Azure Key Vault Managed Storage Account Sas Token Definition
This page shows how to write Terraform for Key Vault Managed Storage Account Sas Token Definition and write them securely.
The Managed Storage Account Sas Token Definition in Key Vault can be configured in Terraform with the resource name
azurerm_key_vault_managed_storage_account_sas_token_definition. The following sections describe how to use the resource and its parameters.
Example Usage from GitHub
An example could not be found in GitHub.
The following arguments are supported:
name- (Required) The name which should be used for this SAS Definition.
managed_storage_account_id- (Required) The ID of the Managed Storage Account.
sas_template_uri- (Required) The SAS definition token template signed with an arbitrary key. Tokens created according to the SAS definition will have the same properties as the template, but regenerated with a new validity period.
sas_type- (Required) The type of SAS token the SAS definition will create. Possible values are
validity_period- (Required) Validity period of SAS token. Value needs to be in ISO 8601 duration format.
tags- (Optional) A mapping of tags which should be assigned to the SAS Definition.
In addition to the Arguments listed above - the following Attributes are exported:
id- The ID of the Managed Storage Account SAS Definition.
secret_id- The ID of the Secret that is created by Managed Storage Account SAS Definition.
Explanation in Terraform Registry
Manages a Key Vault Managed Storage Account SAS Definition.
Tips: Best Practices for The Other Azure Key Vault Resources
In addition to the azurerm_key_vault, Azure Key Vault has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.
Ensure to specify a network ACL for the key vault
It is better to specify network ACL for the key vault. The default should be set to deny and Azure Services should be still accepted.
Ensure to configure the expiration date on all keys
It is better to configure the expiration date on all keys which is not set by default.
Ensure to set a content type
It is better to set a content type to aid interpretation on retrieval.
Azure Resource Manager Example
Azure Resource Manager code does not have the related resource.