@pulumi/okta 4.6.2 → 4.6.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (397) hide show
  1. package/adminRoleCustom.d.ts +129 -10
  2. package/adminRoleCustom.js +24 -1
  3. package/adminRoleCustom.js.map +1 -1
  4. package/adminRoleCustomAssignments.d.ts +25 -10
  5. package/adminRoleCustomAssignments.js +13 -1
  6. package/adminRoleCustomAssignments.js.map +1 -1
  7. package/adminRoleTargets.d.ts +44 -14
  8. package/adminRoleTargets.js +30 -0
  9. package/adminRoleTargets.js.map +1 -1
  10. package/app/accessPolicyAssignment.d.ts +20 -1
  11. package/app/accessPolicyAssignment.js +20 -1
  12. package/app/accessPolicyAssignment.js.map +1 -1
  13. package/app/autoLogin.d.ts +119 -72
  14. package/app/autoLogin.js +47 -0
  15. package/app/autoLogin.js.map +1 -1
  16. package/app/basicAuth.d.ts +66 -38
  17. package/app/basicAuth.js +28 -0
  18. package/app/basicAuth.js.map +1 -1
  19. package/app/bookmark.d.ts +71 -35
  20. package/app/bookmark.js +27 -0
  21. package/app/bookmark.js.map +1 -1
  22. package/app/getApp.d.ts +25 -58
  23. package/app/getApp.js +2 -2
  24. package/app/getApp.js.map +1 -1
  25. package/app/getMetadataSaml.d.ts +5 -11
  26. package/app/getMetadataSaml.js +2 -2
  27. package/app/getMetadataSaml.js.map +1 -1
  28. package/app/getOauth.d.ts +34 -62
  29. package/app/getOauth.js +2 -2
  30. package/app/getOauth.js.map +1 -1
  31. package/app/getSaml.d.ts +55 -75
  32. package/app/getSaml.js +2 -2
  33. package/app/getSaml.js.map +1 -1
  34. package/app/groupAssignment.d.ts +15 -6
  35. package/app/groupAssignment.js +9 -0
  36. package/app/groupAssignment.js.map +1 -1
  37. package/app/oauth.d.ts +301 -123
  38. package/app/oauth.js +82 -0
  39. package/app/oauth.js.map +1 -1
  40. package/app/oauthPostLogoutRedirectUri.d.ts +38 -3
  41. package/app/oauthPostLogoutRedirectUri.js +35 -0
  42. package/app/oauthPostLogoutRedirectUri.js.map +1 -1
  43. package/app/oauthRedirectUri.d.ts +37 -3
  44. package/app/oauthRedirectUri.js +34 -0
  45. package/app/oauthRedirectUri.js.map +1 -1
  46. package/app/saml.d.ts +303 -133
  47. package/app/saml.js +161 -0
  48. package/app/saml.js.map +1 -1
  49. package/app/securePasswordStore.d.ts +109 -79
  50. package/app/securePasswordStore.js +30 -0
  51. package/app/securePasswordStore.js.map +1 -1
  52. package/app/swa.d.ts +102 -72
  53. package/app/swa.js +30 -0
  54. package/app/swa.js.map +1 -1
  55. package/app/threeField.d.ts +87 -72
  56. package/app/threeField.js +15 -0
  57. package/app/threeField.js.map +1 -1
  58. package/app/user.d.ts +37 -12
  59. package/app/user.js +22 -0
  60. package/app/user.js.map +1 -1
  61. package/appGroupAssignments.d.ts +40 -3
  62. package/appGroupAssignments.js +37 -0
  63. package/appGroupAssignments.js.map +1 -1
  64. package/appOauthApiScope.d.ts +36 -3
  65. package/appOauthApiScope.js +33 -0
  66. package/appOauthApiScope.js.map +1 -1
  67. package/appSamlAppSettings.d.ts +44 -6
  68. package/appSamlAppSettings.js +38 -0
  69. package/appSamlAppSettings.js.map +1 -1
  70. package/appSharedCredentials.d.ts +115 -72
  71. package/appSharedCredentials.js +43 -0
  72. package/appSharedCredentials.js.map +1 -1
  73. package/appSignonPolicy.d.ts +44 -6
  74. package/appSignonPolicy.js +38 -0
  75. package/appSignonPolicy.js.map +1 -1
  76. package/appSignonPolicyRule.d.ts +327 -68
  77. package/appSignonPolicyRule.js +244 -0
  78. package/appSignonPolicyRule.js.map +1 -1
  79. package/appUserBaseSchemaProperty.d.ts +52 -24
  80. package/appUserBaseSchemaProperty.js +28 -0
  81. package/appUserBaseSchemaProperty.js.map +1 -1
  82. package/appUserSchemaProperty.d.ts +80 -54
  83. package/appUserSchemaProperty.js +26 -0
  84. package/appUserSchemaProperty.js.map +1 -1
  85. package/auth/getServer.d.ts +11 -11
  86. package/auth/getServer.js +2 -2
  87. package/auth/getServerPolicy.d.ts +9 -15
  88. package/auth/getServerPolicy.js +2 -2
  89. package/auth/getServerPolicy.js.map +1 -1
  90. package/auth/getServerScopes.d.ts +5 -8
  91. package/auth/getServerScopes.js +2 -2
  92. package/auth/getServerScopes.js.map +1 -1
  93. package/auth/server.d.ts +49 -13
  94. package/auth/server.js +27 -0
  95. package/auth/server.js.map +1 -1
  96. package/auth/serverClaim.d.ts +54 -18
  97. package/auth/serverClaim.js +27 -0
  98. package/auth/serverClaim.js.map +1 -1
  99. package/auth/serverPolicy.d.ts +43 -6
  100. package/auth/serverPolicy.js +28 -0
  101. package/auth/serverPolicy.js.map +1 -1
  102. package/auth/serverPolicyRule.d.ts +72 -29
  103. package/auth/serverPolicyRule.js +25 -0
  104. package/auth/serverPolicyRule.js.map +1 -1
  105. package/auth/serverScope.d.ts +41 -15
  106. package/auth/serverScope.js +26 -0
  107. package/auth/serverScope.js.map +1 -1
  108. package/authServerClaimDefault.d.ts +50 -13
  109. package/authServerClaimDefault.js +31 -0
  110. package/authServerClaimDefault.js.map +1 -1
  111. package/authServerDefault.d.ts +47 -13
  112. package/authServerDefault.js +25 -0
  113. package/authServerDefault.js.map +1 -1
  114. package/authenticator.d.ts +94 -38
  115. package/authenticator.js +38 -0
  116. package/authenticator.js.map +1 -1
  117. package/behaviour.d.ts +78 -18
  118. package/behaviour.js +42 -0
  119. package/behaviour.js.map +1 -1
  120. package/brand.d.ts +28 -19
  121. package/brand.js +10 -1
  122. package/brand.js.map +1 -1
  123. package/captcha.d.ts +38 -12
  124. package/captcha.js +26 -0
  125. package/captcha.js.map +1 -1
  126. package/captchaOrgWideSettings.d.ts +51 -6
  127. package/captchaOrgWideSettings.js +45 -0
  128. package/captchaOrgWideSettings.js.map +1 -1
  129. package/domain.d.ts +39 -13
  130. package/domain.js +20 -0
  131. package/domain.js.map +1 -1
  132. package/domainCertificate.d.ts +63 -15
  133. package/domainCertificate.js +48 -0
  134. package/domainCertificate.js.map +1 -1
  135. package/domainVerification.d.ts +22 -3
  136. package/domainVerification.js +19 -0
  137. package/domainVerification.js.map +1 -1
  138. package/emailCustomization.d.ts +224 -3
  139. package/emailCustomization.js +41 -0
  140. package/emailCustomization.js.map +1 -1
  141. package/emailSender.d.ts +39 -13
  142. package/emailSender.js +26 -0
  143. package/emailSender.js.map +1 -1
  144. package/emailSenderVerification.d.ts +26 -3
  145. package/emailSenderVerification.js +23 -0
  146. package/emailSenderVerification.js.map +1 -1
  147. package/eventHook.d.ts +37 -0
  148. package/eventHook.js +37 -0
  149. package/eventHook.js.map +1 -1
  150. package/eventHookVerification.d.ts +37 -3
  151. package/eventHookVerification.js +34 -0
  152. package/eventHookVerification.js.map +1 -1
  153. package/factor/factor.d.ts +23 -6
  154. package/factor/factor.js +14 -0
  155. package/factor/factor.js.map +1 -1
  156. package/factorTotp.d.ts +44 -12
  157. package/factorTotp.js +23 -0
  158. package/factorTotp.js.map +1 -1
  159. package/getAppGroupAssignments.d.ts +6 -6
  160. package/getAppGroupAssignments.js +2 -2
  161. package/getAppSignonPolicy.d.ts +6 -16
  162. package/getAppSignonPolicy.js +4 -8
  163. package/getAppSignonPolicy.js.map +1 -1
  164. package/getAppUserAssignments.d.ts +6 -6
  165. package/getAppUserAssignments.js +2 -2
  166. package/getAuthServerClaim.d.ts +12 -15
  167. package/getAuthServerClaim.js +2 -2
  168. package/getAuthServerClaim.js.map +1 -1
  169. package/getAuthServerClaims.d.ts +5 -8
  170. package/getAuthServerClaims.js +2 -2
  171. package/getAuthServerClaims.js.map +1 -1
  172. package/getAuthenticator.d.ts +26 -24
  173. package/getAuthenticator.js +22 -14
  174. package/getAuthenticator.js.map +1 -1
  175. package/getBehaviour.d.ts +8 -6
  176. package/getBehaviour.js +2 -2
  177. package/getBehaviour.js.map +1 -1
  178. package/getBehaviours.d.ts +7 -7
  179. package/getBehaviours.js +2 -2
  180. package/getBrand.d.ts +6 -9
  181. package/getBrand.js +2 -2
  182. package/getBrand.js.map +1 -1
  183. package/getBrands.d.ts +2 -2
  184. package/getBrands.js +2 -2
  185. package/getEmailCustomization.d.ts +9 -14
  186. package/getEmailCustomization.js +6 -2
  187. package/getEmailCustomization.js.map +1 -1
  188. package/getEmailCustomizations.d.ts +9 -11
  189. package/getEmailCustomizations.js +6 -2
  190. package/getEmailCustomizations.js.map +1 -1
  191. package/getGroups.d.ts +25 -11
  192. package/getGroups.js +2 -2
  193. package/getGroups.js.map +1 -1
  194. package/getNetworkZone.d.ts +12 -12
  195. package/getNetworkZone.js +2 -2
  196. package/getRoleSubscription.d.ts +35 -13
  197. package/getRoleSubscription.js +2 -2
  198. package/getRoleSubscription.js.map +1 -1
  199. package/getTemplate.d.ts +8 -10
  200. package/getTemplate.js +6 -2
  201. package/getTemplate.js.map +1 -1
  202. package/getTemplates.d.ts +7 -6
  203. package/getTemplates.js +6 -2
  204. package/getTemplates.js.map +1 -1
  205. package/getTheme.d.ts +12 -14
  206. package/getTheme.js +6 -2
  207. package/getTheme.js.map +1 -1
  208. package/getThemes.d.ts +7 -6
  209. package/getThemes.js +6 -2
  210. package/getThemes.js.map +1 -1
  211. package/getTrustedOrigins.d.ts +4 -7
  212. package/getTrustedOrigins.js +2 -2
  213. package/getTrustedOrigins.js.map +1 -1
  214. package/getUserSecurityQuestions.d.ts +8 -4
  215. package/getUserSecurityQuestions.js +4 -0
  216. package/getUserSecurityQuestions.js.map +1 -1
  217. package/group/getEveryoneGroup.d.ts +5 -10
  218. package/group/getEveryoneGroup.js +2 -4
  219. package/group/getEveryoneGroup.js.map +1 -1
  220. package/group/getGroup.d.ts +26 -17
  221. package/group/getGroup.js +2 -2
  222. package/group/getGroup.js.map +1 -1
  223. package/group/getRule.d.ts +15 -6
  224. package/group/getRule.js +2 -2
  225. package/group/getRule.js.map +1 -1
  226. package/group/group.d.ts +46 -9
  227. package/group/group.js +37 -0
  228. package/group/group.js.map +1 -1
  229. package/group/role.d.ts +101 -15
  230. package/group/role.js +26 -0
  231. package/group/role.js.map +1 -1
  232. package/group/rule.d.ts +80 -6
  233. package/group/rule.js +23 -0
  234. package/group/rule.js.map +1 -1
  235. package/groupMemberships.d.ts +48 -7
  236. package/groupMemberships.js +42 -1
  237. package/groupMemberships.js.map +1 -1
  238. package/groupSchemaProperty.d.ts +94 -51
  239. package/groupSchemaProperty.js +25 -0
  240. package/groupSchemaProperty.js.map +1 -1
  241. package/idp/getMetadataSaml.d.ts +6 -9
  242. package/idp/getMetadataSaml.js +2 -2
  243. package/idp/getMetadataSaml.js.map +1 -1
  244. package/idp/getOidc.d.ts +9 -9
  245. package/idp/getOidc.js +2 -2
  246. package/idp/getSaml.d.ts +13 -16
  247. package/idp/getSaml.js +2 -2
  248. package/idp/getSaml.js.map +1 -1
  249. package/idp/getSocial.d.ts +2 -8
  250. package/idp/getSocial.js +2 -2
  251. package/idp/getSocial.js.map +1 -1
  252. package/idp/oidc.d.ts +297 -12
  253. package/idp/oidc.js +36 -0
  254. package/idp/oidc.js.map +1 -1
  255. package/idp/saml.d.ts +284 -18
  256. package/idp/saml.js +32 -0
  257. package/idp/saml.js.map +1 -1
  258. package/idp/samlKey.d.ts +48 -3
  259. package/idp/samlKey.js +9 -0
  260. package/idp/samlKey.js.map +1 -1
  261. package/idp/social.d.ts +251 -18
  262. package/idp/social.js +32 -0
  263. package/idp/social.js.map +1 -1
  264. package/index/emailDomain.d.ts +41 -16
  265. package/index/emailDomain.js +25 -0
  266. package/index/emailDomain.js.map +1 -1
  267. package/index/emailDomainVerification.d.ts +25 -3
  268. package/index/emailDomainVerification.js +22 -0
  269. package/index/emailDomainVerification.js.map +1 -1
  270. package/index/getDomain.d.ts +14 -11
  271. package/index/getDomain.js +8 -2
  272. package/index/getDomain.js.map +1 -1
  273. package/inline/hook.d.ts +89 -0
  274. package/inline/hook.js +35 -0
  275. package/inline/hook.js.map +1 -1
  276. package/linkDefinition.d.ts +30 -0
  277. package/linkDefinition.js +30 -0
  278. package/linkDefinition.js.map +1 -1
  279. package/linkValue.d.ts +59 -6
  280. package/linkValue.js +53 -0
  281. package/linkValue.js.map +1 -1
  282. package/network/zone.d.ts +74 -27
  283. package/network/zone.js +44 -0
  284. package/network/zone.js.map +1 -1
  285. package/orgConfiguration.d.ts +25 -0
  286. package/orgConfiguration.js +25 -0
  287. package/orgConfiguration.js.map +1 -1
  288. package/orgSupport.d.ts +20 -3
  289. package/orgSupport.js +17 -0
  290. package/orgSupport.js.map +1 -1
  291. package/package.json +1 -1
  292. package/policy/getDefaultPolicy.d.ts +7 -9
  293. package/policy/getDefaultPolicy.js +2 -6
  294. package/policy/getDefaultPolicy.js.map +1 -1
  295. package/policy/getPolicy.d.ts +10 -11
  296. package/policy/getPolicy.js +2 -2
  297. package/policy/getPolicy.js.map +1 -1
  298. package/policy/mfa.d.ts +259 -18
  299. package/policy/mfa.js +49 -0
  300. package/policy/mfa.js.map +1 -1
  301. package/policy/password.d.ts +117 -90
  302. package/policy/password.js +27 -0
  303. package/policy/password.js.map +1 -1
  304. package/policy/ruleIdpDiscovery.d.ts +149 -27
  305. package/policy/ruleIdpDiscovery.js +65 -0
  306. package/policy/ruleIdpDiscovery.js.map +1 -1
  307. package/policy/ruleMfa.d.ts +35 -24
  308. package/policy/ruleMfa.js +11 -0
  309. package/policy/ruleMfa.js.map +1 -1
  310. package/policy/rulePassword.d.ts +46 -33
  311. package/policy/rulePassword.js +13 -0
  312. package/policy/rulePassword.js.map +1 -1
  313. package/policy/ruleSignon.d.ts +170 -57
  314. package/policy/ruleSignon.js +92 -0
  315. package/policy/ruleSignon.js.map +1 -1
  316. package/policy/signon.d.ts +41 -15
  317. package/policy/signon.js +26 -0
  318. package/policy/signon.js.map +1 -1
  319. package/policyMfaDefault.d.ts +250 -13
  320. package/policyMfaDefault.js +45 -0
  321. package/policyMfaDefault.js.map +1 -1
  322. package/policyPasswordDefault.d.ts +88 -54
  323. package/policyPasswordDefault.js +22 -0
  324. package/policyPasswordDefault.js.map +1 -1
  325. package/policyProfileEnrollment.d.ts +28 -6
  326. package/policyProfileEnrollment.js +22 -0
  327. package/policyProfileEnrollment.js.map +1 -1
  328. package/policyProfileEnrollmentApps.d.ts +42 -5
  329. package/policyProfileEnrollmentApps.js +37 -0
  330. package/policyProfileEnrollmentApps.js.map +1 -1
  331. package/policyRuleProfileEnrollment.d.ts +88 -26
  332. package/policyRuleProfileEnrollment.js +62 -0
  333. package/policyRuleProfileEnrollment.js.map +1 -1
  334. package/profile/mapping.d.ts +95 -9
  335. package/profile/mapping.js +41 -0
  336. package/profile/mapping.js.map +1 -1
  337. package/rateLimiting.d.ts +43 -9
  338. package/rateLimiting.js +28 -0
  339. package/rateLimiting.js.map +1 -1
  340. package/resourceSet.d.ts +32 -10
  341. package/resourceSet.js +20 -1
  342. package/resourceSet.js.map +1 -1
  343. package/roleSubscription.d.ts +110 -9
  344. package/roleSubscription.js +26 -0
  345. package/roleSubscription.js.map +1 -1
  346. package/securityNotificationEmails.d.ts +45 -15
  347. package/securityNotificationEmails.js +30 -0
  348. package/securityNotificationEmails.js.map +1 -1
  349. package/templateSms.d.ts +47 -3
  350. package/templateSms.js +35 -0
  351. package/templateSms.js.map +1 -1
  352. package/theme.d.ts +59 -44
  353. package/theme.js +15 -0
  354. package/theme.js.map +1 -1
  355. package/threatInsightSettings.d.ts +58 -6
  356. package/threatInsightSettings.js +34 -0
  357. package/threatInsightSettings.js.map +1 -1
  358. package/trustedorigin/origin.d.ts +37 -12
  359. package/trustedorigin/origin.js +25 -0
  360. package/trustedorigin/origin.js.map +1 -1
  361. package/types/input.d.ts +227 -60
  362. package/types/output.d.ts +446 -56
  363. package/user/getUser.d.ts +104 -32
  364. package/user/getUser.js +2 -2
  365. package/user/getUser.js.map +1 -1
  366. package/user/getUserProfileMappingSource.d.ts +7 -9
  367. package/user/getUserProfileMappingSource.js +4 -6
  368. package/user/getUserProfileMappingSource.js.map +1 -1
  369. package/user/getUserType.d.ts +7 -7
  370. package/user/getUserType.js +2 -2
  371. package/user/getUsers.d.ts +57 -61
  372. package/user/getUsers.js +44 -30
  373. package/user/getUsers.js.map +1 -1
  374. package/user/user.d.ts +215 -117
  375. package/user/user.js +71 -0
  376. package/user/user.js.map +1 -1
  377. package/user/userType.d.ts +34 -9
  378. package/user/userType.js +25 -0
  379. package/user/userType.js.map +1 -1
  380. package/userAdminRoles.d.ts +41 -10
  381. package/userAdminRoles.js +29 -1
  382. package/userAdminRoles.js.map +1 -1
  383. package/userBaseSchemaProperty.d.ts +67 -24
  384. package/userBaseSchemaProperty.js +43 -0
  385. package/userBaseSchemaProperty.js.map +1 -1
  386. package/userFactorQuestion.d.ts +52 -14
  387. package/userFactorQuestion.js +39 -1
  388. package/userFactorQuestion.js.map +1 -1
  389. package/userGroupMemberships.d.ts +23 -4
  390. package/userGroupMemberships.js +20 -1
  391. package/userGroupMemberships.js.map +1 -1
  392. package/userSchemaProperty.d.ts +107 -57
  393. package/userSchemaProperty.js +32 -0
  394. package/userSchemaProperty.js.map +1 -1
  395. package/utilities.d.ts +4 -0
  396. package/utilities.js +33 -1
  397. package/utilities.js.map +1 -1
@@ -1,6 +1,29 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
- * Resource to manage administrative Role assignments for a User
3
+ * These operations allow the creation and manipulation of custom roles as custom collections of permissions.
4
+ *
5
+ * > **NOTE:** This an `Early Access` feature.
6
+ *
7
+ * ## Example Usage
8
+ *
9
+ * ```typescript
10
+ * import * as pulumi from "@pulumi/pulumi";
11
+ * import * as okta from "@pulumi/okta";
12
+ *
13
+ * const example = new okta.AdminRoleCustom("example", {
14
+ * description: "This role allows app assignment management",
15
+ * label: "AppAssignmentManager",
16
+ * permissions: ["okta.apps.assignment.manage"],
17
+ * });
18
+ * ```
19
+ *
20
+ * ## Import
21
+ *
22
+ * Okta Custom Admin Role can be imported via the Okta ID.
23
+ *
24
+ * ```sh
25
+ * $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example <custom role id>
26
+ * ```
4
27
  */
5
28
  export declare class AdminRoleCustom extends pulumi.CustomResource {
6
29
  /**
@@ -19,15 +42,47 @@ export declare class AdminRoleCustom extends pulumi.CustomResource {
19
42
  */
20
43
  static isInstance(obj: any): obj is AdminRoleCustom;
21
44
  /**
22
- * A human-readable description of the new Role
45
+ * A human-readable description of the new Role.
23
46
  */
24
47
  readonly description: pulumi.Output<string>;
25
48
  /**
26
- * The name given to the new Role
49
+ * The name given to the new Role.
27
50
  */
28
51
  readonly label: pulumi.Output<string>;
29
52
  /**
30
- * The permissions that the new Role grants.
53
+ * The permissions that the new Role grants. At least one
54
+ * permission must be specified when creating custom role. Valid values: `"okta.authzServers.manage"`,
55
+ * `"okta.authzServers.read"`,
56
+ * `"okta.apps.assignment.manage"`,
57
+ * `"okta.apps.manage"`,
58
+ * `"okta.apps.read"`,
59
+ * `"okta.customizations.manage"`,
60
+ * `"okta.customizations.read"`,
61
+ * `"okta.groups.appAssignment.manage"`,
62
+ * `"okta.groups.create"`,
63
+ * `"okta.groups.manage"`,
64
+ * `"okta.groups.members.manage"`,
65
+ * `"okta.groups.read"`,
66
+ * `"okta.profilesources.import.run"`,
67
+ * `"okta.users.appAssignment.manage"`,
68
+ * `"okta.users.create"`,
69
+ * `"okta.users.credentials.expirePassword"`,
70
+ * `"okta.users.credentials.manage"`,
71
+ * `"okta.users.credentials.resetFactors"`,
72
+ * `"okta.users.credentials.resetPassword"`,
73
+ * `"okta.users.groupMembership.manage"`,
74
+ * `"okta.users.lifecycle.activate"`,
75
+ * `"okta.users.lifecycle.clearSessions"`,
76
+ * `"okta.users.lifecycle.deactivate"`,
77
+ * `"okta.users.lifecycle.delete"`,
78
+ * `"okta.users.lifecycle.manage"`,
79
+ * `"okta.users.lifecycle.suspend"`,
80
+ * `"okta.users.lifecycle.unlock"`,
81
+ * `"okta.users.lifecycle.unsuspend"`,
82
+ * `"okta.users.manage"`,
83
+ * `"okta.users.read"`,
84
+ * `"okta.users.userprofile.manage"`,
85
+ * `"okta.workflows.invoke"`.,
31
86
  */
32
87
  readonly permissions: pulumi.Output<string[] | undefined>;
33
88
  /**
@@ -44,15 +99,47 @@ export declare class AdminRoleCustom extends pulumi.CustomResource {
44
99
  */
45
100
  export interface AdminRoleCustomState {
46
101
  /**
47
- * A human-readable description of the new Role
102
+ * A human-readable description of the new Role.
48
103
  */
49
104
  description?: pulumi.Input<string>;
50
105
  /**
51
- * The name given to the new Role
106
+ * The name given to the new Role.
52
107
  */
53
108
  label?: pulumi.Input<string>;
54
109
  /**
55
- * The permissions that the new Role grants.
110
+ * The permissions that the new Role grants. At least one
111
+ * permission must be specified when creating custom role. Valid values: `"okta.authzServers.manage"`,
112
+ * `"okta.authzServers.read"`,
113
+ * `"okta.apps.assignment.manage"`,
114
+ * `"okta.apps.manage"`,
115
+ * `"okta.apps.read"`,
116
+ * `"okta.customizations.manage"`,
117
+ * `"okta.customizations.read"`,
118
+ * `"okta.groups.appAssignment.manage"`,
119
+ * `"okta.groups.create"`,
120
+ * `"okta.groups.manage"`,
121
+ * `"okta.groups.members.manage"`,
122
+ * `"okta.groups.read"`,
123
+ * `"okta.profilesources.import.run"`,
124
+ * `"okta.users.appAssignment.manage"`,
125
+ * `"okta.users.create"`,
126
+ * `"okta.users.credentials.expirePassword"`,
127
+ * `"okta.users.credentials.manage"`,
128
+ * `"okta.users.credentials.resetFactors"`,
129
+ * `"okta.users.credentials.resetPassword"`,
130
+ * `"okta.users.groupMembership.manage"`,
131
+ * `"okta.users.lifecycle.activate"`,
132
+ * `"okta.users.lifecycle.clearSessions"`,
133
+ * `"okta.users.lifecycle.deactivate"`,
134
+ * `"okta.users.lifecycle.delete"`,
135
+ * `"okta.users.lifecycle.manage"`,
136
+ * `"okta.users.lifecycle.suspend"`,
137
+ * `"okta.users.lifecycle.unlock"`,
138
+ * `"okta.users.lifecycle.unsuspend"`,
139
+ * `"okta.users.manage"`,
140
+ * `"okta.users.read"`,
141
+ * `"okta.users.userprofile.manage"`,
142
+ * `"okta.workflows.invoke"`.,
56
143
  */
57
144
  permissions?: pulumi.Input<pulumi.Input<string>[]>;
58
145
  }
@@ -61,15 +148,47 @@ export interface AdminRoleCustomState {
61
148
  */
62
149
  export interface AdminRoleCustomArgs {
63
150
  /**
64
- * A human-readable description of the new Role
151
+ * A human-readable description of the new Role.
65
152
  */
66
153
  description: pulumi.Input<string>;
67
154
  /**
68
- * The name given to the new Role
155
+ * The name given to the new Role.
69
156
  */
70
157
  label: pulumi.Input<string>;
71
158
  /**
72
- * The permissions that the new Role grants.
159
+ * The permissions that the new Role grants. At least one
160
+ * permission must be specified when creating custom role. Valid values: `"okta.authzServers.manage"`,
161
+ * `"okta.authzServers.read"`,
162
+ * `"okta.apps.assignment.manage"`,
163
+ * `"okta.apps.manage"`,
164
+ * `"okta.apps.read"`,
165
+ * `"okta.customizations.manage"`,
166
+ * `"okta.customizations.read"`,
167
+ * `"okta.groups.appAssignment.manage"`,
168
+ * `"okta.groups.create"`,
169
+ * `"okta.groups.manage"`,
170
+ * `"okta.groups.members.manage"`,
171
+ * `"okta.groups.read"`,
172
+ * `"okta.profilesources.import.run"`,
173
+ * `"okta.users.appAssignment.manage"`,
174
+ * `"okta.users.create"`,
175
+ * `"okta.users.credentials.expirePassword"`,
176
+ * `"okta.users.credentials.manage"`,
177
+ * `"okta.users.credentials.resetFactors"`,
178
+ * `"okta.users.credentials.resetPassword"`,
179
+ * `"okta.users.groupMembership.manage"`,
180
+ * `"okta.users.lifecycle.activate"`,
181
+ * `"okta.users.lifecycle.clearSessions"`,
182
+ * `"okta.users.lifecycle.deactivate"`,
183
+ * `"okta.users.lifecycle.delete"`,
184
+ * `"okta.users.lifecycle.manage"`,
185
+ * `"okta.users.lifecycle.suspend"`,
186
+ * `"okta.users.lifecycle.unlock"`,
187
+ * `"okta.users.lifecycle.unsuspend"`,
188
+ * `"okta.users.manage"`,
189
+ * `"okta.users.read"`,
190
+ * `"okta.users.userprofile.manage"`,
191
+ * `"okta.workflows.invoke"`.,
73
192
  */
74
193
  permissions?: pulumi.Input<pulumi.Input<string>[]>;
75
194
  }
@@ -6,7 +6,30 @@ exports.AdminRoleCustom = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
- * Resource to manage administrative Role assignments for a User
9
+ * These operations allow the creation and manipulation of custom roles as custom collections of permissions.
10
+ *
11
+ * > **NOTE:** This an `Early Access` feature.
12
+ *
13
+ * ## Example Usage
14
+ *
15
+ * ```typescript
16
+ * import * as pulumi from "@pulumi/pulumi";
17
+ * import * as okta from "@pulumi/okta";
18
+ *
19
+ * const example = new okta.AdminRoleCustom("example", {
20
+ * description: "This role allows app assignment management",
21
+ * label: "AppAssignmentManager",
22
+ * permissions: ["okta.apps.assignment.manage"],
23
+ * });
24
+ * ```
25
+ *
26
+ * ## Import
27
+ *
28
+ * Okta Custom Admin Role can be imported via the Okta ID.
29
+ *
30
+ * ```sh
31
+ * $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example &#60;custom role id&#62;
32
+ * ```
10
33
  */
11
34
  class AdminRoleCustom extends pulumi.CustomResource {
12
35
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"adminRoleCustom.js","sourceRoot":"","sources":["../adminRoleCustom.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;GAEG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAuBD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAvEL,0CAwEC;AA1DG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
1
+ {"version":3,"file":"adminRoleCustom.js","sourceRoot":"","sources":["../adminRoleCustom.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAuDD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAvGL,0CAwGC;AA1FG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
@@ -1,6 +1,18 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
- * Resource to manage the assignment and unassignment of Custom Roles
3
+ * This resource allows the assignment and unassignment of Custom Roles. The `members` field supports these type of resources:
4
+ * - Groups
5
+ * - Users
6
+ *
7
+ * > **NOTE:** This an `Early Access` feature.
8
+ *
9
+ * ## Import
10
+ *
11
+ * Okta Custom Admin Role Assignments can be imported via the Okta ID.
12
+ *
13
+ * ```sh
14
+ * $ pulumi import okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments example &#60;resource_set_id&#62;/&#60;custom_role_id&#62;
15
+ * ```
4
16
  */
5
17
  export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
6
18
  /**
@@ -19,15 +31,16 @@ export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
19
31
  */
20
32
  static isInstance(obj: any): obj is AdminRoleCustomAssignments;
21
33
  /**
22
- * ID of the Custom Role
34
+ * ID of the Custom Role.
23
35
  */
24
36
  readonly customRoleId: pulumi.Output<string>;
25
37
  /**
26
- * The hrefs that point to User(s) and/or Group(s) that receive the Role
38
+ * The hrefs that point to User(s) and/or Group(s) that receive the Role. At least one
39
+ * permission must be specified when creating custom role.
27
40
  */
28
41
  readonly members: pulumi.Output<string[] | undefined>;
29
42
  /**
30
- * ID of the target Resource Set
43
+ * ID of the target Resource Set.
31
44
  */
32
45
  readonly resourceSetId: pulumi.Output<string>;
33
46
  /**
@@ -44,15 +57,16 @@ export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
44
57
  */
45
58
  export interface AdminRoleCustomAssignmentsState {
46
59
  /**
47
- * ID of the Custom Role
60
+ * ID of the Custom Role.
48
61
  */
49
62
  customRoleId?: pulumi.Input<string>;
50
63
  /**
51
- * The hrefs that point to User(s) and/or Group(s) that receive the Role
64
+ * The hrefs that point to User(s) and/or Group(s) that receive the Role. At least one
65
+ * permission must be specified when creating custom role.
52
66
  */
53
67
  members?: pulumi.Input<pulumi.Input<string>[]>;
54
68
  /**
55
- * ID of the target Resource Set
69
+ * ID of the target Resource Set.
56
70
  */
57
71
  resourceSetId?: pulumi.Input<string>;
58
72
  }
@@ -61,15 +75,16 @@ export interface AdminRoleCustomAssignmentsState {
61
75
  */
62
76
  export interface AdminRoleCustomAssignmentsArgs {
63
77
  /**
64
- * ID of the Custom Role
78
+ * ID of the Custom Role.
65
79
  */
66
80
  customRoleId: pulumi.Input<string>;
67
81
  /**
68
- * The hrefs that point to User(s) and/or Group(s) that receive the Role
82
+ * The hrefs that point to User(s) and/or Group(s) that receive the Role. At least one
83
+ * permission must be specified when creating custom role.
69
84
  */
70
85
  members?: pulumi.Input<pulumi.Input<string>[]>;
71
86
  /**
72
- * ID of the target Resource Set
87
+ * ID of the target Resource Set.
73
88
  */
74
89
  resourceSetId: pulumi.Input<string>;
75
90
  }
@@ -6,7 +6,19 @@ exports.AdminRoleCustomAssignments = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
- * Resource to manage the assignment and unassignment of Custom Roles
9
+ * This resource allows the assignment and unassignment of Custom Roles. The `members` field supports these type of resources:
10
+ * - Groups
11
+ * - Users
12
+ *
13
+ * > **NOTE:** This an `Early Access` feature.
14
+ *
15
+ * ## Import
16
+ *
17
+ * Okta Custom Admin Role Assignments can be imported via the Okta ID.
18
+ *
19
+ * ```sh
20
+ * $ pulumi import okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments example &#60;resource_set_id&#62;/&#60;custom_role_id&#62;
21
+ * ```
10
22
  */
11
23
  class AdminRoleCustomAssignments extends pulumi.CustomResource {
12
24
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"adminRoleCustomAssignments.js","sourceRoot":"","sources":["../adminRoleCustomAssignments.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;GAEG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IAuBD,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAvEL,gEAwEC;AA1DG,gBAAgB;AACO,uCAAY,GAAG,kEAAkE,CAAC"}
1
+ {"version":3,"file":"adminRoleCustomAssignments.js","sourceRoot":"","sources":["../adminRoleCustomAssignments.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;GAcG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IAwBD,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAxEL,gEAyEC;AA3DG,gBAAgB;AACO,uCAAY,GAAG,kEAAkE,CAAC"}
@@ -1,4 +1,34 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * Manages targets for administrator roles.
4
+ *
5
+ * This resource allows you to define permissions for admin roles into a smaller subset of Groups or Apps within your org.
6
+ * You can define admin roles to target Groups, Applications, and Application Instances.
7
+ *
8
+ * ## Example Usage
9
+ *
10
+ * ```typescript
11
+ * import * as pulumi from "@pulumi/pulumi";
12
+ * import * as okta from "@pulumi/okta";
13
+ *
14
+ * const example = new okta.AdminRoleTargets("example", {
15
+ * apps: [
16
+ * "oidc_client.<app_id>",
17
+ * "facebook",
18
+ * ],
19
+ * roleType: "APP_ADMIN",
20
+ * userId: "<user_id>",
21
+ * });
22
+ * ```
23
+ *
24
+ * ## Import
25
+ *
26
+ * Okta Admin Role Targets can be imported via the Okta ID.
27
+ *
28
+ * ```sh
29
+ * $ pulumi import okta:index/adminRoleTargets:AdminRoleTargets example &#60;user id&#62;/&#60;role type&#62;
30
+ * ```
31
+ */
2
32
  export declare class AdminRoleTargets extends pulumi.CustomResource {
3
33
  /**
4
34
  * Get an existing AdminRoleTargets resource's state with the given name, ID, and optional extra
@@ -16,23 +46,23 @@ export declare class AdminRoleTargets extends pulumi.CustomResource {
16
46
  */
17
47
  static isInstance(obj: any): obj is AdminRoleTargets;
18
48
  /**
19
- * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
49
+ * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3').
20
50
  */
21
51
  readonly apps: pulumi.Output<string[] | undefined>;
22
52
  /**
23
- * List of group IDs
53
+ * List of group IDs. Conflicts with `apps`.
24
54
  */
25
55
  readonly groups: pulumi.Output<string[] | undefined>;
26
56
  /**
27
- * ID of a role
57
+ * Role ID.
28
58
  */
29
59
  readonly roleId: pulumi.Output<string>;
30
60
  /**
31
- * Type of the role that is assigned to the user and supports optional targets
61
+ * Name of the role associated with the user. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
32
62
  */
33
63
  readonly roleType: pulumi.Output<string>;
34
64
  /**
35
- * User associated with the role
65
+ * ID of the user.
36
66
  */
37
67
  readonly userId: pulumi.Output<string>;
38
68
  /**
@@ -49,23 +79,23 @@ export declare class AdminRoleTargets extends pulumi.CustomResource {
49
79
  */
50
80
  export interface AdminRoleTargetsState {
51
81
  /**
52
- * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
82
+ * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3').
53
83
  */
54
84
  apps?: pulumi.Input<pulumi.Input<string>[]>;
55
85
  /**
56
- * List of group IDs
86
+ * List of group IDs. Conflicts with `apps`.
57
87
  */
58
88
  groups?: pulumi.Input<pulumi.Input<string>[]>;
59
89
  /**
60
- * ID of a role
90
+ * Role ID.
61
91
  */
62
92
  roleId?: pulumi.Input<string>;
63
93
  /**
64
- * Type of the role that is assigned to the user and supports optional targets
94
+ * Name of the role associated with the user. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
65
95
  */
66
96
  roleType?: pulumi.Input<string>;
67
97
  /**
68
- * User associated with the role
98
+ * ID of the user.
69
99
  */
70
100
  userId?: pulumi.Input<string>;
71
101
  }
@@ -74,19 +104,19 @@ export interface AdminRoleTargetsState {
74
104
  */
75
105
  export interface AdminRoleTargetsArgs {
76
106
  /**
77
- * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
107
+ * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3').
78
108
  */
79
109
  apps?: pulumi.Input<pulumi.Input<string>[]>;
80
110
  /**
81
- * List of group IDs
111
+ * List of group IDs. Conflicts with `apps`.
82
112
  */
83
113
  groups?: pulumi.Input<pulumi.Input<string>[]>;
84
114
  /**
85
- * Type of the role that is assigned to the user and supports optional targets
115
+ * Name of the role associated with the user. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
86
116
  */
87
117
  roleType: pulumi.Input<string>;
88
118
  /**
89
- * User associated with the role
119
+ * ID of the user.
90
120
  */
91
121
  userId: pulumi.Input<string>;
92
122
  }
@@ -5,6 +5,36 @@ Object.defineProperty(exports, "__esModule", { value: true });
5
5
  exports.AdminRoleTargets = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
+ /**
9
+ * Manages targets for administrator roles.
10
+ *
11
+ * This resource allows you to define permissions for admin roles into a smaller subset of Groups or Apps within your org.
12
+ * You can define admin roles to target Groups, Applications, and Application Instances.
13
+ *
14
+ * ## Example Usage
15
+ *
16
+ * ```typescript
17
+ * import * as pulumi from "@pulumi/pulumi";
18
+ * import * as okta from "@pulumi/okta";
19
+ *
20
+ * const example = new okta.AdminRoleTargets("example", {
21
+ * apps: [
22
+ * "oidc_client.<app_id>",
23
+ * "facebook",
24
+ * ],
25
+ * roleType: "APP_ADMIN",
26
+ * userId: "<user_id>",
27
+ * });
28
+ * ```
29
+ *
30
+ * ## Import
31
+ *
32
+ * Okta Admin Role Targets can be imported via the Okta ID.
33
+ *
34
+ * ```sh
35
+ * $ pulumi import okta:index/adminRoleTargets:AdminRoleTargets example &#60;user id&#62;/&#60;role type&#62;
36
+ * ```
37
+ */
8
38
  class AdminRoleTargets extends pulumi.CustomResource {
9
39
  /**
10
40
  * Get an existing AdminRoleTargets resource's state with the given name, ID, and optional extra
@@ -1 +1 @@
1
- {"version":3,"file":"adminRoleTargets.js","sourceRoot":"","sources":["../adminRoleTargets.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IA+BD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAnFL,4CAoFC;AAtEG,gBAAgB;AACO,6BAAY,GAAG,8CAA8C,CAAC"}
1
+ {"version":3,"file":"adminRoleTargets.js","sourceRoot":"","sources":["../adminRoleTargets.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IA+BD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAnFL,4CAoFC;AAtEG,gBAAgB;AACO,6BAAY,GAAG,8CAA8C,CAAC"}
@@ -1,6 +1,25 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
- * Manages assignment of Access Policy to an Application
3
+ * Assigns an access policy (colloquially known as a sign-on policy and/or an
4
+ * authentication policy) to an application. This resource does not perform true
5
+ * delete as it will not delete an application and the app's access policy can't be
6
+ * removed; it can only be changed to a different access policy. This resource is
7
+ * only logical within the context of an application therefore `appId` is
8
+ * immutable once set. Use this resource to manage assigning an access policy to an
9
+ * application. It will assign the given `policyId` to the application at creation
10
+ * and during update.
11
+ *
12
+ * > Inside the product a sign-on policy is referenced as an _authentication
13
+ * policy_, in the public API the policy is of type
14
+ * [`ACCESS_POLICY`](https://developer.okta.com/docs/reference/api/policy/#policy-object).
15
+ *
16
+ * ## Import
17
+ *
18
+ * An Okta App's Access Policy Assignment can be imported via its associated Application ID.
19
+ *
20
+ * ```sh
21
+ * $ pulumi import okta:app/accessPolicyAssignment:AccessPolicyAssignment example &#60;app id&#62;
22
+ * ```
4
23
  */
5
24
  export declare class AccessPolicyAssignment extends pulumi.CustomResource {
6
25
  /**
@@ -6,7 +6,26 @@ exports.AccessPolicyAssignment = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
9
- * Manages assignment of Access Policy to an Application
9
+ * Assigns an access policy (colloquially known as a sign-on policy and/or an
10
+ * authentication policy) to an application. This resource does not perform true
11
+ * delete as it will not delete an application and the app's access policy can't be
12
+ * removed; it can only be changed to a different access policy. This resource is
13
+ * only logical within the context of an application therefore `appId` is
14
+ * immutable once set. Use this resource to manage assigning an access policy to an
15
+ * application. It will assign the given `policyId` to the application at creation
16
+ * and during update.
17
+ *
18
+ * > Inside the product a sign-on policy is referenced as an _authentication
19
+ * policy_, in the public API the policy is of type
20
+ * [`ACCESS_POLICY`](https://developer.okta.com/docs/reference/api/policy/#policy-object).
21
+ *
22
+ * ## Import
23
+ *
24
+ * An Okta App's Access Policy Assignment can be imported via its associated Application ID.
25
+ *
26
+ * ```sh
27
+ * $ pulumi import okta:app/accessPolicyAssignment:AccessPolicyAssignment example &#60;app id&#62;
28
+ * ```
10
29
  */
11
30
  class AccessPolicyAssignment extends pulumi.CustomResource {
12
31
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"accessPolicyAssignment.js","sourceRoot":"","sources":["../../app/accessPolicyAssignment.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;GAEG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAjEL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,wDAAwD,CAAC"}
1
+ {"version":3,"file":"accessPolicyAssignment.js","sourceRoot":"","sources":["../../app/accessPolicyAssignment.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAjEL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,wDAAwD,CAAC"}