Skip to content

Terraform azurerm module for Key Vault in Azure with Multiple Access Policies and Secrets

License

Notifications You must be signed in to change notification settings

jungopro/terraform-azurerm-keyvault-advanced

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

terraform-azurerm-keyvault-advanced

Build Status

Create Key Vault in Azure and (optionally) add policies and secrets

This Terraform module deploys a Key Vautl to Azure with a access policies and secrets passed as inputs This module also has the option to create a Resource Group for the Key Vault, althought I recommend creating it manually since destruction of the Resource Group with terraform destroy can potientially cause destruction of other resources in the Resource Group beside the Key Vault

Usage

module "keyvault" {
  source              = "jungopro/keyvault-advanced/azurerm"
  resource_group_name = "myKeyVaultResourceGroup"
  location            = "westeurope"

  tags = {
    environment = "dev"
  }
}

Example with multiple policies and secrets

module "keyvault" {
  source              = "jungopro/keyvault-advanced/azurerm"
  resource_group_name = "myKeyVaultResourceGroup"
  location            = "westeurope"

  tags = {
    environment = "dev"
  }

  policies = {
    full = {
      tenant_id = "<ADD-TENANT-ID"
      object_id = "<ADD-OBJECT-ID>"
      key_permissions = [
        "backup",
        "create",
        "decrypt",
        "delete",
        "encrypt",
        "get",
        "import",
        "list",
        "purge",
        "recover",
        "restore",
        "sign",
        "unwrapKey",
        "update",
        "verify",
        "wrapKey",
      ]
      secret_permissions = [
        "backup",
        "delete",
        "get",
        "list",
        "purge",
        "recover",
        "restore",
        "set",
      ]
      certificate_permissions = [
        "create",
        "delete",
        "deleteissuers",
        "get",
        "getissuers",
        "import",
        "list",
        "listissuers",
        "managecontacts",
        "manageissuers",
        "purge",
        "recover",
        "setissuers",
        "update",
        "backup",
        "restore",
      ]
    }
    read = {
      tenant_id = "<ADD-TENANT-ID"
      object_id = "<ADD-OBJECT-ID>"
      key_permissions = [
        "get",
        "list",
      ]
      secret_permissions = [
        "get",
        "list",
      ]
      certificate_permissions = [
        "get",
        "getissuers",
        "list",
        "listissuers",
      ]
    }
  }

  secrets = {
    foo = {
      value = "" # setting to "" will auto generate a random value
    }
    bar = {
      value = "mysecretvalue" #
    }
  }
}

Authors

Originally created by Omer Barel

License

MIT

About

Terraform azurerm module for Key Vault in Azure with Multiple Access Policies and Secrets

Resources

License

Stars

Watchers

Forks

Packages

 
 
 

Languages