is enabled.
    externalValidations List<Property Map>
    Lists the 3rd party validation of SCEP requests (see below for nested schema).
    lastUpdated String
    A read-only timestamp representing the last time the configuration was updated.
    namespace String
    The namespace of the target resource. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
    restrictCaChainToIssuer Boolean

    If true, only return the issuer CA, otherwise the entire CA certificate chain will be returned if available from the PKI mount.

    Supporting Types

    BackendConfigScepAuthenticators, BackendConfigScepAuthenticatorsArgs

    Cert Dictionary<string, string>
    The accessor and cert_role properties for cert auth backends
    Scep Dictionary<string, string>
    The accessor property for SCEP auth backends
    Cert map[string]string
    The accessor and cert_role properties for cert auth backends
    Scep map[string]string
    The accessor property for SCEP auth backends
    cert Map<String,String>
    The accessor and cert_role properties for cert auth backends
    scep Map<String,String>
    The accessor property for SCEP auth backends
    cert {[key: string]: string}
    The accessor and cert_role properties for cert auth backends
    scep {[key: string]: string}
    The accessor property for SCEP auth backends
    cert Mapping[str, str]
    The accessor and cert_role properties for cert auth backends
    scep Mapping[str, str]
    The accessor property for SCEP auth backends
    cert Map<String>
    The accessor and cert_role properties for cert auth backends
    scep Map<String>
    The accessor property for SCEP auth backends

    BackendConfigScepExternalValidation, BackendConfigScepExternalValidationArgs

    Intune Dictionary<string, string>
    The credentials to enable Microsoft Intune validation of SCEP requests
    Intune map[string]string
    The credentials to enable Microsoft Intune validation of SCEP requests
    intune Map<String,String>
    The credentials to enable Microsoft Intune validation of SCEP requests
    intune {[key: string]: string}
    The credentials to enable Microsoft Intune validation of SCEP requests
    intune Mapping[str, str]
    The credentials to enable Microsoft Intune validation of SCEP requests
    intune Map<String>
    The credentials to enable Microsoft Intune validation of SCEP requests

    Import

    The PKI config cluster can be imported using the resource’s id. In the case of the example above the id would be pki-root/config/scep, where the pki-root component is the resource’s backend, e.g.

    $ pulumi import vault:pkiSecret/backendConfigScep:BackendConfigScep example pki-root/config/scep
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Vault pulumi/pulumi-vault
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the vault Terraform Provider.
    vault logo
    HashiCorp Vault v7.1.0 published on Thursday, Jul 10, 2025 by Pulumi