@pulumi/okta 4.4.0 → 4.4.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +10 -129
- package/adminRoleCustom.js +1 -24
- package/adminRoleCustom.js.map +1 -1
- package/adminRoleCustomAssignments.d.ts +10 -25
- package/adminRoleCustomAssignments.js +1 -13
- package/adminRoleCustomAssignments.js.map +1 -1
- package/adminRoleTargets.d.ts +14 -44
- package/adminRoleTargets.js +0 -30
- package/adminRoleTargets.js.map +1 -1
- package/app/accessPolicyAssignment.d.ts +1 -20
- package/app/accessPolicyAssignment.js +1 -20
- package/app/accessPolicyAssignment.js.map +1 -1
- package/app/autoLogin.d.ts +72 -115
- package/app/autoLogin.js +0 -43
- package/app/autoLogin.js.map +1 -1
- package/app/basicAuth.d.ts +38 -62
- package/app/basicAuth.js +0 -24
- package/app/basicAuth.js.map +1 -1
- package/app/bookmark.d.ts +35 -67
- package/app/bookmark.js +0 -23
- package/app/bookmark.js.map +1 -1
- package/app/getApp.d.ts +58 -25
- package/app/getApp.js +2 -2
- package/app/getApp.js.map +1 -1
- package/app/getMetadataSaml.d.ts +11 -5
- package/app/getMetadataSaml.js +2 -2
- package/app/getMetadataSaml.js.map +1 -1
- package/app/getOauth.d.ts +62 -34
- package/app/getOauth.js +2 -2
- package/app/getOauth.js.map +1 -1
- package/app/getSaml.d.ts +75 -55
- package/app/getSaml.js +2 -2
- package/app/getSaml.js.map +1 -1
- package/app/groupAssignment.d.ts +6 -15
- package/app/groupAssignment.js +0 -9
- package/app/groupAssignment.js.map +1 -1
- package/app/oauth.d.ts +125 -299
- package/app/oauth.js +0 -78
- package/app/oauth.js.map +1 -1
- package/app/oauthPostLogoutRedirectUri.d.ts +0 -31
- package/app/oauthPostLogoutRedirectUri.js +0 -31
- package/app/oauthPostLogoutRedirectUri.js.map +1 -1
- package/app/oauthRedirectUri.d.ts +0 -30
- package/app/oauthRedirectUri.js +0 -30
- package/app/oauthRedirectUri.js.map +1 -1
- package/app/saml.d.ts +133 -299
- package/app/saml.js +0 -157
- package/app/saml.js.map +1 -1
- package/app/securePasswordStore.d.ts +79 -105
- package/app/securePasswordStore.js +0 -26
- package/app/securePasswordStore.js.map +1 -1
- package/app/swa.d.ts +72 -98
- package/app/swa.js +0 -26
- package/app/swa.js.map +1 -1
- package/app/threeField.d.ts +72 -83
- package/app/threeField.js +0 -11
- package/app/threeField.js.map +1 -1
- package/app/user.d.ts +12 -37
- package/app/user.js +0 -22
- package/app/user.js.map +1 -1
- package/appGroupAssignments.d.ts +3 -51
- package/appGroupAssignments.js +0 -48
- package/appGroupAssignments.js.map +1 -1
- package/appOauthApiScope.d.ts +3 -36
- package/appOauthApiScope.js +0 -33
- package/appOauthApiScope.js.map +1 -1
- package/appSamlAppSettings.d.ts +6 -44
- package/appSamlAppSettings.js +0 -38
- package/appSamlAppSettings.js.map +1 -1
- package/appSharedCredentials.d.ts +72 -111
- package/appSharedCredentials.js +0 -39
- package/appSharedCredentials.js.map +1 -1
- package/appSignonPolicy.d.ts +6 -44
- package/appSignonPolicy.js +0 -38
- package/appSignonPolicy.js.map +1 -1
- package/appSignonPolicyRule.d.ts +63 -322
- package/appSignonPolicyRule.js +0 -244
- package/appSignonPolicyRule.js.map +1 -1
- package/appUserBaseSchemaProperty.d.ts +24 -52
- package/appUserBaseSchemaProperty.js +0 -28
- package/appUserBaseSchemaProperty.js.map +1 -1
- package/appUserSchemaProperty.d.ts +54 -80
- package/appUserSchemaProperty.js +0 -26
- package/appUserSchemaProperty.js.map +1 -1
- package/auth/getServer.d.ts +11 -11
- package/auth/getServer.js +2 -2
- package/auth/getServerPolicy.d.ts +15 -9
- package/auth/getServerPolicy.js +2 -2
- package/auth/getServerPolicy.js.map +1 -1
- package/auth/getServerScopes.d.ts +8 -5
- package/auth/getServerScopes.js +2 -2
- package/auth/getServerScopes.js.map +1 -1
- package/auth/server.d.ts +13 -49
- package/auth/server.js +0 -27
- package/auth/server.js.map +1 -1
- package/auth/serverClaim.d.ts +18 -54
- package/auth/serverClaim.js +0 -27
- package/auth/serverClaim.js.map +1 -1
- package/auth/serverPolicy.d.ts +6 -43
- package/auth/serverPolicy.js +0 -28
- package/auth/serverPolicy.js.map +1 -1
- package/auth/serverPolicyClaim.d.ts +35 -71
- package/auth/serverPolicyClaim.js +4 -28
- package/auth/serverPolicyClaim.js.map +1 -1
- package/auth/serverPolicyRule.d.ts +27 -70
- package/auth/serverPolicyRule.js +0 -25
- package/auth/serverPolicyRule.js.map +1 -1
- package/auth/serverScope.d.ts +15 -41
- package/auth/serverScope.js +0 -26
- package/auth/serverScope.js.map +1 -1
- package/authServerClaimDefault.d.ts +13 -50
- package/authServerClaimDefault.js +0 -31
- package/authServerClaimDefault.js.map +1 -1
- package/authServerDefault.d.ts +13 -47
- package/authServerDefault.js +0 -25
- package/authServerDefault.js.map +1 -1
- package/authenticator.d.ts +38 -94
- package/authenticator.js +0 -38
- package/authenticator.js.map +1 -1
- package/behaviour.d.ts +18 -78
- package/behaviour.js +0 -42
- package/behaviour.js.map +1 -1
- package/brand.d.ts +17 -26
- package/brand.js +1 -10
- package/brand.js.map +1 -1
- package/captcha.d.ts +12 -38
- package/captcha.js +0 -26
- package/captcha.js.map +1 -1
- package/captchaOrgWideSettings.d.ts +6 -51
- package/captchaOrgWideSettings.js +0 -45
- package/captchaOrgWideSettings.js.map +1 -1
- package/domain.d.ts +13 -39
- package/domain.js +0 -20
- package/domain.js.map +1 -1
- package/domainCertificate.d.ts +15 -51
- package/domainCertificate.js +0 -36
- package/domainCertificate.js.map +1 -1
- package/domainVerification.d.ts +3 -22
- package/domainVerification.js +0 -19
- package/domainVerification.js.map +1 -1
- package/emailCustomization.d.ts +3 -224
- package/emailCustomization.js +0 -41
- package/emailCustomization.js.map +1 -1
- package/emailSender.d.ts +13 -39
- package/emailSender.js +0 -26
- package/emailSender.js.map +1 -1
- package/emailSenderVerification.d.ts +3 -26
- package/emailSenderVerification.js +0 -23
- package/emailSenderVerification.js.map +1 -1
- package/eventHook.d.ts +0 -37
- package/eventHook.js +0 -37
- package/eventHook.js.map +1 -1
- package/eventHookVerification.d.ts +3 -37
- package/eventHookVerification.js +0 -34
- package/eventHookVerification.js.map +1 -1
- package/factor/factor.d.ts +6 -23
- package/factor/factor.js +0 -14
- package/factor/factor.js.map +1 -1
- package/factorTotp.d.ts +12 -44
- package/factorTotp.js +0 -23
- package/factorTotp.js.map +1 -1
- package/getAppGroupAssignments.d.ts +6 -6
- package/getAppGroupAssignments.js +2 -2
- package/getAppSignonPolicy.d.ts +16 -6
- package/getAppSignonPolicy.js +8 -4
- package/getAppSignonPolicy.js.map +1 -1
- package/getAppUserAssignments.d.ts +6 -6
- package/getAppUserAssignments.js +2 -2
- package/getAuthServerClaim.d.ts +15 -12
- package/getAuthServerClaim.js +2 -2
- package/getAuthServerClaim.js.map +1 -1
- package/getAuthServerClaims.d.ts +8 -5
- package/getAuthServerClaims.js +2 -2
- package/getAuthServerClaims.js.map +1 -1
- package/getAuthenticator.d.ts +24 -26
- package/getAuthenticator.js +14 -22
- package/getAuthenticator.js.map +1 -1
- package/getBehaviour.d.ts +6 -8
- package/getBehaviour.js +2 -2
- package/getBehaviour.js.map +1 -1
- package/getBehaviours.d.ts +7 -7
- package/getBehaviours.js +2 -2
- package/getBrand.d.ts +9 -6
- package/getBrand.js +2 -2
- package/getBrand.js.map +1 -1
- package/getBrands.d.ts +2 -2
- package/getBrands.js +2 -2
- package/getEmailCustomization.d.ts +14 -9
- package/getEmailCustomization.js +2 -6
- package/getEmailCustomization.js.map +1 -1
- package/getEmailCustomizations.d.ts +11 -9
- package/getEmailCustomizations.js +2 -6
- package/getEmailCustomizations.js.map +1 -1
- package/getGroups.d.ts +11 -25
- package/getGroups.js +2 -2
- package/getGroups.js.map +1 -1
- package/getNetworkZone.d.ts +12 -12
- package/getNetworkZone.js +2 -2
- package/getRoleSubscription.d.ts +13 -35
- package/getRoleSubscription.js +2 -2
- package/getRoleSubscription.js.map +1 -1
- package/getTemplate.d.ts +10 -8
- package/getTemplate.js +2 -6
- package/getTemplate.js.map +1 -1
- package/getTemplates.d.ts +6 -7
- package/getTemplates.js +2 -6
- package/getTemplates.js.map +1 -1
- package/getTheme.d.ts +14 -12
- package/getTheme.js +2 -6
- package/getTheme.js.map +1 -1
- package/getThemes.d.ts +6 -7
- package/getThemes.js +2 -6
- package/getThemes.js.map +1 -1
- package/getTrustedOrigins.d.ts +7 -4
- package/getTrustedOrigins.js +2 -2
- package/getTrustedOrigins.js.map +1 -1
- package/getUserSecurityQuestions.d.ts +4 -8
- package/getUserSecurityQuestions.js +0 -4
- package/getUserSecurityQuestions.js.map +1 -1
- package/group/getEveryoneGroup.d.ts +10 -5
- package/group/getEveryoneGroup.js +4 -2
- package/group/getEveryoneGroup.js.map +1 -1
- package/group/getGroup.d.ts +17 -22
- package/group/getGroup.js +2 -2
- package/group/getGroup.js.map +1 -1
- package/group/getRule.d.ts +6 -15
- package/group/getRule.js +2 -2
- package/group/getRule.js.map +1 -1
- package/group/group.d.ts +9 -46
- package/group/group.js +0 -37
- package/group/group.js.map +1 -1
- package/group/role.d.ts +15 -101
- package/group/role.js +0 -26
- package/group/role.js.map +1 -1
- package/group/rule.d.ts +6 -84
- package/group/rule.js +0 -27
- package/group/rule.js.map +1 -1
- package/groupMemberships.d.ts +7 -42
- package/groupMemberships.js +1 -36
- package/groupMemberships.js.map +1 -1
- package/groupSchemaProperty.d.ts +51 -94
- package/groupSchemaProperty.js +0 -25
- package/groupSchemaProperty.js.map +1 -1
- package/idp/getMetadataSaml.d.ts +9 -6
- package/idp/getMetadataSaml.js +2 -2
- package/idp/getMetadataSaml.js.map +1 -1
- package/idp/getOidc.d.ts +9 -9
- package/idp/getOidc.js +2 -2
- package/idp/getSaml.d.ts +16 -13
- package/idp/getSaml.js +2 -2
- package/idp/getSaml.js.map +1 -1
- package/idp/getSocial.d.ts +8 -2
- package/idp/getSocial.js +2 -2
- package/idp/getSocial.js.map +1 -1
- package/idp/oidc.d.ts +12 -297
- package/idp/oidc.js +0 -36
- package/idp/oidc.js.map +1 -1
- package/idp/saml.d.ts +18 -284
- package/idp/saml.js +0 -32
- package/idp/saml.js.map +1 -1
- package/idp/samlKey.d.ts +3 -48
- package/idp/samlKey.js +0 -9
- package/idp/samlKey.js.map +1 -1
- package/idp/social.d.ts +18 -251
- package/idp/social.js +0 -32
- package/idp/social.js.map +1 -1
- package/index/emailDomain.d.ts +16 -41
- package/index/emailDomain.js +0 -25
- package/index/emailDomain.js.map +1 -1
- package/index/emailDomainVerification.d.ts +3 -25
- package/index/emailDomainVerification.js +0 -22
- package/index/emailDomainVerification.js.map +1 -1
- package/index/getDomain.d.ts +11 -14
- package/index/getDomain.js +2 -8
- package/index/getDomain.js.map +1 -1
- package/inline/hook.d.ts +0 -89
- package/inline/hook.js +0 -35
- package/inline/hook.js.map +1 -1
- package/linkDefinition.d.ts +0 -30
- package/linkDefinition.js +0 -30
- package/linkDefinition.js.map +1 -1
- package/linkValue.d.ts +6 -59
- package/linkValue.js +0 -53
- package/linkValue.js.map +1 -1
- package/network/zone.d.ts +27 -74
- package/network/zone.js +0 -44
- package/network/zone.js.map +1 -1
- package/orgConfiguration.d.ts +0 -25
- package/orgConfiguration.js +0 -25
- package/orgConfiguration.js.map +1 -1
- package/orgSupport.d.ts +3 -20
- package/orgSupport.js +0 -17
- package/orgSupport.js.map +1 -1
- package/package.json +2 -2
- package/package.json.bak +1 -1
- package/policy/getDefaultPolicy.d.ts +9 -7
- package/policy/getDefaultPolicy.js +6 -2
- package/policy/getDefaultPolicy.js.map +1 -1
- package/policy/getPolicy.d.ts +11 -10
- package/policy/getPolicy.js +2 -2
- package/policy/getPolicy.js.map +1 -1
- package/policy/mfa.d.ts +18 -259
- package/policy/mfa.js +0 -49
- package/policy/mfa.js.map +1 -1
- package/policy/password.d.ts +90 -117
- package/policy/password.js +0 -27
- package/policy/password.js.map +1 -1
- package/policy/ruleIdpDiscovery.d.ts +27 -149
- package/policy/ruleIdpDiscovery.js +0 -65
- package/policy/ruleIdpDiscovery.js.map +1 -1
- package/policy/ruleMfa.d.ts +24 -35
- package/policy/ruleMfa.js +0 -11
- package/policy/ruleMfa.js.map +1 -1
- package/policy/rulePassword.d.ts +33 -46
- package/policy/rulePassword.js +0 -13
- package/policy/rulePassword.js.map +1 -1
- package/policy/ruleSignon.d.ts +57 -170
- package/policy/ruleSignon.js +0 -92
- package/policy/ruleSignon.js.map +1 -1
- package/policy/signon.d.ts +15 -41
- package/policy/signon.js +0 -26
- package/policy/signon.js.map +1 -1
- package/policyMfaDefault.d.ts +13 -250
- package/policyMfaDefault.js +0 -45
- package/policyMfaDefault.js.map +1 -1
- package/policyPasswordDefault.d.ts +54 -88
- package/policyPasswordDefault.js +0 -22
- package/policyPasswordDefault.js.map +1 -1
- package/policyProfileEnrollment.d.ts +6 -28
- package/policyProfileEnrollment.js +0 -22
- package/policyProfileEnrollment.js.map +1 -1
- package/policyProfileEnrollmentApps.d.ts +5 -42
- package/policyProfileEnrollmentApps.js +0 -37
- package/policyProfileEnrollmentApps.js.map +1 -1
- package/policyRuleProfileEnrollment.d.ts +23 -85
- package/policyRuleProfileEnrollment.js +0 -62
- package/policyRuleProfileEnrollment.js.map +1 -1
- package/profile/mapping.d.ts +9 -95
- package/profile/mapping.js +0 -41
- package/profile/mapping.js.map +1 -1
- package/rateLimiting.d.ts +9 -43
- package/rateLimiting.js +0 -28
- package/rateLimiting.js.map +1 -1
- package/resourceSet.d.ts +10 -32
- package/resourceSet.js +1 -20
- package/resourceSet.js.map +1 -1
- package/roleSubscription.d.ts +9 -110
- package/roleSubscription.js +0 -26
- package/roleSubscription.js.map +1 -1
- package/securityNotificationEmails.d.ts +15 -45
- package/securityNotificationEmails.js +0 -30
- package/securityNotificationEmails.js.map +1 -1
- package/templateSms.d.ts +3 -47
- package/templateSms.js +0 -35
- package/templateSms.js.map +1 -1
- package/theme.d.ts +44 -53
- package/theme.js +0 -9
- package/theme.js.map +1 -1
- package/threatInsightSettings.d.ts +6 -58
- package/threatInsightSettings.js +0 -34
- package/threatInsightSettings.js.map +1 -1
- package/trustedorigin/origin.d.ts +12 -37
- package/trustedorigin/origin.js +0 -25
- package/trustedorigin/origin.js.map +1 -1
- package/types/input.d.ts +60 -227
- package/types/output.d.ts +56 -446
- package/user/getUser.d.ts +32 -104
- package/user/getUser.js +2 -2
- package/user/getUser.js.map +1 -1
- package/user/getUserProfileMappingSource.d.ts +9 -7
- package/user/getUserProfileMappingSource.js +6 -4
- package/user/getUserProfileMappingSource.js.map +1 -1
- package/user/getUserType.d.ts +7 -7
- package/user/getUserType.js +2 -2
- package/user/getUsers.d.ts +61 -57
- package/user/getUsers.js +30 -44
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +117 -215
- package/user/user.js +0 -71
- package/user/user.js.map +1 -1
- package/user/userType.d.ts +9 -34
- package/user/userType.js +0 -25
- package/user/userType.js.map +1 -1
- package/userAdminRoles.d.ts +10 -41
- package/userAdminRoles.js +1 -29
- package/userAdminRoles.js.map +1 -1
- package/userBaseSchemaProperty.d.ts +24 -67
- package/userBaseSchemaProperty.js +0 -43
- package/userBaseSchemaProperty.js.map +1 -1
- package/userFactorQuestion.d.ts +14 -52
- package/userFactorQuestion.js +1 -39
- package/userFactorQuestion.js.map +1 -1
- package/userGroupMemberships.d.ts +4 -23
- package/userGroupMemberships.js +1 -20
- package/userGroupMemberships.js.map +1 -1
- package/userSchemaProperty.d.ts +57 -107
- package/userSchemaProperty.js +0 -32
- package/userSchemaProperty.js.map +1 -1
- package/scripts/install-pulumi-plugin.js +0 -21
package/adminRoleCustom.d.ts
CHANGED
|
@@ -1,29 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
4
|
-
*
|
|
5
|
-
* > **NOTE:** This an `Early Access` feature.
|
|
6
|
-
*
|
|
7
|
-
* ## Example Usage
|
|
8
|
-
*
|
|
9
|
-
* ```typescript
|
|
10
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
-
* import * as okta from "@pulumi/okta";
|
|
12
|
-
*
|
|
13
|
-
* const example = new okta.AdminRoleCustom("example", {
|
|
14
|
-
* description: "This role allows app assignment management",
|
|
15
|
-
* label: "AppAssignmentManager",
|
|
16
|
-
* permissions: ["okta.apps.assignment.manage"],
|
|
17
|
-
* });
|
|
18
|
-
* ```
|
|
19
|
-
*
|
|
20
|
-
* ## Import
|
|
21
|
-
*
|
|
22
|
-
* Okta Custom Admin Role can be imported via the Okta ID.
|
|
23
|
-
*
|
|
24
|
-
* ```sh
|
|
25
|
-
* $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example <custom role id>
|
|
26
|
-
* ```
|
|
3
|
+
* Resource to manage administrative Role assignments for a User
|
|
27
4
|
*/
|
|
28
5
|
export declare class AdminRoleCustom extends pulumi.CustomResource {
|
|
29
6
|
/**
|
|
@@ -42,47 +19,15 @@ export declare class AdminRoleCustom extends pulumi.CustomResource {
|
|
|
42
19
|
*/
|
|
43
20
|
static isInstance(obj: any): obj is AdminRoleCustom;
|
|
44
21
|
/**
|
|
45
|
-
* A human-readable description of the new Role
|
|
22
|
+
* A human-readable description of the new Role
|
|
46
23
|
*/
|
|
47
24
|
readonly description: pulumi.Output<string>;
|
|
48
25
|
/**
|
|
49
|
-
* The name given to the new Role
|
|
26
|
+
* The name given to the new Role
|
|
50
27
|
*/
|
|
51
28
|
readonly label: pulumi.Output<string>;
|
|
52
29
|
/**
|
|
53
|
-
* The permissions that the new Role grants.
|
|
54
|
-
* permission must be specified when creating custom role. Valid values: `"okta.authzServers.manage"`,
|
|
55
|
-
* `"okta.authzServers.read"`,
|
|
56
|
-
* `"okta.apps.assignment.manage"`,
|
|
57
|
-
* `"okta.apps.manage"`,
|
|
58
|
-
* `"okta.apps.read"`,
|
|
59
|
-
* `"okta.customizations.manage"`,
|
|
60
|
-
* `"okta.customizations.read"`,
|
|
61
|
-
* `"okta.groups.appAssignment.manage"`,
|
|
62
|
-
* `"okta.groups.create"`,
|
|
63
|
-
* `"okta.groups.manage"`,
|
|
64
|
-
* `"okta.groups.members.manage"`,
|
|
65
|
-
* `"okta.groups.read"`,
|
|
66
|
-
* `"okta.profilesources.import.run"`,
|
|
67
|
-
* `"okta.users.appAssignment.manage"`,
|
|
68
|
-
* `"okta.users.create"`,
|
|
69
|
-
* `"okta.users.credentials.expirePassword"`,
|
|
70
|
-
* `"okta.users.credentials.manage"`,
|
|
71
|
-
* `"okta.users.credentials.resetFactors"`,
|
|
72
|
-
* `"okta.users.credentials.resetPassword"`,
|
|
73
|
-
* `"okta.users.groupMembership.manage"`,
|
|
74
|
-
* `"okta.users.lifecycle.activate"`,
|
|
75
|
-
* `"okta.users.lifecycle.clearSessions"`,
|
|
76
|
-
* `"okta.users.lifecycle.deactivate"`,
|
|
77
|
-
* `"okta.users.lifecycle.delete"`,
|
|
78
|
-
* `"okta.users.lifecycle.manage"`,
|
|
79
|
-
* `"okta.users.lifecycle.suspend"`,
|
|
80
|
-
* `"okta.users.lifecycle.unlock"`,
|
|
81
|
-
* `"okta.users.lifecycle.unsuspend"`,
|
|
82
|
-
* `"okta.users.manage"`,
|
|
83
|
-
* `"okta.users.read"`,
|
|
84
|
-
* `"okta.users.userprofile.manage"`,
|
|
85
|
-
* `"okta.workflows.invoke"`.,
|
|
30
|
+
* The permissions that the new Role grants.
|
|
86
31
|
*/
|
|
87
32
|
readonly permissions: pulumi.Output<string[] | undefined>;
|
|
88
33
|
/**
|
|
@@ -99,47 +44,15 @@ export declare class AdminRoleCustom extends pulumi.CustomResource {
|
|
|
99
44
|
*/
|
|
100
45
|
export interface AdminRoleCustomState {
|
|
101
46
|
/**
|
|
102
|
-
* A human-readable description of the new Role
|
|
47
|
+
* A human-readable description of the new Role
|
|
103
48
|
*/
|
|
104
49
|
description?: pulumi.Input<string>;
|
|
105
50
|
/**
|
|
106
|
-
* The name given to the new Role
|
|
51
|
+
* The name given to the new Role
|
|
107
52
|
*/
|
|
108
53
|
label?: pulumi.Input<string>;
|
|
109
54
|
/**
|
|
110
|
-
* The permissions that the new Role grants.
|
|
111
|
-
* permission must be specified when creating custom role. Valid values: `"okta.authzServers.manage"`,
|
|
112
|
-
* `"okta.authzServers.read"`,
|
|
113
|
-
* `"okta.apps.assignment.manage"`,
|
|
114
|
-
* `"okta.apps.manage"`,
|
|
115
|
-
* `"okta.apps.read"`,
|
|
116
|
-
* `"okta.customizations.manage"`,
|
|
117
|
-
* `"okta.customizations.read"`,
|
|
118
|
-
* `"okta.groups.appAssignment.manage"`,
|
|
119
|
-
* `"okta.groups.create"`,
|
|
120
|
-
* `"okta.groups.manage"`,
|
|
121
|
-
* `"okta.groups.members.manage"`,
|
|
122
|
-
* `"okta.groups.read"`,
|
|
123
|
-
* `"okta.profilesources.import.run"`,
|
|
124
|
-
* `"okta.users.appAssignment.manage"`,
|
|
125
|
-
* `"okta.users.create"`,
|
|
126
|
-
* `"okta.users.credentials.expirePassword"`,
|
|
127
|
-
* `"okta.users.credentials.manage"`,
|
|
128
|
-
* `"okta.users.credentials.resetFactors"`,
|
|
129
|
-
* `"okta.users.credentials.resetPassword"`,
|
|
130
|
-
* `"okta.users.groupMembership.manage"`,
|
|
131
|
-
* `"okta.users.lifecycle.activate"`,
|
|
132
|
-
* `"okta.users.lifecycle.clearSessions"`,
|
|
133
|
-
* `"okta.users.lifecycle.deactivate"`,
|
|
134
|
-
* `"okta.users.lifecycle.delete"`,
|
|
135
|
-
* `"okta.users.lifecycle.manage"`,
|
|
136
|
-
* `"okta.users.lifecycle.suspend"`,
|
|
137
|
-
* `"okta.users.lifecycle.unlock"`,
|
|
138
|
-
* `"okta.users.lifecycle.unsuspend"`,
|
|
139
|
-
* `"okta.users.manage"`,
|
|
140
|
-
* `"okta.users.read"`,
|
|
141
|
-
* `"okta.users.userprofile.manage"`,
|
|
142
|
-
* `"okta.workflows.invoke"`.,
|
|
55
|
+
* The permissions that the new Role grants.
|
|
143
56
|
*/
|
|
144
57
|
permissions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
145
58
|
}
|
|
@@ -148,47 +61,15 @@ export interface AdminRoleCustomState {
|
|
|
148
61
|
*/
|
|
149
62
|
export interface AdminRoleCustomArgs {
|
|
150
63
|
/**
|
|
151
|
-
* A human-readable description of the new Role
|
|
64
|
+
* A human-readable description of the new Role
|
|
152
65
|
*/
|
|
153
66
|
description: pulumi.Input<string>;
|
|
154
67
|
/**
|
|
155
|
-
* The name given to the new Role
|
|
68
|
+
* The name given to the new Role
|
|
156
69
|
*/
|
|
157
70
|
label: pulumi.Input<string>;
|
|
158
71
|
/**
|
|
159
|
-
* The permissions that the new Role grants.
|
|
160
|
-
* permission must be specified when creating custom role. Valid values: `"okta.authzServers.manage"`,
|
|
161
|
-
* `"okta.authzServers.read"`,
|
|
162
|
-
* `"okta.apps.assignment.manage"`,
|
|
163
|
-
* `"okta.apps.manage"`,
|
|
164
|
-
* `"okta.apps.read"`,
|
|
165
|
-
* `"okta.customizations.manage"`,
|
|
166
|
-
* `"okta.customizations.read"`,
|
|
167
|
-
* `"okta.groups.appAssignment.manage"`,
|
|
168
|
-
* `"okta.groups.create"`,
|
|
169
|
-
* `"okta.groups.manage"`,
|
|
170
|
-
* `"okta.groups.members.manage"`,
|
|
171
|
-
* `"okta.groups.read"`,
|
|
172
|
-
* `"okta.profilesources.import.run"`,
|
|
173
|
-
* `"okta.users.appAssignment.manage"`,
|
|
174
|
-
* `"okta.users.create"`,
|
|
175
|
-
* `"okta.users.credentials.expirePassword"`,
|
|
176
|
-
* `"okta.users.credentials.manage"`,
|
|
177
|
-
* `"okta.users.credentials.resetFactors"`,
|
|
178
|
-
* `"okta.users.credentials.resetPassword"`,
|
|
179
|
-
* `"okta.users.groupMembership.manage"`,
|
|
180
|
-
* `"okta.users.lifecycle.activate"`,
|
|
181
|
-
* `"okta.users.lifecycle.clearSessions"`,
|
|
182
|
-
* `"okta.users.lifecycle.deactivate"`,
|
|
183
|
-
* `"okta.users.lifecycle.delete"`,
|
|
184
|
-
* `"okta.users.lifecycle.manage"`,
|
|
185
|
-
* `"okta.users.lifecycle.suspend"`,
|
|
186
|
-
* `"okta.users.lifecycle.unlock"`,
|
|
187
|
-
* `"okta.users.lifecycle.unsuspend"`,
|
|
188
|
-
* `"okta.users.manage"`,
|
|
189
|
-
* `"okta.users.read"`,
|
|
190
|
-
* `"okta.users.userprofile.manage"`,
|
|
191
|
-
* `"okta.workflows.invoke"`.,
|
|
72
|
+
* The permissions that the new Role grants.
|
|
192
73
|
*/
|
|
193
74
|
permissions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
194
75
|
}
|
package/adminRoleCustom.js
CHANGED
|
@@ -6,30 +6,7 @@ exports.AdminRoleCustom = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
10
|
-
*
|
|
11
|
-
* > **NOTE:** This an `Early Access` feature.
|
|
12
|
-
*
|
|
13
|
-
* ## Example Usage
|
|
14
|
-
*
|
|
15
|
-
* ```typescript
|
|
16
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
-
* import * as okta from "@pulumi/okta";
|
|
18
|
-
*
|
|
19
|
-
* const example = new okta.AdminRoleCustom("example", {
|
|
20
|
-
* description: "This role allows app assignment management",
|
|
21
|
-
* label: "AppAssignmentManager",
|
|
22
|
-
* permissions: ["okta.apps.assignment.manage"],
|
|
23
|
-
* });
|
|
24
|
-
* ```
|
|
25
|
-
*
|
|
26
|
-
* ## Import
|
|
27
|
-
*
|
|
28
|
-
* Okta Custom Admin Role can be imported via the Okta ID.
|
|
29
|
-
*
|
|
30
|
-
* ```sh
|
|
31
|
-
* $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example <custom role id>
|
|
32
|
-
* ```
|
|
9
|
+
* Resource to manage administrative Role assignments for a User
|
|
33
10
|
*/
|
|
34
11
|
class AdminRoleCustom extends pulumi.CustomResource {
|
|
35
12
|
/**
|
package/adminRoleCustom.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"adminRoleCustom.js","sourceRoot":"","sources":["../adminRoleCustom.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"adminRoleCustom.js","sourceRoot":"","sources":["../adminRoleCustom.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;GAEG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAuBD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAvEL,0CAwEC;AA1DG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
|
|
@@ -1,18 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
4
|
-
* - Groups
|
|
5
|
-
* - Users
|
|
6
|
-
*
|
|
7
|
-
* > **NOTE:** This an `Early Access` feature.
|
|
8
|
-
*
|
|
9
|
-
* ## Import
|
|
10
|
-
*
|
|
11
|
-
* Okta Custom Admin Role Assignments can be imported via the Okta ID.
|
|
12
|
-
*
|
|
13
|
-
* ```sh
|
|
14
|
-
* $ pulumi import okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments example <resource_set_id>/<custom_role_id>
|
|
15
|
-
* ```
|
|
3
|
+
* Resource to manage the assignment and unassignment of Custom Roles
|
|
16
4
|
*/
|
|
17
5
|
export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
|
|
18
6
|
/**
|
|
@@ -31,16 +19,15 @@ export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
|
|
|
31
19
|
*/
|
|
32
20
|
static isInstance(obj: any): obj is AdminRoleCustomAssignments;
|
|
33
21
|
/**
|
|
34
|
-
* ID of the Custom Role
|
|
22
|
+
* ID of the Custom Role
|
|
35
23
|
*/
|
|
36
24
|
readonly customRoleId: pulumi.Output<string>;
|
|
37
25
|
/**
|
|
38
|
-
* The hrefs that point to User(s) and/or Group(s) that receive the Role
|
|
39
|
-
* permission must be specified when creating custom role.
|
|
26
|
+
* The hrefs that point to User(s) and/or Group(s) that receive the Role
|
|
40
27
|
*/
|
|
41
28
|
readonly members: pulumi.Output<string[] | undefined>;
|
|
42
29
|
/**
|
|
43
|
-
* ID of the target Resource Set
|
|
30
|
+
* ID of the target Resource Set
|
|
44
31
|
*/
|
|
45
32
|
readonly resourceSetId: pulumi.Output<string>;
|
|
46
33
|
/**
|
|
@@ -57,16 +44,15 @@ export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
|
|
|
57
44
|
*/
|
|
58
45
|
export interface AdminRoleCustomAssignmentsState {
|
|
59
46
|
/**
|
|
60
|
-
* ID of the Custom Role
|
|
47
|
+
* ID of the Custom Role
|
|
61
48
|
*/
|
|
62
49
|
customRoleId?: pulumi.Input<string>;
|
|
63
50
|
/**
|
|
64
|
-
* The hrefs that point to User(s) and/or Group(s) that receive the Role
|
|
65
|
-
* permission must be specified when creating custom role.
|
|
51
|
+
* The hrefs that point to User(s) and/or Group(s) that receive the Role
|
|
66
52
|
*/
|
|
67
53
|
members?: pulumi.Input<pulumi.Input<string>[]>;
|
|
68
54
|
/**
|
|
69
|
-
* ID of the target Resource Set
|
|
55
|
+
* ID of the target Resource Set
|
|
70
56
|
*/
|
|
71
57
|
resourceSetId?: pulumi.Input<string>;
|
|
72
58
|
}
|
|
@@ -75,16 +61,15 @@ export interface AdminRoleCustomAssignmentsState {
|
|
|
75
61
|
*/
|
|
76
62
|
export interface AdminRoleCustomAssignmentsArgs {
|
|
77
63
|
/**
|
|
78
|
-
* ID of the Custom Role
|
|
64
|
+
* ID of the Custom Role
|
|
79
65
|
*/
|
|
80
66
|
customRoleId: pulumi.Input<string>;
|
|
81
67
|
/**
|
|
82
|
-
* The hrefs that point to User(s) and/or Group(s) that receive the Role
|
|
83
|
-
* permission must be specified when creating custom role.
|
|
68
|
+
* The hrefs that point to User(s) and/or Group(s) that receive the Role
|
|
84
69
|
*/
|
|
85
70
|
members?: pulumi.Input<pulumi.Input<string>[]>;
|
|
86
71
|
/**
|
|
87
|
-
* ID of the target Resource Set
|
|
72
|
+
* ID of the target Resource Set
|
|
88
73
|
*/
|
|
89
74
|
resourceSetId: pulumi.Input<string>;
|
|
90
75
|
}
|
|
@@ -6,19 +6,7 @@ exports.AdminRoleCustomAssignments = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
10
|
-
* - Groups
|
|
11
|
-
* - Users
|
|
12
|
-
*
|
|
13
|
-
* > **NOTE:** This an `Early Access` feature.
|
|
14
|
-
*
|
|
15
|
-
* ## Import
|
|
16
|
-
*
|
|
17
|
-
* Okta Custom Admin Role Assignments can be imported via the Okta ID.
|
|
18
|
-
*
|
|
19
|
-
* ```sh
|
|
20
|
-
* $ pulumi import okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments example <resource_set_id>/<custom_role_id>
|
|
21
|
-
* ```
|
|
9
|
+
* Resource to manage the assignment and unassignment of Custom Roles
|
|
22
10
|
*/
|
|
23
11
|
class AdminRoleCustomAssignments extends pulumi.CustomResource {
|
|
24
12
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"adminRoleCustomAssignments.js","sourceRoot":"","sources":["../adminRoleCustomAssignments.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"adminRoleCustomAssignments.js","sourceRoot":"","sources":["../adminRoleCustomAssignments.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;GAEG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IAuBD,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAvEL,gEAwEC;AA1DG,gBAAgB;AACO,uCAAY,GAAG,kEAAkE,CAAC"}
|
package/adminRoleTargets.d.ts
CHANGED
|
@@ -1,34 +1,4 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
-
/**
|
|
3
|
-
* Manages targets for administrator roles.
|
|
4
|
-
*
|
|
5
|
-
* This resource allows you to define permissions for admin roles into a smaller subset of Groups or Apps within your org.
|
|
6
|
-
* You can define admin roles to target Groups, Applications, and Application Instances.
|
|
7
|
-
*
|
|
8
|
-
* ## Example Usage
|
|
9
|
-
*
|
|
10
|
-
* ```typescript
|
|
11
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
12
|
-
* import * as okta from "@pulumi/okta";
|
|
13
|
-
*
|
|
14
|
-
* const example = new okta.AdminRoleTargets("example", {
|
|
15
|
-
* apps: [
|
|
16
|
-
* "oidc_client.<app_id>",
|
|
17
|
-
* "facebook",
|
|
18
|
-
* ],
|
|
19
|
-
* roleType: "APP_ADMIN",
|
|
20
|
-
* userId: "<user_id>",
|
|
21
|
-
* });
|
|
22
|
-
* ```
|
|
23
|
-
*
|
|
24
|
-
* ## Import
|
|
25
|
-
*
|
|
26
|
-
* Okta Admin Role Targets can be imported via the Okta ID.
|
|
27
|
-
*
|
|
28
|
-
* ```sh
|
|
29
|
-
* $ pulumi import okta:index/adminRoleTargets:AdminRoleTargets example <user id>/<role type>
|
|
30
|
-
* ```
|
|
31
|
-
*/
|
|
32
2
|
export declare class AdminRoleTargets extends pulumi.CustomResource {
|
|
33
3
|
/**
|
|
34
4
|
* Get an existing AdminRoleTargets resource's state with the given name, ID, and optional extra
|
|
@@ -46,23 +16,23 @@ export declare class AdminRoleTargets extends pulumi.CustomResource {
|
|
|
46
16
|
*/
|
|
47
17
|
static isInstance(obj: any): obj is AdminRoleTargets;
|
|
48
18
|
/**
|
|
49
|
-
* List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
|
|
19
|
+
* List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
|
|
50
20
|
*/
|
|
51
21
|
readonly apps: pulumi.Output<string[] | undefined>;
|
|
52
22
|
/**
|
|
53
|
-
* List of group IDs
|
|
23
|
+
* List of group IDs
|
|
54
24
|
*/
|
|
55
25
|
readonly groups: pulumi.Output<string[] | undefined>;
|
|
56
26
|
/**
|
|
57
|
-
*
|
|
27
|
+
* ID of a role
|
|
58
28
|
*/
|
|
59
29
|
readonly roleId: pulumi.Output<string>;
|
|
60
30
|
/**
|
|
61
|
-
*
|
|
31
|
+
* Type of the role that is assigned to the user and supports optional targets
|
|
62
32
|
*/
|
|
63
33
|
readonly roleType: pulumi.Output<string>;
|
|
64
34
|
/**
|
|
65
|
-
*
|
|
35
|
+
* User associated with the role
|
|
66
36
|
*/
|
|
67
37
|
readonly userId: pulumi.Output<string>;
|
|
68
38
|
/**
|
|
@@ -79,23 +49,23 @@ export declare class AdminRoleTargets extends pulumi.CustomResource {
|
|
|
79
49
|
*/
|
|
80
50
|
export interface AdminRoleTargetsState {
|
|
81
51
|
/**
|
|
82
|
-
* List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
|
|
52
|
+
* List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
|
|
83
53
|
*/
|
|
84
54
|
apps?: pulumi.Input<pulumi.Input<string>[]>;
|
|
85
55
|
/**
|
|
86
|
-
* List of group IDs
|
|
56
|
+
* List of group IDs
|
|
87
57
|
*/
|
|
88
58
|
groups?: pulumi.Input<pulumi.Input<string>[]>;
|
|
89
59
|
/**
|
|
90
|
-
*
|
|
60
|
+
* ID of a role
|
|
91
61
|
*/
|
|
92
62
|
roleId?: pulumi.Input<string>;
|
|
93
63
|
/**
|
|
94
|
-
*
|
|
64
|
+
* Type of the role that is assigned to the user and supports optional targets
|
|
95
65
|
*/
|
|
96
66
|
roleType?: pulumi.Input<string>;
|
|
97
67
|
/**
|
|
98
|
-
*
|
|
68
|
+
* User associated with the role
|
|
99
69
|
*/
|
|
100
70
|
userId?: pulumi.Input<string>;
|
|
101
71
|
}
|
|
@@ -104,19 +74,19 @@ export interface AdminRoleTargetsState {
|
|
|
104
74
|
*/
|
|
105
75
|
export interface AdminRoleTargetsArgs {
|
|
106
76
|
/**
|
|
107
|
-
* List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
|
|
77
|
+
* List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
|
|
108
78
|
*/
|
|
109
79
|
apps?: pulumi.Input<pulumi.Input<string>[]>;
|
|
110
80
|
/**
|
|
111
|
-
* List of group IDs
|
|
81
|
+
* List of group IDs
|
|
112
82
|
*/
|
|
113
83
|
groups?: pulumi.Input<pulumi.Input<string>[]>;
|
|
114
84
|
/**
|
|
115
|
-
*
|
|
85
|
+
* Type of the role that is assigned to the user and supports optional targets
|
|
116
86
|
*/
|
|
117
87
|
roleType: pulumi.Input<string>;
|
|
118
88
|
/**
|
|
119
|
-
*
|
|
89
|
+
* User associated with the role
|
|
120
90
|
*/
|
|
121
91
|
userId: pulumi.Input<string>;
|
|
122
92
|
}
|
package/adminRoleTargets.js
CHANGED
|
@@ -5,36 +5,6 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.AdminRoleTargets = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
|
-
/**
|
|
9
|
-
* Manages targets for administrator roles.
|
|
10
|
-
*
|
|
11
|
-
* This resource allows you to define permissions for admin roles into a smaller subset of Groups or Apps within your org.
|
|
12
|
-
* You can define admin roles to target Groups, Applications, and Application Instances.
|
|
13
|
-
*
|
|
14
|
-
* ## Example Usage
|
|
15
|
-
*
|
|
16
|
-
* ```typescript
|
|
17
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
18
|
-
* import * as okta from "@pulumi/okta";
|
|
19
|
-
*
|
|
20
|
-
* const example = new okta.AdminRoleTargets("example", {
|
|
21
|
-
* apps: [
|
|
22
|
-
* "oidc_client.<app_id>",
|
|
23
|
-
* "facebook",
|
|
24
|
-
* ],
|
|
25
|
-
* roleType: "APP_ADMIN",
|
|
26
|
-
* userId: "<user_id>",
|
|
27
|
-
* });
|
|
28
|
-
* ```
|
|
29
|
-
*
|
|
30
|
-
* ## Import
|
|
31
|
-
*
|
|
32
|
-
* Okta Admin Role Targets can be imported via the Okta ID.
|
|
33
|
-
*
|
|
34
|
-
* ```sh
|
|
35
|
-
* $ pulumi import okta:index/adminRoleTargets:AdminRoleTargets example <user id>/<role type>
|
|
36
|
-
* ```
|
|
37
|
-
*/
|
|
38
8
|
class AdminRoleTargets extends pulumi.CustomResource {
|
|
39
9
|
/**
|
|
40
10
|
* Get an existing AdminRoleTargets resource's state with the given name, ID, and optional extra
|
package/adminRoleTargets.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"adminRoleTargets.js","sourceRoot":"","sources":["../adminRoleTargets.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"adminRoleTargets.js","sourceRoot":"","sources":["../adminRoleTargets.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IA+BD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAnFL,4CAoFC;AAtEG,gBAAgB;AACO,6BAAY,GAAG,8CAA8C,CAAC"}
|
|
@@ -1,25 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
4
|
-
* authentication policy) to an application. This resource does not perform true
|
|
5
|
-
* delete as it will not delete an application and the app's access policy can't be
|
|
6
|
-
* removed; it can only be changed to a different access policy. This resource is
|
|
7
|
-
* only logical within the context of an application therefore `appId` is
|
|
8
|
-
* immutable once set. Use this resource to manage assigning an access policy to an
|
|
9
|
-
* application. It will assign the given `policyId` to the application at creation
|
|
10
|
-
* and during update.
|
|
11
|
-
*
|
|
12
|
-
* > Inside the product a sign-on policy is referenced as an _authentication
|
|
13
|
-
* policy_, in the public API the policy is of type
|
|
14
|
-
* [`ACCESS_POLICY`](https://developer.okta.com/docs/reference/api/policy/#policy-object).
|
|
15
|
-
*
|
|
16
|
-
* ## Import
|
|
17
|
-
*
|
|
18
|
-
* An Okta App's Access Policy Assignment can be imported via its associated Application ID.
|
|
19
|
-
*
|
|
20
|
-
* ```sh
|
|
21
|
-
* $ pulumi import okta:app/accessPolicyAssignment:AccessPolicyAssignment example <app id>
|
|
22
|
-
* ```
|
|
3
|
+
* Manages assignment of Access Policy to an Application
|
|
23
4
|
*/
|
|
24
5
|
export declare class AccessPolicyAssignment extends pulumi.CustomResource {
|
|
25
6
|
/**
|
|
@@ -6,26 +6,7 @@ exports.AccessPolicyAssignment = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
10
|
-
* authentication policy) to an application. This resource does not perform true
|
|
11
|
-
* delete as it will not delete an application and the app's access policy can't be
|
|
12
|
-
* removed; it can only be changed to a different access policy. This resource is
|
|
13
|
-
* only logical within the context of an application therefore `appId` is
|
|
14
|
-
* immutable once set. Use this resource to manage assigning an access policy to an
|
|
15
|
-
* application. It will assign the given `policyId` to the application at creation
|
|
16
|
-
* and during update.
|
|
17
|
-
*
|
|
18
|
-
* > Inside the product a sign-on policy is referenced as an _authentication
|
|
19
|
-
* policy_, in the public API the policy is of type
|
|
20
|
-
* [`ACCESS_POLICY`](https://developer.okta.com/docs/reference/api/policy/#policy-object).
|
|
21
|
-
*
|
|
22
|
-
* ## Import
|
|
23
|
-
*
|
|
24
|
-
* An Okta App's Access Policy Assignment can be imported via its associated Application ID.
|
|
25
|
-
*
|
|
26
|
-
* ```sh
|
|
27
|
-
* $ pulumi import okta:app/accessPolicyAssignment:AccessPolicyAssignment example <app id>
|
|
28
|
-
* ```
|
|
9
|
+
* Manages assignment of Access Policy to an Application
|
|
29
10
|
*/
|
|
30
11
|
class AccessPolicyAssignment extends pulumi.CustomResource {
|
|
31
12
|
/**
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessPolicyAssignment.js","sourceRoot":"","sources":["../../app/accessPolicyAssignment.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"accessPolicyAssignment.js","sourceRoot":"","sources":["../../app/accessPolicyAssignment.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;GAEG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAjEL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,wDAAwD,CAAC"}
|