Skip to main content

πŸ”Œ Azure Key Vault Key - object.extracts.yaml

  • Contextual name: πŸ”Œ object.extracts.yaml
  • ID: /types/CA10__CaAzureKeyVaultKey__c/object.extracts.yaml
  • Located in: πŸ“• Azure Key Vault Key

Used In​

LogicPolicyFlags
🧠 wip.logic.yaml πŸŸ’πŸ“ Azure Key Vault Automatic Key Rotation is not enabled 🟠🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ Azure Non-RBAC Key Vault stores Keys without expiration date 🟒🟒 x3
🧠 prod.logic.yaml πŸŸ’πŸ“ Azure RBAC Key Vault stores Keys without expiration date 🟒🟒 x3

Content​

Open File

---
extracts:
# Values: Enabled, Disabled. Not Nullable. Can't have no access, retrieved via Microsoft.KeyVault/keys
- name: "CA10__enabledStatus__c"
value:
FIELD:
path: "CA10__enabledStatus__c"
undeterminedIf:
isEmpty: "Corrupted data. Key State cannot be empty."
# Nullable. Can't have no access, retrieved via Microsoft.KeyVault/keys
- name: "CA10__expirationDate__c"
value:
FIELD:
path: "CA10__expirationDate__c"
# Nullable
- name: "CA10__lifetimeActions__c"
value:
FIELD:
path: "CA10__lifetimeActions__c"
# undeterminedIf:
# noAccessDelegate:
# path: "CA10__lifetimeActions__c"
# currentStateMessage: "Unable to determine Key Rotation Policy. Possible permission issue with keys/getrotationpolicy"