Terraform module for creation Azure Key Vault Key
data "azurerm_key_vault" "example" {
name = "example"
resource_group_name = "example"
}
module "key_vault_keys" {
source = "data-platform-hq/key-vault-key/azurerm"
version = "~> 1.0"
project = "datahq"
env = "example"
location = "eastus"
prefix = "cmk"
key_vault_id = data.azurerm_key_vault.example.id
}| Name | Version |
|---|---|
| terraform | >=1.3 |
| azurerm | >= 4.0.1 |
| Name | Version |
|---|---|
| azurerm | >= 4.0.1 |
No modules.
| Name | Type |
|---|---|
| azurerm_key_vault_key.this | resource |
| Name | Description | Type | Default | Required |
|---|---|---|---|---|
| custom_key_name | Specifies the custom name of the Key Vault Key | string |
null |
no |
| custom_rotation_policy | Map with parameters to configure Key rotation policy | object({ |
n/a | yes |
| default_expiration_date | Expiration UTC datetime (Y-m-d'T'H:M:S'Z') | string |
null |
no |
| env | Environment name | string |
n/a | yes |
| key_opts | JSON web key operations: (decrypt,encrypt,sign,unwrapKey,verify,wrapKey) | list(string) |
[ |
no |
| key_size | Size of the RSA key to create in bytes, required for RSA & RSA-HSM: (1024 - 2048) | number |
2048 |
no |
| key_type | Key Type to use for this Key Vault Key: (EC,EC-HSM,RSA,RSA-HSM) | string |
"RSA" |
no |
| key_vault_id | Key Vault ID | string |
n/a | yes |
| location | Specifies the supported Azure location where the resource exists | string |
n/a | yes |
| prefix | Specifies the prefix of the Key Vault Key | string |
"" |
no |
| project | Project name | string |
n/a | yes |
| Name | Description |
|---|---|
| key_id | The Key Vault Key ID |
| key_name | The Key Vault Key name |
Apache 2 Licensed. For more information please see LICENSE