akeyless 5.0.14 → 5.0.16
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +6 -1
- data/docs/AccountGeneralSettings.md +2 -0
- data/docs/ActiveDirectoryPayload.md +2 -0
- data/docs/AllowedClientType.md +20 -0
- data/docs/AuthMethodAccessInfo.md +2 -0
- data/docs/AuthMethodCreateApiKey.md +2 -0
- data/docs/AuthMethodCreateAwsIam.md +2 -0
- data/docs/AuthMethodCreateAzureAD.md +2 -0
- data/docs/AuthMethodCreateCert.md +2 -0
- data/docs/AuthMethodCreateEmail.md +2 -0
- data/docs/AuthMethodCreateGcp.md +2 -0
- data/docs/AuthMethodCreateK8s.md +2 -0
- data/docs/AuthMethodCreateKerberos.md +2 -0
- data/docs/AuthMethodCreateLdap.md +2 -0
- data/docs/AuthMethodCreateOCI.md +2 -0
- data/docs/AuthMethodCreateOIDC.md +2 -0
- data/docs/AuthMethodCreateOauth2.md +2 -0
- data/docs/AuthMethodCreateSAML.md +2 -0
- data/docs/AuthMethodCreateUniversalIdentity.md +2 -0
- data/docs/AuthMethodUpdateApiKey.md +2 -0
- data/docs/AuthMethodUpdateAwsIam.md +2 -0
- data/docs/AuthMethodUpdateAzureAD.md +2 -0
- data/docs/AuthMethodUpdateCert.md +2 -0
- data/docs/AuthMethodUpdateEmail.md +2 -0
- data/docs/AuthMethodUpdateGcp.md +2 -0
- data/docs/AuthMethodUpdateK8s.md +2 -0
- data/docs/AuthMethodUpdateKerberos.md +2 -0
- data/docs/AuthMethodUpdateLdap.md +2 -0
- data/docs/AuthMethodUpdateOCI.md +2 -0
- data/docs/AuthMethodUpdateOIDC.md +2 -0
- data/docs/AuthMethodUpdateOauth2.md +2 -0
- data/docs/AuthMethodUpdateSAML.md +2 -0
- data/docs/AuthMethodUpdateUniversalIdentity.md +2 -0
- data/docs/BastionGlobalConf.md +4 -0
- data/docs/CreateAuthMethod.md +2 -0
- data/docs/CreateAuthMethodAWSIAM.md +2 -0
- data/docs/CreateAuthMethodAzureAD.md +2 -0
- data/docs/CreateAuthMethodCert.md +2 -0
- data/docs/CreateAuthMethodEmail.md +2 -0
- data/docs/CreateAuthMethodGCP.md +2 -0
- data/docs/CreateAuthMethodHuawei.md +2 -0
- data/docs/CreateAuthMethodK8S.md +2 -0
- data/docs/CreateAuthMethodLDAP.md +2 -0
- data/docs/CreateAuthMethodOAuth2.md +2 -0
- data/docs/CreateAuthMethodOCI.md +2 -0
- data/docs/CreateAuthMethodOIDC.md +2 -0
- data/docs/CreateAuthMethodSAML.md +2 -0
- data/docs/CreateAuthMethodUniversalIdentity.md +2 -0
- data/docs/CreatePKICertIssuer.md +6 -0
- data/docs/DSProducerDetails.md +10 -0
- data/docs/DynamicSecretCreateGcp.md +22 -6
- data/docs/DynamicSecretCreateGoogleWorkspace.md +2 -0
- data/docs/DynamicSecretCreateMongoDb.md +2 -0
- data/docs/DynamicSecretCreateMsSql.md +2 -0
- data/docs/DynamicSecretGetValue.md +2 -0
- data/docs/DynamicSecretUpdateGcp.md +22 -6
- data/docs/DynamicSecretUpdateGoogleWorkspace.md +2 -0
- data/docs/DynamicSecretUpdateMongoDb.md +2 -0
- data/docs/DynamicSecretUpdateMsSql.md +2 -0
- data/docs/EventForwarderGetOutput.md +3 -1
- data/docs/GatewayCreateMigration.md +2 -0
- data/docs/GatewayCreateProducerGcp.md +22 -6
- data/docs/GatewayCreateProducerMSSQL.md +2 -0
- data/docs/GatewayCreateProducerMongo.md +2 -0
- data/docs/GatewayUpdateMigration.md +2 -0
- data/docs/GatewayUpdateProducerGcp.md +22 -6
- data/docs/GatewayUpdateProducerMSSQL.md +2 -0
- data/docs/GatewayUpdateProducerMongo.md +2 -0
- data/docs/GatewayUpdateRemoteAccess.md +4 -0
- data/docs/GetDynamicSecretValue.md +2 -0
- data/docs/NotiForwarderDetailsInput.md +28 -0
- data/docs/PKICertificateIssueDetails.md +6 -0
- data/docs/RotatedSecretCreateSsh.md +4 -0
- data/docs/RotatedSecretDeleteSync.md +2 -0
- data/docs/RotatedSecretDetailsInfo.md +4 -0
- data/docs/RotatedSecretUpdateSsh.md +4 -0
- data/docs/SlackNotiForwarderDetails.md +18 -0
- data/docs/StaticSecretDeleteSync.md +2 -0
- data/docs/TeamsNotiForwarderDetails.md +18 -0
- data/docs/UpdateAccountSettings.md +4 -0
- data/docs/UpdateAuthMethod.md +2 -0
- data/docs/UpdateAuthMethodAWSIAM.md +2 -0
- data/docs/UpdateAuthMethodAzureAD.md +2 -0
- data/docs/UpdateAuthMethodCert.md +2 -0
- data/docs/UpdateAuthMethodGCP.md +2 -0
- data/docs/UpdateAuthMethodK8S.md +2 -0
- data/docs/UpdateAuthMethodLDAP.md +2 -0
- data/docs/UpdateAuthMethodOAuth2.md +2 -0
- data/docs/UpdateAuthMethodOCI.md +2 -0
- data/docs/UpdateAuthMethodOIDC.md +2 -0
- data/docs/UpdateAuthMethodSAML.md +2 -0
- data/docs/UpdateAuthMethodUniversalIdentity.md +2 -0
- data/docs/UpdatePKICertIssuer.md +6 -0
- data/docs/V2Api.md +4 -4
- data/docs/WebhookNotiForwarderDetails.md +26 -0
- data/docs/WindowsServiceAttributes.md +4 -0
- data/lib/akeyless/models/account_general_settings.rb +10 -1
- data/lib/akeyless/models/active_directory_payload.rb +10 -1
- data/lib/akeyless/models/allowed_client_type.rb +225 -0
- data/lib/akeyless/models/auth_method_access_info.rb +12 -1
- data/lib/akeyless/models/auth_method_create_api_key.rb +12 -1
- data/lib/akeyless/models/auth_method_create_aws_iam.rb +12 -1
- data/lib/akeyless/models/auth_method_create_azure_ad.rb +12 -1
- data/lib/akeyless/models/auth_method_create_cert.rb +12 -1
- data/lib/akeyless/models/auth_method_create_email.rb +12 -1
- data/lib/akeyless/models/auth_method_create_gcp.rb +12 -1
- data/lib/akeyless/models/auth_method_create_k8s.rb +12 -1
- data/lib/akeyless/models/auth_method_create_kerberos.rb +12 -1
- data/lib/akeyless/models/auth_method_create_ldap.rb +12 -1
- data/lib/akeyless/models/auth_method_create_oauth2.rb +12 -1
- data/lib/akeyless/models/auth_method_create_oci.rb +12 -1
- data/lib/akeyless/models/auth_method_create_oidc.rb +12 -1
- data/lib/akeyless/models/auth_method_create_saml.rb +12 -1
- data/lib/akeyless/models/auth_method_create_universal_identity.rb +12 -1
- data/lib/akeyless/models/auth_method_update_api_key.rb +12 -1
- data/lib/akeyless/models/auth_method_update_aws_iam.rb +12 -1
- data/lib/akeyless/models/auth_method_update_azure_ad.rb +12 -1
- data/lib/akeyless/models/auth_method_update_cert.rb +12 -1
- data/lib/akeyless/models/auth_method_update_email.rb +12 -1
- data/lib/akeyless/models/auth_method_update_gcp.rb +12 -1
- data/lib/akeyless/models/auth_method_update_k8s.rb +12 -1
- data/lib/akeyless/models/auth_method_update_kerberos.rb +12 -1
- data/lib/akeyless/models/auth_method_update_ldap.rb +12 -1
- data/lib/akeyless/models/auth_method_update_oauth2.rb +12 -1
- data/lib/akeyless/models/auth_method_update_oci.rb +12 -1
- data/lib/akeyless/models/auth_method_update_oidc.rb +12 -1
- data/lib/akeyless/models/auth_method_update_saml.rb +12 -1
- data/lib/akeyless/models/auth_method_update_universal_identity.rb +12 -1
- data/lib/akeyless/models/bastion_global_conf.rb +19 -1
- data/lib/akeyless/models/create_auth_method.rb +12 -1
- data/lib/akeyless/models/create_auth_method_awsiam.rb +12 -1
- data/lib/akeyless/models/create_auth_method_azure_ad.rb +12 -1
- data/lib/akeyless/models/create_auth_method_cert.rb +12 -1
- data/lib/akeyless/models/create_auth_method_email.rb +12 -1
- data/lib/akeyless/models/create_auth_method_gcp.rb +12 -1
- data/lib/akeyless/models/create_auth_method_huawei.rb +12 -1
- data/lib/akeyless/models/create_auth_method_k8_s.rb +12 -1
- data/lib/akeyless/models/create_auth_method_ldap.rb +12 -1
- data/lib/akeyless/models/create_auth_method_o_auth2.rb +12 -1
- data/lib/akeyless/models/create_auth_method_oci.rb +12 -1
- data/lib/akeyless/models/create_auth_method_oidc.rb +12 -1
- data/lib/akeyless/models/create_auth_method_saml.rb +12 -1
- data/lib/akeyless/models/create_auth_method_universal_identity.rb +12 -1
- data/lib/akeyless/models/create_pki_cert_issuer.rb +28 -1
- data/lib/akeyless/models/ds_producer_details.rb +47 -1
- data/lib/akeyless/models/dynamic_secret_create_gcp.rb +92 -12
- data/lib/akeyless/models/dynamic_secret_create_google_workspace.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_create_mongo_db.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_create_ms_sql.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_get_value.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_update_gcp.rb +92 -12
- data/lib/akeyless/models/dynamic_secret_update_google_workspace.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_update_mongo_db.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_update_ms_sql.rb +11 -1
- data/lib/akeyless/models/event_forwarder_get_output.rb +13 -4
- data/lib/akeyless/models/gateway_create_migration.rb +13 -1
- data/lib/akeyless/models/gateway_create_producer_gcp.rb +92 -12
- data/lib/akeyless/models/gateway_create_producer_mongo.rb +11 -1
- data/lib/akeyless/models/gateway_create_producer_mssql.rb +11 -1
- data/lib/akeyless/models/gateway_update_migration.rb +13 -1
- data/lib/akeyless/models/gateway_update_producer_gcp.rb +92 -12
- data/lib/akeyless/models/gateway_update_producer_mongo.rb +11 -1
- data/lib/akeyless/models/gateway_update_producer_mssql.rb +11 -1
- data/lib/akeyless/models/gateway_update_remote_access.rb +25 -1
- data/lib/akeyless/models/get_dynamic_secret_value.rb +11 -1
- data/lib/akeyless/models/noti_forwarder_details_input.rb +261 -0
- data/lib/akeyless/models/pki_certificate_issue_details.rb +31 -1
- data/lib/akeyless/models/rotated_secret_create_ssh.rb +21 -1
- data/lib/akeyless/models/rotated_secret_delete_sync.rb +11 -1
- data/lib/akeyless/models/rotated_secret_details_info.rb +21 -1
- data/lib/akeyless/models/rotated_secret_update_ssh.rb +21 -1
- data/lib/akeyless/models/slack_noti_forwarder_details.rb +214 -0
- data/lib/akeyless/models/static_secret_delete_sync.rb +11 -1
- data/lib/akeyless/models/teams_noti_forwarder_details.rb +214 -0
- data/lib/akeyless/models/update_account_settings.rb +21 -1
- data/lib/akeyless/models/update_auth_method.rb +12 -1
- data/lib/akeyless/models/update_auth_method_awsiam.rb +12 -1
- data/lib/akeyless/models/update_auth_method_azure_ad.rb +12 -1
- data/lib/akeyless/models/update_auth_method_cert.rb +12 -1
- data/lib/akeyless/models/update_auth_method_gcp.rb +12 -1
- data/lib/akeyless/models/update_auth_method_k8_s.rb +12 -1
- data/lib/akeyless/models/update_auth_method_ldap.rb +12 -1
- data/lib/akeyless/models/update_auth_method_o_auth2.rb +12 -1
- data/lib/akeyless/models/update_auth_method_oci.rb +12 -1
- data/lib/akeyless/models/update_auth_method_oidc.rb +12 -1
- data/lib/akeyless/models/update_auth_method_saml.rb +12 -1
- data/lib/akeyless/models/update_auth_method_universal_identity.rb +12 -1
- data/lib/akeyless/models/update_pki_cert_issuer.rb +28 -1
- data/lib/akeyless/models/webhook_noti_forwarder_details.rb +253 -0
- data/lib/akeyless/models/windows_service_attributes.rb +21 -1
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +5 -0
- data/spec/models/allowed_client_type_spec.rb +42 -0
- data/spec/models/noti_forwarder_details_input_spec.rb +66 -0
- data/spec/models/slack_noti_forwarder_details_spec.rb +36 -0
- data/spec/models/teams_noti_forwarder_details_spec.rb +36 -0
- data/spec/models/webhook_noti_forwarder_details_spec.rb +60 -0
- metadata +21 -1
data/docs/CreateAuthMethod.md
CHANGED
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
9
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
10
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
@@ -26,6 +27,7 @@ require 'akeyless'
|
|
|
26
27
|
|
|
27
28
|
instance = Akeyless::CreateAuthMethod.new(
|
|
28
29
|
access_expires: null,
|
|
30
|
+
allowed_client_type: null,
|
|
29
31
|
audit_logs_claims: null,
|
|
30
32
|
bound_ips: null,
|
|
31
33
|
delete_protection: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
9
10
|
| **bound_arn** | **Array<String>** | A list of full arns that the access is restricted to | [optional] |
|
|
10
11
|
| **bound_aws_account_id** | **Array<String>** | A list of AWS account-IDs that the access is restricted to | |
|
|
@@ -35,6 +36,7 @@ require 'akeyless'
|
|
|
35
36
|
|
|
36
37
|
instance = Akeyless::CreateAuthMethodAWSIAM.new(
|
|
37
38
|
access_expires: null,
|
|
39
|
+
allowed_client_type: null,
|
|
38
40
|
audit_logs_claims: null,
|
|
39
41
|
bound_arn: null,
|
|
40
42
|
bound_aws_account_id: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audience** | **String** | Deprecated (Deprecated) The audience in the JWT | [optional][default to 'https://management.azure.com/'] |
|
|
9
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
11
|
| **bound_group_id** | **Array<String>** | A list of group ids that the access is restricted to | [optional] |
|
|
@@ -39,6 +40,7 @@ require 'akeyless'
|
|
|
39
40
|
|
|
40
41
|
instance = Akeyless::CreateAuthMethodAzureAD.new(
|
|
41
42
|
access_expires: null,
|
|
43
|
+
allowed_client_type: null,
|
|
42
44
|
audience: null,
|
|
43
45
|
audit_logs_claims: null,
|
|
44
46
|
bound_group_id: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **allowed_cors** | **String** | Comma separated list of allowed CORS domains to be validated as part of the authentication flow. | [optional] |
|
|
9
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
11
|
| **bound_common_names** | **Array<String>** | A list of names. At least one must exist in the Common Name. Supports globbing. | [optional] |
|
|
@@ -36,6 +37,7 @@ require 'akeyless'
|
|
|
36
37
|
|
|
37
38
|
instance = Akeyless::CreateAuthMethodCert.new(
|
|
38
39
|
access_expires: null,
|
|
40
|
+
allowed_client_type: null,
|
|
39
41
|
allowed_cors: null,
|
|
40
42
|
audit_logs_claims: null,
|
|
41
43
|
bound_common_names: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
9
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
10
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
@@ -29,6 +30,7 @@ require 'akeyless'
|
|
|
29
30
|
|
|
30
31
|
instance = Akeyless::CreateAuthMethodEmail.new(
|
|
31
32
|
access_expires: null,
|
|
33
|
+
allowed_client_type: null,
|
|
32
34
|
audit_logs_claims: null,
|
|
33
35
|
bound_ips: null,
|
|
34
36
|
delete_protection: null,
|
data/docs/CreateAuthMethodGCP.md
CHANGED
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audience** | **String** | The audience to verify in the JWT received by the client | [default to 'akeyless.io'] |
|
|
9
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
11
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
@@ -35,6 +36,7 @@ require 'akeyless'
|
|
|
35
36
|
|
|
36
37
|
instance = Akeyless::CreateAuthMethodGCP.new(
|
|
37
38
|
access_expires: null,
|
|
39
|
+
allowed_client_type: null,
|
|
38
40
|
audience: null,
|
|
39
41
|
audit_logs_claims: null,
|
|
40
42
|
bound_ips: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
9
10
|
| **auth_url** | **String** | sts URL | [optional][default to 'https://iam.myhwclouds.com:443/v3'] |
|
|
10
11
|
| **bound_domain_id** | **Array<String>** | A list of domain IDs that the access is restricted to | [optional] |
|
|
@@ -33,6 +34,7 @@ require 'akeyless'
|
|
|
33
34
|
|
|
34
35
|
instance = Akeyless::CreateAuthMethodHuawei.new(
|
|
35
36
|
access_expires: null,
|
|
37
|
+
allowed_client_type: null,
|
|
36
38
|
audit_logs_claims: null,
|
|
37
39
|
auth_url: null,
|
|
38
40
|
bound_domain_id: null,
|
data/docs/CreateAuthMethodK8S.md
CHANGED
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audience** | **String** | The audience in the Kubernetes JWT that the access is restricted to | [optional] |
|
|
9
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
11
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
@@ -32,6 +33,7 @@ require 'akeyless'
|
|
|
32
33
|
|
|
33
34
|
instance = Akeyless::CreateAuthMethodK8S.new(
|
|
34
35
|
access_expires: null,
|
|
36
|
+
allowed_client_type: null,
|
|
35
37
|
audience: null,
|
|
36
38
|
audit_logs_claims: null,
|
|
37
39
|
bound_ips: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
9
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
10
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
@@ -29,6 +30,7 @@ require 'akeyless'
|
|
|
29
30
|
|
|
30
31
|
instance = Akeyless::CreateAuthMethodLDAP.new(
|
|
31
32
|
access_expires: null,
|
|
33
|
+
allowed_client_type: null,
|
|
32
34
|
audit_logs_claims: null,
|
|
33
35
|
bound_ips: null,
|
|
34
36
|
delete_protection: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audience** | **String** | The audience in the JWT | [optional] |
|
|
9
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
11
|
| **bound_client_ids** | **Array<String>** | The clients ids that the access is restricted to | [optional] |
|
|
@@ -36,6 +37,7 @@ require 'akeyless'
|
|
|
36
37
|
|
|
37
38
|
instance = Akeyless::CreateAuthMethodOAuth2.new(
|
|
38
39
|
access_expires: null,
|
|
40
|
+
allowed_client_type: null,
|
|
39
41
|
audience: null,
|
|
40
42
|
audit_logs_claims: null,
|
|
41
43
|
bound_client_ids: null,
|
data/docs/CreateAuthMethodOCI.md
CHANGED
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
9
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
10
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
@@ -28,6 +29,7 @@ require 'akeyless'
|
|
|
28
29
|
|
|
29
30
|
instance = Akeyless::CreateAuthMethodOCI.new(
|
|
30
31
|
access_expires: null,
|
|
32
|
+
allowed_client_type: null,
|
|
31
33
|
audit_logs_claims: null,
|
|
32
34
|
bound_ips: null,
|
|
33
35
|
delete_protection: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **allowed_redirect_uri** | **Array<String>** | Allowed redirect URIs after the authentication | [optional] |
|
|
9
10
|
| **audience** | **String** | Audience claim to be used as part of the authentication flow. In case set, it must match the one configured on the Identity Provider's Application | [optional] |
|
|
10
11
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
@@ -35,6 +36,7 @@ require 'akeyless'
|
|
|
35
36
|
|
|
36
37
|
instance = Akeyless::CreateAuthMethodOIDC.new(
|
|
37
38
|
access_expires: null,
|
|
39
|
+
allowed_client_type: null,
|
|
38
40
|
allowed_redirect_uri: null,
|
|
39
41
|
audience: null,
|
|
40
42
|
audit_logs_claims: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **allowed_redirect_uri** | **Array<String>** | Allowed redirect URIs after the authentication | [optional] |
|
|
9
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
11
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
@@ -31,6 +32,7 @@ require 'akeyless'
|
|
|
31
32
|
|
|
32
33
|
instance = Akeyless::CreateAuthMethodSAML.new(
|
|
33
34
|
access_expires: null,
|
|
35
|
+
allowed_client_type: null,
|
|
34
36
|
allowed_redirect_uri: null,
|
|
35
37
|
audit_logs_claims: null,
|
|
36
38
|
bound_ips: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
9
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
10
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
@@ -29,6 +30,7 @@ require 'akeyless'
|
|
|
29
30
|
|
|
30
31
|
instance = Akeyless::CreateAuthMethodUniversalIdentity.new(
|
|
31
32
|
access_expires: null,
|
|
33
|
+
allowed_client_type: null,
|
|
32
34
|
audit_logs_claims: null,
|
|
33
35
|
bound_ips: null,
|
|
34
36
|
delete_protection: null,
|
data/docs/CreatePKICertIssuer.md
CHANGED
|
@@ -17,7 +17,9 @@
|
|
|
17
17
|
| **code_signing_flag** | **Boolean** | If set, certificates will be flagged for code signing use | [optional] |
|
|
18
18
|
| **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
|
|
19
19
|
| **create_private_crl** | **Boolean** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] |
|
|
20
|
+
| **create_private_ocsp** | **Boolean** | | [optional] |
|
|
20
21
|
| **create_public_crl** | **Boolean** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] |
|
|
22
|
+
| **create_public_ocsp** | **Boolean** | | [optional] |
|
|
21
23
|
| **critical_key_usage** | **String** | Mark key usage as critical [true/false] | [optional][default to 'true'] |
|
|
22
24
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
23
25
|
| **description** | **String** | Description of the object | [optional] |
|
|
@@ -36,6 +38,7 @@
|
|
|
36
38
|
| **name** | **String** | PKI certificate issuer name | |
|
|
37
39
|
| **not_enforce_hostnames** | **Boolean** | If set, any names are allowed for CN and SANs in the certificate and not only a valid host name | [optional] |
|
|
38
40
|
| **not_require_cn** | **Boolean** | If set, clients can request certificates without a CN | [optional] |
|
|
41
|
+
| **ocsp_ttl** | **String** | | [optional] |
|
|
39
42
|
| **organizational_units** | **String** | A comma-separated list of organizational units (OU) that will be set in the issued certificate | [optional] |
|
|
40
43
|
| **organizations** | **String** | A comma-separated list of organizations (O) that will be set in the issued certificate | [optional] |
|
|
41
44
|
| **postal_code** | **String** | A comma-separated list of postal codes that will be set in the issued certificate | [optional] |
|
|
@@ -69,7 +72,9 @@ instance = Akeyless::CreatePKICertIssuer.new(
|
|
|
69
72
|
code_signing_flag: null,
|
|
70
73
|
country: null,
|
|
71
74
|
create_private_crl: null,
|
|
75
|
+
create_private_ocsp: null,
|
|
72
76
|
create_public_crl: null,
|
|
77
|
+
create_public_ocsp: null,
|
|
73
78
|
critical_key_usage: null,
|
|
74
79
|
delete_protection: null,
|
|
75
80
|
description: null,
|
|
@@ -88,6 +93,7 @@ instance = Akeyless::CreatePKICertIssuer.new(
|
|
|
88
93
|
name: null,
|
|
89
94
|
not_enforce_hostnames: null,
|
|
90
95
|
not_require_cn: null,
|
|
96
|
+
ocsp_ttl: null,
|
|
91
97
|
organizational_units: null,
|
|
92
98
|
organizations: null,
|
|
93
99
|
postal_code: null,
|
data/docs/DSProducerDetails.md
CHANGED
|
@@ -94,9 +94,12 @@
|
|
|
94
94
|
| **externally_provided_user** | **String** | | [optional] |
|
|
95
95
|
| **failure_message** | **String** | | [optional] |
|
|
96
96
|
| **fixed_user_only** | **String** | | [optional] |
|
|
97
|
+
| **gcp_access_type** | **String** | | [optional] |
|
|
98
|
+
| **gcp_fixed_user_claim_keyname** | **String** | | [optional] |
|
|
97
99
|
| **gcp_key_algo** | **String** | | [optional] |
|
|
98
100
|
| **gcp_project_id** | **String** | | [optional] |
|
|
99
101
|
| **gcp_role_bindings** | **Hash<String, Array<String>>** | | [optional] |
|
|
102
|
+
| **gcp_role_names** | **String** | | [optional] |
|
|
100
103
|
| **gcp_service_account_email** | **String** | GCPServiceAccountEmail overrides the deprecated field from the target | [optional] |
|
|
101
104
|
| **gcp_service_account_key** | **String** | | [optional] |
|
|
102
105
|
| **gcp_service_account_key_base64** | **String** | | [optional] |
|
|
@@ -187,9 +190,11 @@
|
|
|
187
190
|
| **mongodb_is_atlas** | **Boolean** | | [optional] |
|
|
188
191
|
| **mongodb_password** | **String** | | [optional] |
|
|
189
192
|
| **mongodb_roles** | **String** | common fields | [optional] |
|
|
193
|
+
| **mongodb_scopes** | **String** | | [optional] |
|
|
190
194
|
| **mongodb_uri_connection** | **String** | mongodb fields | [optional] |
|
|
191
195
|
| **mongodb_uri_options** | **String** | | [optional] |
|
|
192
196
|
| **mongodb_username** | **String** | | [optional] |
|
|
197
|
+
| **mssql_allowed_db_names** | **String** | Comma-separated list of allowed DB names for runtime selection when fetching the secret value. Empty string => use target DB name only (no override allowed) \"*\" => any DB name is allowed One or more names => user must select one of the provided names | [optional] |
|
|
193
198
|
| **mssql_creation_statements** | **String** | | [optional] |
|
|
194
199
|
| **mssql_revocation_statements** | **String** | | [optional] |
|
|
195
200
|
| **mysql_creation_statements** | **String** | | [optional] |
|
|
@@ -360,9 +365,12 @@ instance = Akeyless::DSProducerDetails.new(
|
|
|
360
365
|
externally_provided_user: null,
|
|
361
366
|
failure_message: null,
|
|
362
367
|
fixed_user_only: null,
|
|
368
|
+
gcp_access_type: null,
|
|
369
|
+
gcp_fixed_user_claim_keyname: null,
|
|
363
370
|
gcp_key_algo: null,
|
|
364
371
|
gcp_project_id: null,
|
|
365
372
|
gcp_role_bindings: null,
|
|
373
|
+
gcp_role_names: null,
|
|
366
374
|
gcp_service_account_email: null,
|
|
367
375
|
gcp_service_account_key: null,
|
|
368
376
|
gcp_service_account_key_base64: null,
|
|
@@ -453,9 +461,11 @@ instance = Akeyless::DSProducerDetails.new(
|
|
|
453
461
|
mongodb_is_atlas: null,
|
|
454
462
|
mongodb_password: null,
|
|
455
463
|
mongodb_roles: null,
|
|
464
|
+
mongodb_scopes: null,
|
|
456
465
|
mongodb_uri_connection: null,
|
|
457
466
|
mongodb_uri_options: null,
|
|
458
467
|
mongodb_username: null,
|
|
468
|
+
mssql_allowed_db_names: null,
|
|
459
469
|
mssql_creation_statements: null,
|
|
460
470
|
mssql_revocation_statements: null,
|
|
461
471
|
mysql_creation_statements: null,
|
|
@@ -4,21 +4,29 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **access_type** | **String** | | [optional] |
|
|
7
8
|
| **custom_username_template** | **String** | Customize how temporary usernames are generated using go template | [optional] |
|
|
8
9
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
9
10
|
| **description** | **String** | Description of the object | [optional] |
|
|
11
|
+
| **fixed_user_claim_keyname** | **String** | For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external) | [optional][default to 'ext_email'] |
|
|
10
12
|
| **gcp_cred_type** | **String** | | [optional] |
|
|
11
13
|
| **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
|
|
12
|
-
| **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
|
|
13
|
-
| **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations
|
|
14
|
-
| **gcp_sa_email** | **String** | The email of the fixed service
|
|
15
|
-
| **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
|
|
14
|
+
| **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key) | [optional] |
|
|
15
|
+
| **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations | [optional] |
|
|
16
|
+
| **gcp_sa_email** | **String** | The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed) | [optional] |
|
|
17
|
+
| **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token) | [optional] |
|
|
16
18
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
17
19
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
18
20
|
| **name** | **String** | Dynamic secret name | |
|
|
19
21
|
| **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
|
|
20
|
-
| **role_binding** | **String** | Role binding definitions in
|
|
21
|
-
| **
|
|
22
|
+
| **role_binding** | **String** | Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic) | [optional] |
|
|
23
|
+
| **role_names** | **String** | Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external) | [optional] |
|
|
24
|
+
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
|
25
|
+
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
|
26
|
+
| **secure_access_url** | **String** | Destination URL to inject secrets | [optional] |
|
|
27
|
+
| **secure_access_web_browsing** | **Boolean** | Secure browser via Akeyless's Secure Remote Access (SRA) | [optional][default to false] |
|
|
28
|
+
| **secure_access_web_proxy** | **Boolean** | Web-Proxy via Akeyless's Secure Remote Access (SRA) | [optional][default to false] |
|
|
29
|
+
| **service_account_type** | **String** | The type of the GCP service account. Options [fixed, dynamic] (Relevant only when --access-type=sa) | [optional][default to 'fixed'] |
|
|
22
30
|
| **tags** | **Array<String>** | Add tags attached to this object | [optional] |
|
|
23
31
|
| **target_name** | **String** | Target name | [optional] |
|
|
24
32
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
@@ -31,9 +39,11 @@
|
|
|
31
39
|
require 'akeyless'
|
|
32
40
|
|
|
33
41
|
instance = Akeyless::DynamicSecretCreateGcp.new(
|
|
42
|
+
access_type: null,
|
|
34
43
|
custom_username_template: null,
|
|
35
44
|
delete_protection: null,
|
|
36
45
|
description: null,
|
|
46
|
+
fixed_user_claim_keyname: null,
|
|
37
47
|
gcp_cred_type: null,
|
|
38
48
|
gcp_key: null,
|
|
39
49
|
gcp_key_algo: null,
|
|
@@ -45,6 +55,12 @@ instance = Akeyless::DynamicSecretCreateGcp.new(
|
|
|
45
55
|
name: null,
|
|
46
56
|
producer_encryption_key_name: null,
|
|
47
57
|
role_binding: null,
|
|
58
|
+
role_names: null,
|
|
59
|
+
secure_access_delay: null,
|
|
60
|
+
secure_access_enable: null,
|
|
61
|
+
secure_access_url: null,
|
|
62
|
+
secure_access_web_browsing: null,
|
|
63
|
+
secure_access_web_proxy: null,
|
|
48
64
|
service_account_type: null,
|
|
49
65
|
tags: null,
|
|
50
66
|
target_name: null,
|
|
@@ -18,6 +18,7 @@
|
|
|
18
18
|
| **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
|
|
19
19
|
| **role_name** | **String** | Name of the admin role to assign to the user, relevant only for role access-mode | [optional] |
|
|
20
20
|
| **role_scope** | **String** | | [optional] |
|
|
21
|
+
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
|
21
22
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
|
22
23
|
| **secure_access_url** | **String** | Destination URL to inject secrets | [optional] |
|
|
23
24
|
| **secure_access_web** | **Boolean** | Enable Web Secure Remote Access | [optional][default to true] |
|
|
@@ -49,6 +50,7 @@ instance = Akeyless::DynamicSecretCreateGoogleWorkspace.new(
|
|
|
49
50
|
producer_encryption_key_name: null,
|
|
50
51
|
role_name: null,
|
|
51
52
|
role_scope: null,
|
|
53
|
+
secure_access_delay: null,
|
|
52
54
|
secure_access_enable: null,
|
|
53
55
|
secure_access_url: null,
|
|
54
56
|
secure_access_web: null,
|
|
@@ -18,6 +18,7 @@
|
|
|
18
18
|
| **mongodb_name** | **String** | MongoDB Name | [optional] |
|
|
19
19
|
| **mongodb_password** | **String** | MongoDB server password. You will prompted to provide a password if it will not appear in CLI parameters | [optional] |
|
|
20
20
|
| **mongodb_roles** | **String** | MongoDB Roles | [optional][default to '[]'] |
|
|
21
|
+
| **mongodb_scopes** | **String** | MongoDB Scopes (Atlas only) | [optional] |
|
|
21
22
|
| **mongodb_server_uri** | **String** | MongoDB server URI | [optional] |
|
|
22
23
|
| **mongodb_uri_options** | **String** | MongoDB server URI options | [optional] |
|
|
23
24
|
| **mongodb_username** | **String** | MongoDB server username | [optional] |
|
|
@@ -57,6 +58,7 @@ instance = Akeyless::DynamicSecretCreateMongoDb.new(
|
|
|
57
58
|
mongodb_name: null,
|
|
58
59
|
mongodb_password: null,
|
|
59
60
|
mongodb_roles: null,
|
|
61
|
+
mongodb_scopes: null,
|
|
60
62
|
mongodb_server_uri: null,
|
|
61
63
|
mongodb_uri_options: null,
|
|
62
64
|
mongodb_username: null,
|
|
@@ -9,6 +9,7 @@
|
|
|
9
9
|
| **description** | **String** | Description of the object | [optional] |
|
|
10
10
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
11
11
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
12
|
+
| **mssql_allowed_db_names** | **String** | CSV of allowed DB names for runtime selection when getting the secret value. Empty => use target DB only; \"*\" => any DB allowed; One or more names => user must choose from this list | [optional] |
|
|
12
13
|
| **mssql_create_statements** | **String** | MSSQL Creation statements | [optional] |
|
|
13
14
|
| **mssql_dbname** | **String** | MSSQL Name | [optional] |
|
|
14
15
|
| **mssql_host** | **String** | MSSQL Host | [optional][default to '127.0.0.1'] |
|
|
@@ -44,6 +45,7 @@ instance = Akeyless::DynamicSecretCreateMsSql.new(
|
|
|
44
45
|
description: null,
|
|
45
46
|
item_custom_fields: null,
|
|
46
47
|
json: null,
|
|
48
|
+
mssql_allowed_db_names: null,
|
|
47
49
|
mssql_create_statements: null,
|
|
48
50
|
mssql_dbname: null,
|
|
49
51
|
mssql_host: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **args** | **Array<String>** | Optional arguments as key=value pairs or JSON strings, e.g - \\\"--args=csr=base64_encoded_csr --args=common_name=bar\\\" or args='{\\\"csr\\\":\\\"base64_encoded_csr\\\"}. It is possible to combine both formats.' | [optional] |
|
|
8
|
+
| **dbname** | **String** | DBName: Optional override DB name (works only if DS allows it. only relevant for MSSQL) | [optional] |
|
|
8
9
|
| **host** | **String** | Host | [optional] |
|
|
9
10
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
10
11
|
| **name** | **String** | Dynamic secret name | |
|
|
@@ -20,6 +21,7 @@ require 'akeyless'
|
|
|
20
21
|
|
|
21
22
|
instance = Akeyless::DynamicSecretGetValue.new(
|
|
22
23
|
args: null,
|
|
24
|
+
dbname: null,
|
|
23
25
|
host: null,
|
|
24
26
|
json: null,
|
|
25
27
|
name: null,
|
|
@@ -4,22 +4,30 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **access_type** | **String** | | [optional] |
|
|
7
8
|
| **custom_username_template** | **String** | Customize how temporary usernames are generated using go template | [optional] |
|
|
8
9
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
9
10
|
| **description** | **String** | Description of the object | [optional] |
|
|
11
|
+
| **fixed_user_claim_keyname** | **String** | For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external) | [optional][default to 'ext_email'] |
|
|
10
12
|
| **gcp_cred_type** | **String** | | [optional] |
|
|
11
13
|
| **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
|
|
12
|
-
| **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
|
|
13
|
-
| **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations
|
|
14
|
-
| **gcp_sa_email** | **String** | The email of the fixed service
|
|
15
|
-
| **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
|
|
14
|
+
| **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key) | [optional] |
|
|
15
|
+
| **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations | [optional] |
|
|
16
|
+
| **gcp_sa_email** | **String** | The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed) | [optional] |
|
|
17
|
+
| **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token) | [optional] |
|
|
16
18
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
17
19
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
18
20
|
| **name** | **String** | Dynamic secret name | |
|
|
19
21
|
| **new_name** | **String** | Dynamic secret name | [optional] |
|
|
20
22
|
| **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
|
|
21
|
-
| **role_binding** | **String** | Role binding definitions in
|
|
22
|
-
| **
|
|
23
|
+
| **role_binding** | **String** | Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic) | [optional] |
|
|
24
|
+
| **role_names** | **String** | Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external) | [optional] |
|
|
25
|
+
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
|
26
|
+
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
|
27
|
+
| **secure_access_url** | **String** | Destination URL to inject secrets | [optional] |
|
|
28
|
+
| **secure_access_web_browsing** | **Boolean** | Secure browser via Akeyless's Secure Remote Access (SRA) | [optional][default to false] |
|
|
29
|
+
| **secure_access_web_proxy** | **Boolean** | Web-Proxy via Akeyless's Secure Remote Access (SRA) | [optional][default to false] |
|
|
30
|
+
| **service_account_type** | **String** | The type of the GCP service account. Options [fixed, dynamic] (Relevant only when --access-type=sa) | [optional][default to 'fixed'] |
|
|
23
31
|
| **tags** | **Array<String>** | Add tags attached to this object | [optional] |
|
|
24
32
|
| **target_name** | **String** | Target name | [optional] |
|
|
25
33
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
@@ -32,9 +40,11 @@
|
|
|
32
40
|
require 'akeyless'
|
|
33
41
|
|
|
34
42
|
instance = Akeyless::DynamicSecretUpdateGcp.new(
|
|
43
|
+
access_type: null,
|
|
35
44
|
custom_username_template: null,
|
|
36
45
|
delete_protection: null,
|
|
37
46
|
description: null,
|
|
47
|
+
fixed_user_claim_keyname: null,
|
|
38
48
|
gcp_cred_type: null,
|
|
39
49
|
gcp_key: null,
|
|
40
50
|
gcp_key_algo: null,
|
|
@@ -47,6 +57,12 @@ instance = Akeyless::DynamicSecretUpdateGcp.new(
|
|
|
47
57
|
new_name: null,
|
|
48
58
|
producer_encryption_key_name: null,
|
|
49
59
|
role_binding: null,
|
|
60
|
+
role_names: null,
|
|
61
|
+
secure_access_delay: null,
|
|
62
|
+
secure_access_enable: null,
|
|
63
|
+
secure_access_url: null,
|
|
64
|
+
secure_access_web_browsing: null,
|
|
65
|
+
secure_access_web_proxy: null,
|
|
50
66
|
service_account_type: null,
|
|
51
67
|
tags: null,
|
|
52
68
|
target_name: null,
|
|
@@ -19,6 +19,7 @@
|
|
|
19
19
|
| **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
|
|
20
20
|
| **role_name** | **String** | Name of the admin role to assign to the user, relevant only for role access-mode | [optional] |
|
|
21
21
|
| **role_scope** | **String** | | [optional] |
|
|
22
|
+
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
|
22
23
|
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
|
23
24
|
| **secure_access_url** | **String** | Destination URL to inject secrets | [optional] |
|
|
24
25
|
| **secure_access_web** | **Boolean** | Enable Web Secure Remote Access | [optional][default to true] |
|
|
@@ -51,6 +52,7 @@ instance = Akeyless::DynamicSecretUpdateGoogleWorkspace.new(
|
|
|
51
52
|
producer_encryption_key_name: null,
|
|
52
53
|
role_name: null,
|
|
53
54
|
role_scope: null,
|
|
55
|
+
secure_access_delay: null,
|
|
54
56
|
secure_access_enable: null,
|
|
55
57
|
secure_access_url: null,
|
|
56
58
|
secure_access_web: null,
|
|
@@ -18,6 +18,7 @@
|
|
|
18
18
|
| **mongodb_name** | **String** | MongoDB Name | [optional] |
|
|
19
19
|
| **mongodb_password** | **String** | MongoDB server password. You will prompted to provide a password if it will not appear in CLI parameters | [optional] |
|
|
20
20
|
| **mongodb_roles** | **String** | MongoDB Roles | [optional][default to '[]'] |
|
|
21
|
+
| **mongodb_scopes** | **String** | MongoDB Scopes (Atlas only) | [optional] |
|
|
21
22
|
| **mongodb_server_uri** | **String** | MongoDB server URI | [optional] |
|
|
22
23
|
| **mongodb_uri_options** | **String** | MongoDB server URI options | [optional] |
|
|
23
24
|
| **mongodb_username** | **String** | MongoDB server username | [optional] |
|
|
@@ -58,6 +59,7 @@ instance = Akeyless::DynamicSecretUpdateMongoDb.new(
|
|
|
58
59
|
mongodb_name: null,
|
|
59
60
|
mongodb_password: null,
|
|
60
61
|
mongodb_roles: null,
|
|
62
|
+
mongodb_scopes: null,
|
|
61
63
|
mongodb_server_uri: null,
|
|
62
64
|
mongodb_uri_options: null,
|
|
63
65
|
mongodb_username: null,
|
|
@@ -9,6 +9,7 @@
|
|
|
9
9
|
| **description** | **String** | Description of the object | [optional] |
|
|
10
10
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
11
11
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
12
|
+
| **mssql_allowed_db_names** | **String** | CSV of allowed DB names for runtime selection when getting the secret value. Empty => use target DB only; \"*\" => any DB allowed; One or more names => user must choose from this list | [optional] |
|
|
12
13
|
| **mssql_create_statements** | **String** | MSSQL Creation statements | [optional] |
|
|
13
14
|
| **mssql_dbname** | **String** | MSSQL Name | [optional] |
|
|
14
15
|
| **mssql_host** | **String** | MSSQL Host | [optional][default to '127.0.0.1'] |
|
|
@@ -45,6 +46,7 @@ instance = Akeyless::DynamicSecretUpdateMsSql.new(
|
|
|
45
46
|
description: null,
|
|
46
47
|
item_custom_fields: null,
|
|
47
48
|
json: null,
|
|
49
|
+
mssql_allowed_db_names: null,
|
|
48
50
|
mssql_create_statements: null,
|
|
49
51
|
mssql_dbname: null,
|
|
50
52
|
mssql_host: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **event_forwarder** | [**NotiForwarder**](NotiForwarder.md) | | [optional] |
|
|
8
|
+
| **event_forwarder_details** | [**NotiForwarderDetailsInput**](NotiForwarderDetailsInput.md) | | [optional] |
|
|
8
9
|
|
|
9
10
|
## Example
|
|
10
11
|
|
|
@@ -12,7 +13,8 @@
|
|
|
12
13
|
require 'akeyless'
|
|
13
14
|
|
|
14
15
|
instance = Akeyless::EventForwarderGetOutput.new(
|
|
15
|
-
event_forwarder: null
|
|
16
|
+
event_forwarder: null,
|
|
17
|
+
event_forwarder_details: null
|
|
16
18
|
)
|
|
17
19
|
```
|
|
18
20
|
|
|
@@ -7,6 +7,7 @@
|
|
|
7
7
|
| **service_account_key_decoded** | **String** | | [optional] |
|
|
8
8
|
| **ad_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration) | [optional] |
|
|
9
9
|
| **ad_computer_base_dn** | **String** | Distinguished Name of Computer objects (servers) to search in Active Directory e.g.: CN=Computers,DC=example,DC=com (Relevant only for Active Directory migration) | [optional] |
|
|
10
|
+
| **ad_discover_iis_app** | **String** | Enable/Disable discovery of IIS application from each domain server as part of the SSH/Windows Rotated Secrets. Default is false. (Relevant only for Active Directory migration) | [optional][default to 'false'] |
|
|
10
11
|
| **ad_discover_services** | **String** | Enable/Disable discovery of Windows services from each domain server as part of the SSH/Windows Rotated Secrets. Default is false. (Relevant only for Active Directory migration) | [optional][default to 'false'] |
|
|
11
12
|
| **ad_discovery_types** | **Array<String>** | Set migration discovery types (domain-users, computers, local-users). (Relevant only for Active Directory migration) | [optional] |
|
|
12
13
|
| **ad_domain_name** | **String** | Active Directory Domain Name (Relevant only for Active Directory migration) | [optional] |
|
|
@@ -73,6 +74,7 @@ instance = Akeyless::GatewayCreateMigration.new(
|
|
|
73
74
|
service_account_key_decoded: null,
|
|
74
75
|
ad_auto_rotate: null,
|
|
75
76
|
ad_computer_base_dn: null,
|
|
77
|
+
ad_discover_iis_app: null,
|
|
76
78
|
ad_discover_services: null,
|
|
77
79
|
ad_discovery_types: null,
|
|
78
80
|
ad_domain_name: null,
|