vault.pkiSecret.SecretBackendIntermediateSetSigned
Explore with Pulumi AI
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";
const root = new vault.Mount("root", {
    path: "pki-root",
    type: "pki",
    description: "root",
    defaultLeaseTtlSeconds: 8640000,
    maxLeaseTtlSeconds: 8640000,
});
const intermediate = new vault.Mount("intermediate", {
    path: "pki-int",
    type: root.type,
    description: "intermediate",
    defaultLeaseTtlSeconds: 86400,
    maxLeaseTtlSeconds: 86400,
});
const example = new vault.pkisecret.SecretBackendRootCert("example", {
    backend: root.path,
    type: "internal",
    commonName: "RootOrg Root CA",
    ttl: "86400",
    format: "pem",
    privateKeyFormat: "der",
    keyType: "rsa",
    keyBits: 4096,
    excludeCnFromSans: true,
    ou: "Organizational Unit",
    organization: "RootOrg",
    country: "US",
    locality: "San Francisco",
    province: "CA",
});
const exampleSecretBackendIntermediateCertRequest = new vault.pkisecret.SecretBackendIntermediateCertRequest("example", {
    backend: intermediate.path,
    type: example.type,
    commonName: "SubOrg Intermediate CA",
});
const exampleSecretBackendRootSignIntermediate = new vault.pkisecret.SecretBackendRootSignIntermediate("example", {
    backend: root.path,
    csr: exampleSecretBackendIntermediateCertRequest.csr,
    commonName: "SubOrg Intermediate CA",
    excludeCnFromSans: true,
    ou: "SubUnit",
    organization: "SubOrg",
    country: "US",
    locality: "San Francisco",
    province: "CA",
    revoke: true,
});
const exampleSecretBackendIntermediateSetSigned = new vault.pkisecret.SecretBackendIntermediateSetSigned("example", {
    backend: intermediate.path,
    certificate: exampleSecretBackendRootSignIntermediate.certificate,
});
import pulumi
import pulumi_vault as vault
root = vault.Mount("root",
    path="pki-root",
    type="pki",
    description="root",
    default_lease_ttl_seconds=8640000,
    max_lease_ttl_seconds=8640000)
intermediate = vault.Mount("intermediate",
    path="pki-int",
    type=root.type,
    description="intermediate",
    default_lease_ttl_seconds=86400,
    max_lease_ttl_seconds=86400)
example = vault.pki_secret.SecretBackendRootCert("example",
    backend=root.path,
    type="internal",
    common_name="RootOrg Root CA",
    ttl="86400",
    format="pem",
    private_key_format="der",
    key_type="rsa",
    key_bits=4096,
    exclude_cn_from_sans=True,
    ou="Organizational Unit",
    organization="RootOrg",
    country="US",
    locality="San Francisco",
    province="CA")
example_secret_backend_intermediate_cert_request = vault.pki_secret.SecretBackendIntermediateCertRequest("example",
    backend=intermediate.path,
    type=example.type,
    common_name="SubOrg Intermediate CA")
example_secret_backend_root_sign_intermediate = vault.pki_secret.SecretBackendRootSignIntermediate("example",
    backend=root.path,
    csr=example_secret_backend_intermediate_cert_request.csr,
    common_name="SubOrg Intermediate CA",
    exclude_cn_from_sans=True,
    ou="SubUnit",
    organization="SubOrg",
    country="US",
    locality="San Francisco",
    province="CA",
    revoke=True)
example_secret_backend_intermediate_set_signed = vault.pki_secret.SecretBackendIntermediateSetSigned("example",
    backend=intermediate.path,
    certificate=example_secret_backend_root_sign_intermediate.certificate)
package main
import (
	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault"
	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/pkisecret"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		root, err := vault.NewMount(ctx, "root", &vault.MountArgs{
			Path:                   pulumi.String("pki-root"),
			Type:                   pulumi.String("pki"),
			Description:            pulumi.String("root"),
			DefaultLeaseTtlSeconds: pulumi.Int(8640000),
			MaxLeaseTtlSeconds:     pulumi.Int(8640000),
		})
		if err != nil {
			return err
		}
		intermediate, err := vault.NewMount(ctx, "intermediate", &vault.MountArgs{
			Path:                   pulumi.String("pki-int"),
			Type:                   root.Type,
			Description:            pulumi.String("intermediate"),
			DefaultLeaseTtlSeconds: pulumi.Int(86400),
			MaxLeaseTtlSeconds:     pulumi.Int(86400),
		})
		if err != nil {
			return err
		}
		example, err := pkisecret.NewSecretBackendRootCert(ctx, "example", &pkisecret.SecretBackendRootCertArgs{
			Backend:           root.Path,
			Type:              pulumi.String("internal"),
			CommonName:        pulumi.String("RootOrg Root CA"),
			Ttl:               pulumi.String("86400"),
			Format:            pulumi.String("pem"),
			PrivateKeyFormat:  pulumi.String("der"),
			KeyType:           pulumi.String("rsa"),
			KeyBits:           pulumi.Int(4096),
			ExcludeCnFromSans: pulumi.Bool(true),
			Ou:                pulumi.String("Organizational Unit"),
			Organization:      pulumi.String("RootOrg"),
			Country:           pulumi.String("US"),
			Locality:          pulumi.String("San Francisco"),
			Province:          pulumi.String("CA"),
		})
		if err != nil {
			return err
		}
		exampleSecretBackendIntermediateCertRequest, err := pkisecret.NewSecretBackendIntermediateCertRequest(ctx, "example", &pkisecret.SecretBackendIntermediateCertRequestArgs{
			Backend:    intermediate.Path,
			Type:       example.Type,
			CommonName: pulumi.String("SubOrg Intermediate CA"),
		})
		if err != nil {
			return err
		}
		exampleSecretBackendRootSignIntermediate, err := pkisecret.NewSecretBackendRootSignIntermediate(ctx, "example", &pkisecret.SecretBackendRootSignIntermediateArgs{
			Backend:           root.Path,
			Csr:               exampleSecretBackendIntermediateCertRequest.Csr,
			CommonName:        pulumi.String("SubOrg Intermediate CA"),
			ExcludeCnFromSans: pulumi.Bool(true),
			Ou:                pulumi.String("SubUnit"),
			Organization:      pulumi.String("SubOrg"),
			Country:           pulumi.String("US"),
			Locality:          pulumi.String("San Francisco"),
			Province:          pulumi.String("CA"),
			Revoke:            pulumi.Bool(true),
		})
		if err != nil {
			return err
		}
		_, err = pkisecret.NewSecretBackendIntermediateSetSigned(ctx, "example", &pkisecret.SecretBackendIntermediateSetSignedArgs{
			Backend:     intermediate.Path,
			Certificate: exampleSecretBackendRootSignIntermediate.Certificate,
		})
		if err != nil {
			return err
		}
		return nil
	})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;
return await Deployment.RunAsync(() => 
{
    var root = new Vault.Mount("root", new()
    {
        Path = "pki-root",
        Type = "pki",
        Description = "root",
        DefaultLeaseTtlSeconds = 8640000,
        MaxLeaseTtlSeconds = 8640000,
    });
    var intermediate = new Vault.Mount("intermediate", new()
    {
        Path = "pki-int",
        Type = root.Type,
        Description = "intermediate",
        DefaultLeaseTtlSeconds = 86400,
        MaxLeaseTtlSeconds = 86400,
    });
    var example = new Vault.PkiSecret.SecretBackendRootCert("example", new()
    {
        Backend = root.Path,
        Type = "internal",
        CommonName = "RootOrg Root CA",
        Ttl = "86400",
        Format = "pem",
        PrivateKeyFormat = "der",
        KeyType = "rsa",
        KeyBits = 4096,
        ExcludeCnFromSans = true,
        Ou = "Organizational Unit",
        Organization = "RootOrg",
        Country = "US",
        Locality = "San Francisco",
        Province = "CA",
    });
    var exampleSecretBackendIntermediateCertRequest = new Vault.PkiSecret.SecretBackendIntermediateCertRequest("example", new()
    {
        Backend = intermediate.Path,
        Type = example.Type,
        CommonName = "SubOrg Intermediate CA",
    });
    var exampleSecretBackendRootSignIntermediate = new Vault.PkiSecret.SecretBackendRootSignIntermediate("example", new()
    {
        Backend = root.Path,
        Csr = exampleSecretBackendIntermediateCertRequest.Csr,
        CommonName = "SubOrg Intermediate CA",
        ExcludeCnFromSans = true,
        Ou = "SubUnit",
        Organization = "SubOrg",
        Country = "US",
        Locality = "San Francisco",
        Province = "CA",
        Revoke = true,
    });
    var exampleSecretBackendIntermediateSetSigned = new Vault.PkiSecret.SecretBackendIntermediateSetSigned("example", new()
    {
        Backend = intermediate.Path,
        Certificate = exampleSecretBackendRootSignIntermediate.Certificate,
    });
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.Mount;
import com.pulumi.vault.MountArgs;
import com.pulumi.vault.pkiSecret.SecretBackendRootCert;
import com.pulumi.vault.pkiSecret.SecretBackendRootCertArgs;
import com.pulumi.vault.pkiSecret.SecretBackendIntermediateCertRequest;
import com.pulumi.vault.pkiSecret.SecretBackendIntermediateCertRequestArgs;
import com.pulumi.vault.pkiSecret.SecretBackendRootSignIntermediate;
import com.pulumi.vault.pkiSecret.SecretBackendRootSignIntermediateArgs;
import com.pulumi.vault.pkiSecret.SecretBackendIntermediateSetSigned;
import com.pulumi.vault.pkiSecret.SecretBackendIntermediateSetSignedArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }
    public static void stack(Context ctx) {
        var root = new Mount("root", MountArgs.builder()
            .path("pki-root")
            .type("pki")
            .description("root")
            .defaultLeaseTtlSeconds(8640000)
            .maxLeaseTtlSeconds(8640000)
            .build());
        var intermediate = new Mount("intermediate", MountArgs.builder()
            .path("pki-int")
            .type(root.type())
            .description("intermediate")
            .defaultLeaseTtlSeconds(86400)
            .maxLeaseTtlSeconds(86400)
            .build());
        var example = new SecretBackendRootCert("example", SecretBackendRootCertArgs.builder()
            .backend(root.path())
            .type("internal")
            .commonName("RootOrg Root CA")
            .ttl("86400")
            .format("pem")
            .privateKeyFormat("der")
            .keyType("rsa")
            .keyBits(4096)
            .excludeCnFromSans(true)
            .ou("Organizational Unit")
            .organization("RootOrg")
            .country("US")
            .locality("San Francisco")
            .province("CA")
            .build());
        var exampleSecretBackendIntermediateCertRequest = new SecretBackendIntermediateCertRequest("exampleSecretBackendIntermediateCertRequest", SecretBackendIntermediateCertRequestArgs.builder()
            .backend(intermediate.path())
            .type(example.type())
            .commonName("SubOrg Intermediate CA")
            .build());
        var exampleSecretBackendRootSignIntermediate = new SecretBackendRootSignIntermediate("exampleSecretBackendRootSignIntermediate", SecretBackendRootSignIntermediateArgs.builder()
            .backend(root.path())
            .csr(exampleSecretBackendIntermediateCertRequest.csr())
            .commonName("SubOrg Intermediate CA")
            .excludeCnFromSans(true)
            .ou("SubUnit")
            .organization("SubOrg")
            .country("US")
            .locality("San Francisco")
            .province("CA")
            .revoke(true)
            .build());
        var exampleSecretBackendIntermediateSetSigned = new SecretBackendIntermediateSetSigned("exampleSecretBackendIntermediateSetSigned", SecretBackendIntermediateSetSignedArgs.builder()
            .backend(intermediate.path())
            .certificate(exampleSecretBackendRootSignIntermediate.certificate())
            .build());
    }
}
resources:
  root:
    type: vault:Mount
    properties:
      path: pki-root
      type: pki
      description: root
      defaultLeaseTtlSeconds: 8.64e+06
      maxLeaseTtlSeconds: 8.64e+06
  intermediate:
    type: vault:Mount
    properties:
      path: pki-int
      type: ${root.type}
      description: intermediate
      defaultLeaseTtlSeconds: 86400
      maxLeaseTtlSeconds: 86400
  example:
    type: vault:pkiSecret:SecretBackendRootCert
    properties:
      backend: ${root.path}
      type: internal
      commonName: RootOrg Root CA
      ttl: 86400
      format: pem
      privateKeyFormat: der
      keyType: rsa
      keyBits: 4096
      excludeCnFromSans: true
      ou: Organizational Unit
      organization: RootOrg
      country: US
      locality: San Francisco
      province: CA
  exampleSecretBackendIntermediateCertRequest:
    type: vault:pkiSecret:SecretBackendIntermediateCertRequest
    name: example
    properties:
      backend: ${intermediate.path}
      type: ${example.type}
      commonName: SubOrg Intermediate CA
  exampleSecretBackendRootSignIntermediate:
    type: vault:pkiSecret:SecretBackendRootSignIntermediate
    name: example
    properties:
      backend: ${root.path}
      csr: ${exampleSecretBackendIntermediateCertRequest.csr}
      commonName: SubOrg Intermediate CA
      excludeCnFromSans: true
      ou: SubUnit
      organization: SubOrg
      country: US
      locality: San Francisco
      province: CA
      revoke: true
  exampleSecretBackendIntermediateSetSigned:
    type: vault:pkiSecret:SecretBackendIntermediateSetSigned
    name: example
    properties:
      backend: ${intermediate.path}
      certificate: ${exampleSecretBackendRootSignIntermediate.certificate}
Create SecretBackendIntermediateSetSigned Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new SecretBackendIntermediateSetSigned(name: string, args: SecretBackendIntermediateSetSignedArgs, opts?: CustomResourceOptions);@overload
def SecretBackendIntermediateSetSigned(resource_name: str,
                                       args: SecretBackendIntermediateSetSignedArgs,
                                       opts: Optional[ResourceOptions] = None)
@overload
def SecretBackendIntermediateSetSigned(resource_name: str,
                                       opts: Optional[ResourceOptions] = None,
                                       backend: Optional[str] = None,
                                       certificate: Optional[str] = None,
                                       namespace: Optional[str] = None)func NewSecretBackendIntermediateSetSigned(ctx *Context, name string, args SecretBackendIntermediateSetSignedArgs, opts ...ResourceOption) (*SecretBackendIntermediateSetSigned, error)public SecretBackendIntermediateSetSigned(string name, SecretBackendIntermediateSetSignedArgs args, CustomResourceOptions? opts = null)
public SecretBackendIntermediateSetSigned(String name, SecretBackendIntermediateSetSignedArgs args)
public SecretBackendIntermediateSetSigned(String name, SecretBackendIntermediateSetSignedArgs args, CustomResourceOptions options)
type: vault:pkiSecret:SecretBackendIntermediateSetSigned
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args SecretBackendIntermediateSetSignedArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args SecretBackendIntermediateSetSignedArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args SecretBackendIntermediateSetSignedArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args SecretBackendIntermediateSetSignedArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args SecretBackendIntermediateSetSignedArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var secretBackendIntermediateSetSignedResource = new Vault.PkiSecret.SecretBackendIntermediateSetSigned("secretBackendIntermediateSetSignedResource", new()
{
    Backend = "string",
    Certificate = "string",
    Namespace = "string",
});
example, err := pkisecret.NewSecretBackendIntermediateSetSigned(ctx, "secretBackendIntermediateSetSignedResource", &pkisecret.SecretBackendIntermediateSetSignedArgs{
	Backend:     pulumi.String("string"),
	Certificate: pulumi.String("string"),
	Namespace:   pulumi.String("string"),
})
var secretBackendIntermediateSetSignedResource = new SecretBackendIntermediateSetSigned("secretBackendIntermediateSetSignedResource", SecretBackendIntermediateSetSignedArgs.builder()
    .backend("string")
    .certificate("string")
    .namespace("string")
    .build());
secret_backend_intermediate_set_signed_resource = vault.pki_secret.SecretBackendIntermediateSetSigned("secretBackendIntermediateSetSignedResource",
    backend="string",
    certificate="string",
    namespace="string")
const secretBackendIntermediateSetSignedResource = new vault.pkisecret.SecretBackendIntermediateSetSigned("secretBackendIntermediateSetSignedResource", {
    backend: "string",
    certificate: "string",
    namespace: "string",
});
type: vault:pkiSecret:SecretBackendIntermediateSetSigned
properties:
    backend: string
    certificate: string
    namespace: string
SecretBackendIntermediateSetSigned Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The SecretBackendIntermediateSetSigned resource accepts the following input properties:
- Backend string
- The PKI secret backend the resource belongs to.
- Certificate string
- Specifies the PEM encoded certificate. May optionally append additional CA certificates to populate the whole chain, which will then enable returning the full chain from issue and sign operations.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Backend string
- The PKI secret backend the resource belongs to.
- Certificate string
- Specifies the PEM encoded certificate. May optionally append additional CA certificates to populate the whole chain, which will then enable returning the full chain from issue and sign operations.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend String
- The PKI secret backend the resource belongs to.
- certificate String
- Specifies the PEM encoded certificate. May optionally append additional CA certificates to populate the whole chain, which will then enable returning the full chain from issue and sign operations.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend string
- The PKI secret backend the resource belongs to.
- certificate string
- Specifies the PEM encoded certificate. May optionally append additional CA certificates to populate the whole chain, which will then enable returning the full chain from issue and sign operations.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend str
- The PKI secret backend the resource belongs to.
- certificate str
- Specifies the PEM encoded certificate. May optionally append additional CA certificates to populate the whole chain, which will then enable returning the full chain from issue and sign operations.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend String
- The PKI secret backend the resource belongs to.
- certificate String
- Specifies the PEM encoded certificate. May optionally append additional CA certificates to populate the whole chain, which will then enable returning the full chain from issue and sign operations.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
Outputs
All input properties are implicitly available as output properties. Additionally, the SecretBackendIntermediateSetSigned resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- ImportedIssuers List<string>
- The imported issuers indicating which issuers were created as part of this request.
- ImportedKeys List<string>
- The imported keys indicating which keys were created as part of this request.
- Id string
- The provider-assigned unique ID for this managed resource.
- ImportedIssuers []string
- The imported issuers indicating which issuers were created as part of this request.
- ImportedKeys []string
- The imported keys indicating which keys were created as part of this request.
- id String
- The provider-assigned unique ID for this managed resource.
- importedIssuers List<String>
- The imported issuers indicating which issuers were created as part of this request.
- importedKeys List<String>
- The imported keys indicating which keys were created as part of this request.
- id string
- The provider-assigned unique ID for this managed resource.
- importedIssuers string[]
- The imported issuers indicating which issuers were created as part of this request.
- importedKeys string[]
- The imported keys indicating which keys were created as part of this request.
- id str
- The provider-assigned unique ID for this managed resource.
- imported_issuers Sequence[str]
- The imported issuers indicating which issuers were created as part of this request.
- imported_keys Sequence[str]
- The imported keys indicating which keys were created as part of this request.
- id String
- The provider-assigned unique ID for this managed resource.
- importedIssuers List<String>
- The imported issuers indicating which issuers were created as part of this request.
- importedKeys List<String>
- The imported keys indicating which keys were created as part of this request.
Look up Existing SecretBackendIntermediateSetSigned Resource
Get an existing SecretBackendIntermediateSetSigned resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: SecretBackendIntermediateSetSignedState, opts?: CustomResourceOptions): SecretBackendIntermediateSetSigned@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        backend: Optional[str] = None,
        certificate: Optional[str] = None,
        imported_issuers: Optional[Sequence[str]] = None,
        imported_keys: Optional[Sequence[str]] = None,
        namespace: Optional[str] = None) -> SecretBackendIntermediateSetSignedfunc GetSecretBackendIntermediateSetSigned(ctx *Context, name string, id IDInput, state *SecretBackendIntermediateSetSignedState, opts ...ResourceOption) (*SecretBackendIntermediateSetSigned, error)public static SecretBackendIntermediateSetSigned Get(string name, Input<string> id, SecretBackendIntermediateSetSignedState? state, CustomResourceOptions? opts = null)public static SecretBackendIntermediateSetSigned get(String name, Output<String> id, SecretBackendIntermediateSetSignedState state, CustomResourceOptions options)resources:  _:    type: vault:pkiSecret:SecretBackendIntermediateSetSigned    get:      id: ${id}- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Backend string
- The PKI secret backend the resource belongs to.
- Certificate string
- Specifies the PEM encoded certificate. May optionally append additional CA certificates to populate the whole chain, which will then enable returning the full chain from issue and sign operations.
- ImportedIssuers List<string>
- The imported issuers indicating which issuers were created as part of this request.
- ImportedKeys List<string>
- The imported keys indicating which keys were created as part of this request.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- Backend string
- The PKI secret backend the resource belongs to.
- Certificate string
- Specifies the PEM encoded certificate. May optionally append additional CA certificates to populate the whole chain, which will then enable returning the full chain from issue and sign operations.
- ImportedIssuers []string
- The imported issuers indicating which issuers were created as part of this request.
- ImportedKeys []string
- The imported keys indicating which keys were created as part of this request.
- Namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend String
- The PKI secret backend the resource belongs to.
- certificate String
- Specifies the PEM encoded certificate. May optionally append additional CA certificates to populate the whole chain, which will then enable returning the full chain from issue and sign operations.
- importedIssuers List<String>
- The imported issuers indicating which issuers were created as part of this request.
- importedKeys List<String>
- The imported keys indicating which keys were created as part of this request.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend string
- The PKI secret backend the resource belongs to.
- certificate string
- Specifies the PEM encoded certificate. May optionally append additional CA certificates to populate the whole chain, which will then enable returning the full chain from issue and sign operations.
- importedIssuers string[]
- The imported issuers indicating which issuers were created as part of this request.
- importedKeys string[]
- The imported keys indicating which keys were created as part of this request.
- namespace string
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend str
- The PKI secret backend the resource belongs to.
- certificate str
- Specifies the PEM encoded certificate. May optionally append additional CA certificates to populate the whole chain, which will then enable returning the full chain from issue and sign operations.
- imported_issuers Sequence[str]
- The imported issuers indicating which issuers were created as part of this request.
- imported_keys Sequence[str]
- The imported keys indicating which keys were created as part of this request.
- namespace str
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
- backend String
- The PKI secret backend the resource belongs to.
- certificate String
- Specifies the PEM encoded certificate. May optionally append additional CA certificates to populate the whole chain, which will then enable returning the full chain from issue and sign operations.
- importedIssuers List<String>
- The imported issuers indicating which issuers were created as part of this request.
- importedKeys List<String>
- The imported keys indicating which keys were created as part of this request.
- namespace String
- The namespace to provision the resource in.
The value should not contain leading or trailing forward slashes.
The namespaceis always relative to the provider's configured namespace. Available only for Vault Enterprise.
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the vaultTerraform Provider.