Azure Hardware Security Module Module
This page shows how to write Terraform for Hardware Security Module Module and write them securely.
azurerm_dedicated_hardware_security_module (Terraform)
The Module in Hardware Security Module can be configured in Terraform with the resource name azurerm_dedicated_hardware_security_module
. The following sections describe how to use the resource and its parameters.
Example Usage from GitHub
An example could not be found in GitHub.
Parameters
-
id
optional computed - string -
location
required - string -
name
required - string -
resource_group_name
required - string -
sku_name
required - string -
stamp_id
optional - string -
tags
optional - map from string to string -
zones
optional - list of string -
network_profile
list block-
network_interface_private_ip_addresses
required - set of string -
subnet_id
required - string
-
-
timeouts
single block
Explanation in Terraform Registry
Manages a Dedicated Hardware Security Module. -> Note: Before using this resource, it's required to submit the request of registering the providers and features with Azure CLI
az provider register --namespace Microsoft.HardwareSecurityModules && az feature register --namespace Microsoft.HardwareSecurityModules --name AzureDedicatedHSM && az provider register --namespace Microsoft.Network && az feature register --namespace Microsoft.Network --name AllowBaremetalServers
and ask service team (hsmrequest@microsoft.com) to approve. See more details from https://docs.microsoft.com/en-us/azure/dedicated-hsm/tutorial-deploy-hsm-cli#prerequisites. -> Note: If the quota is not enough in some region, please submit the quota request to service team.
Azure Resource Manager Example
Azure Resource Manager code does not have the related resource.