vault.aws.SecretBackend
Explore with Pulumi AI
Import
AWS secret backends can be imported using the path, e.g.
$ pulumi import vault:aws/secretBackend:SecretBackend aws aws
Create SecretBackend Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecretBackend(name: string, args?: SecretBackendArgs, opts?: CustomResourceOptions);@overload
def SecretBackend(resource_name: str,
                  args: Optional[SecretBackendArgs] = None,
                  opts: Optional[ResourceOptions] = None)
@overload
def SecretBackend(resource_name: str,
                  opts: Optional[ResourceOptions] = None,
                  access_key: Optional[str] = None,
                  default_lease_ttl_seconds: Optional[int] = None,
                  description: Optional[str] = None,
                  disable_automated_rotation: Optional[bool] = None,
                  disable_remount: Optional[bool] = None,
                  iam_endpoint: Optional[str] = None,
                  identity_token_audience: Optional[str] = None,
                  identity_token_key: Optional[str] = None,
                  identity_token_ttl: Optional[int] = None,
                  local: Optional[bool] = None,
                  max_lease_ttl_seconds: Optional[int] = None,
                  namespace: Optional[str] = None,
                  path: Optional[str] = None,
                  region: Optional[str] = None,
                  role_arn: Optional[str] = None,
                  rotation_period: Optional[int] = None,
                  rotation_schedule: Optional[str] = None,
                  rotation_window: Optional[int] = None,
                  secret_key: Optional[str] = None,
                  sts_endpoint: Optional[str] = None,
                  sts_fallback_endpoints: Optional[Sequence[str]] = None,
                  sts_fallback_regions: Optional[Sequence[str]] = None,
                  sts_region: Optional[str] = None,
                  username_template: Optional[str] = None)func NewSecretBackend(ctx *Context, name string, args *SecretBackendArgs, opts ...ResourceOption) (*SecretBackend, error)public SecretBackend(string name, SecretBackendArgs? args = null, CustomResourceOptions? opts = null)
public SecretBackend(String name, SecretBackendArgs args)
public SecretBackend(String name, SecretBackendArgs args, CustomResourceOptions options)
type: vault:aws:SecretBackend
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecretBackendArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var vaultSecretBackendResource = new Vault.Aws.SecretBackend("vaultSecretBackendResource", new()
{
    AccessKey = "string",
    DefaultLeaseTtlSeconds = 0,
    Description = "string",
    DisableAutomatedRotation = false,
    DisableRemount = false,
    IamEndpoint = "string",
    IdentityTokenAudience = "string",
    IdentityTokenKey = "string",
    IdentityTokenTtl = 0,
    Local = false,
    MaxLeaseTtlSeconds = 0,
    Namespace = "string",
    Path = "string",
    Region = "string",
    RoleArn = "string",
    RotationPeriod = 0,
    RotationSchedule = "string",
    RotationWindow = 0,
    SecretKey = "string",
    StsEndpoint = "string",
    StsFallbackEndpoints = new[]
    {
        "string",
    },
    StsFallbackRegions = new[]
    {
        "string",
    },
    StsRegion = "string",
    UsernameTemplate = "string",
});
example, err := aws.NewSecretBackend(ctx, "vaultSecretBackendResource", &aws.SecretBackendArgs{
	AccessKey:                pulumi.String("string"),
	DefaultLeaseTtlSeconds:   pulumi.Int(0),
	Description:              pulumi.String("string"),
	DisableAutomatedRotation: pulumi.Bool(false),
	DisableRemount:           pulumi.Bool(false),
	IamEndpoint:              pulumi.String("string"),
	IdentityTokenAudience:    pulumi.String("string"),
	IdentityTokenKey:         pulumi.String("string"),
	IdentityTokenTtl:         pulumi.Int(0),
	Local:                    pulumi.Bool(false),
	MaxLeaseTtlSeconds:       pulumi.Int(0),
	Namespace:                pulumi.String("string"),
	Path:                     pulumi.String("string"),
	Region:                   pulumi.String("string"),
	RoleArn:                  pulumi.String("string"),
	RotationPeriod:           pulumi.Int(0),
	RotationSchedule:         pulumi.String("string"),
	RotationWindow:           pulumi.Int(0),
	SecretKey:                pulumi.String("string"),
	StsEndpoint:              pulumi.String("string"),
	StsFallbackEndpoints: pulumi.StringArray{
		pulumi.String("string"),
	},
	StsFallbackRegions: pulumi.StringArray{
		pulumi.String("string"),
	},
	StsRegion:        pulumi.String("string"),
	UsernameTemplate: pulumi.String("string"),
})
var vaultSecretBackendResource = new com.pulumi.vault.aws.SecretBackend("vaultSecretBackendResource", com.pulumi.vault.aws.SecretBackendArgs.builder()
    .accessKey("string")
    .defaultLeaseTtlSeconds(0)
    .description("string")
    .disableAutomatedRotation(false)
    .disableRemount(false)
    .iamEndpoint("string")
    .identityTokenAudience("string")
    .identityTokenKey("string")
    .identityTokenTtl(0)
    .local(false)
    .maxLeaseTtlSeconds(0)
    .namespace("string")
    .path("string")
    .region("string")
    .roleArn("string")
    .rotationPeriod(0)
    .rotationSchedule("string")
    .rotationWindow(0)
    .secretKey("string")
    .stsEndpoint("string")
    .stsFallbackEndpoints("string")
    .stsFallbackRegions("string")
    .stsRegion("string")
    .usernameTemplate("string")
    .build());
vault_secret_backend_resource = vault.aws.SecretBackend("vaultSecretBackendResource",
    access_key="string",
    default_lease_ttl_seconds=0,
    description="string",
    disable_automated_rotation=False,
    disable_remount=False,
    iam_endpoint="string",
    identity_token_audience="string",
    identity_token_key="string",
    identity_token_ttl=0,
    local=False,
    max_lease_ttl_seconds=0,
    namespace="string",
    path="string",
    region="string",
    role_arn="string",
    rotation_period=0,
    rotation_schedule="string",
    rotation_window=0,
    secret_key="string",
    sts_endpoint="string",
    sts_fallback_endpoints=["string"],
    sts_fallback_regions=["string"],
    sts_region="string",
    username_template="string")
const vaultSecretBackendResource = new vault.aws.SecretBackend("vaultSecretBackendResource", {
    accessKey: "string",
    defaultLeaseTtlSeconds: 0,
    description: "string",
    disableAutomatedRotation: false,
    disableRemount: false,
    iamEndpoint: "string",
    identityTokenAudience: "string",
    identityTokenKey: "string",
    identityTokenTtl: 0,
    local: false,
    maxLeaseTtlSeconds: 0,
    namespace: "string",
    path: "string",
    region: "string",
    roleArn: "string",
    rotationPeriod: 0,
    rotationSchedule: "string",
    rotationWindow: 0,
    secretKey: "string",
    stsEndpoint: "string",
    stsFallbackEndpoints: ["string"],
    stsFallbackRegions: ["string"],
    stsRegion: "string",
    usernameTemplate: "string",
});
type: vault:aws:SecretBackend
properties:
    accessKey: string
    defaultLeaseTtlSeconds: 0
    description: string
    disableAutomatedRotation: false
    disableRemount: false
    iamEndpoint: string
    identityTokenAudience: string
    identityTokenKey: string
    identityTokenTtl: 0
    local: false
    maxLeaseTtlSeconds: 0
    namespace: string
    path: string
    region: string
    roleArn: string
    rotationPeriod: 0
    rotationSchedule: string
    rotationWindow: 0
    secretKey: string
    stsEndpoint: string
    stsFallbackEndpoints:
        - string
    stsFallbackRegions:
        - string
    stsRegion: string
    usernameTemplate: string
SecretBackend Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SecretBackend resource accepts the following input properties:
- AccessKey string
- The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- DefaultLease intTtl Seconds 
- The default TTL for credentials issued by this backend.
- Description string
- A human-friendly description for this backend.
- DisableAutomated boolRotation 
- Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
- DisableRemount bool
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- IamEndpoint string
- Specifies a custom HTTP IAM endpoint to use.
- IdentityToken stringAudience 
- The audience claim value. Requires Vault 1.16+.
- IdentityToken stringKey 
- The key to use for signing identity tokens. Requires Vault 1.16+.
- IdentityToken intTtl 
- The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
- Local bool
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- MaxLease intTtl Seconds 
- The maximum TTL that can be requested for credentials issued by this backend.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Path string
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults toaws.
- Region string
- The AWS region to make API calls against. Defaults to us-east-1.
- RoleArn string
- Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
- RotationPeriod int
- The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
- RotationSchedule string
- The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
- RotationWindow int
- The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.
- SecretKey string
- The AWS Secret Access Key to use when generating new credentials.
- StsEndpoint string
- Specifies a custom HTTP STS endpoint to use.
- StsFallback List<string>Endpoints 
- Ordered list of sts_endpoints to try if the defined one fails. Requires Vault 1.19+
- StsFallback List<string>Regions 
- Ordered list of sts_regions matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
- StsRegion string
- Specifies the region of the STS endpoint. Should be included if sts_endpointis supplied. Requires Vault 1.19+
- UsernameTemplate string
- Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:{{ if (eq .Type "STS") }} {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }} {{ else }} {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }} {{ end }}
- AccessKey string
- The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- DefaultLease intTtl Seconds 
- The default TTL for credentials issued by this backend.
- Description string
- A human-friendly description for this backend.
- DisableAutomated boolRotation 
- Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
- DisableRemount bool
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- IamEndpoint string
- Specifies a custom HTTP IAM endpoint to use.
- IdentityToken stringAudience 
- The audience claim value. Requires Vault 1.16+.
- IdentityToken stringKey 
- The key to use for signing identity tokens. Requires Vault 1.16+.
- IdentityToken intTtl 
- The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
- Local bool
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- MaxLease intTtl Seconds 
- The maximum TTL that can be requested for credentials issued by this backend.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Path string
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults toaws.
- Region string
- The AWS region to make API calls against. Defaults to us-east-1.
- RoleArn string
- Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
- RotationPeriod int
- The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
- RotationSchedule string
- The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
- RotationWindow int
- The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.
- SecretKey string
- The AWS Secret Access Key to use when generating new credentials.
- StsEndpoint string
- Specifies a custom HTTP STS endpoint to use.
- StsFallback []stringEndpoints 
- Ordered list of sts_endpoints to try if the defined one fails. Requires Vault 1.19+
- StsFallback []stringRegions 
- Ordered list of sts_regions matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
- StsRegion string
- Specifies the region of the STS endpoint. Should be included if sts_endpointis supplied. Requires Vault 1.19+
- UsernameTemplate string
- Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:{{ if (eq .Type "STS") }} {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }} {{ else }} {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }} {{ end }}
- accessKey String
- The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- defaultLease IntegerTtl Seconds 
- The default TTL for credentials issued by this backend.
- description String
- A human-friendly description for this backend.
- disableAutomated BooleanRotation 
- Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
- disableRemount Boolean
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iamEndpoint String
- Specifies a custom HTTP IAM endpoint to use.
- identityToken StringAudience 
- The audience claim value. Requires Vault 1.16+.
- identityToken StringKey 
- The key to use for signing identity tokens. Requires Vault 1.16+.
- identityToken IntegerTtl 
- The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
- local Boolean
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- maxLease IntegerTtl Seconds 
- The maximum TTL that can be requested for credentials issued by this backend.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- path String
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults toaws.
- region String
- The AWS region to make API calls against. Defaults to us-east-1.
- roleArn String
- Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
- rotationPeriod Integer
- The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
- rotationSchedule String
- The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
- rotationWindow Integer
- The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.
- secretKey String
- The AWS Secret Access Key to use when generating new credentials.
- stsEndpoint String
- Specifies a custom HTTP STS endpoint to use.
- stsFallback List<String>Endpoints 
- Ordered list of sts_endpoints to try if the defined one fails. Requires Vault 1.19+
- stsFallback List<String>Regions 
- Ordered list of sts_regions matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
- stsRegion String
- Specifies the region of the STS endpoint. Should be included if sts_endpointis supplied. Requires Vault 1.19+
- usernameTemplate String
- Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:{{ if (eq .Type "STS") }} {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }} {{ else }} {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }} {{ end }}
- accessKey string
- The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- defaultLease numberTtl Seconds 
- The default TTL for credentials issued by this backend.
- description string
- A human-friendly description for this backend.
- disableAutomated booleanRotation 
- Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
- disableRemount boolean
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iamEndpoint string
- Specifies a custom HTTP IAM endpoint to use.
- identityToken stringAudience 
- The audience claim value. Requires Vault 1.16+.
- identityToken stringKey 
- The key to use for signing identity tokens. Requires Vault 1.16+.
- identityToken numberTtl 
- The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
- local boolean
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- maxLease numberTtl Seconds 
- The maximum TTL that can be requested for credentials issued by this backend.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- path string
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults toaws.
- region string
- The AWS region to make API calls against. Defaults to us-east-1.
- roleArn string
- Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
- rotationPeriod number
- The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
- rotationSchedule string
- The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
- rotationWindow number
- The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.
- secretKey string
- The AWS Secret Access Key to use when generating new credentials.
- stsEndpoint string
- Specifies a custom HTTP STS endpoint to use.
- stsFallback string[]Endpoints 
- Ordered list of sts_endpoints to try if the defined one fails. Requires Vault 1.19+
- stsFallback string[]Regions 
- Ordered list of sts_regions matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
- stsRegion string
- Specifies the region of the STS endpoint. Should be included if sts_endpointis supplied. Requires Vault 1.19+
- usernameTemplate string
- Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:{{ if (eq .Type "STS") }} {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }} {{ else }} {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }} {{ end }}
- access_key str
- The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- default_lease_ intttl_ seconds 
- The default TTL for credentials issued by this backend.
- description str
- A human-friendly description for this backend.
- disable_automated_ boolrotation 
- Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
- disable_remount bool
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iam_endpoint str
- Specifies a custom HTTP IAM endpoint to use.
- identity_token_ straudience 
- The audience claim value. Requires Vault 1.16+.
- identity_token_ strkey 
- The key to use for signing identity tokens. Requires Vault 1.16+.
- identity_token_ intttl 
- The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
- local bool
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- max_lease_ intttl_ seconds 
- The maximum TTL that can be requested for credentials issued by this backend.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- path str
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults toaws.
- region str
- The AWS region to make API calls against. Defaults to us-east-1.
- role_arn str
- Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
- rotation_period int
- The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
- rotation_schedule str
- The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
- rotation_window int
- The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.
- secret_key str
- The AWS Secret Access Key to use when generating new credentials.
- sts_endpoint str
- Specifies a custom HTTP STS endpoint to use.
- sts_fallback_ Sequence[str]endpoints 
- Ordered list of sts_endpoints to try if the defined one fails. Requires Vault 1.19+
- sts_fallback_ Sequence[str]regions 
- Ordered list of sts_regions matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
- sts_region str
- Specifies the region of the STS endpoint. Should be included if sts_endpointis supplied. Requires Vault 1.19+
- username_template str
- Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:{{ if (eq .Type "STS") }} {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }} {{ else }} {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }} {{ end }}
- accessKey String
- The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- defaultLease NumberTtl Seconds 
- The default TTL for credentials issued by this backend.
- description String
- A human-friendly description for this backend.
- disableAutomated BooleanRotation 
- Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
- disableRemount Boolean
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iamEndpoint String
- Specifies a custom HTTP IAM endpoint to use.
- identityToken StringAudience 
- The audience claim value. Requires Vault 1.16+.
- identityToken StringKey 
- The key to use for signing identity tokens. Requires Vault 1.16+.
- identityToken NumberTtl 
- The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
- local Boolean
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- maxLease NumberTtl Seconds 
- The maximum TTL that can be requested for credentials issued by this backend.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- path String
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults toaws.
- region String
- The AWS region to make API calls against. Defaults to us-east-1.
- roleArn String
- Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
- rotationPeriod Number
- The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
- rotationSchedule String
- The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
- rotationWindow Number
- The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.
- secretKey String
- The AWS Secret Access Key to use when generating new credentials.
- stsEndpoint String
- Specifies a custom HTTP STS endpoint to use.
- stsFallback List<String>Endpoints 
- Ordered list of sts_endpoints to try if the defined one fails. Requires Vault 1.19+
- stsFallback List<String>Regions 
- Ordered list of sts_regions matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
- stsRegion String
- Specifies the region of the STS endpoint. Should be included if sts_endpointis supplied. Requires Vault 1.19+
- usernameTemplate String
- Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:{{ if (eq .Type "STS") }} {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }} {{ else }} {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }} {{ end }}
Outputs
All input properties are implicitly available as output properties. Additionally, the SecretBackend resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Look up Existing SecretBackend Resource
Get an existing SecretBackend resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecretBackendState, opts?: CustomResourceOptions): SecretBackend@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        access_key: Optional[str] = None,
        default_lease_ttl_seconds: Optional[int] = None,
        description: Optional[str] = None,
        disable_automated_rotation: Optional[bool] = None,
        disable_remount: Optional[bool] = None,
        iam_endpoint: Optional[str] = None,
        identity_token_audience: Optional[str] = None,
        identity_token_key: Optional[str] = None,
        identity_token_ttl: Optional[int] = None,
        local: Optional[bool] = None,
        max_lease_ttl_seconds: Optional[int] = None,
        namespace: Optional[str] = None,
        path: Optional[str] = None,
        region: Optional[str] = None,
        role_arn: Optional[str] = None,
        rotation_period: Optional[int] = None,
        rotation_schedule: Optional[str] = None,
        rotation_window: Optional[int] = None,
        secret_key: Optional[str] = None,
        sts_endpoint: Optional[str] = None,
        sts_fallback_endpoints: Optional[Sequence[str]] = None,
        sts_fallback_regions: Optional[Sequence[str]] = None,
        sts_region: Optional[str] = None,
        username_template: Optional[str] = None) -> SecretBackendfunc GetSecretBackend(ctx *Context, name string, id IDInput, state *SecretBackendState, opts ...ResourceOption) (*SecretBackend, error)public static SecretBackend Get(string name, Input<string> id, SecretBackendState? state, CustomResourceOptions? opts = null)public static SecretBackend get(String name, Output<String> id, SecretBackendState state, CustomResourceOptions options)resources:  _:    type: vault:aws:SecretBackend    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- AccessKey string
- The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- DefaultLease intTtl Seconds 
- The default TTL for credentials issued by this backend.
- Description string
- A human-friendly description for this backend.
- DisableAutomated boolRotation 
- Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
- DisableRemount bool
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- IamEndpoint string
- Specifies a custom HTTP IAM endpoint to use.
- IdentityToken stringAudience 
- The audience claim value. Requires Vault 1.16+.
- IdentityToken stringKey 
- The key to use for signing identity tokens. Requires Vault 1.16+.
- IdentityToken intTtl 
- The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
- Local bool
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- MaxLease intTtl Seconds 
- The maximum TTL that can be requested for credentials issued by this backend.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Path string
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults toaws.
- Region string
- The AWS region to make API calls against. Defaults to us-east-1.
- RoleArn string
- Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
- RotationPeriod int
- The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
- RotationSchedule string
- The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
- RotationWindow int
- The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.
- SecretKey string
- The AWS Secret Access Key to use when generating new credentials.
- StsEndpoint string
- Specifies a custom HTTP STS endpoint to use.
- StsFallback List<string>Endpoints 
- Ordered list of sts_endpoints to try if the defined one fails. Requires Vault 1.19+
- StsFallback List<string>Regions 
- Ordered list of sts_regions matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
- StsRegion string
- Specifies the region of the STS endpoint. Should be included if sts_endpointis supplied. Requires Vault 1.19+
- UsernameTemplate string
- Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:{{ if (eq .Type "STS") }} {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }} {{ else }} {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }} {{ end }}
- AccessKey string
- The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- DefaultLease intTtl Seconds 
- The default TTL for credentials issued by this backend.
- Description string
- A human-friendly description for this backend.
- DisableAutomated boolRotation 
- Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
- DisableRemount bool
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- IamEndpoint string
- Specifies a custom HTTP IAM endpoint to use.
- IdentityToken stringAudience 
- The audience claim value. Requires Vault 1.16+.
- IdentityToken stringKey 
- The key to use for signing identity tokens. Requires Vault 1.16+.
- IdentityToken intTtl 
- The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
- Local bool
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- MaxLease intTtl Seconds 
- The maximum TTL that can be requested for credentials issued by this backend.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Path string
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults toaws.
- Region string
- The AWS region to make API calls against. Defaults to us-east-1.
- RoleArn string
- Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
- RotationPeriod int
- The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
- RotationSchedule string
- The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
- RotationWindow int
- The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.
- SecretKey string
- The AWS Secret Access Key to use when generating new credentials.
- StsEndpoint string
- Specifies a custom HTTP STS endpoint to use.
- StsFallback []stringEndpoints 
- Ordered list of sts_endpoints to try if the defined one fails. Requires Vault 1.19+
- StsFallback []stringRegions 
- Ordered list of sts_regions matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
- StsRegion string
- Specifies the region of the STS endpoint. Should be included if sts_endpointis supplied. Requires Vault 1.19+
- UsernameTemplate string
- Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:{{ if (eq .Type "STS") }} {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }} {{ else }} {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }} {{ end }}
- accessKey String
- The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- defaultLease IntegerTtl Seconds 
- The default TTL for credentials issued by this backend.
- description String
- A human-friendly description for this backend.
- disableAutomated BooleanRotation 
- Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
- disableRemount Boolean
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iamEndpoint String
- Specifies a custom HTTP IAM endpoint to use.
- identityToken StringAudience 
- The audience claim value. Requires Vault 1.16+.
- identityToken StringKey 
- The key to use for signing identity tokens. Requires Vault 1.16+.
- identityToken IntegerTtl 
- The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
- local Boolean
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- maxLease IntegerTtl Seconds 
- The maximum TTL that can be requested for credentials issued by this backend.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- path String
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults toaws.
- region String
- The AWS region to make API calls against. Defaults to us-east-1.
- roleArn String
- Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
- rotationPeriod Integer
- The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
- rotationSchedule String
- The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
- rotationWindow Integer
- The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.
- secretKey String
- The AWS Secret Access Key to use when generating new credentials.
- stsEndpoint String
- Specifies a custom HTTP STS endpoint to use.
- stsFallback List<String>Endpoints 
- Ordered list of sts_endpoints to try if the defined one fails. Requires Vault 1.19+
- stsFallback List<String>Regions 
- Ordered list of sts_regions matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
- stsRegion String
- Specifies the region of the STS endpoint. Should be included if sts_endpointis supplied. Requires Vault 1.19+
- usernameTemplate String
- Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:{{ if (eq .Type "STS") }} {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }} {{ else }} {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }} {{ end }}
- accessKey string
- The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- defaultLease numberTtl Seconds 
- The default TTL for credentials issued by this backend.
- description string
- A human-friendly description for this backend.
- disableAutomated booleanRotation 
- Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
- disableRemount boolean
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iamEndpoint string
- Specifies a custom HTTP IAM endpoint to use.
- identityToken stringAudience 
- The audience claim value. Requires Vault 1.16+.
- identityToken stringKey 
- The key to use for signing identity tokens. Requires Vault 1.16+.
- identityToken numberTtl 
- The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
- local boolean
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- maxLease numberTtl Seconds 
- The maximum TTL that can be requested for credentials issued by this backend.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- path string
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults toaws.
- region string
- The AWS region to make API calls against. Defaults to us-east-1.
- roleArn string
- Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
- rotationPeriod number
- The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
- rotationSchedule string
- The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
- rotationWindow number
- The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.
- secretKey string
- The AWS Secret Access Key to use when generating new credentials.
- stsEndpoint string
- Specifies a custom HTTP STS endpoint to use.
- stsFallback string[]Endpoints 
- Ordered list of sts_endpoints to try if the defined one fails. Requires Vault 1.19+
- stsFallback string[]Regions 
- Ordered list of sts_regions matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
- stsRegion string
- Specifies the region of the STS endpoint. Should be included if sts_endpointis supplied. Requires Vault 1.19+
- usernameTemplate string
- Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:{{ if (eq .Type "STS") }} {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }} {{ else }} {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }} {{ end }}
- access_key str
- The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- default_lease_ intttl_ seconds 
- The default TTL for credentials issued by this backend.
- description str
- A human-friendly description for this backend.
- disable_automated_ boolrotation 
- Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
- disable_remount bool
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iam_endpoint str
- Specifies a custom HTTP IAM endpoint to use.
- identity_token_ straudience 
- The audience claim value. Requires Vault 1.16+.
- identity_token_ strkey 
- The key to use for signing identity tokens. Requires Vault 1.16+.
- identity_token_ intttl 
- The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
- local bool
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- max_lease_ intttl_ seconds 
- The maximum TTL that can be requested for credentials issued by this backend.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- path str
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults toaws.
- region str
- The AWS region to make API calls against. Defaults to us-east-1.
- role_arn str
- Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
- rotation_period int
- The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
- rotation_schedule str
- The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
- rotation_window int
- The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.
- secret_key str
- The AWS Secret Access Key to use when generating new credentials.
- sts_endpoint str
- Specifies a custom HTTP STS endpoint to use.
- sts_fallback_ Sequence[str]endpoints 
- Ordered list of sts_endpoints to try if the defined one fails. Requires Vault 1.19+
- sts_fallback_ Sequence[str]regions 
- Ordered list of sts_regions matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
- sts_region str
- Specifies the region of the STS endpoint. Should be included if sts_endpointis supplied. Requires Vault 1.19+
- username_template str
- Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:{{ if (eq .Type "STS") }} {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }} {{ else }} {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }} {{ end }}
- accessKey String
- The AWS Access Key ID this backend should use to issue new credentials. Vault uses the official AWS SDK to authenticate, and thus can also use standard AWS environment credentials, shared file credentials or IAM role/ECS task credentials.
- defaultLease NumberTtl Seconds 
- The default TTL for credentials issued by this backend.
- description String
- A human-friendly description for this backend.
- disableAutomated BooleanRotation 
- Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
- disableRemount Boolean
- If set, opts out of mount migration on path updates. See here for more info on Mount Migration
- iamEndpoint String
- Specifies a custom HTTP IAM endpoint to use.
- identityToken StringAudience 
- The audience claim value. Requires Vault 1.16+.
- identityToken StringKey 
- The key to use for signing identity tokens. Requires Vault 1.16+.
- identityToken NumberTtl 
- The TTL of generated identity tokens in seconds. Requires Vault 1.16+.
- local Boolean
- Specifies whether the secrets mount will be marked as local. Local mounts are not replicated to performance replicas.
- maxLease NumberTtl Seconds 
- The maximum TTL that can be requested for credentials issued by this backend.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- path String
- The unique path this backend should be mounted at. Must
not begin or end with a /. Defaults toaws.
- region String
- The AWS region to make API calls against. Defaults to us-east-1.
- roleArn String
- Role ARN to assume for plugin identity token federation. Requires Vault 1.16+.
- rotationPeriod Number
- The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
- rotationSchedule String
- The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
- rotationWindow Number
- The maximum amount of time in seconds allowed to complete
a rotation when a scheduled token rotation occurs. The default rotation window is
unbound and the minimum allowable window is 3600. Requires Vault Enterprise 1.19+.
- secretKey String
- The AWS Secret Access Key to use when generating new credentials.
- stsEndpoint String
- Specifies a custom HTTP STS endpoint to use.
- stsFallback List<String>Endpoints 
- Ordered list of sts_endpoints to try if the defined one fails. Requires Vault 1.19+
- stsFallback List<String>Regions 
- Ordered list of sts_regions matching the fallback endpoints. Should correspond in order with those endpoints. Requires Vault 1.19+
- stsRegion String
- Specifies the region of the STS endpoint. Should be included if sts_endpointis supplied. Requires Vault 1.19+
- usernameTemplate String
- Template describing how dynamic usernames are generated. The username template is used to generate both IAM usernames (capped at 64 characters) and STS usernames (capped at 32 characters). If no template is provided the field defaults to the template:{{ if (eq .Type "STS") }} {{ printf "vault-%s-%s" (unix_time) (random 20) | truncate 32 }} {{ else }} {{ printf "vault-%s-%s-%s" (printf "%s-%s" (.DisplayName) (.PolicyName) | truncate 42) (unix_time) (random 20) | truncate 64 }} {{ end }}
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the vaultTerraform Provider.