AuthBackend
Create a AuthBackend Resource
new AuthBackend(name: string, args?: AuthBackendArgs, opts?: CustomResourceOptions);def AuthBackend(resource_name, opts=None, bound_issuer=None, default_role=None, description=None, jwks_ca_pem=None, jwks_url=None, jwt_supported_algs=None, jwt_validation_pubkeys=None, oidc_client_id=None, oidc_client_secret=None, oidc_discovery_ca_pem=None, oidc_discovery_url=None, path=None, tune=None, type=None, __props__=None);func NewAuthBackend(ctx *Context, name string, args *AuthBackendArgs, opts ...ResourceOption) (*AuthBackend, error)public AuthBackend(string name, AuthBackendArgs? args = null, CustomResourceOptions? opts = null)- name string
- The unique name of the resource.
- args AuthBackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- opts ResourceOptions
- A bag of options that control this resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args AuthBackendArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args AuthBackendArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
AuthBackend Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Programming Model docs.
Inputs
The AuthBackend resource accepts the following input properties:
- Bound
Issuer string The value against which to match the iss claim in a JWT
- Default
Role string The default role to use if none is provided during login
- Description string
The description of the auth backend
- Jwks
Ca stringPem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
- Jwks
Url string JWKS URL to use to authenticate signatures. Cannot be used with “oidc_discovery_url” or “jwt_validation_pubkeys”.
- Jwt
Supported List<string>Algs A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
- Jwt
Validation List<string>Pubkeys A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with
oidc_discovery_url- Oidc
Client stringId Client ID used for OIDC backends
- Oidc
Client stringSecret Client Secret used for OIDC backends
- Oidc
Discovery stringCa Pem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
- Oidc
Discovery stringUrl The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with
jwt_validation_pubkeys- Path string
Path to mount the JWT/OIDC auth backend
- Tune
Auth
Backend Tune Args - Type string
Type of auth backend. Should be one of
jwtoroidc. Default -jwt
- Bound
Issuer string The value against which to match the iss claim in a JWT
- Default
Role string The default role to use if none is provided during login
- Description string
The description of the auth backend
- Jwks
Ca stringPem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
- Jwks
Url string JWKS URL to use to authenticate signatures. Cannot be used with “oidc_discovery_url” or “jwt_validation_pubkeys”.
- Jwt
Supported []stringAlgs A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
- Jwt
Validation []stringPubkeys A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with
oidc_discovery_url- Oidc
Client stringId Client ID used for OIDC backends
- Oidc
Client stringSecret Client Secret used for OIDC backends
- Oidc
Discovery stringCa Pem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
- Oidc
Discovery stringUrl The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with
jwt_validation_pubkeys- Path string
Path to mount the JWT/OIDC auth backend
- Tune
Auth
Backend Tune - Type string
Type of auth backend. Should be one of
jwtoroidc. Default -jwt
- bound
Issuer string The value against which to match the iss claim in a JWT
- default
Role string The default role to use if none is provided during login
- description string
The description of the auth backend
- jwks
Ca stringPem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
- jwks
Url string JWKS URL to use to authenticate signatures. Cannot be used with “oidc_discovery_url” or “jwt_validation_pubkeys”.
- jwt
Supported string[]Algs A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
- jwt
Validation string[]Pubkeys A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with
oidc_discovery_url- oidc
Client stringId Client ID used for OIDC backends
- oidc
Client stringSecret Client Secret used for OIDC backends
- oidc
Discovery stringCa Pem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
- oidc
Discovery stringUrl The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with
jwt_validation_pubkeys- path string
Path to mount the JWT/OIDC auth backend
- tune
Auth
Backend Tune - type string
Type of auth backend. Should be one of
jwtoroidc. Default -jwt
- bound_
issuer str The value against which to match the iss claim in a JWT
- default_
role str The default role to use if none is provided during login
- description str
The description of the auth backend
- jwks_
ca_ strpem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
- jwks_
url str JWKS URL to use to authenticate signatures. Cannot be used with “oidc_discovery_url” or “jwt_validation_pubkeys”.
- jwt_
supported_ List[str]algs A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
- jwt_
validation_ List[str]pubkeys A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with
oidc_discovery_url- oidc_
client_ strid Client ID used for OIDC backends
- oidc_
client_ strsecret Client Secret used for OIDC backends
- oidc_
discovery_ strca_ pem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
- oidc_
discovery_ strurl The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with
jwt_validation_pubkeys- path str
Path to mount the JWT/OIDC auth backend
- tune
Dict[Auth
Backend Tune] - type str
Type of auth backend. Should be one of
jwtoroidc. Default -jwt
Outputs
All input properties are implicitly available as output properties. Additionally, the AuthBackend resource produces the following output properties:
Look up an Existing AuthBackend Resource
Get an existing AuthBackend resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: AuthBackendState, opts?: CustomResourceOptions): AuthBackendstatic get(resource_name, id, opts=None, accessor=None, bound_issuer=None, default_role=None, description=None, jwks_ca_pem=None, jwks_url=None, jwt_supported_algs=None, jwt_validation_pubkeys=None, oidc_client_id=None, oidc_client_secret=None, oidc_discovery_ca_pem=None, oidc_discovery_url=None, path=None, tune=None, type=None, __props__=None);func GetAuthBackend(ctx *Context, name string, id IDInput, state *AuthBackendState, opts ...ResourceOption) (*AuthBackend, error)public static AuthBackend Get(string name, Input<string> id, AuthBackendState? state, CustomResourceOptions? opts = null)- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
The following state arguments are supported:
- Accessor string
The accessor of the JWT auth backend
- Bound
Issuer string The value against which to match the iss claim in a JWT
- Default
Role string The default role to use if none is provided during login
- Description string
The description of the auth backend
- Jwks
Ca stringPem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
- Jwks
Url string JWKS URL to use to authenticate signatures. Cannot be used with “oidc_discovery_url” or “jwt_validation_pubkeys”.
- Jwt
Supported List<string>Algs A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
- Jwt
Validation List<string>Pubkeys A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with
oidc_discovery_url- Oidc
Client stringId Client ID used for OIDC backends
- Oidc
Client stringSecret Client Secret used for OIDC backends
- Oidc
Discovery stringCa Pem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
- Oidc
Discovery stringUrl The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with
jwt_validation_pubkeys- Path string
Path to mount the JWT/OIDC auth backend
- Tune
Auth
Backend Tune Args - Type string
Type of auth backend. Should be one of
jwtoroidc. Default -jwt
- Accessor string
The accessor of the JWT auth backend
- Bound
Issuer string The value against which to match the iss claim in a JWT
- Default
Role string The default role to use if none is provided during login
- Description string
The description of the auth backend
- Jwks
Ca stringPem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
- Jwks
Url string JWKS URL to use to authenticate signatures. Cannot be used with “oidc_discovery_url” or “jwt_validation_pubkeys”.
- Jwt
Supported []stringAlgs A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
- Jwt
Validation []stringPubkeys A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with
oidc_discovery_url- Oidc
Client stringId Client ID used for OIDC backends
- Oidc
Client stringSecret Client Secret used for OIDC backends
- Oidc
Discovery stringCa Pem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
- Oidc
Discovery stringUrl The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with
jwt_validation_pubkeys- Path string
Path to mount the JWT/OIDC auth backend
- Tune
Auth
Backend Tune - Type string
Type of auth backend. Should be one of
jwtoroidc. Default -jwt
- accessor string
The accessor of the JWT auth backend
- bound
Issuer string The value against which to match the iss claim in a JWT
- default
Role string The default role to use if none is provided during login
- description string
The description of the auth backend
- jwks
Ca stringPem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
- jwks
Url string JWKS URL to use to authenticate signatures. Cannot be used with “oidc_discovery_url” or “jwt_validation_pubkeys”.
- jwt
Supported string[]Algs A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
- jwt
Validation string[]Pubkeys A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with
oidc_discovery_url- oidc
Client stringId Client ID used for OIDC backends
- oidc
Client stringSecret Client Secret used for OIDC backends
- oidc
Discovery stringCa Pem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
- oidc
Discovery stringUrl The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with
jwt_validation_pubkeys- path string
Path to mount the JWT/OIDC auth backend
- tune
Auth
Backend Tune - type string
Type of auth backend. Should be one of
jwtoroidc. Default -jwt
- accessor str
The accessor of the JWT auth backend
- bound_
issuer str The value against which to match the iss claim in a JWT
- default_
role str The default role to use if none is provided during login
- description str
The description of the auth backend
- jwks_
ca_ strpem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the JWKS URL. If not set, system certificates are used.
- jwks_
url str JWKS URL to use to authenticate signatures. Cannot be used with “oidc_discovery_url” or “jwt_validation_pubkeys”.
- jwt_
supported_ List[str]algs A list of supported signing algorithms. Vault 1.1.0 defaults to [RS256] but future or past versions of Vault may differ
- jwt_
validation_ List[str]pubkeys A list of PEM-encoded public keys to use to authenticate signatures locally. Cannot be used in combination with
oidc_discovery_url- oidc_
client_ strid Client ID used for OIDC backends
- oidc_
client_ strsecret Client Secret used for OIDC backends
- oidc_
discovery_ strca_ pem The CA certificate or chain of certificates, in PEM format, to use to validate connections to the OIDC Discovery URL. If not set, system certificates are used
- oidc_
discovery_ strurl The OIDC Discovery URL, without any .well-known component (base path). Cannot be used in combination with
jwt_validation_pubkeys- path str
Path to mount the JWT/OIDC auth backend
- tune
Dict[Auth
Backend Tune] - type str
Type of auth backend. Should be one of
jwtoroidc. Default -jwt
Supporting Types
AuthBackendTune
- Allowed
Response List<string>Headers List of headers to whitelist and allowing a plugin to include them in the response.
- Audit
Non List<string>Hmac Request Keys Specifies the list of keys that will not be HMAC’d by audit devices in the request data object.
- Audit
Non List<string>Hmac Response Keys Specifies the list of keys that will not be HMAC’d by audit devices in the response data object.
- Default
Lease stringTtl Specifies the default time-to-live. If set, this overrides the global default. Must be a valid duration string
- Listing
Visibility string Specifies whether to show this mount in the UI-specific listing endpoint. Valid values are “unauth” or “hidden”.
- Max
Lease stringTtl Specifies the maximum time-to-live. If set, this overrides the global default. Must be a valid duration string
- Passthrough
Request List<string>Headers List of headers to whitelist and pass from the request to the backend.
- Token
Type string Specifies the type of tokens that should be returned by the mount. Valid values are “default-service”, “default-batch”, “service”, “batch”.
- Allowed
Response []stringHeaders List of headers to whitelist and allowing a plugin to include them in the response.
- Audit
Non []stringHmac Request Keys Specifies the list of keys that will not be HMAC’d by audit devices in the request data object.
- Audit
Non []stringHmac Response Keys Specifies the list of keys that will not be HMAC’d by audit devices in the response data object.
- Default
Lease stringTtl Specifies the default time-to-live. If set, this overrides the global default. Must be a valid duration string
- Listing
Visibility string Specifies whether to show this mount in the UI-specific listing endpoint. Valid values are “unauth” or “hidden”.
- Max
Lease stringTtl Specifies the maximum time-to-live. If set, this overrides the global default. Must be a valid duration string
- Passthrough
Request []stringHeaders List of headers to whitelist and pass from the request to the backend.
- Token
Type string Specifies the type of tokens that should be returned by the mount. Valid values are “default-service”, “default-batch”, “service”, “batch”.
- allowed
Response string[]Headers List of headers to whitelist and allowing a plugin to include them in the response.
- audit
Non string[]Hmac Request Keys Specifies the list of keys that will not be HMAC’d by audit devices in the request data object.
- audit
Non string[]Hmac Response Keys Specifies the list of keys that will not be HMAC’d by audit devices in the response data object.
- default
Lease stringTtl Specifies the default time-to-live. If set, this overrides the global default. Must be a valid duration string
- listing
Visibility string Specifies whether to show this mount in the UI-specific listing endpoint. Valid values are “unauth” or “hidden”.
- max
Lease stringTtl Specifies the maximum time-to-live. If set, this overrides the global default. Must be a valid duration string
- passthrough
Request string[]Headers List of headers to whitelist and pass from the request to the backend.
- token
Type string Specifies the type of tokens that should be returned by the mount. Valid values are “default-service”, “default-batch”, “service”, “batch”.
- allowed
Response List[str]Headers List of headers to whitelist and allowing a plugin to include them in the response.
- audit
Non List[str]Hmac Request Keys Specifies the list of keys that will not be HMAC’d by audit devices in the request data object.
- audit
Non List[str]Hmac Response Keys Specifies the list of keys that will not be HMAC’d by audit devices in the response data object.
- default
Lease strTtl Specifies the default time-to-live. If set, this overrides the global default. Must be a valid duration string
- listing_
visibility str Specifies whether to show this mount in the UI-specific listing endpoint. Valid values are “unauth” or “hidden”.
- max
Lease strTtl Specifies the maximum time-to-live. If set, this overrides the global default. Must be a valid duration string
- passthrough
Request List[str]Headers List of headers to whitelist and pass from the request to the backend.
- token_
type str Specifies the type of tokens that should be returned by the mount. Valid values are “default-service”, “default-batch”, “service”, “batch”.
Package Details
- Repository
- https://github.com/pulumi/pulumi-vault
- License
- Apache-2.0
- Notes
- This Pulumi package is based on the
vaultTerraform Provider.