@pulumi/okta 4.4.0 → 4.4.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (399) hide show
  1. package/adminRoleCustom.d.ts +10 -129
  2. package/adminRoleCustom.js +1 -24
  3. package/adminRoleCustom.js.map +1 -1
  4. package/adminRoleCustomAssignments.d.ts +10 -25
  5. package/adminRoleCustomAssignments.js +1 -13
  6. package/adminRoleCustomAssignments.js.map +1 -1
  7. package/adminRoleTargets.d.ts +14 -44
  8. package/adminRoleTargets.js +0 -30
  9. package/adminRoleTargets.js.map +1 -1
  10. package/app/accessPolicyAssignment.d.ts +1 -20
  11. package/app/accessPolicyAssignment.js +1 -20
  12. package/app/accessPolicyAssignment.js.map +1 -1
  13. package/app/autoLogin.d.ts +72 -115
  14. package/app/autoLogin.js +0 -43
  15. package/app/autoLogin.js.map +1 -1
  16. package/app/basicAuth.d.ts +38 -62
  17. package/app/basicAuth.js +0 -24
  18. package/app/basicAuth.js.map +1 -1
  19. package/app/bookmark.d.ts +35 -67
  20. package/app/bookmark.js +0 -23
  21. package/app/bookmark.js.map +1 -1
  22. package/app/getApp.d.ts +58 -25
  23. package/app/getApp.js +2 -2
  24. package/app/getApp.js.map +1 -1
  25. package/app/getMetadataSaml.d.ts +11 -5
  26. package/app/getMetadataSaml.js +2 -2
  27. package/app/getMetadataSaml.js.map +1 -1
  28. package/app/getOauth.d.ts +62 -34
  29. package/app/getOauth.js +2 -2
  30. package/app/getOauth.js.map +1 -1
  31. package/app/getSaml.d.ts +75 -55
  32. package/app/getSaml.js +2 -2
  33. package/app/getSaml.js.map +1 -1
  34. package/app/groupAssignment.d.ts +6 -15
  35. package/app/groupAssignment.js +0 -9
  36. package/app/groupAssignment.js.map +1 -1
  37. package/app/oauth.d.ts +125 -299
  38. package/app/oauth.js +0 -78
  39. package/app/oauth.js.map +1 -1
  40. package/app/oauthPostLogoutRedirectUri.d.ts +0 -31
  41. package/app/oauthPostLogoutRedirectUri.js +0 -31
  42. package/app/oauthPostLogoutRedirectUri.js.map +1 -1
  43. package/app/oauthRedirectUri.d.ts +0 -30
  44. package/app/oauthRedirectUri.js +0 -30
  45. package/app/oauthRedirectUri.js.map +1 -1
  46. package/app/saml.d.ts +133 -299
  47. package/app/saml.js +0 -157
  48. package/app/saml.js.map +1 -1
  49. package/app/securePasswordStore.d.ts +79 -105
  50. package/app/securePasswordStore.js +0 -26
  51. package/app/securePasswordStore.js.map +1 -1
  52. package/app/swa.d.ts +72 -98
  53. package/app/swa.js +0 -26
  54. package/app/swa.js.map +1 -1
  55. package/app/threeField.d.ts +72 -83
  56. package/app/threeField.js +0 -11
  57. package/app/threeField.js.map +1 -1
  58. package/app/user.d.ts +12 -37
  59. package/app/user.js +0 -22
  60. package/app/user.js.map +1 -1
  61. package/appGroupAssignments.d.ts +3 -51
  62. package/appGroupAssignments.js +0 -48
  63. package/appGroupAssignments.js.map +1 -1
  64. package/appOauthApiScope.d.ts +3 -36
  65. package/appOauthApiScope.js +0 -33
  66. package/appOauthApiScope.js.map +1 -1
  67. package/appSamlAppSettings.d.ts +6 -44
  68. package/appSamlAppSettings.js +0 -38
  69. package/appSamlAppSettings.js.map +1 -1
  70. package/appSharedCredentials.d.ts +72 -111
  71. package/appSharedCredentials.js +0 -39
  72. package/appSharedCredentials.js.map +1 -1
  73. package/appSignonPolicy.d.ts +6 -44
  74. package/appSignonPolicy.js +0 -38
  75. package/appSignonPolicy.js.map +1 -1
  76. package/appSignonPolicyRule.d.ts +63 -322
  77. package/appSignonPolicyRule.js +0 -244
  78. package/appSignonPolicyRule.js.map +1 -1
  79. package/appUserBaseSchemaProperty.d.ts +24 -52
  80. package/appUserBaseSchemaProperty.js +0 -28
  81. package/appUserBaseSchemaProperty.js.map +1 -1
  82. package/appUserSchemaProperty.d.ts +54 -80
  83. package/appUserSchemaProperty.js +0 -26
  84. package/appUserSchemaProperty.js.map +1 -1
  85. package/auth/getServer.d.ts +11 -11
  86. package/auth/getServer.js +2 -2
  87. package/auth/getServerPolicy.d.ts +15 -9
  88. package/auth/getServerPolicy.js +2 -2
  89. package/auth/getServerPolicy.js.map +1 -1
  90. package/auth/getServerScopes.d.ts +8 -5
  91. package/auth/getServerScopes.js +2 -2
  92. package/auth/getServerScopes.js.map +1 -1
  93. package/auth/server.d.ts +13 -49
  94. package/auth/server.js +0 -27
  95. package/auth/server.js.map +1 -1
  96. package/auth/serverClaim.d.ts +18 -54
  97. package/auth/serverClaim.js +0 -27
  98. package/auth/serverClaim.js.map +1 -1
  99. package/auth/serverPolicy.d.ts +6 -43
  100. package/auth/serverPolicy.js +0 -28
  101. package/auth/serverPolicy.js.map +1 -1
  102. package/auth/serverPolicyClaim.d.ts +35 -71
  103. package/auth/serverPolicyClaim.js +4 -28
  104. package/auth/serverPolicyClaim.js.map +1 -1
  105. package/auth/serverPolicyRule.d.ts +27 -70
  106. package/auth/serverPolicyRule.js +0 -25
  107. package/auth/serverPolicyRule.js.map +1 -1
  108. package/auth/serverScope.d.ts +15 -41
  109. package/auth/serverScope.js +0 -26
  110. package/auth/serverScope.js.map +1 -1
  111. package/authServerClaimDefault.d.ts +13 -50
  112. package/authServerClaimDefault.js +0 -31
  113. package/authServerClaimDefault.js.map +1 -1
  114. package/authServerDefault.d.ts +13 -47
  115. package/authServerDefault.js +0 -25
  116. package/authServerDefault.js.map +1 -1
  117. package/authenticator.d.ts +38 -94
  118. package/authenticator.js +0 -38
  119. package/authenticator.js.map +1 -1
  120. package/behaviour.d.ts +18 -78
  121. package/behaviour.js +0 -42
  122. package/behaviour.js.map +1 -1
  123. package/brand.d.ts +17 -26
  124. package/brand.js +1 -10
  125. package/brand.js.map +1 -1
  126. package/captcha.d.ts +12 -38
  127. package/captcha.js +0 -26
  128. package/captcha.js.map +1 -1
  129. package/captchaOrgWideSettings.d.ts +6 -51
  130. package/captchaOrgWideSettings.js +0 -45
  131. package/captchaOrgWideSettings.js.map +1 -1
  132. package/domain.d.ts +13 -39
  133. package/domain.js +0 -20
  134. package/domain.js.map +1 -1
  135. package/domainCertificate.d.ts +15 -51
  136. package/domainCertificate.js +0 -36
  137. package/domainCertificate.js.map +1 -1
  138. package/domainVerification.d.ts +3 -22
  139. package/domainVerification.js +0 -19
  140. package/domainVerification.js.map +1 -1
  141. package/emailCustomization.d.ts +3 -224
  142. package/emailCustomization.js +0 -41
  143. package/emailCustomization.js.map +1 -1
  144. package/emailSender.d.ts +13 -39
  145. package/emailSender.js +0 -26
  146. package/emailSender.js.map +1 -1
  147. package/emailSenderVerification.d.ts +3 -26
  148. package/emailSenderVerification.js +0 -23
  149. package/emailSenderVerification.js.map +1 -1
  150. package/eventHook.d.ts +0 -37
  151. package/eventHook.js +0 -37
  152. package/eventHook.js.map +1 -1
  153. package/eventHookVerification.d.ts +3 -37
  154. package/eventHookVerification.js +0 -34
  155. package/eventHookVerification.js.map +1 -1
  156. package/factor/factor.d.ts +6 -23
  157. package/factor/factor.js +0 -14
  158. package/factor/factor.js.map +1 -1
  159. package/factorTotp.d.ts +12 -44
  160. package/factorTotp.js +0 -23
  161. package/factorTotp.js.map +1 -1
  162. package/getAppGroupAssignments.d.ts +6 -6
  163. package/getAppGroupAssignments.js +2 -2
  164. package/getAppSignonPolicy.d.ts +16 -6
  165. package/getAppSignonPolicy.js +8 -4
  166. package/getAppSignonPolicy.js.map +1 -1
  167. package/getAppUserAssignments.d.ts +6 -6
  168. package/getAppUserAssignments.js +2 -2
  169. package/getAuthServerClaim.d.ts +15 -12
  170. package/getAuthServerClaim.js +2 -2
  171. package/getAuthServerClaim.js.map +1 -1
  172. package/getAuthServerClaims.d.ts +8 -5
  173. package/getAuthServerClaims.js +2 -2
  174. package/getAuthServerClaims.js.map +1 -1
  175. package/getAuthenticator.d.ts +24 -26
  176. package/getAuthenticator.js +14 -22
  177. package/getAuthenticator.js.map +1 -1
  178. package/getBehaviour.d.ts +6 -8
  179. package/getBehaviour.js +2 -2
  180. package/getBehaviour.js.map +1 -1
  181. package/getBehaviours.d.ts +7 -7
  182. package/getBehaviours.js +2 -2
  183. package/getBrand.d.ts +9 -6
  184. package/getBrand.js +2 -2
  185. package/getBrand.js.map +1 -1
  186. package/getBrands.d.ts +2 -2
  187. package/getBrands.js +2 -2
  188. package/getEmailCustomization.d.ts +14 -9
  189. package/getEmailCustomization.js +2 -6
  190. package/getEmailCustomization.js.map +1 -1
  191. package/getEmailCustomizations.d.ts +11 -9
  192. package/getEmailCustomizations.js +2 -6
  193. package/getEmailCustomizations.js.map +1 -1
  194. package/getGroups.d.ts +11 -25
  195. package/getGroups.js +2 -2
  196. package/getGroups.js.map +1 -1
  197. package/getNetworkZone.d.ts +12 -12
  198. package/getNetworkZone.js +2 -2
  199. package/getRoleSubscription.d.ts +13 -35
  200. package/getRoleSubscription.js +2 -2
  201. package/getRoleSubscription.js.map +1 -1
  202. package/getTemplate.d.ts +10 -8
  203. package/getTemplate.js +2 -6
  204. package/getTemplate.js.map +1 -1
  205. package/getTemplates.d.ts +6 -7
  206. package/getTemplates.js +2 -6
  207. package/getTemplates.js.map +1 -1
  208. package/getTheme.d.ts +14 -12
  209. package/getTheme.js +2 -6
  210. package/getTheme.js.map +1 -1
  211. package/getThemes.d.ts +6 -7
  212. package/getThemes.js +2 -6
  213. package/getThemes.js.map +1 -1
  214. package/getTrustedOrigins.d.ts +7 -4
  215. package/getTrustedOrigins.js +2 -2
  216. package/getTrustedOrigins.js.map +1 -1
  217. package/getUserSecurityQuestions.d.ts +4 -8
  218. package/getUserSecurityQuestions.js +0 -4
  219. package/getUserSecurityQuestions.js.map +1 -1
  220. package/group/getEveryoneGroup.d.ts +10 -5
  221. package/group/getEveryoneGroup.js +4 -2
  222. package/group/getEveryoneGroup.js.map +1 -1
  223. package/group/getGroup.d.ts +17 -22
  224. package/group/getGroup.js +2 -2
  225. package/group/getGroup.js.map +1 -1
  226. package/group/getRule.d.ts +6 -15
  227. package/group/getRule.js +2 -2
  228. package/group/getRule.js.map +1 -1
  229. package/group/group.d.ts +9 -46
  230. package/group/group.js +0 -37
  231. package/group/group.js.map +1 -1
  232. package/group/role.d.ts +15 -101
  233. package/group/role.js +0 -26
  234. package/group/role.js.map +1 -1
  235. package/group/rule.d.ts +6 -84
  236. package/group/rule.js +0 -27
  237. package/group/rule.js.map +1 -1
  238. package/groupMemberships.d.ts +7 -42
  239. package/groupMemberships.js +1 -36
  240. package/groupMemberships.js.map +1 -1
  241. package/groupSchemaProperty.d.ts +51 -94
  242. package/groupSchemaProperty.js +0 -25
  243. package/groupSchemaProperty.js.map +1 -1
  244. package/idp/getMetadataSaml.d.ts +9 -6
  245. package/idp/getMetadataSaml.js +2 -2
  246. package/idp/getMetadataSaml.js.map +1 -1
  247. package/idp/getOidc.d.ts +9 -9
  248. package/idp/getOidc.js +2 -2
  249. package/idp/getSaml.d.ts +16 -13
  250. package/idp/getSaml.js +2 -2
  251. package/idp/getSaml.js.map +1 -1
  252. package/idp/getSocial.d.ts +8 -2
  253. package/idp/getSocial.js +2 -2
  254. package/idp/getSocial.js.map +1 -1
  255. package/idp/oidc.d.ts +12 -297
  256. package/idp/oidc.js +0 -36
  257. package/idp/oidc.js.map +1 -1
  258. package/idp/saml.d.ts +18 -284
  259. package/idp/saml.js +0 -32
  260. package/idp/saml.js.map +1 -1
  261. package/idp/samlKey.d.ts +3 -48
  262. package/idp/samlKey.js +0 -9
  263. package/idp/samlKey.js.map +1 -1
  264. package/idp/social.d.ts +18 -251
  265. package/idp/social.js +0 -32
  266. package/idp/social.js.map +1 -1
  267. package/index/emailDomain.d.ts +16 -41
  268. package/index/emailDomain.js +0 -25
  269. package/index/emailDomain.js.map +1 -1
  270. package/index/emailDomainVerification.d.ts +3 -25
  271. package/index/emailDomainVerification.js +0 -22
  272. package/index/emailDomainVerification.js.map +1 -1
  273. package/index/getDomain.d.ts +11 -14
  274. package/index/getDomain.js +2 -8
  275. package/index/getDomain.js.map +1 -1
  276. package/inline/hook.d.ts +0 -89
  277. package/inline/hook.js +0 -35
  278. package/inline/hook.js.map +1 -1
  279. package/linkDefinition.d.ts +0 -30
  280. package/linkDefinition.js +0 -30
  281. package/linkDefinition.js.map +1 -1
  282. package/linkValue.d.ts +6 -59
  283. package/linkValue.js +0 -53
  284. package/linkValue.js.map +1 -1
  285. package/network/zone.d.ts +27 -74
  286. package/network/zone.js +0 -44
  287. package/network/zone.js.map +1 -1
  288. package/orgConfiguration.d.ts +0 -25
  289. package/orgConfiguration.js +0 -25
  290. package/orgConfiguration.js.map +1 -1
  291. package/orgSupport.d.ts +3 -20
  292. package/orgSupport.js +0 -17
  293. package/orgSupport.js.map +1 -1
  294. package/package.json +2 -2
  295. package/package.json.bak +1 -1
  296. package/policy/getDefaultPolicy.d.ts +9 -7
  297. package/policy/getDefaultPolicy.js +6 -2
  298. package/policy/getDefaultPolicy.js.map +1 -1
  299. package/policy/getPolicy.d.ts +11 -10
  300. package/policy/getPolicy.js +2 -2
  301. package/policy/getPolicy.js.map +1 -1
  302. package/policy/mfa.d.ts +18 -259
  303. package/policy/mfa.js +0 -49
  304. package/policy/mfa.js.map +1 -1
  305. package/policy/password.d.ts +90 -117
  306. package/policy/password.js +0 -27
  307. package/policy/password.js.map +1 -1
  308. package/policy/ruleIdpDiscovery.d.ts +27 -149
  309. package/policy/ruleIdpDiscovery.js +0 -65
  310. package/policy/ruleIdpDiscovery.js.map +1 -1
  311. package/policy/ruleMfa.d.ts +24 -35
  312. package/policy/ruleMfa.js +0 -11
  313. package/policy/ruleMfa.js.map +1 -1
  314. package/policy/rulePassword.d.ts +33 -46
  315. package/policy/rulePassword.js +0 -13
  316. package/policy/rulePassword.js.map +1 -1
  317. package/policy/ruleSignon.d.ts +57 -170
  318. package/policy/ruleSignon.js +0 -92
  319. package/policy/ruleSignon.js.map +1 -1
  320. package/policy/signon.d.ts +15 -41
  321. package/policy/signon.js +0 -26
  322. package/policy/signon.js.map +1 -1
  323. package/policyMfaDefault.d.ts +13 -250
  324. package/policyMfaDefault.js +0 -45
  325. package/policyMfaDefault.js.map +1 -1
  326. package/policyPasswordDefault.d.ts +54 -88
  327. package/policyPasswordDefault.js +0 -22
  328. package/policyPasswordDefault.js.map +1 -1
  329. package/policyProfileEnrollment.d.ts +6 -28
  330. package/policyProfileEnrollment.js +0 -22
  331. package/policyProfileEnrollment.js.map +1 -1
  332. package/policyProfileEnrollmentApps.d.ts +5 -42
  333. package/policyProfileEnrollmentApps.js +0 -37
  334. package/policyProfileEnrollmentApps.js.map +1 -1
  335. package/policyRuleProfileEnrollment.d.ts +23 -85
  336. package/policyRuleProfileEnrollment.js +0 -62
  337. package/policyRuleProfileEnrollment.js.map +1 -1
  338. package/profile/mapping.d.ts +9 -95
  339. package/profile/mapping.js +0 -41
  340. package/profile/mapping.js.map +1 -1
  341. package/rateLimiting.d.ts +9 -43
  342. package/rateLimiting.js +0 -28
  343. package/rateLimiting.js.map +1 -1
  344. package/resourceSet.d.ts +10 -32
  345. package/resourceSet.js +1 -20
  346. package/resourceSet.js.map +1 -1
  347. package/roleSubscription.d.ts +9 -110
  348. package/roleSubscription.js +0 -26
  349. package/roleSubscription.js.map +1 -1
  350. package/securityNotificationEmails.d.ts +15 -45
  351. package/securityNotificationEmails.js +0 -30
  352. package/securityNotificationEmails.js.map +1 -1
  353. package/templateSms.d.ts +3 -47
  354. package/templateSms.js +0 -35
  355. package/templateSms.js.map +1 -1
  356. package/theme.d.ts +44 -53
  357. package/theme.js +0 -9
  358. package/theme.js.map +1 -1
  359. package/threatInsightSettings.d.ts +6 -58
  360. package/threatInsightSettings.js +0 -34
  361. package/threatInsightSettings.js.map +1 -1
  362. package/trustedorigin/origin.d.ts +12 -37
  363. package/trustedorigin/origin.js +0 -25
  364. package/trustedorigin/origin.js.map +1 -1
  365. package/types/input.d.ts +60 -227
  366. package/types/output.d.ts +56 -446
  367. package/user/getUser.d.ts +32 -104
  368. package/user/getUser.js +2 -2
  369. package/user/getUser.js.map +1 -1
  370. package/user/getUserProfileMappingSource.d.ts +9 -7
  371. package/user/getUserProfileMappingSource.js +6 -4
  372. package/user/getUserProfileMappingSource.js.map +1 -1
  373. package/user/getUserType.d.ts +7 -7
  374. package/user/getUserType.js +2 -2
  375. package/user/getUsers.d.ts +61 -57
  376. package/user/getUsers.js +30 -44
  377. package/user/getUsers.js.map +1 -1
  378. package/user/user.d.ts +117 -215
  379. package/user/user.js +0 -71
  380. package/user/user.js.map +1 -1
  381. package/user/userType.d.ts +9 -34
  382. package/user/userType.js +0 -25
  383. package/user/userType.js.map +1 -1
  384. package/userAdminRoles.d.ts +10 -41
  385. package/userAdminRoles.js +1 -29
  386. package/userAdminRoles.js.map +1 -1
  387. package/userBaseSchemaProperty.d.ts +24 -67
  388. package/userBaseSchemaProperty.js +0 -43
  389. package/userBaseSchemaProperty.js.map +1 -1
  390. package/userFactorQuestion.d.ts +14 -52
  391. package/userFactorQuestion.js +1 -39
  392. package/userFactorQuestion.js.map +1 -1
  393. package/userGroupMemberships.d.ts +4 -23
  394. package/userGroupMemberships.js +1 -20
  395. package/userGroupMemberships.js.map +1 -1
  396. package/userSchemaProperty.d.ts +57 -107
  397. package/userSchemaProperty.js +0 -32
  398. package/userSchemaProperty.js.map +1 -1
  399. package/scripts/install-pulumi-plugin.js +0 -21
package/app/saml.d.ts CHANGED
@@ -1,163 +1,6 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  import * as inputs from "../types/input";
3
3
  import * as outputs from "../types/output";
4
- /**
5
- * This resource allows you to create and configure a SAML Application.
6
- *
7
- * > If you receive the error `You do not have permission to access the feature
8
- * you are requesting` contact support and
9
- * request feature flag `ADVANCED_SSO` be applied to your org.
10
- *
11
- * ## Example Usage
12
- *
13
- * ```typescript
14
- * import * as pulumi from "@pulumi/pulumi";
15
- * import * as okta from "@pulumi/okta";
16
- *
17
- * const example = new okta.app.Saml("example", {
18
- * attributeStatements: [{
19
- * filterType: "REGEX",
20
- * filterValue: ".*",
21
- * name: "groups",
22
- * type: "GROUP",
23
- * }],
24
- * audience: "https://example.com/audience",
25
- * authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
26
- * destination: "https://example.com",
27
- * digestAlgorithm: "SHA256",
28
- * honorForceAuthn: false,
29
- * label: "example",
30
- * recipient: "https://example.com",
31
- * responseSigned: true,
32
- * signatureAlgorithm: "RSA_SHA256",
33
- * ssoUrl: "https://example.com",
34
- * subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
35
- * subjectNameIdTemplate: "${user.userName}",
36
- * });
37
- * ```
38
- * ### With inline hook
39
- *
40
- * ```typescript
41
- * import * as pulumi from "@pulumi/pulumi";
42
- * import * as okta from "@pulumi/okta";
43
- *
44
- * const testHook = new okta.inline.Hook("testHook", {
45
- * status: "ACTIVE",
46
- * type: "com.okta.saml.tokens.transform",
47
- * version: "1.0.2",
48
- * channel: {
49
- * type: "HTTP",
50
- * version: "1.0.0",
51
- * uri: "https://example.com/test1",
52
- * method: "POST",
53
- * },
54
- * auth: {
55
- * key: "Authorization",
56
- * type: "HEADER",
57
- * value: "secret",
58
- * },
59
- * });
60
- * const testSaml = new okta.app.Saml("testSaml", {
61
- * label: "testAcc_replace_with_uuid",
62
- * ssoUrl: "https://google.com",
63
- * recipient: "https://here.com",
64
- * destination: "https://its-about-the-journey.com",
65
- * audience: "https://audience.com",
66
- * subjectNameIdTemplate: "${user.userName}",
67
- * subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
68
- * responseSigned: true,
69
- * signatureAlgorithm: "RSA_SHA256",
70
- * digestAlgorithm: "SHA256",
71
- * honorForceAuthn: false,
72
- * authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
73
- * inlineHookId: testHook.id,
74
- * attributeStatements: [{
75
- * type: "GROUP",
76
- * name: "groups",
77
- * filterType: "REGEX",
78
- * filterValue: ".*",
79
- * }],
80
- * }, {
81
- * dependsOn: [testHook],
82
- * });
83
- * ```
84
- * ### Pre-configured app with SAML 1.1 sign-on mode
85
- *
86
- * ```typescript
87
- * import * as pulumi from "@pulumi/pulumi";
88
- * import * as okta from "@pulumi/okta";
89
- *
90
- * const test = new okta.app.Saml("test", {
91
- * appSettingsJson: `{
92
- * "groupFilter": "app1.*",
93
- * "siteURL": "https://www.okta.com"
94
- * }
95
- *
96
- * `,
97
- * label: "SharePoint (On-Premise)",
98
- * preconfiguredApp: "sharepoint_onpremise",
99
- * samlVersion: "1.1",
100
- * status: "ACTIVE",
101
- * userNameTemplate: "${source.login}",
102
- * userNameTemplateType: "BUILT_IN",
103
- * });
104
- * ```
105
- * ### Pre-configured app with SAML 1.1 sign-on mode, `appSettingsJson` and `appLinksJson`
106
- *
107
- * ```typescript
108
- * import * as pulumi from "@pulumi/pulumi";
109
- * import * as okta from "@pulumi/okta";
110
- *
111
- * const office365 = new okta.app.Saml("office365", {
112
- * appLinksJson: ` {
113
- * "calendar": false,
114
- * "crm": false,
115
- * "delve": false,
116
- * "excel": false,
117
- * "forms": false,
118
- * "mail": false,
119
- * "newsfeed": false,
120
- * "onedrive": false,
121
- * "people": false,
122
- * "planner": false,
123
- * "powerbi": false,
124
- * "powerpoint": false,
125
- * "sites": false,
126
- * "sway": false,
127
- * "tasks": false,
128
- * "teams": false,
129
- * "video": false,
130
- * "word": false,
131
- * "yammer": false,
132
- * "login": true
133
- * }
134
- *
135
- * `,
136
- * appSettingsJson: ` {
137
- * "wsFedConfigureType": "AUTO",
138
- * "windowsTransportEnabled": false,
139
- * "domain": "okta.com",
140
- * "msftTenant": "okta",
141
- * "domains": [],
142
- * "requireAdminConsent": false
143
- * }
144
- *
145
- * `,
146
- * label: "Microsoft Office 365",
147
- * preconfiguredApp: "office365",
148
- * samlVersion: "1.1",
149
- * status: "ACTIVE",
150
- * });
151
- * ```
152
- *
153
- * ## Import
154
- *
155
- * A SAML App can be imported via the Okta ID.
156
- *
157
- * ```sh
158
- * $ pulumi import okta:app/saml:Saml example <app id>
159
- * ```
160
- */
161
4
  export declare class Saml extends pulumi.CustomResource {
162
5
  /**
163
6
  * Get an existing Saml resource's state with the given name, ID, and optional extra
@@ -175,19 +18,19 @@ export declare class Saml extends pulumi.CustomResource {
175
18
  */
176
19
  static isInstance(obj: any): obj is Saml;
177
20
  /**
178
- * Custom error page URL.
21
+ * Custom error page URL
179
22
  */
180
23
  readonly accessibilityErrorRedirectUrl: pulumi.Output<string | undefined>;
181
24
  /**
182
- * Custom login page for this application.
25
+ * Custom login page URL
183
26
  */
184
27
  readonly accessibilityLoginRedirectUrl: pulumi.Output<string | undefined>;
185
28
  /**
186
- * Enable self-service. Default is: `false`.
29
+ * Enable self service
187
30
  */
188
31
  readonly accessibilitySelfService: pulumi.Output<boolean | undefined>;
189
32
  /**
190
- * An array of ACS endpoints. You can configure a maximum of 100 endpoints.
33
+ * List of ACS endpoints for this SAML application
191
34
  */
192
35
  readonly acsEndpoints: pulumi.Output<string[] | undefined>;
193
36
  /**
@@ -195,27 +38,24 @@ export declare class Saml extends pulumi.CustomResource {
195
38
  */
196
39
  readonly adminNote: pulumi.Output<string | undefined>;
197
40
  /**
198
- * Displays specific appLinks for the app. The value for each application link should be boolean.
41
+ * Displays specific appLinks for the app
199
42
  */
200
43
  readonly appLinksJson: pulumi.Output<string | undefined>;
201
44
  /**
202
- * Application settings in JSON format.
45
+ * Application settings in JSON format
203
46
  */
204
47
  readonly appSettingsJson: pulumi.Output<string | undefined>;
205
48
  /**
206
- * Determines whether the SAML assertion is digitally signed.
49
+ * Determines whether the SAML assertion is digitally signed
207
50
  */
208
51
  readonly assertionSigned: pulumi.Output<boolean | undefined>;
209
- /**
210
- * List of SAML Attribute statements.
211
- */
212
52
  readonly attributeStatements: pulumi.Output<outputs.app.SamlAttributeStatement[] | undefined>;
213
53
  /**
214
54
  * Audience Restriction
215
55
  */
216
56
  readonly audience: pulumi.Output<string | undefined>;
217
57
  /**
218
- * The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.
58
+ * Id of this apps authentication policy
219
59
  */
220
60
  readonly authenticationPolicy: pulumi.Output<string | undefined>;
221
61
  /**
@@ -223,11 +63,11 @@ export declare class Saml extends pulumi.CustomResource {
223
63
  */
224
64
  readonly authnContextClassRef: pulumi.Output<string | undefined>;
225
65
  /**
226
- * Display auto submit toolbar. Default is: `false`
66
+ * Display auto submit toolbar
227
67
  */
228
68
  readonly autoSubmitToolbar: pulumi.Output<boolean | undefined>;
229
69
  /**
230
- * The raw signing certificate.
70
+ * cert from SAML XML metadata payload
231
71
  */
232
72
  readonly certificate: pulumi.Output<string>;
233
73
  /**
@@ -243,7 +83,7 @@ export declare class Saml extends pulumi.CustomResource {
243
83
  */
244
84
  readonly digestAlgorithm: pulumi.Output<string | undefined>;
245
85
  /**
246
- * Url that can be used to embed this application into another portal.
86
+ * The url that can be used to embed this application in other portals.
247
87
  */
248
88
  readonly embedUrl: pulumi.Output<string>;
249
89
  /**
@@ -251,95 +91,95 @@ export declare class Saml extends pulumi.CustomResource {
251
91
  */
252
92
  readonly enduserNote: pulumi.Output<string | undefined>;
253
93
  /**
254
- * Entity ID, the ID portion of the `entityUrl`.
94
+ * Entity ID, the ID portion of the entity_url
255
95
  */
256
96
  readonly entityKey: pulumi.Output<string>;
257
97
  /**
258
- * Entity URL for instance [http://www.okta.com/exk1fcia6d6EMsf331d8](http://www.okta.com/exk1fcia6d6EMsf331d8).
98
+ * Entity URL for instance http://www.okta.com/exk1fcia6d6EMsf331d8
259
99
  */
260
100
  readonly entityUrl: pulumi.Output<string>;
261
101
  /**
262
- * features enabled. Notice: you can't currently configure provisioning features via the API.
102
+ * features to enable
263
103
  */
264
104
  readonly features: pulumi.Output<string[]>;
265
105
  /**
266
- * Do not display application icon on mobile app. Default is: `false`
106
+ * Do not display application icon on mobile app
267
107
  */
268
108
  readonly hideIos: pulumi.Output<boolean | undefined>;
269
109
  /**
270
- * Do not display application icon to users. Default is: `false`
110
+ * Do not display application icon to users
271
111
  */
272
112
  readonly hideWeb: pulumi.Output<boolean | undefined>;
273
113
  /**
274
- * Prompt user to re-authenticate if SP asks for it. Default is: `false`
114
+ * Prompt user to re-authenticate if SP asks for it
275
115
  */
276
116
  readonly honorForceAuthn: pulumi.Output<boolean | undefined>;
277
117
  /**
278
- * `urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Post` location from the SAML metadata.
118
+ * urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Post location from the SAML metadata.
279
119
  */
280
120
  readonly httpPostBinding: pulumi.Output<string>;
281
121
  /**
282
- * `urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect` location from the SAML metadata.
122
+ * urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect location from the SAML metadata.
283
123
  */
284
124
  readonly httpRedirectBinding: pulumi.Output<string>;
285
125
  /**
286
- * SAML issuer ID.
126
+ * SAML issuer ID
287
127
  */
288
128
  readonly idpIssuer: pulumi.Output<string | undefined>;
289
129
  /**
290
- * _Early Access Property_. Enables [Federation Broker Mode](https://help.okta.com/en/prod/Content/Topics/Apps/apps-fbm-enable.htm).
130
+ * *Early Access Property*. Enable Federation Broker Mode.
291
131
  */
292
132
  readonly implicitAssignment: pulumi.Output<boolean | undefined>;
293
133
  /**
294
- * Saml Inline Hook associated with the application.
134
+ * Saml Inline Hook setting
295
135
  */
296
136
  readonly inlineHookId: pulumi.Output<string | undefined>;
297
137
  /**
298
- * Certificate key ID.
138
+ * Certificate ID
299
139
  */
300
140
  readonly keyId: pulumi.Output<string>;
301
141
  /**
302
- * Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid`.
142
+ * Certificate name. This modulates the rotation of keys. New name == new key.
303
143
  */
304
144
  readonly keyName: pulumi.Output<string | undefined>;
305
145
  /**
306
- * Number of years the certificate is valid (2 - 10 years).
146
+ * Number of years the certificate is valid.
307
147
  */
308
148
  readonly keyYearsValid: pulumi.Output<number | undefined>;
309
149
  /**
310
- * An array of all key credentials for the application. Format of each entry is as follows:
150
+ * Application keys
311
151
  */
312
152
  readonly keys: pulumi.Output<outputs.app.SamlKey[]>;
313
153
  /**
314
- * label of application.
154
+ * Pretty name of app.
315
155
  */
316
156
  readonly label: pulumi.Output<string>;
317
157
  /**
318
- * Local file path to the logo. The file must be in PNG, JPG, or GIF format, and less than 1 MB in size.
158
+ * Local path to logo of the application.
319
159
  */
320
160
  readonly logo: pulumi.Output<string | undefined>;
321
161
  /**
322
- * Direct link of application logo.
162
+ * URL of the application's logo
323
163
  */
324
164
  readonly logoUrl: pulumi.Output<string>;
325
165
  /**
326
- * The raw SAML metadata in XML.
166
+ * SAML xml metadata payload
327
167
  */
328
168
  readonly metadata: pulumi.Output<string>;
329
169
  /**
330
- * SAML xml metadata URL.
170
+ * SAML xml metadata URL
331
171
  */
332
172
  readonly metadataUrl: pulumi.Output<string>;
333
173
  /**
334
- * The name of the attribute statement.
174
+ * The reference name of the attribute statement
335
175
  */
336
176
  readonly name: pulumi.Output<string>;
337
177
  /**
338
- * name of application from the Okta Integration Network, if not included a custom app will be created. If not provided the following arguments are required:
178
+ * Name of preexisting SAML application. For instance 'slack'
339
179
  */
340
180
  readonly preconfiguredApp: pulumi.Output<string | undefined>;
341
181
  /**
342
- * The location where the app may present the SAML assertion.
182
+ * The location where the app may present the SAML assertion
343
183
  */
344
184
  readonly recipient: pulumi.Output<string | undefined>;
345
185
  /**
@@ -347,7 +187,7 @@ export declare class Saml extends pulumi.CustomResource {
347
187
  */
348
188
  readonly requestCompressed: pulumi.Output<boolean | undefined>;
349
189
  /**
350
- * Determines whether the SAML auth response message is digitally signed.
190
+ * Determines whether the SAML auth response message is digitally signed
351
191
  */
352
192
  readonly responseSigned: pulumi.Output<boolean | undefined>;
353
193
  /**
@@ -355,39 +195,39 @@ export declare class Saml extends pulumi.CustomResource {
355
195
  */
356
196
  readonly samlSignedRequestEnabled: pulumi.Output<boolean | undefined>;
357
197
  /**
358
- * SAML version for the app's sign-on mode. Valid values are: `"2.0"` or `"1.1"`. Default is `"2.0"`.
198
+ * SAML version for the app's sign-on mode
359
199
  */
360
200
  readonly samlVersion: pulumi.Output<string | undefined>;
361
201
  /**
362
- * Sign-on mode of application.
202
+ * Sign on mode of application.
363
203
  */
364
204
  readonly signOnMode: pulumi.Output<string>;
365
205
  /**
366
- * Signature algorithm used ot digitally sign the assertion and response.
206
+ * Signature algorithm used ot digitally sign the assertion and response
367
207
  */
368
208
  readonly signatureAlgorithm: pulumi.Output<string | undefined>;
369
209
  /**
370
- * x509 encoded certificate that the Service Provider uses to sign Single Logout requests. Note: should be provided without `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`, see [official documentation](https://developer.okta.com/docs/reference/api/apps/#service-provider-certificate).
210
+ * x509 encoded certificate that the Service Provider uses to sign Single Logout requests
371
211
  */
372
212
  readonly singleLogoutCertificate: pulumi.Output<string | undefined>;
373
213
  /**
374
- * The issuer of the Service Provider that generates the Single Logout request.
214
+ * The issuer of the Service Provider that generates the Single Logout request
375
215
  */
376
216
  readonly singleLogoutIssuer: pulumi.Output<string | undefined>;
377
217
  /**
378
- * The location where the logout response is sent.
218
+ * The location where the logout response is sent
379
219
  */
380
220
  readonly singleLogoutUrl: pulumi.Output<string | undefined>;
381
221
  /**
382
- * SAML service provider issuer.
222
+ * SAML SP issuer ID
383
223
  */
384
224
  readonly spIssuer: pulumi.Output<string | undefined>;
385
225
  /**
386
- * Single Sign-on Url.
226
+ * Single Sign On URL
387
227
  */
388
228
  readonly ssoUrl: pulumi.Output<string | undefined>;
389
229
  /**
390
- * status of application.
230
+ * Status of application.
391
231
  */
392
232
  readonly status: pulumi.Output<string | undefined>;
393
233
  /**
@@ -395,23 +235,23 @@ export declare class Saml extends pulumi.CustomResource {
395
235
  */
396
236
  readonly subjectNameIdFormat: pulumi.Output<string | undefined>;
397
237
  /**
398
- * Template for app user's username when a user is assigned to the app.
238
+ * Template for app user's username when a user is assigned to the app
399
239
  */
400
240
  readonly subjectNameIdTemplate: pulumi.Output<string | undefined>;
401
241
  /**
402
- * Username template. Default is: `"${source.login}"`
242
+ * Username template
403
243
  */
404
244
  readonly userNameTemplate: pulumi.Output<string | undefined>;
405
245
  /**
406
- * Push username on update. Valid values: `"PUSH"` and `"DONT_PUSH"`.
246
+ * Push username on update
407
247
  */
408
248
  readonly userNameTemplatePushStatus: pulumi.Output<string | undefined>;
409
249
  /**
410
- * Username template suffix.
250
+ * Username template suffix
411
251
  */
412
252
  readonly userNameTemplateSuffix: pulumi.Output<string | undefined>;
413
253
  /**
414
- * Username template type. Default is: `"BUILT_IN"`.
254
+ * Username template type
415
255
  */
416
256
  readonly userNameTemplateType: pulumi.Output<string | undefined>;
417
257
  /**
@@ -428,19 +268,19 @@ export declare class Saml extends pulumi.CustomResource {
428
268
  */
429
269
  export interface SamlState {
430
270
  /**
431
- * Custom error page URL.
271
+ * Custom error page URL
432
272
  */
433
273
  accessibilityErrorRedirectUrl?: pulumi.Input<string>;
434
274
  /**
435
- * Custom login page for this application.
275
+ * Custom login page URL
436
276
  */
437
277
  accessibilityLoginRedirectUrl?: pulumi.Input<string>;
438
278
  /**
439
- * Enable self-service. Default is: `false`.
279
+ * Enable self service
440
280
  */
441
281
  accessibilitySelfService?: pulumi.Input<boolean>;
442
282
  /**
443
- * An array of ACS endpoints. You can configure a maximum of 100 endpoints.
283
+ * List of ACS endpoints for this SAML application
444
284
  */
445
285
  acsEndpoints?: pulumi.Input<pulumi.Input<string>[]>;
446
286
  /**
@@ -448,27 +288,24 @@ export interface SamlState {
448
288
  */
449
289
  adminNote?: pulumi.Input<string>;
450
290
  /**
451
- * Displays specific appLinks for the app. The value for each application link should be boolean.
291
+ * Displays specific appLinks for the app
452
292
  */
453
293
  appLinksJson?: pulumi.Input<string>;
454
294
  /**
455
- * Application settings in JSON format.
295
+ * Application settings in JSON format
456
296
  */
457
297
  appSettingsJson?: pulumi.Input<string>;
458
298
  /**
459
- * Determines whether the SAML assertion is digitally signed.
299
+ * Determines whether the SAML assertion is digitally signed
460
300
  */
461
301
  assertionSigned?: pulumi.Input<boolean>;
462
- /**
463
- * List of SAML Attribute statements.
464
- */
465
302
  attributeStatements?: pulumi.Input<pulumi.Input<inputs.app.SamlAttributeStatement>[]>;
466
303
  /**
467
304
  * Audience Restriction
468
305
  */
469
306
  audience?: pulumi.Input<string>;
470
307
  /**
471
- * The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.
308
+ * Id of this apps authentication policy
472
309
  */
473
310
  authenticationPolicy?: pulumi.Input<string>;
474
311
  /**
@@ -476,11 +313,11 @@ export interface SamlState {
476
313
  */
477
314
  authnContextClassRef?: pulumi.Input<string>;
478
315
  /**
479
- * Display auto submit toolbar. Default is: `false`
316
+ * Display auto submit toolbar
480
317
  */
481
318
  autoSubmitToolbar?: pulumi.Input<boolean>;
482
319
  /**
483
- * The raw signing certificate.
320
+ * cert from SAML XML metadata payload
484
321
  */
485
322
  certificate?: pulumi.Input<string>;
486
323
  /**
@@ -496,7 +333,7 @@ export interface SamlState {
496
333
  */
497
334
  digestAlgorithm?: pulumi.Input<string>;
498
335
  /**
499
- * Url that can be used to embed this application into another portal.
336
+ * The url that can be used to embed this application in other portals.
500
337
  */
501
338
  embedUrl?: pulumi.Input<string>;
502
339
  /**
@@ -504,95 +341,95 @@ export interface SamlState {
504
341
  */
505
342
  enduserNote?: pulumi.Input<string>;
506
343
  /**
507
- * Entity ID, the ID portion of the `entityUrl`.
344
+ * Entity ID, the ID portion of the entity_url
508
345
  */
509
346
  entityKey?: pulumi.Input<string>;
510
347
  /**
511
- * Entity URL for instance [http://www.okta.com/exk1fcia6d6EMsf331d8](http://www.okta.com/exk1fcia6d6EMsf331d8).
348
+ * Entity URL for instance http://www.okta.com/exk1fcia6d6EMsf331d8
512
349
  */
513
350
  entityUrl?: pulumi.Input<string>;
514
351
  /**
515
- * features enabled. Notice: you can't currently configure provisioning features via the API.
352
+ * features to enable
516
353
  */
517
354
  features?: pulumi.Input<pulumi.Input<string>[]>;
518
355
  /**
519
- * Do not display application icon on mobile app. Default is: `false`
356
+ * Do not display application icon on mobile app
520
357
  */
521
358
  hideIos?: pulumi.Input<boolean>;
522
359
  /**
523
- * Do not display application icon to users. Default is: `false`
360
+ * Do not display application icon to users
524
361
  */
525
362
  hideWeb?: pulumi.Input<boolean>;
526
363
  /**
527
- * Prompt user to re-authenticate if SP asks for it. Default is: `false`
364
+ * Prompt user to re-authenticate if SP asks for it
528
365
  */
529
366
  honorForceAuthn?: pulumi.Input<boolean>;
530
367
  /**
531
- * `urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Post` location from the SAML metadata.
368
+ * urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Post location from the SAML metadata.
532
369
  */
533
370
  httpPostBinding?: pulumi.Input<string>;
534
371
  /**
535
- * `urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect` location from the SAML metadata.
372
+ * urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect location from the SAML metadata.
536
373
  */
537
374
  httpRedirectBinding?: pulumi.Input<string>;
538
375
  /**
539
- * SAML issuer ID.
376
+ * SAML issuer ID
540
377
  */
541
378
  idpIssuer?: pulumi.Input<string>;
542
379
  /**
543
- * _Early Access Property_. Enables [Federation Broker Mode](https://help.okta.com/en/prod/Content/Topics/Apps/apps-fbm-enable.htm).
380
+ * *Early Access Property*. Enable Federation Broker Mode.
544
381
  */
545
382
  implicitAssignment?: pulumi.Input<boolean>;
546
383
  /**
547
- * Saml Inline Hook associated with the application.
384
+ * Saml Inline Hook setting
548
385
  */
549
386
  inlineHookId?: pulumi.Input<string>;
550
387
  /**
551
- * Certificate key ID.
388
+ * Certificate ID
552
389
  */
553
390
  keyId?: pulumi.Input<string>;
554
391
  /**
555
- * Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid`.
392
+ * Certificate name. This modulates the rotation of keys. New name == new key.
556
393
  */
557
394
  keyName?: pulumi.Input<string>;
558
395
  /**
559
- * Number of years the certificate is valid (2 - 10 years).
396
+ * Number of years the certificate is valid.
560
397
  */
561
398
  keyYearsValid?: pulumi.Input<number>;
562
399
  /**
563
- * An array of all key credentials for the application. Format of each entry is as follows:
400
+ * Application keys
564
401
  */
565
402
  keys?: pulumi.Input<pulumi.Input<inputs.app.SamlKey>[]>;
566
403
  /**
567
- * label of application.
404
+ * Pretty name of app.
568
405
  */
569
406
  label?: pulumi.Input<string>;
570
407
  /**
571
- * Local file path to the logo. The file must be in PNG, JPG, or GIF format, and less than 1 MB in size.
408
+ * Local path to logo of the application.
572
409
  */
573
410
  logo?: pulumi.Input<string>;
574
411
  /**
575
- * Direct link of application logo.
412
+ * URL of the application's logo
576
413
  */
577
414
  logoUrl?: pulumi.Input<string>;
578
415
  /**
579
- * The raw SAML metadata in XML.
416
+ * SAML xml metadata payload
580
417
  */
581
418
  metadata?: pulumi.Input<string>;
582
419
  /**
583
- * SAML xml metadata URL.
420
+ * SAML xml metadata URL
584
421
  */
585
422
  metadataUrl?: pulumi.Input<string>;
586
423
  /**
587
- * The name of the attribute statement.
424
+ * The reference name of the attribute statement
588
425
  */
589
426
  name?: pulumi.Input<string>;
590
427
  /**
591
- * name of application from the Okta Integration Network, if not included a custom app will be created. If not provided the following arguments are required:
428
+ * Name of preexisting SAML application. For instance 'slack'
592
429
  */
593
430
  preconfiguredApp?: pulumi.Input<string>;
594
431
  /**
595
- * The location where the app may present the SAML assertion.
432
+ * The location where the app may present the SAML assertion
596
433
  */
597
434
  recipient?: pulumi.Input<string>;
598
435
  /**
@@ -600,7 +437,7 @@ export interface SamlState {
600
437
  */
601
438
  requestCompressed?: pulumi.Input<boolean>;
602
439
  /**
603
- * Determines whether the SAML auth response message is digitally signed.
440
+ * Determines whether the SAML auth response message is digitally signed
604
441
  */
605
442
  responseSigned?: pulumi.Input<boolean>;
606
443
  /**
@@ -608,39 +445,39 @@ export interface SamlState {
608
445
  */
609
446
  samlSignedRequestEnabled?: pulumi.Input<boolean>;
610
447
  /**
611
- * SAML version for the app's sign-on mode. Valid values are: `"2.0"` or `"1.1"`. Default is `"2.0"`.
448
+ * SAML version for the app's sign-on mode
612
449
  */
613
450
  samlVersion?: pulumi.Input<string>;
614
451
  /**
615
- * Sign-on mode of application.
452
+ * Sign on mode of application.
616
453
  */
617
454
  signOnMode?: pulumi.Input<string>;
618
455
  /**
619
- * Signature algorithm used ot digitally sign the assertion and response.
456
+ * Signature algorithm used ot digitally sign the assertion and response
620
457
  */
621
458
  signatureAlgorithm?: pulumi.Input<string>;
622
459
  /**
623
- * x509 encoded certificate that the Service Provider uses to sign Single Logout requests. Note: should be provided without `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`, see [official documentation](https://developer.okta.com/docs/reference/api/apps/#service-provider-certificate).
460
+ * x509 encoded certificate that the Service Provider uses to sign Single Logout requests
624
461
  */
625
462
  singleLogoutCertificate?: pulumi.Input<string>;
626
463
  /**
627
- * The issuer of the Service Provider that generates the Single Logout request.
464
+ * The issuer of the Service Provider that generates the Single Logout request
628
465
  */
629
466
  singleLogoutIssuer?: pulumi.Input<string>;
630
467
  /**
631
- * The location where the logout response is sent.
468
+ * The location where the logout response is sent
632
469
  */
633
470
  singleLogoutUrl?: pulumi.Input<string>;
634
471
  /**
635
- * SAML service provider issuer.
472
+ * SAML SP issuer ID
636
473
  */
637
474
  spIssuer?: pulumi.Input<string>;
638
475
  /**
639
- * Single Sign-on Url.
476
+ * Single Sign On URL
640
477
  */
641
478
  ssoUrl?: pulumi.Input<string>;
642
479
  /**
643
- * status of application.
480
+ * Status of application.
644
481
  */
645
482
  status?: pulumi.Input<string>;
646
483
  /**
@@ -648,23 +485,23 @@ export interface SamlState {
648
485
  */
649
486
  subjectNameIdFormat?: pulumi.Input<string>;
650
487
  /**
651
- * Template for app user's username when a user is assigned to the app.
488
+ * Template for app user's username when a user is assigned to the app
652
489
  */
653
490
  subjectNameIdTemplate?: pulumi.Input<string>;
654
491
  /**
655
- * Username template. Default is: `"${source.login}"`
492
+ * Username template
656
493
  */
657
494
  userNameTemplate?: pulumi.Input<string>;
658
495
  /**
659
- * Push username on update. Valid values: `"PUSH"` and `"DONT_PUSH"`.
496
+ * Push username on update
660
497
  */
661
498
  userNameTemplatePushStatus?: pulumi.Input<string>;
662
499
  /**
663
- * Username template suffix.
500
+ * Username template suffix
664
501
  */
665
502
  userNameTemplateSuffix?: pulumi.Input<string>;
666
503
  /**
667
- * Username template type. Default is: `"BUILT_IN"`.
504
+ * Username template type
668
505
  */
669
506
  userNameTemplateType?: pulumi.Input<string>;
670
507
  }
@@ -673,19 +510,19 @@ export interface SamlState {
673
510
  */
674
511
  export interface SamlArgs {
675
512
  /**
676
- * Custom error page URL.
513
+ * Custom error page URL
677
514
  */
678
515
  accessibilityErrorRedirectUrl?: pulumi.Input<string>;
679
516
  /**
680
- * Custom login page for this application.
517
+ * Custom login page URL
681
518
  */
682
519
  accessibilityLoginRedirectUrl?: pulumi.Input<string>;
683
520
  /**
684
- * Enable self-service. Default is: `false`.
521
+ * Enable self service
685
522
  */
686
523
  accessibilitySelfService?: pulumi.Input<boolean>;
687
524
  /**
688
- * An array of ACS endpoints. You can configure a maximum of 100 endpoints.
525
+ * List of ACS endpoints for this SAML application
689
526
  */
690
527
  acsEndpoints?: pulumi.Input<pulumi.Input<string>[]>;
691
528
  /**
@@ -693,27 +530,24 @@ export interface SamlArgs {
693
530
  */
694
531
  adminNote?: pulumi.Input<string>;
695
532
  /**
696
- * Displays specific appLinks for the app. The value for each application link should be boolean.
533
+ * Displays specific appLinks for the app
697
534
  */
698
535
  appLinksJson?: pulumi.Input<string>;
699
536
  /**
700
- * Application settings in JSON format.
537
+ * Application settings in JSON format
701
538
  */
702
539
  appSettingsJson?: pulumi.Input<string>;
703
540
  /**
704
- * Determines whether the SAML assertion is digitally signed.
541
+ * Determines whether the SAML assertion is digitally signed
705
542
  */
706
543
  assertionSigned?: pulumi.Input<boolean>;
707
- /**
708
- * List of SAML Attribute statements.
709
- */
710
544
  attributeStatements?: pulumi.Input<pulumi.Input<inputs.app.SamlAttributeStatement>[]>;
711
545
  /**
712
546
  * Audience Restriction
713
547
  */
714
548
  audience?: pulumi.Input<string>;
715
549
  /**
716
- * The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.
550
+ * Id of this apps authentication policy
717
551
  */
718
552
  authenticationPolicy?: pulumi.Input<string>;
719
553
  /**
@@ -721,7 +555,7 @@ export interface SamlArgs {
721
555
  */
722
556
  authnContextClassRef?: pulumi.Input<string>;
723
557
  /**
724
- * Display auto submit toolbar. Default is: `false`
558
+ * Display auto submit toolbar
725
559
  */
726
560
  autoSubmitToolbar?: pulumi.Input<boolean>;
727
561
  /**
@@ -741,51 +575,51 @@ export interface SamlArgs {
741
575
  */
742
576
  enduserNote?: pulumi.Input<string>;
743
577
  /**
744
- * Do not display application icon on mobile app. Default is: `false`
578
+ * Do not display application icon on mobile app
745
579
  */
746
580
  hideIos?: pulumi.Input<boolean>;
747
581
  /**
748
- * Do not display application icon to users. Default is: `false`
582
+ * Do not display application icon to users
749
583
  */
750
584
  hideWeb?: pulumi.Input<boolean>;
751
585
  /**
752
- * Prompt user to re-authenticate if SP asks for it. Default is: `false`
586
+ * Prompt user to re-authenticate if SP asks for it
753
587
  */
754
588
  honorForceAuthn?: pulumi.Input<boolean>;
755
589
  /**
756
- * SAML issuer ID.
590
+ * SAML issuer ID
757
591
  */
758
592
  idpIssuer?: pulumi.Input<string>;
759
593
  /**
760
- * _Early Access Property_. Enables [Federation Broker Mode](https://help.okta.com/en/prod/Content/Topics/Apps/apps-fbm-enable.htm).
594
+ * *Early Access Property*. Enable Federation Broker Mode.
761
595
  */
762
596
  implicitAssignment?: pulumi.Input<boolean>;
763
597
  /**
764
- * Saml Inline Hook associated with the application.
598
+ * Saml Inline Hook setting
765
599
  */
766
600
  inlineHookId?: pulumi.Input<string>;
767
601
  /**
768
- * Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid`.
602
+ * Certificate name. This modulates the rotation of keys. New name == new key.
769
603
  */
770
604
  keyName?: pulumi.Input<string>;
771
605
  /**
772
- * Number of years the certificate is valid (2 - 10 years).
606
+ * Number of years the certificate is valid.
773
607
  */
774
608
  keyYearsValid?: pulumi.Input<number>;
775
609
  /**
776
- * label of application.
610
+ * Pretty name of app.
777
611
  */
778
612
  label: pulumi.Input<string>;
779
613
  /**
780
- * Local file path to the logo. The file must be in PNG, JPG, or GIF format, and less than 1 MB in size.
614
+ * Local path to logo of the application.
781
615
  */
782
616
  logo?: pulumi.Input<string>;
783
617
  /**
784
- * name of application from the Okta Integration Network, if not included a custom app will be created. If not provided the following arguments are required:
618
+ * Name of preexisting SAML application. For instance 'slack'
785
619
  */
786
620
  preconfiguredApp?: pulumi.Input<string>;
787
621
  /**
788
- * The location where the app may present the SAML assertion.
622
+ * The location where the app may present the SAML assertion
789
623
  */
790
624
  recipient?: pulumi.Input<string>;
791
625
  /**
@@ -793,7 +627,7 @@ export interface SamlArgs {
793
627
  */
794
628
  requestCompressed?: pulumi.Input<boolean>;
795
629
  /**
796
- * Determines whether the SAML auth response message is digitally signed.
630
+ * Determines whether the SAML auth response message is digitally signed
797
631
  */
798
632
  responseSigned?: pulumi.Input<boolean>;
799
633
  /**
@@ -801,35 +635,35 @@ export interface SamlArgs {
801
635
  */
802
636
  samlSignedRequestEnabled?: pulumi.Input<boolean>;
803
637
  /**
804
- * SAML version for the app's sign-on mode. Valid values are: `"2.0"` or `"1.1"`. Default is `"2.0"`.
638
+ * SAML version for the app's sign-on mode
805
639
  */
806
640
  samlVersion?: pulumi.Input<string>;
807
641
  /**
808
- * Signature algorithm used ot digitally sign the assertion and response.
642
+ * Signature algorithm used ot digitally sign the assertion and response
809
643
  */
810
644
  signatureAlgorithm?: pulumi.Input<string>;
811
645
  /**
812
- * x509 encoded certificate that the Service Provider uses to sign Single Logout requests. Note: should be provided without `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`, see [official documentation](https://developer.okta.com/docs/reference/api/apps/#service-provider-certificate).
646
+ * x509 encoded certificate that the Service Provider uses to sign Single Logout requests
813
647
  */
814
648
  singleLogoutCertificate?: pulumi.Input<string>;
815
649
  /**
816
- * The issuer of the Service Provider that generates the Single Logout request.
650
+ * The issuer of the Service Provider that generates the Single Logout request
817
651
  */
818
652
  singleLogoutIssuer?: pulumi.Input<string>;
819
653
  /**
820
- * The location where the logout response is sent.
654
+ * The location where the logout response is sent
821
655
  */
822
656
  singleLogoutUrl?: pulumi.Input<string>;
823
657
  /**
824
- * SAML service provider issuer.
658
+ * SAML SP issuer ID
825
659
  */
826
660
  spIssuer?: pulumi.Input<string>;
827
661
  /**
828
- * Single Sign-on Url.
662
+ * Single Sign On URL
829
663
  */
830
664
  ssoUrl?: pulumi.Input<string>;
831
665
  /**
832
- * status of application.
666
+ * Status of application.
833
667
  */
834
668
  status?: pulumi.Input<string>;
835
669
  /**
@@ -837,23 +671,23 @@ export interface SamlArgs {
837
671
  */
838
672
  subjectNameIdFormat?: pulumi.Input<string>;
839
673
  /**
840
- * Template for app user's username when a user is assigned to the app.
674
+ * Template for app user's username when a user is assigned to the app
841
675
  */
842
676
  subjectNameIdTemplate?: pulumi.Input<string>;
843
677
  /**
844
- * Username template. Default is: `"${source.login}"`
678
+ * Username template
845
679
  */
846
680
  userNameTemplate?: pulumi.Input<string>;
847
681
  /**
848
- * Push username on update. Valid values: `"PUSH"` and `"DONT_PUSH"`.
682
+ * Push username on update
849
683
  */
850
684
  userNameTemplatePushStatus?: pulumi.Input<string>;
851
685
  /**
852
- * Username template suffix.
686
+ * Username template suffix
853
687
  */
854
688
  userNameTemplateSuffix?: pulumi.Input<string>;
855
689
  /**
856
- * Username template type. Default is: `"BUILT_IN"`.
690
+ * Username template type
857
691
  */
858
692
  userNameTemplateType?: pulumi.Input<string>;
859
693
  }