@pulumi/okta 4.6.2 → 4.6.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +129 -10
- package/adminRoleCustom.js +24 -1
- package/adminRoleCustom.js.map +1 -1
- package/adminRoleCustomAssignments.d.ts +25 -10
- package/adminRoleCustomAssignments.js +13 -1
- package/adminRoleCustomAssignments.js.map +1 -1
- package/adminRoleTargets.d.ts +44 -14
- package/adminRoleTargets.js +30 -0
- package/adminRoleTargets.js.map +1 -1
- package/app/accessPolicyAssignment.d.ts +20 -1
- package/app/accessPolicyAssignment.js +20 -1
- package/app/accessPolicyAssignment.js.map +1 -1
- package/app/autoLogin.d.ts +119 -72
- package/app/autoLogin.js +47 -0
- package/app/autoLogin.js.map +1 -1
- package/app/basicAuth.d.ts +66 -38
- package/app/basicAuth.js +28 -0
- package/app/basicAuth.js.map +1 -1
- package/app/bookmark.d.ts +71 -35
- package/app/bookmark.js +27 -0
- package/app/bookmark.js.map +1 -1
- package/app/getApp.d.ts +25 -58
- package/app/getApp.js +2 -2
- package/app/getApp.js.map +1 -1
- package/app/getMetadataSaml.d.ts +5 -11
- package/app/getMetadataSaml.js +2 -2
- package/app/getMetadataSaml.js.map +1 -1
- package/app/getOauth.d.ts +34 -62
- package/app/getOauth.js +2 -2
- package/app/getOauth.js.map +1 -1
- package/app/getSaml.d.ts +55 -75
- package/app/getSaml.js +2 -2
- package/app/getSaml.js.map +1 -1
- package/app/groupAssignment.d.ts +15 -6
- package/app/groupAssignment.js +9 -0
- package/app/groupAssignment.js.map +1 -1
- package/app/oauth.d.ts +301 -123
- package/app/oauth.js +82 -0
- package/app/oauth.js.map +1 -1
- package/app/oauthPostLogoutRedirectUri.d.ts +38 -3
- package/app/oauthPostLogoutRedirectUri.js +35 -0
- package/app/oauthPostLogoutRedirectUri.js.map +1 -1
- package/app/oauthRedirectUri.d.ts +37 -3
- package/app/oauthRedirectUri.js +34 -0
- package/app/oauthRedirectUri.js.map +1 -1
- package/app/saml.d.ts +303 -133
- package/app/saml.js +161 -0
- package/app/saml.js.map +1 -1
- package/app/securePasswordStore.d.ts +109 -79
- package/app/securePasswordStore.js +30 -0
- package/app/securePasswordStore.js.map +1 -1
- package/app/swa.d.ts +102 -72
- package/app/swa.js +30 -0
- package/app/swa.js.map +1 -1
- package/app/threeField.d.ts +87 -72
- package/app/threeField.js +15 -0
- package/app/threeField.js.map +1 -1
- package/app/user.d.ts +37 -12
- package/app/user.js +22 -0
- package/app/user.js.map +1 -1
- package/appGroupAssignments.d.ts +40 -3
- package/appGroupAssignments.js +37 -0
- package/appGroupAssignments.js.map +1 -1
- package/appOauthApiScope.d.ts +36 -3
- package/appOauthApiScope.js +33 -0
- package/appOauthApiScope.js.map +1 -1
- package/appSamlAppSettings.d.ts +44 -6
- package/appSamlAppSettings.js +38 -0
- package/appSamlAppSettings.js.map +1 -1
- package/appSharedCredentials.d.ts +115 -72
- package/appSharedCredentials.js +43 -0
- package/appSharedCredentials.js.map +1 -1
- package/appSignonPolicy.d.ts +44 -6
- package/appSignonPolicy.js +38 -0
- package/appSignonPolicy.js.map +1 -1
- package/appSignonPolicyRule.d.ts +327 -68
- package/appSignonPolicyRule.js +244 -0
- package/appSignonPolicyRule.js.map +1 -1
- package/appUserBaseSchemaProperty.d.ts +52 -24
- package/appUserBaseSchemaProperty.js +28 -0
- package/appUserBaseSchemaProperty.js.map +1 -1
- package/appUserSchemaProperty.d.ts +80 -54
- package/appUserSchemaProperty.js +26 -0
- package/appUserSchemaProperty.js.map +1 -1
- package/auth/getServer.d.ts +11 -11
- package/auth/getServer.js +2 -2
- package/auth/getServerPolicy.d.ts +9 -15
- package/auth/getServerPolicy.js +2 -2
- package/auth/getServerPolicy.js.map +1 -1
- package/auth/getServerScopes.d.ts +5 -8
- package/auth/getServerScopes.js +2 -2
- package/auth/getServerScopes.js.map +1 -1
- package/auth/server.d.ts +49 -13
- package/auth/server.js +27 -0
- package/auth/server.js.map +1 -1
- package/auth/serverClaim.d.ts +54 -18
- package/auth/serverClaim.js +27 -0
- package/auth/serverClaim.js.map +1 -1
- package/auth/serverPolicy.d.ts +43 -6
- package/auth/serverPolicy.js +28 -0
- package/auth/serverPolicy.js.map +1 -1
- package/auth/serverPolicyRule.d.ts +72 -29
- package/auth/serverPolicyRule.js +25 -0
- package/auth/serverPolicyRule.js.map +1 -1
- package/auth/serverScope.d.ts +41 -15
- package/auth/serverScope.js +26 -0
- package/auth/serverScope.js.map +1 -1
- package/authServerClaimDefault.d.ts +50 -13
- package/authServerClaimDefault.js +31 -0
- package/authServerClaimDefault.js.map +1 -1
- package/authServerDefault.d.ts +47 -13
- package/authServerDefault.js +25 -0
- package/authServerDefault.js.map +1 -1
- package/authenticator.d.ts +94 -38
- package/authenticator.js +38 -0
- package/authenticator.js.map +1 -1
- package/behaviour.d.ts +78 -18
- package/behaviour.js +42 -0
- package/behaviour.js.map +1 -1
- package/brand.d.ts +28 -19
- package/brand.js +10 -1
- package/brand.js.map +1 -1
- package/captcha.d.ts +38 -12
- package/captcha.js +26 -0
- package/captcha.js.map +1 -1
- package/captchaOrgWideSettings.d.ts +51 -6
- package/captchaOrgWideSettings.js +45 -0
- package/captchaOrgWideSettings.js.map +1 -1
- package/domain.d.ts +39 -13
- package/domain.js +20 -0
- package/domain.js.map +1 -1
- package/domainCertificate.d.ts +63 -15
- package/domainCertificate.js +48 -0
- package/domainCertificate.js.map +1 -1
- package/domainVerification.d.ts +22 -3
- package/domainVerification.js +19 -0
- package/domainVerification.js.map +1 -1
- package/emailCustomization.d.ts +224 -3
- package/emailCustomization.js +41 -0
- package/emailCustomization.js.map +1 -1
- package/emailSender.d.ts +39 -13
- package/emailSender.js +26 -0
- package/emailSender.js.map +1 -1
- package/emailSenderVerification.d.ts +26 -3
- package/emailSenderVerification.js +23 -0
- package/emailSenderVerification.js.map +1 -1
- package/eventHook.d.ts +37 -0
- package/eventHook.js +37 -0
- package/eventHook.js.map +1 -1
- package/eventHookVerification.d.ts +37 -3
- package/eventHookVerification.js +34 -0
- package/eventHookVerification.js.map +1 -1
- package/factor/factor.d.ts +23 -6
- package/factor/factor.js +14 -0
- package/factor/factor.js.map +1 -1
- package/factorTotp.d.ts +44 -12
- package/factorTotp.js +23 -0
- package/factorTotp.js.map +1 -1
- package/getAppGroupAssignments.d.ts +6 -6
- package/getAppGroupAssignments.js +2 -2
- package/getAppSignonPolicy.d.ts +6 -16
- package/getAppSignonPolicy.js +4 -8
- package/getAppSignonPolicy.js.map +1 -1
- package/getAppUserAssignments.d.ts +6 -6
- package/getAppUserAssignments.js +2 -2
- package/getAuthServerClaim.d.ts +12 -15
- package/getAuthServerClaim.js +2 -2
- package/getAuthServerClaim.js.map +1 -1
- package/getAuthServerClaims.d.ts +5 -8
- package/getAuthServerClaims.js +2 -2
- package/getAuthServerClaims.js.map +1 -1
- package/getAuthenticator.d.ts +26 -24
- package/getAuthenticator.js +22 -14
- package/getAuthenticator.js.map +1 -1
- package/getBehaviour.d.ts +8 -6
- package/getBehaviour.js +2 -2
- package/getBehaviour.js.map +1 -1
- package/getBehaviours.d.ts +7 -7
- package/getBehaviours.js +2 -2
- package/getBrand.d.ts +6 -9
- package/getBrand.js +2 -2
- package/getBrand.js.map +1 -1
- package/getBrands.d.ts +2 -2
- package/getBrands.js +2 -2
- package/getEmailCustomization.d.ts +9 -14
- package/getEmailCustomization.js +6 -2
- package/getEmailCustomization.js.map +1 -1
- package/getEmailCustomizations.d.ts +9 -11
- package/getEmailCustomizations.js +6 -2
- package/getEmailCustomizations.js.map +1 -1
- package/getGroups.d.ts +25 -11
- package/getGroups.js +2 -2
- package/getGroups.js.map +1 -1
- package/getNetworkZone.d.ts +12 -12
- package/getNetworkZone.js +2 -2
- package/getRoleSubscription.d.ts +35 -13
- package/getRoleSubscription.js +2 -2
- package/getRoleSubscription.js.map +1 -1
- package/getTemplate.d.ts +8 -10
- package/getTemplate.js +6 -2
- package/getTemplate.js.map +1 -1
- package/getTemplates.d.ts +7 -6
- package/getTemplates.js +6 -2
- package/getTemplates.js.map +1 -1
- package/getTheme.d.ts +12 -14
- package/getTheme.js +6 -2
- package/getTheme.js.map +1 -1
- package/getThemes.d.ts +7 -6
- package/getThemes.js +6 -2
- package/getThemes.js.map +1 -1
- package/getTrustedOrigins.d.ts +4 -7
- package/getTrustedOrigins.js +2 -2
- package/getTrustedOrigins.js.map +1 -1
- package/getUserSecurityQuestions.d.ts +8 -4
- package/getUserSecurityQuestions.js +4 -0
- package/getUserSecurityQuestions.js.map +1 -1
- package/group/getEveryoneGroup.d.ts +5 -10
- package/group/getEveryoneGroup.js +2 -4
- package/group/getEveryoneGroup.js.map +1 -1
- package/group/getGroup.d.ts +26 -17
- package/group/getGroup.js +2 -2
- package/group/getGroup.js.map +1 -1
- package/group/getRule.d.ts +15 -6
- package/group/getRule.js +2 -2
- package/group/getRule.js.map +1 -1
- package/group/group.d.ts +46 -9
- package/group/group.js +37 -0
- package/group/group.js.map +1 -1
- package/group/role.d.ts +101 -15
- package/group/role.js +26 -0
- package/group/role.js.map +1 -1
- package/group/rule.d.ts +80 -6
- package/group/rule.js +23 -0
- package/group/rule.js.map +1 -1
- package/groupMemberships.d.ts +48 -7
- package/groupMemberships.js +42 -1
- package/groupMemberships.js.map +1 -1
- package/groupSchemaProperty.d.ts +94 -51
- package/groupSchemaProperty.js +25 -0
- package/groupSchemaProperty.js.map +1 -1
- package/idp/getMetadataSaml.d.ts +6 -9
- package/idp/getMetadataSaml.js +2 -2
- package/idp/getMetadataSaml.js.map +1 -1
- package/idp/getOidc.d.ts +9 -9
- package/idp/getOidc.js +2 -2
- package/idp/getSaml.d.ts +13 -16
- package/idp/getSaml.js +2 -2
- package/idp/getSaml.js.map +1 -1
- package/idp/getSocial.d.ts +2 -8
- package/idp/getSocial.js +2 -2
- package/idp/getSocial.js.map +1 -1
- package/idp/oidc.d.ts +297 -12
- package/idp/oidc.js +36 -0
- package/idp/oidc.js.map +1 -1
- package/idp/saml.d.ts +284 -18
- package/idp/saml.js +32 -0
- package/idp/saml.js.map +1 -1
- package/idp/samlKey.d.ts +48 -3
- package/idp/samlKey.js +9 -0
- package/idp/samlKey.js.map +1 -1
- package/idp/social.d.ts +251 -18
- package/idp/social.js +32 -0
- package/idp/social.js.map +1 -1
- package/index/emailDomain.d.ts +41 -16
- package/index/emailDomain.js +25 -0
- package/index/emailDomain.js.map +1 -1
- package/index/emailDomainVerification.d.ts +25 -3
- package/index/emailDomainVerification.js +22 -0
- package/index/emailDomainVerification.js.map +1 -1
- package/index/getDomain.d.ts +14 -11
- package/index/getDomain.js +8 -2
- package/index/getDomain.js.map +1 -1
- package/inline/hook.d.ts +89 -0
- package/inline/hook.js +35 -0
- package/inline/hook.js.map +1 -1
- package/linkDefinition.d.ts +30 -0
- package/linkDefinition.js +30 -0
- package/linkDefinition.js.map +1 -1
- package/linkValue.d.ts +59 -6
- package/linkValue.js +53 -0
- package/linkValue.js.map +1 -1
- package/network/zone.d.ts +74 -27
- package/network/zone.js +44 -0
- package/network/zone.js.map +1 -1
- package/orgConfiguration.d.ts +25 -0
- package/orgConfiguration.js +25 -0
- package/orgConfiguration.js.map +1 -1
- package/orgSupport.d.ts +20 -3
- package/orgSupport.js +17 -0
- package/orgSupport.js.map +1 -1
- package/package.json +1 -1
- package/policy/getDefaultPolicy.d.ts +7 -9
- package/policy/getDefaultPolicy.js +2 -6
- package/policy/getDefaultPolicy.js.map +1 -1
- package/policy/getPolicy.d.ts +10 -11
- package/policy/getPolicy.js +2 -2
- package/policy/getPolicy.js.map +1 -1
- package/policy/mfa.d.ts +259 -18
- package/policy/mfa.js +49 -0
- package/policy/mfa.js.map +1 -1
- package/policy/password.d.ts +117 -90
- package/policy/password.js +27 -0
- package/policy/password.js.map +1 -1
- package/policy/ruleIdpDiscovery.d.ts +149 -27
- package/policy/ruleIdpDiscovery.js +65 -0
- package/policy/ruleIdpDiscovery.js.map +1 -1
- package/policy/ruleMfa.d.ts +35 -24
- package/policy/ruleMfa.js +11 -0
- package/policy/ruleMfa.js.map +1 -1
- package/policy/rulePassword.d.ts +46 -33
- package/policy/rulePassword.js +13 -0
- package/policy/rulePassword.js.map +1 -1
- package/policy/ruleSignon.d.ts +170 -57
- package/policy/ruleSignon.js +92 -0
- package/policy/ruleSignon.js.map +1 -1
- package/policy/signon.d.ts +41 -15
- package/policy/signon.js +26 -0
- package/policy/signon.js.map +1 -1
- package/policyMfaDefault.d.ts +250 -13
- package/policyMfaDefault.js +45 -0
- package/policyMfaDefault.js.map +1 -1
- package/policyPasswordDefault.d.ts +88 -54
- package/policyPasswordDefault.js +22 -0
- package/policyPasswordDefault.js.map +1 -1
- package/policyProfileEnrollment.d.ts +28 -6
- package/policyProfileEnrollment.js +22 -0
- package/policyProfileEnrollment.js.map +1 -1
- package/policyProfileEnrollmentApps.d.ts +42 -5
- package/policyProfileEnrollmentApps.js +37 -0
- package/policyProfileEnrollmentApps.js.map +1 -1
- package/policyRuleProfileEnrollment.d.ts +88 -26
- package/policyRuleProfileEnrollment.js +62 -0
- package/policyRuleProfileEnrollment.js.map +1 -1
- package/profile/mapping.d.ts +95 -9
- package/profile/mapping.js +41 -0
- package/profile/mapping.js.map +1 -1
- package/rateLimiting.d.ts +43 -9
- package/rateLimiting.js +28 -0
- package/rateLimiting.js.map +1 -1
- package/resourceSet.d.ts +32 -10
- package/resourceSet.js +20 -1
- package/resourceSet.js.map +1 -1
- package/roleSubscription.d.ts +110 -9
- package/roleSubscription.js +26 -0
- package/roleSubscription.js.map +1 -1
- package/securityNotificationEmails.d.ts +45 -15
- package/securityNotificationEmails.js +30 -0
- package/securityNotificationEmails.js.map +1 -1
- package/templateSms.d.ts +47 -3
- package/templateSms.js +35 -0
- package/templateSms.js.map +1 -1
- package/theme.d.ts +59 -44
- package/theme.js +15 -0
- package/theme.js.map +1 -1
- package/threatInsightSettings.d.ts +58 -6
- package/threatInsightSettings.js +34 -0
- package/threatInsightSettings.js.map +1 -1
- package/trustedorigin/origin.d.ts +37 -12
- package/trustedorigin/origin.js +25 -0
- package/trustedorigin/origin.js.map +1 -1
- package/types/input.d.ts +227 -60
- package/types/output.d.ts +446 -56
- package/user/getUser.d.ts +104 -32
- package/user/getUser.js +2 -2
- package/user/getUser.js.map +1 -1
- package/user/getUserProfileMappingSource.d.ts +7 -9
- package/user/getUserProfileMappingSource.js +4 -6
- package/user/getUserProfileMappingSource.js.map +1 -1
- package/user/getUserType.d.ts +7 -7
- package/user/getUserType.js +2 -2
- package/user/getUsers.d.ts +57 -61
- package/user/getUsers.js +44 -30
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +215 -117
- package/user/user.js +71 -0
- package/user/user.js.map +1 -1
- package/user/userType.d.ts +34 -9
- package/user/userType.js +25 -0
- package/user/userType.js.map +1 -1
- package/userAdminRoles.d.ts +41 -10
- package/userAdminRoles.js +29 -1
- package/userAdminRoles.js.map +1 -1
- package/userBaseSchemaProperty.d.ts +67 -24
- package/userBaseSchemaProperty.js +43 -0
- package/userBaseSchemaProperty.js.map +1 -1
- package/userFactorQuestion.d.ts +52 -14
- package/userFactorQuestion.js +39 -1
- package/userFactorQuestion.js.map +1 -1
- package/userGroupMemberships.d.ts +23 -4
- package/userGroupMemberships.js +20 -1
- package/userGroupMemberships.js.map +1 -1
- package/userSchemaProperty.d.ts +107 -57
- package/userSchemaProperty.js +32 -0
- package/userSchemaProperty.js.map +1 -1
- package/utilities.d.ts +4 -0
- package/utilities.js +33 -1
- package/utilities.js.map +1 -1
package/group/group.d.ts
CHANGED
|
@@ -1,4 +1,41 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* Creates an Okta Group.
|
|
4
|
+
*
|
|
5
|
+
* This resource allows you to create and configure an Okta Group.
|
|
6
|
+
*
|
|
7
|
+
* ## Example Usage
|
|
8
|
+
*
|
|
9
|
+
* ```typescript
|
|
10
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
+
* import * as okta from "@pulumi/okta";
|
|
12
|
+
*
|
|
13
|
+
* const example = new okta.group.Group("example", {description: "My Example Group"});
|
|
14
|
+
* ```
|
|
15
|
+
*
|
|
16
|
+
* Custom profile attributes
|
|
17
|
+
* ```typescript
|
|
18
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
+
* import * as okta from "@pulumi/okta";
|
|
20
|
+
*
|
|
21
|
+
* const example = new okta.group.Group("example", {
|
|
22
|
+
* description: "My Example Group",
|
|
23
|
+
* customProfileAttributes: JSON.stringify({
|
|
24
|
+
* example1: "testing1234",
|
|
25
|
+
* example2: true,
|
|
26
|
+
* example3: 54321,
|
|
27
|
+
* }),
|
|
28
|
+
* });
|
|
29
|
+
* ```
|
|
30
|
+
*
|
|
31
|
+
* ## Import
|
|
32
|
+
*
|
|
33
|
+
* An Okta Group can be imported via the Okta ID.
|
|
34
|
+
*
|
|
35
|
+
* ```sh
|
|
36
|
+
* $ pulumi import okta:group/group:Group example <group id>
|
|
37
|
+
* ```
|
|
38
|
+
*/
|
|
2
39
|
export declare class Group extends pulumi.CustomResource {
|
|
3
40
|
/**
|
|
4
41
|
* Get an existing Group resource's state with the given name, ID, and optional extra
|
|
@@ -16,15 +53,15 @@ export declare class Group extends pulumi.CustomResource {
|
|
|
16
53
|
*/
|
|
17
54
|
static isInstance(obj: any): obj is Group;
|
|
18
55
|
/**
|
|
19
|
-
*
|
|
56
|
+
* raw JSON containing all custom profile attributes.
|
|
20
57
|
*/
|
|
21
58
|
readonly customProfileAttributes: pulumi.Output<string | undefined>;
|
|
22
59
|
/**
|
|
23
|
-
*
|
|
60
|
+
* The description of the Okta Group.
|
|
24
61
|
*/
|
|
25
62
|
readonly description: pulumi.Output<string | undefined>;
|
|
26
63
|
/**
|
|
27
|
-
*
|
|
64
|
+
* The name of the Okta Group.
|
|
28
65
|
*/
|
|
29
66
|
readonly name: pulumi.Output<string>;
|
|
30
67
|
/**
|
|
@@ -47,15 +84,15 @@ export declare class Group extends pulumi.CustomResource {
|
|
|
47
84
|
*/
|
|
48
85
|
export interface GroupState {
|
|
49
86
|
/**
|
|
50
|
-
*
|
|
87
|
+
* raw JSON containing all custom profile attributes.
|
|
51
88
|
*/
|
|
52
89
|
customProfileAttributes?: pulumi.Input<string>;
|
|
53
90
|
/**
|
|
54
|
-
*
|
|
91
|
+
* The description of the Okta Group.
|
|
55
92
|
*/
|
|
56
93
|
description?: pulumi.Input<string>;
|
|
57
94
|
/**
|
|
58
|
-
*
|
|
95
|
+
* The name of the Okta Group.
|
|
59
96
|
*/
|
|
60
97
|
name?: pulumi.Input<string>;
|
|
61
98
|
/**
|
|
@@ -70,15 +107,15 @@ export interface GroupState {
|
|
|
70
107
|
*/
|
|
71
108
|
export interface GroupArgs {
|
|
72
109
|
/**
|
|
73
|
-
*
|
|
110
|
+
* raw JSON containing all custom profile attributes.
|
|
74
111
|
*/
|
|
75
112
|
customProfileAttributes?: pulumi.Input<string>;
|
|
76
113
|
/**
|
|
77
|
-
*
|
|
114
|
+
* The description of the Okta Group.
|
|
78
115
|
*/
|
|
79
116
|
description?: pulumi.Input<string>;
|
|
80
117
|
/**
|
|
81
|
-
*
|
|
118
|
+
* The name of the Okta Group.
|
|
82
119
|
*/
|
|
83
120
|
name?: pulumi.Input<string>;
|
|
84
121
|
/**
|
package/group/group.js
CHANGED
|
@@ -5,6 +5,43 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.Group = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Creates an Okta Group.
|
|
10
|
+
*
|
|
11
|
+
* This resource allows you to create and configure an Okta Group.
|
|
12
|
+
*
|
|
13
|
+
* ## Example Usage
|
|
14
|
+
*
|
|
15
|
+
* ```typescript
|
|
16
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
17
|
+
* import * as okta from "@pulumi/okta";
|
|
18
|
+
*
|
|
19
|
+
* const example = new okta.group.Group("example", {description: "My Example Group"});
|
|
20
|
+
* ```
|
|
21
|
+
*
|
|
22
|
+
* Custom profile attributes
|
|
23
|
+
* ```typescript
|
|
24
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
25
|
+
* import * as okta from "@pulumi/okta";
|
|
26
|
+
*
|
|
27
|
+
* const example = new okta.group.Group("example", {
|
|
28
|
+
* description: "My Example Group",
|
|
29
|
+
* customProfileAttributes: JSON.stringify({
|
|
30
|
+
* example1: "testing1234",
|
|
31
|
+
* example2: true,
|
|
32
|
+
* example3: 54321,
|
|
33
|
+
* }),
|
|
34
|
+
* });
|
|
35
|
+
* ```
|
|
36
|
+
*
|
|
37
|
+
* ## Import
|
|
38
|
+
*
|
|
39
|
+
* An Okta Group can be imported via the Okta ID.
|
|
40
|
+
*
|
|
41
|
+
* ```sh
|
|
42
|
+
* $ pulumi import okta:group/group:Group example <group id>
|
|
43
|
+
* ```
|
|
44
|
+
*/
|
|
8
45
|
class Group extends pulumi.CustomResource {
|
|
9
46
|
/**
|
|
10
47
|
* Get an existing Group resource's state with the given name, ID, and optional extra
|
package/group/group.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"group.js","sourceRoot":"","sources":["../../group/group.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,MAAa,KAAM,SAAQ,MAAM,CAAC,cAAc;IAC5C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkB,EAAE,IAAmC;QAChH,OAAO,IAAI,KAAK,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC5D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,KAAK,CAAC,YAAY,CAAC;IACtD,CAAC;IA6BD,YAAY,IAAY,EAAE,WAAoC,EAAE,IAAmC;QAC/F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqC,CAAC;YACpD,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAAoC,CAAC;YAClD,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,KAAK,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;;AAzEL,sBA0EC;AA5DG,gBAAgB;AACO,kBAAY,GAAG,wBAAwB,CAAC"}
|
|
1
|
+
{"version":3,"file":"group.js","sourceRoot":"","sources":["../../group/group.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAoCG;AACH,MAAa,KAAM,SAAQ,MAAM,CAAC,cAAc;IAC5C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAkB,EAAE,IAAmC;QAChH,OAAO,IAAI,KAAK,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC5D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,KAAK,CAAC,YAAY,CAAC;IACtD,CAAC;IA6BD,YAAY,IAAY,EAAE,WAAoC,EAAE,IAAmC;QAC/F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAqC,CAAC;YACpD,cAAc,CAAC,yBAAyB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9F,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACrE;aAAM;YACH,MAAM,IAAI,GAAG,WAAoC,CAAC;YAClD,cAAc,CAAC,yBAAyB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,uBAAuB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5F,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,KAAK,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC1D,CAAC;;AAzEL,sBA0EC;AA5DG,gBAAgB;AACO,kBAAY,GAAG,wBAAwB,CAAC"}
|
package/group/role.d.ts
CHANGED
|
@@ -1,4 +1,30 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* Assigns Admin roles to Okta Groups.
|
|
4
|
+
*
|
|
5
|
+
* This resource allows you to assign Okta administrator roles to Okta Groups. This resource provides a one-to-one
|
|
6
|
+
* interface between the Okta group and the admin role.
|
|
7
|
+
*
|
|
8
|
+
* ## Example Usage
|
|
9
|
+
*
|
|
10
|
+
* ```typescript
|
|
11
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
12
|
+
* import * as okta from "@pulumi/okta";
|
|
13
|
+
*
|
|
14
|
+
* const example = new okta.group.Role("example", {
|
|
15
|
+
* groupId: "<group id>",
|
|
16
|
+
* roleType: "READ_ONLY_ADMIN",
|
|
17
|
+
* });
|
|
18
|
+
* ```
|
|
19
|
+
*
|
|
20
|
+
* ## Import
|
|
21
|
+
*
|
|
22
|
+
* Individual admin role assignment can be imported by passing the group and role assignment IDs as follows
|
|
23
|
+
*
|
|
24
|
+
* ```sh
|
|
25
|
+
* $ pulumi import okta:group/role:Role example <group id>/<role id>
|
|
26
|
+
* ```
|
|
27
|
+
*/
|
|
2
28
|
export declare class Role extends pulumi.CustomResource {
|
|
3
29
|
/**
|
|
4
30
|
* Get an existing Role resource's state with the given name, ID, and optional extra
|
|
@@ -16,23 +42,43 @@ export declare class Role extends pulumi.CustomResource {
|
|
|
16
42
|
*/
|
|
17
43
|
static isInstance(obj: any): obj is Role;
|
|
18
44
|
/**
|
|
19
|
-
* When this setting is enabled, the admins won't receive any of the default Okta
|
|
45
|
+
* When this setting is enabled, the admins won't receive any of the default Okta
|
|
46
|
+
* administrator emails. These admins also won't have access to contact Okta Support and open support cases on behalf of your org.
|
|
20
47
|
*/
|
|
21
48
|
readonly disableNotifications: pulumi.Output<boolean | undefined>;
|
|
22
49
|
/**
|
|
23
|
-
* ID of group to attach admin roles to
|
|
50
|
+
* The ID of group to attach admin roles to.
|
|
24
51
|
*/
|
|
25
52
|
readonly groupId: pulumi.Output<string>;
|
|
26
53
|
/**
|
|
27
|
-
*
|
|
54
|
+
* Admin role assigned to the group. It can be any one of the following values:
|
|
55
|
+
* `"API_ADMIN"`,
|
|
56
|
+
* `"APP_ADMIN"`,
|
|
57
|
+
* `"CUSTOM"`,
|
|
58
|
+
* `"GROUP_MEMBERSHIP_ADMIN"`,
|
|
59
|
+
* `"HELP_DESK_ADMIN"`,
|
|
60
|
+
* `"MOBILE_ADMIN"`,
|
|
61
|
+
* `"ORG_ADMIN"`,
|
|
62
|
+
* `"READ_ONLY_ADMIN"`,
|
|
63
|
+
* `"REPORT_ADMIN"`,
|
|
64
|
+
* `"SUPER_ADMIN"`,
|
|
65
|
+
* `"USER_ADMIN"`
|
|
66
|
+
* . See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
|
|
67
|
+
*
|
|
68
|
+
*
|
|
69
|
+
* - `"USER_ADMIN"` is the Group Administrator.
|
|
28
70
|
*/
|
|
29
71
|
readonly roleType: pulumi.Output<string>;
|
|
30
72
|
/**
|
|
31
|
-
*
|
|
73
|
+
* A list of app names (name represents set of app instances, like 'salesforce' or '
|
|
74
|
+
* facebook'), or a combination of app name and app instance ID (like 'facebook.0oapsqQ6dv19pqyEo0g3') you would like as
|
|
75
|
+
* the targets of the admin role.
|
|
76
|
+
* - Only supported when used with the role type `"APP_ADMIN"`.
|
|
32
77
|
*/
|
|
33
78
|
readonly targetAppLists: pulumi.Output<string[] | undefined>;
|
|
34
79
|
/**
|
|
35
|
-
*
|
|
80
|
+
* A list of group IDs you would like as the targets of the admin role.
|
|
81
|
+
* - Only supported when used with the role types: `GROUP_MEMBERSHIP_ADMIN`, `HELP_DESK_ADMIN`, or `USER_ADMIN`.
|
|
36
82
|
*/
|
|
37
83
|
readonly targetGroupLists: pulumi.Output<string[] | undefined>;
|
|
38
84
|
/**
|
|
@@ -49,23 +95,43 @@ export declare class Role extends pulumi.CustomResource {
|
|
|
49
95
|
*/
|
|
50
96
|
export interface RoleState {
|
|
51
97
|
/**
|
|
52
|
-
* When this setting is enabled, the admins won't receive any of the default Okta
|
|
98
|
+
* When this setting is enabled, the admins won't receive any of the default Okta
|
|
99
|
+
* administrator emails. These admins also won't have access to contact Okta Support and open support cases on behalf of your org.
|
|
53
100
|
*/
|
|
54
101
|
disableNotifications?: pulumi.Input<boolean>;
|
|
55
102
|
/**
|
|
56
|
-
* ID of group to attach admin roles to
|
|
103
|
+
* The ID of group to attach admin roles to.
|
|
57
104
|
*/
|
|
58
105
|
groupId?: pulumi.Input<string>;
|
|
59
106
|
/**
|
|
60
|
-
*
|
|
107
|
+
* Admin role assigned to the group. It can be any one of the following values:
|
|
108
|
+
* `"API_ADMIN"`,
|
|
109
|
+
* `"APP_ADMIN"`,
|
|
110
|
+
* `"CUSTOM"`,
|
|
111
|
+
* `"GROUP_MEMBERSHIP_ADMIN"`,
|
|
112
|
+
* `"HELP_DESK_ADMIN"`,
|
|
113
|
+
* `"MOBILE_ADMIN"`,
|
|
114
|
+
* `"ORG_ADMIN"`,
|
|
115
|
+
* `"READ_ONLY_ADMIN"`,
|
|
116
|
+
* `"REPORT_ADMIN"`,
|
|
117
|
+
* `"SUPER_ADMIN"`,
|
|
118
|
+
* `"USER_ADMIN"`
|
|
119
|
+
* . See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
|
|
120
|
+
*
|
|
121
|
+
*
|
|
122
|
+
* - `"USER_ADMIN"` is the Group Administrator.
|
|
61
123
|
*/
|
|
62
124
|
roleType?: pulumi.Input<string>;
|
|
63
125
|
/**
|
|
64
|
-
*
|
|
126
|
+
* A list of app names (name represents set of app instances, like 'salesforce' or '
|
|
127
|
+
* facebook'), or a combination of app name and app instance ID (like 'facebook.0oapsqQ6dv19pqyEo0g3') you would like as
|
|
128
|
+
* the targets of the admin role.
|
|
129
|
+
* - Only supported when used with the role type `"APP_ADMIN"`.
|
|
65
130
|
*/
|
|
66
131
|
targetAppLists?: pulumi.Input<pulumi.Input<string>[]>;
|
|
67
132
|
/**
|
|
68
|
-
*
|
|
133
|
+
* A list of group IDs you would like as the targets of the admin role.
|
|
134
|
+
* - Only supported when used with the role types: `GROUP_MEMBERSHIP_ADMIN`, `HELP_DESK_ADMIN`, or `USER_ADMIN`.
|
|
69
135
|
*/
|
|
70
136
|
targetGroupLists?: pulumi.Input<pulumi.Input<string>[]>;
|
|
71
137
|
}
|
|
@@ -74,23 +140,43 @@ export interface RoleState {
|
|
|
74
140
|
*/
|
|
75
141
|
export interface RoleArgs {
|
|
76
142
|
/**
|
|
77
|
-
* When this setting is enabled, the admins won't receive any of the default Okta
|
|
143
|
+
* When this setting is enabled, the admins won't receive any of the default Okta
|
|
144
|
+
* administrator emails. These admins also won't have access to contact Okta Support and open support cases on behalf of your org.
|
|
78
145
|
*/
|
|
79
146
|
disableNotifications?: pulumi.Input<boolean>;
|
|
80
147
|
/**
|
|
81
|
-
* ID of group to attach admin roles to
|
|
148
|
+
* The ID of group to attach admin roles to.
|
|
82
149
|
*/
|
|
83
150
|
groupId: pulumi.Input<string>;
|
|
84
151
|
/**
|
|
85
|
-
*
|
|
152
|
+
* Admin role assigned to the group. It can be any one of the following values:
|
|
153
|
+
* `"API_ADMIN"`,
|
|
154
|
+
* `"APP_ADMIN"`,
|
|
155
|
+
* `"CUSTOM"`,
|
|
156
|
+
* `"GROUP_MEMBERSHIP_ADMIN"`,
|
|
157
|
+
* `"HELP_DESK_ADMIN"`,
|
|
158
|
+
* `"MOBILE_ADMIN"`,
|
|
159
|
+
* `"ORG_ADMIN"`,
|
|
160
|
+
* `"READ_ONLY_ADMIN"`,
|
|
161
|
+
* `"REPORT_ADMIN"`,
|
|
162
|
+
* `"SUPER_ADMIN"`,
|
|
163
|
+
* `"USER_ADMIN"`
|
|
164
|
+
* . See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
|
|
165
|
+
*
|
|
166
|
+
*
|
|
167
|
+
* - `"USER_ADMIN"` is the Group Administrator.
|
|
86
168
|
*/
|
|
87
169
|
roleType: pulumi.Input<string>;
|
|
88
170
|
/**
|
|
89
|
-
*
|
|
171
|
+
* A list of app names (name represents set of app instances, like 'salesforce' or '
|
|
172
|
+
* facebook'), or a combination of app name and app instance ID (like 'facebook.0oapsqQ6dv19pqyEo0g3') you would like as
|
|
173
|
+
* the targets of the admin role.
|
|
174
|
+
* - Only supported when used with the role type `"APP_ADMIN"`.
|
|
90
175
|
*/
|
|
91
176
|
targetAppLists?: pulumi.Input<pulumi.Input<string>[]>;
|
|
92
177
|
/**
|
|
93
|
-
*
|
|
178
|
+
* A list of group IDs you would like as the targets of the admin role.
|
|
179
|
+
* - Only supported when used with the role types: `GROUP_MEMBERSHIP_ADMIN`, `HELP_DESK_ADMIN`, or `USER_ADMIN`.
|
|
94
180
|
*/
|
|
95
181
|
targetGroupLists?: pulumi.Input<pulumi.Input<string>[]>;
|
|
96
182
|
}
|
package/group/role.js
CHANGED
|
@@ -5,6 +5,32 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.Role = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* Assigns Admin roles to Okta Groups.
|
|
10
|
+
*
|
|
11
|
+
* This resource allows you to assign Okta administrator roles to Okta Groups. This resource provides a one-to-one
|
|
12
|
+
* interface between the Okta group and the admin role.
|
|
13
|
+
*
|
|
14
|
+
* ## Example Usage
|
|
15
|
+
*
|
|
16
|
+
* ```typescript
|
|
17
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
18
|
+
* import * as okta from "@pulumi/okta";
|
|
19
|
+
*
|
|
20
|
+
* const example = new okta.group.Role("example", {
|
|
21
|
+
* groupId: "<group id>",
|
|
22
|
+
* roleType: "READ_ONLY_ADMIN",
|
|
23
|
+
* });
|
|
24
|
+
* ```
|
|
25
|
+
*
|
|
26
|
+
* ## Import
|
|
27
|
+
*
|
|
28
|
+
* Individual admin role assignment can be imported by passing the group and role assignment IDs as follows
|
|
29
|
+
*
|
|
30
|
+
* ```sh
|
|
31
|
+
* $ pulumi import okta:group/role:Role example <group id>/<role id>
|
|
32
|
+
* ```
|
|
33
|
+
*/
|
|
8
34
|
class Role extends pulumi.CustomResource {
|
|
9
35
|
/**
|
|
10
36
|
* Get an existing Role resource's state with the given name, ID, and optional extra
|
package/group/role.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"role.js","sourceRoot":"","sources":["../../group/role.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,MAAa,IAAK,SAAQ,MAAM,CAAC,cAAc;IAC3C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiB,EAAE,IAAmC;QAC/G,OAAO,IAAI,IAAI,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC3D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,IAAI,CAAC,YAAY,CAAC;IACrD,CAAC;
|
|
1
|
+
{"version":3,"file":"role.js","sourceRoot":"","sources":["../../group/role.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,IAAK,SAAQ,MAAM,CAAC,cAAc;IAC3C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiB,EAAE,IAAmC;QAC/G,OAAO,IAAI,IAAI,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC3D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,IAAI,CAAC,YAAY,CAAC;IACrD,CAAC;IAmDD,YAAY,IAAY,EAAE,WAAkC,EAAE,IAAmC;QAC7F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoC,CAAC;YACnD,cAAc,CAAC,sBAAsB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACxF,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACnF;aAAM;YACH,MAAM,IAAI,GAAG,WAAmC,CAAC;YACjD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,OAAO,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACpD,MAAM,IAAI,KAAK,CAAC,qCAAqC,CAAC,CAAC;aAC1D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,sBAAsB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,oBAAoB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;SACjF;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,IAAI,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzD,CAAC;;AAvGL,oBAwGC;AA1FG,gBAAgB;AACO,iBAAY,GAAG,sBAAsB,CAAC"}
|
package/group/rule.d.ts
CHANGED
|
@@ -1,4 +1,27 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* ## Example Usage
|
|
4
|
+
*
|
|
5
|
+
* ```typescript
|
|
6
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
7
|
+
* import * as okta from "@pulumi/okta";
|
|
8
|
+
*
|
|
9
|
+
* const example = new okta.group.Rule("example", {
|
|
10
|
+
* expressionType: "urn:okta:expression:1.0",
|
|
11
|
+
* expressionValue: "String.startsWith(user.firstName,\"andy\")",
|
|
12
|
+
* groupAssignments: ["<group id>"],
|
|
13
|
+
* status: "ACTIVE",
|
|
14
|
+
* });
|
|
15
|
+
* ```
|
|
16
|
+
*
|
|
17
|
+
* ## Import
|
|
18
|
+
*
|
|
19
|
+
* An Okta Group Rule can be imported via the Okta ID.
|
|
20
|
+
*
|
|
21
|
+
* ```sh
|
|
22
|
+
* $ pulumi import okta:group/rule:Rule example <group rule id>
|
|
23
|
+
* ```
|
|
24
|
+
*/
|
|
2
25
|
export declare class Rule extends pulumi.CustomResource {
|
|
3
26
|
/**
|
|
4
27
|
* Get an existing Rule resource's state with the given name, ID, and optional extra
|
|
@@ -15,17 +38,34 @@ export declare class Rule extends pulumi.CustomResource {
|
|
|
15
38
|
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
16
39
|
*/
|
|
17
40
|
static isInstance(obj: any): obj is Rule;
|
|
41
|
+
/**
|
|
42
|
+
* The expression type to use to invoke the rule. The default
|
|
43
|
+
* is `"urn:okta:expression:1.0"`.
|
|
44
|
+
*/
|
|
18
45
|
readonly expressionType: pulumi.Output<string | undefined>;
|
|
46
|
+
/**
|
|
47
|
+
* The expression value.
|
|
48
|
+
*/
|
|
19
49
|
readonly expressionValue: pulumi.Output<string>;
|
|
50
|
+
/**
|
|
51
|
+
* The list of group ids to assign the users to.
|
|
52
|
+
*/
|
|
20
53
|
readonly groupAssignments: pulumi.Output<string[]>;
|
|
54
|
+
/**
|
|
55
|
+
* The name of the Group Rule (min character 1; max characters 50).
|
|
56
|
+
*/
|
|
21
57
|
readonly name: pulumi.Output<string>;
|
|
22
58
|
/**
|
|
23
|
-
*
|
|
59
|
+
* This tells the provider to remove users added by this rule from the assigned
|
|
60
|
+
* group after destroying this resource. Default is `false`.
|
|
24
61
|
*/
|
|
25
62
|
readonly removeAssignedUsers: pulumi.Output<boolean | undefined>;
|
|
63
|
+
/**
|
|
64
|
+
* The status of the group rule.
|
|
65
|
+
*/
|
|
26
66
|
readonly status: pulumi.Output<string | undefined>;
|
|
27
67
|
/**
|
|
28
|
-
* The list of user IDs that would be excluded when rules are processed
|
|
68
|
+
* The list of user IDs that would be excluded when rules are processed.
|
|
29
69
|
*/
|
|
30
70
|
readonly usersExcludeds: pulumi.Output<string[] | undefined>;
|
|
31
71
|
/**
|
|
@@ -41,17 +81,34 @@ export declare class Rule extends pulumi.CustomResource {
|
|
|
41
81
|
* Input properties used for looking up and filtering Rule resources.
|
|
42
82
|
*/
|
|
43
83
|
export interface RuleState {
|
|
84
|
+
/**
|
|
85
|
+
* The expression type to use to invoke the rule. The default
|
|
86
|
+
* is `"urn:okta:expression:1.0"`.
|
|
87
|
+
*/
|
|
44
88
|
expressionType?: pulumi.Input<string>;
|
|
89
|
+
/**
|
|
90
|
+
* The expression value.
|
|
91
|
+
*/
|
|
45
92
|
expressionValue?: pulumi.Input<string>;
|
|
93
|
+
/**
|
|
94
|
+
* The list of group ids to assign the users to.
|
|
95
|
+
*/
|
|
46
96
|
groupAssignments?: pulumi.Input<pulumi.Input<string>[]>;
|
|
97
|
+
/**
|
|
98
|
+
* The name of the Group Rule (min character 1; max characters 50).
|
|
99
|
+
*/
|
|
47
100
|
name?: pulumi.Input<string>;
|
|
48
101
|
/**
|
|
49
|
-
*
|
|
102
|
+
* This tells the provider to remove users added by this rule from the assigned
|
|
103
|
+
* group after destroying this resource. Default is `false`.
|
|
50
104
|
*/
|
|
51
105
|
removeAssignedUsers?: pulumi.Input<boolean>;
|
|
106
|
+
/**
|
|
107
|
+
* The status of the group rule.
|
|
108
|
+
*/
|
|
52
109
|
status?: pulumi.Input<string>;
|
|
53
110
|
/**
|
|
54
|
-
* The list of user IDs that would be excluded when rules are processed
|
|
111
|
+
* The list of user IDs that would be excluded when rules are processed.
|
|
55
112
|
*/
|
|
56
113
|
usersExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
57
114
|
}
|
|
@@ -59,17 +116,34 @@ export interface RuleState {
|
|
|
59
116
|
* The set of arguments for constructing a Rule resource.
|
|
60
117
|
*/
|
|
61
118
|
export interface RuleArgs {
|
|
119
|
+
/**
|
|
120
|
+
* The expression type to use to invoke the rule. The default
|
|
121
|
+
* is `"urn:okta:expression:1.0"`.
|
|
122
|
+
*/
|
|
62
123
|
expressionType?: pulumi.Input<string>;
|
|
124
|
+
/**
|
|
125
|
+
* The expression value.
|
|
126
|
+
*/
|
|
63
127
|
expressionValue: pulumi.Input<string>;
|
|
128
|
+
/**
|
|
129
|
+
* The list of group ids to assign the users to.
|
|
130
|
+
*/
|
|
64
131
|
groupAssignments: pulumi.Input<pulumi.Input<string>[]>;
|
|
132
|
+
/**
|
|
133
|
+
* The name of the Group Rule (min character 1; max characters 50).
|
|
134
|
+
*/
|
|
65
135
|
name?: pulumi.Input<string>;
|
|
66
136
|
/**
|
|
67
|
-
*
|
|
137
|
+
* This tells the provider to remove users added by this rule from the assigned
|
|
138
|
+
* group after destroying this resource. Default is `false`.
|
|
68
139
|
*/
|
|
69
140
|
removeAssignedUsers?: pulumi.Input<boolean>;
|
|
141
|
+
/**
|
|
142
|
+
* The status of the group rule.
|
|
143
|
+
*/
|
|
70
144
|
status?: pulumi.Input<string>;
|
|
71
145
|
/**
|
|
72
|
-
* The list of user IDs that would be excluded when rules are processed
|
|
146
|
+
* The list of user IDs that would be excluded when rules are processed.
|
|
73
147
|
*/
|
|
74
148
|
usersExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
75
149
|
}
|
package/group/rule.js
CHANGED
|
@@ -5,6 +5,29 @@ Object.defineProperty(exports, "__esModule", { value: true });
|
|
|
5
5
|
exports.Rule = void 0;
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
|
+
/**
|
|
9
|
+
* ## Example Usage
|
|
10
|
+
*
|
|
11
|
+
* ```typescript
|
|
12
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
13
|
+
* import * as okta from "@pulumi/okta";
|
|
14
|
+
*
|
|
15
|
+
* const example = new okta.group.Rule("example", {
|
|
16
|
+
* expressionType: "urn:okta:expression:1.0",
|
|
17
|
+
* expressionValue: "String.startsWith(user.firstName,\"andy\")",
|
|
18
|
+
* groupAssignments: ["<group id>"],
|
|
19
|
+
* status: "ACTIVE",
|
|
20
|
+
* });
|
|
21
|
+
* ```
|
|
22
|
+
*
|
|
23
|
+
* ## Import
|
|
24
|
+
*
|
|
25
|
+
* An Okta Group Rule can be imported via the Okta ID.
|
|
26
|
+
*
|
|
27
|
+
* ```sh
|
|
28
|
+
* $ pulumi import okta:group/rule:Rule example <group rule id>
|
|
29
|
+
* ```
|
|
30
|
+
*/
|
|
8
31
|
class Rule extends pulumi.CustomResource {
|
|
9
32
|
/**
|
|
10
33
|
* Get an existing Rule resource's state with the given name, ID, and optional extra
|
package/group/rule.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"rule.js","sourceRoot":"","sources":["../../group/rule.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C,MAAa,IAAK,SAAQ,MAAM,CAAC,cAAc;IAC3C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiB,EAAE,IAAmC;QAC/G,OAAO,IAAI,IAAI,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC3D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,IAAI,CAAC,YAAY,CAAC;IACrD,CAAC;
|
|
1
|
+
{"version":3,"file":"rule.js","sourceRoot":"","sources":["../../group/rule.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;GAsBG;AACH,MAAa,IAAK,SAAQ,MAAM,CAAC,cAAc;IAC3C;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAiB,EAAE,IAAmC;QAC/G,OAAO,IAAI,IAAI,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC3D,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,IAAI,CAAC,YAAY,CAAC;IACrD,CAAC;IAyCD,YAAY,IAAY,EAAE,WAAkC,EAAE,IAAmC;QAC7F,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAoC,CAAC;YACnD,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,qBAAqB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACtF,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;aAAM;YACH,MAAM,IAAI,GAAG,WAAmC,CAAC;YACjD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,eAAe,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC5D,MAAM,IAAI,KAAK,CAAC,6CAA6C,CAAC,CAAC;aAClE;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,gBAAgB,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC7D,MAAM,IAAI,KAAK,CAAC,8CAA8C,CAAC,CAAC;aACnE;YACD,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,qBAAqB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,mBAAmB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,IAAI,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACzD,CAAC;;AAjGL,oBAkGC;AApFG,gBAAgB;AACO,iBAAY,GAAG,sBAAsB,CAAC"}
|
package/groupMemberships.d.ts
CHANGED
|
@@ -1,6 +1,47 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
* Resource to manage a set of
|
|
3
|
+
* Resource to manage a set of memberships for a specific group.
|
|
4
|
+
*
|
|
5
|
+
* This resource will allow you to bulk manage group membership in Okta for a given
|
|
6
|
+
* group. This offers an interface to pass multiple users into a single resource
|
|
7
|
+
* call, for better API resource usage. If you need a relationship of a single
|
|
8
|
+
* user to many groups, please use the `okta.UserGroupMemberships` resource.
|
|
9
|
+
*
|
|
10
|
+
* **Important**: The default behavior of the resource is to only maintain the
|
|
11
|
+
* state of user ids that are assigned it. This behavior will signal drift only if
|
|
12
|
+
* those users stop being part of the group. If the desired behavior is track all
|
|
13
|
+
* users that are added/removed from the group make use of the `trackAllUsers`
|
|
14
|
+
* argument with this resource.
|
|
15
|
+
*
|
|
16
|
+
* ## Example Usage
|
|
17
|
+
*
|
|
18
|
+
* ```typescript
|
|
19
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
20
|
+
* import * as okta from "@pulumi/okta";
|
|
21
|
+
*
|
|
22
|
+
* const testGroup = new okta.group.Group("testGroup", {description: "testing, testing"});
|
|
23
|
+
* const testGroupMemberships = new okta.GroupMemberships("testGroupMemberships", {
|
|
24
|
+
* groupId: testGroup.id,
|
|
25
|
+
* users: [
|
|
26
|
+
* okta_user.test1.id,
|
|
27
|
+
* okta_user.test2.id,
|
|
28
|
+
* ],
|
|
29
|
+
* });
|
|
30
|
+
* ```
|
|
31
|
+
*
|
|
32
|
+
* ## Import
|
|
33
|
+
*
|
|
34
|
+
* an Okta Group's memberships can be imported via the Okta group ID.
|
|
35
|
+
*
|
|
36
|
+
* ```sh
|
|
37
|
+
* $ pulumi import okta:index/groupMemberships:GroupMemberships test <group id>
|
|
38
|
+
* ```
|
|
39
|
+
*
|
|
40
|
+
* optional parameter track all users will also import all user id currently assigned to the group
|
|
41
|
+
*
|
|
42
|
+
* ```sh
|
|
43
|
+
* $ pulumi import okta:index/groupMemberships:GroupMemberships test <group id>/<true>
|
|
44
|
+
* ```
|
|
4
45
|
*/
|
|
5
46
|
export declare class GroupMemberships extends pulumi.CustomResource {
|
|
6
47
|
/**
|
|
@@ -19,11 +60,11 @@ export declare class GroupMemberships extends pulumi.CustomResource {
|
|
|
19
60
|
*/
|
|
20
61
|
static isInstance(obj: any): obj is GroupMemberships;
|
|
21
62
|
/**
|
|
22
|
-
*
|
|
63
|
+
* Okta group ID.
|
|
23
64
|
*/
|
|
24
65
|
readonly groupId: pulumi.Output<string>;
|
|
25
66
|
/**
|
|
26
|
-
* The resource
|
|
67
|
+
* The resource will concern itself with all users added/deleted to the group; even those managed outside of the resource.
|
|
27
68
|
*/
|
|
28
69
|
readonly trackAllUsers: pulumi.Output<boolean | undefined>;
|
|
29
70
|
/**
|
|
@@ -44,11 +85,11 @@ export declare class GroupMemberships extends pulumi.CustomResource {
|
|
|
44
85
|
*/
|
|
45
86
|
export interface GroupMembershipsState {
|
|
46
87
|
/**
|
|
47
|
-
*
|
|
88
|
+
* Okta group ID.
|
|
48
89
|
*/
|
|
49
90
|
groupId?: pulumi.Input<string>;
|
|
50
91
|
/**
|
|
51
|
-
* The resource
|
|
92
|
+
* The resource will concern itself with all users added/deleted to the group; even those managed outside of the resource.
|
|
52
93
|
*/
|
|
53
94
|
trackAllUsers?: pulumi.Input<boolean>;
|
|
54
95
|
/**
|
|
@@ -61,11 +102,11 @@ export interface GroupMembershipsState {
|
|
|
61
102
|
*/
|
|
62
103
|
export interface GroupMembershipsArgs {
|
|
63
104
|
/**
|
|
64
|
-
*
|
|
105
|
+
* Okta group ID.
|
|
65
106
|
*/
|
|
66
107
|
groupId: pulumi.Input<string>;
|
|
67
108
|
/**
|
|
68
|
-
* The resource
|
|
109
|
+
* The resource will concern itself with all users added/deleted to the group; even those managed outside of the resource.
|
|
69
110
|
*/
|
|
70
111
|
trackAllUsers?: pulumi.Input<boolean>;
|
|
71
112
|
/**
|