Skip to content

Commit 809af88

Browse files
authored
Merge pull request #9 from kumarvna/develop
adding SPN access policies and private endpoint #2
2 parents 6681a97 + 951735f commit 809af88

File tree

2 files changed

+6
-8
lines changed

2 files changed

+6
-8
lines changed

README.md

Lines changed: 5 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -140,19 +140,17 @@ We can configure Azure Disk Encryption to use Azure Key Vault to control and man
140140

141141
When you need to pass a secure value (like a password) as a parameter during deployment, you can retrieve the value from an Azure Key Vault. To access the Key Vault when deploying Managed Applications, you must grant access to the Appliance Resource Provider service principal. This access is enabled by default for this module. Incase you want to disable it set the argument `enabled_for_template_deployment = "false"`.
142142

143-
## Soft-Delete and Purge Protection
143+
### Soft-Delete and Purge Protection
144144

145-
When soft-delete is enabled, resources marked as deleted resources are retained for a specified period (90 days by default). The service further provides a mechanism for recovering the deleted object, essentially undoing the deletion.
146-
147-
When creating a new key vault, soft-delete is enabled by default. __As of 2020-12-15 Azure now requires that Soft Delete is enabled on Key Vaults and this can no longer be disabled__.
145+
Soft-delete is enabled by default. When enabled, resources marked as deleted resources are retained for a specified period (90 days by default). The service further provides a mechanism for recovering the deleted object, essentially undoing the deletion.
148146

149147
Purge protection is an optional Key Vault behavior and is not enabled by default. Purge protection can only be enabled once soft-delete is enabled. It can be turned on using this module by setting the argument `enable_purge_protection = true`.
150148

151-
When purge protection is on, a vault or an object in the deleted state cannot be purged until the retention period has passed. Soft-deleted vaults and objects can still be recovered, ensuring that the retention policy will be followed.
149+
When purge protection is on, a vault or an object in the deleted state cannot be purged until the retention period has passed. Soft-deleted vaults and objects can still be recovered, ensuring that the retention policy will be followed. Soft delete retention can be updated using `soft_delete_retention_days` argument with a valid days.
152150

153151
> The default retention period is 90 days for the soft-delete and the purge protection retention policy uses the same interval. Once set, the retention policy interval cannot be changed.
154152
155-
## Certificate contacts
153+
### Certificate contacts
156154

157155
Certificate contacts contain contact information to send notifications triggered by certificate lifetime events. The contacts information is shared by all the certificates in the key vault. A notification is sent to all the specified contacts for an event for any certificate in the key vault.
158156

@@ -184,7 +182,7 @@ module "key-vault" {
184182
}
185183
```
186184

187-
## Private Endpoint - Integrate Key Vault with Azure Private Link
185+
### Private Endpoint - Integrate Key Vault with Azure Private Link
188186

189187
Azure Private Endpoint is a network interface that connects you privately and securely to a service powered by Azure Private Link. Private Endpoint uses a private IP address from your VNet, effectively bringing the service into your VNet.
190188

examples/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ Terraform Module to create a Key Vault also adds required access policies for az
66

77
* [Simple Key Vault Creation](simple_keyvault/)
88
* [Key Vault with Private Endpoint](keyvault_with_private_end_point/)
9-
* [Key Vault and Private Endpoiont using existing VNet and Subnet](keyvault_private_end_point_with_existing_VNet_Subnet/)
9+
* [Key Vault with Private Endpoiont using existing VNet and Subnet](keyvault_private_end_point_with_existing_VNet_Subnet/)
1010

1111
## Terraform Usage
1212

0 commit comments

Comments
 (0)