akeyless 3.1.1 → 3.2.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +23 -1
- data/docs/AssocTargetItem.md +2 -0
- data/docs/CreateCertificate.md +3 -1
- data/docs/CreateClassicKey.md +6 -2
- data/docs/CreateDBTarget.md +4 -0
- data/docs/CreateDFCKey.md +3 -1
- data/docs/CreateDynamicSecret.md +3 -1
- data/docs/CreateKey.md +3 -1
- data/docs/CreatePKICertIssuer.md +3 -1
- data/docs/CreatePingTarget.md +38 -0
- data/docs/CreatePingTargetOutput.md +18 -0
- data/docs/CreateRotatedSecret.md +5 -1
- data/docs/CreateSSHCertIssuer.md +3 -1
- data/docs/CreateSecret.md +3 -1
- data/docs/CreateTokenizer.md +3 -1
- data/docs/DSProducerDetails.md +48 -0
- data/docs/DecryptGPG.md +34 -0
- data/docs/DecryptGPGOutput.md +18 -0
- data/docs/EncryptGPG.md +32 -0
- data/docs/EncryptGPGOutput.md +18 -0
- data/docs/GatewayCreateProducerPing.md +66 -0
- data/docs/GatewayCreateProducerPingOutput.md +18 -0
- data/docs/GatewayCreateProducerSnowflake.md +4 -0
- data/docs/GatewayUpdateItem.md +3 -1
- data/docs/GatewayUpdateProducerPing.md +68 -0
- data/docs/GatewayUpdateProducerPingOutput.md +18 -0
- data/docs/GatewayUpdateProducerSnowflake.md +4 -0
- data/docs/GenCustomerFragment.md +4 -2
- data/docs/GetKubeExecCreds.md +5 -3
- data/docs/GetPKICertificate.md +5 -3
- data/docs/SecureRemoteAccess.md +2 -0
- data/docs/SignGPG.md +32 -0
- data/docs/SignGPGOutput.md +18 -0
- data/docs/TargetTypeDetailsInput.md +14 -0
- data/docs/UpdateDBTarget.md +4 -0
- data/docs/UpdateItem.md +3 -1
- data/docs/UpdatePKICertIssuer.md +3 -1
- data/docs/UpdatePingTarget.md +44 -0
- data/docs/UpdateRotatedSecret.md +5 -1
- data/docs/UpdateSSHCertIssuer.md +3 -1
- data/docs/UploadPKCS12.md +3 -1
- data/docs/UploadRSA.md +3 -1
- data/docs/V2Api.md +504 -0
- data/docs/VerifyGPG.md +32 -0
- data/lib/akeyless/api/v2_api.rb +512 -0
- data/lib/akeyless/models/assoc_target_item.rb +11 -1
- data/lib/akeyless/models/create_certificate.rb +12 -2
- data/lib/akeyless/models/create_classic_key.rb +23 -3
- data/lib/akeyless/models/create_db_target.rb +21 -1
- data/lib/akeyless/models/create_dfc_key.rb +12 -2
- data/lib/akeyless/models/create_dynamic_secret.rb +12 -4
- data/lib/akeyless/models/create_key.rb +12 -2
- data/lib/akeyless/models/create_ping_target.rb +329 -0
- data/lib/akeyless/models/create_ping_target_output.rb +219 -0
- data/lib/akeyless/models/create_pki_cert_issuer.rb +12 -2
- data/lib/akeyless/models/create_rotated_secret.rb +24 -2
- data/lib/akeyless/models/create_secret.rb +12 -2
- data/lib/akeyless/models/create_ssh_cert_issuer.rb +12 -2
- data/lib/akeyless/models/create_tokenizer.rb +12 -2
- data/lib/akeyless/models/decrypt_gpg.rb +310 -0
- data/lib/akeyless/models/decrypt_gpg_output.rb +219 -0
- data/lib/akeyless/models/ds_producer_details.rb +235 -1
- data/lib/akeyless/models/encrypt_gpg.rb +300 -0
- data/lib/akeyless/models/encrypt_gpg_output.rb +219 -0
- data/lib/akeyless/models/gateway_create_producer_ping.rb +482 -0
- data/lib/akeyless/models/gateway_create_producer_ping_output.rb +219 -0
- data/lib/akeyless/models/gateway_create_producer_snowflake.rb +22 -2
- data/lib/akeyless/models/gateway_update_item.rb +14 -2
- data/lib/akeyless/models/gateway_update_producer_ping.rb +492 -0
- data/lib/akeyless/models/gateway_update_producer_ping_output.rb +219 -0
- data/lib/akeyless/models/gateway_update_producer_snowflake.rb +22 -2
- data/lib/akeyless/models/gen_customer_fragment.rb +15 -5
- data/lib/akeyless/models/get_kube_exec_creds.rb +14 -4
- data/lib/akeyless/models/get_pki_certificate.rb +14 -4
- data/lib/akeyless/models/secure_remote_access.rb +10 -1
- data/lib/akeyless/models/sign_gpg.rb +300 -0
- data/lib/akeyless/models/sign_gpg_output.rb +219 -0
- data/lib/akeyless/models/target_type_details_input.rb +65 -1
- data/lib/akeyless/models/update_db_target.rb +21 -1
- data/lib/akeyless/models/update_item.rb +14 -2
- data/lib/akeyless/models/update_ping_target.rb +358 -0
- data/lib/akeyless/models/update_pki_cert_issuer.rb +12 -2
- data/lib/akeyless/models/update_rotated_secret.rb +26 -2
- data/lib/akeyless/models/update_ssh_cert_issuer.rb +12 -2
- data/lib/akeyless/models/upload_pkcs12.rb +12 -2
- data/lib/akeyless/models/upload_rsa.rb +12 -2
- data/lib/akeyless/models/verify_gpg.rb +300 -0
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +14 -0
- data/spec/models/create_ping_target_output_spec.rb +34 -0
- data/spec/models/create_ping_target_spec.rb +94 -0
- data/spec/models/decrypt_gpg_output_spec.rb +34 -0
- data/spec/models/decrypt_gpg_spec.rb +82 -0
- data/spec/models/encrypt_gpg_output_spec.rb +34 -0
- data/spec/models/encrypt_gpg_spec.rb +76 -0
- data/spec/models/gateway_create_producer_ping_output_spec.rb +34 -0
- data/spec/models/gateway_create_producer_ping_spec.rb +178 -0
- data/spec/models/gateway_update_producer_ping_output_spec.rb +34 -0
- data/spec/models/gateway_update_producer_ping_spec.rb +184 -0
- data/spec/models/sign_gpg_output_spec.rb +34 -0
- data/spec/models/sign_gpg_spec.rb +76 -0
- data/spec/models/update_ping_target_spec.rb +112 -0
- data/spec/models/verify_gpg_spec.rb +76 -0
- metadata +609 -553
data/docs/DSProducerDetails.md
CHANGED
@@ -4,15 +4,18 @@
|
|
4
4
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **access_token_manager_id** | **String** | | [optional] |
|
7
8
|
| **active** | **Boolean** | | [optional] |
|
8
9
|
| **admin_name** | **String** | | [optional] |
|
9
10
|
| **admin_pwd** | **String** | | [optional] |
|
10
11
|
| **admin_rotation_interval_days** | **Integer** | | [optional] |
|
12
|
+
| **administrative_port** | **String** | | [optional] |
|
11
13
|
| **artifactory_admin_apikey** | **String** | | [optional] |
|
12
14
|
| **artifactory_admin_username** | **String** | | [optional] |
|
13
15
|
| **artifactory_base_url** | **String** | | [optional] |
|
14
16
|
| **artifactory_token_audience** | **String** | | [optional] |
|
15
17
|
| **artifactory_token_scope** | **String** | | [optional] |
|
18
|
+
| **authorization_port** | **String** | | [optional] |
|
16
19
|
| **aws_access_key_id** | **String** | | [optional] |
|
17
20
|
| **aws_access_mode** | **String** | | [optional] |
|
18
21
|
| **aws_region** | **String** | | [optional] |
|
@@ -45,6 +48,7 @@
|
|
45
48
|
| **chef_server_url** | **String** | | [optional] |
|
46
49
|
| **chef_server_username** | **String** | | [optional] |
|
47
50
|
| **chef_skip_ssl** | **Boolean** | | [optional] |
|
51
|
+
| **client_authentication_type** | **String** | | [optional] |
|
48
52
|
| **create_sync_url** | **String** | | [optional] |
|
49
53
|
| **db_host_name** | **String** | | [optional] |
|
50
54
|
| **db_isolation_level** | **String** | | [optional] |
|
@@ -52,6 +56,8 @@
|
|
52
56
|
| **db_max_open_conns** | **String** | | [optional] |
|
53
57
|
| **db_name** | **String** | | [optional] |
|
54
58
|
| **db_port** | **String** | | [optional] |
|
59
|
+
| **db_private_key** | **String** | (Optional) Private Key in PEM format | [optional] |
|
60
|
+
| **db_private_key_passphrase** | **String** | | [optional] |
|
55
61
|
| **db_pwd** | **String** | | [optional] |
|
56
62
|
| **db_server_certificates** | **String** | (Optional) DBServerCertificates defines the set of root certificate authorities that clients use when verifying server certificates. If DBServerCertificates is empty, TLS uses the host's root CA set. | [optional] |
|
57
63
|
| **db_server_name** | **String** | (Optional) ServerName is used to verify the hostname on the returned certificates unless InsecureSkipVerify is given. It is also included in the client's handshake to support virtual hosting unless it is an IP address. | [optional] |
|
@@ -69,6 +75,7 @@
|
|
69
75
|
| **eks_region** | **String** | | [optional] |
|
70
76
|
| **eks_secret_access_key** | **String** | | [optional] |
|
71
77
|
| **enable_admin_rotation** | **Boolean** | | [optional] |
|
78
|
+
| **enforce_replay_prevention** | **Boolean** | relevant for PRIVATE_KEY_JWT client authentication type | [optional] |
|
72
79
|
| **externally_provided_user** | **String** | | [optional] |
|
73
80
|
| **failure_message** | **String** | | [optional] |
|
74
81
|
| **fixed_user_only** | **String** | | [optional] |
|
@@ -94,6 +101,7 @@
|
|
94
101
|
| **gke_cluster_name** | **String** | | [optional] |
|
95
102
|
| **gke_service_account_key** | **String** | | [optional] |
|
96
103
|
| **gke_service_account_name** | **String** | | [optional] |
|
104
|
+
| **grant_types** | **Array<String>** | | [optional] |
|
97
105
|
| **groups** | **String** | | [optional] |
|
98
106
|
| **hanadb_creation_statements** | **String** | | [optional] |
|
99
107
|
| **hanadb_revocation_statements** | **String** | | [optional] |
|
@@ -101,12 +109,21 @@
|
|
101
109
|
| **host_port** | **String** | | [optional] |
|
102
110
|
| **implementation_type** | **String** | | [optional] |
|
103
111
|
| **is_fixed_user** | **String** | | [optional] |
|
112
|
+
| **issuer** | **String** | relevant for CLIENT_TLS_CERTIFICATE client authentication type | [optional] |
|
104
113
|
| **item_targets_assoc** | [**Array<ItemTargetAssociation>**](ItemTargetAssociation.md) | | [optional] |
|
114
|
+
| **jwks** | **String** | | [optional] |
|
115
|
+
| **jwks_url** | **String** | | [optional] |
|
116
|
+
| **k8s_allowed_namespaces** | **String** | comma-separated list of allowed namespaces. Can hold just * which signifies that any namespace is allowed | [optional] |
|
105
117
|
| **k8s_bearer_token** | **String** | | [optional] |
|
106
118
|
| **k8s_cluster_ca_certificate** | **String** | | [optional] |
|
107
119
|
| **k8s_cluster_endpoint** | **String** | | [optional] |
|
120
|
+
| **k8s_dynamic_mode** | **Boolean** | when native k8s is in dynamic mode, user can define allowed namespaces, K8sServiceAccount doesn't exist from the start and will only be created at time of getting dynamic secret value By default dynamic mode is false and producer behaves like it did before | [optional] |
|
108
121
|
| **k8s_namespace** | **String** | | [optional] |
|
122
|
+
| **k8s_role_name** | **String** | Name of the pre-existing Role or ClusterRole to bind a generated service account to. | [optional] |
|
123
|
+
| **k8s_role_type** | **String** | | [optional] |
|
109
124
|
| **k8s_service_account** | **String** | | [optional] |
|
125
|
+
| **k8s_temp_role_binding_definition** | **Array<Integer>** | Yaml/Json definition of temporary role binding that will be created and deleted when TTL is due. Must have as subject name of Service Account specified in K8sServiceAccount field | [optional] |
|
126
|
+
| **k8s_temp_role_definition** | **Array<Integer>** | Yaml/Json definition of temporary role that will be created and deleted when TTL is due | [optional] |
|
110
127
|
| **last_admin_rotation** | **Integer** | | [optional] |
|
111
128
|
| **ldap_audience** | **String** | | [optional] |
|
112
129
|
| **ldap_bind_dn** | **String** | | [optional] |
|
@@ -138,8 +155,10 @@
|
|
138
155
|
| **password_length** | **Integer** | | [optional] |
|
139
156
|
| **password_policy** | **String** | | [optional] |
|
140
157
|
| **payload** | **String** | | [optional] |
|
158
|
+
| **ping_url** | **String** | | [optional] |
|
141
159
|
| **postgres_creation_statements** | **String** | | [optional] |
|
142
160
|
| **postgres_revocation_statements** | **String** | | [optional] |
|
161
|
+
| **privileged_user** | **String** | | [optional] |
|
143
162
|
| **rabbitmq_server_password** | **String** | | [optional] |
|
144
163
|
| **rabbitmq_server_uri** | **String** | | [optional] |
|
145
164
|
| **rabbitmq_server_user** | **String** | | [optional] |
|
@@ -148,7 +167,9 @@
|
|
148
167
|
| **rabbitmq_user_tags** | **String** | | [optional] |
|
149
168
|
| **rabbitmq_user_vhost** | **String** | | [optional] |
|
150
169
|
| **rabbitmq_user_write_permission** | **String** | | [optional] |
|
170
|
+
| **redirect_uris** | **Array<String>** | | [optional] |
|
151
171
|
| **redshift_creation_statements** | **String** | | [optional] |
|
172
|
+
| **restricted_scopes** | **Array<String>** | | [optional] |
|
152
173
|
| **revoke_sync_url** | **String** | | [optional] |
|
153
174
|
| **rotate_sync_url** | **String** | | [optional] |
|
154
175
|
| **scopes** | **Array<String>** | | [optional] |
|
@@ -158,12 +179,15 @@
|
|
158
179
|
| **sf_user_role** | **String** | generated users info | [optional] |
|
159
180
|
| **sf_warehouse_name** | **String** | | [optional] |
|
160
181
|
| **should_stop** | **String** | TODO delete this after migration | [optional] |
|
182
|
+
| **signing_algorithm** | **String** | | [optional] |
|
161
183
|
| **ssl_connection_certificate** | **String** | (Optional) SSLConnectionCertificate defines the certificate for SSL connection. Must be base64 certificate loaded by UI using file loader field | [optional] |
|
162
184
|
| **ssl_connection_mode** | **Boolean** | (Optional) SSLConnectionMode defines if SSL mode will be used to connect to DB | [optional] |
|
185
|
+
| **subject_dn** | **String** | | [optional] |
|
163
186
|
| **tags** | **Array<String>** | | [optional] |
|
164
187
|
| **timeout_seconds** | **Integer** | | [optional] |
|
165
188
|
| **use_gw_cloud_identity** | **Boolean** | | [optional] |
|
166
189
|
| **user_name** | **String** | | [optional] |
|
190
|
+
| **user_password** | **String** | | [optional] |
|
167
191
|
| **user_principal_name** | **String** | | [optional] |
|
168
192
|
| **user_ttl** | **String** | | [optional] |
|
169
193
|
| **username_length** | **Integer** | | [optional] |
|
@@ -189,15 +213,18 @@
|
|
189
213
|
require 'akeyless'
|
190
214
|
|
191
215
|
instance = Akeyless::DSProducerDetails.new(
|
216
|
+
access_token_manager_id: null,
|
192
217
|
active: null,
|
193
218
|
admin_name: null,
|
194
219
|
admin_pwd: null,
|
195
220
|
admin_rotation_interval_days: null,
|
221
|
+
administrative_port: null,
|
196
222
|
artifactory_admin_apikey: null,
|
197
223
|
artifactory_admin_username: null,
|
198
224
|
artifactory_base_url: null,
|
199
225
|
artifactory_token_audience: null,
|
200
226
|
artifactory_token_scope: null,
|
227
|
+
authorization_port: null,
|
201
228
|
aws_access_key_id: null,
|
202
229
|
aws_access_mode: null,
|
203
230
|
aws_region: null,
|
@@ -230,6 +257,7 @@ instance = Akeyless::DSProducerDetails.new(
|
|
230
257
|
chef_server_url: null,
|
231
258
|
chef_server_username: null,
|
232
259
|
chef_skip_ssl: null,
|
260
|
+
client_authentication_type: null,
|
233
261
|
create_sync_url: null,
|
234
262
|
db_host_name: null,
|
235
263
|
db_isolation_level: null,
|
@@ -237,6 +265,8 @@ instance = Akeyless::DSProducerDetails.new(
|
|
237
265
|
db_max_open_conns: null,
|
238
266
|
db_name: null,
|
239
267
|
db_port: null,
|
268
|
+
db_private_key: null,
|
269
|
+
db_private_key_passphrase: null,
|
240
270
|
db_pwd: null,
|
241
271
|
db_server_certificates: null,
|
242
272
|
db_server_name: null,
|
@@ -254,6 +284,7 @@ instance = Akeyless::DSProducerDetails.new(
|
|
254
284
|
eks_region: null,
|
255
285
|
eks_secret_access_key: null,
|
256
286
|
enable_admin_rotation: null,
|
287
|
+
enforce_replay_prevention: null,
|
257
288
|
externally_provided_user: null,
|
258
289
|
failure_message: null,
|
259
290
|
fixed_user_only: null,
|
@@ -279,6 +310,7 @@ instance = Akeyless::DSProducerDetails.new(
|
|
279
310
|
gke_cluster_name: null,
|
280
311
|
gke_service_account_key: null,
|
281
312
|
gke_service_account_name: null,
|
313
|
+
grant_types: null,
|
282
314
|
groups: null,
|
283
315
|
hanadb_creation_statements: null,
|
284
316
|
hanadb_revocation_statements: null,
|
@@ -286,12 +318,21 @@ instance = Akeyless::DSProducerDetails.new(
|
|
286
318
|
host_port: null,
|
287
319
|
implementation_type: null,
|
288
320
|
is_fixed_user: null,
|
321
|
+
issuer: null,
|
289
322
|
item_targets_assoc: null,
|
323
|
+
jwks: null,
|
324
|
+
jwks_url: null,
|
325
|
+
k8s_allowed_namespaces: null,
|
290
326
|
k8s_bearer_token: null,
|
291
327
|
k8s_cluster_ca_certificate: null,
|
292
328
|
k8s_cluster_endpoint: null,
|
329
|
+
k8s_dynamic_mode: null,
|
293
330
|
k8s_namespace: null,
|
331
|
+
k8s_role_name: null,
|
332
|
+
k8s_role_type: null,
|
294
333
|
k8s_service_account: null,
|
334
|
+
k8s_temp_role_binding_definition: null,
|
335
|
+
k8s_temp_role_definition: null,
|
295
336
|
last_admin_rotation: null,
|
296
337
|
ldap_audience: null,
|
297
338
|
ldap_bind_dn: null,
|
@@ -323,8 +364,10 @@ instance = Akeyless::DSProducerDetails.new(
|
|
323
364
|
password_length: null,
|
324
365
|
password_policy: null,
|
325
366
|
payload: null,
|
367
|
+
ping_url: null,
|
326
368
|
postgres_creation_statements: null,
|
327
369
|
postgres_revocation_statements: null,
|
370
|
+
privileged_user: null,
|
328
371
|
rabbitmq_server_password: null,
|
329
372
|
rabbitmq_server_uri: null,
|
330
373
|
rabbitmq_server_user: null,
|
@@ -333,7 +376,9 @@ instance = Akeyless::DSProducerDetails.new(
|
|
333
376
|
rabbitmq_user_tags: null,
|
334
377
|
rabbitmq_user_vhost: null,
|
335
378
|
rabbitmq_user_write_permission: null,
|
379
|
+
redirect_uris: null,
|
336
380
|
redshift_creation_statements: null,
|
381
|
+
restricted_scopes: null,
|
337
382
|
revoke_sync_url: null,
|
338
383
|
rotate_sync_url: null,
|
339
384
|
scopes: null,
|
@@ -343,12 +388,15 @@ instance = Akeyless::DSProducerDetails.new(
|
|
343
388
|
sf_user_role: null,
|
344
389
|
sf_warehouse_name: null,
|
345
390
|
should_stop: null,
|
391
|
+
signing_algorithm: null,
|
346
392
|
ssl_connection_certificate: null,
|
347
393
|
ssl_connection_mode: null,
|
394
|
+
subject_dn: null,
|
348
395
|
tags: null,
|
349
396
|
timeout_seconds: null,
|
350
397
|
use_gw_cloud_identity: null,
|
351
398
|
user_name: null,
|
399
|
+
user_password: null,
|
352
400
|
user_principal_name: null,
|
353
401
|
user_ttl: null,
|
354
402
|
username_length: null,
|
data/docs/DecryptGPG.md
ADDED
@@ -0,0 +1,34 @@
|
|
1
|
+
# Akeyless::DecryptGPG
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **ciphertext** | **String** | Ciphertext to be decrypted in base64 encoded format | |
|
8
|
+
| **display_id** | **String** | The display id of the key to use in the decryption process | [optional] |
|
9
|
+
| **item_id** | **Integer** | The item id of the key to use in the decryption process | [optional] |
|
10
|
+
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
11
|
+
| **key_name** | **String** | The name of the key to use in the decryption process | |
|
12
|
+
| **output_format** | **String** | If specified, the output will be formatted accordingly. options: [base64] | [optional] |
|
13
|
+
| **passphrase** | **String** | Passphrase that was used to generate the key | [optional] |
|
14
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
15
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
16
|
+
|
17
|
+
## Example
|
18
|
+
|
19
|
+
```ruby
|
20
|
+
require 'akeyless'
|
21
|
+
|
22
|
+
instance = Akeyless::DecryptGPG.new(
|
23
|
+
ciphertext: null,
|
24
|
+
display_id: null,
|
25
|
+
item_id: null,
|
26
|
+
json: null,
|
27
|
+
key_name: null,
|
28
|
+
output_format: null,
|
29
|
+
passphrase: null,
|
30
|
+
token: null,
|
31
|
+
uid_token: null
|
32
|
+
)
|
33
|
+
```
|
34
|
+
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# Akeyless::DecryptGPGOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **result** | **String** | | [optional] |
|
8
|
+
|
9
|
+
## Example
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'akeyless'
|
13
|
+
|
14
|
+
instance = Akeyless::DecryptGPGOutput.new(
|
15
|
+
result: null
|
16
|
+
)
|
17
|
+
```
|
18
|
+
|
data/docs/EncryptGPG.md
ADDED
@@ -0,0 +1,32 @@
|
|
1
|
+
# Akeyless::EncryptGPG
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **display_id** | **String** | The display id of the key to use in the encryption process | [optional] |
|
8
|
+
| **input_format** | **String** | If specified, the plaintext input is assumed to be formatted accordingly. Current supported options: [base64] | [optional] |
|
9
|
+
| **item_id** | **Integer** | The item id of the key to use in the encryption process | [optional] |
|
10
|
+
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
11
|
+
| **key_name** | **String** | The name of the key to use in the encryption process | |
|
12
|
+
| **plaintext** | **String** | Data to be encrypted | |
|
13
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
14
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
15
|
+
|
16
|
+
## Example
|
17
|
+
|
18
|
+
```ruby
|
19
|
+
require 'akeyless'
|
20
|
+
|
21
|
+
instance = Akeyless::EncryptGPG.new(
|
22
|
+
display_id: null,
|
23
|
+
input_format: null,
|
24
|
+
item_id: null,
|
25
|
+
json: null,
|
26
|
+
key_name: null,
|
27
|
+
plaintext: null,
|
28
|
+
token: null,
|
29
|
+
uid_token: null
|
30
|
+
)
|
31
|
+
```
|
32
|
+
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# Akeyless::EncryptGPGOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **result** | **String** | | [optional] |
|
8
|
+
|
9
|
+
## Example
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'akeyless'
|
13
|
+
|
14
|
+
instance = Akeyless::EncryptGPGOutput.new(
|
15
|
+
result: null
|
16
|
+
)
|
17
|
+
```
|
18
|
+
|
@@ -0,0 +1,66 @@
|
|
1
|
+
# Akeyless::GatewayCreateProducerPing
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
8
|
+
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
9
|
+
| **name** | **String** | Producer name | |
|
10
|
+
| **ping_administrative_port** | **String** | Ping Federate administrative port | [optional][default to '9999'] |
|
11
|
+
| **ping_atm_id** | **String** | Set a specific Access Token Management (ATM) instance for the created OAuth Client by providing the ATM Id. If no explicit value is given, the default pingfederate server ATM will be set. | [optional] |
|
12
|
+
| **ping_authorization_port** | **String** | Ping Federate authorization port | [optional][default to '9031'] |
|
13
|
+
| **ping_cert_subject_dn** | **String** | The subject DN of the client certificate. If no explicit value is given, the producer will create CA certificate and matched client certificate and return it as value. Used in conjunction with ping-issuer-dn (relevant for CLIENT_TLS_CERTIFICATE authentication method) | [optional] |
|
14
|
+
| **ping_client_authentication_type** | **String** | OAuth Client Authentication Type [CLIENT_SECRET, PRIVATE_KEY_JWT, CLIENT_TLS_CERTIFICATE] | [optional][default to 'CLIENT_SECRET'] |
|
15
|
+
| **ping_enforce_replay_prevention** | **String** | Determines whether PingFederate requires a unique signed JWT from the client for each action (relevant for PRIVATE_KEY_JWT authentication method) | [optional] |
|
16
|
+
| **ping_grant_types** | **Array<String>** | List of OAuth client grant types [IMPLICIT, AUTHORIZATION_CODE, CLIENT_CREDENTIALS, TOKEN_EXCHANGE, REFRESH_TOKEN, ASSERTION_GRANTS, PASSWORD, RESOURCE_OWNER_CREDENTIALS]. If no explicit value is given, AUTHORIZATION_CODE will be selected as default. | [optional] |
|
17
|
+
| **ping_issuer_dn** | **String** | Issuer DN of trusted CA certificate that imported into Ping Federate server. You may select \\\"Trust Any\\\" to trust all the existing issuers in Ping Federate server. Used in conjunction with ping-cert-subject-dn (relevant for CLIENT_TLS_CERTIFICATE authentication method) | [optional] |
|
18
|
+
| **ping_jwks** | **String** | Base64-encoded JSON Web Key Set (JWKS). If no explicit value is given, the producer will create JWKs and matched signed JWT (Sign Algo: RS256) and return it as value (relevant for PRIVATE_KEY_JWT authentication method) | [optional] |
|
19
|
+
| **ping_jwks_url** | **String** | The URL of the JSON Web Key Set (JWKS). If no explicit value is given, the producer will create JWKs and matched signed JWT and return it as value (relevant for PRIVATE_KEY_JWT authentication method) | [optional] |
|
20
|
+
| **ping_password** | **String** | Ping Federate privileged user password | [optional] |
|
21
|
+
| **ping_privileged_user** | **String** | Ping Federate privileged user | [optional] |
|
22
|
+
| **ping_redirect_uris** | **Array<String>** | List of URIs to which the OAuth authorization server may redirect the resource owner's user agent after authorization is obtained. At least one redirection URI is required for the AUTHORIZATION_CODE and IMPLICIT grant types. | [optional] |
|
23
|
+
| **ping_restricted_scopes** | **Array<String>** | Limit the OAuth client to specific scopes list | [optional] |
|
24
|
+
| **ping_signing_algo** | **String** | The signing algorithm that the client must use to sign its request objects [RS256,RS384,RS512,ES256,ES384,ES512,PS256,PS384,PS512] If no explicit value is given, the client can use any of the supported signing algorithms (relevant for PRIVATE_KEY_JWT authentication method) | [optional] |
|
25
|
+
| **ping_url** | **String** | Ping URL | [optional] |
|
26
|
+
| **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
|
27
|
+
| **tags** | **Array<String>** | List of the tags attached to this secret | [optional] |
|
28
|
+
| **target_name** | **String** | Target name | [optional] |
|
29
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
30
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
31
|
+
| **user_ttl** | **String** | The time from dynamic secret creation to expiration. | [optional][default to '60m'] |
|
32
|
+
|
33
|
+
## Example
|
34
|
+
|
35
|
+
```ruby
|
36
|
+
require 'akeyless'
|
37
|
+
|
38
|
+
instance = Akeyless::GatewayCreateProducerPing.new(
|
39
|
+
delete_protection: null,
|
40
|
+
json: null,
|
41
|
+
name: null,
|
42
|
+
ping_administrative_port: null,
|
43
|
+
ping_atm_id: null,
|
44
|
+
ping_authorization_port: null,
|
45
|
+
ping_cert_subject_dn: null,
|
46
|
+
ping_client_authentication_type: null,
|
47
|
+
ping_enforce_replay_prevention: null,
|
48
|
+
ping_grant_types: null,
|
49
|
+
ping_issuer_dn: null,
|
50
|
+
ping_jwks: null,
|
51
|
+
ping_jwks_url: null,
|
52
|
+
ping_password: null,
|
53
|
+
ping_privileged_user: null,
|
54
|
+
ping_redirect_uris: null,
|
55
|
+
ping_restricted_scopes: null,
|
56
|
+
ping_signing_algo: null,
|
57
|
+
ping_url: null,
|
58
|
+
producer_encryption_key_name: null,
|
59
|
+
tags: null,
|
60
|
+
target_name: null,
|
61
|
+
token: null,
|
62
|
+
uid_token: null,
|
63
|
+
user_ttl: null
|
64
|
+
)
|
65
|
+
```
|
66
|
+
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# Akeyless::GatewayCreateProducerPingOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **producer_details** | [**DSProducerDetails**](DSProducerDetails.md) | | [optional] |
|
8
|
+
|
9
|
+
## Example
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'akeyless'
|
13
|
+
|
14
|
+
instance = Akeyless::GatewayCreateProducerPingOutput.new(
|
15
|
+
producer_details: null
|
16
|
+
)
|
17
|
+
```
|
18
|
+
|
@@ -11,6 +11,8 @@
|
|
11
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
13
13
|
| **name** | **String** | Producer name | |
|
14
|
+
| **private_key** | **String** | RSA Private key (base64 encoded) | [optional] |
|
15
|
+
| **private_key_passphrase** | **String** | The Private key passphrase | [optional] |
|
14
16
|
| **role** | **String** | User role | [optional] |
|
15
17
|
| **tags** | **Array<String>** | List of the tags attached to this secret | [optional] |
|
16
18
|
| **target_name** | **String** | Target name | [optional] |
|
@@ -32,6 +34,8 @@ instance = Akeyless::GatewayCreateProducerSnowflake.new(
|
|
32
34
|
delete_protection: null,
|
33
35
|
json: null,
|
34
36
|
name: null,
|
37
|
+
private_key: null,
|
38
|
+
private_key_passphrase: null,
|
35
39
|
role: null,
|
36
40
|
tags: null,
|
37
41
|
target_name: null,
|
data/docs/GatewayUpdateItem.md
CHANGED
@@ -10,12 +10,13 @@
|
|
10
10
|
| **auto_rotate** | **String** | Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation | [optional] |
|
11
11
|
| **custom_payload** | **String** | | [optional] |
|
12
12
|
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
13
|
+
| **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
|
13
14
|
| **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
|
14
15
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
15
16
|
| **keep_prev_version** | **String** | | [optional] |
|
16
17
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
17
18
|
| **name** | **String** | Item name | |
|
18
|
-
| **new_metadata** | **String** |
|
19
|
+
| **new_metadata** | **String** | Deprecated - use description | [optional][default to 'default_metadata'] |
|
19
20
|
| **new_name** | **String** | New item name | [optional] |
|
20
21
|
| **new_version** | **Boolean** | Deprecated | [optional] |
|
21
22
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
@@ -40,6 +41,7 @@ instance = Akeyless::GatewayUpdateItem.new(
|
|
40
41
|
auto_rotate: null,
|
41
42
|
custom_payload: null,
|
42
43
|
delete_protection: null,
|
44
|
+
description: null,
|
43
45
|
gcp_key: null,
|
44
46
|
json: null,
|
45
47
|
keep_prev_version: null,
|
@@ -0,0 +1,68 @@
|
|
1
|
+
# Akeyless::GatewayUpdateProducerPing
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **delete_protection** | **String** | Protection from accidental deletion of this item | [optional] |
|
8
|
+
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
9
|
+
| **name** | **String** | Producer name | |
|
10
|
+
| **new_name** | **String** | Producer New name | [optional] |
|
11
|
+
| **ping_administrative_port** | **String** | Ping Federate administrative port | [optional][default to '9999'] |
|
12
|
+
| **ping_atm_id** | **String** | Set a specific Access Token Management (ATM) instance for the created OAuth Client by providing the ATM Id. If no explicit value is given, the default pingfederate server ATM will be set. | [optional] |
|
13
|
+
| **ping_authorization_port** | **String** | Ping Federate authorization port | [optional][default to '9031'] |
|
14
|
+
| **ping_cert_subject_dn** | **String** | The subject DN of the client certificate. If no explicit value is given, the producer will create CA certificate and matched client certificate and return it as value. Used in conjunction with ping-issuer-dn (relevant for CLIENT_TLS_CERTIFICATE authentication method) | [optional] |
|
15
|
+
| **ping_client_authentication_type** | **String** | OAuth Client Authentication Type [CLIENT_SECRET, PRIVATE_KEY_JWT, CLIENT_TLS_CERTIFICATE] | [optional][default to 'CLIENT_SECRET'] |
|
16
|
+
| **ping_enforce_replay_prevention** | **String** | Determines whether PingFederate requires a unique signed JWT from the client for each action (relevant for PRIVATE_KEY_JWT authentication method) | [optional] |
|
17
|
+
| **ping_grant_types** | **Array<String>** | List of OAuth client grant types [IMPLICIT, AUTHORIZATION_CODE, CLIENT_CREDENTIALS, TOKEN_EXCHANGE, REFRESH_TOKEN, ASSERTION_GRANTS, PASSWORD, RESOURCE_OWNER_CREDENTIALS]. If no explicit value is given, AUTHORIZATION_CODE will be selected as default. | [optional] |
|
18
|
+
| **ping_issuer_dn** | **String** | Issuer DN of trusted CA certificate that imported into Ping Federate server. You may select \\\"Trust Any\\\" to trust all the existing issuers in Ping Federate server. Used in conjunction with ping-cert-subject-dn (relevant for CLIENT_TLS_CERTIFICATE authentication method) | [optional] |
|
19
|
+
| **ping_jwks** | **String** | Base64-encoded JSON Web Key Set (JWKS). If no explicit value is given, the producer will create JWKs and matched signed JWT (Sign Algo: RS256) and return it as value (relevant for PRIVATE_KEY_JWT authentication method) | [optional] |
|
20
|
+
| **ping_jwks_url** | **String** | The URL of the JSON Web Key Set (JWKS). If no explicit value is given, the producer will create JWKs and matched signed JWT and return it as value (relevant for PRIVATE_KEY_JWT authentication method) | [optional] |
|
21
|
+
| **ping_password** | **String** | Ping Federate privileged user password | [optional] |
|
22
|
+
| **ping_privileged_user** | **String** | Ping Federate privileged user | [optional] |
|
23
|
+
| **ping_redirect_uris** | **Array<String>** | List of URIs to which the OAuth authorization server may redirect the resource owner's user agent after authorization is obtained. At least one redirection URI is required for the AUTHORIZATION_CODE and IMPLICIT grant types. | [optional] |
|
24
|
+
| **ping_restricted_scopes** | **Array<String>** | Limit the OAuth client to specific scopes list | [optional] |
|
25
|
+
| **ping_signing_algo** | **String** | The signing algorithm that the client must use to sign its request objects [RS256,RS384,RS512,ES256,ES384,ES512,PS256,PS384,PS512] If no explicit value is given, the client can use any of the supported signing algorithms (relevant for PRIVATE_KEY_JWT authentication method) | [optional] |
|
26
|
+
| **ping_url** | **String** | Ping URL | [optional] |
|
27
|
+
| **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
|
28
|
+
| **tags** | **Array<String>** | List of the tags attached to this secret | [optional] |
|
29
|
+
| **target_name** | **String** | Target name | [optional] |
|
30
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
31
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
32
|
+
| **user_ttl** | **String** | The time from dynamic secret creation to expiration. | [optional][default to '60m'] |
|
33
|
+
|
34
|
+
## Example
|
35
|
+
|
36
|
+
```ruby
|
37
|
+
require 'akeyless'
|
38
|
+
|
39
|
+
instance = Akeyless::GatewayUpdateProducerPing.new(
|
40
|
+
delete_protection: null,
|
41
|
+
json: null,
|
42
|
+
name: null,
|
43
|
+
new_name: null,
|
44
|
+
ping_administrative_port: null,
|
45
|
+
ping_atm_id: null,
|
46
|
+
ping_authorization_port: null,
|
47
|
+
ping_cert_subject_dn: null,
|
48
|
+
ping_client_authentication_type: null,
|
49
|
+
ping_enforce_replay_prevention: null,
|
50
|
+
ping_grant_types: null,
|
51
|
+
ping_issuer_dn: null,
|
52
|
+
ping_jwks: null,
|
53
|
+
ping_jwks_url: null,
|
54
|
+
ping_password: null,
|
55
|
+
ping_privileged_user: null,
|
56
|
+
ping_redirect_uris: null,
|
57
|
+
ping_restricted_scopes: null,
|
58
|
+
ping_signing_algo: null,
|
59
|
+
ping_url: null,
|
60
|
+
producer_encryption_key_name: null,
|
61
|
+
tags: null,
|
62
|
+
target_name: null,
|
63
|
+
token: null,
|
64
|
+
uid_token: null,
|
65
|
+
user_ttl: null
|
66
|
+
)
|
67
|
+
```
|
68
|
+
|
@@ -0,0 +1,18 @@
|
|
1
|
+
# Akeyless::GatewayUpdateProducerPingOutput
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **producer_details** | [**DSProducerDetails**](DSProducerDetails.md) | | [optional] |
|
8
|
+
|
9
|
+
## Example
|
10
|
+
|
11
|
+
```ruby
|
12
|
+
require 'akeyless'
|
13
|
+
|
14
|
+
instance = Akeyless::GatewayUpdateProducerPingOutput.new(
|
15
|
+
producer_details: null
|
16
|
+
)
|
17
|
+
```
|
18
|
+
|
@@ -12,6 +12,8 @@
|
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
13
13
|
| **name** | **String** | Producer name | |
|
14
14
|
| **new_name** | **String** | Producer name | [optional] |
|
15
|
+
| **private_key** | **String** | RSA Private key (base64 encoded) | [optional] |
|
16
|
+
| **private_key_passphrase** | **String** | The Private key passphrase | [optional] |
|
15
17
|
| **role** | **String** | User role | [optional] |
|
16
18
|
| **tags** | **Array<String>** | List of the tags attached to this secret | [optional] |
|
17
19
|
| **target_name** | **String** | Target name | [optional] |
|
@@ -34,6 +36,8 @@ instance = Akeyless::GatewayUpdateProducerSnowflake.new(
|
|
34
36
|
json: null,
|
35
37
|
name: null,
|
36
38
|
new_name: null,
|
39
|
+
private_key: null,
|
40
|
+
private_key_passphrase: null,
|
37
41
|
role: null,
|
38
42
|
tags: null,
|
39
43
|
target_name: null,
|
data/docs/GenCustomerFragment.md
CHANGED
@@ -4,8 +4,9 @@
|
|
4
4
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
|
-
| **description** | **String** |
|
7
|
+
| **description** | **String** | Description of the object | [optional] |
|
8
8
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
9
|
+
| **metadata** | **String** | Deprecated - use description | [optional] |
|
9
10
|
|
10
11
|
## Example
|
11
12
|
|
@@ -14,7 +15,8 @@ require 'akeyless'
|
|
14
15
|
|
15
16
|
instance = Akeyless::GenCustomerFragment.new(
|
16
17
|
description: null,
|
17
|
-
json: null
|
18
|
+
json: null,
|
19
|
+
metadata: null
|
18
20
|
)
|
19
21
|
```
|
20
22
|
|
data/docs/GetKubeExecCreds.md
CHANGED
@@ -4,16 +4,17 @@
|
|
4
4
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
|
-
| **alt_names** | **String** | The Subject Alternative Names to be included in the PKI certificate (in a comma-
|
7
|
+
| **alt_names** | **String** | The Subject Alternative Names to be included in the PKI certificate (in a comma-separated list) (if CSR is supplied this flag is ignored and any DNS.* names are taken from it) | [optional] |
|
8
8
|
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
9
|
-
| **common_name** | **String** | The common name to be included in the PKI certificate | [optional] |
|
9
|
+
| **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
|
10
|
+
| **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
|
10
11
|
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] |
|
11
12
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
12
13
|
| **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
|
13
14
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
14
15
|
| **ttl** | **Integer** | Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL) | [optional] |
|
15
16
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
16
|
-
| **uri_sans** | **String** | The URI Subject Alternative Names to be included in the PKI certificate (in a comma-
|
17
|
+
| **uri_sans** | **String** | The URI Subject Alternative Names to be included in the PKI certificate (in a comma-separated list) (if CSR is supplied this flag is ignored and any URI.* names are taken from it) | [optional] |
|
17
18
|
|
18
19
|
## Example
|
19
20
|
|
@@ -24,6 +25,7 @@ instance = Akeyless::GetKubeExecCreds.new(
|
|
24
25
|
alt_names: null,
|
25
26
|
cert_issuer_name: null,
|
26
27
|
common_name: null,
|
28
|
+
csr_data_base64: null,
|
27
29
|
extended_key_usage: null,
|
28
30
|
json: null,
|
29
31
|
key_data_base64: null,
|
data/docs/GetPKICertificate.md
CHANGED
@@ -4,16 +4,17 @@
|
|
4
4
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
|
-
| **alt_names** | **String** | The Subject Alternative Names to be included in the PKI certificate (in a comma-
|
7
|
+
| **alt_names** | **String** | The Subject Alternative Names to be included in the PKI certificate (in a comma-separated list) (if CSR is supplied this flag is ignored and any DNS.* names are taken from it) | [optional] |
|
8
8
|
| **cert_issuer_name** | **String** | The name of the PKI certificate issuer | |
|
9
|
-
| **common_name** | **String** | The common name to be included in the PKI certificate | [optional] |
|
9
|
+
| **common_name** | **String** | The common name to be included in the PKI certificate (if CSR is supplied this flag is ignored and the CSR subject CN is taken) | [optional] |
|
10
|
+
| **csr_data_base64** | **String** | Certificate Signing Request contents encoded in base64 to generate the certificate with | [optional] |
|
10
11
|
| **extended_key_usage** | **String** | A comma-separated list of extended key usage requests which will be used for certificate issuance. Supported values: 'clientauth', 'serverauth'. | [optional] |
|
11
12
|
| **json** | **Boolean** | Set output format to JSON | [optional] |
|
12
13
|
| **key_data_base64** | **String** | PKI key file contents. If this option is used, the certificate will be printed to stdout | [optional] |
|
13
14
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
14
15
|
| **ttl** | **Integer** | Updated certificate lifetime in seconds (must be less than the Certificate Issuer default TTL) | [optional] |
|
15
16
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
16
|
-
| **uri_sans** | **String** | The URI Subject Alternative Names to be included in the PKI certificate (in a comma-
|
17
|
+
| **uri_sans** | **String** | The URI Subject Alternative Names to be included in the PKI certificate (in a comma-separated list) (if CSR is supplied this flag is ignored and any URI.* names are taken from it) | [optional] |
|
17
18
|
|
18
19
|
## Example
|
19
20
|
|
@@ -24,6 +25,7 @@ instance = Akeyless::GetPKICertificate.new(
|
|
24
25
|
alt_names: null,
|
25
26
|
cert_issuer_name: null,
|
26
27
|
common_name: null,
|
28
|
+
csr_data_base64: null,
|
27
29
|
extended_key_usage: null,
|
28
30
|
json: null,
|
29
31
|
key_data_base64: null,
|
data/docs/SecureRemoteAccess.md
CHANGED
@@ -24,6 +24,7 @@
|
|
24
24
|
| **native** | **Boolean** | | [optional] |
|
25
25
|
| **rdp_user** | **String** | | [optional] |
|
26
26
|
| **region** | **String** | | [optional] |
|
27
|
+
| **rotate_after_disconnect** | **Boolean** | | [optional] |
|
27
28
|
| **schema** | **String** | | [optional] |
|
28
29
|
| **ssh_password** | **Boolean** | | [optional] |
|
29
30
|
| **ssh_private_key** | **Boolean** | | [optional] |
|
@@ -58,6 +59,7 @@ instance = Akeyless::SecureRemoteAccess.new(
|
|
58
59
|
native: null,
|
59
60
|
rdp_user: null,
|
60
61
|
region: null,
|
62
|
+
rotate_after_disconnect: null,
|
61
63
|
schema: null,
|
62
64
|
ssh_password: null,
|
63
65
|
ssh_private_key: null,
|