Class: Azure::KeyVault::Mgmt::V2019_09_01::Models::VaultPatchProperties
- Inherits:
-
Object
- Object
- Azure::KeyVault::Mgmt::V2019_09_01::Models::VaultPatchProperties
- Includes:
- MsRestAzure
- Defined in:
- lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb
Overview
Properties of the vault
Instance Attribute Summary collapse
-
#access_policies ⇒ Array<AccessPolicyEntry>
have access to the key vault.
-
#create_mode ⇒ CreateMode
vault need to be recovered or not.
-
#enable_purge_protection ⇒ Boolean
is enabled for this vault.
-
#enable_rbac_authorization ⇒ Boolean
authorized.
-
#enable_soft_delete ⇒ Boolean
functionality is enabled for this key vault.
-
#enabled_for_deployment ⇒ Boolean
are permitted to retrieve certificates stored as secrets from the key vault.
-
#enabled_for_disk_encryption ⇒ Boolean
permitted to retrieve secrets from the vault and unwrap keys.
-
#enabled_for_template_deployment ⇒ Boolean
permitted to retrieve secrets from the key vault.
-
#network_acls ⇒ NetworkRuleSet
accessibility of the vault from specific network locations.
-
#sku ⇒ Sku
SKU details.
-
#soft_delete_retention_in_days ⇒ Integer
<=90.
-
#tenant_id ⇒ Object
authenticating requests to the key vault.
Class Method Summary collapse
-
.mapper ⇒ Object
Mapper for VaultPatchProperties class as Ruby Hash.
Instance Attribute Details
#access_policies ⇒ Array<AccessPolicyEntry>
have access to the key vault. All identities in the array must use the same tenant ID as the key vault’s tenant ID.
25 26 27 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 25 def access_policies @access_policies end |
#create_mode ⇒ CreateMode
vault need to be recovered or not. Possible values include: ‘recover’, ‘default’
62 63 64 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 62 def create_mode @create_mode end |
#enable_purge_protection ⇒ Boolean
is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
71 72 73 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 71 def enable_purge_protection @enable_purge_protection end |
#enable_rbac_authorization ⇒ Boolean
authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored (warning: this is a preview feature). When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the value of this property will not change.
53 54 55 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 53 def @enable_rbac_authorization end |
#enable_soft_delete ⇒ Boolean
functionality is enabled for this key vault. Once set to true, it cannot be reverted to false.
43 44 45 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 43 def enable_soft_delete @enable_soft_delete end |
#enabled_for_deployment ⇒ Boolean
are permitted to retrieve certificates stored as secrets from the key vault.
30 31 32 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 30 def enabled_for_deployment @enabled_for_deployment end |
#enabled_for_disk_encryption ⇒ Boolean
permitted to retrieve secrets from the vault and unwrap keys.
34 35 36 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 34 def enabled_for_disk_encryption @enabled_for_disk_encryption end |
#enabled_for_template_deployment ⇒ Boolean
permitted to retrieve secrets from the key vault.
38 39 40 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 38 def enabled_for_template_deployment @enabled_for_template_deployment end |
#network_acls ⇒ NetworkRuleSet
accessibility of the vault from specific network locations.
75 76 77 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 75 def network_acls @network_acls end |
#sku ⇒ Sku
Returns SKU details.
20 21 22 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 20 def sku @sku end |
#soft_delete_retention_in_days ⇒ Integer
<=90.
57 58 59 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 57 def soft_delete_retention_in_days @soft_delete_retention_in_days end |
#tenant_id ⇒ Object
authenticating requests to the key vault.
17 18 19 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 17 def tenant_id @tenant_id end |
Class Method Details
.mapper ⇒ Object
Mapper for VaultPatchProperties class as Ruby Hash. This will be used for serialization/deserialization.
82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 |
# File 'lib/2019-09-01/generated/azure_mgmt_key_vault/models/vault_patch_properties.rb', line 82 def self.mapper() { client_side_validation: true, required: false, serialized_name: 'VaultPatchProperties', type: { name: 'Composite', class_name: 'VaultPatchProperties', model_properties: { tenant_id: { client_side_validation: true, required: false, serialized_name: 'tenantId', type: { name: 'String' } }, sku: { client_side_validation: true, required: false, serialized_name: 'sku', type: { name: 'Composite', class_name: 'Sku' } }, access_policies: { client_side_validation: true, required: false, serialized_name: 'accessPolicies', type: { name: 'Sequence', element: { client_side_validation: true, required: false, serialized_name: 'AccessPolicyEntryElementType', type: { name: 'Composite', class_name: 'AccessPolicyEntry' } } } }, enabled_for_deployment: { client_side_validation: true, required: false, serialized_name: 'enabledForDeployment', type: { name: 'Boolean' } }, enabled_for_disk_encryption: { client_side_validation: true, required: false, serialized_name: 'enabledForDiskEncryption', type: { name: 'Boolean' } }, enabled_for_template_deployment: { client_side_validation: true, required: false, serialized_name: 'enabledForTemplateDeployment', type: { name: 'Boolean' } }, enable_soft_delete: { client_side_validation: true, required: false, serialized_name: 'enableSoftDelete', type: { name: 'Boolean' } }, enable_rbac_authorization: { client_side_validation: true, required: false, serialized_name: 'enableRbacAuthorization', type: { name: 'Boolean' } }, soft_delete_retention_in_days: { client_side_validation: true, required: false, serialized_name: 'softDeleteRetentionInDays', type: { name: 'Number' } }, create_mode: { client_side_validation: true, required: false, serialized_name: 'createMode', type: { name: 'Enum', module: 'CreateMode' } }, enable_purge_protection: { client_side_validation: true, required: false, serialized_name: 'enablePurgeProtection', type: { name: 'Boolean' } }, network_acls: { client_side_validation: true, required: false, serialized_name: 'networkAcls', type: { name: 'Composite', class_name: 'NetworkRuleSet' } } } } } end |