» vault_jwt_auth_backend

Provides a resource for managing an JWT auth backend within Vault.

» Example Usage

resource "vault_jwt_auth_backend" "example" {
    description  = "Demonstration of the Terraform JWT auth backend"
    path = "jwt"
    oidc_discovery_url = "https://myco.auth0.com/"
    bound_issuer = "https://myco.auth0.com/"
}

» Argument Reference

The following arguments are supported:

  • path - (Required) Path to mount the JWT auth backend

  • description - (Optional) The description of the auth backend

  • oidc_discovery_url - (Optional) The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with jwt_validation_pubkeys

  • bound_issuer - (Optional) The value against which to match the iss claim in a JWT

  • oidc_discovery_ca_pem - (Optional) The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used

  • jwt_validation_pubkeys - (Optional) A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with oidc_discovery_url

  • jwt_supported_algs - (Optional) A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ

» Attributes Reference

No additional attributes are exposed by this resource.