akeyless 4.2.3 → 4.2.4

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (248) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +43 -2
  3. data/docs/AccountGeneralSettings.md +2 -0
  4. data/docs/AwsStorage.md +28 -0
  5. data/docs/AzureStorage.md +28 -0
  6. data/docs/BastionConfigReplyObj.md +28 -0
  7. data/docs/BastionGlobalConf.md +24 -0
  8. data/docs/Configure.md +8 -0
  9. data/docs/Connect.md +2 -2
  10. data/docs/CreateClassicKey.md +8 -0
  11. data/docs/CreateDFCKey.md +8 -0
  12. data/docs/DynamicSecretUpdateArtifactory.md +1 -1
  13. data/docs/DynamicSecretUpdateAws.md +1 -1
  14. data/docs/DynamicSecretUpdateAzure.md +1 -1
  15. data/docs/DynamicSecretUpdateCassandra.md +1 -1
  16. data/docs/DynamicSecretUpdateChef.md +1 -1
  17. data/docs/DynamicSecretUpdateCustom.md +1 -1
  18. data/docs/DynamicSecretUpdateDockerhub.md +1 -1
  19. data/docs/DynamicSecretUpdateEks.md +1 -1
  20. data/docs/DynamicSecretUpdateGcp.md +1 -1
  21. data/docs/DynamicSecretUpdateGithub.md +1 -1
  22. data/docs/DynamicSecretUpdateGitlab.md +1 -1
  23. data/docs/DynamicSecretUpdateGke.md +1 -1
  24. data/docs/DynamicSecretUpdateGoogleWorkspace.md +1 -1
  25. data/docs/DynamicSecretUpdateHanaDb.md +1 -1
  26. data/docs/DynamicSecretUpdateK8s.md +1 -1
  27. data/docs/DynamicSecretUpdateLdap.md +1 -1
  28. data/docs/DynamicSecretUpdateMongoDb.md +1 -1
  29. data/docs/DynamicSecretUpdateMsSql.md +1 -1
  30. data/docs/DynamicSecretUpdateMySql.md +1 -1
  31. data/docs/DynamicSecretUpdateOracleDb.md +1 -1
  32. data/docs/DynamicSecretUpdatePing.md +1 -1
  33. data/docs/DynamicSecretUpdateVenafi.md +1 -1
  34. data/docs/EmailPassAccessRules.md +3 -1
  35. data/docs/EventForwarderCreateEmail.md +2 -2
  36. data/docs/EventForwarderCreateServiceNow.md +1 -1
  37. data/docs/EventForwarderCreateSlack.md +1 -1
  38. data/docs/EventForwarderCreateWebhook.md +1 -1
  39. data/docs/EventForwarderUpdateEmail.md +2 -2
  40. data/docs/EventForwarderUpdateServiceNow.md +1 -1
  41. data/docs/EventForwarderUpdateSlack.md +1 -1
  42. data/docs/EventForwarderUpdateWebhook.md +1 -1
  43. data/docs/GatewayGetRemoteAccess.md +22 -0
  44. data/docs/GatewayUpdateItem.md +2 -0
  45. data/docs/GatewayUpdateRemoteAccess.md +36 -0
  46. data/docs/GatewayUpdateRemoteAccessRdpRecordings.md +46 -0
  47. data/docs/GwUpdateRemoteAccessSessionLogsAwsS3.md +42 -0
  48. data/docs/GwUpdateRemoteAccessSessionLogsAzureAnalytics.md +32 -0
  49. data/docs/GwUpdateRemoteAccessSessionLogsDatadog.md +38 -0
  50. data/docs/GwUpdateRemoteAccessSessionLogsElasticsearch.md +48 -0
  51. data/docs/GwUpdateRemoteAccessSessionLogsGoogleChronicle.md +36 -0
  52. data/docs/GwUpdateRemoteAccessSessionLogsLogstash.md +36 -0
  53. data/docs/GwUpdateRemoteAccessSessionLogsLogzIo.md +32 -0
  54. data/docs/GwUpdateRemoteAccessSessionLogsSplunk.md +42 -0
  55. data/docs/GwUpdateRemoteAccessSessionLogsStdout.md +28 -0
  56. data/docs/GwUpdateRemoteAccessSessionLogsSumologic.md +34 -0
  57. data/docs/GwUpdateRemoteAccessSessionLogsSyslog.md +40 -0
  58. data/docs/ItemGeneralInfo.md +4 -0
  59. data/docs/NextAutoRotationEvent.md +18 -0
  60. data/docs/PasswordExpirationInfo.md +24 -0
  61. data/docs/ResetAccessKey.md +24 -0
  62. data/docs/ResetAuthMethodAccessKeyOutput.md +18 -0
  63. data/docs/RollbackSecret.md +2 -0
  64. data/docs/RotatedSecretCreateAws.md +2 -0
  65. data/docs/RotatedSecretCreateAzure.md +2 -0
  66. data/docs/RotatedSecretCreateCassandra.md +2 -0
  67. data/docs/RotatedSecretCreateCustom.md +2 -0
  68. data/docs/RotatedSecretCreateDockerhub.md +2 -0
  69. data/docs/RotatedSecretCreateGcp.md +2 -0
  70. data/docs/RotatedSecretCreateHanadb.md +2 -0
  71. data/docs/RotatedSecretCreateLdap.md +2 -0
  72. data/docs/RotatedSecretCreateMongodb.md +2 -0
  73. data/docs/RotatedSecretCreateMssql.md +2 -0
  74. data/docs/RotatedSecretCreateMysql.md +2 -0
  75. data/docs/RotatedSecretCreateOracledb.md +2 -0
  76. data/docs/RotatedSecretCreatePostgresql.md +2 -0
  77. data/docs/RotatedSecretCreateRedis.md +2 -0
  78. data/docs/RotatedSecretCreateRedshift.md +2 -0
  79. data/docs/RotatedSecretCreateSnowflake.md +2 -0
  80. data/docs/RotatedSecretCreateSsh.md +2 -0
  81. data/docs/RotatedSecretCreateWindows.md +2 -0
  82. data/docs/RotatedSecretUpdateAws.md +2 -0
  83. data/docs/RotatedSecretUpdateAzure.md +2 -0
  84. data/docs/RotatedSecretUpdateCassandra.md +2 -0
  85. data/docs/RotatedSecretUpdateCustom.md +2 -0
  86. data/docs/RotatedSecretUpdateDockerhub.md +2 -0
  87. data/docs/RotatedSecretUpdateGcp.md +2 -0
  88. data/docs/RotatedSecretUpdateHanadb.md +2 -0
  89. data/docs/RotatedSecretUpdateLdap.md +2 -0
  90. data/docs/RotatedSecretUpdateMongodb.md +2 -0
  91. data/docs/RotatedSecretUpdateMssql.md +2 -0
  92. data/docs/RotatedSecretUpdateMysql.md +2 -0
  93. data/docs/RotatedSecretUpdateOracledb.md +2 -0
  94. data/docs/RotatedSecretUpdatePostgresql.md +2 -0
  95. data/docs/RotatedSecretUpdateRedis.md +2 -0
  96. data/docs/RotatedSecretUpdateRedshift.md +2 -0
  97. data/docs/RotatedSecretUpdateSnowflake.md +2 -0
  98. data/docs/RotatedSecretUpdateSsh.md +2 -0
  99. data/docs/RotatedSecretUpdateWindows.md +2 -0
  100. data/docs/SshBastionConf.md +24 -0
  101. data/docs/SshBastionSessionTermination.md +26 -0
  102. data/docs/UpdateAccountSettings.md +6 -0
  103. data/docs/UpdateItem.md +2 -0
  104. data/docs/UpdateRotationSettings.md +2 -0
  105. data/docs/UpdateTarget.md +1 -1
  106. data/docs/UploadRSA.md +2 -0
  107. data/docs/V2Api.md +880 -1
  108. data/docs/WebBastionConf.md +20 -0
  109. data/docs/WebBastionGuacamole.md +18 -0
  110. data/docs/WebBastionRdpRecord.md +22 -0
  111. data/lib/akeyless/api/v2_api.rb +886 -1
  112. data/lib/akeyless/models/account_general_settings.rb +10 -1
  113. data/lib/akeyless/models/aws_storage.rb +260 -0
  114. data/lib/akeyless/models/azure_storage.rb +260 -0
  115. data/lib/akeyless/models/bastion_config_reply_obj.rb +259 -0
  116. data/lib/akeyless/models/bastion_global_conf.rb +243 -0
  117. data/lib/akeyless/models/configure.rb +41 -1
  118. data/lib/akeyless/models/connect.rb +11 -11
  119. data/lib/akeyless/models/create_classic_key.rb +45 -1
  120. data/lib/akeyless/models/create_dfc_key.rb +45 -1
  121. data/lib/akeyless/models/dynamic_secret_update_artifactory.rb +1 -1
  122. data/lib/akeyless/models/dynamic_secret_update_aws.rb +1 -1
  123. data/lib/akeyless/models/dynamic_secret_update_azure.rb +1 -1
  124. data/lib/akeyless/models/dynamic_secret_update_cassandra.rb +1 -1
  125. data/lib/akeyless/models/dynamic_secret_update_chef.rb +1 -1
  126. data/lib/akeyless/models/dynamic_secret_update_custom.rb +1 -1
  127. data/lib/akeyless/models/dynamic_secret_update_dockerhub.rb +1 -1
  128. data/lib/akeyless/models/dynamic_secret_update_eks.rb +1 -1
  129. data/lib/akeyless/models/dynamic_secret_update_gcp.rb +1 -1
  130. data/lib/akeyless/models/dynamic_secret_update_github.rb +1 -1
  131. data/lib/akeyless/models/dynamic_secret_update_gitlab.rb +1 -1
  132. data/lib/akeyless/models/dynamic_secret_update_gke.rb +1 -1
  133. data/lib/akeyless/models/dynamic_secret_update_google_workspace.rb +1 -1
  134. data/lib/akeyless/models/dynamic_secret_update_hana_db.rb +1 -1
  135. data/lib/akeyless/models/dynamic_secret_update_k8s.rb +1 -1
  136. data/lib/akeyless/models/dynamic_secret_update_ldap.rb +1 -1
  137. data/lib/akeyless/models/dynamic_secret_update_mongo_db.rb +1 -1
  138. data/lib/akeyless/models/dynamic_secret_update_ms_sql.rb +1 -1
  139. data/lib/akeyless/models/dynamic_secret_update_my_sql.rb +1 -1
  140. data/lib/akeyless/models/dynamic_secret_update_oracle_db.rb +1 -1
  141. data/lib/akeyless/models/dynamic_secret_update_ping.rb +1 -1
  142. data/lib/akeyless/models/dynamic_secret_update_venafi.rb +1 -1
  143. data/lib/akeyless/models/email_pass_access_rules.rb +14 -4
  144. data/lib/akeyless/models/event_forwarder_create_email.rb +2 -2
  145. data/lib/akeyless/models/event_forwarder_create_service_now.rb +1 -1
  146. data/lib/akeyless/models/event_forwarder_create_slack.rb +1 -1
  147. data/lib/akeyless/models/event_forwarder_create_webhook.rb +1 -1
  148. data/lib/akeyless/models/event_forwarder_update_email.rb +2 -2
  149. data/lib/akeyless/models/event_forwarder_update_service_now.rb +1 -1
  150. data/lib/akeyless/models/event_forwarder_update_slack.rb +1 -1
  151. data/lib/akeyless/models/event_forwarder_update_webhook.rb +1 -1
  152. data/lib/akeyless/models/gateway_get_remote_access.rb +238 -0
  153. data/lib/akeyless/models/gateway_update_item.rb +13 -1
  154. data/lib/akeyless/models/gateway_update_remote_access.rb +318 -0
  155. data/lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb +358 -0
  156. data/lib/akeyless/models/gw_update_remote_access_session_logs_aws_s3.rb +346 -0
  157. data/lib/akeyless/models/gw_update_remote_access_session_logs_azure_analytics.rb +294 -0
  158. data/lib/akeyless/models/gw_update_remote_access_session_logs_datadog.rb +330 -0
  159. data/lib/akeyless/models/gw_update_remote_access_session_logs_elasticsearch.rb +376 -0
  160. data/lib/akeyless/models/gw_update_remote_access_session_logs_google_chronicle.rb +314 -0
  161. data/lib/akeyless/models/gw_update_remote_access_session_logs_logstash.rb +316 -0
  162. data/lib/akeyless/models/gw_update_remote_access_session_logs_logz_io.rb +294 -0
  163. data/lib/akeyless/models/gw_update_remote_access_session_logs_splunk.rb +350 -0
  164. data/lib/akeyless/models/gw_update_remote_access_session_logs_stdout.rb +274 -0
  165. data/lib/akeyless/models/gw_update_remote_access_session_logs_sumologic.rb +308 -0
  166. data/lib/akeyless/models/gw_update_remote_access_session_logs_syslog.rb +342 -0
  167. data/lib/akeyless/models/item_general_info.rb +23 -1
  168. data/lib/akeyless/models/next_auto_rotation_event.rb +214 -0
  169. data/lib/akeyless/models/password_expiration_info.rb +242 -0
  170. data/lib/akeyless/models/reset_access_key.rb +255 -0
  171. data/lib/akeyless/models/reset_auth_method_access_key_output.rb +215 -0
  172. data/lib/akeyless/models/rollback_secret.rb +13 -1
  173. data/lib/akeyless/models/rotated_secret_create_aws.rb +13 -1
  174. data/lib/akeyless/models/rotated_secret_create_azure.rb +13 -1
  175. data/lib/akeyless/models/rotated_secret_create_cassandra.rb +13 -1
  176. data/lib/akeyless/models/rotated_secret_create_custom.rb +13 -1
  177. data/lib/akeyless/models/rotated_secret_create_dockerhub.rb +13 -1
  178. data/lib/akeyless/models/rotated_secret_create_gcp.rb +13 -1
  179. data/lib/akeyless/models/rotated_secret_create_hanadb.rb +13 -1
  180. data/lib/akeyless/models/rotated_secret_create_ldap.rb +13 -1
  181. data/lib/akeyless/models/rotated_secret_create_mongodb.rb +13 -1
  182. data/lib/akeyless/models/rotated_secret_create_mssql.rb +13 -1
  183. data/lib/akeyless/models/rotated_secret_create_mysql.rb +13 -1
  184. data/lib/akeyless/models/rotated_secret_create_oracledb.rb +13 -1
  185. data/lib/akeyless/models/rotated_secret_create_postgresql.rb +13 -1
  186. data/lib/akeyless/models/rotated_secret_create_redis.rb +13 -1
  187. data/lib/akeyless/models/rotated_secret_create_redshift.rb +13 -1
  188. data/lib/akeyless/models/rotated_secret_create_snowflake.rb +13 -1
  189. data/lib/akeyless/models/rotated_secret_create_ssh.rb +13 -1
  190. data/lib/akeyless/models/rotated_secret_create_windows.rb +13 -1
  191. data/lib/akeyless/models/rotated_secret_update_aws.rb +13 -1
  192. data/lib/akeyless/models/rotated_secret_update_azure.rb +13 -1
  193. data/lib/akeyless/models/rotated_secret_update_cassandra.rb +13 -1
  194. data/lib/akeyless/models/rotated_secret_update_custom.rb +13 -1
  195. data/lib/akeyless/models/rotated_secret_update_dockerhub.rb +13 -1
  196. data/lib/akeyless/models/rotated_secret_update_gcp.rb +13 -1
  197. data/lib/akeyless/models/rotated_secret_update_hanadb.rb +13 -1
  198. data/lib/akeyless/models/rotated_secret_update_ldap.rb +13 -1
  199. data/lib/akeyless/models/rotated_secret_update_mongodb.rb +13 -1
  200. data/lib/akeyless/models/rotated_secret_update_mssql.rb +13 -1
  201. data/lib/akeyless/models/rotated_secret_update_mysql.rb +13 -1
  202. data/lib/akeyless/models/rotated_secret_update_oracledb.rb +13 -1
  203. data/lib/akeyless/models/rotated_secret_update_postgresql.rb +13 -1
  204. data/lib/akeyless/models/rotated_secret_update_redis.rb +13 -1
  205. data/lib/akeyless/models/rotated_secret_update_redshift.rb +13 -1
  206. data/lib/akeyless/models/rotated_secret_update_snowflake.rb +13 -1
  207. data/lib/akeyless/models/rotated_secret_update_ssh.rb +13 -1
  208. data/lib/akeyless/models/rotated_secret_update_windows.rb +13 -1
  209. data/lib/akeyless/models/ssh_bastion_conf.rb +241 -0
  210. data/lib/akeyless/models/ssh_bastion_session_termination.rb +250 -0
  211. data/lib/akeyless/models/update_account_settings.rb +31 -1
  212. data/lib/akeyless/models/update_item.rb +13 -1
  213. data/lib/akeyless/models/update_rotation_settings.rb +13 -1
  214. data/lib/akeyless/models/update_target.rb +1 -1
  215. data/lib/akeyless/models/upload_rsa.rb +13 -1
  216. data/lib/akeyless/models/web_bastion_conf.rb +223 -0
  217. data/lib/akeyless/models/web_bastion_guacamole.rb +214 -0
  218. data/lib/akeyless/models/web_bastion_rdp_record.rb +232 -0
  219. data/lib/akeyless/version.rb +1 -1
  220. data/lib/akeyless.rb +27 -0
  221. data/spec/models/aws_storage_spec.rb +66 -0
  222. data/spec/models/azure_storage_spec.rb +66 -0
  223. data/spec/models/bastion_config_reply_obj_spec.rb +66 -0
  224. data/spec/models/bastion_global_conf_spec.rb +54 -0
  225. data/spec/models/gateway_get_remote_access_spec.rb +48 -0
  226. data/spec/models/gateway_update_remote_access_rdp_recordings_spec.rb +120 -0
  227. data/spec/models/gateway_update_remote_access_spec.rb +90 -0
  228. data/spec/models/gw_update_remote_access_session_logs_aws_s3_spec.rb +108 -0
  229. data/spec/models/gw_update_remote_access_session_logs_azure_analytics_spec.rb +78 -0
  230. data/spec/models/gw_update_remote_access_session_logs_datadog_spec.rb +96 -0
  231. data/spec/models/gw_update_remote_access_session_logs_elasticsearch_spec.rb +126 -0
  232. data/spec/models/gw_update_remote_access_session_logs_google_chronicle_spec.rb +90 -0
  233. data/spec/models/gw_update_remote_access_session_logs_logstash_spec.rb +90 -0
  234. data/spec/models/gw_update_remote_access_session_logs_logz_io_spec.rb +78 -0
  235. data/spec/models/gw_update_remote_access_session_logs_splunk_spec.rb +108 -0
  236. data/spec/models/gw_update_remote_access_session_logs_stdout_spec.rb +66 -0
  237. data/spec/models/gw_update_remote_access_session_logs_sumologic_spec.rb +84 -0
  238. data/spec/models/gw_update_remote_access_session_logs_syslog_spec.rb +102 -0
  239. data/spec/models/next_auto_rotation_event_spec.rb +36 -0
  240. data/spec/models/password_expiration_info_spec.rb +54 -0
  241. data/spec/models/reset_access_key_spec.rb +54 -0
  242. data/spec/models/reset_auth_method_access_key_output_spec.rb +36 -0
  243. data/spec/models/ssh_bastion_conf_spec.rb +54 -0
  244. data/spec/models/ssh_bastion_session_termination_spec.rb +60 -0
  245. data/spec/models/web_bastion_conf_spec.rb +42 -0
  246. data/spec/models/web_bastion_guacamole_spec.rb +36 -0
  247. data/spec/models/web_bastion_rdp_record_spec.rb +48 -0
  248. metadata +1089 -981
@@ -22,6 +22,7 @@
22
22
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
23
23
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=ldap) | [optional] |
24
24
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) | [optional] |
25
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
25
26
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
26
27
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
27
28
  | **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
@@ -61,6 +62,7 @@ instance = Akeyless::RotatedSecretUpdateLdap.new(
61
62
  rotate_after_disconnect: null,
62
63
  rotated_password: null,
63
64
  rotated_username: null,
65
+ rotation_event_in: null,
64
66
  rotation_hour: null,
65
67
  rotation_interval: null,
66
68
  secure_access_enable: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
@@ -52,6 +53,7 @@ instance = Akeyless::RotatedSecretUpdateMongodb.new(
52
53
  rotate_after_disconnect: null,
53
54
  rotated_password: null,
54
55
  rotated_username: null,
56
+ rotation_event_in: null,
55
57
  rotation_hour: null,
56
58
  rotation_interval: null,
57
59
  secure_access_bastion_issuer: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
@@ -53,6 +54,7 @@ instance = Akeyless::RotatedSecretUpdateMssql.new(
53
54
  rotate_after_disconnect: null,
54
55
  rotated_password: null,
55
56
  rotated_username: null,
57
+ rotation_event_in: null,
56
58
  rotation_hour: null,
57
59
  rotation_interval: null,
58
60
  secure_access_bastion_issuer: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
@@ -52,6 +53,7 @@ instance = Akeyless::RotatedSecretUpdateMysql.new(
52
53
  rotate_after_disconnect: null,
53
54
  rotated_password: null,
54
55
  rotated_username: null,
56
+ rotation_event_in: null,
55
57
  rotation_hour: null,
56
58
  rotation_interval: null,
57
59
  secure_access_bastion_issuer: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **secure_access_db_name** | **String** | The DB name (relevant only for DB Dynamic-Secret) | [optional] |
@@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretUpdateOracledb.new(
51
52
  rotate_after_disconnect: null,
52
53
  rotated_password: null,
53
54
  rotated_username: null,
55
+ rotation_event_in: null,
54
56
  rotation_hour: null,
55
57
  rotation_interval: null,
56
58
  secure_access_db_name: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
@@ -53,6 +54,7 @@ instance = Akeyless::RotatedSecretUpdatePostgresql.new(
53
54
  rotate_after_disconnect: null,
54
55
  rotated_password: null,
55
56
  rotated_username: null,
57
+ rotation_event_in: null,
56
58
  rotation_hour: null,
57
59
  rotation_interval: null,
58
60
  secure_access_bastion_issuer: null,
@@ -19,6 +19,7 @@
19
19
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
20
20
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
21
21
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
22
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
22
23
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
23
24
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
24
25
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateRedis.new(
45
46
  rm_tag: null,
46
47
  rotated_password: null,
47
48
  rotated_username: null,
49
+ rotation_event_in: null,
48
50
  rotation_hour: null,
49
51
  rotation_interval: null,
50
52
  token: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **secure_access_db_name** | **String** | The DB name (relevant only for DB Dynamic-Secret) | [optional] |
@@ -50,6 +51,7 @@ instance = Akeyless::RotatedSecretUpdateRedshift.new(
50
51
  rotate_after_disconnect: null,
51
52
  rotated_password: null,
52
53
  rotated_username: null,
54
+ rotation_event_in: null,
53
55
  rotation_hour: null,
54
56
  rotation_interval: null,
55
57
  secure_access_db_name: null,
@@ -19,6 +19,7 @@
19
19
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
20
20
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
21
21
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
22
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
22
23
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
23
24
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
24
25
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateSnowflake.new(
45
46
  rm_tag: null,
46
47
  rotated_password: null,
47
48
  rotated_username: null,
49
+ rotation_event_in: null,
48
50
  rotation_hour: null,
49
51
  rotation_interval: null,
50
52
  token: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **rotator_custom_cmd** | **String** | Custom rotation command | [optional] |
@@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateSsh.new(
57
58
  rotate_after_disconnect: null,
58
59
  rotated_password: null,
59
60
  rotated_username: null,
61
+ rotation_event_in: null,
60
62
  rotation_hour: null,
61
63
  rotation_interval: null,
62
64
  rotator_custom_cmd: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -54,6 +55,7 @@ instance = Akeyless::RotatedSecretUpdateWindows.new(
54
55
  rotate_after_disconnect: null,
55
56
  rotated_password: null,
56
57
  rotated_username: null,
58
+ rotation_event_in: null,
57
59
  rotation_hour: null,
58
60
  rotation_interval: null,
59
61
  rotator_type: null,
@@ -0,0 +1,24 @@
1
+ # Akeyless::SshBastionConf
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **hide_session_recording** | **Boolean** | | [optional] |
8
+ | **kexalgs** | **String** | | [optional] |
9
+ | **log_forwarding** | [**LogForwardingConfigPart**](LogForwardingConfigPart.md) | | [optional] |
10
+ | **session_termination** | [**SshBastionSessionTermination**](SshBastionSessionTermination.md) | | [optional] |
11
+
12
+ ## Example
13
+
14
+ ```ruby
15
+ require 'akeyless'
16
+
17
+ instance = Akeyless::SshBastionConf.new(
18
+ hide_session_recording: null,
19
+ kexalgs: null,
20
+ log_forwarding: null,
21
+ session_termination: null
22
+ )
23
+ ```
24
+
@@ -0,0 +1,26 @@
1
+ # Akeyless::SshBastionSessionTermination
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **api_password** | **String** | | [optional] |
8
+ | **api_token** | **String** | | [optional] |
9
+ | **api_url** | **String** | | [optional] |
10
+ | **api_username** | **String** | | [optional] |
11
+ | **enabled** | **Boolean** | | [optional] |
12
+
13
+ ## Example
14
+
15
+ ```ruby
16
+ require 'akeyless'
17
+
18
+ instance = Akeyless::SshBastionSessionTermination.new(
19
+ api_password: null,
20
+ api_token: null,
21
+ api_url: null,
22
+ api_username: null,
23
+ enabled: null
24
+ )
25
+ ```
26
+
@@ -16,6 +16,7 @@
16
16
  | **dynamic_secret_max_ttl** | **Integer** | Set the maximum ttl for dynamic secrets | [optional] |
17
17
  | **dynamic_secret_max_ttl_enable** | **String** | Set a maximum ttl for dynamic secrets [true/false] | [optional] |
18
18
  | **enable_item_sharing** | **String** | Enable sharing items [true/false] | [optional] |
19
+ | **enable_password_expiration** | **String** | Enable password expiration policy [true/false] | [optional] |
19
20
  | **force_new_versions** | **String** | If set to true, new version will be created on update | [optional] |
20
21
  | **gw_bound_ips** | **Array<String>** | A default list of comma-separated CIDR block that acts as a trusted Gateway entity. | [optional] |
21
22
  | **invalid_characters** | **String** | Characters that cannot be used for items/targets/roles/auths/event_forwarder names. Empty string will enforce nothing. | [optional][default to 'notReceivedInvalidCharacter'] |
@@ -31,6 +32,8 @@
31
32
  | **max_rotation_interval** | **Integer** | Set the maximum rotation interval for rotated secrets auto rotation settings | [optional] |
32
33
  | **max_rotation_interval_enable** | **String** | Set a maximum rotation interval for rotated secrets auto rotation settings [true/false] | [optional] |
33
34
  | **max_versions** | **String** | Max versions | [optional] |
35
+ | **password_expiration_days** | **String** | Specifies the number of days that a password is valid before it must be changed. A default value of 90 days is used. | [optional] |
36
+ | **password_expiration_notification_days** | **String** | Specifies the number of days before a user receives notification that their password will expire. A default value of 14 days is used. | [optional] |
34
37
  | **password_length** | **Integer** | Password length between 5 - to 50 characters | [optional] |
35
38
  | **phone** | **String** | Phone number | [optional] |
36
39
  | **postal_code** | **String** | Postal code | [optional] |
@@ -62,6 +65,7 @@ instance = Akeyless::UpdateAccountSettings.new(
62
65
  dynamic_secret_max_ttl: null,
63
66
  dynamic_secret_max_ttl_enable: null,
64
67
  enable_item_sharing: null,
68
+ enable_password_expiration: null,
65
69
  force_new_versions: null,
66
70
  gw_bound_ips: null,
67
71
  invalid_characters: null,
@@ -77,6 +81,8 @@ instance = Akeyless::UpdateAccountSettings.new(
77
81
  max_rotation_interval: null,
78
82
  max_rotation_interval_enable: null,
79
83
  max_versions: null,
84
+ password_expiration_days: null,
85
+ password_expiration_notification_days: null,
80
86
  password_length: null,
81
87
  phone: null,
82
88
  postal_code: null,
data/docs/UpdateItem.md CHANGED
@@ -11,6 +11,7 @@
11
11
  | **change_event** | **String** | Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) | [optional] |
12
12
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
13
13
  | **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
14
+ | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
14
15
  | **host_provider** | **String** | Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret | [optional] |
15
16
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
16
17
  | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
@@ -60,6 +61,7 @@ instance = Akeyless::UpdateItem.new(
60
61
  change_event: null,
61
62
  delete_protection: null,
62
63
  description: null,
64
+ expiration_event_in: null,
63
65
  host_provider: null,
64
66
  json: null,
65
67
  max_versions: null,
@@ -7,6 +7,7 @@
7
7
  | **auto_rotate** | **Boolean** | Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation | |
8
8
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
9
9
  | **name** | **String** | Key name | |
10
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
10
11
  | **rotation_interval** | **Integer** | The number of days to wait between every automatic key rotation (7-365) | [optional] |
11
12
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
12
13
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
@@ -20,6 +21,7 @@ instance = Akeyless::UpdateRotationSettings.new(
20
21
  auto_rotate: null,
21
22
  json: null,
22
23
  name: null,
24
+ rotation_event_in: null,
23
25
  rotation_interval: null,
24
26
  token: null,
25
27
  uid_token: null
data/docs/UpdateTarget.md CHANGED
@@ -9,7 +9,7 @@
9
9
  | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
10
10
  | **name** | **String** | Target name | |
11
11
  | **new_comment** | **String** | Deprecated - use description | [optional][default to 'default_comment'] |
12
- | **new_name** | **String** | New Target name | [optional] |
12
+ | **new_name** | **String** | New target name | [optional] |
13
13
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
14
14
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
15
15
 
data/docs/UploadRSA.md CHANGED
@@ -10,6 +10,7 @@
10
10
  | **customer_frg_id** | **String** | The customer fragment ID that will be used to split the key (if empty, the key will be created independently of a customer fragment) | [optional] |
11
11
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
12
12
  | **description** | **String** | Description of the object | [optional] |
13
+ | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
13
14
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
14
15
  | **metadata** | **String** | Deprecated - use description | [optional] |
15
16
  | **name** | **String** | Name of key to be created | |
@@ -32,6 +33,7 @@ instance = Akeyless::UploadRSA.new(
32
33
  customer_frg_id: null,
33
34
  delete_protection: null,
34
35
  description: null,
36
+ expiration_event_in: null,
35
37
  json: null,
36
38
  metadata: null,
37
39
  name: null,