» vault_pki_secret_backend_role

Creates a role on an PKI Secret Backend for Vault.

» Example Usage

resource "vault_pki_secret_backend" "pki" {
  path = "%s"
  default_lease_ttl_seconds = 3600
  max_lease_ttl_seconds = 86400
}

resource "vault_pki_secret_backend_role" "role" {
  backend = "${vault_pki_secret_backend.pki.path}"
  name    = "my_role"
}

» Argument Reference

The following arguments are supported:

  • backend - (Required) The path the PKI secret backend is mounted at, with no leading or trailing /s.

  • name - (Required) The name to identify this role within the backend. Must be unique within the backend.

  • ttl - (Optional) The TTL

  • max_ttl - (Optional) The maximum TTL

  • allow_localhost - (Optional) Flag to allow certificates for localhost

  • allowed_domains - (Optional) List of allowed domains for certificates

  • allow_bare_domains - (Optional) Flag to allow certificates matching the actual domain

  • allow_subdomains - (Optional) Flag to allow certificates matching subdomains

  • allow_glob_domains - (Optional) Flag to allow names containing glob patterns.

  • allow_any_name - (Optional) Flag to allow any name

  • enforce_hostnames - (Optional) Flag to allow only valid host names

  • allow_ip_sans - (Optional) Flag to allow IP SANs

  • allowed_uri_sans - (Optional) Defines allowed URI SANs

  • allowed_other_sans - (Optional) Defines allowed custom SANs

  • server_flag - (Optional) Flag to specify certificates for server use

  • client_flag - (Optional) Flag to specify certificates for client use

  • code_signing_flag - (Optional) Flag to specify certificates for code signing use

  • email_protection_flag - (Optional) Flag to specify certificates for email protection use

  • key_type - (Optional) The type of generated keys

  • key_bits - (Optional) The number of bits of generated keys

  • key_usage - (Optional) Specify the allowed key usage constraint on issued certificates

  • ext_key_usage - (Optional) Specify the allowed extended key usage constraint on issued certificates

  • use_csr_common_name - (Optional) Flag to use the CN in the CSR

  • use_csr_sans - (Optional) Flag to use the SANs in the CSR

  • ou - (Optional) The organization unit of generated certificates

  • organization - (Optional) The organization of generated certificates

  • country - (Optional) The country of generated certificates

  • locality - (Optional) The locality of generated certificates

  • province - (Optional) The province of generated certificates

  • street_address - (Optional) The street address of generated certificates

  • postal_code - (Optional) The postal code of generated certificates

  • generate_lease - (Optional) Flag to generate leases with certificates

  • no_store - (Optional) Flag to not store certificates in the storage backend

  • require_cn - (Optional) Flag to force CN usage

  • policy_identifiers - (Optional) Specify the list of allowed policies IODs

  • basic_constraints_valid_for_non_ca - (Optional) Flag to mark basic constraints valid when issuing non-CA certificates

» Attributes Reference

No additional attributes are exported by this resource.

» Import

PKI secret backend roles can be imported using the path, e.g.

$ terraform import vault_pki_secret_backend_role.role pki/roles/my_role