Azure Key Vault Data - Update secret attributes
Use the Azure Key Vault Data - Update secret attributes action A tool for building the processes, logic, and direction within workflows. Actions are the steps the workflow performs to complete a process. to update the properties of an existing secret without updating the secret value.
For more information about the Azure Key Vault Data connector, go to Azure Key Vault Data.
Configure the Azure Key Vault Data - Update secret attributes action
-
Add the action to the workflow and open the action configuration panel. For more information, see Add an action to the workflow.
- Select a Connection. If you do not have a connection, see Add a connection.
- Specify the Secret name to update attributes.
Azure Key Vault Data - Update secret attributes action fields and settings
Section |
Field |
Description |
Variable types |
---|---|---|---|
(Unlabeled) |
The Azure Key Vault Data connection to use to update the secret. To refresh the available connections, click |
(n/a) |
|
Secret name | The name of the secret to update. | Text, Decimal, Integer, Boolean, DateTime, Collection | |
Content type | The content type of the secret. You may specify the content type of a secret to assist in interpreting the secret data when it's retrieved. The maximum length of this field is 255 characters. The suggested usage is as a hint for interpreting the secret data. For instance, an implementation may store both passwords and certificates as secrets, then use this field to differentiate. There are no predefined values. | Text, Decimal, Integer, Boolean, DateTime, Collection | |
Expiration date |
Expiry date in Unix time. This attribute identifies the expiration time on or after which the secret data SHOULD NOT be retrieved. ![]() Unix time (also known as Epoch time, Posix time, seconds since the Epoch, or UNIX Epoch time) is a system for describing a point in time. It is the number of seconds that have elapsed since the Unix epoch, minus leap seconds; the Unix epoch is 00:00:00 UTC on 1 January 1970 (an arbitrary date); leap seconds are ignored, with a leap second having the same Unix time as the second before it, and every day is treated as if it contains exactly 86400 seconds. Unix time is widely used in operating systems and file formats. ![]() The following steps present an example of how to get Unix time from a date in a form input:
|
Integer | |
Enable | Determines whether the secret is enabled. This attribute specifies whether the secret data can be retrieved. The enabled attribute is used in conjunction with Activation date and Expiration date. When an operation occurs between the two dates, it will only be permitted if enabled is set to true. | Boolean | |
Activation date |
Not before date in Unix time. ![]() Unix time (also known as Epoch time, Posix time, seconds since the Epoch, or UNIX Epoch time) is a system for describing a point in time. It is the number of seconds that have elapsed since the Unix epoch, minus leap seconds; the Unix epoch is 00:00:00 UTC on 1 January 1970 (an arbitrary date); leap seconds are ignored, with a leap second having the same Unix time as the second before it, and every day is treated as if it contains exactly 86400 seconds. Unix time is widely used in operating systems and file formats. ![]() The following steps present an example of how to get Unix time from a date in a form input:
|
Integer | |
Output | Secret |
Stores the result of the action as an object. See Azure Key Vault - Update Secret API for information on these values. The following values are returned:
|
Object |