Wiki Templates

admin 11/23/2021
26 Comments

Google Personal Templates has both annual and monthly budget templates (choose one of those). Money Management Template by vertex42.com demo video (3 min) Budget Calculator (Online) and Budget Calculator (Excel) by Financial Consumer Agency of Canada. Budget with Snowball. Budgeting Worksheets. Australian Worksheets. Free Calculators. Variadic templates. C11 introduced variadic templates, which can take a variable number of arguments in a manner somewhat similar to variadic functions such as std::printf. Function templates, class templates and (in C14) variable templates can all be variadic. Template aliases.

  1. Wiki Templates Sharepoint
  2. Wikipedia Page Template For Word
  3. Wiki Templates Amino
  4. Wiki Templates For Teams
-->

Template format

Wiki Templates Sharepoint

To create a Microsoft.KeyVault/vaults resource, add the following JSON to the resources section of your template.

Bicep is currently in preview. For more information, see Project Bicep.

Property values

The following tables describe the values you need to set in the schema.

Microsoft.KeyVault/vaults object

Note

Wiki

In Bicep, type and apiVersion are specified in the first line of the resource declaration. Use the format <type>@<apiVersion>. Don't set those properties in the resource body.

NameTypeRequiredValue
namestringYesName of the vault
typeenumYesFor JSON - Microsoft.KeyVault/vaults
apiVersionenumYesFor JSON - 2019-09-01
locationstringYesThe supported Azure location where the key vault should be created.
tagsobjectNoThe tags that will be assigned to the key vault.
propertiesobjectYesProperties of the vault - VaultProperties object
resourcesarrayNo

VaultProperties object

NameTypeRequiredValue
tenantIdstringYesThe Azure Active Directory tenant ID that should be used for authenticating requests to the key vault. - globally unique identifier
skuobjectYesSKU details - Sku object
accessPoliciesarrayNoAn array of 0 to 1024 identities that have access to the key vault. All identities in the array must use the same tenant ID as the key vault's tenant ID. When createMode is set to recover, access policies are not required. Otherwise, access policies are required. - AccessPolicyEntry object
vaultUristringNoThe URI of the vault for performing operations on keys and secrets. This property is readonly.
enabledForDeploymentbooleanNoProperty to specify whether Azure Virtual Machines are permitted to retrieve certificates stored as secrets from the key vault.
enabledForDiskEncryptionbooleanNoProperty to specify whether Azure Disk Encryption is permitted to retrieve secrets from the vault and unwrap keys.
enabledForTemplateDeploymentbooleanNoProperty to specify whether Azure Resource Manager is permitted to retrieve secrets from the key vault.
enableSoftDeletebooleanNoProperty to specify whether the 'soft delete' functionality is enabled for this key vault. If it's not set to any value(true or false) when creating new key vault, it will be set to true by default. Once set to true, it cannot be reverted to false.
softDeleteRetentionInDaysintegerNosoftDelete data retention days. It accepts >=7 and <=90.
enableRbacAuthorizationbooleanNoProperty that controls how data actions are authorized. When true, the key vault will use Role Based Access Control (RBAC) for authorization of data actions, and the access policies specified in vault properties will be ignored (warning: this is a preview feature). When false, the key vault will use the access policies specified in vault properties, and any policy stored on Azure Resource Manager will be ignored. If null or not specified, the vault is created with the default value of false. Note that management actions are always authorized with RBAC.
createModeenumNoThe vault's create mode to indicate whether the vault need to be recovered or not. - recover or default
enablePurgeProtectionbooleanNoProperty specifying whether protection against purge is enabled for this vault. Setting this property to true activates protection against purge for this vault and its content - only the Key Vault service may initiate a hard, irrecoverable deletion. The setting is effective only if soft delete is also enabled. Enabling this functionality is irreversible - that is, the property does not accept false as its value.
networkAclsobjectNoRules governing the accessibility of the key vault from specific network locations. - NetworkRuleSet object

Sku object

NameTypeRequiredValue
familyenumYesSKU family name - A
nameenumYesSKU name to specify whether the key vault is a standard vault or a premium vault. - standard or premium

AccessPolicyEntry object

NameTypeRequiredValue
tenantIdstringYesThe Azure Active Directory tenant ID that should be used for authenticating requests to the key vault. - globally unique identifier
objectIdstringYesThe object ID of a user, service principal or security group in the Azure Active Directory tenant for the vault. The object ID must be unique for the list of access policies.
applicationIdstringNoApplication ID of the client making request on behalf of a principal - globally unique identifier
permissionsobjectYesPermissions the identity has for keys, secrets and certificates. - Permissions object

NetworkRuleSet object

NameTypeRequiredValue
bypassenumNoTells what traffic can bypass network rules. This can be 'AzureServices' or 'None'. If not specified the default is 'AzureServices'. - AzureServices or None
defaultActionenumNoThe default action when no rule from ipRules and from virtualNetworkRules match. This is only used after the bypass property has been evaluated. - Allow or Deny
ipRulesarrayNoThe list of IP address rules. - IPRule object
virtualNetworkRulesarrayNoThe list of virtual network rules. - VirtualNetworkRule object

Permissions object

NameTypeRequiredValue
keysarrayNoPermissions to keys - all, encrypt, decrypt, wrapKey, unwrapKey, sign, verify, get, list, create, update, import, delete, backup, restore, recover, purge
secretsarrayNoPermissions to secrets - all, get, list, set, delete, backup, restore, recover, purge
certificatesarrayNoPermissions to certificates - all, get, list, delete, create, import, update, managecontacts, getissuers, listissuers, setissuers, deleteissuers, manageissuers, recover, purge, backup, restore
storagearrayNoPermissions to storage accounts - all, get, list, delete, set, update, regeneratekey, recover, purge, backup, restore, setsas, listsas, getsas, deletesas

IPRule object

NameTypeRequiredValue
valuestringYesAn IPv4 address range in CIDR notation, such as '124.56.78.91' (simple IP address) or '124.56.78.0/24' (all addresses that start with 124.56.78).

Wikipedia Page Template For Word

Wiki

VirtualNetworkRule object

Wiki Templates Amino

NameTypeRequiredValue
idstringYesFull resource id of a vnet subnet, such as '/subscriptions/subid/resourceGroups/rg1/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/subnet1'.

Quickstart templates

The following quickstart templates deploy this resource type.

Wiki Templates For Teams

TemplateDescription
Create an API Management service with SSL from KeyVault
This template deploys an API Management service configured with User Assigned Identity. It uses this identity to fetch SSL certificate from KeyVault and keeps it updated by checking every 4 hours.
App Service Environment with Azure SQL backend
This template creates an App Service Environment with an Azure SQL backend along with private endpoints along with associated resources typically used in an private/isolated environment.
Testing environment for Azure Firewall Premium
This template creates an Azure Firewall Premium and Firewall Policy with premium features such as Intrusion Inspection Detection (IDPS), TLS inspection and Web Category filtering
Create an Azure Machine Learning service workspace.
This template creates an Azure Machine Learning service workspace.
Create AML workspace with multiple Datasets & Datastores
This template creates Azure Machine Learning workspace with multiple datasets & datastores.
# Create a new encrypted windows vm from gallery image.
This template creates a new encrypted windows vm using the server 2k12 gallery image.
# Create a new encrypted managed disks windows vm from gallery image.
This template creates a new encrypted managed disks windows vm using the server 2k12 gallery image.
This template encrypts a running Windows VMSS
This template enables encryption on a running Windows VM Scale Set
Enable encryption on a running Windows VM.
This template enables encryption on a running windows vm.
Create and encrypt a new Windows VMSS with jumpbox
This template allows you to deploy a simple VM Scale Set of Windows VMs using the lastest patched version of serveral Windows versions. This template also deploys a jumpbox with a public IP address in the same virtual network. You can connect to the jumpbox via this public IP address, then connect from there to VMs in the scale set via private IP addresses.This template enables encryption on the VM Scale Set of Windows VMs.
Create an AKS compute target with a Private IP address.
This template creates an AKS compute target in given Azure Machine Learning service workspace with a private IP address.
AKS cluster with the Application Gateway Ingress Controller
This sample shows how to deploy an AKS cluster with Application Gateway, Application Gateway Ingress Controller, Azure Container Registry, Log Analytics and Key Vault
Continuous Deployment to VM Scale Sets using Spinnaker
This template allows you to install Spinnaker on VM or AKS. Specifically, as for the VM scenario you can deploy and configure a DevOps pipeline from an Aptly repository to a VM Scale Set in Azure.
Azure Machine Learning Workspace
This template creates a new Azure Machine Learning Workspace, along with an encrypted Storage Account, KeyVault and Applications Insights Logging
Create a KeyVault
This module allows you to create a KeyVault.
Create an Azure Key Vault and a secret
This template creates an Azure Key Vault and a secret.
Connect to a Key Vault via private endpoint
This sample shows how to use configure a virtual network and private DNS zone to access Key Vault via private endpoint.
Create a Key Vault and a list of secrets
This template creates a Key Vault and a list of secrets within the key vault as passed along with the parameters
Create Key Vault with logging enabled
This template creates an Azure Key Vault and an Azure Storage account that is used for logging. It optionally creates resource locks to protect your Key Vault and storage resources.
Advanced template for Azure Machine Learning workspace
A template that creates Azure Machine Learning workspace with private endpoints and resources behind VNET
Create an Application Gateway V2 with Key Vault
This template deploys an Application Gateway V2 in a Virtual Network, a user defined identity, Key Vault, a secret (cert data), and access policy on Key Vault and Application Gateway.
SAS 9.4 and Viya Quickstart Template for Azure
The SAS® 9.4 and Viya QuickStart Template for Azure deploy these products on the cloud: SAS® Enterprise BI Server 9.4, SAS® Enterprise Miner 15.1, and SAS® Visual Analytics 8.5 on Linux, and SAS® Visual Data Mining and Machine Learning 8.5 on Linux for Viya. This QuickStart is a reference architecture for users who wants to deploy the combination of SAS® 9.4 and Viya on Azure using cloud-friendly technologies. By deploying the SAS® platform on Azure, you get an integrated environment of SAS® 9.4 and Viya environments so you can take advantage of both worlds. SAS® Viya is a cloud-enabled, in-memory analytics engine. It uses elastic, scalable, and fault-tolerant processing to address complex analytical challenges. SAS® Viya provides faster processing for analytics by using a standardized code base that supports programming in SAS®, Python, R, Java, and Lua. It also supports cloud, on-premises, or hybrid environments and deploys seamlessly to any infrastructure or application ecosystem.