nomad.AclAuthMethod
Explore with Pulumi AI
Manages an ACL Auth Method in Nomad.
Example Usage
Creating an ALC Auth Method:
import * as pulumi from "@pulumi/pulumi";
import * as nomad from "@pulumi/nomad";
const myNomadAclAuthMethod = new nomad.AclAuthMethod("my_nomad_acl_auth_method", {
name: "my-nomad-acl-auth-method",
type: "OIDC",
tokenLocality: "global",
maxTokenTtl: "10m0s",
tokenNameFormat: `${auth_method_type}-${value.user}`,
"default": true,
config: {
oidcDiscoveryUrl: "https://uk.auth0.com/",
oidcClientId: "someclientid",
oidcClientSecret: "someclientsecret-t",
boundAudiences: ["someclientid"],
allowedRedirectUris: [
"http://localhost:4649/oidc/callback",
"http://localhost:4646/ui/settings/tokens",
],
listClaimMappings: {
"http://nomad.internal/roles": "roles",
},
},
});
import pulumi
import pulumi_nomad as nomad
my_nomad_acl_auth_method = nomad.AclAuthMethod("my_nomad_acl_auth_method",
name="my-nomad-acl-auth-method",
type="OIDC",
token_locality="global",
max_token_ttl="10m0s",
token_name_format="${auth_method_type}-${value.user}",
default=True,
config={
"oidc_discovery_url": "https://uk.auth0.com/",
"oidc_client_id": "someclientid",
"oidc_client_secret": "someclientsecret-t",
"bound_audiences": ["someclientid"],
"allowed_redirect_uris": [
"http://localhost:4649/oidc/callback",
"http://localhost:4646/ui/settings/tokens",
],
"list_claim_mappings": {
"http://nomad.internal/roles": "roles",
},
})
package main
import (
"fmt"
"github.com/pulumi/pulumi-nomad/sdk/v2/go/nomad"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := nomad.NewAclAuthMethod(ctx, "my_nomad_acl_auth_method", &nomad.AclAuthMethodArgs{
Name: pulumi.String("my-nomad-acl-auth-method"),
Type: pulumi.String("OIDC"),
TokenLocality: pulumi.String("global"),
MaxTokenTtl: pulumi.String("10m0s"),
TokenNameFormat: pulumi.Sprintf("${auth_method_type}-${value.user}"),
Default: pulumi.Bool(true),
Config: &nomad.AclAuthMethodConfigArgs{
OidcDiscoveryUrl: pulumi.String("https://uk.auth0.com/"),
OidcClientId: pulumi.String("someclientid"),
OidcClientSecret: pulumi.String("someclientsecret-t"),
BoundAudiences: pulumi.StringArray{
pulumi.String("someclientid"),
},
AllowedRedirectUris: pulumi.StringArray{
pulumi.String("http://localhost:4649/oidc/callback"),
pulumi.String("http://localhost:4646/ui/settings/tokens"),
},
ListClaimMappings: pulumi.StringMap{
"http://nomad.internal/roles": pulumi.String("roles"),
},
},
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Nomad = Pulumi.Nomad;
return await Deployment.RunAsync(() =>
{
var myNomadAclAuthMethod = new Nomad.AclAuthMethod("my_nomad_acl_auth_method", new()
{
Name = "my-nomad-acl-auth-method",
Type = "OIDC",
TokenLocality = "global",
MaxTokenTtl = "10m0s",
TokenNameFormat = "${auth_method_type}-${value.user}",
Default = true,
Config = new Nomad.Inputs.AclAuthMethodConfigArgs
{
OidcDiscoveryUrl = "https://uk.auth0.com/",
OidcClientId = "someclientid",
OidcClientSecret = "someclientsecret-t",
BoundAudiences = new[]
{
"someclientid",
},
AllowedRedirectUris = new[]
{
"http://localhost:4649/oidc/callback",
"http://localhost:4646/ui/settings/tokens",
},
ListClaimMappings =
{
{ "http://nomad.internal/roles", "roles" },
},
},
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.nomad.AclAuthMethod;
import com.pulumi.nomad.AclAuthMethodArgs;
import com.pulumi.nomad.inputs.AclAuthMethodConfigArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var myNomadAclAuthMethod = new AclAuthMethod("myNomadAclAuthMethod", AclAuthMethodArgs.builder()
.name("my-nomad-acl-auth-method")
.type("OIDC")
.tokenLocality("global")
.maxTokenTtl("10m0s")
.tokenNameFormat("${auth_method_type}-${value.user}")
.default_(true)
.config(AclAuthMethodConfigArgs.builder()
.oidcDiscoveryUrl("https://uk.auth0.com/")
.oidcClientId("someclientid")
.oidcClientSecret("someclientsecret-t")
.boundAudiences("someclientid")
.allowedRedirectUris(
"http://localhost:4649/oidc/callback",
"http://localhost:4646/ui/settings/tokens")
.listClaimMappings(Map.of("http://nomad.internal/roles", "roles"))
.build())
.build());
}
}
resources:
myNomadAclAuthMethod:
type: nomad:AclAuthMethod
name: my_nomad_acl_auth_method
properties:
name: my-nomad-acl-auth-method
type: OIDC
tokenLocality: global
maxTokenTtl: 10m0s
tokenNameFormat: $${auth_method_type}-$${value.user}
default: true
config:
oidcDiscoveryUrl: https://uk.auth0.com/
oidcClientId: someclientid
oidcClientSecret: someclientsecret-t
boundAudiences:
- someclientid
allowedRedirectUris:
- http://localhost:4649/oidc/callback
- http://localhost:4646/ui/settings/tokens
listClaimMappings:
http://nomad.internal/roles: roles
Create AclAuthMethod Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new AclAuthMethod(name: string, args: AclAuthMethodArgs, opts?: CustomResourceOptions);
@overload
def AclAuthMethod(resource_name: str,
args: AclAuthMethodArgs,
opts: Optional[ResourceOptions] = None)
@overload
def AclAuthMethod(resource_name: str,
opts: Optional[ResourceOptions] = None,
config: Optional[AclAuthMethodConfigArgs] = None,
max_token_ttl: Optional[str] = None,
token_locality: Optional[str] = None,
type: Optional[str] = None,
default: Optional[bool] = None,
name: Optional[str] = None,
token_name_format: Optional[str] = None)
func NewAclAuthMethod(ctx *Context, name string, args AclAuthMethodArgs, opts ...ResourceOption) (*AclAuthMethod, error)
public AclAuthMethod(string name, AclAuthMethodArgs args, CustomResourceOptions? opts = null)
public AclAuthMethod(String name, AclAuthMethodArgs args)
public AclAuthMethod(String name, AclAuthMethodArgs args, CustomResourceOptions options)
type: nomad:AclAuthMethod
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args AclAuthMethodArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args AclAuthMethodArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AclAuthMethodArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AclAuthMethodArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args AclAuthMethodArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var aclAuthMethodResource = new Nomad.AclAuthMethod("aclAuthMethodResource", new()
{
Config = new Nomad.Inputs.AclAuthMethodConfigArgs
{
AllowedRedirectUris = new[]
{
"string",
},
BoundAudiences = new[]
{
"string",
},
BoundIssuers = new[]
{
"string",
},
ClaimMappings =
{
{ "string", "string" },
},
ClockSkewLeeway = "string",
DiscoveryCaPems = new[]
{
"string",
},
ExpirationLeeway = "string",
JwksCaCert = "string",
JwksUrl = "string",
JwtValidationPubKeys = new[]
{
"string",
},
ListClaimMappings =
{
{ "string", "string" },
},
NotBeforeLeeway = "string",
OidcClientAssertion = new Nomad.Inputs.AclAuthMethodConfigOidcClientAssertionArgs
{
KeySource = "string",
Audiences = new[]
{
"string",
},
ExtraHeaders =
{
{ "string", "string" },
},
KeyAlgorithm = "string",
PrivateKey = new Nomad.Inputs.AclAuthMethodConfigOidcClientAssertionPrivateKeyArgs
{
KeyId = "string",
KeyIdHeader = "string",
PemCert = "string",
PemCertFile = "string",
PemKey = "string",
PemKeyFile = "string",
},
},
OidcClientId = "string",
OidcClientSecret = "string",
OidcDisableUserinfo = false,
OidcDiscoveryUrl = "string",
OidcEnablePkce = false,
OidcScopes = new[]
{
"string",
},
SigningAlgs = new[]
{
"string",
},
VerboseLogging = false,
},
MaxTokenTtl = "string",
TokenLocality = "string",
Type = "string",
Default = false,
Name = "string",
TokenNameFormat = "string",
});
example, err := nomad.NewAclAuthMethod(ctx, "aclAuthMethodResource", &nomad.AclAuthMethodArgs{
Config: &nomad.AclAuthMethodConfigArgs{
AllowedRedirectUris: pulumi.StringArray{
pulumi.String("string"),
},
BoundAudiences: pulumi.StringArray{
pulumi.String("string"),
},
BoundIssuers: pulumi.StringArray{
pulumi.String("string"),
},
ClaimMappings: pulumi.StringMap{
"string": pulumi.String("string"),
},
ClockSkewLeeway: pulumi.String("string"),
DiscoveryCaPems: pulumi.StringArray{
pulumi.String("string"),
},
ExpirationLeeway: pulumi.String("string"),
JwksCaCert: pulumi.String("string"),
JwksUrl: pulumi.String("string"),
JwtValidationPubKeys: pulumi.StringArray{
pulumi.String("string"),
},
ListClaimMappings: pulumi.StringMap{
"string": pulumi.String("string"),
},
NotBeforeLeeway: pulumi.String("string"),
OidcClientAssertion: &nomad.AclAuthMethodConfigOidcClientAssertionArgs{
KeySource: pulumi.String("string"),
Audiences: pulumi.StringArray{
pulumi.String("string"),
},
ExtraHeaders: pulumi.StringMap{
"string": pulumi.String("string"),
},
KeyAlgorithm: pulumi.String("string"),
PrivateKey: &nomad.AclAuthMethodConfigOidcClientAssertionPrivateKeyArgs{
KeyId: pulumi.String("string"),
KeyIdHeader: pulumi.String("string"),
PemCert: pulumi.String("string"),
PemCertFile: pulumi.String("string"),
PemKey: pulumi.String("string"),
PemKeyFile: pulumi.String("string"),
},
},
OidcClientId: pulumi.String("string"),
OidcClientSecret: pulumi.String("string"),
OidcDisableUserinfo: pulumi.Bool(false),
OidcDiscoveryUrl: pulumi.String("string"),
OidcEnablePkce: pulumi.Bool(false),
OidcScopes: pulumi.StringArray{
pulumi.String("string"),
},
SigningAlgs: pulumi.StringArray{
pulumi.String("string"),
},
VerboseLogging: pulumi.Bool(false),
},
MaxTokenTtl: pulumi.String("string"),
TokenLocality: pulumi.String("string"),
Type: pulumi.String("string"),
Default: pulumi.Bool(false),
Name: pulumi.String("string"),
TokenNameFormat: pulumi.String("string"),
})
var aclAuthMethodResource = new AclAuthMethod("aclAuthMethodResource", AclAuthMethodArgs.builder()
.config(AclAuthMethodConfigArgs.builder()
.allowedRedirectUris("string")
.boundAudiences("string")
.boundIssuers("string")
.claimMappings(Map.of("string", "string"))
.clockSkewLeeway("string")
.discoveryCaPems("string")
.expirationLeeway("string")
.jwksCaCert("string")
.jwksUrl("string")
.jwtValidationPubKeys("string")
.listClaimMappings(Map.of("string", "string"))
.notBeforeLeeway("string")
.oidcClientAssertion(AclAuthMethodConfigOidcClientAssertionArgs.builder()
.keySource("string")
.audiences("string")
.extraHeaders(Map.of("string", "string"))
.keyAlgorithm("string")
.privateKey(AclAuthMethodConfigOidcClientAssertionPrivateKeyArgs.builder()
.keyId("string")
.keyIdHeader("string")
.pemCert("string")
.pemCertFile("string")
.pemKey("string")
.pemKeyFile("string")
.build())
.build())
.oidcClientId("string")
.oidcClientSecret("string")
.oidcDisableUserinfo(false)
.oidcDiscoveryUrl("string")
.oidcEnablePkce(false)
.oidcScopes("string")
.signingAlgs("string")
.verboseLogging(false)
.build())
.maxTokenTtl("string")
.tokenLocality("string")
.type("string")
.default_(false)
.name("string")
.tokenNameFormat("string")
.build());
acl_auth_method_resource = nomad.AclAuthMethod("aclAuthMethodResource",
config={
"allowed_redirect_uris": ["string"],
"bound_audiences": ["string"],
"bound_issuers": ["string"],
"claim_mappings": {
"string": "string",
},
"clock_skew_leeway": "string",
"discovery_ca_pems": ["string"],
"expiration_leeway": "string",
"jwks_ca_cert": "string",
"jwks_url": "string",
"jwt_validation_pub_keys": ["string"],
"list_claim_mappings": {
"string": "string",
},
"not_before_leeway": "string",
"oidc_client_assertion": {
"key_source": "string",
"audiences": ["string"],
"extra_headers": {
"string": "string",
},
"key_algorithm": "string",
"private_key": {
"key_id": "string",
"key_id_header": "string",
"pem_cert": "string",
"pem_cert_file": "string",
"pem_key": "string",
"pem_key_file": "string",
},
},
"oidc_client_id": "string",
"oidc_client_secret": "string",
"oidc_disable_userinfo": False,
"oidc_discovery_url": "string",
"oidc_enable_pkce": False,
"oidc_scopes": ["string"],
"signing_algs": ["string"],
"verbose_logging": False,
},
max_token_ttl="string",
token_locality="string",
type="string",
default=False,
name="string",
token_name_format="string")
const aclAuthMethodResource = new nomad.AclAuthMethod("aclAuthMethodResource", {
config: {
allowedRedirectUris: ["string"],
boundAudiences: ["string"],
boundIssuers: ["string"],
claimMappings: {
string: "string",
},
clockSkewLeeway: "string",
discoveryCaPems: ["string"],
expirationLeeway: "string",
jwksCaCert: "string",
jwksUrl: "string",
jwtValidationPubKeys: ["string"],
listClaimMappings: {
string: "string",
},
notBeforeLeeway: "string",
oidcClientAssertion: {
keySource: "string",
audiences: ["string"],
extraHeaders: {
string: "string",
},
keyAlgorithm: "string",
privateKey: {
keyId: "string",
keyIdHeader: "string",
pemCert: "string",
pemCertFile: "string",
pemKey: "string",
pemKeyFile: "string",
},
},
oidcClientId: "string",
oidcClientSecret: "string",
oidcDisableUserinfo: false,
oidcDiscoveryUrl: "string",
oidcEnablePkce: false,
oidcScopes: ["string"],
signingAlgs: ["string"],
verboseLogging: false,
},
maxTokenTtl: "string",
tokenLocality: "string",
type: "string",
"default": false,
name: "string",
tokenNameFormat: "string",
});
type: nomad:AclAuthMethod
properties:
config:
allowedRedirectUris:
- string
boundAudiences:
- string
boundIssuers:
- string
claimMappings:
string: string
clockSkewLeeway: string
discoveryCaPems:
- string
expirationLeeway: string
jwksCaCert: string
jwksUrl: string
jwtValidationPubKeys:
- string
listClaimMappings:
string: string
notBeforeLeeway: string
oidcClientAssertion:
audiences:
- string
extraHeaders:
string: string
keyAlgorithm: string
keySource: string
privateKey:
keyId: string
keyIdHeader: string
pemCert: string
pemCertFile: string
pemKey: string
pemKeyFile: string
oidcClientId: string
oidcClientSecret: string
oidcDisableUserinfo: false
oidcDiscoveryUrl: string
oidcEnablePkce: false
oidcScopes:
- string
signingAlgs:
- string
verboseLogging: false
default: false
maxTokenTtl: string
name: string
tokenLocality: string
tokenNameFormat: string
type: string
AclAuthMethod Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The AclAuthMethod resource accepts the following input properties:
- Config
Acl
Auth Method Config (block: <required>)
- Configuration specific to the auth method provider.- Max
Token stringTtl (string: <required>)
- Defines the maximum life of a token created by this method and is specified as a time duration such as "15h".- Token
Locality string (string: <required>)
- Defines whether the ACL Auth Method creates a local or global token when performing SSO login. This field must be set to eitherlocal
orglobal
.- Type string
(string: <required>)
- ACL Auth Method SSO workflow type. Valid values, areOIDC
andJWT
.- Default bool
(bool: false)
- Defines whether this ACL Auth Method is to be set as default.- Name string
(string: <required>)
- The identifier of the ACL Auth Method.- Token
Name stringFormat (string: "${auth_method_type}-${auth_method_name}")
- Defines the token name format for the generated tokens This can be lightly templated using HIL '${foo}' syntax.
- Config
Acl
Auth Method Config Args (block: <required>)
- Configuration specific to the auth method provider.- Max
Token stringTtl (string: <required>)
- Defines the maximum life of a token created by this method and is specified as a time duration such as "15h".- Token
Locality string (string: <required>)
- Defines whether the ACL Auth Method creates a local or global token when performing SSO login. This field must be set to eitherlocal
orglobal
.- Type string
(string: <required>)
- ACL Auth Method SSO workflow type. Valid values, areOIDC
andJWT
.- Default bool
(bool: false)
- Defines whether this ACL Auth Method is to be set as default.- Name string
(string: <required>)
- The identifier of the ACL Auth Method.- Token
Name stringFormat (string: "${auth_method_type}-${auth_method_name}")
- Defines the token name format for the generated tokens This can be lightly templated using HIL '${foo}' syntax.
- config
Acl
Auth Method Config (block: <required>)
- Configuration specific to the auth method provider.- max
Token StringTtl (string: <required>)
- Defines the maximum life of a token created by this method and is specified as a time duration such as "15h".- token
Locality String (string: <required>)
- Defines whether the ACL Auth Method creates a local or global token when performing SSO login. This field must be set to eitherlocal
orglobal
.- type String
(string: <required>)
- ACL Auth Method SSO workflow type. Valid values, areOIDC
andJWT
.- default_ Boolean
(bool: false)
- Defines whether this ACL Auth Method is to be set as default.- name String
(string: <required>)
- The identifier of the ACL Auth Method.- token
Name StringFormat (string: "${auth_method_type}-${auth_method_name}")
- Defines the token name format for the generated tokens This can be lightly templated using HIL '${foo}' syntax.
- config
Acl
Auth Method Config (block: <required>)
- Configuration specific to the auth method provider.- max
Token stringTtl (string: <required>)
- Defines the maximum life of a token created by this method and is specified as a time duration such as "15h".- token
Locality string (string: <required>)
- Defines whether the ACL Auth Method creates a local or global token when performing SSO login. This field must be set to eitherlocal
orglobal
.- type string
(string: <required>)
- ACL Auth Method SSO workflow type. Valid values, areOIDC
andJWT
.- default boolean
(bool: false)
- Defines whether this ACL Auth Method is to be set as default.- name string
(string: <required>)
- The identifier of the ACL Auth Method.- token
Name stringFormat (string: "${auth_method_type}-${auth_method_name}")
- Defines the token name format for the generated tokens This can be lightly templated using HIL '${foo}' syntax.
- config
Acl
Auth Method Config Args (block: <required>)
- Configuration specific to the auth method provider.- max_
token_ strttl (string: <required>)
- Defines the maximum life of a token created by this method and is specified as a time duration such as "15h".- token_
locality str (string: <required>)
- Defines whether the ACL Auth Method creates a local or global token when performing SSO login. This field must be set to eitherlocal
orglobal
.- type str
(string: <required>)
- ACL Auth Method SSO workflow type. Valid values, areOIDC
andJWT
.- default bool
(bool: false)
- Defines whether this ACL Auth Method is to be set as default.- name str
(string: <required>)
- The identifier of the ACL Auth Method.- token_
name_ strformat (string: "${auth_method_type}-${auth_method_name}")
- Defines the token name format for the generated tokens This can be lightly templated using HIL '${foo}' syntax.
- config Property Map
(block: <required>)
- Configuration specific to the auth method provider.- max
Token StringTtl (string: <required>)
- Defines the maximum life of a token created by this method and is specified as a time duration such as "15h".- token
Locality String (string: <required>)
- Defines whether the ACL Auth Method creates a local or global token when performing SSO login. This field must be set to eitherlocal
orglobal
.- type String
(string: <required>)
- ACL Auth Method SSO workflow type. Valid values, areOIDC
andJWT
.- default Boolean
(bool: false)
- Defines whether this ACL Auth Method is to be set as default.- name String
(string: <required>)
- The identifier of the ACL Auth Method.- token
Name StringFormat (string: "${auth_method_type}-${auth_method_name}")
- Defines the token name format for the generated tokens This can be lightly templated using HIL '${foo}' syntax.
Outputs
All input properties are implicitly available as output properties. Additionally, the AclAuthMethod resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing AclAuthMethod Resource
Get an existing AclAuthMethod resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AclAuthMethodState, opts?: CustomResourceOptions): AclAuthMethod
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
config: Optional[AclAuthMethodConfigArgs] = None,
default: Optional[bool] = None,
max_token_ttl: Optional[str] = None,
name: Optional[str] = None,
token_locality: Optional[str] = None,
token_name_format: Optional[str] = None,
type: Optional[str] = None) -> AclAuthMethod
func GetAclAuthMethod(ctx *Context, name string, id IDInput, state *AclAuthMethodState, opts ...ResourceOption) (*AclAuthMethod, error)
public static AclAuthMethod Get(string name, Input<string> id, AclAuthMethodState? state, CustomResourceOptions? opts = null)
public static AclAuthMethod get(String name, Output<String> id, AclAuthMethodState state, CustomResourceOptions options)
resources: _: type: nomad:AclAuthMethod get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Config
Acl
Auth Method Config (block: <required>)
- Configuration specific to the auth method provider.- Default bool
(bool: false)
- Defines whether this ACL Auth Method is to be set as default.- Max
Token stringTtl (string: <required>)
- Defines the maximum life of a token created by this method and is specified as a time duration such as "15h".- Name string
(string: <required>)
- The identifier of the ACL Auth Method.- Token
Locality string (string: <required>)
- Defines whether the ACL Auth Method creates a local or global token when performing SSO login. This field must be set to eitherlocal
orglobal
.- Token
Name stringFormat (string: "${auth_method_type}-${auth_method_name}")
- Defines the token name format for the generated tokens This can be lightly templated using HIL '${foo}' syntax.- Type string
(string: <required>)
- ACL Auth Method SSO workflow type. Valid values, areOIDC
andJWT
.
- Config
Acl
Auth Method Config Args (block: <required>)
- Configuration specific to the auth method provider.- Default bool
(bool: false)
- Defines whether this ACL Auth Method is to be set as default.- Max
Token stringTtl (string: <required>)
- Defines the maximum life of a token created by this method and is specified as a time duration such as "15h".- Name string
(string: <required>)
- The identifier of the ACL Auth Method.- Token
Locality string (string: <required>)
- Defines whether the ACL Auth Method creates a local or global token when performing SSO login. This field must be set to eitherlocal
orglobal
.- Token
Name stringFormat (string: "${auth_method_type}-${auth_method_name}")
- Defines the token name format for the generated tokens This can be lightly templated using HIL '${foo}' syntax.- Type string
(string: <required>)
- ACL Auth Method SSO workflow type. Valid values, areOIDC
andJWT
.
- config
Acl
Auth Method Config (block: <required>)
- Configuration specific to the auth method provider.- default_ Boolean
(bool: false)
- Defines whether this ACL Auth Method is to be set as default.- max
Token StringTtl (string: <required>)
- Defines the maximum life of a token created by this method and is specified as a time duration such as "15h".- name String
(string: <required>)
- The identifier of the ACL Auth Method.- token
Locality String (string: <required>)
- Defines whether the ACL Auth Method creates a local or global token when performing SSO login. This field must be set to eitherlocal
orglobal
.- token
Name StringFormat (string: "${auth_method_type}-${auth_method_name}")
- Defines the token name format for the generated tokens This can be lightly templated using HIL '${foo}' syntax.- type String
(string: <required>)
- ACL Auth Method SSO workflow type. Valid values, areOIDC
andJWT
.
- config
Acl
Auth Method Config (block: <required>)
- Configuration specific to the auth method provider.- default boolean
(bool: false)
- Defines whether this ACL Auth Method is to be set as default.- max
Token stringTtl (string: <required>)
- Defines the maximum life of a token created by this method and is specified as a time duration such as "15h".- name string
(string: <required>)
- The identifier of the ACL Auth Method.- token
Locality string (string: <required>)
- Defines whether the ACL Auth Method creates a local or global token when performing SSO login. This field must be set to eitherlocal
orglobal
.- token
Name stringFormat (string: "${auth_method_type}-${auth_method_name}")
- Defines the token name format for the generated tokens This can be lightly templated using HIL '${foo}' syntax.- type string
(string: <required>)
- ACL Auth Method SSO workflow type. Valid values, areOIDC
andJWT
.
- config
Acl
Auth Method Config Args (block: <required>)
- Configuration specific to the auth method provider.- default bool
(bool: false)
- Defines whether this ACL Auth Method is to be set as default.- max_
token_ strttl (string: <required>)
- Defines the maximum life of a token created by this method and is specified as a time duration such as "15h".- name str
(string: <required>)
- The identifier of the ACL Auth Method.- token_
locality str (string: <required>)
- Defines whether the ACL Auth Method creates a local or global token when performing SSO login. This field must be set to eitherlocal
orglobal
.- token_
name_ strformat (string: "${auth_method_type}-${auth_method_name}")
- Defines the token name format for the generated tokens This can be lightly templated using HIL '${foo}' syntax.- type str
(string: <required>)
- ACL Auth Method SSO workflow type. Valid values, areOIDC
andJWT
.
- config Property Map
(block: <required>)
- Configuration specific to the auth method provider.- default Boolean
(bool: false)
- Defines whether this ACL Auth Method is to be set as default.- max
Token StringTtl (string: <required>)
- Defines the maximum life of a token created by this method and is specified as a time duration such as "15h".- name String
(string: <required>)
- The identifier of the ACL Auth Method.- token
Locality String (string: <required>)
- Defines whether the ACL Auth Method creates a local or global token when performing SSO login. This field must be set to eitherlocal
orglobal
.- token
Name StringFormat (string: "${auth_method_type}-${auth_method_name}")
- Defines the token name format for the generated tokens This can be lightly templated using HIL '${foo}' syntax.- type String
(string: <required>)
- ACL Auth Method SSO workflow type. Valid values, areOIDC
andJWT
.
Supporting Types
AclAuthMethodConfig, AclAuthMethodConfigArgs
- Allowed
Redirect List<string>Uris ([]string: <optional>)
- A list of allowed values that can be used for the redirect URI.- Bound
Audiences List<string> ([]string: <optional>)
- List of auth claims that are valid for login.- Bound
Issuers List<string> ([]string: <optional>)
- The value against which to match the iss claim in a JWT.- Claim
Mappings Dictionary<string, string> - Mappings of claims (key) that will be copied to a metadata field (value).
- Clock
Skew stringLeeway (string: <optional>)
- Duration of leeway when validating all claims in the form of a time duration such as "5m" or "1h".- Discovery
Ca List<string>Pems ([]string: <optional>)
- PEM encoded CA certs for use by the TLS client used to talk with the OIDC Discovery URL.- Expiration
Leeway string (string: <optional>)
- Duration of leeway when validating expiration of a JWT in the form of a time duration such as "5m" or "1h".- Jwks
Ca stringCert (string: <optional>)
- PEM encoded CA cert for use by the TLS client used to talk with the JWKS server.- Jwks
Url string (string: <optional>)
- JSON Web Key Sets url for authenticating signatures.- Jwt
Validation List<string>Pub Keys ([]string: <optional>)
- List of PEM-encoded public keys to use to authenticate signatures locally.- List
Claim Dictionary<string, string>Mappings - Mappings of list claims (key) that will be copied to a metadata field (value).
- Not
Before stringLeeway (string: <optional>)
- Duration of leeway when validating not before values of a token in the form of a time duration such as "5m" or "1h".- Oidc
Client AclAssertion Auth Method Config Oidc Client Assertion (OIDCClientAssertion: <optional>)
- Optionally send a signed JWT ("[private key jwt][]") as a client assertion to the OIDC provider. Browse to the [OIDC concepts][concepts-assertions] page to learn more.- Oidc
Client stringId (string: <optional>)
- The OAuth Client ID configured with the OIDC provider.- Oidc
Client stringSecret (string: <optional>)
- The OAuth Client Secret configured with the OIDC provider.- Oidc
Disable boolUserinfo (bool: false)
- When set totrue
, Nomad will not make a request to the identity provider to get OIDCUserInfo
. You may wish to set this if your identity provider doesn't send any additional claims from theUserInfo
endpoint.- Oidc
Discovery stringUrl (string: <optional>)
- The OIDC Discovery URL, without any .well-known component (base path).- Oidc
Enable boolPkce (bool: false)
- When set totrue
, Nomad will include [PKCE][] verification in the auth flow. Even with PKCE enabled in Nomad, you may still need to enable it in your OIDC provider.- Oidc
Scopes List<string> ([]string: <optional>)
- List of OIDC scopes.- Signing
Algs List<string> ([]string: <optional>)
- A list of supported signing algorithms.- Verbose
Logging bool - Enable OIDC verbose logging on the Nomad server.
- Allowed
Redirect []stringUris ([]string: <optional>)
- A list of allowed values that can be used for the redirect URI.- Bound
Audiences []string ([]string: <optional>)
- List of auth claims that are valid for login.- Bound
Issuers []string ([]string: <optional>)
- The value against which to match the iss claim in a JWT.- Claim
Mappings map[string]string - Mappings of claims (key) that will be copied to a metadata field (value).
- Clock
Skew stringLeeway (string: <optional>)
- Duration of leeway when validating all claims in the form of a time duration such as "5m" or "1h".- Discovery
Ca []stringPems ([]string: <optional>)
- PEM encoded CA certs for use by the TLS client used to talk with the OIDC Discovery URL.- Expiration
Leeway string (string: <optional>)
- Duration of leeway when validating expiration of a JWT in the form of a time duration such as "5m" or "1h".- Jwks
Ca stringCert (string: <optional>)
- PEM encoded CA cert for use by the TLS client used to talk with the JWKS server.- Jwks
Url string (string: <optional>)
- JSON Web Key Sets url for authenticating signatures.- Jwt
Validation []stringPub Keys ([]string: <optional>)
- List of PEM-encoded public keys to use to authenticate signatures locally.- List
Claim map[string]stringMappings - Mappings of list claims (key) that will be copied to a metadata field (value).
- Not
Before stringLeeway (string: <optional>)
- Duration of leeway when validating not before values of a token in the form of a time duration such as "5m" or "1h".- Oidc
Client AclAssertion Auth Method Config Oidc Client Assertion (OIDCClientAssertion: <optional>)
- Optionally send a signed JWT ("[private key jwt][]") as a client assertion to the OIDC provider. Browse to the [OIDC concepts][concepts-assertions] page to learn more.- Oidc
Client stringId (string: <optional>)
- The OAuth Client ID configured with the OIDC provider.- Oidc
Client stringSecret (string: <optional>)
- The OAuth Client Secret configured with the OIDC provider.- Oidc
Disable boolUserinfo (bool: false)
- When set totrue
, Nomad will not make a request to the identity provider to get OIDCUserInfo
. You may wish to set this if your identity provider doesn't send any additional claims from theUserInfo
endpoint.- Oidc
Discovery stringUrl (string: <optional>)
- The OIDC Discovery URL, without any .well-known component (base path).- Oidc
Enable boolPkce (bool: false)
- When set totrue
, Nomad will include [PKCE][] verification in the auth flow. Even with PKCE enabled in Nomad, you may still need to enable it in your OIDC provider.- Oidc
Scopes []string ([]string: <optional>)
- List of OIDC scopes.- Signing
Algs []string ([]string: <optional>)
- A list of supported signing algorithms.- Verbose
Logging bool - Enable OIDC verbose logging on the Nomad server.
- allowed
Redirect List<String>Uris ([]string: <optional>)
- A list of allowed values that can be used for the redirect URI.- bound
Audiences List<String> ([]string: <optional>)
- List of auth claims that are valid for login.- bound
Issuers List<String> ([]string: <optional>)
- The value against which to match the iss claim in a JWT.- claim
Mappings Map<String,String> - Mappings of claims (key) that will be copied to a metadata field (value).
- clock
Skew StringLeeway (string: <optional>)
- Duration of leeway when validating all claims in the form of a time duration such as "5m" or "1h".- discovery
Ca List<String>Pems ([]string: <optional>)
- PEM encoded CA certs for use by the TLS client used to talk with the OIDC Discovery URL.- expiration
Leeway String (string: <optional>)
- Duration of leeway when validating expiration of a JWT in the form of a time duration such as "5m" or "1h".- jwks
Ca StringCert (string: <optional>)
- PEM encoded CA cert for use by the TLS client used to talk with the JWKS server.- jwks
Url String (string: <optional>)
- JSON Web Key Sets url for authenticating signatures.- jwt
Validation List<String>Pub Keys ([]string: <optional>)
- List of PEM-encoded public keys to use to authenticate signatures locally.- list
Claim Map<String,String>Mappings - Mappings of list claims (key) that will be copied to a metadata field (value).
- not
Before StringLeeway (string: <optional>)
- Duration of leeway when validating not before values of a token in the form of a time duration such as "5m" or "1h".- oidc
Client AclAssertion Auth Method Config Oidc Client Assertion (OIDCClientAssertion: <optional>)
- Optionally send a signed JWT ("[private key jwt][]") as a client assertion to the OIDC provider. Browse to the [OIDC concepts][concepts-assertions] page to learn more.- oidc
Client StringId (string: <optional>)
- The OAuth Client ID configured with the OIDC provider.- oidc
Client StringSecret (string: <optional>)
- The OAuth Client Secret configured with the OIDC provider.- oidc
Disable BooleanUserinfo (bool: false)
- When set totrue
, Nomad will not make a request to the identity provider to get OIDCUserInfo
. You may wish to set this if your identity provider doesn't send any additional claims from theUserInfo
endpoint.- oidc
Discovery StringUrl (string: <optional>)
- The OIDC Discovery URL, without any .well-known component (base path).- oidc
Enable BooleanPkce (bool: false)
- When set totrue
, Nomad will include [PKCE][] verification in the auth flow. Even with PKCE enabled in Nomad, you may still need to enable it in your OIDC provider.- oidc
Scopes List<String> ([]string: <optional>)
- List of OIDC scopes.- signing
Algs List<String> ([]string: <optional>)
- A list of supported signing algorithms.- verbose
Logging Boolean - Enable OIDC verbose logging on the Nomad server.
- allowed
Redirect string[]Uris ([]string: <optional>)
- A list of allowed values that can be used for the redirect URI.- bound
Audiences string[] ([]string: <optional>)
- List of auth claims that are valid for login.- bound
Issuers string[] ([]string: <optional>)
- The value against which to match the iss claim in a JWT.- claim
Mappings {[key: string]: string} - Mappings of claims (key) that will be copied to a metadata field (value).
- clock
Skew stringLeeway (string: <optional>)
- Duration of leeway when validating all claims in the form of a time duration such as "5m" or "1h".- discovery
Ca string[]Pems ([]string: <optional>)
- PEM encoded CA certs for use by the TLS client used to talk with the OIDC Discovery URL.- expiration
Leeway string (string: <optional>)
- Duration of leeway when validating expiration of a JWT in the form of a time duration such as "5m" or "1h".- jwks
Ca stringCert (string: <optional>)
- PEM encoded CA cert for use by the TLS client used to talk with the JWKS server.- jwks
Url string (string: <optional>)
- JSON Web Key Sets url for authenticating signatures.- jwt
Validation string[]Pub Keys ([]string: <optional>)
- List of PEM-encoded public keys to use to authenticate signatures locally.- list
Claim {[key: string]: string}Mappings - Mappings of list claims (key) that will be copied to a metadata field (value).
- not
Before stringLeeway (string: <optional>)
- Duration of leeway when validating not before values of a token in the form of a time duration such as "5m" or "1h".- oidc
Client AclAssertion Auth Method Config Oidc Client Assertion (OIDCClientAssertion: <optional>)
- Optionally send a signed JWT ("[private key jwt][]") as a client assertion to the OIDC provider. Browse to the [OIDC concepts][concepts-assertions] page to learn more.- oidc
Client stringId (string: <optional>)
- The OAuth Client ID configured with the OIDC provider.- oidc
Client stringSecret (string: <optional>)
- The OAuth Client Secret configured with the OIDC provider.- oidc
Disable booleanUserinfo (bool: false)
- When set totrue
, Nomad will not make a request to the identity provider to get OIDCUserInfo
. You may wish to set this if your identity provider doesn't send any additional claims from theUserInfo
endpoint.- oidc
Discovery stringUrl (string: <optional>)
- The OIDC Discovery URL, without any .well-known component (base path).- oidc
Enable booleanPkce (bool: false)
- When set totrue
, Nomad will include [PKCE][] verification in the auth flow. Even with PKCE enabled in Nomad, you may still need to enable it in your OIDC provider.- oidc
Scopes string[] ([]string: <optional>)
- List of OIDC scopes.- signing
Algs string[] ([]string: <optional>)
- A list of supported signing algorithms.- verbose
Logging boolean - Enable OIDC verbose logging on the Nomad server.
- allowed_
redirect_ Sequence[str]uris ([]string: <optional>)
- A list of allowed values that can be used for the redirect URI.- bound_
audiences Sequence[str] ([]string: <optional>)
- List of auth claims that are valid for login.- bound_
issuers Sequence[str] ([]string: <optional>)
- The value against which to match the iss claim in a JWT.- claim_
mappings Mapping[str, str] - Mappings of claims (key) that will be copied to a metadata field (value).
- clock_
skew_ strleeway (string: <optional>)
- Duration of leeway when validating all claims in the form of a time duration such as "5m" or "1h".- discovery_
ca_ Sequence[str]pems ([]string: <optional>)
- PEM encoded CA certs for use by the TLS client used to talk with the OIDC Discovery URL.- expiration_
leeway str (string: <optional>)
- Duration of leeway when validating expiration of a JWT in the form of a time duration such as "5m" or "1h".- jwks_
ca_ strcert (string: <optional>)
- PEM encoded CA cert for use by the TLS client used to talk with the JWKS server.- jwks_
url str (string: <optional>)
- JSON Web Key Sets url for authenticating signatures.- jwt_
validation_ Sequence[str]pub_ keys ([]string: <optional>)
- List of PEM-encoded public keys to use to authenticate signatures locally.- list_
claim_ Mapping[str, str]mappings - Mappings of list claims (key) that will be copied to a metadata field (value).
- not_
before_ strleeway (string: <optional>)
- Duration of leeway when validating not before values of a token in the form of a time duration such as "5m" or "1h".- oidc_
client_ Aclassertion Auth Method Config Oidc Client Assertion (OIDCClientAssertion: <optional>)
- Optionally send a signed JWT ("[private key jwt][]") as a client assertion to the OIDC provider. Browse to the [OIDC concepts][concepts-assertions] page to learn more.- oidc_
client_ strid (string: <optional>)
- The OAuth Client ID configured with the OIDC provider.- oidc_
client_ strsecret (string: <optional>)
- The OAuth Client Secret configured with the OIDC provider.- oidc_
disable_ booluserinfo (bool: false)
- When set totrue
, Nomad will not make a request to the identity provider to get OIDCUserInfo
. You may wish to set this if your identity provider doesn't send any additional claims from theUserInfo
endpoint.- oidc_
discovery_ strurl (string: <optional>)
- The OIDC Discovery URL, without any .well-known component (base path).- oidc_
enable_ boolpkce (bool: false)
- When set totrue
, Nomad will include [PKCE][] verification in the auth flow. Even with PKCE enabled in Nomad, you may still need to enable it in your OIDC provider.- oidc_
scopes Sequence[str] ([]string: <optional>)
- List of OIDC scopes.- signing_
algs Sequence[str] ([]string: <optional>)
- A list of supported signing algorithms.- verbose_
logging bool - Enable OIDC verbose logging on the Nomad server.
- allowed
Redirect List<String>Uris ([]string: <optional>)
- A list of allowed values that can be used for the redirect URI.- bound
Audiences List<String> ([]string: <optional>)
- List of auth claims that are valid for login.- bound
Issuers List<String> ([]string: <optional>)
- The value against which to match the iss claim in a JWT.- claim
Mappings Map<String> - Mappings of claims (key) that will be copied to a metadata field (value).
- clock
Skew StringLeeway (string: <optional>)
- Duration of leeway when validating all claims in the form of a time duration such as "5m" or "1h".- discovery
Ca List<String>Pems ([]string: <optional>)
- PEM encoded CA certs for use by the TLS client used to talk with the OIDC Discovery URL.- expiration
Leeway String (string: <optional>)
- Duration of leeway when validating expiration of a JWT in the form of a time duration such as "5m" or "1h".- jwks
Ca StringCert (string: <optional>)
- PEM encoded CA cert for use by the TLS client used to talk with the JWKS server.- jwks
Url String (string: <optional>)
- JSON Web Key Sets url for authenticating signatures.- jwt
Validation List<String>Pub Keys ([]string: <optional>)
- List of PEM-encoded public keys to use to authenticate signatures locally.- list
Claim Map<String>Mappings - Mappings of list claims (key) that will be copied to a metadata field (value).
- not
Before StringLeeway (string: <optional>)
- Duration of leeway when validating not before values of a token in the form of a time duration such as "5m" or "1h".- oidc
Client Property MapAssertion (OIDCClientAssertion: <optional>)
- Optionally send a signed JWT ("[private key jwt][]") as a client assertion to the OIDC provider. Browse to the [OIDC concepts][concepts-assertions] page to learn more.- oidc
Client StringId (string: <optional>)
- The OAuth Client ID configured with the OIDC provider.- oidc
Client StringSecret (string: <optional>)
- The OAuth Client Secret configured with the OIDC provider.- oidc
Disable BooleanUserinfo (bool: false)
- When set totrue
, Nomad will not make a request to the identity provider to get OIDCUserInfo
. You may wish to set this if your identity provider doesn't send any additional claims from theUserInfo
endpoint.- oidc
Discovery StringUrl (string: <optional>)
- The OIDC Discovery URL, without any .well-known component (base path).- oidc
Enable BooleanPkce (bool: false)
- When set totrue
, Nomad will include [PKCE][] verification in the auth flow. Even with PKCE enabled in Nomad, you may still need to enable it in your OIDC provider.- oidc
Scopes List<String> ([]string: <optional>)
- List of OIDC scopes.- signing
Algs List<String> ([]string: <optional>)
- A list of supported signing algorithms.- verbose
Logging Boolean - Enable OIDC verbose logging on the Nomad server.
AclAuthMethodConfigOidcClientAssertion, AclAuthMethodConfigOidcClientAssertionArgs
- Key
Source string (string: <required>)
- Specifies where to get the private key to sign the JWT. Available sources:- "nomad": Use current active key in Nomad's keyring
- "private_key": Use key material in the
private_key
field - "client_secret": Use the
oidc_client_secret
as an HMAC key
- Audiences List<string>
([]string: optional)
- Who processes the assertion. Defaults to the auth method'soidc_discovery_url
.- Extra
Headers Dictionary<string, string> (map[string]string: optional)
- Add to the JWT headers, alongside "kid" and "type". Setting the "kid" header here is not allowed; useprivate_key.key_id
.- Key
Algorithm string (string: <optional>)
is the key's algorithm. Its default values are based on thekey_source
:- "nomad": "RS256"; this is from Nomad's keyring and must not be changed
- "private_key": "RS256"; must be RS256, RS384, or RS512
- "client_secret": "HS256"; must be HS256, HS384, or HS512
- Private
Key AclAuth Method Config Oidc Client Assertion Private Key (OIDCClientAssertionKey: <optional>)
- External key to sign the JWT.key_source
must be "private_key" to enable this.
- Key
Source string (string: <required>)
- Specifies where to get the private key to sign the JWT. Available sources:- "nomad": Use current active key in Nomad's keyring
- "private_key": Use key material in the
private_key
field - "client_secret": Use the
oidc_client_secret
as an HMAC key
- Audiences []string
([]string: optional)
- Who processes the assertion. Defaults to the auth method'soidc_discovery_url
.- Extra
Headers map[string]string (map[string]string: optional)
- Add to the JWT headers, alongside "kid" and "type". Setting the "kid" header here is not allowed; useprivate_key.key_id
.- Key
Algorithm string (string: <optional>)
is the key's algorithm. Its default values are based on thekey_source
:- "nomad": "RS256"; this is from Nomad's keyring and must not be changed
- "private_key": "RS256"; must be RS256, RS384, or RS512
- "client_secret": "HS256"; must be HS256, HS384, or HS512
- Private
Key AclAuth Method Config Oidc Client Assertion Private Key (OIDCClientAssertionKey: <optional>)
- External key to sign the JWT.key_source
must be "private_key" to enable this.
- key
Source String (string: <required>)
- Specifies where to get the private key to sign the JWT. Available sources:- "nomad": Use current active key in Nomad's keyring
- "private_key": Use key material in the
private_key
field - "client_secret": Use the
oidc_client_secret
as an HMAC key
- audiences List<String>
([]string: optional)
- Who processes the assertion. Defaults to the auth method'soidc_discovery_url
.- extra
Headers Map<String,String> (map[string]string: optional)
- Add to the JWT headers, alongside "kid" and "type". Setting the "kid" header here is not allowed; useprivate_key.key_id
.- key
Algorithm String (string: <optional>)
is the key's algorithm. Its default values are based on thekey_source
:- "nomad": "RS256"; this is from Nomad's keyring and must not be changed
- "private_key": "RS256"; must be RS256, RS384, or RS512
- "client_secret": "HS256"; must be HS256, HS384, or HS512
- private
Key AclAuth Method Config Oidc Client Assertion Private Key (OIDCClientAssertionKey: <optional>)
- External key to sign the JWT.key_source
must be "private_key" to enable this.
- key
Source string (string: <required>)
- Specifies where to get the private key to sign the JWT. Available sources:- "nomad": Use current active key in Nomad's keyring
- "private_key": Use key material in the
private_key
field - "client_secret": Use the
oidc_client_secret
as an HMAC key
- audiences string[]
([]string: optional)
- Who processes the assertion. Defaults to the auth method'soidc_discovery_url
.- extra
Headers {[key: string]: string} (map[string]string: optional)
- Add to the JWT headers, alongside "kid" and "type". Setting the "kid" header here is not allowed; useprivate_key.key_id
.- key
Algorithm string (string: <optional>)
is the key's algorithm. Its default values are based on thekey_source
:- "nomad": "RS256"; this is from Nomad's keyring and must not be changed
- "private_key": "RS256"; must be RS256, RS384, or RS512
- "client_secret": "HS256"; must be HS256, HS384, or HS512
- private
Key AclAuth Method Config Oidc Client Assertion Private Key (OIDCClientAssertionKey: <optional>)
- External key to sign the JWT.key_source
must be "private_key" to enable this.
- key_
source str (string: <required>)
- Specifies where to get the private key to sign the JWT. Available sources:- "nomad": Use current active key in Nomad's keyring
- "private_key": Use key material in the
private_key
field - "client_secret": Use the
oidc_client_secret
as an HMAC key
- audiences Sequence[str]
([]string: optional)
- Who processes the assertion. Defaults to the auth method'soidc_discovery_url
.- extra_
headers Mapping[str, str] (map[string]string: optional)
- Add to the JWT headers, alongside "kid" and "type". Setting the "kid" header here is not allowed; useprivate_key.key_id
.- key_
algorithm str (string: <optional>)
is the key's algorithm. Its default values are based on thekey_source
:- "nomad": "RS256"; this is from Nomad's keyring and must not be changed
- "private_key": "RS256"; must be RS256, RS384, or RS512
- "client_secret": "HS256"; must be HS256, HS384, or HS512
- private_
key AclAuth Method Config Oidc Client Assertion Private Key (OIDCClientAssertionKey: <optional>)
- External key to sign the JWT.key_source
must be "private_key" to enable this.
- key
Source String (string: <required>)
- Specifies where to get the private key to sign the JWT. Available sources:- "nomad": Use current active key in Nomad's keyring
- "private_key": Use key material in the
private_key
field - "client_secret": Use the
oidc_client_secret
as an HMAC key
- audiences List<String>
([]string: optional)
- Who processes the assertion. Defaults to the auth method'soidc_discovery_url
.- extra
Headers Map<String> (map[string]string: optional)
- Add to the JWT headers, alongside "kid" and "type". Setting the "kid" header here is not allowed; useprivate_key.key_id
.- key
Algorithm String (string: <optional>)
is the key's algorithm. Its default values are based on thekey_source
:- "nomad": "RS256"; this is from Nomad's keyring and must not be changed
- "private_key": "RS256"; must be RS256, RS384, or RS512
- "client_secret": "HS256"; must be HS256, HS384, or HS512
- private
Key Property Map (OIDCClientAssertionKey: <optional>)
- External key to sign the JWT.key_source
must be "private_key" to enable this.
AclAuthMethodConfigOidcClientAssertionPrivateKey, AclAuthMethodConfigOidcClientAssertionPrivateKeyArgs
- Key
Id string (string: optional)
- Becomes the JWT's "kid" header. Mutually exclusive withpem_cert
andpem_cert_file
. Allowedkey_id_header
values: "kid" (the default)- Key
Id stringHeader (string: optional)
- Which header the provider uses to find the public key to verify the signed JWT. The default and allowed values depend on whether you setkey_id
,pem_cert
, orpem_cert_file
. You must set exactly one of those options, so refer to them for their requirements.- Pem
Cert string (string: optional)
- An x509 certificate, signed by the private key or a CA, in pem format. Nomad uses this certificate to derive an [x5t#S256][] (or [x5t][]) key_id. Mutually exclusive withpem_cert_file
andkey_id
. Allowedkey_id_header
values: "x5t", "x5t#S256" (default "x5t#S256")- Pem
Cert stringFile (string: optional)
- An absolute path to an x509 certificate on Nomad servers' disk, signed by the private key or a CA, in pem format. Nomad uses this certificate to derive an [x5t#S256][] (or [x5t][]) header. Mutually exclusive withpem_cert
and key_id. Allowedkey_id_header
values: "x5t", "x5t#S256" (default "x5t#S256")- Pem
Key string (string: <optional>)
- An RSA private key, in pem format. It is used to sign the JWT. Mutually exclusive withpem_key
.- Pem
Key stringFile (string: optional)
- An absolute path to a private key on Nomad servers' disk, in pem format. It is used to sign the JWT. Mutually exclusive withpem_key_file
.
- Key
Id string (string: optional)
- Becomes the JWT's "kid" header. Mutually exclusive withpem_cert
andpem_cert_file
. Allowedkey_id_header
values: "kid" (the default)- Key
Id stringHeader (string: optional)
- Which header the provider uses to find the public key to verify the signed JWT. The default and allowed values depend on whether you setkey_id
,pem_cert
, orpem_cert_file
. You must set exactly one of those options, so refer to them for their requirements.- Pem
Cert string (string: optional)
- An x509 certificate, signed by the private key or a CA, in pem format. Nomad uses this certificate to derive an [x5t#S256][] (or [x5t][]) key_id. Mutually exclusive withpem_cert_file
andkey_id
. Allowedkey_id_header
values: "x5t", "x5t#S256" (default "x5t#S256")- Pem
Cert stringFile (string: optional)
- An absolute path to an x509 certificate on Nomad servers' disk, signed by the private key or a CA, in pem format. Nomad uses this certificate to derive an [x5t#S256][] (or [x5t][]) header. Mutually exclusive withpem_cert
and key_id. Allowedkey_id_header
values: "x5t", "x5t#S256" (default "x5t#S256")- Pem
Key string (string: <optional>)
- An RSA private key, in pem format. It is used to sign the JWT. Mutually exclusive withpem_key
.- Pem
Key stringFile (string: optional)
- An absolute path to a private key on Nomad servers' disk, in pem format. It is used to sign the JWT. Mutually exclusive withpem_key_file
.
- key
Id String (string: optional)
- Becomes the JWT's "kid" header. Mutually exclusive withpem_cert
andpem_cert_file
. Allowedkey_id_header
values: "kid" (the default)- key
Id StringHeader (string: optional)
- Which header the provider uses to find the public key to verify the signed JWT. The default and allowed values depend on whether you setkey_id
,pem_cert
, orpem_cert_file
. You must set exactly one of those options, so refer to them for their requirements.- pem
Cert String (string: optional)
- An x509 certificate, signed by the private key or a CA, in pem format. Nomad uses this certificate to derive an [x5t#S256][] (or [x5t][]) key_id. Mutually exclusive withpem_cert_file
andkey_id
. Allowedkey_id_header
values: "x5t", "x5t#S256" (default "x5t#S256")- pem
Cert StringFile (string: optional)
- An absolute path to an x509 certificate on Nomad servers' disk, signed by the private key or a CA, in pem format. Nomad uses this certificate to derive an [x5t#S256][] (or [x5t][]) header. Mutually exclusive withpem_cert
and key_id. Allowedkey_id_header
values: "x5t", "x5t#S256" (default "x5t#S256")- pem
Key String (string: <optional>)
- An RSA private key, in pem format. It is used to sign the JWT. Mutually exclusive withpem_key
.- pem
Key StringFile (string: optional)
- An absolute path to a private key on Nomad servers' disk, in pem format. It is used to sign the JWT. Mutually exclusive withpem_key_file
.
- key
Id string (string: optional)
- Becomes the JWT's "kid" header. Mutually exclusive withpem_cert
andpem_cert_file
. Allowedkey_id_header
values: "kid" (the default)- key
Id stringHeader (string: optional)
- Which header the provider uses to find the public key to verify the signed JWT. The default and allowed values depend on whether you setkey_id
,pem_cert
, orpem_cert_file
. You must set exactly one of those options, so refer to them for their requirements.- pem
Cert string (string: optional)
- An x509 certificate, signed by the private key or a CA, in pem format. Nomad uses this certificate to derive an [x5t#S256][] (or [x5t][]) key_id. Mutually exclusive withpem_cert_file
andkey_id
. Allowedkey_id_header
values: "x5t", "x5t#S256" (default "x5t#S256")- pem
Cert stringFile (string: optional)
- An absolute path to an x509 certificate on Nomad servers' disk, signed by the private key or a CA, in pem format. Nomad uses this certificate to derive an [x5t#S256][] (or [x5t][]) header. Mutually exclusive withpem_cert
and key_id. Allowedkey_id_header
values: "x5t", "x5t#S256" (default "x5t#S256")- pem
Key string (string: <optional>)
- An RSA private key, in pem format. It is used to sign the JWT. Mutually exclusive withpem_key
.- pem
Key stringFile (string: optional)
- An absolute path to a private key on Nomad servers' disk, in pem format. It is used to sign the JWT. Mutually exclusive withpem_key_file
.
- key_
id str (string: optional)
- Becomes the JWT's "kid" header. Mutually exclusive withpem_cert
andpem_cert_file
. Allowedkey_id_header
values: "kid" (the default)- key_
id_ strheader (string: optional)
- Which header the provider uses to find the public key to verify the signed JWT. The default and allowed values depend on whether you setkey_id
,pem_cert
, orpem_cert_file
. You must set exactly one of those options, so refer to them for their requirements.- pem_
cert str (string: optional)
- An x509 certificate, signed by the private key or a CA, in pem format. Nomad uses this certificate to derive an [x5t#S256][] (or [x5t][]) key_id. Mutually exclusive withpem_cert_file
andkey_id
. Allowedkey_id_header
values: "x5t", "x5t#S256" (default "x5t#S256")- pem_
cert_ strfile (string: optional)
- An absolute path to an x509 certificate on Nomad servers' disk, signed by the private key or a CA, in pem format. Nomad uses this certificate to derive an [x5t#S256][] (or [x5t][]) header. Mutually exclusive withpem_cert
and key_id. Allowedkey_id_header
values: "x5t", "x5t#S256" (default "x5t#S256")- pem_
key str (string: <optional>)
- An RSA private key, in pem format. It is used to sign the JWT. Mutually exclusive withpem_key
.- pem_
key_ strfile (string: optional)
- An absolute path to a private key on Nomad servers' disk, in pem format. It is used to sign the JWT. Mutually exclusive withpem_key_file
.
- key
Id String (string: optional)
- Becomes the JWT's "kid" header. Mutually exclusive withpem_cert
andpem_cert_file
. Allowedkey_id_header
values: "kid" (the default)- key
Id StringHeader (string: optional)
- Which header the provider uses to find the public key to verify the signed JWT. The default and allowed values depend on whether you setkey_id
,pem_cert
, orpem_cert_file
. You must set exactly one of those options, so refer to them for their requirements.- pem
Cert String (string: optional)
- An x509 certificate, signed by the private key or a CA, in pem format. Nomad uses this certificate to derive an [x5t#S256][] (or [x5t][]) key_id. Mutually exclusive withpem_cert_file
andkey_id
. Allowedkey_id_header
values: "x5t", "x5t#S256" (default "x5t#S256")- pem
Cert StringFile (string: optional)
- An absolute path to an x509 certificate on Nomad servers' disk, signed by the private key or a CA, in pem format. Nomad uses this certificate to derive an [x5t#S256][] (or [x5t][]) header. Mutually exclusive withpem_cert
and key_id. Allowedkey_id_header
values: "x5t", "x5t#S256" (default "x5t#S256")- pem
Key String (string: <optional>)
- An RSA private key, in pem format. It is used to sign the JWT. Mutually exclusive withpem_key
.- pem
Key StringFile (string: optional)
- An absolute path to a private key on Nomad servers' disk, in pem format. It is used to sign the JWT. Mutually exclusive withpem_key_file
.
Package Details
- Repository
- HashiCorp Nomad pulumi/pulumi-nomad
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
nomad
Terraform Provider.