akeyless 4.2.3 → 4.2.5

Sign up to get free protection for your applications and to get access to all the features.
Files changed (291) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +54 -2
  3. data/docs/AccountGeneralSettings.md +2 -0
  4. data/docs/AcmeAccount.md +22 -0
  5. data/docs/AuthMethodRoleAssociation.md +2 -0
  6. data/docs/AwsStorage.md +28 -0
  7. data/docs/AzureStorage.md +28 -0
  8. data/docs/BastionConfigReplyObj.md +28 -0
  9. data/docs/BastionGlobalConf.md +24 -0
  10. data/docs/ChangeAdminAccountPassword.md +26 -0
  11. data/docs/Configure.md +8 -0
  12. data/docs/Connect.md +2 -2
  13. data/docs/CreateClassicKey.md +8 -0
  14. data/docs/CreateDFCKey.md +8 -0
  15. data/docs/CreatePKICertIssuer.md +5 -1
  16. data/docs/DeactivateAcmeAccount.md +28 -0
  17. data/docs/DynamicSecretUpdateArtifactory.md +1 -1
  18. data/docs/DynamicSecretUpdateAws.md +1 -1
  19. data/docs/DynamicSecretUpdateAzure.md +1 -1
  20. data/docs/DynamicSecretUpdateCassandra.md +1 -1
  21. data/docs/DynamicSecretUpdateChef.md +1 -1
  22. data/docs/DynamicSecretUpdateCustom.md +1 -1
  23. data/docs/DynamicSecretUpdateDockerhub.md +1 -1
  24. data/docs/DynamicSecretUpdateEks.md +1 -1
  25. data/docs/DynamicSecretUpdateGcp.md +1 -1
  26. data/docs/DynamicSecretUpdateGithub.md +1 -1
  27. data/docs/DynamicSecretUpdateGitlab.md +1 -1
  28. data/docs/DynamicSecretUpdateGke.md +1 -1
  29. data/docs/DynamicSecretUpdateGoogleWorkspace.md +1 -1
  30. data/docs/DynamicSecretUpdateHanaDb.md +1 -1
  31. data/docs/DynamicSecretUpdateK8s.md +1 -1
  32. data/docs/DynamicSecretUpdateLdap.md +1 -1
  33. data/docs/DynamicSecretUpdateMongoDb.md +1 -1
  34. data/docs/DynamicSecretUpdateMsSql.md +1 -1
  35. data/docs/DynamicSecretUpdateMySql.md +1 -1
  36. data/docs/DynamicSecretUpdateOracleDb.md +1 -1
  37. data/docs/DynamicSecretUpdatePing.md +1 -1
  38. data/docs/DynamicSecretUpdateVenafi.md +1 -1
  39. data/docs/EmailPassAccessRules.md +3 -1
  40. data/docs/EventForwarderCreateEmail.md +2 -2
  41. data/docs/EventForwarderCreateServiceNow.md +1 -1
  42. data/docs/EventForwarderCreateSlack.md +1 -1
  43. data/docs/EventForwarderCreateWebhook.md +1 -1
  44. data/docs/EventForwarderUpdateEmail.md +2 -2
  45. data/docs/EventForwarderUpdateServiceNow.md +1 -1
  46. data/docs/EventForwarderUpdateSlack.md +1 -1
  47. data/docs/EventForwarderUpdateWebhook.md +1 -1
  48. data/docs/GatewayGetRemoteAccess.md +22 -0
  49. data/docs/GatewayUpdateItem.md +2 -0
  50. data/docs/GatewayUpdateRemoteAccess.md +36 -0
  51. data/docs/GatewayUpdateRemoteAccessRdpRecordings.md +46 -0
  52. data/docs/GenerateAcmeEab.md +24 -0
  53. data/docs/GenerateAcmeEabOutput.md +22 -0
  54. data/docs/GetGroupOutput.md +2 -0
  55. data/docs/GetKubeExecCreds.md +1 -1
  56. data/docs/GetPKICertificate.md +1 -1
  57. data/docs/Group.md +2 -0
  58. data/docs/GwUpdateRemoteAccessSessionLogsAwsS3.md +42 -0
  59. data/docs/GwUpdateRemoteAccessSessionLogsAzureAnalytics.md +32 -0
  60. data/docs/GwUpdateRemoteAccessSessionLogsDatadog.md +38 -0
  61. data/docs/GwUpdateRemoteAccessSessionLogsElasticsearch.md +48 -0
  62. data/docs/GwUpdateRemoteAccessSessionLogsGoogleChronicle.md +36 -0
  63. data/docs/GwUpdateRemoteAccessSessionLogsLogstash.md +36 -0
  64. data/docs/GwUpdateRemoteAccessSessionLogsLogzIo.md +32 -0
  65. data/docs/GwUpdateRemoteAccessSessionLogsSplunk.md +42 -0
  66. data/docs/GwUpdateRemoteAccessSessionLogsStdout.md +28 -0
  67. data/docs/GwUpdateRemoteAccessSessionLogsSumologic.md +34 -0
  68. data/docs/GwUpdateRemoteAccessSessionLogsSyslog.md +40 -0
  69. data/docs/ItemGeneralInfo.md +4 -0
  70. data/docs/ListAcmeAccounts.md +24 -0
  71. data/docs/ListAcmeAccountsOutput.md +18 -0
  72. data/docs/NextAutoRotationEvent.md +18 -0
  73. data/docs/PKICertificateIssueDetails.md +4 -0
  74. data/docs/PasswordExpirationInfo.md +24 -0
  75. data/docs/ResetAccessKey.md +24 -0
  76. data/docs/ResetAuthMethodAccessKeyOutput.md +18 -0
  77. data/docs/RoleAssociationDetails.md +2 -0
  78. data/docs/RoleAuthMethodAssociation.md +2 -0
  79. data/docs/RollbackSecret.md +2 -0
  80. data/docs/RotatedSecretCreateAws.md +2 -0
  81. data/docs/RotatedSecretCreateAzure.md +2 -0
  82. data/docs/RotatedSecretCreateCassandra.md +2 -0
  83. data/docs/RotatedSecretCreateCustom.md +2 -0
  84. data/docs/RotatedSecretCreateDockerhub.md +2 -0
  85. data/docs/RotatedSecretCreateGcp.md +2 -0
  86. data/docs/RotatedSecretCreateHanadb.md +2 -0
  87. data/docs/RotatedSecretCreateLdap.md +2 -0
  88. data/docs/RotatedSecretCreateMongodb.md +2 -0
  89. data/docs/RotatedSecretCreateMssql.md +2 -0
  90. data/docs/RotatedSecretCreateMysql.md +2 -0
  91. data/docs/RotatedSecretCreateOracledb.md +2 -0
  92. data/docs/RotatedSecretCreatePostgresql.md +2 -0
  93. data/docs/RotatedSecretCreateRedis.md +2 -0
  94. data/docs/RotatedSecretCreateRedshift.md +2 -0
  95. data/docs/RotatedSecretCreateSnowflake.md +2 -0
  96. data/docs/RotatedSecretCreateSsh.md +2 -0
  97. data/docs/RotatedSecretCreateWindows.md +2 -0
  98. data/docs/RotatedSecretUpdateAws.md +2 -0
  99. data/docs/RotatedSecretUpdateAzure.md +2 -0
  100. data/docs/RotatedSecretUpdateCassandra.md +2 -0
  101. data/docs/RotatedSecretUpdateCustom.md +2 -0
  102. data/docs/RotatedSecretUpdateDockerhub.md +2 -0
  103. data/docs/RotatedSecretUpdateGcp.md +2 -0
  104. data/docs/RotatedSecretUpdateHanadb.md +2 -0
  105. data/docs/RotatedSecretUpdateLdap.md +2 -0
  106. data/docs/RotatedSecretUpdateMongodb.md +2 -0
  107. data/docs/RotatedSecretUpdateMssql.md +2 -0
  108. data/docs/RotatedSecretUpdateMysql.md +2 -0
  109. data/docs/RotatedSecretUpdateOracledb.md +2 -0
  110. data/docs/RotatedSecretUpdatePostgresql.md +2 -0
  111. data/docs/RotatedSecretUpdateRedis.md +2 -0
  112. data/docs/RotatedSecretUpdateRedshift.md +2 -0
  113. data/docs/RotatedSecretUpdateSnowflake.md +2 -0
  114. data/docs/RotatedSecretUpdateSsh.md +2 -0
  115. data/docs/RotatedSecretUpdateWindows.md +2 -0
  116. data/docs/SshBastionConf.md +24 -0
  117. data/docs/SshBastionSessionTermination.md +26 -0
  118. data/docs/UpdateAccountSettings.md +6 -0
  119. data/docs/UpdateClassicKeyCertificate.md +2 -0
  120. data/docs/UpdateItem.md +4 -0
  121. data/docs/UpdatePKICertIssuer.md +5 -1
  122. data/docs/UpdateRotationSettings.md +2 -0
  123. data/docs/UpdateTarget.md +1 -1
  124. data/docs/UploadRSA.md +2 -0
  125. data/docs/V2Api.md +1356 -225
  126. data/docs/WebBastionConf.md +20 -0
  127. data/docs/WebBastionGuacamole.md +18 -0
  128. data/docs/WebBastionRdpRecord.md +22 -0
  129. data/lib/akeyless/api/v2_api.rb +1360 -219
  130. data/lib/akeyless/models/account_general_settings.rb +10 -1
  131. data/lib/akeyless/models/acme_account.rb +234 -0
  132. data/lib/akeyless/models/auth_method_role_association.rb +10 -1
  133. data/lib/akeyless/models/aws_storage.rb +260 -0
  134. data/lib/akeyless/models/azure_storage.rb +260 -0
  135. data/lib/akeyless/models/bastion_config_reply_obj.rb +259 -0
  136. data/lib/akeyless/models/bastion_global_conf.rb +243 -0
  137. data/lib/akeyless/models/change_admin_account_password.rb +271 -0
  138. data/lib/akeyless/models/configure.rb +41 -1
  139. data/lib/akeyless/models/connect.rb +11 -11
  140. data/lib/akeyless/models/create_classic_key.rb +45 -1
  141. data/lib/akeyless/models/create_dfc_key.rb +45 -1
  142. data/lib/akeyless/models/create_pki_cert_issuer.rb +24 -2
  143. data/lib/akeyless/models/deactivate_acme_account.rb +282 -0
  144. data/lib/akeyless/models/dynamic_secret_update_artifactory.rb +1 -1
  145. data/lib/akeyless/models/dynamic_secret_update_aws.rb +1 -1
  146. data/lib/akeyless/models/dynamic_secret_update_azure.rb +1 -1
  147. data/lib/akeyless/models/dynamic_secret_update_cassandra.rb +1 -1
  148. data/lib/akeyless/models/dynamic_secret_update_chef.rb +1 -1
  149. data/lib/akeyless/models/dynamic_secret_update_custom.rb +1 -1
  150. data/lib/akeyless/models/dynamic_secret_update_dockerhub.rb +1 -1
  151. data/lib/akeyless/models/dynamic_secret_update_eks.rb +1 -1
  152. data/lib/akeyless/models/dynamic_secret_update_gcp.rb +1 -1
  153. data/lib/akeyless/models/dynamic_secret_update_github.rb +1 -1
  154. data/lib/akeyless/models/dynamic_secret_update_gitlab.rb +1 -1
  155. data/lib/akeyless/models/dynamic_secret_update_gke.rb +1 -1
  156. data/lib/akeyless/models/dynamic_secret_update_google_workspace.rb +1 -1
  157. data/lib/akeyless/models/dynamic_secret_update_hana_db.rb +1 -1
  158. data/lib/akeyless/models/dynamic_secret_update_k8s.rb +1 -1
  159. data/lib/akeyless/models/dynamic_secret_update_ldap.rb +1 -1
  160. data/lib/akeyless/models/dynamic_secret_update_mongo_db.rb +1 -1
  161. data/lib/akeyless/models/dynamic_secret_update_ms_sql.rb +1 -1
  162. data/lib/akeyless/models/dynamic_secret_update_my_sql.rb +1 -1
  163. data/lib/akeyless/models/dynamic_secret_update_oracle_db.rb +1 -1
  164. data/lib/akeyless/models/dynamic_secret_update_ping.rb +1 -1
  165. data/lib/akeyless/models/dynamic_secret_update_venafi.rb +1 -1
  166. data/lib/akeyless/models/email_pass_access_rules.rb +14 -4
  167. data/lib/akeyless/models/event_forwarder_create_email.rb +2 -2
  168. data/lib/akeyless/models/event_forwarder_create_service_now.rb +1 -1
  169. data/lib/akeyless/models/event_forwarder_create_slack.rb +1 -1
  170. data/lib/akeyless/models/event_forwarder_create_webhook.rb +1 -1
  171. data/lib/akeyless/models/event_forwarder_update_email.rb +2 -2
  172. data/lib/akeyless/models/event_forwarder_update_service_now.rb +1 -1
  173. data/lib/akeyless/models/event_forwarder_update_slack.rb +1 -1
  174. data/lib/akeyless/models/event_forwarder_update_webhook.rb +1 -1
  175. data/lib/akeyless/models/gateway_get_remote_access.rb +238 -0
  176. data/lib/akeyless/models/gateway_update_item.rb +13 -1
  177. data/lib/akeyless/models/gateway_update_remote_access.rb +318 -0
  178. data/lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb +358 -0
  179. data/lib/akeyless/models/generate_acme_eab.rb +254 -0
  180. data/lib/akeyless/models/generate_acme_eab_output.rb +232 -0
  181. data/lib/akeyless/models/get_group_output.rb +10 -1
  182. data/lib/akeyless/models/get_kube_exec_creds.rb +1 -1
  183. data/lib/akeyless/models/get_pki_certificate.rb +1 -1
  184. data/lib/akeyless/models/group.rb +10 -1
  185. data/lib/akeyless/models/gw_update_remote_access_session_logs_aws_s3.rb +346 -0
  186. data/lib/akeyless/models/gw_update_remote_access_session_logs_azure_analytics.rb +294 -0
  187. data/lib/akeyless/models/gw_update_remote_access_session_logs_datadog.rb +330 -0
  188. data/lib/akeyless/models/gw_update_remote_access_session_logs_elasticsearch.rb +376 -0
  189. data/lib/akeyless/models/gw_update_remote_access_session_logs_google_chronicle.rb +314 -0
  190. data/lib/akeyless/models/gw_update_remote_access_session_logs_logstash.rb +316 -0
  191. data/lib/akeyless/models/gw_update_remote_access_session_logs_logz_io.rb +294 -0
  192. data/lib/akeyless/models/gw_update_remote_access_session_logs_splunk.rb +350 -0
  193. data/lib/akeyless/models/gw_update_remote_access_session_logs_stdout.rb +274 -0
  194. data/lib/akeyless/models/gw_update_remote_access_session_logs_sumologic.rb +308 -0
  195. data/lib/akeyless/models/gw_update_remote_access_session_logs_syslog.rb +342 -0
  196. data/lib/akeyless/models/item_general_info.rb +23 -1
  197. data/lib/akeyless/models/list_acme_accounts.rb +255 -0
  198. data/lib/akeyless/models/list_acme_accounts_output.rb +216 -0
  199. data/lib/akeyless/models/next_auto_rotation_event.rb +214 -0
  200. data/lib/akeyless/models/password_expiration_info.rb +242 -0
  201. data/lib/akeyless/models/pki_certificate_issue_details.rb +19 -1
  202. data/lib/akeyless/models/reset_access_key.rb +255 -0
  203. data/lib/akeyless/models/reset_auth_method_access_key_output.rb +215 -0
  204. data/lib/akeyless/models/role_association_details.rb +10 -1
  205. data/lib/akeyless/models/role_auth_method_association.rb +10 -1
  206. data/lib/akeyless/models/rollback_secret.rb +13 -1
  207. data/lib/akeyless/models/rotated_secret_create_aws.rb +13 -1
  208. data/lib/akeyless/models/rotated_secret_create_azure.rb +13 -1
  209. data/lib/akeyless/models/rotated_secret_create_cassandra.rb +13 -1
  210. data/lib/akeyless/models/rotated_secret_create_custom.rb +13 -1
  211. data/lib/akeyless/models/rotated_secret_create_dockerhub.rb +13 -1
  212. data/lib/akeyless/models/rotated_secret_create_gcp.rb +13 -1
  213. data/lib/akeyless/models/rotated_secret_create_hanadb.rb +13 -1
  214. data/lib/akeyless/models/rotated_secret_create_ldap.rb +13 -1
  215. data/lib/akeyless/models/rotated_secret_create_mongodb.rb +13 -1
  216. data/lib/akeyless/models/rotated_secret_create_mssql.rb +13 -1
  217. data/lib/akeyless/models/rotated_secret_create_mysql.rb +13 -1
  218. data/lib/akeyless/models/rotated_secret_create_oracledb.rb +13 -1
  219. data/lib/akeyless/models/rotated_secret_create_postgresql.rb +13 -1
  220. data/lib/akeyless/models/rotated_secret_create_redis.rb +13 -1
  221. data/lib/akeyless/models/rotated_secret_create_redshift.rb +13 -1
  222. data/lib/akeyless/models/rotated_secret_create_snowflake.rb +13 -1
  223. data/lib/akeyless/models/rotated_secret_create_ssh.rb +13 -1
  224. data/lib/akeyless/models/rotated_secret_create_windows.rb +13 -1
  225. data/lib/akeyless/models/rotated_secret_update_aws.rb +13 -1
  226. data/lib/akeyless/models/rotated_secret_update_azure.rb +13 -1
  227. data/lib/akeyless/models/rotated_secret_update_cassandra.rb +13 -1
  228. data/lib/akeyless/models/rotated_secret_update_custom.rb +13 -1
  229. data/lib/akeyless/models/rotated_secret_update_dockerhub.rb +13 -1
  230. data/lib/akeyless/models/rotated_secret_update_gcp.rb +13 -1
  231. data/lib/akeyless/models/rotated_secret_update_hanadb.rb +13 -1
  232. data/lib/akeyless/models/rotated_secret_update_ldap.rb +13 -1
  233. data/lib/akeyless/models/rotated_secret_update_mongodb.rb +13 -1
  234. data/lib/akeyless/models/rotated_secret_update_mssql.rb +13 -1
  235. data/lib/akeyless/models/rotated_secret_update_mysql.rb +13 -1
  236. data/lib/akeyless/models/rotated_secret_update_oracledb.rb +13 -1
  237. data/lib/akeyless/models/rotated_secret_update_postgresql.rb +13 -1
  238. data/lib/akeyless/models/rotated_secret_update_redis.rb +13 -1
  239. data/lib/akeyless/models/rotated_secret_update_redshift.rb +13 -1
  240. data/lib/akeyless/models/rotated_secret_update_snowflake.rb +13 -1
  241. data/lib/akeyless/models/rotated_secret_update_ssh.rb +13 -1
  242. data/lib/akeyless/models/rotated_secret_update_windows.rb +13 -1
  243. data/lib/akeyless/models/ssh_bastion_conf.rb +241 -0
  244. data/lib/akeyless/models/ssh_bastion_session_termination.rb +250 -0
  245. data/lib/akeyless/models/update_account_settings.rb +31 -1
  246. data/lib/akeyless/models/update_classic_key_certificate.rb +10 -1
  247. data/lib/akeyless/models/update_item.rb +22 -1
  248. data/lib/akeyless/models/update_pki_cert_issuer.rb +24 -2
  249. data/lib/akeyless/models/update_rotation_settings.rb +13 -1
  250. data/lib/akeyless/models/update_target.rb +1 -1
  251. data/lib/akeyless/models/upload_rsa.rb +13 -1
  252. data/lib/akeyless/models/web_bastion_conf.rb +223 -0
  253. data/lib/akeyless/models/web_bastion_guacamole.rb +214 -0
  254. data/lib/akeyless/models/web_bastion_rdp_record.rb +232 -0
  255. data/lib/akeyless/version.rb +1 -1
  256. data/lib/akeyless.rb +34 -0
  257. data/spec/models/acme_account_spec.rb +48 -0
  258. data/spec/models/aws_storage_spec.rb +66 -0
  259. data/spec/models/azure_storage_spec.rb +66 -0
  260. data/spec/models/bastion_config_reply_obj_spec.rb +66 -0
  261. data/spec/models/bastion_global_conf_spec.rb +54 -0
  262. data/spec/models/change_admin_account_password_spec.rb +60 -0
  263. data/spec/models/deactivate_acme_account_spec.rb +66 -0
  264. data/spec/models/gateway_get_remote_access_spec.rb +48 -0
  265. data/spec/models/gateway_update_remote_access_rdp_recordings_spec.rb +120 -0
  266. data/spec/models/gateway_update_remote_access_spec.rb +90 -0
  267. data/spec/models/generate_acme_eab_output_spec.rb +48 -0
  268. data/spec/models/generate_acme_eab_spec.rb +54 -0
  269. data/spec/models/gw_update_remote_access_session_logs_aws_s3_spec.rb +108 -0
  270. data/spec/models/gw_update_remote_access_session_logs_azure_analytics_spec.rb +78 -0
  271. data/spec/models/gw_update_remote_access_session_logs_datadog_spec.rb +96 -0
  272. data/spec/models/gw_update_remote_access_session_logs_elasticsearch_spec.rb +126 -0
  273. data/spec/models/gw_update_remote_access_session_logs_google_chronicle_spec.rb +90 -0
  274. data/spec/models/gw_update_remote_access_session_logs_logstash_spec.rb +90 -0
  275. data/spec/models/gw_update_remote_access_session_logs_logz_io_spec.rb +78 -0
  276. data/spec/models/gw_update_remote_access_session_logs_splunk_spec.rb +108 -0
  277. data/spec/models/gw_update_remote_access_session_logs_stdout_spec.rb +66 -0
  278. data/spec/models/gw_update_remote_access_session_logs_sumologic_spec.rb +84 -0
  279. data/spec/models/gw_update_remote_access_session_logs_syslog_spec.rb +102 -0
  280. data/spec/models/list_acme_accounts_output_spec.rb +36 -0
  281. data/spec/models/list_acme_accounts_spec.rb +54 -0
  282. data/spec/models/next_auto_rotation_event_spec.rb +36 -0
  283. data/spec/models/password_expiration_info_spec.rb +54 -0
  284. data/spec/models/reset_access_key_spec.rb +54 -0
  285. data/spec/models/reset_auth_method_access_key_output_spec.rb +36 -0
  286. data/spec/models/ssh_bastion_conf_spec.rb +54 -0
  287. data/spec/models/ssh_bastion_session_termination_spec.rb +60 -0
  288. data/spec/models/web_bastion_conf_spec.rb +42 -0
  289. data/spec/models/web_bastion_guacamole_spec.rb +36 -0
  290. data/spec/models/web_bastion_rdp_record_spec.rb +48 -0
  291. metadata +1117 -981
@@ -15,6 +15,7 @@
15
15
  | **name** | **String** | Rotated secret name | |
16
16
  | **password_length** | **String** | The length of the password to be generated | [optional] |
17
17
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
18
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
18
19
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
19
20
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
20
21
  | **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
@@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretCreateCustom.new(
51
52
  name: null,
52
53
  password_length: null,
53
54
  rotate_after_disconnect: null,
55
+ rotation_event_in: null,
54
56
  rotation_hour: null,
55
57
  rotation_interval: null,
56
58
  secure_access_allow_external_user: null,
@@ -13,6 +13,7 @@
13
13
  | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
14
14
  | **name** | **String** | Rotated secret name | |
15
15
  | **password_length** | **String** | The length of the password to be generated | [optional] |
16
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
16
17
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
17
18
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
18
19
  | **tags** | **Array<String>** | Add tags attached to this object | [optional] |
@@ -35,6 +36,7 @@ instance = Akeyless::RotatedSecretCreateDockerhub.new(
35
36
  max_versions: null,
36
37
  name: null,
37
38
  password_length: null,
39
+ rotation_event_in: null,
38
40
  rotation_hour: null,
39
41
  rotation_interval: null,
40
42
  tags: null,
@@ -16,6 +16,7 @@
16
16
  | **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
17
17
  | **name** | **String** | Rotated secret name | |
18
18
  | **password_length** | **String** | The length of the password to be generated | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/service-account-rotator] | |
@@ -42,6 +43,7 @@ instance = Akeyless::RotatedSecretCreateGcp.new(
42
43
  max_versions: null,
43
44
  name: null,
44
45
  password_length: null,
46
+ rotation_event_in: null,
45
47
  rotation_hour: null,
46
48
  rotation_interval: null,
47
49
  rotator_type: null,
@@ -15,6 +15,7 @@
15
15
  | **password_length** | **String** | The length of the password to be generated | [optional] |
16
16
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
17
17
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
18
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
18
19
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
19
20
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
20
21
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateHanadb.new(
40
41
  password_length: null,
41
42
  rotated_password: null,
42
43
  rotated_username: null,
44
+ rotation_event_in: null,
43
45
  rotation_hour: null,
44
46
  rotation_interval: null,
45
47
  rotator_type: null,
@@ -18,6 +18,7 @@
18
18
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
19
19
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=ldap) | [optional] |
20
20
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) | [optional] |
21
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
21
22
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
22
23
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
23
24
  | **rotator_type** | **String** | The rotator type. options: [target/ldap] | |
@@ -56,6 +57,7 @@ instance = Akeyless::RotatedSecretCreateLdap.new(
56
57
  rotate_after_disconnect: null,
57
58
  rotated_password: null,
58
59
  rotated_username: null,
60
+ rotation_event_in: null,
59
61
  rotation_hour: null,
60
62
  rotation_interval: null,
61
63
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -47,6 +48,7 @@ instance = Akeyless::RotatedSecretCreateMongodb.new(
47
48
  rotate_after_disconnect: null,
48
49
  rotated_password: null,
49
50
  rotated_username: null,
51
+ rotation_event_in: null,
50
52
  rotation_hour: null,
51
53
  rotation_interval: null,
52
54
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretCreateMssql.new(
48
49
  rotate_after_disconnect: null,
49
50
  rotated_password: null,
50
51
  rotated_username: null,
52
+ rotation_event_in: null,
51
53
  rotation_hour: null,
52
54
  rotation_interval: null,
53
55
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -47,6 +48,7 @@ instance = Akeyless::RotatedSecretCreateMysql.new(
47
48
  rotate_after_disconnect: null,
48
49
  rotated_password: null,
49
50
  rotated_username: null,
51
+ rotation_event_in: null,
50
52
  rotation_hour: null,
51
53
  rotation_interval: null,
52
54
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -46,6 +47,7 @@ instance = Akeyless::RotatedSecretCreateOracledb.new(
46
47
  rotate_after_disconnect: null,
47
48
  rotated_password: null,
48
49
  rotated_username: null,
50
+ rotation_event_in: null,
49
51
  rotation_hour: null,
50
52
  rotation_interval: null,
51
53
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretCreatePostgresql.new(
48
49
  rotate_after_disconnect: null,
49
50
  rotated_password: null,
50
51
  rotated_username: null,
52
+ rotation_event_in: null,
51
53
  rotation_hour: null,
52
54
  rotation_interval: null,
53
55
  rotator_type: null,
@@ -15,6 +15,7 @@
15
15
  | **password_length** | **String** | The length of the password to be generated | [optional] |
16
16
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
17
17
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
18
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
18
19
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
19
20
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
20
21
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateRedis.new(
40
41
  password_length: null,
41
42
  rotated_password: null,
42
43
  rotated_username: null,
44
+ rotation_event_in: null,
43
45
  rotation_hour: null,
44
46
  rotation_interval: null,
45
47
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretCreateRedshift.new(
45
46
  rotate_after_disconnect: null,
46
47
  rotated_password: null,
47
48
  rotated_username: null,
49
+ rotation_event_in: null,
48
50
  rotation_hour: null,
49
51
  rotation_interval: null,
50
52
  rotator_type: null,
@@ -15,6 +15,7 @@
15
15
  | **password_length** | **String** | The length of the password to be generated | [optional] |
16
16
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
17
17
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
18
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
18
19
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
19
20
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
20
21
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateSnowflake.new(
40
41
  password_length: null,
41
42
  rotated_password: null,
42
43
  rotated_username: null,
44
+ rotation_event_in: null,
43
45
  rotation_hour: null,
44
46
  rotation_interval: null,
45
47
  rotator_type: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_custom_cmd** | **String** | Custom rotation command | [optional] |
@@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretCreateSsh.new(
51
52
  rotate_after_disconnect: null,
52
53
  rotated_password: null,
53
54
  rotated_username: null,
55
+ rotation_event_in: null,
54
56
  rotation_hour: null,
55
57
  rotation_interval: null,
56
58
  rotator_custom_cmd: null,
@@ -16,6 +16,7 @@
16
16
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
17
17
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
18
18
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
19
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
19
20
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
20
21
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
21
22
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretCreateWindows.new(
48
49
  rotate_after_disconnect: null,
49
50
  rotated_password: null,
50
51
  rotated_username: null,
52
+ rotation_event_in: null,
51
53
  rotation_hour: null,
52
54
  rotation_interval: null,
53
55
  rotator_type: null,
@@ -22,6 +22,7 @@
22
22
  | **password_length** | **String** | The length of the password to be generated | [optional] |
23
23
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
24
24
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
25
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
25
26
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
26
27
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
27
28
  | **secure_access_aws_account_id** | **String** | The AWS account id | [optional] |
@@ -55,6 +56,7 @@ instance = Akeyless::RotatedSecretUpdateAws.new(
55
56
  password_length: null,
56
57
  rm_tag: null,
57
58
  rotate_after_disconnect: null,
59
+ rotation_event_in: null,
58
60
  rotation_hour: null,
59
61
  rotation_interval: null,
60
62
  secure_access_aws_account_id: null,
@@ -21,6 +21,7 @@
21
21
  | **password_length** | **String** | The length of the password to be generated | [optional] |
22
22
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
23
23
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
24
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
24
25
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
25
26
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
26
27
  | **secure_access_disable_concurrent_connections** | **Boolean** | Enable this flag to prevent simultaneous use of the same secret | [optional] |
@@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateAzure.new(
57
58
  password_length: null,
58
59
  rm_tag: null,
59
60
  rotate_after_disconnect: null,
61
+ rotation_event_in: null,
60
62
  rotation_hour: null,
61
63
  rotation_interval: null,
62
64
  secure_access_disable_concurrent_connections: null,
@@ -19,6 +19,7 @@
19
19
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
20
20
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
21
21
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
22
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
22
23
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
23
24
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
24
25
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateCassandra.new(
45
46
  rm_tag: null,
46
47
  rotated_password: null,
47
48
  rotated_username: null,
49
+ rotation_event_in: null,
48
50
  rotation_hour: null,
49
51
  rotation_interval: null,
50
52
  token: null,
@@ -19,6 +19,7 @@
19
19
  | **password_length** | **String** | The length of the password to be generated | [optional] |
20
20
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
21
21
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
22
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
22
23
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
23
24
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
24
25
  | **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
@@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateCustom.new(
57
58
  password_length: null,
58
59
  rm_tag: null,
59
60
  rotate_after_disconnect: null,
61
+ rotation_event_in: null,
60
62
  rotation_hour: null,
61
63
  rotation_interval: null,
62
64
  secure_access_allow_external_user: null,
@@ -17,6 +17,7 @@
17
17
  | **new_name** | **String** | New item name | [optional] |
18
18
  | **password_length** | **String** | The length of the password to be generated | [optional] |
19
19
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
20
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
20
21
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
21
22
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
22
23
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -41,6 +42,7 @@ instance = Akeyless::RotatedSecretUpdateDockerhub.new(
41
42
  new_name: null,
42
43
  password_length: null,
43
44
  rm_tag: null,
45
+ rotation_event_in: null,
44
46
  rotation_hour: null,
45
47
  rotation_interval: null,
46
48
  token: null,
@@ -20,6 +20,7 @@
20
20
  | **new_name** | **String** | New item name | [optional] |
21
21
  | **password_length** | **String** | The length of the password to be generated | [optional] |
22
22
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **rotator_type** | **String** | The rotator type. options: [target/service-account-rotator] | |
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretUpdateGcp.new(
48
49
  new_name: null,
49
50
  password_length: null,
50
51
  rm_tag: null,
52
+ rotation_event_in: null,
51
53
  rotation_hour: null,
52
54
  rotation_interval: null,
53
55
  rotator_type: null,
@@ -19,6 +19,7 @@
19
19
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
20
20
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
21
21
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
22
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
22
23
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
23
24
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
24
25
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateHanadb.new(
45
46
  rm_tag: null,
46
47
  rotated_password: null,
47
48
  rotated_username: null,
49
+ rotation_event_in: null,
48
50
  rotation_hour: null,
49
51
  rotation_interval: null,
50
52
  token: null,
@@ -22,6 +22,7 @@
22
22
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
23
23
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=ldap) | [optional] |
24
24
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) | [optional] |
25
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
25
26
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
26
27
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
27
28
  | **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
@@ -61,6 +62,7 @@ instance = Akeyless::RotatedSecretUpdateLdap.new(
61
62
  rotate_after_disconnect: null,
62
63
  rotated_password: null,
63
64
  rotated_username: null,
65
+ rotation_event_in: null,
64
66
  rotation_hour: null,
65
67
  rotation_interval: null,
66
68
  secure_access_enable: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
@@ -52,6 +53,7 @@ instance = Akeyless::RotatedSecretUpdateMongodb.new(
52
53
  rotate_after_disconnect: null,
53
54
  rotated_password: null,
54
55
  rotated_username: null,
56
+ rotation_event_in: null,
55
57
  rotation_hour: null,
56
58
  rotation_interval: null,
57
59
  secure_access_bastion_issuer: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
@@ -53,6 +54,7 @@ instance = Akeyless::RotatedSecretUpdateMssql.new(
53
54
  rotate_after_disconnect: null,
54
55
  rotated_password: null,
55
56
  rotated_username: null,
57
+ rotation_event_in: null,
56
58
  rotation_hour: null,
57
59
  rotation_interval: null,
58
60
  secure_access_bastion_issuer: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
@@ -52,6 +53,7 @@ instance = Akeyless::RotatedSecretUpdateMysql.new(
52
53
  rotate_after_disconnect: null,
53
54
  rotated_password: null,
54
55
  rotated_username: null,
56
+ rotation_event_in: null,
55
57
  rotation_hour: null,
56
58
  rotation_interval: null,
57
59
  secure_access_bastion_issuer: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **secure_access_db_name** | **String** | The DB name (relevant only for DB Dynamic-Secret) | [optional] |
@@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretUpdateOracledb.new(
51
52
  rotate_after_disconnect: null,
52
53
  rotated_password: null,
53
54
  rotated_username: null,
55
+ rotation_event_in: null,
54
56
  rotation_hour: null,
55
57
  rotation_interval: null,
56
58
  secure_access_db_name: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
@@ -53,6 +54,7 @@ instance = Akeyless::RotatedSecretUpdatePostgresql.new(
53
54
  rotate_after_disconnect: null,
54
55
  rotated_password: null,
55
56
  rotated_username: null,
57
+ rotation_event_in: null,
56
58
  rotation_hour: null,
57
59
  rotation_interval: null,
58
60
  secure_access_bastion_issuer: null,
@@ -19,6 +19,7 @@
19
19
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
20
20
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
21
21
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
22
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
22
23
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
23
24
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
24
25
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateRedis.new(
45
46
  rm_tag: null,
46
47
  rotated_password: null,
47
48
  rotated_username: null,
49
+ rotation_event_in: null,
48
50
  rotation_hour: null,
49
51
  rotation_interval: null,
50
52
  token: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **secure_access_db_name** | **String** | The DB name (relevant only for DB Dynamic-Secret) | [optional] |
@@ -50,6 +51,7 @@ instance = Akeyless::RotatedSecretUpdateRedshift.new(
50
51
  rotate_after_disconnect: null,
51
52
  rotated_password: null,
52
53
  rotated_username: null,
54
+ rotation_event_in: null,
53
55
  rotation_hour: null,
54
56
  rotation_interval: null,
55
57
  secure_access_db_name: null,
@@ -19,6 +19,7 @@
19
19
  | **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
20
20
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
21
21
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
22
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
22
23
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
23
24
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
24
25
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateSnowflake.new(
45
46
  rm_tag: null,
46
47
  rotated_password: null,
47
48
  rotated_username: null,
49
+ rotation_event_in: null,
48
50
  rotation_hour: null,
49
51
  rotation_interval: null,
50
52
  token: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **rotator_custom_cmd** | **String** | Custom rotation command | [optional] |
@@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateSsh.new(
57
58
  rotate_after_disconnect: null,
58
59
  rotated_password: null,
59
60
  rotated_username: null,
61
+ rotation_event_in: null,
60
62
  rotation_hour: null,
61
63
  rotation_interval: null,
62
64
  rotator_custom_cmd: null,
@@ -20,6 +20,7 @@
20
20
  | **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
21
21
  | **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
22
22
  | **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
23
+ | **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
23
24
  | **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
24
25
  | **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
25
26
  | **rotator_type** | **String** | The rotator type. options: [target/password] | |
@@ -54,6 +55,7 @@ instance = Akeyless::RotatedSecretUpdateWindows.new(
54
55
  rotate_after_disconnect: null,
55
56
  rotated_password: null,
56
57
  rotated_username: null,
58
+ rotation_event_in: null,
57
59
  rotation_hour: null,
58
60
  rotation_interval: null,
59
61
  rotator_type: null,
@@ -0,0 +1,24 @@
1
+ # Akeyless::SshBastionConf
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **hide_session_recording** | **Boolean** | | [optional] |
8
+ | **kexalgs** | **String** | | [optional] |
9
+ | **log_forwarding** | [**LogForwardingConfigPart**](LogForwardingConfigPart.md) | | [optional] |
10
+ | **session_termination** | [**SshBastionSessionTermination**](SshBastionSessionTermination.md) | | [optional] |
11
+
12
+ ## Example
13
+
14
+ ```ruby
15
+ require 'akeyless'
16
+
17
+ instance = Akeyless::SshBastionConf.new(
18
+ hide_session_recording: null,
19
+ kexalgs: null,
20
+ log_forwarding: null,
21
+ session_termination: null
22
+ )
23
+ ```
24
+
@@ -0,0 +1,26 @@
1
+ # Akeyless::SshBastionSessionTermination
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **api_password** | **String** | | [optional] |
8
+ | **api_token** | **String** | | [optional] |
9
+ | **api_url** | **String** | | [optional] |
10
+ | **api_username** | **String** | | [optional] |
11
+ | **enabled** | **Boolean** | | [optional] |
12
+
13
+ ## Example
14
+
15
+ ```ruby
16
+ require 'akeyless'
17
+
18
+ instance = Akeyless::SshBastionSessionTermination.new(
19
+ api_password: null,
20
+ api_token: null,
21
+ api_url: null,
22
+ api_username: null,
23
+ enabled: null
24
+ )
25
+ ```
26
+