akeyless 5.0.14 → 5.0.16

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (199) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +6 -1
  3. data/docs/AccountGeneralSettings.md +2 -0
  4. data/docs/ActiveDirectoryPayload.md +2 -0
  5. data/docs/AllowedClientType.md +20 -0
  6. data/docs/AuthMethodAccessInfo.md +2 -0
  7. data/docs/AuthMethodCreateApiKey.md +2 -0
  8. data/docs/AuthMethodCreateAwsIam.md +2 -0
  9. data/docs/AuthMethodCreateAzureAD.md +2 -0
  10. data/docs/AuthMethodCreateCert.md +2 -0
  11. data/docs/AuthMethodCreateEmail.md +2 -0
  12. data/docs/AuthMethodCreateGcp.md +2 -0
  13. data/docs/AuthMethodCreateK8s.md +2 -0
  14. data/docs/AuthMethodCreateKerberos.md +2 -0
  15. data/docs/AuthMethodCreateLdap.md +2 -0
  16. data/docs/AuthMethodCreateOCI.md +2 -0
  17. data/docs/AuthMethodCreateOIDC.md +2 -0
  18. data/docs/AuthMethodCreateOauth2.md +2 -0
  19. data/docs/AuthMethodCreateSAML.md +2 -0
  20. data/docs/AuthMethodCreateUniversalIdentity.md +2 -0
  21. data/docs/AuthMethodUpdateApiKey.md +2 -0
  22. data/docs/AuthMethodUpdateAwsIam.md +2 -0
  23. data/docs/AuthMethodUpdateAzureAD.md +2 -0
  24. data/docs/AuthMethodUpdateCert.md +2 -0
  25. data/docs/AuthMethodUpdateEmail.md +2 -0
  26. data/docs/AuthMethodUpdateGcp.md +2 -0
  27. data/docs/AuthMethodUpdateK8s.md +2 -0
  28. data/docs/AuthMethodUpdateKerberos.md +2 -0
  29. data/docs/AuthMethodUpdateLdap.md +2 -0
  30. data/docs/AuthMethodUpdateOCI.md +2 -0
  31. data/docs/AuthMethodUpdateOIDC.md +2 -0
  32. data/docs/AuthMethodUpdateOauth2.md +2 -0
  33. data/docs/AuthMethodUpdateSAML.md +2 -0
  34. data/docs/AuthMethodUpdateUniversalIdentity.md +2 -0
  35. data/docs/BastionGlobalConf.md +4 -0
  36. data/docs/CreateAuthMethod.md +2 -0
  37. data/docs/CreateAuthMethodAWSIAM.md +2 -0
  38. data/docs/CreateAuthMethodAzureAD.md +2 -0
  39. data/docs/CreateAuthMethodCert.md +2 -0
  40. data/docs/CreateAuthMethodEmail.md +2 -0
  41. data/docs/CreateAuthMethodGCP.md +2 -0
  42. data/docs/CreateAuthMethodHuawei.md +2 -0
  43. data/docs/CreateAuthMethodK8S.md +2 -0
  44. data/docs/CreateAuthMethodLDAP.md +2 -0
  45. data/docs/CreateAuthMethodOAuth2.md +2 -0
  46. data/docs/CreateAuthMethodOCI.md +2 -0
  47. data/docs/CreateAuthMethodOIDC.md +2 -0
  48. data/docs/CreateAuthMethodSAML.md +2 -0
  49. data/docs/CreateAuthMethodUniversalIdentity.md +2 -0
  50. data/docs/CreatePKICertIssuer.md +6 -0
  51. data/docs/DSProducerDetails.md +10 -0
  52. data/docs/DynamicSecretCreateGcp.md +22 -6
  53. data/docs/DynamicSecretCreateGoogleWorkspace.md +2 -0
  54. data/docs/DynamicSecretCreateMongoDb.md +2 -0
  55. data/docs/DynamicSecretCreateMsSql.md +2 -0
  56. data/docs/DynamicSecretGetValue.md +2 -0
  57. data/docs/DynamicSecretUpdateGcp.md +22 -6
  58. data/docs/DynamicSecretUpdateGoogleWorkspace.md +2 -0
  59. data/docs/DynamicSecretUpdateMongoDb.md +2 -0
  60. data/docs/DynamicSecretUpdateMsSql.md +2 -0
  61. data/docs/EventForwarderGetOutput.md +3 -1
  62. data/docs/GatewayCreateMigration.md +2 -0
  63. data/docs/GatewayCreateProducerGcp.md +22 -6
  64. data/docs/GatewayCreateProducerMSSQL.md +2 -0
  65. data/docs/GatewayCreateProducerMongo.md +2 -0
  66. data/docs/GatewayUpdateMigration.md +2 -0
  67. data/docs/GatewayUpdateProducerGcp.md +22 -6
  68. data/docs/GatewayUpdateProducerMSSQL.md +2 -0
  69. data/docs/GatewayUpdateProducerMongo.md +2 -0
  70. data/docs/GatewayUpdateRemoteAccess.md +4 -0
  71. data/docs/GetDynamicSecretValue.md +2 -0
  72. data/docs/NotiForwarderDetailsInput.md +28 -0
  73. data/docs/PKICertificateIssueDetails.md +6 -0
  74. data/docs/RotatedSecretCreateSsh.md +4 -0
  75. data/docs/RotatedSecretDeleteSync.md +2 -0
  76. data/docs/RotatedSecretDetailsInfo.md +4 -0
  77. data/docs/RotatedSecretUpdateSsh.md +4 -0
  78. data/docs/SlackNotiForwarderDetails.md +18 -0
  79. data/docs/StaticSecretDeleteSync.md +2 -0
  80. data/docs/TeamsNotiForwarderDetails.md +18 -0
  81. data/docs/UpdateAccountSettings.md +4 -0
  82. data/docs/UpdateAuthMethod.md +2 -0
  83. data/docs/UpdateAuthMethodAWSIAM.md +2 -0
  84. data/docs/UpdateAuthMethodAzureAD.md +2 -0
  85. data/docs/UpdateAuthMethodCert.md +2 -0
  86. data/docs/UpdateAuthMethodGCP.md +2 -0
  87. data/docs/UpdateAuthMethodK8S.md +2 -0
  88. data/docs/UpdateAuthMethodLDAP.md +2 -0
  89. data/docs/UpdateAuthMethodOAuth2.md +2 -0
  90. data/docs/UpdateAuthMethodOCI.md +2 -0
  91. data/docs/UpdateAuthMethodOIDC.md +2 -0
  92. data/docs/UpdateAuthMethodSAML.md +2 -0
  93. data/docs/UpdateAuthMethodUniversalIdentity.md +2 -0
  94. data/docs/UpdatePKICertIssuer.md +6 -0
  95. data/docs/V2Api.md +4 -4
  96. data/docs/WebhookNotiForwarderDetails.md +26 -0
  97. data/docs/WindowsServiceAttributes.md +4 -0
  98. data/lib/akeyless/models/account_general_settings.rb +10 -1
  99. data/lib/akeyless/models/active_directory_payload.rb +10 -1
  100. data/lib/akeyless/models/allowed_client_type.rb +225 -0
  101. data/lib/akeyless/models/auth_method_access_info.rb +12 -1
  102. data/lib/akeyless/models/auth_method_create_api_key.rb +12 -1
  103. data/lib/akeyless/models/auth_method_create_aws_iam.rb +12 -1
  104. data/lib/akeyless/models/auth_method_create_azure_ad.rb +12 -1
  105. data/lib/akeyless/models/auth_method_create_cert.rb +12 -1
  106. data/lib/akeyless/models/auth_method_create_email.rb +12 -1
  107. data/lib/akeyless/models/auth_method_create_gcp.rb +12 -1
  108. data/lib/akeyless/models/auth_method_create_k8s.rb +12 -1
  109. data/lib/akeyless/models/auth_method_create_kerberos.rb +12 -1
  110. data/lib/akeyless/models/auth_method_create_ldap.rb +12 -1
  111. data/lib/akeyless/models/auth_method_create_oauth2.rb +12 -1
  112. data/lib/akeyless/models/auth_method_create_oci.rb +12 -1
  113. data/lib/akeyless/models/auth_method_create_oidc.rb +12 -1
  114. data/lib/akeyless/models/auth_method_create_saml.rb +12 -1
  115. data/lib/akeyless/models/auth_method_create_universal_identity.rb +12 -1
  116. data/lib/akeyless/models/auth_method_update_api_key.rb +12 -1
  117. data/lib/akeyless/models/auth_method_update_aws_iam.rb +12 -1
  118. data/lib/akeyless/models/auth_method_update_azure_ad.rb +12 -1
  119. data/lib/akeyless/models/auth_method_update_cert.rb +12 -1
  120. data/lib/akeyless/models/auth_method_update_email.rb +12 -1
  121. data/lib/akeyless/models/auth_method_update_gcp.rb +12 -1
  122. data/lib/akeyless/models/auth_method_update_k8s.rb +12 -1
  123. data/lib/akeyless/models/auth_method_update_kerberos.rb +12 -1
  124. data/lib/akeyless/models/auth_method_update_ldap.rb +12 -1
  125. data/lib/akeyless/models/auth_method_update_oauth2.rb +12 -1
  126. data/lib/akeyless/models/auth_method_update_oci.rb +12 -1
  127. data/lib/akeyless/models/auth_method_update_oidc.rb +12 -1
  128. data/lib/akeyless/models/auth_method_update_saml.rb +12 -1
  129. data/lib/akeyless/models/auth_method_update_universal_identity.rb +12 -1
  130. data/lib/akeyless/models/bastion_global_conf.rb +19 -1
  131. data/lib/akeyless/models/create_auth_method.rb +12 -1
  132. data/lib/akeyless/models/create_auth_method_awsiam.rb +12 -1
  133. data/lib/akeyless/models/create_auth_method_azure_ad.rb +12 -1
  134. data/lib/akeyless/models/create_auth_method_cert.rb +12 -1
  135. data/lib/akeyless/models/create_auth_method_email.rb +12 -1
  136. data/lib/akeyless/models/create_auth_method_gcp.rb +12 -1
  137. data/lib/akeyless/models/create_auth_method_huawei.rb +12 -1
  138. data/lib/akeyless/models/create_auth_method_k8_s.rb +12 -1
  139. data/lib/akeyless/models/create_auth_method_ldap.rb +12 -1
  140. data/lib/akeyless/models/create_auth_method_o_auth2.rb +12 -1
  141. data/lib/akeyless/models/create_auth_method_oci.rb +12 -1
  142. data/lib/akeyless/models/create_auth_method_oidc.rb +12 -1
  143. data/lib/akeyless/models/create_auth_method_saml.rb +12 -1
  144. data/lib/akeyless/models/create_auth_method_universal_identity.rb +12 -1
  145. data/lib/akeyless/models/create_pki_cert_issuer.rb +28 -1
  146. data/lib/akeyless/models/ds_producer_details.rb +47 -1
  147. data/lib/akeyless/models/dynamic_secret_create_gcp.rb +92 -12
  148. data/lib/akeyless/models/dynamic_secret_create_google_workspace.rb +11 -1
  149. data/lib/akeyless/models/dynamic_secret_create_mongo_db.rb +11 -1
  150. data/lib/akeyless/models/dynamic_secret_create_ms_sql.rb +11 -1
  151. data/lib/akeyless/models/dynamic_secret_get_value.rb +11 -1
  152. data/lib/akeyless/models/dynamic_secret_update_gcp.rb +92 -12
  153. data/lib/akeyless/models/dynamic_secret_update_google_workspace.rb +11 -1
  154. data/lib/akeyless/models/dynamic_secret_update_mongo_db.rb +11 -1
  155. data/lib/akeyless/models/dynamic_secret_update_ms_sql.rb +11 -1
  156. data/lib/akeyless/models/event_forwarder_get_output.rb +13 -4
  157. data/lib/akeyless/models/gateway_create_migration.rb +13 -1
  158. data/lib/akeyless/models/gateway_create_producer_gcp.rb +92 -12
  159. data/lib/akeyless/models/gateway_create_producer_mongo.rb +11 -1
  160. data/lib/akeyless/models/gateway_create_producer_mssql.rb +11 -1
  161. data/lib/akeyless/models/gateway_update_migration.rb +13 -1
  162. data/lib/akeyless/models/gateway_update_producer_gcp.rb +92 -12
  163. data/lib/akeyless/models/gateway_update_producer_mongo.rb +11 -1
  164. data/lib/akeyless/models/gateway_update_producer_mssql.rb +11 -1
  165. data/lib/akeyless/models/gateway_update_remote_access.rb +25 -1
  166. data/lib/akeyless/models/get_dynamic_secret_value.rb +11 -1
  167. data/lib/akeyless/models/noti_forwarder_details_input.rb +261 -0
  168. data/lib/akeyless/models/pki_certificate_issue_details.rb +31 -1
  169. data/lib/akeyless/models/rotated_secret_create_ssh.rb +21 -1
  170. data/lib/akeyless/models/rotated_secret_delete_sync.rb +11 -1
  171. data/lib/akeyless/models/rotated_secret_details_info.rb +21 -1
  172. data/lib/akeyless/models/rotated_secret_update_ssh.rb +21 -1
  173. data/lib/akeyless/models/slack_noti_forwarder_details.rb +214 -0
  174. data/lib/akeyless/models/static_secret_delete_sync.rb +11 -1
  175. data/lib/akeyless/models/teams_noti_forwarder_details.rb +214 -0
  176. data/lib/akeyless/models/update_account_settings.rb +21 -1
  177. data/lib/akeyless/models/update_auth_method.rb +12 -1
  178. data/lib/akeyless/models/update_auth_method_awsiam.rb +12 -1
  179. data/lib/akeyless/models/update_auth_method_azure_ad.rb +12 -1
  180. data/lib/akeyless/models/update_auth_method_cert.rb +12 -1
  181. data/lib/akeyless/models/update_auth_method_gcp.rb +12 -1
  182. data/lib/akeyless/models/update_auth_method_k8_s.rb +12 -1
  183. data/lib/akeyless/models/update_auth_method_ldap.rb +12 -1
  184. data/lib/akeyless/models/update_auth_method_o_auth2.rb +12 -1
  185. data/lib/akeyless/models/update_auth_method_oci.rb +12 -1
  186. data/lib/akeyless/models/update_auth_method_oidc.rb +12 -1
  187. data/lib/akeyless/models/update_auth_method_saml.rb +12 -1
  188. data/lib/akeyless/models/update_auth_method_universal_identity.rb +12 -1
  189. data/lib/akeyless/models/update_pki_cert_issuer.rb +28 -1
  190. data/lib/akeyless/models/webhook_noti_forwarder_details.rb +253 -0
  191. data/lib/akeyless/models/windows_service_attributes.rb +21 -1
  192. data/lib/akeyless/version.rb +1 -1
  193. data/lib/akeyless.rb +5 -0
  194. data/spec/models/allowed_client_type_spec.rb +42 -0
  195. data/spec/models/noti_forwarder_details_input_spec.rb +66 -0
  196. data/spec/models/slack_noti_forwarder_details_spec.rb +36 -0
  197. data/spec/models/teams_noti_forwarder_details_spec.rb +36 -0
  198. data/spec/models/webhook_noti_forwarder_details_spec.rb +60 -0
  199. metadata +21 -1
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
9
10
  | **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
10
11
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
@@ -26,6 +27,7 @@ require 'akeyless'
26
27
 
27
28
  instance = Akeyless::CreateAuthMethod.new(
28
29
  access_expires: null,
30
+ allowed_client_type: null,
29
31
  audit_logs_claims: null,
30
32
  bound_ips: null,
31
33
  delete_protection: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
9
10
  | **bound_arn** | **Array<String>** | A list of full arns that the access is restricted to | [optional] |
10
11
  | **bound_aws_account_id** | **Array<String>** | A list of AWS account-IDs that the access is restricted to | |
@@ -35,6 +36,7 @@ require 'akeyless'
35
36
 
36
37
  instance = Akeyless::CreateAuthMethodAWSIAM.new(
37
38
  access_expires: null,
39
+ allowed_client_type: null,
38
40
  audit_logs_claims: null,
39
41
  bound_arn: null,
40
42
  bound_aws_account_id: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **audience** | **String** | Deprecated (Deprecated) The audience in the JWT | [optional][default to 'https://management.azure.com/'] |
9
10
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
10
11
  | **bound_group_id** | **Array<String>** | A list of group ids that the access is restricted to | [optional] |
@@ -39,6 +40,7 @@ require 'akeyless'
39
40
 
40
41
  instance = Akeyless::CreateAuthMethodAzureAD.new(
41
42
  access_expires: null,
43
+ allowed_client_type: null,
42
44
  audience: null,
43
45
  audit_logs_claims: null,
44
46
  bound_group_id: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **allowed_cors** | **String** | Comma separated list of allowed CORS domains to be validated as part of the authentication flow. | [optional] |
9
10
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
10
11
  | **bound_common_names** | **Array<String>** | A list of names. At least one must exist in the Common Name. Supports globbing. | [optional] |
@@ -36,6 +37,7 @@ require 'akeyless'
36
37
 
37
38
  instance = Akeyless::CreateAuthMethodCert.new(
38
39
  access_expires: null,
40
+ allowed_client_type: null,
39
41
  allowed_cors: null,
40
42
  audit_logs_claims: null,
41
43
  bound_common_names: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
9
10
  | **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
10
11
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
@@ -29,6 +30,7 @@ require 'akeyless'
29
30
 
30
31
  instance = Akeyless::CreateAuthMethodEmail.new(
31
32
  access_expires: null,
33
+ allowed_client_type: null,
32
34
  audit_logs_claims: null,
33
35
  bound_ips: null,
34
36
  delete_protection: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **audience** | **String** | The audience to verify in the JWT received by the client | [default to 'akeyless.io'] |
9
10
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
10
11
  | **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
@@ -35,6 +36,7 @@ require 'akeyless'
35
36
 
36
37
  instance = Akeyless::CreateAuthMethodGCP.new(
37
38
  access_expires: null,
39
+ allowed_client_type: null,
38
40
  audience: null,
39
41
  audit_logs_claims: null,
40
42
  bound_ips: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
9
10
  | **auth_url** | **String** | sts URL | [optional][default to 'https://iam.myhwclouds.com:443/v3'] |
10
11
  | **bound_domain_id** | **Array<String>** | A list of domain IDs that the access is restricted to | [optional] |
@@ -33,6 +34,7 @@ require 'akeyless'
33
34
 
34
35
  instance = Akeyless::CreateAuthMethodHuawei.new(
35
36
  access_expires: null,
37
+ allowed_client_type: null,
36
38
  audit_logs_claims: null,
37
39
  auth_url: null,
38
40
  bound_domain_id: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **audience** | **String** | The audience in the Kubernetes JWT that the access is restricted to | [optional] |
9
10
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
10
11
  | **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
@@ -32,6 +33,7 @@ require 'akeyless'
32
33
 
33
34
  instance = Akeyless::CreateAuthMethodK8S.new(
34
35
  access_expires: null,
36
+ allowed_client_type: null,
35
37
  audience: null,
36
38
  audit_logs_claims: null,
37
39
  bound_ips: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
9
10
  | **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
10
11
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
@@ -29,6 +30,7 @@ require 'akeyless'
29
30
 
30
31
  instance = Akeyless::CreateAuthMethodLDAP.new(
31
32
  access_expires: null,
33
+ allowed_client_type: null,
32
34
  audit_logs_claims: null,
33
35
  bound_ips: null,
34
36
  delete_protection: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **audience** | **String** | The audience in the JWT | [optional] |
9
10
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
10
11
  | **bound_client_ids** | **Array<String>** | The clients ids that the access is restricted to | [optional] |
@@ -36,6 +37,7 @@ require 'akeyless'
36
37
 
37
38
  instance = Akeyless::CreateAuthMethodOAuth2.new(
38
39
  access_expires: null,
40
+ allowed_client_type: null,
39
41
  audience: null,
40
42
  audit_logs_claims: null,
41
43
  bound_client_ids: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
9
10
  | **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
10
11
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
@@ -28,6 +29,7 @@ require 'akeyless'
28
29
 
29
30
  instance = Akeyless::CreateAuthMethodOCI.new(
30
31
  access_expires: null,
32
+ allowed_client_type: null,
31
33
  audit_logs_claims: null,
32
34
  bound_ips: null,
33
35
  delete_protection: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **allowed_redirect_uri** | **Array<String>** | Allowed redirect URIs after the authentication | [optional] |
9
10
  | **audience** | **String** | Audience claim to be used as part of the authentication flow. In case set, it must match the one configured on the Identity Provider's Application | [optional] |
10
11
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
@@ -35,6 +36,7 @@ require 'akeyless'
35
36
 
36
37
  instance = Akeyless::CreateAuthMethodOIDC.new(
37
38
  access_expires: null,
39
+ allowed_client_type: null,
38
40
  allowed_redirect_uri: null,
39
41
  audience: null,
40
42
  audit_logs_claims: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **allowed_redirect_uri** | **Array<String>** | Allowed redirect URIs after the authentication | [optional] |
9
10
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
10
11
  | **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
@@ -31,6 +32,7 @@ require 'akeyless'
31
32
 
32
33
  instance = Akeyless::CreateAuthMethodSAML.new(
33
34
  access_expires: null,
35
+ allowed_client_type: null,
34
36
  allowed_redirect_uri: null,
35
37
  audit_logs_claims: null,
36
38
  bound_ips: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
8
+ | **allowed_client_type** | **Array<String>** | | [optional] |
8
9
  | **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
9
10
  | **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
10
11
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
@@ -29,6 +30,7 @@ require 'akeyless'
29
30
 
30
31
  instance = Akeyless::CreateAuthMethodUniversalIdentity.new(
31
32
  access_expires: null,
33
+ allowed_client_type: null,
32
34
  audit_logs_claims: null,
33
35
  bound_ips: null,
34
36
  delete_protection: null,
@@ -17,7 +17,9 @@
17
17
  | **code_signing_flag** | **Boolean** | If set, certificates will be flagged for code signing use | [optional] |
18
18
  | **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
19
19
  | **create_private_crl** | **Boolean** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] |
20
+ | **create_private_ocsp** | **Boolean** | | [optional] |
20
21
  | **create_public_crl** | **Boolean** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] |
22
+ | **create_public_ocsp** | **Boolean** | | [optional] |
21
23
  | **critical_key_usage** | **String** | Mark key usage as critical [true/false] | [optional][default to 'true'] |
22
24
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
23
25
  | **description** | **String** | Description of the object | [optional] |
@@ -36,6 +38,7 @@
36
38
  | **name** | **String** | PKI certificate issuer name | |
37
39
  | **not_enforce_hostnames** | **Boolean** | If set, any names are allowed for CN and SANs in the certificate and not only a valid host name | [optional] |
38
40
  | **not_require_cn** | **Boolean** | If set, clients can request certificates without a CN | [optional] |
41
+ | **ocsp_ttl** | **String** | | [optional] |
39
42
  | **organizational_units** | **String** | A comma-separated list of organizational units (OU) that will be set in the issued certificate | [optional] |
40
43
  | **organizations** | **String** | A comma-separated list of organizations (O) that will be set in the issued certificate | [optional] |
41
44
  | **postal_code** | **String** | A comma-separated list of postal codes that will be set in the issued certificate | [optional] |
@@ -69,7 +72,9 @@ instance = Akeyless::CreatePKICertIssuer.new(
69
72
  code_signing_flag: null,
70
73
  country: null,
71
74
  create_private_crl: null,
75
+ create_private_ocsp: null,
72
76
  create_public_crl: null,
77
+ create_public_ocsp: null,
73
78
  critical_key_usage: null,
74
79
  delete_protection: null,
75
80
  description: null,
@@ -88,6 +93,7 @@ instance = Akeyless::CreatePKICertIssuer.new(
88
93
  name: null,
89
94
  not_enforce_hostnames: null,
90
95
  not_require_cn: null,
96
+ ocsp_ttl: null,
91
97
  organizational_units: null,
92
98
  organizations: null,
93
99
  postal_code: null,
@@ -94,9 +94,12 @@
94
94
  | **externally_provided_user** | **String** | | [optional] |
95
95
  | **failure_message** | **String** | | [optional] |
96
96
  | **fixed_user_only** | **String** | | [optional] |
97
+ | **gcp_access_type** | **String** | | [optional] |
98
+ | **gcp_fixed_user_claim_keyname** | **String** | | [optional] |
97
99
  | **gcp_key_algo** | **String** | | [optional] |
98
100
  | **gcp_project_id** | **String** | | [optional] |
99
101
  | **gcp_role_bindings** | **Hash<String, Array<String>>** | | [optional] |
102
+ | **gcp_role_names** | **String** | | [optional] |
100
103
  | **gcp_service_account_email** | **String** | GCPServiceAccountEmail overrides the deprecated field from the target | [optional] |
101
104
  | **gcp_service_account_key** | **String** | | [optional] |
102
105
  | **gcp_service_account_key_base64** | **String** | | [optional] |
@@ -187,9 +190,11 @@
187
190
  | **mongodb_is_atlas** | **Boolean** | | [optional] |
188
191
  | **mongodb_password** | **String** | | [optional] |
189
192
  | **mongodb_roles** | **String** | common fields | [optional] |
193
+ | **mongodb_scopes** | **String** | | [optional] |
190
194
  | **mongodb_uri_connection** | **String** | mongodb fields | [optional] |
191
195
  | **mongodb_uri_options** | **String** | | [optional] |
192
196
  | **mongodb_username** | **String** | | [optional] |
197
+ | **mssql_allowed_db_names** | **String** | Comma-separated list of allowed DB names for runtime selection when fetching the secret value. Empty string => use target DB name only (no override allowed) \"*\" => any DB name is allowed One or more names => user must select one of the provided names | [optional] |
193
198
  | **mssql_creation_statements** | **String** | | [optional] |
194
199
  | **mssql_revocation_statements** | **String** | | [optional] |
195
200
  | **mysql_creation_statements** | **String** | | [optional] |
@@ -360,9 +365,12 @@ instance = Akeyless::DSProducerDetails.new(
360
365
  externally_provided_user: null,
361
366
  failure_message: null,
362
367
  fixed_user_only: null,
368
+ gcp_access_type: null,
369
+ gcp_fixed_user_claim_keyname: null,
363
370
  gcp_key_algo: null,
364
371
  gcp_project_id: null,
365
372
  gcp_role_bindings: null,
373
+ gcp_role_names: null,
366
374
  gcp_service_account_email: null,
367
375
  gcp_service_account_key: null,
368
376
  gcp_service_account_key_base64: null,
@@ -453,9 +461,11 @@ instance = Akeyless::DSProducerDetails.new(
453
461
  mongodb_is_atlas: null,
454
462
  mongodb_password: null,
455
463
  mongodb_roles: null,
464
+ mongodb_scopes: null,
456
465
  mongodb_uri_connection: null,
457
466
  mongodb_uri_options: null,
458
467
  mongodb_username: null,
468
+ mssql_allowed_db_names: null,
459
469
  mssql_creation_statements: null,
460
470
  mssql_revocation_statements: null,
461
471
  mysql_creation_statements: null,
@@ -4,21 +4,29 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **access_type** | **String** | | [optional] |
7
8
  | **custom_username_template** | **String** | Customize how temporary usernames are generated using go template | [optional] |
8
9
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
9
10
  | **description** | **String** | Description of the object | [optional] |
11
+ | **fixed_user_claim_keyname** | **String** | For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external) | [optional][default to 'ext_email'] |
10
12
  | **gcp_cred_type** | **String** | | [optional] |
11
13
  | **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
12
- | **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
13
- | **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
14
- | **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
15
- | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
14
+ | **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key) | [optional] |
15
+ | **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations | [optional] |
16
+ | **gcp_sa_email** | **String** | The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed) | [optional] |
17
+ | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token) | [optional] |
16
18
  | **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
17
19
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
18
20
  | **name** | **String** | Dynamic secret name | |
19
21
  | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
20
- | **role_binding** | **String** | Role binding definitions in json format | [optional] |
21
- | **service_account_type** | **String** | The type of the gcp dynamic secret. Options[fixed, dynamic] | [default to 'fixed'] |
22
+ | **role_binding** | **String** | Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic) | [optional] |
23
+ | **role_names** | **String** | Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external) | [optional] |
24
+ | **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
25
+ | **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
26
+ | **secure_access_url** | **String** | Destination URL to inject secrets | [optional] |
27
+ | **secure_access_web_browsing** | **Boolean** | Secure browser via Akeyless's Secure Remote Access (SRA) | [optional][default to false] |
28
+ | **secure_access_web_proxy** | **Boolean** | Web-Proxy via Akeyless's Secure Remote Access (SRA) | [optional][default to false] |
29
+ | **service_account_type** | **String** | The type of the GCP service account. Options [fixed, dynamic] (Relevant only when --access-type=sa) | [optional][default to 'fixed'] |
22
30
  | **tags** | **Array<String>** | Add tags attached to this object | [optional] |
23
31
  | **target_name** | **String** | Target name | [optional] |
24
32
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -31,9 +39,11 @@
31
39
  require 'akeyless'
32
40
 
33
41
  instance = Akeyless::DynamicSecretCreateGcp.new(
42
+ access_type: null,
34
43
  custom_username_template: null,
35
44
  delete_protection: null,
36
45
  description: null,
46
+ fixed_user_claim_keyname: null,
37
47
  gcp_cred_type: null,
38
48
  gcp_key: null,
39
49
  gcp_key_algo: null,
@@ -45,6 +55,12 @@ instance = Akeyless::DynamicSecretCreateGcp.new(
45
55
  name: null,
46
56
  producer_encryption_key_name: null,
47
57
  role_binding: null,
58
+ role_names: null,
59
+ secure_access_delay: null,
60
+ secure_access_enable: null,
61
+ secure_access_url: null,
62
+ secure_access_web_browsing: null,
63
+ secure_access_web_proxy: null,
48
64
  service_account_type: null,
49
65
  tags: null,
50
66
  target_name: null,
@@ -18,6 +18,7 @@
18
18
  | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
19
19
  | **role_name** | **String** | Name of the admin role to assign to the user, relevant only for role access-mode | [optional] |
20
20
  | **role_scope** | **String** | | [optional] |
21
+ | **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
21
22
  | **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
22
23
  | **secure_access_url** | **String** | Destination URL to inject secrets | [optional] |
23
24
  | **secure_access_web** | **Boolean** | Enable Web Secure Remote Access | [optional][default to true] |
@@ -49,6 +50,7 @@ instance = Akeyless::DynamicSecretCreateGoogleWorkspace.new(
49
50
  producer_encryption_key_name: null,
50
51
  role_name: null,
51
52
  role_scope: null,
53
+ secure_access_delay: null,
52
54
  secure_access_enable: null,
53
55
  secure_access_url: null,
54
56
  secure_access_web: null,
@@ -18,6 +18,7 @@
18
18
  | **mongodb_name** | **String** | MongoDB Name | [optional] |
19
19
  | **mongodb_password** | **String** | MongoDB server password. You will prompted to provide a password if it will not appear in CLI parameters | [optional] |
20
20
  | **mongodb_roles** | **String** | MongoDB Roles | [optional][default to '[]'] |
21
+ | **mongodb_scopes** | **String** | MongoDB Scopes (Atlas only) | [optional] |
21
22
  | **mongodb_server_uri** | **String** | MongoDB server URI | [optional] |
22
23
  | **mongodb_uri_options** | **String** | MongoDB server URI options | [optional] |
23
24
  | **mongodb_username** | **String** | MongoDB server username | [optional] |
@@ -57,6 +58,7 @@ instance = Akeyless::DynamicSecretCreateMongoDb.new(
57
58
  mongodb_name: null,
58
59
  mongodb_password: null,
59
60
  mongodb_roles: null,
61
+ mongodb_scopes: null,
60
62
  mongodb_server_uri: null,
61
63
  mongodb_uri_options: null,
62
64
  mongodb_username: null,
@@ -9,6 +9,7 @@
9
9
  | **description** | **String** | Description of the object | [optional] |
10
10
  | **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
11
11
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
+ | **mssql_allowed_db_names** | **String** | CSV of allowed DB names for runtime selection when getting the secret value. Empty => use target DB only; \"*\" => any DB allowed; One or more names => user must choose from this list | [optional] |
12
13
  | **mssql_create_statements** | **String** | MSSQL Creation statements | [optional] |
13
14
  | **mssql_dbname** | **String** | MSSQL Name | [optional] |
14
15
  | **mssql_host** | **String** | MSSQL Host | [optional][default to '127.0.0.1'] |
@@ -44,6 +45,7 @@ instance = Akeyless::DynamicSecretCreateMsSql.new(
44
45
  description: null,
45
46
  item_custom_fields: null,
46
47
  json: null,
48
+ mssql_allowed_db_names: null,
47
49
  mssql_create_statements: null,
48
50
  mssql_dbname: null,
49
51
  mssql_host: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **args** | **Array<String>** | Optional arguments as key=value pairs or JSON strings, e.g - \\\"--args=csr=base64_encoded_csr --args=common_name=bar\\\" or args='{\\\"csr\\\":\\\"base64_encoded_csr\\\"}. It is possible to combine both formats.' | [optional] |
8
+ | **dbname** | **String** | DBName: Optional override DB name (works only if DS allows it. only relevant for MSSQL) | [optional] |
8
9
  | **host** | **String** | Host | [optional] |
9
10
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
10
11
  | **name** | **String** | Dynamic secret name | |
@@ -20,6 +21,7 @@ require 'akeyless'
20
21
 
21
22
  instance = Akeyless::DynamicSecretGetValue.new(
22
23
  args: null,
24
+ dbname: null,
23
25
  host: null,
24
26
  json: null,
25
27
  name: null,
@@ -4,22 +4,30 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **access_type** | **String** | | [optional] |
7
8
  | **custom_username_template** | **String** | Customize how temporary usernames are generated using go template | [optional] |
8
9
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
9
10
  | **description** | **String** | Description of the object | [optional] |
11
+ | **fixed_user_claim_keyname** | **String** | For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external) | [optional][default to 'ext_email'] |
10
12
  | **gcp_cred_type** | **String** | | [optional] |
11
13
  | **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
12
- | **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
13
- | **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations (tmp service accounts) | [optional] |
14
- | **gcp_sa_email** | **String** | The email of the fixed service acocunt to generate keys or tokens for. (revelant for service-account-type=fixed) | [optional] |
15
- | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
14
+ | **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key) | [optional] |
15
+ | **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations | [optional] |
16
+ | **gcp_sa_email** | **String** | The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed) | [optional] |
17
+ | **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token) | [optional] |
16
18
  | **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
17
19
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
18
20
  | **name** | **String** | Dynamic secret name | |
19
21
  | **new_name** | **String** | Dynamic secret name | [optional] |
20
22
  | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
21
- | **role_binding** | **String** | Role binding definitions in json format | [optional] |
22
- | **service_account_type** | **String** | The type of the gcp dynamic secret. Options[fixed, dynamic] | [default to 'fixed'] |
23
+ | **role_binding** | **String** | Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic) | [optional] |
24
+ | **role_names** | **String** | Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external) | [optional] |
25
+ | **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
26
+ | **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
27
+ | **secure_access_url** | **String** | Destination URL to inject secrets | [optional] |
28
+ | **secure_access_web_browsing** | **Boolean** | Secure browser via Akeyless's Secure Remote Access (SRA) | [optional][default to false] |
29
+ | **secure_access_web_proxy** | **Boolean** | Web-Proxy via Akeyless's Secure Remote Access (SRA) | [optional][default to false] |
30
+ | **service_account_type** | **String** | The type of the GCP service account. Options [fixed, dynamic] (Relevant only when --access-type=sa) | [optional][default to 'fixed'] |
23
31
  | **tags** | **Array<String>** | Add tags attached to this object | [optional] |
24
32
  | **target_name** | **String** | Target name | [optional] |
25
33
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -32,9 +40,11 @@
32
40
  require 'akeyless'
33
41
 
34
42
  instance = Akeyless::DynamicSecretUpdateGcp.new(
43
+ access_type: null,
35
44
  custom_username_template: null,
36
45
  delete_protection: null,
37
46
  description: null,
47
+ fixed_user_claim_keyname: null,
38
48
  gcp_cred_type: null,
39
49
  gcp_key: null,
40
50
  gcp_key_algo: null,
@@ -47,6 +57,12 @@ instance = Akeyless::DynamicSecretUpdateGcp.new(
47
57
  new_name: null,
48
58
  producer_encryption_key_name: null,
49
59
  role_binding: null,
60
+ role_names: null,
61
+ secure_access_delay: null,
62
+ secure_access_enable: null,
63
+ secure_access_url: null,
64
+ secure_access_web_browsing: null,
65
+ secure_access_web_proxy: null,
50
66
  service_account_type: null,
51
67
  tags: null,
52
68
  target_name: null,
@@ -19,6 +19,7 @@
19
19
  | **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
20
20
  | **role_name** | **String** | Name of the admin role to assign to the user, relevant only for role access-mode | [optional] |
21
21
  | **role_scope** | **String** | | [optional] |
22
+ | **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
22
23
  | **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
23
24
  | **secure_access_url** | **String** | Destination URL to inject secrets | [optional] |
24
25
  | **secure_access_web** | **Boolean** | Enable Web Secure Remote Access | [optional][default to true] |
@@ -51,6 +52,7 @@ instance = Akeyless::DynamicSecretUpdateGoogleWorkspace.new(
51
52
  producer_encryption_key_name: null,
52
53
  role_name: null,
53
54
  role_scope: null,
55
+ secure_access_delay: null,
54
56
  secure_access_enable: null,
55
57
  secure_access_url: null,
56
58
  secure_access_web: null,
@@ -18,6 +18,7 @@
18
18
  | **mongodb_name** | **String** | MongoDB Name | [optional] |
19
19
  | **mongodb_password** | **String** | MongoDB server password. You will prompted to provide a password if it will not appear in CLI parameters | [optional] |
20
20
  | **mongodb_roles** | **String** | MongoDB Roles | [optional][default to '[]'] |
21
+ | **mongodb_scopes** | **String** | MongoDB Scopes (Atlas only) | [optional] |
21
22
  | **mongodb_server_uri** | **String** | MongoDB server URI | [optional] |
22
23
  | **mongodb_uri_options** | **String** | MongoDB server URI options | [optional] |
23
24
  | **mongodb_username** | **String** | MongoDB server username | [optional] |
@@ -58,6 +59,7 @@ instance = Akeyless::DynamicSecretUpdateMongoDb.new(
58
59
  mongodb_name: null,
59
60
  mongodb_password: null,
60
61
  mongodb_roles: null,
62
+ mongodb_scopes: null,
61
63
  mongodb_server_uri: null,
62
64
  mongodb_uri_options: null,
63
65
  mongodb_username: null,
@@ -9,6 +9,7 @@
9
9
  | **description** | **String** | Description of the object | [optional] |
10
10
  | **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
11
11
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
12
+ | **mssql_allowed_db_names** | **String** | CSV of allowed DB names for runtime selection when getting the secret value. Empty => use target DB only; \"*\" => any DB allowed; One or more names => user must choose from this list | [optional] |
12
13
  | **mssql_create_statements** | **String** | MSSQL Creation statements | [optional] |
13
14
  | **mssql_dbname** | **String** | MSSQL Name | [optional] |
14
15
  | **mssql_host** | **String** | MSSQL Host | [optional][default to '127.0.0.1'] |
@@ -45,6 +46,7 @@ instance = Akeyless::DynamicSecretUpdateMsSql.new(
45
46
  description: null,
46
47
  item_custom_fields: null,
47
48
  json: null,
49
+ mssql_allowed_db_names: null,
48
50
  mssql_create_statements: null,
49
51
  mssql_dbname: null,
50
52
  mssql_host: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **event_forwarder** | [**NotiForwarder**](NotiForwarder.md) | | [optional] |
8
+ | **event_forwarder_details** | [**NotiForwarderDetailsInput**](NotiForwarderDetailsInput.md) | | [optional] |
8
9
 
9
10
  ## Example
10
11
 
@@ -12,7 +13,8 @@
12
13
  require 'akeyless'
13
14
 
14
15
  instance = Akeyless::EventForwarderGetOutput.new(
15
- event_forwarder: null
16
+ event_forwarder: null,
17
+ event_forwarder_details: null
16
18
  )
17
19
  ```
18
20
 
@@ -7,6 +7,7 @@
7
7
  | **service_account_key_decoded** | **String** | | [optional] |
8
8
  | **ad_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration) | [optional] |
9
9
  | **ad_computer_base_dn** | **String** | Distinguished Name of Computer objects (servers) to search in Active Directory e.g.: CN=Computers,DC=example,DC=com (Relevant only for Active Directory migration) | [optional] |
10
+ | **ad_discover_iis_app** | **String** | Enable/Disable discovery of IIS application from each domain server as part of the SSH/Windows Rotated Secrets. Default is false. (Relevant only for Active Directory migration) | [optional][default to 'false'] |
10
11
  | **ad_discover_services** | **String** | Enable/Disable discovery of Windows services from each domain server as part of the SSH/Windows Rotated Secrets. Default is false. (Relevant only for Active Directory migration) | [optional][default to 'false'] |
11
12
  | **ad_discovery_types** | **Array<String>** | Set migration discovery types (domain-users, computers, local-users). (Relevant only for Active Directory migration) | [optional] |
12
13
  | **ad_domain_name** | **String** | Active Directory Domain Name (Relevant only for Active Directory migration) | [optional] |
@@ -73,6 +74,7 @@ instance = Akeyless::GatewayCreateMigration.new(
73
74
  service_account_key_decoded: null,
74
75
  ad_auto_rotate: null,
75
76
  ad_computer_base_dn: null,
77
+ ad_discover_iis_app: null,
76
78
  ad_discover_services: null,
77
79
  ad_discovery_types: null,
78
80
  ad_domain_name: null,