keyvault
dodevops/keyvault/azure
Highly opinionaged management of keyvault resources in Azure
Azure Keyvault management Introduction This module manages a keyvault resource in Azure with the required permissions. Usage Instantiate the module by calling it from Terraform like this: ``hcl module "azure-keyvault" { source = "dodevops/keyvault/azure" version = " " (...) } ` Requirements No requirements. Providers The following providers are used by this module: - azurerm Modules No modules. Resources The following resources are used by this module: - azurerm_key_vault.keyvault (resource) - azurerm_key_vault_access_policy.keyvault-access-policy-objectid-apps-createonly (resource) - azurerm_key_vault_access_policy.keyvault-access-policy-objectid-apps-fullaccess (resource) - azurerm_key_vault_access_policy.keyvault-access-policy-objectid-apps-readonly (resource) - azurerm_key_vault_access
| Name | Type | Description | Default |
|---|---|---|---|
| network_acls_virtual_network_subnet_ids | list(string) | List of one or more Subnet IDs which should be able to access this Key Vault. If | required |
| location | string | The azure location used for azure | required |
| azure_tenant_id | string | The tenant id used for azure | required |
| project | string | Three letter project key | required |
| stage | string | Stage for this ressource group | required |
| resource_group | string | Azure Resource Group to use | required |
| network_acls_ip_rules | list(string) | List of one or more IP Addresses, or CIDR Blocks which should be able to access | required |
| allowed_objectid_app_tuples_createonly | list(string) | A list of object IDs with allowed apps (in the form of <objectid>:<app>) that ar | [] |
| enable_audit | bool | Enable audit of keyvault changes | false |
| tags | map(any) | Map of tags for the resources | {} |
| allowed_objectids_fullaccess | list(string) | A list of object IDs that are allowed to fully access the keyvault elements (wit | [] |
| soft_delete_retention_days | number | The number of days that items should be retained for once soft-deleted. This val | 14 |
| network_acls_bypass | string | Specifies which traffic can bypass the network rules. Possible values are AzureS | "None" |
| allowed_objectids_createonly | list(string) | A list of object IDs that are allowed to create (but not read or change) element | [] |
| sku | string | Keyvault sku | "standard" |
| allowed_objectid_app_tuples_fullaccess | list(string) | A list of object IDs with allowed apps (in the form of <objectid>:<app>) that ar | [] |
| allowed_objectids_readonly | list(string) | A list of object IDs that are allowed to read elements in the keyvault | [] |
| allowed_objectid_app_tuples_readonly | list(string) | A list of object IDs with allowed apps (in the form of <objectid>:<app>) that ar | [] |
| network_acls_default_action | string | The Default Action to use when no rules match from ip_rules / virtual_network_su | "Deny" |
vault_idTerraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Azure Verified Pattern Module for Azure Landing Zone
Terraform Azure Verified Resource Module for Key Vault
Terraform module for building and deploying Next.js apps to AWS. Supports SSR (L