akeyless 4.2.3 → 4.2.4
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +43 -2
- data/docs/AccountGeneralSettings.md +2 -0
- data/docs/AwsStorage.md +28 -0
- data/docs/AzureStorage.md +28 -0
- data/docs/BastionConfigReplyObj.md +28 -0
- data/docs/BastionGlobalConf.md +24 -0
- data/docs/Configure.md +8 -0
- data/docs/Connect.md +2 -2
- data/docs/CreateClassicKey.md +8 -0
- data/docs/CreateDFCKey.md +8 -0
- data/docs/DynamicSecretUpdateArtifactory.md +1 -1
- data/docs/DynamicSecretUpdateAws.md +1 -1
- data/docs/DynamicSecretUpdateAzure.md +1 -1
- data/docs/DynamicSecretUpdateCassandra.md +1 -1
- data/docs/DynamicSecretUpdateChef.md +1 -1
- data/docs/DynamicSecretUpdateCustom.md +1 -1
- data/docs/DynamicSecretUpdateDockerhub.md +1 -1
- data/docs/DynamicSecretUpdateEks.md +1 -1
- data/docs/DynamicSecretUpdateGcp.md +1 -1
- data/docs/DynamicSecretUpdateGithub.md +1 -1
- data/docs/DynamicSecretUpdateGitlab.md +1 -1
- data/docs/DynamicSecretUpdateGke.md +1 -1
- data/docs/DynamicSecretUpdateGoogleWorkspace.md +1 -1
- data/docs/DynamicSecretUpdateHanaDb.md +1 -1
- data/docs/DynamicSecretUpdateK8s.md +1 -1
- data/docs/DynamicSecretUpdateLdap.md +1 -1
- data/docs/DynamicSecretUpdateMongoDb.md +1 -1
- data/docs/DynamicSecretUpdateMsSql.md +1 -1
- data/docs/DynamicSecretUpdateMySql.md +1 -1
- data/docs/DynamicSecretUpdateOracleDb.md +1 -1
- data/docs/DynamicSecretUpdatePing.md +1 -1
- data/docs/DynamicSecretUpdateVenafi.md +1 -1
- data/docs/EmailPassAccessRules.md +3 -1
- data/docs/EventForwarderCreateEmail.md +2 -2
- data/docs/EventForwarderCreateServiceNow.md +1 -1
- data/docs/EventForwarderCreateSlack.md +1 -1
- data/docs/EventForwarderCreateWebhook.md +1 -1
- data/docs/EventForwarderUpdateEmail.md +2 -2
- data/docs/EventForwarderUpdateServiceNow.md +1 -1
- data/docs/EventForwarderUpdateSlack.md +1 -1
- data/docs/EventForwarderUpdateWebhook.md +1 -1
- data/docs/GatewayGetRemoteAccess.md +22 -0
- data/docs/GatewayUpdateItem.md +2 -0
- data/docs/GatewayUpdateRemoteAccess.md +36 -0
- data/docs/GatewayUpdateRemoteAccessRdpRecordings.md +46 -0
- data/docs/GwUpdateRemoteAccessSessionLogsAwsS3.md +42 -0
- data/docs/GwUpdateRemoteAccessSessionLogsAzureAnalytics.md +32 -0
- data/docs/GwUpdateRemoteAccessSessionLogsDatadog.md +38 -0
- data/docs/GwUpdateRemoteAccessSessionLogsElasticsearch.md +48 -0
- data/docs/GwUpdateRemoteAccessSessionLogsGoogleChronicle.md +36 -0
- data/docs/GwUpdateRemoteAccessSessionLogsLogstash.md +36 -0
- data/docs/GwUpdateRemoteAccessSessionLogsLogzIo.md +32 -0
- data/docs/GwUpdateRemoteAccessSessionLogsSplunk.md +42 -0
- data/docs/GwUpdateRemoteAccessSessionLogsStdout.md +28 -0
- data/docs/GwUpdateRemoteAccessSessionLogsSumologic.md +34 -0
- data/docs/GwUpdateRemoteAccessSessionLogsSyslog.md +40 -0
- data/docs/ItemGeneralInfo.md +4 -0
- data/docs/NextAutoRotationEvent.md +18 -0
- data/docs/PasswordExpirationInfo.md +24 -0
- data/docs/ResetAccessKey.md +24 -0
- data/docs/ResetAuthMethodAccessKeyOutput.md +18 -0
- data/docs/RollbackSecret.md +2 -0
- data/docs/RotatedSecretCreateAws.md +2 -0
- data/docs/RotatedSecretCreateAzure.md +2 -0
- data/docs/RotatedSecretCreateCassandra.md +2 -0
- data/docs/RotatedSecretCreateCustom.md +2 -0
- data/docs/RotatedSecretCreateDockerhub.md +2 -0
- data/docs/RotatedSecretCreateGcp.md +2 -0
- data/docs/RotatedSecretCreateHanadb.md +2 -0
- data/docs/RotatedSecretCreateLdap.md +2 -0
- data/docs/RotatedSecretCreateMongodb.md +2 -0
- data/docs/RotatedSecretCreateMssql.md +2 -0
- data/docs/RotatedSecretCreateMysql.md +2 -0
- data/docs/RotatedSecretCreateOracledb.md +2 -0
- data/docs/RotatedSecretCreatePostgresql.md +2 -0
- data/docs/RotatedSecretCreateRedis.md +2 -0
- data/docs/RotatedSecretCreateRedshift.md +2 -0
- data/docs/RotatedSecretCreateSnowflake.md +2 -0
- data/docs/RotatedSecretCreateSsh.md +2 -0
- data/docs/RotatedSecretCreateWindows.md +2 -0
- data/docs/RotatedSecretUpdateAws.md +2 -0
- data/docs/RotatedSecretUpdateAzure.md +2 -0
- data/docs/RotatedSecretUpdateCassandra.md +2 -0
- data/docs/RotatedSecretUpdateCustom.md +2 -0
- data/docs/RotatedSecretUpdateDockerhub.md +2 -0
- data/docs/RotatedSecretUpdateGcp.md +2 -0
- data/docs/RotatedSecretUpdateHanadb.md +2 -0
- data/docs/RotatedSecretUpdateLdap.md +2 -0
- data/docs/RotatedSecretUpdateMongodb.md +2 -0
- data/docs/RotatedSecretUpdateMssql.md +2 -0
- data/docs/RotatedSecretUpdateMysql.md +2 -0
- data/docs/RotatedSecretUpdateOracledb.md +2 -0
- data/docs/RotatedSecretUpdatePostgresql.md +2 -0
- data/docs/RotatedSecretUpdateRedis.md +2 -0
- data/docs/RotatedSecretUpdateRedshift.md +2 -0
- data/docs/RotatedSecretUpdateSnowflake.md +2 -0
- data/docs/RotatedSecretUpdateSsh.md +2 -0
- data/docs/RotatedSecretUpdateWindows.md +2 -0
- data/docs/SshBastionConf.md +24 -0
- data/docs/SshBastionSessionTermination.md +26 -0
- data/docs/UpdateAccountSettings.md +6 -0
- data/docs/UpdateItem.md +2 -0
- data/docs/UpdateRotationSettings.md +2 -0
- data/docs/UpdateTarget.md +1 -1
- data/docs/UploadRSA.md +2 -0
- data/docs/V2Api.md +880 -1
- data/docs/WebBastionConf.md +20 -0
- data/docs/WebBastionGuacamole.md +18 -0
- data/docs/WebBastionRdpRecord.md +22 -0
- data/lib/akeyless/api/v2_api.rb +886 -1
- data/lib/akeyless/models/account_general_settings.rb +10 -1
- data/lib/akeyless/models/aws_storage.rb +260 -0
- data/lib/akeyless/models/azure_storage.rb +260 -0
- data/lib/akeyless/models/bastion_config_reply_obj.rb +259 -0
- data/lib/akeyless/models/bastion_global_conf.rb +243 -0
- data/lib/akeyless/models/configure.rb +41 -1
- data/lib/akeyless/models/connect.rb +11 -11
- data/lib/akeyless/models/create_classic_key.rb +45 -1
- data/lib/akeyless/models/create_dfc_key.rb +45 -1
- data/lib/akeyless/models/dynamic_secret_update_artifactory.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_aws.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_azure.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_cassandra.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_chef.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_custom.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_dockerhub.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_eks.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_gcp.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_github.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_gitlab.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_gke.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_google_workspace.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_hana_db.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_k8s.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_ldap.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_mongo_db.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_ms_sql.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_my_sql.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_oracle_db.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_ping.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_venafi.rb +1 -1
- data/lib/akeyless/models/email_pass_access_rules.rb +14 -4
- data/lib/akeyless/models/event_forwarder_create_email.rb +2 -2
- data/lib/akeyless/models/event_forwarder_create_service_now.rb +1 -1
- data/lib/akeyless/models/event_forwarder_create_slack.rb +1 -1
- data/lib/akeyless/models/event_forwarder_create_webhook.rb +1 -1
- data/lib/akeyless/models/event_forwarder_update_email.rb +2 -2
- data/lib/akeyless/models/event_forwarder_update_service_now.rb +1 -1
- data/lib/akeyless/models/event_forwarder_update_slack.rb +1 -1
- data/lib/akeyless/models/event_forwarder_update_webhook.rb +1 -1
- data/lib/akeyless/models/gateway_get_remote_access.rb +238 -0
- data/lib/akeyless/models/gateway_update_item.rb +13 -1
- data/lib/akeyless/models/gateway_update_remote_access.rb +318 -0
- data/lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb +358 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_aws_s3.rb +346 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_azure_analytics.rb +294 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_datadog.rb +330 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_elasticsearch.rb +376 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_google_chronicle.rb +314 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_logstash.rb +316 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_logz_io.rb +294 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_splunk.rb +350 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_stdout.rb +274 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_sumologic.rb +308 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_syslog.rb +342 -0
- data/lib/akeyless/models/item_general_info.rb +23 -1
- data/lib/akeyless/models/next_auto_rotation_event.rb +214 -0
- data/lib/akeyless/models/password_expiration_info.rb +242 -0
- data/lib/akeyless/models/reset_access_key.rb +255 -0
- data/lib/akeyless/models/reset_auth_method_access_key_output.rb +215 -0
- data/lib/akeyless/models/rollback_secret.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_aws.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_azure.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_cassandra.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_custom.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_dockerhub.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_gcp.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_hanadb.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_ldap.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_mongodb.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_mssql.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_mysql.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_oracledb.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_postgresql.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_redis.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_redshift.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_snowflake.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_ssh.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_windows.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_aws.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_azure.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_cassandra.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_custom.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_dockerhub.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_gcp.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_hanadb.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_ldap.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_mongodb.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_mssql.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_mysql.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_oracledb.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_postgresql.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_redis.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_redshift.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_snowflake.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_ssh.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_windows.rb +13 -1
- data/lib/akeyless/models/ssh_bastion_conf.rb +241 -0
- data/lib/akeyless/models/ssh_bastion_session_termination.rb +250 -0
- data/lib/akeyless/models/update_account_settings.rb +31 -1
- data/lib/akeyless/models/update_item.rb +13 -1
- data/lib/akeyless/models/update_rotation_settings.rb +13 -1
- data/lib/akeyless/models/update_target.rb +1 -1
- data/lib/akeyless/models/upload_rsa.rb +13 -1
- data/lib/akeyless/models/web_bastion_conf.rb +223 -0
- data/lib/akeyless/models/web_bastion_guacamole.rb +214 -0
- data/lib/akeyless/models/web_bastion_rdp_record.rb +232 -0
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +27 -0
- data/spec/models/aws_storage_spec.rb +66 -0
- data/spec/models/azure_storage_spec.rb +66 -0
- data/spec/models/bastion_config_reply_obj_spec.rb +66 -0
- data/spec/models/bastion_global_conf_spec.rb +54 -0
- data/spec/models/gateway_get_remote_access_spec.rb +48 -0
- data/spec/models/gateway_update_remote_access_rdp_recordings_spec.rb +120 -0
- data/spec/models/gateway_update_remote_access_spec.rb +90 -0
- data/spec/models/gw_update_remote_access_session_logs_aws_s3_spec.rb +108 -0
- data/spec/models/gw_update_remote_access_session_logs_azure_analytics_spec.rb +78 -0
- data/spec/models/gw_update_remote_access_session_logs_datadog_spec.rb +96 -0
- data/spec/models/gw_update_remote_access_session_logs_elasticsearch_spec.rb +126 -0
- data/spec/models/gw_update_remote_access_session_logs_google_chronicle_spec.rb +90 -0
- data/spec/models/gw_update_remote_access_session_logs_logstash_spec.rb +90 -0
- data/spec/models/gw_update_remote_access_session_logs_logz_io_spec.rb +78 -0
- data/spec/models/gw_update_remote_access_session_logs_splunk_spec.rb +108 -0
- data/spec/models/gw_update_remote_access_session_logs_stdout_spec.rb +66 -0
- data/spec/models/gw_update_remote_access_session_logs_sumologic_spec.rb +84 -0
- data/spec/models/gw_update_remote_access_session_logs_syslog_spec.rb +102 -0
- data/spec/models/next_auto_rotation_event_spec.rb +36 -0
- data/spec/models/password_expiration_info_spec.rb +54 -0
- data/spec/models/reset_access_key_spec.rb +54 -0
- data/spec/models/reset_auth_method_access_key_output_spec.rb +36 -0
- data/spec/models/ssh_bastion_conf_spec.rb +54 -0
- data/spec/models/ssh_bastion_session_termination_spec.rb +60 -0
- data/spec/models/web_bastion_conf_spec.rb +42 -0
- data/spec/models/web_bastion_guacamole_spec.rb +36 -0
- data/spec/models/web_bastion_rdp_record_spec.rb +48 -0
- metadata +1089 -981
@@ -22,6 +22,7 @@
|
|
22
22
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
23
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=ldap) | [optional] |
|
24
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) | [optional] |
|
25
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
25
26
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
26
27
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
27
28
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
@@ -61,6 +62,7 @@ instance = Akeyless::RotatedSecretUpdateLdap.new(
|
|
61
62
|
rotate_after_disconnect: null,
|
62
63
|
rotated_password: null,
|
63
64
|
rotated_username: null,
|
65
|
+
rotation_event_in: null,
|
64
66
|
rotation_hour: null,
|
65
67
|
rotation_interval: null,
|
66
68
|
secure_access_enable: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
|
@@ -52,6 +53,7 @@ instance = Akeyless::RotatedSecretUpdateMongodb.new(
|
|
52
53
|
rotate_after_disconnect: null,
|
53
54
|
rotated_password: null,
|
54
55
|
rotated_username: null,
|
56
|
+
rotation_event_in: null,
|
55
57
|
rotation_hour: null,
|
56
58
|
rotation_interval: null,
|
57
59
|
secure_access_bastion_issuer: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
|
@@ -53,6 +54,7 @@ instance = Akeyless::RotatedSecretUpdateMssql.new(
|
|
53
54
|
rotate_after_disconnect: null,
|
54
55
|
rotated_password: null,
|
55
56
|
rotated_username: null,
|
57
|
+
rotation_event_in: null,
|
56
58
|
rotation_hour: null,
|
57
59
|
rotation_interval: null,
|
58
60
|
secure_access_bastion_issuer: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
|
@@ -52,6 +53,7 @@ instance = Akeyless::RotatedSecretUpdateMysql.new(
|
|
52
53
|
rotate_after_disconnect: null,
|
53
54
|
rotated_password: null,
|
54
55
|
rotated_username: null,
|
56
|
+
rotation_event_in: null,
|
55
57
|
rotation_hour: null,
|
56
58
|
rotation_interval: null,
|
57
59
|
secure_access_bastion_issuer: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **secure_access_db_name** | **String** | The DB name (relevant only for DB Dynamic-Secret) | [optional] |
|
@@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretUpdateOracledb.new(
|
|
51
52
|
rotate_after_disconnect: null,
|
52
53
|
rotated_password: null,
|
53
54
|
rotated_username: null,
|
55
|
+
rotation_event_in: null,
|
54
56
|
rotation_hour: null,
|
55
57
|
rotation_interval: null,
|
56
58
|
secure_access_db_name: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
|
@@ -53,6 +54,7 @@ instance = Akeyless::RotatedSecretUpdatePostgresql.new(
|
|
53
54
|
rotate_after_disconnect: null,
|
54
55
|
rotated_password: null,
|
55
56
|
rotated_username: null,
|
57
|
+
rotation_event_in: null,
|
56
58
|
rotation_hour: null,
|
57
59
|
rotation_interval: null,
|
58
60
|
secure_access_bastion_issuer: null,
|
@@ -19,6 +19,7 @@
|
|
19
19
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
20
20
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
21
21
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
22
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
22
23
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
23
24
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
24
25
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateRedis.new(
|
|
45
46
|
rm_tag: null,
|
46
47
|
rotated_password: null,
|
47
48
|
rotated_username: null,
|
49
|
+
rotation_event_in: null,
|
48
50
|
rotation_hour: null,
|
49
51
|
rotation_interval: null,
|
50
52
|
token: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **secure_access_db_name** | **String** | The DB name (relevant only for DB Dynamic-Secret) | [optional] |
|
@@ -50,6 +51,7 @@ instance = Akeyless::RotatedSecretUpdateRedshift.new(
|
|
50
51
|
rotate_after_disconnect: null,
|
51
52
|
rotated_password: null,
|
52
53
|
rotated_username: null,
|
54
|
+
rotation_event_in: null,
|
53
55
|
rotation_hour: null,
|
54
56
|
rotation_interval: null,
|
55
57
|
secure_access_db_name: null,
|
@@ -19,6 +19,7 @@
|
|
19
19
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
20
20
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
21
21
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
22
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
22
23
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
23
24
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
24
25
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateSnowflake.new(
|
|
45
46
|
rm_tag: null,
|
46
47
|
rotated_password: null,
|
47
48
|
rotated_username: null,
|
49
|
+
rotation_event_in: null,
|
48
50
|
rotation_hour: null,
|
49
51
|
rotation_interval: null,
|
50
52
|
token: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **rotator_custom_cmd** | **String** | Custom rotation command | [optional] |
|
@@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateSsh.new(
|
|
57
58
|
rotate_after_disconnect: null,
|
58
59
|
rotated_password: null,
|
59
60
|
rotated_username: null,
|
61
|
+
rotation_event_in: null,
|
60
62
|
rotation_hour: null,
|
61
63
|
rotation_interval: null,
|
62
64
|
rotator_custom_cmd: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
@@ -54,6 +55,7 @@ instance = Akeyless::RotatedSecretUpdateWindows.new(
|
|
54
55
|
rotate_after_disconnect: null,
|
55
56
|
rotated_password: null,
|
56
57
|
rotated_username: null,
|
58
|
+
rotation_event_in: null,
|
57
59
|
rotation_hour: null,
|
58
60
|
rotation_interval: null,
|
59
61
|
rotator_type: null,
|
@@ -0,0 +1,24 @@
|
|
1
|
+
# Akeyless::SshBastionConf
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **hide_session_recording** | **Boolean** | | [optional] |
|
8
|
+
| **kexalgs** | **String** | | [optional] |
|
9
|
+
| **log_forwarding** | [**LogForwardingConfigPart**](LogForwardingConfigPart.md) | | [optional] |
|
10
|
+
| **session_termination** | [**SshBastionSessionTermination**](SshBastionSessionTermination.md) | | [optional] |
|
11
|
+
|
12
|
+
## Example
|
13
|
+
|
14
|
+
```ruby
|
15
|
+
require 'akeyless'
|
16
|
+
|
17
|
+
instance = Akeyless::SshBastionConf.new(
|
18
|
+
hide_session_recording: null,
|
19
|
+
kexalgs: null,
|
20
|
+
log_forwarding: null,
|
21
|
+
session_termination: null
|
22
|
+
)
|
23
|
+
```
|
24
|
+
|
@@ -0,0 +1,26 @@
|
|
1
|
+
# Akeyless::SshBastionSessionTermination
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **api_password** | **String** | | [optional] |
|
8
|
+
| **api_token** | **String** | | [optional] |
|
9
|
+
| **api_url** | **String** | | [optional] |
|
10
|
+
| **api_username** | **String** | | [optional] |
|
11
|
+
| **enabled** | **Boolean** | | [optional] |
|
12
|
+
|
13
|
+
## Example
|
14
|
+
|
15
|
+
```ruby
|
16
|
+
require 'akeyless'
|
17
|
+
|
18
|
+
instance = Akeyless::SshBastionSessionTermination.new(
|
19
|
+
api_password: null,
|
20
|
+
api_token: null,
|
21
|
+
api_url: null,
|
22
|
+
api_username: null,
|
23
|
+
enabled: null
|
24
|
+
)
|
25
|
+
```
|
26
|
+
|
@@ -16,6 +16,7 @@
|
|
16
16
|
| **dynamic_secret_max_ttl** | **Integer** | Set the maximum ttl for dynamic secrets | [optional] |
|
17
17
|
| **dynamic_secret_max_ttl_enable** | **String** | Set a maximum ttl for dynamic secrets [true/false] | [optional] |
|
18
18
|
| **enable_item_sharing** | **String** | Enable sharing items [true/false] | [optional] |
|
19
|
+
| **enable_password_expiration** | **String** | Enable password expiration policy [true/false] | [optional] |
|
19
20
|
| **force_new_versions** | **String** | If set to true, new version will be created on update | [optional] |
|
20
21
|
| **gw_bound_ips** | **Array<String>** | A default list of comma-separated CIDR block that acts as a trusted Gateway entity. | [optional] |
|
21
22
|
| **invalid_characters** | **String** | Characters that cannot be used for items/targets/roles/auths/event_forwarder names. Empty string will enforce nothing. | [optional][default to 'notReceivedInvalidCharacter'] |
|
@@ -31,6 +32,8 @@
|
|
31
32
|
| **max_rotation_interval** | **Integer** | Set the maximum rotation interval for rotated secrets auto rotation settings | [optional] |
|
32
33
|
| **max_rotation_interval_enable** | **String** | Set a maximum rotation interval for rotated secrets auto rotation settings [true/false] | [optional] |
|
33
34
|
| **max_versions** | **String** | Max versions | [optional] |
|
35
|
+
| **password_expiration_days** | **String** | Specifies the number of days that a password is valid before it must be changed. A default value of 90 days is used. | [optional] |
|
36
|
+
| **password_expiration_notification_days** | **String** | Specifies the number of days before a user receives notification that their password will expire. A default value of 14 days is used. | [optional] |
|
34
37
|
| **password_length** | **Integer** | Password length between 5 - to 50 characters | [optional] |
|
35
38
|
| **phone** | **String** | Phone number | [optional] |
|
36
39
|
| **postal_code** | **String** | Postal code | [optional] |
|
@@ -62,6 +65,7 @@ instance = Akeyless::UpdateAccountSettings.new(
|
|
62
65
|
dynamic_secret_max_ttl: null,
|
63
66
|
dynamic_secret_max_ttl_enable: null,
|
64
67
|
enable_item_sharing: null,
|
68
|
+
enable_password_expiration: null,
|
65
69
|
force_new_versions: null,
|
66
70
|
gw_bound_ips: null,
|
67
71
|
invalid_characters: null,
|
@@ -77,6 +81,8 @@ instance = Akeyless::UpdateAccountSettings.new(
|
|
77
81
|
max_rotation_interval: null,
|
78
82
|
max_rotation_interval_enable: null,
|
79
83
|
max_versions: null,
|
84
|
+
password_expiration_days: null,
|
85
|
+
password_expiration_notification_days: null,
|
80
86
|
password_length: null,
|
81
87
|
phone: null,
|
82
88
|
postal_code: null,
|
data/docs/UpdateItem.md
CHANGED
@@ -11,6 +11,7 @@
|
|
11
11
|
| **change_event** | **String** | Trigger an event when a secret value changed [true/false] (Relevant only for Static Secret) | [optional] |
|
12
12
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
13
13
|
| **description** | **String** | Description of the object | [optional][default to 'default_metadata'] |
|
14
|
+
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
14
15
|
| **host_provider** | **String** | Host provider type [explicit/target], Default Host provider is explicit, Relevant only for Secure Remote Access of ssh cert issuer, ldap rotated secret and ldap dynamic secret | [optional] |
|
15
16
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
@@ -60,6 +61,7 @@ instance = Akeyless::UpdateItem.new(
|
|
60
61
|
change_event: null,
|
61
62
|
delete_protection: null,
|
62
63
|
description: null,
|
64
|
+
expiration_event_in: null,
|
63
65
|
host_provider: null,
|
64
66
|
json: null,
|
65
67
|
max_versions: null,
|
@@ -7,6 +7,7 @@
|
|
7
7
|
| **auto_rotate** | **Boolean** | Whether to automatically rotate every --rotation-interval days, or disable existing automatic rotation | |
|
8
8
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
9
9
|
| **name** | **String** | Key name | |
|
10
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
10
11
|
| **rotation_interval** | **Integer** | The number of days to wait between every automatic key rotation (7-365) | [optional] |
|
11
12
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
12
13
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
@@ -20,6 +21,7 @@ instance = Akeyless::UpdateRotationSettings.new(
|
|
20
21
|
auto_rotate: null,
|
21
22
|
json: null,
|
22
23
|
name: null,
|
24
|
+
rotation_event_in: null,
|
23
25
|
rotation_interval: null,
|
24
26
|
token: null,
|
25
27
|
uid_token: null
|
data/docs/UpdateTarget.md
CHANGED
@@ -9,7 +9,7 @@
|
|
9
9
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
10
10
|
| **name** | **String** | Target name | |
|
11
11
|
| **new_comment** | **String** | Deprecated - use description | [optional][default to 'default_comment'] |
|
12
|
-
| **new_name** | **String** | New
|
12
|
+
| **new_name** | **String** | New target name | [optional] |
|
13
13
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
14
14
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
15
15
|
|
data/docs/UploadRSA.md
CHANGED
@@ -10,6 +10,7 @@
|
|
10
10
|
| **customer_frg_id** | **String** | The customer fragment ID that will be used to split the key (if empty, the key will be created independently of a customer fragment) | [optional] |
|
11
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
12
12
|
| **description** | **String** | Description of the object | [optional] |
|
13
|
+
| **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
|
13
14
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
14
15
|
| **metadata** | **String** | Deprecated - use description | [optional] |
|
15
16
|
| **name** | **String** | Name of key to be created | |
|
@@ -32,6 +33,7 @@ instance = Akeyless::UploadRSA.new(
|
|
32
33
|
customer_frg_id: null,
|
33
34
|
delete_protection: null,
|
34
35
|
description: null,
|
36
|
+
expiration_event_in: null,
|
35
37
|
json: null,
|
36
38
|
metadata: null,
|
37
39
|
name: null,
|