akeyless 5.0.1 → 5.0.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +6 -2
- data/docs/BastionConfigReplyObj.md +2 -2
- data/docs/Connect.md +1 -1
- data/docs/CreateUSC.md +5 -1
- data/docs/DesktopAppConf.md +24 -0
- data/docs/DynamicSecretCreateLdap.md +4 -0
- data/docs/DynamicSecretCreateRdp.md +4 -0
- data/docs/DynamicSecretUpdateLdap.md +4 -0
- data/docs/DynamicSecretUpdateRdp.md +4 -0
- data/docs/GatewayCreateProducerLdap.md +4 -0
- data/docs/GatewayCreateProducerRdp.md +4 -0
- data/docs/GatewayDetailsForItemReplyObj.md +24 -0
- data/docs/GatewayUpdateProducerLdap.md +4 -0
- data/docs/GatewayUpdateProducerRdp.md +4 -0
- data/docs/GatewayUpdateRemoteAccessDesktopApp.md +28 -0
- data/docs/Item.md +1 -1
- data/docs/RotatedSecretCreateLdap.md +4 -0
- data/docs/RotatedSecretCreateSsh.md +2 -0
- data/docs/RotatedSecretCreateWindows.md +4 -0
- data/docs/RotatedSecretUpdateLdap.md +4 -0
- data/docs/RotatedSecretUpdateSsh.md +2 -0
- data/docs/RotatedSecretUpdateWindows.md +4 -0
- data/docs/SecretInfo.md +2 -0
- data/docs/SecureRemoteAccess.md +2 -0
- data/docs/SraDesktopAppConf.md +22 -0
- data/docs/UscCreate.md +2 -0
- data/docs/UscList.md +2 -0
- data/docs/V2Api.md +63 -0
- data/lib/akeyless/api/v2_api.rb +64 -0
- data/lib/akeyless/models/bastion_config_reply_obj.rb +10 -10
- data/lib/akeyless/models/connect.rb +1 -1
- data/lib/akeyless/models/create_usc.rb +26 -4
- data/lib/akeyless/models/desktop_app_conf.rb +241 -0
- data/lib/akeyless/models/dynamic_secret_create_ldap.rb +21 -1
- data/lib/akeyless/models/dynamic_secret_create_rdp.rb +21 -1
- data/lib/akeyless/models/dynamic_secret_update_ldap.rb +21 -1
- data/lib/akeyless/models/dynamic_secret_update_rdp.rb +21 -1
- data/lib/akeyless/models/gateway_create_producer_ldap.rb +21 -1
- data/lib/akeyless/models/gateway_create_producer_rdp.rb +21 -1
- data/lib/akeyless/models/gateway_details_for_item_reply_obj.rb +241 -0
- data/lib/akeyless/models/gateway_update_producer_ldap.rb +21 -1
- data/lib/akeyless/models/gateway_update_producer_rdp.rb +21 -1
- data/lib/akeyless/models/gateway_update_remote_access_desktop_app.rb +265 -0
- data/lib/akeyless/models/item.rb +1 -1
- data/lib/akeyless/models/rotated_secret_create_ldap.rb +21 -1
- data/lib/akeyless/models/rotated_secret_create_ssh.rb +13 -1
- data/lib/akeyless/models/rotated_secret_create_windows.rb +21 -1
- data/lib/akeyless/models/rotated_secret_update_ldap.rb +21 -1
- data/lib/akeyless/models/rotated_secret_update_ssh.rb +13 -1
- data/lib/akeyless/models/rotated_secret_update_windows.rb +21 -1
- data/lib/akeyless/models/secret_info.rb +10 -1
- data/lib/akeyless/models/secure_remote_access.rb +10 -1
- data/lib/akeyless/models/sra_desktop_app_conf.rb +232 -0
- data/lib/akeyless/models/usc_create.rb +10 -1
- data/lib/akeyless/models/usc_list.rb +10 -1
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +4 -1
- data/spec/models/desktop_app_conf_spec.rb +54 -0
- data/spec/models/gateway_details_for_item_reply_obj_spec.rb +54 -0
- data/spec/models/gateway_update_remote_access_desktop_app_spec.rb +66 -0
- data/spec/models/sra_desktop_app_conf_spec.rb +48 -0
- metadata +1070 -1054
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 0e736375b812cbde13e0ca7ad50795f8043d2f7b95d11408ae0198c0d8edaf85
|
4
|
+
data.tar.gz: e2cbeb7f0c15e53e513ab283e3aa83ca2c1173cf10c5682f02cf82415f81fee9
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: b511c5366e0caf7ba6c19dcad542caf68357e345a49d1fcef01edd8fe7192ccb9b0b67411925157a6bc14dde0f4c11182d9579b910dead216d1ac53805ac4475
|
7
|
+
data.tar.gz: b86a3b076d2a7f0061bc14274219e5b32fc414a838f76db911cc0210ce2a3ea8dbd452b1283919e1197f58258c1fd8bd8327d88f4ef1a753968f4793a0c61c5d
|
data/README.md
CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
|
|
7
7
|
This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
|
8
8
|
|
9
9
|
- API version: 2.0
|
10
|
-
- Package version: 5.0.
|
10
|
+
- Package version: 5.0.2
|
11
11
|
- Generator version: 7.10.0
|
12
12
|
- Build package: org.openapitools.codegen.languages.RubyClientCodegen
|
13
13
|
For more information, please visit [http://akeyless.io](http://akeyless.io)
|
@@ -365,6 +365,7 @@ Class | Method | HTTP request | Description
|
|
365
365
|
*Akeyless::V2Api* | [**gateway_update_producer_snowflake**](docs/V2Api.md#gateway_update_producer_snowflake) | **POST** /gateway-update-producer-snowflake |
|
366
366
|
*Akeyless::V2Api* | [**gateway_update_producer_venafi**](docs/V2Api.md#gateway_update_producer_venafi) | **POST** /gateway-update-producer-certificate-automation |
|
367
367
|
*Akeyless::V2Api* | [**gateway_update_remote_access**](docs/V2Api.md#gateway_update_remote_access) | **POST** /gateway-update-remote-access |
|
368
|
+
*Akeyless::V2Api* | [**gateway_update_remote_access_desktop_app**](docs/V2Api.md#gateway_update_remote_access_desktop_app) | **POST** /gateway-update-remote-access-desktop-app |
|
368
369
|
*Akeyless::V2Api* | [**gateway_update_remote_access_rdp_recordings**](docs/V2Api.md#gateway_update_remote_access_rdp_recordings) | **POST** /gateway-update-remote-access-rdp-recording |
|
369
370
|
*Akeyless::V2Api* | [**gateway_update_tls_cert**](docs/V2Api.md#gateway_update_tls_cert) | **POST** /gateway-update-tls-cert |
|
370
371
|
*Akeyless::V2Api* | [**gateway_update_tmp_users**](docs/V2Api.md#gateway_update_tmp_users) | **POST** /gateway-update-producer-tmp-creds |
|
@@ -903,6 +904,7 @@ Class | Method | HTTP request | Description
|
|
903
904
|
- [Akeyless::DescribePermissionsOutput](docs/DescribePermissionsOutput.md)
|
904
905
|
- [Akeyless::DescribeSubClaims](docs/DescribeSubClaims.md)
|
905
906
|
- [Akeyless::DescribeSubClaimsOutput](docs/DescribeSubClaimsOutput.md)
|
907
|
+
- [Akeyless::DesktopAppConf](docs/DesktopAppConf.md)
|
906
908
|
- [Akeyless::Detokenize](docs/Detokenize.md)
|
907
909
|
- [Akeyless::DetokenizeOutput](docs/DetokenizeOutput.md)
|
908
910
|
- [Akeyless::DockerhubTargetDetails](docs/DockerhubTargetDetails.md)
|
@@ -1020,7 +1022,6 @@ Class | Method | HTTP request | Description
|
|
1020
1022
|
- [Akeyless::GCPPayload](docs/GCPPayload.md)
|
1021
1023
|
- [Akeyless::GCPSecretsMigration](docs/GCPSecretsMigration.md)
|
1022
1024
|
- [Akeyless::GKETargetDetails](docs/GKETargetDetails.md)
|
1023
|
-
- [Akeyless::GatewayBasicInfo](docs/GatewayBasicInfo.md)
|
1024
1025
|
- [Akeyless::GatewayCreateAllowedAccess](docs/GatewayCreateAllowedAccess.md)
|
1025
1026
|
- [Akeyless::GatewayCreateK8SAuthConfig](docs/GatewayCreateK8SAuthConfig.md)
|
1026
1027
|
- [Akeyless::GatewayCreateK8SAuthConfigOutput](docs/GatewayCreateK8SAuthConfigOutput.md)
|
@@ -1085,6 +1086,7 @@ Class | Method | HTTP request | Description
|
|
1085
1086
|
- [Akeyless::GatewayDeleteMigration](docs/GatewayDeleteMigration.md)
|
1086
1087
|
- [Akeyless::GatewayDeleteProducer](docs/GatewayDeleteProducer.md)
|
1087
1088
|
- [Akeyless::GatewayDeleteProducerOutput](docs/GatewayDeleteProducerOutput.md)
|
1089
|
+
- [Akeyless::GatewayDetailsForItemReplyObj](docs/GatewayDetailsForItemReplyObj.md)
|
1088
1090
|
- [Akeyless::GatewayDownloadCustomerFragments](docs/GatewayDownloadCustomerFragments.md)
|
1089
1091
|
- [Akeyless::GatewayDownloadCustomerFragmentsOutput](docs/GatewayDownloadCustomerFragmentsOutput.md)
|
1090
1092
|
- [Akeyless::GatewayGetAllowedAccess](docs/GatewayGetAllowedAccess.md)
|
@@ -1200,6 +1202,7 @@ Class | Method | HTTP request | Description
|
|
1200
1202
|
- [Akeyless::GatewayUpdateProducerVenafi](docs/GatewayUpdateProducerVenafi.md)
|
1201
1203
|
- [Akeyless::GatewayUpdateProducerVenafiOutput](docs/GatewayUpdateProducerVenafiOutput.md)
|
1202
1204
|
- [Akeyless::GatewayUpdateRemoteAccess](docs/GatewayUpdateRemoteAccess.md)
|
1205
|
+
- [Akeyless::GatewayUpdateRemoteAccessDesktopApp](docs/GatewayUpdateRemoteAccessDesktopApp.md)
|
1203
1206
|
- [Akeyless::GatewayUpdateRemoteAccessRdpRecordings](docs/GatewayUpdateRemoteAccessRdpRecordings.md)
|
1204
1207
|
- [Akeyless::GatewayUpdateTlsCert](docs/GatewayUpdateTlsCert.md)
|
1205
1208
|
- [Akeyless::GatewayUpdateTlsCertOutput](docs/GatewayUpdateTlsCertOutput.md)
|
@@ -1498,6 +1501,7 @@ Class | Method | HTTP request | Description
|
|
1498
1501
|
- [Akeyless::SignRsaSsaPssOutput](docs/SignRsaSsaPssOutput.md)
|
1499
1502
|
- [Akeyless::SmInfo](docs/SmInfo.md)
|
1500
1503
|
- [Akeyless::SplunkLogForwardingConfig](docs/SplunkLogForwardingConfig.md)
|
1504
|
+
- [Akeyless::SraDesktopAppConf](docs/SraDesktopAppConf.md)
|
1501
1505
|
- [Akeyless::SraInfo](docs/SraInfo.md)
|
1502
1506
|
- [Akeyless::SraSessionEntryOut](docs/SraSessionEntryOut.md)
|
1503
1507
|
- [Akeyless::SshBastionConf](docs/SshBastionConf.md)
|
@@ -4,8 +4,8 @@
|
|
4
4
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
|
-
| **api_gateway_url** | **String** | | [optional] |
|
8
7
|
| **cluster_id** | **String** | | [optional] |
|
8
|
+
| **desktop_app** | [**SraDesktopAppConf**](SraDesktopAppConf.md) | | [optional] |
|
9
9
|
| **gator_cluster_id** | **Integer** | | [optional] |
|
10
10
|
| **global** | [**BastionGlobalConf**](BastionGlobalConf.md) | | [optional] |
|
11
11
|
| **ssh_bastion** | [**SshBastionConf**](SshBastionConf.md) | | [optional] |
|
@@ -17,8 +17,8 @@
|
|
17
17
|
require 'akeyless'
|
18
18
|
|
19
19
|
instance = Akeyless::BastionConfigReplyObj.new(
|
20
|
-
api_gateway_url: null,
|
21
20
|
cluster_id: null,
|
21
|
+
desktop_app: null,
|
22
22
|
gator_cluster_id: null,
|
23
23
|
global: null,
|
24
24
|
ssh_bastion: null,
|
data/docs/Connect.md
CHANGED
@@ -26,7 +26,7 @@
|
|
26
26
|
| **target** | **String** | The target | [optional] |
|
27
27
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
28
28
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
29
|
-
| **use_ssh_agent** | **Boolean** |
|
29
|
+
| **use_ssh_agent** | **Boolean** | Deprecated | [optional] |
|
30
30
|
| **via_bastion** | **String** | Deprecated. Use via-sra | [optional] |
|
31
31
|
| **via_sra** | **String** | The jump box server | [optional] |
|
32
32
|
|
data/docs/CreateUSC.md
CHANGED
@@ -14,6 +14,8 @@
|
|
14
14
|
| **target_to_associate** | **String** | Target Universal Secrets Connector to connect | |
|
15
15
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
16
16
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
17
|
+
| **usc_prefix** | **String** | Prefix for all secrets created in AWS Secrets Manager | [optional] |
|
18
|
+
| **use_prefix_as_filter** | **String** | Whether to filter the USC secret list using the specified usc-prefix [true/false] | [optional][default to 'false'] |
|
17
19
|
|
18
20
|
## Example
|
19
21
|
|
@@ -30,7 +32,9 @@ instance = Akeyless::CreateUSC.new(
|
|
30
32
|
tags: null,
|
31
33
|
target_to_associate: null,
|
32
34
|
token: null,
|
33
|
-
uid_token: null
|
35
|
+
uid_token: null,
|
36
|
+
usc_prefix: null,
|
37
|
+
use_prefix_as_filter: null
|
34
38
|
)
|
35
39
|
```
|
36
40
|
|
@@ -0,0 +1,24 @@
|
|
1
|
+
# Akeyless::DesktopAppConf
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **default_cert_issuer_id** | **Integer** | | [optional] |
|
8
|
+
| **default_cert_issuer_name** | **String** | | [optional] |
|
9
|
+
| **secure_web_access_url** | **String** | | [optional] |
|
10
|
+
| **secure_web_proxy_url** | **String** | | [optional] |
|
11
|
+
|
12
|
+
## Example
|
13
|
+
|
14
|
+
```ruby
|
15
|
+
require 'akeyless'
|
16
|
+
|
17
|
+
instance = Akeyless::DesktopAppConf.new(
|
18
|
+
default_cert_issuer_id: null,
|
19
|
+
default_cert_issuer_name: null,
|
20
|
+
secure_web_access_url: null,
|
21
|
+
secure_web_proxy_url: null
|
22
|
+
)
|
23
|
+
```
|
24
|
+
|
@@ -19,6 +19,8 @@
|
|
19
19
|
| **name** | **String** | Dynamic secret name | |
|
20
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
21
21
|
| **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
|
22
|
+
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
23
|
+
| **secure_access_certificate_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Secure Access | [optional] |
|
22
24
|
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
23
25
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
24
26
|
| **secure_access_host** | **Array<String>** | Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) | [optional] |
|
@@ -55,6 +57,8 @@ instance = Akeyless::DynamicSecretCreateLdap.new(
|
|
55
57
|
name: null,
|
56
58
|
password_length: null,
|
57
59
|
producer_encryption_key_name: null,
|
60
|
+
secure_access_bastion_issuer: null,
|
61
|
+
secure_access_certificate_issuer: null,
|
58
62
|
secure_access_delay: null,
|
59
63
|
secure_access_enable: null,
|
60
64
|
secure_access_host: null,
|
@@ -19,6 +19,8 @@
|
|
19
19
|
| **rdp_host_port** | **String** | Port | [optional][default to '22'] |
|
20
20
|
| **rdp_user_groups** | **String** | Groups | [optional] |
|
21
21
|
| **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
|
22
|
+
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
23
|
+
| **secure_access_certificate_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Secure Access | [optional] |
|
22
24
|
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
23
25
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
24
26
|
| **secure_access_host** | **Array<String>** | Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) | [optional] |
|
@@ -53,6 +55,8 @@ instance = Akeyless::DynamicSecretCreateRdp.new(
|
|
53
55
|
rdp_host_port: null,
|
54
56
|
rdp_user_groups: null,
|
55
57
|
secure_access_allow_external_user: null,
|
58
|
+
secure_access_bastion_issuer: null,
|
59
|
+
secure_access_certificate_issuer: null,
|
56
60
|
secure_access_delay: null,
|
57
61
|
secure_access_enable: null,
|
58
62
|
secure_access_host: null,
|
@@ -20,6 +20,8 @@
|
|
20
20
|
| **new_name** | **String** | Dynamic secret name | [optional] |
|
21
21
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
22
22
|
| **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
|
23
|
+
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
24
|
+
| **secure_access_certificate_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Secure Access | [optional] |
|
23
25
|
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
24
26
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
25
27
|
| **secure_access_host** | **Array<String>** | Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) | [optional] |
|
@@ -57,6 +59,8 @@ instance = Akeyless::DynamicSecretUpdateLdap.new(
|
|
57
59
|
new_name: null,
|
58
60
|
password_length: null,
|
59
61
|
producer_encryption_key_name: null,
|
62
|
+
secure_access_bastion_issuer: null,
|
63
|
+
secure_access_certificate_issuer: null,
|
60
64
|
secure_access_delay: null,
|
61
65
|
secure_access_enable: null,
|
62
66
|
secure_access_host: null,
|
@@ -20,6 +20,8 @@
|
|
20
20
|
| **rdp_host_port** | **String** | Port | [optional][default to '22'] |
|
21
21
|
| **rdp_user_groups** | **String** | Groups | [optional] |
|
22
22
|
| **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
|
23
|
+
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
24
|
+
| **secure_access_certificate_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Secure Access | [optional] |
|
23
25
|
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
24
26
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
25
27
|
| **secure_access_host** | **Array<String>** | Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) | [optional] |
|
@@ -55,6 +57,8 @@ instance = Akeyless::DynamicSecretUpdateRdp.new(
|
|
55
57
|
rdp_host_port: null,
|
56
58
|
rdp_user_groups: null,
|
57
59
|
secure_access_allow_external_user: null,
|
60
|
+
secure_access_bastion_issuer: null,
|
61
|
+
secure_access_certificate_issuer: null,
|
58
62
|
secure_access_delay: null,
|
59
63
|
secure_access_enable: null,
|
60
64
|
secure_access_host: null,
|
@@ -18,6 +18,8 @@
|
|
18
18
|
| **name** | **String** | Dynamic secret name | |
|
19
19
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
20
20
|
| **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
|
21
|
+
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
22
|
+
| **secure_access_certificate_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Secure Access | [optional] |
|
21
23
|
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
22
24
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
23
25
|
| **secure_access_host** | **Array<String>** | Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) | [optional] |
|
@@ -53,6 +55,8 @@ instance = Akeyless::GatewayCreateProducerLdap.new(
|
|
53
55
|
name: null,
|
54
56
|
password_length: null,
|
55
57
|
producer_encryption_key_name: null,
|
58
|
+
secure_access_bastion_issuer: null,
|
59
|
+
secure_access_certificate_issuer: null,
|
56
60
|
secure_access_delay: null,
|
57
61
|
secure_access_enable: null,
|
58
62
|
secure_access_host: null,
|
@@ -18,6 +18,8 @@
|
|
18
18
|
| **rdp_host_port** | **String** | Port | [optional][default to '22'] |
|
19
19
|
| **rdp_user_groups** | **String** | Groups | [optional] |
|
20
20
|
| **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
|
21
|
+
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
22
|
+
| **secure_access_certificate_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Secure Access | [optional] |
|
21
23
|
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
22
24
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
23
25
|
| **secure_access_host** | **Array<String>** | Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) | [optional] |
|
@@ -51,6 +53,8 @@ instance = Akeyless::GatewayCreateProducerRdp.new(
|
|
51
53
|
rdp_host_port: null,
|
52
54
|
rdp_user_groups: null,
|
53
55
|
secure_access_allow_external_user: null,
|
56
|
+
secure_access_bastion_issuer: null,
|
57
|
+
secure_access_certificate_issuer: null,
|
54
58
|
secure_access_delay: null,
|
55
59
|
secure_access_enable: null,
|
56
60
|
secure_access_host: null,
|
@@ -0,0 +1,24 @@
|
|
1
|
+
# Akeyless::GatewayDetailsForItemReplyObj
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **cluster_name** | **String** | | [optional] |
|
8
|
+
| **cluster_url** | **String** | | [optional] |
|
9
|
+
| **desktop_app** | [**DesktopAppConf**](DesktopAppConf.md) | | [optional] |
|
10
|
+
| **is_cluster_available** | **Boolean** | | [optional] |
|
11
|
+
|
12
|
+
## Example
|
13
|
+
|
14
|
+
```ruby
|
15
|
+
require 'akeyless'
|
16
|
+
|
17
|
+
instance = Akeyless::GatewayDetailsForItemReplyObj.new(
|
18
|
+
cluster_name: null,
|
19
|
+
cluster_url: null,
|
20
|
+
desktop_app: null,
|
21
|
+
is_cluster_available: null
|
22
|
+
)
|
23
|
+
```
|
24
|
+
|
@@ -19,6 +19,8 @@
|
|
19
19
|
| **new_name** | **String** | Dynamic secret name | [optional] |
|
20
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
21
21
|
| **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
|
22
|
+
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
23
|
+
| **secure_access_certificate_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Secure Access | [optional] |
|
22
24
|
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
23
25
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
24
26
|
| **secure_access_host** | **Array<String>** | Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) | [optional] |
|
@@ -55,6 +57,8 @@ instance = Akeyless::GatewayUpdateProducerLdap.new(
|
|
55
57
|
new_name: null,
|
56
58
|
password_length: null,
|
57
59
|
producer_encryption_key_name: null,
|
60
|
+
secure_access_bastion_issuer: null,
|
61
|
+
secure_access_certificate_issuer: null,
|
58
62
|
secure_access_delay: null,
|
59
63
|
secure_access_enable: null,
|
60
64
|
secure_access_host: null,
|
@@ -19,6 +19,8 @@
|
|
19
19
|
| **rdp_host_port** | **String** | Port | [optional][default to '22'] |
|
20
20
|
| **rdp_user_groups** | **String** | Groups | [optional] |
|
21
21
|
| **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
|
22
|
+
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
23
|
+
| **secure_access_certificate_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Secure Access | [optional] |
|
22
24
|
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
23
25
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
24
26
|
| **secure_access_host** | **Array<String>** | Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) | [optional] |
|
@@ -53,6 +55,8 @@ instance = Akeyless::GatewayUpdateProducerRdp.new(
|
|
53
55
|
rdp_host_port: null,
|
54
56
|
rdp_user_groups: null,
|
55
57
|
secure_access_allow_external_user: null,
|
58
|
+
secure_access_bastion_issuer: null,
|
59
|
+
secure_access_certificate_issuer: null,
|
56
60
|
secure_access_delay: null,
|
57
61
|
secure_access_enable: null,
|
58
62
|
secure_access_host: null,
|
@@ -0,0 +1,28 @@
|
|
1
|
+
# Akeyless::GatewayUpdateRemoteAccessDesktopApp
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **desktop_app_secure_web_access_url** | **String** | | [optional] |
|
8
|
+
| **desktop_app_secure_web_proxy** | **String** | | [optional] |
|
9
|
+
| **desktop_app_ssh_cert_issuer** | **String** | | [optional] |
|
10
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
11
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
12
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
13
|
+
|
14
|
+
## Example
|
15
|
+
|
16
|
+
```ruby
|
17
|
+
require 'akeyless'
|
18
|
+
|
19
|
+
instance = Akeyless::GatewayUpdateRemoteAccessDesktopApp.new(
|
20
|
+
desktop_app_secure_web_access_url: null,
|
21
|
+
desktop_app_secure_web_proxy: null,
|
22
|
+
desktop_app_ssh_cert_issuer: null,
|
23
|
+
json: null,
|
24
|
+
token: null,
|
25
|
+
uid_token: null
|
26
|
+
)
|
27
|
+
```
|
28
|
+
|
data/docs/Item.md
CHANGED
@@ -18,7 +18,7 @@
|
|
18
18
|
| **delete_protection** | **Boolean** | | [optional] |
|
19
19
|
| **deletion_date** | **Time** | | [optional] |
|
20
20
|
| **display_id** | **String** | | [optional] |
|
21
|
-
| **gateway_details** | [**Array<
|
21
|
+
| **gateway_details** | [**Array<GatewayDetailsForItemReplyObj>**](GatewayDetailsForItemReplyObj.md) | | [optional] |
|
22
22
|
| **is_access_request_enabled** | **Boolean** | | [optional] |
|
23
23
|
| **is_enabled** | **Boolean** | | [optional] |
|
24
24
|
| **item_accessibility** | **Integer** | | [optional] |
|
@@ -22,6 +22,8 @@
|
|
22
22
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
23
23
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
24
24
|
| **rotator_type** | **String** | The rotator type. options: [target/ldap] | |
|
25
|
+
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
26
|
+
| **secure_access_certificate_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Secure Access | [optional] |
|
25
27
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
26
28
|
| **secure_access_host** | **Array<String>** | Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) | [optional] |
|
27
29
|
| **secure_access_rdp_domain** | **String** | Default domain name server. i.e. microsoft.com | [optional] |
|
@@ -61,6 +63,8 @@ instance = Akeyless::RotatedSecretCreateLdap.new(
|
|
61
63
|
rotation_hour: null,
|
62
64
|
rotation_interval: null,
|
63
65
|
rotator_type: null,
|
66
|
+
secure_access_bastion_issuer: null,
|
67
|
+
secure_access_certificate_issuer: null,
|
64
68
|
secure_access_enable: null,
|
65
69
|
secure_access_host: null,
|
66
70
|
secure_access_rdp_domain: null,
|
@@ -30,6 +30,7 @@
|
|
30
30
|
| **secure_access_rdp_domain** | **String** | Default domain name server. i.e. microsoft.com | [optional] |
|
31
31
|
| **secure_access_rdp_user** | **String** | Override the RDP Domain username | [optional] |
|
32
32
|
| **secure_access_ssh_user** | **String** | Override the SSH username as indicated in SSH Certificate Issuer | [optional] |
|
33
|
+
| **secure_access_target_type** | **String** | Specify target type. Options are ssh or rdp | [optional][default to 'false'] |
|
33
34
|
| **tags** | **Array<String>** | Add tags attached to this object | [optional] |
|
34
35
|
| **target_name** | **String** | Target name | |
|
35
36
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -67,6 +68,7 @@ instance = Akeyless::RotatedSecretCreateSsh.new(
|
|
67
68
|
secure_access_rdp_domain: null,
|
68
69
|
secure_access_rdp_user: null,
|
69
70
|
secure_access_ssh_user: null,
|
71
|
+
secure_access_target_type: null,
|
70
72
|
tags: null,
|
71
73
|
target_name: null,
|
72
74
|
token: null,
|
@@ -22,6 +22,8 @@
|
|
22
22
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
23
23
|
| **same_password** | **String** | Rotate same password for each host from the Linked Target (relevant only for Linked Target) | [optional] |
|
24
24
|
| **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
|
25
|
+
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
26
|
+
| **secure_access_certificate_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Secure Access | [optional] |
|
25
27
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
26
28
|
| **secure_access_host** | **Array<String>** | Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) | [optional] |
|
27
29
|
| **secure_access_rdp_domain** | **String** | Default domain name server. i.e. microsoft.com | [optional] |
|
@@ -55,6 +57,8 @@ instance = Akeyless::RotatedSecretCreateWindows.new(
|
|
55
57
|
rotator_type: null,
|
56
58
|
same_password: null,
|
57
59
|
secure_access_allow_external_user: null,
|
60
|
+
secure_access_bastion_issuer: null,
|
61
|
+
secure_access_certificate_issuer: null,
|
58
62
|
secure_access_enable: null,
|
59
63
|
secure_access_host: null,
|
60
64
|
secure_access_rdp_domain: null,
|
@@ -25,6 +25,8 @@
|
|
25
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
26
26
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
27
27
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
28
|
+
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
29
|
+
| **secure_access_certificate_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Secure Access | [optional] |
|
28
30
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
29
31
|
| **secure_access_host** | **Array<String>** | Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) | [optional] |
|
30
32
|
| **secure_access_rdp_domain** | **String** | Default domain name server. i.e. microsoft.com | [optional] |
|
@@ -65,6 +67,8 @@ instance = Akeyless::RotatedSecretUpdateLdap.new(
|
|
65
67
|
rotation_event_in: null,
|
66
68
|
rotation_hour: null,
|
67
69
|
rotation_interval: null,
|
70
|
+
secure_access_bastion_issuer: null,
|
71
|
+
secure_access_certificate_issuer: null,
|
68
72
|
secure_access_enable: null,
|
69
73
|
secure_access_host: null,
|
70
74
|
secure_access_rdp_domain: null,
|
@@ -34,6 +34,7 @@
|
|
34
34
|
| **secure_access_rdp_domain** | **String** | Default domain name server. i.e. microsoft.com | [optional] |
|
35
35
|
| **secure_access_rdp_user** | **String** | Override the RDP Domain username | [optional] |
|
36
36
|
| **secure_access_ssh_user** | **String** | Override the SSH username as indicated in SSH Certificate Issuer | [optional] |
|
37
|
+
| **secure_access_target_type** | **String** | Specify target type. Options are ssh or rdp | [optional][default to 'false'] |
|
37
38
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
38
39
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
39
40
|
|
@@ -73,6 +74,7 @@ instance = Akeyless::RotatedSecretUpdateSsh.new(
|
|
73
74
|
secure_access_rdp_domain: null,
|
74
75
|
secure_access_rdp_user: null,
|
75
76
|
secure_access_ssh_user: null,
|
77
|
+
secure_access_target_type: null,
|
76
78
|
token: null,
|
77
79
|
uid_token: null
|
78
80
|
)
|
@@ -26,6 +26,8 @@
|
|
26
26
|
| **rotator_type** | **String** | The rotator type. options: [target/password] | |
|
27
27
|
| **same_password** | **String** | Rotate same password for each host from the Linked Target (relevant only for Linked Target) | [optional] |
|
28
28
|
| **secure_access_allow_external_user** | **Boolean** | Allow providing external user for a domain users | [optional][default to false] |
|
29
|
+
| **secure_access_bastion_issuer** | **String** | Deprecated. use secure-access-certificate-issuer | [optional] |
|
30
|
+
| **secure_access_certificate_issuer** | **String** | Path to the SSH Certificate Issuer for your Akeyless Secure Access | [optional] |
|
29
31
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
30
32
|
| **secure_access_host** | **Array<String>** | Target servers for connections (In case of Linked Target association, host(s) will inherit Linked Target hosts - Relevant only for Dynamic Secrets/producers) | [optional] |
|
31
33
|
| **secure_access_rdp_domain** | **String** | Default domain name server. i.e. microsoft.com | [optional] |
|
@@ -61,6 +63,8 @@ instance = Akeyless::RotatedSecretUpdateWindows.new(
|
|
61
63
|
rotator_type: null,
|
62
64
|
same_password: null,
|
63
65
|
secure_access_allow_external_user: null,
|
66
|
+
secure_access_bastion_issuer: null,
|
67
|
+
secure_access_certificate_issuer: null,
|
64
68
|
secure_access_enable: null,
|
65
69
|
secure_access_host: null,
|
66
70
|
secure_access_rdp_domain: null,
|
data/docs/SecretInfo.md
CHANGED
@@ -13,6 +13,7 @@
|
|
13
13
|
| **secret_id** | **String** | | [optional] |
|
14
14
|
| **status** | **Boolean** | | [optional] |
|
15
15
|
| **tags** | **Hash<String, String>** | | [optional] |
|
16
|
+
| **thumbprint** | **String** | | [optional] |
|
16
17
|
| **type** | **String** | | [optional] |
|
17
18
|
| **version** | **Integer** | | [optional] |
|
18
19
|
|
@@ -31,6 +32,7 @@ instance = Akeyless::SecretInfo.new(
|
|
31
32
|
secret_id: null,
|
32
33
|
status: null,
|
33
34
|
tags: null,
|
35
|
+
thumbprint: null,
|
34
36
|
type: null,
|
35
37
|
version: null
|
36
38
|
)
|
data/docs/SecureRemoteAccess.md
CHANGED
@@ -25,6 +25,7 @@
|
|
25
25
|
| **host** | **Array<String>** | | [optional] |
|
26
26
|
| **host_provider_type** | **String** | | [optional] |
|
27
27
|
| **is_cli** | **Boolean** | | [optional] |
|
28
|
+
| **is_desktop_app** | **Boolean** | | [optional] |
|
28
29
|
| **is_web** | **Boolean** | | [optional] |
|
29
30
|
| **isolated** | **Boolean** | | [optional] |
|
30
31
|
| **native** | **Boolean** | | [optional] |
|
@@ -70,6 +71,7 @@ instance = Akeyless::SecureRemoteAccess.new(
|
|
70
71
|
host: null,
|
71
72
|
host_provider_type: null,
|
72
73
|
is_cli: null,
|
74
|
+
is_desktop_app: null,
|
73
75
|
is_web: null,
|
74
76
|
isolated: null,
|
75
77
|
native: null,
|
@@ -0,0 +1,22 @@
|
|
1
|
+
# Akeyless::SraDesktopAppConf
|
2
|
+
|
3
|
+
## Properties
|
4
|
+
|
5
|
+
| Name | Type | Description | Notes |
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
7
|
+
| **default_cert_issuer_id** | **Integer** | | [optional] |
|
8
|
+
| **secure_web_access_url** | **String** | | [optional] |
|
9
|
+
| **secure_web_proxy_url** | **String** | | [optional] |
|
10
|
+
|
11
|
+
## Example
|
12
|
+
|
13
|
+
```ruby
|
14
|
+
require 'akeyless'
|
15
|
+
|
16
|
+
instance = Akeyless::SraDesktopAppConf.new(
|
17
|
+
default_cert_issuer_id: null,
|
18
|
+
secure_web_access_url: null,
|
19
|
+
secure_web_proxy_url: null
|
20
|
+
)
|
21
|
+
```
|
22
|
+
|
data/docs/UscCreate.md
CHANGED
@@ -8,6 +8,7 @@
|
|
8
8
|
| **description** | **String** | Description of the universal secrets | [optional] |
|
9
9
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
10
10
|
| **namespace** | **String** | The namespace (relevant for Hashi vault target) | [optional] |
|
11
|
+
| **object_type** | **String** | | [optional] |
|
11
12
|
| **secret_name** | **String** | Name for the new universal secrets | |
|
12
13
|
| **tags** | **Hash<String, String>** | Tags for the universal secrets | [optional] |
|
13
14
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
@@ -25,6 +26,7 @@ instance = Akeyless::UscCreate.new(
|
|
25
26
|
description: null,
|
26
27
|
json: null,
|
27
28
|
namespace: null,
|
29
|
+
object_type: null,
|
28
30
|
secret_name: null,
|
29
31
|
tags: null,
|
30
32
|
token: null,
|
data/docs/UscList.md
CHANGED
@@ -5,6 +5,7 @@
|
|
5
5
|
| Name | Type | Description | Notes |
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
7
7
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
8
|
+
| **object_type** | **String** | | [optional] |
|
8
9
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
9
10
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
10
11
|
| **usc_name** | **String** | Name of the Universal Secrets Connector item | |
|
@@ -16,6 +17,7 @@ require 'akeyless'
|
|
16
17
|
|
17
18
|
instance = Akeyless::UscList.new(
|
18
19
|
json: null,
|
20
|
+
object_type: null,
|
19
21
|
token: null,
|
20
22
|
uid_token: null,
|
21
23
|
usc_name: null
|
data/docs/V2Api.md
CHANGED
@@ -309,6 +309,7 @@ All URIs are relative to *https://api.akeyless.io*
|
|
309
309
|
| [**gateway_update_producer_snowflake**](V2Api.md#gateway_update_producer_snowflake) | **POST** /gateway-update-producer-snowflake | |
|
310
310
|
| [**gateway_update_producer_venafi**](V2Api.md#gateway_update_producer_venafi) | **POST** /gateway-update-producer-certificate-automation | |
|
311
311
|
| [**gateway_update_remote_access**](V2Api.md#gateway_update_remote_access) | **POST** /gateway-update-remote-access | |
|
312
|
+
| [**gateway_update_remote_access_desktop_app**](V2Api.md#gateway_update_remote_access_desktop_app) | **POST** /gateway-update-remote-access-desktop-app | |
|
312
313
|
| [**gateway_update_remote_access_rdp_recordings**](V2Api.md#gateway_update_remote_access_rdp_recordings) | **POST** /gateway-update-remote-access-rdp-recording | |
|
313
314
|
| [**gateway_update_tls_cert**](V2Api.md#gateway_update_tls_cert) | **POST** /gateway-update-tls-cert | |
|
314
315
|
| [**gateway_update_tmp_users**](V2Api.md#gateway_update_tmp_users) | **POST** /gateway-update-producer-tmp-creds | |
|
@@ -19491,6 +19492,68 @@ No authorization required
|
|
19491
19492
|
- **Accept**: application/json
|
19492
19493
|
|
19493
19494
|
|
19495
|
+
## gateway_update_remote_access_desktop_app
|
19496
|
+
|
19497
|
+
> Object gateway_update_remote_access_desktop_app(gateway_update_remote_access_desktop_app)
|
19498
|
+
|
19499
|
+
|
19500
|
+
|
19501
|
+
### Examples
|
19502
|
+
|
19503
|
+
```ruby
|
19504
|
+
require 'time'
|
19505
|
+
require 'akeyless'
|
19506
|
+
|
19507
|
+
api_instance = Akeyless::V2Api.new
|
19508
|
+
gateway_update_remote_access_desktop_app = Akeyless::GatewayUpdateRemoteAccessDesktopApp.new # GatewayUpdateRemoteAccessDesktopApp |
|
19509
|
+
|
19510
|
+
begin
|
19511
|
+
|
19512
|
+
result = api_instance.gateway_update_remote_access_desktop_app(gateway_update_remote_access_desktop_app)
|
19513
|
+
p result
|
19514
|
+
rescue Akeyless::ApiError => e
|
19515
|
+
puts "Error when calling V2Api->gateway_update_remote_access_desktop_app: #{e}"
|
19516
|
+
end
|
19517
|
+
```
|
19518
|
+
|
19519
|
+
#### Using the gateway_update_remote_access_desktop_app_with_http_info variant
|
19520
|
+
|
19521
|
+
This returns an Array which contains the response data, status code and headers.
|
19522
|
+
|
19523
|
+
> <Array(Object, Integer, Hash)> gateway_update_remote_access_desktop_app_with_http_info(gateway_update_remote_access_desktop_app)
|
19524
|
+
|
19525
|
+
```ruby
|
19526
|
+
begin
|
19527
|
+
|
19528
|
+
data, status_code, headers = api_instance.gateway_update_remote_access_desktop_app_with_http_info(gateway_update_remote_access_desktop_app)
|
19529
|
+
p status_code # => 2xx
|
19530
|
+
p headers # => { ... }
|
19531
|
+
p data # => Object
|
19532
|
+
rescue Akeyless::ApiError => e
|
19533
|
+
puts "Error when calling V2Api->gateway_update_remote_access_desktop_app_with_http_info: #{e}"
|
19534
|
+
end
|
19535
|
+
```
|
19536
|
+
|
19537
|
+
### Parameters
|
19538
|
+
|
19539
|
+
| Name | Type | Description | Notes |
|
19540
|
+
| ---- | ---- | ----------- | ----- |
|
19541
|
+
| **gateway_update_remote_access_desktop_app** | [**GatewayUpdateRemoteAccessDesktopApp**](GatewayUpdateRemoteAccessDesktopApp.md) | | |
|
19542
|
+
|
19543
|
+
### Return type
|
19544
|
+
|
19545
|
+
**Object**
|
19546
|
+
|
19547
|
+
### Authorization
|
19548
|
+
|
19549
|
+
No authorization required
|
19550
|
+
|
19551
|
+
### HTTP request headers
|
19552
|
+
|
19553
|
+
- **Content-Type**: application/json
|
19554
|
+
- **Accept**: application/json
|
19555
|
+
|
19556
|
+
|
19494
19557
|
## gateway_update_remote_access_rdp_recordings
|
19495
19558
|
|
19496
19559
|
> Object gateway_update_remote_access_rdp_recordings(gateway_update_remote_access_rdp_recordings)
|