You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This module supports creating a standard or root key in an existing key ring and Key Protect instance. You can specify rotation and deletion policies.
9
+
This module supports creating a standard or root key in an existing key ring and KMS instance. KMS can be Key Protect or Hyper Protect Crypto Services(HPCS) instance. You can specify rotation and deletion policies for the keys.
10
10
11
11
## Usage
12
12
13
13
```hcl
14
14
provider "ibm" {
15
15
ibmcloud_api_key = "XXXXXXXXXX"
16
-
# Must be the same region the Key Protect instance is in
| <aname="input_dual_auth_delete_enabled"></a> [dual\_auth\_delete\_enabled](#input\_dual\_auth\_delete\_enabled)| If set to true, Key Protect enables a dual authorization policy on a single key. Note: Once the dual authorization policy is set on the key, it cannot be reverted. A key with dual authorization policy enabled cannot be destroyed by using Terraform. |`bool`|`false`| no |
79
+
| <aname="input_dual_auth_delete_enabled"></a> [dual\_auth\_delete\_enabled](#input\_dual\_auth\_delete\_enabled)| If set to true, KMS enables a dual authorization policy on a single key. Note: Once the dual authorization policy is set on the key, it cannot be reverted. A key with dual authorization policy enabled cannot be destroyed by using Terraform. |`bool`|`false`| no |
80
80
| <aname="input_endpoint_type"></a> [endpoint\_type](#input\_endpoint\_type)| Endpoint to use when creating the Key |`string`|`"public"`| no |
81
81
| <aname="input_force_delete"></a> [force\_delete](#input\_force\_delete)| Set as true to enable forcing deletion even if key is in use |`bool`|`false`| no |
82
82
| <aname="input_key_name"></a> [key\_name](#input\_key\_name)| Name to give the key |`string`| n/a | yes |
83
-
| <aname="input_key_protect_instance_id"></a> [key\_protect\_instance\_id](#input\_key\_protect\_instance\_id)| ID or GUID of Key Protect Instance |`string`| n/a | yes |
84
-
| <aname="input_key_protect_key_ring_id"></a> [key\_protect\_key\_ring\_id](#input\_key\_protect\_key\_ring\_id)| The ID of the key ring where you want to add your Key Protect key |`string`|`"default"`| no |
83
+
| <aname="input_kms_instance_id"></a> [kms\_instance\_id](#input\_kms\_instance\_id)| ID or GUID of KMS Instance |`string`| n/a | yes |
84
+
| <aname="input_kms_key_ring_id"></a> [kms\_key\_ring\_id](#input\_kms\_key\_ring\_id)| The ID of the key ring where you want to add your KMS key |`string`|`"default"`| no |
85
85
| <aname="input_rotation_interval_month"></a> [rotation\_interval\_month](#input\_rotation\_interval\_month)| The key rotation time interval in months. Rotation policy cannot be set for standard key, so value is ignored if var.standard\_key is true |`number`|`1`| no |
86
86
| <aname="input_standard_key"></a> [standard\_key](#input\_standard\_key)| Set as true for Standard Key, false for Root Key |`bool`|`false`| no |
Copy file name to clipboardExpand all lines: module-metadata.json
+11-11
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@
4
4
"dual_auth_delete_enabled": {
5
5
"name": "dual_auth_delete_enabled",
6
6
"type": "bool",
7
-
"description": "If set to true, Key Protect enables a dual authorization policy on a single key. Note: Once the dual authorization policy is set on the key, it cannot be reverted. A key with dual authorization policy enabled cannot be destroyed by using Terraform.",
7
+
"description": "If set to true, KMS enables a dual authorization policy on a single key. Note: Once the dual authorization policy is set on the key, it cannot be reverted. A key with dual authorization policy enabled cannot be destroyed by using Terraform.",
8
8
"default": false,
9
9
"pos": {
10
10
"filename": "variables.tf",
@@ -55,10 +55,10 @@
55
55
},
56
56
"immutable": true
57
57
},
58
-
"key_protect_instance_id": {
59
-
"name": "key_protect_instance_id",
58
+
"kms_instance_id": {
59
+
"name": "kms_instance_id",
60
60
"type": "string",
61
-
"description": "ID or GUID of Key Protect Instance",
61
+
"description": "ID or GUID of KMS Instance",
62
62
"required": true,
63
63
"source": [
64
64
"ibm_kms_key.key.instance_id",
@@ -75,10 +75,10 @@
75
75
"service:kms|hs-crypto"
76
76
]
77
77
},
78
-
"key_protect_key_ring_id": {
79
-
"name": "key_protect_key_ring_id",
78
+
"kms_key_ring_id": {
79
+
"name": "kms_key_ring_id",
80
80
"type": "string",
81
-
"description": "The ID of the key ring where you want to add your Key Protect key",
81
+
"description": "The ID of the key ring where you want to add your KMS key",
0 commit comments