akeyless 5.0.22 → 5.0.23

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (173) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +23 -1
  3. data/docs/AccountGeneralSettings.md +4 -0
  4. data/docs/AuthMethodCreateUniversalIdentity.md +4 -0
  5. data/docs/AuthMethodUpdateUniversalIdentity.md +4 -0
  6. data/docs/AwsStorage.md +2 -0
  7. data/docs/CreateAuthMethodUniversalIdentity.md +4 -0
  8. data/docs/CreateRotatedSecret.md +3 -1
  9. data/docs/CreateSecret.md +2 -0
  10. data/docs/CreateUSC.md +1 -1
  11. data/docs/DeleteRoleRule.md +1 -1
  12. data/docs/DescribePermissions.md +1 -1
  13. data/docs/DigiCertTargetDetails.md +42 -0
  14. data/docs/EsmListSecretsOutput.md +3 -1
  15. data/docs/GatewayCreateMigration.md +4 -0
  16. data/docs/GatewayUpdateMigration.md +4 -0
  17. data/docs/GatewayUpdateRemoteAccessRdpRecordings.md +2 -0
  18. data/docs/GeneralConfigPart.md +4 -0
  19. data/docs/GoogleTrustTargetDetails.md +42 -0
  20. data/docs/HashiPayload.md +5 -1
  21. data/docs/Item.md +2 -0
  22. data/docs/ItemLockingSetting.md +20 -0
  23. data/docs/LockItem.md +28 -0
  24. data/docs/LockTarget.md +28 -0
  25. data/docs/LockingInfo.md +24 -0
  26. data/docs/MigrationStatusReplyObj.md +2 -0
  27. data/docs/NetappStorage.md +30 -0
  28. data/docs/ReverseRBAC.md +1 -1
  29. data/docs/RotatedSecretCreateAws.md +3 -1
  30. data/docs/RotatedSecretCreateAzure.md +3 -1
  31. data/docs/RotatedSecretCreateCustom.md +3 -1
  32. data/docs/RotatedSecretCreateLdap.md +3 -1
  33. data/docs/RotatedSecretCreateMongodb.md +3 -1
  34. data/docs/RotatedSecretCreateMssql.md +3 -1
  35. data/docs/RotatedSecretCreateMysql.md +3 -1
  36. data/docs/RotatedSecretCreateOracledb.md +3 -1
  37. data/docs/RotatedSecretCreatePostgresql.md +3 -1
  38. data/docs/RotatedSecretCreateRedshift.md +3 -1
  39. data/docs/RotatedSecretCreateSsh.md +3 -1
  40. data/docs/RotatedSecretCreateWindows.md +3 -1
  41. data/docs/RotatedSecretUpdateAws.md +3 -1
  42. data/docs/RotatedSecretUpdateAzure.md +3 -1
  43. data/docs/RotatedSecretUpdateCustom.md +3 -1
  44. data/docs/RotatedSecretUpdateLdap.md +3 -1
  45. data/docs/RotatedSecretUpdateMongodb.md +3 -1
  46. data/docs/RotatedSecretUpdateMssql.md +3 -1
  47. data/docs/RotatedSecretUpdateMysql.md +3 -1
  48. data/docs/RotatedSecretUpdateOracledb.md +3 -1
  49. data/docs/RotatedSecretUpdatePostgresql.md +3 -1
  50. data/docs/RotatedSecretUpdateRedshift.md +3 -1
  51. data/docs/RotatedSecretUpdateSsh.md +3 -1
  52. data/docs/RotatedSecretUpdateWindows.md +3 -1
  53. data/docs/SecretInfo.md +2 -0
  54. data/docs/SecureRemoteAccess.md +4 -0
  55. data/docs/SetRoleRule.md +1 -1
  56. data/docs/SyncCounters.md +22 -0
  57. data/docs/Target.md +2 -0
  58. data/docs/TargetCreateDigiCert.md +50 -0
  59. data/docs/TargetCreateGoogleTrust.md +50 -0
  60. data/docs/TargetCreateLetsEncrypt.md +1 -1
  61. data/docs/TargetCreateSplunk.md +3 -1
  62. data/docs/TargetTypeDetailsInput.md +4 -0
  63. data/docs/TargetUpdateDigiCert.md +54 -0
  64. data/docs/TargetUpdateGoogleTrust.md +54 -0
  65. data/docs/TargetUpdateLetsEncrypt.md +1 -1
  66. data/docs/UniversalIdentityAccessRules.md +4 -0
  67. data/docs/UnlockItem.md +24 -0
  68. data/docs/UnlockTarget.md +24 -0
  69. data/docs/UpdateAccountSettings.md +4 -0
  70. data/docs/UpdateAuthMethodUniversalIdentity.md +4 -0
  71. data/docs/UpdateItem.md +3 -1
  72. data/docs/UpdateRotatedSecret.md +3 -1
  73. data/docs/UscCreate.md +2 -0
  74. data/docs/UscDelete.md +4 -0
  75. data/docs/UscGet.md +4 -0
  76. data/docs/UscListSecretsOutput.md +3 -1
  77. data/docs/UscUpdate.md +4 -0
  78. data/docs/V2Api.md +506 -2
  79. data/docs/WebBastionRdpRecord.md +2 -0
  80. data/lib/akeyless/api/v2_api.rb +512 -0
  81. data/lib/akeyless/models/account_general_settings.rb +19 -1
  82. data/lib/akeyless/models/auth_method_create_universal_identity.rb +25 -1
  83. data/lib/akeyless/models/auth_method_update_universal_identity.rb +25 -1
  84. data/lib/akeyless/models/aws_storage.rb +10 -1
  85. data/lib/akeyless/models/create_auth_method_universal_identity.rb +25 -1
  86. data/lib/akeyless/models/create_rotated_secret.rb +12 -4
  87. data/lib/akeyless/models/create_secret.rb +11 -1
  88. data/lib/akeyless/models/create_usc.rb +1 -1
  89. data/lib/akeyless/models/delete_role_rule.rb +1 -1
  90. data/lib/akeyless/models/describe_permissions.rb +1 -1
  91. data/lib/akeyless/models/digi_cert_target_details.rb +333 -0
  92. data/lib/akeyless/models/esm_list_secrets_output.rb +15 -4
  93. data/lib/akeyless/models/gateway_create_migration.rb +21 -1
  94. data/lib/akeyless/models/gateway_update_migration.rb +21 -1
  95. data/lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb +11 -1
  96. data/lib/akeyless/models/general_config_part.rb +19 -1
  97. data/lib/akeyless/models/google_trust_target_details.rb +335 -0
  98. data/lib/akeyless/models/hashi_payload.rb +22 -4
  99. data/lib/akeyless/models/item.rb +10 -1
  100. data/lib/akeyless/models/item_locking_setting.rb +223 -0
  101. data/lib/akeyless/models/lock_item.rb +274 -0
  102. data/lib/akeyless/models/lock_target.rb +274 -0
  103. data/lib/akeyless/models/locking_info.rb +243 -0
  104. data/lib/akeyless/models/migration_status_reply_obj.rb +10 -1
  105. data/lib/akeyless/models/netapp_storage.rb +268 -0
  106. data/lib/akeyless/models/reverse_rbac.rb +1 -1
  107. data/lib/akeyless/models/rotated_secret_create_aws.rb +12 -4
  108. data/lib/akeyless/models/rotated_secret_create_azure.rb +12 -4
  109. data/lib/akeyless/models/rotated_secret_create_custom.rb +12 -4
  110. data/lib/akeyless/models/rotated_secret_create_ldap.rb +12 -4
  111. data/lib/akeyless/models/rotated_secret_create_mongodb.rb +12 -4
  112. data/lib/akeyless/models/rotated_secret_create_mssql.rb +12 -4
  113. data/lib/akeyless/models/rotated_secret_create_mysql.rb +12 -4
  114. data/lib/akeyless/models/rotated_secret_create_oracledb.rb +12 -4
  115. data/lib/akeyless/models/rotated_secret_create_postgresql.rb +12 -4
  116. data/lib/akeyless/models/rotated_secret_create_redshift.rb +12 -4
  117. data/lib/akeyless/models/rotated_secret_create_ssh.rb +12 -4
  118. data/lib/akeyless/models/rotated_secret_create_windows.rb +12 -4
  119. data/lib/akeyless/models/rotated_secret_update_aws.rb +12 -4
  120. data/lib/akeyless/models/rotated_secret_update_azure.rb +12 -4
  121. data/lib/akeyless/models/rotated_secret_update_custom.rb +12 -4
  122. data/lib/akeyless/models/rotated_secret_update_ldap.rb +12 -4
  123. data/lib/akeyless/models/rotated_secret_update_mongodb.rb +12 -4
  124. data/lib/akeyless/models/rotated_secret_update_mssql.rb +12 -4
  125. data/lib/akeyless/models/rotated_secret_update_mysql.rb +12 -4
  126. data/lib/akeyless/models/rotated_secret_update_oracledb.rb +12 -4
  127. data/lib/akeyless/models/rotated_secret_update_postgresql.rb +12 -4
  128. data/lib/akeyless/models/rotated_secret_update_redshift.rb +12 -4
  129. data/lib/akeyless/models/rotated_secret_update_ssh.rb +12 -4
  130. data/lib/akeyless/models/rotated_secret_update_windows.rb +12 -4
  131. data/lib/akeyless/models/secret_info.rb +10 -1
  132. data/lib/akeyless/models/secure_remote_access.rb +19 -1
  133. data/lib/akeyless/models/set_role_rule.rb +1 -1
  134. data/lib/akeyless/models/sync_counters.rb +233 -0
  135. data/lib/akeyless/models/target.rb +10 -1
  136. data/lib/akeyless/models/target_create_digi_cert.rb +398 -0
  137. data/lib/akeyless/models/target_create_google_trust.rb +398 -0
  138. data/lib/akeyless/models/target_create_lets_encrypt.rb +7 -0
  139. data/lib/akeyless/models/target_create_splunk.rb +11 -1
  140. data/lib/akeyless/models/target_type_details_input.rb +19 -1
  141. data/lib/akeyless/models/target_update_digi_cert.rb +418 -0
  142. data/lib/akeyless/models/target_update_google_trust.rb +418 -0
  143. data/lib/akeyless/models/target_update_lets_encrypt.rb +7 -0
  144. data/lib/akeyless/models/universal_identity_access_rules.rb +19 -1
  145. data/lib/akeyless/models/unlock_item.rb +254 -0
  146. data/lib/akeyless/models/unlock_target.rb +254 -0
  147. data/lib/akeyless/models/update_account_settings.rb +21 -1
  148. data/lib/akeyless/models/update_auth_method_universal_identity.rb +25 -1
  149. data/lib/akeyless/models/update_item.rb +12 -4
  150. data/lib/akeyless/models/update_rotated_secret.rb +12 -4
  151. data/lib/akeyless/models/usc_create.rb +10 -1
  152. data/lib/akeyless/models/usc_delete.rb +20 -1
  153. data/lib/akeyless/models/usc_get.rb +20 -1
  154. data/lib/akeyless/models/usc_list_secrets_output.rb +15 -4
  155. data/lib/akeyless/models/usc_update.rb +20 -1
  156. data/lib/akeyless/models/web_bastion_rdp_record.rb +10 -1
  157. data/lib/akeyless/version.rb +1 -1
  158. data/lib/akeyless.rb +14 -0
  159. data/spec/models/digi_cert_target_details_spec.rb +108 -0
  160. data/spec/models/google_trust_target_details_spec.rb +108 -0
  161. data/spec/models/item_locking_setting_spec.rb +42 -0
  162. data/spec/models/lock_item_spec.rb +66 -0
  163. data/spec/models/lock_target_spec.rb +66 -0
  164. data/spec/models/locking_info_spec.rb +54 -0
  165. data/spec/models/netapp_storage_spec.rb +72 -0
  166. data/spec/models/sync_counters_spec.rb +48 -0
  167. data/spec/models/target_create_digi_cert_spec.rb +132 -0
  168. data/spec/models/target_create_google_trust_spec.rb +132 -0
  169. data/spec/models/target_update_digi_cert_spec.rb +144 -0
  170. data/spec/models/target_update_google_trust_spec.rb +144 -0
  171. data/spec/models/unlock_item_spec.rb +54 -0
  172. data/spec/models/unlock_target_spec.rb +54 -0
  173. metadata +1206 -1147
@@ -48,6 +48,9 @@ module Akeyless
48
48
  # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)
49
49
  attr_accessor :key
50
50
 
51
+ # Lock this secret for read/update while an SRA session is active
52
+ attr_accessor :lock_during_sra_session
53
+
51
54
  # Set the maximum number of versions, limited by the account settings defaults.
52
55
  attr_accessor :max_versions
53
56
 
@@ -63,7 +66,7 @@ module Akeyless
63
66
  # List of the existent tags that will be removed from this item
64
67
  attr_accessor :rm_tag
65
68
 
66
- # Rotate the value of the secret after SRA session ends [true/false]
69
+ # StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect.
67
70
  attr_accessor :rotate_after_disconnect
68
71
 
69
72
  # How many days before the rotation of the item would you like to be notified
@@ -146,6 +149,7 @@ module Akeyless
146
149
  :'json' => :'json',
147
150
  :'keep_prev_version' => :'keep-prev-version',
148
151
  :'key' => :'key',
152
+ :'lock_during_sra_session' => :'lock-during-sra-session',
149
153
  :'max_versions' => :'max-versions',
150
154
  :'name' => :'name',
151
155
  :'new_name' => :'new-name',
@@ -196,6 +200,7 @@ module Akeyless
196
200
  :'json' => :'Boolean',
197
201
  :'keep_prev_version' => :'String',
198
202
  :'key' => :'String',
203
+ :'lock_during_sra_session' => :'String',
199
204
  :'max_versions' => :'String',
200
205
  :'name' => :'String',
201
206
  :'new_name' => :'String',
@@ -302,6 +307,10 @@ module Akeyless
302
307
  self.key = attributes[:'key']
303
308
  end
304
309
 
310
+ if attributes.key?(:'lock_during_sra_session')
311
+ self.lock_during_sra_session = attributes[:'lock_during_sra_session']
312
+ end
313
+
305
314
  if attributes.key?(:'max_versions')
306
315
  self.max_versions = attributes[:'max_versions']
307
316
  end
@@ -328,8 +337,6 @@ module Akeyless
328
337
 
329
338
  if attributes.key?(:'rotate_after_disconnect')
330
339
  self.rotate_after_disconnect = attributes[:'rotate_after_disconnect']
331
- else
332
- self.rotate_after_disconnect = 'false'
333
340
  end
334
341
 
335
342
  if attributes.key?(:'rotation_event_in')
@@ -469,6 +476,7 @@ module Akeyless
469
476
  json == o.json &&
470
477
  keep_prev_version == o.keep_prev_version &&
471
478
  key == o.key &&
479
+ lock_during_sra_session == o.lock_during_sra_session &&
472
480
  max_versions == o.max_versions &&
473
481
  name == o.name &&
474
482
  new_name == o.new_name &&
@@ -508,7 +516,7 @@ module Akeyless
508
516
  # Calculates hash code according to all attributes.
509
517
  # @return [Integer] Hash code
510
518
  def hash
511
- [add_tag, authentication_credentials, auto_rotate, custom_payload, delete_protection, description, enable_password_policy, item_custom_fields, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotation_event_in, rotation_hour, rotation_interval, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, timeout_sec, token, uid_token, use_capital_letters, use_lower_letters, use_numbers, use_special_characters].hash
519
+ [add_tag, authentication_credentials, auto_rotate, custom_payload, delete_protection, description, enable_password_policy, item_custom_fields, json, keep_prev_version, key, lock_during_sra_session, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotation_event_in, rotation_hour, rotation_interval, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, timeout_sec, token, uid_token, use_capital_letters, use_lower_letters, use_numbers, use_special_characters].hash
512
520
  end
513
521
 
514
522
  # Builds the object from hash
@@ -47,6 +47,9 @@ module Akeyless
47
47
  # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)
48
48
  attr_accessor :key
49
49
 
50
+ # Lock this secret for read/update while an SRA session is active
51
+ attr_accessor :lock_during_sra_session
52
+
50
53
  # Set the maximum number of versions, limited by the account settings defaults.
51
54
  attr_accessor :max_versions
52
55
 
@@ -62,7 +65,7 @@ module Akeyless
62
65
  # List of the existent tags that will be removed from this item
63
66
  attr_accessor :rm_tag
64
67
 
65
- # Rotate the value of the secret after SRA session ends [true/false]
68
+ # StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect.
66
69
  attr_accessor :rotate_after_disconnect
67
70
 
68
71
  # rotated-username password (relevant only for rotator-type=ldap)
@@ -136,6 +139,7 @@ module Akeyless
136
139
  :'json' => :'json',
137
140
  :'keep_prev_version' => :'keep-prev-version',
138
141
  :'key' => :'key',
142
+ :'lock_during_sra_session' => :'lock-during-sra-session',
139
143
  :'max_versions' => :'max-versions',
140
144
  :'name' => :'name',
141
145
  :'new_name' => :'new-name',
@@ -183,6 +187,7 @@ module Akeyless
183
187
  :'json' => :'Boolean',
184
188
  :'keep_prev_version' => :'String',
185
189
  :'key' => :'String',
190
+ :'lock_during_sra_session' => :'String',
186
191
  :'max_versions' => :'String',
187
192
  :'name' => :'String',
188
193
  :'new_name' => :'String',
@@ -286,6 +291,10 @@ module Akeyless
286
291
  self.key = attributes[:'key']
287
292
  end
288
293
 
294
+ if attributes.key?(:'lock_during_sra_session')
295
+ self.lock_during_sra_session = attributes[:'lock_during_sra_session']
296
+ end
297
+
289
298
  if attributes.key?(:'max_versions')
290
299
  self.max_versions = attributes[:'max_versions']
291
300
  end
@@ -312,8 +321,6 @@ module Akeyless
312
321
 
313
322
  if attributes.key?(:'rotate_after_disconnect')
314
323
  self.rotate_after_disconnect = attributes[:'rotate_after_disconnect']
315
- else
316
- self.rotate_after_disconnect = 'false'
317
324
  end
318
325
 
319
326
  if attributes.key?(:'rotated_password')
@@ -443,6 +450,7 @@ module Akeyless
443
450
  json == o.json &&
444
451
  keep_prev_version == o.keep_prev_version &&
445
452
  key == o.key &&
453
+ lock_during_sra_session == o.lock_during_sra_session &&
446
454
  max_versions == o.max_versions &&
447
455
  name == o.name &&
448
456
  new_name == o.new_name &&
@@ -479,7 +487,7 @@ module Akeyless
479
487
  # Calculates hash code according to all attributes.
480
488
  # @return [Integer] Hash code
481
489
  def hash
482
- [provider_type, add_tag, authentication_credentials, auto_rotate, delete_protection, description, host_provider, item_custom_fields, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, target, token, uid_token, user_attribute, user_dn].hash
490
+ [provider_type, add_tag, authentication_credentials, auto_rotate, delete_protection, description, host_provider, item_custom_fields, json, keep_prev_version, key, lock_during_sra_session, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_url, secure_access_web, secure_access_web_browsing, secure_access_web_proxy, target, token, uid_token, user_attribute, user_dn].hash
483
491
  end
484
492
 
485
493
  # Builds the object from hash
@@ -42,6 +42,9 @@ module Akeyless
42
42
  # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)
43
43
  attr_accessor :key
44
44
 
45
+ # Lock this secret for read/update while an SRA session is active
46
+ attr_accessor :lock_during_sra_session
47
+
45
48
  # Set the maximum number of versions, limited by the account settings defaults.
46
49
  attr_accessor :max_versions
47
50
 
@@ -57,7 +60,7 @@ module Akeyless
57
60
  # List of the existent tags that will be removed from this item
58
61
  attr_accessor :rm_tag
59
62
 
60
- # Rotate the value of the secret after SRA session ends [true/false]
63
+ # StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect.
61
64
  attr_accessor :rotate_after_disconnect
62
65
 
63
66
  # rotated-username password (relevant only for rotator-type=password)
@@ -111,6 +114,7 @@ module Akeyless
111
114
  :'json' => :'json',
112
115
  :'keep_prev_version' => :'keep-prev-version',
113
116
  :'key' => :'key',
117
+ :'lock_during_sra_session' => :'lock-during-sra-session',
114
118
  :'max_versions' => :'max-versions',
115
119
  :'name' => :'name',
116
120
  :'new_name' => :'new-name',
@@ -150,6 +154,7 @@ module Akeyless
150
154
  :'json' => :'Boolean',
151
155
  :'keep_prev_version' => :'String',
152
156
  :'key' => :'String',
157
+ :'lock_during_sra_session' => :'String',
153
158
  :'max_versions' => :'String',
154
159
  :'name' => :'String',
155
160
  :'new_name' => :'String',
@@ -239,6 +244,10 @@ module Akeyless
239
244
  self.key = attributes[:'key']
240
245
  end
241
246
 
247
+ if attributes.key?(:'lock_during_sra_session')
248
+ self.lock_during_sra_session = attributes[:'lock_during_sra_session']
249
+ end
250
+
242
251
  if attributes.key?(:'max_versions')
243
252
  self.max_versions = attributes[:'max_versions']
244
253
  end
@@ -265,8 +274,6 @@ module Akeyless
265
274
 
266
275
  if attributes.key?(:'rotate_after_disconnect')
267
276
  self.rotate_after_disconnect = attributes[:'rotate_after_disconnect']
268
- else
269
- self.rotate_after_disconnect = 'false'
270
277
  end
271
278
 
272
279
  if attributes.key?(:'rotated_password')
@@ -362,6 +369,7 @@ module Akeyless
362
369
  json == o.json &&
363
370
  keep_prev_version == o.keep_prev_version &&
364
371
  key == o.key &&
372
+ lock_during_sra_session == o.lock_during_sra_session &&
365
373
  max_versions == o.max_versions &&
366
374
  name == o.name &&
367
375
  new_name == o.new_name &&
@@ -392,7 +400,7 @@ module Akeyless
392
400
  # Calculates hash code according to all attributes.
393
401
  # @return [Integer] Hash code
394
402
  def hash
395
- [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash
403
+ [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, lock_during_sra_session, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash
396
404
  end
397
405
 
398
406
  # Builds the object from hash
@@ -42,6 +42,9 @@ module Akeyless
42
42
  # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)
43
43
  attr_accessor :key
44
44
 
45
+ # Lock this secret for read/update while an SRA session is active
46
+ attr_accessor :lock_during_sra_session
47
+
45
48
  # Set the maximum number of versions, limited by the account settings defaults.
46
49
  attr_accessor :max_versions
47
50
 
@@ -57,7 +60,7 @@ module Akeyless
57
60
  # List of the existent tags that will be removed from this item
58
61
  attr_accessor :rm_tag
59
62
 
60
- # Rotate the value of the secret after SRA session ends [true/false]
63
+ # StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect.
61
64
  attr_accessor :rotate_after_disconnect
62
65
 
63
66
  # rotated-username password (relevant only for rotator-type=password)
@@ -114,6 +117,7 @@ module Akeyless
114
117
  :'json' => :'json',
115
118
  :'keep_prev_version' => :'keep-prev-version',
116
119
  :'key' => :'key',
120
+ :'lock_during_sra_session' => :'lock-during-sra-session',
117
121
  :'max_versions' => :'max-versions',
118
122
  :'name' => :'name',
119
123
  :'new_name' => :'new-name',
@@ -154,6 +158,7 @@ module Akeyless
154
158
  :'json' => :'Boolean',
155
159
  :'keep_prev_version' => :'String',
156
160
  :'key' => :'String',
161
+ :'lock_during_sra_session' => :'String',
157
162
  :'max_versions' => :'String',
158
163
  :'name' => :'String',
159
164
  :'new_name' => :'String',
@@ -244,6 +249,10 @@ module Akeyless
244
249
  self.key = attributes[:'key']
245
250
  end
246
251
 
252
+ if attributes.key?(:'lock_during_sra_session')
253
+ self.lock_during_sra_session = attributes[:'lock_during_sra_session']
254
+ end
255
+
247
256
  if attributes.key?(:'max_versions')
248
257
  self.max_versions = attributes[:'max_versions']
249
258
  end
@@ -270,8 +279,6 @@ module Akeyless
270
279
 
271
280
  if attributes.key?(:'rotate_after_disconnect')
272
281
  self.rotate_after_disconnect = attributes[:'rotate_after_disconnect']
273
- else
274
- self.rotate_after_disconnect = 'false'
275
282
  end
276
283
 
277
284
  if attributes.key?(:'rotated_password')
@@ -371,6 +378,7 @@ module Akeyless
371
378
  json == o.json &&
372
379
  keep_prev_version == o.keep_prev_version &&
373
380
  key == o.key &&
381
+ lock_during_sra_session == o.lock_during_sra_session &&
374
382
  max_versions == o.max_versions &&
375
383
  name == o.name &&
376
384
  new_name == o.new_name &&
@@ -402,7 +410,7 @@ module Akeyless
402
410
  # Calculates hash code according to all attributes.
403
411
  # @return [Integer] Hash code
404
412
  def hash
405
- [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash
413
+ [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, lock_during_sra_session, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash
406
414
  end
407
415
 
408
416
  # Builds the object from hash
@@ -42,6 +42,9 @@ module Akeyless
42
42
  # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)
43
43
  attr_accessor :key
44
44
 
45
+ # Lock this secret for read/update while an SRA session is active
46
+ attr_accessor :lock_during_sra_session
47
+
45
48
  # Set the maximum number of versions, limited by the account settings defaults.
46
49
  attr_accessor :max_versions
47
50
 
@@ -57,7 +60,7 @@ module Akeyless
57
60
  # List of the existent tags that will be removed from this item
58
61
  attr_accessor :rm_tag
59
62
 
60
- # Rotate the value of the secret after SRA session ends [true/false]
63
+ # StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect.
61
64
  attr_accessor :rotate_after_disconnect
62
65
 
63
66
  # rotated-username password (relevant only for rotator-type=password)
@@ -111,6 +114,7 @@ module Akeyless
111
114
  :'json' => :'json',
112
115
  :'keep_prev_version' => :'keep-prev-version',
113
116
  :'key' => :'key',
117
+ :'lock_during_sra_session' => :'lock-during-sra-session',
114
118
  :'max_versions' => :'max-versions',
115
119
  :'name' => :'name',
116
120
  :'new_name' => :'new-name',
@@ -150,6 +154,7 @@ module Akeyless
150
154
  :'json' => :'Boolean',
151
155
  :'keep_prev_version' => :'String',
152
156
  :'key' => :'String',
157
+ :'lock_during_sra_session' => :'String',
153
158
  :'max_versions' => :'String',
154
159
  :'name' => :'String',
155
160
  :'new_name' => :'String',
@@ -239,6 +244,10 @@ module Akeyless
239
244
  self.key = attributes[:'key']
240
245
  end
241
246
 
247
+ if attributes.key?(:'lock_during_sra_session')
248
+ self.lock_during_sra_session = attributes[:'lock_during_sra_session']
249
+ end
250
+
242
251
  if attributes.key?(:'max_versions')
243
252
  self.max_versions = attributes[:'max_versions']
244
253
  end
@@ -265,8 +274,6 @@ module Akeyless
265
274
 
266
275
  if attributes.key?(:'rotate_after_disconnect')
267
276
  self.rotate_after_disconnect = attributes[:'rotate_after_disconnect']
268
- else
269
- self.rotate_after_disconnect = 'false'
270
277
  end
271
278
 
272
279
  if attributes.key?(:'rotated_password')
@@ -362,6 +369,7 @@ module Akeyless
362
369
  json == o.json &&
363
370
  keep_prev_version == o.keep_prev_version &&
364
371
  key == o.key &&
372
+ lock_during_sra_session == o.lock_during_sra_session &&
365
373
  max_versions == o.max_versions &&
366
374
  name == o.name &&
367
375
  new_name == o.new_name &&
@@ -392,7 +400,7 @@ module Akeyless
392
400
  # Calculates hash code according to all attributes.
393
401
  # @return [Integer] Hash code
394
402
  def hash
395
- [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash
403
+ [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, lock_during_sra_session, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash
396
404
  end
397
405
 
398
406
  # Builds the object from hash
@@ -42,6 +42,9 @@ module Akeyless
42
42
  # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)
43
43
  attr_accessor :key
44
44
 
45
+ # Lock this secret for read/update while an SRA session is active
46
+ attr_accessor :lock_during_sra_session
47
+
45
48
  # Set the maximum number of versions, limited by the account settings defaults.
46
49
  attr_accessor :max_versions
47
50
 
@@ -57,7 +60,7 @@ module Akeyless
57
60
  # List of the existent tags that will be removed from this item
58
61
  attr_accessor :rm_tag
59
62
 
60
- # Rotate the value of the secret after SRA session ends [true/false]
63
+ # StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect.
61
64
  attr_accessor :rotate_after_disconnect
62
65
 
63
66
  # rotated-username password (relevant only for rotator-type=password)
@@ -105,6 +108,7 @@ module Akeyless
105
108
  :'json' => :'json',
106
109
  :'keep_prev_version' => :'keep-prev-version',
107
110
  :'key' => :'key',
111
+ :'lock_during_sra_session' => :'lock-during-sra-session',
108
112
  :'max_versions' => :'max-versions',
109
113
  :'name' => :'name',
110
114
  :'new_name' => :'new-name',
@@ -142,6 +146,7 @@ module Akeyless
142
146
  :'json' => :'Boolean',
143
147
  :'keep_prev_version' => :'String',
144
148
  :'key' => :'String',
149
+ :'lock_during_sra_session' => :'String',
145
150
  :'max_versions' => :'String',
146
151
  :'name' => :'String',
147
152
  :'new_name' => :'String',
@@ -229,6 +234,10 @@ module Akeyless
229
234
  self.key = attributes[:'key']
230
235
  end
231
236
 
237
+ if attributes.key?(:'lock_during_sra_session')
238
+ self.lock_during_sra_session = attributes[:'lock_during_sra_session']
239
+ end
240
+
232
241
  if attributes.key?(:'max_versions')
233
242
  self.max_versions = attributes[:'max_versions']
234
243
  end
@@ -255,8 +264,6 @@ module Akeyless
255
264
 
256
265
  if attributes.key?(:'rotate_after_disconnect')
257
266
  self.rotate_after_disconnect = attributes[:'rotate_after_disconnect']
258
- else
259
- self.rotate_after_disconnect = 'false'
260
267
  end
261
268
 
262
269
  if attributes.key?(:'rotated_password')
@@ -344,6 +351,7 @@ module Akeyless
344
351
  json == o.json &&
345
352
  keep_prev_version == o.keep_prev_version &&
346
353
  key == o.key &&
354
+ lock_during_sra_session == o.lock_during_sra_session &&
347
355
  max_versions == o.max_versions &&
348
356
  name == o.name &&
349
357
  new_name == o.new_name &&
@@ -372,7 +380,7 @@ module Akeyless
372
380
  # Calculates hash code according to all attributes.
373
381
  # @return [Integer] Hash code
374
382
  def hash
375
- [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash
383
+ [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, lock_during_sra_session, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_db_name, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash
376
384
  end
377
385
 
378
386
  # Builds the object from hash
@@ -42,6 +42,9 @@ module Akeyless
42
42
  # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)
43
43
  attr_accessor :key
44
44
 
45
+ # Lock this secret for read/update while an SRA session is active
46
+ attr_accessor :lock_during_sra_session
47
+
45
48
  # Set the maximum number of versions, limited by the account settings defaults.
46
49
  attr_accessor :max_versions
47
50
 
@@ -57,7 +60,7 @@ module Akeyless
57
60
  # List of the existent tags that will be removed from this item
58
61
  attr_accessor :rm_tag
59
62
 
60
- # Rotate the value of the secret after SRA session ends [true/false]
63
+ # StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect.
61
64
  attr_accessor :rotate_after_disconnect
62
65
 
63
66
  # rotated-username password (relevant only for rotator-type=password)
@@ -114,6 +117,7 @@ module Akeyless
114
117
  :'json' => :'json',
115
118
  :'keep_prev_version' => :'keep-prev-version',
116
119
  :'key' => :'key',
120
+ :'lock_during_sra_session' => :'lock-during-sra-session',
117
121
  :'max_versions' => :'max-versions',
118
122
  :'name' => :'name',
119
123
  :'new_name' => :'new-name',
@@ -154,6 +158,7 @@ module Akeyless
154
158
  :'json' => :'Boolean',
155
159
  :'keep_prev_version' => :'String',
156
160
  :'key' => :'String',
161
+ :'lock_during_sra_session' => :'String',
157
162
  :'max_versions' => :'String',
158
163
  :'name' => :'String',
159
164
  :'new_name' => :'String',
@@ -244,6 +249,10 @@ module Akeyless
244
249
  self.key = attributes[:'key']
245
250
  end
246
251
 
252
+ if attributes.key?(:'lock_during_sra_session')
253
+ self.lock_during_sra_session = attributes[:'lock_during_sra_session']
254
+ end
255
+
247
256
  if attributes.key?(:'max_versions')
248
257
  self.max_versions = attributes[:'max_versions']
249
258
  end
@@ -270,8 +279,6 @@ module Akeyless
270
279
 
271
280
  if attributes.key?(:'rotate_after_disconnect')
272
281
  self.rotate_after_disconnect = attributes[:'rotate_after_disconnect']
273
- else
274
- self.rotate_after_disconnect = 'false'
275
282
  end
276
283
 
277
284
  if attributes.key?(:'rotated_password')
@@ -371,6 +378,7 @@ module Akeyless
371
378
  json == o.json &&
372
379
  keep_prev_version == o.keep_prev_version &&
373
380
  key == o.key &&
381
+ lock_during_sra_session == o.lock_during_sra_session &&
374
382
  max_versions == o.max_versions &&
375
383
  name == o.name &&
376
384
  new_name == o.new_name &&
@@ -402,7 +410,7 @@ module Akeyless
402
410
  # Calculates hash code according to all attributes.
403
411
  # @return [Integer] Hash code
404
412
  def hash
405
- [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash
413
+ [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, lock_during_sra_session, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_db_name, secure_access_db_schema, secure_access_enable, secure_access_host, secure_access_web, token, uid_token].hash
406
414
  end
407
415
 
408
416
  # Builds the object from hash
@@ -42,6 +42,9 @@ module Akeyless
42
42
  # The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used)
43
43
  attr_accessor :key
44
44
 
45
+ # Lock this secret for read/update while an SRA session is active
46
+ attr_accessor :lock_during_sra_session
47
+
45
48
  # Set the maximum number of versions, limited by the account settings defaults.
46
49
  attr_accessor :max_versions
47
50
 
@@ -57,7 +60,7 @@ module Akeyless
57
60
  # List of the existent tags that will be removed from this item
58
61
  attr_accessor :rm_tag
59
62
 
60
- # Rotate the value of the secret after SRA session ends [true/false]
63
+ # StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect.
61
64
  attr_accessor :rotate_after_disconnect
62
65
 
63
66
  # rotated-username password (relevant only for rotator-type=password)
@@ -102,6 +105,7 @@ module Akeyless
102
105
  :'json' => :'json',
103
106
  :'keep_prev_version' => :'keep-prev-version',
104
107
  :'key' => :'key',
108
+ :'lock_during_sra_session' => :'lock-during-sra-session',
105
109
  :'max_versions' => :'max-versions',
106
110
  :'name' => :'name',
107
111
  :'new_name' => :'new-name',
@@ -138,6 +142,7 @@ module Akeyless
138
142
  :'json' => :'Boolean',
139
143
  :'keep_prev_version' => :'String',
140
144
  :'key' => :'String',
145
+ :'lock_during_sra_session' => :'String',
141
146
  :'max_versions' => :'String',
142
147
  :'name' => :'String',
143
148
  :'new_name' => :'String',
@@ -224,6 +229,10 @@ module Akeyless
224
229
  self.key = attributes[:'key']
225
230
  end
226
231
 
232
+ if attributes.key?(:'lock_during_sra_session')
233
+ self.lock_during_sra_session = attributes[:'lock_during_sra_session']
234
+ end
235
+
227
236
  if attributes.key?(:'max_versions')
228
237
  self.max_versions = attributes[:'max_versions']
229
238
  end
@@ -250,8 +259,6 @@ module Akeyless
250
259
 
251
260
  if attributes.key?(:'rotate_after_disconnect')
252
261
  self.rotate_after_disconnect = attributes[:'rotate_after_disconnect']
253
- else
254
- self.rotate_after_disconnect = 'false'
255
262
  end
256
263
 
257
264
  if attributes.key?(:'rotated_password')
@@ -333,6 +340,7 @@ module Akeyless
333
340
  json == o.json &&
334
341
  keep_prev_version == o.keep_prev_version &&
335
342
  key == o.key &&
343
+ lock_during_sra_session == o.lock_during_sra_session &&
336
344
  max_versions == o.max_versions &&
337
345
  name == o.name &&
338
346
  new_name == o.new_name &&
@@ -360,7 +368,7 @@ module Akeyless
360
368
  # Calculates hash code according to all attributes.
361
369
  # @return [Integer] Hash code
362
370
  def hash
363
- [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_db_name, secure_access_enable, secure_access_host, token, uid_token].hash
371
+ [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, lock_during_sra_session, max_versions, name, new_name, password_length, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, secure_access_db_name, secure_access_enable, secure_access_host, token, uid_token].hash
364
372
  end
365
373
 
366
374
  # Builds the object from hash
@@ -45,6 +45,9 @@ module Akeyless
45
45
  # Private key file contents encoded using base64
46
46
  attr_accessor :key_data_base64
47
47
 
48
+ # Lock this secret for read/update while an SRA session is active
49
+ attr_accessor :lock_during_sra_session
50
+
48
51
  # Set the maximum number of versions, limited by the account settings defaults.
49
52
  attr_accessor :max_versions
50
53
 
@@ -63,7 +66,7 @@ module Akeyless
63
66
  # List of the existent tags that will be removed from this item
64
67
  attr_accessor :rm_tag
65
68
 
66
- # Rotate the value of the secret after SRA session ends [true/false]
69
+ # StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect.
67
70
  attr_accessor :rotate_after_disconnect
68
71
 
69
72
  # rotated-username password (relevant only for rotator-type=password)
@@ -136,6 +139,7 @@ module Akeyless
136
139
  :'keep_prev_version' => :'keep-prev-version',
137
140
  :'key' => :'key',
138
141
  :'key_data_base64' => :'key-data-base64',
142
+ :'lock_during_sra_session' => :'lock-during-sra-session',
139
143
  :'max_versions' => :'max-versions',
140
144
  :'name' => :'name',
141
145
  :'new_name' => :'new-name',
@@ -183,6 +187,7 @@ module Akeyless
183
187
  :'keep_prev_version' => :'String',
184
188
  :'key' => :'String',
185
189
  :'key_data_base64' => :'String',
190
+ :'lock_during_sra_session' => :'String',
186
191
  :'max_versions' => :'String',
187
192
  :'name' => :'String',
188
193
  :'new_name' => :'String',
@@ -283,6 +288,10 @@ module Akeyless
283
288
  self.key_data_base64 = attributes[:'key_data_base64']
284
289
  end
285
290
 
291
+ if attributes.key?(:'lock_during_sra_session')
292
+ self.lock_during_sra_session = attributes[:'lock_during_sra_session']
293
+ end
294
+
286
295
  if attributes.key?(:'max_versions')
287
296
  self.max_versions = attributes[:'max_versions']
288
297
  end
@@ -313,8 +322,6 @@ module Akeyless
313
322
 
314
323
  if attributes.key?(:'rotate_after_disconnect')
315
324
  self.rotate_after_disconnect = attributes[:'rotate_after_disconnect']
316
- else
317
- self.rotate_after_disconnect = 'false'
318
325
  end
319
326
 
320
327
  if attributes.key?(:'rotated_password')
@@ -444,6 +451,7 @@ module Akeyless
444
451
  keep_prev_version == o.keep_prev_version &&
445
452
  key == o.key &&
446
453
  key_data_base64 == o.key_data_base64 &&
454
+ lock_during_sra_session == o.lock_during_sra_session &&
447
455
  max_versions == o.max_versions &&
448
456
  name == o.name &&
449
457
  new_name == o.new_name &&
@@ -481,7 +489,7 @@ module Akeyless
481
489
  # Calculates hash code according to all attributes.
482
490
  # @return [Integer] Hash code
483
491
  def hash
484
- [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, key_data_base64, max_versions, name, new_name, password_length, public_key_remote_path, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, secure_access_target_type, token, uid_token].hash
492
+ [add_tag, authentication_credentials, auto_rotate, delete_protection, description, item_custom_fields, json, keep_prev_version, key, key_data_base64, lock_during_sra_session, max_versions, name, new_name, password_length, public_key_remote_path, rm_tag, rotate_after_disconnect, rotated_password, rotated_username, rotation_event_in, rotation_hour, rotation_interval, rotator_custom_cmd, rotator_type, same_password, secure_access_allow_external_user, secure_access_bastion_issuer, secure_access_certificate_issuer, secure_access_enable, secure_access_host, secure_access_rdp_domain, secure_access_rdp_user, secure_access_ssh_user, secure_access_target_type, token, uid_token].hash
485
493
  end
486
494
 
487
495
  # Builds the object from hash