vault.Provider
Explore with Pulumi AI
The provider type for the vault package. By default, resources use package-wide configuration
settings, however an explicit Provider instance may be created and passed during resource
construction to achieve fine-grained programmatic control over provider settings. See the
documentation for more information.
Create Provider Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new Provider(name: string, args: ProviderArgs, opts?: CustomResourceOptions);@overload
def Provider(resource_name: str,
             args: ProviderArgs,
             opts: Optional[ResourceOptions] = None)
@overload
def Provider(resource_name: str,
             opts: Optional[ResourceOptions] = None,
             add_address_to_env: Optional[str] = None,
             address: Optional[str] = None,
             auth_login: Optional[ProviderAuthLoginArgs] = None,
             auth_login_aws: Optional[ProviderAuthLoginAwsArgs] = None,
             auth_login_azure: Optional[ProviderAuthLoginAzureArgs] = None,
             auth_login_cert: Optional[ProviderAuthLoginCertArgs] = None,
             auth_login_gcp: Optional[ProviderAuthLoginGcpArgs] = None,
             auth_login_jwt: Optional[ProviderAuthLoginJwtArgs] = None,
             auth_login_kerberos: Optional[ProviderAuthLoginKerberosArgs] = None,
             auth_login_oci: Optional[ProviderAuthLoginOciArgs] = None,
             auth_login_oidc: Optional[ProviderAuthLoginOidcArgs] = None,
             auth_login_radius: Optional[ProviderAuthLoginRadiusArgs] = None,
             auth_login_token_file: Optional[ProviderAuthLoginTokenFileArgs] = None,
             auth_login_userpass: Optional[ProviderAuthLoginUserpassArgs] = None,
             ca_cert_dir: Optional[str] = None,
             ca_cert_file: Optional[str] = None,
             client_auth: Optional[ProviderClientAuthArgs] = None,
             headers: Optional[Sequence[ProviderHeaderArgs]] = None,
             max_lease_ttl_seconds: Optional[int] = None,
             max_retries: Optional[int] = None,
             max_retries_ccc: Optional[int] = None,
             namespace: Optional[str] = None,
             set_namespace_from_token: Optional[bool] = None,
             skip_child_token: Optional[bool] = None,
             skip_get_vault_version: Optional[bool] = None,
             skip_tls_verify: Optional[bool] = None,
             tls_server_name: Optional[str] = None,
             token: Optional[str] = None,
             token_name: Optional[str] = None,
             vault_version_override: Optional[str] = None)func NewProvider(ctx *Context, name string, args ProviderArgs, opts ...ResourceOption) (*Provider, error)public Provider(string name, ProviderArgs args, CustomResourceOptions? opts = null)
public Provider(String name, ProviderArgs args)
public Provider(String name, ProviderArgs args, CustomResourceOptions options)
type: pulumi:providers:vault
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args ProviderArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args ProviderArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args ProviderArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args ProviderArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args ProviderArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Provider Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The Provider resource accepts the following input properties:
- Address string
- URL of the root of the target Vault server.
- Token string
- Token to use to authenticate to Vault.
- AddAddress stringTo Env 
- AuthLogin ProviderAuth Login 
- Login to vault with an existing auth method using auth//login
- AuthLogin ProviderAws Auth Login Aws 
- Login to vault using the AWS method
- AuthLogin ProviderAzure Auth Login Azure 
- Login to vault using the azure method
- AuthLogin ProviderCert Auth Login Cert 
- Login to vault using the cert method
- AuthLogin ProviderGcp Auth Login Gcp 
- Login to vault using the gcp method
- AuthLogin ProviderJwt Auth Login Jwt 
- Login to vault using the jwt method
- AuthLogin ProviderKerberos Auth Login Kerberos 
- Login to vault using the kerberos method
- AuthLogin ProviderOci Auth Login Oci 
- Login to vault using the OCI method
- AuthLogin ProviderOidc Auth Login Oidc 
- Login to vault using the oidc method
- AuthLogin ProviderRadius Auth Login Radius 
- Login to vault using the radius method
- AuthLogin ProviderToken File Auth Login Token File 
- Login to vault using
- AuthLogin ProviderUserpass Auth Login Userpass 
- Login to vault using the userpass method
- CaCert stringDir 
- Path to directory containing CA certificate files to validate the server's certificate.
- CaCert stringFile 
- Path to a CA certificate file to validate the server's certificate.
- ClientAuth ProviderClient Auth 
- Client authentication credentials.
- Headers
List<ProviderHeader> 
- The headers to send with each Vault request.
- MaxLease intTtl Seconds 
- Maximum TTL for secret leases requested by this provider.
It can also be sourced from the following environment variable: TERRAFORM_VAULT_MAX_TTL
- MaxRetries int
- Maximum number of retries when a 5xx error code is encountered.
It can also be sourced from the following environment variable: VAULT_MAX_RETRIES
- MaxRetries intCcc 
- Maximum number of retries for Client Controlled Consistency related operations
- Namespace string
- The namespace to use. Available only for Vault Enterprise.
- SetNamespace boolFrom Token 
- In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
- SkipChild boolToken 
- Set this to true to prevent the creation of ephemeral child token used by this provider.
- SkipGet boolVault Version 
- Skip the dynamic fetching of the Vault server version.
- SkipTls boolVerify 
- Set this to true only if the target Vault server is an insecure development instance.
It can also be sourced from the following environment variable: VAULT_SKIP_VERIFY
- TlsServer stringName 
- Name to use as the SNI host when connecting via TLS.
- TokenName string
- Token name to use for creating the Vault child token.
- VaultVersion stringOverride 
- Override the Vault server version, which is normally determined dynamically from the target Vault server
- Address string
- URL of the root of the target Vault server.
- Token string
- Token to use to authenticate to Vault.
- AddAddress stringTo Env 
- AuthLogin ProviderAuth Login Args 
- Login to vault with an existing auth method using auth//login
- AuthLogin ProviderAws Auth Login Aws Args 
- Login to vault using the AWS method
- AuthLogin ProviderAzure Auth Login Azure Args 
- Login to vault using the azure method
- AuthLogin ProviderCert Auth Login Cert Args 
- Login to vault using the cert method
- AuthLogin ProviderGcp Auth Login Gcp Args 
- Login to vault using the gcp method
- AuthLogin ProviderJwt Auth Login Jwt Args 
- Login to vault using the jwt method
- AuthLogin ProviderKerberos Auth Login Kerberos Args 
- Login to vault using the kerberos method
- AuthLogin ProviderOci Auth Login Oci Args 
- Login to vault using the OCI method
- AuthLogin ProviderOidc Auth Login Oidc Args 
- Login to vault using the oidc method
- AuthLogin ProviderRadius Auth Login Radius Args 
- Login to vault using the radius method
- AuthLogin ProviderToken File Auth Login Token File Args 
- Login to vault using
- AuthLogin ProviderUserpass Auth Login Userpass Args 
- Login to vault using the userpass method
- CaCert stringDir 
- Path to directory containing CA certificate files to validate the server's certificate.
- CaCert stringFile 
- Path to a CA certificate file to validate the server's certificate.
- ClientAuth ProviderClient Auth Args 
- Client authentication credentials.
- Headers
[]ProviderHeader Args 
- The headers to send with each Vault request.
- MaxLease intTtl Seconds 
- Maximum TTL for secret leases requested by this provider.
It can also be sourced from the following environment variable: TERRAFORM_VAULT_MAX_TTL
- MaxRetries int
- Maximum number of retries when a 5xx error code is encountered.
It can also be sourced from the following environment variable: VAULT_MAX_RETRIES
- MaxRetries intCcc 
- Maximum number of retries for Client Controlled Consistency related operations
- Namespace string
- The namespace to use. Available only for Vault Enterprise.
- SetNamespace boolFrom Token 
- In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
- SkipChild boolToken 
- Set this to true to prevent the creation of ephemeral child token used by this provider.
- SkipGet boolVault Version 
- Skip the dynamic fetching of the Vault server version.
- SkipTls boolVerify 
- Set this to true only if the target Vault server is an insecure development instance.
It can also be sourced from the following environment variable: VAULT_SKIP_VERIFY
- TlsServer stringName 
- Name to use as the SNI host when connecting via TLS.
- TokenName string
- Token name to use for creating the Vault child token.
- VaultVersion stringOverride 
- Override the Vault server version, which is normally determined dynamically from the target Vault server
- address String
- URL of the root of the target Vault server.
- token String
- Token to use to authenticate to Vault.
- addAddress StringTo Env 
- authLogin ProviderAuth Login 
- Login to vault with an existing auth method using auth//login
- authLogin ProviderAws Auth Login Aws 
- Login to vault using the AWS method
- authLogin ProviderAzure Auth Login Azure 
- Login to vault using the azure method
- authLogin ProviderCert Auth Login Cert 
- Login to vault using the cert method
- authLogin ProviderGcp Auth Login Gcp 
- Login to vault using the gcp method
- authLogin ProviderJwt Auth Login Jwt 
- Login to vault using the jwt method
- authLogin ProviderKerberos Auth Login Kerberos 
- Login to vault using the kerberos method
- authLogin ProviderOci Auth Login Oci 
- Login to vault using the OCI method
- authLogin ProviderOidc Auth Login Oidc 
- Login to vault using the oidc method
- authLogin ProviderRadius Auth Login Radius 
- Login to vault using the radius method
- authLogin ProviderToken File Auth Login Token File 
- Login to vault using
- authLogin ProviderUserpass Auth Login Userpass 
- Login to vault using the userpass method
- caCert StringDir 
- Path to directory containing CA certificate files to validate the server's certificate.
- caCert StringFile 
- Path to a CA certificate file to validate the server's certificate.
- clientAuth ProviderClient Auth 
- Client authentication credentials.
- headers
List<ProviderHeader> 
- The headers to send with each Vault request.
- maxLease IntegerTtl Seconds 
- Maximum TTL for secret leases requested by this provider.
It can also be sourced from the following environment variable: TERRAFORM_VAULT_MAX_TTL
- maxRetries Integer
- Maximum number of retries when a 5xx error code is encountered.
It can also be sourced from the following environment variable: VAULT_MAX_RETRIES
- maxRetries IntegerCcc 
- Maximum number of retries for Client Controlled Consistency related operations
- namespace String
- The namespace to use. Available only for Vault Enterprise.
- setNamespace BooleanFrom Token 
- In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
- skipChild BooleanToken 
- Set this to true to prevent the creation of ephemeral child token used by this provider.
- skipGet BooleanVault Version 
- Skip the dynamic fetching of the Vault server version.
- skipTls BooleanVerify 
- Set this to true only if the target Vault server is an insecure development instance.
It can also be sourced from the following environment variable: VAULT_SKIP_VERIFY
- tlsServer StringName 
- Name to use as the SNI host when connecting via TLS.
- tokenName String
- Token name to use for creating the Vault child token.
- vaultVersion StringOverride 
- Override the Vault server version, which is normally determined dynamically from the target Vault server
- address string
- URL of the root of the target Vault server.
- token string
- Token to use to authenticate to Vault.
- addAddress stringTo Env 
- authLogin ProviderAuth Login 
- Login to vault with an existing auth method using auth//login
- authLogin ProviderAws Auth Login Aws 
- Login to vault using the AWS method
- authLogin ProviderAzure Auth Login Azure 
- Login to vault using the azure method
- authLogin ProviderCert Auth Login Cert 
- Login to vault using the cert method
- authLogin ProviderGcp Auth Login Gcp 
- Login to vault using the gcp method
- authLogin ProviderJwt Auth Login Jwt 
- Login to vault using the jwt method
- authLogin ProviderKerberos Auth Login Kerberos 
- Login to vault using the kerberos method
- authLogin ProviderOci Auth Login Oci 
- Login to vault using the OCI method
- authLogin ProviderOidc Auth Login Oidc 
- Login to vault using the oidc method
- authLogin ProviderRadius Auth Login Radius 
- Login to vault using the radius method
- authLogin ProviderToken File Auth Login Token File 
- Login to vault using
- authLogin ProviderUserpass Auth Login Userpass 
- Login to vault using the userpass method
- caCert stringDir 
- Path to directory containing CA certificate files to validate the server's certificate.
- caCert stringFile 
- Path to a CA certificate file to validate the server's certificate.
- clientAuth ProviderClient Auth 
- Client authentication credentials.
- headers
ProviderHeader[] 
- The headers to send with each Vault request.
- maxLease numberTtl Seconds 
- Maximum TTL for secret leases requested by this provider.
It can also be sourced from the following environment variable: TERRAFORM_VAULT_MAX_TTL
- maxRetries number
- Maximum number of retries when a 5xx error code is encountered.
It can also be sourced from the following environment variable: VAULT_MAX_RETRIES
- maxRetries numberCcc 
- Maximum number of retries for Client Controlled Consistency related operations
- namespace string
- The namespace to use. Available only for Vault Enterprise.
- setNamespace booleanFrom Token 
- In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
- skipChild booleanToken 
- Set this to true to prevent the creation of ephemeral child token used by this provider.
- skipGet booleanVault Version 
- Skip the dynamic fetching of the Vault server version.
- skipTls booleanVerify 
- Set this to true only if the target Vault server is an insecure development instance.
It can also be sourced from the following environment variable: VAULT_SKIP_VERIFY
- tlsServer stringName 
- Name to use as the SNI host when connecting via TLS.
- tokenName string
- Token name to use for creating the Vault child token.
- vaultVersion stringOverride 
- Override the Vault server version, which is normally determined dynamically from the target Vault server
- address str
- URL of the root of the target Vault server.
- token str
- Token to use to authenticate to Vault.
- add_address_ strto_ env 
- auth_login ProviderAuth Login Args 
- Login to vault with an existing auth method using auth//login
- auth_login_ Provideraws Auth Login Aws Args 
- Login to vault using the AWS method
- auth_login_ Providerazure Auth Login Azure Args 
- Login to vault using the azure method
- auth_login_ Providercert Auth Login Cert Args 
- Login to vault using the cert method
- auth_login_ Providergcp Auth Login Gcp Args 
- Login to vault using the gcp method
- auth_login_ Providerjwt Auth Login Jwt Args 
- Login to vault using the jwt method
- auth_login_ Providerkerberos Auth Login Kerberos Args 
- Login to vault using the kerberos method
- auth_login_ Provideroci Auth Login Oci Args 
- Login to vault using the OCI method
- auth_login_ Provideroidc Auth Login Oidc Args 
- Login to vault using the oidc method
- auth_login_ Providerradius Auth Login Radius Args 
- Login to vault using the radius method
- auth_login_ Providertoken_ file Auth Login Token File Args 
- Login to vault using
- auth_login_ Provideruserpass Auth Login Userpass Args 
- Login to vault using the userpass method
- ca_cert_ strdir 
- Path to directory containing CA certificate files to validate the server's certificate.
- ca_cert_ strfile 
- Path to a CA certificate file to validate the server's certificate.
- client_auth ProviderClient Auth Args 
- Client authentication credentials.
- headers
Sequence[ProviderHeader Args] 
- The headers to send with each Vault request.
- max_lease_ intttl_ seconds 
- Maximum TTL for secret leases requested by this provider.
It can also be sourced from the following environment variable: TERRAFORM_VAULT_MAX_TTL
- max_retries int
- Maximum number of retries when a 5xx error code is encountered.
It can also be sourced from the following environment variable: VAULT_MAX_RETRIES
- max_retries_ intccc 
- Maximum number of retries for Client Controlled Consistency related operations
- namespace str
- The namespace to use. Available only for Vault Enterprise.
- set_namespace_ boolfrom_ token 
- In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
- skip_child_ booltoken 
- Set this to true to prevent the creation of ephemeral child token used by this provider.
- skip_get_ boolvault_ version 
- Skip the dynamic fetching of the Vault server version.
- skip_tls_ boolverify 
- Set this to true only if the target Vault server is an insecure development instance.
It can also be sourced from the following environment variable: VAULT_SKIP_VERIFY
- tls_server_ strname 
- Name to use as the SNI host when connecting via TLS.
- token_name str
- Token name to use for creating the Vault child token.
- vault_version_ stroverride 
- Override the Vault server version, which is normally determined dynamically from the target Vault server
- address String
- URL of the root of the target Vault server.
- token String
- Token to use to authenticate to Vault.
- addAddress StringTo Env 
- authLogin Property Map
- Login to vault with an existing auth method using auth//login
- authLogin Property MapAws 
- Login to vault using the AWS method
- authLogin Property MapAzure 
- Login to vault using the azure method
- authLogin Property MapCert 
- Login to vault using the cert method
- authLogin Property MapGcp 
- Login to vault using the gcp method
- authLogin Property MapJwt 
- Login to vault using the jwt method
- authLogin Property MapKerberos 
- Login to vault using the kerberos method
- authLogin Property MapOci 
- Login to vault using the OCI method
- authLogin Property MapOidc 
- Login to vault using the oidc method
- authLogin Property MapRadius 
- Login to vault using the radius method
- authLogin Property MapToken File 
- Login to vault using
- authLogin Property MapUserpass 
- Login to vault using the userpass method
- caCert StringDir 
- Path to directory containing CA certificate files to validate the server's certificate.
- caCert StringFile 
- Path to a CA certificate file to validate the server's certificate.
- clientAuth Property Map
- Client authentication credentials.
- headers List<Property Map>
- The headers to send with each Vault request.
- maxLease NumberTtl Seconds 
- Maximum TTL for secret leases requested by this provider.
It can also be sourced from the following environment variable: TERRAFORM_VAULT_MAX_TTL
- maxRetries Number
- Maximum number of retries when a 5xx error code is encountered.
It can also be sourced from the following environment variable: VAULT_MAX_RETRIES
- maxRetries NumberCcc 
- Maximum number of retries for Client Controlled Consistency related operations
- namespace String
- The namespace to use. Available only for Vault Enterprise.
- setNamespace BooleanFrom Token 
- In the case where the Vault token is for a specific namespace and the provider namespace is not configured, use the token namespace as the root namespace for all resources.
- skipChild BooleanToken 
- Set this to true to prevent the creation of ephemeral child token used by this provider.
- skipGet BooleanVault Version 
- Skip the dynamic fetching of the Vault server version.
- skipTls BooleanVerify 
- Set this to true only if the target Vault server is an insecure development instance.
It can also be sourced from the following environment variable: VAULT_SKIP_VERIFY
- tlsServer StringName 
- Name to use as the SNI host when connecting via TLS.
- tokenName String
- Token name to use for creating the Vault child token.
- vaultVersion StringOverride 
- Override the Vault server version, which is normally determined dynamically from the target Vault server
Outputs
All input properties are implicitly available as output properties. Additionally, the Provider resource produces the following output properties:
- Id string
- The provider-assigned unique ID for this managed resource.
- Id string
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
- id string
- The provider-assigned unique ID for this managed resource.
- id str
- The provider-assigned unique ID for this managed resource.
- id String
- The provider-assigned unique ID for this managed resource.
Supporting Types
ProviderAuthLogin, ProviderAuthLoginArgs      
- Path string
- Method string
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- Parameters Dictionary<string, string>
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- Path string
- Method string
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- Parameters map[string]string
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- path String
- method String
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- parameters Map<String,String>
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- path string
- method string
- namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- parameters {[key: string]: string}
- useRoot booleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- path str
- method str
- namespace str
- The authentication engine's namespace. Conflicts with use_root_namespace
- parameters Mapping[str, str]
- use_root_ boolnamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- path String
- method String
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- parameters Map<String>
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
ProviderAuthLoginAws, ProviderAuthLoginAwsArgs        
- Role string
- The Vault role to use when logging into Vault.
- AwsAccess stringKey Id 
- The AWS access key ID.
- AwsIam stringEndpoint 
- The IAM endpoint URL.
- AwsProfile string
- The name of the AWS profile.
- AwsRegion string
- The AWS region.
- AwsRole stringArn 
- The ARN of the AWS Role to assume.Used during STS AssumeRole
- AwsRole stringSession Name 
- Specifies the name to attach to the AWS role session. Used during STS AssumeRole
- AwsSecret stringAccess Key 
- The AWS secret access key.
- AwsSession stringToken 
- The AWS session token.
- string
- Path to the AWS shared credentials file.
- AwsSts stringEndpoint 
- The STS endpoint URL.
- AwsWeb stringIdentity Token File 
- Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
- HeaderValue string
- The Vault header value to include in the STS signing request.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- Role string
- The Vault role to use when logging into Vault.
- AwsAccess stringKey Id 
- The AWS access key ID.
- AwsIam stringEndpoint 
- The IAM endpoint URL.
- AwsProfile string
- The name of the AWS profile.
- AwsRegion string
- The AWS region.
- AwsRole stringArn 
- The ARN of the AWS Role to assume.Used during STS AssumeRole
- AwsRole stringSession Name 
- Specifies the name to attach to the AWS role session. Used during STS AssumeRole
- AwsSecret stringAccess Key 
- The AWS secret access key.
- AwsSession stringToken 
- The AWS session token.
- string
- Path to the AWS shared credentials file.
- AwsSts stringEndpoint 
- The STS endpoint URL.
- AwsWeb stringIdentity Token File 
- Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
- HeaderValue string
- The Vault header value to include in the STS signing request.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- role String
- The Vault role to use when logging into Vault.
- awsAccess StringKey Id 
- The AWS access key ID.
- awsIam StringEndpoint 
- The IAM endpoint URL.
- awsProfile String
- The name of the AWS profile.
- awsRegion String
- The AWS region.
- awsRole StringArn 
- The ARN of the AWS Role to assume.Used during STS AssumeRole
- awsRole StringSession Name 
- Specifies the name to attach to the AWS role session. Used during STS AssumeRole
- awsSecret StringAccess Key 
- The AWS secret access key.
- awsSession StringToken 
- The AWS session token.
- String
- Path to the AWS shared credentials file.
- awsSts StringEndpoint 
- The STS endpoint URL.
- awsWeb StringIdentity Token File 
- Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
- headerValue String
- The Vault header value to include in the STS signing request.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- role string
- The Vault role to use when logging into Vault.
- awsAccess stringKey Id 
- The AWS access key ID.
- awsIam stringEndpoint 
- The IAM endpoint URL.
- awsProfile string
- The name of the AWS profile.
- awsRegion string
- The AWS region.
- awsRole stringArn 
- The ARN of the AWS Role to assume.Used during STS AssumeRole
- awsRole stringSession Name 
- Specifies the name to attach to the AWS role session. Used during STS AssumeRole
- awsSecret stringAccess Key 
- The AWS secret access key.
- awsSession stringToken 
- The AWS session token.
- string
- Path to the AWS shared credentials file.
- awsSts stringEndpoint 
- The STS endpoint URL.
- awsWeb stringIdentity Token File 
- Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
- headerValue string
- The Vault header value to include in the STS signing request.
- mount string
- The path where the authentication engine is mounted.
- namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot booleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- role str
- The Vault role to use when logging into Vault.
- aws_access_ strkey_ id 
- The AWS access key ID.
- aws_iam_ strendpoint 
- The IAM endpoint URL.
- aws_profile str
- The name of the AWS profile.
- aws_region str
- The AWS region.
- aws_role_ strarn 
- The ARN of the AWS Role to assume.Used during STS AssumeRole
- aws_role_ strsession_ name 
- Specifies the name to attach to the AWS role session. Used during STS AssumeRole
- aws_secret_ straccess_ key 
- The AWS secret access key.
- aws_session_ strtoken 
- The AWS session token.
- str
- Path to the AWS shared credentials file.
- aws_sts_ strendpoint 
- The STS endpoint URL.
- aws_web_ stridentity_ token_ file 
- Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
- header_value str
- The Vault header value to include in the STS signing request.
- mount str
- The path where the authentication engine is mounted.
- namespace str
- The authentication engine's namespace. Conflicts with use_root_namespace
- use_root_ boolnamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- role String
- The Vault role to use when logging into Vault.
- awsAccess StringKey Id 
- The AWS access key ID.
- awsIam StringEndpoint 
- The IAM endpoint URL.
- awsProfile String
- The name of the AWS profile.
- awsRegion String
- The AWS region.
- awsRole StringArn 
- The ARN of the AWS Role to assume.Used during STS AssumeRole
- awsRole StringSession Name 
- Specifies the name to attach to the AWS role session. Used during STS AssumeRole
- awsSecret StringAccess Key 
- The AWS secret access key.
- awsSession StringToken 
- The AWS session token.
- String
- Path to the AWS shared credentials file.
- awsSts StringEndpoint 
- The STS endpoint URL.
- awsWeb StringIdentity Token File 
- Path to the file containing an OAuth 2.0 access token or OpenID Connect ID token.
- headerValue String
- The Vault header value to include in the STS signing request.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
ProviderAuthLoginAzure, ProviderAuthLoginAzureArgs        
- ResourceGroup stringName 
- The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
- Role string
- Name of the login role.
- SubscriptionId string
- The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
- ClientId string
- The identity's client ID.
- Jwt string
- A signed JSON Web Token. If not specified on will be created automatically
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- Scope string
- The scopes to include in the token request.
- TenantId string
- Provides the tenant ID to use in a multi-tenant authentication scenario.
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- VmName string
- The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
- VmssName string
- The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
- ResourceGroup stringName 
- The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
- Role string
- Name of the login role.
- SubscriptionId string
- The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
- ClientId string
- The identity's client ID.
- Jwt string
- A signed JSON Web Token. If not specified on will be created automatically
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- Scope string
- The scopes to include in the token request.
- TenantId string
- Provides the tenant ID to use in a multi-tenant authentication scenario.
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- VmName string
- The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
- VmssName string
- The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
- resourceGroup StringName 
- The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
- role String
- Name of the login role.
- subscriptionId String
- The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
- clientId String
- The identity's client ID.
- jwt String
- A signed JSON Web Token. If not specified on will be created automatically
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- scope String
- The scopes to include in the token request.
- tenantId String
- Provides the tenant ID to use in a multi-tenant authentication scenario.
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- vmName String
- The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
- vmssName String
- The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
- resourceGroup stringName 
- The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
- role string
- Name of the login role.
- subscriptionId string
- The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
- clientId string
- The identity's client ID.
- jwt string
- A signed JSON Web Token. If not specified on will be created automatically
- mount string
- The path where the authentication engine is mounted.
- namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- scope string
- The scopes to include in the token request.
- tenantId string
- Provides the tenant ID to use in a multi-tenant authentication scenario.
- useRoot booleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- vmName string
- The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
- vmssName string
- The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
- resource_group_ strname 
- The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
- role str
- Name of the login role.
- subscription_id str
- The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
- client_id str
- The identity's client ID.
- jwt str
- A signed JSON Web Token. If not specified on will be created automatically
- mount str
- The path where the authentication engine is mounted.
- namespace str
- The authentication engine's namespace. Conflicts with use_root_namespace
- scope str
- The scopes to include in the token request.
- tenant_id str
- Provides the tenant ID to use in a multi-tenant authentication scenario.
- use_root_ boolnamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- vm_name str
- The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
- vmss_name str
- The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
- resourceGroup StringName 
- The resource group for the machine that generated the MSI token. This information can be obtained through instance metadata.
- role String
- Name of the login role.
- subscriptionId String
- The subscription ID for the machine that generated the MSI token. This information can be obtained through instance metadata.
- clientId String
- The identity's client ID.
- jwt String
- A signed JSON Web Token. If not specified on will be created automatically
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- scope String
- The scopes to include in the token request.
- tenantId String
- Provides the tenant ID to use in a multi-tenant authentication scenario.
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- vmName String
- The virtual machine name for the machine that generated the MSI token. This information can be obtained through instance metadata.
- vmssName String
- The virtual machine scale set name for the machine that generated the MSI token. This information can be obtained through instance metadata.
ProviderAuthLoginCert, ProviderAuthLoginCertArgs        
- CertFile string
- Path to a file containing the client certificate.
- KeyFile string
- Path to a file containing the private key that the certificate was issued for.
- Mount string
- The path where the authentication engine is mounted.
- Name string
- Name of the certificate's role
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- CertFile string
- Path to a file containing the client certificate.
- KeyFile string
- Path to a file containing the private key that the certificate was issued for.
- Mount string
- The path where the authentication engine is mounted.
- Name string
- Name of the certificate's role
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- certFile String
- Path to a file containing the client certificate.
- keyFile String
- Path to a file containing the private key that the certificate was issued for.
- mount String
- The path where the authentication engine is mounted.
- name String
- Name of the certificate's role
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- certFile string
- Path to a file containing the client certificate.
- keyFile string
- Path to a file containing the private key that the certificate was issued for.
- mount string
- The path where the authentication engine is mounted.
- name string
- Name of the certificate's role
- namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot booleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- cert_file str
- Path to a file containing the client certificate.
- key_file str
- Path to a file containing the private key that the certificate was issued for.
- mount str
- The path where the authentication engine is mounted.
- name str
- Name of the certificate's role
- namespace str
- The authentication engine's namespace. Conflicts with use_root_namespace
- use_root_ boolnamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- certFile String
- Path to a file containing the client certificate.
- keyFile String
- Path to a file containing the private key that the certificate was issued for.
- mount String
- The path where the authentication engine is mounted.
- name String
- Name of the certificate's role
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
ProviderAuthLoginGcp, ProviderAuthLoginGcpArgs        
- Role string
- Name of the login role.
- Credentials string
- Path to the Google Cloud credentials file.
- Jwt string
- A signed JSON Web Token.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- ServiceAccount string
- IAM service account.
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- Role string
- Name of the login role.
- Credentials string
- Path to the Google Cloud credentials file.
- Jwt string
- A signed JSON Web Token.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- ServiceAccount string
- IAM service account.
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- role String
- Name of the login role.
- credentials String
- Path to the Google Cloud credentials file.
- jwt String
- A signed JSON Web Token.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- serviceAccount String
- IAM service account.
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- role string
- Name of the login role.
- credentials string
- Path to the Google Cloud credentials file.
- jwt string
- A signed JSON Web Token.
- mount string
- The path where the authentication engine is mounted.
- namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- serviceAccount string
- IAM service account.
- useRoot booleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- role str
- Name of the login role.
- credentials str
- Path to the Google Cloud credentials file.
- jwt str
- A signed JSON Web Token.
- mount str
- The path where the authentication engine is mounted.
- namespace str
- The authentication engine's namespace. Conflicts with use_root_namespace
- service_account str
- IAM service account.
- use_root_ boolnamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- role String
- Name of the login role.
- credentials String
- Path to the Google Cloud credentials file.
- jwt String
- A signed JSON Web Token.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- serviceAccount String
- IAM service account.
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
ProviderAuthLoginJwt, ProviderAuthLoginJwtArgs        
- Jwt string
- A signed JSON Web Token.
- Role string
- Name of the login role.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- Jwt string
- A signed JSON Web Token.
- Role string
- Name of the login role.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- jwt String
- A signed JSON Web Token.
- role String
- Name of the login role.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- jwt string
- A signed JSON Web Token.
- role string
- Name of the login role.
- mount string
- The path where the authentication engine is mounted.
- namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot booleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- jwt str
- A signed JSON Web Token.
- role str
- Name of the login role.
- mount str
- The path where the authentication engine is mounted.
- namespace str
- The authentication engine's namespace. Conflicts with use_root_namespace
- use_root_ boolnamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- jwt String
- A signed JSON Web Token.
- role String
- Name of the login role.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
ProviderAuthLoginKerberos, ProviderAuthLoginKerberosArgs        
- DisableFast boolNegotiation 
- Disable the Kerberos FAST negotiation.
- KeytabPath string
- The Kerberos keytab file containing the entry of the login entity.
- Krb5confPath string
- A valid Kerberos configuration file e.g. /etc/krb5.conf.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- Realm string
- The Kerberos server's authoritative authentication domain
- RemoveInstance boolName 
- Strip the host from the username found in the keytab.
- Service string
- The service principle name.
- Token string
- Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- Username string
- The username to login into Kerberos with.
- DisableFast boolNegotiation 
- Disable the Kerberos FAST negotiation.
- KeytabPath string
- The Kerberos keytab file containing the entry of the login entity.
- Krb5confPath string
- A valid Kerberos configuration file e.g. /etc/krb5.conf.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- Realm string
- The Kerberos server's authoritative authentication domain
- RemoveInstance boolName 
- Strip the host from the username found in the keytab.
- Service string
- The service principle name.
- Token string
- Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- Username string
- The username to login into Kerberos with.
- disableFast BooleanNegotiation 
- Disable the Kerberos FAST negotiation.
- keytabPath String
- The Kerberos keytab file containing the entry of the login entity.
- krb5confPath String
- A valid Kerberos configuration file e.g. /etc/krb5.conf.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- realm String
- The Kerberos server's authoritative authentication domain
- removeInstance BooleanName 
- Strip the host from the username found in the keytab.
- service String
- The service principle name.
- token String
- Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- username String
- The username to login into Kerberos with.
- disableFast booleanNegotiation 
- Disable the Kerberos FAST negotiation.
- keytabPath string
- The Kerberos keytab file containing the entry of the login entity.
- krb5confPath string
- A valid Kerberos configuration file e.g. /etc/krb5.conf.
- mount string
- The path where the authentication engine is mounted.
- namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- realm string
- The Kerberos server's authoritative authentication domain
- removeInstance booleanName 
- Strip the host from the username found in the keytab.
- service string
- The service principle name.
- token string
- Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
- useRoot booleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- username string
- The username to login into Kerberos with.
- disable_fast_ boolnegotiation 
- Disable the Kerberos FAST negotiation.
- keytab_path str
- The Kerberos keytab file containing the entry of the login entity.
- krb5conf_path str
- A valid Kerberos configuration file e.g. /etc/krb5.conf.
- mount str
- The path where the authentication engine is mounted.
- namespace str
- The authentication engine's namespace. Conflicts with use_root_namespace
- realm str
- The Kerberos server's authoritative authentication domain
- remove_instance_ boolname 
- Strip the host from the username found in the keytab.
- service str
- The service principle name.
- token str
- Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
- use_root_ boolnamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- username str
- The username to login into Kerberos with.
- disableFast BooleanNegotiation 
- Disable the Kerberos FAST negotiation.
- keytabPath String
- The Kerberos keytab file containing the entry of the login entity.
- krb5confPath String
- A valid Kerberos configuration file e.g. /etc/krb5.conf.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- realm String
- The Kerberos server's authoritative authentication domain
- removeInstance BooleanName 
- Strip the host from the username found in the keytab.
- service String
- The service principle name.
- token String
- Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) token
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- username String
- The username to login into Kerberos with.
ProviderAuthLoginOci, ProviderAuthLoginOciArgs        
- AuthType string
- Authentication type to use when getting OCI credentials.
- Role string
- Name of the login role.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- AuthType string
- Authentication type to use when getting OCI credentials.
- Role string
- Name of the login role.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- authType String
- Authentication type to use when getting OCI credentials.
- role String
- Name of the login role.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- authType string
- Authentication type to use when getting OCI credentials.
- role string
- Name of the login role.
- mount string
- The path where the authentication engine is mounted.
- namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot booleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- auth_type str
- Authentication type to use when getting OCI credentials.
- role str
- Name of the login role.
- mount str
- The path where the authentication engine is mounted.
- namespace str
- The authentication engine's namespace. Conflicts with use_root_namespace
- use_root_ boolnamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- authType String
- Authentication type to use when getting OCI credentials.
- role String
- Name of the login role.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
ProviderAuthLoginOidc, ProviderAuthLoginOidcArgs        
- Role string
- Name of the login role.
- CallbackAddress string
- The callback address. Must be a valid URI without the path.
- CallbackListener stringAddress 
- The callback listener's address. Must be a valid URI without the path.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- Role string
- Name of the login role.
- CallbackAddress string
- The callback address. Must be a valid URI without the path.
- CallbackListener stringAddress 
- The callback listener's address. Must be a valid URI without the path.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- role String
- Name of the login role.
- callbackAddress String
- The callback address. Must be a valid URI without the path.
- callbackListener StringAddress 
- The callback listener's address. Must be a valid URI without the path.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- role string
- Name of the login role.
- callbackAddress string
- The callback address. Must be a valid URI without the path.
- callbackListener stringAddress 
- The callback listener's address. Must be a valid URI without the path.
- mount string
- The path where the authentication engine is mounted.
- namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot booleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- role str
- Name of the login role.
- callback_address str
- The callback address. Must be a valid URI without the path.
- callback_listener_ straddress 
- The callback listener's address. Must be a valid URI without the path.
- mount str
- The path where the authentication engine is mounted.
- namespace str
- The authentication engine's namespace. Conflicts with use_root_namespace
- use_root_ boolnamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- role String
- Name of the login role.
- callbackAddress String
- The callback address. Must be a valid URI without the path.
- callbackListener StringAddress 
- The callback listener's address. Must be a valid URI without the path.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
ProviderAuthLoginRadius, ProviderAuthLoginRadiusArgs        
- Password string
- The Radius password for username.
- Username string
- The Radius username.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- Password string
- The Radius password for username.
- Username string
- The Radius username.
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- password String
- The Radius password for username.
- username String
- The Radius username.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- password string
- The Radius password for username.
- username string
- The Radius username.
- mount string
- The path where the authentication engine is mounted.
- namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot booleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- password str
- The Radius password for username.
- username str
- The Radius username.
- mount str
- The path where the authentication engine is mounted.
- namespace str
- The authentication engine's namespace. Conflicts with use_root_namespace
- use_root_ boolnamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- password String
- The Radius password for username.
- username String
- The Radius username.
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
ProviderAuthLoginTokenFile, ProviderAuthLoginTokenFileArgs          
- Filename string
- The name of a file containing a single line that is a valid Vault token
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- Filename string
- The name of a file containing a single line that is a valid Vault token
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- filename String
- The name of a file containing a single line that is a valid Vault token
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- filename string
- The name of a file containing a single line that is a valid Vault token
- namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot booleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- filename str
- The name of a file containing a single line that is a valid Vault token
- namespace str
- The authentication engine's namespace. Conflicts with use_root_namespace
- use_root_ boolnamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- filename String
- The name of a file containing a single line that is a valid Vault token
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
ProviderAuthLoginUserpass, ProviderAuthLoginUserpassArgs        
- Username string
- Login with username
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- Password string
- Login with password
- PasswordFile string
- Login with password from a file
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- Username string
- Login with username
- Mount string
- The path where the authentication engine is mounted.
- Namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- Password string
- Login with password
- PasswordFile string
- Login with password from a file
- UseRoot boolNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- username String
- Login with username
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- password String
- Login with password
- passwordFile String
- Login with password from a file
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- username string
- Login with username
- mount string
- The path where the authentication engine is mounted.
- namespace string
- The authentication engine's namespace. Conflicts with use_root_namespace
- password string
- Login with password
- passwordFile string
- Login with password from a file
- useRoot booleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- username str
- Login with username
- mount str
- The path where the authentication engine is mounted.
- namespace str
- The authentication engine's namespace. Conflicts with use_root_namespace
- password str
- Login with password
- password_file str
- Login with password from a file
- use_root_ boolnamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
- username String
- Login with username
- mount String
- The path where the authentication engine is mounted.
- namespace String
- The authentication engine's namespace. Conflicts with use_root_namespace
- password String
- Login with password
- passwordFile String
- Login with password from a file
- useRoot BooleanNamespace 
- Authenticate to the root Vault namespace. Conflicts with namespace
ProviderClientAuth, ProviderClientAuthArgs      
ProviderHeader, ProviderHeaderArgs    
Package Details
- Repository
- Vault pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the vaultTerraform Provider.