akeyless 4.2.3 → 4.2.5
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +54 -2
- data/docs/AccountGeneralSettings.md +2 -0
- data/docs/AcmeAccount.md +22 -0
- data/docs/AuthMethodRoleAssociation.md +2 -0
- data/docs/AwsStorage.md +28 -0
- data/docs/AzureStorage.md +28 -0
- data/docs/BastionConfigReplyObj.md +28 -0
- data/docs/BastionGlobalConf.md +24 -0
- data/docs/ChangeAdminAccountPassword.md +26 -0
- data/docs/Configure.md +8 -0
- data/docs/Connect.md +2 -2
- data/docs/CreateClassicKey.md +8 -0
- data/docs/CreateDFCKey.md +8 -0
- data/docs/CreatePKICertIssuer.md +5 -1
- data/docs/DeactivateAcmeAccount.md +28 -0
- data/docs/DynamicSecretUpdateArtifactory.md +1 -1
- data/docs/DynamicSecretUpdateAws.md +1 -1
- data/docs/DynamicSecretUpdateAzure.md +1 -1
- data/docs/DynamicSecretUpdateCassandra.md +1 -1
- data/docs/DynamicSecretUpdateChef.md +1 -1
- data/docs/DynamicSecretUpdateCustom.md +1 -1
- data/docs/DynamicSecretUpdateDockerhub.md +1 -1
- data/docs/DynamicSecretUpdateEks.md +1 -1
- data/docs/DynamicSecretUpdateGcp.md +1 -1
- data/docs/DynamicSecretUpdateGithub.md +1 -1
- data/docs/DynamicSecretUpdateGitlab.md +1 -1
- data/docs/DynamicSecretUpdateGke.md +1 -1
- data/docs/DynamicSecretUpdateGoogleWorkspace.md +1 -1
- data/docs/DynamicSecretUpdateHanaDb.md +1 -1
- data/docs/DynamicSecretUpdateK8s.md +1 -1
- data/docs/DynamicSecretUpdateLdap.md +1 -1
- data/docs/DynamicSecretUpdateMongoDb.md +1 -1
- data/docs/DynamicSecretUpdateMsSql.md +1 -1
- data/docs/DynamicSecretUpdateMySql.md +1 -1
- data/docs/DynamicSecretUpdateOracleDb.md +1 -1
- data/docs/DynamicSecretUpdatePing.md +1 -1
- data/docs/DynamicSecretUpdateVenafi.md +1 -1
- data/docs/EmailPassAccessRules.md +3 -1
- data/docs/EventForwarderCreateEmail.md +2 -2
- data/docs/EventForwarderCreateServiceNow.md +1 -1
- data/docs/EventForwarderCreateSlack.md +1 -1
- data/docs/EventForwarderCreateWebhook.md +1 -1
- data/docs/EventForwarderUpdateEmail.md +2 -2
- data/docs/EventForwarderUpdateServiceNow.md +1 -1
- data/docs/EventForwarderUpdateSlack.md +1 -1
- data/docs/EventForwarderUpdateWebhook.md +1 -1
- data/docs/GatewayGetRemoteAccess.md +22 -0
- data/docs/GatewayUpdateItem.md +2 -0
- data/docs/GatewayUpdateRemoteAccess.md +36 -0
- data/docs/GatewayUpdateRemoteAccessRdpRecordings.md +46 -0
- data/docs/GenerateAcmeEab.md +24 -0
- data/docs/GenerateAcmeEabOutput.md +22 -0
- data/docs/GetGroupOutput.md +2 -0
- data/docs/GetKubeExecCreds.md +1 -1
- data/docs/GetPKICertificate.md +1 -1
- data/docs/Group.md +2 -0
- data/docs/GwUpdateRemoteAccessSessionLogsAwsS3.md +42 -0
- data/docs/GwUpdateRemoteAccessSessionLogsAzureAnalytics.md +32 -0
- data/docs/GwUpdateRemoteAccessSessionLogsDatadog.md +38 -0
- data/docs/GwUpdateRemoteAccessSessionLogsElasticsearch.md +48 -0
- data/docs/GwUpdateRemoteAccessSessionLogsGoogleChronicle.md +36 -0
- data/docs/GwUpdateRemoteAccessSessionLogsLogstash.md +36 -0
- data/docs/GwUpdateRemoteAccessSessionLogsLogzIo.md +32 -0
- data/docs/GwUpdateRemoteAccessSessionLogsSplunk.md +42 -0
- data/docs/GwUpdateRemoteAccessSessionLogsStdout.md +28 -0
- data/docs/GwUpdateRemoteAccessSessionLogsSumologic.md +34 -0
- data/docs/GwUpdateRemoteAccessSessionLogsSyslog.md +40 -0
- data/docs/ItemGeneralInfo.md +4 -0
- data/docs/ListAcmeAccounts.md +24 -0
- data/docs/ListAcmeAccountsOutput.md +18 -0
- data/docs/NextAutoRotationEvent.md +18 -0
- data/docs/PKICertificateIssueDetails.md +4 -0
- data/docs/PasswordExpirationInfo.md +24 -0
- data/docs/ResetAccessKey.md +24 -0
- data/docs/ResetAuthMethodAccessKeyOutput.md +18 -0
- data/docs/RoleAssociationDetails.md +2 -0
- data/docs/RoleAuthMethodAssociation.md +2 -0
- data/docs/RollbackSecret.md +2 -0
- data/docs/RotatedSecretCreateAws.md +2 -0
- data/docs/RotatedSecretCreateAzure.md +2 -0
- data/docs/RotatedSecretCreateCassandra.md +2 -0
- data/docs/RotatedSecretCreateCustom.md +2 -0
- data/docs/RotatedSecretCreateDockerhub.md +2 -0
- data/docs/RotatedSecretCreateGcp.md +2 -0
- data/docs/RotatedSecretCreateHanadb.md +2 -0
- data/docs/RotatedSecretCreateLdap.md +2 -0
- data/docs/RotatedSecretCreateMongodb.md +2 -0
- data/docs/RotatedSecretCreateMssql.md +2 -0
- data/docs/RotatedSecretCreateMysql.md +2 -0
- data/docs/RotatedSecretCreateOracledb.md +2 -0
- data/docs/RotatedSecretCreatePostgresql.md +2 -0
- data/docs/RotatedSecretCreateRedis.md +2 -0
- data/docs/RotatedSecretCreateRedshift.md +2 -0
- data/docs/RotatedSecretCreateSnowflake.md +2 -0
- data/docs/RotatedSecretCreateSsh.md +2 -0
- data/docs/RotatedSecretCreateWindows.md +2 -0
- data/docs/RotatedSecretUpdateAws.md +2 -0
- data/docs/RotatedSecretUpdateAzure.md +2 -0
- data/docs/RotatedSecretUpdateCassandra.md +2 -0
- data/docs/RotatedSecretUpdateCustom.md +2 -0
- data/docs/RotatedSecretUpdateDockerhub.md +2 -0
- data/docs/RotatedSecretUpdateGcp.md +2 -0
- data/docs/RotatedSecretUpdateHanadb.md +2 -0
- data/docs/RotatedSecretUpdateLdap.md +2 -0
- data/docs/RotatedSecretUpdateMongodb.md +2 -0
- data/docs/RotatedSecretUpdateMssql.md +2 -0
- data/docs/RotatedSecretUpdateMysql.md +2 -0
- data/docs/RotatedSecretUpdateOracledb.md +2 -0
- data/docs/RotatedSecretUpdatePostgresql.md +2 -0
- data/docs/RotatedSecretUpdateRedis.md +2 -0
- data/docs/RotatedSecretUpdateRedshift.md +2 -0
- data/docs/RotatedSecretUpdateSnowflake.md +2 -0
- data/docs/RotatedSecretUpdateSsh.md +2 -0
- data/docs/RotatedSecretUpdateWindows.md +2 -0
- data/docs/SshBastionConf.md +24 -0
- data/docs/SshBastionSessionTermination.md +26 -0
- data/docs/UpdateAccountSettings.md +6 -0
- data/docs/UpdateClassicKeyCertificate.md +2 -0
- data/docs/UpdateItem.md +4 -0
- data/docs/UpdatePKICertIssuer.md +5 -1
- data/docs/UpdateRotationSettings.md +2 -0
- data/docs/UpdateTarget.md +1 -1
- data/docs/UploadRSA.md +2 -0
- data/docs/V2Api.md +1356 -225
- data/docs/WebBastionConf.md +20 -0
- data/docs/WebBastionGuacamole.md +18 -0
- data/docs/WebBastionRdpRecord.md +22 -0
- data/lib/akeyless/api/v2_api.rb +1360 -219
- data/lib/akeyless/models/account_general_settings.rb +10 -1
- data/lib/akeyless/models/acme_account.rb +234 -0
- data/lib/akeyless/models/auth_method_role_association.rb +10 -1
- data/lib/akeyless/models/aws_storage.rb +260 -0
- data/lib/akeyless/models/azure_storage.rb +260 -0
- data/lib/akeyless/models/bastion_config_reply_obj.rb +259 -0
- data/lib/akeyless/models/bastion_global_conf.rb +243 -0
- data/lib/akeyless/models/change_admin_account_password.rb +271 -0
- data/lib/akeyless/models/configure.rb +41 -1
- data/lib/akeyless/models/connect.rb +11 -11
- data/lib/akeyless/models/create_classic_key.rb +45 -1
- data/lib/akeyless/models/create_dfc_key.rb +45 -1
- data/lib/akeyless/models/create_pki_cert_issuer.rb +24 -2
- data/lib/akeyless/models/deactivate_acme_account.rb +282 -0
- data/lib/akeyless/models/dynamic_secret_update_artifactory.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_aws.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_azure.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_cassandra.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_chef.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_custom.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_dockerhub.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_eks.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_gcp.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_github.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_gitlab.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_gke.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_google_workspace.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_hana_db.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_k8s.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_ldap.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_mongo_db.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_ms_sql.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_my_sql.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_oracle_db.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_ping.rb +1 -1
- data/lib/akeyless/models/dynamic_secret_update_venafi.rb +1 -1
- data/lib/akeyless/models/email_pass_access_rules.rb +14 -4
- data/lib/akeyless/models/event_forwarder_create_email.rb +2 -2
- data/lib/akeyless/models/event_forwarder_create_service_now.rb +1 -1
- data/lib/akeyless/models/event_forwarder_create_slack.rb +1 -1
- data/lib/akeyless/models/event_forwarder_create_webhook.rb +1 -1
- data/lib/akeyless/models/event_forwarder_update_email.rb +2 -2
- data/lib/akeyless/models/event_forwarder_update_service_now.rb +1 -1
- data/lib/akeyless/models/event_forwarder_update_slack.rb +1 -1
- data/lib/akeyless/models/event_forwarder_update_webhook.rb +1 -1
- data/lib/akeyless/models/gateway_get_remote_access.rb +238 -0
- data/lib/akeyless/models/gateway_update_item.rb +13 -1
- data/lib/akeyless/models/gateway_update_remote_access.rb +318 -0
- data/lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb +358 -0
- data/lib/akeyless/models/generate_acme_eab.rb +254 -0
- data/lib/akeyless/models/generate_acme_eab_output.rb +232 -0
- data/lib/akeyless/models/get_group_output.rb +10 -1
- data/lib/akeyless/models/get_kube_exec_creds.rb +1 -1
- data/lib/akeyless/models/get_pki_certificate.rb +1 -1
- data/lib/akeyless/models/group.rb +10 -1
- data/lib/akeyless/models/gw_update_remote_access_session_logs_aws_s3.rb +346 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_azure_analytics.rb +294 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_datadog.rb +330 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_elasticsearch.rb +376 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_google_chronicle.rb +314 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_logstash.rb +316 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_logz_io.rb +294 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_splunk.rb +350 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_stdout.rb +274 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_sumologic.rb +308 -0
- data/lib/akeyless/models/gw_update_remote_access_session_logs_syslog.rb +342 -0
- data/lib/akeyless/models/item_general_info.rb +23 -1
- data/lib/akeyless/models/list_acme_accounts.rb +255 -0
- data/lib/akeyless/models/list_acme_accounts_output.rb +216 -0
- data/lib/akeyless/models/next_auto_rotation_event.rb +214 -0
- data/lib/akeyless/models/password_expiration_info.rb +242 -0
- data/lib/akeyless/models/pki_certificate_issue_details.rb +19 -1
- data/lib/akeyless/models/reset_access_key.rb +255 -0
- data/lib/akeyless/models/reset_auth_method_access_key_output.rb +215 -0
- data/lib/akeyless/models/role_association_details.rb +10 -1
- data/lib/akeyless/models/role_auth_method_association.rb +10 -1
- data/lib/akeyless/models/rollback_secret.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_aws.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_azure.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_cassandra.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_custom.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_dockerhub.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_gcp.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_hanadb.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_ldap.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_mongodb.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_mssql.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_mysql.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_oracledb.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_postgresql.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_redis.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_redshift.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_snowflake.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_ssh.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_windows.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_aws.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_azure.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_cassandra.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_custom.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_dockerhub.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_gcp.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_hanadb.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_ldap.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_mongodb.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_mssql.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_mysql.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_oracledb.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_postgresql.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_redis.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_redshift.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_snowflake.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_ssh.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_windows.rb +13 -1
- data/lib/akeyless/models/ssh_bastion_conf.rb +241 -0
- data/lib/akeyless/models/ssh_bastion_session_termination.rb +250 -0
- data/lib/akeyless/models/update_account_settings.rb +31 -1
- data/lib/akeyless/models/update_classic_key_certificate.rb +10 -1
- data/lib/akeyless/models/update_item.rb +22 -1
- data/lib/akeyless/models/update_pki_cert_issuer.rb +24 -2
- data/lib/akeyless/models/update_rotation_settings.rb +13 -1
- data/lib/akeyless/models/update_target.rb +1 -1
- data/lib/akeyless/models/upload_rsa.rb +13 -1
- data/lib/akeyless/models/web_bastion_conf.rb +223 -0
- data/lib/akeyless/models/web_bastion_guacamole.rb +214 -0
- data/lib/akeyless/models/web_bastion_rdp_record.rb +232 -0
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +34 -0
- data/spec/models/acme_account_spec.rb +48 -0
- data/spec/models/aws_storage_spec.rb +66 -0
- data/spec/models/azure_storage_spec.rb +66 -0
- data/spec/models/bastion_config_reply_obj_spec.rb +66 -0
- data/spec/models/bastion_global_conf_spec.rb +54 -0
- data/spec/models/change_admin_account_password_spec.rb +60 -0
- data/spec/models/deactivate_acme_account_spec.rb +66 -0
- data/spec/models/gateway_get_remote_access_spec.rb +48 -0
- data/spec/models/gateway_update_remote_access_rdp_recordings_spec.rb +120 -0
- data/spec/models/gateway_update_remote_access_spec.rb +90 -0
- data/spec/models/generate_acme_eab_output_spec.rb +48 -0
- data/spec/models/generate_acme_eab_spec.rb +54 -0
- data/spec/models/gw_update_remote_access_session_logs_aws_s3_spec.rb +108 -0
- data/spec/models/gw_update_remote_access_session_logs_azure_analytics_spec.rb +78 -0
- data/spec/models/gw_update_remote_access_session_logs_datadog_spec.rb +96 -0
- data/spec/models/gw_update_remote_access_session_logs_elasticsearch_spec.rb +126 -0
- data/spec/models/gw_update_remote_access_session_logs_google_chronicle_spec.rb +90 -0
- data/spec/models/gw_update_remote_access_session_logs_logstash_spec.rb +90 -0
- data/spec/models/gw_update_remote_access_session_logs_logz_io_spec.rb +78 -0
- data/spec/models/gw_update_remote_access_session_logs_splunk_spec.rb +108 -0
- data/spec/models/gw_update_remote_access_session_logs_stdout_spec.rb +66 -0
- data/spec/models/gw_update_remote_access_session_logs_sumologic_spec.rb +84 -0
- data/spec/models/gw_update_remote_access_session_logs_syslog_spec.rb +102 -0
- data/spec/models/list_acme_accounts_output_spec.rb +36 -0
- data/spec/models/list_acme_accounts_spec.rb +54 -0
- data/spec/models/next_auto_rotation_event_spec.rb +36 -0
- data/spec/models/password_expiration_info_spec.rb +54 -0
- data/spec/models/reset_access_key_spec.rb +54 -0
- data/spec/models/reset_auth_method_access_key_output_spec.rb +36 -0
- data/spec/models/ssh_bastion_conf_spec.rb +54 -0
- data/spec/models/ssh_bastion_session_termination_spec.rb +60 -0
- data/spec/models/web_bastion_conf_spec.rb +42 -0
- data/spec/models/web_bastion_guacamole_spec.rb +36 -0
- data/spec/models/web_bastion_rdp_record_spec.rb +48 -0
- metadata +1117 -981
@@ -15,6 +15,7 @@
|
|
15
15
|
| **name** | **String** | Rotated secret name | |
|
16
16
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
17
17
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
18
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
18
19
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
19
20
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
20
21
|
| **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
|
@@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretCreateCustom.new(
|
|
51
52
|
name: null,
|
52
53
|
password_length: null,
|
53
54
|
rotate_after_disconnect: null,
|
55
|
+
rotation_event_in: null,
|
54
56
|
rotation_hour: null,
|
55
57
|
rotation_interval: null,
|
56
58
|
secure_access_allow_external_user: null,
|
@@ -13,6 +13,7 @@
|
|
13
13
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
14
14
|
| **name** | **String** | Rotated secret name | |
|
15
15
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
16
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
16
17
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
17
18
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
18
19
|
| **tags** | **Array<String>** | Add tags attached to this object | [optional] |
|
@@ -35,6 +36,7 @@ instance = Akeyless::RotatedSecretCreateDockerhub.new(
|
|
35
36
|
max_versions: null,
|
36
37
|
name: null,
|
37
38
|
password_length: null,
|
39
|
+
rotation_event_in: null,
|
38
40
|
rotation_hour: null,
|
39
41
|
rotation_interval: null,
|
40
42
|
tags: null,
|
@@ -16,6 +16,7 @@
|
|
16
16
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
17
17
|
| **name** | **String** | Rotated secret name | |
|
18
18
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
19
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
19
20
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
20
21
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
21
22
|
| **rotator_type** | **String** | The rotator type. options: [target/service-account-rotator] | |
|
@@ -42,6 +43,7 @@ instance = Akeyless::RotatedSecretCreateGcp.new(
|
|
42
43
|
max_versions: null,
|
43
44
|
name: null,
|
44
45
|
password_length: null,
|
46
|
+
rotation_event_in: null,
|
45
47
|
rotation_hour: null,
|
46
48
|
rotation_interval: null,
|
47
49
|
rotator_type: null,
|
@@ -15,6 +15,7 @@
|
|
15
15
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
16
16
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
17
17
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
18
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
18
19
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
19
20
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
20
21
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
@@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateHanadb.new(
|
|
40
41
|
password_length: null,
|
41
42
|
rotated_password: null,
|
42
43
|
rotated_username: null,
|
44
|
+
rotation_event_in: null,
|
43
45
|
rotation_hour: null,
|
44
46
|
rotation_interval: null,
|
45
47
|
rotator_type: null,
|
@@ -18,6 +18,7 @@
|
|
18
18
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
19
19
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=ldap) | [optional] |
|
20
20
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) | [optional] |
|
21
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
21
22
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
22
23
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
23
24
|
| **rotator_type** | **String** | The rotator type. options: [target/ldap] | |
|
@@ -56,6 +57,7 @@ instance = Akeyless::RotatedSecretCreateLdap.new(
|
|
56
57
|
rotate_after_disconnect: null,
|
57
58
|
rotated_password: null,
|
58
59
|
rotated_username: null,
|
60
|
+
rotation_event_in: null,
|
59
61
|
rotation_hour: null,
|
60
62
|
rotation_interval: null,
|
61
63
|
rotator_type: null,
|
@@ -16,6 +16,7 @@
|
|
16
16
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
17
17
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
18
18
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
19
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
19
20
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
20
21
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
21
22
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
@@ -47,6 +48,7 @@ instance = Akeyless::RotatedSecretCreateMongodb.new(
|
|
47
48
|
rotate_after_disconnect: null,
|
48
49
|
rotated_password: null,
|
49
50
|
rotated_username: null,
|
51
|
+
rotation_event_in: null,
|
50
52
|
rotation_hour: null,
|
51
53
|
rotation_interval: null,
|
52
54
|
rotator_type: null,
|
@@ -16,6 +16,7 @@
|
|
16
16
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
17
17
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
18
18
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
19
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
19
20
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
20
21
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
21
22
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretCreateMssql.new(
|
|
48
49
|
rotate_after_disconnect: null,
|
49
50
|
rotated_password: null,
|
50
51
|
rotated_username: null,
|
52
|
+
rotation_event_in: null,
|
51
53
|
rotation_hour: null,
|
52
54
|
rotation_interval: null,
|
53
55
|
rotator_type: null,
|
@@ -16,6 +16,7 @@
|
|
16
16
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
17
17
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
18
18
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
19
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
19
20
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
20
21
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
21
22
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
@@ -47,6 +48,7 @@ instance = Akeyless::RotatedSecretCreateMysql.new(
|
|
47
48
|
rotate_after_disconnect: null,
|
48
49
|
rotated_password: null,
|
49
50
|
rotated_username: null,
|
51
|
+
rotation_event_in: null,
|
50
52
|
rotation_hour: null,
|
51
53
|
rotation_interval: null,
|
52
54
|
rotator_type: null,
|
@@ -16,6 +16,7 @@
|
|
16
16
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
17
17
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
18
18
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
19
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
19
20
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
20
21
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
21
22
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
@@ -46,6 +47,7 @@ instance = Akeyless::RotatedSecretCreateOracledb.new(
|
|
46
47
|
rotate_after_disconnect: null,
|
47
48
|
rotated_password: null,
|
48
49
|
rotated_username: null,
|
50
|
+
rotation_event_in: null,
|
49
51
|
rotation_hour: null,
|
50
52
|
rotation_interval: null,
|
51
53
|
rotator_type: null,
|
@@ -16,6 +16,7 @@
|
|
16
16
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
17
17
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
18
18
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
19
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
19
20
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
20
21
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
21
22
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretCreatePostgresql.new(
|
|
48
49
|
rotate_after_disconnect: null,
|
49
50
|
rotated_password: null,
|
50
51
|
rotated_username: null,
|
52
|
+
rotation_event_in: null,
|
51
53
|
rotation_hour: null,
|
52
54
|
rotation_interval: null,
|
53
55
|
rotator_type: null,
|
@@ -15,6 +15,7 @@
|
|
15
15
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
16
16
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
17
17
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
18
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
18
19
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
19
20
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
20
21
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
@@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateRedis.new(
|
|
40
41
|
password_length: null,
|
41
42
|
rotated_password: null,
|
42
43
|
rotated_username: null,
|
44
|
+
rotation_event_in: null,
|
43
45
|
rotation_hour: null,
|
44
46
|
rotation_interval: null,
|
45
47
|
rotator_type: null,
|
@@ -16,6 +16,7 @@
|
|
16
16
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
17
17
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
18
18
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
19
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
19
20
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
20
21
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
21
22
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretCreateRedshift.new(
|
|
45
46
|
rotate_after_disconnect: null,
|
46
47
|
rotated_password: null,
|
47
48
|
rotated_username: null,
|
49
|
+
rotation_event_in: null,
|
48
50
|
rotation_hour: null,
|
49
51
|
rotation_interval: null,
|
50
52
|
rotator_type: null,
|
@@ -15,6 +15,7 @@
|
|
15
15
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
16
16
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
17
17
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
18
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
18
19
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
19
20
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
20
21
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
@@ -40,6 +41,7 @@ instance = Akeyless::RotatedSecretCreateSnowflake.new(
|
|
40
41
|
password_length: null,
|
41
42
|
rotated_password: null,
|
42
43
|
rotated_username: null,
|
44
|
+
rotation_event_in: null,
|
43
45
|
rotation_hour: null,
|
44
46
|
rotation_interval: null,
|
45
47
|
rotator_type: null,
|
@@ -16,6 +16,7 @@
|
|
16
16
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
17
17
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
18
18
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
19
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
19
20
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
20
21
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
21
22
|
| **rotator_custom_cmd** | **String** | Custom rotation command | [optional] |
|
@@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretCreateSsh.new(
|
|
51
52
|
rotate_after_disconnect: null,
|
52
53
|
rotated_password: null,
|
53
54
|
rotated_username: null,
|
55
|
+
rotation_event_in: null,
|
54
56
|
rotation_hour: null,
|
55
57
|
rotation_interval: null,
|
56
58
|
rotator_custom_cmd: null,
|
@@ -16,6 +16,7 @@
|
|
16
16
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
17
17
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
18
18
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
19
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
19
20
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
20
21
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
21
22
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretCreateWindows.new(
|
|
48
49
|
rotate_after_disconnect: null,
|
49
50
|
rotated_password: null,
|
50
51
|
rotated_username: null,
|
52
|
+
rotation_event_in: null,
|
51
53
|
rotation_hour: null,
|
52
54
|
rotation_interval: null,
|
53
55
|
rotator_type: null,
|
@@ -22,6 +22,7 @@
|
|
22
22
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
23
23
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
24
24
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
25
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
25
26
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
26
27
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
27
28
|
| **secure_access_aws_account_id** | **String** | The AWS account id | [optional] |
|
@@ -55,6 +56,7 @@ instance = Akeyless::RotatedSecretUpdateAws.new(
|
|
55
56
|
password_length: null,
|
56
57
|
rm_tag: null,
|
57
58
|
rotate_after_disconnect: null,
|
59
|
+
rotation_event_in: null,
|
58
60
|
rotation_hour: null,
|
59
61
|
rotation_interval: null,
|
60
62
|
secure_access_aws_account_id: null,
|
@@ -21,6 +21,7 @@
|
|
21
21
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
22
22
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
23
23
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
24
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
24
25
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
25
26
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
26
27
|
| **secure_access_disable_concurrent_connections** | **Boolean** | Enable this flag to prevent simultaneous use of the same secret | [optional] |
|
@@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateAzure.new(
|
|
57
58
|
password_length: null,
|
58
59
|
rm_tag: null,
|
59
60
|
rotate_after_disconnect: null,
|
61
|
+
rotation_event_in: null,
|
60
62
|
rotation_hour: null,
|
61
63
|
rotation_interval: null,
|
62
64
|
secure_access_disable_concurrent_connections: null,
|
@@ -19,6 +19,7 @@
|
|
19
19
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
20
20
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
21
21
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
22
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
22
23
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
23
24
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
24
25
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateCassandra.new(
|
|
45
46
|
rm_tag: null,
|
46
47
|
rotated_password: null,
|
47
48
|
rotated_username: null,
|
49
|
+
rotation_event_in: null,
|
48
50
|
rotation_hour: null,
|
49
51
|
rotation_interval: null,
|
50
52
|
token: null,
|
@@ -19,6 +19,7 @@
|
|
19
19
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
20
20
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
21
21
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
22
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
22
23
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
23
24
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
24
25
|
| **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
|
@@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateCustom.new(
|
|
57
58
|
password_length: null,
|
58
59
|
rm_tag: null,
|
59
60
|
rotate_after_disconnect: null,
|
61
|
+
rotation_event_in: null,
|
60
62
|
rotation_hour: null,
|
61
63
|
rotation_interval: null,
|
62
64
|
secure_access_allow_external_user: null,
|
@@ -17,6 +17,7 @@
|
|
17
17
|
| **new_name** | **String** | New item name | [optional] |
|
18
18
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
19
19
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
20
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
20
21
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
21
22
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
22
23
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -41,6 +42,7 @@ instance = Akeyless::RotatedSecretUpdateDockerhub.new(
|
|
41
42
|
new_name: null,
|
42
43
|
password_length: null,
|
43
44
|
rm_tag: null,
|
45
|
+
rotation_event_in: null,
|
44
46
|
rotation_hour: null,
|
45
47
|
rotation_interval: null,
|
46
48
|
token: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **new_name** | **String** | New item name | [optional] |
|
21
21
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
22
22
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **rotator_type** | **String** | The rotator type. options: [target/service-account-rotator] | |
|
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretUpdateGcp.new(
|
|
48
49
|
new_name: null,
|
49
50
|
password_length: null,
|
50
51
|
rm_tag: null,
|
52
|
+
rotation_event_in: null,
|
51
53
|
rotation_hour: null,
|
52
54
|
rotation_interval: null,
|
53
55
|
rotator_type: null,
|
@@ -19,6 +19,7 @@
|
|
19
19
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
20
20
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
21
21
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
22
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
22
23
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
23
24
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
24
25
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateHanadb.new(
|
|
45
46
|
rm_tag: null,
|
46
47
|
rotated_password: null,
|
47
48
|
rotated_username: null,
|
49
|
+
rotation_event_in: null,
|
48
50
|
rotation_hour: null,
|
49
51
|
rotation_interval: null,
|
50
52
|
token: null,
|
@@ -22,6 +22,7 @@
|
|
22
22
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
23
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=ldap) | [optional] |
|
24
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) | [optional] |
|
25
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
25
26
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
26
27
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
27
28
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
@@ -61,6 +62,7 @@ instance = Akeyless::RotatedSecretUpdateLdap.new(
|
|
61
62
|
rotate_after_disconnect: null,
|
62
63
|
rotated_password: null,
|
63
64
|
rotated_username: null,
|
65
|
+
rotation_event_in: null,
|
64
66
|
rotation_hour: null,
|
65
67
|
rotation_interval: null,
|
66
68
|
secure_access_enable: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
|
@@ -52,6 +53,7 @@ instance = Akeyless::RotatedSecretUpdateMongodb.new(
|
|
52
53
|
rotate_after_disconnect: null,
|
53
54
|
rotated_password: null,
|
54
55
|
rotated_username: null,
|
56
|
+
rotation_event_in: null,
|
55
57
|
rotation_hour: null,
|
56
58
|
rotation_interval: null,
|
57
59
|
secure_access_bastion_issuer: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
|
@@ -53,6 +54,7 @@ instance = Akeyless::RotatedSecretUpdateMssql.new(
|
|
53
54
|
rotate_after_disconnect: null,
|
54
55
|
rotated_password: null,
|
55
56
|
rotated_username: null,
|
57
|
+
rotation_event_in: null,
|
56
58
|
rotation_hour: null,
|
57
59
|
rotation_interval: null,
|
58
60
|
secure_access_bastion_issuer: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
|
@@ -52,6 +53,7 @@ instance = Akeyless::RotatedSecretUpdateMysql.new(
|
|
52
53
|
rotate_after_disconnect: null,
|
53
54
|
rotated_password: null,
|
54
55
|
rotated_username: null,
|
56
|
+
rotation_event_in: null,
|
55
57
|
rotation_hour: null,
|
56
58
|
rotation_interval: null,
|
57
59
|
secure_access_bastion_issuer: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **secure_access_db_name** | **String** | The DB name (relevant only for DB Dynamic-Secret) | [optional] |
|
@@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretUpdateOracledb.new(
|
|
51
52
|
rotate_after_disconnect: null,
|
52
53
|
rotated_password: null,
|
53
54
|
rotated_username: null,
|
55
|
+
rotation_event_in: null,
|
54
56
|
rotation_hour: null,
|
55
57
|
rotation_interval: null,
|
56
58
|
secure_access_db_name: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **secure_access_bastion_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Bastion | [optional] |
|
@@ -53,6 +54,7 @@ instance = Akeyless::RotatedSecretUpdatePostgresql.new(
|
|
53
54
|
rotate_after_disconnect: null,
|
54
55
|
rotated_password: null,
|
55
56
|
rotated_username: null,
|
57
|
+
rotation_event_in: null,
|
56
58
|
rotation_hour: null,
|
57
59
|
rotation_interval: null,
|
58
60
|
secure_access_bastion_issuer: null,
|
@@ -19,6 +19,7 @@
|
|
19
19
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
20
20
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
21
21
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
22
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
22
23
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
23
24
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
24
25
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateRedis.new(
|
|
45
46
|
rm_tag: null,
|
46
47
|
rotated_password: null,
|
47
48
|
rotated_username: null,
|
49
|
+
rotation_event_in: null,
|
48
50
|
rotation_hour: null,
|
49
51
|
rotation_interval: null,
|
50
52
|
token: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **secure_access_db_name** | **String** | The DB name (relevant only for DB Dynamic-Secret) | [optional] |
|
@@ -50,6 +51,7 @@ instance = Akeyless::RotatedSecretUpdateRedshift.new(
|
|
50
51
|
rotate_after_disconnect: null,
|
51
52
|
rotated_password: null,
|
52
53
|
rotated_username: null,
|
54
|
+
rotation_event_in: null,
|
53
55
|
rotation_hour: null,
|
54
56
|
rotation_interval: null,
|
55
57
|
secure_access_db_name: null,
|
@@ -19,6 +19,7 @@
|
|
19
19
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
20
20
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
21
21
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
22
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
22
23
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
23
24
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
24
25
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateSnowflake.new(
|
|
45
46
|
rm_tag: null,
|
46
47
|
rotated_password: null,
|
47
48
|
rotated_username: null,
|
49
|
+
rotation_event_in: null,
|
48
50
|
rotation_hour: null,
|
49
51
|
rotation_interval: null,
|
50
52
|
token: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **rotator_custom_cmd** | **String** | Custom rotation command | [optional] |
|
@@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateSsh.new(
|
|
57
58
|
rotate_after_disconnect: null,
|
58
59
|
rotated_password: null,
|
59
60
|
rotated_username: null,
|
61
|
+
rotation_event_in: null,
|
60
62
|
rotation_hour: null,
|
61
63
|
rotation_interval: null,
|
62
64
|
rotator_custom_cmd: null,
|
@@ -20,6 +20,7 @@
|
|
20
20
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
21
21
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
22
22
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
23
|
+
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
23
24
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
24
25
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
25
26
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
@@ -54,6 +55,7 @@ instance = Akeyless::RotatedSecretUpdateWindows.new(
|
|
54
55
|
rotate_after_disconnect: null,
|
55
56
|
rotated_password: null,
|
56
57
|
rotated_username: null,
|
58
|
+
rotation_event_in: null,
|
57
59
|
rotation_hour: null,
|
58
60
|
rotation_interval: null,
|
59
61
|
rotator_type: null,
|
@@ -0,0 +1,24 @@
|
|
1
|
+
# Akeyless::SshBastionConf
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **hide_session_recording** | **Boolean** | | [optional] |
|
8
|
+
| **kexalgs** | **String** | | [optional] |
|
9
|
+
| **log_forwarding** | [**LogForwardingConfigPart**](LogForwardingConfigPart.md) | | [optional] |
|
10
|
+
| **session_termination** | [**SshBastionSessionTermination**](SshBastionSessionTermination.md) | | [optional] |
|
11
|
+
|
12
|
+
## Example
|
13
|
+
|
14
|
+
```ruby
|
15
|
+
require 'akeyless'
|
16
|
+
|
17
|
+
instance = Akeyless::SshBastionConf.new(
|
18
|
+
hide_session_recording: null,
|
19
|
+
kexalgs: null,
|
20
|
+
log_forwarding: null,
|
21
|
+
session_termination: null
|
22
|
+
)
|
23
|
+
```
|
24
|
+
|
@@ -0,0 +1,26 @@
|
|
1
|
+
# Akeyless::SshBastionSessionTermination
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **api_password** | **String** | | [optional] |
|
8
|
+
| **api_token** | **String** | | [optional] |
|
9
|
+
| **api_url** | **String** | | [optional] |
|
10
|
+
| **api_username** | **String** | | [optional] |
|
11
|
+
| **enabled** | **Boolean** | | [optional] |
|
12
|
+
|
13
|
+
## Example
|
14
|
+
|
15
|
+
```ruby
|
16
|
+
require 'akeyless'
|
17
|
+
|
18
|
+
instance = Akeyless::SshBastionSessionTermination.new(
|
19
|
+
api_password: null,
|
20
|
+
api_token: null,
|
21
|
+
api_url: null,
|
22
|
+
api_username: null,
|
23
|
+
enabled: null
|
24
|
+
)
|
25
|
+
```
|
26
|
+
|