akeyless 5.0.16 → 5.0.17
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +1 -1
- data/docs/AuthMethodCreateApiKey.md +1 -1
- data/docs/AuthMethodCreateAwsIam.md +1 -1
- data/docs/AuthMethodCreateAzureAD.md +1 -1
- data/docs/AuthMethodCreateCert.md +1 -1
- data/docs/AuthMethodCreateEmail.md +1 -1
- data/docs/AuthMethodCreateGcp.md +1 -1
- data/docs/AuthMethodCreateK8s.md +1 -1
- data/docs/AuthMethodCreateKerberos.md +1 -1
- data/docs/AuthMethodCreateLdap.md +1 -1
- data/docs/AuthMethodCreateOCI.md +1 -1
- data/docs/AuthMethodCreateOIDC.md +1 -1
- data/docs/AuthMethodCreateOauth2.md +1 -1
- data/docs/AuthMethodCreateSAML.md +1 -1
- data/docs/AuthMethodCreateUniversalIdentity.md +1 -1
- data/docs/AuthMethodUpdateApiKey.md +1 -1
- data/docs/AuthMethodUpdateAwsIam.md +1 -1
- data/docs/AuthMethodUpdateAzureAD.md +1 -1
- data/docs/AuthMethodUpdateCert.md +1 -1
- data/docs/AuthMethodUpdateEmail.md +1 -1
- data/docs/AuthMethodUpdateGcp.md +1 -1
- data/docs/AuthMethodUpdateK8s.md +1 -1
- data/docs/AuthMethodUpdateKerberos.md +1 -1
- data/docs/AuthMethodUpdateLdap.md +1 -1
- data/docs/AuthMethodUpdateOCI.md +1 -1
- data/docs/AuthMethodUpdateOIDC.md +1 -1
- data/docs/AuthMethodUpdateOauth2.md +1 -1
- data/docs/AuthMethodUpdateSAML.md +1 -1
- data/docs/AuthMethodUpdateUniversalIdentity.md +1 -1
- data/docs/CreateAuthMethod.md +1 -1
- data/docs/CreateAuthMethodAWSIAM.md +1 -1
- data/docs/CreateAuthMethodAzureAD.md +1 -1
- data/docs/CreateAuthMethodCert.md +1 -1
- data/docs/CreateAuthMethodEmail.md +1 -1
- data/docs/CreateAuthMethodGCP.md +1 -1
- data/docs/CreateAuthMethodHuawei.md +1 -1
- data/docs/CreateAuthMethodK8S.md +1 -1
- data/docs/CreateAuthMethodLDAP.md +1 -1
- data/docs/CreateAuthMethodOAuth2.md +1 -1
- data/docs/CreateAuthMethodOCI.md +1 -1
- data/docs/CreateAuthMethodOIDC.md +1 -1
- data/docs/CreateAuthMethodSAML.md +1 -1
- data/docs/CreateAuthMethodUniversalIdentity.md +1 -1
- data/docs/CreatePKICertIssuer.md +3 -3
- data/docs/UpdateAccountSettings.md +2 -2
- data/docs/UpdateAuthMethod.md +1 -1
- data/docs/UpdateAuthMethodAWSIAM.md +1 -1
- data/docs/UpdateAuthMethodAzureAD.md +1 -1
- data/docs/UpdateAuthMethodCert.md +1 -1
- data/docs/UpdateAuthMethodGCP.md +1 -1
- data/docs/UpdateAuthMethodK8S.md +1 -1
- data/docs/UpdateAuthMethodLDAP.md +1 -1
- data/docs/UpdateAuthMethodOAuth2.md +1 -1
- data/docs/UpdateAuthMethodOCI.md +1 -1
- data/docs/UpdateAuthMethodOIDC.md +1 -1
- data/docs/UpdateAuthMethodSAML.md +1 -1
- data/docs/UpdateAuthMethodUniversalIdentity.md +1 -1
- data/docs/UpdatePKICertIssuer.md +3 -3
- data/lib/akeyless/models/auth_method_create_api_key.rb +1 -0
- data/lib/akeyless/models/auth_method_create_aws_iam.rb +1 -0
- data/lib/akeyless/models/auth_method_create_azure_ad.rb +1 -0
- data/lib/akeyless/models/auth_method_create_cert.rb +1 -0
- data/lib/akeyless/models/auth_method_create_email.rb +1 -0
- data/lib/akeyless/models/auth_method_create_gcp.rb +1 -0
- data/lib/akeyless/models/auth_method_create_k8s.rb +1 -0
- data/lib/akeyless/models/auth_method_create_kerberos.rb +1 -0
- data/lib/akeyless/models/auth_method_create_ldap.rb +1 -0
- data/lib/akeyless/models/auth_method_create_oauth2.rb +1 -0
- data/lib/akeyless/models/auth_method_create_oci.rb +1 -0
- data/lib/akeyless/models/auth_method_create_oidc.rb +1 -0
- data/lib/akeyless/models/auth_method_create_saml.rb +1 -0
- data/lib/akeyless/models/auth_method_create_universal_identity.rb +1 -0
- data/lib/akeyless/models/auth_method_update_api_key.rb +1 -0
- data/lib/akeyless/models/auth_method_update_aws_iam.rb +1 -0
- data/lib/akeyless/models/auth_method_update_azure_ad.rb +1 -0
- data/lib/akeyless/models/auth_method_update_cert.rb +1 -0
- data/lib/akeyless/models/auth_method_update_email.rb +1 -0
- data/lib/akeyless/models/auth_method_update_gcp.rb +1 -0
- data/lib/akeyless/models/auth_method_update_k8s.rb +1 -0
- data/lib/akeyless/models/auth_method_update_kerberos.rb +1 -0
- data/lib/akeyless/models/auth_method_update_ldap.rb +1 -0
- data/lib/akeyless/models/auth_method_update_oauth2.rb +1 -0
- data/lib/akeyless/models/auth_method_update_oci.rb +1 -0
- data/lib/akeyless/models/auth_method_update_oidc.rb +1 -0
- data/lib/akeyless/models/auth_method_update_saml.rb +1 -0
- data/lib/akeyless/models/auth_method_update_universal_identity.rb +1 -0
- data/lib/akeyless/models/create_auth_method.rb +1 -0
- data/lib/akeyless/models/create_auth_method_awsiam.rb +1 -0
- data/lib/akeyless/models/create_auth_method_azure_ad.rb +1 -0
- data/lib/akeyless/models/create_auth_method_cert.rb +1 -0
- data/lib/akeyless/models/create_auth_method_email.rb +1 -0
- data/lib/akeyless/models/create_auth_method_gcp.rb +1 -0
- data/lib/akeyless/models/create_auth_method_huawei.rb +1 -0
- data/lib/akeyless/models/create_auth_method_k8_s.rb +1 -0
- data/lib/akeyless/models/create_auth_method_ldap.rb +1 -0
- data/lib/akeyless/models/create_auth_method_o_auth2.rb +1 -0
- data/lib/akeyless/models/create_auth_method_oci.rb +1 -0
- data/lib/akeyless/models/create_auth_method_oidc.rb +1 -0
- data/lib/akeyless/models/create_auth_method_saml.rb +1 -0
- data/lib/akeyless/models/create_auth_method_universal_identity.rb +1 -0
- data/lib/akeyless/models/create_pki_cert_issuer.rb +3 -0
- data/lib/akeyless/models/update_account_settings.rb +2 -0
- data/lib/akeyless/models/update_auth_method.rb +1 -0
- data/lib/akeyless/models/update_auth_method_awsiam.rb +1 -0
- data/lib/akeyless/models/update_auth_method_azure_ad.rb +1 -0
- data/lib/akeyless/models/update_auth_method_cert.rb +1 -0
- data/lib/akeyless/models/update_auth_method_gcp.rb +1 -0
- data/lib/akeyless/models/update_auth_method_k8_s.rb +1 -0
- data/lib/akeyless/models/update_auth_method_ldap.rb +1 -0
- data/lib/akeyless/models/update_auth_method_o_auth2.rb +1 -0
- data/lib/akeyless/models/update_auth_method_oci.rb +1 -0
- data/lib/akeyless/models/update_auth_method_oidc.rb +1 -0
- data/lib/akeyless/models/update_auth_method_saml.rb +1 -0
- data/lib/akeyless/models/update_auth_method_universal_identity.rb +1 -0
- data/lib/akeyless/models/update_pki_cert_issuer.rb +3 -0
- data/lib/akeyless/version.rb +1 -1
- metadata +1 -1
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
11
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audience** | **String** | The audience in the JWT | [optional] |
|
|
10
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
11
11
|
| **bound_client_ids** | **Array<String>** | The clients ids that the access is restricted to | [optional] |
|
data/docs/UpdateAuthMethodOCI.md
CHANGED
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
11
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **allowed_redirect_uri** | **Array<String>** | Allowed redirect URIs after the authentication | [optional] |
|
|
10
10
|
| **audience** | **String** | Audience claim to be used as part of the authentication flow. In case set, it must match the one configured on the Identity Provider's Application | [optional] |
|
|
11
11
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **allowed_redirect_uri** | **Array<String>** | Allowed redirect URIs after the authentication | [optional] |
|
|
10
10
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
11
11
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
@@ -5,7 +5,7 @@
|
|
|
5
5
|
| Name | Type | Description | Notes |
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_expires** | **Integer** | Access expiration date in Unix timestamp (select 0 for access without expiry date) | [optional][default to 0] |
|
|
8
|
-
| **allowed_client_type** | **Array<String>** |
|
|
8
|
+
| **allowed_client_type** | **Array<String>** | limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension] | [optional] |
|
|
9
9
|
| **audit_logs_claims** | **Array<String>** | Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\" | [optional] |
|
|
10
10
|
| **bound_ips** | **Array<String>** | A CIDR whitelist with the IPs that the access is restricted to | [optional] |
|
|
11
11
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
data/docs/UpdatePKICertIssuer.md
CHANGED
|
@@ -17,9 +17,9 @@
|
|
|
17
17
|
| **code_signing_flag** | **Boolean** | If set, certificates will be flagged for code signing use | [optional] |
|
|
18
18
|
| **country** | **String** | A comma-separated list of countries that will be set in the issued certificate | [optional] |
|
|
19
19
|
| **create_private_crl** | **Boolean** | Set this to allow the issuer will expose a CRL endpoint in the Gateway | [optional] |
|
|
20
|
-
| **create_private_ocsp** | **Boolean** |
|
|
20
|
+
| **create_private_ocsp** | **Boolean** | Set this to enable an OCSP endpoint in the Gateway and include its URL in AIA | [optional] |
|
|
21
21
|
| **create_public_crl** | **Boolean** | Set this to allow the cert issuer will expose a public CRL endpoint | [optional] |
|
|
22
|
-
| **create_public_ocsp** | **Boolean** |
|
|
22
|
+
| **create_public_ocsp** | **Boolean** | Set this to enable a public OCSP endpoint and include its URL in AIA (served by UAM and includes account id) | [optional] |
|
|
23
23
|
| **critical_key_usage** | **String** | Mark key usage as critical [true/false] | [optional][default to 'true'] |
|
|
24
24
|
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
25
25
|
| **description** | **String** | Description of the object | [optional] |
|
|
@@ -39,7 +39,7 @@
|
|
|
39
39
|
| **new_name** | **String** | New item name | [optional] |
|
|
40
40
|
| **not_enforce_hostnames** | **Boolean** | If set, any names are allowed for CN and SANs in the certificate and not only a valid host name | [optional] |
|
|
41
41
|
| **not_require_cn** | **Boolean** | If set, clients can request certificates without a CN | [optional] |
|
|
42
|
-
| **ocsp_ttl** | **String** |
|
|
42
|
+
| **ocsp_ttl** | **String** | OCSP NextUpdate window for OCSP responses (min 10m). Supports s,m,h,d suffix. | [optional] |
|
|
43
43
|
| **organizational_units** | **String** | A comma-separated list of organizational units (OU) that will be set in the issued certificate | [optional] |
|
|
44
44
|
| **organizations** | **String** | A comma-separated list of organizations (O) that will be set in the issued certificate | [optional] |
|
|
45
45
|
| **postal_code** | **String** | A comma-separated list of postal codes that will be set in the issued certificate | [optional] |
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Deprecated (Deprecated) The audience in the JWT
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Comma separated list of allowed CORS domains to be validated as part of the authentication flow.
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# The audience to verify in the JWT received by the client
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# The audience in the Kubernetes JWT that the access is restricted to
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# The audience in the JWT
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Allowed redirect URIs after the authentication
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Allowed redirect URIs after the authentication
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -18,6 +18,7 @@ module Akeyless
|
|
|
18
18
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
19
19
|
attr_accessor :access_expires
|
|
20
20
|
|
|
21
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
21
22
|
attr_accessor :allowed_client_type
|
|
22
23
|
|
|
23
24
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Deprecated (Deprecated) The audience in the JWT
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Comma separated list of allowed CORS domains to be validated as part of the authentication flow.
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# The audience to verify in the JWT received by the client
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# The audience in the Kubernetes JWT that the access is restricted to
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# The audience in the JWT
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Allowed redirect URIs after the authentication
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Allowed redirect URIs after the authentication
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Deprecated (Deprecated) The audience in the JWT
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Comma separated list of allowed CORS domains to be validated as part of the authentication flow.
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# The audience to verify in the JWT received by the client
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# The audience in the Kubernetes JWT that the access is restricted to
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# The audience in the JWT
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Allowed redirect URIs after the authentication
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Allowed redirect URIs after the authentication
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -54,11 +54,13 @@ module Akeyless
|
|
|
54
54
|
# Set this to allow the issuer will expose a CRL endpoint in the Gateway
|
|
55
55
|
attr_accessor :create_private_crl
|
|
56
56
|
|
|
57
|
+
# Set this to enable an OCSP endpoint in the Gateway and include its URL in AIA
|
|
57
58
|
attr_accessor :create_private_ocsp
|
|
58
59
|
|
|
59
60
|
# Set this to allow the cert issuer will expose a public CRL endpoint
|
|
60
61
|
attr_accessor :create_public_crl
|
|
61
62
|
|
|
63
|
+
# Set this to enable a public OCSP endpoint and include its URL in AIA (served by UAM and includes account id)
|
|
62
64
|
attr_accessor :create_public_ocsp
|
|
63
65
|
|
|
64
66
|
# Mark key usage as critical [true/false]
|
|
@@ -115,6 +117,7 @@ module Akeyless
|
|
|
115
117
|
# If set, clients can request certificates without a CN
|
|
116
118
|
attr_accessor :not_require_cn
|
|
117
119
|
|
|
120
|
+
# OCSP NextUpdate window for OCSP responses (min 10m). Supports s,m,h,d suffix.
|
|
118
121
|
attr_accessor :ocsp_ttl
|
|
119
122
|
|
|
120
123
|
# A comma-separated list of organizational units (OU) that will be set in the issued certificate
|
|
@@ -18,6 +18,7 @@ module Akeyless
|
|
|
18
18
|
# Address
|
|
19
19
|
attr_accessor :address
|
|
20
20
|
|
|
21
|
+
# A default list of client types that are allowed to authenticate [cli,ui,gateway-admin,sdk,mobile,extension].
|
|
21
22
|
attr_accessor :allowed_client_type
|
|
22
23
|
|
|
23
24
|
# Limits email sharing to the specified domains. Relevant only when item sharing is enabled. By default, all domains are allowed.
|
|
@@ -101,6 +102,7 @@ module Akeyless
|
|
|
101
102
|
# Minimum ttl
|
|
102
103
|
attr_accessor :jwt_ttl_min
|
|
103
104
|
|
|
105
|
+
# Lock allowed-client-type setting in the account [true/false].
|
|
104
106
|
attr_accessor :lock_allowed_client_type
|
|
105
107
|
|
|
106
108
|
# Lock bound-ips setting globally in the account.
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Deprecated (Deprecated) The audience in the JWT
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Comma separated list of allowed CORS domains to be validated as part of the authentication flow.
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# The audience to verify in the JWT received by the client
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# The audience in the Kubernetes JWT that the access is restricted to
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# The audience in the JWT
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Subclaims to include in audit logs, e.g \"--audit-logs-claims email --audit-logs-claims username\"
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Allowed redirect URIs after the authentication
|
|
@@ -19,6 +19,7 @@ module Akeyless
|
|
|
19
19
|
# Access expiration date in Unix timestamp (select 0 for access without expiry date)
|
|
20
20
|
attr_accessor :access_expires
|
|
21
21
|
|
|
22
|
+
# limit the auth method usage for specific client types [cli,ui,gateway-admin,sdk,mobile,extension]
|
|
22
23
|
attr_accessor :allowed_client_type
|
|
23
24
|
|
|
24
25
|
# Allowed redirect URIs after the authentication
|