1. Packages
  2. Packages
  3. HashiCorp Vault Provider
  4. API Docs
  5. secrets
  6. SyncAzureDestination
Viewing docs for HashiCorp Vault v7.8.0
published on Tuesday, Mar 31, 2026 by Pulumi
vault logo
Viewing docs for HashiCorp Vault v7.8.0
published on Tuesday, Mar 31, 2026 by Pulumi

    Creates a Azure Key Vault destination to synchronize secrets in Vault. Requires Vault 1.16+. Available only for Vault Enterprise.

    Important All data provided in the resource configuration will be written in cleartext to state and plan files generated by Terraform, and will appear in the console output when Terraform runs. Protect these artifacts accordingly. See the main provider documentation for more details.

    For more information on syncing secrets with Azure Key Vault, please refer to the Vault documentation.

    Example Usage

    import * as pulumi from "@pulumi/pulumi";
    import * as vault from "@pulumi/vault";
    
    const az = new vault.secrets.SyncAzureDestination("az", {
        name: "az-dest",
        keyVaultUri: keyVaultUri,
        clientId: clientId,
        clientSecret: clientSecret,
        tenantId: tenantId,
        secretNameTemplate: "vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
        customTags: {
            foo: "bar",
        },
    });
    
    import pulumi
    import pulumi_vault as vault
    
    az = vault.secrets.SyncAzureDestination("az",
        name="az-dest",
        key_vault_uri=key_vault_uri,
        client_id=client_id,
        client_secret=client_secret,
        tenant_id=tenant_id,
        secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
        custom_tags={
            "foo": "bar",
        })
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/secrets"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := secrets.NewSyncAzureDestination(ctx, "az", &secrets.SyncAzureDestinationArgs{
    			Name:               pulumi.String("az-dest"),
    			KeyVaultUri:        pulumi.Any(keyVaultUri),
    			ClientId:           pulumi.Any(clientId),
    			ClientSecret:       pulumi.Any(clientSecret),
    			TenantId:           pulumi.Any(tenantId),
    			SecretNameTemplate: pulumi.String("vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}"),
    			CustomTags: pulumi.StringMap{
    				"foo": pulumi.String("bar"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Vault = Pulumi.Vault;
    
    return await Deployment.RunAsync(() => 
    {
        var az = new Vault.Secrets.SyncAzureDestination("az", new()
        {
            Name = "az-dest",
            KeyVaultUri = keyVaultUri,
            ClientId = clientId,
            ClientSecret = clientSecret,
            TenantId = tenantId,
            SecretNameTemplate = "vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
            CustomTags = 
            {
                { "foo", "bar" },
            },
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.vault.secrets.SyncAzureDestination;
    import com.pulumi.vault.secrets.SyncAzureDestinationArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var az = new SyncAzureDestination("az", SyncAzureDestinationArgs.builder()
                .name("az-dest")
                .keyVaultUri(keyVaultUri)
                .clientId(clientId)
                .clientSecret(clientSecret)
                .tenantId(tenantId)
                .secretNameTemplate("vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
                .customTags(Map.of("foo", "bar"))
                .build());
    
        }
    }
    
    resources:
      az:
        type: vault:secrets:SyncAzureDestination
        properties:
          name: az-dest
          keyVaultUri: ${keyVaultUri}
          clientId: ${clientId}
          clientSecret: ${clientSecret}
          tenantId: ${tenantId}
          secretNameTemplate: vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}
          customTags:
            foo: bar
    

    With Networking Configuration (Vault 1.19+)

    import * as pulumi from "@pulumi/pulumi";
    import * as vault from "@pulumi/vault";
    
    const azNetworking = new vault.secrets.SyncAzureDestination("az_networking", {
        name: "az-dest-networking",
        keyVaultUri: keyVaultUri,
        clientId: clientId,
        clientSecret: clientSecret,
        tenantId: tenantId,
        allowedIpv4Addresses: [
            "10.0.0.0/8",
            "192.168.0.0/16",
        ],
        allowedIpv6Addresses: ["2001:db8::/32"],
        allowedPorts: [
            443,
            8443,
        ],
        disableStrictNetworking: false,
    });
    
    import pulumi
    import pulumi_vault as vault
    
    az_networking = vault.secrets.SyncAzureDestination("az_networking",
        name="az-dest-networking",
        key_vault_uri=key_vault_uri,
        client_id=client_id,
        client_secret=client_secret,
        tenant_id=tenant_id,
        allowed_ipv4_addresses=[
            "10.0.0.0/8",
            "192.168.0.0/16",
        ],
        allowed_ipv6_addresses=["2001:db8::/32"],
        allowed_ports=[
            443,
            8443,
        ],
        disable_strict_networking=False)
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/secrets"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := secrets.NewSyncAzureDestination(ctx, "az_networking", &secrets.SyncAzureDestinationArgs{
    			Name:         pulumi.String("az-dest-networking"),
    			KeyVaultUri:  pulumi.Any(keyVaultUri),
    			ClientId:     pulumi.Any(clientId),
    			ClientSecret: pulumi.Any(clientSecret),
    			TenantId:     pulumi.Any(tenantId),
    			AllowedIpv4Addresses: pulumi.StringArray{
    				pulumi.String("10.0.0.0/8"),
    				pulumi.String("192.168.0.0/16"),
    			},
    			AllowedIpv6Addresses: pulumi.StringArray{
    				pulumi.String("2001:db8::/32"),
    			},
    			AllowedPorts: pulumi.IntArray{
    				pulumi.Int(443),
    				pulumi.Int(8443),
    			},
    			DisableStrictNetworking: pulumi.Bool(false),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Vault = Pulumi.Vault;
    
    return await Deployment.RunAsync(() => 
    {
        var azNetworking = new Vault.Secrets.SyncAzureDestination("az_networking", new()
        {
            Name = "az-dest-networking",
            KeyVaultUri = keyVaultUri,
            ClientId = clientId,
            ClientSecret = clientSecret,
            TenantId = tenantId,
            AllowedIpv4Addresses = new[]
            {
                "10.0.0.0/8",
                "192.168.0.0/16",
            },
            AllowedIpv6Addresses = new[]
            {
                "2001:db8::/32",
            },
            AllowedPorts = new[]
            {
                443,
                8443,
            },
            DisableStrictNetworking = false,
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.vault.secrets.SyncAzureDestination;
    import com.pulumi.vault.secrets.SyncAzureDestinationArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var azNetworking = new SyncAzureDestination("azNetworking", SyncAzureDestinationArgs.builder()
                .name("az-dest-networking")
                .keyVaultUri(keyVaultUri)
                .clientId(clientId)
                .clientSecret(clientSecret)
                .tenantId(tenantId)
                .allowedIpv4Addresses(            
                    "10.0.0.0/8",
                    "192.168.0.0/16")
                .allowedIpv6Addresses("2001:db8::/32")
                .allowedPorts(            
                    443,
                    8443)
                .disableStrictNetworking(false)
                .build());
    
        }
    }
    
    resources:
      azNetworking:
        type: vault:secrets:SyncAzureDestination
        name: az_networking
        properties:
          name: az-dest-networking
          keyVaultUri: ${keyVaultUri}
          clientId: ${clientId}
          clientSecret: ${clientSecret}
          tenantId: ${tenantId}
          allowedIpv4Addresses:
            - 10.0.0.0/8
            - 192.168.0.0/16
          allowedIpv6Addresses:
            - 2001:db8::/32
          allowedPorts:
            - 443
            - 8443
          disableStrictNetworking: false
    

    Using Workload Identity Federation (Vault 2.0.0+)

    import * as pulumi from "@pulumi/pulumi";
    import * as vault from "@pulumi/vault";
    
    const azWif = new vault.secrets.SyncAzureDestination("az_wif", {
        name: "az-dest-wif",
        keyVaultUri: keyVaultUri,
        clientId: clientId,
        tenantId: tenantId,
        identityTokenAudience: identityTokenAudience,
        identityTokenTtl: 3600,
        identityTokenKey: "my-key",
        granularity: "secret-path",
    });
    
    import pulumi
    import pulumi_vault as vault
    
    az_wif = vault.secrets.SyncAzureDestination("az_wif",
        name="az-dest-wif",
        key_vault_uri=key_vault_uri,
        client_id=client_id,
        tenant_id=tenant_id,
        identity_token_audience=identity_token_audience,
        identity_token_ttl=3600,
        identity_token_key="my-key",
        granularity="secret-path")
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/secrets"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		_, err := secrets.NewSyncAzureDestination(ctx, "az_wif", &secrets.SyncAzureDestinationArgs{
    			Name:                  pulumi.String("az-dest-wif"),
    			KeyVaultUri:           pulumi.Any(keyVaultUri),
    			ClientId:              pulumi.Any(clientId),
    			TenantId:              pulumi.Any(tenantId),
    			IdentityTokenAudience: identityTokenAudience,
    			IdentityTokenTtl:      pulumi.Int(3600),
    			IdentityTokenKey:      "my-key",
    			Granularity:           pulumi.String("secret-path"),
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    
    using System.Collections.Generic;
    using System.Linq;
    using Pulumi;
    using Vault = Pulumi.Vault;
    
    return await Deployment.RunAsync(() => 
    {
        var azWif = new Vault.Secrets.SyncAzureDestination("az_wif", new()
        {
            Name = "az-dest-wif",
            KeyVaultUri = keyVaultUri,
            ClientId = clientId,
            TenantId = tenantId,
            IdentityTokenAudience = identityTokenAudience,
            IdentityTokenTtl = 3600,
            IdentityTokenKey = "my-key",
            Granularity = "secret-path",
        });
    
    });
    
    package generated_program;
    
    import com.pulumi.Context;
    import com.pulumi.Pulumi;
    import com.pulumi.core.Output;
    import com.pulumi.vault.secrets.SyncAzureDestination;
    import com.pulumi.vault.secrets.SyncAzureDestinationArgs;
    import java.util.List;
    import java.util.ArrayList;
    import java.util.Map;
    import java.io.File;
    import java.nio.file.Files;
    import java.nio.file.Paths;
    
    public class App {
        public static void main(String[] args) {
            Pulumi.run(App::stack);
        }
    
        public static void stack(Context ctx) {
            var azWif = new SyncAzureDestination("azWif", SyncAzureDestinationArgs.builder()
                .name("az-dest-wif")
                .keyVaultUri(keyVaultUri)
                .clientId(clientId)
                .tenantId(tenantId)
                .identityTokenAudience(identityTokenAudience)
                .identityTokenTtl(3600)
                .identityTokenKey("my-key")
                .granularity("secret-path")
                .build());
    
        }
    }
    
    resources:
      azWif:
        type: vault:secrets:SyncAzureDestination
        name: az_wif
        properties:
          name: az-dest-wif
          keyVaultUri: ${keyVaultUri}
          clientId: ${clientId}
          tenantId: ${tenantId}
          identityTokenAudience: ${identityTokenAudience}
          identityTokenTtl: 3600
          identityTokenKey: my-key
          granularity: secret-path
    

    Create SyncAzureDestination Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new SyncAzureDestination(name: string, args?: SyncAzureDestinationArgs, opts?: CustomResourceOptions);
    @overload
    def SyncAzureDestination(resource_name: str,
                             args: Optional[SyncAzureDestinationArgs] = None,
                             opts: Optional[ResourceOptions] = None)
    
    @overload
    def SyncAzureDestination(resource_name: str,
                             opts: Optional[ResourceOptions] = None,
                             allowed_ipv4_addresses: Optional[Sequence[str]] = None,
                             allowed_ipv6_addresses: Optional[Sequence[str]] = None,
                             allowed_ports: Optional[Sequence[int]] = None,
                             client_id: Optional[str] = None,
                             client_secret: Optional[str] = None,
                             cloud: Optional[str] = None,
                             custom_tags: Optional[Mapping[str, str]] = None,
                             disable_strict_networking: Optional[bool] = None,
                             granularity: Optional[str] = None,
                             identity_token_audience_wo: Optional[str] = None,
                             identity_token_audience_wo_version: Optional[int] = None,
                             identity_token_key_wo: Optional[str] = None,
                             identity_token_key_wo_version: Optional[int] = None,
                             identity_token_ttl: Optional[int] = None,
                             key_vault_uri: Optional[str] = None,
                             name: Optional[str] = None,
                             namespace: Optional[str] = None,
                             secret_name_template: Optional[str] = None,
                             tenant_id: Optional[str] = None)
    func NewSyncAzureDestination(ctx *Context, name string, args *SyncAzureDestinationArgs, opts ...ResourceOption) (*SyncAzureDestination, error)
    public SyncAzureDestination(string name, SyncAzureDestinationArgs? args = null, CustomResourceOptions? opts = null)
    public SyncAzureDestination(String name, SyncAzureDestinationArgs args)
    public SyncAzureDestination(String name, SyncAzureDestinationArgs args, CustomResourceOptions options)
    
    type: vault:secrets:SyncAzureDestination
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args SyncAzureDestinationArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args SyncAzureDestinationArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args SyncAzureDestinationArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args SyncAzureDestinationArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args SyncAzureDestinationArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    SyncAzureDestination Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The SyncAzureDestination resource accepts the following input properties:

    AllowedIpv4Addresses List<string>
    Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
    AllowedIpv6Addresses List<string>
    Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
    AllowedPorts List<int>
    Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
    ClientId string
    Client ID of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_ID environment variable.
    ClientSecret string
    Client Secret of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_SECRET environment variable.
    Cloud string
    Specifies a cloud for the client. The default is Azure Public Cloud.
    CustomTags Dictionary<string, string>
    Custom tags to set on the secret managed at the destination.
    DisableStrictNetworking bool
    If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
    Granularity string
    Determines what level of information is synced as a distinct resource at the destination. Supports secret-path and secret-key.
    IdentityTokenAudienceWo string
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
    IdentityTokenAudienceWoVersion int
    A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
    IdentityTokenKeyWo string
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
    IdentityTokenKeyWoVersion int
    A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
    IdentityTokenTtl int
    The TTL of generated tokens.
    KeyVaultUri string
    URI of an existing Azure Key Vault instance. Can be omitted and directly provided to Vault using the KEY_VAULT_URI environment variable.
    Name string
    Unique name of the Azure destination.
    Namespace string
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace.
    SecretNameTemplate string
    Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
    TenantId string
    ID of the target Azure tenant. Can be omitted and directly provided to Vault using the AZURE_TENANT_ID environment variable.
    AllowedIpv4Addresses []string
    Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
    AllowedIpv6Addresses []string
    Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
    AllowedPorts []int
    Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
    ClientId string
    Client ID of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_ID environment variable.
    ClientSecret string
    Client Secret of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_SECRET environment variable.
    Cloud string
    Specifies a cloud for the client. The default is Azure Public Cloud.
    CustomTags map[string]string
    Custom tags to set on the secret managed at the destination.
    DisableStrictNetworking bool
    If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
    Granularity string
    Determines what level of information is synced as a distinct resource at the destination. Supports secret-path and secret-key.
    IdentityTokenAudienceWo string
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
    IdentityTokenAudienceWoVersion int
    A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
    IdentityTokenKeyWo string
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
    IdentityTokenKeyWoVersion int
    A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
    IdentityTokenTtl int
    The TTL of generated tokens.
    KeyVaultUri string
    URI of an existing Azure Key Vault instance. Can be omitted and directly provided to Vault using the KEY_VAULT_URI environment variable.
    Name string
    Unique name of the Azure destination.
    Namespace string
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace.
    SecretNameTemplate string
    Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
    TenantId string
    ID of the target Azure tenant. Can be omitted and directly provided to Vault using the AZURE_TENANT_ID environment variable.
    allowedIpv4Addresses List<String>
    Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
    allowedIpv6Addresses List<String>
    Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
    allowedPorts List<Integer>
    Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
    clientId String
    Client ID of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_ID environment variable.
    clientSecret String
    Client Secret of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_SECRET environment variable.
    cloud String
    Specifies a cloud for the client. The default is Azure Public Cloud.
    customTags Map<String,String>
    Custom tags to set on the secret managed at the destination.
    disableStrictNetworking Boolean
    If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
    granularity String
    Determines what level of information is synced as a distinct resource at the destination. Supports secret-path and secret-key.
    identityTokenAudienceWo String
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
    identityTokenAudienceWoVersion Integer
    A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
    identityTokenKeyWo String
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
    identityTokenKeyWoVersion Integer
    A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
    identityTokenTtl Integer
    The TTL of generated tokens.
    keyVaultUri String
    URI of an existing Azure Key Vault instance. Can be omitted and directly provided to Vault using the KEY_VAULT_URI environment variable.
    name String
    Unique name of the Azure destination.
    namespace String
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace.
    secretNameTemplate String
    Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
    tenantId String
    ID of the target Azure tenant. Can be omitted and directly provided to Vault using the AZURE_TENANT_ID environment variable.
    allowedIpv4Addresses string[]
    Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
    allowedIpv6Addresses string[]
    Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
    allowedPorts number[]
    Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
    clientId string
    Client ID of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_ID environment variable.
    clientSecret string
    Client Secret of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_SECRET environment variable.
    cloud string
    Specifies a cloud for the client. The default is Azure Public Cloud.
    customTags {[key: string]: string}
    Custom tags to set on the secret managed at the destination.
    disableStrictNetworking boolean
    If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
    granularity string
    Determines what level of information is synced as a distinct resource at the destination. Supports secret-path and secret-key.
    identityTokenAudienceWo string
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
    identityTokenAudienceWoVersion number
    A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
    identityTokenKeyWo string
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
    identityTokenKeyWoVersion number
    A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
    identityTokenTtl number
    The TTL of generated tokens.
    keyVaultUri string
    URI of an existing Azure Key Vault instance. Can be omitted and directly provided to Vault using the KEY_VAULT_URI environment variable.
    name string
    Unique name of the Azure destination.
    namespace string
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace.
    secretNameTemplate string
    Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
    tenantId string
    ID of the target Azure tenant. Can be omitted and directly provided to Vault using the AZURE_TENANT_ID environment variable.
    allowed_ipv4_addresses Sequence[str]
    Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
    allowed_ipv6_addresses Sequence[str]
    Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
    allowed_ports Sequence[int]
    Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
    client_id str
    Client ID of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_ID environment variable.
    client_secret str
    Client Secret of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_SECRET environment variable.
    cloud str
    Specifies a cloud for the client. The default is Azure Public Cloud.
    custom_tags Mapping[str, str]
    Custom tags to set on the secret managed at the destination.
    disable_strict_networking bool
    If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
    granularity str
    Determines what level of information is synced as a distinct resource at the destination. Supports secret-path and secret-key.
    identity_token_audience_wo str
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
    identity_token_audience_wo_version int
    A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
    identity_token_key_wo str
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
    identity_token_key_wo_version int
    A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
    identity_token_ttl int
    The TTL of generated tokens.
    key_vault_uri str
    URI of an existing Azure Key Vault instance. Can be omitted and directly provided to Vault using the KEY_VAULT_URI environment variable.
    name str
    Unique name of the Azure destination.
    namespace str
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace.
    secret_name_template str
    Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
    tenant_id str
    ID of the target Azure tenant. Can be omitted and directly provided to Vault using the AZURE_TENANT_ID environment variable.
    allowedIpv4Addresses List<String>
    Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
    allowedIpv6Addresses List<String>
    Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
    allowedPorts List<Number>
    Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
    clientId String
    Client ID of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_ID environment variable.
    clientSecret String
    Client Secret of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_SECRET environment variable.
    cloud String
    Specifies a cloud for the client. The default is Azure Public Cloud.
    customTags Map<String>
    Custom tags to set on the secret managed at the destination.
    disableStrictNetworking Boolean
    If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
    granularity String
    Determines what level of information is synced as a distinct resource at the destination. Supports secret-path and secret-key.
    identityTokenAudienceWo String
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
    identityTokenAudienceWoVersion Number
    A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
    identityTokenKeyWo String
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
    identityTokenKeyWoVersion Number
    A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
    identityTokenTtl Number
    The TTL of generated tokens.
    keyVaultUri String
    URI of an existing Azure Key Vault instance. Can be omitted and directly provided to Vault using the KEY_VAULT_URI environment variable.
    name String
    Unique name of the Azure destination.
    namespace String
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace.
    secretNameTemplate String
    Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
    tenantId String
    ID of the target Azure tenant. Can be omitted and directly provided to Vault using the AZURE_TENANT_ID environment variable.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the SyncAzureDestination resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Type string
    The type of the secrets destination (azure-kv).
    Id string
    The provider-assigned unique ID for this managed resource.
    Type string
    The type of the secrets destination (azure-kv).
    id String
    The provider-assigned unique ID for this managed resource.
    type String
    The type of the secrets destination (azure-kv).
    id string
    The provider-assigned unique ID for this managed resource.
    type string
    The type of the secrets destination (azure-kv).
    id str
    The provider-assigned unique ID for this managed resource.
    type str
    The type of the secrets destination (azure-kv).
    id String
    The provider-assigned unique ID for this managed resource.
    type String
    The type of the secrets destination (azure-kv).

    Look up Existing SyncAzureDestination Resource

    Get an existing SyncAzureDestination resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: SyncAzureDestinationState, opts?: CustomResourceOptions): SyncAzureDestination
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            allowed_ipv4_addresses: Optional[Sequence[str]] = None,
            allowed_ipv6_addresses: Optional[Sequence[str]] = None,
            allowed_ports: Optional[Sequence[int]] = None,
            client_id: Optional[str] = None,
            client_secret: Optional[str] = None,
            cloud: Optional[str] = None,
            custom_tags: Optional[Mapping[str, str]] = None,
            disable_strict_networking: Optional[bool] = None,
            granularity: Optional[str] = None,
            identity_token_audience_wo: Optional[str] = None,
            identity_token_audience_wo_version: Optional[int] = None,
            identity_token_key_wo: Optional[str] = None,
            identity_token_key_wo_version: Optional[int] = None,
            identity_token_ttl: Optional[int] = None,
            key_vault_uri: Optional[str] = None,
            name: Optional[str] = None,
            namespace: Optional[str] = None,
            secret_name_template: Optional[str] = None,
            tenant_id: Optional[str] = None,
            type: Optional[str] = None) -> SyncAzureDestination
    func GetSyncAzureDestination(ctx *Context, name string, id IDInput, state *SyncAzureDestinationState, opts ...ResourceOption) (*SyncAzureDestination, error)
    public static SyncAzureDestination Get(string name, Input<string> id, SyncAzureDestinationState? state, CustomResourceOptions? opts = null)
    public static SyncAzureDestination get(String name, Output<String> id, SyncAzureDestinationState state, CustomResourceOptions options)
    resources:  _:    type: vault:secrets:SyncAzureDestination    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AllowedIpv4Addresses List<string>
    Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
    AllowedIpv6Addresses List<string>
    Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
    AllowedPorts List<int>
    Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
    ClientId string
    Client ID of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_ID environment variable.
    ClientSecret string
    Client Secret of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_SECRET environment variable.
    Cloud string
    Specifies a cloud for the client. The default is Azure Public Cloud.
    CustomTags Dictionary<string, string>
    Custom tags to set on the secret managed at the destination.
    DisableStrictNetworking bool
    If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
    Granularity string
    Determines what level of information is synced as a distinct resource at the destination. Supports secret-path and secret-key.
    IdentityTokenAudienceWo string
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
    IdentityTokenAudienceWoVersion int
    A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
    IdentityTokenKeyWo string
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
    IdentityTokenKeyWoVersion int
    A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
    IdentityTokenTtl int
    The TTL of generated tokens.
    KeyVaultUri string
    URI of an existing Azure Key Vault instance. Can be omitted and directly provided to Vault using the KEY_VAULT_URI environment variable.
    Name string
    Unique name of the Azure destination.
    Namespace string
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace.
    SecretNameTemplate string
    Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
    TenantId string
    ID of the target Azure tenant. Can be omitted and directly provided to Vault using the AZURE_TENANT_ID environment variable.
    Type string
    The type of the secrets destination (azure-kv).
    AllowedIpv4Addresses []string
    Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
    AllowedIpv6Addresses []string
    Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
    AllowedPorts []int
    Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
    ClientId string
    Client ID of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_ID environment variable.
    ClientSecret string
    Client Secret of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_SECRET environment variable.
    Cloud string
    Specifies a cloud for the client. The default is Azure Public Cloud.
    CustomTags map[string]string
    Custom tags to set on the secret managed at the destination.
    DisableStrictNetworking bool
    If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
    Granularity string
    Determines what level of information is synced as a distinct resource at the destination. Supports secret-path and secret-key.
    IdentityTokenAudienceWo string
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
    IdentityTokenAudienceWoVersion int
    A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
    IdentityTokenKeyWo string
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
    IdentityTokenKeyWoVersion int
    A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
    IdentityTokenTtl int
    The TTL of generated tokens.
    KeyVaultUri string
    URI of an existing Azure Key Vault instance. Can be omitted and directly provided to Vault using the KEY_VAULT_URI environment variable.
    Name string
    Unique name of the Azure destination.
    Namespace string
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace.
    SecretNameTemplate string
    Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
    TenantId string
    ID of the target Azure tenant. Can be omitted and directly provided to Vault using the AZURE_TENANT_ID environment variable.
    Type string
    The type of the secrets destination (azure-kv).
    allowedIpv4Addresses List<String>
    Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
    allowedIpv6Addresses List<String>
    Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
    allowedPorts List<Integer>
    Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
    clientId String
    Client ID of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_ID environment variable.
    clientSecret String
    Client Secret of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_SECRET environment variable.
    cloud String
    Specifies a cloud for the client. The default is Azure Public Cloud.
    customTags Map<String,String>
    Custom tags to set on the secret managed at the destination.
    disableStrictNetworking Boolean
    If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
    granularity String
    Determines what level of information is synced as a distinct resource at the destination. Supports secret-path and secret-key.
    identityTokenAudienceWo String
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
    identityTokenAudienceWoVersion Integer
    A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
    identityTokenKeyWo String
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
    identityTokenKeyWoVersion Integer
    A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
    identityTokenTtl Integer
    The TTL of generated tokens.
    keyVaultUri String
    URI of an existing Azure Key Vault instance. Can be omitted and directly provided to Vault using the KEY_VAULT_URI environment variable.
    name String
    Unique name of the Azure destination.
    namespace String
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace.
    secretNameTemplate String
    Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
    tenantId String
    ID of the target Azure tenant. Can be omitted and directly provided to Vault using the AZURE_TENANT_ID environment variable.
    type String
    The type of the secrets destination (azure-kv).
    allowedIpv4Addresses string[]
    Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
    allowedIpv6Addresses string[]
    Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
    allowedPorts number[]
    Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
    clientId string
    Client ID of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_ID environment variable.
    clientSecret string
    Client Secret of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_SECRET environment variable.
    cloud string
    Specifies a cloud for the client. The default is Azure Public Cloud.
    customTags {[key: string]: string}
    Custom tags to set on the secret managed at the destination.
    disableStrictNetworking boolean
    If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
    granularity string
    Determines what level of information is synced as a distinct resource at the destination. Supports secret-path and secret-key.
    identityTokenAudienceWo string
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
    identityTokenAudienceWoVersion number
    A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
    identityTokenKeyWo string
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
    identityTokenKeyWoVersion number
    A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
    identityTokenTtl number
    The TTL of generated tokens.
    keyVaultUri string
    URI of an existing Azure Key Vault instance. Can be omitted and directly provided to Vault using the KEY_VAULT_URI environment variable.
    name string
    Unique name of the Azure destination.
    namespace string
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace.
    secretNameTemplate string
    Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
    tenantId string
    ID of the target Azure tenant. Can be omitted and directly provided to Vault using the AZURE_TENANT_ID environment variable.
    type string
    The type of the secrets destination (azure-kv).
    allowed_ipv4_addresses Sequence[str]
    Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
    allowed_ipv6_addresses Sequence[str]
    Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
    allowed_ports Sequence[int]
    Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
    client_id str
    Client ID of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_ID environment variable.
    client_secret str
    Client Secret of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_SECRET environment variable.
    cloud str
    Specifies a cloud for the client. The default is Azure Public Cloud.
    custom_tags Mapping[str, str]
    Custom tags to set on the secret managed at the destination.
    disable_strict_networking bool
    If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
    granularity str
    Determines what level of information is synced as a distinct resource at the destination. Supports secret-path and secret-key.
    identity_token_audience_wo str
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
    identity_token_audience_wo_version int
    A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
    identity_token_key_wo str
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
    identity_token_key_wo_version int
    A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
    identity_token_ttl int
    The TTL of generated tokens.
    key_vault_uri str
    URI of an existing Azure Key Vault instance. Can be omitted and directly provided to Vault using the KEY_VAULT_URI environment variable.
    name str
    Unique name of the Azure destination.
    namespace str
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace.
    secret_name_template str
    Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
    tenant_id str
    ID of the target Azure tenant. Can be omitted and directly provided to Vault using the AZURE_TENANT_ID environment variable.
    type str
    The type of the secrets destination (azure-kv).
    allowedIpv4Addresses List<String>
    Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
    allowedIpv6Addresses List<String>
    Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
    allowedPorts List<Number>
    Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
    clientId String
    Client ID of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_ID environment variable.
    clientSecret String
    Client Secret of an Azure app registration. Can be omitted and directly provided to Vault using the AZURE_CLIENT_SECRET environment variable.
    cloud String
    Specifies a cloud for the client. The default is Azure Public Cloud.
    customTags Map<String>
    Custom tags to set on the secret managed at the destination.
    disableStrictNetworking Boolean
    If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
    granularity String
    Determines what level of information is synced as a distinct resource at the destination. Supports secret-path and secret-key.
    identityTokenAudienceWo String
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
    identityTokenAudienceWoVersion Number
    A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
    identityTokenKeyWo String
    NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
    identityTokenKeyWoVersion Number
    A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
    identityTokenTtl Number
    The TTL of generated tokens.
    keyVaultUri String
    URI of an existing Azure Key Vault instance. Can be omitted and directly provided to Vault using the KEY_VAULT_URI environment variable.
    name String
    Unique name of the Azure destination.
    namespace String
    The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace.
    secretNameTemplate String
    Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
    tenantId String
    ID of the target Azure tenant. Can be omitted and directly provided to Vault using the AZURE_TENANT_ID environment variable.
    type String
    The type of the secrets destination (azure-kv).

    Import

    Azure Secrets sync destinations can be imported using the name, e.g.

    $ pulumi import vault:secrets/syncAzureDestination:SyncAzureDestination az az-dest
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Vault pulumi/pulumi-vault
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the vault Terraform Provider.
    vault logo
    Viewing docs for HashiCorp Vault v7.8.0
    published on Tuesday, Mar 31, 2026 by Pulumi
      Try Pulumi Cloud free. Your team will thank you.