akeyless 5.0.21 → 5.0.22

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (87) hide show
  1. checksums.yaml +4 -4
  2. data/README.md +13 -1
  3. data/docs/AccountGeneralSettings.md +2 -0
  4. data/docs/ActiveDirectoryPayload.md +6 -0
  5. data/docs/Auth.md +2 -0
  6. data/docs/AuthMethodCreateCert.md +2 -0
  7. data/docs/AuthMethodUpdateCert.md +2 -0
  8. data/docs/AzureADAccessRules.md +2 -0
  9. data/docs/AzureTargetDetails.md +2 -0
  10. data/docs/CertAccessRules.md +2 -0
  11. data/docs/CertificateChainInfo.md +2 -0
  12. data/docs/Configure.md +2 -0
  13. data/docs/ConjurMigration.md +20 -0
  14. data/docs/ConjurPayload.md +24 -0
  15. data/docs/CreateAuthMethodCert.md +2 -0
  16. data/docs/CreateAzureTarget.md +2 -0
  17. data/docs/CreateUSC.md +10 -0
  18. data/docs/DSProducerDetails.md +2 -0
  19. data/docs/DefaultAuthMethodSettings.md +20 -0
  20. data/docs/GatewayCreateMigration.md +15 -1
  21. data/docs/GatewayUpdateMigration.md +14 -0
  22. data/docs/GetPKICertificateOutput.md +2 -0
  23. data/docs/GithubMetadata.md +28 -0
  24. data/docs/HTTPChallengeInfo.md +26 -0
  25. data/docs/IssuerOverviewInfo.md +22 -0
  26. data/docs/ItemGeneralInfo.md +2 -0
  27. data/docs/MigrationStatusReplyObj.md +2 -0
  28. data/docs/MigrationsConfigPart.md +2 -0
  29. data/docs/SecretInfo.md +2 -0
  30. data/docs/TargetCreateAzure.md +2 -0
  31. data/docs/TargetUpdateAzure.md +2 -0
  32. data/docs/UpdateAuthMethodCert.md +2 -0
  33. data/docs/UpdateAzureTarget.md +2 -0
  34. data/docs/V2Api.md +126 -0
  35. data/docs/ValidateCertificateChallenge.md +30 -0
  36. data/docs/ValidateCertificateChallengeOutput.md +24 -0
  37. data/docs/VaultAddress.md +20 -0
  38. data/docs/VaultAddressOutput.md +20 -0
  39. data/lib/akeyless/api/v2_api.rb +128 -0
  40. data/lib/akeyless/models/account_general_settings.rb +10 -1
  41. data/lib/akeyless/models/active_directory_payload.rb +30 -1
  42. data/lib/akeyless/models/auth.rb +13 -1
  43. data/lib/akeyless/models/auth_method_create_cert.rb +11 -1
  44. data/lib/akeyless/models/auth_method_update_cert.rb +11 -1
  45. data/lib/akeyless/models/azure_ad_access_rules.rb +11 -1
  46. data/lib/akeyless/models/azure_target_details.rb +10 -1
  47. data/lib/akeyless/models/cert_access_rules.rb +11 -1
  48. data/lib/akeyless/models/certificate_chain_info.rb +11 -1
  49. data/lib/akeyless/models/configure.rb +13 -1
  50. data/lib/akeyless/models/conjur_migration.rb +223 -0
  51. data/lib/akeyless/models/conjur_payload.rb +241 -0
  52. data/lib/akeyless/models/create_auth_method_cert.rb +11 -1
  53. data/lib/akeyless/models/create_azure_target.rb +13 -1
  54. data/lib/akeyless/models/create_usc.rb +54 -1
  55. data/lib/akeyless/models/default_auth_method_settings.rb +223 -0
  56. data/lib/akeyless/models/ds_producer_details.rb +10 -1
  57. data/lib/akeyless/models/gateway_create_migration.rb +74 -2
  58. data/lib/akeyless/models/gateway_update_migration.rb +73 -1
  59. data/lib/akeyless/models/get_pki_certificate_output.rb +10 -1
  60. data/lib/akeyless/models/github_metadata.rb +259 -0
  61. data/lib/akeyless/models/http_challenge_info.rb +251 -0
  62. data/lib/akeyless/models/issuer_overview_info.rb +232 -0
  63. data/lib/akeyless/models/item_general_info.rb +10 -1
  64. data/lib/akeyless/models/migration_status_reply_obj.rb +10 -1
  65. data/lib/akeyless/models/migrations_config_part.rb +12 -1
  66. data/lib/akeyless/models/secret_info.rb +10 -1
  67. data/lib/akeyless/models/target_create_azure.rb +13 -1
  68. data/lib/akeyless/models/target_update_azure.rb +13 -1
  69. data/lib/akeyless/models/update_auth_method_cert.rb +11 -1
  70. data/lib/akeyless/models/update_azure_target.rb +13 -1
  71. data/lib/akeyless/models/validate_certificate_challenge.rb +279 -0
  72. data/lib/akeyless/models/validate_certificate_challenge_output.rb +242 -0
  73. data/lib/akeyless/models/vault_address.rb +227 -0
  74. data/lib/akeyless/models/vault_address_output.rb +223 -0
  75. data/lib/akeyless/version.rb +1 -1
  76. data/lib/akeyless.rb +10 -0
  77. data/spec/models/conjur_migration_spec.rb +42 -0
  78. data/spec/models/conjur_payload_spec.rb +54 -0
  79. data/spec/models/default_auth_method_settings_spec.rb +42 -0
  80. data/spec/models/github_metadata_spec.rb +66 -0
  81. data/spec/models/http_challenge_info_spec.rb +60 -0
  82. data/spec/models/issuer_overview_info_spec.rb +48 -0
  83. data/spec/models/validate_certificate_challenge_output_spec.rb +54 -0
  84. data/spec/models/validate_certificate_challenge_spec.rb +72 -0
  85. data/spec/models/vault_address_output_spec.rb +42 -0
  86. data/spec/models/vault_address_spec.rb +42 -0
  87. metadata +41 -1
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: a50df1564b03a42b11e79749518c800879f473a0c5958f00b06c7116e238c7dc
4
- data.tar.gz: 5560fd32e296d44407df339867588d72880c934781af1a8a46dddc104491d118
3
+ metadata.gz: e46636c1d6bff155fd9a66320a4156d9e72ad18b96638976e12c761a2c70c258
4
+ data.tar.gz: e6f954813204f8e93a874b72d88c9725f1e51c46bb4691f28dd669324580b5e7
5
5
  SHA512:
6
- metadata.gz: f6d5f04cabdbadfc79b788eee87d8866093dd380efe0eac115a7e5408e7ca871efcc897e601e38554fc2c574f340f9fb5cfdb06b3c789c8df3bc3e18ceb63334
7
- data.tar.gz: a407649269edd3dc25c743d7489ffc7e5d3df0a64474635ef0aec93ec970cc3f7da9c5fb165276a3b0aa7a78a4d5b0f2ca1035fd7156faeef5ff81ebf864a653
6
+ metadata.gz: 00cf27d9e20ab8e2a3c35323ced26fff0dd74932948301bb56705e279e6e38b6c5e8884582d126d26aca9b7145aa73795fad766f731baa8f42e70cfc1493e200
7
+ data.tar.gz: '08be6c31019f3b0d626ba38fa3316cc9456dbb490bf623c59535abba8023adc844f495231e2af789d33ac4608b777021ea04586d136f824a6da969f6863089fc'
data/README.md CHANGED
@@ -7,7 +7,7 @@ The purpose of this application is to provide access to Akeyless API.
7
7
  This SDK is automatically generated by the [OpenAPI Generator](https://openapi-generator.tech) project:
8
8
 
9
9
  - API version: 3.0
10
- - Package version: 5.0.21
10
+ - Package version: 5.0.22
11
11
  - Generator version: 7.10.0
12
12
  - Build package: org.openapitools.codegen.languages.RubyClientCodegen
13
13
  For more information, please visit [http://akeyless.io](http://akeyless.io)
@@ -654,7 +654,9 @@ Class | Method | HTTP request | Description
654
654
  *Akeyless::V2Api* | [**usc_get**](docs/V2Api.md#usc_get) | **POST** /usc-get |
655
655
  *Akeyless::V2Api* | [**usc_list**](docs/V2Api.md#usc_list) | **POST** /usc-list |
656
656
  *Akeyless::V2Api* | [**usc_update**](docs/V2Api.md#usc_update) | **POST** /usc-update |
657
+ *Akeyless::V2Api* | [**validate_certificate_challenge**](docs/V2Api.md#validate_certificate_challenge) | **POST** /validate-certificate-challenge |
657
658
  *Akeyless::V2Api* | [**validate_token**](docs/V2Api.md#validate_token) | **POST** /validate-token |
659
+ *Akeyless::V2Api* | [**vault_address**](docs/V2Api.md#vault_address) | **POST** /vault-address |
658
660
  *Akeyless::V2Api* | [**verify_data_with_classic_key**](docs/V2Api.md#verify_data_with_classic_key) | **POST** /verify-data-with-classic-key |
659
661
  *Akeyless::V2Api* | [**verify_ec_dsa**](docs/V2Api.md#verify_ec_dsa) | **POST** /verify-ecdsa |
660
662
  *Akeyless::V2Api* | [**verify_gpg**](docs/V2Api.md#verify_gpg) | **POST** /verify-gpg |
@@ -791,6 +793,8 @@ Class | Method | HTTP request | Description
791
793
  - [Akeyless::ConfigHash](docs/ConfigHash.md)
792
794
  - [Akeyless::Configure](docs/Configure.md)
793
795
  - [Akeyless::ConfigureOutput](docs/ConfigureOutput.md)
796
+ - [Akeyless::ConjurMigration](docs/ConjurMigration.md)
797
+ - [Akeyless::ConjurPayload](docs/ConjurPayload.md)
794
798
  - [Akeyless::Connect](docs/Connect.md)
795
799
  - [Akeyless::CreateAWSTarget](docs/CreateAWSTarget.md)
796
800
  - [Akeyless::CreateAWSTargetOutput](docs/CreateAWSTargetOutput.md)
@@ -923,6 +927,7 @@ Class | Method | HTTP request | Description
923
927
  - [Akeyless::DecryptPKCS1Output](docs/DecryptPKCS1Output.md)
924
928
  - [Akeyless::DecryptWithClassicKey](docs/DecryptWithClassicKey.md)
925
929
  - [Akeyless::DecryptWithClassicKeyOutput](docs/DecryptWithClassicKeyOutput.md)
930
+ - [Akeyless::DefaultAuthMethodSettings](docs/DefaultAuthMethodSettings.md)
926
931
  - [Akeyless::DefaultConfigPart](docs/DefaultConfigPart.md)
927
932
  - [Akeyless::DefaultHomePage](docs/DefaultHomePage.md)
928
933
  - [Akeyless::DeleteAuthMethod](docs/DeleteAuthMethod.md)
@@ -1310,6 +1315,7 @@ Class | Method | HTTP request | Description
1310
1315
  - [Akeyless::GetTargetDetails](docs/GetTargetDetails.md)
1311
1316
  - [Akeyless::GetTargetDetailsOutput](docs/GetTargetDetailsOutput.md)
1312
1317
  - [Akeyless::GetUserEventStatusOutput](docs/GetUserEventStatusOutput.md)
1318
+ - [Akeyless::GithubMetadata](docs/GithubMetadata.md)
1313
1319
  - [Akeyless::GithubTargetDetails](docs/GithubTargetDetails.md)
1314
1320
  - [Akeyless::GitlabTargetDetails](docs/GitlabTargetDetails.md)
1315
1321
  - [Akeyless::GlobalSignAtlasTargetDetails](docs/GlobalSignAtlasTargetDetails.md)
@@ -1329,6 +1335,7 @@ Class | Method | HTTP request | Description
1329
1335
  - [Akeyless::GwUpdateRemoteAccessSessionLogsStdout](docs/GwUpdateRemoteAccessSessionLogsStdout.md)
1330
1336
  - [Akeyless::GwUpdateRemoteAccessSessionLogsSumologic](docs/GwUpdateRemoteAccessSessionLogsSumologic.md)
1331
1337
  - [Akeyless::GwUpdateRemoteAccessSessionLogsSyslog](docs/GwUpdateRemoteAccessSessionLogsSyslog.md)
1338
+ - [Akeyless::HTTPChallengeInfo](docs/HTTPChallengeInfo.md)
1332
1339
  - [Akeyless::HashiMigration](docs/HashiMigration.md)
1333
1340
  - [Akeyless::HashiPayload](docs/HashiPayload.md)
1334
1341
  - [Akeyless::HashiVaultTargetDetails](docs/HashiVaultTargetDetails.md)
@@ -1338,6 +1345,7 @@ Class | Method | HTTP request | Description
1338
1345
  - [Akeyless::ImportPasswords](docs/ImportPasswords.md)
1339
1346
  - [Akeyless::ImportPasswordsOutput](docs/ImportPasswordsOutput.md)
1340
1347
  - [Akeyless::ImporterInfo](docs/ImporterInfo.md)
1348
+ - [Akeyless::IssuerOverviewInfo](docs/IssuerOverviewInfo.md)
1341
1349
  - [Akeyless::Item](docs/Item.md)
1342
1350
  - [Akeyless::ItemCustomFieldsDetails](docs/ItemCustomFieldsDetails.md)
1343
1351
  - [Akeyless::ItemGeneralInfo](docs/ItemGeneralInfo.md)
@@ -1804,8 +1812,12 @@ Class | Method | HTTP request | Description
1804
1812
  - [Akeyless::UscSyncInfo](docs/UscSyncInfo.md)
1805
1813
  - [Akeyless::UscUpdate](docs/UscUpdate.md)
1806
1814
  - [Akeyless::UscUpdateSecretOutput](docs/UscUpdateSecretOutput.md)
1815
+ - [Akeyless::ValidateCertificateChallenge](docs/ValidateCertificateChallenge.md)
1816
+ - [Akeyless::ValidateCertificateChallengeOutput](docs/ValidateCertificateChallengeOutput.md)
1807
1817
  - [Akeyless::ValidateToken](docs/ValidateToken.md)
1808
1818
  - [Akeyless::ValidateTokenOutput](docs/ValidateTokenOutput.md)
1819
+ - [Akeyless::VaultAddress](docs/VaultAddress.md)
1820
+ - [Akeyless::VaultAddressOutput](docs/VaultAddressOutput.md)
1809
1821
  - [Akeyless::VaultlessTokenizerInfo](docs/VaultlessTokenizerInfo.md)
1810
1822
  - [Akeyless::VenafiTargetDetails](docs/VenafiTargetDetails.md)
1811
1823
  - [Akeyless::VerifyDataWithClassicKey](docs/VerifyDataWithClassicKey.md)
@@ -14,6 +14,7 @@
14
14
  | **auth_usage_event** | [**UsageEventSetting**](UsageEventSetting.md) | | [optional] |
15
15
  | **certificate_expiration_events** | [**CertificateExpirationEventsSettings**](CertificateExpirationEventsSettings.md) | | [optional] |
16
16
  | **data_protection_section** | [**DataProtectionSection**](DataProtectionSection.md) | | [optional] |
17
+ | **default_auth_method** | [**DefaultAuthMethodSettings**](DefaultAuthMethodSettings.md) | | [optional] |
17
18
  | **default_home_page** | [**DefaultHomePage**](DefaultHomePage.md) | | [optional] |
18
19
  | **dynamic_secret_max_ttl** | [**DynamicSecretMaxTtl**](DynamicSecretMaxTtl.md) | | [optional] |
19
20
  | **enable_request_for_access** | **Boolean** | | [optional] |
@@ -45,6 +46,7 @@ instance = Akeyless::AccountGeneralSettings.new(
45
46
  auth_usage_event: null,
46
47
  certificate_expiration_events: null,
47
48
  data_protection_section: null,
49
+ default_auth_method: null,
48
50
  default_home_page: null,
49
51
  dynamic_secret_max_ttl: null,
50
52
  enable_request_for_access: null,
@@ -5,9 +5,12 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **active_directory_target_id** | **Integer** | | [optional] |
8
+ | **ai_certificate_discovery** | **Boolean** | | [optional] |
8
9
  | **auto_rotate** | **Boolean** | | [optional] |
9
10
  | **auto_rotate_interval_in_days** | **Integer** | | [optional] |
10
11
  | **auto_rotate_rotation_hour** | **Integer** | | [optional] |
12
+ | **certificates_expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
13
+ | **certificates_path_template** | **String** | | [optional] |
11
14
  | **computer_base_dn** | **String** | | [optional] |
12
15
  | **discover_iis_apps** | **Boolean** | | [optional] |
13
16
  | **discover_local_users** | **Boolean** | Deprecated | [optional] |
@@ -35,9 +38,12 @@ require 'akeyless'
35
38
 
36
39
  instance = Akeyless::ActiveDirectoryPayload.new(
37
40
  active_directory_target_id: null,
41
+ ai_certificate_discovery: null,
38
42
  auto_rotate: null,
39
43
  auto_rotate_interval_in_days: null,
40
44
  auto_rotate_rotation_hour: null,
45
+ certificates_expiration_events: null,
46
+ certificates_path_template: null,
41
47
  computer_base_dn: null,
42
48
  discover_iis_apps: null,
43
49
  discover_local_users: null,
data/docs/Auth.md CHANGED
@@ -10,6 +10,7 @@
10
10
  | **account_id** | **String** | Account id (relevant only for access-type=password where the email address is associated with more than one account) | [optional] |
11
11
  | **admin_email** | **String** | Email (relevant only for access-type=password) | [optional] |
12
12
  | **admin_password** | **String** | Password (relevant only for access-type=password) | [optional] |
13
+ | **azure_cloud** | **String** | Azure cloud environment to use. Values: AzureCloud (default), AzureUSGovernment, AzureChinaCloud. | [optional][default to 'AzureCloud'] |
13
14
  | **cert_challenge** | **String** | Certificate challenge encoded in base64. (relevant only for access-type=cert) | [optional] |
14
15
  | **cert_data** | **String** | Certificate data encoded in base64. Used if file was not provided. (relevant only for access-type=cert) | [optional] |
15
16
  | **cloud_id** | **String** | The cloud identity (relevant only for access-type=azure_ad,aws_iam,gcp) | [optional] |
@@ -48,6 +49,7 @@ instance = Akeyless::Auth.new(
48
49
  account_id: null,
49
50
  admin_email: null,
50
51
  admin_password: null,
52
+ azure_cloud: null,
51
53
  cert_challenge: null,
52
54
  cert_data: null,
53
55
  cloud_id: null,
@@ -25,6 +25,7 @@
25
25
  | **jwt_ttl** | **Integer** | Jwt TTL | [optional][default to 0] |
26
26
  | **name** | **String** | Auth Method name | |
27
27
  | **product_type** | **Array<String>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional] |
28
+ | **require_crl_dp** | **Boolean** | Require certificate CRL distribution points (CDP) and enforce CRL validation during authentication. | [optional] |
28
29
  | **revoked_cert_ids** | **Array<String>** | A list of revoked cert ids | [optional] |
29
30
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
30
31
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
@@ -57,6 +58,7 @@ instance = Akeyless::AuthMethodCreateCert.new(
57
58
  jwt_ttl: null,
58
59
  name: null,
59
60
  product_type: null,
61
+ require_crl_dp: null,
60
62
  revoked_cert_ids: null,
61
63
  token: null,
62
64
  uid_token: null,
@@ -26,6 +26,7 @@
26
26
  | **name** | **String** | Auth Method name | |
27
27
  | **new_name** | **String** | Auth Method new name | [optional] |
28
28
  | **product_type** | **Array<String>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional] |
29
+ | **require_crl_dp** | **Boolean** | Require certificate CRL distribution points (CDP) and enforce CRL validation during authentication. | [optional] |
29
30
  | **revoked_cert_ids** | **Array<String>** | A list of revoked cert ids | [optional] |
30
31
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
31
32
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
@@ -59,6 +60,7 @@ instance = Akeyless::AuthMethodUpdateCert.new(
59
60
  name: null,
60
61
  new_name: null,
61
62
  product_type: null,
63
+ require_crl_dp: null,
62
64
  revoked_cert_ids: null,
63
65
  token: null,
64
66
  uid_token: null,
@@ -5,6 +5,7 @@
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **ad_endpoint** | **String** | The audience in the JWT. | [optional] |
8
+ | **azure_cloud** | **String** | Azure cloud environment [AzureCloud/AzureUSGovernment/AzureChinaCloud]. For create/update, cloud is inferred from jwks_uri. | [optional] |
8
9
  | **bound_group_ids** | **Array<String>** | The list of group ids that login is restricted to. | [optional] |
9
10
  | **bound_resource_groups** | **Array<String>** | The list of resource groups that login is restricted to. | [optional] |
10
11
  | **bound_resource_ids** | **Array<String>** | The list of full resource ids that the login is restricted to. | [optional] |
@@ -25,6 +26,7 @@ require 'akeyless'
25
26
 
26
27
  instance = Akeyless::AzureADAccessRules.new(
27
28
  ad_endpoint: null,
29
+ azure_cloud: null,
28
30
  bound_group_ids: null,
29
31
  bound_resource_groups: null,
30
32
  bound_resource_ids: null,
@@ -6,6 +6,7 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **azure_client_id** | **String** | | [optional] |
8
8
  | **azure_client_secret** | **String** | | [optional] |
9
+ | **azure_cloud** | **String** | | [optional] |
9
10
  | **azure_resource_group_name** | **String** | | [optional] |
10
11
  | **azure_resource_name** | **String** | | [optional] |
11
12
  | **azure_subscription_id** | **String** | | [optional] |
@@ -24,6 +25,7 @@ require 'akeyless'
24
25
  instance = Akeyless::AzureTargetDetails.new(
25
26
  azure_client_id: null,
26
27
  azure_client_secret: null,
28
+ azure_cloud: null,
27
29
  azure_resource_group_name: null,
28
30
  azure_resource_name: null,
29
31
  azure_subscription_id: null,
@@ -12,6 +12,7 @@
12
12
  | **bound_organizational_units** | **Array<String>** | A list of Organizational Units names. At least one must exist in the OU field. | [optional] |
13
13
  | **bound_uri_sans** | **Array<String>** | A list of URIs. At least one must exist in the SANs. Supports globbing. | [optional] |
14
14
  | **certificate** | **String** | Base64 encdoed PEM certificate | [optional] |
15
+ | **require_crl_dp** | **Boolean** | RequireCrlDp indicates whether CRL distribution points are required on the leaf client certificate, and whether CRL validation must be enforced during authentication. | [optional] |
15
16
  | **revoked_cert_ids** | **Array<String>** | A list of revoked cert ids | [optional] |
16
17
  | **unique_identifier** | **String** | A unique identifier to distinguish different users | [optional] |
17
18
 
@@ -29,6 +30,7 @@ instance = Akeyless::CertAccessRules.new(
29
30
  bound_organizational_units: null,
30
31
  bound_uri_sans: null,
31
32
  certificate: null,
33
+ require_crl_dp: null,
32
34
  revoked_cert_ids: null,
33
35
  unique_identifier: null
34
36
  )
@@ -15,6 +15,7 @@
15
15
  | **certificate_pem** | **String** | | [optional] |
16
16
  | **certificate_status** | **String** | | [optional] |
17
17
  | **common_name** | **String** | | [optional] |
18
+ | **csr_pem** | **String** | CSRPEM contains the PEM-encoded CSR for pending certificates (HTTP-01 challenge) | [optional] |
18
19
  | **error_message** | **String** | | [optional] |
19
20
  | **expiration_date** | **Time** | | [optional] |
20
21
  | **expiration_events** | [**Array<CertificateExpirationEvent>**](CertificateExpirationEvent.md) | | [optional] |
@@ -40,6 +41,7 @@ instance = Akeyless::CertificateChainInfo.new(
40
41
  certificate_pem: null,
41
42
  certificate_status: null,
42
43
  common_name: null,
44
+ csr_pem: null,
43
45
  error_message: null,
44
46
  expiration_date: null,
45
47
  expiration_events: null,
data/docs/Configure.md CHANGED
@@ -11,6 +11,7 @@
11
11
  | **admin_email** | **String** | Email (relevant only for access-type=password) | [optional] |
12
12
  | **admin_password** | **String** | Password (relevant only for access-type=password) | [optional] |
13
13
  | **azure_ad_object_id** | **String** | Azure Active Directory ObjectId (relevant only for access-type=azure_ad) | [optional] |
14
+ | **azure_cloud** | **String** | Azure cloud environment to use. Values: AzureCloud (default), AzureUSGovernment, AzureChinaCloud. | [optional][default to 'AzureCloud'] |
14
15
  | **cert_data** | **String** | Certificate data encoded in base64. Used if file was not provided. (relevant only for access-type=cert in Curl Context) | [optional] |
15
16
  | **cert_issuer_name** | **String** | Certificate Issuer Name | [optional] |
16
17
  | **cert_username** | **String** | The username to sign in the SSH certificate (use a comma-separated list for more than one username) | [optional] |
@@ -42,6 +43,7 @@ instance = Akeyless::Configure.new(
42
43
  admin_email: null,
43
44
  admin_password: null,
44
45
  azure_ad_object_id: null,
46
+ azure_cloud: null,
45
47
  cert_data: null,
46
48
  cert_issuer_name: null,
47
49
  cert_username: null,
@@ -0,0 +1,20 @@
1
+ # Akeyless::ConjurMigration
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **general** | [**MigrationGeneral**](MigrationGeneral.md) | | [optional] |
8
+ | **payload** | [**ConjurPayload**](ConjurPayload.md) | | [optional] |
9
+
10
+ ## Example
11
+
12
+ ```ruby
13
+ require 'akeyless'
14
+
15
+ instance = Akeyless::ConjurMigration.new(
16
+ general: null,
17
+ payload: null
18
+ )
19
+ ```
20
+
@@ -0,0 +1,24 @@
1
+ # Akeyless::ConjurPayload
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **conjur_account** | **String** | | [optional] |
8
+ | **conjur_api_key** | **String** | | [optional] |
9
+ | **conjur_url** | **String** | | [optional] |
10
+ | **conjur_username** | **String** | | [optional] |
11
+
12
+ ## Example
13
+
14
+ ```ruby
15
+ require 'akeyless'
16
+
17
+ instance = Akeyless::ConjurPayload.new(
18
+ conjur_account: null,
19
+ conjur_api_key: null,
20
+ conjur_url: null,
21
+ conjur_username: null
22
+ )
23
+ ```
24
+
@@ -25,6 +25,7 @@
25
25
  | **jwt_ttl** | **Integer** | Jwt TTL | [optional][default to 0] |
26
26
  | **name** | **String** | Auth Method name | |
27
27
  | **product_type** | **Array<String>** | Choose the relevant product type for the auth method [sm, sra, pm, dp, ca] | [optional] |
28
+ | **require_crl_dp** | **Boolean** | Require certificate CRL distribution points (CDP) and enforce CRL validation during authentication. | [optional] |
28
29
  | **revoked_cert_ids** | **Array<String>** | A list of revoked cert ids | [optional] |
29
30
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
30
31
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
@@ -57,6 +58,7 @@ instance = Akeyless::CreateAuthMethodCert.new(
57
58
  jwt_ttl: null,
58
59
  name: null,
59
60
  product_type: null,
61
+ require_crl_dp: null,
60
62
  revoked_cert_ids: null,
61
63
  token: null,
62
64
  uid_token: null,
@@ -4,6 +4,7 @@
4
4
 
5
5
  | Name | Type | Description | Notes |
6
6
  | ---- | ---- | ----------- | ----- |
7
+ | **azure_cloud** | **String** | Azure cloud environment to use. Values: AzureCloud (default), AzureUSGovernment, AzureChinaCloud. | [optional][default to 'AzureCloud'] |
7
8
  | **client_id** | **String** | Azure client/application id | [optional] |
8
9
  | **client_secret** | **String** | Azure client secret | [optional] |
9
10
  | **comment** | **String** | Deprecated - use description | [optional] |
@@ -27,6 +28,7 @@
27
28
  require 'akeyless'
28
29
 
29
30
  instance = Akeyless::CreateAzureTarget.new(
31
+ azure_cloud: null,
30
32
  client_id: null,
31
33
  client_secret: null,
32
34
  comment: null,
data/docs/CreateUSC.md CHANGED
@@ -7,12 +7,17 @@
7
7
  | **azure_kv_name** | **String** | Azure Key Vault name (Relevant only for Azure targets) | [optional] |
8
8
  | **delete_protection** | **String** | Protection from accidental deletion of this object [true/false] | [optional] |
9
9
  | **description** | **String** | Description of the Universal Secrets Connector | [optional] |
10
+ | **environment_names** | **String** | The environments in repo-name/environment-name format, comma-separated (only relevant for: github-scope=repository-environment) | [optional] |
10
11
  | **gcp_project_id** | **String** | GCP Project ID (Relevant only for GCP targets) | [optional] |
11
12
  | **gcp_sm_regions** | **String** | GCP Secret Manager regions to query for regional secrets (comma-separated, e.g., us-east1,us-west1). Max 12 regions. Required when listing with object-type=regional-secrets. | [optional] |
13
+ | **github_scope** | **String** | The scope where secrets will be created, available options: [repository, organization, repository-environment] | [optional][default to 'repository'] |
12
14
  | **item_custom_fields** | **Hash<String, String>** | Additional custom fields to associate with the item | [optional] |
13
15
  | **json** | **Boolean** | Set output format to JSON | [optional][default to false] |
14
16
  | **k8s_namespace** | **String** | K8s namespace (Relevant to Kubernetes targets) | [optional] |
15
17
  | **name** | **String** | Universal Secrets Connector name | |
18
+ | **organization_name** | **String** | The organization name to create the secret in (only relevant for: github-scope=organization) | [optional] |
19
+ | **repository_access** | **String** | | [optional][default to 'public'] |
20
+ | **repository_names** | **String** | The repository names, comma-separated (only relevant for: github-scope=repository) | [optional] |
16
21
  | **tags** | **Array<String>** | List of the tags attached to this Universal Secrets Connector | [optional] |
17
22
  | **target_to_associate** | **String** | Target Universal Secrets Connector to connect | |
18
23
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
@@ -29,12 +34,17 @@ instance = Akeyless::CreateUSC.new(
29
34
  azure_kv_name: null,
30
35
  delete_protection: null,
31
36
  description: null,
37
+ environment_names: null,
32
38
  gcp_project_id: null,
33
39
  gcp_sm_regions: null,
40
+ github_scope: null,
34
41
  item_custom_fields: null,
35
42
  json: null,
36
43
  k8s_namespace: null,
37
44
  name: null,
45
+ organization_name: null,
46
+ repository_access: null,
47
+ repository_names: null,
38
48
  tags: null,
39
49
  target_to_associate: null,
40
50
  token: null,
@@ -36,6 +36,7 @@
36
36
  | **azure_app_object_id** | **String** | | [optional] |
37
37
  | **azure_client_id** | **String** | | [optional] |
38
38
  | **azure_client_secret** | **String** | | [optional] |
39
+ | **azure_cloud** | **String** | | [optional] |
39
40
  | **azure_fixed_user_name_sub_claim_key** | **String** | | [optional] |
40
41
  | **azure_fixed_user_only** | **Boolean** | | [optional] |
41
42
  | **azure_resource_group_name** | **String** | | [optional] |
@@ -307,6 +308,7 @@ instance = Akeyless::DSProducerDetails.new(
307
308
  azure_app_object_id: null,
308
309
  azure_client_id: null,
309
310
  azure_client_secret: null,
311
+ azure_cloud: null,
310
312
  azure_fixed_user_name_sub_claim_key: null,
311
313
  azure_fixed_user_only: null,
312
314
  azure_resource_group_name: null,
@@ -0,0 +1,20 @@
1
+ # Akeyless::DefaultAuthMethodSettings
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **default_access_id** | **String** | | [optional] |
8
+ | **default_auth_method_type** | **String** | | [optional] |
9
+
10
+ ## Example
11
+
12
+ ```ruby
13
+ require 'akeyless'
14
+
15
+ instance = Akeyless::DefaultAuthMethodSettings.new(
16
+ default_access_id: null,
17
+ default_auth_method_type: null
18
+ )
19
+ ```
20
+
@@ -6,6 +6,8 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **service_account_key_decoded** | **String** | | [optional] |
8
8
  | **ad_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration) | [optional] |
9
+ | **ad_cert_expiration_event_in** | **Array<String>** | How many days before the expiration of discovered certificates would you like to be notified (Relevant only for Active Directory migration with certificate discovery enabled) | [optional] |
10
+ | **ad_certificates_path_template** | **String** | Path location template for migrating certificates e.g.: /Certificates/{{COMMON_NAME}} (Relevant only for Active Directory migration with certificate discovery enabled) | [optional] |
9
11
  | **ad_computer_base_dn** | **String** | Distinguished Name of Computer objects (servers) to search in Active Directory e.g.: CN=Computers,DC=example,DC=com (Relevant only for Active Directory migration) | [optional] |
10
12
  | **ad_discover_iis_app** | **String** | Enable/Disable discovery of IIS application from each domain server as part of the SSH/Windows Rotated Secrets. Default is false. (Relevant only for Active Directory migration) | [optional][default to 'false'] |
11
13
  | **ad_discover_services** | **String** | Enable/Disable discovery of Windows services from each domain server as part of the SSH/Windows Rotated Secrets. Default is false. (Relevant only for Active Directory migration) | [optional][default to 'false'] |
@@ -28,6 +30,7 @@
28
30
  | **ad_winrm_over_http** | **String** | Use WinRM over HTTP, by default runs over HTTPS | [optional][default to 'false'] |
29
31
  | **ad_winrm_port** | **String** | Set the WinRM Port for further connection to the domain servers. Default is 5986 (Relevant only for Active Directory migration) | [optional][default to '5986'] |
30
32
  | **ad_discover_local_users** | **String** | Enable/Disable discovery of local users from each domain server and migrate them as SSH/Windows Rotated Secrets. Default is false: only domain users will be migrated. Discovery of local users might require further installation of SSH on the servers, based on the supplied computer base DN. This will be implemented automatically as part of the migration process (Relevant only for Active Directory migration) Deprecated: use AdDiscoverTypes | [optional] |
33
+ | **ai_certificate_discovery** | **String** | Enable AI-assisted certificate discovery (only when AI Insight is enabled on the Gateway) | [optional] |
31
34
  | **aws_key** | **String** | AWS Secret Access Key (relevant only for AWS migration) | [optional] |
32
35
  | **aws_key_id** | **String** | AWS Access Key ID with sufficient permissions to get all secrets, e.g. 'arn:aws:secretsmanager:[Region]:[AccountId]:secret:[/path/to/secrets/*]' (relevant only for AWS migration) | [optional] |
33
36
  | **aws_region** | **String** | AWS region of the required Secrets Manager (relevant only for AWS migration) | [optional][default to 'us-east-2'] |
@@ -35,6 +38,10 @@
35
38
  | **azure_kv_name** | **String** | Azure Key Vault Name (relevant only for Azure Key Vault migration) | [optional] |
36
39
  | **azure_secret** | **String** | Azure Key Vault secret (relevant only for Azure Key Vault migration) | [optional] |
37
40
  | **azure_tenant_id** | **String** | Azure Key Vault Access tenant ID (relevant only for Azure Key Vault migration) | [optional] |
41
+ | **conjur_account** | **String** | Conjur account name set on your Conjur server (relevant only for Conjur migration). | [optional] |
42
+ | **conjur_api_key** | **String** | Conjur API Key for the specified user (relevant only for Conjur migration). | [optional] |
43
+ | **conjur_url** | **String** | Conjur server base URL (relevant only for Conjur migration). If conjur-url is HTTPS and Conjur uses a private CA/self-signed certificate, make the CA bundle available on the Gateway and set CONJUR_SSL_CERT_PATH to its path. | [optional] |
44
+ | **conjur_username** | **String** | Conjur username used to authenticate (relevant only for Conjur migration). | [optional] |
38
45
  | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
39
46
  | **gcp_key** | **String** | Base64-encoded GCP Service Account private key text with sufficient permissions to Secrets Manager, Minimum required permission is Secret Manager Secret Accessor, e.g. 'roles/secretmanager.secretAccessor' (relevant only for GCP migration) | [optional] |
40
47
  | **gcp_project_id** | **String** | GCP Project ID (cross-project override) | [optional] |
@@ -66,7 +73,7 @@
66
73
  | **si_users_path_template** | **String** | Path location template for migrating users as Rotated Secrets e.g.: .../Users/{{COMPUTER_NAME}}/{{USERNAME}} (Relevant only for Server Inventory migration) | |
67
74
  | **target_location** | **String** | Target location in Akeyless for imported secrets | |
68
75
  | **token** | **String** | Authentication token (see `/auth` and `/configure`) | [optional] |
69
- | **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/active_directory/server_inventory/certificate) | [optional] |
76
+ | **type** | **String** | Migration type (hashi/aws/gcp/k8s/azure_kv/conjur/active_directory/server_inventory/certificate) | [optional] |
70
77
  | **uid_token** | **String** | The universal identity token, Required only for universal_identity authentication | [optional] |
71
78
  | **use_gw_cloud_identity** | **Boolean** | Use the GW's Cloud IAM | [optional] |
72
79
 
@@ -78,6 +85,8 @@ require 'akeyless'
78
85
  instance = Akeyless::GatewayCreateMigration.new(
79
86
  service_account_key_decoded: null,
80
87
  ad_auto_rotate: null,
88
+ ad_cert_expiration_event_in: null,
89
+ ad_certificates_path_template: null,
81
90
  ad_computer_base_dn: null,
82
91
  ad_discover_iis_app: null,
83
92
  ad_discover_services: null,
@@ -100,6 +109,7 @@ instance = Akeyless::GatewayCreateMigration.new(
100
109
  ad_winrm_over_http: null,
101
110
  ad_winrm_port: null,
102
111
  ad_discover_local_users: null,
112
+ ai_certificate_discovery: null,
103
113
  aws_key: null,
104
114
  aws_key_id: null,
105
115
  aws_region: null,
@@ -107,6 +117,10 @@ instance = Akeyless::GatewayCreateMigration.new(
107
117
  azure_kv_name: null,
108
118
  azure_secret: null,
109
119
  azure_tenant_id: null,
120
+ conjur_account: null,
121
+ conjur_api_key: null,
122
+ conjur_url: null,
123
+ conjur_username: null,
110
124
  expiration_event_in: null,
111
125
  gcp_key: null,
112
126
  gcp_project_id: null,
@@ -6,6 +6,8 @@
6
6
  | ---- | ---- | ----------- | ----- |
7
7
  | **service_account_key_decoded** | **String** | | [optional] |
8
8
  | **ad_auto_rotate** | **String** | Enable/Disable automatic/recurrent rotation for migrated secrets. Default is false: only manual rotation is allowed for migrated secrets. If set to true, this command should be combined with --ad-rotation-interval and --ad-rotation-hour parameters (Relevant only for Active Directory migration) | [optional] |
9
+ | **ad_cert_expiration_event_in** | **Array<String>** | How many days before the expiration of discovered certificates would you like to be notified (Relevant only for Active Directory migration with certificate discovery enabled) | [optional] |
10
+ | **ad_certificates_path_template** | **String** | Path location template for migrating certificates e.g.: /Certificates/{{COMMON_NAME}} (Relevant only for Active Directory migration with certificate discovery enabled) | [optional] |
9
11
  | **ad_computer_base_dn** | **String** | Distinguished Name of Computer objects (servers) to search in Active Directory e.g.: CN=Computers,DC=example,DC=com (Relevant only for Active Directory migration) | [optional] |
10
12
  | **ad_discover_iis_app** | **String** | Enable/Disable discovery of IIS application from each domain server as part of the SSH/Windows Rotated Secrets. Default is false. (Relevant only for Active Directory migration) | [optional][default to 'false'] |
11
13
  | **ad_discover_services** | **String** | Enable/Disable discovery of Windows services from each domain server as part of the SSH/Windows Rotated Secrets. Default is false. (Relevant only for Active Directory migration) | [optional][default to 'false'] |
@@ -28,6 +30,7 @@
28
30
  | **ad_winrm_over_http** | **String** | Use WinRM over HTTP, by default runs over HTTPS | [optional][default to 'false'] |
29
31
  | **ad_winrm_port** | **String** | Set the WinRM Port for further connection to the domain servers. Default is 5986 (Relevant only for Active Directory migration) | [optional][default to '5986'] |
30
32
  | **ad_discover_local_users** | **String** | Enable/Disable discovery of local users from each domain server and migrate them as SSH/Windows Rotated Secrets. Default is false: only domain users will be migrated. Discovery of local users might require further installation of SSH on the servers, based on the supplied computer base DN. This will be implemented automatically as part of the migration process (Relevant only for Active Directory migration) Deprecated: use AdDiscoverTypes | [optional] |
33
+ | **ai_certificate_discovery** | **String** | Enable AI-assisted certificate discovery (only when AI Insight is enabled on the Gateway) | [optional] |
31
34
  | **aws_key** | **String** | AWS Secret Access Key (relevant only for AWS migration) | [optional] |
32
35
  | **aws_key_id** | **String** | AWS Access Key ID with sufficient permissions to get all secrets, e.g. 'arn:aws:secretsmanager:[Region]:[AccountId]:secret:[/path/to/secrets/*]' (relevant only for AWS migration) | [optional] |
33
36
  | **aws_region** | **String** | AWS region of the required Secrets Manager (relevant only for AWS migration) | [optional][default to 'us-east-2'] |
@@ -35,6 +38,10 @@
35
38
  | **azure_kv_name** | **String** | Azure Key Vault Name (relevant only for Azure Key Vault migration) | [optional] |
36
39
  | **azure_secret** | **String** | Azure Key Vault secret (relevant only for Azure Key Vault migration) | [optional] |
37
40
  | **azure_tenant_id** | **String** | Azure Key Vault Access tenant ID (relevant only for Azure Key Vault migration) | [optional] |
41
+ | **conjur_account** | **String** | Conjur account name set on your Conjur server (relevant only for Conjur migration). | [optional] |
42
+ | **conjur_api_key** | **String** | Conjur API Key for the specified user (relevant only for Conjur migration). | [optional] |
43
+ | **conjur_url** | **String** | Conjur server base URL (relevant only for Conjur migration). If conjur-url is HTTPS and Conjur uses a private CA/self-signed certificate, make the CA bundle available on the Gateway and set CONJUR_SSL_CERT_PATH to its path. | [optional] |
44
+ | **conjur_username** | **String** | Conjur username used to authenticate (relevant only for Conjur migration). | [optional] |
38
45
  | **expiration_event_in** | **Array<String>** | How many days before the expiration of the certificate would you like to be notified. | [optional] |
39
46
  | **gcp_key** | **String** | Base64-encoded GCP Service Account private key text with sufficient permissions to Secrets Manager, Minimum required permission is Secret Manager Secret Accessor, e.g. 'roles/secretmanager.secretAccessor' (relevant only for GCP migration) | [optional] |
40
47
  | **gcp_project_id** | **String** | GCP Project ID (cross-project override) | [optional] |
@@ -79,6 +86,8 @@ require 'akeyless'
79
86
  instance = Akeyless::GatewayUpdateMigration.new(
80
87
  service_account_key_decoded: null,
81
88
  ad_auto_rotate: null,
89
+ ad_cert_expiration_event_in: null,
90
+ ad_certificates_path_template: null,
82
91
  ad_computer_base_dn: null,
83
92
  ad_discover_iis_app: null,
84
93
  ad_discover_services: null,
@@ -101,6 +110,7 @@ instance = Akeyless::GatewayUpdateMigration.new(
101
110
  ad_winrm_over_http: null,
102
111
  ad_winrm_port: null,
103
112
  ad_discover_local_users: null,
113
+ ai_certificate_discovery: null,
104
114
  aws_key: null,
105
115
  aws_key_id: null,
106
116
  aws_region: null,
@@ -108,6 +118,10 @@ instance = Akeyless::GatewayUpdateMigration.new(
108
118
  azure_kv_name: null,
109
119
  azure_secret: null,
110
120
  azure_tenant_id: null,
121
+ conjur_account: null,
122
+ conjur_api_key: null,
123
+ conjur_url: null,
124
+ conjur_username: null,
111
125
  expiration_event_in: null,
112
126
  gcp_key: null,
113
127
  gcp_project_id: null,
@@ -7,6 +7,7 @@
7
7
  | **cert_display_id** | **String** | | [optional] |
8
8
  | **cert_item_id** | **Integer** | | [optional] |
9
9
  | **data** | **String** | | [optional] |
10
+ | **http_challenge_info** | [**HTTPChallengeInfo**](HTTPChallengeInfo.md) | | [optional] |
10
11
  | **parent_cert** | **String** | | [optional] |
11
12
  | **path** | **String** | | [optional] |
12
13
  | **reading_token** | **String** | | [optional] |
@@ -20,6 +21,7 @@ instance = Akeyless::GetPKICertificateOutput.new(
20
21
  cert_display_id: null,
21
22
  cert_item_id: null,
22
23
  data: null,
24
+ http_challenge_info: null,
23
25
  parent_cert: null,
24
26
  path: null,
25
27
  reading_token: null
@@ -0,0 +1,28 @@
1
+ # Akeyless::GithubMetadata
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **environment_name** | **String** | | [optional] |
8
+ | **organization_name** | **String** | | [optional] |
9
+ | **repository** | **String** | | [optional] |
10
+ | **repository_access** | **String** | | [optional] |
11
+ | **scope** | **String** | | [optional] |
12
+ | **selected_repositories** | **String** | | [optional] |
13
+
14
+ ## Example
15
+
16
+ ```ruby
17
+ require 'akeyless'
18
+
19
+ instance = Akeyless::GithubMetadata.new(
20
+ environment_name: null,
21
+ organization_name: null,
22
+ repository: null,
23
+ repository_access: null,
24
+ scope: null,
25
+ selected_repositories: null
26
+ )
27
+ ```
28
+
@@ -0,0 +1,26 @@
1
+ # Akeyless::HTTPChallengeInfo
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **file_content** | **String** | | [optional] |
8
+ | **file_path** | **String** | | [optional] |
9
+ | **instructions** | **String** | | [optional] |
10
+ | **key_auth** | **String** | | [optional] |
11
+ | **token** | **String** | | [optional] |
12
+
13
+ ## Example
14
+
15
+ ```ruby
16
+ require 'akeyless'
17
+
18
+ instance = Akeyless::HTTPChallengeInfo.new(
19
+ file_content: null,
20
+ file_path: null,
21
+ instructions: null,
22
+ key_auth: null,
23
+ token: null
24
+ )
25
+ ```
26
+
@@ -0,0 +1,22 @@
1
+ # Akeyless::IssuerOverviewInfo
2
+
3
+ ## Properties
4
+
5
+ | Name | Type | Description | Notes |
6
+ | ---- | ---- | ----------- | ----- |
7
+ | **certificate_authority_mode** | **String** | | [optional] |
8
+ | **expiration_date** | **Time** | | [optional] |
9
+ | **key_type** | **String** | | [optional] |
10
+
11
+ ## Example
12
+
13
+ ```ruby
14
+ require 'akeyless'
15
+
16
+ instance = Akeyless::IssuerOverviewInfo.new(
17
+ certificate_authority_mode: null,
18
+ expiration_date: null,
19
+ key_type: null
20
+ )
21
+ ```
22
+