Stores the state as a Blob with the given Key within the Blob Container within the Blob Storage Account.
This backend supports state locking and consistency checking with Azure Blob Storage native capabilities.
Warning: We recommend using environment variables to supply credentials and other sensitive data. If you use -backend-config
or hardcode these values directly in your configuration, Terraform will include these values in both the .terraform
subdirectory and in plan files. Refer to Credentials and Sensitive Data for details.
The azurerm
backend needs to authenticate to the storage account data plane in order to manipulate the state file blob in the storage account container. In order to do that, it needs to authenticate and to know the data plane URI for the storage account.
The azurerm
backend supports 5 methods to authenticate to the storage account data plane:
There are 5 types of Azure Active Directory authentication supported, which apply to the Azure Active Directory and Access Key Lookup methods.
These types can be supplied via inputs or via a pre-authenticated Azure CLI. We cover them in more depth in the following sections.
Data Plane URIIn most cases, you can infer the data plane URI from the storage_account_name
and container_name
. Refer to the storage account overview documentation for more information on the standard endpoints.
If you are using the 'Azure DNS zone endpoints' feature, the backend will need to lookup the data plane URI from the management plane. This requires that you set the lookup_blob_endpoint
configuration option to true
and the Reader
role assignment on the storage account.
This method requires a valid Azure Active Directory principal and a predictable storage account data plane URI.
Required Configuration OptionsThe following configuration options are always required for this method:
use_azuread_auth
- Set to true
to use Azure Active Directory authentication to the storage account data plane. This can also be set via the ARM_USE_AZUREAD
environment variable.tenant_id
- The tenant ID of the Azure Active Directory principal is required to authenticate to the storage account data plane. If using Azure CLI, this can be inferred from the CLI session. This can also be set via the ARM_TENANT_ID
environment variable.storage_account_name
- The name of the storage account to write the state file blob to.container_name
- The name of the storage account container to write the state file blob to.key
- The name of the blob within the storage account container to write the state file to.These optional configuration options apply when looking up the data plane URI from the management plane. They are not required when the data plane URI can be inferred from the storage_account_name
and container_name
.
lookup_blob_endpoint
- Set to true
to lookup the storage account data plane URI from the management plane. This is required if you are using the 'Azure DNS zone endpoints' feature. Defaults to false
. This value can also be sourced from the ARM_USE_DNS_ZONE_ENDPOINT
environment variable.subscription_id
- The subscription ID of the storage account is required to query the management plane. This is only required if lookup_blob_endpoint
is set to true
. If using Azure CLI, this can be inferred from the CLI session. This can also be set via the ARM_SUBSCRIPTION_ID
environment variable.resource_group_name
- The resource group name of the storage account is required to query the management plane. This is only required if lookup_blob_endpoint
is set to true
.The recommended data plane role assignments required for this method are either one of:
Storage Blob Data Owner
on the storage account container (Recommended)Storage Blob Data Contributor
on the storage accountThe recommended management plane role assignments required for this method are:
Reader
on the storage account (Only required if lookup_blob_endpoint
is set to true
)The following additional configuration options are always required for this sub-type:
use_oidc
- Set to true
to use OpenID Connect / Workload identity federation to authenticate to the storage account data plane. This can also be set via the ARM_USE_OIDC
environment variable.client_id
- The client ID of the Azure Active Directory Service Principal / App Registration or User Assigned Managed Identity is required to authenticate to the storage account data plane. This can also be set via the ARM_CLIENT_ID
environment variable.With GitHub, the ID Token environment variables are automatically found, so no further settings are required.
terraform {
backend "azurerm" {
use_oidc = true # Can also be set via `ARM_USE_OIDC` environment variable.
use_azuread_auth = true # Can also be set via `ARM_USE_AZUREAD` environment variable.
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable.
client_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_CLIENT_ID` environment variable.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
Example Configuration for Azure DevOps
With Azure DevOps, the ID Token endpoint environment variables are automatically found, but you need to supply the service connection ID in oidc_azure_service_connection_id
. If you are using the AzureCLI
or AzurePowerShell
tasks, the service connection ID is automatically set to the AZURESUBSCRIPTION_SERVICE_CONNECTION_ID
environment variable.
terraform {
backend "azurerm" {
use_oidc = true # Can also be set via `ARM_USE_OIDC` environment variable.
oidc_azure_service_connection_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_OIDC_AZURE_SERVICE_CONNECTION_ID` environment variable.
use_azuread_auth = true # Can also be set via `ARM_USE_AZUREAD` environment variable.
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable.
client_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_CLIENT_ID` environment variable.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
Azure Active Directory with Compute Attached Managed Identity Required Configuration Options
The following additional configuration options are always required for this sub-type:
use_msi
- Set to true
to use the managed identity to authenticate to the storage account data plane. This can also be set via the ARM_USE_MSI
environment variable.The following additional configuration options are optional for this sub-type:
client_id
- The client ID of the User Assigned Managed Identity is required to authenticate to the storage account data plane. This is not required for System Assigned Managed Identity. This can also be set via the ARM_CLIENT_ID
environment variable.terraform {
backend "azurerm" {
use_msi = true # Can also be set via `ARM_USE_MSI` environment variable.
use_azuread_auth = true # Can also be set via `ARM_USE_AZUREAD` environment variable.
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable.
client_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_CLIENT_ID` environment variable. Not required for System Assigned Managed Identity.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
Azure Active Directory with Azure CLI
You must have a pre-authenticated Azure CLI session using any supported method.
Required Configuration OptionsThe following additional configuration options are always required for this sub-type:
use_cli
- Set to true
to use the Azure CLI session authenticate to the storage account data plane. This can also be set via the ARM_USE_CLI
environment variable.terraform {
backend "azurerm" {
use_cli = true # Can also be set via `ARM_USE_CLI` environment variable.
use_azuread_auth = true # Can also be set via `ARM_USE_AZUREAD` environment variable.
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable. Azure CLI will fallback to use the connected tenant ID if not supplied.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
Azure Active Directory with Client Secret
Terraform retains this method for backwards compatibility only, do not use it for any new workloads.
Warning! This method requires you to manage and rotate a secret. Use OpenID Connect / Workload identity federation as a more secure approach.
Required InputsThe following additional configuration options are always required for this sub-type:
client_id
- The client ID of the Azure Active Directory Service Principal / App Registration is required to authenticate to the storage account data plane. This can also be set via the ARM_CLIENT_ID
environment variable.client_secret
- The client secret of the Azure Active Directory Service Principal / App Registration is required to authenticate to the storage account data plane. This can also be set via the ARM_CLIENT_SECRET
environment variable.terraform {
backend "azurerm" {
use_azuread_auth = true # Can also be set via `ARM_USE_AZUREAD` environment variable.
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable.
client_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_CLIENT_ID` environment variable.
client_secret = "************************************" # Can also be set via `ARM_CLIENT_SECRET` environment variable.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
Azure Active Directory with Client Certificate
Terraform retains this method for backwards compatibility only, do not use it for any new workloads.
Warning! This method requires you to manage and rotate a secret. Use OpenID Connect / Workload identity federation as a more secure approach.
Required InputsThe following additional configuration options are always required for this sub-type:
client_id
- The client ID of the Azure Active Directory Service Principal / App Registration is required to authenticate to the storage account data plane. This can also be set via the ARM_CLIENT_ID
environment variable.client_certificate_path
- The path to the client certificate bundle is required to authenticate to the storage account data plane. This can also be set via the ARM_CLIENT_CERTIFICATE_PATH
environment variable.client_certificate_password
- The password for the client certificate bundle is required to authenticate to the storage account data plane. This can also be set via the ARM_CLIENT_CERTIFICATE_PASSWORD
environment variable.terraform {
backend "azurerm" {
use_azuread_auth = true # Can also be set via `ARM_USE_AZUREAD` environment variable.
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable.
client_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_CLIENT_ID` environment variable.
client_certificate_path = "/path/to/bundle.pfx" # Can also be set via `ARM_CLIENT_CERTIFICATE_PATH` environment variable.
client_certificate_password = "************************************" # Can also be set via `ARM_CLIENT_CERTIFICATE_PASSWORD` environment variable.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
This method requires you find the Access Key for the storage account and supply it to the backend configuration.
The Access Key is then used to directly authenticate to the storage account data plane.
Terraform retains this method for backwards compatibility, we do not recommend it for new workloads.
Required Configuration OptionsThe following configuration options are always required for this method:
access_key
- The Access Key of the storage account is required to authenticate to the storage account data plane. This can also be set via the ARM_ACCESS_KEY
environment variable.storage_account_name
- The name of the storage account to write the state file blob to.container_name
- The name of the storage account container to write the state file blob to.key
- The name of the blob within the storage account container to write the state file to.There are no role assignments required on the storage account for this method as the Access Key is used to authenticate to the data plane.
Example ConfigurationWarning! This method requires you to manage and rotate a secret. Consider using OIDC as a more secure approach.
terraform {
backend "azurerm" {
access_key = "abcdefghijklmnopqrstuvwxyz0123456789..." # Can also be set via `ARM_ACCESS_KEY` environment variable.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
This method requires you generate a SAS Token for the storage account container or blob and supply it to the backend configuration.
The SAS Token is then used to directly authenticate to the storage account data plane.
Terraform retains this method for backwards compatibility, we do not recommend it for new workloads.
Required Configuration OptionsThe following configuration options are always required for this method:
sas_token
- The SAS Token for the storage account container or blob is required to authenticate to the storage account data plane. This can also be set via the ARM_SAS_TOKEN
environment variable.storage_account_name
- The name of the storage account to write the state file blob to.container_name
- The name of the storage account container to write the state file blob to.key
- The name of the blob within the storage account container to write the state file to.The SAS Token requires write
and list
permissions on the container or blob.
Warning! This method requires you to manage and rotate a secret. Consider using OIDC as a more secure approach.
terraform {
backend "azurerm" {
sas_token = "abcdefghijklmnopqrstuvwxyz0123456789..." # Can also be set via `ARM_SAS_TOKEN` environment variable.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
This method requires a valid Azure Active Directory principal and is a fallback for when Azure Active Directory authentication cannot be used on the storage account data plane.
This method queries the management plane to get the storage account Access Key and then uses that Access Key to authenticate to the storage account data plane. It requires elevated permissions on the storage account.
Terraform retains this method for backwards compatibility, we do not recommend it for new workloads.
Required Configuration OptionsThe following configuration options are always required for this method:
tenant_id
- The tenant ID of the Azure Active Directory principal is required to authenticate to the storage account management and data plane. If using Azure CLI, this can be inferred from the CLI session. This can also be set via the ARM_TENANT_ID
environment variable.subscription_id
- The subscription ID of the storage account is required to query the management plane. If using Azure CLI, this can be inferred from the CLI session. This can also be set via the ARM_SUBSCRIPTION_ID
environment variable.resource_group_name
- The resource group name of the storage account is required to query the management plane.storage_account_name
- The name of the storage account to write the state file blob to.container_name
- The name of the storage account container to write the state file blob to.key
- The name of the blob within the storage account container to write the state file to.These optional configuration options apply when looking up the data plane URI from the management plane. They are not required when the data plane URI can be inferred from the storage_account_name
and container_name
.
lookup_blob_endpoint
- Set to true
to lookup the storage account data plane URI from the management plane. This is required if you are using the 'Azure DNS zone endpoints' feature. Defaults to false
. This value can also be sourced from the ARM_USE_DNS_ZONE_ENDPOINT
environment variable.The recommended data plane role assignments required for this method are either one of:
Storage Blob Data Owner
on the storage account container (Recommended)Storage Blob Data Contributor
on the storage accountThe recommended management plane role assignments required for this method are:
Reader
on the storage accountStorage Account Key Operator Service Role
on the storage accountOpenID Connect / Workload identity federation is the recommended method for this scenario.
Required Configuration OptionsThe following additional configuration options are always required for this sub-type:
use_oidc
- Set to true
to use OpenID Connect / Workload identity federation to authenticate to the storage account management and data plane. This can also be set via the ARM_USE_OIDC
environment variable.client_id
- The client ID of the Azure Active Directory Service Principal / App Registration or User Assigned Managed Identity is required to authenticate to the storage account management and data plane. This can also be set via the ARM_CLIENT_ID
environment variable.With GitHub, the ID Token environment variables are automatically found, so no further settings are required.
terraform {
backend "azurerm" {
use_oidc = true # Can also be set via `ARM_USE_OIDC` environment variable.
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable.
subscription_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_SUBSCRIPTION_ID` environment variable.
client_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_CLIENT_ID` environment variable.
resource_group_name = "StorageAccount-ResourceGroup" # Can be passed via `-backend-config=`"resource_group_name=<resource group name>"` in the `init` command.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
Example Configuration for Azure DevOps
With Azure DevOps, the ID Token endpoint environment variables are automatically found, but you need to supply the service connection ID in oidc_azure_service_connection_id
. If you are using the AzureCLI
or AzurePowerShell
tasks, the service connection ID is automatically set to the AZURESUBSCRIPTION_SERVICE_CONNECTION_ID
environment variable.
terraform {
backend "azurerm" {
use_oidc = true # Can also be set via `ARM_USE_OIDC` environment variable.
oidc_azure_service_connection_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_OIDC_AZURE_SERVICE_CONNECTION_ID` environment variable.
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable.
subscription_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_SUBSCRIPTION_ID` environment variable.
client_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_CLIENT_ID` environment variable.
resource_group_name = "StorageAccount-ResourceGroup" # Can be passed via `-backend-config=`"resource_group_name=<resource group name>"` in the `init` command.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
Access Key Lookup with Compute Attached Managed Identity Required Configuration Options
The following additional configuration options are always required for this sub-type:
use_msi
- Set to true
to use the managed identity to authenticate to the storage account data plane. This can also be set via the ARM_USE_MSI
environment variable.The following additional configuration options are optional for this sub-type:
client_id
- The client ID of the User Assigned Managed Identity is required to authenticate to the storage account data plane. This is not required for System Assigned Managed Identity. This can also be set via the ARM_CLIENT_ID
environment variable.terraform {
backend "azurerm" {
use_msi = true # Can also be set via `ARM_USE_MSI` environment variable.
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable.
subscription_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_SUBSCRIPTION_ID` environment variable.
client_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_CLIENT_ID` environment variable. Not required for System Assigned Managed Identity.
resource_group_name = "StorageAccount-ResourceGroup" # Can be passed via `-backend-config=`"resource_group_name=<resource group name>"` in the `init` command.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
Access Key Lookup with Azure CLI
You must have a pre-authenticated Azure CLI session using any supported method.
terraform {
backend "azurerm" {
use_cli = true # Can also be set via `ARM_USE_CLI` environment variable.
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable. Azure CLI will fallback to use the connected tenant ID if not supplied.
subscription_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_SUBSCRIPTION_ID` environment variable. Azure CLI will fallback to use the connected subscription ID if not supplied.
resource_group_name = "StorageAccount-ResourceGroup" # Can be passed via `-backend-config=`"resource_group_name=<resource group name>"` in the `init` command.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
Access Key Lookup with Client Secret
Terraform retains this method for backwards compatibility only, do not use it for any new workloads.
Warning! This method requires you to manage and rotate a secret. Use OpenID Connect / Workload identity federation as a more secure approach.
terraform {
backend "azurerm" {
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable.
subscription_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_SUBSCRIPTION_ID` environment variable.
client_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_CLIENT_ID` environment variable.
client_secret = "************************************" # Can also be set via `ARM_CLIENT_SECRET` environment variable.
resource_group_name = "StorageAccount-ResourceGroup" # Can be passed via `-backend-config=`"resource_group_name=<resource group name>"` in the `init` command.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
Access Key Lookup with Client Certificate
Terraform retains this method for backwards compatibility only, do not use it for any new workloads.
Warning! This method requires you to manage and rotate a secret. Use OpenID Connect / Workload identity federation as a more secure approach.
terraform {
backend "azurerm" {
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable.
subscription_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_SUBSCRIPTION_ID` environment variable.
client_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_CLIENT_ID` environment variable.
client_certificate_path = "/path/to/bundle.pfx" # Can also be set via `ARM_CLIENT_CERTIFICATE_PATH` environment variable.
client_certificate_password = "************************************" # Can also be set via `ARM_CLIENT_CERTIFICATE_PASSWORD` environment variable.
resource_group_name = "StorageAccount-ResourceGroup" # Can be passed via `-backend-config=`"resource_group_name=<resource group name>"` in the `init` command.
storage_account_name = "abcd1234" # Can be passed via `-backend-config=`"storage_account_name=<storage account name>"` in the `init` command.
container_name = "tfstate" # Can be passed via `-backend-config=`"container_name=<container name>"` in the `init` command.
key = "prod.terraform.tfstate" # Can be passed via `-backend-config=`"key=<blob key name>"` in the `init` command.
}
}
To use the terraform_remote_state
data source with the azurerm
backend, you must use the exact same configuration as you would for the backend
block in your configuration.
For example to use Direct Azure Active Directory authentication with OpenID Connect / Workload identity federation for GitHub you would use the following configuration:
data "terraform_remote_state" "foo" {
backend = "azurerm"
config = {
use_oidc = true # Can also be set via `ARM_USE_OIDC` environment variable.
use_azuread_auth = true # Can also be set via `ARM_USE_AZUREAD` environment variable.
tenant_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_TENANT_ID` environment variable.
client_id = "00000000-0000-0000-0000-000000000000" # Can also be set via `ARM_CLIENT_ID` environment variable.
storage_account_name = "abcd1234" # There is not environment variable support for this input.
container_name = "tfstate" # There is not environment variable support for this input.
key = "prod.terraform.tfstate" # There is not environment variable support for this input.
}
}
Warning: We recommend using environment variables to supply credentials and other sensitive data. If you use -backend-config
or hardcode these values directly in your configuration, Terraform will include these values in both the .terraform
subdirectory and in plan files. Refer to Credentials and Sensitive Data for details.
For more information on when each of these configuration settings is required, refer to the previous sections of this page.
The following configuration options are supported:
storage_account_name
- (Required) The Name of the Storage Account.
container_name
- (Required) The Name of the Storage Container within the Storage Account.
key
- (Required) The name of the Blob used to retrieve/store Terraform's State file inside the Storage Container.
environment
- (Optional) The Azure Environment which should be used. This can also be sourced from the ARM_ENVIRONMENT
environment variable. Possible values are public
, china
and usgovernment
. Defaults to public
.
metadata_host
- (Optional) The Hostname of the Azure Metadata Service (for example management.azure.com
), used to obtain the Cloud Environment when using a Custom Azure Environment. This can also be sourced from the ARM_METADATA_HOSTNAME
Environment Variable.
lookup_blob_endpoint
- (Optional) Set to true
to look up the Storage Account Data Plane URI from the Management Plane. Defaults to false
. This value can also be sourced from the ARM_USE_DNS_ZONE_ENDPOINT
environment variable.
snapshot
- (Optional) Set to true
to snapshot the Blob used to store the Terraform state file before use. Defaults to false
. This value can also be sourced from the ARM_SNAPSHOT
environment variable.
tenant_id
- (Optional) The Tenant ID of the principal. This can also be sourced from the ARM_TENANT_ID
environment variable.
use_azuread_auth
- (Optional) Whether Azure Active Directory Authentication for storage account data plane authentication. This can also be sourced from the ARM_USE_AZUREAD
environment variable.
subscription_id
- (Optional) The Subscription ID of the storage account required for management plane authentication. This can also be sourced from the ARM_SUBSCRIPTION_ID
environment variable.
resource_group_name
- (Optional) The Name of the Resource Group in which the Storage Account exists required for management plane authentication.
access_key
- (Optional) The Access Key used to authenticate to the storage account data plane with the Direct Access Key authenticaton method. This can also be sourced from the ARM_ACCESS_KEY
environment variable.
sas_token
- (Optional) The SAS Token used to authenticate to the storage account data plane with the Direct SAS Token authentication method. This can also be sourced from the ARM_SAS_TOKEN
environment variable.
use_cli
- (Optional) Set to true
to use the Azure CLI session for authentication to the storage account management and data plane. This value can also be sourced from the ARM_USE_CLI
environment variable.
use_oidc
- (Optional) Set to true
to use OpenID Connect / Workload identity federation authentication for authentication to the storage account management and data plane. This can also be sourced from the ARM_USE_OIDC
environment variable.
client_id
- (Optional) The Client ID of the Azure Active Directory Principal required for some authentication sub-types. This can also be sourced from the ARM_CLIENT_ID
environment variable.
ado_pipeline_service_connection_id
- (Optional) The Azure DevOps Pipeline Service Connection ID required for Open ID Connect / Workload identity federation authentication with Azure DevOps. This can also be sourced from the ARM_ADO_PIPELINE_SERVICE_CONNECTION_ID
or ARM_OIDC_AZURE_SERVICE_CONNECTION_ID
environment variables. The provider will look for values in this order and use the first it finds configured.
oidc_request_url
- (Optional) The URL for the Open ID Connect provider from which to request an ID token. This is only required for advanced scenarios or third party integrations. This can also be sourced from the ARM_OIDC_REQUEST_URL
, ACTIONS_ID_TOKEN_REQUEST_URL
or SYSTEM_OIDCREQUESTURI
environment variables. The provider will look for values in this order and use the first it finds configured.
oidc_request_token
- (Optional) The bearer token for the request to the Open ID Connect provider. This is only required for advanced scenarios or third party integrations. This can also be sourced from the ARM_OIDC_REQUEST_TOKEN
, ACTIONS_ID_TOKEN_REQUEST_TOKEN
or SYSTEM_ACCESSTOKEN
environment variables. The provider will look for values in this order and use the first it finds configured.
oidc_token
- (Optional) The ID Token when authenticating using OpenID Connect. This is only required for advanced scenarios or third party integrations. This can also be sourced from the ARM_OIDC_TOKEN
environment variable.
oidc_token_file_path
- (Optional) The path to a file containing an ID token when authenticating using OpenID Connect. This is only required for advanced scenarios or third party integrations. This can also be sourced from the ARM_OIDC_TOKEN_FILE_PATH
environment variable.
use_aks_workload_identity
(Optional) Set to true
to use Azure AKS Workload Identity for authentication. This is only required for advanced scenarios or third party integrations. This can also be sourced from the ARM_USE_AKS_WORKLOAD_IDENTITY
environment variable.
use_msi
- (Optional) Set to true
to use a Compute Attached Managed Service Identity for authentication to the storage account management and data planes. This can also be sourced from the ARM_USE_MSI
environment variable.
msi_endpoint
- (Optional) The path to a custom Managed Service Identity endpoint which is automatically determined if not specified. This can also be sourced from the ARM_MSI_ENDPOINT
environment variable.
client_id_file_path
(Optional) The path to a file containing the Client ID which should be used. This can also be sourced from the ARM_CLIENT_ID_FILE_PATH
Environment Variable.
client_certificate_password
- (Optional) The password associated with the Client Certificate specified in client_certificate_path
. This can also be sourced from the ARM_CLIENT_CERTIFICATE_PASSWORD
environment variable.
client_certificate_path
- (Optional) The path to the PFX file used as the Client Certificate when authenticating as a Service Principal. This can also be sourced from the ARM_CLIENT_CERTIFICATE_PATH
environment variable.
client_certificate
- (Optional) Base64 encoded PKCS#12 certificate bundle to use when authenticating as a Service Principal using a Client Certificate. This can also be sourced from the ARM_CLIENT_CERTIFICATE
environment variable.
client_id_file_path
(Optional) The path to a file containing the Client ID which should be used. This can also be sourced from the ARM_CLIENT_ID_FILE_PATH
Environment Variable.
client_secret
- (Optional) The Client Secret of the Service Principal. This can also be sourced from the ARM_CLIENT_SECRET
environment variable.
client_secret_file_path
- (Optional) The path to a file containing the Client Secret which should be used. This can also be sourced from the ARM_CLIENT_SECRET_FILE_PATH
Environment Variable.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4