akeyless 4.2.3 → 4.2.4

Sign up to get free protection for your applications and to get access to all the features.
Files changed (248) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +43 -2
  3. data/docs/AccountGeneralSettings.md +2 -0
  4. data/docs/AwsStorage.md +28 -0
  5. data/docs/AzureStorage.md +28 -0
  6. data/docs/BastionConfigReplyObj.md +28 -0
  7. data/docs/BastionGlobalConf.md +24 -0
  8. data/docs/Configure.md +8 -0
  9. data/docs/Connect.md +2 -2
  10. data/docs/CreateClassicKey.md +8 -0
  11. data/docs/CreateDFCKey.md +8 -0
  12. data/docs/DynamicSecretUpdateArtifactory.md +1 -1
  13. data/docs/DynamicSecretUpdateAws.md +1 -1
  14. data/docs/DynamicSecretUpdateAzure.md +1 -1
  15. data/docs/DynamicSecretUpdateCassandra.md +1 -1
  16. data/docs/DynamicSecretUpdateChef.md +1 -1
  17. data/docs/DynamicSecretUpdateCustom.md +1 -1
  18. data/docs/DynamicSecretUpdateDockerhub.md +1 -1
  19. data/docs/DynamicSecretUpdateEks.md +1 -1
  20. data/docs/DynamicSecretUpdateGcp.md +1 -1
  21. data/docs/DynamicSecretUpdateGithub.md +1 -1
  22. data/docs/DynamicSecretUpdateGitlab.md +1 -1
  23. data/docs/DynamicSecretUpdateGke.md +1 -1
  24. data/docs/DynamicSecretUpdateGoogleWorkspace.md +1 -1
  25. data/docs/DynamicSecretUpdateHanaDb.md +1 -1
  26. data/docs/DynamicSecretUpdateK8s.md +1 -1
  27. data/docs/DynamicSecretUpdateLdap.md +1 -1
  28. data/docs/DynamicSecretUpdateMongoDb.md +1 -1
  29. data/docs/DynamicSecretUpdateMsSql.md +1 -1
  30. data/docs/DynamicSecretUpdateMySql.md +1 -1
  31. data/docs/DynamicSecretUpdateOracleDb.md +1 -1
  32. data/docs/DynamicSecretUpdatePing.md +1 -1
  33. data/docs/DynamicSecretUpdateVenafi.md +1 -1
  34. data/docs/EmailPassAccessRules.md +3 -1
  35. data/docs/EventForwarderCreateEmail.md +2 -2
  36. data/docs/EventForwarderCreateServiceNow.md +1 -1
  37. data/docs/EventForwarderCreateSlack.md +1 -1
  38. data/docs/EventForwarderCreateWebhook.md +1 -1
  39. data/docs/EventForwarderUpdateEmail.md +2 -2
  40. data/docs/EventForwarderUpdateServiceNow.md +1 -1
  41. data/docs/EventForwarderUpdateSlack.md +1 -1
  42. data/docs/EventForwarderUpdateWebhook.md +1 -1
  43. data/docs/GatewayGetRemoteAccess.md +22 -0
  44. data/docs/GatewayUpdateItem.md +2 -0
  45. data/docs/GatewayUpdateRemoteAccess.md +36 -0
  46. data/docs/GatewayUpdateRemoteAccessRdpRecordings.md +46 -0
  47. data/docs/GwUpdateRemoteAccessSessionLogsAwsS3.md +42 -0
  48. data/docs/GwUpdateRemoteAccessSessionLogsAzureAnalytics.md +32 -0
  49. data/docs/GwUpdateRemoteAccessSessionLogsDatadog.md +38 -0
  50. data/docs/GwUpdateRemoteAccessSessionLogsElasticsearch.md +48 -0
  51. data/docs/GwUpdateRemoteAccessSessionLogsGoogleChronicle.md +36 -0
  52. data/docs/GwUpdateRemoteAccessSessionLogsLogstash.md +36 -0
  53. data/docs/GwUpdateRemoteAccessSessionLogsLogzIo.md +32 -0
  54. data/docs/GwUpdateRemoteAccessSessionLogsSplunk.md +42 -0
  55. data/docs/GwUpdateRemoteAccessSessionLogsStdout.md +28 -0
  56. data/docs/GwUpdateRemoteAccessSessionLogsSumologic.md +34 -0
  57. data/docs/GwUpdateRemoteAccessSessionLogsSyslog.md +40 -0
  58. data/docs/ItemGeneralInfo.md +4 -0
  59. data/docs/NextAutoRotationEvent.md +18 -0
  60. data/docs/PasswordExpirationInfo.md +24 -0
  61. data/docs/ResetAccessKey.md +24 -0
  62. data/docs/ResetAuthMethodAccessKeyOutput.md +18 -0
  63. data/docs/RollbackSecret.md +2 -0
  64. data/docs/RotatedSecretCreateAws.md +2 -0
  65. data/docs/RotatedSecretCreateAzure.md +2 -0
  66. data/docs/RotatedSecretCreateCassandra.md +2 -0
  67. data/docs/RotatedSecretCreateCustom.md +2 -0
  68. data/docs/RotatedSecretCreateDockerhub.md +2 -0
  69. data/docs/RotatedSecretCreateGcp.md +2 -0
  70. data/docs/RotatedSecretCreateHanadb.md +2 -0
  71. data/docs/RotatedSecretCreateLdap.md +2 -0
  72. data/docs/RotatedSecretCreateMongodb.md +2 -0
  73. data/docs/RotatedSecretCreateMssql.md +2 -0
  74. data/docs/RotatedSecretCreateMysql.md +2 -0
  75. data/docs/RotatedSecretCreateOracledb.md +2 -0
  76. data/docs/RotatedSecretCreatePostgresql.md +2 -0
  77. data/docs/RotatedSecretCreateRedis.md +2 -0
  78. data/docs/RotatedSecretCreateRedshift.md +2 -0
  79. data/docs/RotatedSecretCreateSnowflake.md +2 -0
  80. data/docs/RotatedSecretCreateSsh.md +2 -0
  81. data/docs/RotatedSecretCreateWindows.md +2 -0
  82. data/docs/RotatedSecretUpdateAws.md +2 -0
  83. data/docs/RotatedSecretUpdateAzure.md +2 -0
  84. data/docs/RotatedSecretUpdateCassandra.md +2 -0
  85. data/docs/RotatedSecretUpdateCustom.md +2 -0
  86. data/docs/RotatedSecretUpdateDockerhub.md +2 -0
  87. data/docs/RotatedSecretUpdateGcp.md +2 -0
  88. data/docs/RotatedSecretUpdateHanadb.md +2 -0
  89. data/docs/RotatedSecretUpdateLdap.md +2 -0
  90. data/docs/RotatedSecretUpdateMongodb.md +2 -0
  91. data/docs/RotatedSecretUpdateMssql.md +2 -0
  92. data/docs/RotatedSecretUpdateMysql.md +2 -0
  93. data/docs/RotatedSecretUpdateOracledb.md +2 -0
  94. data/docs/RotatedSecretUpdatePostgresql.md +2 -0
  95. data/docs/RotatedSecretUpdateRedis.md +2 -0
  96. data/docs/RotatedSecretUpdateRedshift.md +2 -0
  97. data/docs/RotatedSecretUpdateSnowflake.md +2 -0
  98. data/docs/RotatedSecretUpdateSsh.md +2 -0
  99. data/docs/RotatedSecretUpdateWindows.md +2 -0
  100. data/docs/SshBastionConf.md +24 -0
  101. data/docs/SshBastionSessionTermination.md +26 -0
  102. data/docs/UpdateAccountSettings.md +6 -0
  103. data/docs/UpdateItem.md +2 -0
  104. data/docs/UpdateRotationSettings.md +2 -0
  105. data/docs/UpdateTarget.md +1 -1
  106. data/docs/UploadRSA.md +2 -0
  107. data/docs/V2Api.md +880 -1
  108. data/docs/WebBastionConf.md +20 -0
  109. data/docs/WebBastionGuacamole.md +18 -0
  110. data/docs/WebBastionRdpRecord.md +22 -0
  111. data/lib/akeyless/api/v2_api.rb +886 -1
  112. data/lib/akeyless/models/account_general_settings.rb +10 -1
  113. data/lib/akeyless/models/aws_storage.rb +260 -0
  114. data/lib/akeyless/models/azure_storage.rb +260 -0
  115. data/lib/akeyless/models/bastion_config_reply_obj.rb +259 -0
  116. data/lib/akeyless/models/bastion_global_conf.rb +243 -0
  117. data/lib/akeyless/models/configure.rb +41 -1
  118. data/lib/akeyless/models/connect.rb +11 -11
  119. data/lib/akeyless/models/create_classic_key.rb +45 -1
  120. data/lib/akeyless/models/create_dfc_key.rb +45 -1
  121. data/lib/akeyless/models/dynamic_secret_update_artifactory.rb +1 -1
  122. data/lib/akeyless/models/dynamic_secret_update_aws.rb +1 -1
  123. data/lib/akeyless/models/dynamic_secret_update_azure.rb +1 -1
  124. data/lib/akeyless/models/dynamic_secret_update_cassandra.rb +1 -1
  125. data/lib/akeyless/models/dynamic_secret_update_chef.rb +1 -1
  126. data/lib/akeyless/models/dynamic_secret_update_custom.rb +1 -1
  127. data/lib/akeyless/models/dynamic_secret_update_dockerhub.rb +1 -1
  128. data/lib/akeyless/models/dynamic_secret_update_eks.rb +1 -1
  129. data/lib/akeyless/models/dynamic_secret_update_gcp.rb +1 -1
  130. data/lib/akeyless/models/dynamic_secret_update_github.rb +1 -1
  131. data/lib/akeyless/models/dynamic_secret_update_gitlab.rb +1 -1
  132. data/lib/akeyless/models/dynamic_secret_update_gke.rb +1 -1
  133. data/lib/akeyless/models/dynamic_secret_update_google_workspace.rb +1 -1
  134. data/lib/akeyless/models/dynamic_secret_update_hana_db.rb +1 -1
  135. data/lib/akeyless/models/dynamic_secret_update_k8s.rb +1 -1
  136. data/lib/akeyless/models/dynamic_secret_update_ldap.rb +1 -1
  137. data/lib/akeyless/models/dynamic_secret_update_mongo_db.rb +1 -1
  138. data/lib/akeyless/models/dynamic_secret_update_ms_sql.rb +1 -1
  139. data/lib/akeyless/models/dynamic_secret_update_my_sql.rb +1 -1
  140. data/lib/akeyless/models/dynamic_secret_update_oracle_db.rb +1 -1
  141. data/lib/akeyless/models/dynamic_secret_update_ping.rb +1 -1
  142. data/lib/akeyless/models/dynamic_secret_update_venafi.rb +1 -1
  143. data/lib/akeyless/models/email_pass_access_rules.rb +14 -4
  144. data/lib/akeyless/models/event_forwarder_create_email.rb +2 -2
  145. data/lib/akeyless/models/event_forwarder_create_service_now.rb +1 -1
  146. data/lib/akeyless/models/event_forwarder_create_slack.rb +1 -1
  147. data/lib/akeyless/models/event_forwarder_create_webhook.rb +1 -1
  148. data/lib/akeyless/models/event_forwarder_update_email.rb +2 -2
  149. data/lib/akeyless/models/event_forwarder_update_service_now.rb +1 -1
  150. data/lib/akeyless/models/event_forwarder_update_slack.rb +1 -1
  151. data/lib/akeyless/models/event_forwarder_update_webhook.rb +1 -1
  152. data/lib/akeyless/models/gateway_get_remote_access.rb +238 -0
  153. data/lib/akeyless/models/gateway_update_item.rb +13 -1
  154. data/lib/akeyless/models/gateway_update_remote_access.rb +318 -0
  155. data/lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb +358 -0
  156. data/lib/akeyless/models/gw_update_remote_access_session_logs_aws_s3.rb +346 -0
  157. data/lib/akeyless/models/gw_update_remote_access_session_logs_azure_analytics.rb +294 -0
  158. data/lib/akeyless/models/gw_update_remote_access_session_logs_datadog.rb +330 -0
  159. data/lib/akeyless/models/gw_update_remote_access_session_logs_elasticsearch.rb +376 -0
  160. data/lib/akeyless/models/gw_update_remote_access_session_logs_google_chronicle.rb +314 -0
  161. data/lib/akeyless/models/gw_update_remote_access_session_logs_logstash.rb +316 -0
  162. data/lib/akeyless/models/gw_update_remote_access_session_logs_logz_io.rb +294 -0
  163. data/lib/akeyless/models/gw_update_remote_access_session_logs_splunk.rb +350 -0
  164. data/lib/akeyless/models/gw_update_remote_access_session_logs_stdout.rb +274 -0
  165. data/lib/akeyless/models/gw_update_remote_access_session_logs_sumologic.rb +308 -0
  166. data/lib/akeyless/models/gw_update_remote_access_session_logs_syslog.rb +342 -0
  167. data/lib/akeyless/models/item_general_info.rb +23 -1
  168. data/lib/akeyless/models/next_auto_rotation_event.rb +214 -0
  169. data/lib/akeyless/models/password_expiration_info.rb +242 -0
  170. data/lib/akeyless/models/reset_access_key.rb +255 -0
  171. data/lib/akeyless/models/reset_auth_method_access_key_output.rb +215 -0
  172. data/lib/akeyless/models/rollback_secret.rb +13 -1
  173. data/lib/akeyless/models/rotated_secret_create_aws.rb +13 -1
  174. data/lib/akeyless/models/rotated_secret_create_azure.rb +13 -1
  175. data/lib/akeyless/models/rotated_secret_create_cassandra.rb +13 -1
  176. data/lib/akeyless/models/rotated_secret_create_custom.rb +13 -1
  177. data/lib/akeyless/models/rotated_secret_create_dockerhub.rb +13 -1
  178. data/lib/akeyless/models/rotated_secret_create_gcp.rb +13 -1
  179. data/lib/akeyless/models/rotated_secret_create_hanadb.rb +13 -1
  180. data/lib/akeyless/models/rotated_secret_create_ldap.rb +13 -1
  181. data/lib/akeyless/models/rotated_secret_create_mongodb.rb +13 -1
  182. data/lib/akeyless/models/rotated_secret_create_mssql.rb +13 -1
  183. data/lib/akeyless/models/rotated_secret_create_mysql.rb +13 -1
  184. data/lib/akeyless/models/rotated_secret_create_oracledb.rb +13 -1
  185. data/lib/akeyless/models/rotated_secret_create_postgresql.rb +13 -1
  186. data/lib/akeyless/models/rotated_secret_create_redis.rb +13 -1
  187. data/lib/akeyless/models/rotated_secret_create_redshift.rb +13 -1
  188. data/lib/akeyless/models/rotated_secret_create_snowflake.rb +13 -1
  189. data/lib/akeyless/models/rotated_secret_create_ssh.rb +13 -1
  190. data/lib/akeyless/models/rotated_secret_create_windows.rb +13 -1
  191. data/lib/akeyless/models/rotated_secret_update_aws.rb +13 -1
  192. data/lib/akeyless/models/rotated_secret_update_azure.rb +13 -1
  193. data/lib/akeyless/models/rotated_secret_update_cassandra.rb +13 -1
  194. data/lib/akeyless/models/rotated_secret_update_custom.rb +13 -1
  195. data/lib/akeyless/models/rotated_secret_update_dockerhub.rb +13 -1
  196. data/lib/akeyless/models/rotated_secret_update_gcp.rb +13 -1
  197. data/lib/akeyless/models/rotated_secret_update_hanadb.rb +13 -1
  198. data/lib/akeyless/models/rotated_secret_update_ldap.rb +13 -1
  199. data/lib/akeyless/models/rotated_secret_update_mongodb.rb +13 -1
  200. data/lib/akeyless/models/rotated_secret_update_mssql.rb +13 -1
  201. data/lib/akeyless/models/rotated_secret_update_mysql.rb +13 -1
  202. data/lib/akeyless/models/rotated_secret_update_oracledb.rb +13 -1
  203. data/lib/akeyless/models/rotated_secret_update_postgresql.rb +13 -1
  204. data/lib/akeyless/models/rotated_secret_update_redis.rb +13 -1
  205. data/lib/akeyless/models/rotated_secret_update_redshift.rb +13 -1
  206. data/lib/akeyless/models/rotated_secret_update_snowflake.rb +13 -1
  207. data/lib/akeyless/models/rotated_secret_update_ssh.rb +13 -1
  208. data/lib/akeyless/models/rotated_secret_update_windows.rb +13 -1
  209. data/lib/akeyless/models/ssh_bastion_conf.rb +241 -0
  210. data/lib/akeyless/models/ssh_bastion_session_termination.rb +250 -0
  211. data/lib/akeyless/models/update_account_settings.rb +31 -1
  212. data/lib/akeyless/models/update_item.rb +13 -1
  213. data/lib/akeyless/models/update_rotation_settings.rb +13 -1
  214. data/lib/akeyless/models/update_target.rb +1 -1
  215. data/lib/akeyless/models/upload_rsa.rb +13 -1
  216. data/lib/akeyless/models/web_bastion_conf.rb +223 -0
  217. data/lib/akeyless/models/web_bastion_guacamole.rb +214 -0
  218. data/lib/akeyless/models/web_bastion_rdp_record.rb +232 -0
  219. data/lib/akeyless/version.rb +1 -1
  220. data/lib/akeyless.rb +27 -0
  221. data/spec/models/aws_storage_spec.rb +66 -0
  222. data/spec/models/azure_storage_spec.rb +66 -0
  223. data/spec/models/bastion_config_reply_obj_spec.rb +66 -0
  224. data/spec/models/bastion_global_conf_spec.rb +54 -0
  225. data/spec/models/gateway_get_remote_access_spec.rb +48 -0
  226. data/spec/models/gateway_update_remote_access_rdp_recordings_spec.rb +120 -0
  227. data/spec/models/gateway_update_remote_access_spec.rb +90 -0
  228. data/spec/models/gw_update_remote_access_session_logs_aws_s3_spec.rb +108 -0
  229. data/spec/models/gw_update_remote_access_session_logs_azure_analytics_spec.rb +78 -0
  230. data/spec/models/gw_update_remote_access_session_logs_datadog_spec.rb +96 -0
  231. data/spec/models/gw_update_remote_access_session_logs_elasticsearch_spec.rb +126 -0
  232. data/spec/models/gw_update_remote_access_session_logs_google_chronicle_spec.rb +90 -0
  233. data/spec/models/gw_update_remote_access_session_logs_logstash_spec.rb +90 -0
  234. data/spec/models/gw_update_remote_access_session_logs_logz_io_spec.rb +78 -0
  235. data/spec/models/gw_update_remote_access_session_logs_splunk_spec.rb +108 -0
  236. data/spec/models/gw_update_remote_access_session_logs_stdout_spec.rb +66 -0
  237. data/spec/models/gw_update_remote_access_session_logs_sumologic_spec.rb +84 -0
  238. data/spec/models/gw_update_remote_access_session_logs_syslog_spec.rb +102 -0
  239. data/spec/models/next_auto_rotation_event_spec.rb +36 -0
  240. data/spec/models/password_expiration_info_spec.rb +54 -0
  241. data/spec/models/reset_access_key_spec.rb +54 -0
  242. data/spec/models/reset_auth_method_access_key_output_spec.rb +36 -0
  243. data/spec/models/ssh_bastion_conf_spec.rb +54 -0
  244. data/spec/models/ssh_bastion_session_termination_spec.rb +60 -0
  245. data/spec/models/web_bastion_conf_spec.rb +42 -0
  246. data/spec/models/web_bastion_guacamole_spec.rb +36 -0
  247. data/spec/models/web_bastion_rdp_record_spec.rb +48 -0
  248. metadata +1089 -981
@@ -0,0 +1,34 @@
1
+ # Akeyless::GwUpdateRemoteAccessSessionLogsSumologic
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] |
8
+ | **endpoint** | **String** | Sumologic endpoint URL | [optional] |
9
+ | **host** | **String** | Sumologic host | [optional][default to 'use-existing'] |
10
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
11
+ | **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] |
12
+ | **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] |
13
+ | **sumologic_tags** | **String** | A comma-separated list of Sumologic tags | [optional][default to 'use-existing'] |
14
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
15
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
16
+
17
+ ## Example
18
+
19
+ ```ruby
20
+ require 'akeyless'
21
+
22
+ instance = Akeyless::GwUpdateRemoteAccessSessionLogsSumologic.new(
23
+ enable: null,
24
+ endpoint: null,
25
+ host: null,
26
+ json: null,
27
+ output_format: null,
28
+ pull_interval: null,
29
+ sumologic_tags: null,
30
+ token: null,
31
+ uid_token: null
32
+ )
33
+ ```
34
+
@@ -0,0 +1,40 @@
1
+ # Akeyless::GwUpdateRemoteAccessSessionLogsSyslog
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **enable** | **String** | Enable Log Forwarding [true/false] | [optional][default to 'true'] |
8
+ | **enable_tls** | **Boolean** | Enable tls relevant only for network type TCP | [optional] |
9
+ | **formatter** | **String** | Syslog formatter [text/cef] | [optional][default to 'text'] |
10
+ | **host** | **String** | Syslog host | [optional] |
11
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
+ | **network** | **String** | Syslog network [tcp/udp] | [optional][default to 'tcp'] |
13
+ | **output_format** | **String** | Logs format [text/json] | [optional][default to 'text'] |
14
+ | **pull_interval** | **String** | Pull interval in seconds | [optional][default to '10'] |
15
+ | **target_tag** | **String** | Syslog target tag | [optional][default to 'use-existing'] |
16
+ | **tls_certificate** | **String** | Syslog tls certificate | [optional][default to 'use-existing'] |
17
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
18
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
19
+
20
+ ## Example
21
+
22
+ ```ruby
23
+ require 'akeyless'
24
+
25
+ instance = Akeyless::GwUpdateRemoteAccessSessionLogsSyslog.new(
26
+ enable: null,
27
+ enable_tls: null,
28
+ formatter: null,
29
+ host: null,
30
+ json: null,
31
+ network: null,
32
+ output_format: null,
33
+ pull_interval: null,
34
+ target_tag: null,
35
+ tls_certificate: null,
36
+ token: null,
37
+ uid_token: null
38
+ )
39
+ ```
40
+
@@ -12,7 +12,9 @@
12
12
  | **cluster_gw_url** | **String** | | [optional] |
13
13
  | **display_metadata** | **String** | | [optional] |
14
14
  | **dynamic_secret_producer_details** | [**DynamicSecretProducerInfo**](DynamicSecretProducerInfo.md) | | [optional] |
15
+ | **expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
15
16
  | **importer_info** | [**ImporterInfo**](ImporterInfo.md) | | [optional] |
17
+ | **next_rotation_events** | [**Array<NextAutoRotationEvent>**](NextAutoRotationEvent.md) | | [optional] |
16
18
  | **oidc_client_info** | [**OidcClientInfo**](OidcClientInfo.md) | | [optional] |
17
19
  | **password_policy** | [**PasswordPolicyInfo**](PasswordPolicyInfo.md) | | [optional] |
18
20
  | **rotated_secret_details** | [**RotatedSecretDetailsInfo**](RotatedSecretDetailsInfo.md) | | [optional] |
@@ -34,7 +36,9 @@ instance = Akeyless::ItemGeneralInfo.new(
34
36
  cluster_gw_url: null,
35
37
  display_metadata: null,
36
38
  dynamic_secret_producer_details: null,
39
+ expiration_events: null,
37
40
  importer_info: null,
41
+ next_rotation_events: null,
38
42
  oidc_client_info: null,
39
43
  password_policy: null,
40
44
  rotated_secret_details: null,
@@ -0,0 +1,18 @@
1
+ # Akeyless::NextAutoRotationEvent
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **seconds_before** | **Integer** | | [optional] |
8
+
9
+ ## Example
10
+
11
+ ```ruby
12
+ require 'akeyless'
13
+
14
+ instance = Akeyless::NextAutoRotationEvent.new(
15
+ seconds_before: null
16
+ )
17
+ ```
18
+
@@ -0,0 +1,24 @@
1
+ # Akeyless::PasswordExpirationInfo
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **days_before_expire** | **Integer** | | [optional] |
8
+ | **days_before_notification** | **Integer** | | [optional] |
9
+ | **days_until_expire** | **Integer** | r/o calculated parameter | [optional] |
10
+ | **enable** | **Boolean** | | [optional] |
11
+
12
+ ## Example
13
+
14
+ ```ruby
15
+ require 'akeyless'
16
+
17
+ instance = Akeyless::PasswordExpirationInfo.new(
18
+ days_before_expire: null,
19
+ days_before_notification: null,
20
+ days_until_expire: null,
21
+ enable: null
22
+ )
23
+ ```
24
+
@@ -0,0 +1,24 @@
1
+ # Akeyless::ResetAccessKey
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
8
+ | **name** | **String** | Auth Method name | |
9
+ | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
10
+ | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
11
+
12
+ ## Example
13
+
14
+ ```ruby
15
+ require 'akeyless'
16
+
17
+ instance = Akeyless::ResetAccessKey.new(
18
+ json: null,
19
+ name: null,
20
+ token: null,
21
+ uid_token: null
22
+ )
23
+ ```
24
+
@@ -0,0 +1,18 @@
1
+ # Akeyless::ResetAuthMethodAccessKeyOutput
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **access_key** | **String** | | [optional] |
8
+
9
+ ## Example
10
+
11
+ ```ruby
12
+ require 'akeyless'
13
+
14
+ instance = Akeyless::ResetAuthMethodAccessKeyOutput.new(
15
+ access_key: null
16
+ )
17
+ ```
18
+
@@ -4,6 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **accessibility** | **String** | for personal password manager | [optional][default to 'regular'] |
7
8
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
8
9
  | **name** | **String** | Secret name | |
9
10
  | **old_version** | **Integer** | Old secret version to rollback to | |
@@ -16,6 +17,7 @@
16
17
  require 'akeyless'
17
18
 
18
19
  instance = Akeyless::RollbackSecret.new(
20
+ accessibility: null,
19
21
  json: null,
20
22
  name: null,
21
23
  old_version: null,
@@ -18,6 +18,7 @@
18
18
  | **name** | **String** | Rotated secret name | |
19
19
  | **password_length** | **String** | The length of the password to be generated | [optional] |
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
21
22
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
22
23
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
23
24
  | **rotator_type** | **String** | The rotator type. options: [target/api-key] | |
@@ -50,6 +51,7 @@ instance = Akeyless::RotatedSecretCreateAws.new(
50
51
  name: null,
51
52
  password_length: null,
52
53
  rotate_after_disconnect: null,
54
+ rotation_event_in: null,
53
55
  rotation_hour: null,
54
56
  rotation_interval: null,
55
57
  rotator_type: null,
@@ -17,6 +17,7 @@
17
17
  | **name** | **String** | Rotated secret name | |
18
18
  | **password_length** | **String** | The length of the password to be generated | [optional] |
19
19
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
20
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
20
21
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
21
22
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
22
23
  | **rotator_type** | **String** | The rotator type. options: [target/password/api-key/azure-storage-account] | |
@@ -52,6 +53,7 @@ instance = Akeyless::RotatedSecretCreateAzure.new(
52
53
  name: null,
53
54
  password_length: null,
54
55
  rotate_after_disconnect: null,
56
+ rotation_event_in: null,
55
57
  rotation_hour: null,
56
58
  rotation_interval: null,
57
59
  rotator_type: null,
@@ -15,6 +15,7 @@
15
15
  | **password_length** | **String** | The length of the password to be generated | [optional] |
16
16
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
17
17
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
18
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
18
19
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
19
20
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
20
21
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateCassandra.new(
40
41
  password_length: null,
41
42
  rotated_password: null,
42
43
  rotated_username: null,
44
+ rotation_event_in: null,
43
45
  rotation_hour: null,
44
46
  rotation_interval: null,
45
47
  rotator_type: null,
@@ -15,6 +15,7 @@
15
15
  | **name** | **String** | Rotated secret name | |
16
16
  | **password_length** | **String** | The length of the password to be generated | [optional] |
17
17
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
18
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
18
19
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
19
20
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
20
21
  | **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
@@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretCreateCustom.new(
51
52
  name: null,
52
53
  password_length: null,
53
54
  rotate_after_disconnect: null,
55
+ rotation_event_in: null,
54
56
  rotation_hour: null,
55
57
  rotation_interval: null,
56
58
  secure_access_allow_external_user: null,
@@ -13,6 +13,7 @@
13
13
  | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
14
14
  | **name** | **String** | Rotated secret name | |
15
15
  | **password_length** | **String** | The length of the password to be generated | [optional] |
16
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
16
17
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
17
18
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
18
19
  | **tags** | **Array<String>** | Add tags attached to this object | [optional] |
@@ -35,6 +36,7 @@ instance = Akeyless::RotatedSecretCreateDockerhub.new(
35
36
  max_versions: null,
36
37
  name: null,
37
38
  password_length: null,
39
+ rotation_event_in: null,
38
40
  rotation_hour: null,
39
41
  rotation_interval: null,
40
42
  tags: null,
@@ -16,6 +16,7 @@
16
16
  | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
17
17
  | **name** | **String** | Rotated secret name | |
18
18
  | **password_length** | **String** | The length of the password to be generated | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/service-account-rotator] | |
@@ -42,6 +43,7 @@ instance = Akeyless::RotatedSecretCreateGcp.new(
42
43
  max_versions: null,
43
44
  name: null,
44
45
  password_length: null,
46
+ rotation_event_in: null,
45
47
  rotation_hour: null,
46
48
  rotation_interval: null,
47
49
  rotator_type: null,
@@ -15,6 +15,7 @@
15
15
  | **password_length** | **String** | The length of the password to be generated | [optional] |
16
16
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
17
17
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
18
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
18
19
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
19
20
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
20
21
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateHanadb.new(
40
41
  password_length: null,
41
42
  rotated_password: null,
42
43
  rotated_username: null,
44
+ rotation_event_in: null,
43
45
  rotation_hour: null,
44
46
  rotation_interval: null,
45
47
  rotator_type: null,
@@ -18,6 +18,7 @@
18
18
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
19
19
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=ldap) | [optional] |
20
20
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) | [optional] |
21
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
21
22
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
22
23
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
23
24
  | **rotator_type** | **String** | The rotator type. options: [target/ldap] | |
@@ -56,6 +57,7 @@ instance = Akeyless::RotatedSecretCreateLdap.new(
56
57
  rotate_after_disconnect: null,
57
58
  rotated_password: null,
58
59
  rotated_username: null,
60
+ rotation_event_in: null,
59
61
  rotation_hour: null,
60
62
  rotation_interval: null,
61
63
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -47,6 +48,7 @@ instance = Akeyless::RotatedSecretCreateMongodb.new(
47
48
  rotate_after_disconnect: null,
48
49
  rotated_password: null,
49
50
  rotated_username: null,
51
+ rotation_event_in: null,
50
52
  rotation_hour: null,
51
53
  rotation_interval: null,
52
54
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretCreateMssql.new(
48
49
  rotate_after_disconnect: null,
49
50
  rotated_password: null,
50
51
  rotated_username: null,
52
+ rotation_event_in: null,
51
53
  rotation_hour: null,
52
54
  rotation_interval: null,
53
55
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -47,6 +48,7 @@ instance = Akeyless::RotatedSecretCreateMysql.new(
47
48
  rotate_after_disconnect: null,
48
49
  rotated_password: null,
49
50
  rotated_username: null,
51
+ rotation_event_in: null,
50
52
  rotation_hour: null,
51
53
  rotation_interval: null,
52
54
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -46,6 +47,7 @@ instance = Akeyless::RotatedSecretCreateOracledb.new(
46
47
  rotate_after_disconnect: null,
47
48
  rotated_password: null,
48
49
  rotated_username: null,
50
+ rotation_event_in: null,
49
51
  rotation_hour: null,
50
52
  rotation_interval: null,
51
53
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretCreatePostgresql.new(
48
49
  rotate_after_disconnect: null,
49
50
  rotated_password: null,
50
51
  rotated_username: null,
52
+ rotation_event_in: null,
51
53
  rotation_hour: null,
52
54
  rotation_interval: null,
53
55
  rotator_type: null,
@@ -15,6 +15,7 @@
15
15
  | **password_length** | **String** | The length of the password to be generated | [optional] |
16
16
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
17
17
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
18
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
18
19
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
19
20
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
20
21
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateRedis.new(
40
41
  password_length: null,
41
42
  rotated_password: null,
42
43
  rotated_username: null,
44
+ rotation_event_in: null,
43
45
  rotation_hour: null,
44
46
  rotation_interval: null,
45
47
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretCreateRedshift.new(
45
46
  rotate_after_disconnect: null,
46
47
  rotated_password: null,
47
48
  rotated_username: null,
49
+ rotation_event_in: null,
48
50
  rotation_hour: null,
49
51
  rotation_interval: null,
50
52
  rotator_type: null,
@@ -15,6 +15,7 @@
15
15
  | **password_length** | **String** | The length of the password to be generated | [optional] |
16
16
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
17
17
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
18
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
18
19
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
19
20
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
20
21
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateSnowflake.new(
40
41
  password_length: null,
41
42
  rotated_password: null,
42
43
  rotated_username: null,
44
+ rotation_event_in: null,
43
45
  rotation_hour: null,
44
46
  rotation_interval: null,
45
47
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_custom_cmd** | **String** | Custom rotation command | [optional] |
@@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretCreateSsh.new(
51
52
  rotate_after_disconnect: null,
52
53
  rotated_password: null,
53
54
  rotated_username: null,
55
+ rotation_event_in: null,
54
56
  rotation_hour: null,
55
57
  rotation_interval: null,
56
58
  rotator_custom_cmd: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretCreateWindows.new(
48
49
  rotate_after_disconnect: null,
49
50
  rotated_password: null,
50
51
  rotated_username: null,
52
+ rotation_event_in: null,
51
53
  rotation_hour: null,
52
54
  rotation_interval: null,
53
55
  rotator_type: null,
@@ -22,6 +22,7 @@
22
22
  | **password_length** | **String** | The length of the password to be generated | [optional] |
23
23
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
24
24
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
25
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
25
26
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
26
27
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
27
28
  | **secure_access_aws_account_id** | **String** | The AWS account id | [optional] |
@@ -55,6 +56,7 @@ instance = Akeyless::RotatedSecretUpdateAws.new(
55
56
  password_length: null,
56
57
  rm_tag: null,
57
58
  rotate_after_disconnect: null,
59
+ rotation_event_in: null,
58
60
  rotation_hour: null,
59
61
  rotation_interval: null,
60
62
  secure_access_aws_account_id: null,
@@ -21,6 +21,7 @@
21
21
  | **password_length** | **String** | The length of the password to be generated | [optional] |
22
22
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
23
23
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
24
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
24
25
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
25
26
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
26
27
  | **secure_access_disable_concurrent_connections** | **Boolean** | Enable this flag to prevent simultaneous use of the same secret | [optional] |
@@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateAzure.new(
57
58
  password_length: null,
58
59
  rm_tag: null,
59
60
  rotate_after_disconnect: null,
61
+ rotation_event_in: null,
60
62
  rotation_hour: null,
61
63
  rotation_interval: null,
62
64
  secure_access_disable_concurrent_connections: null,
@@ -19,6 +19,7 @@
19
19
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
20
20
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
21
21
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
22
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
22
23
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
23
24
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
24
25
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateCassandra.new(
45
46
  rm_tag: null,
46
47
  rotated_password: null,
47
48
  rotated_username: null,
49
+ rotation_event_in: null,
48
50
  rotation_hour: null,
49
51
  rotation_interval: null,
50
52
  token: null,
@@ -19,6 +19,7 @@
19
19
  | **password_length** | **String** | The length of the password to be generated | [optional] |
20
20
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
21
21
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
22
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
22
23
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
23
24
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
24
25
  | **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
@@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateCustom.new(
57
58
  password_length: null,
58
59
  rm_tag: null,
59
60
  rotate_after_disconnect: null,
61
+ rotation_event_in: null,
60
62
  rotation_hour: null,
61
63
  rotation_interval: null,
62
64
  secure_access_allow_external_user: null,
@@ -17,6 +17,7 @@
17
17
  | **new_name** | **String** | New item name | [optional] |
18
18
  | **password_length** | **String** | The length of the password to be generated | [optional] |
19
19
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
20
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
20
21
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
21
22
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
22
23
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -41,6 +42,7 @@ instance = Akeyless::RotatedSecretUpdateDockerhub.new(
41
42
  new_name: null,
42
43
  password_length: null,
43
44
  rm_tag: null,
45
+ rotation_event_in: null,
44
46
  rotation_hour: null,
45
47
  rotation_interval: null,
46
48
  token: null,
@@ -20,6 +20,7 @@
20
20
  | **new_name** | **String** | New item name | [optional] |
21
21
  | **password_length** | **String** | The length of the password to be generated | [optional] |
22
22
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **rotator_type** | **String** | The rotator type. options: [target/service-account-rotator] | |
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretUpdateGcp.new(
48
49
  new_name: null,
49
50
  password_length: null,
50
51
  rm_tag: null,
52
+ rotation_event_in: null,
51
53
  rotation_hour: null,
52
54
  rotation_interval: null,
53
55
  rotator_type: null,
@@ -19,6 +19,7 @@
19
19
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
20
20
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
21
21
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
22
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
22
23
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
23
24
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
24
25
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateHanadb.new(
45
46
  rm_tag: null,
46
47
  rotated_password: null,
47
48
  rotated_username: null,
49
+ rotation_event_in: null,
48
50
  rotation_hour: null,
49
51
  rotation_interval: null,
50
52
  token: null,