key-vault
aztfm/key-vault/azurerm
Terraform module for Microsoft Azure to manage Key Vault resource.
Azure Key Vault - Terraform Module   !GitHub release (latest by date)  Version compatibility | Module version | Terraform version | AzureRM version | | -------------- | ----------------- | --------------- | | >= 2.x.x | >= 1.3.x | >= 3.69.0 | | >= 1.x.x | >= 0.13.x | >= 2.34.0 | Parameters The following parameters are supported: | Name | Description | Type | Default | Required | | ---- | ----------- | :--: | :-----: | :------: | |name|Specifies the name of the Key Vault. Changing this forces a new resource to be created.|string|n/a|yes| |resource\_group\_name|Th
| Name | Type | Description | Default |
|---|---|---|---|
| resource_group_name | string | The name of the resource group in which to create the Key Vault. Changing this f | required |
| location | string | The location/region where the Key Vault is created. | required |
| sku_name | string | The Name of the SKU used for this Key Vault. Possible values are standard and pr | required |
| tenant_id | string | The Azure Active Directory tenant ID that should be used for authenticating requ | required |
| name | string | Specifies the name of the Key Vault. Changing this forces a new resource to be c | required |
| enabled_for_disk_encryption | bool | Boolean flag to specify whether Azure Disk Encryption is permitted to retrieve s | false |
| tags | map(string) | A mapping of tags to assign to the resource. | {} |
| purge_protection_enabled | bool | Is Purge Protection enabled for this Key Vault? | false |
| enabled_for_deployment | bool | Boolean flag to specify whether Azure Virtual Machines are permitted to retrieve | false |
| soft_delete_retention_days | number | The number of days that items should be retained for once soft-deleted. This val | 90 |
| enabled_for_template_deployment | bool | Boolean flag to specify whether Azure Resource Manager is permitted to retrieve | false |
| contacts | list(object({ email = stri | List of objects that represent each contact. | [] |
| enable_rbac_authorization | bool | Boolean flag to specify whether Azure Key Vault uses Role Based Access Control ( | false |
| access_policies | list(object({ object_id | List of objects that represent the configuration of each access policies. | [] |
| keys | list(object({ name | List of objects that represent the configuration of each key. | [] |
| secrets | list(object({ name | List of objects that represent the configuration of each secrect. | [] |
resource_group_name — The name of the resource group in which to create the virtual network.tags — The tags assigned to the resource.contacts — Blocks containing each contact.keys — Blocks containing configuration of each key.secrets — Blocks containing configuration of each secret.id — The virtual network configuration ID.location — The location/region where the virtual network is created.access_policies — Blocks containing configuration of each access policy.name — The name of the virtual network.Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,