1. Packages
  2. Packages
  3. Akeyless Provider
  4. API Docs
  5. DynamicSecretGcp
Viewing docs for akeyless 2.0.1
published on Monday, Apr 27, 2026 by akeyless-community
Viewing docs for akeyless 2.0.1
published on Monday, Apr 27, 2026 by akeyless-community

    Google Cloud Provider (GCP) dynamic secret resource

    Create DynamicSecretGcp Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new DynamicSecretGcp(name: string, args?: DynamicSecretGcpArgs, opts?: CustomResourceOptions);
    @overload
    def DynamicSecretGcp(resource_name: str,
                         args: Optional[DynamicSecretGcpArgs] = None,
                         opts: Optional[ResourceOptions] = None)
    
    @overload
    def DynamicSecretGcp(resource_name: str,
                         opts: Optional[ResourceOptions] = None,
                         access_type: Optional[str] = None,
                         custom_username_template: Optional[str] = None,
                         delete_protection: Optional[str] = None,
                         description: Optional[str] = None,
                         dynamic_secret_gcp_id: Optional[str] = None,
                         encryption_key_name: Optional[str] = None,
                         fixed_user_claim_keyname: Optional[str] = None,
                         gcp_cred_type: Optional[str] = None,
                         gcp_key: Optional[str] = None,
                         gcp_key_algo: Optional[str] = None,
                         gcp_project_id: Optional[str] = None,
                         gcp_sa_email: Optional[str] = None,
                         gcp_token_scopes: Optional[str] = None,
                         item_custom_fields: Optional[Mapping[str, str]] = None,
                         name: Optional[str] = None,
                         project_id: Optional[str] = None,
                         role_binding: Optional[str] = None,
                         role_names: Optional[str] = None,
                         secure_access_delay: Optional[float] = None,
                         secure_access_enable: Optional[str] = None,
                         secure_access_url: Optional[str] = None,
                         secure_access_web_browsing: Optional[bool] = None,
                         secure_access_web_proxy: Optional[bool] = None,
                         service_account_type: Optional[str] = None,
                         tags: Optional[Sequence[str]] = None,
                         target_name: Optional[str] = None,
                         user_ttl: Optional[str] = None)
    func NewDynamicSecretGcp(ctx *Context, name string, args *DynamicSecretGcpArgs, opts ...ResourceOption) (*DynamicSecretGcp, error)
    public DynamicSecretGcp(string name, DynamicSecretGcpArgs? args = null, CustomResourceOptions? opts = null)
    public DynamicSecretGcp(String name, DynamicSecretGcpArgs args)
    public DynamicSecretGcp(String name, DynamicSecretGcpArgs args, CustomResourceOptions options)
    
    type: akeyless:DynamicSecretGcp
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args DynamicSecretGcpArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args DynamicSecretGcpArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args DynamicSecretGcpArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args DynamicSecretGcpArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args DynamicSecretGcpArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var dynamicSecretGcpResource = new Akeyless.DynamicSecretGcp("dynamicSecretGcpResource", new()
    {
        AccessType = "string",
        CustomUsernameTemplate = "string",
        DeleteProtection = "string",
        Description = "string",
        DynamicSecretGcpId = "string",
        EncryptionKeyName = "string",
        FixedUserClaimKeyname = "string",
        GcpCredType = "string",
        GcpKey = "string",
        GcpKeyAlgo = "string",
        GcpProjectId = "string",
        GcpSaEmail = "string",
        GcpTokenScopes = "string",
        ItemCustomFields = 
        {
            { "string", "string" },
        },
        Name = "string",
        ProjectId = "string",
        RoleBinding = "string",
        RoleNames = "string",
        SecureAccessDelay = 0,
        SecureAccessEnable = "string",
        SecureAccessUrl = "string",
        SecureAccessWebBrowsing = false,
        SecureAccessWebProxy = false,
        ServiceAccountType = "string",
        Tags = new[]
        {
            "string",
        },
        TargetName = "string",
        UserTtl = "string",
    });
    
    example, err := akeyless.NewDynamicSecretGcp(ctx, "dynamicSecretGcpResource", &akeyless.DynamicSecretGcpArgs{
    	AccessType:             pulumi.String("string"),
    	CustomUsernameTemplate: pulumi.String("string"),
    	DeleteProtection:       pulumi.String("string"),
    	Description:            pulumi.String("string"),
    	DynamicSecretGcpId:     pulumi.String("string"),
    	EncryptionKeyName:      pulumi.String("string"),
    	FixedUserClaimKeyname:  pulumi.String("string"),
    	GcpCredType:            pulumi.String("string"),
    	GcpKey:                 pulumi.String("string"),
    	GcpKeyAlgo:             pulumi.String("string"),
    	GcpProjectId:           pulumi.String("string"),
    	GcpSaEmail:             pulumi.String("string"),
    	GcpTokenScopes:         pulumi.String("string"),
    	ItemCustomFields: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    	Name:                    pulumi.String("string"),
    	ProjectId:               pulumi.String("string"),
    	RoleBinding:             pulumi.String("string"),
    	RoleNames:               pulumi.String("string"),
    	SecureAccessDelay:       pulumi.Float64(0),
    	SecureAccessEnable:      pulumi.String("string"),
    	SecureAccessUrl:         pulumi.String("string"),
    	SecureAccessWebBrowsing: pulumi.Bool(false),
    	SecureAccessWebProxy:    pulumi.Bool(false),
    	ServiceAccountType:      pulumi.String("string"),
    	Tags: pulumi.StringArray{
    		pulumi.String("string"),
    	},
    	TargetName: pulumi.String("string"),
    	UserTtl:    pulumi.String("string"),
    })
    
    var dynamicSecretGcpResource = new DynamicSecretGcp("dynamicSecretGcpResource", DynamicSecretGcpArgs.builder()
        .accessType("string")
        .customUsernameTemplate("string")
        .deleteProtection("string")
        .description("string")
        .dynamicSecretGcpId("string")
        .encryptionKeyName("string")
        .fixedUserClaimKeyname("string")
        .gcpCredType("string")
        .gcpKey("string")
        .gcpKeyAlgo("string")
        .gcpProjectId("string")
        .gcpSaEmail("string")
        .gcpTokenScopes("string")
        .itemCustomFields(Map.of("string", "string"))
        .name("string")
        .projectId("string")
        .roleBinding("string")
        .roleNames("string")
        .secureAccessDelay(0.0)
        .secureAccessEnable("string")
        .secureAccessUrl("string")
        .secureAccessWebBrowsing(false)
        .secureAccessWebProxy(false)
        .serviceAccountType("string")
        .tags("string")
        .targetName("string")
        .userTtl("string")
        .build());
    
    dynamic_secret_gcp_resource = akeyless.DynamicSecretGcp("dynamicSecretGcpResource",
        access_type="string",
        custom_username_template="string",
        delete_protection="string",
        description="string",
        dynamic_secret_gcp_id="string",
        encryption_key_name="string",
        fixed_user_claim_keyname="string",
        gcp_cred_type="string",
        gcp_key="string",
        gcp_key_algo="string",
        gcp_project_id="string",
        gcp_sa_email="string",
        gcp_token_scopes="string",
        item_custom_fields={
            "string": "string",
        },
        name="string",
        project_id="string",
        role_binding="string",
        role_names="string",
        secure_access_delay=float(0),
        secure_access_enable="string",
        secure_access_url="string",
        secure_access_web_browsing=False,
        secure_access_web_proxy=False,
        service_account_type="string",
        tags=["string"],
        target_name="string",
        user_ttl="string")
    
    const dynamicSecretGcpResource = new akeyless.DynamicSecretGcp("dynamicSecretGcpResource", {
        accessType: "string",
        customUsernameTemplate: "string",
        deleteProtection: "string",
        description: "string",
        dynamicSecretGcpId: "string",
        encryptionKeyName: "string",
        fixedUserClaimKeyname: "string",
        gcpCredType: "string",
        gcpKey: "string",
        gcpKeyAlgo: "string",
        gcpProjectId: "string",
        gcpSaEmail: "string",
        gcpTokenScopes: "string",
        itemCustomFields: {
            string: "string",
        },
        name: "string",
        projectId: "string",
        roleBinding: "string",
        roleNames: "string",
        secureAccessDelay: 0,
        secureAccessEnable: "string",
        secureAccessUrl: "string",
        secureAccessWebBrowsing: false,
        secureAccessWebProxy: false,
        serviceAccountType: "string",
        tags: ["string"],
        targetName: "string",
        userTtl: "string",
    });
    
    type: akeyless:DynamicSecretGcp
    properties:
        accessType: string
        customUsernameTemplate: string
        deleteProtection: string
        description: string
        dynamicSecretGcpId: string
        encryptionKeyName: string
        fixedUserClaimKeyname: string
        gcpCredType: string
        gcpKey: string
        gcpKeyAlgo: string
        gcpProjectId: string
        gcpSaEmail: string
        gcpTokenScopes: string
        itemCustomFields:
            string: string
        name: string
        projectId: string
        roleBinding: string
        roleNames: string
        secureAccessDelay: 0
        secureAccessEnable: string
        secureAccessUrl: string
        secureAccessWebBrowsing: false
        secureAccessWebProxy: false
        serviceAccountType: string
        tags:
            - string
        targetName: string
        userTtl: string
    

    DynamicSecretGcp Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The DynamicSecretGcp resource accepts the following input properties:

    AccessType string
    The type of the GCP dynamic secret, options are [sa, external]
    CustomUsernameTemplate string
    Customize how temporary usernames are generated using go template
    DeleteProtection string
    Protection from accidental deletion of this object [true/false]
    Description string
    Description of the object
    DynamicSecretGcpId string
    The ID of this resource.
    EncryptionKeyName string
    Dynamic producer encryption key
    FixedUserClaimKeyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external)
    GcpCredType string
    Credentials type, options are [token, key]
    GcpKey string
    Base64-encoded service account private key text
    GcpKeyAlgo string
    Service account key algorithm, e.g. KEYALGRSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key)
    GcpProjectId string
    GCP Project ID override for dynamic secret operations
    GcpSaEmail string
    The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed)
    GcpTokenScopes string
    Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token)
    ItemCustomFields Dictionary<string, string>
    Additional custom fields to associate with the item
    Name string
    Dynamic secret name
    ProjectId string
    GCP Project ID override for dynamic secret operations
    RoleBinding string
    Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic)
    RoleNames string
    Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external)
    SecureAccessDelay double
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    SecureAccessEnable string
    Enable/Disable secure remote access [true/false]
    SecureAccessUrl string
    Destination URL to inject secrets
    SecureAccessWebBrowsing bool
    Secure browser via Akeyless's Secure Remote Access (SRA)
    SecureAccessWebProxy bool
    Web-Proxy via Akeyless's Secure Remote Access (SRA)
    ServiceAccountType string
    The type of the GCP service account. Options fixed, dynamic
    Tags List<string>
    Add tags attached to this object
    TargetName string
    Target name
    UserTtl string
    User TTL
    AccessType string
    The type of the GCP dynamic secret, options are [sa, external]
    CustomUsernameTemplate string
    Customize how temporary usernames are generated using go template
    DeleteProtection string
    Protection from accidental deletion of this object [true/false]
    Description string
    Description of the object
    DynamicSecretGcpId string
    The ID of this resource.
    EncryptionKeyName string
    Dynamic producer encryption key
    FixedUserClaimKeyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external)
    GcpCredType string
    Credentials type, options are [token, key]
    GcpKey string
    Base64-encoded service account private key text
    GcpKeyAlgo string
    Service account key algorithm, e.g. KEYALGRSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key)
    GcpProjectId string
    GCP Project ID override for dynamic secret operations
    GcpSaEmail string
    The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed)
    GcpTokenScopes string
    Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token)
    ItemCustomFields map[string]string
    Additional custom fields to associate with the item
    Name string
    Dynamic secret name
    ProjectId string
    GCP Project ID override for dynamic secret operations
    RoleBinding string
    Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic)
    RoleNames string
    Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external)
    SecureAccessDelay float64
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    SecureAccessEnable string
    Enable/Disable secure remote access [true/false]
    SecureAccessUrl string
    Destination URL to inject secrets
    SecureAccessWebBrowsing bool
    Secure browser via Akeyless's Secure Remote Access (SRA)
    SecureAccessWebProxy bool
    Web-Proxy via Akeyless's Secure Remote Access (SRA)
    ServiceAccountType string
    The type of the GCP service account. Options fixed, dynamic
    Tags []string
    Add tags attached to this object
    TargetName string
    Target name
    UserTtl string
    User TTL
    accessType String
    The type of the GCP dynamic secret, options are [sa, external]
    customUsernameTemplate String
    Customize how temporary usernames are generated using go template
    deleteProtection String
    Protection from accidental deletion of this object [true/false]
    description String
    Description of the object
    dynamicSecretGcpId String
    The ID of this resource.
    encryptionKeyName String
    Dynamic producer encryption key
    fixedUserClaimKeyname String
    For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external)
    gcpCredType String
    Credentials type, options are [token, key]
    gcpKey String
    Base64-encoded service account private key text
    gcpKeyAlgo String
    Service account key algorithm, e.g. KEYALGRSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key)
    gcpProjectId String
    GCP Project ID override for dynamic secret operations
    gcpSaEmail String
    The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed)
    gcpTokenScopes String
    Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token)
    itemCustomFields Map<String,String>
    Additional custom fields to associate with the item
    name String
    Dynamic secret name
    projectId String
    GCP Project ID override for dynamic secret operations
    roleBinding String
    Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic)
    roleNames String
    Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external)
    secureAccessDelay Double
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secureAccessEnable String
    Enable/Disable secure remote access [true/false]
    secureAccessUrl String
    Destination URL to inject secrets
    secureAccessWebBrowsing Boolean
    Secure browser via Akeyless's Secure Remote Access (SRA)
    secureAccessWebProxy Boolean
    Web-Proxy via Akeyless's Secure Remote Access (SRA)
    serviceAccountType String
    The type of the GCP service account. Options fixed, dynamic
    tags List<String>
    Add tags attached to this object
    targetName String
    Target name
    userTtl String
    User TTL
    accessType string
    The type of the GCP dynamic secret, options are [sa, external]
    customUsernameTemplate string
    Customize how temporary usernames are generated using go template
    deleteProtection string
    Protection from accidental deletion of this object [true/false]
    description string
    Description of the object
    dynamicSecretGcpId string
    The ID of this resource.
    encryptionKeyName string
    Dynamic producer encryption key
    fixedUserClaimKeyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external)
    gcpCredType string
    Credentials type, options are [token, key]
    gcpKey string
    Base64-encoded service account private key text
    gcpKeyAlgo string
    Service account key algorithm, e.g. KEYALGRSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key)
    gcpProjectId string
    GCP Project ID override for dynamic secret operations
    gcpSaEmail string
    The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed)
    gcpTokenScopes string
    Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token)
    itemCustomFields {[key: string]: string}
    Additional custom fields to associate with the item
    name string
    Dynamic secret name
    projectId string
    GCP Project ID override for dynamic secret operations
    roleBinding string
    Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic)
    roleNames string
    Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external)
    secureAccessDelay number
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secureAccessEnable string
    Enable/Disable secure remote access [true/false]
    secureAccessUrl string
    Destination URL to inject secrets
    secureAccessWebBrowsing boolean
    Secure browser via Akeyless's Secure Remote Access (SRA)
    secureAccessWebProxy boolean
    Web-Proxy via Akeyless's Secure Remote Access (SRA)
    serviceAccountType string
    The type of the GCP service account. Options fixed, dynamic
    tags string[]
    Add tags attached to this object
    targetName string
    Target name
    userTtl string
    User TTL
    access_type str
    The type of the GCP dynamic secret, options are [sa, external]
    custom_username_template str
    Customize how temporary usernames are generated using go template
    delete_protection str
    Protection from accidental deletion of this object [true/false]
    description str
    Description of the object
    dynamic_secret_gcp_id str
    The ID of this resource.
    encryption_key_name str
    Dynamic producer encryption key
    fixed_user_claim_keyname str
    For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external)
    gcp_cred_type str
    Credentials type, options are [token, key]
    gcp_key str
    Base64-encoded service account private key text
    gcp_key_algo str
    Service account key algorithm, e.g. KEYALGRSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key)
    gcp_project_id str
    GCP Project ID override for dynamic secret operations
    gcp_sa_email str
    The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed)
    gcp_token_scopes str
    Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token)
    item_custom_fields Mapping[str, str]
    Additional custom fields to associate with the item
    name str
    Dynamic secret name
    project_id str
    GCP Project ID override for dynamic secret operations
    role_binding str
    Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic)
    role_names str
    Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external)
    secure_access_delay float
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secure_access_enable str
    Enable/Disable secure remote access [true/false]
    secure_access_url str
    Destination URL to inject secrets
    secure_access_web_browsing bool
    Secure browser via Akeyless's Secure Remote Access (SRA)
    secure_access_web_proxy bool
    Web-Proxy via Akeyless's Secure Remote Access (SRA)
    service_account_type str
    The type of the GCP service account. Options fixed, dynamic
    tags Sequence[str]
    Add tags attached to this object
    target_name str
    Target name
    user_ttl str
    User TTL
    accessType String
    The type of the GCP dynamic secret, options are [sa, external]
    customUsernameTemplate String
    Customize how temporary usernames are generated using go template
    deleteProtection String
    Protection from accidental deletion of this object [true/false]
    description String
    Description of the object
    dynamicSecretGcpId String
    The ID of this resource.
    encryptionKeyName String
    Dynamic producer encryption key
    fixedUserClaimKeyname String
    For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external)
    gcpCredType String
    Credentials type, options are [token, key]
    gcpKey String
    Base64-encoded service account private key text
    gcpKeyAlgo String
    Service account key algorithm, e.g. KEYALGRSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key)
    gcpProjectId String
    GCP Project ID override for dynamic secret operations
    gcpSaEmail String
    The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed)
    gcpTokenScopes String
    Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token)
    itemCustomFields Map<String>
    Additional custom fields to associate with the item
    name String
    Dynamic secret name
    projectId String
    GCP Project ID override for dynamic secret operations
    roleBinding String
    Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic)
    roleNames String
    Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external)
    secureAccessDelay Number
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secureAccessEnable String
    Enable/Disable secure remote access [true/false]
    secureAccessUrl String
    Destination URL to inject secrets
    secureAccessWebBrowsing Boolean
    Secure browser via Akeyless's Secure Remote Access (SRA)
    secureAccessWebProxy Boolean
    Web-Proxy via Akeyless's Secure Remote Access (SRA)
    serviceAccountType String
    The type of the GCP service account. Options fixed, dynamic
    tags List<String>
    Add tags attached to this object
    targetName String
    Target name
    userTtl String
    User TTL

    Outputs

    All input properties are implicitly available as output properties. Additionally, the DynamicSecretGcp resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing DynamicSecretGcp Resource

    Get an existing DynamicSecretGcp resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: DynamicSecretGcpState, opts?: CustomResourceOptions): DynamicSecretGcp
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            access_type: Optional[str] = None,
            custom_username_template: Optional[str] = None,
            delete_protection: Optional[str] = None,
            description: Optional[str] = None,
            dynamic_secret_gcp_id: Optional[str] = None,
            encryption_key_name: Optional[str] = None,
            fixed_user_claim_keyname: Optional[str] = None,
            gcp_cred_type: Optional[str] = None,
            gcp_key: Optional[str] = None,
            gcp_key_algo: Optional[str] = None,
            gcp_project_id: Optional[str] = None,
            gcp_sa_email: Optional[str] = None,
            gcp_token_scopes: Optional[str] = None,
            item_custom_fields: Optional[Mapping[str, str]] = None,
            name: Optional[str] = None,
            project_id: Optional[str] = None,
            role_binding: Optional[str] = None,
            role_names: Optional[str] = None,
            secure_access_delay: Optional[float] = None,
            secure_access_enable: Optional[str] = None,
            secure_access_url: Optional[str] = None,
            secure_access_web_browsing: Optional[bool] = None,
            secure_access_web_proxy: Optional[bool] = None,
            service_account_type: Optional[str] = None,
            tags: Optional[Sequence[str]] = None,
            target_name: Optional[str] = None,
            user_ttl: Optional[str] = None) -> DynamicSecretGcp
    func GetDynamicSecretGcp(ctx *Context, name string, id IDInput, state *DynamicSecretGcpState, opts ...ResourceOption) (*DynamicSecretGcp, error)
    public static DynamicSecretGcp Get(string name, Input<string> id, DynamicSecretGcpState? state, CustomResourceOptions? opts = null)
    public static DynamicSecretGcp get(String name, Output<String> id, DynamicSecretGcpState state, CustomResourceOptions options)
    resources:  _:    type: akeyless:DynamicSecretGcp    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AccessType string
    The type of the GCP dynamic secret, options are [sa, external]
    CustomUsernameTemplate string
    Customize how temporary usernames are generated using go template
    DeleteProtection string
    Protection from accidental deletion of this object [true/false]
    Description string
    Description of the object
    DynamicSecretGcpId string
    The ID of this resource.
    EncryptionKeyName string
    Dynamic producer encryption key
    FixedUserClaimKeyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external)
    GcpCredType string
    Credentials type, options are [token, key]
    GcpKey string
    Base64-encoded service account private key text
    GcpKeyAlgo string
    Service account key algorithm, e.g. KEYALGRSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key)
    GcpProjectId string
    GCP Project ID override for dynamic secret operations
    GcpSaEmail string
    The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed)
    GcpTokenScopes string
    Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token)
    ItemCustomFields Dictionary<string, string>
    Additional custom fields to associate with the item
    Name string
    Dynamic secret name
    ProjectId string
    GCP Project ID override for dynamic secret operations
    RoleBinding string
    Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic)
    RoleNames string
    Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external)
    SecureAccessDelay double
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    SecureAccessEnable string
    Enable/Disable secure remote access [true/false]
    SecureAccessUrl string
    Destination URL to inject secrets
    SecureAccessWebBrowsing bool
    Secure browser via Akeyless's Secure Remote Access (SRA)
    SecureAccessWebProxy bool
    Web-Proxy via Akeyless's Secure Remote Access (SRA)
    ServiceAccountType string
    The type of the GCP service account. Options fixed, dynamic
    Tags List<string>
    Add tags attached to this object
    TargetName string
    Target name
    UserTtl string
    User TTL
    AccessType string
    The type of the GCP dynamic secret, options are [sa, external]
    CustomUsernameTemplate string
    Customize how temporary usernames are generated using go template
    DeleteProtection string
    Protection from accidental deletion of this object [true/false]
    Description string
    Description of the object
    DynamicSecretGcpId string
    The ID of this resource.
    EncryptionKeyName string
    Dynamic producer encryption key
    FixedUserClaimKeyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external)
    GcpCredType string
    Credentials type, options are [token, key]
    GcpKey string
    Base64-encoded service account private key text
    GcpKeyAlgo string
    Service account key algorithm, e.g. KEYALGRSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key)
    GcpProjectId string
    GCP Project ID override for dynamic secret operations
    GcpSaEmail string
    The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed)
    GcpTokenScopes string
    Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token)
    ItemCustomFields map[string]string
    Additional custom fields to associate with the item
    Name string
    Dynamic secret name
    ProjectId string
    GCP Project ID override for dynamic secret operations
    RoleBinding string
    Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic)
    RoleNames string
    Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external)
    SecureAccessDelay float64
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    SecureAccessEnable string
    Enable/Disable secure remote access [true/false]
    SecureAccessUrl string
    Destination URL to inject secrets
    SecureAccessWebBrowsing bool
    Secure browser via Akeyless's Secure Remote Access (SRA)
    SecureAccessWebProxy bool
    Web-Proxy via Akeyless's Secure Remote Access (SRA)
    ServiceAccountType string
    The type of the GCP service account. Options fixed, dynamic
    Tags []string
    Add tags attached to this object
    TargetName string
    Target name
    UserTtl string
    User TTL
    accessType String
    The type of the GCP dynamic secret, options are [sa, external]
    customUsernameTemplate String
    Customize how temporary usernames are generated using go template
    deleteProtection String
    Protection from accidental deletion of this object [true/false]
    description String
    Description of the object
    dynamicSecretGcpId String
    The ID of this resource.
    encryptionKeyName String
    Dynamic producer encryption key
    fixedUserClaimKeyname String
    For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external)
    gcpCredType String
    Credentials type, options are [token, key]
    gcpKey String
    Base64-encoded service account private key text
    gcpKeyAlgo String
    Service account key algorithm, e.g. KEYALGRSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key)
    gcpProjectId String
    GCP Project ID override for dynamic secret operations
    gcpSaEmail String
    The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed)
    gcpTokenScopes String
    Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token)
    itemCustomFields Map<String,String>
    Additional custom fields to associate with the item
    name String
    Dynamic secret name
    projectId String
    GCP Project ID override for dynamic secret operations
    roleBinding String
    Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic)
    roleNames String
    Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external)
    secureAccessDelay Double
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secureAccessEnable String
    Enable/Disable secure remote access [true/false]
    secureAccessUrl String
    Destination URL to inject secrets
    secureAccessWebBrowsing Boolean
    Secure browser via Akeyless's Secure Remote Access (SRA)
    secureAccessWebProxy Boolean
    Web-Proxy via Akeyless's Secure Remote Access (SRA)
    serviceAccountType String
    The type of the GCP service account. Options fixed, dynamic
    tags List<String>
    Add tags attached to this object
    targetName String
    Target name
    userTtl String
    User TTL
    accessType string
    The type of the GCP dynamic secret, options are [sa, external]
    customUsernameTemplate string
    Customize how temporary usernames are generated using go template
    deleteProtection string
    Protection from accidental deletion of this object [true/false]
    description string
    Description of the object
    dynamicSecretGcpId string
    The ID of this resource.
    encryptionKeyName string
    Dynamic producer encryption key
    fixedUserClaimKeyname string
    For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external)
    gcpCredType string
    Credentials type, options are [token, key]
    gcpKey string
    Base64-encoded service account private key text
    gcpKeyAlgo string
    Service account key algorithm, e.g. KEYALGRSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key)
    gcpProjectId string
    GCP Project ID override for dynamic secret operations
    gcpSaEmail string
    The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed)
    gcpTokenScopes string
    Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token)
    itemCustomFields {[key: string]: string}
    Additional custom fields to associate with the item
    name string
    Dynamic secret name
    projectId string
    GCP Project ID override for dynamic secret operations
    roleBinding string
    Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic)
    roleNames string
    Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external)
    secureAccessDelay number
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secureAccessEnable string
    Enable/Disable secure remote access [true/false]
    secureAccessUrl string
    Destination URL to inject secrets
    secureAccessWebBrowsing boolean
    Secure browser via Akeyless's Secure Remote Access (SRA)
    secureAccessWebProxy boolean
    Web-Proxy via Akeyless's Secure Remote Access (SRA)
    serviceAccountType string
    The type of the GCP service account. Options fixed, dynamic
    tags string[]
    Add tags attached to this object
    targetName string
    Target name
    userTtl string
    User TTL
    access_type str
    The type of the GCP dynamic secret, options are [sa, external]
    custom_username_template str
    Customize how temporary usernames are generated using go template
    delete_protection str
    Protection from accidental deletion of this object [true/false]
    description str
    Description of the object
    dynamic_secret_gcp_id str
    The ID of this resource.
    encryption_key_name str
    Dynamic producer encryption key
    fixed_user_claim_keyname str
    For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external)
    gcp_cred_type str
    Credentials type, options are [token, key]
    gcp_key str
    Base64-encoded service account private key text
    gcp_key_algo str
    Service account key algorithm, e.g. KEYALGRSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key)
    gcp_project_id str
    GCP Project ID override for dynamic secret operations
    gcp_sa_email str
    The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed)
    gcp_token_scopes str
    Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token)
    item_custom_fields Mapping[str, str]
    Additional custom fields to associate with the item
    name str
    Dynamic secret name
    project_id str
    GCP Project ID override for dynamic secret operations
    role_binding str
    Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic)
    role_names str
    Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external)
    secure_access_delay float
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secure_access_enable str
    Enable/Disable secure remote access [true/false]
    secure_access_url str
    Destination URL to inject secrets
    secure_access_web_browsing bool
    Secure browser via Akeyless's Secure Remote Access (SRA)
    secure_access_web_proxy bool
    Web-Proxy via Akeyless's Secure Remote Access (SRA)
    service_account_type str
    The type of the GCP service account. Options fixed, dynamic
    tags Sequence[str]
    Add tags attached to this object
    target_name str
    Target name
    user_ttl str
    User TTL
    accessType String
    The type of the GCP dynamic secret, options are [sa, external]
    customUsernameTemplate String
    Customize how temporary usernames are generated using go template
    deleteProtection String
    Protection from accidental deletion of this object [true/false]
    description String
    Description of the object
    dynamicSecretGcpId String
    The ID of this resource.
    encryptionKeyName String
    Dynamic producer encryption key
    fixedUserClaimKeyname String
    For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external)
    gcpCredType String
    Credentials type, options are [token, key]
    gcpKey String
    Base64-encoded service account private key text
    gcpKeyAlgo String
    Service account key algorithm, e.g. KEYALGRSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key)
    gcpProjectId String
    GCP Project ID override for dynamic secret operations
    gcpSaEmail String
    The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed)
    gcpTokenScopes String
    Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token)
    itemCustomFields Map<String>
    Additional custom fields to associate with the item
    name String
    Dynamic secret name
    projectId String
    GCP Project ID override for dynamic secret operations
    roleBinding String
    Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic)
    roleNames String
    Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external)
    secureAccessDelay Number
    The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds
    secureAccessEnable String
    Enable/Disable secure remote access [true/false]
    secureAccessUrl String
    Destination URL to inject secrets
    secureAccessWebBrowsing Boolean
    Secure browser via Akeyless's Secure Remote Access (SRA)
    secureAccessWebProxy Boolean
    Web-Proxy via Akeyless's Secure Remote Access (SRA)
    serviceAccountType String
    The type of the GCP service account. Options fixed, dynamic
    tags List<String>
    Add tags attached to this object
    targetName String
    Target name
    userTtl String
    User TTL

    Package Details

    Repository
    akeyless akeyless-community/terraform-provider-akeyless
    License
    Notes
    This Pulumi package is based on the akeyless Terraform Provider.
    Viewing docs for akeyless 2.0.1
    published on Monday, Apr 27, 2026 by akeyless-community
      Try Pulumi Cloud free. Your team will thank you.