@pulumi/keycloak 5.3.0 → 5.3.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/attributeImporterIdentityProviderMapper.d.ts +46 -63
- package/attributeImporterIdentityProviderMapper.js +25 -33
- package/attributeImporterIdentityProviderMapper.js.map +1 -1
- package/attributeToRoleIdentityMapper.d.ts +10 -2
- package/attributeToRoleIdentityMapper.js +10 -2
- package/attributeToRoleIdentityMapper.js.map +1 -1
- package/authentication/bindings.d.ts +2 -0
- package/authentication/bindings.js +2 -0
- package/authentication/bindings.js.map +1 -1
- package/authentication/execution.d.ts +8 -2
- package/authentication/execution.js +8 -2
- package/authentication/execution.js.map +1 -1
- package/authentication/executionConfig.d.ts +12 -2
- package/authentication/executionConfig.js +12 -2
- package/authentication/executionConfig.js.map +1 -1
- package/authentication/flow.d.ts +16 -2
- package/authentication/flow.js +16 -2
- package/authentication/flow.js.map +1 -1
- package/authentication/subflow.d.ts +18 -2
- package/authentication/subflow.js +18 -2
- package/authentication/subflow.js.map +1 -1
- package/customIdentityProviderMapping.d.ts +13 -5
- package/customIdentityProviderMapping.js +10 -2
- package/customIdentityProviderMapping.js.map +1 -1
- package/customUserFederation.d.ts +51 -50
- package/customUserFederation.js +27 -14
- package/customUserFederation.js.map +1 -1
- package/defaultGroups.d.ts +19 -27
- package/defaultGroups.js +19 -9
- package/defaultGroups.js.map +1 -1
- package/defaultRoles.d.ts +13 -2
- package/defaultRoles.js +13 -2
- package/defaultRoles.js.map +1 -1
- package/genericClientProtocolMapper.d.ts +40 -37
- package/genericClientProtocolMapper.js +25 -13
- package/genericClientProtocolMapper.js.map +1 -1
- package/genericClientRoleMapper.d.ts +22 -2
- package/genericClientRoleMapper.js +22 -2
- package/genericClientRoleMapper.js.map +1 -1
- package/genericProtocolMapper.d.ts +8 -2
- package/genericProtocolMapper.js +8 -2
- package/genericProtocolMapper.js.map +1 -1
- package/genericRoleMapper.d.ts +22 -2
- package/genericRoleMapper.js +22 -2
- package/genericRoleMapper.js.map +1 -1
- package/getAuthenticationExecution.d.ts +4 -0
- package/getAuthenticationExecution.js +4 -0
- package/getAuthenticationExecution.js.map +1 -1
- package/getAuthenticationFlow.d.ts +4 -0
- package/getAuthenticationFlow.js +4 -0
- package/getAuthenticationFlow.js.map +1 -1
- package/getClientDescriptionConverter.d.ts +4 -0
- package/getClientDescriptionConverter.js +4 -0
- package/getClientDescriptionConverter.js.map +1 -1
- package/getGroup.d.ts +4 -62
- package/getGroup.js +4 -50
- package/getGroup.js.map +1 -1
- package/getRealm.d.ts +32 -10
- package/getRealm.js +32 -4
- package/getRealm.js.map +1 -1
- package/getRealmKeys.d.ts +8 -28
- package/getRealmKeys.js +8 -4
- package/getRealmKeys.js.map +1 -1
- package/getRole.d.ts +4 -65
- package/getRole.js +4 -44
- package/getRole.js.map +1 -1
- package/getUser.d.ts +4 -0
- package/getUser.js +4 -0
- package/getUser.js.map +1 -1
- package/getUserRealmRoles.d.ts +4 -0
- package/getUserRealmRoles.js +4 -0
- package/getUserRealmRoles.js.map +1 -1
- package/group.d.ts +35 -58
- package/group.js +35 -16
- package/group.js.map +1 -1
- package/groupMemberships.d.ts +27 -43
- package/groupMemberships.js +27 -16
- package/groupMemberships.js.map +1 -1
- package/groupPermissions.d.ts +13 -0
- package/groupPermissions.js +13 -0
- package/groupPermissions.js.map +1 -1
- package/groupRoles.d.ts +32 -91
- package/groupRoles.js +32 -55
- package/groupRoles.js.map +1 -1
- package/hardcodedAttributeIdentityProviderMapper.d.ts +2 -0
- package/hardcodedAttributeIdentityProviderMapper.js +2 -0
- package/hardcodedAttributeIdentityProviderMapper.js.map +1 -1
- package/hardcodedRoleIdentityMapper.d.ts +2 -0
- package/hardcodedRoleIdentityMapper.js +2 -0
- package/hardcodedRoleIdentityMapper.js.map +1 -1
- package/identityProviderTokenExchangeScopePermission.d.ts +10 -2
- package/identityProviderTokenExchangeScopePermission.js +10 -2
- package/identityProviderTokenExchangeScopePermission.js.map +1 -1
- package/ldap/customMapper.d.ts +10 -2
- package/ldap/customMapper.js +10 -2
- package/ldap/customMapper.js.map +1 -1
- package/ldap/fullNameMapper.d.ts +41 -54
- package/ldap/fullNameMapper.js +32 -18
- package/ldap/fullNameMapper.js.map +1 -1
- package/ldap/groupMapper.d.ts +55 -164
- package/ldap/groupMapper.js +46 -20
- package/ldap/groupMapper.js.map +1 -1
- package/ldap/hardcodedAttributeMapper.d.ts +10 -2
- package/ldap/hardcodedAttributeMapper.js +10 -2
- package/ldap/hardcodedAttributeMapper.js.map +1 -1
- package/ldap/hardcodedGroupMapper.d.ts +10 -2
- package/ldap/hardcodedGroupMapper.js +10 -2
- package/ldap/hardcodedGroupMapper.js.map +1 -1
- package/ldap/hardcodedRoleMapper.d.ts +29 -64
- package/ldap/hardcodedRoleMapper.js +17 -52
- package/ldap/hardcodedRoleMapper.js.map +1 -1
- package/ldap/msadLdsUserAccountControlMapper.d.ts +10 -2
- package/ldap/msadLdsUserAccountControlMapper.js +10 -2
- package/ldap/msadLdsUserAccountControlMapper.js.map +1 -1
- package/ldap/msadUserAccountControlMapper.d.ts +34 -32
- package/ldap/msadUserAccountControlMapper.js +25 -14
- package/ldap/msadUserAccountControlMapper.js.map +1 -1
- package/ldap/roleMapper.d.ts +10 -2
- package/ldap/roleMapper.js +10 -2
- package/ldap/roleMapper.js.map +1 -1
- package/ldap/userAttributeMapper.d.ts +60 -45
- package/ldap/userAttributeMapper.js +30 -15
- package/ldap/userAttributeMapper.js.map +1 -1
- package/ldap/userFederation.d.ts +125 -95
- package/ldap/userFederation.js +53 -20
- package/ldap/userFederation.js.map +1 -1
- package/oidc/googleIdentityProvider.d.ts +8 -2
- package/oidc/googleIdentityProvider.js +8 -2
- package/oidc/googleIdentityProvider.js.map +1 -1
- package/oidc/identityProvider.d.ts +8 -2
- package/oidc/identityProvider.js +8 -2
- package/oidc/identityProvider.js.map +1 -1
- package/openid/audienceProtocolMapper.d.ts +62 -45
- package/openid/audienceProtocolMapper.js +38 -21
- package/openid/audienceProtocolMapper.js.map +1 -1
- package/openid/audienceResolveProtocolMapper.d.ts +17 -3
- package/openid/audienceResolveProtocolMapper.js +17 -3
- package/openid/audienceResolveProtocolMapper.js.map +1 -1
- package/openid/audienceResolveProtocolMappter.d.ts +17 -3
- package/openid/audienceResolveProtocolMappter.js +17 -3
- package/openid/audienceResolveProtocolMappter.js.map +1 -1
- package/openid/client.d.ts +48 -431
- package/openid/client.js +48 -14
- package/openid/client.js.map +1 -1
- package/openid/clientAuthorizationPermission.d.ts +6 -2
- package/openid/clientAuthorizationPermission.js +6 -2
- package/openid/clientAuthorizationPermission.js.map +1 -1
- package/openid/clientDefaultScopes.d.ts +17 -33
- package/openid/clientDefaultScopes.js +17 -6
- package/openid/clientDefaultScopes.js.map +1 -1
- package/openid/clientOptionalScopes.d.ts +17 -34
- package/openid/clientOptionalScopes.js +17 -7
- package/openid/clientOptionalScopes.js.map +1 -1
- package/openid/clientPolicy.d.ts +2 -0
- package/openid/clientPolicy.js +2 -0
- package/openid/clientPolicy.js.map +1 -1
- package/openid/clientScope.d.ts +27 -67
- package/openid/clientScope.js +27 -13
- package/openid/clientScope.js.map +1 -1
- package/openid/clientServiceAccountRealmRole.d.ts +8 -2
- package/openid/clientServiceAccountRealmRole.js +8 -2
- package/openid/clientServiceAccountRealmRole.js.map +1 -1
- package/openid/clientServiceAccountRole.d.ts +8 -2
- package/openid/clientServiceAccountRole.js +8 -2
- package/openid/clientServiceAccountRole.js.map +1 -1
- package/openid/fullNameProtocolMapper.d.ts +49 -61
- package/openid/fullNameProtocolMapper.js +37 -22
- package/openid/fullNameProtocolMapper.js.map +1 -1
- package/openid/getClient.d.ts +32 -14
- package/openid/getClient.js +32 -2
- package/openid/getClient.js.map +1 -1
- package/openid/getClientAuthorizationPolicy.d.ts +4 -0
- package/openid/getClientAuthorizationPolicy.js +4 -0
- package/openid/getClientAuthorizationPolicy.js.map +1 -1
- package/openid/getClientScope.d.ts +4 -0
- package/openid/getClientScope.js +4 -0
- package/openid/getClientScope.js.map +1 -1
- package/openid/getClientServiceAccountUser.d.ts +4 -0
- package/openid/getClientServiceAccountUser.js +4 -0
- package/openid/getClientServiceAccountUser.js.map +1 -1
- package/openid/groupMembershipProtocolMapper.d.ts +53 -81
- package/openid/groupMembershipProtocolMapper.js +41 -24
- package/openid/groupMembershipProtocolMapper.js.map +1 -1
- package/openid/hardcodedClaimProtocolMapper.d.ts +66 -66
- package/openid/hardcodedClaimProtocolMapper.js +42 -24
- package/openid/hardcodedClaimProtocolMapper.js.map +1 -1
- package/openid/hardcodedRoleProtocolMapper.d.ts +48 -43
- package/openid/hardcodedRoleProtocolMapper.js +36 -22
- package/openid/hardcodedRoleProtocolMapper.js.map +1 -1
- package/openid/scriptProtocolMapper.d.ts +17 -3
- package/openid/scriptProtocolMapper.js +17 -3
- package/openid/scriptProtocolMapper.js.map +1 -1
- package/openid/userAttributeProtocolMapper.d.ts +73 -72
- package/openid/userAttributeProtocolMapper.js +43 -24
- package/openid/userAttributeProtocolMapper.js.map +1 -1
- package/openid/userClientRoleProtocolMapper.d.ts +17 -3
- package/openid/userClientRoleProtocolMapper.js +17 -3
- package/openid/userClientRoleProtocolMapper.js.map +1 -1
- package/openid/userPropertyProtocolMapper.d.ts +66 -67
- package/openid/userPropertyProtocolMapper.js +42 -25
- package/openid/userPropertyProtocolMapper.js.map +1 -1
- package/openid/userRealmRoleProtocolMapper.d.ts +73 -63
- package/openid/userRealmRoleProtocolMapper.js +43 -24
- package/openid/userRealmRoleProtocolMapper.js.map +1 -1
- package/openid/userSessionNoteProtocolMapper.d.ts +17 -3
- package/openid/userSessionNoteProtocolMapper.js +17 -3
- package/openid/userSessionNoteProtocolMapper.js.map +1 -1
- package/package.json +1 -1
- package/realm.d.ts +30 -509
- package/realm.js +0 -83
- package/realm.js.map +1 -1
- package/realmEvents.d.ts +20 -74
- package/realmEvents.js +20 -11
- package/realmEvents.js.map +1 -1
- package/realmKeystoreAesGenerated.d.ts +8 -2
- package/realmKeystoreAesGenerated.js +8 -2
- package/realmKeystoreAesGenerated.js.map +1 -1
- package/realmKeystoreEcdsaGenerated.d.ts +8 -2
- package/realmKeystoreEcdsaGenerated.js +8 -2
- package/realmKeystoreEcdsaGenerated.js.map +1 -1
- package/realmKeystoreHmacGenerated.d.ts +8 -2
- package/realmKeystoreHmacGenerated.js +8 -2
- package/realmKeystoreHmacGenerated.js.map +1 -1
- package/realmKeystoreJavaGenerated.d.ts +8 -2
- package/realmKeystoreJavaGenerated.js +8 -2
- package/realmKeystoreJavaGenerated.js.map +1 -1
- package/realmKeystoreRsa.d.ts +6 -2
- package/realmKeystoreRsa.js +6 -2
- package/realmKeystoreRsa.js.map +1 -1
- package/realmKeystoreRsaGenerated.d.ts +8 -2
- package/realmKeystoreRsaGenerated.js +8 -2
- package/realmKeystoreRsaGenerated.js.map +1 -1
- package/realmUserProfile.d.ts +2 -0
- package/realmUserProfile.js +2 -0
- package/realmUserProfile.js.map +1 -1
- package/requiredAction.d.ts +8 -2
- package/requiredAction.js +8 -2
- package/requiredAction.js.map +1 -1
- package/role.d.ts +58 -125
- package/role.js +58 -71
- package/role.js.map +1 -1
- package/saml/client.d.ts +46 -327
- package/saml/client.js +46 -12
- package/saml/client.js.map +1 -1
- package/saml/clientDefaultScope.d.ts +5 -1
- package/saml/clientDefaultScope.js +5 -1
- package/saml/clientDefaultScope.js.map +1 -1
- package/saml/clientScope.d.ts +10 -2
- package/saml/clientScope.js +10 -2
- package/saml/clientScope.js.map +1 -1
- package/saml/getClient.d.ts +4 -0
- package/saml/getClient.js +4 -0
- package/saml/getClient.js.map +1 -1
- package/saml/getClientInstallationProvider.d.ts +4 -0
- package/saml/getClientInstallationProvider.js +4 -0
- package/saml/getClientInstallationProvider.js.map +1 -1
- package/saml/identityProvider.d.ts +163 -117
- package/saml/identityProvider.js +52 -21
- package/saml/identityProvider.js.map +1 -1
- package/saml/scriptProtocolMapper.d.ts +13 -3
- package/saml/scriptProtocolMapper.js +13 -3
- package/saml/scriptProtocolMapper.js.map +1 -1
- package/saml/userAttributeProtocolMapper.d.ts +32 -91
- package/saml/userAttributeProtocolMapper.js +32 -19
- package/saml/userAttributeProtocolMapper.js.map +1 -1
- package/saml/userPropertyProtocolMapper.d.ts +32 -91
- package/saml/userPropertyProtocolMapper.js +32 -19
- package/saml/userPropertyProtocolMapper.js.map +1 -1
- package/types/input.d.ts +74 -183
- package/types/output.d.ts +44 -207
- package/user.d.ts +36 -112
- package/user.js +36 -22
- package/user.js.map +1 -1
- package/userGroups.d.ts +9 -1
- package/userGroups.js +9 -1
- package/userGroups.js.map +1 -1
- package/userRoles.d.ts +11 -2
- package/userRoles.js +11 -2
- package/userRoles.js.map +1 -1
- package/userTemplateImporterIdentityProviderMapper.d.ts +10 -2
- package/userTemplateImporterIdentityProviderMapper.js +10 -2
- package/userTemplateImporterIdentityProviderMapper.js.map +1 -1
- package/usersPermissions.d.ts +10 -25
- package/usersPermissions.js +10 -25
- package/usersPermissions.js.map +1 -1
package/types/input.d.ts
CHANGED
|
@@ -104,50 +104,110 @@ export interface GetRealmSmtpServerAuthArgs {
|
|
|
104
104
|
}
|
|
105
105
|
export interface GetRealmWebAuthnPasswordlessPolicy {
|
|
106
106
|
acceptableAaguids?: string[];
|
|
107
|
+
/**
|
|
108
|
+
* Either none, indirect or direct
|
|
109
|
+
*/
|
|
107
110
|
attestationConveyancePreference?: string;
|
|
111
|
+
/**
|
|
112
|
+
* Either platform or cross-platform
|
|
113
|
+
*/
|
|
108
114
|
authenticatorAttachment?: string;
|
|
109
115
|
avoidSameAuthenticatorRegister?: boolean;
|
|
110
116
|
createTimeout?: number;
|
|
111
117
|
relyingPartyEntityName?: string;
|
|
112
118
|
relyingPartyId?: string;
|
|
119
|
+
/**
|
|
120
|
+
* Either Yes or No
|
|
121
|
+
*/
|
|
113
122
|
requireResidentKey?: string;
|
|
123
|
+
/**
|
|
124
|
+
* Keycloak lists ES256, ES384, ES512, RS256, ES384, ES512 at the time of writing
|
|
125
|
+
*/
|
|
114
126
|
signatureAlgorithms?: string[];
|
|
127
|
+
/**
|
|
128
|
+
* Either required, preferred or discouraged
|
|
129
|
+
*/
|
|
115
130
|
userVerificationRequirement?: string;
|
|
116
131
|
}
|
|
117
132
|
export interface GetRealmWebAuthnPasswordlessPolicyArgs {
|
|
118
133
|
acceptableAaguids?: pulumi.Input<pulumi.Input<string>[]>;
|
|
134
|
+
/**
|
|
135
|
+
* Either none, indirect or direct
|
|
136
|
+
*/
|
|
119
137
|
attestationConveyancePreference?: pulumi.Input<string>;
|
|
138
|
+
/**
|
|
139
|
+
* Either platform or cross-platform
|
|
140
|
+
*/
|
|
120
141
|
authenticatorAttachment?: pulumi.Input<string>;
|
|
121
142
|
avoidSameAuthenticatorRegister?: pulumi.Input<boolean>;
|
|
122
143
|
createTimeout?: pulumi.Input<number>;
|
|
123
144
|
relyingPartyEntityName?: pulumi.Input<string>;
|
|
124
145
|
relyingPartyId?: pulumi.Input<string>;
|
|
146
|
+
/**
|
|
147
|
+
* Either Yes or No
|
|
148
|
+
*/
|
|
125
149
|
requireResidentKey?: pulumi.Input<string>;
|
|
150
|
+
/**
|
|
151
|
+
* Keycloak lists ES256, ES384, ES512, RS256, ES384, ES512 at the time of writing
|
|
152
|
+
*/
|
|
126
153
|
signatureAlgorithms?: pulumi.Input<pulumi.Input<string>[]>;
|
|
154
|
+
/**
|
|
155
|
+
* Either required, preferred or discouraged
|
|
156
|
+
*/
|
|
127
157
|
userVerificationRequirement?: pulumi.Input<string>;
|
|
128
158
|
}
|
|
129
159
|
export interface GetRealmWebAuthnPolicy {
|
|
130
160
|
acceptableAaguids?: string[];
|
|
161
|
+
/**
|
|
162
|
+
* Either none, indirect or direct
|
|
163
|
+
*/
|
|
131
164
|
attestationConveyancePreference?: string;
|
|
165
|
+
/**
|
|
166
|
+
* Either platform or cross-platform
|
|
167
|
+
*/
|
|
132
168
|
authenticatorAttachment?: string;
|
|
133
169
|
avoidSameAuthenticatorRegister?: boolean;
|
|
134
170
|
createTimeout?: number;
|
|
135
171
|
relyingPartyEntityName?: string;
|
|
136
172
|
relyingPartyId?: string;
|
|
173
|
+
/**
|
|
174
|
+
* Either Yes or No
|
|
175
|
+
*/
|
|
137
176
|
requireResidentKey?: string;
|
|
177
|
+
/**
|
|
178
|
+
* Keycloak lists ES256, ES384, ES512, RS256, ES384, ES512 at the time of writing
|
|
179
|
+
*/
|
|
138
180
|
signatureAlgorithms?: string[];
|
|
181
|
+
/**
|
|
182
|
+
* Either required, preferred or discouraged
|
|
183
|
+
*/
|
|
139
184
|
userVerificationRequirement?: string;
|
|
140
185
|
}
|
|
141
186
|
export interface GetRealmWebAuthnPolicyArgs {
|
|
142
187
|
acceptableAaguids?: pulumi.Input<pulumi.Input<string>[]>;
|
|
188
|
+
/**
|
|
189
|
+
* Either none, indirect or direct
|
|
190
|
+
*/
|
|
143
191
|
attestationConveyancePreference?: pulumi.Input<string>;
|
|
192
|
+
/**
|
|
193
|
+
* Either platform or cross-platform
|
|
194
|
+
*/
|
|
144
195
|
authenticatorAttachment?: pulumi.Input<string>;
|
|
145
196
|
avoidSameAuthenticatorRegister?: pulumi.Input<boolean>;
|
|
146
197
|
createTimeout?: pulumi.Input<number>;
|
|
147
198
|
relyingPartyEntityName?: pulumi.Input<string>;
|
|
148
199
|
relyingPartyId?: pulumi.Input<string>;
|
|
200
|
+
/**
|
|
201
|
+
* Either Yes or No
|
|
202
|
+
*/
|
|
149
203
|
requireResidentKey?: pulumi.Input<string>;
|
|
204
|
+
/**
|
|
205
|
+
* Keycloak lists ES256, ES384, ES512, RS256, ES384, ES512 at the time of writing
|
|
206
|
+
*/
|
|
150
207
|
signatureAlgorithms?: pulumi.Input<pulumi.Input<string>[]>;
|
|
208
|
+
/**
|
|
209
|
+
* Either required, preferred or discouraged
|
|
210
|
+
*/
|
|
151
211
|
userVerificationRequirement?: pulumi.Input<string>;
|
|
152
212
|
}
|
|
153
213
|
export interface GroupPermissionsManageMembersScope {
|
|
@@ -176,38 +236,20 @@ export interface GroupPermissionsViewScope {
|
|
|
176
236
|
policies?: pulumi.Input<pulumi.Input<string>[]>;
|
|
177
237
|
}
|
|
178
238
|
export interface RealmInternationalization {
|
|
179
|
-
/**
|
|
180
|
-
* The locale to use by default. This locale code must be present within the `supportedLocales` list.
|
|
181
|
-
*/
|
|
182
239
|
defaultLocale: pulumi.Input<string>;
|
|
183
|
-
/**
|
|
184
|
-
* A list of [ISO 639-1](https://en.wikipedia.org/wiki/List_of_ISO_639-1_codes) locale codes that the realm should support.
|
|
185
|
-
*/
|
|
186
240
|
supportedLocales: pulumi.Input<pulumi.Input<string>[]>;
|
|
187
241
|
}
|
|
188
242
|
export interface RealmOtpPolicy {
|
|
189
243
|
/**
|
|
190
|
-
* What hashing algorithm should be used to generate the OTP
|
|
244
|
+
* What hashing algorithm should be used to generate the OTP.
|
|
191
245
|
*/
|
|
192
246
|
algorithm?: pulumi.Input<string>;
|
|
193
|
-
/**
|
|
194
|
-
* How many digits the OTP have. Defaults to `6`.
|
|
195
|
-
*/
|
|
196
247
|
digits?: pulumi.Input<number>;
|
|
197
|
-
/**
|
|
198
|
-
* What should the initial counter value be. Defaults to `2`.
|
|
199
|
-
*/
|
|
200
248
|
initialCounter?: pulumi.Input<number>;
|
|
201
|
-
/**
|
|
202
|
-
* How far ahead should the server look just in case the token generator and server are out of time sync or counter sync. Defaults to `1`.
|
|
203
|
-
*/
|
|
204
249
|
lookAheadWindow?: pulumi.Input<number>;
|
|
205
|
-
/**
|
|
206
|
-
* How many seconds should an OTP token be valid. Defaults to `30`.
|
|
207
|
-
*/
|
|
208
250
|
period?: pulumi.Input<number>;
|
|
209
251
|
/**
|
|
210
|
-
*
|
|
252
|
+
* OTP Type, totp for Time-Based One Time Password or hotp for counter base one time password
|
|
211
253
|
*/
|
|
212
254
|
type?: pulumi.Input<string>;
|
|
213
255
|
}
|
|
@@ -216,117 +258,38 @@ export interface RealmSecurityDefenses {
|
|
|
216
258
|
headers?: pulumi.Input<inputs.RealmSecurityDefensesHeaders>;
|
|
217
259
|
}
|
|
218
260
|
export interface RealmSecurityDefensesBruteForceDetection {
|
|
219
|
-
/**
|
|
220
|
-
* When will failure count be reset?
|
|
221
|
-
*/
|
|
222
261
|
failureResetTimeSeconds?: pulumi.Input<number>;
|
|
223
262
|
maxFailureWaitSeconds?: pulumi.Input<number>;
|
|
224
|
-
/**
|
|
225
|
-
* How many failures before wait is triggered.
|
|
226
|
-
*/
|
|
227
263
|
maxLoginFailures?: pulumi.Input<number>;
|
|
228
|
-
/**
|
|
229
|
-
* How long to wait after a quick login failure.
|
|
230
|
-
* - `maxFailureWaitSeconds ` - (Optional) Max. time a user will be locked out.
|
|
231
|
-
*/
|
|
232
264
|
minimumQuickLoginWaitSeconds?: pulumi.Input<number>;
|
|
233
|
-
/**
|
|
234
|
-
* When `true`, this will lock the user permanently when the user exceeds the maximum login failures.
|
|
235
|
-
*/
|
|
236
265
|
permanentLockout?: pulumi.Input<boolean>;
|
|
237
|
-
/**
|
|
238
|
-
* Configures the amount of time, in milliseconds, for consecutive failures to lock a user out.
|
|
239
|
-
*/
|
|
240
266
|
quickLoginCheckMilliSeconds?: pulumi.Input<number>;
|
|
241
|
-
/**
|
|
242
|
-
* This represents the amount of time a user should be locked out when the login failure threshold has been met.
|
|
243
|
-
*/
|
|
244
267
|
waitIncrementSeconds?: pulumi.Input<number>;
|
|
245
268
|
}
|
|
246
269
|
export interface RealmSecurityDefensesHeaders {
|
|
247
|
-
/**
|
|
248
|
-
* Sets the Content Security Policy, which can be used for prevent pages from being included by non-origin iframes. More information can be found in the [W3C-CSP](https://www.w3.org/TR/CSP/) Abstract.
|
|
249
|
-
*/
|
|
250
270
|
contentSecurityPolicy?: pulumi.Input<string>;
|
|
251
|
-
/**
|
|
252
|
-
* Used for testing Content Security Policies.
|
|
253
|
-
*/
|
|
254
271
|
contentSecurityPolicyReportOnly?: pulumi.Input<string>;
|
|
255
|
-
/**
|
|
256
|
-
* The Referrer-Policy HTTP header controls how much referrer information (sent with the Referer header) should be included with requests.
|
|
257
|
-
*/
|
|
258
272
|
referrerPolicy?: pulumi.Input<string>;
|
|
259
|
-
/**
|
|
260
|
-
* The Script-Transport-Security HTTP header tells browsers to always use HTTPS.
|
|
261
|
-
*/
|
|
262
273
|
strictTransportSecurity?: pulumi.Input<string>;
|
|
263
|
-
/**
|
|
264
|
-
* Sets the X-Content-Type-Options, which can be used for prevent MIME-sniffing a response away from the declared content-type
|
|
265
|
-
*/
|
|
266
274
|
xContentTypeOptions?: pulumi.Input<string>;
|
|
267
|
-
/**
|
|
268
|
-
* Sets the x-frame-option, which can be used to prevent pages from being included by non-origin iframes. More information can be found in the [RFC7034](https://tools.ietf.org/html/rfc7034)
|
|
269
|
-
*/
|
|
270
275
|
xFrameOptions?: pulumi.Input<string>;
|
|
271
|
-
/**
|
|
272
|
-
* Prevent pages from appearing in search engines.
|
|
273
|
-
*/
|
|
274
276
|
xRobotsTag?: pulumi.Input<string>;
|
|
275
|
-
/**
|
|
276
|
-
* This header configures the Cross-site scripting (XSS) filter in your browser.
|
|
277
|
-
*/
|
|
278
277
|
xXssProtection?: pulumi.Input<string>;
|
|
279
278
|
}
|
|
280
279
|
export interface RealmSmtpServer {
|
|
281
|
-
/**
|
|
282
|
-
* Enables authentication to the SMTP server. This block supports the following arguments:
|
|
283
|
-
*/
|
|
284
280
|
auth?: pulumi.Input<inputs.RealmSmtpServerAuth>;
|
|
285
|
-
/**
|
|
286
|
-
* The email address uses for bounces.
|
|
287
|
-
*/
|
|
288
281
|
envelopeFrom?: pulumi.Input<string>;
|
|
289
|
-
/**
|
|
290
|
-
* The email address for the sender.
|
|
291
|
-
*/
|
|
292
282
|
from: pulumi.Input<string>;
|
|
293
|
-
/**
|
|
294
|
-
* The display name of the sender email address.
|
|
295
|
-
*/
|
|
296
283
|
fromDisplayName?: pulumi.Input<string>;
|
|
297
|
-
/**
|
|
298
|
-
* The host of the SMTP server.
|
|
299
|
-
*/
|
|
300
284
|
host: pulumi.Input<string>;
|
|
301
|
-
/**
|
|
302
|
-
* The port of the SMTP server (defaults to 25).
|
|
303
|
-
*/
|
|
304
285
|
port?: pulumi.Input<string>;
|
|
305
|
-
/**
|
|
306
|
-
* The "reply to" email address.
|
|
307
|
-
*/
|
|
308
286
|
replyTo?: pulumi.Input<string>;
|
|
309
|
-
/**
|
|
310
|
-
* The display name of the "reply to" email address.
|
|
311
|
-
*/
|
|
312
287
|
replyToDisplayName?: pulumi.Input<string>;
|
|
313
|
-
/**
|
|
314
|
-
* When `true`, enables SSL. Defaults to `false`.
|
|
315
|
-
*/
|
|
316
288
|
ssl?: pulumi.Input<boolean>;
|
|
317
|
-
/**
|
|
318
|
-
* When `true`, enables StartTLS. Defaults to `false`.
|
|
319
|
-
*/
|
|
320
289
|
starttls?: pulumi.Input<boolean>;
|
|
321
290
|
}
|
|
322
291
|
export interface RealmSmtpServerAuth {
|
|
323
|
-
/**
|
|
324
|
-
* The SMTP server password.
|
|
325
|
-
*/
|
|
326
292
|
password: pulumi.Input<string>;
|
|
327
|
-
/**
|
|
328
|
-
* The SMTP server username.
|
|
329
|
-
*/
|
|
330
293
|
username: pulumi.Input<string>;
|
|
331
294
|
}
|
|
332
295
|
export interface RealmUserProfileAttribute {
|
|
@@ -412,111 +375,66 @@ export interface RealmUserProfileGroup {
|
|
|
412
375
|
name: pulumi.Input<string>;
|
|
413
376
|
}
|
|
414
377
|
export interface RealmWebAuthnPasswordlessPolicy {
|
|
415
|
-
/**
|
|
416
|
-
* A set of AAGUIDs for which an authenticator can be registered.
|
|
417
|
-
*/
|
|
418
378
|
acceptableAaguids?: pulumi.Input<pulumi.Input<string>[]>;
|
|
419
379
|
/**
|
|
420
|
-
*
|
|
380
|
+
* Either none, indirect or direct
|
|
421
381
|
*/
|
|
422
382
|
attestationConveyancePreference?: pulumi.Input<string>;
|
|
423
383
|
/**
|
|
424
|
-
*
|
|
384
|
+
* Either platform or cross-platform
|
|
425
385
|
*/
|
|
426
386
|
authenticatorAttachment?: pulumi.Input<string>;
|
|
427
|
-
/**
|
|
428
|
-
* When `true`, Keycloak will avoid registering the authenticator for WebAuthn if it has already been registered. Defaults to `false`.
|
|
429
|
-
*/
|
|
430
387
|
avoidSameAuthenticatorRegister?: pulumi.Input<boolean>;
|
|
431
|
-
/**
|
|
432
|
-
* The timeout value for creating a user's public key credential in seconds. When set to `0`, this timeout option is not adapted. Defaults to `0`.
|
|
433
|
-
*/
|
|
434
388
|
createTimeout?: pulumi.Input<number>;
|
|
435
|
-
/**
|
|
436
|
-
* A human readable server name for the WebAuthn Relying Party. Defaults to `keycloak`.
|
|
437
|
-
*/
|
|
438
389
|
relyingPartyEntityName?: pulumi.Input<string>;
|
|
439
|
-
/**
|
|
440
|
-
* The WebAuthn relying party ID.
|
|
441
|
-
*/
|
|
442
390
|
relyingPartyId?: pulumi.Input<string>;
|
|
443
391
|
/**
|
|
444
|
-
*
|
|
392
|
+
* Either Yes or No
|
|
445
393
|
*/
|
|
446
394
|
requireResidentKey?: pulumi.Input<string>;
|
|
447
395
|
/**
|
|
448
|
-
*
|
|
396
|
+
* Keycloak lists ES256, ES384, ES512, RS256, RS384, RS512, RS1 at the time of writing
|
|
449
397
|
*/
|
|
450
398
|
signatureAlgorithms?: pulumi.Input<pulumi.Input<string>[]>;
|
|
451
399
|
/**
|
|
452
|
-
*
|
|
400
|
+
* Either required, preferred or discouraged
|
|
453
401
|
*/
|
|
454
402
|
userVerificationRequirement?: pulumi.Input<string>;
|
|
455
403
|
}
|
|
456
404
|
export interface RealmWebAuthnPolicy {
|
|
457
|
-
/**
|
|
458
|
-
* A set of AAGUIDs for which an authenticator can be registered.
|
|
459
|
-
*/
|
|
460
405
|
acceptableAaguids?: pulumi.Input<pulumi.Input<string>[]>;
|
|
461
406
|
/**
|
|
462
|
-
*
|
|
407
|
+
* Either none, indirect or direct
|
|
463
408
|
*/
|
|
464
409
|
attestationConveyancePreference?: pulumi.Input<string>;
|
|
465
410
|
/**
|
|
466
|
-
*
|
|
411
|
+
* Either platform or cross-platform
|
|
467
412
|
*/
|
|
468
413
|
authenticatorAttachment?: pulumi.Input<string>;
|
|
469
|
-
/**
|
|
470
|
-
* When `true`, Keycloak will avoid registering the authenticator for WebAuthn if it has already been registered. Defaults to `false`.
|
|
471
|
-
*/
|
|
472
414
|
avoidSameAuthenticatorRegister?: pulumi.Input<boolean>;
|
|
473
|
-
/**
|
|
474
|
-
* The timeout value for creating a user's public key credential in seconds. When set to `0`, this timeout option is not adapted. Defaults to `0`.
|
|
475
|
-
*/
|
|
476
415
|
createTimeout?: pulumi.Input<number>;
|
|
477
|
-
/**
|
|
478
|
-
* A human readable server name for the WebAuthn Relying Party. Defaults to `keycloak`.
|
|
479
|
-
*/
|
|
480
416
|
relyingPartyEntityName?: pulumi.Input<string>;
|
|
481
|
-
/**
|
|
482
|
-
* The WebAuthn relying party ID.
|
|
483
|
-
*/
|
|
484
417
|
relyingPartyId?: pulumi.Input<string>;
|
|
485
418
|
/**
|
|
486
|
-
*
|
|
419
|
+
* Either Yes or No
|
|
487
420
|
*/
|
|
488
421
|
requireResidentKey?: pulumi.Input<string>;
|
|
489
422
|
/**
|
|
490
|
-
*
|
|
423
|
+
* Keycloak lists ES256, ES384, ES512, RS256, RS384, RS512, RS1 at the time of writing
|
|
491
424
|
*/
|
|
492
425
|
signatureAlgorithms?: pulumi.Input<pulumi.Input<string>[]>;
|
|
493
426
|
/**
|
|
494
|
-
*
|
|
427
|
+
* Either required, preferred or discouraged
|
|
495
428
|
*/
|
|
496
429
|
userVerificationRequirement?: pulumi.Input<string>;
|
|
497
430
|
}
|
|
498
431
|
export interface UserFederatedIdentity {
|
|
499
|
-
/**
|
|
500
|
-
* The name of the identity provider
|
|
501
|
-
*/
|
|
502
432
|
identityProvider: pulumi.Input<string>;
|
|
503
|
-
/**
|
|
504
|
-
* The ID of the user defined in the identity provider
|
|
505
|
-
*/
|
|
506
433
|
userId: pulumi.Input<string>;
|
|
507
|
-
/**
|
|
508
|
-
* The user name of the user defined in the identity provider
|
|
509
|
-
*/
|
|
510
434
|
userName: pulumi.Input<string>;
|
|
511
435
|
}
|
|
512
436
|
export interface UserInitialPassword {
|
|
513
|
-
/**
|
|
514
|
-
* If set to `true`, the initial password is set up for renewal on first use. Default to `false`.
|
|
515
|
-
*/
|
|
516
437
|
temporary?: pulumi.Input<boolean>;
|
|
517
|
-
/**
|
|
518
|
-
* The initial password.
|
|
519
|
-
*/
|
|
520
438
|
value: pulumi.Input<string>;
|
|
521
439
|
}
|
|
522
440
|
export interface UsersPermissionsImpersonateScope {
|
|
@@ -552,7 +470,7 @@ export interface UsersPermissionsViewScope {
|
|
|
552
470
|
export declare namespace ldap {
|
|
553
471
|
interface UserFederationCache {
|
|
554
472
|
/**
|
|
555
|
-
* Day of the week the entry will become invalid on
|
|
473
|
+
* Day of the week the entry will become invalid on.
|
|
556
474
|
*/
|
|
557
475
|
evictionDay?: pulumi.Input<number>;
|
|
558
476
|
/**
|
|
@@ -567,14 +485,11 @@ export declare namespace ldap {
|
|
|
567
485
|
* Max lifespan of cache entry (duration string).
|
|
568
486
|
*/
|
|
569
487
|
maxLifespan?: pulumi.Input<string>;
|
|
570
|
-
/**
|
|
571
|
-
* Can be one of `DEFAULT`, `EVICT_DAILY`, `EVICT_WEEKLY`, `MAX_LIFESPAN`, or `NO_CACHE`. Defaults to `DEFAULT`.
|
|
572
|
-
*/
|
|
573
488
|
policy?: pulumi.Input<string>;
|
|
574
489
|
}
|
|
575
490
|
interface UserFederationKerberos {
|
|
576
491
|
/**
|
|
577
|
-
* The name of the kerberos realm, e.g. FOO.LOCAL
|
|
492
|
+
* The name of the kerberos realm, e.g. FOO.LOCAL
|
|
578
493
|
*/
|
|
579
494
|
kerberosRealm: pulumi.Input<string>;
|
|
580
495
|
/**
|
|
@@ -593,31 +508,13 @@ export declare namespace ldap {
|
|
|
593
508
|
}
|
|
594
509
|
export declare namespace openid {
|
|
595
510
|
interface ClientAuthenticationFlowBindingOverrides {
|
|
596
|
-
/**
|
|
597
|
-
* Browser flow id, (flow needs to exist)
|
|
598
|
-
*/
|
|
599
511
|
browserId?: pulumi.Input<string>;
|
|
600
|
-
/**
|
|
601
|
-
* Direct grant flow id (flow needs to exist)
|
|
602
|
-
*/
|
|
603
512
|
directGrantId?: pulumi.Input<string>;
|
|
604
513
|
}
|
|
605
514
|
interface ClientAuthorization {
|
|
606
|
-
/**
|
|
607
|
-
* When `true`, resources can be managed remotely by the resource server. Defaults to `false`.
|
|
608
|
-
*/
|
|
609
515
|
allowRemoteResourceManagement?: pulumi.Input<boolean>;
|
|
610
|
-
/**
|
|
611
|
-
* Dictates how the policies associated with a given permission are evaluated and how a final decision is obtained. Could be one of `AFFIRMATIVE`, `CONSENSUS`, or `UNANIMOUS`. Applies to permissions.
|
|
612
|
-
*/
|
|
613
516
|
decisionStrategy?: pulumi.Input<string>;
|
|
614
|
-
/**
|
|
615
|
-
* When `true`, defaults set by Keycloak will be respected. Defaults to `false`.
|
|
616
|
-
*/
|
|
617
517
|
keepDefaults?: pulumi.Input<boolean>;
|
|
618
|
-
/**
|
|
619
|
-
* Dictates how policies are enforced when evaluating authorization requests. Can be one of `ENFORCING`, `PERMISSIVE`, or `DISABLED`.
|
|
620
|
-
*/
|
|
621
518
|
policyEnforcementMode: pulumi.Input<string>;
|
|
622
519
|
}
|
|
623
520
|
interface ClientGroupPolicyGroup {
|
|
@@ -667,13 +564,7 @@ export declare namespace openid {
|
|
|
667
564
|
}
|
|
668
565
|
export declare namespace saml {
|
|
669
566
|
interface ClientAuthenticationFlowBindingOverrides {
|
|
670
|
-
/**
|
|
671
|
-
* Browser flow id, (flow needs to exist)
|
|
672
|
-
*/
|
|
673
567
|
browserId?: pulumi.Input<string>;
|
|
674
|
-
/**
|
|
675
|
-
* Direct grant flow id (flow needs to exist)
|
|
676
|
-
*/
|
|
677
568
|
directGrantId?: pulumi.Input<string>;
|
|
678
569
|
}
|
|
679
570
|
}
|