pub struct DiskEncryptionSetResult {
pub auto_key_rotation_enabled: Output<Option<bool>>,
pub encryption_type: Output<Option<String>>,
pub federated_client_id: Output<Option<String>>,
pub identity: Output<DiskEncryptionSetIdentity>,
pub key_vault_key_id: Output<Option<String>>,
pub key_vault_key_url: Output<String>,
pub location: Output<String>,
pub managed_hsm_key_id: Output<Option<String>>,
pub name: Output<String>,
pub resource_group_name: Output<String>,
pub tags: Output<Option<HashMap<String, String>>>,
}
Fields§
§auto_key_rotation_enabled: Output<Option<bool>>
§encryption_type: Output<Option<String>>
The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey
, EncryptionAtRestWithPlatformAndCustomerKeys
and ConfidentialVmEncryptedWithCustomerKey
. Defaults to EncryptionAtRestWithCustomerKey
. Changing this forces a new resource to be created.
federated_client_id: Output<Option<String>>
Multi-tenant application client id to access key vault in a different tenant.
identity: Output<DiskEncryptionSetIdentity>
An identity
block as defined below.
key_vault_key_id: Output<Option<String>>
Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret). Exactly one of managed_hsm_key_id
, key_vault_key_id
must be specified.
NOTE Access to the KeyVault must be granted for this Disk Encryption Set, if you want to further use this Disk Encryption Set in a Managed Disk or Virtual Machine, or Virtual Machine Scale Set. For instructions, please refer to the doc of Server side encryption of Azure managed disks.
NOTE A KeyVault or Managed HSM using enable_rbac_authorization requires to use
azure.authorization.Assignment
to assign the roleKey Vault Crypto Service Encryption User
to this Disk Encryption Set. In this case,azure.keyvault.AccessPolicy
is not needed.
key_vault_key_url: Output<String>
The URL for the Key Vault Key or Key Vault Secret that is currently being used by the service.
location: Output<String>
Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
managed_hsm_key_id: Output<Option<String>>
Key ID of a key in a managed HSM. Exactly one of managed_hsm_key_id
, key_vault_key_id
must be specified.
name: Output<String>
The name of the Disk Encryption Set. Changing this forces a new resource to be created.
resource_group_name: Output<String>
Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
A mapping of tags to assign to the Disk Encryption Set.