Skip to content

Latest commit

 

History

History
35 lines (31 loc) · 3.31 KB

RotatedSecretCreatePostgresql.md

File metadata and controls

35 lines (31 loc) · 3.31 KB

akeyless.Model.RotatedSecretCreatePostgresql

Properties

Name Type Description Notes
AuthenticationCredentials string The credentials to connect with use-user-creds/use-target-creds [optional] [default to "use-user-creds"]
AutoRotate string Whether to automatically rotate every - -rotation-interval days, or disable existing automatic rotation [true/false] [optional]
DeleteProtection string Protection from accidental deletion of this object [true/false] [optional]
Description string Description of the object [optional]
Json bool Set output format to JSON [optional] [default to false]
Key string The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) [optional]
MaxVersions string Set the maximum number of versions, limited by the account settings defaults. [optional]
Name string Rotated secret name
PasswordLength string The length of the password to be generated [optional]
RotateAfterDisconnect string Rotate the value of the secret after SRA session ends [true/false] [optional] [default to "false"]
RotatedPassword string rotated-username password (relevant only for rotator-type=password) [optional]
RotatedUsername string username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) [optional]
RotationEventIn List<string> How many days before the rotation of the item would you like to be notified [optional]
RotationHour int The Hour of the rotation in UTC [optional]
RotationInterval string The number of days to wait between every automatic key rotation (1-365) [optional]
RotatorType string The rotator type. options: [target/password]
SecureAccessBastionIssuer string Path to the SSH Certificate Issuer for your Akeyless Bastion [optional]
SecureAccessDbName string The DB name (relevant only for DB Dynamic-Secret) [optional]
SecureAccessDbSchema string The DB schema [optional]
SecureAccessEnable string Enable/Disable secure remote access [true/false] [optional]
SecureAccessHost List<string> Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) [optional]
SecureAccessWeb bool Enable Web Secure Remote Access [optional] [default to false]
Tags List<string> Add tags attached to this object [optional]
TargetName string Target name
Token string Authentication token (see `/auth` and `/configure`) [optional]
UidToken string The universal identity token, Required only for universal_identity authentication [optional]

[Back to Model list] [Back to API list] [Back to README]