Secrets Mount Mssql Args
Constructors
Properties
A list of roles that are allowed to use this connection.
Connection string to use to connect to the database.
Set to true when the target is a Contained Database, e.g. AzureSQL.
Cancels all upcoming rotations of the root credential until unset. Requires Vault Enterprise 1.19+. Supported list of database secrets engines that can be configured:
Disable special character escaping in username and password
Maximum number of seconds a connection may be reused.
Maximum number of idle connections to the database.
Maximum number of open connections to the database.
Specifies the name of the plugin to use.
A list of database statements to be executed to rotate the root user's credentials.
The amount of time in seconds Vault should wait before rotating the root credential. A zero value tells Vault not to rotate the root credential. The minimum rotation period is 10 seconds. Requires Vault Enterprise 1.19+.
The schedule, in cron-style time format, defining the schedule on which Vault should rotate the root token. Requires Vault Enterprise 1.19+.
The maximum amount of time in seconds allowed to complete a rotation when a scheduled token rotation occurs. The default rotation window is unbound and the minimum allowable window is 3600
. Requires Vault Enterprise 1.19+.
Username generation template.
Whether the connection should be verified on initial configuration or not.