» vault_ssh_secret_backend_ca
Provides a resource to manage CA information in an SSH secret backend SSH secret backend within Vault.
» Example Usage
resource "vault_mount" "example" {
type = "ssh"
}
resource "vault_ssh_secret_backend_ca" "foo" {
backend = "${vault_mount.example.path}"
}
» Argument Reference
The following arguments are supported:
-
backend
- (Optional) The path where the SSH secret backend is mounted. Defaults to 'ssh' -
generate_signing_key
- (Optional) Whether Vault should generate the signing key pair internally. Defaults to true -
public_key
- (Optional) The public key part the SSH CA key pair; required if generate_signing_key is false. -
private_key
- (Optional) The private key part the SSH CA key pair; required if generate_signing_key is false.
Important Because Vault does not support reading the private_key back from the API, Terraform cannot detect
and correct drift on private_key
. Changing the values, however, will overwrite the previously stored values.
» Attributes Reference
No additional attributes are exposed by this resource.