» vault_pki_secret_backend_role
Creates a role on an PKI Secret Backend for Vault.
» Example Usage
resource "vault_pki_secret_backend" "pki" {
path = "%s"
default_lease_ttl_seconds = 3600
max_lease_ttl_seconds = 86400
}
resource "vault_pki_secret_backend_role" "role" {
backend = "${vault_pki_secret_backend.pki.path}"
name = "my_role"
}
» Argument Reference
The following arguments are supported:
-
backend
- (Required) The path the PKI secret backend is mounted at, with no leading or trailing/
s. -
name
- (Required) The name to identify this role within the backend. Must be unique within the backend. -
ttl
- (Optional) The TTL -
max_ttl
- (Optional) The maximum TTL -
allow_localhost
- (Optional) Flag to allow certificates for localhost -
allowed_domains
- (Optional) List of allowed domains for certificates -
allow_bare_domains
- (Optional) Flag to allow certificates matching the actual domain -
allow_subdomains
- (Optional) Flag to allow certificates matching subdomains -
allow_glob_domains
- (Optional) Flag to allow names containing glob patterns. -
allow_any_name
- (Optional) Flag to allow any name -
enforce_hostnames
- (Optional) Flag to allow only valid host names -
allow_ip_sans
- (Optional) Flag to allow IP SANs -
allowed_uri_sans
- (Optional) Defines allowed URI SANs -
allowed_other_sans
- (Optional) Defines allowed custom SANs -
server_flag
- (Optional) Flag to specify certificates for server use -
client_flag
- (Optional) Flag to specify certificates for client use -
code_signing_flag
- (Optional) Flag to specify certificates for code signing use -
email_protection_flag
- (Optional) Flag to specify certificates for email protection use -
key_type
- (Optional) The type of generated keys -
key_bits
- (Optional) The number of bits of generated keys -
key_usage
- (Optional) Specify the allowed key usage constraint on issued certificates -
ext_key_usage
- (Optional) Specify the allowed extended key usage constraint on issued certificates -
use_csr_common_name
- (Optional) Flag to use the CN in the CSR -
use_csr_sans
- (Optional) Flag to use the SANs in the CSR -
ou
- (Optional) The organization unit of generated certificates -
organization
- (Optional) The organization of generated certificates -
country
- (Optional) The country of generated certificates -
locality
- (Optional) The locality of generated certificates -
province
- (Optional) The province of generated certificates -
street_address
- (Optional) The street address of generated certificates -
postal_code
- (Optional) The postal code of generated certificates -
generate_lease
- (Optional) Flag to generate leases with certificates -
no_store
- (Optional) Flag to not store certificates in the storage backend -
require_cn
- (Optional) Flag to force CN usage -
policy_identifiers
- (Optional) Specify the list of allowed policies IODs -
basic_constraints_valid_for_non_ca
- (Optional) Flag to mark basic constraints valid when issuing non-CA certificates
» Attributes Reference
No additional attributes are exported by this resource.
» Import
PKI secret backend roles can be imported using the path
, e.g.
$ terraform import vault_pki_secret_backend_role.role pki/roles/my_role