akeyless 5.0.22 → 5.0.24
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +33 -5
- data/docs/AccountGeneralSettings.md +4 -0
- data/docs/AgenticRule.md +20 -0
- data/docs/AgenticRules.md +20 -0
- data/docs/AuthMethodCreateUniversalIdentity.md +4 -0
- data/docs/AuthMethodUpdateUniversalIdentity.md +4 -0
- data/docs/AwsStorage.md +2 -0
- data/docs/CreateAuthMethodUniversalIdentity.md +4 -0
- data/docs/CreateRole.md +2 -0
- data/docs/CreateRotatedSecret.md +3 -1
- data/docs/CreateSecret.md +2 -0
- data/docs/CreateUSC.md +6 -2
- data/docs/DSProducerDetails.md +2 -0
- data/docs/DeleteRoleRule.md +1 -1
- data/docs/DescribePermissions.md +1 -1
- data/docs/DigiCertTargetDetails.md +42 -0
- data/docs/EsmListSecretsOutput.md +5 -1
- data/docs/GatewayCreateMigration.md +4 -0
- data/docs/GatewayMigrationCreateOutput.md +2 -0
- data/docs/GatewayUpdateMigration.md +4 -0
- data/docs/GatewayUpdateRemoteAccessRdpRecordings.md +2 -0
- data/docs/GeneralConfigPart.md +4 -0
- data/docs/GoogleTrustTargetDetails.md +42 -0
- data/docs/HashiPayload.md +5 -1
- data/docs/Item.md +2 -0
- data/docs/ItemGeneralInfo.md +2 -0
- data/docs/ItemLockingSetting.md +20 -0
- data/docs/ListItems.md +2 -0
- data/docs/LockItem.md +28 -0
- data/docs/LockTarget.md +28 -0
- data/docs/LockingInfo.md +24 -0
- data/docs/MigrationStatusReplyObj.md +2 -0
- data/docs/NetappStorage.md +30 -0
- data/docs/ReverseRBAC.md +1 -1
- data/docs/RotatedSecretCreateAws.md +3 -1
- data/docs/RotatedSecretCreateAzure.md +3 -1
- data/docs/RotatedSecretCreateCustom.md +3 -1
- data/docs/RotatedSecretCreateLdap.md +3 -1
- data/docs/RotatedSecretCreateMongodb.md +3 -1
- data/docs/RotatedSecretCreateMssql.md +3 -1
- data/docs/RotatedSecretCreateMysql.md +3 -1
- data/docs/RotatedSecretCreateOracledb.md +3 -1
- data/docs/RotatedSecretCreatePostgresql.md +3 -1
- data/docs/RotatedSecretCreateRedshift.md +3 -1
- data/docs/RotatedSecretCreateSsh.md +3 -1
- data/docs/RotatedSecretCreateWindows.md +3 -1
- data/docs/RotatedSecretUpdateAws.md +3 -1
- data/docs/RotatedSecretUpdateAzure.md +3 -1
- data/docs/RotatedSecretUpdateCustom.md +3 -1
- data/docs/RotatedSecretUpdateLdap.md +3 -1
- data/docs/RotatedSecretUpdateMongodb.md +3 -1
- data/docs/RotatedSecretUpdateMssql.md +3 -1
- data/docs/RotatedSecretUpdateMysql.md +3 -1
- data/docs/RotatedSecretUpdateOracledb.md +3 -1
- data/docs/RotatedSecretUpdatePostgresql.md +3 -1
- data/docs/RotatedSecretUpdateRedshift.md +3 -1
- data/docs/RotatedSecretUpdateSsh.md +3 -1
- data/docs/RotatedSecretUpdateWindows.md +3 -1
- data/docs/RuntimeAuthorityCommand.md +28 -0
- data/docs/SecretInfo.md +2 -0
- data/docs/SecureRemoteAccess.md +4 -0
- data/docs/SetDefaultProfile.md +20 -0
- data/docs/SetDefaultProfileOutput.md +18 -0
- data/docs/SetRoleRule.md +1 -1
- data/docs/SyncCounters.md +22 -0
- data/docs/SystemAccessCredentialsReplyObj.md +2 -0
- data/docs/Target.md +4 -0
- data/docs/TargetCreateArtifactory.md +2 -0
- data/docs/TargetCreateAws.md +2 -0
- data/docs/TargetCreateAzure.md +2 -0
- data/docs/TargetCreateDB.md +2 -0
- data/docs/TargetCreateDigiCert.md +52 -0
- data/docs/TargetCreateDockerhub.md +2 -0
- data/docs/TargetCreateEks.md +2 -0
- data/docs/TargetCreateGcp.md +2 -0
- data/docs/TargetCreateGemini.md +2 -0
- data/docs/TargetCreateGithub.md +2 -0
- data/docs/TargetCreateGitlab.md +2 -0
- data/docs/TargetCreateGke.md +2 -0
- data/docs/TargetCreateGlobalSign.md +2 -0
- data/docs/TargetCreateGlobalSignAtlas.md +2 -0
- data/docs/TargetCreateGodaddy.md +2 -0
- data/docs/TargetCreateGoogleTrust.md +52 -0
- data/docs/TargetCreateHashiVault.md +2 -0
- data/docs/TargetCreateK8s.md +2 -0
- data/docs/TargetCreateLdap.md +2 -0
- data/docs/TargetCreateLetsEncrypt.md +3 -1
- data/docs/TargetCreateLinked.md +2 -0
- data/docs/TargetCreateOpenAI.md +2 -0
- data/docs/TargetCreatePing.md +2 -0
- data/docs/TargetCreateRabbitMq.md +2 -0
- data/docs/TargetCreateSalesforce.md +2 -0
- data/docs/TargetCreateSectigo.md +2 -0
- data/docs/TargetCreateSplunk.md +5 -1
- data/docs/TargetCreateSsh.md +2 -0
- data/docs/TargetCreateWeb.md +2 -0
- data/docs/TargetCreateWindows.md +2 -0
- data/docs/TargetCreateZeroSSL.md +2 -0
- data/docs/TargetTypeDetailsInput.md +4 -0
- data/docs/TargetUpdateArtifactory.md +2 -0
- data/docs/TargetUpdateAws.md +2 -0
- data/docs/TargetUpdateAzure.md +2 -0
- data/docs/TargetUpdateDB.md +2 -0
- data/docs/TargetUpdateDigiCert.md +54 -0
- data/docs/TargetUpdateDockerhub.md +2 -0
- data/docs/TargetUpdateEks.md +2 -0
- data/docs/TargetUpdateGcp.md +2 -0
- data/docs/TargetUpdateGemini.md +2 -0
- data/docs/TargetUpdateGithub.md +2 -0
- data/docs/TargetUpdateGitlab.md +2 -0
- data/docs/TargetUpdateGke.md +2 -0
- data/docs/TargetUpdateGlobalSign.md +2 -0
- data/docs/TargetUpdateGlobalSignAtlas.md +2 -0
- data/docs/TargetUpdateGodaddy.md +2 -0
- data/docs/TargetUpdateGoogleTrust.md +56 -0
- data/docs/TargetUpdateHashiVault.md +2 -0
- data/docs/TargetUpdateK8s.md +2 -0
- data/docs/TargetUpdateLdap.md +2 -0
- data/docs/TargetUpdateLetsEncrypt.md +3 -1
- data/docs/TargetUpdateOpenAI.md +2 -0
- data/docs/TargetUpdatePing.md +2 -0
- data/docs/TargetUpdateRabbitMq.md +2 -0
- data/docs/TargetUpdateSalesforce.md +2 -0
- data/docs/TargetUpdateSectigo.md +2 -0
- data/docs/TargetUpdateSsh.md +2 -0
- data/docs/TargetUpdateWeb.md +2 -0
- data/docs/TargetUpdateWindows.md +2 -0
- data/docs/TargetUpdateZeroSSL.md +2 -0
- data/docs/UniversalIdentityAccessRules.md +4 -0
- data/docs/UnlockItem.md +24 -0
- data/docs/UnlockTarget.md +24 -0
- data/docs/UpdateAccountSettings.md +4 -0
- data/docs/UpdateAuthMethodUniversalIdentity.md +4 -0
- data/docs/UpdateItem.md +8 -2
- data/docs/UpdateRole.md +2 -0
- data/docs/UpdateRotatedSecret.md +3 -1
- data/docs/UpdateTarget.md +2 -0
- data/docs/UscCreate.md +2 -0
- data/docs/UscDelete.md +4 -0
- data/docs/UscGet.md +4 -0
- data/docs/UscList.md +4 -0
- data/docs/UscListSecretsOutput.md +5 -1
- data/docs/UscUpdate.md +4 -0
- data/docs/V2Api.md +572 -6
- data/docs/WebBastionRdpRecord.md +2 -0
- data/lib/akeyless/api/v2_api.rb +580 -4
- data/lib/akeyless/models/account_general_settings.rb +19 -1
- data/lib/akeyless/models/agentic_rule.rb +223 -0
- data/lib/akeyless/models/agentic_rules.rb +227 -0
- data/lib/akeyless/models/auth_method_create_universal_identity.rb +25 -1
- data/lib/akeyless/models/auth_method_update_universal_identity.rb +25 -1
- data/lib/akeyless/models/aws_storage.rb +10 -1
- data/lib/akeyless/models/create_auth_method_universal_identity.rb +25 -1
- data/lib/akeyless/models/create_role.rb +11 -1
- data/lib/akeyless/models/create_rotated_secret.rb +12 -4
- data/lib/akeyless/models/create_secret.rb +11 -1
- data/lib/akeyless/models/create_usc.rb +25 -5
- data/lib/akeyless/models/delete_role_rule.rb +1 -1
- data/lib/akeyless/models/describe_permissions.rb +1 -1
- data/lib/akeyless/models/digi_cert_target_details.rb +333 -0
- data/lib/akeyless/models/ds_producer_details.rb +10 -1
- data/lib/akeyless/models/esm_list_secrets_output.rb +24 -4
- data/lib/akeyless/models/gateway_create_migration.rb +21 -1
- data/lib/akeyless/models/gateway_migration_create_output.rb +10 -1
- data/lib/akeyless/models/gateway_update_migration.rb +21 -1
- data/lib/akeyless/models/gateway_update_remote_access_rdp_recordings.rb +11 -1
- data/lib/akeyless/models/general_config_part.rb +19 -1
- data/lib/akeyless/models/google_trust_target_details.rb +335 -0
- data/lib/akeyless/models/hashi_payload.rb +22 -4
- data/lib/akeyless/models/item.rb +10 -1
- data/lib/akeyless/models/item_general_info.rb +10 -1
- data/lib/akeyless/models/item_locking_setting.rb +223 -0
- data/lib/akeyless/models/list_items.rb +13 -1
- data/lib/akeyless/models/lock_item.rb +274 -0
- data/lib/akeyless/models/lock_target.rb +274 -0
- data/lib/akeyless/models/locking_info.rb +243 -0
- data/lib/akeyless/models/migration_status_reply_obj.rb +10 -1
- data/lib/akeyless/models/netapp_storage.rb +268 -0
- data/lib/akeyless/models/reverse_rbac.rb +1 -1
- data/lib/akeyless/models/rotated_secret_create_aws.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_azure.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_custom.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_ldap.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_mongodb.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_mssql.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_mysql.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_oracledb.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_postgresql.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_redshift.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_ssh.rb +12 -4
- data/lib/akeyless/models/rotated_secret_create_windows.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_aws.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_azure.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_custom.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_ldap.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_mongodb.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_mssql.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_mysql.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_oracledb.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_postgresql.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_redshift.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_ssh.rb +12 -4
- data/lib/akeyless/models/rotated_secret_update_windows.rb +12 -4
- data/lib/akeyless/models/runtime_authority_command.rb +288 -0
- data/lib/akeyless/models/secret_info.rb +10 -1
- data/lib/akeyless/models/secure_remote_access.rb +19 -1
- data/lib/akeyless/models/set_default_profile.rb +234 -0
- data/lib/akeyless/models/set_default_profile_output.rb +214 -0
- data/lib/akeyless/models/set_role_rule.rb +1 -1
- data/lib/akeyless/models/sync_counters.rb +233 -0
- data/lib/akeyless/models/system_access_credentials_reply_obj.rb +11 -1
- data/lib/akeyless/models/target.rb +19 -1
- data/lib/akeyless/models/target_create_artifactory.rb +11 -1
- data/lib/akeyless/models/target_create_aws.rb +11 -1
- data/lib/akeyless/models/target_create_azure.rb +11 -1
- data/lib/akeyless/models/target_create_db.rb +11 -1
- data/lib/akeyless/models/target_create_digi_cert.rb +408 -0
- data/lib/akeyless/models/target_create_dockerhub.rb +11 -1
- data/lib/akeyless/models/target_create_eks.rb +11 -1
- data/lib/akeyless/models/target_create_gcp.rb +11 -1
- data/lib/akeyless/models/target_create_gemini.rb +11 -1
- data/lib/akeyless/models/target_create_github.rb +11 -1
- data/lib/akeyless/models/target_create_gitlab.rb +11 -1
- data/lib/akeyless/models/target_create_gke.rb +11 -1
- data/lib/akeyless/models/target_create_global_sign.rb +11 -1
- data/lib/akeyless/models/target_create_global_sign_atlas.rb +11 -1
- data/lib/akeyless/models/target_create_godaddy.rb +11 -1
- data/lib/akeyless/models/target_create_google_trust.rb +408 -0
- data/lib/akeyless/models/target_create_hashi_vault.rb +11 -1
- data/lib/akeyless/models/target_create_k8s.rb +11 -1
- data/lib/akeyless/models/target_create_ldap.rb +11 -1
- data/lib/akeyless/models/target_create_lets_encrypt.rb +18 -1
- data/lib/akeyless/models/target_create_linked.rb +11 -1
- data/lib/akeyless/models/target_create_open_ai.rb +11 -1
- data/lib/akeyless/models/target_create_ping.rb +11 -1
- data/lib/akeyless/models/target_create_rabbit_mq.rb +11 -1
- data/lib/akeyless/models/target_create_salesforce.rb +11 -1
- data/lib/akeyless/models/target_create_sectigo.rb +11 -1
- data/lib/akeyless/models/target_create_splunk.rb +21 -1
- data/lib/akeyless/models/target_create_ssh.rb +11 -1
- data/lib/akeyless/models/target_create_web.rb +11 -1
- data/lib/akeyless/models/target_create_windows.rb +11 -1
- data/lib/akeyless/models/target_create_zero_ssl.rb +11 -1
- data/lib/akeyless/models/target_type_details_input.rb +19 -1
- data/lib/akeyless/models/target_update_artifactory.rb +11 -1
- data/lib/akeyless/models/target_update_aws.rb +11 -1
- data/lib/akeyless/models/target_update_azure.rb +11 -1
- data/lib/akeyless/models/target_update_db.rb +11 -1
- data/lib/akeyless/models/target_update_digi_cert.rb +418 -0
- data/lib/akeyless/models/target_update_dockerhub.rb +11 -1
- data/lib/akeyless/models/target_update_eks.rb +11 -1
- data/lib/akeyless/models/target_update_gcp.rb +11 -1
- data/lib/akeyless/models/target_update_gemini.rb +11 -1
- data/lib/akeyless/models/target_update_github.rb +11 -1
- data/lib/akeyless/models/target_update_gitlab.rb +11 -1
- data/lib/akeyless/models/target_update_gke.rb +11 -1
- data/lib/akeyless/models/target_update_global_sign.rb +11 -1
- data/lib/akeyless/models/target_update_global_sign_atlas.rb +11 -1
- data/lib/akeyless/models/target_update_godaddy.rb +11 -1
- data/lib/akeyless/models/target_update_google_trust.rb +428 -0
- data/lib/akeyless/models/target_update_hashi_vault.rb +11 -1
- data/lib/akeyless/models/target_update_k8s.rb +11 -1
- data/lib/akeyless/models/target_update_ldap.rb +11 -1
- data/lib/akeyless/models/target_update_lets_encrypt.rb +18 -1
- data/lib/akeyless/models/target_update_open_ai.rb +11 -1
- data/lib/akeyless/models/target_update_ping.rb +11 -1
- data/lib/akeyless/models/target_update_rabbit_mq.rb +11 -1
- data/lib/akeyless/models/target_update_salesforce.rb +11 -1
- data/lib/akeyless/models/target_update_sectigo.rb +11 -1
- data/lib/akeyless/models/target_update_ssh.rb +11 -1
- data/lib/akeyless/models/target_update_web.rb +11 -1
- data/lib/akeyless/models/target_update_windows.rb +11 -1
- data/lib/akeyless/models/target_update_zero_ssl.rb +11 -1
- data/lib/akeyless/models/universal_identity_access_rules.rb +19 -1
- data/lib/akeyless/models/unlock_item.rb +254 -0
- data/lib/akeyless/models/unlock_target.rb +254 -0
- data/lib/akeyless/models/update_account_settings.rb +21 -1
- data/lib/akeyless/models/update_auth_method_universal_identity.rb +25 -1
- data/lib/akeyless/models/update_item.rb +35 -7
- data/lib/akeyless/models/update_role.rb +11 -1
- data/lib/akeyless/models/update_rotated_secret.rb +12 -4
- data/lib/akeyless/models/update_target.rb +11 -1
- data/lib/akeyless/models/usc_create.rb +10 -1
- data/lib/akeyless/models/usc_delete.rb +20 -1
- data/lib/akeyless/models/usc_get.rb +20 -1
- data/lib/akeyless/models/usc_list.rb +21 -1
- data/lib/akeyless/models/usc_list_secrets_output.rb +24 -4
- data/lib/akeyless/models/usc_update.rb +20 -1
- data/lib/akeyless/models/web_bastion_rdp_record.rb +10 -1
- data/lib/akeyless/version.rb +1 -1
- data/lib/akeyless.rb +19 -0
- data/spec/models/agentic_rule_spec.rb +42 -0
- data/spec/models/agentic_rules_spec.rb +42 -0
- data/spec/models/digi_cert_target_details_spec.rb +108 -0
- data/spec/models/google_trust_target_details_spec.rb +108 -0
- data/spec/models/item_locking_setting_spec.rb +42 -0
- data/spec/models/lock_item_spec.rb +66 -0
- data/spec/models/lock_target_spec.rb +66 -0
- data/spec/models/locking_info_spec.rb +54 -0
- data/spec/models/netapp_storage_spec.rb +72 -0
- data/spec/models/runtime_authority_command_spec.rb +66 -0
- data/spec/models/set_default_profile_output_spec.rb +36 -0
- data/spec/models/set_default_profile_spec.rb +42 -0
- data/spec/models/sync_counters_spec.rb +48 -0
- data/spec/models/target_create_digi_cert_spec.rb +132 -0
- data/spec/models/target_create_google_trust_spec.rb +132 -0
- data/spec/models/target_update_digi_cert_spec.rb +144 -0
- data/spec/models/target_update_google_trust_spec.rb +144 -0
- data/spec/models/unlock_item_spec.rb +54 -0
- data/spec/models/unlock_target_spec.rb +54 -0
- metadata +1226 -1147
|
@@ -11,10 +11,11 @@
|
|
|
11
11
|
| **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
|
|
12
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
13
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
14
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
14
15
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
15
16
|
| **name** | **String** | Rotated secret name | |
|
|
16
17
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
17
|
-
| **rotate_after_disconnect** | **String** |
|
|
18
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
18
19
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
19
20
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
20
21
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -47,6 +48,7 @@ instance = Akeyless::RotatedSecretCreateWindows.new(
|
|
|
47
48
|
item_custom_fields: null,
|
|
48
49
|
json: null,
|
|
49
50
|
key: null,
|
|
51
|
+
lock_during_sra_session: null,
|
|
50
52
|
max_versions: null,
|
|
51
53
|
name: null,
|
|
52
54
|
password_length: null,
|
|
@@ -20,12 +20,13 @@
|
|
|
20
20
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
21
21
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
22
22
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
23
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
23
24
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
24
25
|
| **name** | **String** | Rotated secret name | |
|
|
25
26
|
| **new_name** | **String** | New item name | [optional] |
|
|
26
27
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
27
28
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
28
|
-
| **rotate_after_disconnect** | **String** |
|
|
29
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
29
30
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
30
31
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
31
32
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
@@ -59,6 +60,7 @@ instance = Akeyless::RotatedSecretUpdateAws.new(
|
|
|
59
60
|
json: null,
|
|
60
61
|
keep_prev_version: null,
|
|
61
62
|
key: null,
|
|
63
|
+
lock_during_sra_session: null,
|
|
62
64
|
max_versions: null,
|
|
63
65
|
name: null,
|
|
64
66
|
new_name: null,
|
|
@@ -21,6 +21,7 @@
|
|
|
21
21
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
22
22
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
23
23
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
24
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
24
25
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
25
26
|
| **name** | **String** | Rotated secret name | |
|
|
26
27
|
| **new_name** | **String** | New item name | [optional] |
|
|
@@ -28,7 +29,7 @@
|
|
|
28
29
|
| **resource_group_name** | **String** | The resource group name (only relevant when explicitly-set-sa=true) | [optional] |
|
|
29
30
|
| **resource_name** | **String** | The name of the storage account (only relevant when explicitly-set-sa=true) | [optional] |
|
|
30
31
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
31
|
-
| **rotate_after_disconnect** | **String** |
|
|
32
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
32
33
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
33
34
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
34
35
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
@@ -66,6 +67,7 @@ instance = Akeyless::RotatedSecretUpdateAzure.new(
|
|
|
66
67
|
json: null,
|
|
67
68
|
keep_prev_version: null,
|
|
68
69
|
key: null,
|
|
70
|
+
lock_during_sra_session: null,
|
|
69
71
|
max_versions: null,
|
|
70
72
|
name: null,
|
|
71
73
|
new_name: null,
|
|
@@ -15,12 +15,13 @@
|
|
|
15
15
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
16
16
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
17
17
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
18
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
18
19
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
19
20
|
| **name** | **String** | Rotated secret name | |
|
|
20
21
|
| **new_name** | **String** | New item name | [optional] |
|
|
21
22
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
22
23
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
23
|
-
| **rotate_after_disconnect** | **String** |
|
|
24
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
25
26
|
| **rotation_hour** | **Integer** | The Hour of the rotation in UTC | [optional] |
|
|
26
27
|
| **rotation_interval** | **String** | The number of days to wait between every automatic key rotation (1-365) | [optional] |
|
|
@@ -61,6 +62,7 @@ instance = Akeyless::RotatedSecretUpdateCustom.new(
|
|
|
61
62
|
json: null,
|
|
62
63
|
keep_prev_version: null,
|
|
63
64
|
key: null,
|
|
65
|
+
lock_during_sra_session: null,
|
|
64
66
|
max_versions: null,
|
|
65
67
|
name: null,
|
|
66
68
|
new_name: null,
|
|
@@ -15,12 +15,13 @@
|
|
|
15
15
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
16
16
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
17
17
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
18
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
18
19
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
19
20
|
| **name** | **String** | Rotated secret name | |
|
|
20
21
|
| **new_name** | **String** | New item name | [optional] |
|
|
21
22
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
22
23
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
23
|
-
| **rotate_after_disconnect** | **String** |
|
|
24
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
24
25
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=ldap) | [optional] |
|
|
25
26
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=ldap) | [optional] |
|
|
26
27
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -58,6 +59,7 @@ instance = Akeyless::RotatedSecretUpdateLdap.new(
|
|
|
58
59
|
json: null,
|
|
59
60
|
keep_prev_version: null,
|
|
60
61
|
key: null,
|
|
62
|
+
lock_during_sra_session: null,
|
|
61
63
|
max_versions: null,
|
|
62
64
|
name: null,
|
|
63
65
|
new_name: null,
|
|
@@ -13,12 +13,13 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
20
21
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
|
-
| **rotate_after_disconnect** | **String** |
|
|
22
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
22
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
23
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretUpdateMongodb.new(
|
|
|
48
49
|
json: null,
|
|
49
50
|
keep_prev_version: null,
|
|
50
51
|
key: null,
|
|
52
|
+
lock_during_sra_session: null,
|
|
51
53
|
max_versions: null,
|
|
52
54
|
name: null,
|
|
53
55
|
new_name: null,
|
|
@@ -13,12 +13,13 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
20
21
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
|
-
| **rotate_after_disconnect** | **String** |
|
|
22
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
22
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
23
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -49,6 +50,7 @@ instance = Akeyless::RotatedSecretUpdateMssql.new(
|
|
|
49
50
|
json: null,
|
|
50
51
|
keep_prev_version: null,
|
|
51
52
|
key: null,
|
|
53
|
+
lock_during_sra_session: null,
|
|
52
54
|
max_versions: null,
|
|
53
55
|
name: null,
|
|
54
56
|
new_name: null,
|
|
@@ -13,12 +13,13 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
20
21
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
|
-
| **rotate_after_disconnect** | **String** |
|
|
22
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
22
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
23
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -48,6 +49,7 @@ instance = Akeyless::RotatedSecretUpdateMysql.new(
|
|
|
48
49
|
json: null,
|
|
49
50
|
keep_prev_version: null,
|
|
50
51
|
key: null,
|
|
52
|
+
lock_during_sra_session: null,
|
|
51
53
|
max_versions: null,
|
|
52
54
|
name: null,
|
|
53
55
|
new_name: null,
|
|
@@ -13,12 +13,13 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
20
21
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
|
-
| **rotate_after_disconnect** | **String** |
|
|
22
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
22
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
23
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -46,6 +47,7 @@ instance = Akeyless::RotatedSecretUpdateOracledb.new(
|
|
|
46
47
|
json: null,
|
|
47
48
|
keep_prev_version: null,
|
|
48
49
|
key: null,
|
|
50
|
+
lock_during_sra_session: null,
|
|
49
51
|
max_versions: null,
|
|
50
52
|
name: null,
|
|
51
53
|
new_name: null,
|
|
@@ -13,12 +13,13 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
20
21
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
|
-
| **rotate_after_disconnect** | **String** |
|
|
22
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
22
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
23
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -49,6 +50,7 @@ instance = Akeyless::RotatedSecretUpdatePostgresql.new(
|
|
|
49
50
|
json: null,
|
|
50
51
|
keep_prev_version: null,
|
|
51
52
|
key: null,
|
|
53
|
+
lock_during_sra_session: null,
|
|
52
54
|
max_versions: null,
|
|
53
55
|
name: null,
|
|
54
56
|
new_name: null,
|
|
@@ -13,12 +13,13 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
20
21
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
|
-
| **rotate_after_disconnect** | **String** |
|
|
22
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
22
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
23
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -45,6 +46,7 @@ instance = Akeyless::RotatedSecretUpdateRedshift.new(
|
|
|
45
46
|
json: null,
|
|
46
47
|
keep_prev_version: null,
|
|
47
48
|
key: null,
|
|
49
|
+
lock_during_sra_session: null,
|
|
48
50
|
max_versions: null,
|
|
49
51
|
name: null,
|
|
50
52
|
new_name: null,
|
|
@@ -14,13 +14,14 @@
|
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
16
|
| **key_data_base64** | **String** | Private key file contents encoded using base64 | [optional] |
|
|
17
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
17
18
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
18
19
|
| **name** | **String** | Rotated secret name | |
|
|
19
20
|
| **new_name** | **String** | New item name | [optional] |
|
|
20
21
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
21
22
|
| **public_key_remote_path** | **String** | The path to the public key that will be rotated on the server | [optional] |
|
|
22
23
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
23
|
-
| **rotate_after_disconnect** | **String** |
|
|
24
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
24
25
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
25
26
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
26
27
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -57,6 +58,7 @@ instance = Akeyless::RotatedSecretUpdateSsh.new(
|
|
|
57
58
|
keep_prev_version: null,
|
|
58
59
|
key: null,
|
|
59
60
|
key_data_base64: null,
|
|
61
|
+
lock_during_sra_session: null,
|
|
60
62
|
max_versions: null,
|
|
61
63
|
name: null,
|
|
62
64
|
new_name: null,
|
|
@@ -13,12 +13,13 @@
|
|
|
13
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
14
14
|
| **keep_prev_version** | **String** | Whether to keep previous version [true/false]. If not set, use default according to account settings | [optional] |
|
|
15
15
|
| **key** | **String** | The name of a key that used to encrypt the secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
16
|
+
| **lock_during_sra_session** | **String** | Lock this secret for read/update while an SRA session is active | [optional] |
|
|
16
17
|
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
17
18
|
| **name** | **String** | Rotated secret name | |
|
|
18
19
|
| **new_name** | **String** | New item name | [optional] |
|
|
19
20
|
| **password_length** | **String** | The length of the password to be generated | [optional] |
|
|
20
21
|
| **rm_tag** | **Array<String>** | List of the existent tags that will be removed from this item | [optional] |
|
|
21
|
-
| **rotate_after_disconnect** | **String** |
|
|
22
|
+
| **rotate_after_disconnect** | **String** | StringOrBool accepts JSON strings, booleans, and numbers for backward compatibility with older SDK versions that send boolean values for rotate-after-disconnect. | [optional] |
|
|
22
23
|
| **rotated_password** | **String** | rotated-username password (relevant only for rotator-type=password) | [optional] |
|
|
23
24
|
| **rotated_username** | **String** | username to be rotated, if selected use-self-creds at rotator-creds-type, this username will try to rotate it's own password, if use-target-creds is selected, target credentials will be use to rotate the rotated-password (relevant only for rotator-type=password) | [optional] |
|
|
24
25
|
| **rotation_event_in** | **Array<String>** | How many days before the rotation of the item would you like to be notified | [optional] |
|
|
@@ -51,6 +52,7 @@ instance = Akeyless::RotatedSecretUpdateWindows.new(
|
|
|
51
52
|
json: null,
|
|
52
53
|
keep_prev_version: null,
|
|
53
54
|
key: null,
|
|
55
|
+
lock_during_sra_session: null,
|
|
54
56
|
max_versions: null,
|
|
55
57
|
name: null,
|
|
56
58
|
new_name: null,
|
|
@@ -0,0 +1,28 @@
|
|
|
1
|
+
# Akeyless::RuntimeAuthorityCommand
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **agent_id** | **String** | Agent identifier for auditing | |
|
|
8
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
9
|
+
| **name** | **String** | Secret name (dynamic secret or rotated secret) | |
|
|
10
|
+
| **payload** | **String** | Query or action payload (SQL, natural language, or CLI-style) | |
|
|
11
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
12
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
13
|
+
|
|
14
|
+
## Example
|
|
15
|
+
|
|
16
|
+
```ruby
|
|
17
|
+
require 'akeyless'
|
|
18
|
+
|
|
19
|
+
instance = Akeyless::RuntimeAuthorityCommand.new(
|
|
20
|
+
agent_id: null,
|
|
21
|
+
json: null,
|
|
22
|
+
name: null,
|
|
23
|
+
payload: null,
|
|
24
|
+
token: null,
|
|
25
|
+
uid_token: null
|
|
26
|
+
)
|
|
27
|
+
```
|
|
28
|
+
|
data/docs/SecretInfo.md
CHANGED
|
@@ -12,6 +12,7 @@
|
|
|
12
12
|
| **last_retrieved** | **Time** | | [optional] |
|
|
13
13
|
| **location** | **Object** | | [optional] |
|
|
14
14
|
| **name** | **String** | | [optional] |
|
|
15
|
+
| **namespace** | **String** | | [optional] |
|
|
15
16
|
| **region** | **String** | | [optional] |
|
|
16
17
|
| **secret_id** | **String** | | [optional] |
|
|
17
18
|
| **status** | **Boolean** | | [optional] |
|
|
@@ -34,6 +35,7 @@ instance = Akeyless::SecretInfo.new(
|
|
|
34
35
|
last_retrieved: null,
|
|
35
36
|
location: null,
|
|
36
37
|
name: null,
|
|
38
|
+
namespace: null,
|
|
37
39
|
region: null,
|
|
38
40
|
secret_id: null,
|
|
39
41
|
status: null,
|
data/docs/SecureRemoteAccess.md
CHANGED
|
@@ -28,11 +28,13 @@
|
|
|
28
28
|
| **is_desktop_app** | **Boolean** | | [optional] |
|
|
29
29
|
| **is_web** | **Boolean** | | [optional] |
|
|
30
30
|
| **isolated** | **Boolean** | | [optional] |
|
|
31
|
+
| **lock_during_sra_session** | **Boolean** | | [optional] |
|
|
31
32
|
| **native** | **Boolean** | | [optional] |
|
|
32
33
|
| **rd_gateway_server** | **String** | | [optional] |
|
|
33
34
|
| **rdp_user** | **String** | | [optional] |
|
|
34
35
|
| **region** | **String** | | [optional] |
|
|
35
36
|
| **rotate_after_disconnect** | **Boolean** | | [optional] |
|
|
37
|
+
| **rotate_after_disconnect_delay_mins** | **Integer** | | [optional] |
|
|
36
38
|
| **schema** | **String** | | [optional] |
|
|
37
39
|
| **ssh_password** | **Boolean** | | [optional] |
|
|
38
40
|
| **ssh_private_key** | **Boolean** | | [optional] |
|
|
@@ -74,11 +76,13 @@ instance = Akeyless::SecureRemoteAccess.new(
|
|
|
74
76
|
is_desktop_app: null,
|
|
75
77
|
is_web: null,
|
|
76
78
|
isolated: null,
|
|
79
|
+
lock_during_sra_session: null,
|
|
77
80
|
native: null,
|
|
78
81
|
rd_gateway_server: null,
|
|
79
82
|
rdp_user: null,
|
|
80
83
|
region: null,
|
|
81
84
|
rotate_after_disconnect: null,
|
|
85
|
+
rotate_after_disconnect_delay_mins: null,
|
|
82
86
|
schema: null,
|
|
83
87
|
ssh_password: null,
|
|
84
88
|
ssh_private_key: null,
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
# Akeyless::SetDefaultProfile
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
8
|
+
| **profile** | **String** | Profile name to use as the default | |
|
|
9
|
+
|
|
10
|
+
## Example
|
|
11
|
+
|
|
12
|
+
```ruby
|
|
13
|
+
require 'akeyless'
|
|
14
|
+
|
|
15
|
+
instance = Akeyless::SetDefaultProfile.new(
|
|
16
|
+
json: null,
|
|
17
|
+
profile: null
|
|
18
|
+
)
|
|
19
|
+
```
|
|
20
|
+
|
|
@@ -0,0 +1,18 @@
|
|
|
1
|
+
# Akeyless::SetDefaultProfileOutput
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **profile_name** | **String** | | [optional] |
|
|
8
|
+
|
|
9
|
+
## Example
|
|
10
|
+
|
|
11
|
+
```ruby
|
|
12
|
+
require 'akeyless'
|
|
13
|
+
|
|
14
|
+
instance = Akeyless::SetDefaultProfileOutput.new(
|
|
15
|
+
profile_name: null
|
|
16
|
+
)
|
|
17
|
+
```
|
|
18
|
+
|
data/docs/SetRoleRule.md
CHANGED
|
@@ -8,7 +8,7 @@
|
|
|
8
8
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
9
9
|
| **path** | **String** | The path the rule refers to | |
|
|
10
10
|
| **role_name** | **String** | The role name to be updated | |
|
|
11
|
-
| **rule_type** | **String** | item-rule, target-rule, role-rule, auth-method-rule, search-rule, reports-rule, gw-reports-rule
|
|
11
|
+
| **rule_type** | **String** | item-rule, target-rule, role-rule, auth-method-rule, search-rule, reports-rule, gw-reports-rule, sra-reports-rule, ara-reports-rule, sra-rule, ara-rule | [optional][default to 'item-rule'] |
|
|
12
12
|
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
13
13
|
| **ttl** | **Integer** | RoleRule ttl | [optional] |
|
|
14
14
|
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
@@ -0,0 +1,22 @@
|
|
|
1
|
+
# Akeyless::SyncCounters
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **created** | **Integer** | | [optional] |
|
|
8
|
+
| **failed** | **Integer** | | [optional] |
|
|
9
|
+
| **skipped** | **Integer** | | [optional] |
|
|
10
|
+
|
|
11
|
+
## Example
|
|
12
|
+
|
|
13
|
+
```ruby
|
|
14
|
+
require 'akeyless'
|
|
15
|
+
|
|
16
|
+
instance = Akeyless::SyncCounters.new(
|
|
17
|
+
created: null,
|
|
18
|
+
failed: null,
|
|
19
|
+
skipped: null
|
|
20
|
+
)
|
|
21
|
+
```
|
|
22
|
+
|
|
@@ -6,6 +6,7 @@
|
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_id** | **String** | | [optional] |
|
|
8
8
|
| **auth_creds** | **String** | Temporary credentials for accessing Auth | [optional] |
|
|
9
|
+
| **csrf_token** | **String** | CSRF token for synchronizer-token pattern (only populated for WebUI clients) | [optional] |
|
|
9
10
|
| **expiry** | **Integer** | Credentials expiration date | [optional] |
|
|
10
11
|
| **kfm_creds** | **String** | Temporary credentials for accessing the KFMs instances | [optional] |
|
|
11
12
|
| **need_mfa_app_first_config** | **Boolean** | If the user didn't complete to configure the MFA app | [optional] |
|
|
@@ -21,6 +22,7 @@ require 'akeyless'
|
|
|
21
22
|
instance = Akeyless::SystemAccessCredentialsReplyObj.new(
|
|
22
23
|
access_id: null,
|
|
23
24
|
auth_creds: null,
|
|
25
|
+
csrf_token: null,
|
|
24
26
|
expiry: null,
|
|
25
27
|
kfm_creds: null,
|
|
26
28
|
need_mfa_app_first_config: null,
|
data/docs/Target.md
CHANGED
|
@@ -11,8 +11,10 @@
|
|
|
11
11
|
| **client_permissions** | **Array<String>** | | [optional] |
|
|
12
12
|
| **comment** | **String** | | [optional] |
|
|
13
13
|
| **creation_date** | **Time** | | [optional] |
|
|
14
|
+
| **delete_protection** | **Boolean** | | [optional] |
|
|
14
15
|
| **is_access_request_enabled** | **Boolean** | | [optional] |
|
|
15
16
|
| **last_version** | **Integer** | | [optional] |
|
|
17
|
+
| **locking_info** | [**LockingInfo**](LockingInfo.md) | | [optional] |
|
|
16
18
|
| **modification_date** | **Time** | | [optional] |
|
|
17
19
|
| **parent_target_name** | **String** | | [optional] |
|
|
18
20
|
| **protection_key_name** | **String** | | [optional] |
|
|
@@ -38,8 +40,10 @@ instance = Akeyless::Target.new(
|
|
|
38
40
|
client_permissions: null,
|
|
39
41
|
comment: null,
|
|
40
42
|
creation_date: null,
|
|
43
|
+
delete_protection: null,
|
|
41
44
|
is_access_request_enabled: null,
|
|
42
45
|
last_version: null,
|
|
46
|
+
locking_info: null,
|
|
43
47
|
modification_date: null,
|
|
44
48
|
parent_target_name: null,
|
|
45
49
|
protection_key_name: null,
|
|
@@ -7,6 +7,7 @@
|
|
|
7
7
|
| **artifactory_admin_name** | **String** | Artifactory Admin Name | |
|
|
8
8
|
| **artifactory_admin_pwd** | **String** | Artifactory Admin password | |
|
|
9
9
|
| **base_url** | **String** | Base URL | |
|
|
10
|
+
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
10
11
|
| **description** | **String** | Description of the object | [optional] |
|
|
11
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
12
13
|
| **key** | **String** | The name of a key used to encrypt the target secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
@@ -24,6 +25,7 @@ instance = Akeyless::TargetCreateArtifactory.new(
|
|
|
24
25
|
artifactory_admin_name: null,
|
|
25
26
|
artifactory_admin_pwd: null,
|
|
26
27
|
base_url: null,
|
|
28
|
+
delete_protection: null,
|
|
27
29
|
description: null,
|
|
28
30
|
json: null,
|
|
29
31
|
key: null,
|
data/docs/TargetCreateAws.md
CHANGED
|
@@ -6,6 +6,7 @@
|
|
|
6
6
|
| ---- | ---- | ----------- | ----- |
|
|
7
7
|
| **access_key** | **String** | AWS secret access key | |
|
|
8
8
|
| **access_key_id** | **String** | AWS access key ID | |
|
|
9
|
+
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
9
10
|
| **description** | **String** | Description of the object | [optional] |
|
|
10
11
|
| **generate_external_id** | **Boolean** | A unique auto-generated value used in your AWS account when configuring your AWS IAM role to securely delegate access to Akeyless. Relevant only when using GW cloud ID | [optional] |
|
|
11
12
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
@@ -27,6 +28,7 @@ require 'akeyless'
|
|
|
27
28
|
instance = Akeyless::TargetCreateAws.new(
|
|
28
29
|
access_key: null,
|
|
29
30
|
access_key_id: null,
|
|
31
|
+
delete_protection: null,
|
|
30
32
|
description: null,
|
|
31
33
|
generate_external_id: null,
|
|
32
34
|
json: null,
|
data/docs/TargetCreateAzure.md
CHANGED
|
@@ -8,6 +8,7 @@
|
|
|
8
8
|
| **client_id** | **String** | Azure client/application id | [optional] |
|
|
9
9
|
| **client_secret** | **String** | Azure client secret | [optional] |
|
|
10
10
|
| **connection_type** | **String** | Type of connection [credentials/cloud-identity] | [optional][default to 'credentials'] |
|
|
11
|
+
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
11
12
|
| **description** | **String** | Description of the object | [optional] |
|
|
12
13
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
13
14
|
| **key** | **String** | The name of a key that used to encrypt the target secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
@@ -31,6 +32,7 @@ instance = Akeyless::TargetCreateAzure.new(
|
|
|
31
32
|
client_id: null,
|
|
32
33
|
client_secret: null,
|
|
33
34
|
connection_type: null,
|
|
35
|
+
delete_protection: null,
|
|
34
36
|
description: null,
|
|
35
37
|
json: null,
|
|
36
38
|
key: null,
|
data/docs/TargetCreateDB.md
CHANGED
|
@@ -15,6 +15,7 @@
|
|
|
15
15
|
| **db_server_certificates** | **String** | (Optional) DB server certificates | [optional] |
|
|
16
16
|
| **db_server_name** | **String** | (Optional) Server name for certificate verification | [optional] |
|
|
17
17
|
| **db_type** | **String** | | |
|
|
18
|
+
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
18
19
|
| **description** | **String** | Description of the object | [optional] |
|
|
19
20
|
| **host** | **String** | | [optional] |
|
|
20
21
|
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
@@ -60,6 +61,7 @@ instance = Akeyless::TargetCreateDB.new(
|
|
|
60
61
|
db_server_certificates: null,
|
|
61
62
|
db_server_name: null,
|
|
62
63
|
db_type: null,
|
|
64
|
+
delete_protection: null,
|
|
63
65
|
description: null,
|
|
64
66
|
host: null,
|
|
65
67
|
json: null,
|
|
@@ -0,0 +1,52 @@
|
|
|
1
|
+
# Akeyless::TargetCreateDigiCert
|
|
2
|
+
|
|
3
|
+
## Properties
|
|
4
|
+
|
|
5
|
+
| Name | Type | Description | Notes |
|
|
6
|
+
| ---- | ---- | ----------- | ----- |
|
|
7
|
+
| **acme_challenge** | **String** | ACME challenge type. Options: [dns] | [optional][default to 'dns'] |
|
|
8
|
+
| **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
|
|
9
|
+
| **description** | **String** | Description of the object | [optional] |
|
|
10
|
+
| **digicert_url** | **String** | DigiCert ACME endpoint selector. Options: [us-production/eu-production/us-demo/eu-demo] | [optional][default to 'us-production'] |
|
|
11
|
+
| **dns_target_creds** | **String** | Name of existing cloud target for DNS credentials. Required when challenge type is dns. Supported providers: AWS, Azure, GCP | [optional] |
|
|
12
|
+
| **eab_hmac_key** | **String** | External Account Binding HMAC key (required for ACME account bootstrap on create) | [optional] |
|
|
13
|
+
| **eab_key_id** | **String** | External Account Binding key identifier (required for ACME account bootstrap on create) | [optional] |
|
|
14
|
+
| **email** | **String** | Email address for ACME account registration | |
|
|
15
|
+
| **gcp_project** | **String** | GCP Cloud DNS project ID. Optional and can be derived from service account | [optional] |
|
|
16
|
+
| **hosted_zone** | **String** | AWS Route53 hosted zone ID. Required when DNS credentials target is AWS | [optional] |
|
|
17
|
+
| **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
|
|
18
|
+
| **key** | **String** | The name of a key that used to encrypt the target secret value (if empty, the account default protectionKey key will be used) | [optional] |
|
|
19
|
+
| **max_versions** | **String** | Set the maximum number of versions, limited by the account settings defaults. | [optional] |
|
|
20
|
+
| **name** | **String** | Target name | |
|
|
21
|
+
| **resource_group** | **String** | Azure resource group name. Required when DNS credentials target is Azure | [optional] |
|
|
22
|
+
| **timeout** | **String** | Timeout for challenge validation | [optional][default to '5m'] |
|
|
23
|
+
| **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
|
|
24
|
+
| **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
|
|
25
|
+
|
|
26
|
+
## Example
|
|
27
|
+
|
|
28
|
+
```ruby
|
|
29
|
+
require 'akeyless'
|
|
30
|
+
|
|
31
|
+
instance = Akeyless::TargetCreateDigiCert.new(
|
|
32
|
+
acme_challenge: null,
|
|
33
|
+
delete_protection: null,
|
|
34
|
+
description: null,
|
|
35
|
+
digicert_url: null,
|
|
36
|
+
dns_target_creds: null,
|
|
37
|
+
eab_hmac_key: null,
|
|
38
|
+
eab_key_id: null,
|
|
39
|
+
email: null,
|
|
40
|
+
gcp_project: null,
|
|
41
|
+
hosted_zone: null,
|
|
42
|
+
json: null,
|
|
43
|
+
key: null,
|
|
44
|
+
max_versions: null,
|
|
45
|
+
name: null,
|
|
46
|
+
resource_group: null,
|
|
47
|
+
timeout: null,
|
|
48
|
+
token: null,
|
|
49
|
+
uid_token: null
|
|
50
|
+
)
|
|
51
|
+
```
|
|
52
|
+
|