main.tf 1.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687
  1. resource "azurerm_key_vault" "current" {
  2. name = var.key_vault_display_name
  3. location = var.resource_group_location
  4. resource_group_name = var.resource_group_name
  5. enabled_for_disk_encryption = true
  6. tenant_id = var.tenant_id
  7. soft_delete_retention_days = 7
  8. purge_protection_enabled = false
  9. sku_name = "standard"
  10. access_policy {
  11. tenant_id = var.tenant_id
  12. object_id = var.client_object_id
  13. key_permissions = [
  14. "Get",
  15. "List",
  16. "Create",
  17. "Delete",
  18. "Purge",
  19. "Decrypt",
  20. "Encrypt",
  21. ]
  22. secret_permissions = [
  23. "Set",
  24. "Get",
  25. "Delete",
  26. "Purge",
  27. "Recover"
  28. ]
  29. storage_permissions = [
  30. "Set",
  31. "Get",
  32. "Delete",
  33. "Purge",
  34. "Recover"
  35. ]
  36. }
  37. access_policy {
  38. tenant_id = var.tenant_id
  39. object_id = var.eso_sp_object_id
  40. secret_permissions = [
  41. "Get",
  42. "Set",
  43. "Delete",
  44. "Purge",
  45. "Recover",
  46. ]
  47. }
  48. access_policy {
  49. tenant_id = var.tenant_id
  50. object_id = var.eso_e2e_sp_object_id
  51. secret_permissions = [
  52. "Get",
  53. "Set",
  54. "Delete",
  55. "Purge",
  56. "Recover",
  57. ]
  58. key_permissions = [
  59. "Get",
  60. "List",
  61. "Create",
  62. "Delete",
  63. "Purge",
  64. "Decrypt",
  65. "Encrypt",
  66. ]
  67. certificate_permissions = [
  68. "Get",
  69. "List",
  70. "Create",
  71. "Delete",
  72. "Purge",
  73. ]
  74. }
  75. }