@pulumi/juniper-mist 0.1.3 → 0.1.4
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/device/gatewayCluster.d.ts +3 -1
- package/device/gatewayCluster.js +3 -1
- package/device/gatewayCluster.js.map +1 -1
- package/device/getApStats.d.ts +1 -1
- package/device/getApStats.js.map +1 -1
- package/device/getGatewayStats.d.ts +1 -1
- package/device/getGatewayStats.js.map +1 -1
- package/device/getSwitchStats.d.ts +1 -1
- package/device/getSwitchStats.js.map +1 -1
- package/getConstAlarms.d.ts +1 -1
- package/getConstAlarms.js.map +1 -1
- package/getConstAppCategories.d.ts +1 -1
- package/getConstAppCategories.js.map +1 -1
- package/getConstAppSubCategories.d.ts +1 -1
- package/getConstAppSubCategories.js.map +1 -1
- package/getConstApplications.d.ts +1 -1
- package/getConstApplications.js.map +1 -1
- package/getConstCountries.d.ts +1 -1
- package/getConstCountries.js.map +1 -1
- package/getConstTrafficTypes.d.ts +1 -1
- package/getConstTrafficTypes.js.map +1 -1
- package/getConstWebhooks.d.ts +1 -1
- package/getConstWebhooks.js.map +1 -1
- package/getSites.d.ts +1 -1
- package/getSites.js.map +1 -1
- package/org/getDeviceprofilesAp.d.ts +1 -1
- package/org/getDeviceprofilesAp.js.map +1 -1
- package/org/getDeviceprofilesGateway.d.ts +1 -1
- package/org/getDeviceprofilesGateway.js.map +1 -1
- package/org/getGatewaytemplates.d.ts +1 -1
- package/org/getGatewaytemplates.js.map +1 -1
- package/org/getIdpprofiles.d.ts +1 -1
- package/org/getIdpprofiles.js.map +1 -1
- package/org/getInventory.d.ts +1 -1
- package/org/getInventory.js.map +1 -1
- package/org/getNacidpMetadata.d.ts +1 -1
- package/org/getNacidpMetadata.js.map +1 -1
- package/org/getNacrules.d.ts +1 -1
- package/org/getNacrules.js.map +1 -1
- package/org/getNactags.d.ts +1 -1
- package/org/getNactags.js.map +1 -1
- package/org/getNetworks.d.ts +1 -1
- package/org/getNetworks.js.map +1 -1
- package/org/getNetworktemplates.d.ts +1 -1
- package/org/getNetworktemplates.js.map +1 -1
- package/org/getPsks.d.ts +1 -1
- package/org/getPsks.js.map +1 -1
- package/org/getRftemplates.d.ts +1 -1
- package/org/getRftemplates.js.map +1 -1
- package/org/getServicepolicies.d.ts +1 -1
- package/org/getServicepolicies.js.map +1 -1
- package/org/getServices.d.ts +1 -1
- package/org/getServices.js.map +1 -1
- package/org/getSitegroups.d.ts +1 -1
- package/org/getSitegroups.js.map +1 -1
- package/org/getSsoMetadata.d.ts +1 -1
- package/org/getSsoMetadata.js.map +1 -1
- package/org/getVpns.d.ts +1 -1
- package/org/getVpns.js.map +1 -1
- package/org/getWebhooks.d.ts +1 -1
- package/org/getWebhooks.js.map +1 -1
- package/org/getWlantemplates.d.ts +1 -1
- package/org/getWlantemplates.js.map +1 -1
- package/org/getWxtags.d.ts +1 -1
- package/org/getWxtags.js.map +1 -1
- package/org/inventory.d.ts +9 -3
- package/org/inventory.js.map +1 -1
- package/org/wlan.d.ts +57 -42
- package/org/wlan.js +6 -4
- package/org/wlan.js.map +1 -1
- package/package.json +3 -3
- package/site/getPsks.d.ts +1 -1
- package/site/getPsks.js.map +1 -1
- package/site/getWebhooks.d.ts +1 -1
- package/site/getWebhooks.js.map +1 -1
- package/site/wlan.d.ts +57 -42
- package/site/wlan.js +6 -4
- package/site/wlan.js.map +1 -1
- package/types/input.d.ts +120 -126
- package/types/output.d.ts +171 -177
package/types/output.d.ts
CHANGED
|
@@ -4690,7 +4690,7 @@ export declare namespace org {
|
|
|
4690
4690
|
/**
|
|
4691
4691
|
* List of additional email string to deliver the alarms via emails
|
|
4692
4692
|
*/
|
|
4693
|
-
additionalEmails
|
|
4693
|
+
additionalEmails: string[];
|
|
4694
4694
|
/**
|
|
4695
4695
|
* Whether to enable the alarm delivery via emails or not
|
|
4696
4696
|
*/
|
|
@@ -10176,7 +10176,7 @@ Please update your configurations.
|
|
|
10176
10176
|
/**
|
|
10177
10177
|
* SAE anti-clogging token threshold
|
|
10178
10178
|
*/
|
|
10179
|
-
anticlogThreshold
|
|
10179
|
+
anticlogThreshold?: number;
|
|
10180
10180
|
/**
|
|
10181
10181
|
* whether to trigger EAP reauth when the session ends
|
|
10182
10182
|
*/
|
|
@@ -10200,7 +10200,7 @@ Please update your configurations.
|
|
|
10200
10200
|
/**
|
|
10201
10201
|
* if `type`==`open`. enum: `disabled`, `enabled` (means transition mode), `required`
|
|
10202
10202
|
*/
|
|
10203
|
-
owe
|
|
10203
|
+
owe?: string;
|
|
10204
10204
|
/**
|
|
10205
10205
|
* when `type`=`psk` or `type`=`eap`, one or more of `wpa1-ccmp`, `wpa1-tkip`, `wpa2-ccmp`, `wpa2-tkip`, `wpa3`
|
|
10206
10206
|
*/
|
|
@@ -10220,7 +10220,7 @@ Please update your configurations.
|
|
|
10220
10220
|
/**
|
|
10221
10221
|
* enable WEP as secondary auth
|
|
10222
10222
|
*/
|
|
10223
|
-
wepAsSecondaryAuth
|
|
10223
|
+
wepAsSecondaryAuth?: boolean;
|
|
10224
10224
|
}
|
|
10225
10225
|
interface WlanAuthServer {
|
|
10226
10226
|
/**
|
|
@@ -10329,7 +10329,6 @@ Please update your configurations.
|
|
|
10329
10329
|
* enum: `cloudPsks`, `radius`
|
|
10330
10330
|
*/
|
|
10331
10331
|
source: string;
|
|
10332
|
-
vlanIds?: string[];
|
|
10333
10332
|
}
|
|
10334
10333
|
interface WlanDynamicVlan {
|
|
10335
10334
|
/**
|
|
@@ -10337,7 +10336,7 @@ Please update your configurations.
|
|
|
10337
10336
|
*/
|
|
10338
10337
|
defaultVlanIds: string[];
|
|
10339
10338
|
/**
|
|
10340
|
-
*
|
|
10339
|
+
* Requires `vlanEnabled`==`true` to be set to `true`. Whether to enable dynamic vlan
|
|
10341
10340
|
*/
|
|
10342
10341
|
enabled: boolean;
|
|
10343
10342
|
/**
|
|
@@ -10404,19 +10403,19 @@ Please update your configurations.
|
|
|
10404
10403
|
}
|
|
10405
10404
|
interface WlanPortal {
|
|
10406
10405
|
/**
|
|
10407
|
-
*
|
|
10406
|
+
* Optional if `amazonEnabled`==`true`. Whether to allow guest to connect to other Guest WLANs (with different `WLAN.ssid`) of same org without reauthentication (disable randomMac for seamless roaming)
|
|
10408
10407
|
*/
|
|
10409
|
-
allowWlanIdRoam
|
|
10408
|
+
allowWlanIdRoam?: boolean;
|
|
10410
10409
|
/**
|
|
10411
|
-
*
|
|
10410
|
+
* Optional if `amazonEnabled`==`true`. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
|
|
10412
10411
|
*/
|
|
10413
10412
|
amazonClientId: string;
|
|
10414
10413
|
/**
|
|
10415
|
-
*
|
|
10414
|
+
* Optional if `amazonEnabled`==`true`. Amazon OAuth2 client secret. If amazonClientId was provided, provide a correspoinding value. Else leave blank.
|
|
10416
10415
|
*/
|
|
10417
10416
|
amazonClientSecret: string;
|
|
10418
10417
|
/**
|
|
10419
|
-
* Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
10418
|
+
* Optional if `amazonEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
10420
10419
|
*/
|
|
10421
10420
|
amazonEmailDomains: string[];
|
|
10422
10421
|
/**
|
|
@@ -10424,21 +10423,19 @@ Please update your configurations.
|
|
|
10424
10423
|
*/
|
|
10425
10424
|
amazonEnabled: boolean;
|
|
10426
10425
|
/**
|
|
10427
|
-
*
|
|
10426
|
+
* Optional if `amazonEnabled`==`true`. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
|
|
10428
10427
|
*/
|
|
10429
|
-
amazonExpire
|
|
10428
|
+
amazonExpire?: number;
|
|
10430
10429
|
/**
|
|
10431
|
-
* authentication scheme. enum: `external`, `none`, `sso`
|
|
10430
|
+
* authentication scheme. enum: `amazon`, `azure`, `email`, `external`, `facebook`, `google`, `microsoft`, `multi`, `none`, `password`, `sponsor`, `sso`
|
|
10432
10431
|
*/
|
|
10433
10432
|
auth: string;
|
|
10434
10433
|
/**
|
|
10435
|
-
* Required if `azureEnabled`==`true`.
|
|
10436
|
-
* Azure active directory app client id
|
|
10434
|
+
* Required if `azureEnabled`==`true`. Azure active directory app client id
|
|
10437
10435
|
*/
|
|
10438
10436
|
azureClientId: string;
|
|
10439
10437
|
/**
|
|
10440
|
-
* Required if `azureEnabled`==`true`.
|
|
10441
|
-
* Azure active directory app client secret
|
|
10438
|
+
* Required if `azureEnabled`==`true`. Azure active directory app client secret
|
|
10442
10439
|
*/
|
|
10443
10440
|
azureClientSecret: string;
|
|
10444
10441
|
/**
|
|
@@ -10448,36 +10445,35 @@ Please update your configurations.
|
|
|
10448
10445
|
/**
|
|
10449
10446
|
* interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
|
|
10450
10447
|
*/
|
|
10451
|
-
azureExpire
|
|
10448
|
+
azureExpire?: number;
|
|
10452
10449
|
/**
|
|
10453
|
-
* Required if `azureEnabled`==`true`.
|
|
10454
|
-
* Azure active directory tenant id.
|
|
10450
|
+
* Required if `azureEnabled`==`true`. Azure active directory tenant id.
|
|
10455
10451
|
*/
|
|
10456
10452
|
azureTenantId: string;
|
|
10457
10453
|
/**
|
|
10458
|
-
*
|
|
10454
|
+
* Required if `smsProvider`==`broadnet`
|
|
10459
10455
|
*/
|
|
10460
10456
|
broadnetPassword: string;
|
|
10461
10457
|
/**
|
|
10462
|
-
*
|
|
10458
|
+
* Required if `smsProvider`==`broadnet`
|
|
10463
10459
|
*/
|
|
10464
|
-
broadnetSid
|
|
10460
|
+
broadnetSid?: string;
|
|
10465
10461
|
/**
|
|
10466
|
-
*
|
|
10462
|
+
* Required if `smsProvider`==`broadnet`
|
|
10467
10463
|
*/
|
|
10468
|
-
broadnetUserId
|
|
10464
|
+
broadnetUserId?: string;
|
|
10469
10465
|
/**
|
|
10470
10466
|
* whether to bypass the guest portal when cloud not reachable (and apply the default policies)
|
|
10471
10467
|
*/
|
|
10472
10468
|
bypassWhenCloudDown: boolean;
|
|
10473
10469
|
/**
|
|
10474
|
-
*
|
|
10470
|
+
* Required if `smsProvider`==`clickatell`
|
|
10475
10471
|
*/
|
|
10476
|
-
clickatellApiKey
|
|
10472
|
+
clickatellApiKey?: string;
|
|
10477
10473
|
/**
|
|
10478
10474
|
* whether to allow guest to roam between WLANs (with same `WLAN.ssid`, regardless of variables) of different sites of same org without reauthentication (disable randomMac for seamless roaming)
|
|
10479
10475
|
*/
|
|
10480
|
-
crossSite
|
|
10476
|
+
crossSite?: boolean;
|
|
10481
10477
|
/**
|
|
10482
10478
|
* whether email (access code verification) is enabled as a login method
|
|
10483
10479
|
*/
|
|
@@ -10491,21 +10487,19 @@ Please update your configurations.
|
|
|
10491
10487
|
*/
|
|
10492
10488
|
expire: number;
|
|
10493
10489
|
/**
|
|
10494
|
-
* external portal URL (e.g. https://host/url) where we can append our query parameters to
|
|
10490
|
+
* Required if `wlanPortalAuth`==`external`. External portal URL (e.g. https://host/url) where we can append our query parameters to
|
|
10495
10491
|
*/
|
|
10496
10492
|
externalPortalUrl: string;
|
|
10497
10493
|
/**
|
|
10498
|
-
* Required if `facebookEnabled`==`true`.
|
|
10499
|
-
* Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
|
|
10494
|
+
* Required if `facebookEnabled`==`true`. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
|
|
10500
10495
|
*/
|
|
10501
10496
|
facebookClientId: string;
|
|
10502
10497
|
/**
|
|
10503
|
-
* Required if `facebookEnabled`==`true`.
|
|
10504
|
-
* Facebook OAuth2 app secret. If facebookClientId was provided, provide a correspoinding value. Else leave blank.
|
|
10498
|
+
* Required if `facebookEnabled`==`true`. Facebook OAuth2 app secret. If facebookClientId was provided, provide a correspoinding value. Else leave blank.
|
|
10505
10499
|
*/
|
|
10506
10500
|
facebookClientSecret: string;
|
|
10507
10501
|
/**
|
|
10508
|
-
* Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
10502
|
+
* Optional if `facebookEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
10509
10503
|
*/
|
|
10510
10504
|
facebookEmailDomains: string[];
|
|
10511
10505
|
/**
|
|
@@ -10513,9 +10507,9 @@ Please update your configurations.
|
|
|
10513
10507
|
*/
|
|
10514
10508
|
facebookEnabled: boolean;
|
|
10515
10509
|
/**
|
|
10516
|
-
*
|
|
10510
|
+
* Optional if `facebookEnabled`==`true`. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
|
|
10517
10511
|
*/
|
|
10518
|
-
facebookExpire
|
|
10512
|
+
facebookExpire?: number;
|
|
10519
10513
|
/**
|
|
10520
10514
|
* whether to forward the user to another URL after authorized
|
|
10521
10515
|
*/
|
|
@@ -10529,11 +10523,11 @@ Please update your configurations.
|
|
|
10529
10523
|
*/
|
|
10530
10524
|
googleClientId: string;
|
|
10531
10525
|
/**
|
|
10532
|
-
* Google OAuth2 app secret. If googleClientId was provided, provide a correspoinding value. Else leave blank.
|
|
10526
|
+
* Optional if `googleEnabled`==`true`. Google OAuth2 app secret. If googleClientId was provided, provide a correspoinding value. Else leave blank.
|
|
10533
10527
|
*/
|
|
10534
10528
|
googleClientSecret: string;
|
|
10535
10529
|
/**
|
|
10536
|
-
* Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
10530
|
+
* Optional if `googleEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
10537
10531
|
*/
|
|
10538
10532
|
googleEmailDomains: string[];
|
|
10539
10533
|
/**
|
|
@@ -10541,27 +10535,27 @@ Please update your configurations.
|
|
|
10541
10535
|
*/
|
|
10542
10536
|
googleEnabled: boolean;
|
|
10543
10537
|
/**
|
|
10544
|
-
*
|
|
10538
|
+
* Optional if `googleEnabled`==`true`. Interval for which guest remains authorized using google auth (in minutes), if not provided, uses expire`
|
|
10545
10539
|
*/
|
|
10546
|
-
googleExpire
|
|
10540
|
+
googleExpire?: number;
|
|
10547
10541
|
/**
|
|
10548
|
-
*
|
|
10542
|
+
* Required if `smsProvider`==`gupshup`
|
|
10549
10543
|
*/
|
|
10550
|
-
gupshupPassword
|
|
10544
|
+
gupshupPassword?: string;
|
|
10551
10545
|
/**
|
|
10552
|
-
*
|
|
10546
|
+
* Required if `smsProvider`==`gupshup`
|
|
10553
10547
|
*/
|
|
10554
|
-
gupshupUserid
|
|
10548
|
+
gupshupUserid?: string;
|
|
10555
10549
|
/**
|
|
10556
|
-
*
|
|
10550
|
+
* Optional if `microsoftEnabled`==`true`. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
|
|
10557
10551
|
*/
|
|
10558
10552
|
microsoftClientId: string;
|
|
10559
10553
|
/**
|
|
10560
|
-
*
|
|
10554
|
+
* Optional if `microsoftEnabled`==`true`. Microsoft 365 OAuth2 client secret. If microsoftClientId was provided, provide a correspoinding value. Else leave blank.
|
|
10561
10555
|
*/
|
|
10562
10556
|
microsoftClientSecret: string;
|
|
10563
10557
|
/**
|
|
10564
|
-
* Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
10558
|
+
* Optional if `microsoftEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
10565
10559
|
*/
|
|
10566
10560
|
microsoftEmailDomains: string[];
|
|
10567
10561
|
/**
|
|
@@ -10569,19 +10563,19 @@ Please update your configurations.
|
|
|
10569
10563
|
*/
|
|
10570
10564
|
microsoftEnabled: boolean;
|
|
10571
10565
|
/**
|
|
10572
|
-
*
|
|
10566
|
+
* Optional if `microsoftEnabled`==`true`. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
|
|
10573
10567
|
*/
|
|
10574
|
-
microsoftExpire
|
|
10568
|
+
microsoftExpire?: number;
|
|
10575
10569
|
/**
|
|
10576
|
-
*
|
|
10570
|
+
* Whether password is enabled
|
|
10577
10571
|
*/
|
|
10578
10572
|
passphraseEnabled: boolean;
|
|
10579
10573
|
/**
|
|
10580
|
-
*
|
|
10574
|
+
* Optional if `passphraseEnabled`==`true`. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, uses `expire`
|
|
10581
10575
|
*/
|
|
10582
|
-
passphraseExpire
|
|
10576
|
+
passphraseExpire?: number;
|
|
10583
10577
|
/**
|
|
10584
|
-
*
|
|
10578
|
+
* Required if `passphraseEnabled`==`true`.
|
|
10585
10579
|
*/
|
|
10586
10580
|
password: string;
|
|
10587
10581
|
/**
|
|
@@ -10594,34 +10588,37 @@ Please update your configurations.
|
|
|
10594
10588
|
predefinedSponsorsHideEmail: boolean;
|
|
10595
10589
|
privacy: boolean;
|
|
10596
10590
|
/**
|
|
10597
|
-
*
|
|
10591
|
+
* Required if `smsProvider`==`puzzel`
|
|
10598
10592
|
*/
|
|
10599
|
-
puzzelPassword
|
|
10593
|
+
puzzelPassword?: string;
|
|
10600
10594
|
/**
|
|
10601
|
-
*
|
|
10595
|
+
* Required if `smsProvider`==`puzzel`
|
|
10602
10596
|
*/
|
|
10603
|
-
puzzelServiceId
|
|
10597
|
+
puzzelServiceId?: string;
|
|
10604
10598
|
/**
|
|
10605
|
-
*
|
|
10599
|
+
* Required if `smsProvider`==`puzzel`
|
|
10606
10600
|
*/
|
|
10607
|
-
puzzelUsername
|
|
10601
|
+
puzzelUsername?: string;
|
|
10608
10602
|
/**
|
|
10609
10603
|
* whether sms is enabled as a login method
|
|
10610
10604
|
*/
|
|
10611
10605
|
smsEnabled: boolean;
|
|
10612
10606
|
/**
|
|
10613
|
-
*
|
|
10607
|
+
* Optional if `smsEnabled`==`true`. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
|
|
10608
|
+
*/
|
|
10609
|
+
smsExpire?: number;
|
|
10610
|
+
/**
|
|
10611
|
+
* Optional if `smsEnabled`==`true`. SMS Message format
|
|
10614
10612
|
*/
|
|
10615
|
-
smsExpire: number;
|
|
10616
10613
|
smsMessageFormat: string;
|
|
10617
10614
|
/**
|
|
10618
|
-
* enum: `broadnet`, `clickatell`, `gupshup`, `manual`, `puzzel`, `telstra`, `twilio`
|
|
10615
|
+
* Optioanl if `smsEnabled`==`true`. enum: `broadnet`, `clickatell`, `gupshup`, `manual`, `puzzel`, `telstra`, `twilio`
|
|
10619
10616
|
*/
|
|
10620
10617
|
smsProvider: string;
|
|
10621
10618
|
/**
|
|
10622
|
-
*
|
|
10619
|
+
* Optional if `sponsorEnabled`==`true`. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefinedSponsorsEnabled enabled and sponsorNotifyAll disabled
|
|
10623
10620
|
*/
|
|
10624
|
-
sponsorAutoApprove
|
|
10621
|
+
sponsorAutoApprove?: boolean;
|
|
10625
10622
|
/**
|
|
10626
10623
|
* list of domain allowed for sponsor email. Required if `sponsorEnabled` is `true` and `sponsors` is empty.
|
|
10627
10624
|
*/
|
|
@@ -10631,19 +10628,19 @@ Please update your configurations.
|
|
|
10631
10628
|
*/
|
|
10632
10629
|
sponsorEnabled: boolean;
|
|
10633
10630
|
/**
|
|
10634
|
-
*
|
|
10631
|
+
* Optional if `sponsorEnabled`==`true`. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
|
|
10635
10632
|
*/
|
|
10636
|
-
sponsorExpire
|
|
10633
|
+
sponsorExpire?: number;
|
|
10637
10634
|
/**
|
|
10638
|
-
*
|
|
10635
|
+
* Optional if `sponsorEnabled`==`true`. How long to remain valid sponsored guest request approve/deny link received in email, in minutes.
|
|
10639
10636
|
*/
|
|
10640
10637
|
sponsorLinkValidityDuration: string;
|
|
10641
10638
|
/**
|
|
10642
|
-
* whether to notify all sponsors that are mentioned in `sponsors` object. Both `sponsorNotifyAll` and `predefinedSponsorsEnabled` should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
|
|
10639
|
+
* Optional if `sponsorEnabled`==`true`. whether to notify all sponsors that are mentioned in `sponsors` object. Both `sponsorNotifyAll` and `predefinedSponsorsEnabled` should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
|
|
10643
10640
|
*/
|
|
10644
10641
|
sponsorNotifyAll: boolean;
|
|
10645
10642
|
/**
|
|
10646
|
-
* if enabled, guest will get email about sponsor's action (approve/deny)
|
|
10643
|
+
* Optional if `sponsorEnabled`==`true`. If enabled, guest will get email about sponsor's action (approve/deny)
|
|
10647
10644
|
*/
|
|
10648
10645
|
sponsorStatusNotify: boolean;
|
|
10649
10646
|
/**
|
|
@@ -10656,53 +10653,53 @@ Please update your configurations.
|
|
|
10656
10653
|
[key: string]: string;
|
|
10657
10654
|
};
|
|
10658
10655
|
/**
|
|
10659
|
-
* if `wlanPortalAuth`==`sso`, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
|
|
10656
|
+
* Optionl if `wlanPortalAuth`==`sso`, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
|
|
10660
10657
|
*/
|
|
10661
10658
|
ssoDefaultRole: string;
|
|
10662
10659
|
/**
|
|
10663
|
-
* if `wlanPortalAuth`==`sso`
|
|
10660
|
+
* Optionl if `wlanPortalAuth`==`sso`
|
|
10664
10661
|
*/
|
|
10665
10662
|
ssoForcedRole: string;
|
|
10666
10663
|
/**
|
|
10667
|
-
* if `wlanPortalAuth`==`sso
|
|
10664
|
+
* Required if `wlanPortalAuth`==`sso`. IDP Cert (used to verify the signed response)
|
|
10668
10665
|
*/
|
|
10669
10666
|
ssoIdpCert: string;
|
|
10670
10667
|
/**
|
|
10671
|
-
* if `wlanPortalAuth`==`sso`, Signing algorithm for SAML Assertion. enum: `sha1`, `sha256`, `sha384`, `sha512`
|
|
10668
|
+
* Optioanl if `wlanPortalAuth`==`sso`, Signing algorithm for SAML Assertion. enum: `sha1`, `sha256`, `sha384`, `sha512`
|
|
10672
10669
|
*/
|
|
10673
10670
|
ssoIdpSignAlgo: string;
|
|
10674
10671
|
/**
|
|
10675
|
-
* if `wlanPortalAuth`==`sso`, IDP Single-Sign-On URL
|
|
10672
|
+
* Required if `wlanPortalAuth`==`sso`, IDP Single-Sign-On URL
|
|
10676
10673
|
*/
|
|
10677
10674
|
ssoIdpSsoUrl: string;
|
|
10678
10675
|
/**
|
|
10679
|
-
* if `wlanPortalAuth`==`sso`, IDP issuer URL
|
|
10676
|
+
* Required if `wlanPortalAuth`==`sso`, IDP issuer URL
|
|
10680
10677
|
*/
|
|
10681
10678
|
ssoIssuer: string;
|
|
10682
10679
|
/**
|
|
10683
|
-
* if `wlanPortalAuth`==`sso`. enum: `email`, `unspecified`
|
|
10680
|
+
* Optional if `wlanPortalAuth`==`sso`. enum: `email`, `unspecified`
|
|
10684
10681
|
*/
|
|
10685
10682
|
ssoNameidFormat: string;
|
|
10686
10683
|
/**
|
|
10687
|
-
*
|
|
10684
|
+
* Required if `smsProvider`==`telstra`, Client ID provided by Telstra
|
|
10688
10685
|
*/
|
|
10689
|
-
telstraClientId
|
|
10686
|
+
telstraClientId?: string;
|
|
10690
10687
|
/**
|
|
10691
|
-
*
|
|
10688
|
+
* Required if `smsProvider`==`telstra`, Client secret provided by Telstra
|
|
10692
10689
|
*/
|
|
10693
|
-
telstraClientSecret
|
|
10690
|
+
telstraClientSecret?: string;
|
|
10694
10691
|
/**
|
|
10695
|
-
*
|
|
10692
|
+
* Required if `smsProvider`==`twilio`, Auth token account with twilio account
|
|
10696
10693
|
*/
|
|
10697
|
-
twilioAuthToken
|
|
10694
|
+
twilioAuthToken?: string;
|
|
10698
10695
|
/**
|
|
10699
|
-
*
|
|
10696
|
+
* Required if `smsProvider`==`twilio`, Twilio phone number associated with the account. See example for accepted format.
|
|
10700
10697
|
*/
|
|
10701
|
-
twilioPhoneNumber
|
|
10698
|
+
twilioPhoneNumber?: string;
|
|
10702
10699
|
/**
|
|
10703
|
-
*
|
|
10700
|
+
* Required if `smsProvider`==`twilio`, Account SID provided by Twilio
|
|
10704
10701
|
*/
|
|
10705
|
-
twilioSid
|
|
10702
|
+
twilioSid?: string;
|
|
10706
10703
|
}
|
|
10707
10704
|
interface WlanPortalTemplatePortalTemplate {
|
|
10708
10705
|
accessCodeAlternateEmail: string;
|
|
@@ -11425,7 +11422,7 @@ Please update your configurations.
|
|
|
11425
11422
|
/**
|
|
11426
11423
|
* Minimum RSSI for client to connect, 0 means not enforcing
|
|
11427
11424
|
*/
|
|
11428
|
-
minRssi
|
|
11425
|
+
minRssi: number;
|
|
11429
11426
|
/**
|
|
11430
11427
|
* Data Rates template to apply. enum:
|
|
11431
11428
|
* * `no-legacy`: no 11b
|
|
@@ -11434,7 +11431,7 @@ Please update your configurations.
|
|
|
11434
11431
|
* * `high-density`: no 11b, no low rates
|
|
11435
11432
|
* * `custom`: user defined
|
|
11436
11433
|
*/
|
|
11437
|
-
template
|
|
11434
|
+
template: string;
|
|
11438
11435
|
/**
|
|
11439
11436
|
* if `template`==`custom`. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
|
|
11440
11437
|
*/
|
|
@@ -13435,7 +13432,7 @@ Please update your configurations.
|
|
|
13435
13432
|
/**
|
|
13436
13433
|
* SAE anti-clogging token threshold
|
|
13437
13434
|
*/
|
|
13438
|
-
anticlogThreshold
|
|
13435
|
+
anticlogThreshold?: number;
|
|
13439
13436
|
/**
|
|
13440
13437
|
* whether to trigger EAP reauth when the session ends
|
|
13441
13438
|
*/
|
|
@@ -13459,7 +13456,7 @@ Please update your configurations.
|
|
|
13459
13456
|
/**
|
|
13460
13457
|
* if `type`==`open`. enum: `disabled`, `enabled` (means transition mode), `required`
|
|
13461
13458
|
*/
|
|
13462
|
-
owe
|
|
13459
|
+
owe?: string;
|
|
13463
13460
|
/**
|
|
13464
13461
|
* when `type`=`psk` or `type`=`eap`, one or more of `wpa1-ccmp`, `wpa1-tkip`, `wpa2-ccmp`, `wpa2-tkip`, `wpa3`
|
|
13465
13462
|
*/
|
|
@@ -13479,7 +13476,7 @@ Please update your configurations.
|
|
|
13479
13476
|
/**
|
|
13480
13477
|
* enable WEP as secondary auth
|
|
13481
13478
|
*/
|
|
13482
|
-
wepAsSecondaryAuth
|
|
13479
|
+
wepAsSecondaryAuth?: boolean;
|
|
13483
13480
|
}
|
|
13484
13481
|
interface WlanAuthServer {
|
|
13485
13482
|
/**
|
|
@@ -13588,7 +13585,6 @@ Please update your configurations.
|
|
|
13588
13585
|
* enum: `cloudPsks`, `radius`
|
|
13589
13586
|
*/
|
|
13590
13587
|
source: string;
|
|
13591
|
-
vlanIds?: string[];
|
|
13592
13588
|
}
|
|
13593
13589
|
interface WlanDynamicVlan {
|
|
13594
13590
|
/**
|
|
@@ -13596,7 +13592,7 @@ Please update your configurations.
|
|
|
13596
13592
|
*/
|
|
13597
13593
|
defaultVlanIds: string[];
|
|
13598
13594
|
/**
|
|
13599
|
-
*
|
|
13595
|
+
* Requires `vlanEnabled`==`true` to be set to `true`. Whether to enable dynamic vlan
|
|
13600
13596
|
*/
|
|
13601
13597
|
enabled: boolean;
|
|
13602
13598
|
/**
|
|
@@ -13663,19 +13659,19 @@ Please update your configurations.
|
|
|
13663
13659
|
}
|
|
13664
13660
|
interface WlanPortal {
|
|
13665
13661
|
/**
|
|
13666
|
-
*
|
|
13662
|
+
* Optional if `amazonEnabled`==`true`. Whether to allow guest to connect to other Guest WLANs (with different `WLAN.ssid`) of same org without reauthentication (disable randomMac for seamless roaming)
|
|
13667
13663
|
*/
|
|
13668
|
-
allowWlanIdRoam
|
|
13664
|
+
allowWlanIdRoam?: boolean;
|
|
13669
13665
|
/**
|
|
13670
|
-
*
|
|
13666
|
+
* Optional if `amazonEnabled`==`true`. Amazon OAuth2 client id. This is optional. If not provided, it will use a default one.
|
|
13671
13667
|
*/
|
|
13672
13668
|
amazonClientId: string;
|
|
13673
13669
|
/**
|
|
13674
|
-
*
|
|
13670
|
+
* Optional if `amazonEnabled`==`true`. Amazon OAuth2 client secret. If amazonClientId was provided, provide a correspoinding value. Else leave blank.
|
|
13675
13671
|
*/
|
|
13676
13672
|
amazonClientSecret: string;
|
|
13677
13673
|
/**
|
|
13678
|
-
* Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
13674
|
+
* Optional if `amazonEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
13679
13675
|
*/
|
|
13680
13676
|
amazonEmailDomains: string[];
|
|
13681
13677
|
/**
|
|
@@ -13683,21 +13679,19 @@ Please update your configurations.
|
|
|
13683
13679
|
*/
|
|
13684
13680
|
amazonEnabled: boolean;
|
|
13685
13681
|
/**
|
|
13686
|
-
*
|
|
13682
|
+
* Optional if `amazonEnabled`==`true`. Interval for which guest remains authorized using amazon auth (in minutes), if not provided, uses expire`
|
|
13687
13683
|
*/
|
|
13688
|
-
amazonExpire
|
|
13684
|
+
amazonExpire?: number;
|
|
13689
13685
|
/**
|
|
13690
|
-
* authentication scheme. enum: `external`, `none`, `sso`
|
|
13686
|
+
* authentication scheme. enum: `amazon`, `azure`, `email`, `external`, `facebook`, `google`, `microsoft`, `multi`, `none`, `password`, `sponsor`, `sso`
|
|
13691
13687
|
*/
|
|
13692
13688
|
auth: string;
|
|
13693
13689
|
/**
|
|
13694
|
-
* Required if `azureEnabled`==`true`.
|
|
13695
|
-
* Azure active directory app client id
|
|
13690
|
+
* Required if `azureEnabled`==`true`. Azure active directory app client id
|
|
13696
13691
|
*/
|
|
13697
13692
|
azureClientId: string;
|
|
13698
13693
|
/**
|
|
13699
|
-
* Required if `azureEnabled`==`true`.
|
|
13700
|
-
* Azure active directory app client secret
|
|
13694
|
+
* Required if `azureEnabled`==`true`. Azure active directory app client secret
|
|
13701
13695
|
*/
|
|
13702
13696
|
azureClientSecret: string;
|
|
13703
13697
|
/**
|
|
@@ -13707,36 +13701,35 @@ Please update your configurations.
|
|
|
13707
13701
|
/**
|
|
13708
13702
|
* interval for which guest remains authorized using azure auth (in minutes), if not provided, uses expire`
|
|
13709
13703
|
*/
|
|
13710
|
-
azureExpire
|
|
13704
|
+
azureExpire?: number;
|
|
13711
13705
|
/**
|
|
13712
|
-
* Required if `azureEnabled`==`true`.
|
|
13713
|
-
* Azure active directory tenant id.
|
|
13706
|
+
* Required if `azureEnabled`==`true`. Azure active directory tenant id.
|
|
13714
13707
|
*/
|
|
13715
13708
|
azureTenantId: string;
|
|
13716
13709
|
/**
|
|
13717
|
-
*
|
|
13710
|
+
* Required if `smsProvider`==`broadnet`
|
|
13718
13711
|
*/
|
|
13719
13712
|
broadnetPassword: string;
|
|
13720
13713
|
/**
|
|
13721
|
-
*
|
|
13714
|
+
* Required if `smsProvider`==`broadnet`
|
|
13722
13715
|
*/
|
|
13723
|
-
broadnetSid
|
|
13716
|
+
broadnetSid?: string;
|
|
13724
13717
|
/**
|
|
13725
|
-
*
|
|
13718
|
+
* Required if `smsProvider`==`broadnet`
|
|
13726
13719
|
*/
|
|
13727
|
-
broadnetUserId
|
|
13720
|
+
broadnetUserId?: string;
|
|
13728
13721
|
/**
|
|
13729
13722
|
* whether to bypass the guest portal when cloud not reachable (and apply the default policies)
|
|
13730
13723
|
*/
|
|
13731
13724
|
bypassWhenCloudDown: boolean;
|
|
13732
13725
|
/**
|
|
13733
|
-
*
|
|
13726
|
+
* Required if `smsProvider`==`clickatell`
|
|
13734
13727
|
*/
|
|
13735
|
-
clickatellApiKey
|
|
13728
|
+
clickatellApiKey?: string;
|
|
13736
13729
|
/**
|
|
13737
13730
|
* whether to allow guest to roam between WLANs (with same `WLAN.ssid`, regardless of variables) of different sites of same org without reauthentication (disable randomMac for seamless roaming)
|
|
13738
13731
|
*/
|
|
13739
|
-
crossSite
|
|
13732
|
+
crossSite?: boolean;
|
|
13740
13733
|
/**
|
|
13741
13734
|
* whether email (access code verification) is enabled as a login method
|
|
13742
13735
|
*/
|
|
@@ -13750,21 +13743,19 @@ Please update your configurations.
|
|
|
13750
13743
|
*/
|
|
13751
13744
|
expire: number;
|
|
13752
13745
|
/**
|
|
13753
|
-
* external portal URL (e.g. https://host/url) where we can append our query parameters to
|
|
13746
|
+
* Required if `wlanPortalAuth`==`external`. External portal URL (e.g. https://host/url) where we can append our query parameters to
|
|
13754
13747
|
*/
|
|
13755
13748
|
externalPortalUrl: string;
|
|
13756
13749
|
/**
|
|
13757
|
-
* Required if `facebookEnabled`==`true`.
|
|
13758
|
-
* Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
|
|
13750
|
+
* Required if `facebookEnabled`==`true`. Facebook OAuth2 app id. This is optional. If not provided, it will use a default one.
|
|
13759
13751
|
*/
|
|
13760
13752
|
facebookClientId: string;
|
|
13761
13753
|
/**
|
|
13762
|
-
* Required if `facebookEnabled`==`true`.
|
|
13763
|
-
* Facebook OAuth2 app secret. If facebookClientId was provided, provide a correspoinding value. Else leave blank.
|
|
13754
|
+
* Required if `facebookEnabled`==`true`. Facebook OAuth2 app secret. If facebookClientId was provided, provide a correspoinding value. Else leave blank.
|
|
13764
13755
|
*/
|
|
13765
13756
|
facebookClientSecret: string;
|
|
13766
13757
|
/**
|
|
13767
|
-
* Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
13758
|
+
* Optional if `facebookEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
13768
13759
|
*/
|
|
13769
13760
|
facebookEmailDomains: string[];
|
|
13770
13761
|
/**
|
|
@@ -13772,9 +13763,9 @@ Please update your configurations.
|
|
|
13772
13763
|
*/
|
|
13773
13764
|
facebookEnabled: boolean;
|
|
13774
13765
|
/**
|
|
13775
|
-
*
|
|
13766
|
+
* Optional if `facebookEnabled`==`true`. Interval for which guest remains authorized using facebook auth (in minutes), if not provided, uses expire`
|
|
13776
13767
|
*/
|
|
13777
|
-
facebookExpire
|
|
13768
|
+
facebookExpire?: number;
|
|
13778
13769
|
/**
|
|
13779
13770
|
* whether to forward the user to another URL after authorized
|
|
13780
13771
|
*/
|
|
@@ -13788,11 +13779,11 @@ Please update your configurations.
|
|
|
13788
13779
|
*/
|
|
13789
13780
|
googleClientId: string;
|
|
13790
13781
|
/**
|
|
13791
|
-
* Google OAuth2 app secret. If googleClientId was provided, provide a correspoinding value. Else leave blank.
|
|
13782
|
+
* Optional if `googleEnabled`==`true`. Google OAuth2 app secret. If googleClientId was provided, provide a correspoinding value. Else leave blank.
|
|
13792
13783
|
*/
|
|
13793
13784
|
googleClientSecret: string;
|
|
13794
13785
|
/**
|
|
13795
|
-
* Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
13786
|
+
* Optional if `googleEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
13796
13787
|
*/
|
|
13797
13788
|
googleEmailDomains: string[];
|
|
13798
13789
|
/**
|
|
@@ -13800,27 +13791,27 @@ Please update your configurations.
|
|
|
13800
13791
|
*/
|
|
13801
13792
|
googleEnabled: boolean;
|
|
13802
13793
|
/**
|
|
13803
|
-
*
|
|
13794
|
+
* Optional if `googleEnabled`==`true`. Interval for which guest remains authorized using google auth (in minutes), if not provided, uses expire`
|
|
13804
13795
|
*/
|
|
13805
|
-
googleExpire
|
|
13796
|
+
googleExpire?: number;
|
|
13806
13797
|
/**
|
|
13807
|
-
*
|
|
13798
|
+
* Required if `smsProvider`==`gupshup`
|
|
13808
13799
|
*/
|
|
13809
|
-
gupshupPassword
|
|
13800
|
+
gupshupPassword?: string;
|
|
13810
13801
|
/**
|
|
13811
|
-
*
|
|
13802
|
+
* Required if `smsProvider`==`gupshup`
|
|
13812
13803
|
*/
|
|
13813
|
-
gupshupUserid
|
|
13804
|
+
gupshupUserid?: string;
|
|
13814
13805
|
/**
|
|
13815
|
-
*
|
|
13806
|
+
* Optional if `microsoftEnabled`==`true`. Microsoft 365 OAuth2 client id. This is optional. If not provided, it will use a default one.
|
|
13816
13807
|
*/
|
|
13817
13808
|
microsoftClientId: string;
|
|
13818
13809
|
/**
|
|
13819
|
-
*
|
|
13810
|
+
* Optional if `microsoftEnabled`==`true`. Microsoft 365 OAuth2 client secret. If microsoftClientId was provided, provide a correspoinding value. Else leave blank.
|
|
13820
13811
|
*/
|
|
13821
13812
|
microsoftClientSecret: string;
|
|
13822
13813
|
/**
|
|
13823
|
-
* Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
13814
|
+
* Optional if `microsoftEnabled`==`true`. Matches authenticated user email against provided domains. If null or [], all authenticated emails will be allowed.
|
|
13824
13815
|
*/
|
|
13825
13816
|
microsoftEmailDomains: string[];
|
|
13826
13817
|
/**
|
|
@@ -13828,19 +13819,19 @@ Please update your configurations.
|
|
|
13828
13819
|
*/
|
|
13829
13820
|
microsoftEnabled: boolean;
|
|
13830
13821
|
/**
|
|
13831
|
-
*
|
|
13822
|
+
* Optional if `microsoftEnabled`==`true`. Interval for which guest remains authorized using microsoft auth (in minutes), if not provided, uses expire`
|
|
13832
13823
|
*/
|
|
13833
|
-
microsoftExpire
|
|
13824
|
+
microsoftExpire?: number;
|
|
13834
13825
|
/**
|
|
13835
|
-
*
|
|
13826
|
+
* Whether password is enabled
|
|
13836
13827
|
*/
|
|
13837
13828
|
passphraseEnabled: boolean;
|
|
13838
13829
|
/**
|
|
13839
|
-
*
|
|
13830
|
+
* Optional if `passphraseEnabled`==`true`. Interval for which guest remains authorized using passphrase auth (in minutes), if not provided, uses `expire`
|
|
13840
13831
|
*/
|
|
13841
|
-
passphraseExpire
|
|
13832
|
+
passphraseExpire?: number;
|
|
13842
13833
|
/**
|
|
13843
|
-
*
|
|
13834
|
+
* Required if `passphraseEnabled`==`true`.
|
|
13844
13835
|
*/
|
|
13845
13836
|
password: string;
|
|
13846
13837
|
/**
|
|
@@ -13853,34 +13844,37 @@ Please update your configurations.
|
|
|
13853
13844
|
predefinedSponsorsHideEmail: boolean;
|
|
13854
13845
|
privacy: boolean;
|
|
13855
13846
|
/**
|
|
13856
|
-
*
|
|
13847
|
+
* Required if `smsProvider`==`puzzel`
|
|
13857
13848
|
*/
|
|
13858
|
-
puzzelPassword
|
|
13849
|
+
puzzelPassword?: string;
|
|
13859
13850
|
/**
|
|
13860
|
-
*
|
|
13851
|
+
* Required if `smsProvider`==`puzzel`
|
|
13861
13852
|
*/
|
|
13862
|
-
puzzelServiceId
|
|
13853
|
+
puzzelServiceId?: string;
|
|
13863
13854
|
/**
|
|
13864
|
-
*
|
|
13855
|
+
* Required if `smsProvider`==`puzzel`
|
|
13865
13856
|
*/
|
|
13866
|
-
puzzelUsername
|
|
13857
|
+
puzzelUsername?: string;
|
|
13867
13858
|
/**
|
|
13868
13859
|
* whether sms is enabled as a login method
|
|
13869
13860
|
*/
|
|
13870
13861
|
smsEnabled: boolean;
|
|
13871
13862
|
/**
|
|
13872
|
-
*
|
|
13863
|
+
* Optional if `smsEnabled`==`true`. Interval for which guest remains authorized using sms auth (in minutes), if not provided, uses expire`
|
|
13864
|
+
*/
|
|
13865
|
+
smsExpire?: number;
|
|
13866
|
+
/**
|
|
13867
|
+
* Optional if `smsEnabled`==`true`. SMS Message format
|
|
13873
13868
|
*/
|
|
13874
|
-
smsExpire: number;
|
|
13875
13869
|
smsMessageFormat: string;
|
|
13876
13870
|
/**
|
|
13877
|
-
* enum: `broadnet`, `clickatell`, `gupshup`, `manual`, `puzzel`, `telstra`, `twilio`
|
|
13871
|
+
* Optioanl if `smsEnabled`==`true`. enum: `broadnet`, `clickatell`, `gupshup`, `manual`, `puzzel`, `telstra`, `twilio`
|
|
13878
13872
|
*/
|
|
13879
13873
|
smsProvider: string;
|
|
13880
13874
|
/**
|
|
13881
|
-
*
|
|
13875
|
+
* Optional if `sponsorEnabled`==`true`. Whether to automatically approve guest and allow sponsor to revoke guest access, needs predefinedSponsorsEnabled enabled and sponsorNotifyAll disabled
|
|
13882
13876
|
*/
|
|
13883
|
-
sponsorAutoApprove
|
|
13877
|
+
sponsorAutoApprove?: boolean;
|
|
13884
13878
|
/**
|
|
13885
13879
|
* list of domain allowed for sponsor email. Required if `sponsorEnabled` is `true` and `sponsors` is empty.
|
|
13886
13880
|
*/
|
|
@@ -13890,19 +13884,19 @@ Please update your configurations.
|
|
|
13890
13884
|
*/
|
|
13891
13885
|
sponsorEnabled: boolean;
|
|
13892
13886
|
/**
|
|
13893
|
-
*
|
|
13887
|
+
* Optional if `sponsorEnabled`==`true`. Interval for which guest remains authorized using sponsor auth (in minutes), if not provided, uses expire`
|
|
13894
13888
|
*/
|
|
13895
|
-
sponsorExpire
|
|
13889
|
+
sponsorExpire?: number;
|
|
13896
13890
|
/**
|
|
13897
|
-
*
|
|
13891
|
+
* Optional if `sponsorEnabled`==`true`. How long to remain valid sponsored guest request approve/deny link received in email, in minutes.
|
|
13898
13892
|
*/
|
|
13899
13893
|
sponsorLinkValidityDuration: string;
|
|
13900
13894
|
/**
|
|
13901
|
-
* whether to notify all sponsors that are mentioned in `sponsors` object. Both `sponsorNotifyAll` and `predefinedSponsorsEnabled` should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
|
|
13895
|
+
* Optional if `sponsorEnabled`==`true`. whether to notify all sponsors that are mentioned in `sponsors` object. Both `sponsorNotifyAll` and `predefinedSponsorsEnabled` should be true in order to notify sponsors. If true, email sent to 10 sponsors in no particular order.
|
|
13902
13896
|
*/
|
|
13903
13897
|
sponsorNotifyAll: boolean;
|
|
13904
13898
|
/**
|
|
13905
|
-
* if enabled, guest will get email about sponsor's action (approve/deny)
|
|
13899
|
+
* Optional if `sponsorEnabled`==`true`. If enabled, guest will get email about sponsor's action (approve/deny)
|
|
13906
13900
|
*/
|
|
13907
13901
|
sponsorStatusNotify: boolean;
|
|
13908
13902
|
/**
|
|
@@ -13915,53 +13909,53 @@ Please update your configurations.
|
|
|
13915
13909
|
[key: string]: string;
|
|
13916
13910
|
};
|
|
13917
13911
|
/**
|
|
13918
|
-
* if `wlanPortalAuth`==`sso`, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
|
|
13912
|
+
* Optionl if `wlanPortalAuth`==`sso`, default role to assign if there’s no match. By default, an assertion is treated as invalid when there’s no role matched
|
|
13919
13913
|
*/
|
|
13920
13914
|
ssoDefaultRole: string;
|
|
13921
13915
|
/**
|
|
13922
|
-
* if `wlanPortalAuth`==`sso`
|
|
13916
|
+
* Optionl if `wlanPortalAuth`==`sso`
|
|
13923
13917
|
*/
|
|
13924
13918
|
ssoForcedRole: string;
|
|
13925
13919
|
/**
|
|
13926
|
-
* if `wlanPortalAuth`==`sso
|
|
13920
|
+
* Required if `wlanPortalAuth`==`sso`. IDP Cert (used to verify the signed response)
|
|
13927
13921
|
*/
|
|
13928
13922
|
ssoIdpCert: string;
|
|
13929
13923
|
/**
|
|
13930
|
-
* if `wlanPortalAuth`==`sso`, Signing algorithm for SAML Assertion. enum: `sha1`, `sha256`, `sha384`, `sha512`
|
|
13924
|
+
* Optioanl if `wlanPortalAuth`==`sso`, Signing algorithm for SAML Assertion. enum: `sha1`, `sha256`, `sha384`, `sha512`
|
|
13931
13925
|
*/
|
|
13932
13926
|
ssoIdpSignAlgo: string;
|
|
13933
13927
|
/**
|
|
13934
|
-
* if `wlanPortalAuth`==`sso`, IDP Single-Sign-On URL
|
|
13928
|
+
* Required if `wlanPortalAuth`==`sso`, IDP Single-Sign-On URL
|
|
13935
13929
|
*/
|
|
13936
13930
|
ssoIdpSsoUrl: string;
|
|
13937
13931
|
/**
|
|
13938
|
-
* if `wlanPortalAuth`==`sso`, IDP issuer URL
|
|
13932
|
+
* Required if `wlanPortalAuth`==`sso`, IDP issuer URL
|
|
13939
13933
|
*/
|
|
13940
13934
|
ssoIssuer: string;
|
|
13941
13935
|
/**
|
|
13942
|
-
* if `wlanPortalAuth`==`sso`. enum: `email`, `unspecified`
|
|
13936
|
+
* Optional if `wlanPortalAuth`==`sso`. enum: `email`, `unspecified`
|
|
13943
13937
|
*/
|
|
13944
13938
|
ssoNameidFormat: string;
|
|
13945
13939
|
/**
|
|
13946
|
-
*
|
|
13940
|
+
* Required if `smsProvider`==`telstra`, Client ID provided by Telstra
|
|
13947
13941
|
*/
|
|
13948
|
-
telstraClientId
|
|
13942
|
+
telstraClientId?: string;
|
|
13949
13943
|
/**
|
|
13950
|
-
*
|
|
13944
|
+
* Required if `smsProvider`==`telstra`, Client secret provided by Telstra
|
|
13951
13945
|
*/
|
|
13952
|
-
telstraClientSecret
|
|
13946
|
+
telstraClientSecret?: string;
|
|
13953
13947
|
/**
|
|
13954
|
-
*
|
|
13948
|
+
* Required if `smsProvider`==`twilio`, Auth token account with twilio account
|
|
13955
13949
|
*/
|
|
13956
|
-
twilioAuthToken
|
|
13950
|
+
twilioAuthToken?: string;
|
|
13957
13951
|
/**
|
|
13958
|
-
*
|
|
13952
|
+
* Required if `smsProvider`==`twilio`, Twilio phone number associated with the account. See example for accepted format.
|
|
13959
13953
|
*/
|
|
13960
|
-
twilioPhoneNumber
|
|
13954
|
+
twilioPhoneNumber?: string;
|
|
13961
13955
|
/**
|
|
13962
|
-
*
|
|
13956
|
+
* Required if `smsProvider`==`twilio`, Account SID provided by Twilio
|
|
13963
13957
|
*/
|
|
13964
|
-
twilioSid
|
|
13958
|
+
twilioSid?: string;
|
|
13965
13959
|
}
|
|
13966
13960
|
interface WlanPortalTemplatePortalTemplate {
|
|
13967
13961
|
accessCodeAlternateEmail: string;
|
|
@@ -14684,7 +14678,7 @@ Please update your configurations.
|
|
|
14684
14678
|
/**
|
|
14685
14679
|
* Minimum RSSI for client to connect, 0 means not enforcing
|
|
14686
14680
|
*/
|
|
14687
|
-
minRssi
|
|
14681
|
+
minRssi: number;
|
|
14688
14682
|
/**
|
|
14689
14683
|
* Data Rates template to apply. enum:
|
|
14690
14684
|
* * `no-legacy`: no 11b
|
|
@@ -14693,7 +14687,7 @@ Please update your configurations.
|
|
|
14693
14687
|
* * `high-density`: no 11b, no low rates
|
|
14694
14688
|
* * `custom`: user defined
|
|
14695
14689
|
*/
|
|
14696
|
-
template
|
|
14690
|
+
template: string;
|
|
14697
14691
|
/**
|
|
14698
14692
|
* if `template`==`custom`. MCS bitmasks for 4 streams (16-bit for each stream, MCS0 is least significant bit), e.g. 03ff 01ff 00ff limits VHT rates to MCS 0-9 for 1 stream, MCS 0-8 for 2 streams, and MCS 0-7 for 3 streams.
|
|
14699
14693
|
*/
|