» vault_azure_secret_backend

Creates an Azure Secret Backend for Vault.

The Azure secrets engine dynamically generates Azure service principals and role assignments. Vault roles can be mapped to one or more Azure roles, providing a simple, flexible way to manage the permissions granted to generated service principals.

» Example Usage

resource "vault_azure_secret_backend" "azure" {
  subscription_id = "11111111-2222-3333-4444-111111111111"
  tenant_id = "11111111-2222-3333-4444-222222222222"
  client_id = "11111111-2222-3333-4444-333333333333"
  client_secret = "12345678901234567890"
  environment = "AzurePublicCloud"

» Argument Reference

The following arguments are supported:

  • subscription_id (string: <required>) - The subscription id for the Azure Active Directory.
  • tenant_id (string: <required>) - The tenant id for the Azure Active Directory.
  • client_id (string:"") - The OAuth2 client id to connect to Azure.
  • client_secret (string:"") - The OAuth2 client secret to connect to Azure.
  • environment (string:"") - The Azure environment.
  • path (string: <optional>) - The unique path this backend should be mounted at. Defaults to azure.

» Attributes Reference

No additional attributes are exported by this resource.