Skip to content

Latest commit

 

History

History
74 lines (68 loc) · 4.45 KB

RotatedSecretCreateSsh.md

File metadata and controls

74 lines (68 loc) · 4.45 KB

Akeyless::RotatedSecretCreateSsh

Properties

Name Type Description Notes
authentication_credentials String The credentials to connect with use-user-creds/use-target-creds [optional][default to 'use-user-creds']
auto_rotate String Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false] [optional]
delete_protection String Protection from accidental deletion of this object [true/false] [optional]
description String Description of the object [optional]
json Boolean Set output format to JSON [optional][default to false]
key String The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) [optional]
max_versions String Set the maximum number of versions, limited by the account settings defaults. [optional]
name String Rotated secret name
password_length String The length of the password to be generated [optional]
rotate_after_disconnect String Rotate the value of the secret after SRA session ends [true/false] [optional][default to 'false']
rotated_password String rotated-username password (relevant only for rotator-type=password) [optional]
rotated_username String username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) [optional]
rotation_event_in Array<String> How many days before the rotation of the item would you like to be notified [optional]
rotation_hour Integer The Hour of the rotation in UTC [optional]
rotation_interval String The number of days to wait between every automatic key rotation (1-365) [optional]
rotator_custom_cmd String Custom rotation command [optional]
rotator_type String The rotator type. options: [target/password]
same_password String Rotate same password for each host from the Linked Target (relevant only for Linked Target) [optional]
secure_access_allow_external_user Boolean Allow providing external user for a domain users [optional][default to false]
secure_access_bastion_issuer String Path to the SSH Certificate Issuer for your Akeyless Bastion [optional]
secure_access_enable String Enable/Disable secure remote access [true/false] [optional]
secure_access_host Array<String> Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) [optional]
secure_access_rdp_domain String Default domain name server. i.e. microsoft.com [optional]
secure_access_rdp_user String Override the RDP Domain username [optional]
secure_access_ssh_user String Override the SSH username as indicated in SSH Certificate Issuer [optional]
tags Array<String> Add tags attached to this object [optional]
target_name String Target name
token String Authentication token (see `/auth` and `/configure`) [optional]
uid_token String The universal identity token, Required only for universal_identity authentication [optional]

Example

require 'akeyless'

instance = Akeyless::RotatedSecretCreateSsh.new(
  authentication_credentials: null,
  auto_rotate: null,
  delete_protection: null,
  description: null,
  json: null,
  key: null,
  max_versions: null,
  name: null,
  password_length: null,
  rotate_after_disconnect: null,
  rotated_password: null,
  rotated_username: null,
  rotation_event_in: null,
  rotation_hour: null,
  rotation_interval: null,
  rotator_custom_cmd: null,
  rotator_type: null,
  same_password: null,
  secure_access_allow_external_user: null,
  secure_access_bastion_issuer: null,
  secure_access_enable: null,
  secure_access_host: null,
  secure_access_rdp_domain: null,
  secure_access_rdp_user: null,
  secure_access_ssh_user: null,
  tags: null,
  target_name: null,
  token: null,
  uid_token: null
)