You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Dynamically derived from the deployment template link uri
_debugLevel
string
No
Specifies the type of information to log for debugging. The permitted values are none, requestContent, responseContent, or both requestContent and responseContent separated by a comma. The default is none. When setting this value, carefully consider the type of information you are passing in during deployment. By logging information about the request or response, you could potentially expose sensitive data that is retrieved through the deployment operations.
SKU name to specify whether the key vault is a standard vault or a premium vault. - standard or premium
enabledForDeployment
boolean
Yes
Property to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault. - true or false
enabledForTemplateDeployment
boolean
Yes
Property to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault. - true or false
enabledForDiskEncryption
boolean
No
Property to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys. - true or false
accessPoliciesObjectId
string
Yes
The object ID of a user, service principal or security group in the Azure Active Directory tenant for the vault. The object ID must be unique for the list of access policies.
networkAcls
object
Yes
A collection of rules governing the accessibility of the vault from specific network locations. - networkAcls object
When specifying the name of a keyvault simply include the token [unique] (including the []) as part of the name. The template will replace the [unique] word with a unique string of characters. For example:
Name
Result
key-[unique]-deploy
key-sd8kjdf678k9-deploy
keyvault-test-[unique]
keyvault-test-7djkf90jkdf
This is helpfull to ensure there will be no keyvault duplicates in Azure as it need to be unique.
networkAcls object
Name
Type
Required
Value
bypass
enum
No
Tells what traffic can bypass network rules. This can be 'AzureServices' or 'None'. If not specified the default is 'AzureServices'. - AzureServices or None
defaultAction
enum
No
The default action when no rule from ipRules and from virtualNetworkRules match. This is only used after the bypass property has been evaluated. - Allow or Deny
An IPv4 address range in CIDR notation, such as '124.56.78.91' (simple IP address) or '124.56.78.0/24' (all addresses that start with 124.56.78).
VirtualNetworkRule object
Name
Type
Required
Value
id
string
Yes
Full resource id of a vnet subnet, such as '/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/subnet1'.
The value of the secret. NOTE: 'value' will never be returned from the service, as APIs using this model are is intended for internal use in ARM deployments. Users should use the data-plane REST service for interaction with vault secrets.