1. Packages
  2. HashiCorp Vault Provider
  3. API Docs
  4. kubernetes
  5. AuthBackendConfig
HashiCorp Vault v6.6.0 published on Thursday, Mar 13, 2025 by Pulumi

vault.kubernetes.AuthBackendConfig

Explore with Pulumi AI

Manages an Kubernetes auth backend config in a Vault server. See the Vault documentation for more information.

Example Usage

import * as pulumi from "@pulumi/pulumi";
import * as vault from "@pulumi/vault";

const kubernetes = new vault.AuthBackend("kubernetes", {type: "kubernetes"});
const example = new vault.kubernetes.AuthBackendConfig("example", {
    backend: kubernetes.path,
    kubernetesHost: "http://example.com:443",
    kubernetesCaCert: `-----BEGIN CERTIFICATE-----
example
-----END CERTIFICATE-----`,
    tokenReviewerJwt: "ZXhhbXBsZQo=",
    issuer: "api",
    disableIssValidation: true,
});
Copy
import pulumi
import pulumi_vault as vault

kubernetes = vault.AuthBackend("kubernetes", type="kubernetes")
example = vault.kubernetes.AuthBackendConfig("example",
    backend=kubernetes.path,
    kubernetes_host="http://example.com:443",
    kubernetes_ca_cert="""-----BEGIN CERTIFICATE-----
example
-----END CERTIFICATE-----""",
    token_reviewer_jwt="ZXhhbXBsZQo=",
    issuer="api",
    disable_iss_validation=True)
Copy
package main

import (
	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault"
	"github.com/pulumi/pulumi-vault/sdk/v6/go/vault/kubernetes"
	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)

func main() {
	pulumi.Run(func(ctx *pulumi.Context) error {
		kubernetes, err := vault.NewAuthBackend(ctx, "kubernetes", &vault.AuthBackendArgs{
			Type: pulumi.String("kubernetes"),
		})
		if err != nil {
			return err
		}
		_, err = kubernetes.NewAuthBackendConfig(ctx, "example", &kubernetes.AuthBackendConfigArgs{
			Backend:              kubernetes.Path,
			KubernetesHost:       pulumi.String("http://example.com:443"),
			KubernetesCaCert:     pulumi.String("-----BEGIN CERTIFICATE-----\nexample\n-----END CERTIFICATE-----"),
			TokenReviewerJwt:     pulumi.String("ZXhhbXBsZQo="),
			Issuer:               pulumi.String("api"),
			DisableIssValidation: pulumi.Bool(true),
		})
		if err != nil {
			return err
		}
		return nil
	})
}
Copy
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Vault = Pulumi.Vault;

return await Deployment.RunAsync(() => 
{
    var kubernetes = new Vault.AuthBackend("kubernetes", new()
    {
        Type = "kubernetes",
    });

    var example = new Vault.Kubernetes.AuthBackendConfig("example", new()
    {
        Backend = kubernetes.Path,
        KubernetesHost = "http://example.com:443",
        KubernetesCaCert = @"-----BEGIN CERTIFICATE-----
example
-----END CERTIFICATE-----",
        TokenReviewerJwt = "ZXhhbXBsZQo=",
        Issuer = "api",
        DisableIssValidation = true,
    });

});
Copy
package generated_program;

import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.vault.AuthBackend;
import com.pulumi.vault.AuthBackendArgs;
import com.pulumi.vault.kubernetes.AuthBackendConfig;
import com.pulumi.vault.kubernetes.AuthBackendConfigArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;

public class App {
    public static void main(String[] args) {
        Pulumi.run(App::stack);
    }

    public static void stack(Context ctx) {
        var kubernetes = new AuthBackend("kubernetes", AuthBackendArgs.builder()
            .type("kubernetes")
            .build());

        var example = new AuthBackendConfig("example", AuthBackendConfigArgs.builder()
            .backend(kubernetes.path())
            .kubernetesHost("http://example.com:443")
            .kubernetesCaCert("""
-----BEGIN CERTIFICATE-----
example
-----END CERTIFICATE-----            """)
            .tokenReviewerJwt("ZXhhbXBsZQo=")
            .issuer("api")
            .disableIssValidation("true")
            .build());

    }
}
Copy
resources:
  kubernetes:
    type: vault:AuthBackend
    properties:
      type: kubernetes
  example:
    type: vault:kubernetes:AuthBackendConfig
    properties:
      backend: ${kubernetes.path}
      kubernetesHost: http://example.com:443
      kubernetesCaCert: |-
        -----BEGIN CERTIFICATE-----
        example
        -----END CERTIFICATE-----        
      tokenReviewerJwt: ZXhhbXBsZQo=
      issuer: api
      disableIssValidation: 'true'
Copy

Create AuthBackendConfig Resource

Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

Constructor syntax

new AuthBackendConfig(name: string, args: AuthBackendConfigArgs, opts?: CustomResourceOptions);
@overload
def AuthBackendConfig(resource_name: str,
                      args: AuthBackendConfigArgs,
                      opts: Optional[ResourceOptions] = None)

@overload
def AuthBackendConfig(resource_name: str,
                      opts: Optional[ResourceOptions] = None,
                      kubernetes_host: Optional[str] = None,
                      backend: Optional[str] = None,
                      disable_iss_validation: Optional[bool] = None,
                      disable_local_ca_jwt: Optional[bool] = None,
                      issuer: Optional[str] = None,
                      kubernetes_ca_cert: Optional[str] = None,
                      namespace: Optional[str] = None,
                      pem_keys: Optional[Sequence[str]] = None,
                      token_reviewer_jwt: Optional[str] = None,
                      use_annotations_as_alias_metadata: Optional[bool] = None)
func NewAuthBackendConfig(ctx *Context, name string, args AuthBackendConfigArgs, opts ...ResourceOption) (*AuthBackendConfig, error)
public AuthBackendConfig(string name, AuthBackendConfigArgs args, CustomResourceOptions? opts = null)
public AuthBackendConfig(String name, AuthBackendConfigArgs args)
public AuthBackendConfig(String name, AuthBackendConfigArgs args, CustomResourceOptions options)
type: vault:kubernetes:AuthBackendConfig
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.

Parameters

name This property is required. string
The unique name of the resource.
args This property is required. AuthBackendConfigArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
resource_name This property is required. str
The unique name of the resource.
args This property is required. AuthBackendConfigArgs
The arguments to resource properties.
opts ResourceOptions
Bag of options to control resource's behavior.
ctx Context
Context object for the current deployment.
name This property is required. string
The unique name of the resource.
args This property is required. AuthBackendConfigArgs
The arguments to resource properties.
opts ResourceOption
Bag of options to control resource's behavior.
name This property is required. string
The unique name of the resource.
args This property is required. AuthBackendConfigArgs
The arguments to resource properties.
opts CustomResourceOptions
Bag of options to control resource's behavior.
name This property is required. String
The unique name of the resource.
args This property is required. AuthBackendConfigArgs
The arguments to resource properties.
options CustomResourceOptions
Bag of options to control resource's behavior.

Constructor example

The following reference example uses placeholder values for all input properties.

var vaultAuthBackendConfigResource = new Vault.Kubernetes.AuthBackendConfig("vaultAuthBackendConfigResource", new()
{
    KubernetesHost = "string",
    Backend = "string",
    DisableIssValidation = false,
    DisableLocalCaJwt = false,
    Issuer = "string",
    KubernetesCaCert = "string",
    Namespace = "string",
    PemKeys = new[]
    {
        "string",
    },
    TokenReviewerJwt = "string",
    UseAnnotationsAsAliasMetadata = false,
});
Copy
example, err := kubernetes.NewAuthBackendConfig(ctx, "vaultAuthBackendConfigResource", &kubernetes.AuthBackendConfigArgs{
	KubernetesHost:       pulumi.String("string"),
	Backend:              pulumi.String("string"),
	DisableIssValidation: pulumi.Bool(false),
	DisableLocalCaJwt:    pulumi.Bool(false),
	Issuer:               pulumi.String("string"),
	KubernetesCaCert:     pulumi.String("string"),
	Namespace:            pulumi.String("string"),
	PemKeys: pulumi.StringArray{
		pulumi.String("string"),
	},
	TokenReviewerJwt:              pulumi.String("string"),
	UseAnnotationsAsAliasMetadata: pulumi.Bool(false),
})
Copy
var vaultAuthBackendConfigResource = new AuthBackendConfig("vaultAuthBackendConfigResource", AuthBackendConfigArgs.builder()
    .kubernetesHost("string")
    .backend("string")
    .disableIssValidation(false)
    .disableLocalCaJwt(false)
    .issuer("string")
    .kubernetesCaCert("string")
    .namespace("string")
    .pemKeys("string")
    .tokenReviewerJwt("string")
    .useAnnotationsAsAliasMetadata(false)
    .build());
Copy
vault_auth_backend_config_resource = vault.kubernetes.AuthBackendConfig("vaultAuthBackendConfigResource",
    kubernetes_host="string",
    backend="string",
    disable_iss_validation=False,
    disable_local_ca_jwt=False,
    issuer="string",
    kubernetes_ca_cert="string",
    namespace="string",
    pem_keys=["string"],
    token_reviewer_jwt="string",
    use_annotations_as_alias_metadata=False)
Copy
const vaultAuthBackendConfigResource = new vault.kubernetes.AuthBackendConfig("vaultAuthBackendConfigResource", {
    kubernetesHost: "string",
    backend: "string",
    disableIssValidation: false,
    disableLocalCaJwt: false,
    issuer: "string",
    kubernetesCaCert: "string",
    namespace: "string",
    pemKeys: ["string"],
    tokenReviewerJwt: "string",
    useAnnotationsAsAliasMetadata: false,
});
Copy
type: vault:kubernetes:AuthBackendConfig
properties:
    backend: string
    disableIssValidation: false
    disableLocalCaJwt: false
    issuer: string
    kubernetesCaCert: string
    kubernetesHost: string
    namespace: string
    pemKeys:
        - string
    tokenReviewerJwt: string
    useAnnotationsAsAliasMetadata: false
Copy

AuthBackendConfig Resource Properties

To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

Inputs

In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

The AuthBackendConfig resource accepts the following input properties:

KubernetesHost This property is required. string
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
Backend Changes to this property will trigger replacement. string
Unique name of the kubernetes backend to configure.
DisableIssValidation bool
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
DisableLocalCaJwt bool
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
Issuer string
JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
KubernetesCaCert string
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
Namespace Changes to this property will trigger replacement. string
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
PemKeys List<string>
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
TokenReviewerJwt string
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
UseAnnotationsAsAliasMetadata bool
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
KubernetesHost This property is required. string
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
Backend Changes to this property will trigger replacement. string
Unique name of the kubernetes backend to configure.
DisableIssValidation bool
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
DisableLocalCaJwt bool
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
Issuer string
JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
KubernetesCaCert string
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
Namespace Changes to this property will trigger replacement. string
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
PemKeys []string
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
TokenReviewerJwt string
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
UseAnnotationsAsAliasMetadata bool
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
kubernetesHost This property is required. String
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
backend Changes to this property will trigger replacement. String
Unique name of the kubernetes backend to configure.
disableIssValidation Boolean
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
disableLocalCaJwt Boolean
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
issuer String
JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
kubernetesCaCert String
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
namespace Changes to this property will trigger replacement. String
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
pemKeys List<String>
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
tokenReviewerJwt String
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
useAnnotationsAsAliasMetadata Boolean
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
kubernetesHost This property is required. string
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
backend Changes to this property will trigger replacement. string
Unique name of the kubernetes backend to configure.
disableIssValidation boolean
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
disableLocalCaJwt boolean
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
issuer string
JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
kubernetesCaCert string
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
namespace Changes to this property will trigger replacement. string
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
pemKeys string[]
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
tokenReviewerJwt string
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
useAnnotationsAsAliasMetadata boolean
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
kubernetes_host This property is required. str
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
backend Changes to this property will trigger replacement. str
Unique name of the kubernetes backend to configure.
disable_iss_validation bool
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
disable_local_ca_jwt bool
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
issuer str
JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
kubernetes_ca_cert str
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
namespace Changes to this property will trigger replacement. str
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
pem_keys Sequence[str]
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
token_reviewer_jwt str
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
use_annotations_as_alias_metadata bool
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
kubernetesHost This property is required. String
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
backend Changes to this property will trigger replacement. String
Unique name of the kubernetes backend to configure.
disableIssValidation Boolean
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
disableLocalCaJwt Boolean
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
issuer String
JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
kubernetesCaCert String
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
namespace Changes to this property will trigger replacement. String
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
pemKeys List<String>
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
tokenReviewerJwt String
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
useAnnotationsAsAliasMetadata Boolean
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+

Outputs

All input properties are implicitly available as output properties. Additionally, the AuthBackendConfig resource produces the following output properties:

Id string
The provider-assigned unique ID for this managed resource.
Id string
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.
id string
The provider-assigned unique ID for this managed resource.
id str
The provider-assigned unique ID for this managed resource.
id String
The provider-assigned unique ID for this managed resource.

Look up Existing AuthBackendConfig Resource

Get an existing AuthBackendConfig resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

public static get(name: string, id: Input<ID>, state?: AuthBackendConfigState, opts?: CustomResourceOptions): AuthBackendConfig
@staticmethod
def get(resource_name: str,
        id: str,
        opts: Optional[ResourceOptions] = None,
        backend: Optional[str] = None,
        disable_iss_validation: Optional[bool] = None,
        disable_local_ca_jwt: Optional[bool] = None,
        issuer: Optional[str] = None,
        kubernetes_ca_cert: Optional[str] = None,
        kubernetes_host: Optional[str] = None,
        namespace: Optional[str] = None,
        pem_keys: Optional[Sequence[str]] = None,
        token_reviewer_jwt: Optional[str] = None,
        use_annotations_as_alias_metadata: Optional[bool] = None) -> AuthBackendConfig
func GetAuthBackendConfig(ctx *Context, name string, id IDInput, state *AuthBackendConfigState, opts ...ResourceOption) (*AuthBackendConfig, error)
public static AuthBackendConfig Get(string name, Input<string> id, AuthBackendConfigState? state, CustomResourceOptions? opts = null)
public static AuthBackendConfig get(String name, Output<String> id, AuthBackendConfigState state, CustomResourceOptions options)
resources:  _:    type: vault:kubernetes:AuthBackendConfig    get:      id: ${id}
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
resource_name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
name This property is required.
The unique name of the resulting resource.
id This property is required.
The unique provider ID of the resource to lookup.
state
Any extra arguments used during the lookup.
opts
A bag of options that control this resource's behavior.
The following state arguments are supported:
Backend Changes to this property will trigger replacement. string
Unique name of the kubernetes backend to configure.
DisableIssValidation bool
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
DisableLocalCaJwt bool
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
Issuer string
JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
KubernetesCaCert string
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
KubernetesHost string
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
Namespace Changes to this property will trigger replacement. string
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
PemKeys List<string>
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
TokenReviewerJwt string
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
UseAnnotationsAsAliasMetadata bool
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
Backend Changes to this property will trigger replacement. string
Unique name of the kubernetes backend to configure.
DisableIssValidation bool
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
DisableLocalCaJwt bool
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
Issuer string
JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
KubernetesCaCert string
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
KubernetesHost string
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
Namespace Changes to this property will trigger replacement. string
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
PemKeys []string
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
TokenReviewerJwt string
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
UseAnnotationsAsAliasMetadata bool
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
backend Changes to this property will trigger replacement. String
Unique name of the kubernetes backend to configure.
disableIssValidation Boolean
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
disableLocalCaJwt Boolean
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
issuer String
JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
kubernetesCaCert String
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
kubernetesHost String
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
namespace Changes to this property will trigger replacement. String
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
pemKeys List<String>
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
tokenReviewerJwt String
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
useAnnotationsAsAliasMetadata Boolean
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
backend Changes to this property will trigger replacement. string
Unique name of the kubernetes backend to configure.
disableIssValidation boolean
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
disableLocalCaJwt boolean
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
issuer string
JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
kubernetesCaCert string
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
kubernetesHost string
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
namespace Changes to this property will trigger replacement. string
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
pemKeys string[]
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
tokenReviewerJwt string
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
useAnnotationsAsAliasMetadata boolean
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
backend Changes to this property will trigger replacement. str
Unique name of the kubernetes backend to configure.
disable_iss_validation bool
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
disable_local_ca_jwt bool
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
issuer str
JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
kubernetes_ca_cert str
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
kubernetes_host str
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
namespace Changes to this property will trigger replacement. str
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
pem_keys Sequence[str]
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
token_reviewer_jwt str
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
use_annotations_as_alias_metadata bool
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+
backend Changes to this property will trigger replacement. String
Unique name of the kubernetes backend to configure.
disableIssValidation Boolean
Disable JWT issuer validation. Allows to skip ISS validation. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
disableLocalCaJwt Boolean
Disable defaulting to the local CA cert and service account JWT when running in a Kubernetes pod. Requires Vault v1.5.4+ or Vault auth kubernetes plugin v0.7.1+
issuer String
JWT issuer. If no issuer is specified, kubernetes.io/serviceaccount will be used as the default issuer.
kubernetesCaCert String
PEM encoded CA cert for use by the TLS client used to talk with the Kubernetes API.
kubernetesHost String
Host must be a host string, a host:port pair, or a URL to the base of the Kubernetes API server.
namespace Changes to this property will trigger replacement. String
The namespace to provision the resource in. The value should not contain leading or trailing forward slashes. The namespace is always relative to the provider's configured namespace. Available only for Vault Enterprise.
pemKeys List<String>
List of PEM-formatted public keys or certificates used to verify the signatures of Kubernetes service account JWTs. If a certificate is given, its public key will be extracted. Not every installation of Kubernetes exposes these keys.
tokenReviewerJwt String
A service account JWT (or other token) used as a bearer token to access the TokenReview API to validate other JWTs during login. If not set the JWT used for login will be used to access the API.
useAnnotationsAsAliasMetadata Boolean
Use annotations from the client token's associated service account as alias metadata for the Vault entity. Requires Vault v1.16+ or Vault auth kubernetes plugin v0.18.0+

Import

Kubernetes authentication backend can be imported using the path, e.g.

$ pulumi import vault:kubernetes/authBackendConfig:AuthBackendConfig config auth/kubernetes/config
Copy

To learn more about importing existing cloud resources, see Importing resources.

Package Details

Repository
Vault pulumi/pulumi-vault
License
Apache-2.0
Notes
This Pulumi package is based on the vault Terraform Provider.