@pulumi/okta 4.6.2 → 4.6.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +129 -10
- package/adminRoleCustom.js +24 -1
- package/adminRoleCustom.js.map +1 -1
- package/adminRoleCustomAssignments.d.ts +25 -10
- package/adminRoleCustomAssignments.js +13 -1
- package/adminRoleCustomAssignments.js.map +1 -1
- package/adminRoleTargets.d.ts +44 -14
- package/adminRoleTargets.js +30 -0
- package/adminRoleTargets.js.map +1 -1
- package/app/accessPolicyAssignment.d.ts +20 -1
- package/app/accessPolicyAssignment.js +20 -1
- package/app/accessPolicyAssignment.js.map +1 -1
- package/app/autoLogin.d.ts +119 -72
- package/app/autoLogin.js +47 -0
- package/app/autoLogin.js.map +1 -1
- package/app/basicAuth.d.ts +66 -38
- package/app/basicAuth.js +28 -0
- package/app/basicAuth.js.map +1 -1
- package/app/bookmark.d.ts +71 -35
- package/app/bookmark.js +27 -0
- package/app/bookmark.js.map +1 -1
- package/app/getApp.d.ts +25 -58
- package/app/getApp.js +2 -2
- package/app/getApp.js.map +1 -1
- package/app/getMetadataSaml.d.ts +5 -11
- package/app/getMetadataSaml.js +2 -2
- package/app/getMetadataSaml.js.map +1 -1
- package/app/getOauth.d.ts +34 -62
- package/app/getOauth.js +2 -2
- package/app/getOauth.js.map +1 -1
- package/app/getSaml.d.ts +55 -75
- package/app/getSaml.js +2 -2
- package/app/getSaml.js.map +1 -1
- package/app/groupAssignment.d.ts +15 -6
- package/app/groupAssignment.js +9 -0
- package/app/groupAssignment.js.map +1 -1
- package/app/oauth.d.ts +301 -123
- package/app/oauth.js +82 -0
- package/app/oauth.js.map +1 -1
- package/app/oauthPostLogoutRedirectUri.d.ts +38 -3
- package/app/oauthPostLogoutRedirectUri.js +35 -0
- package/app/oauthPostLogoutRedirectUri.js.map +1 -1
- package/app/oauthRedirectUri.d.ts +37 -3
- package/app/oauthRedirectUri.js +34 -0
- package/app/oauthRedirectUri.js.map +1 -1
- package/app/saml.d.ts +303 -133
- package/app/saml.js +161 -0
- package/app/saml.js.map +1 -1
- package/app/securePasswordStore.d.ts +109 -79
- package/app/securePasswordStore.js +30 -0
- package/app/securePasswordStore.js.map +1 -1
- package/app/swa.d.ts +102 -72
- package/app/swa.js +30 -0
- package/app/swa.js.map +1 -1
- package/app/threeField.d.ts +87 -72
- package/app/threeField.js +15 -0
- package/app/threeField.js.map +1 -1
- package/app/user.d.ts +37 -12
- package/app/user.js +22 -0
- package/app/user.js.map +1 -1
- package/appGroupAssignments.d.ts +40 -3
- package/appGroupAssignments.js +37 -0
- package/appGroupAssignments.js.map +1 -1
- package/appOauthApiScope.d.ts +36 -3
- package/appOauthApiScope.js +33 -0
- package/appOauthApiScope.js.map +1 -1
- package/appSamlAppSettings.d.ts +44 -6
- package/appSamlAppSettings.js +38 -0
- package/appSamlAppSettings.js.map +1 -1
- package/appSharedCredentials.d.ts +115 -72
- package/appSharedCredentials.js +43 -0
- package/appSharedCredentials.js.map +1 -1
- package/appSignonPolicy.d.ts +44 -6
- package/appSignonPolicy.js +38 -0
- package/appSignonPolicy.js.map +1 -1
- package/appSignonPolicyRule.d.ts +327 -68
- package/appSignonPolicyRule.js +244 -0
- package/appSignonPolicyRule.js.map +1 -1
- package/appUserBaseSchemaProperty.d.ts +52 -24
- package/appUserBaseSchemaProperty.js +28 -0
- package/appUserBaseSchemaProperty.js.map +1 -1
- package/appUserSchemaProperty.d.ts +80 -54
- package/appUserSchemaProperty.js +26 -0
- package/appUserSchemaProperty.js.map +1 -1
- package/auth/getServer.d.ts +11 -11
- package/auth/getServer.js +2 -2
- package/auth/getServerPolicy.d.ts +9 -15
- package/auth/getServerPolicy.js +2 -2
- package/auth/getServerPolicy.js.map +1 -1
- package/auth/getServerScopes.d.ts +5 -8
- package/auth/getServerScopes.js +2 -2
- package/auth/getServerScopes.js.map +1 -1
- package/auth/server.d.ts +49 -13
- package/auth/server.js +27 -0
- package/auth/server.js.map +1 -1
- package/auth/serverClaim.d.ts +54 -18
- package/auth/serverClaim.js +27 -0
- package/auth/serverClaim.js.map +1 -1
- package/auth/serverPolicy.d.ts +43 -6
- package/auth/serverPolicy.js +28 -0
- package/auth/serverPolicy.js.map +1 -1
- package/auth/serverPolicyRule.d.ts +72 -29
- package/auth/serverPolicyRule.js +25 -0
- package/auth/serverPolicyRule.js.map +1 -1
- package/auth/serverScope.d.ts +41 -15
- package/auth/serverScope.js +26 -0
- package/auth/serverScope.js.map +1 -1
- package/authServerClaimDefault.d.ts +50 -13
- package/authServerClaimDefault.js +31 -0
- package/authServerClaimDefault.js.map +1 -1
- package/authServerDefault.d.ts +47 -13
- package/authServerDefault.js +25 -0
- package/authServerDefault.js.map +1 -1
- package/authenticator.d.ts +94 -38
- package/authenticator.js +38 -0
- package/authenticator.js.map +1 -1
- package/behaviour.d.ts +78 -18
- package/behaviour.js +42 -0
- package/behaviour.js.map +1 -1
- package/brand.d.ts +28 -19
- package/brand.js +10 -1
- package/brand.js.map +1 -1
- package/captcha.d.ts +38 -12
- package/captcha.js +26 -0
- package/captcha.js.map +1 -1
- package/captchaOrgWideSettings.d.ts +51 -6
- package/captchaOrgWideSettings.js +45 -0
- package/captchaOrgWideSettings.js.map +1 -1
- package/domain.d.ts +39 -13
- package/domain.js +20 -0
- package/domain.js.map +1 -1
- package/domainCertificate.d.ts +63 -15
- package/domainCertificate.js +48 -0
- package/domainCertificate.js.map +1 -1
- package/domainVerification.d.ts +22 -3
- package/domainVerification.js +19 -0
- package/domainVerification.js.map +1 -1
- package/emailCustomization.d.ts +224 -3
- package/emailCustomization.js +41 -0
- package/emailCustomization.js.map +1 -1
- package/emailSender.d.ts +39 -13
- package/emailSender.js +26 -0
- package/emailSender.js.map +1 -1
- package/emailSenderVerification.d.ts +26 -3
- package/emailSenderVerification.js +23 -0
- package/emailSenderVerification.js.map +1 -1
- package/eventHook.d.ts +37 -0
- package/eventHook.js +37 -0
- package/eventHook.js.map +1 -1
- package/eventHookVerification.d.ts +37 -3
- package/eventHookVerification.js +34 -0
- package/eventHookVerification.js.map +1 -1
- package/factor/factor.d.ts +23 -6
- package/factor/factor.js +14 -0
- package/factor/factor.js.map +1 -1
- package/factorTotp.d.ts +44 -12
- package/factorTotp.js +23 -0
- package/factorTotp.js.map +1 -1
- package/getAppGroupAssignments.d.ts +6 -6
- package/getAppGroupAssignments.js +2 -2
- package/getAppSignonPolicy.d.ts +6 -16
- package/getAppSignonPolicy.js +4 -8
- package/getAppSignonPolicy.js.map +1 -1
- package/getAppUserAssignments.d.ts +6 -6
- package/getAppUserAssignments.js +2 -2
- package/getAuthServerClaim.d.ts +12 -15
- package/getAuthServerClaim.js +2 -2
- package/getAuthServerClaim.js.map +1 -1
- package/getAuthServerClaims.d.ts +5 -8
- package/getAuthServerClaims.js +2 -2
- package/getAuthServerClaims.js.map +1 -1
- package/getAuthenticator.d.ts +26 -24
- package/getAuthenticator.js +22 -14
- package/getAuthenticator.js.map +1 -1
- package/getBehaviour.d.ts +8 -6
- package/getBehaviour.js +2 -2
- package/getBehaviour.js.map +1 -1
- package/getBehaviours.d.ts +7 -7
- package/getBehaviours.js +2 -2
- package/getBrand.d.ts +6 -9
- package/getBrand.js +2 -2
- package/getBrand.js.map +1 -1
- package/getBrands.d.ts +2 -2
- package/getBrands.js +2 -2
- package/getEmailCustomization.d.ts +9 -14
- package/getEmailCustomization.js +6 -2
- package/getEmailCustomization.js.map +1 -1
- package/getEmailCustomizations.d.ts +9 -11
- package/getEmailCustomizations.js +6 -2
- package/getEmailCustomizations.js.map +1 -1
- package/getGroups.d.ts +25 -11
- package/getGroups.js +2 -2
- package/getGroups.js.map +1 -1
- package/getNetworkZone.d.ts +12 -12
- package/getNetworkZone.js +2 -2
- package/getRoleSubscription.d.ts +35 -13
- package/getRoleSubscription.js +2 -2
- package/getRoleSubscription.js.map +1 -1
- package/getTemplate.d.ts +8 -10
- package/getTemplate.js +6 -2
- package/getTemplate.js.map +1 -1
- package/getTemplates.d.ts +7 -6
- package/getTemplates.js +6 -2
- package/getTemplates.js.map +1 -1
- package/getTheme.d.ts +12 -14
- package/getTheme.js +6 -2
- package/getTheme.js.map +1 -1
- package/getThemes.d.ts +7 -6
- package/getThemes.js +6 -2
- package/getThemes.js.map +1 -1
- package/getTrustedOrigins.d.ts +4 -7
- package/getTrustedOrigins.js +2 -2
- package/getTrustedOrigins.js.map +1 -1
- package/getUserSecurityQuestions.d.ts +8 -4
- package/getUserSecurityQuestions.js +4 -0
- package/getUserSecurityQuestions.js.map +1 -1
- package/group/getEveryoneGroup.d.ts +5 -10
- package/group/getEveryoneGroup.js +2 -4
- package/group/getEveryoneGroup.js.map +1 -1
- package/group/getGroup.d.ts +26 -17
- package/group/getGroup.js +2 -2
- package/group/getGroup.js.map +1 -1
- package/group/getRule.d.ts +15 -6
- package/group/getRule.js +2 -2
- package/group/getRule.js.map +1 -1
- package/group/group.d.ts +46 -9
- package/group/group.js +37 -0
- package/group/group.js.map +1 -1
- package/group/role.d.ts +101 -15
- package/group/role.js +26 -0
- package/group/role.js.map +1 -1
- package/group/rule.d.ts +80 -6
- package/group/rule.js +23 -0
- package/group/rule.js.map +1 -1
- package/groupMemberships.d.ts +48 -7
- package/groupMemberships.js +42 -1
- package/groupMemberships.js.map +1 -1
- package/groupSchemaProperty.d.ts +94 -51
- package/groupSchemaProperty.js +25 -0
- package/groupSchemaProperty.js.map +1 -1
- package/idp/getMetadataSaml.d.ts +6 -9
- package/idp/getMetadataSaml.js +2 -2
- package/idp/getMetadataSaml.js.map +1 -1
- package/idp/getOidc.d.ts +9 -9
- package/idp/getOidc.js +2 -2
- package/idp/getSaml.d.ts +13 -16
- package/idp/getSaml.js +2 -2
- package/idp/getSaml.js.map +1 -1
- package/idp/getSocial.d.ts +2 -8
- package/idp/getSocial.js +2 -2
- package/idp/getSocial.js.map +1 -1
- package/idp/oidc.d.ts +297 -12
- package/idp/oidc.js +36 -0
- package/idp/oidc.js.map +1 -1
- package/idp/saml.d.ts +284 -18
- package/idp/saml.js +32 -0
- package/idp/saml.js.map +1 -1
- package/idp/samlKey.d.ts +48 -3
- package/idp/samlKey.js +9 -0
- package/idp/samlKey.js.map +1 -1
- package/idp/social.d.ts +251 -18
- package/idp/social.js +32 -0
- package/idp/social.js.map +1 -1
- package/index/emailDomain.d.ts +41 -16
- package/index/emailDomain.js +25 -0
- package/index/emailDomain.js.map +1 -1
- package/index/emailDomainVerification.d.ts +25 -3
- package/index/emailDomainVerification.js +22 -0
- package/index/emailDomainVerification.js.map +1 -1
- package/index/getDomain.d.ts +14 -11
- package/index/getDomain.js +8 -2
- package/index/getDomain.js.map +1 -1
- package/inline/hook.d.ts +89 -0
- package/inline/hook.js +35 -0
- package/inline/hook.js.map +1 -1
- package/linkDefinition.d.ts +30 -0
- package/linkDefinition.js +30 -0
- package/linkDefinition.js.map +1 -1
- package/linkValue.d.ts +59 -6
- package/linkValue.js +53 -0
- package/linkValue.js.map +1 -1
- package/network/zone.d.ts +74 -27
- package/network/zone.js +44 -0
- package/network/zone.js.map +1 -1
- package/orgConfiguration.d.ts +25 -0
- package/orgConfiguration.js +25 -0
- package/orgConfiguration.js.map +1 -1
- package/orgSupport.d.ts +20 -3
- package/orgSupport.js +17 -0
- package/orgSupport.js.map +1 -1
- package/package.json +1 -1
- package/policy/getDefaultPolicy.d.ts +7 -9
- package/policy/getDefaultPolicy.js +2 -6
- package/policy/getDefaultPolicy.js.map +1 -1
- package/policy/getPolicy.d.ts +10 -11
- package/policy/getPolicy.js +2 -2
- package/policy/getPolicy.js.map +1 -1
- package/policy/mfa.d.ts +259 -18
- package/policy/mfa.js +49 -0
- package/policy/mfa.js.map +1 -1
- package/policy/password.d.ts +117 -90
- package/policy/password.js +27 -0
- package/policy/password.js.map +1 -1
- package/policy/ruleIdpDiscovery.d.ts +149 -27
- package/policy/ruleIdpDiscovery.js +65 -0
- package/policy/ruleIdpDiscovery.js.map +1 -1
- package/policy/ruleMfa.d.ts +35 -24
- package/policy/ruleMfa.js +11 -0
- package/policy/ruleMfa.js.map +1 -1
- package/policy/rulePassword.d.ts +46 -33
- package/policy/rulePassword.js +13 -0
- package/policy/rulePassword.js.map +1 -1
- package/policy/ruleSignon.d.ts +170 -57
- package/policy/ruleSignon.js +92 -0
- package/policy/ruleSignon.js.map +1 -1
- package/policy/signon.d.ts +41 -15
- package/policy/signon.js +26 -0
- package/policy/signon.js.map +1 -1
- package/policyMfaDefault.d.ts +250 -13
- package/policyMfaDefault.js +45 -0
- package/policyMfaDefault.js.map +1 -1
- package/policyPasswordDefault.d.ts +88 -54
- package/policyPasswordDefault.js +22 -0
- package/policyPasswordDefault.js.map +1 -1
- package/policyProfileEnrollment.d.ts +28 -6
- package/policyProfileEnrollment.js +22 -0
- package/policyProfileEnrollment.js.map +1 -1
- package/policyProfileEnrollmentApps.d.ts +42 -5
- package/policyProfileEnrollmentApps.js +37 -0
- package/policyProfileEnrollmentApps.js.map +1 -1
- package/policyRuleProfileEnrollment.d.ts +88 -26
- package/policyRuleProfileEnrollment.js +62 -0
- package/policyRuleProfileEnrollment.js.map +1 -1
- package/profile/mapping.d.ts +95 -9
- package/profile/mapping.js +41 -0
- package/profile/mapping.js.map +1 -1
- package/rateLimiting.d.ts +43 -9
- package/rateLimiting.js +28 -0
- package/rateLimiting.js.map +1 -1
- package/resourceSet.d.ts +32 -10
- package/resourceSet.js +20 -1
- package/resourceSet.js.map +1 -1
- package/roleSubscription.d.ts +110 -9
- package/roleSubscription.js +26 -0
- package/roleSubscription.js.map +1 -1
- package/securityNotificationEmails.d.ts +45 -15
- package/securityNotificationEmails.js +30 -0
- package/securityNotificationEmails.js.map +1 -1
- package/templateSms.d.ts +47 -3
- package/templateSms.js +35 -0
- package/templateSms.js.map +1 -1
- package/theme.d.ts +59 -44
- package/theme.js +15 -0
- package/theme.js.map +1 -1
- package/threatInsightSettings.d.ts +58 -6
- package/threatInsightSettings.js +34 -0
- package/threatInsightSettings.js.map +1 -1
- package/trustedorigin/origin.d.ts +37 -12
- package/trustedorigin/origin.js +25 -0
- package/trustedorigin/origin.js.map +1 -1
- package/types/input.d.ts +227 -60
- package/types/output.d.ts +446 -56
- package/user/getUser.d.ts +104 -32
- package/user/getUser.js +2 -2
- package/user/getUser.js.map +1 -1
- package/user/getUserProfileMappingSource.d.ts +7 -9
- package/user/getUserProfileMappingSource.js +4 -6
- package/user/getUserProfileMappingSource.js.map +1 -1
- package/user/getUserType.d.ts +7 -7
- package/user/getUserType.js +2 -2
- package/user/getUsers.d.ts +57 -61
- package/user/getUsers.js +44 -30
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +215 -117
- package/user/user.js +71 -0
- package/user/user.js.map +1 -1
- package/user/userType.d.ts +34 -9
- package/user/userType.js +25 -0
- package/user/userType.js.map +1 -1
- package/userAdminRoles.d.ts +41 -10
- package/userAdminRoles.js +29 -1
- package/userAdminRoles.js.map +1 -1
- package/userBaseSchemaProperty.d.ts +67 -24
- package/userBaseSchemaProperty.js +43 -0
- package/userBaseSchemaProperty.js.map +1 -1
- package/userFactorQuestion.d.ts +52 -14
- package/userFactorQuestion.js +39 -1
- package/userFactorQuestion.js.map +1 -1
- package/userGroupMemberships.d.ts +23 -4
- package/userGroupMemberships.js +20 -1
- package/userGroupMemberships.js.map +1 -1
- package/userSchemaProperty.d.ts +107 -57
- package/userSchemaProperty.js +32 -0
- package/userSchemaProperty.js.map +1 -1
- package/utilities.d.ts +4 -0
- package/utilities.js +33 -1
- package/utilities.js.map +1 -1
package/idp/getSaml.d.ts
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
3
|
+
* Use this data source to retrieve a SAML IdP from Okta.
|
|
4
4
|
*
|
|
5
5
|
* ## Example Usage
|
|
6
6
|
*
|
|
@@ -19,11 +19,11 @@ export declare function getSaml(args?: GetSamlArgs, opts?: pulumi.InvokeOptions)
|
|
|
19
19
|
*/
|
|
20
20
|
export interface GetSamlArgs {
|
|
21
21
|
/**
|
|
22
|
-
*
|
|
22
|
+
* The id of the idp to retrieve, conflicts with `name`.
|
|
23
23
|
*/
|
|
24
24
|
id?: string;
|
|
25
25
|
/**
|
|
26
|
-
*
|
|
26
|
+
* The name of the idp to retrieve, conflicts with `id`.
|
|
27
27
|
*/
|
|
28
28
|
name?: string;
|
|
29
29
|
}
|
|
@@ -31,9 +31,6 @@ export interface GetSamlArgs {
|
|
|
31
31
|
* A collection of values returned by getSaml.
|
|
32
32
|
*/
|
|
33
33
|
export interface GetSamlResult {
|
|
34
|
-
/**
|
|
35
|
-
* ACS binding
|
|
36
|
-
*/
|
|
37
34
|
readonly acsBinding: string;
|
|
38
35
|
/**
|
|
39
36
|
* Determines whether to publish an instance-specific (trust) or organization (shared) ACS endpoint in the SAML metadata.
|
|
@@ -44,7 +41,7 @@ export interface GetSamlResult {
|
|
|
44
41
|
*/
|
|
45
42
|
readonly audience: string;
|
|
46
43
|
/**
|
|
47
|
-
*
|
|
44
|
+
* id of idp.
|
|
48
45
|
*/
|
|
49
46
|
readonly id?: string;
|
|
50
47
|
/**
|
|
@@ -52,7 +49,7 @@ export interface GetSamlResult {
|
|
|
52
49
|
*/
|
|
53
50
|
readonly issuer: string;
|
|
54
51
|
/**
|
|
55
|
-
*
|
|
52
|
+
* indicates whether Okta uses the original Okta org domain URL, or a custom domain URL in the request to the IdP.
|
|
56
53
|
*/
|
|
57
54
|
readonly issuerMode: string;
|
|
58
55
|
/**
|
|
@@ -60,11 +57,11 @@ export interface GetSamlResult {
|
|
|
60
57
|
*/
|
|
61
58
|
readonly kid: string;
|
|
62
59
|
/**
|
|
63
|
-
*
|
|
60
|
+
* name of the idp.
|
|
64
61
|
*/
|
|
65
62
|
readonly name?: string;
|
|
66
63
|
/**
|
|
67
|
-
*
|
|
64
|
+
* single sign-on binding.
|
|
68
65
|
*/
|
|
69
66
|
readonly ssoBinding: string;
|
|
70
67
|
/**
|
|
@@ -72,11 +69,11 @@ export interface GetSamlResult {
|
|
|
72
69
|
*/
|
|
73
70
|
readonly ssoDestination: string;
|
|
74
71
|
/**
|
|
75
|
-
*
|
|
72
|
+
* single sign-on url.
|
|
76
73
|
*/
|
|
77
74
|
readonly ssoUrl: string;
|
|
78
75
|
/**
|
|
79
|
-
*
|
|
76
|
+
* regular expression pattern used to filter untrusted IdP usernames.
|
|
80
77
|
*/
|
|
81
78
|
readonly subjectFilter: string;
|
|
82
79
|
/**
|
|
@@ -84,12 +81,12 @@ export interface GetSamlResult {
|
|
|
84
81
|
*/
|
|
85
82
|
readonly subjectFormats: string[];
|
|
86
83
|
/**
|
|
87
|
-
*
|
|
84
|
+
* type of idp.
|
|
88
85
|
*/
|
|
89
86
|
readonly type: string;
|
|
90
87
|
}
|
|
91
88
|
/**
|
|
92
|
-
*
|
|
89
|
+
* Use this data source to retrieve a SAML IdP from Okta.
|
|
93
90
|
*
|
|
94
91
|
* ## Example Usage
|
|
95
92
|
*
|
|
@@ -108,11 +105,11 @@ export declare function getSamlOutput(args?: GetSamlOutputArgs, opts?: pulumi.In
|
|
|
108
105
|
*/
|
|
109
106
|
export interface GetSamlOutputArgs {
|
|
110
107
|
/**
|
|
111
|
-
*
|
|
108
|
+
* The id of the idp to retrieve, conflicts with `name`.
|
|
112
109
|
*/
|
|
113
110
|
id?: pulumi.Input<string>;
|
|
114
111
|
/**
|
|
115
|
-
*
|
|
112
|
+
* The name of the idp to retrieve, conflicts with `id`.
|
|
116
113
|
*/
|
|
117
114
|
name?: pulumi.Input<string>;
|
|
118
115
|
}
|
package/idp/getSaml.js
CHANGED
|
@@ -6,7 +6,7 @@ exports.getSamlOutput = exports.getSaml = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
9
|
+
* Use this data source to retrieve a SAML IdP from Okta.
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
12
|
*
|
|
@@ -29,7 +29,7 @@ function getSaml(args, opts) {
|
|
|
29
29
|
}
|
|
30
30
|
exports.getSaml = getSaml;
|
|
31
31
|
/**
|
|
32
|
-
*
|
|
32
|
+
* Use this data source to retrieve a SAML IdP from Okta.
|
|
33
33
|
*
|
|
34
34
|
* ## Example Usage
|
|
35
35
|
*
|
package/idp/getSaml.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getSaml.js","sourceRoot":"","sources":["../../idp/getSaml.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,OAAO,CAAC,IAAkB,EAAE,IAA2B;IACnE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,0BAA0B,EAAE;QACrD,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,0BAQC;
|
|
1
|
+
{"version":3,"file":"getSaml.js","sourceRoot":"","sources":["../../idp/getSaml.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,OAAO,CAAC,IAAkB,EAAE,IAA2B;IACnE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,0BAA0B,EAAE;QACrD,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,0BAQC;AA0ED;;;;;;;;;;;;;GAaG;AACH,SAAgB,aAAa,CAAC,IAAwB,EAAE,IAA2B;IAC/E,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,OAAO,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAClE,CAAC;AAFD,sCAEC"}
|
package/idp/getSocial.d.ts
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
3
|
+
* Use this data source to retrieve a social IdP from Okta, namely `APPLE`, `FACEBOOK`, `LINKEDIN`, `MICROSOFT`, or `GOOGLE`.
|
|
4
4
|
*
|
|
5
5
|
* ## Example Usage
|
|
6
6
|
*
|
|
@@ -75,9 +75,6 @@ export interface GetSocialResult {
|
|
|
75
75
|
* Whitelist of Okta Group identifiers.
|
|
76
76
|
*/
|
|
77
77
|
readonly groupsFilters: string[];
|
|
78
|
-
/**
|
|
79
|
-
* The id of the social idp to retrieve, conflicts with `name`.
|
|
80
|
-
*/
|
|
81
78
|
readonly id?: string;
|
|
82
79
|
/**
|
|
83
80
|
* Indicates whether Okta uses the original Okta org domain URL, or a custom domain URL.
|
|
@@ -87,9 +84,6 @@ export interface GetSocialResult {
|
|
|
87
84
|
* Maximum allowable clock-skew when processing messages from the IdP.
|
|
88
85
|
*/
|
|
89
86
|
readonly maxClockSkew: number;
|
|
90
|
-
/**
|
|
91
|
-
* The name of the social idp to retrieve, conflicts with `id`.
|
|
92
|
-
*/
|
|
93
87
|
readonly name?: string;
|
|
94
88
|
/**
|
|
95
89
|
* Determines if the IdP should act as a source of truth for user profile attributes.
|
|
@@ -141,7 +135,7 @@ export interface GetSocialResult {
|
|
|
141
135
|
readonly usernameTemplate: string;
|
|
142
136
|
}
|
|
143
137
|
/**
|
|
144
|
-
*
|
|
138
|
+
* Use this data source to retrieve a social IdP from Okta, namely `APPLE`, `FACEBOOK`, `LINKEDIN`, `MICROSOFT`, or `GOOGLE`.
|
|
145
139
|
*
|
|
146
140
|
* ## Example Usage
|
|
147
141
|
*
|
package/idp/getSocial.js
CHANGED
|
@@ -6,7 +6,7 @@ exports.getSocialOutput = exports.getSocial = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
9
|
+
* Use this data source to retrieve a social IdP from Okta, namely `APPLE`, `FACEBOOK`, `LINKEDIN`, `MICROSOFT`, or `GOOGLE`.
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
12
|
*
|
|
@@ -29,7 +29,7 @@ function getSocial(args, opts) {
|
|
|
29
29
|
}
|
|
30
30
|
exports.getSocial = getSocial;
|
|
31
31
|
/**
|
|
32
|
-
*
|
|
32
|
+
* Use this data source to retrieve a social IdP from Okta, namely `APPLE`, `FACEBOOK`, `LINKEDIN`, `MICROSOFT`, or `GOOGLE`.
|
|
33
33
|
*
|
|
34
34
|
* ## Example Usage
|
|
35
35
|
*
|
package/idp/getSocial.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getSocial.js","sourceRoot":"","sources":["../../idp/getSocial.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,SAAS,CAAC,IAAoB,EAAE,IAA2B;IACvE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,8BAA8B,EAAE;QACzD,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,8BAQC;
|
|
1
|
+
{"version":3,"file":"getSocial.js","sourceRoot":"","sources":["../../idp/getSocial.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,SAAS,CAAC,IAAoB,EAAE,IAA2B;IACvE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,8BAA8B,EAAE;QACzD,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,8BAQC;AA2HD;;;;;;;;;;;;;GAaG;AACH,SAAgB,eAAe,CAAC,IAA0B,EAAE,IAA2B;IACnF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACpE,CAAC;AAFD,0CAEC"}
|
package/idp/oidc.d.ts
CHANGED
|
@@ -1,4 +1,40 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* Creates an OIDC Identity Provider.
|
|
4
|
+
*
|
|
5
|
+
* This resource allows you to create and configure an OIDC Identity Provider.
|
|
6
|
+
*
|
|
7
|
+
* ## Example Usage
|
|
8
|
+
*
|
|
9
|
+
* ```typescript
|
|
10
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
11
|
+
* import * as okta from "@pulumi/okta";
|
|
12
|
+
*
|
|
13
|
+
* const example = new okta.idp.Oidc("example", {
|
|
14
|
+
* authorizationBinding: "HTTP-REDIRECT",
|
|
15
|
+
* authorizationUrl: "https://idp.example.com/authorize",
|
|
16
|
+
* clientId: "efg456",
|
|
17
|
+
* clientSecret: "efg456",
|
|
18
|
+
* issuerUrl: "https://id.example.com",
|
|
19
|
+
* jwksBinding: "HTTP-REDIRECT",
|
|
20
|
+
* jwksUrl: "https://idp.example.com/keys",
|
|
21
|
+
* scopes: ["openid"],
|
|
22
|
+
* tokenBinding: "HTTP-POST",
|
|
23
|
+
* tokenUrl: "https://idp.example.com/token",
|
|
24
|
+
* userInfoBinding: "HTTP-REDIRECT",
|
|
25
|
+
* userInfoUrl: "https://idp.example.com/userinfo",
|
|
26
|
+
* usernameTemplate: "idpuser.email",
|
|
27
|
+
* });
|
|
28
|
+
* ```
|
|
29
|
+
*
|
|
30
|
+
* ## Import
|
|
31
|
+
*
|
|
32
|
+
* An OIDC IdP can be imported via the Okta ID.
|
|
33
|
+
*
|
|
34
|
+
* ```sh
|
|
35
|
+
* $ pulumi import okta:idp/oidc:Oidc example <idp id>
|
|
36
|
+
* ```
|
|
37
|
+
*/
|
|
2
38
|
export declare class Oidc extends pulumi.CustomResource {
|
|
3
39
|
/**
|
|
4
40
|
* Get an existing Oidc resource's state with the given name, ID, and optional extra
|
|
@@ -15,54 +51,138 @@ export declare class Oidc extends pulumi.CustomResource {
|
|
|
15
51
|
* when multiple copies of the Pulumi SDK have been loaded into the same process.
|
|
16
52
|
*/
|
|
17
53
|
static isInstance(obj: any): obj is Oidc;
|
|
54
|
+
/**
|
|
55
|
+
* Specifies the account linking action for an IdP user.
|
|
56
|
+
*/
|
|
18
57
|
readonly accountLinkAction: pulumi.Output<string | undefined>;
|
|
58
|
+
/**
|
|
59
|
+
* Group memberships to determine link candidates.
|
|
60
|
+
*/
|
|
19
61
|
readonly accountLinkGroupIncludes: pulumi.Output<string[] | undefined>;
|
|
62
|
+
/**
|
|
63
|
+
* The method of making an authorization request. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
|
|
64
|
+
*/
|
|
20
65
|
readonly authorizationBinding: pulumi.Output<string>;
|
|
66
|
+
/**
|
|
67
|
+
* IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
|
|
68
|
+
*/
|
|
21
69
|
readonly authorizationUrl: pulumi.Output<string>;
|
|
70
|
+
/**
|
|
71
|
+
* Unique identifier issued by AS for the Okta IdP instance.
|
|
72
|
+
*/
|
|
22
73
|
readonly clientId: pulumi.Output<string>;
|
|
74
|
+
/**
|
|
75
|
+
* Client secret issued by AS for the Okta IdP instance.
|
|
76
|
+
*/
|
|
23
77
|
readonly clientSecret: pulumi.Output<string>;
|
|
78
|
+
/**
|
|
79
|
+
* Action for a previously deprovisioned IdP user during authentication. Can be `"NONE"` or `"REACTIVATE"`.
|
|
80
|
+
*/
|
|
24
81
|
readonly deprovisionedAction: pulumi.Output<string | undefined>;
|
|
82
|
+
/**
|
|
83
|
+
* Provisioning action for IdP user's group memberships. It can be `"NONE"`, `"SYNC"`, `"APPEND"`, or `"ASSIGN"`.
|
|
84
|
+
*/
|
|
25
85
|
readonly groupsAction: pulumi.Output<string | undefined>;
|
|
86
|
+
/**
|
|
87
|
+
* List of Okta Group IDs to add an IdP user as a member with the `"ASSIGN"` `groupsAction`.
|
|
88
|
+
*/
|
|
26
89
|
readonly groupsAssignments: pulumi.Output<string[] | undefined>;
|
|
90
|
+
/**
|
|
91
|
+
* IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
|
|
92
|
+
*/
|
|
27
93
|
readonly groupsAttribute: pulumi.Output<string | undefined>;
|
|
94
|
+
/**
|
|
95
|
+
* Whitelist of Okta Group identifiers that are allowed for the `"APPEND"` or `"SYNC"` `groupsAction`.
|
|
96
|
+
*/
|
|
28
97
|
readonly groupsFilters: pulumi.Output<string[] | undefined>;
|
|
29
98
|
/**
|
|
30
|
-
* Indicates whether Okta uses the original Okta org domain URL, custom domain URL, or dynamic.
|
|
99
|
+
* Indicates whether Okta uses the original Okta org domain URL, a custom domain URL, or dynamic. It can be `"ORG_URL"`, `"CUSTOM_URL"`, or `"DYNAMIC"`.
|
|
31
100
|
*/
|
|
32
101
|
readonly issuerMode: pulumi.Output<string | undefined>;
|
|
102
|
+
/**
|
|
103
|
+
* URI that identifies the issuer.
|
|
104
|
+
*/
|
|
33
105
|
readonly issuerUrl: pulumi.Output<string>;
|
|
106
|
+
/**
|
|
107
|
+
* The method of making a request for the OIDC JWKS. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
|
|
108
|
+
*/
|
|
34
109
|
readonly jwksBinding: pulumi.Output<string>;
|
|
110
|
+
/**
|
|
111
|
+
* Endpoint where the keys signer publishes its keys in a JWK Set.
|
|
112
|
+
*/
|
|
35
113
|
readonly jwksUrl: pulumi.Output<string>;
|
|
114
|
+
/**
|
|
115
|
+
* Maximum allowable clock-skew when processing messages from the IdP.
|
|
116
|
+
*/
|
|
36
117
|
readonly maxClockSkew: pulumi.Output<number | undefined>;
|
|
37
118
|
/**
|
|
38
|
-
*
|
|
119
|
+
* The Application's display name.
|
|
39
120
|
*/
|
|
40
121
|
readonly name: pulumi.Output<string>;
|
|
122
|
+
/**
|
|
123
|
+
* Determines if the IdP should act as a source of truth for user profile attributes.
|
|
124
|
+
*/
|
|
41
125
|
readonly profileMaster: pulumi.Output<boolean | undefined>;
|
|
126
|
+
/**
|
|
127
|
+
* The type of protocol to use. It can be `"OIDC"` or `"OAUTH2"`.
|
|
128
|
+
*/
|
|
42
129
|
readonly protocolType: pulumi.Output<string | undefined>;
|
|
130
|
+
/**
|
|
131
|
+
* Provisioning action for an IdP user during authentication.
|
|
132
|
+
*/
|
|
43
133
|
readonly provisioningAction: pulumi.Output<string | undefined>;
|
|
44
134
|
/**
|
|
45
|
-
* The HMAC Signature Algorithm used when signing an authorization request
|
|
135
|
+
* The HMAC Signature Algorithm used when signing an authorization request. Defaults to `"HS256"`. It can be `"HS256"`, `"HS384"`, `"HS512"`, `"SHA-256"`. `"RS256"`, `"RS384"`, or `"RS512"`. NOTE: `"SHA-256"` an undocumented legacy value and not continue to be valid. See API docs https://developer.okta.com/docs/reference/api/idps/#oidc-request-signature-algorithm-object
|
|
46
136
|
*/
|
|
47
137
|
readonly requestSignatureAlgorithm: pulumi.Output<string | undefined>;
|
|
48
138
|
/**
|
|
49
|
-
* Specifies whether to digitally sign an
|
|
139
|
+
* Specifies whether to digitally sign an AuthnRequest messages to the IdP. Defaults to `"REQUEST"`. It can be `"REQUEST"` or `"NONE"`.
|
|
50
140
|
*/
|
|
51
141
|
readonly requestSignatureScope: pulumi.Output<string | undefined>;
|
|
142
|
+
/**
|
|
143
|
+
* The scopes of the IdP.
|
|
144
|
+
*/
|
|
52
145
|
readonly scopes: pulumi.Output<string[]>;
|
|
146
|
+
/**
|
|
147
|
+
* Status of the IdP.
|
|
148
|
+
*/
|
|
53
149
|
readonly status: pulumi.Output<string | undefined>;
|
|
150
|
+
/**
|
|
151
|
+
* Okta user profile attribute for matching transformed IdP username. Only for matchType `"CUSTOM_ATTRIBUTE"`.
|
|
152
|
+
*/
|
|
54
153
|
readonly subjectMatchAttribute: pulumi.Output<string | undefined>;
|
|
154
|
+
/**
|
|
155
|
+
* Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default, it is set to `"USERNAME"`. It can be set to `"USERNAME"`, `"EMAIL"`, `"USERNAME_OR_EMAIL"` or `"CUSTOM_ATTRIBUTE"`.
|
|
156
|
+
*/
|
|
55
157
|
readonly subjectMatchType: pulumi.Output<string | undefined>;
|
|
158
|
+
/**
|
|
159
|
+
* Action for a previously suspended IdP user during authentication. Can be set to `"NONE"` or `"UNSUSPEND"`
|
|
160
|
+
*/
|
|
56
161
|
readonly suspendedAction: pulumi.Output<string | undefined>;
|
|
162
|
+
/**
|
|
163
|
+
* The method of making a token request. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
|
|
164
|
+
*/
|
|
57
165
|
readonly tokenBinding: pulumi.Output<string>;
|
|
166
|
+
/**
|
|
167
|
+
* IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
|
|
168
|
+
*/
|
|
58
169
|
readonly tokenUrl: pulumi.Output<string>;
|
|
59
170
|
/**
|
|
60
171
|
* Type of OIDC IdP.
|
|
61
172
|
*/
|
|
62
173
|
readonly type: pulumi.Output<string>;
|
|
63
174
|
readonly userInfoBinding: pulumi.Output<string | undefined>;
|
|
175
|
+
/**
|
|
176
|
+
* Protected resource endpoint that returns claims about the authenticated user.
|
|
177
|
+
*/
|
|
64
178
|
readonly userInfoUrl: pulumi.Output<string | undefined>;
|
|
179
|
+
/**
|
|
180
|
+
* User type ID. Can be used as `targetId` in the `okta.profile.Mapping` resource.
|
|
181
|
+
*/
|
|
65
182
|
readonly userTypeId: pulumi.Output<string>;
|
|
183
|
+
/**
|
|
184
|
+
* Okta EL Expression to generate or transform a unique username for the IdP user.
|
|
185
|
+
*/
|
|
66
186
|
readonly usernameTemplate: pulumi.Output<string | undefined>;
|
|
67
187
|
/**
|
|
68
188
|
* Create a Oidc resource with the given unique name, arguments, and options.
|
|
@@ -77,102 +197,267 @@ export declare class Oidc extends pulumi.CustomResource {
|
|
|
77
197
|
* Input properties used for looking up and filtering Oidc resources.
|
|
78
198
|
*/
|
|
79
199
|
export interface OidcState {
|
|
200
|
+
/**
|
|
201
|
+
* Specifies the account linking action for an IdP user.
|
|
202
|
+
*/
|
|
80
203
|
accountLinkAction?: pulumi.Input<string>;
|
|
204
|
+
/**
|
|
205
|
+
* Group memberships to determine link candidates.
|
|
206
|
+
*/
|
|
81
207
|
accountLinkGroupIncludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
208
|
+
/**
|
|
209
|
+
* The method of making an authorization request. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
|
|
210
|
+
*/
|
|
82
211
|
authorizationBinding?: pulumi.Input<string>;
|
|
212
|
+
/**
|
|
213
|
+
* IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
|
|
214
|
+
*/
|
|
83
215
|
authorizationUrl?: pulumi.Input<string>;
|
|
216
|
+
/**
|
|
217
|
+
* Unique identifier issued by AS for the Okta IdP instance.
|
|
218
|
+
*/
|
|
84
219
|
clientId?: pulumi.Input<string>;
|
|
220
|
+
/**
|
|
221
|
+
* Client secret issued by AS for the Okta IdP instance.
|
|
222
|
+
*/
|
|
85
223
|
clientSecret?: pulumi.Input<string>;
|
|
224
|
+
/**
|
|
225
|
+
* Action for a previously deprovisioned IdP user during authentication. Can be `"NONE"` or `"REACTIVATE"`.
|
|
226
|
+
*/
|
|
86
227
|
deprovisionedAction?: pulumi.Input<string>;
|
|
228
|
+
/**
|
|
229
|
+
* Provisioning action for IdP user's group memberships. It can be `"NONE"`, `"SYNC"`, `"APPEND"`, or `"ASSIGN"`.
|
|
230
|
+
*/
|
|
87
231
|
groupsAction?: pulumi.Input<string>;
|
|
232
|
+
/**
|
|
233
|
+
* List of Okta Group IDs to add an IdP user as a member with the `"ASSIGN"` `groupsAction`.
|
|
234
|
+
*/
|
|
88
235
|
groupsAssignments?: pulumi.Input<pulumi.Input<string>[]>;
|
|
236
|
+
/**
|
|
237
|
+
* IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
|
|
238
|
+
*/
|
|
89
239
|
groupsAttribute?: pulumi.Input<string>;
|
|
240
|
+
/**
|
|
241
|
+
* Whitelist of Okta Group identifiers that are allowed for the `"APPEND"` or `"SYNC"` `groupsAction`.
|
|
242
|
+
*/
|
|
90
243
|
groupsFilters?: pulumi.Input<pulumi.Input<string>[]>;
|
|
91
244
|
/**
|
|
92
|
-
* Indicates whether Okta uses the original Okta org domain URL, custom domain URL, or dynamic.
|
|
245
|
+
* Indicates whether Okta uses the original Okta org domain URL, a custom domain URL, or dynamic. It can be `"ORG_URL"`, `"CUSTOM_URL"`, or `"DYNAMIC"`.
|
|
93
246
|
*/
|
|
94
247
|
issuerMode?: pulumi.Input<string>;
|
|
248
|
+
/**
|
|
249
|
+
* URI that identifies the issuer.
|
|
250
|
+
*/
|
|
95
251
|
issuerUrl?: pulumi.Input<string>;
|
|
252
|
+
/**
|
|
253
|
+
* The method of making a request for the OIDC JWKS. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
|
|
254
|
+
*/
|
|
96
255
|
jwksBinding?: pulumi.Input<string>;
|
|
256
|
+
/**
|
|
257
|
+
* Endpoint where the keys signer publishes its keys in a JWK Set.
|
|
258
|
+
*/
|
|
97
259
|
jwksUrl?: pulumi.Input<string>;
|
|
260
|
+
/**
|
|
261
|
+
* Maximum allowable clock-skew when processing messages from the IdP.
|
|
262
|
+
*/
|
|
98
263
|
maxClockSkew?: pulumi.Input<number>;
|
|
99
264
|
/**
|
|
100
|
-
*
|
|
265
|
+
* The Application's display name.
|
|
101
266
|
*/
|
|
102
267
|
name?: pulumi.Input<string>;
|
|
268
|
+
/**
|
|
269
|
+
* Determines if the IdP should act as a source of truth for user profile attributes.
|
|
270
|
+
*/
|
|
103
271
|
profileMaster?: pulumi.Input<boolean>;
|
|
272
|
+
/**
|
|
273
|
+
* The type of protocol to use. It can be `"OIDC"` or `"OAUTH2"`.
|
|
274
|
+
*/
|
|
104
275
|
protocolType?: pulumi.Input<string>;
|
|
276
|
+
/**
|
|
277
|
+
* Provisioning action for an IdP user during authentication.
|
|
278
|
+
*/
|
|
105
279
|
provisioningAction?: pulumi.Input<string>;
|
|
106
280
|
/**
|
|
107
|
-
* The HMAC Signature Algorithm used when signing an authorization request
|
|
281
|
+
* The HMAC Signature Algorithm used when signing an authorization request. Defaults to `"HS256"`. It can be `"HS256"`, `"HS384"`, `"HS512"`, `"SHA-256"`. `"RS256"`, `"RS384"`, or `"RS512"`. NOTE: `"SHA-256"` an undocumented legacy value and not continue to be valid. See API docs https://developer.okta.com/docs/reference/api/idps/#oidc-request-signature-algorithm-object
|
|
108
282
|
*/
|
|
109
283
|
requestSignatureAlgorithm?: pulumi.Input<string>;
|
|
110
284
|
/**
|
|
111
|
-
* Specifies whether to digitally sign an
|
|
285
|
+
* Specifies whether to digitally sign an AuthnRequest messages to the IdP. Defaults to `"REQUEST"`. It can be `"REQUEST"` or `"NONE"`.
|
|
112
286
|
*/
|
|
113
287
|
requestSignatureScope?: pulumi.Input<string>;
|
|
288
|
+
/**
|
|
289
|
+
* The scopes of the IdP.
|
|
290
|
+
*/
|
|
114
291
|
scopes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
292
|
+
/**
|
|
293
|
+
* Status of the IdP.
|
|
294
|
+
*/
|
|
115
295
|
status?: pulumi.Input<string>;
|
|
296
|
+
/**
|
|
297
|
+
* Okta user profile attribute for matching transformed IdP username. Only for matchType `"CUSTOM_ATTRIBUTE"`.
|
|
298
|
+
*/
|
|
116
299
|
subjectMatchAttribute?: pulumi.Input<string>;
|
|
300
|
+
/**
|
|
301
|
+
* Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default, it is set to `"USERNAME"`. It can be set to `"USERNAME"`, `"EMAIL"`, `"USERNAME_OR_EMAIL"` or `"CUSTOM_ATTRIBUTE"`.
|
|
302
|
+
*/
|
|
117
303
|
subjectMatchType?: pulumi.Input<string>;
|
|
304
|
+
/**
|
|
305
|
+
* Action for a previously suspended IdP user during authentication. Can be set to `"NONE"` or `"UNSUSPEND"`
|
|
306
|
+
*/
|
|
118
307
|
suspendedAction?: pulumi.Input<string>;
|
|
308
|
+
/**
|
|
309
|
+
* The method of making a token request. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
|
|
310
|
+
*/
|
|
119
311
|
tokenBinding?: pulumi.Input<string>;
|
|
312
|
+
/**
|
|
313
|
+
* IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
|
|
314
|
+
*/
|
|
120
315
|
tokenUrl?: pulumi.Input<string>;
|
|
121
316
|
/**
|
|
122
317
|
* Type of OIDC IdP.
|
|
123
318
|
*/
|
|
124
319
|
type?: pulumi.Input<string>;
|
|
125
320
|
userInfoBinding?: pulumi.Input<string>;
|
|
321
|
+
/**
|
|
322
|
+
* Protected resource endpoint that returns claims about the authenticated user.
|
|
323
|
+
*/
|
|
126
324
|
userInfoUrl?: pulumi.Input<string>;
|
|
325
|
+
/**
|
|
326
|
+
* User type ID. Can be used as `targetId` in the `okta.profile.Mapping` resource.
|
|
327
|
+
*/
|
|
127
328
|
userTypeId?: pulumi.Input<string>;
|
|
329
|
+
/**
|
|
330
|
+
* Okta EL Expression to generate or transform a unique username for the IdP user.
|
|
331
|
+
*/
|
|
128
332
|
usernameTemplate?: pulumi.Input<string>;
|
|
129
333
|
}
|
|
130
334
|
/**
|
|
131
335
|
* The set of arguments for constructing a Oidc resource.
|
|
132
336
|
*/
|
|
133
337
|
export interface OidcArgs {
|
|
338
|
+
/**
|
|
339
|
+
* Specifies the account linking action for an IdP user.
|
|
340
|
+
*/
|
|
134
341
|
accountLinkAction?: pulumi.Input<string>;
|
|
342
|
+
/**
|
|
343
|
+
* Group memberships to determine link candidates.
|
|
344
|
+
*/
|
|
135
345
|
accountLinkGroupIncludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
346
|
+
/**
|
|
347
|
+
* The method of making an authorization request. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
|
|
348
|
+
*/
|
|
136
349
|
authorizationBinding: pulumi.Input<string>;
|
|
350
|
+
/**
|
|
351
|
+
* IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
|
|
352
|
+
*/
|
|
137
353
|
authorizationUrl: pulumi.Input<string>;
|
|
354
|
+
/**
|
|
355
|
+
* Unique identifier issued by AS for the Okta IdP instance.
|
|
356
|
+
*/
|
|
138
357
|
clientId: pulumi.Input<string>;
|
|
358
|
+
/**
|
|
359
|
+
* Client secret issued by AS for the Okta IdP instance.
|
|
360
|
+
*/
|
|
139
361
|
clientSecret: pulumi.Input<string>;
|
|
362
|
+
/**
|
|
363
|
+
* Action for a previously deprovisioned IdP user during authentication. Can be `"NONE"` or `"REACTIVATE"`.
|
|
364
|
+
*/
|
|
140
365
|
deprovisionedAction?: pulumi.Input<string>;
|
|
366
|
+
/**
|
|
367
|
+
* Provisioning action for IdP user's group memberships. It can be `"NONE"`, `"SYNC"`, `"APPEND"`, or `"ASSIGN"`.
|
|
368
|
+
*/
|
|
141
369
|
groupsAction?: pulumi.Input<string>;
|
|
370
|
+
/**
|
|
371
|
+
* List of Okta Group IDs to add an IdP user as a member with the `"ASSIGN"` `groupsAction`.
|
|
372
|
+
*/
|
|
142
373
|
groupsAssignments?: pulumi.Input<pulumi.Input<string>[]>;
|
|
374
|
+
/**
|
|
375
|
+
* IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
|
|
376
|
+
*/
|
|
143
377
|
groupsAttribute?: pulumi.Input<string>;
|
|
378
|
+
/**
|
|
379
|
+
* Whitelist of Okta Group identifiers that are allowed for the `"APPEND"` or `"SYNC"` `groupsAction`.
|
|
380
|
+
*/
|
|
144
381
|
groupsFilters?: pulumi.Input<pulumi.Input<string>[]>;
|
|
145
382
|
/**
|
|
146
|
-
* Indicates whether Okta uses the original Okta org domain URL, custom domain URL, or dynamic.
|
|
383
|
+
* Indicates whether Okta uses the original Okta org domain URL, a custom domain URL, or dynamic. It can be `"ORG_URL"`, `"CUSTOM_URL"`, or `"DYNAMIC"`.
|
|
147
384
|
*/
|
|
148
385
|
issuerMode?: pulumi.Input<string>;
|
|
386
|
+
/**
|
|
387
|
+
* URI that identifies the issuer.
|
|
388
|
+
*/
|
|
149
389
|
issuerUrl: pulumi.Input<string>;
|
|
390
|
+
/**
|
|
391
|
+
* The method of making a request for the OIDC JWKS. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
|
|
392
|
+
*/
|
|
150
393
|
jwksBinding: pulumi.Input<string>;
|
|
394
|
+
/**
|
|
395
|
+
* Endpoint where the keys signer publishes its keys in a JWK Set.
|
|
396
|
+
*/
|
|
151
397
|
jwksUrl: pulumi.Input<string>;
|
|
398
|
+
/**
|
|
399
|
+
* Maximum allowable clock-skew when processing messages from the IdP.
|
|
400
|
+
*/
|
|
152
401
|
maxClockSkew?: pulumi.Input<number>;
|
|
153
402
|
/**
|
|
154
|
-
*
|
|
403
|
+
* The Application's display name.
|
|
155
404
|
*/
|
|
156
405
|
name?: pulumi.Input<string>;
|
|
406
|
+
/**
|
|
407
|
+
* Determines if the IdP should act as a source of truth for user profile attributes.
|
|
408
|
+
*/
|
|
157
409
|
profileMaster?: pulumi.Input<boolean>;
|
|
410
|
+
/**
|
|
411
|
+
* The type of protocol to use. It can be `"OIDC"` or `"OAUTH2"`.
|
|
412
|
+
*/
|
|
158
413
|
protocolType?: pulumi.Input<string>;
|
|
414
|
+
/**
|
|
415
|
+
* Provisioning action for an IdP user during authentication.
|
|
416
|
+
*/
|
|
159
417
|
provisioningAction?: pulumi.Input<string>;
|
|
160
418
|
/**
|
|
161
|
-
* The HMAC Signature Algorithm used when signing an authorization request
|
|
419
|
+
* The HMAC Signature Algorithm used when signing an authorization request. Defaults to `"HS256"`. It can be `"HS256"`, `"HS384"`, `"HS512"`, `"SHA-256"`. `"RS256"`, `"RS384"`, or `"RS512"`. NOTE: `"SHA-256"` an undocumented legacy value and not continue to be valid. See API docs https://developer.okta.com/docs/reference/api/idps/#oidc-request-signature-algorithm-object
|
|
162
420
|
*/
|
|
163
421
|
requestSignatureAlgorithm?: pulumi.Input<string>;
|
|
164
422
|
/**
|
|
165
|
-
* Specifies whether to digitally sign an
|
|
423
|
+
* Specifies whether to digitally sign an AuthnRequest messages to the IdP. Defaults to `"REQUEST"`. It can be `"REQUEST"` or `"NONE"`.
|
|
166
424
|
*/
|
|
167
425
|
requestSignatureScope?: pulumi.Input<string>;
|
|
426
|
+
/**
|
|
427
|
+
* The scopes of the IdP.
|
|
428
|
+
*/
|
|
168
429
|
scopes: pulumi.Input<pulumi.Input<string>[]>;
|
|
430
|
+
/**
|
|
431
|
+
* Status of the IdP.
|
|
432
|
+
*/
|
|
169
433
|
status?: pulumi.Input<string>;
|
|
434
|
+
/**
|
|
435
|
+
* Okta user profile attribute for matching transformed IdP username. Only for matchType `"CUSTOM_ATTRIBUTE"`.
|
|
436
|
+
*/
|
|
170
437
|
subjectMatchAttribute?: pulumi.Input<string>;
|
|
438
|
+
/**
|
|
439
|
+
* Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default, it is set to `"USERNAME"`. It can be set to `"USERNAME"`, `"EMAIL"`, `"USERNAME_OR_EMAIL"` or `"CUSTOM_ATTRIBUTE"`.
|
|
440
|
+
*/
|
|
171
441
|
subjectMatchType?: pulumi.Input<string>;
|
|
442
|
+
/**
|
|
443
|
+
* Action for a previously suspended IdP user during authentication. Can be set to `"NONE"` or `"UNSUSPEND"`
|
|
444
|
+
*/
|
|
172
445
|
suspendedAction?: pulumi.Input<string>;
|
|
446
|
+
/**
|
|
447
|
+
* The method of making a token request. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
|
|
448
|
+
*/
|
|
173
449
|
tokenBinding: pulumi.Input<string>;
|
|
450
|
+
/**
|
|
451
|
+
* IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
|
|
452
|
+
*/
|
|
174
453
|
tokenUrl: pulumi.Input<string>;
|
|
175
454
|
userInfoBinding?: pulumi.Input<string>;
|
|
455
|
+
/**
|
|
456
|
+
* Protected resource endpoint that returns claims about the authenticated user.
|
|
457
|
+
*/
|
|
176
458
|
userInfoUrl?: pulumi.Input<string>;
|
|
459
|
+
/**
|
|
460
|
+
* Okta EL Expression to generate or transform a unique username for the IdP user.
|
|
461
|
+
*/
|
|
177
462
|
usernameTemplate?: pulumi.Input<string>;
|
|
178
463
|
}
|