@pulumi/keycloak 5.3.0 → 5.3.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (285) hide show
  1. package/attributeImporterIdentityProviderMapper.d.ts +46 -63
  2. package/attributeImporterIdentityProviderMapper.js +25 -33
  3. package/attributeImporterIdentityProviderMapper.js.map +1 -1
  4. package/attributeToRoleIdentityMapper.d.ts +10 -2
  5. package/attributeToRoleIdentityMapper.js +10 -2
  6. package/attributeToRoleIdentityMapper.js.map +1 -1
  7. package/authentication/bindings.d.ts +2 -0
  8. package/authentication/bindings.js +2 -0
  9. package/authentication/bindings.js.map +1 -1
  10. package/authentication/execution.d.ts +8 -2
  11. package/authentication/execution.js +8 -2
  12. package/authentication/execution.js.map +1 -1
  13. package/authentication/executionConfig.d.ts +12 -2
  14. package/authentication/executionConfig.js +12 -2
  15. package/authentication/executionConfig.js.map +1 -1
  16. package/authentication/flow.d.ts +16 -2
  17. package/authentication/flow.js +16 -2
  18. package/authentication/flow.js.map +1 -1
  19. package/authentication/subflow.d.ts +18 -2
  20. package/authentication/subflow.js +18 -2
  21. package/authentication/subflow.js.map +1 -1
  22. package/customIdentityProviderMapping.d.ts +13 -5
  23. package/customIdentityProviderMapping.js +10 -2
  24. package/customIdentityProviderMapping.js.map +1 -1
  25. package/customUserFederation.d.ts +51 -50
  26. package/customUserFederation.js +27 -14
  27. package/customUserFederation.js.map +1 -1
  28. package/defaultGroups.d.ts +19 -27
  29. package/defaultGroups.js +19 -9
  30. package/defaultGroups.js.map +1 -1
  31. package/defaultRoles.d.ts +13 -2
  32. package/defaultRoles.js +13 -2
  33. package/defaultRoles.js.map +1 -1
  34. package/genericClientProtocolMapper.d.ts +40 -37
  35. package/genericClientProtocolMapper.js +25 -13
  36. package/genericClientProtocolMapper.js.map +1 -1
  37. package/genericClientRoleMapper.d.ts +22 -2
  38. package/genericClientRoleMapper.js +22 -2
  39. package/genericClientRoleMapper.js.map +1 -1
  40. package/genericProtocolMapper.d.ts +8 -2
  41. package/genericProtocolMapper.js +8 -2
  42. package/genericProtocolMapper.js.map +1 -1
  43. package/genericRoleMapper.d.ts +22 -2
  44. package/genericRoleMapper.js +22 -2
  45. package/genericRoleMapper.js.map +1 -1
  46. package/getAuthenticationExecution.d.ts +4 -0
  47. package/getAuthenticationExecution.js +4 -0
  48. package/getAuthenticationExecution.js.map +1 -1
  49. package/getAuthenticationFlow.d.ts +4 -0
  50. package/getAuthenticationFlow.js +4 -0
  51. package/getAuthenticationFlow.js.map +1 -1
  52. package/getClientDescriptionConverter.d.ts +4 -0
  53. package/getClientDescriptionConverter.js +4 -0
  54. package/getClientDescriptionConverter.js.map +1 -1
  55. package/getGroup.d.ts +4 -62
  56. package/getGroup.js +4 -50
  57. package/getGroup.js.map +1 -1
  58. package/getRealm.d.ts +32 -10
  59. package/getRealm.js +32 -4
  60. package/getRealm.js.map +1 -1
  61. package/getRealmKeys.d.ts +8 -28
  62. package/getRealmKeys.js +8 -4
  63. package/getRealmKeys.js.map +1 -1
  64. package/getRole.d.ts +4 -65
  65. package/getRole.js +4 -44
  66. package/getRole.js.map +1 -1
  67. package/getUser.d.ts +4 -0
  68. package/getUser.js +4 -0
  69. package/getUser.js.map +1 -1
  70. package/getUserRealmRoles.d.ts +4 -0
  71. package/getUserRealmRoles.js +4 -0
  72. package/getUserRealmRoles.js.map +1 -1
  73. package/group.d.ts +35 -58
  74. package/group.js +35 -16
  75. package/group.js.map +1 -1
  76. package/groupMemberships.d.ts +27 -43
  77. package/groupMemberships.js +27 -16
  78. package/groupMemberships.js.map +1 -1
  79. package/groupPermissions.d.ts +13 -0
  80. package/groupPermissions.js +13 -0
  81. package/groupPermissions.js.map +1 -1
  82. package/groupRoles.d.ts +32 -91
  83. package/groupRoles.js +32 -55
  84. package/groupRoles.js.map +1 -1
  85. package/hardcodedAttributeIdentityProviderMapper.d.ts +2 -0
  86. package/hardcodedAttributeIdentityProviderMapper.js +2 -0
  87. package/hardcodedAttributeIdentityProviderMapper.js.map +1 -1
  88. package/hardcodedRoleIdentityMapper.d.ts +2 -0
  89. package/hardcodedRoleIdentityMapper.js +2 -0
  90. package/hardcodedRoleIdentityMapper.js.map +1 -1
  91. package/identityProviderTokenExchangeScopePermission.d.ts +10 -2
  92. package/identityProviderTokenExchangeScopePermission.js +10 -2
  93. package/identityProviderTokenExchangeScopePermission.js.map +1 -1
  94. package/ldap/customMapper.d.ts +10 -2
  95. package/ldap/customMapper.js +10 -2
  96. package/ldap/customMapper.js.map +1 -1
  97. package/ldap/fullNameMapper.d.ts +41 -54
  98. package/ldap/fullNameMapper.js +32 -18
  99. package/ldap/fullNameMapper.js.map +1 -1
  100. package/ldap/groupMapper.d.ts +55 -164
  101. package/ldap/groupMapper.js +46 -20
  102. package/ldap/groupMapper.js.map +1 -1
  103. package/ldap/hardcodedAttributeMapper.d.ts +10 -2
  104. package/ldap/hardcodedAttributeMapper.js +10 -2
  105. package/ldap/hardcodedAttributeMapper.js.map +1 -1
  106. package/ldap/hardcodedGroupMapper.d.ts +10 -2
  107. package/ldap/hardcodedGroupMapper.js +10 -2
  108. package/ldap/hardcodedGroupMapper.js.map +1 -1
  109. package/ldap/hardcodedRoleMapper.d.ts +29 -64
  110. package/ldap/hardcodedRoleMapper.js +17 -52
  111. package/ldap/hardcodedRoleMapper.js.map +1 -1
  112. package/ldap/msadLdsUserAccountControlMapper.d.ts +10 -2
  113. package/ldap/msadLdsUserAccountControlMapper.js +10 -2
  114. package/ldap/msadLdsUserAccountControlMapper.js.map +1 -1
  115. package/ldap/msadUserAccountControlMapper.d.ts +34 -32
  116. package/ldap/msadUserAccountControlMapper.js +25 -14
  117. package/ldap/msadUserAccountControlMapper.js.map +1 -1
  118. package/ldap/roleMapper.d.ts +10 -2
  119. package/ldap/roleMapper.js +10 -2
  120. package/ldap/roleMapper.js.map +1 -1
  121. package/ldap/userAttributeMapper.d.ts +60 -45
  122. package/ldap/userAttributeMapper.js +30 -15
  123. package/ldap/userAttributeMapper.js.map +1 -1
  124. package/ldap/userFederation.d.ts +125 -95
  125. package/ldap/userFederation.js +53 -20
  126. package/ldap/userFederation.js.map +1 -1
  127. package/oidc/googleIdentityProvider.d.ts +8 -2
  128. package/oidc/googleIdentityProvider.js +8 -2
  129. package/oidc/googleIdentityProvider.js.map +1 -1
  130. package/oidc/identityProvider.d.ts +8 -2
  131. package/oidc/identityProvider.js +8 -2
  132. package/oidc/identityProvider.js.map +1 -1
  133. package/openid/audienceProtocolMapper.d.ts +62 -45
  134. package/openid/audienceProtocolMapper.js +38 -21
  135. package/openid/audienceProtocolMapper.js.map +1 -1
  136. package/openid/audienceResolveProtocolMapper.d.ts +17 -3
  137. package/openid/audienceResolveProtocolMapper.js +17 -3
  138. package/openid/audienceResolveProtocolMapper.js.map +1 -1
  139. package/openid/audienceResolveProtocolMappter.d.ts +17 -3
  140. package/openid/audienceResolveProtocolMappter.js +17 -3
  141. package/openid/audienceResolveProtocolMappter.js.map +1 -1
  142. package/openid/client.d.ts +48 -431
  143. package/openid/client.js +48 -14
  144. package/openid/client.js.map +1 -1
  145. package/openid/clientAuthorizationPermission.d.ts +6 -2
  146. package/openid/clientAuthorizationPermission.js +6 -2
  147. package/openid/clientAuthorizationPermission.js.map +1 -1
  148. package/openid/clientDefaultScopes.d.ts +17 -33
  149. package/openid/clientDefaultScopes.js +17 -6
  150. package/openid/clientDefaultScopes.js.map +1 -1
  151. package/openid/clientOptionalScopes.d.ts +17 -34
  152. package/openid/clientOptionalScopes.js +17 -7
  153. package/openid/clientOptionalScopes.js.map +1 -1
  154. package/openid/clientPolicy.d.ts +2 -0
  155. package/openid/clientPolicy.js +2 -0
  156. package/openid/clientPolicy.js.map +1 -1
  157. package/openid/clientScope.d.ts +27 -67
  158. package/openid/clientScope.js +27 -13
  159. package/openid/clientScope.js.map +1 -1
  160. package/openid/clientServiceAccountRealmRole.d.ts +8 -2
  161. package/openid/clientServiceAccountRealmRole.js +8 -2
  162. package/openid/clientServiceAccountRealmRole.js.map +1 -1
  163. package/openid/clientServiceAccountRole.d.ts +8 -2
  164. package/openid/clientServiceAccountRole.js +8 -2
  165. package/openid/clientServiceAccountRole.js.map +1 -1
  166. package/openid/fullNameProtocolMapper.d.ts +49 -61
  167. package/openid/fullNameProtocolMapper.js +37 -22
  168. package/openid/fullNameProtocolMapper.js.map +1 -1
  169. package/openid/getClient.d.ts +32 -14
  170. package/openid/getClient.js +32 -2
  171. package/openid/getClient.js.map +1 -1
  172. package/openid/getClientAuthorizationPolicy.d.ts +4 -0
  173. package/openid/getClientAuthorizationPolicy.js +4 -0
  174. package/openid/getClientAuthorizationPolicy.js.map +1 -1
  175. package/openid/getClientScope.d.ts +4 -0
  176. package/openid/getClientScope.js +4 -0
  177. package/openid/getClientScope.js.map +1 -1
  178. package/openid/getClientServiceAccountUser.d.ts +4 -0
  179. package/openid/getClientServiceAccountUser.js +4 -0
  180. package/openid/getClientServiceAccountUser.js.map +1 -1
  181. package/openid/groupMembershipProtocolMapper.d.ts +53 -81
  182. package/openid/groupMembershipProtocolMapper.js +41 -24
  183. package/openid/groupMembershipProtocolMapper.js.map +1 -1
  184. package/openid/hardcodedClaimProtocolMapper.d.ts +66 -66
  185. package/openid/hardcodedClaimProtocolMapper.js +42 -24
  186. package/openid/hardcodedClaimProtocolMapper.js.map +1 -1
  187. package/openid/hardcodedRoleProtocolMapper.d.ts +48 -43
  188. package/openid/hardcodedRoleProtocolMapper.js +36 -22
  189. package/openid/hardcodedRoleProtocolMapper.js.map +1 -1
  190. package/openid/scriptProtocolMapper.d.ts +17 -3
  191. package/openid/scriptProtocolMapper.js +17 -3
  192. package/openid/scriptProtocolMapper.js.map +1 -1
  193. package/openid/userAttributeProtocolMapper.d.ts +73 -72
  194. package/openid/userAttributeProtocolMapper.js +43 -24
  195. package/openid/userAttributeProtocolMapper.js.map +1 -1
  196. package/openid/userClientRoleProtocolMapper.d.ts +17 -3
  197. package/openid/userClientRoleProtocolMapper.js +17 -3
  198. package/openid/userClientRoleProtocolMapper.js.map +1 -1
  199. package/openid/userPropertyProtocolMapper.d.ts +66 -67
  200. package/openid/userPropertyProtocolMapper.js +42 -25
  201. package/openid/userPropertyProtocolMapper.js.map +1 -1
  202. package/openid/userRealmRoleProtocolMapper.d.ts +73 -63
  203. package/openid/userRealmRoleProtocolMapper.js +43 -24
  204. package/openid/userRealmRoleProtocolMapper.js.map +1 -1
  205. package/openid/userSessionNoteProtocolMapper.d.ts +17 -3
  206. package/openid/userSessionNoteProtocolMapper.js +17 -3
  207. package/openid/userSessionNoteProtocolMapper.js.map +1 -1
  208. package/package.json +1 -1
  209. package/realm.d.ts +30 -509
  210. package/realm.js +0 -83
  211. package/realm.js.map +1 -1
  212. package/realmEvents.d.ts +20 -74
  213. package/realmEvents.js +20 -11
  214. package/realmEvents.js.map +1 -1
  215. package/realmKeystoreAesGenerated.d.ts +8 -2
  216. package/realmKeystoreAesGenerated.js +8 -2
  217. package/realmKeystoreAesGenerated.js.map +1 -1
  218. package/realmKeystoreEcdsaGenerated.d.ts +8 -2
  219. package/realmKeystoreEcdsaGenerated.js +8 -2
  220. package/realmKeystoreEcdsaGenerated.js.map +1 -1
  221. package/realmKeystoreHmacGenerated.d.ts +8 -2
  222. package/realmKeystoreHmacGenerated.js +8 -2
  223. package/realmKeystoreHmacGenerated.js.map +1 -1
  224. package/realmKeystoreJavaGenerated.d.ts +8 -2
  225. package/realmKeystoreJavaGenerated.js +8 -2
  226. package/realmKeystoreJavaGenerated.js.map +1 -1
  227. package/realmKeystoreRsa.d.ts +6 -2
  228. package/realmKeystoreRsa.js +6 -2
  229. package/realmKeystoreRsa.js.map +1 -1
  230. package/realmKeystoreRsaGenerated.d.ts +8 -2
  231. package/realmKeystoreRsaGenerated.js +8 -2
  232. package/realmKeystoreRsaGenerated.js.map +1 -1
  233. package/realmUserProfile.d.ts +2 -0
  234. package/realmUserProfile.js +2 -0
  235. package/realmUserProfile.js.map +1 -1
  236. package/requiredAction.d.ts +8 -2
  237. package/requiredAction.js +8 -2
  238. package/requiredAction.js.map +1 -1
  239. package/role.d.ts +58 -125
  240. package/role.js +58 -71
  241. package/role.js.map +1 -1
  242. package/saml/client.d.ts +46 -327
  243. package/saml/client.js +46 -12
  244. package/saml/client.js.map +1 -1
  245. package/saml/clientDefaultScope.d.ts +5 -1
  246. package/saml/clientDefaultScope.js +5 -1
  247. package/saml/clientDefaultScope.js.map +1 -1
  248. package/saml/clientScope.d.ts +10 -2
  249. package/saml/clientScope.js +10 -2
  250. package/saml/clientScope.js.map +1 -1
  251. package/saml/getClient.d.ts +4 -0
  252. package/saml/getClient.js +4 -0
  253. package/saml/getClient.js.map +1 -1
  254. package/saml/getClientInstallationProvider.d.ts +4 -0
  255. package/saml/getClientInstallationProvider.js +4 -0
  256. package/saml/getClientInstallationProvider.js.map +1 -1
  257. package/saml/identityProvider.d.ts +163 -117
  258. package/saml/identityProvider.js +52 -21
  259. package/saml/identityProvider.js.map +1 -1
  260. package/saml/scriptProtocolMapper.d.ts +13 -3
  261. package/saml/scriptProtocolMapper.js +13 -3
  262. package/saml/scriptProtocolMapper.js.map +1 -1
  263. package/saml/userAttributeProtocolMapper.d.ts +32 -91
  264. package/saml/userAttributeProtocolMapper.js +32 -19
  265. package/saml/userAttributeProtocolMapper.js.map +1 -1
  266. package/saml/userPropertyProtocolMapper.d.ts +32 -91
  267. package/saml/userPropertyProtocolMapper.js +32 -19
  268. package/saml/userPropertyProtocolMapper.js.map +1 -1
  269. package/types/input.d.ts +74 -183
  270. package/types/output.d.ts +44 -207
  271. package/user.d.ts +36 -112
  272. package/user.js +36 -22
  273. package/user.js.map +1 -1
  274. package/userGroups.d.ts +9 -1
  275. package/userGroups.js +9 -1
  276. package/userGroups.js.map +1 -1
  277. package/userRoles.d.ts +11 -2
  278. package/userRoles.js +11 -2
  279. package/userRoles.js.map +1 -1
  280. package/userTemplateImporterIdentityProviderMapper.d.ts +10 -2
  281. package/userTemplateImporterIdentityProviderMapper.js +10 -2
  282. package/userTemplateImporterIdentityProviderMapper.js.map +1 -1
  283. package/usersPermissions.d.ts +10 -25
  284. package/usersPermissions.js +10 -25
  285. package/usersPermissions.js.map +1 -1
package/types/input.d.ts CHANGED
@@ -104,50 +104,110 @@ export interface GetRealmSmtpServerAuthArgs {
104
104
  }
105
105
  export interface GetRealmWebAuthnPasswordlessPolicy {
106
106
  acceptableAaguids?: string[];
107
+ /**
108
+ * Either none, indirect or direct
109
+ */
107
110
  attestationConveyancePreference?: string;
111
+ /**
112
+ * Either platform or cross-platform
113
+ */
108
114
  authenticatorAttachment?: string;
109
115
  avoidSameAuthenticatorRegister?: boolean;
110
116
  createTimeout?: number;
111
117
  relyingPartyEntityName?: string;
112
118
  relyingPartyId?: string;
119
+ /**
120
+ * Either Yes or No
121
+ */
113
122
  requireResidentKey?: string;
123
+ /**
124
+ * Keycloak lists ES256, ES384, ES512, RS256, ES384, ES512 at the time of writing
125
+ */
114
126
  signatureAlgorithms?: string[];
127
+ /**
128
+ * Either required, preferred or discouraged
129
+ */
115
130
  userVerificationRequirement?: string;
116
131
  }
117
132
  export interface GetRealmWebAuthnPasswordlessPolicyArgs {
118
133
  acceptableAaguids?: pulumi.Input<pulumi.Input<string>[]>;
134
+ /**
135
+ * Either none, indirect or direct
136
+ */
119
137
  attestationConveyancePreference?: pulumi.Input<string>;
138
+ /**
139
+ * Either platform or cross-platform
140
+ */
120
141
  authenticatorAttachment?: pulumi.Input<string>;
121
142
  avoidSameAuthenticatorRegister?: pulumi.Input<boolean>;
122
143
  createTimeout?: pulumi.Input<number>;
123
144
  relyingPartyEntityName?: pulumi.Input<string>;
124
145
  relyingPartyId?: pulumi.Input<string>;
146
+ /**
147
+ * Either Yes or No
148
+ */
125
149
  requireResidentKey?: pulumi.Input<string>;
150
+ /**
151
+ * Keycloak lists ES256, ES384, ES512, RS256, ES384, ES512 at the time of writing
152
+ */
126
153
  signatureAlgorithms?: pulumi.Input<pulumi.Input<string>[]>;
154
+ /**
155
+ * Either required, preferred or discouraged
156
+ */
127
157
  userVerificationRequirement?: pulumi.Input<string>;
128
158
  }
129
159
  export interface GetRealmWebAuthnPolicy {
130
160
  acceptableAaguids?: string[];
161
+ /**
162
+ * Either none, indirect or direct
163
+ */
131
164
  attestationConveyancePreference?: string;
165
+ /**
166
+ * Either platform or cross-platform
167
+ */
132
168
  authenticatorAttachment?: string;
133
169
  avoidSameAuthenticatorRegister?: boolean;
134
170
  createTimeout?: number;
135
171
  relyingPartyEntityName?: string;
136
172
  relyingPartyId?: string;
173
+ /**
174
+ * Either Yes or No
175
+ */
137
176
  requireResidentKey?: string;
177
+ /**
178
+ * Keycloak lists ES256, ES384, ES512, RS256, ES384, ES512 at the time of writing
179
+ */
138
180
  signatureAlgorithms?: string[];
181
+ /**
182
+ * Either required, preferred or discouraged
183
+ */
139
184
  userVerificationRequirement?: string;
140
185
  }
141
186
  export interface GetRealmWebAuthnPolicyArgs {
142
187
  acceptableAaguids?: pulumi.Input<pulumi.Input<string>[]>;
188
+ /**
189
+ * Either none, indirect or direct
190
+ */
143
191
  attestationConveyancePreference?: pulumi.Input<string>;
192
+ /**
193
+ * Either platform or cross-platform
194
+ */
144
195
  authenticatorAttachment?: pulumi.Input<string>;
145
196
  avoidSameAuthenticatorRegister?: pulumi.Input<boolean>;
146
197
  createTimeout?: pulumi.Input<number>;
147
198
  relyingPartyEntityName?: pulumi.Input<string>;
148
199
  relyingPartyId?: pulumi.Input<string>;
200
+ /**
201
+ * Either Yes or No
202
+ */
149
203
  requireResidentKey?: pulumi.Input<string>;
204
+ /**
205
+ * Keycloak lists ES256, ES384, ES512, RS256, ES384, ES512 at the time of writing
206
+ */
150
207
  signatureAlgorithms?: pulumi.Input<pulumi.Input<string>[]>;
208
+ /**
209
+ * Either required, preferred or discouraged
210
+ */
151
211
  userVerificationRequirement?: pulumi.Input<string>;
152
212
  }
153
213
  export interface GroupPermissionsManageMembersScope {
@@ -176,38 +236,20 @@ export interface GroupPermissionsViewScope {
176
236
  policies?: pulumi.Input<pulumi.Input<string>[]>;
177
237
  }
178
238
  export interface RealmInternationalization {
179
- /**
180
- * The locale to use by default. This locale code must be present within the `supportedLocales` list.
181
- */
182
239
  defaultLocale: pulumi.Input<string>;
183
- /**
184
- * A list of [ISO 639-1](https://en.wikipedia.org/wiki/List_of_ISO_639-1_codes) locale codes that the realm should support.
185
- */
186
240
  supportedLocales: pulumi.Input<pulumi.Input<string>[]>;
187
241
  }
188
242
  export interface RealmOtpPolicy {
189
243
  /**
190
- * What hashing algorithm should be used to generate the OTP, Valid options are `HmacSHA1`,`HmacSHA256` and `HmacSHA512`. Defaults to `HmacSHA1`.
244
+ * What hashing algorithm should be used to generate the OTP.
191
245
  */
192
246
  algorithm?: pulumi.Input<string>;
193
- /**
194
- * How many digits the OTP have. Defaults to `6`.
195
- */
196
247
  digits?: pulumi.Input<number>;
197
- /**
198
- * What should the initial counter value be. Defaults to `2`.
199
- */
200
248
  initialCounter?: pulumi.Input<number>;
201
- /**
202
- * How far ahead should the server look just in case the token generator and server are out of time sync or counter sync. Defaults to `1`.
203
- */
204
249
  lookAheadWindow?: pulumi.Input<number>;
205
- /**
206
- * How many seconds should an OTP token be valid. Defaults to `30`.
207
- */
208
250
  period?: pulumi.Input<number>;
209
251
  /**
210
- * One Time Password Type, supported Values are `totp` for Time-Based One Time Password and `hotp` for Counter Based. Defaults to `totp`.
252
+ * OTP Type, totp for Time-Based One Time Password or hotp for counter base one time password
211
253
  */
212
254
  type?: pulumi.Input<string>;
213
255
  }
@@ -216,117 +258,38 @@ export interface RealmSecurityDefenses {
216
258
  headers?: pulumi.Input<inputs.RealmSecurityDefensesHeaders>;
217
259
  }
218
260
  export interface RealmSecurityDefensesBruteForceDetection {
219
- /**
220
- * When will failure count be reset?
221
- */
222
261
  failureResetTimeSeconds?: pulumi.Input<number>;
223
262
  maxFailureWaitSeconds?: pulumi.Input<number>;
224
- /**
225
- * How many failures before wait is triggered.
226
- */
227
263
  maxLoginFailures?: pulumi.Input<number>;
228
- /**
229
- * How long to wait after a quick login failure.
230
- * - `maxFailureWaitSeconds ` - (Optional) Max. time a user will be locked out.
231
- */
232
264
  minimumQuickLoginWaitSeconds?: pulumi.Input<number>;
233
- /**
234
- * When `true`, this will lock the user permanently when the user exceeds the maximum login failures.
235
- */
236
265
  permanentLockout?: pulumi.Input<boolean>;
237
- /**
238
- * Configures the amount of time, in milliseconds, for consecutive failures to lock a user out.
239
- */
240
266
  quickLoginCheckMilliSeconds?: pulumi.Input<number>;
241
- /**
242
- * This represents the amount of time a user should be locked out when the login failure threshold has been met.
243
- */
244
267
  waitIncrementSeconds?: pulumi.Input<number>;
245
268
  }
246
269
  export interface RealmSecurityDefensesHeaders {
247
- /**
248
- * Sets the Content Security Policy, which can be used for prevent pages from being included by non-origin iframes. More information can be found in the [W3C-CSP](https://www.w3.org/TR/CSP/) Abstract.
249
- */
250
270
  contentSecurityPolicy?: pulumi.Input<string>;
251
- /**
252
- * Used for testing Content Security Policies.
253
- */
254
271
  contentSecurityPolicyReportOnly?: pulumi.Input<string>;
255
- /**
256
- * The Referrer-Policy HTTP header controls how much referrer information (sent with the Referer header) should be included with requests.
257
- */
258
272
  referrerPolicy?: pulumi.Input<string>;
259
- /**
260
- * The Script-Transport-Security HTTP header tells browsers to always use HTTPS.
261
- */
262
273
  strictTransportSecurity?: pulumi.Input<string>;
263
- /**
264
- * Sets the X-Content-Type-Options, which can be used for prevent MIME-sniffing a response away from the declared content-type
265
- */
266
274
  xContentTypeOptions?: pulumi.Input<string>;
267
- /**
268
- * Sets the x-frame-option, which can be used to prevent pages from being included by non-origin iframes. More information can be found in the [RFC7034](https://tools.ietf.org/html/rfc7034)
269
- */
270
275
  xFrameOptions?: pulumi.Input<string>;
271
- /**
272
- * Prevent pages from appearing in search engines.
273
- */
274
276
  xRobotsTag?: pulumi.Input<string>;
275
- /**
276
- * This header configures the Cross-site scripting (XSS) filter in your browser.
277
- */
278
277
  xXssProtection?: pulumi.Input<string>;
279
278
  }
280
279
  export interface RealmSmtpServer {
281
- /**
282
- * Enables authentication to the SMTP server. This block supports the following arguments:
283
- */
284
280
  auth?: pulumi.Input<inputs.RealmSmtpServerAuth>;
285
- /**
286
- * The email address uses for bounces.
287
- */
288
281
  envelopeFrom?: pulumi.Input<string>;
289
- /**
290
- * The email address for the sender.
291
- */
292
282
  from: pulumi.Input<string>;
293
- /**
294
- * The display name of the sender email address.
295
- */
296
283
  fromDisplayName?: pulumi.Input<string>;
297
- /**
298
- * The host of the SMTP server.
299
- */
300
284
  host: pulumi.Input<string>;
301
- /**
302
- * The port of the SMTP server (defaults to 25).
303
- */
304
285
  port?: pulumi.Input<string>;
305
- /**
306
- * The "reply to" email address.
307
- */
308
286
  replyTo?: pulumi.Input<string>;
309
- /**
310
- * The display name of the "reply to" email address.
311
- */
312
287
  replyToDisplayName?: pulumi.Input<string>;
313
- /**
314
- * When `true`, enables SSL. Defaults to `false`.
315
- */
316
288
  ssl?: pulumi.Input<boolean>;
317
- /**
318
- * When `true`, enables StartTLS. Defaults to `false`.
319
- */
320
289
  starttls?: pulumi.Input<boolean>;
321
290
  }
322
291
  export interface RealmSmtpServerAuth {
323
- /**
324
- * The SMTP server password.
325
- */
326
292
  password: pulumi.Input<string>;
327
- /**
328
- * The SMTP server username.
329
- */
330
293
  username: pulumi.Input<string>;
331
294
  }
332
295
  export interface RealmUserProfileAttribute {
@@ -412,111 +375,66 @@ export interface RealmUserProfileGroup {
412
375
  name: pulumi.Input<string>;
413
376
  }
414
377
  export interface RealmWebAuthnPasswordlessPolicy {
415
- /**
416
- * A set of AAGUIDs for which an authenticator can be registered.
417
- */
418
378
  acceptableAaguids?: pulumi.Input<pulumi.Input<string>[]>;
419
379
  /**
420
- * The preference of how to generate a WebAuthn attestation statement. Valid options are `not specified`, `none`, `indirect`, `direct`, or `enterprise`. Defaults to `not specified`.
380
+ * Either none, indirect or direct
421
381
  */
422
382
  attestationConveyancePreference?: pulumi.Input<string>;
423
383
  /**
424
- * The acceptable attachment pattern for the WebAuthn authenticator. Valid options are `not specified`, `platform`, or `cross-platform`. Defaults to `not specified`.
384
+ * Either platform or cross-platform
425
385
  */
426
386
  authenticatorAttachment?: pulumi.Input<string>;
427
- /**
428
- * When `true`, Keycloak will avoid registering the authenticator for WebAuthn if it has already been registered. Defaults to `false`.
429
- */
430
387
  avoidSameAuthenticatorRegister?: pulumi.Input<boolean>;
431
- /**
432
- * The timeout value for creating a user's public key credential in seconds. When set to `0`, this timeout option is not adapted. Defaults to `0`.
433
- */
434
388
  createTimeout?: pulumi.Input<number>;
435
- /**
436
- * A human readable server name for the WebAuthn Relying Party. Defaults to `keycloak`.
437
- */
438
389
  relyingPartyEntityName?: pulumi.Input<string>;
439
- /**
440
- * The WebAuthn relying party ID.
441
- */
442
390
  relyingPartyId?: pulumi.Input<string>;
443
391
  /**
444
- * Specifies whether or not a public key should be created to represent the resident key. Valid options are `not specified`, `Yes`, or `No`. Defaults to `not specified`.
392
+ * Either Yes or No
445
393
  */
446
394
  requireResidentKey?: pulumi.Input<string>;
447
395
  /**
448
- * A set of signature algorithms that should be used for the authentication assertion. Valid options at the time these docs were written are `ES256`, `ES384`, `ES512`, `RS256`, `RS384`, `RS512`, and `RS1`.
396
+ * Keycloak lists ES256, ES384, ES512, RS256, RS384, RS512, RS1 at the time of writing
449
397
  */
450
398
  signatureAlgorithms?: pulumi.Input<pulumi.Input<string>[]>;
451
399
  /**
452
- * Specifies the policy for verifying a user logging in via WebAuthn. Valid options are `not specified`, `required`, `preferred`, or `discouraged`. Defaults to `not specified`.
400
+ * Either required, preferred or discouraged
453
401
  */
454
402
  userVerificationRequirement?: pulumi.Input<string>;
455
403
  }
456
404
  export interface RealmWebAuthnPolicy {
457
- /**
458
- * A set of AAGUIDs for which an authenticator can be registered.
459
- */
460
405
  acceptableAaguids?: pulumi.Input<pulumi.Input<string>[]>;
461
406
  /**
462
- * The preference of how to generate a WebAuthn attestation statement. Valid options are `not specified`, `none`, `indirect`, `direct`, or `enterprise`. Defaults to `not specified`.
407
+ * Either none, indirect or direct
463
408
  */
464
409
  attestationConveyancePreference?: pulumi.Input<string>;
465
410
  /**
466
- * The acceptable attachment pattern for the WebAuthn authenticator. Valid options are `not specified`, `platform`, or `cross-platform`. Defaults to `not specified`.
411
+ * Either platform or cross-platform
467
412
  */
468
413
  authenticatorAttachment?: pulumi.Input<string>;
469
- /**
470
- * When `true`, Keycloak will avoid registering the authenticator for WebAuthn if it has already been registered. Defaults to `false`.
471
- */
472
414
  avoidSameAuthenticatorRegister?: pulumi.Input<boolean>;
473
- /**
474
- * The timeout value for creating a user's public key credential in seconds. When set to `0`, this timeout option is not adapted. Defaults to `0`.
475
- */
476
415
  createTimeout?: pulumi.Input<number>;
477
- /**
478
- * A human readable server name for the WebAuthn Relying Party. Defaults to `keycloak`.
479
- */
480
416
  relyingPartyEntityName?: pulumi.Input<string>;
481
- /**
482
- * The WebAuthn relying party ID.
483
- */
484
417
  relyingPartyId?: pulumi.Input<string>;
485
418
  /**
486
- * Specifies whether or not a public key should be created to represent the resident key. Valid options are `not specified`, `Yes`, or `No`. Defaults to `not specified`.
419
+ * Either Yes or No
487
420
  */
488
421
  requireResidentKey?: pulumi.Input<string>;
489
422
  /**
490
- * A set of signature algorithms that should be used for the authentication assertion. Valid options at the time these docs were written are `ES256`, `ES384`, `ES512`, `RS256`, `RS384`, `RS512`, and `RS1`.
423
+ * Keycloak lists ES256, ES384, ES512, RS256, RS384, RS512, RS1 at the time of writing
491
424
  */
492
425
  signatureAlgorithms?: pulumi.Input<pulumi.Input<string>[]>;
493
426
  /**
494
- * Specifies the policy for verifying a user logging in via WebAuthn. Valid options are `not specified`, `required`, `preferred`, or `discouraged`. Defaults to `not specified`.
427
+ * Either required, preferred or discouraged
495
428
  */
496
429
  userVerificationRequirement?: pulumi.Input<string>;
497
430
  }
498
431
  export interface UserFederatedIdentity {
499
- /**
500
- * The name of the identity provider
501
- */
502
432
  identityProvider: pulumi.Input<string>;
503
- /**
504
- * The ID of the user defined in the identity provider
505
- */
506
433
  userId: pulumi.Input<string>;
507
- /**
508
- * The user name of the user defined in the identity provider
509
- */
510
434
  userName: pulumi.Input<string>;
511
435
  }
512
436
  export interface UserInitialPassword {
513
- /**
514
- * If set to `true`, the initial password is set up for renewal on first use. Default to `false`.
515
- */
516
437
  temporary?: pulumi.Input<boolean>;
517
- /**
518
- * The initial password.
519
- */
520
438
  value: pulumi.Input<string>;
521
439
  }
522
440
  export interface UsersPermissionsImpersonateScope {
@@ -552,7 +470,7 @@ export interface UsersPermissionsViewScope {
552
470
  export declare namespace ldap {
553
471
  interface UserFederationCache {
554
472
  /**
555
- * Day of the week the entry will become invalid on
473
+ * Day of the week the entry will become invalid on.
556
474
  */
557
475
  evictionDay?: pulumi.Input<number>;
558
476
  /**
@@ -567,14 +485,11 @@ export declare namespace ldap {
567
485
  * Max lifespan of cache entry (duration string).
568
486
  */
569
487
  maxLifespan?: pulumi.Input<string>;
570
- /**
571
- * Can be one of `DEFAULT`, `EVICT_DAILY`, `EVICT_WEEKLY`, `MAX_LIFESPAN`, or `NO_CACHE`. Defaults to `DEFAULT`.
572
- */
573
488
  policy?: pulumi.Input<string>;
574
489
  }
575
490
  interface UserFederationKerberos {
576
491
  /**
577
- * The name of the kerberos realm, e.g. FOO.LOCAL.
492
+ * The name of the kerberos realm, e.g. FOO.LOCAL
578
493
  */
579
494
  kerberosRealm: pulumi.Input<string>;
580
495
  /**
@@ -593,31 +508,13 @@ export declare namespace ldap {
593
508
  }
594
509
  export declare namespace openid {
595
510
  interface ClientAuthenticationFlowBindingOverrides {
596
- /**
597
- * Browser flow id, (flow needs to exist)
598
- */
599
511
  browserId?: pulumi.Input<string>;
600
- /**
601
- * Direct grant flow id (flow needs to exist)
602
- */
603
512
  directGrantId?: pulumi.Input<string>;
604
513
  }
605
514
  interface ClientAuthorization {
606
- /**
607
- * When `true`, resources can be managed remotely by the resource server. Defaults to `false`.
608
- */
609
515
  allowRemoteResourceManagement?: pulumi.Input<boolean>;
610
- /**
611
- * Dictates how the policies associated with a given permission are evaluated and how a final decision is obtained. Could be one of `AFFIRMATIVE`, `CONSENSUS`, or `UNANIMOUS`. Applies to permissions.
612
- */
613
516
  decisionStrategy?: pulumi.Input<string>;
614
- /**
615
- * When `true`, defaults set by Keycloak will be respected. Defaults to `false`.
616
- */
617
517
  keepDefaults?: pulumi.Input<boolean>;
618
- /**
619
- * Dictates how policies are enforced when evaluating authorization requests. Can be one of `ENFORCING`, `PERMISSIVE`, or `DISABLED`.
620
- */
621
518
  policyEnforcementMode: pulumi.Input<string>;
622
519
  }
623
520
  interface ClientGroupPolicyGroup {
@@ -667,13 +564,7 @@ export declare namespace openid {
667
564
  }
668
565
  export declare namespace saml {
669
566
  interface ClientAuthenticationFlowBindingOverrides {
670
- /**
671
- * Browser flow id, (flow needs to exist)
672
- */
673
567
  browserId?: pulumi.Input<string>;
674
- /**
675
- * Direct grant flow id (flow needs to exist)
676
- */
677
568
  directGrantId?: pulumi.Input<string>;
678
569
  }
679
570
  }