pulumi-vault 7.6.0a1764657486__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (274) hide show
  1. pulumi_vault/__init__.py +1399 -0
  2. pulumi_vault/_inputs.py +2701 -0
  3. pulumi_vault/_utilities.py +331 -0
  4. pulumi_vault/ad/__init__.py +12 -0
  5. pulumi_vault/ad/get_access_credentials.py +177 -0
  6. pulumi_vault/ad/secret_backend.py +1916 -0
  7. pulumi_vault/ad/secret_library.py +546 -0
  8. pulumi_vault/ad/secret_role.py +499 -0
  9. pulumi_vault/alicloud/__init__.py +9 -0
  10. pulumi_vault/alicloud/auth_backend_role.py +866 -0
  11. pulumi_vault/approle/__init__.py +12 -0
  12. pulumi_vault/approle/auth_backend_login.py +571 -0
  13. pulumi_vault/approle/auth_backend_role.py +1082 -0
  14. pulumi_vault/approle/auth_backend_role_secret_id.py +796 -0
  15. pulumi_vault/approle/get_auth_backend_role_id.py +169 -0
  16. pulumi_vault/audit.py +499 -0
  17. pulumi_vault/audit_request_header.py +277 -0
  18. pulumi_vault/auth_backend.py +565 -0
  19. pulumi_vault/aws/__init__.py +22 -0
  20. pulumi_vault/aws/auth_backend_cert.py +420 -0
  21. pulumi_vault/aws/auth_backend_client.py +1259 -0
  22. pulumi_vault/aws/auth_backend_config_identity.py +494 -0
  23. pulumi_vault/aws/auth_backend_identity_whitelist.py +380 -0
  24. pulumi_vault/aws/auth_backend_login.py +1046 -0
  25. pulumi_vault/aws/auth_backend_role.py +1961 -0
  26. pulumi_vault/aws/auth_backend_role_tag.py +638 -0
  27. pulumi_vault/aws/auth_backend_roletag_blacklist.py +366 -0
  28. pulumi_vault/aws/auth_backend_sts_role.py +414 -0
  29. pulumi_vault/aws/get_access_credentials.py +369 -0
  30. pulumi_vault/aws/get_static_access_credentials.py +137 -0
  31. pulumi_vault/aws/secret_backend.py +2018 -0
  32. pulumi_vault/aws/secret_backend_role.py +1188 -0
  33. pulumi_vault/aws/secret_backend_static_role.py +639 -0
  34. pulumi_vault/azure/__init__.py +15 -0
  35. pulumi_vault/azure/_inputs.py +108 -0
  36. pulumi_vault/azure/auth_backend_config.py +1096 -0
  37. pulumi_vault/azure/auth_backend_role.py +1176 -0
  38. pulumi_vault/azure/backend.py +1793 -0
  39. pulumi_vault/azure/backend_role.py +883 -0
  40. pulumi_vault/azure/get_access_credentials.py +400 -0
  41. pulumi_vault/azure/outputs.py +107 -0
  42. pulumi_vault/cert_auth_backend_role.py +1539 -0
  43. pulumi_vault/config/__init__.py +9 -0
  44. pulumi_vault/config/__init__.pyi +164 -0
  45. pulumi_vault/config/_inputs.py +73 -0
  46. pulumi_vault/config/outputs.py +1225 -0
  47. pulumi_vault/config/ui_custom_message.py +530 -0
  48. pulumi_vault/config/vars.py +230 -0
  49. pulumi_vault/consul/__init__.py +10 -0
  50. pulumi_vault/consul/secret_backend.py +1517 -0
  51. pulumi_vault/consul/secret_backend_role.py +847 -0
  52. pulumi_vault/database/__init__.py +14 -0
  53. pulumi_vault/database/_inputs.py +11907 -0
  54. pulumi_vault/database/outputs.py +8496 -0
  55. pulumi_vault/database/secret_backend_connection.py +1676 -0
  56. pulumi_vault/database/secret_backend_role.py +840 -0
  57. pulumi_vault/database/secret_backend_static_role.py +881 -0
  58. pulumi_vault/database/secrets_mount.py +2160 -0
  59. pulumi_vault/egp_policy.py +399 -0
  60. pulumi_vault/gcp/__init__.py +17 -0
  61. pulumi_vault/gcp/_inputs.py +441 -0
  62. pulumi_vault/gcp/auth_backend.py +1486 -0
  63. pulumi_vault/gcp/auth_backend_role.py +1235 -0
  64. pulumi_vault/gcp/get_auth_backend_role.py +514 -0
  65. pulumi_vault/gcp/outputs.py +302 -0
  66. pulumi_vault/gcp/secret_backend.py +1807 -0
  67. pulumi_vault/gcp/secret_impersonated_account.py +484 -0
  68. pulumi_vault/gcp/secret_roleset.py +554 -0
  69. pulumi_vault/gcp/secret_static_account.py +557 -0
  70. pulumi_vault/generic/__init__.py +11 -0
  71. pulumi_vault/generic/endpoint.py +786 -0
  72. pulumi_vault/generic/get_secret.py +306 -0
  73. pulumi_vault/generic/secret.py +486 -0
  74. pulumi_vault/get_auth_backend.py +226 -0
  75. pulumi_vault/get_auth_backends.py +170 -0
  76. pulumi_vault/get_namespace.py +226 -0
  77. pulumi_vault/get_namespaces.py +202 -0
  78. pulumi_vault/get_nomad_access_token.py +210 -0
  79. pulumi_vault/get_policy_document.py +160 -0
  80. pulumi_vault/get_raft_autopilot_state.py +267 -0
  81. pulumi_vault/github/__init__.py +13 -0
  82. pulumi_vault/github/_inputs.py +225 -0
  83. pulumi_vault/github/auth_backend.py +1194 -0
  84. pulumi_vault/github/outputs.py +174 -0
  85. pulumi_vault/github/team.py +380 -0
  86. pulumi_vault/github/user.py +380 -0
  87. pulumi_vault/identity/__init__.py +35 -0
  88. pulumi_vault/identity/entity.py +447 -0
  89. pulumi_vault/identity/entity_alias.py +398 -0
  90. pulumi_vault/identity/entity_policies.py +455 -0
  91. pulumi_vault/identity/get_entity.py +384 -0
  92. pulumi_vault/identity/get_group.py +467 -0
  93. pulumi_vault/identity/get_oidc_client_creds.py +175 -0
  94. pulumi_vault/identity/get_oidc_openid_config.py +334 -0
  95. pulumi_vault/identity/get_oidc_public_keys.py +179 -0
  96. pulumi_vault/identity/group.py +805 -0
  97. pulumi_vault/identity/group_alias.py +386 -0
  98. pulumi_vault/identity/group_member_entity_ids.py +444 -0
  99. pulumi_vault/identity/group_member_group_ids.py +467 -0
  100. pulumi_vault/identity/group_policies.py +471 -0
  101. pulumi_vault/identity/mfa_duo.py +674 -0
  102. pulumi_vault/identity/mfa_login_enforcement.py +566 -0
  103. pulumi_vault/identity/mfa_okta.py +626 -0
  104. pulumi_vault/identity/mfa_pingid.py +616 -0
  105. pulumi_vault/identity/mfa_totp.py +758 -0
  106. pulumi_vault/identity/oidc.py +268 -0
  107. pulumi_vault/identity/oidc_assignment.py +375 -0
  108. pulumi_vault/identity/oidc_client.py +667 -0
  109. pulumi_vault/identity/oidc_key.py +474 -0
  110. pulumi_vault/identity/oidc_key_allowed_client_id.py +298 -0
  111. pulumi_vault/identity/oidc_provider.py +550 -0
  112. pulumi_vault/identity/oidc_role.py +543 -0
  113. pulumi_vault/identity/oidc_scope.py +355 -0
  114. pulumi_vault/identity/outputs.py +137 -0
  115. pulumi_vault/jwt/__init__.py +12 -0
  116. pulumi_vault/jwt/_inputs.py +225 -0
  117. pulumi_vault/jwt/auth_backend.py +1347 -0
  118. pulumi_vault/jwt/auth_backend_role.py +1847 -0
  119. pulumi_vault/jwt/outputs.py +174 -0
  120. pulumi_vault/kmip/__init__.py +11 -0
  121. pulumi_vault/kmip/secret_backend.py +1591 -0
  122. pulumi_vault/kmip/secret_role.py +1194 -0
  123. pulumi_vault/kmip/secret_scope.py +372 -0
  124. pulumi_vault/kubernetes/__init__.py +15 -0
  125. pulumi_vault/kubernetes/auth_backend_config.py +654 -0
  126. pulumi_vault/kubernetes/auth_backend_role.py +1031 -0
  127. pulumi_vault/kubernetes/get_auth_backend_config.py +280 -0
  128. pulumi_vault/kubernetes/get_auth_backend_role.py +470 -0
  129. pulumi_vault/kubernetes/get_service_account_token.py +344 -0
  130. pulumi_vault/kubernetes/secret_backend.py +1341 -0
  131. pulumi_vault/kubernetes/secret_backend_role.py +1140 -0
  132. pulumi_vault/kv/__init__.py +18 -0
  133. pulumi_vault/kv/_inputs.py +124 -0
  134. pulumi_vault/kv/get_secret.py +240 -0
  135. pulumi_vault/kv/get_secret_subkeys_v2.py +275 -0
  136. pulumi_vault/kv/get_secret_v2.py +315 -0
  137. pulumi_vault/kv/get_secrets_list.py +186 -0
  138. pulumi_vault/kv/get_secrets_list_v2.py +243 -0
  139. pulumi_vault/kv/outputs.py +102 -0
  140. pulumi_vault/kv/secret.py +397 -0
  141. pulumi_vault/kv/secret_backend_v2.py +455 -0
  142. pulumi_vault/kv/secret_v2.py +970 -0
  143. pulumi_vault/ldap/__init__.py +19 -0
  144. pulumi_vault/ldap/_inputs.py +225 -0
  145. pulumi_vault/ldap/auth_backend.py +2520 -0
  146. pulumi_vault/ldap/auth_backend_group.py +386 -0
  147. pulumi_vault/ldap/auth_backend_user.py +439 -0
  148. pulumi_vault/ldap/get_dynamic_credentials.py +181 -0
  149. pulumi_vault/ldap/get_static_credentials.py +192 -0
  150. pulumi_vault/ldap/outputs.py +174 -0
  151. pulumi_vault/ldap/secret_backend.py +2207 -0
  152. pulumi_vault/ldap/secret_backend_dynamic_role.py +767 -0
  153. pulumi_vault/ldap/secret_backend_library_set.py +552 -0
  154. pulumi_vault/ldap/secret_backend_static_role.py +541 -0
  155. pulumi_vault/managed/__init__.py +11 -0
  156. pulumi_vault/managed/_inputs.py +944 -0
  157. pulumi_vault/managed/keys.py +398 -0
  158. pulumi_vault/managed/outputs.py +667 -0
  159. pulumi_vault/mfa_duo.py +589 -0
  160. pulumi_vault/mfa_okta.py +623 -0
  161. pulumi_vault/mfa_pingid.py +670 -0
  162. pulumi_vault/mfa_totp.py +620 -0
  163. pulumi_vault/mongodbatlas/__init__.py +10 -0
  164. pulumi_vault/mongodbatlas/secret_backend.py +388 -0
  165. pulumi_vault/mongodbatlas/secret_role.py +726 -0
  166. pulumi_vault/mount.py +1262 -0
  167. pulumi_vault/namespace.py +452 -0
  168. pulumi_vault/nomad_secret_backend.py +1559 -0
  169. pulumi_vault/nomad_secret_role.py +489 -0
  170. pulumi_vault/oci_auth_backend.py +676 -0
  171. pulumi_vault/oci_auth_backend_role.py +852 -0
  172. pulumi_vault/okta/__init__.py +13 -0
  173. pulumi_vault/okta/_inputs.py +320 -0
  174. pulumi_vault/okta/auth_backend.py +1231 -0
  175. pulumi_vault/okta/auth_backend_group.py +369 -0
  176. pulumi_vault/okta/auth_backend_user.py +416 -0
  177. pulumi_vault/okta/outputs.py +244 -0
  178. pulumi_vault/outputs.py +502 -0
  179. pulumi_vault/pkisecret/__init__.py +38 -0
  180. pulumi_vault/pkisecret/_inputs.py +270 -0
  181. pulumi_vault/pkisecret/backend_acme_eab.py +550 -0
  182. pulumi_vault/pkisecret/backend_config_acme.py +690 -0
  183. pulumi_vault/pkisecret/backend_config_auto_tidy.py +1370 -0
  184. pulumi_vault/pkisecret/backend_config_cluster.py +370 -0
  185. pulumi_vault/pkisecret/backend_config_cmpv2.py +693 -0
  186. pulumi_vault/pkisecret/backend_config_est.py +756 -0
  187. pulumi_vault/pkisecret/backend_config_scep.py +738 -0
  188. pulumi_vault/pkisecret/get_backend_cert_metadata.py +277 -0
  189. pulumi_vault/pkisecret/get_backend_config_cmpv2.py +226 -0
  190. pulumi_vault/pkisecret/get_backend_config_est.py +251 -0
  191. pulumi_vault/pkisecret/get_backend_config_scep.py +271 -0
  192. pulumi_vault/pkisecret/get_backend_issuer.py +395 -0
  193. pulumi_vault/pkisecret/get_backend_issuers.py +192 -0
  194. pulumi_vault/pkisecret/get_backend_key.py +211 -0
  195. pulumi_vault/pkisecret/get_backend_keys.py +192 -0
  196. pulumi_vault/pkisecret/outputs.py +270 -0
  197. pulumi_vault/pkisecret/secret_backend_cert.py +1315 -0
  198. pulumi_vault/pkisecret/secret_backend_config_ca.py +386 -0
  199. pulumi_vault/pkisecret/secret_backend_config_issuers.py +392 -0
  200. pulumi_vault/pkisecret/secret_backend_config_urls.py +462 -0
  201. pulumi_vault/pkisecret/secret_backend_crl_config.py +846 -0
  202. pulumi_vault/pkisecret/secret_backend_intermediate_cert_request.py +1629 -0
  203. pulumi_vault/pkisecret/secret_backend_intermediate_set_signed.py +444 -0
  204. pulumi_vault/pkisecret/secret_backend_issuer.py +1089 -0
  205. pulumi_vault/pkisecret/secret_backend_key.py +613 -0
  206. pulumi_vault/pkisecret/secret_backend_role.py +2694 -0
  207. pulumi_vault/pkisecret/secret_backend_root_cert.py +2134 -0
  208. pulumi_vault/pkisecret/secret_backend_root_sign_intermediate.py +2031 -0
  209. pulumi_vault/pkisecret/secret_backend_sign.py +1194 -0
  210. pulumi_vault/plugin.py +596 -0
  211. pulumi_vault/plugin_pinned_version.py +299 -0
  212. pulumi_vault/policy.py +279 -0
  213. pulumi_vault/provider.py +781 -0
  214. pulumi_vault/pulumi-plugin.json +5 -0
  215. pulumi_vault/py.typed +0 -0
  216. pulumi_vault/quota_lease_count.py +504 -0
  217. pulumi_vault/quota_rate_limit.py +751 -0
  218. pulumi_vault/rabbitmq/__init__.py +12 -0
  219. pulumi_vault/rabbitmq/_inputs.py +235 -0
  220. pulumi_vault/rabbitmq/outputs.py +144 -0
  221. pulumi_vault/rabbitmq/secret_backend.py +1437 -0
  222. pulumi_vault/rabbitmq/secret_backend_role.py +496 -0
  223. pulumi_vault/raft_autopilot.py +609 -0
  224. pulumi_vault/raft_snapshot_agent_config.py +1591 -0
  225. pulumi_vault/rgp_policy.py +349 -0
  226. pulumi_vault/saml/__init__.py +12 -0
  227. pulumi_vault/saml/_inputs.py +225 -0
  228. pulumi_vault/saml/auth_backend.py +811 -0
  229. pulumi_vault/saml/auth_backend_role.py +1068 -0
  230. pulumi_vault/saml/outputs.py +174 -0
  231. pulumi_vault/scep_auth_backend_role.py +908 -0
  232. pulumi_vault/secrets/__init__.py +18 -0
  233. pulumi_vault/secrets/_inputs.py +110 -0
  234. pulumi_vault/secrets/outputs.py +94 -0
  235. pulumi_vault/secrets/sync_association.py +450 -0
  236. pulumi_vault/secrets/sync_aws_destination.py +780 -0
  237. pulumi_vault/secrets/sync_azure_destination.py +736 -0
  238. pulumi_vault/secrets/sync_config.py +303 -0
  239. pulumi_vault/secrets/sync_gcp_destination.py +572 -0
  240. pulumi_vault/secrets/sync_gh_destination.py +688 -0
  241. pulumi_vault/secrets/sync_github_apps.py +376 -0
  242. pulumi_vault/secrets/sync_vercel_destination.py +603 -0
  243. pulumi_vault/ssh/__init__.py +13 -0
  244. pulumi_vault/ssh/_inputs.py +76 -0
  245. pulumi_vault/ssh/get_secret_backend_sign.py +294 -0
  246. pulumi_vault/ssh/outputs.py +51 -0
  247. pulumi_vault/ssh/secret_backend_ca.py +588 -0
  248. pulumi_vault/ssh/secret_backend_role.py +1493 -0
  249. pulumi_vault/terraformcloud/__init__.py +11 -0
  250. pulumi_vault/terraformcloud/secret_backend.py +1321 -0
  251. pulumi_vault/terraformcloud/secret_creds.py +445 -0
  252. pulumi_vault/terraformcloud/secret_role.py +563 -0
  253. pulumi_vault/token.py +1026 -0
  254. pulumi_vault/tokenauth/__init__.py +9 -0
  255. pulumi_vault/tokenauth/auth_backend_role.py +1135 -0
  256. pulumi_vault/transform/__init__.py +14 -0
  257. pulumi_vault/transform/alphabet.py +348 -0
  258. pulumi_vault/transform/get_decode.py +287 -0
  259. pulumi_vault/transform/get_encode.py +291 -0
  260. pulumi_vault/transform/role.py +350 -0
  261. pulumi_vault/transform/template.py +592 -0
  262. pulumi_vault/transform/transformation.py +608 -0
  263. pulumi_vault/transit/__init__.py +15 -0
  264. pulumi_vault/transit/get_cmac.py +256 -0
  265. pulumi_vault/transit/get_decrypt.py +181 -0
  266. pulumi_vault/transit/get_encrypt.py +174 -0
  267. pulumi_vault/transit/get_sign.py +328 -0
  268. pulumi_vault/transit/get_verify.py +373 -0
  269. pulumi_vault/transit/secret_backend_key.py +1202 -0
  270. pulumi_vault/transit/secret_cache_config.py +302 -0
  271. pulumi_vault-7.6.0a1764657486.dist-info/METADATA +92 -0
  272. pulumi_vault-7.6.0a1764657486.dist-info/RECORD +274 -0
  273. pulumi_vault-7.6.0a1764657486.dist-info/WHEEL +5 -0
  274. pulumi_vault-7.6.0a1764657486.dist-info/top_level.txt +1 -0
@@ -0,0 +1,1096 @@
1
+ # coding=utf-8
2
+ # *** WARNING: this file was generated by pulumi-language-python. ***
3
+ # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
+
5
+ import builtins as _builtins
6
+ import warnings
7
+ import sys
8
+ import pulumi
9
+ import pulumi.runtime
10
+ from typing import Any, Mapping, Optional, Sequence, Union, overload
11
+ if sys.version_info >= (3, 11):
12
+ from typing import NotRequired, TypedDict, TypeAlias
13
+ else:
14
+ from typing_extensions import NotRequired, TypedDict, TypeAlias
15
+ from .. import _utilities
16
+
17
+ __all__ = ['AuthBackendConfigArgs', 'AuthBackendConfig']
18
+
19
+ @pulumi.input_type
20
+ class AuthBackendConfigArgs:
21
+ def __init__(__self__, *,
22
+ resource: pulumi.Input[_builtins.str],
23
+ tenant_id: pulumi.Input[_builtins.str],
24
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
25
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
26
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
27
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
28
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
29
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
30
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
31
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
32
+ max_retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
33
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
34
+ retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
35
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
36
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
37
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None):
38
+ """
39
+ The set of arguments for constructing a AuthBackendConfig resource.
40
+ :param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
41
+ Azure Active Directory.
42
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
43
+ organization.
44
+ :param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
45
+ mounted at. Defaults to `azure`.
46
+ :param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
47
+ Currently read permissions to query compute resources are required.
48
+ :param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
49
+ Azure APIs.
50
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
51
+ *Available only for Vault Enterprise*
52
+ :param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
53
+ AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
54
+ AzureGermanCloud. Defaults to `AzurePublicCloud`.
55
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
56
+ *Available only for Vault Enterprise*
57
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
58
+ :param pulumi.Input[_builtins.int] max_retries: Maximum number of retries for Azure API requests.
59
+ Defaults to `3`.
60
+ :param pulumi.Input[_builtins.int] max_retry_delay: The maximum delay in seconds between retries for Azure API requests.
61
+ Defaults to `60`.
62
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
63
+ The value should not contain leading or trailing forward slashes.
64
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
65
+ *Available only for Vault Enterprise*.
66
+ :param pulumi.Input[_builtins.int] retry_delay: The initial delay in seconds between retries for Azure API requests.
67
+ Defaults to `4`.
68
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
69
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
70
+ *Available only for Vault Enterprise*
71
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
72
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
73
+ *Available only for Vault Enterprise*
74
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
75
+ a rotation when a scheduled token rotation occurs. The default rotation window is
76
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
77
+ *Available only for Vault Enterprise*
78
+ """
79
+ pulumi.set(__self__, "resource", resource)
80
+ pulumi.set(__self__, "tenant_id", tenant_id)
81
+ if backend is not None:
82
+ pulumi.set(__self__, "backend", backend)
83
+ if client_id is not None:
84
+ pulumi.set(__self__, "client_id", client_id)
85
+ if client_secret is not None:
86
+ pulumi.set(__self__, "client_secret", client_secret)
87
+ if disable_automated_rotation is not None:
88
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
89
+ if environment is not None:
90
+ pulumi.set(__self__, "environment", environment)
91
+ if identity_token_audience is not None:
92
+ pulumi.set(__self__, "identity_token_audience", identity_token_audience)
93
+ if identity_token_ttl is not None:
94
+ pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
95
+ if max_retries is not None:
96
+ pulumi.set(__self__, "max_retries", max_retries)
97
+ if max_retry_delay is not None:
98
+ pulumi.set(__self__, "max_retry_delay", max_retry_delay)
99
+ if namespace is not None:
100
+ pulumi.set(__self__, "namespace", namespace)
101
+ if retry_delay is not None:
102
+ pulumi.set(__self__, "retry_delay", retry_delay)
103
+ if rotation_period is not None:
104
+ pulumi.set(__self__, "rotation_period", rotation_period)
105
+ if rotation_schedule is not None:
106
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
107
+ if rotation_window is not None:
108
+ pulumi.set(__self__, "rotation_window", rotation_window)
109
+
110
+ @_builtins.property
111
+ @pulumi.getter
112
+ def resource(self) -> pulumi.Input[_builtins.str]:
113
+ """
114
+ The configured URL for the application registered in
115
+ Azure Active Directory.
116
+ """
117
+ return pulumi.get(self, "resource")
118
+
119
+ @resource.setter
120
+ def resource(self, value: pulumi.Input[_builtins.str]):
121
+ pulumi.set(self, "resource", value)
122
+
123
+ @_builtins.property
124
+ @pulumi.getter(name="tenantId")
125
+ def tenant_id(self) -> pulumi.Input[_builtins.str]:
126
+ """
127
+ The tenant id for the Azure Active Directory
128
+ organization.
129
+ """
130
+ return pulumi.get(self, "tenant_id")
131
+
132
+ @tenant_id.setter
133
+ def tenant_id(self, value: pulumi.Input[_builtins.str]):
134
+ pulumi.set(self, "tenant_id", value)
135
+
136
+ @_builtins.property
137
+ @pulumi.getter
138
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
139
+ """
140
+ The path the Azure auth backend being configured was
141
+ mounted at. Defaults to `azure`.
142
+ """
143
+ return pulumi.get(self, "backend")
144
+
145
+ @backend.setter
146
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
147
+ pulumi.set(self, "backend", value)
148
+
149
+ @_builtins.property
150
+ @pulumi.getter(name="clientId")
151
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
152
+ """
153
+ The client id for credentials to query the Azure APIs.
154
+ Currently read permissions to query compute resources are required.
155
+ """
156
+ return pulumi.get(self, "client_id")
157
+
158
+ @client_id.setter
159
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
160
+ pulumi.set(self, "client_id", value)
161
+
162
+ @_builtins.property
163
+ @pulumi.getter(name="clientSecret")
164
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
165
+ """
166
+ The client secret for credentials to query the
167
+ Azure APIs.
168
+ """
169
+ return pulumi.get(self, "client_secret")
170
+
171
+ @client_secret.setter
172
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
173
+ pulumi.set(self, "client_secret", value)
174
+
175
+ @_builtins.property
176
+ @pulumi.getter(name="disableAutomatedRotation")
177
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
178
+ """
179
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
180
+ *Available only for Vault Enterprise*
181
+ """
182
+ return pulumi.get(self, "disable_automated_rotation")
183
+
184
+ @disable_automated_rotation.setter
185
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
186
+ pulumi.set(self, "disable_automated_rotation", value)
187
+
188
+ @_builtins.property
189
+ @pulumi.getter
190
+ def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
191
+ """
192
+ The Azure cloud environment. Valid values:
193
+ AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
194
+ AzureGermanCloud. Defaults to `AzurePublicCloud`.
195
+ """
196
+ return pulumi.get(self, "environment")
197
+
198
+ @environment.setter
199
+ def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
200
+ pulumi.set(self, "environment", value)
201
+
202
+ @_builtins.property
203
+ @pulumi.getter(name="identityTokenAudience")
204
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
205
+ """
206
+ The audience claim value for plugin identity tokens. Requires Vault 1.17+.
207
+ *Available only for Vault Enterprise*
208
+ """
209
+ return pulumi.get(self, "identity_token_audience")
210
+
211
+ @identity_token_audience.setter
212
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
213
+ pulumi.set(self, "identity_token_audience", value)
214
+
215
+ @_builtins.property
216
+ @pulumi.getter(name="identityTokenTtl")
217
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
218
+ """
219
+ The TTL of generated identity tokens in seconds.
220
+ """
221
+ return pulumi.get(self, "identity_token_ttl")
222
+
223
+ @identity_token_ttl.setter
224
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
225
+ pulumi.set(self, "identity_token_ttl", value)
226
+
227
+ @_builtins.property
228
+ @pulumi.getter(name="maxRetries")
229
+ def max_retries(self) -> Optional[pulumi.Input[_builtins.int]]:
230
+ """
231
+ Maximum number of retries for Azure API requests.
232
+ Defaults to `3`.
233
+ """
234
+ return pulumi.get(self, "max_retries")
235
+
236
+ @max_retries.setter
237
+ def max_retries(self, value: Optional[pulumi.Input[_builtins.int]]):
238
+ pulumi.set(self, "max_retries", value)
239
+
240
+ @_builtins.property
241
+ @pulumi.getter(name="maxRetryDelay")
242
+ def max_retry_delay(self) -> Optional[pulumi.Input[_builtins.int]]:
243
+ """
244
+ The maximum delay in seconds between retries for Azure API requests.
245
+ Defaults to `60`.
246
+ """
247
+ return pulumi.get(self, "max_retry_delay")
248
+
249
+ @max_retry_delay.setter
250
+ def max_retry_delay(self, value: Optional[pulumi.Input[_builtins.int]]):
251
+ pulumi.set(self, "max_retry_delay", value)
252
+
253
+ @_builtins.property
254
+ @pulumi.getter
255
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
256
+ """
257
+ The namespace to provision the resource in.
258
+ The value should not contain leading or trailing forward slashes.
259
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
260
+ *Available only for Vault Enterprise*.
261
+ """
262
+ return pulumi.get(self, "namespace")
263
+
264
+ @namespace.setter
265
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
266
+ pulumi.set(self, "namespace", value)
267
+
268
+ @_builtins.property
269
+ @pulumi.getter(name="retryDelay")
270
+ def retry_delay(self) -> Optional[pulumi.Input[_builtins.int]]:
271
+ """
272
+ The initial delay in seconds between retries for Azure API requests.
273
+ Defaults to `4`.
274
+ """
275
+ return pulumi.get(self, "retry_delay")
276
+
277
+ @retry_delay.setter
278
+ def retry_delay(self, value: Optional[pulumi.Input[_builtins.int]]):
279
+ pulumi.set(self, "retry_delay", value)
280
+
281
+ @_builtins.property
282
+ @pulumi.getter(name="rotationPeriod")
283
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
284
+ """
285
+ The amount of time in seconds Vault should wait before rotating the root credential.
286
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
287
+ *Available only for Vault Enterprise*
288
+ """
289
+ return pulumi.get(self, "rotation_period")
290
+
291
+ @rotation_period.setter
292
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
293
+ pulumi.set(self, "rotation_period", value)
294
+
295
+ @_builtins.property
296
+ @pulumi.getter(name="rotationSchedule")
297
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
298
+ """
299
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
300
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
301
+ *Available only for Vault Enterprise*
302
+ """
303
+ return pulumi.get(self, "rotation_schedule")
304
+
305
+ @rotation_schedule.setter
306
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
307
+ pulumi.set(self, "rotation_schedule", value)
308
+
309
+ @_builtins.property
310
+ @pulumi.getter(name="rotationWindow")
311
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
312
+ """
313
+ The maximum amount of time in seconds allowed to complete
314
+ a rotation when a scheduled token rotation occurs. The default rotation window is
315
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
316
+ *Available only for Vault Enterprise*
317
+ """
318
+ return pulumi.get(self, "rotation_window")
319
+
320
+ @rotation_window.setter
321
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
322
+ pulumi.set(self, "rotation_window", value)
323
+
324
+
325
+ @pulumi.input_type
326
+ class _AuthBackendConfigState:
327
+ def __init__(__self__, *,
328
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
329
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
330
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
331
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
332
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
333
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
334
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
335
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
336
+ max_retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
337
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
338
+ resource: Optional[pulumi.Input[_builtins.str]] = None,
339
+ retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
340
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
341
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
342
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
343
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None):
344
+ """
345
+ Input properties used for looking up and filtering AuthBackendConfig resources.
346
+ :param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
347
+ mounted at. Defaults to `azure`.
348
+ :param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
349
+ Currently read permissions to query compute resources are required.
350
+ :param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
351
+ Azure APIs.
352
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
353
+ *Available only for Vault Enterprise*
354
+ :param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
355
+ AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
356
+ AzureGermanCloud. Defaults to `AzurePublicCloud`.
357
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
358
+ *Available only for Vault Enterprise*
359
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
360
+ :param pulumi.Input[_builtins.int] max_retries: Maximum number of retries for Azure API requests.
361
+ Defaults to `3`.
362
+ :param pulumi.Input[_builtins.int] max_retry_delay: The maximum delay in seconds between retries for Azure API requests.
363
+ Defaults to `60`.
364
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
365
+ The value should not contain leading or trailing forward slashes.
366
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
367
+ *Available only for Vault Enterprise*.
368
+ :param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
369
+ Azure Active Directory.
370
+ :param pulumi.Input[_builtins.int] retry_delay: The initial delay in seconds between retries for Azure API requests.
371
+ Defaults to `4`.
372
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
373
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
374
+ *Available only for Vault Enterprise*
375
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
376
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
377
+ *Available only for Vault Enterprise*
378
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
379
+ a rotation when a scheduled token rotation occurs. The default rotation window is
380
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
381
+ *Available only for Vault Enterprise*
382
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
383
+ organization.
384
+ """
385
+ if backend is not None:
386
+ pulumi.set(__self__, "backend", backend)
387
+ if client_id is not None:
388
+ pulumi.set(__self__, "client_id", client_id)
389
+ if client_secret is not None:
390
+ pulumi.set(__self__, "client_secret", client_secret)
391
+ if disable_automated_rotation is not None:
392
+ pulumi.set(__self__, "disable_automated_rotation", disable_automated_rotation)
393
+ if environment is not None:
394
+ pulumi.set(__self__, "environment", environment)
395
+ if identity_token_audience is not None:
396
+ pulumi.set(__self__, "identity_token_audience", identity_token_audience)
397
+ if identity_token_ttl is not None:
398
+ pulumi.set(__self__, "identity_token_ttl", identity_token_ttl)
399
+ if max_retries is not None:
400
+ pulumi.set(__self__, "max_retries", max_retries)
401
+ if max_retry_delay is not None:
402
+ pulumi.set(__self__, "max_retry_delay", max_retry_delay)
403
+ if namespace is not None:
404
+ pulumi.set(__self__, "namespace", namespace)
405
+ if resource is not None:
406
+ pulumi.set(__self__, "resource", resource)
407
+ if retry_delay is not None:
408
+ pulumi.set(__self__, "retry_delay", retry_delay)
409
+ if rotation_period is not None:
410
+ pulumi.set(__self__, "rotation_period", rotation_period)
411
+ if rotation_schedule is not None:
412
+ pulumi.set(__self__, "rotation_schedule", rotation_schedule)
413
+ if rotation_window is not None:
414
+ pulumi.set(__self__, "rotation_window", rotation_window)
415
+ if tenant_id is not None:
416
+ pulumi.set(__self__, "tenant_id", tenant_id)
417
+
418
+ @_builtins.property
419
+ @pulumi.getter
420
+ def backend(self) -> Optional[pulumi.Input[_builtins.str]]:
421
+ """
422
+ The path the Azure auth backend being configured was
423
+ mounted at. Defaults to `azure`.
424
+ """
425
+ return pulumi.get(self, "backend")
426
+
427
+ @backend.setter
428
+ def backend(self, value: Optional[pulumi.Input[_builtins.str]]):
429
+ pulumi.set(self, "backend", value)
430
+
431
+ @_builtins.property
432
+ @pulumi.getter(name="clientId")
433
+ def client_id(self) -> Optional[pulumi.Input[_builtins.str]]:
434
+ """
435
+ The client id for credentials to query the Azure APIs.
436
+ Currently read permissions to query compute resources are required.
437
+ """
438
+ return pulumi.get(self, "client_id")
439
+
440
+ @client_id.setter
441
+ def client_id(self, value: Optional[pulumi.Input[_builtins.str]]):
442
+ pulumi.set(self, "client_id", value)
443
+
444
+ @_builtins.property
445
+ @pulumi.getter(name="clientSecret")
446
+ def client_secret(self) -> Optional[pulumi.Input[_builtins.str]]:
447
+ """
448
+ The client secret for credentials to query the
449
+ Azure APIs.
450
+ """
451
+ return pulumi.get(self, "client_secret")
452
+
453
+ @client_secret.setter
454
+ def client_secret(self, value: Optional[pulumi.Input[_builtins.str]]):
455
+ pulumi.set(self, "client_secret", value)
456
+
457
+ @_builtins.property
458
+ @pulumi.getter(name="disableAutomatedRotation")
459
+ def disable_automated_rotation(self) -> Optional[pulumi.Input[_builtins.bool]]:
460
+ """
461
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
462
+ *Available only for Vault Enterprise*
463
+ """
464
+ return pulumi.get(self, "disable_automated_rotation")
465
+
466
+ @disable_automated_rotation.setter
467
+ def disable_automated_rotation(self, value: Optional[pulumi.Input[_builtins.bool]]):
468
+ pulumi.set(self, "disable_automated_rotation", value)
469
+
470
+ @_builtins.property
471
+ @pulumi.getter
472
+ def environment(self) -> Optional[pulumi.Input[_builtins.str]]:
473
+ """
474
+ The Azure cloud environment. Valid values:
475
+ AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
476
+ AzureGermanCloud. Defaults to `AzurePublicCloud`.
477
+ """
478
+ return pulumi.get(self, "environment")
479
+
480
+ @environment.setter
481
+ def environment(self, value: Optional[pulumi.Input[_builtins.str]]):
482
+ pulumi.set(self, "environment", value)
483
+
484
+ @_builtins.property
485
+ @pulumi.getter(name="identityTokenAudience")
486
+ def identity_token_audience(self) -> Optional[pulumi.Input[_builtins.str]]:
487
+ """
488
+ The audience claim value for plugin identity tokens. Requires Vault 1.17+.
489
+ *Available only for Vault Enterprise*
490
+ """
491
+ return pulumi.get(self, "identity_token_audience")
492
+
493
+ @identity_token_audience.setter
494
+ def identity_token_audience(self, value: Optional[pulumi.Input[_builtins.str]]):
495
+ pulumi.set(self, "identity_token_audience", value)
496
+
497
+ @_builtins.property
498
+ @pulumi.getter(name="identityTokenTtl")
499
+ def identity_token_ttl(self) -> Optional[pulumi.Input[_builtins.int]]:
500
+ """
501
+ The TTL of generated identity tokens in seconds.
502
+ """
503
+ return pulumi.get(self, "identity_token_ttl")
504
+
505
+ @identity_token_ttl.setter
506
+ def identity_token_ttl(self, value: Optional[pulumi.Input[_builtins.int]]):
507
+ pulumi.set(self, "identity_token_ttl", value)
508
+
509
+ @_builtins.property
510
+ @pulumi.getter(name="maxRetries")
511
+ def max_retries(self) -> Optional[pulumi.Input[_builtins.int]]:
512
+ """
513
+ Maximum number of retries for Azure API requests.
514
+ Defaults to `3`.
515
+ """
516
+ return pulumi.get(self, "max_retries")
517
+
518
+ @max_retries.setter
519
+ def max_retries(self, value: Optional[pulumi.Input[_builtins.int]]):
520
+ pulumi.set(self, "max_retries", value)
521
+
522
+ @_builtins.property
523
+ @pulumi.getter(name="maxRetryDelay")
524
+ def max_retry_delay(self) -> Optional[pulumi.Input[_builtins.int]]:
525
+ """
526
+ The maximum delay in seconds between retries for Azure API requests.
527
+ Defaults to `60`.
528
+ """
529
+ return pulumi.get(self, "max_retry_delay")
530
+
531
+ @max_retry_delay.setter
532
+ def max_retry_delay(self, value: Optional[pulumi.Input[_builtins.int]]):
533
+ pulumi.set(self, "max_retry_delay", value)
534
+
535
+ @_builtins.property
536
+ @pulumi.getter
537
+ def namespace(self) -> Optional[pulumi.Input[_builtins.str]]:
538
+ """
539
+ The namespace to provision the resource in.
540
+ The value should not contain leading or trailing forward slashes.
541
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
542
+ *Available only for Vault Enterprise*.
543
+ """
544
+ return pulumi.get(self, "namespace")
545
+
546
+ @namespace.setter
547
+ def namespace(self, value: Optional[pulumi.Input[_builtins.str]]):
548
+ pulumi.set(self, "namespace", value)
549
+
550
+ @_builtins.property
551
+ @pulumi.getter
552
+ def resource(self) -> Optional[pulumi.Input[_builtins.str]]:
553
+ """
554
+ The configured URL for the application registered in
555
+ Azure Active Directory.
556
+ """
557
+ return pulumi.get(self, "resource")
558
+
559
+ @resource.setter
560
+ def resource(self, value: Optional[pulumi.Input[_builtins.str]]):
561
+ pulumi.set(self, "resource", value)
562
+
563
+ @_builtins.property
564
+ @pulumi.getter(name="retryDelay")
565
+ def retry_delay(self) -> Optional[pulumi.Input[_builtins.int]]:
566
+ """
567
+ The initial delay in seconds between retries for Azure API requests.
568
+ Defaults to `4`.
569
+ """
570
+ return pulumi.get(self, "retry_delay")
571
+
572
+ @retry_delay.setter
573
+ def retry_delay(self, value: Optional[pulumi.Input[_builtins.int]]):
574
+ pulumi.set(self, "retry_delay", value)
575
+
576
+ @_builtins.property
577
+ @pulumi.getter(name="rotationPeriod")
578
+ def rotation_period(self) -> Optional[pulumi.Input[_builtins.int]]:
579
+ """
580
+ The amount of time in seconds Vault should wait before rotating the root credential.
581
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
582
+ *Available only for Vault Enterprise*
583
+ """
584
+ return pulumi.get(self, "rotation_period")
585
+
586
+ @rotation_period.setter
587
+ def rotation_period(self, value: Optional[pulumi.Input[_builtins.int]]):
588
+ pulumi.set(self, "rotation_period", value)
589
+
590
+ @_builtins.property
591
+ @pulumi.getter(name="rotationSchedule")
592
+ def rotation_schedule(self) -> Optional[pulumi.Input[_builtins.str]]:
593
+ """
594
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
595
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
596
+ *Available only for Vault Enterprise*
597
+ """
598
+ return pulumi.get(self, "rotation_schedule")
599
+
600
+ @rotation_schedule.setter
601
+ def rotation_schedule(self, value: Optional[pulumi.Input[_builtins.str]]):
602
+ pulumi.set(self, "rotation_schedule", value)
603
+
604
+ @_builtins.property
605
+ @pulumi.getter(name="rotationWindow")
606
+ def rotation_window(self) -> Optional[pulumi.Input[_builtins.int]]:
607
+ """
608
+ The maximum amount of time in seconds allowed to complete
609
+ a rotation when a scheduled token rotation occurs. The default rotation window is
610
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
611
+ *Available only for Vault Enterprise*
612
+ """
613
+ return pulumi.get(self, "rotation_window")
614
+
615
+ @rotation_window.setter
616
+ def rotation_window(self, value: Optional[pulumi.Input[_builtins.int]]):
617
+ pulumi.set(self, "rotation_window", value)
618
+
619
+ @_builtins.property
620
+ @pulumi.getter(name="tenantId")
621
+ def tenant_id(self) -> Optional[pulumi.Input[_builtins.str]]:
622
+ """
623
+ The tenant id for the Azure Active Directory
624
+ organization.
625
+ """
626
+ return pulumi.get(self, "tenant_id")
627
+
628
+ @tenant_id.setter
629
+ def tenant_id(self, value: Optional[pulumi.Input[_builtins.str]]):
630
+ pulumi.set(self, "tenant_id", value)
631
+
632
+
633
+ @pulumi.type_token("vault:azure/authBackendConfig:AuthBackendConfig")
634
+ class AuthBackendConfig(pulumi.CustomResource):
635
+ @overload
636
+ def __init__(__self__,
637
+ resource_name: str,
638
+ opts: Optional[pulumi.ResourceOptions] = None,
639
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
640
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
641
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
642
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
643
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
644
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
645
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
646
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
647
+ max_retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
648
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
649
+ resource: Optional[pulumi.Input[_builtins.str]] = None,
650
+ retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
651
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
652
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
653
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
654
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
655
+ __props__=None):
656
+ """
657
+ ## Example Usage
658
+
659
+ You can setup the Azure auth engine with Workload Identity Federation (WIF) for a secret-less configuration:
660
+ ```python
661
+ import pulumi
662
+ import pulumi_vault as vault
663
+
664
+ example = vault.AuthBackend("example",
665
+ type="azure",
666
+ identity_token_key="example-key")
667
+ example_auth_backend_config = vault.azure.AuthBackendConfig("example",
668
+ backend=example.path,
669
+ tenant_id="11111111-2222-3333-4444-555555555555",
670
+ client_id="11111111-2222-3333-4444-555555555555",
671
+ identity_token_audience="<TOKEN_AUDIENCE>",
672
+ identity_token_ttl="<TOKEN_TTL>",
673
+ rotation_schedule="0 * * * SAT",
674
+ rotation_window=3600)
675
+ ```
676
+
677
+ ```python
678
+ import pulumi
679
+ import pulumi_vault as vault
680
+
681
+ example = vault.AuthBackend("example", type="azure")
682
+ example_auth_backend_config = vault.azure.AuthBackendConfig("example",
683
+ backend=example.path,
684
+ tenant_id="11111111-2222-3333-4444-555555555555",
685
+ client_id="11111111-2222-3333-4444-555555555555",
686
+ client_secret="01234567890123456789",
687
+ resource="https://vault.hashicorp.com",
688
+ rotation_schedule="0 * * * SAT",
689
+ rotation_window=3600)
690
+ ```
691
+
692
+ ## Import
693
+
694
+ Azure auth backends can be imported using `auth/`, the `backend` path, and `/config` e.g.
695
+
696
+ ```sh
697
+ $ pulumi import vault:azure/authBackendConfig:AuthBackendConfig example auth/azure/config
698
+ ```
699
+
700
+ :param str resource_name: The name of the resource.
701
+ :param pulumi.ResourceOptions opts: Options for the resource.
702
+ :param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
703
+ mounted at. Defaults to `azure`.
704
+ :param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
705
+ Currently read permissions to query compute resources are required.
706
+ :param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
707
+ Azure APIs.
708
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
709
+ *Available only for Vault Enterprise*
710
+ :param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
711
+ AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
712
+ AzureGermanCloud. Defaults to `AzurePublicCloud`.
713
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
714
+ *Available only for Vault Enterprise*
715
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
716
+ :param pulumi.Input[_builtins.int] max_retries: Maximum number of retries for Azure API requests.
717
+ Defaults to `3`.
718
+ :param pulumi.Input[_builtins.int] max_retry_delay: The maximum delay in seconds between retries for Azure API requests.
719
+ Defaults to `60`.
720
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
721
+ The value should not contain leading or trailing forward slashes.
722
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
723
+ *Available only for Vault Enterprise*.
724
+ :param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
725
+ Azure Active Directory.
726
+ :param pulumi.Input[_builtins.int] retry_delay: The initial delay in seconds between retries for Azure API requests.
727
+ Defaults to `4`.
728
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
729
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
730
+ *Available only for Vault Enterprise*
731
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
732
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
733
+ *Available only for Vault Enterprise*
734
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
735
+ a rotation when a scheduled token rotation occurs. The default rotation window is
736
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
737
+ *Available only for Vault Enterprise*
738
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
739
+ organization.
740
+ """
741
+ ...
742
+ @overload
743
+ def __init__(__self__,
744
+ resource_name: str,
745
+ args: AuthBackendConfigArgs,
746
+ opts: Optional[pulumi.ResourceOptions] = None):
747
+ """
748
+ ## Example Usage
749
+
750
+ You can setup the Azure auth engine with Workload Identity Federation (WIF) for a secret-less configuration:
751
+ ```python
752
+ import pulumi
753
+ import pulumi_vault as vault
754
+
755
+ example = vault.AuthBackend("example",
756
+ type="azure",
757
+ identity_token_key="example-key")
758
+ example_auth_backend_config = vault.azure.AuthBackendConfig("example",
759
+ backend=example.path,
760
+ tenant_id="11111111-2222-3333-4444-555555555555",
761
+ client_id="11111111-2222-3333-4444-555555555555",
762
+ identity_token_audience="<TOKEN_AUDIENCE>",
763
+ identity_token_ttl="<TOKEN_TTL>",
764
+ rotation_schedule="0 * * * SAT",
765
+ rotation_window=3600)
766
+ ```
767
+
768
+ ```python
769
+ import pulumi
770
+ import pulumi_vault as vault
771
+
772
+ example = vault.AuthBackend("example", type="azure")
773
+ example_auth_backend_config = vault.azure.AuthBackendConfig("example",
774
+ backend=example.path,
775
+ tenant_id="11111111-2222-3333-4444-555555555555",
776
+ client_id="11111111-2222-3333-4444-555555555555",
777
+ client_secret="01234567890123456789",
778
+ resource="https://vault.hashicorp.com",
779
+ rotation_schedule="0 * * * SAT",
780
+ rotation_window=3600)
781
+ ```
782
+
783
+ ## Import
784
+
785
+ Azure auth backends can be imported using `auth/`, the `backend` path, and `/config` e.g.
786
+
787
+ ```sh
788
+ $ pulumi import vault:azure/authBackendConfig:AuthBackendConfig example auth/azure/config
789
+ ```
790
+
791
+ :param str resource_name: The name of the resource.
792
+ :param AuthBackendConfigArgs args: The arguments to use to populate this resource's properties.
793
+ :param pulumi.ResourceOptions opts: Options for the resource.
794
+ """
795
+ ...
796
+ def __init__(__self__, resource_name: str, *args, **kwargs):
797
+ resource_args, opts = _utilities.get_resource_args_opts(AuthBackendConfigArgs, pulumi.ResourceOptions, *args, **kwargs)
798
+ if resource_args is not None:
799
+ __self__._internal_init(resource_name, opts, **resource_args.__dict__)
800
+ else:
801
+ __self__._internal_init(resource_name, *args, **kwargs)
802
+
803
+ def _internal_init(__self__,
804
+ resource_name: str,
805
+ opts: Optional[pulumi.ResourceOptions] = None,
806
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
807
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
808
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
809
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
810
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
811
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
812
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
813
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
814
+ max_retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
815
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
816
+ resource: Optional[pulumi.Input[_builtins.str]] = None,
817
+ retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
818
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
819
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
820
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
821
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None,
822
+ __props__=None):
823
+ opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
824
+ if not isinstance(opts, pulumi.ResourceOptions):
825
+ raise TypeError('Expected resource options to be a ResourceOptions instance')
826
+ if opts.id is None:
827
+ if __props__ is not None:
828
+ raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
829
+ __props__ = AuthBackendConfigArgs.__new__(AuthBackendConfigArgs)
830
+
831
+ __props__.__dict__["backend"] = backend
832
+ __props__.__dict__["client_id"] = None if client_id is None else pulumi.Output.secret(client_id)
833
+ __props__.__dict__["client_secret"] = None if client_secret is None else pulumi.Output.secret(client_secret)
834
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
835
+ __props__.__dict__["environment"] = environment
836
+ __props__.__dict__["identity_token_audience"] = identity_token_audience
837
+ __props__.__dict__["identity_token_ttl"] = identity_token_ttl
838
+ __props__.__dict__["max_retries"] = max_retries
839
+ __props__.__dict__["max_retry_delay"] = max_retry_delay
840
+ __props__.__dict__["namespace"] = namespace
841
+ if resource is None and not opts.urn:
842
+ raise TypeError("Missing required property 'resource'")
843
+ __props__.__dict__["resource"] = resource
844
+ __props__.__dict__["retry_delay"] = retry_delay
845
+ __props__.__dict__["rotation_period"] = rotation_period
846
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
847
+ __props__.__dict__["rotation_window"] = rotation_window
848
+ if tenant_id is None and not opts.urn:
849
+ raise TypeError("Missing required property 'tenant_id'")
850
+ __props__.__dict__["tenant_id"] = None if tenant_id is None else pulumi.Output.secret(tenant_id)
851
+ secret_opts = pulumi.ResourceOptions(additional_secret_outputs=["clientId", "clientSecret", "tenantId"])
852
+ opts = pulumi.ResourceOptions.merge(opts, secret_opts)
853
+ super(AuthBackendConfig, __self__).__init__(
854
+ 'vault:azure/authBackendConfig:AuthBackendConfig',
855
+ resource_name,
856
+ __props__,
857
+ opts)
858
+
859
+ @staticmethod
860
+ def get(resource_name: str,
861
+ id: pulumi.Input[str],
862
+ opts: Optional[pulumi.ResourceOptions] = None,
863
+ backend: Optional[pulumi.Input[_builtins.str]] = None,
864
+ client_id: Optional[pulumi.Input[_builtins.str]] = None,
865
+ client_secret: Optional[pulumi.Input[_builtins.str]] = None,
866
+ disable_automated_rotation: Optional[pulumi.Input[_builtins.bool]] = None,
867
+ environment: Optional[pulumi.Input[_builtins.str]] = None,
868
+ identity_token_audience: Optional[pulumi.Input[_builtins.str]] = None,
869
+ identity_token_ttl: Optional[pulumi.Input[_builtins.int]] = None,
870
+ max_retries: Optional[pulumi.Input[_builtins.int]] = None,
871
+ max_retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
872
+ namespace: Optional[pulumi.Input[_builtins.str]] = None,
873
+ resource: Optional[pulumi.Input[_builtins.str]] = None,
874
+ retry_delay: Optional[pulumi.Input[_builtins.int]] = None,
875
+ rotation_period: Optional[pulumi.Input[_builtins.int]] = None,
876
+ rotation_schedule: Optional[pulumi.Input[_builtins.str]] = None,
877
+ rotation_window: Optional[pulumi.Input[_builtins.int]] = None,
878
+ tenant_id: Optional[pulumi.Input[_builtins.str]] = None) -> 'AuthBackendConfig':
879
+ """
880
+ Get an existing AuthBackendConfig resource's state with the given name, id, and optional extra
881
+ properties used to qualify the lookup.
882
+
883
+ :param str resource_name: The unique name of the resulting resource.
884
+ :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
885
+ :param pulumi.ResourceOptions opts: Options for the resource.
886
+ :param pulumi.Input[_builtins.str] backend: The path the Azure auth backend being configured was
887
+ mounted at. Defaults to `azure`.
888
+ :param pulumi.Input[_builtins.str] client_id: The client id for credentials to query the Azure APIs.
889
+ Currently read permissions to query compute resources are required.
890
+ :param pulumi.Input[_builtins.str] client_secret: The client secret for credentials to query the
891
+ Azure APIs.
892
+ :param pulumi.Input[_builtins.bool] disable_automated_rotation: Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
893
+ *Available only for Vault Enterprise*
894
+ :param pulumi.Input[_builtins.str] environment: The Azure cloud environment. Valid values:
895
+ AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
896
+ AzureGermanCloud. Defaults to `AzurePublicCloud`.
897
+ :param pulumi.Input[_builtins.str] identity_token_audience: The audience claim value for plugin identity tokens. Requires Vault 1.17+.
898
+ *Available only for Vault Enterprise*
899
+ :param pulumi.Input[_builtins.int] identity_token_ttl: The TTL of generated identity tokens in seconds.
900
+ :param pulumi.Input[_builtins.int] max_retries: Maximum number of retries for Azure API requests.
901
+ Defaults to `3`.
902
+ :param pulumi.Input[_builtins.int] max_retry_delay: The maximum delay in seconds between retries for Azure API requests.
903
+ Defaults to `60`.
904
+ :param pulumi.Input[_builtins.str] namespace: The namespace to provision the resource in.
905
+ The value should not contain leading or trailing forward slashes.
906
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
907
+ *Available only for Vault Enterprise*.
908
+ :param pulumi.Input[_builtins.str] resource: The configured URL for the application registered in
909
+ Azure Active Directory.
910
+ :param pulumi.Input[_builtins.int] retry_delay: The initial delay in seconds between retries for Azure API requests.
911
+ Defaults to `4`.
912
+ :param pulumi.Input[_builtins.int] rotation_period: The amount of time in seconds Vault should wait before rotating the root credential.
913
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
914
+ *Available only for Vault Enterprise*
915
+ :param pulumi.Input[_builtins.str] rotation_schedule: The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
916
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
917
+ *Available only for Vault Enterprise*
918
+ :param pulumi.Input[_builtins.int] rotation_window: The maximum amount of time in seconds allowed to complete
919
+ a rotation when a scheduled token rotation occurs. The default rotation window is
920
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
921
+ *Available only for Vault Enterprise*
922
+ :param pulumi.Input[_builtins.str] tenant_id: The tenant id for the Azure Active Directory
923
+ organization.
924
+ """
925
+ opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
926
+
927
+ __props__ = _AuthBackendConfigState.__new__(_AuthBackendConfigState)
928
+
929
+ __props__.__dict__["backend"] = backend
930
+ __props__.__dict__["client_id"] = client_id
931
+ __props__.__dict__["client_secret"] = client_secret
932
+ __props__.__dict__["disable_automated_rotation"] = disable_automated_rotation
933
+ __props__.__dict__["environment"] = environment
934
+ __props__.__dict__["identity_token_audience"] = identity_token_audience
935
+ __props__.__dict__["identity_token_ttl"] = identity_token_ttl
936
+ __props__.__dict__["max_retries"] = max_retries
937
+ __props__.__dict__["max_retry_delay"] = max_retry_delay
938
+ __props__.__dict__["namespace"] = namespace
939
+ __props__.__dict__["resource"] = resource
940
+ __props__.__dict__["retry_delay"] = retry_delay
941
+ __props__.__dict__["rotation_period"] = rotation_period
942
+ __props__.__dict__["rotation_schedule"] = rotation_schedule
943
+ __props__.__dict__["rotation_window"] = rotation_window
944
+ __props__.__dict__["tenant_id"] = tenant_id
945
+ return AuthBackendConfig(resource_name, opts=opts, __props__=__props__)
946
+
947
+ @_builtins.property
948
+ @pulumi.getter
949
+ def backend(self) -> pulumi.Output[Optional[_builtins.str]]:
950
+ """
951
+ The path the Azure auth backend being configured was
952
+ mounted at. Defaults to `azure`.
953
+ """
954
+ return pulumi.get(self, "backend")
955
+
956
+ @_builtins.property
957
+ @pulumi.getter(name="clientId")
958
+ def client_id(self) -> pulumi.Output[Optional[_builtins.str]]:
959
+ """
960
+ The client id for credentials to query the Azure APIs.
961
+ Currently read permissions to query compute resources are required.
962
+ """
963
+ return pulumi.get(self, "client_id")
964
+
965
+ @_builtins.property
966
+ @pulumi.getter(name="clientSecret")
967
+ def client_secret(self) -> pulumi.Output[Optional[_builtins.str]]:
968
+ """
969
+ The client secret for credentials to query the
970
+ Azure APIs.
971
+ """
972
+ return pulumi.get(self, "client_secret")
973
+
974
+ @_builtins.property
975
+ @pulumi.getter(name="disableAutomatedRotation")
976
+ def disable_automated_rotation(self) -> pulumi.Output[Optional[_builtins.bool]]:
977
+ """
978
+ Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+.
979
+ *Available only for Vault Enterprise*
980
+ """
981
+ return pulumi.get(self, "disable_automated_rotation")
982
+
983
+ @_builtins.property
984
+ @pulumi.getter
985
+ def environment(self) -> pulumi.Output[Optional[_builtins.str]]:
986
+ """
987
+ The Azure cloud environment. Valid values:
988
+ AzurePublicCloud, AzureUSGovernmentCloud, AzureChinaCloud,
989
+ AzureGermanCloud. Defaults to `AzurePublicCloud`.
990
+ """
991
+ return pulumi.get(self, "environment")
992
+
993
+ @_builtins.property
994
+ @pulumi.getter(name="identityTokenAudience")
995
+ def identity_token_audience(self) -> pulumi.Output[Optional[_builtins.str]]:
996
+ """
997
+ The audience claim value for plugin identity tokens. Requires Vault 1.17+.
998
+ *Available only for Vault Enterprise*
999
+ """
1000
+ return pulumi.get(self, "identity_token_audience")
1001
+
1002
+ @_builtins.property
1003
+ @pulumi.getter(name="identityTokenTtl")
1004
+ def identity_token_ttl(self) -> pulumi.Output[_builtins.int]:
1005
+ """
1006
+ The TTL of generated identity tokens in seconds.
1007
+ """
1008
+ return pulumi.get(self, "identity_token_ttl")
1009
+
1010
+ @_builtins.property
1011
+ @pulumi.getter(name="maxRetries")
1012
+ def max_retries(self) -> pulumi.Output[Optional[_builtins.int]]:
1013
+ """
1014
+ Maximum number of retries for Azure API requests.
1015
+ Defaults to `3`.
1016
+ """
1017
+ return pulumi.get(self, "max_retries")
1018
+
1019
+ @_builtins.property
1020
+ @pulumi.getter(name="maxRetryDelay")
1021
+ def max_retry_delay(self) -> pulumi.Output[Optional[_builtins.int]]:
1022
+ """
1023
+ The maximum delay in seconds between retries for Azure API requests.
1024
+ Defaults to `60`.
1025
+ """
1026
+ return pulumi.get(self, "max_retry_delay")
1027
+
1028
+ @_builtins.property
1029
+ @pulumi.getter
1030
+ def namespace(self) -> pulumi.Output[Optional[_builtins.str]]:
1031
+ """
1032
+ The namespace to provision the resource in.
1033
+ The value should not contain leading or trailing forward slashes.
1034
+ The `namespace` is always relative to the provider's configured [namespace](https://www.terraform.io/docs/providers/vault/index.html#namespace).
1035
+ *Available only for Vault Enterprise*.
1036
+ """
1037
+ return pulumi.get(self, "namespace")
1038
+
1039
+ @_builtins.property
1040
+ @pulumi.getter
1041
+ def resource(self) -> pulumi.Output[_builtins.str]:
1042
+ """
1043
+ The configured URL for the application registered in
1044
+ Azure Active Directory.
1045
+ """
1046
+ return pulumi.get(self, "resource")
1047
+
1048
+ @_builtins.property
1049
+ @pulumi.getter(name="retryDelay")
1050
+ def retry_delay(self) -> pulumi.Output[Optional[_builtins.int]]:
1051
+ """
1052
+ The initial delay in seconds between retries for Azure API requests.
1053
+ Defaults to `4`.
1054
+ """
1055
+ return pulumi.get(self, "retry_delay")
1056
+
1057
+ @_builtins.property
1058
+ @pulumi.getter(name="rotationPeriod")
1059
+ def rotation_period(self) -> pulumi.Output[Optional[_builtins.int]]:
1060
+ """
1061
+ The amount of time in seconds Vault should wait before rotating the root credential.
1062
+ A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
1063
+ *Available only for Vault Enterprise*
1064
+ """
1065
+ return pulumi.get(self, "rotation_period")
1066
+
1067
+ @_builtins.property
1068
+ @pulumi.getter(name="rotationSchedule")
1069
+ def rotation_schedule(self) -> pulumi.Output[Optional[_builtins.str]]:
1070
+ """
1071
+ The schedule, in [cron-style time format](https://en.wikipedia.org/wiki/Cron),
1072
+ defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
1073
+ *Available only for Vault Enterprise*
1074
+ """
1075
+ return pulumi.get(self, "rotation_schedule")
1076
+
1077
+ @_builtins.property
1078
+ @pulumi.getter(name="rotationWindow")
1079
+ def rotation_window(self) -> pulumi.Output[Optional[_builtins.int]]:
1080
+ """
1081
+ The maximum amount of time in seconds allowed to complete
1082
+ a rotation when a scheduled token rotation occurs. The default rotation window is
1083
+ unbound and the minimum allowable window is `3600`. Requires Vault Enterprise 1.19+.
1084
+ *Available only for Vault Enterprise*
1085
+ """
1086
+ return pulumi.get(self, "rotation_window")
1087
+
1088
+ @_builtins.property
1089
+ @pulumi.getter(name="tenantId")
1090
+ def tenant_id(self) -> pulumi.Output[_builtins.str]:
1091
+ """
1092
+ The tenant id for the Azure Active Directory
1093
+ organization.
1094
+ """
1095
+ return pulumi.get(self, "tenant_id")
1096
+