/rotated-secret-create-azure

Body Params
string

API ID to rotate (relevant only for rotator-type=api-key)

string

API key to rotate (relevant only for rotator-type=api-key)

string

Id of the azure app that hold the serect to be rotated (relevant only for rotator-type=api-key & authentication-credentials=use-target-creds)

string
Defaults to use-user-creds

The credentials to connect with use-user-creds/use-target-creds

string

Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation [true/false]

string

Protection from accidental deletion of this object [true/false]

string

Description of the object

string
Defaults to false

If set, explicitly provide the storage account details [true/false]

string

Enable graceful rotation (keep both versions temporarily). When enabled, a new secret version is created while the previous version is kept for the grace period, so both versions exist for a limited time. [true/false]

int32

The Hour of the grace rotation in UTC

string

The number of days to wait before deleting the old key (must be bigger than rotation-interval)

string

When to create the new version relative to the rotation date [after/before]

item-custom-fields
object

Additional custom fields to associate with the item

boolean
Defaults to false

Set output format to JSON

string

The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)

string

Lock this secret for read/update while an SRA session is active

string

Set the maximum number of versions, limited by the account settings defaults.

string
required

Rotated secret name

string

The length of the password to be generated

string

The resource group name (only relevant when explicitly-set-sa=true)

string

The name of the storage account (only relevant when explicitly-set-sa=true)

string

StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect.

rotation-event-in
array of strings

How many days before the rotation of the item would you like to be notified

rotation-event-in
int32

The Hour of the rotation in UTC

string

The number of days to wait between every automatic key rotation (1-365)

string
required

The rotator type. options: [target/password/api-key/azure-storage-account]

boolean

Enable this flag to prevent simultaneous use of the same secret

string

Enable/Disable secure remote access [true/false]

string

Destination URL to inject secrets

boolean
Defaults to false

Enable Web Secure Remote Access

boolean
Defaults to false

Secure browser via Akeyless's Secure Remote Access (SRA)

boolean
Defaults to false

Web-Proxy via Akeyless's Secure Remote Access (SRA)

string

The name of the storage account key to rotate [key1/key2/kerb1/kerb2] (relevat to azure-storage-account)

tags
array of strings

Add tags attached to this object

tags
string
required

The target name to associate

string

Authentication token (see /auth and /configure)

string

The universal identity token, Required only for universal_identity authentication

string

The user principal name to rotate his password (relevant only for rotator-type=password)

Responses

Language
Response
Click Try It! to start a request and see the response here! Or choose an example:
application/json
Footer Section