keyvault

claranet/keyvault/azurerm

Terraform Module HCL AZURERM

Terraform module composition (feature) for Azure KeyVault

Install
module "keyvault" {
source = "claranet/keyvault/azurerm"
version = "8.2.0"
}
plain text: /constructs/tfmod-claranet-keyvault-azurerm/install.txt
⭐ Source on GitHub 📦 Registry page
README

Azure Key Vault feature ![Changelog](CHANGELOG.md) ![Notice](NOTICE) ![Apache V2 License](LICENSE) ![OpenTofu Registry](https://search.opentofu.org/module/claranet/keyvault/azurerm/) This Terraform module creates an Azure Key Vault with "reader" and "admin" pre-configured Access policies and Diagnostic settings enabled. Global versioning rule for Claranet Azure modules | Module version | Terraform version | OpenTofu version | AzureRM version | | -------------- | ----------------- | ---------------- | --------------- | | >= 8.x.x | Unverified | 1.8.x | >= 4.0 | | >= 7.x.x | 1.3.x | | >= 3.0 | | >= 6.x.x | 1.x | | >= 3.0 | | >= 5.x.x | 0.15.x | | >= 2.0 | | >= 4.x.x | 0.13.x / 0.14.x | | >= 2.0 | | >= 3.x.x | 0.12.x | | >= 2.0 | | >= 2.x.x | 0.12.x | | < 2.0 | | < 2.x.x | 0.11.x | | < 2.0 |

Inputs (30)
NameTypeDescriptionDefault
resource_group_namestringResource Group the resources will belong to. required
locationstringAzure location for Key Vault. required
logs_destinations_idslist(string)List of destination resources IDs for logs diagnostic destination. Can be `Stora required
location_shortstringShort string for Azure location. required
client_namestringClient name. required
stackstringStack name. required
environmentstringEnvironment name. required
managed_hardware_security_module_enabledboolCreate a Key Vault Managed HSM resource if enabled. Changing this forces a new rfalse
tenant_idstringThe Azure Active Directory tenant ID that should be used for authenticating requ""
enabled_for_template_deploymentboolWhether Azure Resource Manager is permitted to retrieve secrets from the Key Vaufalse
reader_objects_idslist(string)IDs of the objects that can read all keys, secrets and certificates.[]
public_network_access_enabledboolWhether the Key Vault is available from public network.false
hsm_security_domain_certificateslist(string)List of Key Vault certificates IDs to be used as security domain certificates.null
logs_categorieslist(string)Log categories to send to destinations.null
logs_metrics_categorieslist(string)Metrics categories to send to destinations.null
sku_namestringThe Name of the SKU used for this Key Vault. Possible values are `standard` and "standard"
name_prefixstringOptional prefix for the generated name.""
name_suffixstringOptional suffix for the generated name.""
admin_objects_idslist(string)IDs of the objects that can do all operations on all keys, secrets and certifica[]
custom_namestringName of the Key Vault, generated if not set.""
extra_tagsmap(string)Extra tags to add.{}
network_aclsobject({ bypass Object with attributes: `bypass`, `default_action`, `ip_rules`, `virtual_network{}
purge_protection_enabledboolWhether to activate purge protection.true
soft_delete_retention_daysnumberThe number of days that items should be retained for once soft-deleted. This val7
hsm_security_domain_quorumnumberNumber of security domain certificates needed to perform operations.null
enabled_for_deploymentboolWhether Azure Virtual Machines are permitted to retrieve certificates stored as false
enabled_for_disk_encryptionboolWhether Azure Disk Encryption is permitted to retrieve secrets from the vault anfalse
Outputs (11)
resource_role_assignment_key_vault_administrator — Role assignment for Key Vault Administrator.
resource_role_assignment_key_vault_secrets_users — Role assignment for Key Vault Secrets User.
resource_role_assignment_key_vault_reader — Role assignment for Key Vault Reader.
id — Key Vault ID.
uri — URI of the Key Vault.
resource_key_vault_access_policy_readers — Key Vault readers access policy.
resource_key_vault_access_policy_admins — Key Vault admins access policy.
name — Key Vault name.
resource — Key Vault resource object.
hsm_security_domain — The security domain of the Key Vault Managed Hardware Security Module.
module_diagnostics — Diagnostics module output.
Resources (4)
azurerm_key_vaultazurerm_key_vault_access_policyazurerm_key_vault_managed_hardware_security_moduleazurerm_role_assignment
Details
FrameworkTerraform Module
LanguageHCL
Version8.2.0
Cloud AZURERM
★ Stars22
Forks28
Total downloads334.9k
Inputs30
Outputs11
Resources4
Examples2
LicenseApache-2.0
Namespaceclaranet
Updated