published on Tuesday, Mar 31, 2026 by Pulumi
published on Tuesday, Mar 31, 2026 by Pulumi
Creates a Azure Key Vault destination to synchronize secrets in Vault. Requires Vault 1.16+. Available only for Vault Enterprise.
Important All data provided in the resource configuration will be written in cleartext to state and plan files generated by Terraform, and will appear in the console output when Terraform runs. Protect these artifacts accordingly. See the main provider documentation for more details.
For more information on syncing secrets with Azure Key Vault, please refer to the Vault documentation.
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const az = new vault.secrets.SyncAzureDestination("az", {
name: "az-dest",
keyVaultUri: keyVaultUri,
clientId: clientId,
clientSecret: clientSecret,
tenantId: tenantId,
secretNameTemplate: "vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
customTags: {
foo: "bar",
},
});
import pulumi
import pulumi_vault as vault
az = vault.secrets.SyncAzureDestination("az",
name="az-dest",
key_vault_uri=key_vault_uri,
client_id=client_id,
client_secret=client_secret,
tenant_id=tenant_id,
secret_name_template="vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
custom_tags={
"foo": "bar",
})
package main
import (
"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/secrets"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := secrets.NewSyncAzureDestination(ctx, "az", &secrets.SyncAzureDestinationArgs{
Name: pulumi.String("az-dest"),
KeyVaultUri: pulumi.Any(keyVaultUri),
ClientId: pulumi.Any(clientId),
ClientSecret: pulumi.Any(clientSecret),
TenantId: pulumi.Any(tenantId),
SecretNameTemplate: pulumi.String("vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}"),
CustomTags: pulumi.StringMap{
"foo": pulumi.String("bar"),
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var az = new Vault.Secrets.SyncAzureDestination("az", new()
{
Name = "az-dest",
KeyVaultUri = keyVaultUri,
ClientId = clientId,
ClientSecret = clientSecret,
TenantId = tenantId,
SecretNameTemplate = "vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}",
CustomTags =
{
{ "foo", "bar" },
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.secrets.SyncAzureDestination;
import com.pulumi.vault.secrets.SyncAzureDestinationArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var az = new SyncAzureDestination("az", SyncAzureDestinationArgs.builder()
.name("az-dest")
.keyVaultUri(keyVaultUri)
.clientId(clientId)
.clientSecret(clientSecret)
.tenantId(tenantId)
.secretNameTemplate("vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}")
.customTags(Map.of("foo", "bar"))
.build());
}
}
resources:
az:
type: vault:secrets:SyncAzureDestination
properties:
name: az-dest
keyVaultUri: ${keyVaultUri}
clientId: ${clientId}
clientSecret: ${clientSecret}
tenantId: ${tenantId}
secretNameTemplate: vault_{{ .MountAccessor | lowercase }}_{{ .SecretPath | lowercase }}
customTags:
foo: bar
With Networking Configuration (Vault 1.19+)
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const azNetworking = new vault.secrets.SyncAzureDestination("az_networking", {
name: "az-dest-networking",
keyVaultUri: keyVaultUri,
clientId: clientId,
clientSecret: clientSecret,
tenantId: tenantId,
allowedIpv4Addresses: [
"10.0.0.0/8",
"192.168.0.0/16",
],
allowedIpv6Addresses: ["2001:db8::/32"],
allowedPorts: [
443,
8443,
],
disableStrictNetworking: false,
});
import pulumi
import pulumi_vault as vault
az_networking = vault.secrets.SyncAzureDestination("az_networking",
name="az-dest-networking",
key_vault_uri=key_vault_uri,
client_id=client_id,
client_secret=client_secret,
tenant_id=tenant_id,
allowed_ipv4_addresses=[
"10.0.0.0/8",
"192.168.0.0/16",
],
allowed_ipv6_addresses=["2001:db8::/32"],
allowed_ports=[
443,
8443,
],
disable_strict_networking=False)
package main
import (
"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/secrets"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := secrets.NewSyncAzureDestination(ctx, "az_networking", &secrets.SyncAzureDestinationArgs{
Name: pulumi.String("az-dest-networking"),
KeyVaultUri: pulumi.Any(keyVaultUri),
ClientId: pulumi.Any(clientId),
ClientSecret: pulumi.Any(clientSecret),
TenantId: pulumi.Any(tenantId),
AllowedIpv4Addresses: pulumi.StringArray{
pulumi.String("10.0.0.0/8"),
pulumi.String("192.168.0.0/16"),
},
AllowedIpv6Addresses: pulumi.StringArray{
pulumi.String("2001:db8::/32"),
},
AllowedPorts: pulumi.IntArray{
pulumi.Int(443),
pulumi.Int(8443),
},
DisableStrictNetworking: pulumi.Bool(false),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var azNetworking = new Vault.Secrets.SyncAzureDestination("az_networking", new()
{
Name = "az-dest-networking",
KeyVaultUri = keyVaultUri,
ClientId = clientId,
ClientSecret = clientSecret,
TenantId = tenantId,
AllowedIpv4Addresses = new[]
{
"10.0.0.0/8",
"192.168.0.0/16",
},
AllowedIpv6Addresses = new[]
{
"2001:db8::/32",
},
AllowedPorts = new[]
{
443,
8443,
},
DisableStrictNetworking = false,
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.secrets.SyncAzureDestination;
import com.pulumi.vault.secrets.SyncAzureDestinationArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var azNetworking = new SyncAzureDestination("azNetworking", SyncAzureDestinationArgs.builder()
.name("az-dest-networking")
.keyVaultUri(keyVaultUri)
.clientId(clientId)
.clientSecret(clientSecret)
.tenantId(tenantId)
.allowedIpv4Addresses(
"10.0.0.0/8",
"192.168.0.0/16")
.allowedIpv6Addresses("2001:db8::/32")
.allowedPorts(
443,
8443)
.disableStrictNetworking(false)
.build());
}
}
resources:
azNetworking:
type: vault:secrets:SyncAzureDestination
name: az_networking
properties:
name: az-dest-networking
keyVaultUri: ${keyVaultUri}
clientId: ${clientId}
clientSecret: ${clientSecret}
tenantId: ${tenantId}
allowedIpv4Addresses:
- 10.0.0.0/8
- 192.168.0.0/16
allowedIpv6Addresses:
- 2001:db8::/32
allowedPorts:
- 443
- 8443
disableStrictNetworking: false
Using Workload Identity Federation (Vault 2.0.0+)
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const azWif = new vault.secrets.SyncAzureDestination("az_wif", {
name: "az-dest-wif",
keyVaultUri: keyVaultUri,
clientId: clientId,
tenantId: tenantId,
identityTokenAudience: identityTokenAudience,
identityTokenTtl: 3600,
identityTokenKey: "my-key",
granularity: "secret-path",
});
import pulumi
import pulumi_vault as vault
az_wif = vault.secrets.SyncAzureDestination("az_wif",
name="az-dest-wif",
key_vault_uri=key_vault_uri,
client_id=client_id,
tenant_id=tenant_id,
identity_token_audience=identity_token_audience,
identity_token_ttl=3600,
identity_token_key="my-key",
granularity="secret-path")
package main
import (
"github.com/pulumi/pulumi-vault/sdk/v7/go/vault/secrets"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := secrets.NewSyncAzureDestination(ctx, "az_wif", &secrets.SyncAzureDestinationArgs{
Name: pulumi.String("az-dest-wif"),
KeyVaultUri: pulumi.Any(keyVaultUri),
ClientId: pulumi.Any(clientId),
TenantId: pulumi.Any(tenantId),
IdentityTokenAudience: identityTokenAudience,
IdentityTokenTtl: pulumi.Int(3600),
IdentityTokenKey: "my-key",
Granularity: pulumi.String("secret-path"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() =>
{
var azWif = new Vault.Secrets.SyncAzureDestination("az_wif", new()
{
Name = "az-dest-wif",
KeyVaultUri = keyVaultUri,
ClientId = clientId,
TenantId = tenantId,
IdentityTokenAudience = identityTokenAudience,
IdentityTokenTtl = 3600,
IdentityTokenKey = "my-key",
Granularity = "secret-path",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.secrets.SyncAzureDestination;
import com.pulumi.vault.secrets.SyncAzureDestinationArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var azWif = new SyncAzureDestination("azWif", SyncAzureDestinationArgs.builder()
.name("az-dest-wif")
.keyVaultUri(keyVaultUri)
.clientId(clientId)
.tenantId(tenantId)
.identityTokenAudience(identityTokenAudience)
.identityTokenTtl(3600)
.identityTokenKey("my-key")
.granularity("secret-path")
.build());
}
}
resources:
azWif:
type: vault:secrets:SyncAzureDestination
name: az_wif
properties:
name: az-dest-wif
keyVaultUri: ${keyVaultUri}
clientId: ${clientId}
tenantId: ${tenantId}
identityTokenAudience: ${identityTokenAudience}
identityTokenTtl: 3600
identityTokenKey: my-key
granularity: secret-path
Create SyncAzureDestination Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SyncAzureDestination(name: string, args?: SyncAzureDestinationArgs, opts?: CustomResourceOptions);@overload
def SyncAzureDestination(resource_name: str,
args: Optional[SyncAzureDestinationArgs] = None,
opts: Optional[ResourceOptions] = None)
@overload
def SyncAzureDestination(resource_name: str,
opts: Optional[ResourceOptions] = None,
allowed_ipv4_addresses: Optional[Sequence[str]] = None,
allowed_ipv6_addresses: Optional[Sequence[str]] = None,
allowed_ports: Optional[Sequence[int]] = None,
client_id: Optional[str] = None,
client_secret: Optional[str] = None,
cloud: Optional[str] = None,
custom_tags: Optional[Mapping[str, str]] = None,
disable_strict_networking: Optional[bool] = None,
granularity: Optional[str] = None,
identity_token_audience_wo: Optional[str] = None,
identity_token_audience_wo_version: Optional[int] = None,
identity_token_key_wo: Optional[str] = None,
identity_token_key_wo_version: Optional[int] = None,
identity_token_ttl: Optional[int] = None,
key_vault_uri: Optional[str] = None,
name: Optional[str] = None,
namespace: Optional[str] = None,
secret_name_template: Optional[str] = None,
tenant_id: Optional[str] = None)func NewSyncAzureDestination(ctx *Context, name string, args *SyncAzureDestinationArgs, opts ...ResourceOption) (*SyncAzureDestination, error)public SyncAzureDestination(string name, SyncAzureDestinationArgs? args = null, CustomResourceOptions? opts = null)
public SyncAzureDestination(String name, SyncAzureDestinationArgs args)
public SyncAzureDestination(String name, SyncAzureDestinationArgs args, CustomResourceOptions options)
type: vault:secrets:SyncAzureDestination
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SyncAzureDestinationArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SyncAzureDestinationArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SyncAzureDestinationArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SyncAzureDestinationArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SyncAzureDestinationArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
SyncAzureDestination Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SyncAzureDestination resource accepts the following input properties:
- Allowed
Ipv4Addresses List<string> - Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
- Allowed
Ipv6Addresses List<string> - Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
- Allowed
Ports List<int> - Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
- Client
Id string - Client ID of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_IDenvironment variable. - Client
Secret string - Client Secret of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_SECRETenvironment variable. - Cloud string
- Specifies a cloud for the client. The default is Azure Public Cloud.
- Dictionary<string, string>
- Custom tags to set on the secret managed at the destination.
- Disable
Strict boolNetworking - If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
- Granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - Identity
Token stringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- Identity
Token stringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- Identity
Token intTtl - The TTL of generated tokens.
- Key
Vault stringUri - URI of an existing Azure Key Vault instance.
Can be omitted and directly provided to Vault using the
KEY_VAULT_URIenvironment variable. - Name string
- Unique name of the Azure destination.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - Secret
Name stringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- Tenant
Id string - ID of the target Azure tenant.
Can be omitted and directly provided to Vault using the
AZURE_TENANT_IDenvironment variable.
- Allowed
Ipv4Addresses []string - Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
- Allowed
Ipv6Addresses []string - Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
- Allowed
Ports []int - Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
- Client
Id string - Client ID of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_IDenvironment variable. - Client
Secret string - Client Secret of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_SECRETenvironment variable. - Cloud string
- Specifies a cloud for the client. The default is Azure Public Cloud.
- map[string]string
- Custom tags to set on the secret managed at the destination.
- Disable
Strict boolNetworking - If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
- Granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - Identity
Token stringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- Identity
Token stringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- Identity
Token intTtl - The TTL of generated tokens.
- Key
Vault stringUri - URI of an existing Azure Key Vault instance.
Can be omitted and directly provided to Vault using the
KEY_VAULT_URIenvironment variable. - Name string
- Unique name of the Azure destination.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - Secret
Name stringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- Tenant
Id string - ID of the target Azure tenant.
Can be omitted and directly provided to Vault using the
AZURE_TENANT_IDenvironment variable.
- allowed
Ipv4Addresses List<String> - Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
- allowed
Ipv6Addresses List<String> - Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
- allowed
Ports List<Integer> - Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
- client
Id String - Client ID of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_IDenvironment variable. - client
Secret String - Client Secret of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_SECRETenvironment variable. - cloud String
- Specifies a cloud for the client. The default is Azure Public Cloud.
- Map<String,String>
- Custom tags to set on the secret managed at the destination.
- disable
Strict BooleanNetworking - If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
- granularity String
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity
Token StringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token IntegerAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity
Token StringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token IntegerKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity
Token IntegerTtl - The TTL of generated tokens.
- key
Vault StringUri - URI of an existing Azure Key Vault instance.
Can be omitted and directly provided to Vault using the
KEY_VAULT_URIenvironment variable. - name String
- Unique name of the Azure destination.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - secret
Name StringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- tenant
Id String - ID of the target Azure tenant.
Can be omitted and directly provided to Vault using the
AZURE_TENANT_IDenvironment variable.
- allowed
Ipv4Addresses string[] - Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
- allowed
Ipv6Addresses string[] - Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
- allowed
Ports number[] - Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
- client
Id string - Client ID of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_IDenvironment variable. - client
Secret string - Client Secret of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_SECRETenvironment variable. - cloud string
- Specifies a cloud for the client. The default is Azure Public Cloud.
- {[key: string]: string}
- Custom tags to set on the secret managed at the destination.
- disable
Strict booleanNetworking - If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
- granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity
Token stringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token numberAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity
Token stringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token numberKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity
Token numberTtl - The TTL of generated tokens.
- key
Vault stringUri - URI of an existing Azure Key Vault instance.
Can be omitted and directly provided to Vault using the
KEY_VAULT_URIenvironment variable. - name string
- Unique name of the Azure destination.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - secret
Name stringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- tenant
Id string - ID of the target Azure tenant.
Can be omitted and directly provided to Vault using the
AZURE_TENANT_IDenvironment variable.
- allowed_
ipv4_ Sequence[str]addresses - Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
- allowed_
ipv6_ Sequence[str]addresses - Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
- allowed_
ports Sequence[int] - Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
- client_
id str - Client ID of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_IDenvironment variable. - client_
secret str - Client Secret of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_SECRETenvironment variable. - cloud str
- Specifies a cloud for the client. The default is Azure Public Cloud.
- Mapping[str, str]
- Custom tags to set on the secret managed at the destination.
- disable_
strict_ boolnetworking - If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
- granularity str
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity_
token_ straudience_ wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity_
token_ intaudience_ wo_ version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity_
token_ strkey_ wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity_
token_ intkey_ wo_ version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity_
token_ intttl - The TTL of generated tokens.
- key_
vault_ struri - URI of an existing Azure Key Vault instance.
Can be omitted and directly provided to Vault using the
KEY_VAULT_URIenvironment variable. - name str
- Unique name of the Azure destination.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - secret_
name_ strtemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- tenant_
id str - ID of the target Azure tenant.
Can be omitted and directly provided to Vault using the
AZURE_TENANT_IDenvironment variable.
- allowed
Ipv4Addresses List<String> - Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
- allowed
Ipv6Addresses List<String> - Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
- allowed
Ports List<Number> - Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
- client
Id String - Client ID of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_IDenvironment variable. - client
Secret String - Client Secret of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_SECRETenvironment variable. - cloud String
- Specifies a cloud for the client. The default is Azure Public Cloud.
- Map<String>
- Custom tags to set on the secret managed at the destination.
- disable
Strict BooleanNetworking - If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
- granularity String
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity
Token StringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token NumberAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity
Token StringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token NumberKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity
Token NumberTtl - The TTL of generated tokens.
- key
Vault StringUri - URI of an existing Azure Key Vault instance.
Can be omitted and directly provided to Vault using the
KEY_VAULT_URIenvironment variable. - name String
- Unique name of the Azure destination.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - secret
Name StringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- tenant
Id String - ID of the target Azure tenant.
Can be omitted and directly provided to Vault using the
AZURE_TENANT_IDenvironment variable.
Outputs
All input properties are implicitly available as output properties. Additionally, the SyncAzureDestination resource produces the following output properties:
Look up Existing SyncAzureDestination Resource
Get an existing SyncAzureDestination resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SyncAzureDestinationState, opts?: CustomResourceOptions): SyncAzureDestination@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
allowed_ipv4_addresses: Optional[Sequence[str]] = None,
allowed_ipv6_addresses: Optional[Sequence[str]] = None,
allowed_ports: Optional[Sequence[int]] = None,
client_id: Optional[str] = None,
client_secret: Optional[str] = None,
cloud: Optional[str] = None,
custom_tags: Optional[Mapping[str, str]] = None,
disable_strict_networking: Optional[bool] = None,
granularity: Optional[str] = None,
identity_token_audience_wo: Optional[str] = None,
identity_token_audience_wo_version: Optional[int] = None,
identity_token_key_wo: Optional[str] = None,
identity_token_key_wo_version: Optional[int] = None,
identity_token_ttl: Optional[int] = None,
key_vault_uri: Optional[str] = None,
name: Optional[str] = None,
namespace: Optional[str] = None,
secret_name_template: Optional[str] = None,
tenant_id: Optional[str] = None,
type: Optional[str] = None) -> SyncAzureDestinationfunc GetSyncAzureDestination(ctx *Context, name string, id IDInput, state *SyncAzureDestinationState, opts ...ResourceOption) (*SyncAzureDestination, error)public static SyncAzureDestination Get(string name, Input<string> id, SyncAzureDestinationState? state, CustomResourceOptions? opts = null)public static SyncAzureDestination get(String name, Output<String> id, SyncAzureDestinationState state, CustomResourceOptions options)resources: _: type: vault:secrets:SyncAzureDestination get: id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Allowed
Ipv4Addresses List<string> - Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
- Allowed
Ipv6Addresses List<string> - Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
- Allowed
Ports List<int> - Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
- Client
Id string - Client ID of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_IDenvironment variable. - Client
Secret string - Client Secret of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_SECRETenvironment variable. - Cloud string
- Specifies a cloud for the client. The default is Azure Public Cloud.
- Dictionary<string, string>
- Custom tags to set on the secret managed at the destination.
- Disable
Strict boolNetworking - If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
- Granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - Identity
Token stringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- Identity
Token stringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- Identity
Token intTtl - The TTL of generated tokens.
- Key
Vault stringUri - URI of an existing Azure Key Vault instance.
Can be omitted and directly provided to Vault using the
KEY_VAULT_URIenvironment variable. - Name string
- Unique name of the Azure destination.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - Secret
Name stringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- Tenant
Id string - ID of the target Azure tenant.
Can be omitted and directly provided to Vault using the
AZURE_TENANT_IDenvironment variable. - Type string
- The type of the secrets destination (
azure-kv).
- Allowed
Ipv4Addresses []string - Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
- Allowed
Ipv6Addresses []string - Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
- Allowed
Ports []int - Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
- Client
Id string - Client ID of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_IDenvironment variable. - Client
Secret string - Client Secret of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_SECRETenvironment variable. - Cloud string
- Specifies a cloud for the client. The default is Azure Public Cloud.
- map[string]string
- Custom tags to set on the secret managed at the destination.
- Disable
Strict boolNetworking - If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
- Granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - Identity
Token stringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- Identity
Token stringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- Identity
Token intKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- Identity
Token intTtl - The TTL of generated tokens.
- Key
Vault stringUri - URI of an existing Azure Key Vault instance.
Can be omitted and directly provided to Vault using the
KEY_VAULT_URIenvironment variable. - Name string
- Unique name of the Azure destination.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - Secret
Name stringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- Tenant
Id string - ID of the target Azure tenant.
Can be omitted and directly provided to Vault using the
AZURE_TENANT_IDenvironment variable. - Type string
- The type of the secrets destination (
azure-kv).
- allowed
Ipv4Addresses List<String> - Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
- allowed
Ipv6Addresses List<String> - Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
- allowed
Ports List<Integer> - Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
- client
Id String - Client ID of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_IDenvironment variable. - client
Secret String - Client Secret of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_SECRETenvironment variable. - cloud String
- Specifies a cloud for the client. The default is Azure Public Cloud.
- Map<String,String>
- Custom tags to set on the secret managed at the destination.
- disable
Strict BooleanNetworking - If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
- granularity String
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity
Token StringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token IntegerAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity
Token StringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token IntegerKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity
Token IntegerTtl - The TTL of generated tokens.
- key
Vault StringUri - URI of an existing Azure Key Vault instance.
Can be omitted and directly provided to Vault using the
KEY_VAULT_URIenvironment variable. - name String
- Unique name of the Azure destination.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - secret
Name StringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- tenant
Id String - ID of the target Azure tenant.
Can be omitted and directly provided to Vault using the
AZURE_TENANT_IDenvironment variable. - type String
- The type of the secrets destination (
azure-kv).
- allowed
Ipv4Addresses string[] - Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
- allowed
Ipv6Addresses string[] - Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
- allowed
Ports number[] - Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
- client
Id string - Client ID of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_IDenvironment variable. - client
Secret string - Client Secret of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_SECRETenvironment variable. - cloud string
- Specifies a cloud for the client. The default is Azure Public Cloud.
- {[key: string]: string}
- Custom tags to set on the secret managed at the destination.
- disable
Strict booleanNetworking - If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
- granularity string
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity
Token stringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token numberAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity
Token stringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token numberKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity
Token numberTtl - The TTL of generated tokens.
- key
Vault stringUri - URI of an existing Azure Key Vault instance.
Can be omitted and directly provided to Vault using the
KEY_VAULT_URIenvironment variable. - name string
- Unique name of the Azure destination.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - secret
Name stringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- tenant
Id string - ID of the target Azure tenant.
Can be omitted and directly provided to Vault using the
AZURE_TENANT_IDenvironment variable. - type string
- The type of the secrets destination (
azure-kv).
- allowed_
ipv4_ Sequence[str]addresses - Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
- allowed_
ipv6_ Sequence[str]addresses - Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
- allowed_
ports Sequence[int] - Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
- client_
id str - Client ID of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_IDenvironment variable. - client_
secret str - Client Secret of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_SECRETenvironment variable. - cloud str
- Specifies a cloud for the client. The default is Azure Public Cloud.
- Mapping[str, str]
- Custom tags to set on the secret managed at the destination.
- disable_
strict_ boolnetworking - If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
- granularity str
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity_
token_ straudience_ wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity_
token_ intaudience_ wo_ version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity_
token_ strkey_ wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity_
token_ intkey_ wo_ version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity_
token_ intttl - The TTL of generated tokens.
- key_
vault_ struri - URI of an existing Azure Key Vault instance.
Can be omitted and directly provided to Vault using the
KEY_VAULT_URIenvironment variable. - name str
- Unique name of the Azure destination.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - secret_
name_ strtemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- tenant_
id str - ID of the target Azure tenant.
Can be omitted and directly provided to Vault using the
AZURE_TENANT_IDenvironment variable. - type str
- The type of the secrets destination (
azure-kv).
- allowed
Ipv4Addresses List<String> - Set of allowed IPv4 addresses in CIDR notation (e.g., 192.168.1.1/32) for outbound connections from Vault to the destination. If not set, all IPv4 addresses are allowed. Requires Vault 1.19+.
- allowed
Ipv6Addresses List<String> - Set of allowed IPv6 addresses in CIDR notation (e.g., 2001:db8::1/128) for outbound connections from Vault to the destination. If not set, all IPv6 addresses are allowed. Requires Vault 1.19+.
- allowed
Ports List<Number> - Set of allowed ports for outbound connections from Vault to the destination. If not set, all ports are allowed. Requires Vault 1.19+.
- client
Id String - Client ID of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_IDenvironment variable. - client
Secret String - Client Secret of an Azure app registration.
Can be omitted and directly provided to Vault using the
AZURE_CLIENT_SECRETenvironment variable. - cloud String
- Specifies a cloud for the client. The default is Azure Public Cloud.
- Map<String>
- Custom tags to set on the secret managed at the destination.
- disable
Strict BooleanNetworking - If set to true, disables strict networking enforcement for this destination. When disabled, Vault will not enforce allowed IP addresses and ports. Requires Vault 1.19+.
- granularity String
- Determines what level of information is synced as a distinct resource
at the destination. Supports
secret-pathandsecret-key. - identity
Token StringAudience Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The audience claim value for identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token NumberAudience Wo Version - A version counter for the write-only identityTokenAudienceWo field. Incrementing this value will trigger an update.
- identity
Token StringKey Wo - NOTE: This field is write-only and its value will not be updated in state as part of read operations. The key to use for signing identity tokens. This is a write-only field and will not be read back from Vault.
- identity
Token NumberKey Wo Version - A version counter for the write-only identityTokenKeyWo field. Incrementing this value will trigger an update.
- identity
Token NumberTtl - The TTL of generated tokens.
- key
Vault StringUri - URI of an existing Azure Key Vault instance.
Can be omitted and directly provided to Vault using the
KEY_VAULT_URIenvironment variable. - name String
- Unique name of the Azure destination.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The
namespaceis always relative to the provider's configured namespace. - secret
Name StringTemplate - Template describing how to generate external secret names. Supports a subset of the Go Template syntax.
- tenant
Id String - ID of the target Azure tenant.
Can be omitted and directly provided to Vault using the
AZURE_TENANT_IDenvironment variable. - type String
- The type of the secrets destination (
azure-kv).
Import
Azure Secrets sync destinations can be imported using the name, e.g.
$ pulumi import vault:secrets/syncAzureDestination:SyncAzureDestination az az-dest
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
vaultTerraform Provider.
published on Tuesday, Mar 31, 2026 by Pulumi
