akeyless 5.0.14 → 5.0.16
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +6 -1
- data/docs/AccountGeneralSettings.md +2 -0
- data/docs/ActiveDirectoryPayload.md +2 -0
- data/docs/AllowedClientType.md +20 -0
- data/docs/AuthMethodAccessInfo.md +2 -0
- data/docs/AuthMethodCreateApiKey.md +2 -0
- data/docs/AuthMethodCreateAwsIam.md +2 -0
- data/docs/AuthMethodCreateAzureAD.md +2 -0
- data/docs/AuthMethodCreateCert.md +2 -0
- data/docs/AuthMethodCreateEmail.md +2 -0
- data/docs/AuthMethodCreateGcp.md +2 -0
- data/docs/AuthMethodCreateK8s.md +2 -0
- data/docs/AuthMethodCreateKerberos.md +2 -0
- data/docs/AuthMethodCreateLdap.md +2 -0
- data/docs/AuthMethodCreateOCI.md +2 -0
- data/docs/AuthMethodCreateOIDC.md +2 -0
- data/docs/AuthMethodCreateOauth2.md +2 -0
- data/docs/AuthMethodCreateSAML.md +2 -0
- data/docs/AuthMethodCreateUniversalIdentity.md +2 -0
- data/docs/AuthMethodUpdateApiKey.md +2 -0
- data/docs/AuthMethodUpdateAwsIam.md +2 -0
- data/docs/AuthMethodUpdateAzureAD.md +2 -0
- data/docs/AuthMethodUpdateCert.md +2 -0
- data/docs/AuthMethodUpdateEmail.md +2 -0
- data/docs/AuthMethodUpdateGcp.md +2 -0
- data/docs/AuthMethodUpdateK8s.md +2 -0
- data/docs/AuthMethodUpdateKerberos.md +2 -0
- data/docs/AuthMethodUpdateLdap.md +2 -0
- data/docs/AuthMethodUpdateOCI.md +2 -0
- data/docs/AuthMethodUpdateOIDC.md +2 -0
- data/docs/AuthMethodUpdateOauth2.md +2 -0
- data/docs/AuthMethodUpdateSAML.md +2 -0
- data/docs/AuthMethodUpdateUniversalIdentity.md +2 -0
- data/docs/BastionGlobalConf.md +4 -0
- data/docs/CreateAuthMethod.md +2 -0
- data/docs/CreateAuthMethodAWSIAM.md +2 -0
- data/docs/CreateAuthMethodAzureAD.md +2 -0
- data/docs/CreateAuthMethodCert.md +2 -0
- data/docs/CreateAuthMethodEmail.md +2 -0
- data/docs/CreateAuthMethodGCP.md +2 -0
- data/docs/CreateAuthMethodHuawei.md +2 -0
- data/docs/CreateAuthMethodK8S.md +2 -0
- data/docs/CreateAuthMethodLDAP.md +2 -0
- data/docs/CreateAuthMethodOAuth2.md +2 -0
- data/docs/CreateAuthMethodOCI.md +2 -0
- data/docs/CreateAuthMethodOIDC.md +2 -0
- data/docs/CreateAuthMethodSAML.md +2 -0
- data/docs/CreateAuthMethodUniversalIdentity.md +2 -0
- data/docs/CreatePKICertIssuer.md +6 -0
- data/docs/DSProducerDetails.md +10 -0
- data/docs/DynamicSecretCreateGcp.md +22 -6
- data/docs/DynamicSecretCreateGoogleWorkspace.md +2 -0
- data/docs/DynamicSecretCreateMongoDb.md +2 -0
- data/docs/DynamicSecretCreateMsSql.md +2 -0
- data/docs/DynamicSecretGetValue.md +2 -0
- data/docs/DynamicSecretUpdateGcp.md +22 -6
- data/docs/DynamicSecretUpdateGoogleWorkspace.md +2 -0
- data/docs/DynamicSecretUpdateMongoDb.md +2 -0
- data/docs/DynamicSecretUpdateMsSql.md +2 -0
- data/docs/EventForwarderGetOutput.md +3 -1
- data/docs/GatewayCreateMigration.md +2 -0
- data/docs/GatewayCreateProducerGcp.md +22 -6
- data/docs/GatewayCreateProducerMSSQL.md +2 -0
- data/docs/GatewayCreateProducerMongo.md +2 -0
- data/docs/GatewayUpdateMigration.md +2 -0
- data/docs/GatewayUpdateProducerGcp.md +22 -6
- data/docs/GatewayUpdateProducerMSSQL.md +2 -0
- data/docs/GatewayUpdateProducerMongo.md +2 -0
- data/docs/GatewayUpdateRemoteAccess.md +4 -0
- data/docs/GetDynamicSecretValue.md +2 -0
- data/docs/NotiForwarderDetailsInput.md +28 -0
- data/docs/PKICertificateIssueDetails.md +6 -0
- data/docs/RotatedSecretCreateSsh.md +4 -0
- data/docs/RotatedSecretDeleteSync.md +2 -0
- data/docs/RotatedSecretDetailsInfo.md +4 -0
- data/docs/RotatedSecretUpdateSsh.md +4 -0
- data/docs/SlackNotiForwarderDetails.md +18 -0
- data/docs/StaticSecretDeleteSync.md +2 -0
- data/docs/TeamsNotiForwarderDetails.md +18 -0
- data/docs/UpdateAccountSettings.md +4 -0
- data/docs/UpdateAuthMethod.md +2 -0
- data/docs/UpdateAuthMethodAWSIAM.md +2 -0
- data/docs/UpdateAuthMethodAzureAD.md +2 -0
- data/docs/UpdateAuthMethodCert.md +2 -0
- data/docs/UpdateAuthMethodGCP.md +2 -0
- data/docs/UpdateAuthMethodK8S.md +2 -0
- data/docs/UpdateAuthMethodLDAP.md +2 -0
- data/docs/UpdateAuthMethodOAuth2.md +2 -0
- data/docs/UpdateAuthMethodOCI.md +2 -0
- data/docs/UpdateAuthMethodOIDC.md +2 -0
- data/docs/UpdateAuthMethodSAML.md +2 -0
- data/docs/UpdateAuthMethodUniversalIdentity.md +2 -0
- data/docs/UpdatePKICertIssuer.md +6 -0
- data/docs/V2Api.md +4 -4
- data/docs/WebhookNotiForwarderDetails.md +26 -0
- data/docs/WindowsServiceAttributes.md +4 -0
- data/lib/akeyless/models/account_general_settings.rb +10 -1
- data/lib/akeyless/models/active_directory_payload.rb +10 -1
- data/lib/akeyless/models/allowed_client_type.rb +225 -0
- data/lib/akeyless/models/auth_method_access_info.rb +12 -1
- data/lib/akeyless/models/auth_method_create_api_key.rb +12 -1
- data/lib/akeyless/models/auth_method_create_aws_iam.rb +12 -1
- data/lib/akeyless/models/auth_method_create_azure_ad.rb +12 -1
- data/lib/akeyless/models/auth_method_create_cert.rb +12 -1
- data/lib/akeyless/models/auth_method_create_email.rb +12 -1
- data/lib/akeyless/models/auth_method_create_gcp.rb +12 -1
- data/lib/akeyless/models/auth_method_create_k8s.rb +12 -1
- data/lib/akeyless/models/auth_method_create_kerberos.rb +12 -1
- data/lib/akeyless/models/auth_method_create_ldap.rb +12 -1
- data/lib/akeyless/models/auth_method_create_oauth2.rb +12 -1
- data/lib/akeyless/models/auth_method_create_oci.rb +12 -1
- data/lib/akeyless/models/auth_method_create_oidc.rb +12 -1
- data/lib/akeyless/models/auth_method_create_saml.rb +12 -1
- data/lib/akeyless/models/auth_method_create_universal_identity.rb +12 -1
- data/lib/akeyless/models/auth_method_update_api_key.rb +12 -1
- data/lib/akeyless/models/auth_method_update_aws_iam.rb +12 -1
- data/lib/akeyless/models/auth_method_update_azure_ad.rb +12 -1
- data/lib/akeyless/models/auth_method_update_cert.rb +12 -1
- data/lib/akeyless/models/auth_method_update_email.rb +12 -1
- data/lib/akeyless/models/auth_method_update_gcp.rb +12 -1
- data/lib/akeyless/models/auth_method_update_k8s.rb +12 -1
- data/lib/akeyless/models/auth_method_update_kerberos.rb +12 -1
- data/lib/akeyless/models/auth_method_update_ldap.rb +12 -1
- data/lib/akeyless/models/auth_method_update_oauth2.rb +12 -1
- data/lib/akeyless/models/auth_method_update_oci.rb +12 -1
- data/lib/akeyless/models/auth_method_update_oidc.rb +12 -1
- data/lib/akeyless/models/auth_method_update_saml.rb +12 -1
- data/lib/akeyless/models/auth_method_update_universal_identity.rb +12 -1
- data/lib/akeyless/models/bastion_global_conf.rb +19 -1
- data/lib/akeyless/models/create_auth_method.rb +12 -1
- data/lib/akeyless/models/create_auth_method_awsiam.rb +12 -1
- data/lib/akeyless/models/create_auth_method_azure_ad.rb +12 -1
- data/lib/akeyless/models/create_auth_method_cert.rb +12 -1
- data/lib/akeyless/models/create_auth_method_email.rb +12 -1
- data/lib/akeyless/models/create_auth_method_gcp.rb +12 -1
- data/lib/akeyless/models/create_auth_method_huawei.rb +12 -1
- data/lib/akeyless/models/create_auth_method_k8_s.rb +12 -1
- data/lib/akeyless/models/create_auth_method_ldap.rb +12 -1
- data/lib/akeyless/models/create_auth_method_o_auth2.rb +12 -1
- data/lib/akeyless/models/create_auth_method_oci.rb +12 -1
- data/lib/akeyless/models/create_auth_method_oidc.rb +12 -1
- data/lib/akeyless/models/create_auth_method_saml.rb +12 -1
- data/lib/akeyless/models/create_auth_method_universal_identity.rb +12 -1
- data/lib/akeyless/models/create_pki_cert_issuer.rb +28 -1
- data/lib/akeyless/models/ds_producer_details.rb +47 -1
- data/lib/akeyless/models/dynamic_secret_create_gcp.rb +92 -12
- data/lib/akeyless/models/dynamic_secret_create_google_workspace.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_create_mongo_db.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_create_ms_sql.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_get_value.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_update_gcp.rb +92 -12
- data/lib/akeyless/models/dynamic_secret_update_google_workspace.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_update_mongo_db.rb +11 -1
- data/lib/akeyless/models/dynamic_secret_update_ms_sql.rb +11 -1
- data/lib/akeyless/models/event_forwarder_get_output.rb +13 -4
- data/lib/akeyless/models/gateway_create_migration.rb +13 -1
- data/lib/akeyless/models/gateway_create_producer_gcp.rb +92 -12
- data/lib/akeyless/models/gateway_create_producer_mongo.rb +11 -1
- data/lib/akeyless/models/gateway_create_producer_mssql.rb +11 -1
- data/lib/akeyless/models/gateway_update_migration.rb +13 -1
- data/lib/akeyless/models/gateway_update_producer_gcp.rb +92 -12
- data/lib/akeyless/models/gateway_update_producer_mongo.rb +11 -1
- data/lib/akeyless/models/gateway_update_producer_mssql.rb +11 -1
- data/lib/akeyless/models/gateway_update_remote_access.rb +25 -1
- data/lib/akeyless/models/get_dynamic_secret_value.rb +11 -1
- data/lib/akeyless/models/noti_forwarder_details_input.rb +261 -0
- data/lib/akeyless/models/pki_certificate_issue_details.rb +31 -1
- data/lib/akeyless/models/rotated_secret_create_ssh.rb +21 -1
- data/lib/akeyless/models/rotated_secret_delete_sync.rb +11 -1
- data/lib/akeyless/models/rotated_secret_details_info.rb +21 -1
- data/lib/akeyless/models/rotated_secret_update_ssh.rb +21 -1
- data/lib/akeyless/models/slack_noti_forwarder_details.rb +214 -0
- data/lib/akeyless/models/static_secret_delete_sync.rb +11 -1
- data/lib/akeyless/models/teams_noti_forwarder_details.rb +214 -0
- data/lib/akeyless/models/update_account_settings.rb +21 -1
- data/lib/akeyless/models/update_auth_method.rb +12 -1
- data/lib/akeyless/models/update_auth_method_awsiam.rb +12 -1
- data/lib/akeyless/models/update_auth_method_azure_ad.rb +12 -1
- data/lib/akeyless/models/update_auth_method_cert.rb +12 -1
- data/lib/akeyless/models/update_auth_method_gcp.rb +12 -1
- data/lib/akeyless/models/update_auth_method_k8_s.rb +12 -1
- data/lib/akeyless/models/update_auth_method_ldap.rb +12 -1
- data/lib/akeyless/models/update_auth_method_o_auth2.rb +12 -1
- data/lib/akeyless/models/update_auth_method_oci.rb +12 -1
- data/lib/akeyless/models/update_auth_method_oidc.rb +12 -1
- data/lib/akeyless/models/update_auth_method_saml.rb +12 -1
- data/lib/akeyless/models/update_auth_method_universal_identity.rb +12 -1
- data/lib/akeyless/models/update_pki_cert_issuer.rb +28 -1
- data/lib/akeyless/models/webhook_noti_forwarder_details.rb +253 -0
- data/lib/akeyless/models/windows_service_attributes.rb +21 -1
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +5 -0
- data/spec/models/allowed_client_type_spec.rb +42 -0
- data/spec/models/noti_forwarder_details_input_spec.rb +66 -0
- data/spec/models/slack_noti_forwarder_details_spec.rb +36 -0
- data/spec/models/teams_noti_forwarder_details_spec.rb +36 -0
- data/spec/models/webhook_noti_forwarder_details_spec.rb +60 -0
- metadata +21 -1
|
@@ -4,20 +4,28 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **access_type** | **String** | | [optional] |
|
|
7
8
|
| **custom_username_template** | **String** | Customize how temporary usernames are generated using go template | [optional] |
|
|
8
9
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
10
|
+
| **fixed_user_claim_keyname** | **String** | For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external) | [optional][default to 'ext_email'] |
|
|
9
11
|
| **gcp_cred_type** | **String** | | [optional] |
|
|
10
12
|
| **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
|
|
11
|
-
| **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
|
|
12
|
-
| **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations
|
|
13
|
-
| **gcp_sa_email** | **String** | The email of the fixed service
|
|
14
|
-
| **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
|
|
13
|
+
| **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key) | [optional] |
|
|
14
|
+
| **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations | [optional] |
|
|
15
|
+
| **gcp_sa_email** | **String** | The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed) | [optional] |
|
|
16
|
+
| **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token) | [optional] |
|
|
15
17
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
16
18
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
17
19
|
| **name** | **String** | Dynamic secret name | |
|
|
18
20
|
| **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
|
|
19
|
-
| **role_binding** | **String** | Role binding definitions in
|
|
20
|
-
| **
|
|
21
|
+
| **role_binding** | **String** | Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic) | [optional] |
|
|
22
|
+
| **role_names** | **String** | Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external) | [optional] |
|
|
23
|
+
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
|
24
|
+
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
|
25
|
+
| **secure_access_url** | **String** | Destination URL to inject secrets | [optional] |
|
|
26
|
+
| **secure_access_web_browsing** | **Boolean** | Secure browser via Akeyless's Secure Remote Access (SRA) | [optional][default to false] |
|
|
27
|
+
| **secure_access_web_proxy** | **Boolean** | Web-Proxy via Akeyless's Secure Remote Access (SRA) | [optional][default to false] |
|
|
28
|
+
| **service_account_type** | **String** | The type of the GCP service account. Options [fixed, dynamic] (Relevant only when --access-type=sa) | [optional][default to 'fixed'] |
|
|
21
29
|
| **tags** | **Array<String>** | Add tags attached to this object | [optional] |
|
|
22
30
|
| **target_name** | **String** | Target name | [optional] |
|
|
23
31
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
@@ -30,8 +38,10 @@
|
|
|
30
38
|
require 'akeyless'
|
|
31
39
|
|
|
32
40
|
instance = Akeyless::GatewayCreateProducerGcp.new(
|
|
41
|
+
access_type: null,
|
|
33
42
|
custom_username_template: null,
|
|
34
43
|
delete_protection: null,
|
|
44
|
+
fixed_user_claim_keyname: null,
|
|
35
45
|
gcp_cred_type: null,
|
|
36
46
|
gcp_key: null,
|
|
37
47
|
gcp_key_algo: null,
|
|
@@ -43,6 +53,12 @@ instance = Akeyless::GatewayCreateProducerGcp.new(
|
|
|
43
53
|
name: null,
|
|
44
54
|
producer_encryption_key_name: null,
|
|
45
55
|
role_binding: null,
|
|
56
|
+
role_names: null,
|
|
57
|
+
secure_access_delay: null,
|
|
58
|
+
secure_access_enable: null,
|
|
59
|
+
secure_access_url: null,
|
|
60
|
+
secure_access_web_browsing: null,
|
|
61
|
+
secure_access_web_proxy: null,
|
|
46
62
|
service_account_type: null,
|
|
47
63
|
tags: null,
|
|
48
64
|
target_name: null,
|
|
@@ -8,6 +8,7 @@
|
|
|
8
8
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
9
9
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
10
10
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
11
|
+
| **mssql_allowed_db_names** | **String** | CSV of allowed DB names for runtime selection when getting the secret value. Empty => use target DB only; \"*\" => any DB allowed; One or more names => user must choose from this list | [optional] |
|
|
11
12
|
| **mssql_create_statements** | **String** | MSSQL Creation statements | [optional] |
|
|
12
13
|
| **mssql_dbname** | **String** | MSSQL Name | [optional] |
|
|
13
14
|
| **mssql_host** | **String** | MSSQL Host | [optional][default to '127.0.0.1'] |
|
|
@@ -42,6 +43,7 @@ instance = Akeyless::GatewayCreateProducerMSSQL.new(
|
|
|
42
43
|
delete_protection: null,
|
|
43
44
|
item_custom_fields: null,
|
|
44
45
|
json: null,
|
|
46
|
+
mssql_allowed_db_names: null,
|
|
45
47
|
mssql_create_statements: null,
|
|
46
48
|
mssql_dbname: null,
|
|
47
49
|
mssql_host: null,
|
|
@@ -17,6 +17,7 @@
|
|
|
17
17
|
| **mongodb_name** | **String** | MongoDB Name | [optional] |
|
|
18
18
|
| **mongodb_password** | **String** | MongoDB server password. You will prompted to provide a password if it will not appear in CLI parameters | [optional] |
|
|
19
19
|
| **mongodb_roles** | **String** | MongoDB Roles | [optional][default to '[]'] |
|
|
20
|
+
| **mongodb_scopes** | **String** | MongoDB Scopes (Atlas only) | [optional] |
|
|
20
21
|
| **mongodb_server_uri** | **String** | MongoDB server URI | [optional] |
|
|
21
22
|
| **mongodb_uri_options** | **String** | MongoDB server URI options | [optional] |
|
|
22
23
|
| **mongodb_username** | **String** | MongoDB server username | [optional] |
|
|
@@ -55,6 +56,7 @@ instance = Akeyless::GatewayCreateProducerMongo.new(
|
|
|
55
56
|
mongodb_name: null,
|
|
56
57
|
mongodb_password: null,
|
|
57
58
|
mongodb_roles: null,
|
|
59
|
+
mongodb_scopes: null,
|
|
58
60
|
mongodb_server_uri: null,
|
|
59
61
|
mongodb_uri_options: null,
|
|
60
62
|
mongodb_username: null,
|
|
@@ -7,6 +7,7 @@
|
|
|
7
7
|
| **service_account_key_decoded** | **String** | | [optional] |
|
|
8
8
|
| **ad_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration) | [optional] |
|
|
9
9
|
| **ad_computer_base_dn** | **String** | Distinguished Name of Computer objects (servers) to search in Active Directory e.g.: CN=Computers,DC=example,DC=com (Relevant only for Active Directory migration) | [optional] |
|
|
10
|
+
| **ad_discover_iis_app** | **String** | Enable/Disable discovery of IIS application from each domain server as part of the SSH/Windows Rotated Secrets. Default is false. (Relevant only for Active Directory migration) | [optional][default to 'false'] |
|
|
10
11
|
| **ad_discover_services** | **String** | Enable/Disable discovery of Windows services from each domain server as part of the SSH/Windows Rotated Secrets. Default is false. (Relevant only for Active Directory migration) | [optional][default to 'false'] |
|
|
11
12
|
| **ad_discovery_types** | **Array<String>** | Set migration discovery types (domain-users, computers, local-users). (Relevant only for Active Directory migration) | [optional] |
|
|
12
13
|
| **ad_domain_name** | **String** | Active Directory Domain Name (Relevant only for Active Directory migration) | [optional] |
|
|
@@ -74,6 +75,7 @@ instance = Akeyless::GatewayUpdateMigration.new(
|
|
|
74
75
|
service_account_key_decoded: null,
|
|
75
76
|
ad_auto_rotate: null,
|
|
76
77
|
ad_computer_base_dn: null,
|
|
78
|
+
ad_discover_iis_app: null,
|
|
77
79
|
ad_discover_services: null,
|
|
78
80
|
ad_discovery_types: null,
|
|
79
81
|
ad_domain_name: null,
|
|
@@ -4,21 +4,29 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **access_type** | **String** | | [optional] |
|
|
7
8
|
| **custom_username_template** | **String** | Customize how temporary usernames are generated using go template | [optional] |
|
|
8
9
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
10
|
+
| **fixed_user_claim_keyname** | **String** | For externally provided users, denotes the key-name of IdP claim to extract the username from (Relevant only when --access-type=external) | [optional][default to 'ext_email'] |
|
|
9
11
|
| **gcp_cred_type** | **String** | | [optional] |
|
|
10
12
|
| **gcp_key** | **String** | Base64-encoded service account private key text | [optional] |
|
|
11
|
-
| **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 | [optional] |
|
|
12
|
-
| **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations
|
|
13
|
-
| **gcp_sa_email** | **String** | The email of the fixed service
|
|
14
|
-
| **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 | [optional] |
|
|
13
|
+
| **gcp_key_algo** | **String** | Service account key algorithm, e.g. KEY_ALG_RSA_1024 (Relevant only when --access-type=sa and --gcp-cred-type=key) | [optional] |
|
|
14
|
+
| **gcp_project_id** | **String** | GCP Project ID override for dynamic secret operations | [optional] |
|
|
15
|
+
| **gcp_sa_email** | **String** | The email of the fixed service account to generate keys or tokens for (Relevant only when --access-type=sa and --service-account-type=fixed) | [optional] |
|
|
16
|
+
| **gcp_token_scopes** | **String** | Access token scopes list, e.g. scope1,scope2 (Relevant only when --access-type=sa; required when --gcp-cred-type=token) | [optional] |
|
|
15
17
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
16
18
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
17
19
|
| **name** | **String** | Dynamic secret name | |
|
|
18
20
|
| **new_name** | **String** | Dynamic secret name | [optional] |
|
|
19
21
|
| **producer_encryption_key_name** | **String** | Dynamic producer encryption key | [optional] |
|
|
20
|
-
| **role_binding** | **String** | Role binding definitions in
|
|
21
|
-
| **
|
|
22
|
+
| **role_binding** | **String** | Role binding definitions in JSON format (Relevant only when --access-type=sa and --service-account-type=dynamic) | [optional] |
|
|
23
|
+
| **role_names** | **String** | Comma-separated list of GCP roles to assign to the user (Relevant only when --access-type=external) | [optional] |
|
|
24
|
+
| **secure_access_delay** | **Integer** | The delay duration, in seconds, to wait after generating just-in-time credentials. Accepted range: 0-120 seconds | [optional] |
|
|
25
|
+
| **secure_access_enable** | **String** | Enable/Disable secure remote access [true/false] | [optional] |
|
|
26
|
+
| **secure_access_url** | **String** | Destination URL to inject secrets | [optional] |
|
|
27
|
+
| **secure_access_web_browsing** | **Boolean** | Secure browser via Akeyless's Secure Remote Access (SRA) | [optional][default to false] |
|
|
28
|
+
| **secure_access_web_proxy** | **Boolean** | Web-Proxy via Akeyless's Secure Remote Access (SRA) | [optional][default to false] |
|
|
29
|
+
| **service_account_type** | **String** | The type of the GCP service account. Options [fixed, dynamic] (Relevant only when --access-type=sa) | [optional][default to 'fixed'] |
|
|
22
30
|
| **tags** | **Array<String>** | Add tags attached to this object | [optional] |
|
|
23
31
|
| **target_name** | **String** | Target name | [optional] |
|
|
24
32
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
@@ -31,8 +39,10 @@
|
|
|
31
39
|
require 'akeyless'
|
|
32
40
|
|
|
33
41
|
instance = Akeyless::GatewayUpdateProducerGcp.new(
|
|
42
|
+
access_type: null,
|
|
34
43
|
custom_username_template: null,
|
|
35
44
|
delete_protection: null,
|
|
45
|
+
fixed_user_claim_keyname: null,
|
|
36
46
|
gcp_cred_type: null,
|
|
37
47
|
gcp_key: null,
|
|
38
48
|
gcp_key_algo: null,
|
|
@@ -45,6 +55,12 @@ instance = Akeyless::GatewayUpdateProducerGcp.new(
|
|
|
45
55
|
new_name: null,
|
|
46
56
|
producer_encryption_key_name: null,
|
|
47
57
|
role_binding: null,
|
|
58
|
+
role_names: null,
|
|
59
|
+
secure_access_delay: null,
|
|
60
|
+
secure_access_enable: null,
|
|
61
|
+
secure_access_url: null,
|
|
62
|
+
secure_access_web_browsing: null,
|
|
63
|
+
secure_access_web_proxy: null,
|
|
48
64
|
service_account_type: null,
|
|
49
65
|
tags: null,
|
|
50
66
|
target_name: null,
|
|
@@ -8,6 +8,7 @@
|
|
|
8
8
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
9
9
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
10
10
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
11
|
+
| **mssql_allowed_db_names** | **String** | CSV of allowed DB names for runtime selection when getting the secret value. Empty => use target DB only; \"*\" => any DB allowed; One or more names => user must choose from this list | [optional] |
|
|
11
12
|
| **mssql_create_statements** | **String** | MSSQL Creation statements | [optional] |
|
|
12
13
|
| **mssql_dbname** | **String** | MSSQL Name | [optional] |
|
|
13
14
|
| **mssql_host** | **String** | MSSQL Host | [optional][default to '127.0.0.1'] |
|
|
@@ -43,6 +44,7 @@ instance = Akeyless::GatewayUpdateProducerMSSQL.new(
|
|
|
43
44
|
delete_protection: null,
|
|
44
45
|
item_custom_fields: null,
|
|
45
46
|
json: null,
|
|
47
|
+
mssql_allowed_db_names: null,
|
|
46
48
|
mssql_create_statements: null,
|
|
47
49
|
mssql_dbname: null,
|
|
48
50
|
mssql_host: null,
|
|
@@ -17,6 +17,7 @@
|
|
|
17
17
|
| **mongodb_name** | **String** | MongoDB Name | [optional] |
|
|
18
18
|
| **mongodb_password** | **String** | MongoDB server password. You will prompted to provide a password if it will not appear in CLI parameters | [optional] |
|
|
19
19
|
| **mongodb_roles** | **String** | MongoDB Roles | [optional][default to '[]'] |
|
|
20
|
+
| **mongodb_scopes** | **String** | MongoDB Scopes (Atlas only) | [optional] |
|
|
20
21
|
| **mongodb_server_uri** | **String** | MongoDB server URI | [optional] |
|
|
21
22
|
| **mongodb_uri_options** | **String** | MongoDB server URI options | [optional] |
|
|
22
23
|
| **mongodb_username** | **String** | MongoDB server username | [optional] |
|
|
@@ -56,6 +57,7 @@ instance = Akeyless::GatewayUpdateProducerMongo.new(
|
|
|
56
57
|
mongodb_name: null,
|
|
57
58
|
mongodb_password: null,
|
|
58
59
|
mongodb_roles: null,
|
|
60
|
+
mongodb_scopes: null,
|
|
59
61
|
mongodb_server_uri: null,
|
|
60
62
|
mongodb_uri_options: null,
|
|
61
63
|
mongodb_username: null,
|
|
@@ -4,7 +4,9 @@
|
|
|
4
4
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **allowed_ssh_url** | **String** | Specify a valid SSH-URL to tunnel to SSH session | [optional][default to 'use-existing'] |
|
|
7
8
|
| **allowed_urls** | **String** | List of valid URLs to redirect from the Portal back to the remote access server (in a comma-delimited list) | [optional][default to 'use-existing'] |
|
|
9
|
+
| **default_session_ttl_minutes** | **String** | Default session TTL in minutes | [optional][default to 'use-existing'] |
|
|
8
10
|
| **hide_session_recording** | **String** | Specifies whether to show/hide if the session is currently recorded [true/false] | [optional] |
|
|
9
11
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
10
12
|
| **kexalgs** | **String** | Decide which algorithm will be used as part of the SSH initial hand-shake process | [optional][default to 'use-existing'] |
|
|
@@ -21,7 +23,9 @@
|
|
|
21
23
|
require 'akeyless'
|
|
22
24
|
|
|
23
25
|
instance = Akeyless::GatewayUpdateRemoteAccess.new(
|
|
26
|
+
allowed_ssh_url: null,
|
|
24
27
|
allowed_urls: null,
|
|
28
|
+
default_session_ttl_minutes: null,
|
|
25
29
|
hide_session_recording: null,
|
|
26
30
|
json: null,
|
|
27
31
|
kexalgs: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **args** | **Array<String>** | Optional arguments as key=value pairs or JSON strings, e.g - \\\"--args=csr=base64_encoded_csr --args=common_name=bar\\\" or args='{\\\"csr\\\":\\\"base64_encoded_csr\\\"}. It is possible to combine both formats.' | [optional] |
|
|
8
|
+
| **dbname** | **String** | DBName: Optional override DB name (works only if DS allows it. only relevant for MSSQL) | [optional] |
|
|
8
9
|
| **host** | **String** | Host | [optional] |
|
|
9
10
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
10
11
|
| **name** | **String** | Dynamic secret name | |
|
|
@@ -20,6 +21,7 @@ require 'akeyless'
|
|
|
20
21
|
|
|
21
22
|
instance = Akeyless::GetDynamicSecretValue.new(
|
|
22
23
|
args: null,
|
|
24
|
+
dbname: null,
|
|
23
25
|
host: null,
|
|
24
26
|
json: null,
|
|
25
27
|
name: null,
|
|
@@ -0,0 +1,28 @@
|
|
|
1
|
+
# Akeyless::NotiForwarderDetailsInput
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **app_private_key_pem_base64** | **String** | | [optional] |
|
|
8
|
+
| **client_secret** | **String** | Auth - JWT | [optional] |
|
|
9
|
+
| **password** | **String** | Auth - User Password | [optional] |
|
|
10
|
+
| **slack_noti_forwarder_details** | [**SlackNotiForwarderDetails**](SlackNotiForwarderDetails.md) | | [optional] |
|
|
11
|
+
| **teams_noti_forwarder_details** | [**TeamsNotiForwarderDetails**](TeamsNotiForwarderDetails.md) | | [optional] |
|
|
12
|
+
| **webhook_noti_forwarder_details** | [**WebhookNotiForwarderDetails**](WebhookNotiForwarderDetails.md) | | [optional] |
|
|
13
|
+
|
|
14
|
+
## Example
|
|
15
|
+
|
|
16
|
+
```ruby
|
|
17
|
+
require 'akeyless'
|
|
18
|
+
|
|
19
|
+
instance = Akeyless::NotiForwarderDetailsInput.new(
|
|
20
|
+
app_private_key_pem_base64: null,
|
|
21
|
+
client_secret: null,
|
|
22
|
+
password: null,
|
|
23
|
+
slack_noti_forwarder_details: null,
|
|
24
|
+
teams_noti_forwarder_details: null,
|
|
25
|
+
webhook_noti_forwarder_details: null
|
|
26
|
+
)
|
|
27
|
+
```
|
|
28
|
+
|
|
@@ -19,7 +19,9 @@
|
|
|
19
19
|
| **code_signing_flag** | **Boolean** | | [optional] |
|
|
20
20
|
| **country** | **Array<String>** | | [optional] |
|
|
21
21
|
| **create_private_crl** | **Boolean** | | [optional] |
|
|
22
|
+
| **create_private_ocsp** | **Boolean** | CreatePrivateOcsp enables exposing an OCSP endpoint on the Gateway and embedding its URL in the AIA extension of issued certificates. | [optional] |
|
|
22
23
|
| **create_public_crl** | **Boolean** | | [optional] |
|
|
24
|
+
| **create_public_ocsp** | **Boolean** | CreatePublicOcsp enables exposing a public OCSP endpoint on the Gateway and embedding its URL in the AIA extension of issued certificates. | [optional] |
|
|
23
25
|
| **destination_path** | **String** | DestinationPath is the destination to save generated certificates | [optional] |
|
|
24
26
|
| **disable_wildcards** | **Boolean** | | [optional] |
|
|
25
27
|
| **enforce_hostnames** | **Boolean** | | [optional] |
|
|
@@ -34,6 +36,7 @@
|
|
|
34
36
|
| **max_path_len** | **Integer** | | [optional] |
|
|
35
37
|
| **non_critical_key_usage** | **Boolean** | | [optional] |
|
|
36
38
|
| **not_before_duration** | **Integer** | A Duration represents the elapsed time between two instants as an int64 nanosecond count. The representation limits the largest representable duration to approximately 290 years. | [optional] |
|
|
39
|
+
| **ocsp_next_update** | **Integer** | OcspNextUpdate defines the desired NextUpdate window for OCSP responses. Value is in seconds; 0 means not set. Minimum enforced is 10 minutes. | [optional] |
|
|
37
40
|
| **organization_list** | **Array<String>** | | [optional] |
|
|
38
41
|
| **organization_unit_list** | **Array<String>** | | [optional] |
|
|
39
42
|
| **pki_issuer_type** | **String** | | [optional] |
|
|
@@ -66,7 +69,9 @@ instance = Akeyless::PKICertificateIssueDetails.new(
|
|
|
66
69
|
code_signing_flag: null,
|
|
67
70
|
country: null,
|
|
68
71
|
create_private_crl: null,
|
|
72
|
+
create_private_ocsp: null,
|
|
69
73
|
create_public_crl: null,
|
|
74
|
+
create_public_ocsp: null,
|
|
70
75
|
destination_path: null,
|
|
71
76
|
disable_wildcards: null,
|
|
72
77
|
enforce_hostnames: null,
|
|
@@ -81,6 +86,7 @@ instance = Akeyless::PKICertificateIssueDetails.new(
|
|
|
81
86
|
max_path_len: null,
|
|
82
87
|
non_critical_key_usage: null,
|
|
83
88
|
not_before_duration: null,
|
|
89
|
+
ocsp_next_update: null,
|
|
84
90
|
organization_list: null,
|
|
85
91
|
organization_unit_list: null,
|
|
86
92
|
pki_issuer_type: null,
|
|
@@ -11,9 +11,11 @@
|
|
|
11
11
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
13
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
14
|
+
| **key_data_base64** | **String** | Private key file contents encoded using base64 | [optional] |
|
|
14
15
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
15
16
|
| **name** | **String** | Rotated secret name | |
|
|
16
17
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
18
|
+
| **public_key_remote_path** | **String** | The path to the public key that will be rotated on the server | [optional] |
|
|
17
19
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
|
18
20
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
19
21
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
@@ -50,9 +52,11 @@ instance = Akeyless::RotatedSecretCreateSsh.new(
|
|
|
50
52
|
item_custom_fields: null,
|
|
51
53
|
json: null,
|
|
52
54
|
key: null,
|
|
55
|
+
key_data_base64: null,
|
|
53
56
|
max_versions: null,
|
|
54
57
|
name: null,
|
|
55
58
|
password_length: null,
|
|
59
|
+
public_key_remote_path: null,
|
|
56
60
|
rotate_after_disconnect: null,
|
|
57
61
|
rotated_password: null,
|
|
58
62
|
rotated_username: null,
|
|
@@ -6,6 +6,7 @@
|
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
8
8
|
| **name** | **String** | Rotated secret name | |
|
|
9
|
+
| **remote_secret_name** | **String** | Remote Secret Name to disambiguate when multiple syncs exist under the same USC | [optional] |
|
|
9
10
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
10
11
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
11
12
|
| **usc_name** | **String** | Universal Secret Connector name | |
|
|
@@ -18,6 +19,7 @@ require 'akeyless'
|
|
|
18
19
|
instance = Akeyless::RotatedSecretDeleteSync.new(
|
|
19
20
|
json: null,
|
|
20
21
|
name: null,
|
|
22
|
+
remote_secret_name: null,
|
|
21
23
|
token: null,
|
|
22
24
|
uid_token: null,
|
|
23
25
|
usc_name: null
|
|
@@ -10,11 +10,13 @@
|
|
|
10
10
|
| **grace_rotation_hour** | **Integer** | | [optional] |
|
|
11
11
|
| **grace_rotation_interval** | **Integer** | | [optional] |
|
|
12
12
|
| **gw_cluster_id** | **Integer** | | [optional] |
|
|
13
|
+
| **iis_apps_details** | [**Array<WindowsService>**](WindowsService.md) | | [optional] |
|
|
13
14
|
| **last_rotation_error** | **String** | | [optional] |
|
|
14
15
|
| **managed_by_akeyless** | **Boolean** | | [optional] |
|
|
15
16
|
| **max_versions** | **Integer** | | [optional] |
|
|
16
17
|
| **next_auto_rotate_type** | **String** | | [optional] |
|
|
17
18
|
| **number_of_versions_to_save** | **Integer** | | [optional] |
|
|
19
|
+
| **public_key_remote_path** | **String** | | [optional] |
|
|
18
20
|
| **rotation_hour** | **Integer** | | [optional] |
|
|
19
21
|
| **rotation_interval_min** | **Boolean** | | [optional] |
|
|
20
22
|
| **rotation_statement** | **String** | | [optional] |
|
|
@@ -37,11 +39,13 @@ instance = Akeyless::RotatedSecretDetailsInfo.new(
|
|
|
37
39
|
grace_rotation_hour: null,
|
|
38
40
|
grace_rotation_interval: null,
|
|
39
41
|
gw_cluster_id: null,
|
|
42
|
+
iis_apps_details: null,
|
|
40
43
|
last_rotation_error: null,
|
|
41
44
|
managed_by_akeyless: null,
|
|
42
45
|
max_versions: null,
|
|
43
46
|
next_auto_rotate_type: null,
|
|
44
47
|
number_of_versions_to_save: null,
|
|
48
|
+
public_key_remote_path: null,
|
|
45
49
|
rotation_hour: null,
|
|
46
50
|
rotation_interval_min: null,
|
|
47
51
|
rotation_statement: null,
|
|
@@ -13,10 +13,12 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **key_data_base64** | **String** | Private key file contents encoded using base64 | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
21
|
+
| **public_key_remote_path** | **String** | The path to the public key that will be rotated on the server | [optional] |
|
|
20
22
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
23
|
| **rotate_after_disconnect** | **String** | Rotate the value of the secret after SRA session ends [true/false] | [optional][default to 'false'] |
|
|
22
24
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
@@ -54,10 +56,12 @@ instance = Akeyless::RotatedSecretUpdateSsh.new(
|
|
|
54
56
|
json: null,
|
|
55
57
|
keep_prev_version: null,
|
|
56
58
|
key: null,
|
|
59
|
+
key_data_base64: null,
|
|
57
60
|
max_versions: null,
|
|
58
61
|
name: null,
|
|
59
62
|
new_name: null,
|
|
60
63
|
password_length: null,
|
|
64
|
+
public_key_remote_path: null,
|
|
61
65
|
rm_tag: null,
|
|
62
66
|
rotate_after_disconnect: null,
|
|
63
67
|
rotated_password: null,
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
# Akeyless::SlackNotiForwarderDetails
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **endpoint_url** | **String** | | [optional] |
|
|
8
|
+
|
|
9
|
+
## Example
|
|
10
|
+
|
|
11
|
+
```ruby
|
|
12
|
+
require 'akeyless'
|
|
13
|
+
|
|
14
|
+
instance = Akeyless::SlackNotiForwarderDetails.new(
|
|
15
|
+
endpoint_url: null
|
|
16
|
+
)
|
|
17
|
+
```
|
|
18
|
+
|
|
@@ -6,6 +6,7 @@
|
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
8
8
|
| **name** | **String** | Static secret name | |
|
|
9
|
+
| **remote_secret_name** | **String** | Remote Secret Name to disambiguate when multiple syncs exist under the same USC | [optional] |
|
|
9
10
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
10
11
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
11
12
|
| **usc_name** | **String** | Universal Secret Connector name | |
|
|
@@ -18,6 +19,7 @@ require 'akeyless'
|
|
|
18
19
|
instance = Akeyless::StaticSecretDeleteSync.new(
|
|
19
20
|
json: null,
|
|
20
21
|
name: null,
|
|
22
|
+
remote_secret_name: null,
|
|
21
23
|
token: null,
|
|
22
24
|
uid_token: null,
|
|
23
25
|
usc_name: null
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
# Akeyless::TeamsNotiForwarderDetails
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **webhook_url** | **String** | | [optional] |
|
|
8
|
+
|
|
9
|
+
## Example
|
|
10
|
+
|
|
11
|
+
```ruby
|
|
12
|
+
require 'akeyless'
|
|
13
|
+
|
|
14
|
+
instance = Akeyless::TeamsNotiForwarderDetails.new(
|
|
15
|
+
webhook_url: null
|
|
16
|
+
)
|
|
17
|
+
```
|
|
18
|
+
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **address** | **String** | Address | [optional] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **allowed_email_domains** | **Array<String>** | Limits email sharing to the specified domains. Relevant only when item sharing is enabled. By default, all domains are allowed. | [optional] |
|
|
9
10
|
| **bound_ips** | **Array<String>** | A default list of comma-separated CIDR block that are allowed to authenticate. | [optional] |
|
|
10
11
|
| **city** | **String** | City | [optional] |
|
|
@@ -32,6 +33,7 @@
|
|
|
32
33
|
| **jwt_ttl_default** | **Integer** | Default ttl | [optional] |
|
|
33
34
|
| **jwt_ttl_max** | **Integer** | Maximum ttl | [optional] |
|
|
34
35
|
| **jwt_ttl_min** | **Integer** | Minimum ttl | [optional] |
|
|
36
|
+
| **lock_allowed_client_type** | **String** | | [optional] |
|
|
35
37
|
| **lock_bound_ips** | **String** | Lock bound-ips setting globally in the account. | [optional] |
|
|
36
38
|
| **lock_default_key** | **String** | Lock the account's default protection key, if set - users will not be able to use a different protection key, relevant only if default-key-name is configured [true/false] | [optional] |
|
|
37
39
|
| **lock_gw_bound_ips** | **String** | Lock gw-bound-ips setting in the account. | [optional] |
|
|
@@ -60,6 +62,7 @@ require 'akeyless'
|
|
|
60
62
|
|
|
61
63
|
instance = Akeyless::UpdateAccountSettings.new(
|
|
62
64
|
address: null,
|
|
65
|
+
allowed_client_type: null,
|
|
63
66
|
allowed_email_domains: null,
|
|
64
67
|
bound_ips: null,
|
|
65
68
|
city: null,
|
|
@@ -87,6 +90,7 @@ instance = Akeyless::UpdateAccountSettings.new(
|
|
|
87
90
|
jwt_ttl_default: null,
|
|
88
91
|
jwt_ttl_max: null,
|
|
89
92
|
jwt_ttl_min: null,
|
|
93
|
+
lock_allowed_client_type: null,
|
|
90
94
|
lock_bound_ips: null,
|
|
91
95
|
lock_default_key: null,
|
|
92
96
|
lock_gw_bound_ips: null,
|
data/docs/UpdateAuthMethod.md
CHANGED
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
9
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
10
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
@@ -27,6 +28,7 @@ require 'akeyless'
|
|
|
27
28
|
|
|
28
29
|
instance = Akeyless::UpdateAuthMethod.new(
|
|
29
30
|
access_expires: null,
|
|
31
|
+
allowed_client_type: null,
|
|
30
32
|
audit_logs_claims: null,
|
|
31
33
|
bound_ips: null,
|
|
32
34
|
delete_protection: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
9
10
|
| **bound_arn** | **Array<String>** | A list of full arns that the access is restricted to | [optional] |
|
|
10
11
|
| **bound_aws_account_id** | **Array<String>** | A list of AWS account-IDs that the access is restricted to | |
|
|
@@ -36,6 +37,7 @@ require 'akeyless'
|
|
|
36
37
|
|
|
37
38
|
instance = Akeyless::UpdateAuthMethodAWSIAM.new(
|
|
38
39
|
access_expires: null,
|
|
40
|
+
allowed_client_type: null,
|
|
39
41
|
audit_logs_claims: null,
|
|
40
42
|
bound_arn: null,
|
|
41
43
|
bound_aws_account_id: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audience** | **String** | Deprecated (Deprecated) The audience in the JWT | [optional][default to 'https://management.azure.com/'] |
|
|
9
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
11
|
| **bound_group_id** | **Array<String>** | A list of group ids that the access is restricted to | [optional] |
|
|
@@ -40,6 +41,7 @@ require 'akeyless'
|
|
|
40
41
|
|
|
41
42
|
instance = Akeyless::UpdateAuthMethodAzureAD.new(
|
|
42
43
|
access_expires: null,
|
|
44
|
+
allowed_client_type: null,
|
|
43
45
|
audience: null,
|
|
44
46
|
audit_logs_claims: null,
|
|
45
47
|
bound_group_id: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **allowed_cors** | **String** | Comma separated list of allowed CORS domains to be validated as part of the authentication flow. | [optional] |
|
|
9
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
11
|
| **bound_common_names** | **Array<String>** | A list of names. At least one must exist in the Common Name. Supports globbing. | [optional] |
|
|
@@ -37,6 +38,7 @@ require 'akeyless'
|
|
|
37
38
|
|
|
38
39
|
instance = Akeyless::UpdateAuthMethodCert.new(
|
|
39
40
|
access_expires: null,
|
|
41
|
+
allowed_client_type: null,
|
|
40
42
|
allowed_cors: null,
|
|
41
43
|
audit_logs_claims: null,
|
|
42
44
|
bound_common_names: null,
|
data/docs/UpdateAuthMethodGCP.md
CHANGED
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audience** | **String** | The audience to verify in the JWT received by the client | [default to 'akeyless.io'] |
|
|
9
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
11
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
@@ -36,6 +37,7 @@ require 'akeyless'
|
|
|
36
37
|
|
|
37
38
|
instance = Akeyless::UpdateAuthMethodGCP.new(
|
|
38
39
|
access_expires: null,
|
|
40
|
+
allowed_client_type: null,
|
|
39
41
|
audience: null,
|
|
40
42
|
audit_logs_claims: null,
|
|
41
43
|
bound_ips: null,
|
data/docs/UpdateAuthMethodK8S.md
CHANGED
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audience** | **String** | The audience in the Kubernetes JWT that the access is restricted to | [optional] |
|
|
9
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
11
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
@@ -33,6 +34,7 @@ require 'akeyless'
|
|
|
33
34
|
|
|
34
35
|
instance = Akeyless::UpdateAuthMethodK8S.new(
|
|
35
36
|
access_expires: null,
|
|
37
|
+
allowed_client_type: null,
|
|
36
38
|
audience: null,
|
|
37
39
|
audit_logs_claims: null,
|
|
38
40
|
bound_ips: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
9
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
10
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
@@ -30,6 +31,7 @@ require 'akeyless'
|
|
|
30
31
|
|
|
31
32
|
instance = Akeyless::UpdateAuthMethodLDAP.new(
|
|
32
33
|
access_expires: null,
|
|
34
|
+
allowed_client_type: null,
|
|
33
35
|
audit_logs_claims: null,
|
|
34
36
|
bound_ips: null,
|
|
35
37
|
delete_protection: null,
|
|
@@ -5,6 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | | [optional] |
|
|
8
9
|
| **audience** | **String** | The audience in the JWT | [optional] |
|
|
9
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
11
|
| **bound_client_ids** | **Array<String>** | The clients ids that the access is restricted to | [optional] |
|
|
@@ -37,6 +38,7 @@ require 'akeyless'
|
|
|
37
38
|
|
|
38
39
|
instance = Akeyless::UpdateAuthMethodOAuth2.new(
|
|
39
40
|
access_expires: null,
|
|
41
|
+
allowed_client_type: null,
|
|
40
42
|
audience: null,
|
|
41
43
|
audit_logs_claims: null,
|
|
42
44
|
bound_client_ids: null,
|