-
Notifications
You must be signed in to change notification settings - Fork 232
/
azure.mgmt.compute.v2023_01_02.models.EncryptionSetIdentity.yml
94 lines (74 loc) · 3.48 KB
/
azure.mgmt.compute.v2023_01_02.models.EncryptionSetIdentity.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
### YamlMime:PythonClass
uid: azure.mgmt.compute.v2023_01_02.models.EncryptionSetIdentity
name: EncryptionSetIdentity
fullName: azure.mgmt.compute.v2023_01_02.models.EncryptionSetIdentity
module: azure.mgmt.compute.v2023_01_02.models
inheritances:
- azure.mgmt.compute._serialization.Model
summary: 'The managed identity for the disk encryption set. It should be given permission
on the key
vault before it can be used to encrypt disks.
Variables are only populated by the server, and will be ignored when sending a request.'
constructor:
syntax: 'EncryptionSetIdentity(*, type: str | _models.DiskEncryptionSetIdentityType
| None = None, user_assigned_identities: Dict[str, _models.UserAssignedIdentitiesValue]
| None = None, **kwargs: Any)'
keywordOnlyParameters:
- name: type
description: 'The type of Managed Identity used by the DiskEncryptionSet. Only
SystemAssigned
is supported for new creations. Disk Encryption Sets can be updated with Identity
type None
during migration of subscription to a new Azure Active Directory tenant; it
will cause the
encrypted resources to lose access to the keys. Known values are: "SystemAssigned",
"UserAssigned", "SystemAssigned, UserAssigned", and "None".'
types:
- <xref:str>
- <xref:azure.mgmt.compute.v2023_01_02.models.DiskEncryptionSetIdentityType>
- name: user_assigned_identities
description: 'The list of user identities associated with the disk
encryption set. The user identity dictionary key references will be ARM resource
ids in the
form:
''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}''. #
pylint: disable=line-too-long'
types:
- <xref:dict>[<xref:str>, <xref:azure.mgmt.compute.v2023_01_02.models.UserAssignedIdentitiesValue>]
variables:
- description: 'The type of Managed Identity used by the DiskEncryptionSet. Only SystemAssigned
is
supported for new creations. Disk Encryption Sets can be updated with Identity
type None during
migration of subscription to a new Azure Active Directory tenant; it will cause
the encrypted
resources to lose access to the keys. Known values are: "SystemAssigned", "UserAssigned",
"SystemAssigned, UserAssigned", and "None".'
name: type
types:
- <xref:str>
- <xref:azure.mgmt.compute.v2023_01_02.models.DiskEncryptionSetIdentityType>
- description: 'The object id of the Managed Identity Resource. This will be sent
to the RP
from ARM via the x-ms-identity-principal-id header in the PUT request if the resource
has a
systemAssigned(implicit) identity.'
name: principal_id
types:
- <xref:str>
- description: 'The tenant id of the Managed Identity Resource. This will be sent
to the RP
from ARM via the x-ms-client-tenant-id header in the PUT request if the resource
has a
systemAssigned(implicit) identity.'
name: tenant_id
types:
- <xref:str>
- description: 'The list of user identities associated with the disk encryption
set. The user identity dictionary key references will be ARM resource ids in the
form:
''/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ManagedIdentity/userAssignedIdentities/{identityName}''. #
pylint: disable=line-too-long'
name: user_assigned_identities
types:
- <xref:dict>[<xref:str>, <xref:azure.mgmt.compute.v2023_01_02.models.UserAssignedIdentitiesValue>]