1. Packages
  2. Akeyless Provider
  3. API Docs
  4. DynamicSecretAws
akeyless 1.9.0 published on Monday, Apr 14, 2025 by akeyless-community

akeyless.DynamicSecretAws

Explore with Pulumi AI

AWS dynamic secret resource

Create DynamicSecretAws Resource

Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

Constructor syntax

new DynamicSecretAws(name: string, args?: DynamicSecretAwsArgs, opts?: CustomResourceOptions);
@overload
def DynamicSecretAws(resource_name: str,
                     args: Optional[DynamicSecretAwsArgs] = None,
                     opts: Optional[ResourceOptions] = None)

@overload
def DynamicSecretAws(resource_name: str,
                     opts: Optional[ResourceOptions] = None,
                     access_mode: Optional[str] = None,
                     aws_access_key_id: Optional[str] = None,
                     aws_access_secret_key: Optional[str] = None,
                     aws_role_arns: Optional[str] = None,
                     aws_user_console_access: Optional[bool] = None,
                     aws_user_groups: Optional[str] = None,
                     aws_user_policies: Optional[str] = None,
                     aws_user_programmatic_access: Optional[bool] = None,
                     dynamic_secret_aws_id: Optional[str] = None,
                     encryption_key_name: Optional[str] = None,
                     name: Optional[str] = None,
                     password_length: Optional[str] = None,
                     region: Optional[str] = None,
                     secure_access_aws_account_id: Optional[str] = None,
                     secure_access_aws_native_cli: Optional[bool] = None,
                     secure_access_aws_region: Optional[str] = None,
                     secure_access_bastion_issuer: Optional[str] = None,
                     secure_access_enable: Optional[str] = None,
                     secure_access_url: Optional[str] = None,
                     secure_access_web: Optional[bool] = None,
                     secure_access_web_browsing: Optional[bool] = None,
                     tags: Optional[Sequence[str]] = None,
                     target_name: Optional[str] = None,
                     user_ttl: Optional[str] = None)
func NewDynamicSecretAws(ctx *Context, name string, args *DynamicSecretAwsArgs, opts ...ResourceOption) (*DynamicSecretAws, error)
public DynamicSecretAws(string name, DynamicSecretAwsArgs? args = null, CustomResourceOptions? opts = null)
public DynamicSecretAws(String name, DynamicSecretAwsArgs args)
public DynamicSecretAws(String name, DynamicSecretAwsArgs args, CustomResourceOptions options)
type: akeyless:DynamicSecretAws
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

Parameters

name This property is required. string
The unique name of the resource.
args DynamicSecretAwsArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name This property is required. str
The unique name of the resource.
args DynamicSecretAwsArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name This property is required. string
The unique name of the resource.
args DynamicSecretAwsArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name This property is required. string
The unique name of the resource.
args DynamicSecretAwsArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name This property is required. String
The unique name of the resource.
args This property is required. DynamicSecretAwsArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

Constructor example

The following reference example uses placeholder values for all input properties.

var dynamicSecretAwsResource = new Akeyless.DynamicSecretAws("dynamicSecretAwsResource", new()
{
    AccessMode = "string",
    AwsAccessKeyId = "string",
    AwsAccessSecretKey = "string",
    AwsRoleArns = "string",
    AwsUserConsoleAccess = false,
    AwsUserGroups = "string",
    AwsUserPolicies = "string",
    AwsUserProgrammaticAccess = false,
    DynamicSecretAwsId = "string",
    EncryptionKeyName = "string",
    Name = "string",
    PasswordLength = "string",
    Region = "string",
    SecureAccessAwsAccountId = "string",
    SecureAccessAwsNativeCli = false,
    SecureAccessAwsRegion = "string",
    SecureAccessBastionIssuer = "string",
    SecureAccessEnable = "string",
    SecureAccessUrl = "string",
    SecureAccessWeb = false,
    SecureAccessWebBrowsing = false,
    Tags = new[]
    {
        "string",
    },
    TargetName = "string",
    UserTtl = "string",
});
Copy
example, err := akeyless.NewDynamicSecretAws(ctx, "dynamicSecretAwsResource", &akeyless.DynamicSecretAwsArgs{
AccessMode: pulumi.String("string"),
AwsAccessKeyId: pulumi.String("string"),
AwsAccessSecretKey: pulumi.String("string"),
AwsRoleArns: pulumi.String("string"),
AwsUserConsoleAccess: pulumi.Bool(false),
AwsUserGroups: pulumi.String("string"),
AwsUserPolicies: pulumi.String("string"),
AwsUserProgrammaticAccess: pulumi.Bool(false),
DynamicSecretAwsId: pulumi.String("string"),
EncryptionKeyName: pulumi.String("string"),
Name: pulumi.String("string"),
PasswordLength: pulumi.String("string"),
Region: pulumi.String("string"),
SecureAccessAwsAccountId: pulumi.String("string"),
SecureAccessAwsNativeCli: pulumi.Bool(false),
SecureAccessAwsRegion: pulumi.String("string"),
SecureAccessBastionIssuer: pulumi.String("string"),
SecureAccessEnable: pulumi.String("string"),
SecureAccessUrl: pulumi.String("string"),
SecureAccessWeb: pulumi.Bool(false),
SecureAccessWebBrowsing: pulumi.Bool(false),
Tags: pulumi.StringArray{
pulumi.String("string"),
},
TargetName: pulumi.String("string"),
UserTtl: pulumi.String("string"),
})
Copy
var dynamicSecretAwsResource = new DynamicSecretAws("dynamicSecretAwsResource", DynamicSecretAwsArgs.builder()
    .accessMode("string")
    .awsAccessKeyId("string")
    .awsAccessSecretKey("string")
    .awsRoleArns("string")
    .awsUserConsoleAccess(false)
    .awsUserGroups("string")
    .awsUserPolicies("string")
    .awsUserProgrammaticAccess(false)
    .dynamicSecretAwsId("string")
    .encryptionKeyName("string")
    .name("string")
    .passwordLength("string")
    .region("string")
    .secureAccessAwsAccountId("string")
    .secureAccessAwsNativeCli(false)
    .secureAccessAwsRegion("string")
    .secureAccessBastionIssuer("string")
    .secureAccessEnable("string")
    .secureAccessUrl("string")
    .secureAccessWeb(false)
    .secureAccessWebBrowsing(false)
    .tags("string")
    .targetName("string")
    .userTtl("string")
    .build());
Copy
dynamic_secret_aws_resource = akeyless.DynamicSecretAws("dynamicSecretAwsResource",
    access_mode="string",
    aws_access_key_id="string",
    aws_access_secret_key="string",
    aws_role_arns="string",
    aws_user_console_access=False,
    aws_user_groups="string",
    aws_user_policies="string",
    aws_user_programmatic_access=False,
    dynamic_secret_aws_id="string",
    encryption_key_name="string",
    name="string",
    password_length="string",
    region="string",
    secure_access_aws_account_id="string",
    secure_access_aws_native_cli=False,
    secure_access_aws_region="string",
    secure_access_bastion_issuer="string",
    secure_access_enable="string",
    secure_access_url="string",
    secure_access_web=False,
    secure_access_web_browsing=False,
    tags=["string"],
    target_name="string",
    user_ttl="string")
Copy
const dynamicSecretAwsResource = new akeyless.DynamicSecretAws("dynamicSecretAwsResource", {
    accessMode: "string",
    awsAccessKeyId: "string",
    awsAccessSecretKey: "string",
    awsRoleArns: "string",
    awsUserConsoleAccess: false,
    awsUserGroups: "string",
    awsUserPolicies: "string",
    awsUserProgrammaticAccess: false,
    dynamicSecretAwsId: "string",
    encryptionKeyName: "string",
    name: "string",
    passwordLength: "string",
    region: "string",
    secureAccessAwsAccountId: "string",
    secureAccessAwsNativeCli: false,
    secureAccessAwsRegion: "string",
    secureAccessBastionIssuer: "string",
    secureAccessEnable: "string",
    secureAccessUrl: "string",
    secureAccessWeb: false,
    secureAccessWebBrowsing: false,
    tags: ["string"],
    targetName: "string",
    userTtl: "string",
});
Copy
type: akeyless:DynamicSecretAws
properties:
    accessMode: string
    awsAccessKeyId: string
    awsAccessSecretKey: string
    awsRoleArns: string
    awsUserConsoleAccess: false
    awsUserGroups: string
    awsUserPolicies: string
    awsUserProgrammaticAccess: false
    dynamicSecretAwsId: string
    encryptionKeyName: string
    name: string
    passwordLength: string
    region: string
    secureAccessAwsAccountId: string
    secureAccessAwsNativeCli: false
    secureAccessAwsRegion: string
    secureAccessBastionIssuer: string
    secureAccessEnable: string
    secureAccessUrl: string
    secureAccessWeb: false
    secureAccessWebBrowsing: false
    tags:
        - string
    targetName: string
    userTtl: string
Copy

DynamicSecretAws Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

The DynamicSecretAws resource accepts the following input properties:

AccessMode string
The types of credentials to retrieve from AWS. Options:[iamuser,assumerole]
AwsAccessKeyId string
Access Key ID
AwsAccessSecretKey string
Access Secret Key
AwsRoleArns string
AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma
AwsUserConsoleAccess bool
Enable AWS User console access
AwsUserGroups string
UserGroup name(s). Multiple values should be separated by comma
AwsUserPolicies string
Policy ARN(s). Multiple values should be separated by comma
AwsUserProgrammaticAccess bool
Enable AWS User programmatic access
DynamicSecretAwsId string
The ID of this resource.
EncryptionKeyName string
Encrypt dynamic secret details with following key
Name string
Dynamic secret name
PasswordLength string
The length of the password to be generated
Region string
Region
SecureAccessAwsAccountId string
The aws account id
SecureAccessAwsNativeCli bool
The aws native cli
SecureAccessAwsRegion string
SecureAccessBastionIssuer string
Path to the SSH Certificate Issuer for your Akeyless Bastion
SecureAccessEnable string
Enable/Disable secure remote access, [true/false]
SecureAccessUrl string
SecureAccessWeb bool
Enable Web Secure Remote Access
SecureAccessWebBrowsing bool
Secure browser via Akeyless Web Access Bastion
Tags List<string>
List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
TargetName string
Name of existing target to use in dynamic secret creation
UserTtl string
User TTL
AccessMode string
The types of credentials to retrieve from AWS. Options:[iamuser,assumerole]
AwsAccessKeyId string
Access Key ID
AwsAccessSecretKey string
Access Secret Key
AwsRoleArns string
AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma
AwsUserConsoleAccess bool
Enable AWS User console access
AwsUserGroups string
UserGroup name(s). Multiple values should be separated by comma
AwsUserPolicies string
Policy ARN(s). Multiple values should be separated by comma
AwsUserProgrammaticAccess bool
Enable AWS User programmatic access
DynamicSecretAwsId string
The ID of this resource.
EncryptionKeyName string
Encrypt dynamic secret details with following key
Name string
Dynamic secret name
PasswordLength string
The length of the password to be generated
Region string
Region
SecureAccessAwsAccountId string
The aws account id
SecureAccessAwsNativeCli bool
The aws native cli
SecureAccessAwsRegion string
SecureAccessBastionIssuer string
Path to the SSH Certificate Issuer for your Akeyless Bastion
SecureAccessEnable string
Enable/Disable secure remote access, [true/false]
SecureAccessUrl string
SecureAccessWeb bool
Enable Web Secure Remote Access
SecureAccessWebBrowsing bool
Secure browser via Akeyless Web Access Bastion
Tags []string
List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
TargetName string
Name of existing target to use in dynamic secret creation
UserTtl string
User TTL
accessMode String
The types of credentials to retrieve from AWS. Options:[iamuser,assumerole]
awsAccessKeyId String
Access Key ID
awsAccessSecretKey String
Access Secret Key
awsRoleArns String
AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma
awsUserConsoleAccess Boolean
Enable AWS User console access
awsUserGroups String
UserGroup name(s). Multiple values should be separated by comma
awsUserPolicies String
Policy ARN(s). Multiple values should be separated by comma
awsUserProgrammaticAccess Boolean
Enable AWS User programmatic access
dynamicSecretAwsId String
The ID of this resource.
encryptionKeyName String
Encrypt dynamic secret details with following key
name String
Dynamic secret name
passwordLength String
The length of the password to be generated
region String
Region
secureAccessAwsAccountId String
The aws account id
secureAccessAwsNativeCli Boolean
The aws native cli
secureAccessAwsRegion String
secureAccessBastionIssuer String
Path to the SSH Certificate Issuer for your Akeyless Bastion
secureAccessEnable String
Enable/Disable secure remote access, [true/false]
secureAccessUrl String
secureAccessWeb Boolean
Enable Web Secure Remote Access
secureAccessWebBrowsing Boolean
Secure browser via Akeyless Web Access Bastion
tags List<String>
List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
targetName String
Name of existing target to use in dynamic secret creation
userTtl String
User TTL
accessMode string
The types of credentials to retrieve from AWS. Options:[iamuser,assumerole]
awsAccessKeyId string
Access Key ID
awsAccessSecretKey string
Access Secret Key
awsRoleArns string
AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma
awsUserConsoleAccess boolean
Enable AWS User console access
awsUserGroups string
UserGroup name(s). Multiple values should be separated by comma
awsUserPolicies string
Policy ARN(s). Multiple values should be separated by comma
awsUserProgrammaticAccess boolean
Enable AWS User programmatic access
dynamicSecretAwsId string
The ID of this resource.
encryptionKeyName string
Encrypt dynamic secret details with following key
name string
Dynamic secret name
passwordLength string
The length of the password to be generated
region string
Region
secureAccessAwsAccountId string
The aws account id
secureAccessAwsNativeCli boolean
The aws native cli
secureAccessAwsRegion string
secureAccessBastionIssuer string
Path to the SSH Certificate Issuer for your Akeyless Bastion
secureAccessEnable string
Enable/Disable secure remote access, [true/false]
secureAccessUrl string
secureAccessWeb boolean
Enable Web Secure Remote Access
secureAccessWebBrowsing boolean
Secure browser via Akeyless Web Access Bastion
tags string[]
List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
targetName string
Name of existing target to use in dynamic secret creation
userTtl string
User TTL
access_mode str
The types of credentials to retrieve from AWS. Options:[iamuser,assumerole]
aws_access_key_id str
Access Key ID
aws_access_secret_key str
Access Secret Key
aws_role_arns str
AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma
aws_user_console_access bool
Enable AWS User console access
aws_user_groups str
UserGroup name(s). Multiple values should be separated by comma
aws_user_policies str
Policy ARN(s). Multiple values should be separated by comma
aws_user_programmatic_access bool
Enable AWS User programmatic access
dynamic_secret_aws_id str
The ID of this resource.
encryption_key_name str
Encrypt dynamic secret details with following key
name str
Dynamic secret name
password_length str
The length of the password to be generated
region str
Region
secure_access_aws_account_id str
The aws account id
secure_access_aws_native_cli bool
The aws native cli
secure_access_aws_region str
secure_access_bastion_issuer str
Path to the SSH Certificate Issuer for your Akeyless Bastion
secure_access_enable str
Enable/Disable secure remote access, [true/false]
secure_access_url str
secure_access_web bool
Enable Web Secure Remote Access
secure_access_web_browsing bool
Secure browser via Akeyless Web Access Bastion
tags Sequence[str]
List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
target_name str
Name of existing target to use in dynamic secret creation
user_ttl str
User TTL
accessMode String
The types of credentials to retrieve from AWS. Options:[iamuser,assumerole]
awsAccessKeyId String
Access Key ID
awsAccessSecretKey String
Access Secret Key
awsRoleArns String
AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma
awsUserConsoleAccess Boolean
Enable AWS User console access
awsUserGroups String
UserGroup name(s). Multiple values should be separated by comma
awsUserPolicies String
Policy ARN(s). Multiple values should be separated by comma
awsUserProgrammaticAccess Boolean
Enable AWS User programmatic access
dynamicSecretAwsId String
The ID of this resource.
encryptionKeyName String
Encrypt dynamic secret details with following key
name String
Dynamic secret name
passwordLength String
The length of the password to be generated
region String
Region
secureAccessAwsAccountId String
The aws account id
secureAccessAwsNativeCli Boolean
The aws native cli
secureAccessAwsRegion String
secureAccessBastionIssuer String
Path to the SSH Certificate Issuer for your Akeyless Bastion
secureAccessEnable String
Enable/Disable secure remote access, [true/false]
secureAccessUrl String
secureAccessWeb Boolean
Enable Web Secure Remote Access
secureAccessWebBrowsing Boolean
Secure browser via Akeyless Web Access Bastion
tags List<String>
List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
targetName String
Name of existing target to use in dynamic secret creation
userTtl String
User TTL

Outputs

All input properties are implicitly available as output properties. Additionally, the DynamicSecretAws resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
Id string
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.
id string
The provider-assigned unique ID for this managed resource.
id str
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.

Look up Existing DynamicSecretAws Resource

Get an existing DynamicSecretAws resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: DynamicSecretAwsState, opts?: CustomResourceOptions): DynamicSecretAws
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        access_mode: Optional[str] = None,
        aws_access_key_id: Optional[str] = None,
        aws_access_secret_key: Optional[str] = None,
        aws_role_arns: Optional[str] = None,
        aws_user_console_access: Optional[bool] = None,
        aws_user_groups: Optional[str] = None,
        aws_user_policies: Optional[str] = None,
        aws_user_programmatic_access: Optional[bool] = None,
        dynamic_secret_aws_id: Optional[str] = None,
        encryption_key_name: Optional[str] = None,
        name: Optional[str] = None,
        password_length: Optional[str] = None,
        region: Optional[str] = None,
        secure_access_aws_account_id: Optional[str] = None,
        secure_access_aws_native_cli: Optional[bool] = None,
        secure_access_aws_region: Optional[str] = None,
        secure_access_bastion_issuer: Optional[str] = None,
        secure_access_enable: Optional[str] = None,
        secure_access_url: Optional[str] = None,
        secure_access_web: Optional[bool] = None,
        secure_access_web_browsing: Optional[bool] = None,
        tags: Optional[Sequence[str]] = None,
        target_name: Optional[str] = None,
        user_ttl: Optional[str] = None) -> DynamicSecretAws
func GetDynamicSecretAws(ctx *Context, name string, id IDInput, state *DynamicSecretAwsState, opts ...ResourceOption) (*DynamicSecretAws, error)
public static DynamicSecretAws Get(string name, Input<string> id, DynamicSecretAwsState? state, CustomResourceOptions? opts = null)
public static DynamicSecretAws get(String name, Output<String> id, DynamicSecretAwsState state, CustomResourceOptions options)
resources:  _:    type: akeyless:DynamicSecretAws    get:      id: ${id}
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
AccessMode string
The types of credentials to retrieve from AWS. Options:[iamuser,assumerole]
AwsAccessKeyId string
Access Key ID
AwsAccessSecretKey string
Access Secret Key
AwsRoleArns string
AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma
AwsUserConsoleAccess bool
Enable AWS User console access
AwsUserGroups string
UserGroup name(s). Multiple values should be separated by comma
AwsUserPolicies string
Policy ARN(s). Multiple values should be separated by comma
AwsUserProgrammaticAccess bool
Enable AWS User programmatic access
DynamicSecretAwsId string
The ID of this resource.
EncryptionKeyName string
Encrypt dynamic secret details with following key
Name string
Dynamic secret name
PasswordLength string
The length of the password to be generated
Region string
Region
SecureAccessAwsAccountId string
The aws account id
SecureAccessAwsNativeCli bool
The aws native cli
SecureAccessAwsRegion string
SecureAccessBastionIssuer string
Path to the SSH Certificate Issuer for your Akeyless Bastion
SecureAccessEnable string
Enable/Disable secure remote access, [true/false]
SecureAccessUrl string
SecureAccessWeb bool
Enable Web Secure Remote Access
SecureAccessWebBrowsing bool
Secure browser via Akeyless Web Access Bastion
Tags List<string>
List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
TargetName string
Name of existing target to use in dynamic secret creation
UserTtl string
User TTL
AccessMode string
The types of credentials to retrieve from AWS. Options:[iamuser,assumerole]
AwsAccessKeyId string
Access Key ID
AwsAccessSecretKey string
Access Secret Key
AwsRoleArns string
AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma
AwsUserConsoleAccess bool
Enable AWS User console access
AwsUserGroups string
UserGroup name(s). Multiple values should be separated by comma
AwsUserPolicies string
Policy ARN(s). Multiple values should be separated by comma
AwsUserProgrammaticAccess bool
Enable AWS User programmatic access
DynamicSecretAwsId string
The ID of this resource.
EncryptionKeyName string
Encrypt dynamic secret details with following key
Name string
Dynamic secret name
PasswordLength string
The length of the password to be generated
Region string
Region
SecureAccessAwsAccountId string
The aws account id
SecureAccessAwsNativeCli bool
The aws native cli
SecureAccessAwsRegion string
SecureAccessBastionIssuer string
Path to the SSH Certificate Issuer for your Akeyless Bastion
SecureAccessEnable string
Enable/Disable secure remote access, [true/false]
SecureAccessUrl string
SecureAccessWeb bool
Enable Web Secure Remote Access
SecureAccessWebBrowsing bool
Secure browser via Akeyless Web Access Bastion
Tags []string
List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
TargetName string
Name of existing target to use in dynamic secret creation
UserTtl string
User TTL
accessMode String
The types of credentials to retrieve from AWS. Options:[iamuser,assumerole]
awsAccessKeyId String
Access Key ID
awsAccessSecretKey String
Access Secret Key
awsRoleArns String
AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma
awsUserConsoleAccess Boolean
Enable AWS User console access
awsUserGroups String
UserGroup name(s). Multiple values should be separated by comma
awsUserPolicies String
Policy ARN(s). Multiple values should be separated by comma
awsUserProgrammaticAccess Boolean
Enable AWS User programmatic access
dynamicSecretAwsId String
The ID of this resource.
encryptionKeyName String
Encrypt dynamic secret details with following key
name String
Dynamic secret name
passwordLength String
The length of the password to be generated
region String
Region
secureAccessAwsAccountId String
The aws account id
secureAccessAwsNativeCli Boolean
The aws native cli
secureAccessAwsRegion String
secureAccessBastionIssuer String
Path to the SSH Certificate Issuer for your Akeyless Bastion
secureAccessEnable String
Enable/Disable secure remote access, [true/false]
secureAccessUrl String
secureAccessWeb Boolean
Enable Web Secure Remote Access
secureAccessWebBrowsing Boolean
Secure browser via Akeyless Web Access Bastion
tags List<String>
List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
targetName String
Name of existing target to use in dynamic secret creation
userTtl String
User TTL
accessMode string
The types of credentials to retrieve from AWS. Options:[iamuser,assumerole]
awsAccessKeyId string
Access Key ID
awsAccessSecretKey string
Access Secret Key
awsRoleArns string
AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma
awsUserConsoleAccess boolean
Enable AWS User console access
awsUserGroups string
UserGroup name(s). Multiple values should be separated by comma
awsUserPolicies string
Policy ARN(s). Multiple values should be separated by comma
awsUserProgrammaticAccess boolean
Enable AWS User programmatic access
dynamicSecretAwsId string
The ID of this resource.
encryptionKeyName string
Encrypt dynamic secret details with following key
name string
Dynamic secret name
passwordLength string
The length of the password to be generated
region string
Region
secureAccessAwsAccountId string
The aws account id
secureAccessAwsNativeCli boolean
The aws native cli
secureAccessAwsRegion string
secureAccessBastionIssuer string
Path to the SSH Certificate Issuer for your Akeyless Bastion
secureAccessEnable string
Enable/Disable secure remote access, [true/false]
secureAccessUrl string
secureAccessWeb boolean
Enable Web Secure Remote Access
secureAccessWebBrowsing boolean
Secure browser via Akeyless Web Access Bastion
tags string[]
List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
targetName string
Name of existing target to use in dynamic secret creation
userTtl string
User TTL
access_mode str
The types of credentials to retrieve from AWS. Options:[iamuser,assumerole]
aws_access_key_id str
Access Key ID
aws_access_secret_key str
Access Secret Key
aws_role_arns str
AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma
aws_user_console_access bool
Enable AWS User console access
aws_user_groups str
UserGroup name(s). Multiple values should be separated by comma
aws_user_policies str
Policy ARN(s). Multiple values should be separated by comma
aws_user_programmatic_access bool
Enable AWS User programmatic access
dynamic_secret_aws_id str
The ID of this resource.
encryption_key_name str
Encrypt dynamic secret details with following key
name str
Dynamic secret name
password_length str
The length of the password to be generated
region str
Region
secure_access_aws_account_id str
The aws account id
secure_access_aws_native_cli bool
The aws native cli
secure_access_aws_region str
secure_access_bastion_issuer str
Path to the SSH Certificate Issuer for your Akeyless Bastion
secure_access_enable str
Enable/Disable secure remote access, [true/false]
secure_access_url str
secure_access_web bool
Enable Web Secure Remote Access
secure_access_web_browsing bool
Secure browser via Akeyless Web Access Bastion
tags Sequence[str]
List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
target_name str
Name of existing target to use in dynamic secret creation
user_ttl str
User TTL
accessMode String
The types of credentials to retrieve from AWS. Options:[iamuser,assumerole]
awsAccessKeyId String
Access Key ID
awsAccessSecretKey String
Access Secret Key
awsRoleArns String
AWS Role ARNs to be use in the Assume Role operation. Multiple values should be separated by comma
awsUserConsoleAccess Boolean
Enable AWS User console access
awsUserGroups String
UserGroup name(s). Multiple values should be separated by comma
awsUserPolicies String
Policy ARN(s). Multiple values should be separated by comma
awsUserProgrammaticAccess Boolean
Enable AWS User programmatic access
dynamicSecretAwsId String
The ID of this resource.
encryptionKeyName String
Encrypt dynamic secret details with following key
name String
Dynamic secret name
passwordLength String
The length of the password to be generated
region String
Region
secureAccessAwsAccountId String
The aws account id
secureAccessAwsNativeCli Boolean
The aws native cli
secureAccessAwsRegion String
secureAccessBastionIssuer String
Path to the SSH Certificate Issuer for your Akeyless Bastion
secureAccessEnable String
Enable/Disable secure remote access, [true/false]
secureAccessUrl String
secureAccessWeb Boolean
Enable Web Secure Remote Access
secureAccessWebBrowsing Boolean
Secure browser via Akeyless Web Access Bastion
tags List<String>
List of the tags attached to this secret. To specify multiple tags use argument multiple times: -t Tag1 -t Tag2
targetName String
Name of existing target to use in dynamic secret creation
userTtl String
User TTL

Package Details

Repository
akeyless akeyless-community/terraform-provider-akeyless
License
Notes
This Pulumi package is based on the akeyless Terraform Provider.