@pulumi/juniper-mist 0.8.0 → 0.8.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/types/input.d.ts CHANGED
@@ -7618,6 +7618,188 @@ export declare namespace org {
7618
7618
  */
7619
7619
  vcMac?: pulumi.Input<string>;
7620
7620
  }
7621
+ interface MxclusterMistDas {
7622
+ /**
7623
+ * Dynamic authorization clients configured to send CoA|DM to mist edges on port 3799
7624
+ */
7625
+ coaServers?: pulumi.Input<pulumi.Input<inputs.org.MxclusterMistDasCoaServer>[]>;
7626
+ enabled?: pulumi.Input<boolean>;
7627
+ }
7628
+ interface MxclusterMistDasCoaServer {
7629
+ /**
7630
+ * Whether to disable Event-Timestamp Check
7631
+ */
7632
+ disableEventTimestampCheck?: pulumi.Input<boolean>;
7633
+ enabled?: pulumi.Input<boolean>;
7634
+ /**
7635
+ * This server configured to send CoA|DM to mist edges
7636
+ */
7637
+ host?: pulumi.Input<string>;
7638
+ /**
7639
+ * Mist edges will allow this host on this port
7640
+ */
7641
+ port?: pulumi.Input<number>;
7642
+ /**
7643
+ * Whether to require Message-Authenticator in requests
7644
+ */
7645
+ requireMessageAuthenticator?: pulumi.Input<boolean>;
7646
+ secret?: pulumi.Input<string>;
7647
+ }
7648
+ interface MxclusterMistNac {
7649
+ acctServerPort?: pulumi.Input<number>;
7650
+ authServerPort?: pulumi.Input<number>;
7651
+ /**
7652
+ * Property key is the RADIUS Client IP/Subnet.
7653
+ */
7654
+ clientIps?: pulumi.Input<{
7655
+ [key: string]: pulumi.Input<inputs.org.MxclusterMistNacClientIps>;
7656
+ }>;
7657
+ enabled?: pulumi.Input<boolean>;
7658
+ secret?: pulumi.Input<string>;
7659
+ }
7660
+ interface MxclusterMistNacClientIps {
7661
+ }
7662
+ interface MxclusterMxedgeMgmt {
7663
+ configAutoRevert?: pulumi.Input<boolean>;
7664
+ fipsEnabled?: pulumi.Input<boolean>;
7665
+ mistPassword?: pulumi.Input<string>;
7666
+ /**
7667
+ * enum: `dhcp`, `disabled`, `static`
7668
+ */
7669
+ oobIpType?: pulumi.Input<string>;
7670
+ /**
7671
+ * enum: `autoconf`, `dhcp`, `disabled`, `static`
7672
+ */
7673
+ oobIpType6?: pulumi.Input<string>;
7674
+ rootPassword?: pulumi.Input<string>;
7675
+ }
7676
+ interface MxclusterProxy {
7677
+ disabled?: pulumi.Input<boolean>;
7678
+ url?: pulumi.Input<string>;
7679
+ }
7680
+ interface MxclusterRadsec {
7681
+ /**
7682
+ * List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
7683
+ */
7684
+ acctServers?: pulumi.Input<pulumi.Input<inputs.org.MxclusterRadsecAcctServer>[]>;
7685
+ /**
7686
+ * List of RADIUS authentication servers, order matters where the first one is treated as primary
7687
+ */
7688
+ authServers?: pulumi.Input<pulumi.Input<inputs.org.MxclusterRadsecAuthServer>[]>;
7689
+ /**
7690
+ * Whether to enable service on Mist Edge i.e. RADIUS proxy over TLS
7691
+ */
7692
+ enabled?: pulumi.Input<boolean>;
7693
+ /**
7694
+ * Whether to match ssid in request message to select from a subset of RADIUS servers
7695
+ */
7696
+ matchSsid?: pulumi.Input<boolean>;
7697
+ /**
7698
+ * SSpecify NAS-IP-ADDRESS, NAS-IPv6-ADDRESS to use with auth_servers. enum: `any`, `oob`, `oob6`, `tunnel`, `tunnel6`
7699
+ */
7700
+ nasIpSource?: pulumi.Input<string>;
7701
+ /**
7702
+ * Hostnames or IPs for Mist AP to use as the TLS Server (i.e. they are reachable from AP) in addition to `tuntermHosts`
7703
+ */
7704
+ proxyHosts?: pulumi.Input<pulumi.Input<string>[]>;
7705
+ /**
7706
+ * When ordered, Mist Edge will prefer and go back to the first radius server if possible. enum: `ordered`, `unordered`
7707
+ */
7708
+ serverSelection?: pulumi.Input<string>;
7709
+ /**
7710
+ * Specify IP address to connect to authServers and acct_servers. enum: `any`, `oob`, `oob6`, `tunnel`, `tunnel6`
7711
+ */
7712
+ srcIpSource?: pulumi.Input<string>;
7713
+ }
7714
+ interface MxclusterRadsecAcctServer {
7715
+ /**
7716
+ * IP / hostname of RADIUS server
7717
+ */
7718
+ host?: pulumi.Input<string>;
7719
+ /**
7720
+ * Acct port of RADIUS server
7721
+ */
7722
+ port?: pulumi.Input<number>;
7723
+ /**
7724
+ * Secret of RADIUS server
7725
+ */
7726
+ secret?: pulumi.Input<string>;
7727
+ /**
7728
+ * List of ssids that will use this server if matchSsid is true and match is found
7729
+ */
7730
+ ssids?: pulumi.Input<pulumi.Input<string>[]>;
7731
+ }
7732
+ interface MxclusterRadsecAuthServer {
7733
+ /**
7734
+ * IP / hostname of RADIUS server
7735
+ */
7736
+ host?: pulumi.Input<string>;
7737
+ /**
7738
+ * Whether to enable inband status check
7739
+ */
7740
+ inbandStatusCheck?: pulumi.Input<boolean>;
7741
+ /**
7742
+ * Inband status interval, in seconds
7743
+ */
7744
+ inbandStatusInterval?: pulumi.Input<number>;
7745
+ /**
7746
+ * If used for Mist APs, enable keywrap algorithm. Default is false
7747
+ */
7748
+ keywrapEnabled?: pulumi.Input<boolean>;
7749
+ /**
7750
+ * if used for Mist APs. enum: `ascii`, `hex`
7751
+ */
7752
+ keywrapFormat?: pulumi.Input<string>;
7753
+ /**
7754
+ * If used for Mist APs, encryption key
7755
+ */
7756
+ keywrapKek?: pulumi.Input<string>;
7757
+ /**
7758
+ * If used for Mist APs, Message Authentication Code Key
7759
+ */
7760
+ keywrapMack?: pulumi.Input<string>;
7761
+ /**
7762
+ * Auth port of RADIUS server
7763
+ */
7764
+ port?: pulumi.Input<number>;
7765
+ /**
7766
+ * Authentication request retry
7767
+ */
7768
+ retry?: pulumi.Input<number>;
7769
+ /**
7770
+ * Secret of RADIUS server
7771
+ */
7772
+ secret?: pulumi.Input<string>;
7773
+ /**
7774
+ * List of ssids that will use this server if matchSsid is true and match is found
7775
+ */
7776
+ ssids?: pulumi.Input<pulumi.Input<string>[]>;
7777
+ /**
7778
+ * Authentication request timeout, in seconds
7779
+ */
7780
+ timeout?: pulumi.Input<number>;
7781
+ }
7782
+ interface MxclusterRadsecTls {
7783
+ keypair?: pulumi.Input<string>;
7784
+ }
7785
+ interface MxclusterTuntermDhcpdConfig {
7786
+ enabled?: pulumi.Input<boolean>;
7787
+ servers?: pulumi.Input<pulumi.Input<string>[]>;
7788
+ /**
7789
+ * enum: `relay`
7790
+ */
7791
+ type?: pulumi.Input<string>;
7792
+ }
7793
+ interface MxclusterTuntermExtraRoutes {
7794
+ via?: pulumi.Input<string>;
7795
+ }
7796
+ interface MxclusterTuntermMonitoring {
7797
+ host: pulumi.Input<string>;
7798
+ port: pulumi.Input<number>;
7799
+ protocol: pulumi.Input<string>;
7800
+ srcVlanId: pulumi.Input<number>;
7801
+ timeout: pulumi.Input<number>;
7802
+ }
7621
7803
  interface MxedgeMxedgeMgmt {
7622
7804
  configAutoRevert?: pulumi.Input<boolean>;
7623
7805
  fipsEnabled?: pulumi.Input<boolean>;
@@ -7768,6 +7950,59 @@ export declare namespace org {
7768
7950
  mxagent?: pulumi.Input<string>;
7769
7951
  tunterm?: pulumi.Input<string>;
7770
7952
  }
7953
+ interface NacPortalPortal {
7954
+ /**
7955
+ * Guest portal authentication type. enum: `external`, `multi`, `none`
7956
+ */
7957
+ auth?: pulumi.Input<string>;
7958
+ /**
7959
+ * If `auth`==`none` or `auth`==`multi`, whether to expire the guest after a certain time
7960
+ */
7961
+ expire?: pulumi.Input<number>;
7962
+ /**
7963
+ * If `auth`==`external`, the URL to redirect the user to for authentication
7964
+ */
7965
+ externalPortalUrl?: pulumi.Input<string>;
7966
+ /**
7967
+ * Disconnect client (workaround for reauth issues)
7968
+ */
7969
+ forceReconnect?: pulumi.Input<boolean>;
7970
+ /**
7971
+ * If `auth`==`none` or `auth`==`multi`, whether to forward the user to the guest portal after authentication
7972
+ */
7973
+ forward?: pulumi.Input<boolean>;
7974
+ /**
7975
+ * If `auth`==`none` or `auth`==`multi`, URL to forward the user to after authentication
7976
+ */
7977
+ forwardUrl?: pulumi.Input<string>;
7978
+ /**
7979
+ * Maximum number of clients allowed per guest. 0 (default, unlimited), 1-100 range
7980
+ */
7981
+ maxNumDevices?: pulumi.Input<number>;
7982
+ /**
7983
+ * If `auth`==`none` or `auth`==`multi`, whether to show the privacy policy
7984
+ */
7985
+ privacy?: pulumi.Input<boolean>;
7986
+ }
7987
+ interface NacPortalSso {
7988
+ idpCert?: pulumi.Input<string>;
7989
+ /**
7990
+ * Signing algorithm for SAML Assertion. enum: `sha1`, `sha256`, `sha384`, `sha512`.
7991
+ */
7992
+ idpSignAlgo?: pulumi.Input<string>;
7993
+ idpSsoUrl?: pulumi.Input<string>;
7994
+ issuer?: pulumi.Input<string>;
7995
+ nameidFormat?: pulumi.Input<string>;
7996
+ ssoRoleMatchings?: pulumi.Input<pulumi.Input<inputs.org.NacPortalSsoSsoRoleMatching>[]>;
7997
+ /**
7998
+ * If it's desired to inject a role into Cert's Subject (so it can be used later on in policy)
7999
+ */
8000
+ useSsoRoleForCert?: pulumi.Input<boolean>;
8001
+ }
8002
+ interface NacPortalSsoSsoRoleMatching {
8003
+ assigned?: pulumi.Input<string>;
8004
+ match?: pulumi.Input<string>;
8005
+ }
7771
8006
  interface NacruleMatching {
7772
8007
  /**
7773
8008
  * enum: `cert`, `device-auth`, `eap-teap`, `eap-tls`, `eap-ttls`, `idp`, `mab`, `eap-peap`
package/types/output.d.ts CHANGED
@@ -12698,6 +12698,188 @@ export declare namespace org {
12698
12698
  */
12699
12699
  vcMac: string;
12700
12700
  }
12701
+ interface MxclusterMistDas {
12702
+ /**
12703
+ * Dynamic authorization clients configured to send CoA|DM to mist edges on port 3799
12704
+ */
12705
+ coaServers?: outputs.org.MxclusterMistDasCoaServer[];
12706
+ enabled: boolean;
12707
+ }
12708
+ interface MxclusterMistDasCoaServer {
12709
+ /**
12710
+ * Whether to disable Event-Timestamp Check
12711
+ */
12712
+ disableEventTimestampCheck: boolean;
12713
+ enabled?: boolean;
12714
+ /**
12715
+ * This server configured to send CoA|DM to mist edges
12716
+ */
12717
+ host?: string;
12718
+ /**
12719
+ * Mist edges will allow this host on this port
12720
+ */
12721
+ port: number;
12722
+ /**
12723
+ * Whether to require Message-Authenticator in requests
12724
+ */
12725
+ requireMessageAuthenticator: boolean;
12726
+ secret?: string;
12727
+ }
12728
+ interface MxclusterMistNac {
12729
+ acctServerPort: number;
12730
+ authServerPort: number;
12731
+ /**
12732
+ * Property key is the RADIUS Client IP/Subnet.
12733
+ */
12734
+ clientIps: {
12735
+ [key: string]: outputs.org.MxclusterMistNacClientIps;
12736
+ };
12737
+ enabled: boolean;
12738
+ secret?: string;
12739
+ }
12740
+ interface MxclusterMistNacClientIps {
12741
+ }
12742
+ interface MxclusterMxedgeMgmt {
12743
+ configAutoRevert: boolean;
12744
+ fipsEnabled: boolean;
12745
+ mistPassword?: string;
12746
+ /**
12747
+ * enum: `dhcp`, `disabled`, `static`
12748
+ */
12749
+ oobIpType: string;
12750
+ /**
12751
+ * enum: `autoconf`, `dhcp`, `disabled`, `static`
12752
+ */
12753
+ oobIpType6: string;
12754
+ rootPassword?: string;
12755
+ }
12756
+ interface MxclusterProxy {
12757
+ disabled: boolean;
12758
+ url?: string;
12759
+ }
12760
+ interface MxclusterRadsec {
12761
+ /**
12762
+ * List of RADIUS accounting servers, optional, order matters where the first one is treated as primary
12763
+ */
12764
+ acctServers?: outputs.org.MxclusterRadsecAcctServer[];
12765
+ /**
12766
+ * List of RADIUS authentication servers, order matters where the first one is treated as primary
12767
+ */
12768
+ authServers?: outputs.org.MxclusterRadsecAuthServer[];
12769
+ /**
12770
+ * Whether to enable service on Mist Edge i.e. RADIUS proxy over TLS
12771
+ */
12772
+ enabled?: boolean;
12773
+ /**
12774
+ * Whether to match ssid in request message to select from a subset of RADIUS servers
12775
+ */
12776
+ matchSsid?: boolean;
12777
+ /**
12778
+ * SSpecify NAS-IP-ADDRESS, NAS-IPv6-ADDRESS to use with auth_servers. enum: `any`, `oob`, `oob6`, `tunnel`, `tunnel6`
12779
+ */
12780
+ nasIpSource: string;
12781
+ /**
12782
+ * Hostnames or IPs for Mist AP to use as the TLS Server (i.e. they are reachable from AP) in addition to `tuntermHosts`
12783
+ */
12784
+ proxyHosts?: string[];
12785
+ /**
12786
+ * When ordered, Mist Edge will prefer and go back to the first radius server if possible. enum: `ordered`, `unordered`
12787
+ */
12788
+ serverSelection: string;
12789
+ /**
12790
+ * Specify IP address to connect to authServers and acct_servers. enum: `any`, `oob`, `oob6`, `tunnel`, `tunnel6`
12791
+ */
12792
+ srcIpSource: string;
12793
+ }
12794
+ interface MxclusterRadsecAcctServer {
12795
+ /**
12796
+ * IP / hostname of RADIUS server
12797
+ */
12798
+ host?: string;
12799
+ /**
12800
+ * Acct port of RADIUS server
12801
+ */
12802
+ port: number;
12803
+ /**
12804
+ * Secret of RADIUS server
12805
+ */
12806
+ secret?: string;
12807
+ /**
12808
+ * List of ssids that will use this server if matchSsid is true and match is found
12809
+ */
12810
+ ssids?: string[];
12811
+ }
12812
+ interface MxclusterRadsecAuthServer {
12813
+ /**
12814
+ * IP / hostname of RADIUS server
12815
+ */
12816
+ host?: string;
12817
+ /**
12818
+ * Whether to enable inband status check
12819
+ */
12820
+ inbandStatusCheck: boolean;
12821
+ /**
12822
+ * Inband status interval, in seconds
12823
+ */
12824
+ inbandStatusInterval: number;
12825
+ /**
12826
+ * If used for Mist APs, enable keywrap algorithm. Default is false
12827
+ */
12828
+ keywrapEnabled?: boolean;
12829
+ /**
12830
+ * if used for Mist APs. enum: `ascii`, `hex`
12831
+ */
12832
+ keywrapFormat: string;
12833
+ /**
12834
+ * If used for Mist APs, encryption key
12835
+ */
12836
+ keywrapKek?: string;
12837
+ /**
12838
+ * If used for Mist APs, Message Authentication Code Key
12839
+ */
12840
+ keywrapMack?: string;
12841
+ /**
12842
+ * Auth port of RADIUS server
12843
+ */
12844
+ port: number;
12845
+ /**
12846
+ * Authentication request retry
12847
+ */
12848
+ retry: number;
12849
+ /**
12850
+ * Secret of RADIUS server
12851
+ */
12852
+ secret?: string;
12853
+ /**
12854
+ * List of ssids that will use this server if matchSsid is true and match is found
12855
+ */
12856
+ ssids?: string[];
12857
+ /**
12858
+ * Authentication request timeout, in seconds
12859
+ */
12860
+ timeout: number;
12861
+ }
12862
+ interface MxclusterRadsecTls {
12863
+ keypair?: string;
12864
+ }
12865
+ interface MxclusterTuntermDhcpdConfig {
12866
+ enabled: boolean;
12867
+ servers?: string[];
12868
+ /**
12869
+ * enum: `relay`
12870
+ */
12871
+ type: string;
12872
+ }
12873
+ interface MxclusterTuntermExtraRoutes {
12874
+ via?: string;
12875
+ }
12876
+ interface MxclusterTuntermMonitoring {
12877
+ host: string;
12878
+ port: number;
12879
+ protocol: string;
12880
+ srcVlanId: number;
12881
+ timeout: number;
12882
+ }
12701
12883
  interface MxedgeMxedgeMgmt {
12702
12884
  configAutoRevert: boolean;
12703
12885
  fipsEnabled: boolean;
@@ -12848,6 +13030,59 @@ export declare namespace org {
12848
13030
  mxagent: string;
12849
13031
  tunterm: string;
12850
13032
  }
13033
+ interface NacPortalPortal {
13034
+ /**
13035
+ * Guest portal authentication type. enum: `external`, `multi`, `none`
13036
+ */
13037
+ auth?: string;
13038
+ /**
13039
+ * If `auth`==`none` or `auth`==`multi`, whether to expire the guest after a certain time
13040
+ */
13041
+ expire?: number;
13042
+ /**
13043
+ * If `auth`==`external`, the URL to redirect the user to for authentication
13044
+ */
13045
+ externalPortalUrl?: string;
13046
+ /**
13047
+ * Disconnect client (workaround for reauth issues)
13048
+ */
13049
+ forceReconnect?: boolean;
13050
+ /**
13051
+ * If `auth`==`none` or `auth`==`multi`, whether to forward the user to the guest portal after authentication
13052
+ */
13053
+ forward?: boolean;
13054
+ /**
13055
+ * If `auth`==`none` or `auth`==`multi`, URL to forward the user to after authentication
13056
+ */
13057
+ forwardUrl?: string;
13058
+ /**
13059
+ * Maximum number of clients allowed per guest. 0 (default, unlimited), 1-100 range
13060
+ */
13061
+ maxNumDevices: number;
13062
+ /**
13063
+ * If `auth`==`none` or `auth`==`multi`, whether to show the privacy policy
13064
+ */
13065
+ privacy?: boolean;
13066
+ }
13067
+ interface NacPortalSso {
13068
+ idpCert?: string;
13069
+ /**
13070
+ * Signing algorithm for SAML Assertion. enum: `sha1`, `sha256`, `sha384`, `sha512`.
13071
+ */
13072
+ idpSignAlgo: string;
13073
+ idpSsoUrl?: string;
13074
+ issuer?: string;
13075
+ nameidFormat?: string;
13076
+ ssoRoleMatchings?: outputs.org.NacPortalSsoSsoRoleMatching[];
13077
+ /**
13078
+ * If it's desired to inject a role into Cert's Subject (so it can be used later on in policy)
13079
+ */
13080
+ useSsoRoleForCert?: boolean;
13081
+ }
13082
+ interface NacPortalSsoSsoRoleMatching {
13083
+ assigned?: string;
13084
+ match?: string;
13085
+ }
12851
13086
  interface NacruleMatching {
12852
13087
  /**
12853
13088
  * enum: `cert`, `device-auth`, `eap-teap`, `eap-tls`, `eap-ttls`, `idp`, `mab`, `eap-peap`