@pulumi/okta 4.4.0 → 4.4.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +10 -129
- package/adminRoleCustom.js +1 -24
- package/adminRoleCustom.js.map +1 -1
- package/adminRoleCustomAssignments.d.ts +10 -25
- package/adminRoleCustomAssignments.js +1 -13
- package/adminRoleCustomAssignments.js.map +1 -1
- package/adminRoleTargets.d.ts +14 -44
- package/adminRoleTargets.js +0 -30
- package/adminRoleTargets.js.map +1 -1
- package/app/accessPolicyAssignment.d.ts +1 -20
- package/app/accessPolicyAssignment.js +1 -20
- package/app/accessPolicyAssignment.js.map +1 -1
- package/app/autoLogin.d.ts +72 -115
- package/app/autoLogin.js +0 -43
- package/app/autoLogin.js.map +1 -1
- package/app/basicAuth.d.ts +38 -62
- package/app/basicAuth.js +0 -24
- package/app/basicAuth.js.map +1 -1
- package/app/bookmark.d.ts +35 -67
- package/app/bookmark.js +0 -23
- package/app/bookmark.js.map +1 -1
- package/app/getApp.d.ts +58 -25
- package/app/getApp.js +2 -2
- package/app/getApp.js.map +1 -1
- package/app/getMetadataSaml.d.ts +11 -5
- package/app/getMetadataSaml.js +2 -2
- package/app/getMetadataSaml.js.map +1 -1
- package/app/getOauth.d.ts +62 -34
- package/app/getOauth.js +2 -2
- package/app/getOauth.js.map +1 -1
- package/app/getSaml.d.ts +75 -55
- package/app/getSaml.js +2 -2
- package/app/getSaml.js.map +1 -1
- package/app/groupAssignment.d.ts +6 -15
- package/app/groupAssignment.js +0 -9
- package/app/groupAssignment.js.map +1 -1
- package/app/oauth.d.ts +125 -299
- package/app/oauth.js +0 -78
- package/app/oauth.js.map +1 -1
- package/app/oauthPostLogoutRedirectUri.d.ts +0 -31
- package/app/oauthPostLogoutRedirectUri.js +0 -31
- package/app/oauthPostLogoutRedirectUri.js.map +1 -1
- package/app/oauthRedirectUri.d.ts +0 -30
- package/app/oauthRedirectUri.js +0 -30
- package/app/oauthRedirectUri.js.map +1 -1
- package/app/saml.d.ts +133 -299
- package/app/saml.js +0 -157
- package/app/saml.js.map +1 -1
- package/app/securePasswordStore.d.ts +79 -105
- package/app/securePasswordStore.js +0 -26
- package/app/securePasswordStore.js.map +1 -1
- package/app/swa.d.ts +72 -98
- package/app/swa.js +0 -26
- package/app/swa.js.map +1 -1
- package/app/threeField.d.ts +72 -83
- package/app/threeField.js +0 -11
- package/app/threeField.js.map +1 -1
- package/app/user.d.ts +12 -37
- package/app/user.js +0 -22
- package/app/user.js.map +1 -1
- package/appGroupAssignments.d.ts +3 -51
- package/appGroupAssignments.js +0 -48
- package/appGroupAssignments.js.map +1 -1
- package/appOauthApiScope.d.ts +3 -36
- package/appOauthApiScope.js +0 -33
- package/appOauthApiScope.js.map +1 -1
- package/appSamlAppSettings.d.ts +6 -44
- package/appSamlAppSettings.js +0 -38
- package/appSamlAppSettings.js.map +1 -1
- package/appSharedCredentials.d.ts +72 -111
- package/appSharedCredentials.js +0 -39
- package/appSharedCredentials.js.map +1 -1
- package/appSignonPolicy.d.ts +6 -44
- package/appSignonPolicy.js +0 -38
- package/appSignonPolicy.js.map +1 -1
- package/appSignonPolicyRule.d.ts +63 -322
- package/appSignonPolicyRule.js +0 -244
- package/appSignonPolicyRule.js.map +1 -1
- package/appUserBaseSchemaProperty.d.ts +24 -52
- package/appUserBaseSchemaProperty.js +0 -28
- package/appUserBaseSchemaProperty.js.map +1 -1
- package/appUserSchemaProperty.d.ts +54 -80
- package/appUserSchemaProperty.js +0 -26
- package/appUserSchemaProperty.js.map +1 -1
- package/auth/getServer.d.ts +11 -11
- package/auth/getServer.js +2 -2
- package/auth/getServerPolicy.d.ts +15 -9
- package/auth/getServerPolicy.js +2 -2
- package/auth/getServerPolicy.js.map +1 -1
- package/auth/getServerScopes.d.ts +8 -5
- package/auth/getServerScopes.js +2 -2
- package/auth/getServerScopes.js.map +1 -1
- package/auth/server.d.ts +13 -49
- package/auth/server.js +0 -27
- package/auth/server.js.map +1 -1
- package/auth/serverClaim.d.ts +18 -54
- package/auth/serverClaim.js +0 -27
- package/auth/serverClaim.js.map +1 -1
- package/auth/serverPolicy.d.ts +6 -43
- package/auth/serverPolicy.js +0 -28
- package/auth/serverPolicy.js.map +1 -1
- package/auth/serverPolicyClaim.d.ts +35 -71
- package/auth/serverPolicyClaim.js +4 -28
- package/auth/serverPolicyClaim.js.map +1 -1
- package/auth/serverPolicyRule.d.ts +27 -70
- package/auth/serverPolicyRule.js +0 -25
- package/auth/serverPolicyRule.js.map +1 -1
- package/auth/serverScope.d.ts +15 -41
- package/auth/serverScope.js +0 -26
- package/auth/serverScope.js.map +1 -1
- package/authServerClaimDefault.d.ts +13 -50
- package/authServerClaimDefault.js +0 -31
- package/authServerClaimDefault.js.map +1 -1
- package/authServerDefault.d.ts +13 -47
- package/authServerDefault.js +0 -25
- package/authServerDefault.js.map +1 -1
- package/authenticator.d.ts +38 -94
- package/authenticator.js +0 -38
- package/authenticator.js.map +1 -1
- package/behaviour.d.ts +18 -78
- package/behaviour.js +0 -42
- package/behaviour.js.map +1 -1
- package/brand.d.ts +17 -26
- package/brand.js +1 -10
- package/brand.js.map +1 -1
- package/captcha.d.ts +12 -38
- package/captcha.js +0 -26
- package/captcha.js.map +1 -1
- package/captchaOrgWideSettings.d.ts +6 -51
- package/captchaOrgWideSettings.js +0 -45
- package/captchaOrgWideSettings.js.map +1 -1
- package/domain.d.ts +13 -39
- package/domain.js +0 -20
- package/domain.js.map +1 -1
- package/domainCertificate.d.ts +15 -51
- package/domainCertificate.js +0 -36
- package/domainCertificate.js.map +1 -1
- package/domainVerification.d.ts +3 -22
- package/domainVerification.js +0 -19
- package/domainVerification.js.map +1 -1
- package/emailCustomization.d.ts +3 -224
- package/emailCustomization.js +0 -41
- package/emailCustomization.js.map +1 -1
- package/emailSender.d.ts +13 -39
- package/emailSender.js +0 -26
- package/emailSender.js.map +1 -1
- package/emailSenderVerification.d.ts +3 -26
- package/emailSenderVerification.js +0 -23
- package/emailSenderVerification.js.map +1 -1
- package/eventHook.d.ts +0 -37
- package/eventHook.js +0 -37
- package/eventHook.js.map +1 -1
- package/eventHookVerification.d.ts +3 -37
- package/eventHookVerification.js +0 -34
- package/eventHookVerification.js.map +1 -1
- package/factor/factor.d.ts +6 -23
- package/factor/factor.js +0 -14
- package/factor/factor.js.map +1 -1
- package/factorTotp.d.ts +12 -44
- package/factorTotp.js +0 -23
- package/factorTotp.js.map +1 -1
- package/getAppGroupAssignments.d.ts +6 -6
- package/getAppGroupAssignments.js +2 -2
- package/getAppSignonPolicy.d.ts +16 -6
- package/getAppSignonPolicy.js +8 -4
- package/getAppSignonPolicy.js.map +1 -1
- package/getAppUserAssignments.d.ts +6 -6
- package/getAppUserAssignments.js +2 -2
- package/getAuthServerClaim.d.ts +15 -12
- package/getAuthServerClaim.js +2 -2
- package/getAuthServerClaim.js.map +1 -1
- package/getAuthServerClaims.d.ts +8 -5
- package/getAuthServerClaims.js +2 -2
- package/getAuthServerClaims.js.map +1 -1
- package/getAuthenticator.d.ts +24 -26
- package/getAuthenticator.js +14 -22
- package/getAuthenticator.js.map +1 -1
- package/getBehaviour.d.ts +6 -8
- package/getBehaviour.js +2 -2
- package/getBehaviour.js.map +1 -1
- package/getBehaviours.d.ts +7 -7
- package/getBehaviours.js +2 -2
- package/getBrand.d.ts +9 -6
- package/getBrand.js +2 -2
- package/getBrand.js.map +1 -1
- package/getBrands.d.ts +2 -2
- package/getBrands.js +2 -2
- package/getEmailCustomization.d.ts +14 -9
- package/getEmailCustomization.js +2 -6
- package/getEmailCustomization.js.map +1 -1
- package/getEmailCustomizations.d.ts +11 -9
- package/getEmailCustomizations.js +2 -6
- package/getEmailCustomizations.js.map +1 -1
- package/getGroups.d.ts +11 -25
- package/getGroups.js +2 -2
- package/getGroups.js.map +1 -1
- package/getNetworkZone.d.ts +12 -12
- package/getNetworkZone.js +2 -2
- package/getRoleSubscription.d.ts +13 -35
- package/getRoleSubscription.js +2 -2
- package/getRoleSubscription.js.map +1 -1
- package/getTemplate.d.ts +10 -8
- package/getTemplate.js +2 -6
- package/getTemplate.js.map +1 -1
- package/getTemplates.d.ts +6 -7
- package/getTemplates.js +2 -6
- package/getTemplates.js.map +1 -1
- package/getTheme.d.ts +14 -12
- package/getTheme.js +2 -6
- package/getTheme.js.map +1 -1
- package/getThemes.d.ts +6 -7
- package/getThemes.js +2 -6
- package/getThemes.js.map +1 -1
- package/getTrustedOrigins.d.ts +7 -4
- package/getTrustedOrigins.js +2 -2
- package/getTrustedOrigins.js.map +1 -1
- package/getUserSecurityQuestions.d.ts +4 -8
- package/getUserSecurityQuestions.js +0 -4
- package/getUserSecurityQuestions.js.map +1 -1
- package/group/getEveryoneGroup.d.ts +10 -5
- package/group/getEveryoneGroup.js +4 -2
- package/group/getEveryoneGroup.js.map +1 -1
- package/group/getGroup.d.ts +17 -22
- package/group/getGroup.js +2 -2
- package/group/getGroup.js.map +1 -1
- package/group/getRule.d.ts +6 -15
- package/group/getRule.js +2 -2
- package/group/getRule.js.map +1 -1
- package/group/group.d.ts +9 -46
- package/group/group.js +0 -37
- package/group/group.js.map +1 -1
- package/group/role.d.ts +15 -101
- package/group/role.js +0 -26
- package/group/role.js.map +1 -1
- package/group/rule.d.ts +6 -84
- package/group/rule.js +0 -27
- package/group/rule.js.map +1 -1
- package/groupMemberships.d.ts +7 -42
- package/groupMemberships.js +1 -36
- package/groupMemberships.js.map +1 -1
- package/groupSchemaProperty.d.ts +51 -94
- package/groupSchemaProperty.js +0 -25
- package/groupSchemaProperty.js.map +1 -1
- package/idp/getMetadataSaml.d.ts +9 -6
- package/idp/getMetadataSaml.js +2 -2
- package/idp/getMetadataSaml.js.map +1 -1
- package/idp/getOidc.d.ts +9 -9
- package/idp/getOidc.js +2 -2
- package/idp/getSaml.d.ts +16 -13
- package/idp/getSaml.js +2 -2
- package/idp/getSaml.js.map +1 -1
- package/idp/getSocial.d.ts +8 -2
- package/idp/getSocial.js +2 -2
- package/idp/getSocial.js.map +1 -1
- package/idp/oidc.d.ts +12 -297
- package/idp/oidc.js +0 -36
- package/idp/oidc.js.map +1 -1
- package/idp/saml.d.ts +18 -284
- package/idp/saml.js +0 -32
- package/idp/saml.js.map +1 -1
- package/idp/samlKey.d.ts +3 -48
- package/idp/samlKey.js +0 -9
- package/idp/samlKey.js.map +1 -1
- package/idp/social.d.ts +18 -251
- package/idp/social.js +0 -32
- package/idp/social.js.map +1 -1
- package/index/emailDomain.d.ts +16 -41
- package/index/emailDomain.js +0 -25
- package/index/emailDomain.js.map +1 -1
- package/index/emailDomainVerification.d.ts +3 -25
- package/index/emailDomainVerification.js +0 -22
- package/index/emailDomainVerification.js.map +1 -1
- package/index/getDomain.d.ts +11 -14
- package/index/getDomain.js +2 -8
- package/index/getDomain.js.map +1 -1
- package/inline/hook.d.ts +0 -89
- package/inline/hook.js +0 -35
- package/inline/hook.js.map +1 -1
- package/linkDefinition.d.ts +0 -30
- package/linkDefinition.js +0 -30
- package/linkDefinition.js.map +1 -1
- package/linkValue.d.ts +6 -59
- package/linkValue.js +0 -53
- package/linkValue.js.map +1 -1
- package/network/zone.d.ts +27 -74
- package/network/zone.js +0 -44
- package/network/zone.js.map +1 -1
- package/orgConfiguration.d.ts +0 -25
- package/orgConfiguration.js +0 -25
- package/orgConfiguration.js.map +1 -1
- package/orgSupport.d.ts +3 -20
- package/orgSupport.js +0 -17
- package/orgSupport.js.map +1 -1
- package/package.json +2 -2
- package/package.json.bak +1 -1
- package/policy/getDefaultPolicy.d.ts +9 -7
- package/policy/getDefaultPolicy.js +6 -2
- package/policy/getDefaultPolicy.js.map +1 -1
- package/policy/getPolicy.d.ts +11 -10
- package/policy/getPolicy.js +2 -2
- package/policy/getPolicy.js.map +1 -1
- package/policy/mfa.d.ts +18 -259
- package/policy/mfa.js +0 -49
- package/policy/mfa.js.map +1 -1
- package/policy/password.d.ts +90 -117
- package/policy/password.js +0 -27
- package/policy/password.js.map +1 -1
- package/policy/ruleIdpDiscovery.d.ts +27 -149
- package/policy/ruleIdpDiscovery.js +0 -65
- package/policy/ruleIdpDiscovery.js.map +1 -1
- package/policy/ruleMfa.d.ts +24 -35
- package/policy/ruleMfa.js +0 -11
- package/policy/ruleMfa.js.map +1 -1
- package/policy/rulePassword.d.ts +33 -46
- package/policy/rulePassword.js +0 -13
- package/policy/rulePassword.js.map +1 -1
- package/policy/ruleSignon.d.ts +57 -170
- package/policy/ruleSignon.js +0 -92
- package/policy/ruleSignon.js.map +1 -1
- package/policy/signon.d.ts +15 -41
- package/policy/signon.js +0 -26
- package/policy/signon.js.map +1 -1
- package/policyMfaDefault.d.ts +13 -250
- package/policyMfaDefault.js +0 -45
- package/policyMfaDefault.js.map +1 -1
- package/policyPasswordDefault.d.ts +54 -88
- package/policyPasswordDefault.js +0 -22
- package/policyPasswordDefault.js.map +1 -1
- package/policyProfileEnrollment.d.ts +6 -28
- package/policyProfileEnrollment.js +0 -22
- package/policyProfileEnrollment.js.map +1 -1
- package/policyProfileEnrollmentApps.d.ts +5 -42
- package/policyProfileEnrollmentApps.js +0 -37
- package/policyProfileEnrollmentApps.js.map +1 -1
- package/policyRuleProfileEnrollment.d.ts +23 -85
- package/policyRuleProfileEnrollment.js +0 -62
- package/policyRuleProfileEnrollment.js.map +1 -1
- package/profile/mapping.d.ts +9 -95
- package/profile/mapping.js +0 -41
- package/profile/mapping.js.map +1 -1
- package/rateLimiting.d.ts +9 -43
- package/rateLimiting.js +0 -28
- package/rateLimiting.js.map +1 -1
- package/resourceSet.d.ts +10 -32
- package/resourceSet.js +1 -20
- package/resourceSet.js.map +1 -1
- package/roleSubscription.d.ts +9 -110
- package/roleSubscription.js +0 -26
- package/roleSubscription.js.map +1 -1
- package/securityNotificationEmails.d.ts +15 -45
- package/securityNotificationEmails.js +0 -30
- package/securityNotificationEmails.js.map +1 -1
- package/templateSms.d.ts +3 -47
- package/templateSms.js +0 -35
- package/templateSms.js.map +1 -1
- package/theme.d.ts +44 -53
- package/theme.js +0 -9
- package/theme.js.map +1 -1
- package/threatInsightSettings.d.ts +6 -58
- package/threatInsightSettings.js +0 -34
- package/threatInsightSettings.js.map +1 -1
- package/trustedorigin/origin.d.ts +12 -37
- package/trustedorigin/origin.js +0 -25
- package/trustedorigin/origin.js.map +1 -1
- package/types/input.d.ts +60 -227
- package/types/output.d.ts +56 -446
- package/user/getUser.d.ts +32 -104
- package/user/getUser.js +2 -2
- package/user/getUser.js.map +1 -1
- package/user/getUserProfileMappingSource.d.ts +9 -7
- package/user/getUserProfileMappingSource.js +6 -4
- package/user/getUserProfileMappingSource.js.map +1 -1
- package/user/getUserType.d.ts +7 -7
- package/user/getUserType.js +2 -2
- package/user/getUsers.d.ts +61 -57
- package/user/getUsers.js +30 -44
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +117 -215
- package/user/user.js +0 -71
- package/user/user.js.map +1 -1
- package/user/userType.d.ts +9 -34
- package/user/userType.js +0 -25
- package/user/userType.js.map +1 -1
- package/userAdminRoles.d.ts +10 -41
- package/userAdminRoles.js +1 -29
- package/userAdminRoles.js.map +1 -1
- package/userBaseSchemaProperty.d.ts +24 -67
- package/userBaseSchemaProperty.js +0 -43
- package/userBaseSchemaProperty.js.map +1 -1
- package/userFactorQuestion.d.ts +14 -52
- package/userFactorQuestion.js +1 -39
- package/userFactorQuestion.js.map +1 -1
- package/userGroupMemberships.d.ts +4 -23
- package/userGroupMemberships.js +1 -20
- package/userGroupMemberships.js.map +1 -1
- package/userSchemaProperty.d.ts +57 -107
- package/userSchemaProperty.js +0 -32
- package/userSchemaProperty.js.map +1 -1
- package/scripts/install-pulumi-plugin.js +0 -21
package/policy/signon.d.ts
CHANGED
|
@@ -1,30 +1,4 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
-
/**
|
|
3
|
-
* Creates a Sign On Policy.
|
|
4
|
-
*
|
|
5
|
-
* This resource allows you to create and configure a Sign On Policy.
|
|
6
|
-
*
|
|
7
|
-
* ## Example Usage
|
|
8
|
-
*
|
|
9
|
-
* ```typescript
|
|
10
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
-
* import * as okta from "@pulumi/okta";
|
|
12
|
-
*
|
|
13
|
-
* const example = new okta.policy.Signon("example", {
|
|
14
|
-
* description: "Example",
|
|
15
|
-
* groupsIncludeds: [data.okta_group.everyone.id],
|
|
16
|
-
* status: "ACTIVE",
|
|
17
|
-
* });
|
|
18
|
-
* ```
|
|
19
|
-
*
|
|
20
|
-
* ## Import
|
|
21
|
-
*
|
|
22
|
-
* A Sign On Policy can be imported via the Okta ID.
|
|
23
|
-
*
|
|
24
|
-
* ```sh
|
|
25
|
-
* $ pulumi import okta:policy/signon:Signon example <policy id>
|
|
26
|
-
* ```
|
|
27
|
-
*/
|
|
28
2
|
export declare class Signon extends pulumi.CustomResource {
|
|
29
3
|
/**
|
|
30
4
|
* Get an existing Signon resource's state with the given name, ID, and optional extra
|
|
@@ -42,23 +16,23 @@ export declare class Signon extends pulumi.CustomResource {
|
|
|
42
16
|
*/
|
|
43
17
|
static isInstance(obj: any): obj is Signon;
|
|
44
18
|
/**
|
|
45
|
-
* Policy Description
|
|
19
|
+
* Policy Description
|
|
46
20
|
*/
|
|
47
21
|
readonly description: pulumi.Output<string | undefined>;
|
|
48
22
|
/**
|
|
49
|
-
* List of Group IDs to Include
|
|
23
|
+
* List of Group IDs to Include
|
|
50
24
|
*/
|
|
51
25
|
readonly groupsIncludeds: pulumi.Output<string[] | undefined>;
|
|
52
26
|
/**
|
|
53
|
-
* Policy Name
|
|
27
|
+
* Policy Name
|
|
54
28
|
*/
|
|
55
29
|
readonly name: pulumi.Output<string>;
|
|
56
30
|
/**
|
|
57
|
-
* Priority
|
|
31
|
+
* Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
|
|
58
32
|
*/
|
|
59
33
|
readonly priority: pulumi.Output<number | undefined>;
|
|
60
34
|
/**
|
|
61
|
-
* Policy Status:
|
|
35
|
+
* Policy Status: ACTIVE or INACTIVE.
|
|
62
36
|
*/
|
|
63
37
|
readonly status: pulumi.Output<string | undefined>;
|
|
64
38
|
/**
|
|
@@ -75,23 +49,23 @@ export declare class Signon extends pulumi.CustomResource {
|
|
|
75
49
|
*/
|
|
76
50
|
export interface SignonState {
|
|
77
51
|
/**
|
|
78
|
-
* Policy Description
|
|
52
|
+
* Policy Description
|
|
79
53
|
*/
|
|
80
54
|
description?: pulumi.Input<string>;
|
|
81
55
|
/**
|
|
82
|
-
* List of Group IDs to Include
|
|
56
|
+
* List of Group IDs to Include
|
|
83
57
|
*/
|
|
84
58
|
groupsIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
85
59
|
/**
|
|
86
|
-
* Policy Name
|
|
60
|
+
* Policy Name
|
|
87
61
|
*/
|
|
88
62
|
name?: pulumi.Input<string>;
|
|
89
63
|
/**
|
|
90
|
-
* Priority
|
|
64
|
+
* Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
|
|
91
65
|
*/
|
|
92
66
|
priority?: pulumi.Input<number>;
|
|
93
67
|
/**
|
|
94
|
-
* Policy Status:
|
|
68
|
+
* Policy Status: ACTIVE or INACTIVE.
|
|
95
69
|
*/
|
|
96
70
|
status?: pulumi.Input<string>;
|
|
97
71
|
}
|
|
@@ -100,23 +74,23 @@ export interface SignonState {
|
|
|
100
74
|
*/
|
|
101
75
|
export interface SignonArgs {
|
|
102
76
|
/**
|
|
103
|
-
* Policy Description
|
|
77
|
+
* Policy Description
|
|
104
78
|
*/
|
|
105
79
|
description?: pulumi.Input<string>;
|
|
106
80
|
/**
|
|
107
|
-
* List of Group IDs to Include
|
|
81
|
+
* List of Group IDs to Include
|
|
108
82
|
*/
|
|
109
83
|
groupsIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
110
84
|
/**
|
|
111
|
-
* Policy Name
|
|
85
|
+
* Policy Name
|
|
112
86
|
*/
|
|
113
87
|
name?: pulumi.Input<string>;
|
|
114
88
|
/**
|
|
115
|
-
* Priority
|
|
89
|
+
* Policy Priority, this attribute can be set to a valid priority. To avoid endless diff situation we error if an invalid priority is provided. API defaults it to the last (lowest) if not there.
|
|
116
90
|
*/
|
|
117
91
|
priority?: pulumi.Input<number>;
|
|
118
92
|
/**
|
|
119
|
-
* Policy Status:
|
|
93
|
+
* Policy Status: ACTIVE or INACTIVE.
|
|
120
94
|
*/
|
|
121
95
|
status?: pulumi.Input<string>;
|
|
122
96
|
}
|
package/policy/signon.js
CHANGED
|
@@ -5,32 +5,6 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.Signon = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
-
/**
|
|
9
|
-
* Creates a Sign On Policy.
|
|
10
|
-
*
|
|
11
|
-
* This resource allows you to create and configure a Sign On Policy.
|
|
12
|
-
*
|
|
13
|
-
* ## Example Usage
|
|
14
|
-
*
|
|
15
|
-
* ```typescript
|
|
16
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
-
* import * as okta from "@pulumi/okta";
|
|
18
|
-
*
|
|
19
|
-
* const example = new okta.policy.Signon("example", {
|
|
20
|
-
* description: "Example",
|
|
21
|
-
* groupsIncludeds: [data.okta_group.everyone.id],
|
|
22
|
-
* status: "ACTIVE",
|
|
23
|
-
* });
|
|
24
|
-
* ```
|
|
25
|
-
*
|
|
26
|
-
* ## Import
|
|
27
|
-
*
|
|
28
|
-
* A Sign On Policy can be imported via the Okta ID.
|
|
29
|
-
*
|
|
30
|
-
* ```sh
|
|
31
|
-
* $ pulumi import okta:policy/signon:Signon example <policy id>
|
|
32
|
-
* ```
|
|
33
|
-
*/
|
|
34
8
|
class Signon extends pulumi.CustomResource {
|
|
35
9
|
/**
|
|
36
10
|
* Get an existing Signon resource's state with the given name, ID, and optional extra
|
package/policy/signon.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"signon.js","sourceRoot":"","sources":["../../policy/signon.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"signon.js","sourceRoot":"","sources":["../../policy/signon.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,MAAa,MAAO,SAAQ,MAAM,CAAC,cAAc;IAC7C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmB,EAAE,IAAmC;QACjH,OAAO,IAAI,MAAM,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,MAAM,CAAC,YAAY,CAAC;IACvD,CAAC;IA+BD,YAAY,IAAY,EAAE,WAAsC,EAAE,IAAmC;QACjG,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsC,CAAC;YACrD,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAAqC,CAAC;YACnD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7D;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,MAAM,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3D,CAAC;;AA7EL,wBA8EC;AAhEG,gBAAgB;AACO,mBAAY,GAAG,2BAA2B,CAAC"}
|
package/policyMfaDefault.d.ts
CHANGED
|
@@ -1,49 +1,4 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
-
/**
|
|
3
|
-
* Configures default MFA Policy.
|
|
4
|
-
*
|
|
5
|
-
* This resource allows you to configure default MFA Policy.
|
|
6
|
-
*
|
|
7
|
-
* > Requires Org Feature Flag `OKTA_MFA_POLICY`. Contact support to have this feature flag ***enabled***.
|
|
8
|
-
*
|
|
9
|
-
* > Unless Org Feature Flag `ENG_ENABLE_OPTIONAL_PASSWORD_ENROLLMENT` is ***disabled*** `oktaPassword` or `oktaEmail` must be present and its `enroll` value set to `REQUIRED`. Contact support to have this feature flag ***disabled***.
|
|
10
|
-
*
|
|
11
|
-
* ## Example Usage
|
|
12
|
-
*
|
|
13
|
-
* ```typescript
|
|
14
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
-
* import * as okta from "@pulumi/okta";
|
|
16
|
-
*
|
|
17
|
-
* const classicExample = new okta.PolicyMfaDefault("classicExample", {
|
|
18
|
-
* isOie: false,
|
|
19
|
-
* oktaOtp: {
|
|
20
|
-
* enroll: "REQUIRED",
|
|
21
|
-
* },
|
|
22
|
-
* oktaPassword: {
|
|
23
|
-
* enroll: "REQUIRED",
|
|
24
|
-
* },
|
|
25
|
-
* });
|
|
26
|
-
* const oieExample = new okta.PolicyMfaDefault("oieExample", {
|
|
27
|
-
* isOie: true,
|
|
28
|
-
* oktaPassword: {
|
|
29
|
-
* enroll: "REQUIRED",
|
|
30
|
-
* },
|
|
31
|
-
* oktaVerify: {
|
|
32
|
-
* enroll: "REQUIRED",
|
|
33
|
-
* },
|
|
34
|
-
* });
|
|
35
|
-
* ```
|
|
36
|
-
*
|
|
37
|
-
* > If the `okta.PolicyMfaDefault` is used in conjunction with `okta.policy.Mfa` resources, ensure to use a `dependsOn` attribute for the default policy to ensure that all other policies are created/updated first such that the `priority` field can be appropriately computed on the first plan/apply.
|
|
38
|
-
*
|
|
39
|
-
* ## Import
|
|
40
|
-
*
|
|
41
|
-
* Default MFA Policy can be imported without providing Okta ID.
|
|
42
|
-
*
|
|
43
|
-
* ```sh
|
|
44
|
-
* $ pulumi import okta:index/policyMfaDefault:PolicyMfaDefault example .
|
|
45
|
-
* ```
|
|
46
|
-
*/
|
|
47
2
|
export declare class PolicyMfaDefault extends pulumi.CustomResource {
|
|
48
3
|
/**
|
|
49
4
|
* Get an existing PolicyMfaDefault resource's state with the given name, ID, and optional extra
|
|
@@ -61,153 +16,89 @@ export declare class PolicyMfaDefault extends pulumi.CustomResource {
|
|
|
61
16
|
*/
|
|
62
17
|
static isInstance(obj: any): obj is PolicyMfaDefault;
|
|
63
18
|
/**
|
|
64
|
-
*
|
|
19
|
+
* Default group ID (always included)
|
|
65
20
|
*/
|
|
66
21
|
readonly defaultIncludedGroupId: pulumi.Output<string>;
|
|
67
22
|
/**
|
|
68
|
-
* Default policy description
|
|
23
|
+
* Default policy description
|
|
69
24
|
*/
|
|
70
25
|
readonly description: pulumi.Output<string>;
|
|
71
|
-
/**
|
|
72
|
-
* DUO MFA policy settings (✓ Classic, ✓ OIE).
|
|
73
|
-
*/
|
|
74
26
|
readonly duo: pulumi.Output<{
|
|
75
27
|
[key: string]: string;
|
|
76
28
|
} | undefined>;
|
|
77
|
-
/**
|
|
78
|
-
* External IDP MFA policy settings (✓ OIE).
|
|
79
|
-
*/
|
|
80
29
|
readonly externalIdp: pulumi.Output<{
|
|
81
30
|
[key: string]: string;
|
|
82
31
|
} | undefined>;
|
|
83
|
-
/**
|
|
84
|
-
* Fido U2F MFA policy settings (✓ Classic).
|
|
85
|
-
*/
|
|
86
32
|
readonly fidoU2f: pulumi.Output<{
|
|
87
33
|
[key: string]: string;
|
|
88
34
|
} | undefined>;
|
|
89
|
-
/**
|
|
90
|
-
* Fido Web Authn MFA policy settings (✓ Classic).
|
|
91
|
-
*/
|
|
92
35
|
readonly fidoWebauthn: pulumi.Output<{
|
|
93
36
|
[key: string]: string;
|
|
94
37
|
} | undefined>;
|
|
95
|
-
/**
|
|
96
|
-
* Google OTP MFA policy settings (✓ Classic, ✓ OIE).
|
|
97
|
-
*/
|
|
98
38
|
readonly googleOtp: pulumi.Output<{
|
|
99
39
|
[key: string]: string;
|
|
100
40
|
} | undefined>;
|
|
101
|
-
/**
|
|
102
|
-
* HMAC-based One-Time Password MFA policy settings (✓ Classic).
|
|
103
|
-
*/
|
|
104
41
|
readonly hotp: pulumi.Output<{
|
|
105
42
|
[key: string]: string;
|
|
106
43
|
} | undefined>;
|
|
107
44
|
/**
|
|
108
|
-
*
|
|
109
|
-
* > **WARNING:** Tenant must have the Okta Identity Engine enabled in order to use this feature.
|
|
45
|
+
* Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
|
|
110
46
|
*/
|
|
111
47
|
readonly isOie: pulumi.Output<boolean | undefined>;
|
|
112
48
|
/**
|
|
113
|
-
* Default policy name
|
|
49
|
+
* Default policy name
|
|
114
50
|
*/
|
|
115
51
|
readonly name: pulumi.Output<string>;
|
|
116
|
-
/**
|
|
117
|
-
* Okta Call MFA policy settings (✓ Classic).
|
|
118
|
-
*/
|
|
119
52
|
readonly oktaCall: pulumi.Output<{
|
|
120
53
|
[key: string]: string;
|
|
121
54
|
} | undefined>;
|
|
122
|
-
/**
|
|
123
|
-
* Okta Email MFA policy settings (✓ Classic, ✓ OIE).
|
|
124
|
-
*/
|
|
125
55
|
readonly oktaEmail: pulumi.Output<{
|
|
126
56
|
[key: string]: string;
|
|
127
57
|
} | undefined>;
|
|
128
|
-
/**
|
|
129
|
-
* Okta OTP (via the Okta Verify app) MFA policy settings (✓ Classic).
|
|
130
|
-
*/
|
|
131
58
|
readonly oktaOtp: pulumi.Output<{
|
|
132
59
|
[key: string]: string;
|
|
133
60
|
} | undefined>;
|
|
134
|
-
/**
|
|
135
|
-
* Okta Password MFA policy settings (✓ Classic, ✓ OIE).
|
|
136
|
-
*/
|
|
137
61
|
readonly oktaPassword: pulumi.Output<{
|
|
138
62
|
[key: string]: string;
|
|
139
63
|
} | undefined>;
|
|
140
|
-
/**
|
|
141
|
-
* Okta Push MFA policy settings (✓ Classic).
|
|
142
|
-
*/
|
|
143
64
|
readonly oktaPush: pulumi.Output<{
|
|
144
65
|
[key: string]: string;
|
|
145
66
|
} | undefined>;
|
|
146
|
-
/**
|
|
147
|
-
* Okta Question MFA policy settings (✓ Classic).
|
|
148
|
-
*/
|
|
149
67
|
readonly oktaQuestion: pulumi.Output<{
|
|
150
68
|
[key: string]: string;
|
|
151
69
|
} | undefined>;
|
|
152
|
-
/**
|
|
153
|
-
* Okta SMS MFA policy settings (✓ Classic).
|
|
154
|
-
*/
|
|
155
70
|
readonly oktaSms: pulumi.Output<{
|
|
156
71
|
[key: string]: string;
|
|
157
72
|
} | undefined>;
|
|
158
|
-
/**
|
|
159
|
-
* Okta Verify MFA policy settings (✓ OIE).
|
|
160
|
-
*/
|
|
161
73
|
readonly oktaVerify: pulumi.Output<{
|
|
162
74
|
[key: string]: string;
|
|
163
75
|
} | undefined>;
|
|
164
|
-
/**
|
|
165
|
-
* On-Prem MFA MFA policy settings (✓ OIE).
|
|
166
|
-
*/
|
|
167
76
|
readonly onpremMfa: pulumi.Output<{
|
|
168
77
|
[key: string]: string;
|
|
169
78
|
} | undefined>;
|
|
170
|
-
/**
|
|
171
|
-
* Phone Number MFA policy settings (✓ OIE).
|
|
172
|
-
*/
|
|
173
79
|
readonly phoneNumber: pulumi.Output<{
|
|
174
80
|
[key: string]: string;
|
|
175
81
|
} | undefined>;
|
|
176
82
|
/**
|
|
177
|
-
* Default policy priority
|
|
83
|
+
* Default policy priority
|
|
178
84
|
*/
|
|
179
85
|
readonly priority: pulumi.Output<number>;
|
|
180
|
-
/**
|
|
181
|
-
* RSA Token MFA policy settings (✓ Classic, ✓ OIE).
|
|
182
|
-
*/
|
|
183
86
|
readonly rsaToken: pulumi.Output<{
|
|
184
87
|
[key: string]: string;
|
|
185
88
|
} | undefined>;
|
|
186
|
-
/**
|
|
187
|
-
* Security Question MFA policy settings (✓ OIE).
|
|
188
|
-
*/
|
|
189
89
|
readonly securityQuestion: pulumi.Output<{
|
|
190
90
|
[key: string]: string;
|
|
191
91
|
} | undefined>;
|
|
192
92
|
/**
|
|
193
|
-
* Default policy status
|
|
93
|
+
* Default policy status
|
|
194
94
|
*/
|
|
195
95
|
readonly status: pulumi.Output<string>;
|
|
196
|
-
/**
|
|
197
|
-
* Symantec VIP MFA policy settings (✓ Classic).
|
|
198
|
-
*/
|
|
199
96
|
readonly symantecVip: pulumi.Output<{
|
|
200
97
|
[key: string]: string;
|
|
201
98
|
} | undefined>;
|
|
202
|
-
/**
|
|
203
|
-
* FIDO2 (WebAuthn) MFA policy settings (✓ OIE).
|
|
204
|
-
*/
|
|
205
99
|
readonly webauthn: pulumi.Output<{
|
|
206
100
|
[key: string]: string;
|
|
207
101
|
} | undefined>;
|
|
208
|
-
/**
|
|
209
|
-
* Yubikey Token MFA policy settings (✓ Classic, ✓ OIE).
|
|
210
|
-
*/
|
|
211
102
|
readonly yubikeyToken: pulumi.Output<{
|
|
212
103
|
[key: string]: string;
|
|
213
104
|
} | undefined>;
|
|
@@ -225,153 +116,89 @@ export declare class PolicyMfaDefault extends pulumi.CustomResource {
|
|
|
225
116
|
*/
|
|
226
117
|
export interface PolicyMfaDefaultState {
|
|
227
118
|
/**
|
|
228
|
-
*
|
|
119
|
+
* Default group ID (always included)
|
|
229
120
|
*/
|
|
230
121
|
defaultIncludedGroupId?: pulumi.Input<string>;
|
|
231
122
|
/**
|
|
232
|
-
* Default policy description
|
|
123
|
+
* Default policy description
|
|
233
124
|
*/
|
|
234
125
|
description?: pulumi.Input<string>;
|
|
235
|
-
/**
|
|
236
|
-
* DUO MFA policy settings (✓ Classic, ✓ OIE).
|
|
237
|
-
*/
|
|
238
126
|
duo?: pulumi.Input<{
|
|
239
127
|
[key: string]: pulumi.Input<string>;
|
|
240
128
|
}>;
|
|
241
|
-
/**
|
|
242
|
-
* External IDP MFA policy settings (✓ OIE).
|
|
243
|
-
*/
|
|
244
129
|
externalIdp?: pulumi.Input<{
|
|
245
130
|
[key: string]: pulumi.Input<string>;
|
|
246
131
|
}>;
|
|
247
|
-
/**
|
|
248
|
-
* Fido U2F MFA policy settings (✓ Classic).
|
|
249
|
-
*/
|
|
250
132
|
fidoU2f?: pulumi.Input<{
|
|
251
133
|
[key: string]: pulumi.Input<string>;
|
|
252
134
|
}>;
|
|
253
|
-
/**
|
|
254
|
-
* Fido Web Authn MFA policy settings (✓ Classic).
|
|
255
|
-
*/
|
|
256
135
|
fidoWebauthn?: pulumi.Input<{
|
|
257
136
|
[key: string]: pulumi.Input<string>;
|
|
258
137
|
}>;
|
|
259
|
-
/**
|
|
260
|
-
* Google OTP MFA policy settings (✓ Classic, ✓ OIE).
|
|
261
|
-
*/
|
|
262
138
|
googleOtp?: pulumi.Input<{
|
|
263
139
|
[key: string]: pulumi.Input<string>;
|
|
264
140
|
}>;
|
|
265
|
-
/**
|
|
266
|
-
* HMAC-based One-Time Password MFA policy settings (✓ Classic).
|
|
267
|
-
*/
|
|
268
141
|
hotp?: pulumi.Input<{
|
|
269
142
|
[key: string]: pulumi.Input<string>;
|
|
270
143
|
}>;
|
|
271
144
|
/**
|
|
272
|
-
*
|
|
273
|
-
* > **WARNING:** Tenant must have the Okta Identity Engine enabled in order to use this feature.
|
|
145
|
+
* Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
|
|
274
146
|
*/
|
|
275
147
|
isOie?: pulumi.Input<boolean>;
|
|
276
148
|
/**
|
|
277
|
-
* Default policy name
|
|
149
|
+
* Default policy name
|
|
278
150
|
*/
|
|
279
151
|
name?: pulumi.Input<string>;
|
|
280
|
-
/**
|
|
281
|
-
* Okta Call MFA policy settings (✓ Classic).
|
|
282
|
-
*/
|
|
283
152
|
oktaCall?: pulumi.Input<{
|
|
284
153
|
[key: string]: pulumi.Input<string>;
|
|
285
154
|
}>;
|
|
286
|
-
/**
|
|
287
|
-
* Okta Email MFA policy settings (✓ Classic, ✓ OIE).
|
|
288
|
-
*/
|
|
289
155
|
oktaEmail?: pulumi.Input<{
|
|
290
156
|
[key: string]: pulumi.Input<string>;
|
|
291
157
|
}>;
|
|
292
|
-
/**
|
|
293
|
-
* Okta OTP (via the Okta Verify app) MFA policy settings (✓ Classic).
|
|
294
|
-
*/
|
|
295
158
|
oktaOtp?: pulumi.Input<{
|
|
296
159
|
[key: string]: pulumi.Input<string>;
|
|
297
160
|
}>;
|
|
298
|
-
/**
|
|
299
|
-
* Okta Password MFA policy settings (✓ Classic, ✓ OIE).
|
|
300
|
-
*/
|
|
301
161
|
oktaPassword?: pulumi.Input<{
|
|
302
162
|
[key: string]: pulumi.Input<string>;
|
|
303
163
|
}>;
|
|
304
|
-
/**
|
|
305
|
-
* Okta Push MFA policy settings (✓ Classic).
|
|
306
|
-
*/
|
|
307
164
|
oktaPush?: pulumi.Input<{
|
|
308
165
|
[key: string]: pulumi.Input<string>;
|
|
309
166
|
}>;
|
|
310
|
-
/**
|
|
311
|
-
* Okta Question MFA policy settings (✓ Classic).
|
|
312
|
-
*/
|
|
313
167
|
oktaQuestion?: pulumi.Input<{
|
|
314
168
|
[key: string]: pulumi.Input<string>;
|
|
315
169
|
}>;
|
|
316
|
-
/**
|
|
317
|
-
* Okta SMS MFA policy settings (✓ Classic).
|
|
318
|
-
*/
|
|
319
170
|
oktaSms?: pulumi.Input<{
|
|
320
171
|
[key: string]: pulumi.Input<string>;
|
|
321
172
|
}>;
|
|
322
|
-
/**
|
|
323
|
-
* Okta Verify MFA policy settings (✓ OIE).
|
|
324
|
-
*/
|
|
325
173
|
oktaVerify?: pulumi.Input<{
|
|
326
174
|
[key: string]: pulumi.Input<string>;
|
|
327
175
|
}>;
|
|
328
|
-
/**
|
|
329
|
-
* On-Prem MFA MFA policy settings (✓ OIE).
|
|
330
|
-
*/
|
|
331
176
|
onpremMfa?: pulumi.Input<{
|
|
332
177
|
[key: string]: pulumi.Input<string>;
|
|
333
178
|
}>;
|
|
334
|
-
/**
|
|
335
|
-
* Phone Number MFA policy settings (✓ OIE).
|
|
336
|
-
*/
|
|
337
179
|
phoneNumber?: pulumi.Input<{
|
|
338
180
|
[key: string]: pulumi.Input<string>;
|
|
339
181
|
}>;
|
|
340
182
|
/**
|
|
341
|
-
* Default policy priority
|
|
183
|
+
* Default policy priority
|
|
342
184
|
*/
|
|
343
185
|
priority?: pulumi.Input<number>;
|
|
344
|
-
/**
|
|
345
|
-
* RSA Token MFA policy settings (✓ Classic, ✓ OIE).
|
|
346
|
-
*/
|
|
347
186
|
rsaToken?: pulumi.Input<{
|
|
348
187
|
[key: string]: pulumi.Input<string>;
|
|
349
188
|
}>;
|
|
350
|
-
/**
|
|
351
|
-
* Security Question MFA policy settings (✓ OIE).
|
|
352
|
-
*/
|
|
353
189
|
securityQuestion?: pulumi.Input<{
|
|
354
190
|
[key: string]: pulumi.Input<string>;
|
|
355
191
|
}>;
|
|
356
192
|
/**
|
|
357
|
-
* Default policy status
|
|
193
|
+
* Default policy status
|
|
358
194
|
*/
|
|
359
195
|
status?: pulumi.Input<string>;
|
|
360
|
-
/**
|
|
361
|
-
* Symantec VIP MFA policy settings (✓ Classic).
|
|
362
|
-
*/
|
|
363
196
|
symantecVip?: pulumi.Input<{
|
|
364
197
|
[key: string]: pulumi.Input<string>;
|
|
365
198
|
}>;
|
|
366
|
-
/**
|
|
367
|
-
* FIDO2 (WebAuthn) MFA policy settings (✓ OIE).
|
|
368
|
-
*/
|
|
369
199
|
webauthn?: pulumi.Input<{
|
|
370
200
|
[key: string]: pulumi.Input<string>;
|
|
371
201
|
}>;
|
|
372
|
-
/**
|
|
373
|
-
* Yubikey Token MFA policy settings (✓ Classic, ✓ OIE).
|
|
374
|
-
*/
|
|
375
202
|
yubikeyToken?: pulumi.Input<{
|
|
376
203
|
[key: string]: pulumi.Input<string>;
|
|
377
204
|
}>;
|
|
@@ -380,134 +207,70 @@ export interface PolicyMfaDefaultState {
|
|
|
380
207
|
* The set of arguments for constructing a PolicyMfaDefault resource.
|
|
381
208
|
*/
|
|
382
209
|
export interface PolicyMfaDefaultArgs {
|
|
383
|
-
/**
|
|
384
|
-
* DUO MFA policy settings (✓ Classic, ✓ OIE).
|
|
385
|
-
*/
|
|
386
210
|
duo?: pulumi.Input<{
|
|
387
211
|
[key: string]: pulumi.Input<string>;
|
|
388
212
|
}>;
|
|
389
|
-
/**
|
|
390
|
-
* External IDP MFA policy settings (✓ OIE).
|
|
391
|
-
*/
|
|
392
213
|
externalIdp?: pulumi.Input<{
|
|
393
214
|
[key: string]: pulumi.Input<string>;
|
|
394
215
|
}>;
|
|
395
|
-
/**
|
|
396
|
-
* Fido U2F MFA policy settings (✓ Classic).
|
|
397
|
-
*/
|
|
398
216
|
fidoU2f?: pulumi.Input<{
|
|
399
217
|
[key: string]: pulumi.Input<string>;
|
|
400
218
|
}>;
|
|
401
|
-
/**
|
|
402
|
-
* Fido Web Authn MFA policy settings (✓ Classic).
|
|
403
|
-
*/
|
|
404
219
|
fidoWebauthn?: pulumi.Input<{
|
|
405
220
|
[key: string]: pulumi.Input<string>;
|
|
406
221
|
}>;
|
|
407
|
-
/**
|
|
408
|
-
* Google OTP MFA policy settings (✓ Classic, ✓ OIE).
|
|
409
|
-
*/
|
|
410
222
|
googleOtp?: pulumi.Input<{
|
|
411
223
|
[key: string]: pulumi.Input<string>;
|
|
412
224
|
}>;
|
|
413
|
-
/**
|
|
414
|
-
* HMAC-based One-Time Password MFA policy settings (✓ Classic).
|
|
415
|
-
*/
|
|
416
225
|
hotp?: pulumi.Input<{
|
|
417
226
|
[key: string]: pulumi.Input<string>;
|
|
418
227
|
}>;
|
|
419
228
|
/**
|
|
420
|
-
*
|
|
421
|
-
* > **WARNING:** Tenant must have the Okta Identity Engine enabled in order to use this feature.
|
|
229
|
+
* Is the policy using Okta Identity Engine (OIE) with authenticators instead of factors?
|
|
422
230
|
*/
|
|
423
231
|
isOie?: pulumi.Input<boolean>;
|
|
424
|
-
/**
|
|
425
|
-
* Okta Call MFA policy settings (✓ Classic).
|
|
426
|
-
*/
|
|
427
232
|
oktaCall?: pulumi.Input<{
|
|
428
233
|
[key: string]: pulumi.Input<string>;
|
|
429
234
|
}>;
|
|
430
|
-
/**
|
|
431
|
-
* Okta Email MFA policy settings (✓ Classic, ✓ OIE).
|
|
432
|
-
*/
|
|
433
235
|
oktaEmail?: pulumi.Input<{
|
|
434
236
|
[key: string]: pulumi.Input<string>;
|
|
435
237
|
}>;
|
|
436
|
-
/**
|
|
437
|
-
* Okta OTP (via the Okta Verify app) MFA policy settings (✓ Classic).
|
|
438
|
-
*/
|
|
439
238
|
oktaOtp?: pulumi.Input<{
|
|
440
239
|
[key: string]: pulumi.Input<string>;
|
|
441
240
|
}>;
|
|
442
|
-
/**
|
|
443
|
-
* Okta Password MFA policy settings (✓ Classic, ✓ OIE).
|
|
444
|
-
*/
|
|
445
241
|
oktaPassword?: pulumi.Input<{
|
|
446
242
|
[key: string]: pulumi.Input<string>;
|
|
447
243
|
}>;
|
|
448
|
-
/**
|
|
449
|
-
* Okta Push MFA policy settings (✓ Classic).
|
|
450
|
-
*/
|
|
451
244
|
oktaPush?: pulumi.Input<{
|
|
452
245
|
[key: string]: pulumi.Input<string>;
|
|
453
246
|
}>;
|
|
454
|
-
/**
|
|
455
|
-
* Okta Question MFA policy settings (✓ Classic).
|
|
456
|
-
*/
|
|
457
247
|
oktaQuestion?: pulumi.Input<{
|
|
458
248
|
[key: string]: pulumi.Input<string>;
|
|
459
249
|
}>;
|
|
460
|
-
/**
|
|
461
|
-
* Okta SMS MFA policy settings (✓ Classic).
|
|
462
|
-
*/
|
|
463
250
|
oktaSms?: pulumi.Input<{
|
|
464
251
|
[key: string]: pulumi.Input<string>;
|
|
465
252
|
}>;
|
|
466
|
-
/**
|
|
467
|
-
* Okta Verify MFA policy settings (✓ OIE).
|
|
468
|
-
*/
|
|
469
253
|
oktaVerify?: pulumi.Input<{
|
|
470
254
|
[key: string]: pulumi.Input<string>;
|
|
471
255
|
}>;
|
|
472
|
-
/**
|
|
473
|
-
* On-Prem MFA MFA policy settings (✓ OIE).
|
|
474
|
-
*/
|
|
475
256
|
onpremMfa?: pulumi.Input<{
|
|
476
257
|
[key: string]: pulumi.Input<string>;
|
|
477
258
|
}>;
|
|
478
|
-
/**
|
|
479
|
-
* Phone Number MFA policy settings (✓ OIE).
|
|
480
|
-
*/
|
|
481
259
|
phoneNumber?: pulumi.Input<{
|
|
482
260
|
[key: string]: pulumi.Input<string>;
|
|
483
261
|
}>;
|
|
484
|
-
/**
|
|
485
|
-
* RSA Token MFA policy settings (✓ Classic, ✓ OIE).
|
|
486
|
-
*/
|
|
487
262
|
rsaToken?: pulumi.Input<{
|
|
488
263
|
[key: string]: pulumi.Input<string>;
|
|
489
264
|
}>;
|
|
490
|
-
/**
|
|
491
|
-
* Security Question MFA policy settings (✓ OIE).
|
|
492
|
-
*/
|
|
493
265
|
securityQuestion?: pulumi.Input<{
|
|
494
266
|
[key: string]: pulumi.Input<string>;
|
|
495
267
|
}>;
|
|
496
|
-
/**
|
|
497
|
-
* Symantec VIP MFA policy settings (✓ Classic).
|
|
498
|
-
*/
|
|
499
268
|
symantecVip?: pulumi.Input<{
|
|
500
269
|
[key: string]: pulumi.Input<string>;
|
|
501
270
|
}>;
|
|
502
|
-
/**
|
|
503
|
-
* FIDO2 (WebAuthn) MFA policy settings (✓ OIE).
|
|
504
|
-
*/
|
|
505
271
|
webauthn?: pulumi.Input<{
|
|
506
272
|
[key: string]: pulumi.Input<string>;
|
|
507
273
|
}>;
|
|
508
|
-
/**
|
|
509
|
-
* Yubikey Token MFA policy settings (✓ Classic, ✓ OIE).
|
|
510
|
-
*/
|
|
511
274
|
yubikeyToken?: pulumi.Input<{
|
|
512
275
|
[key: string]: pulumi.Input<string>;
|
|
513
276
|
}>;
|