@pulumi/auth0 3.32.0-alpha.1762406290 → 3.32.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/attackProtection.d.ts +108 -0
- package/attackProtection.js +88 -0
- package/attackProtection.js.map +1 -1
- package/client.d.ts +12 -0
- package/client.js +2 -0
- package/client.js.map +1 -1
- package/connectionScimToken.d.ts +139 -0
- package/connectionScimToken.js +117 -0
- package/connectionScimToken.js.map +1 -0
- package/emailProvider.d.ts +1 -1
- package/emailProvider.js +1 -1
- package/getAttackProtection.d.ts +8 -0
- package/getAttackProtection.js.map +1 -1
- package/getClient.d.ts +4 -0
- package/getClient.js.map +1 -1
- package/index.d.ts +3 -0
- package/index.js +8 -3
- package/index.js.map +1 -1
- package/package.json +2 -2
- package/phoneProvider.d.ts +1 -1
- package/phoneProvider.js +1 -1
- package/types/input.d.ts +128 -0
- package/types/output.d.ts +262 -2
package/types/output.d.ts
CHANGED
|
@@ -29,6 +29,32 @@ export interface ActionSupportedTriggers {
|
|
|
29
29
|
*/
|
|
30
30
|
version: string;
|
|
31
31
|
}
|
|
32
|
+
export interface AttackProtectionBotDetection {
|
|
33
|
+
/**
|
|
34
|
+
* List of IP addresses or ranges that will not trigger bot detection.
|
|
35
|
+
*/
|
|
36
|
+
allowlists: string[];
|
|
37
|
+
/**
|
|
38
|
+
* Bot detection level. Possible values: `low`, `medium`, `high`. Set to empty string to disable.
|
|
39
|
+
*/
|
|
40
|
+
botDetectionLevel: string;
|
|
41
|
+
/**
|
|
42
|
+
* Challenge policy for password flow. Possible values: `never`, `whenRisky`, `always`.
|
|
43
|
+
*/
|
|
44
|
+
challengePasswordPolicy: string;
|
|
45
|
+
/**
|
|
46
|
+
* Challenge policy for password reset flow. Possible values: `never`, `whenRisky`, `always`.
|
|
47
|
+
*/
|
|
48
|
+
challengePasswordResetPolicy: string;
|
|
49
|
+
/**
|
|
50
|
+
* Challenge policy for passwordless flow. Possible values: `never`, `whenRisky`, `always`.
|
|
51
|
+
*/
|
|
52
|
+
challengePasswordlessPolicy: string;
|
|
53
|
+
/**
|
|
54
|
+
* Whether monitoring mode is enabled for bot detection.
|
|
55
|
+
*/
|
|
56
|
+
monitoringModeEnabled: boolean;
|
|
57
|
+
}
|
|
32
58
|
export interface AttackProtectionBreachedPasswordDetection {
|
|
33
59
|
/**
|
|
34
60
|
* When `adminNotification` is enabled within the `shields` property, determines how often email notifications are sent. Possible values: `immediately`, `daily`, `weekly`, `monthly`.
|
|
@@ -89,6 +115,108 @@ export interface AttackProtectionBruteForceProtection {
|
|
|
89
115
|
*/
|
|
90
116
|
shields: string[];
|
|
91
117
|
}
|
|
118
|
+
export interface AttackProtectionCaptcha {
|
|
119
|
+
/**
|
|
120
|
+
* Active CAPTCHA provider ID. Set to empty string to disable CAPTCHA. Possible values: `recaptchaV2`, `recaptchaEnterprise`, `hcaptcha`, `friendlyCaptcha`, `arkose`, `authChallenge`, `simpleCaptcha`.
|
|
121
|
+
*/
|
|
122
|
+
activeProviderId: string;
|
|
123
|
+
/**
|
|
124
|
+
* Configuration for Arkose Labs.
|
|
125
|
+
*/
|
|
126
|
+
arkose: outputs.AttackProtectionCaptchaArkose;
|
|
127
|
+
/**
|
|
128
|
+
* Configuration for Auth0's Auth Challenge.
|
|
129
|
+
*/
|
|
130
|
+
authChallenge: outputs.AttackProtectionCaptchaAuthChallenge;
|
|
131
|
+
/**
|
|
132
|
+
* Configuration for Friendly Captcha.
|
|
133
|
+
*/
|
|
134
|
+
friendlyCaptcha: outputs.AttackProtectionCaptchaFriendlyCaptcha;
|
|
135
|
+
/**
|
|
136
|
+
* Configuration for hCaptcha.
|
|
137
|
+
*/
|
|
138
|
+
hcaptcha: outputs.AttackProtectionCaptchaHcaptcha;
|
|
139
|
+
/**
|
|
140
|
+
* Configuration for Google reCAPTCHA Enterprise.
|
|
141
|
+
*/
|
|
142
|
+
recaptchaEnterprise: outputs.AttackProtectionCaptchaRecaptchaEnterprise;
|
|
143
|
+
/**
|
|
144
|
+
* Configuration for Google reCAPTCHA v2.
|
|
145
|
+
*/
|
|
146
|
+
recaptchaV2: outputs.AttackProtectionCaptchaRecaptchaV2;
|
|
147
|
+
}
|
|
148
|
+
export interface AttackProtectionCaptchaArkose {
|
|
149
|
+
/**
|
|
150
|
+
* Client subdomain for Arkose Labs.
|
|
151
|
+
*/
|
|
152
|
+
clientSubdomain: string;
|
|
153
|
+
/**
|
|
154
|
+
* Whether the captcha should fail open.
|
|
155
|
+
*/
|
|
156
|
+
failOpen: boolean;
|
|
157
|
+
/**
|
|
158
|
+
* Secret for Arkose Labs.
|
|
159
|
+
*/
|
|
160
|
+
secret: string;
|
|
161
|
+
/**
|
|
162
|
+
* Site key for Arkose Labs.
|
|
163
|
+
*/
|
|
164
|
+
siteKey: string;
|
|
165
|
+
/**
|
|
166
|
+
* Verify subdomain for Arkose Labs.
|
|
167
|
+
*/
|
|
168
|
+
verifySubdomain: string;
|
|
169
|
+
}
|
|
170
|
+
export interface AttackProtectionCaptchaAuthChallenge {
|
|
171
|
+
/**
|
|
172
|
+
* Whether the auth challenge should fail open.
|
|
173
|
+
*/
|
|
174
|
+
failOpen: boolean;
|
|
175
|
+
}
|
|
176
|
+
export interface AttackProtectionCaptchaFriendlyCaptcha {
|
|
177
|
+
/**
|
|
178
|
+
* Secret for Friendly Captcha.
|
|
179
|
+
*/
|
|
180
|
+
secret: string;
|
|
181
|
+
/**
|
|
182
|
+
* Site key for Friendly Captcha.
|
|
183
|
+
*/
|
|
184
|
+
siteKey: string;
|
|
185
|
+
}
|
|
186
|
+
export interface AttackProtectionCaptchaHcaptcha {
|
|
187
|
+
/**
|
|
188
|
+
* Secret for hCaptcha.
|
|
189
|
+
*/
|
|
190
|
+
secret: string;
|
|
191
|
+
/**
|
|
192
|
+
* Site key for hCaptcha.
|
|
193
|
+
*/
|
|
194
|
+
siteKey: string;
|
|
195
|
+
}
|
|
196
|
+
export interface AttackProtectionCaptchaRecaptchaEnterprise {
|
|
197
|
+
/**
|
|
198
|
+
* API key for reCAPTCHA Enterprise.
|
|
199
|
+
*/
|
|
200
|
+
apiKey: string;
|
|
201
|
+
/**
|
|
202
|
+
* Project ID for reCAPTCHA Enterprise.
|
|
203
|
+
*/
|
|
204
|
+
projectId: string;
|
|
205
|
+
/**
|
|
206
|
+
* Site key for reCAPTCHA Enterprise.
|
|
207
|
+
*/
|
|
208
|
+
siteKey: string;
|
|
209
|
+
}
|
|
210
|
+
export interface AttackProtectionCaptchaRecaptchaV2 {
|
|
211
|
+
/**
|
|
212
|
+
* Secret for reCAPTCHA v2.
|
|
213
|
+
*/
|
|
214
|
+
secret: string;
|
|
215
|
+
/**
|
|
216
|
+
* Site key for reCAPTCHA v2.
|
|
217
|
+
*/
|
|
218
|
+
siteKey: string;
|
|
219
|
+
}
|
|
92
220
|
export interface AttackProtectionSuspiciousIpThrottling {
|
|
93
221
|
/**
|
|
94
222
|
* List of trusted IP addresses that will not have attack protection enforced against them. This field allows you to specify multiple IP addresses, or ranges. You can use IPv4 or IPv6 addresses and CIDR notation.
|
|
@@ -2308,6 +2436,32 @@ export interface GetActionSupportedTrigger {
|
|
|
2308
2436
|
*/
|
|
2309
2437
|
version: string;
|
|
2310
2438
|
}
|
|
2439
|
+
export interface GetAttackProtectionBotDetection {
|
|
2440
|
+
/**
|
|
2441
|
+
* List of IP addresses or ranges that will not trigger bot detection.
|
|
2442
|
+
*/
|
|
2443
|
+
allowlists: string[];
|
|
2444
|
+
/**
|
|
2445
|
+
* Bot detection level. Possible values: `low`, `medium`, `high`. Set to empty string to disable.
|
|
2446
|
+
*/
|
|
2447
|
+
botDetectionLevel: string;
|
|
2448
|
+
/**
|
|
2449
|
+
* Challenge policy for password flow. Possible values: `never`, `whenRisky`, `always`.
|
|
2450
|
+
*/
|
|
2451
|
+
challengePasswordPolicy: string;
|
|
2452
|
+
/**
|
|
2453
|
+
* Challenge policy for password reset flow. Possible values: `never`, `whenRisky`, `always`.
|
|
2454
|
+
*/
|
|
2455
|
+
challengePasswordResetPolicy: string;
|
|
2456
|
+
/**
|
|
2457
|
+
* Challenge policy for passwordless flow. Possible values: `never`, `whenRisky`, `always`.
|
|
2458
|
+
*/
|
|
2459
|
+
challengePasswordlessPolicy: string;
|
|
2460
|
+
/**
|
|
2461
|
+
* Whether monitoring mode is enabled for bot detection.
|
|
2462
|
+
*/
|
|
2463
|
+
monitoringModeEnabled: boolean;
|
|
2464
|
+
}
|
|
2311
2465
|
export interface GetAttackProtectionBreachedPasswordDetection {
|
|
2312
2466
|
/**
|
|
2313
2467
|
* When `adminNotification` is enabled within the `shields` property, determines how often email notifications are sent. Possible values: `immediately`, `daily`, `weekly`, `monthly`.
|
|
@@ -2368,6 +2522,108 @@ export interface GetAttackProtectionBruteForceProtection {
|
|
|
2368
2522
|
*/
|
|
2369
2523
|
shields: string[];
|
|
2370
2524
|
}
|
|
2525
|
+
export interface GetAttackProtectionCaptcha {
|
|
2526
|
+
/**
|
|
2527
|
+
* Active CAPTCHA provider ID. Set to empty string to disable CAPTCHA. Possible values: `recaptchaV2`, `recaptchaEnterprise`, `hcaptcha`, `friendlyCaptcha`, `arkose`, `authChallenge`, `simpleCaptcha`.
|
|
2528
|
+
*/
|
|
2529
|
+
activeProviderId: string;
|
|
2530
|
+
/**
|
|
2531
|
+
* Configuration for Arkose Labs.
|
|
2532
|
+
*/
|
|
2533
|
+
arkoses: outputs.GetAttackProtectionCaptchaArkose[];
|
|
2534
|
+
/**
|
|
2535
|
+
* Configuration for Auth0's Auth Challenge.
|
|
2536
|
+
*/
|
|
2537
|
+
authChallenges: outputs.GetAttackProtectionCaptchaAuthChallenge[];
|
|
2538
|
+
/**
|
|
2539
|
+
* Configuration for Friendly Captcha.
|
|
2540
|
+
*/
|
|
2541
|
+
friendlyCaptchas: outputs.GetAttackProtectionCaptchaFriendlyCaptcha[];
|
|
2542
|
+
/**
|
|
2543
|
+
* Configuration for hCaptcha.
|
|
2544
|
+
*/
|
|
2545
|
+
hcaptchas: outputs.GetAttackProtectionCaptchaHcaptcha[];
|
|
2546
|
+
/**
|
|
2547
|
+
* Configuration for Google reCAPTCHA Enterprise.
|
|
2548
|
+
*/
|
|
2549
|
+
recaptchaEnterprises: outputs.GetAttackProtectionCaptchaRecaptchaEnterprise[];
|
|
2550
|
+
/**
|
|
2551
|
+
* Configuration for Google reCAPTCHA v2.
|
|
2552
|
+
*/
|
|
2553
|
+
recaptchaV2s: outputs.GetAttackProtectionCaptchaRecaptchaV2[];
|
|
2554
|
+
}
|
|
2555
|
+
export interface GetAttackProtectionCaptchaArkose {
|
|
2556
|
+
/**
|
|
2557
|
+
* Client subdomain for Arkose Labs.
|
|
2558
|
+
*/
|
|
2559
|
+
clientSubdomain: string;
|
|
2560
|
+
/**
|
|
2561
|
+
* Whether the captcha should fail open.
|
|
2562
|
+
*/
|
|
2563
|
+
failOpen: boolean;
|
|
2564
|
+
/**
|
|
2565
|
+
* Secret for Arkose Labs.
|
|
2566
|
+
*/
|
|
2567
|
+
secret: string;
|
|
2568
|
+
/**
|
|
2569
|
+
* Site key for Arkose Labs.
|
|
2570
|
+
*/
|
|
2571
|
+
siteKey: string;
|
|
2572
|
+
/**
|
|
2573
|
+
* Verify subdomain for Arkose Labs.
|
|
2574
|
+
*/
|
|
2575
|
+
verifySubdomain: string;
|
|
2576
|
+
}
|
|
2577
|
+
export interface GetAttackProtectionCaptchaAuthChallenge {
|
|
2578
|
+
/**
|
|
2579
|
+
* Whether the auth challenge should fail open.
|
|
2580
|
+
*/
|
|
2581
|
+
failOpen: boolean;
|
|
2582
|
+
}
|
|
2583
|
+
export interface GetAttackProtectionCaptchaFriendlyCaptcha {
|
|
2584
|
+
/**
|
|
2585
|
+
* Secret for Friendly Captcha.
|
|
2586
|
+
*/
|
|
2587
|
+
secret: string;
|
|
2588
|
+
/**
|
|
2589
|
+
* Site key for Friendly Captcha.
|
|
2590
|
+
*/
|
|
2591
|
+
siteKey: string;
|
|
2592
|
+
}
|
|
2593
|
+
export interface GetAttackProtectionCaptchaHcaptcha {
|
|
2594
|
+
/**
|
|
2595
|
+
* Secret for hCaptcha.
|
|
2596
|
+
*/
|
|
2597
|
+
secret: string;
|
|
2598
|
+
/**
|
|
2599
|
+
* Site key for hCaptcha.
|
|
2600
|
+
*/
|
|
2601
|
+
siteKey: string;
|
|
2602
|
+
}
|
|
2603
|
+
export interface GetAttackProtectionCaptchaRecaptchaEnterprise {
|
|
2604
|
+
/**
|
|
2605
|
+
* API key for reCAPTCHA Enterprise.
|
|
2606
|
+
*/
|
|
2607
|
+
apiKey: string;
|
|
2608
|
+
/**
|
|
2609
|
+
* Project ID for reCAPTCHA Enterprise.
|
|
2610
|
+
*/
|
|
2611
|
+
projectId: string;
|
|
2612
|
+
/**
|
|
2613
|
+
* Site key for reCAPTCHA Enterprise.
|
|
2614
|
+
*/
|
|
2615
|
+
siteKey: string;
|
|
2616
|
+
}
|
|
2617
|
+
export interface GetAttackProtectionCaptchaRecaptchaV2 {
|
|
2618
|
+
/**
|
|
2619
|
+
* Secret for reCAPTCHA v2.
|
|
2620
|
+
*/
|
|
2621
|
+
secret: string;
|
|
2622
|
+
/**
|
|
2623
|
+
* Site key for reCAPTCHA v2.
|
|
2624
|
+
*/
|
|
2625
|
+
siteKey: string;
|
|
2626
|
+
}
|
|
2371
2627
|
export interface GetAttackProtectionSuspiciousIpThrottling {
|
|
2372
2628
|
/**
|
|
2373
2629
|
* List of trusted IP addresses that will not have attack protection enforced against them. This field allows you to specify multiple IP addresses, or ranges. You can use IPv4 or IPv6 addresses and CIDR notation.
|
|
@@ -3590,6 +3846,10 @@ export interface GetClientsClient {
|
|
|
3590
3846
|
* Type of application the client represents. Possible values are: `native`, `spa`, `regularWeb`, `nonInteractive`, `resourceServer`,`ssoIntegration`. Specific SSO integrations types accepted as well are: `rms`, `box`, `cloudbees`, `concur`, `dropbox`, `mscrm`, `echosign`, `egnyte`, `newrelic`, `office365`, `salesforce`, `sentry`, `sharepoint`, `slack`, `springcm`, `zendesk`, `zoom`.
|
|
3591
3847
|
*/
|
|
3592
3848
|
appType: string;
|
|
3849
|
+
/**
|
|
3850
|
+
* List of notification channels enabled for CIBA (Client-Initiated Backchannel Authentication) requests initiated by this client. Valid values are `guardian-push` and `email`. The order is significant as this is the order in which notification channels will be evaluated. Defaults to `["guardian-push"]` if not specified.
|
|
3851
|
+
*/
|
|
3852
|
+
asyncApprovalNotificationChannels: string[];
|
|
3593
3853
|
/**
|
|
3594
3854
|
* URLs that Auth0 may call back to after a user authenticates for the client. Make sure to specify the protocol (https://) otherwise the callback may fail in some cases. With the exception of custom URI schemes for native clients, all callbacks should use protocol https://.
|
|
3595
3855
|
*/
|
|
@@ -6100,11 +6360,11 @@ export interface ResourceServerSubjectTypeAuthorization {
|
|
|
6100
6360
|
/**
|
|
6101
6361
|
* Client authorization policies for the resource server.
|
|
6102
6362
|
*/
|
|
6103
|
-
client
|
|
6363
|
+
client: outputs.ResourceServerSubjectTypeAuthorizationClient;
|
|
6104
6364
|
/**
|
|
6105
6365
|
* User authorization policies for the resource server.
|
|
6106
6366
|
*/
|
|
6107
|
-
user
|
|
6367
|
+
user: outputs.ResourceServerSubjectTypeAuthorizationUser;
|
|
6108
6368
|
}
|
|
6109
6369
|
export interface ResourceServerSubjectTypeAuthorizationClient {
|
|
6110
6370
|
/**
|