@pulumi/okta 4.6.2 → 4.6.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (397) hide show
  1. package/adminRoleCustom.d.ts +129 -10
  2. package/adminRoleCustom.js +24 -1
  3. package/adminRoleCustom.js.map +1 -1
  4. package/adminRoleCustomAssignments.d.ts +25 -10
  5. package/adminRoleCustomAssignments.js +13 -1
  6. package/adminRoleCustomAssignments.js.map +1 -1
  7. package/adminRoleTargets.d.ts +44 -14
  8. package/adminRoleTargets.js +30 -0
  9. package/adminRoleTargets.js.map +1 -1
  10. package/app/accessPolicyAssignment.d.ts +20 -1
  11. package/app/accessPolicyAssignment.js +20 -1
  12. package/app/accessPolicyAssignment.js.map +1 -1
  13. package/app/autoLogin.d.ts +119 -72
  14. package/app/autoLogin.js +47 -0
  15. package/app/autoLogin.js.map +1 -1
  16. package/app/basicAuth.d.ts +66 -38
  17. package/app/basicAuth.js +28 -0
  18. package/app/basicAuth.js.map +1 -1
  19. package/app/bookmark.d.ts +71 -35
  20. package/app/bookmark.js +27 -0
  21. package/app/bookmark.js.map +1 -1
  22. package/app/getApp.d.ts +25 -58
  23. package/app/getApp.js +2 -2
  24. package/app/getApp.js.map +1 -1
  25. package/app/getMetadataSaml.d.ts +5 -11
  26. package/app/getMetadataSaml.js +2 -2
  27. package/app/getMetadataSaml.js.map +1 -1
  28. package/app/getOauth.d.ts +34 -62
  29. package/app/getOauth.js +2 -2
  30. package/app/getOauth.js.map +1 -1
  31. package/app/getSaml.d.ts +55 -75
  32. package/app/getSaml.js +2 -2
  33. package/app/getSaml.js.map +1 -1
  34. package/app/groupAssignment.d.ts +15 -6
  35. package/app/groupAssignment.js +9 -0
  36. package/app/groupAssignment.js.map +1 -1
  37. package/app/oauth.d.ts +301 -123
  38. package/app/oauth.js +82 -0
  39. package/app/oauth.js.map +1 -1
  40. package/app/oauthPostLogoutRedirectUri.d.ts +38 -3
  41. package/app/oauthPostLogoutRedirectUri.js +35 -0
  42. package/app/oauthPostLogoutRedirectUri.js.map +1 -1
  43. package/app/oauthRedirectUri.d.ts +37 -3
  44. package/app/oauthRedirectUri.js +34 -0
  45. package/app/oauthRedirectUri.js.map +1 -1
  46. package/app/saml.d.ts +303 -133
  47. package/app/saml.js +161 -0
  48. package/app/saml.js.map +1 -1
  49. package/app/securePasswordStore.d.ts +109 -79
  50. package/app/securePasswordStore.js +30 -0
  51. package/app/securePasswordStore.js.map +1 -1
  52. package/app/swa.d.ts +102 -72
  53. package/app/swa.js +30 -0
  54. package/app/swa.js.map +1 -1
  55. package/app/threeField.d.ts +87 -72
  56. package/app/threeField.js +15 -0
  57. package/app/threeField.js.map +1 -1
  58. package/app/user.d.ts +37 -12
  59. package/app/user.js +22 -0
  60. package/app/user.js.map +1 -1
  61. package/appGroupAssignments.d.ts +40 -3
  62. package/appGroupAssignments.js +37 -0
  63. package/appGroupAssignments.js.map +1 -1
  64. package/appOauthApiScope.d.ts +36 -3
  65. package/appOauthApiScope.js +33 -0
  66. package/appOauthApiScope.js.map +1 -1
  67. package/appSamlAppSettings.d.ts +44 -6
  68. package/appSamlAppSettings.js +38 -0
  69. package/appSamlAppSettings.js.map +1 -1
  70. package/appSharedCredentials.d.ts +115 -72
  71. package/appSharedCredentials.js +43 -0
  72. package/appSharedCredentials.js.map +1 -1
  73. package/appSignonPolicy.d.ts +44 -6
  74. package/appSignonPolicy.js +38 -0
  75. package/appSignonPolicy.js.map +1 -1
  76. package/appSignonPolicyRule.d.ts +327 -68
  77. package/appSignonPolicyRule.js +244 -0
  78. package/appSignonPolicyRule.js.map +1 -1
  79. package/appUserBaseSchemaProperty.d.ts +52 -24
  80. package/appUserBaseSchemaProperty.js +28 -0
  81. package/appUserBaseSchemaProperty.js.map +1 -1
  82. package/appUserSchemaProperty.d.ts +80 -54
  83. package/appUserSchemaProperty.js +26 -0
  84. package/appUserSchemaProperty.js.map +1 -1
  85. package/auth/getServer.d.ts +11 -11
  86. package/auth/getServer.js +2 -2
  87. package/auth/getServerPolicy.d.ts +9 -15
  88. package/auth/getServerPolicy.js +2 -2
  89. package/auth/getServerPolicy.js.map +1 -1
  90. package/auth/getServerScopes.d.ts +5 -8
  91. package/auth/getServerScopes.js +2 -2
  92. package/auth/getServerScopes.js.map +1 -1
  93. package/auth/server.d.ts +49 -13
  94. package/auth/server.js +27 -0
  95. package/auth/server.js.map +1 -1
  96. package/auth/serverClaim.d.ts +54 -18
  97. package/auth/serverClaim.js +27 -0
  98. package/auth/serverClaim.js.map +1 -1
  99. package/auth/serverPolicy.d.ts +43 -6
  100. package/auth/serverPolicy.js +28 -0
  101. package/auth/serverPolicy.js.map +1 -1
  102. package/auth/serverPolicyRule.d.ts +72 -29
  103. package/auth/serverPolicyRule.js +25 -0
  104. package/auth/serverPolicyRule.js.map +1 -1
  105. package/auth/serverScope.d.ts +41 -15
  106. package/auth/serverScope.js +26 -0
  107. package/auth/serverScope.js.map +1 -1
  108. package/authServerClaimDefault.d.ts +50 -13
  109. package/authServerClaimDefault.js +31 -0
  110. package/authServerClaimDefault.js.map +1 -1
  111. package/authServerDefault.d.ts +47 -13
  112. package/authServerDefault.js +25 -0
  113. package/authServerDefault.js.map +1 -1
  114. package/authenticator.d.ts +94 -38
  115. package/authenticator.js +38 -0
  116. package/authenticator.js.map +1 -1
  117. package/behaviour.d.ts +78 -18
  118. package/behaviour.js +42 -0
  119. package/behaviour.js.map +1 -1
  120. package/brand.d.ts +28 -19
  121. package/brand.js +10 -1
  122. package/brand.js.map +1 -1
  123. package/captcha.d.ts +38 -12
  124. package/captcha.js +26 -0
  125. package/captcha.js.map +1 -1
  126. package/captchaOrgWideSettings.d.ts +51 -6
  127. package/captchaOrgWideSettings.js +45 -0
  128. package/captchaOrgWideSettings.js.map +1 -1
  129. package/domain.d.ts +39 -13
  130. package/domain.js +20 -0
  131. package/domain.js.map +1 -1
  132. package/domainCertificate.d.ts +63 -15
  133. package/domainCertificate.js +48 -0
  134. package/domainCertificate.js.map +1 -1
  135. package/domainVerification.d.ts +22 -3
  136. package/domainVerification.js +19 -0
  137. package/domainVerification.js.map +1 -1
  138. package/emailCustomization.d.ts +224 -3
  139. package/emailCustomization.js +41 -0
  140. package/emailCustomization.js.map +1 -1
  141. package/emailSender.d.ts +39 -13
  142. package/emailSender.js +26 -0
  143. package/emailSender.js.map +1 -1
  144. package/emailSenderVerification.d.ts +26 -3
  145. package/emailSenderVerification.js +23 -0
  146. package/emailSenderVerification.js.map +1 -1
  147. package/eventHook.d.ts +37 -0
  148. package/eventHook.js +37 -0
  149. package/eventHook.js.map +1 -1
  150. package/eventHookVerification.d.ts +37 -3
  151. package/eventHookVerification.js +34 -0
  152. package/eventHookVerification.js.map +1 -1
  153. package/factor/factor.d.ts +23 -6
  154. package/factor/factor.js +14 -0
  155. package/factor/factor.js.map +1 -1
  156. package/factorTotp.d.ts +44 -12
  157. package/factorTotp.js +23 -0
  158. package/factorTotp.js.map +1 -1
  159. package/getAppGroupAssignments.d.ts +6 -6
  160. package/getAppGroupAssignments.js +2 -2
  161. package/getAppSignonPolicy.d.ts +6 -16
  162. package/getAppSignonPolicy.js +4 -8
  163. package/getAppSignonPolicy.js.map +1 -1
  164. package/getAppUserAssignments.d.ts +6 -6
  165. package/getAppUserAssignments.js +2 -2
  166. package/getAuthServerClaim.d.ts +12 -15
  167. package/getAuthServerClaim.js +2 -2
  168. package/getAuthServerClaim.js.map +1 -1
  169. package/getAuthServerClaims.d.ts +5 -8
  170. package/getAuthServerClaims.js +2 -2
  171. package/getAuthServerClaims.js.map +1 -1
  172. package/getAuthenticator.d.ts +26 -24
  173. package/getAuthenticator.js +22 -14
  174. package/getAuthenticator.js.map +1 -1
  175. package/getBehaviour.d.ts +8 -6
  176. package/getBehaviour.js +2 -2
  177. package/getBehaviour.js.map +1 -1
  178. package/getBehaviours.d.ts +7 -7
  179. package/getBehaviours.js +2 -2
  180. package/getBrand.d.ts +6 -9
  181. package/getBrand.js +2 -2
  182. package/getBrand.js.map +1 -1
  183. package/getBrands.d.ts +2 -2
  184. package/getBrands.js +2 -2
  185. package/getEmailCustomization.d.ts +9 -14
  186. package/getEmailCustomization.js +6 -2
  187. package/getEmailCustomization.js.map +1 -1
  188. package/getEmailCustomizations.d.ts +9 -11
  189. package/getEmailCustomizations.js +6 -2
  190. package/getEmailCustomizations.js.map +1 -1
  191. package/getGroups.d.ts +25 -11
  192. package/getGroups.js +2 -2
  193. package/getGroups.js.map +1 -1
  194. package/getNetworkZone.d.ts +12 -12
  195. package/getNetworkZone.js +2 -2
  196. package/getRoleSubscription.d.ts +35 -13
  197. package/getRoleSubscription.js +2 -2
  198. package/getRoleSubscription.js.map +1 -1
  199. package/getTemplate.d.ts +8 -10
  200. package/getTemplate.js +6 -2
  201. package/getTemplate.js.map +1 -1
  202. package/getTemplates.d.ts +7 -6
  203. package/getTemplates.js +6 -2
  204. package/getTemplates.js.map +1 -1
  205. package/getTheme.d.ts +12 -14
  206. package/getTheme.js +6 -2
  207. package/getTheme.js.map +1 -1
  208. package/getThemes.d.ts +7 -6
  209. package/getThemes.js +6 -2
  210. package/getThemes.js.map +1 -1
  211. package/getTrustedOrigins.d.ts +4 -7
  212. package/getTrustedOrigins.js +2 -2
  213. package/getTrustedOrigins.js.map +1 -1
  214. package/getUserSecurityQuestions.d.ts +8 -4
  215. package/getUserSecurityQuestions.js +4 -0
  216. package/getUserSecurityQuestions.js.map +1 -1
  217. package/group/getEveryoneGroup.d.ts +5 -10
  218. package/group/getEveryoneGroup.js +2 -4
  219. package/group/getEveryoneGroup.js.map +1 -1
  220. package/group/getGroup.d.ts +26 -17
  221. package/group/getGroup.js +2 -2
  222. package/group/getGroup.js.map +1 -1
  223. package/group/getRule.d.ts +15 -6
  224. package/group/getRule.js +2 -2
  225. package/group/getRule.js.map +1 -1
  226. package/group/group.d.ts +46 -9
  227. package/group/group.js +37 -0
  228. package/group/group.js.map +1 -1
  229. package/group/role.d.ts +101 -15
  230. package/group/role.js +26 -0
  231. package/group/role.js.map +1 -1
  232. package/group/rule.d.ts +80 -6
  233. package/group/rule.js +23 -0
  234. package/group/rule.js.map +1 -1
  235. package/groupMemberships.d.ts +48 -7
  236. package/groupMemberships.js +42 -1
  237. package/groupMemberships.js.map +1 -1
  238. package/groupSchemaProperty.d.ts +94 -51
  239. package/groupSchemaProperty.js +25 -0
  240. package/groupSchemaProperty.js.map +1 -1
  241. package/idp/getMetadataSaml.d.ts +6 -9
  242. package/idp/getMetadataSaml.js +2 -2
  243. package/idp/getMetadataSaml.js.map +1 -1
  244. package/idp/getOidc.d.ts +9 -9
  245. package/idp/getOidc.js +2 -2
  246. package/idp/getSaml.d.ts +13 -16
  247. package/idp/getSaml.js +2 -2
  248. package/idp/getSaml.js.map +1 -1
  249. package/idp/getSocial.d.ts +2 -8
  250. package/idp/getSocial.js +2 -2
  251. package/idp/getSocial.js.map +1 -1
  252. package/idp/oidc.d.ts +297 -12
  253. package/idp/oidc.js +36 -0
  254. package/idp/oidc.js.map +1 -1
  255. package/idp/saml.d.ts +284 -18
  256. package/idp/saml.js +32 -0
  257. package/idp/saml.js.map +1 -1
  258. package/idp/samlKey.d.ts +48 -3
  259. package/idp/samlKey.js +9 -0
  260. package/idp/samlKey.js.map +1 -1
  261. package/idp/social.d.ts +251 -18
  262. package/idp/social.js +32 -0
  263. package/idp/social.js.map +1 -1
  264. package/index/emailDomain.d.ts +41 -16
  265. package/index/emailDomain.js +25 -0
  266. package/index/emailDomain.js.map +1 -1
  267. package/index/emailDomainVerification.d.ts +25 -3
  268. package/index/emailDomainVerification.js +22 -0
  269. package/index/emailDomainVerification.js.map +1 -1
  270. package/index/getDomain.d.ts +14 -11
  271. package/index/getDomain.js +8 -2
  272. package/index/getDomain.js.map +1 -1
  273. package/inline/hook.d.ts +89 -0
  274. package/inline/hook.js +35 -0
  275. package/inline/hook.js.map +1 -1
  276. package/linkDefinition.d.ts +30 -0
  277. package/linkDefinition.js +30 -0
  278. package/linkDefinition.js.map +1 -1
  279. package/linkValue.d.ts +59 -6
  280. package/linkValue.js +53 -0
  281. package/linkValue.js.map +1 -1
  282. package/network/zone.d.ts +74 -27
  283. package/network/zone.js +44 -0
  284. package/network/zone.js.map +1 -1
  285. package/orgConfiguration.d.ts +25 -0
  286. package/orgConfiguration.js +25 -0
  287. package/orgConfiguration.js.map +1 -1
  288. package/orgSupport.d.ts +20 -3
  289. package/orgSupport.js +17 -0
  290. package/orgSupport.js.map +1 -1
  291. package/package.json +1 -1
  292. package/policy/getDefaultPolicy.d.ts +7 -9
  293. package/policy/getDefaultPolicy.js +2 -6
  294. package/policy/getDefaultPolicy.js.map +1 -1
  295. package/policy/getPolicy.d.ts +10 -11
  296. package/policy/getPolicy.js +2 -2
  297. package/policy/getPolicy.js.map +1 -1
  298. package/policy/mfa.d.ts +259 -18
  299. package/policy/mfa.js +49 -0
  300. package/policy/mfa.js.map +1 -1
  301. package/policy/password.d.ts +117 -90
  302. package/policy/password.js +27 -0
  303. package/policy/password.js.map +1 -1
  304. package/policy/ruleIdpDiscovery.d.ts +149 -27
  305. package/policy/ruleIdpDiscovery.js +65 -0
  306. package/policy/ruleIdpDiscovery.js.map +1 -1
  307. package/policy/ruleMfa.d.ts +35 -24
  308. package/policy/ruleMfa.js +11 -0
  309. package/policy/ruleMfa.js.map +1 -1
  310. package/policy/rulePassword.d.ts +46 -33
  311. package/policy/rulePassword.js +13 -0
  312. package/policy/rulePassword.js.map +1 -1
  313. package/policy/ruleSignon.d.ts +170 -57
  314. package/policy/ruleSignon.js +92 -0
  315. package/policy/ruleSignon.js.map +1 -1
  316. package/policy/signon.d.ts +41 -15
  317. package/policy/signon.js +26 -0
  318. package/policy/signon.js.map +1 -1
  319. package/policyMfaDefault.d.ts +250 -13
  320. package/policyMfaDefault.js +45 -0
  321. package/policyMfaDefault.js.map +1 -1
  322. package/policyPasswordDefault.d.ts +88 -54
  323. package/policyPasswordDefault.js +22 -0
  324. package/policyPasswordDefault.js.map +1 -1
  325. package/policyProfileEnrollment.d.ts +28 -6
  326. package/policyProfileEnrollment.js +22 -0
  327. package/policyProfileEnrollment.js.map +1 -1
  328. package/policyProfileEnrollmentApps.d.ts +42 -5
  329. package/policyProfileEnrollmentApps.js +37 -0
  330. package/policyProfileEnrollmentApps.js.map +1 -1
  331. package/policyRuleProfileEnrollment.d.ts +88 -26
  332. package/policyRuleProfileEnrollment.js +62 -0
  333. package/policyRuleProfileEnrollment.js.map +1 -1
  334. package/profile/mapping.d.ts +95 -9
  335. package/profile/mapping.js +41 -0
  336. package/profile/mapping.js.map +1 -1
  337. package/rateLimiting.d.ts +43 -9
  338. package/rateLimiting.js +28 -0
  339. package/rateLimiting.js.map +1 -1
  340. package/resourceSet.d.ts +32 -10
  341. package/resourceSet.js +20 -1
  342. package/resourceSet.js.map +1 -1
  343. package/roleSubscription.d.ts +110 -9
  344. package/roleSubscription.js +26 -0
  345. package/roleSubscription.js.map +1 -1
  346. package/securityNotificationEmails.d.ts +45 -15
  347. package/securityNotificationEmails.js +30 -0
  348. package/securityNotificationEmails.js.map +1 -1
  349. package/templateSms.d.ts +47 -3
  350. package/templateSms.js +35 -0
  351. package/templateSms.js.map +1 -1
  352. package/theme.d.ts +59 -44
  353. package/theme.js +15 -0
  354. package/theme.js.map +1 -1
  355. package/threatInsightSettings.d.ts +58 -6
  356. package/threatInsightSettings.js +34 -0
  357. package/threatInsightSettings.js.map +1 -1
  358. package/trustedorigin/origin.d.ts +37 -12
  359. package/trustedorigin/origin.js +25 -0
  360. package/trustedorigin/origin.js.map +1 -1
  361. package/types/input.d.ts +227 -60
  362. package/types/output.d.ts +446 -56
  363. package/user/getUser.d.ts +104 -32
  364. package/user/getUser.js +2 -2
  365. package/user/getUser.js.map +1 -1
  366. package/user/getUserProfileMappingSource.d.ts +7 -9
  367. package/user/getUserProfileMappingSource.js +4 -6
  368. package/user/getUserProfileMappingSource.js.map +1 -1
  369. package/user/getUserType.d.ts +7 -7
  370. package/user/getUserType.js +2 -2
  371. package/user/getUsers.d.ts +57 -61
  372. package/user/getUsers.js +44 -30
  373. package/user/getUsers.js.map +1 -1
  374. package/user/user.d.ts +215 -117
  375. package/user/user.js +71 -0
  376. package/user/user.js.map +1 -1
  377. package/user/userType.d.ts +34 -9
  378. package/user/userType.js +25 -0
  379. package/user/userType.js.map +1 -1
  380. package/userAdminRoles.d.ts +41 -10
  381. package/userAdminRoles.js +29 -1
  382. package/userAdminRoles.js.map +1 -1
  383. package/userBaseSchemaProperty.d.ts +67 -24
  384. package/userBaseSchemaProperty.js +43 -0
  385. package/userBaseSchemaProperty.js.map +1 -1
  386. package/userFactorQuestion.d.ts +52 -14
  387. package/userFactorQuestion.js +39 -1
  388. package/userFactorQuestion.js.map +1 -1
  389. package/userGroupMemberships.d.ts +23 -4
  390. package/userGroupMemberships.js +20 -1
  391. package/userGroupMemberships.js.map +1 -1
  392. package/userSchemaProperty.d.ts +107 -57
  393. package/userSchemaProperty.js +32 -0
  394. package/userSchemaProperty.js.map +1 -1
  395. package/utilities.d.ts +4 -0
  396. package/utilities.js +33 -1
  397. package/utilities.js.map +1 -1
package/idp/getSaml.d.ts CHANGED
@@ -1,6 +1,6 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
- * Get a SAML IdP from Okta.
3
+ * Use this data source to retrieve a SAML IdP from Okta.
4
4
  *
5
5
  * ## Example Usage
6
6
  *
@@ -19,11 +19,11 @@ export declare function getSaml(args?: GetSamlArgs, opts?: pulumi.InvokeOptions)
19
19
  */
20
20
  export interface GetSamlArgs {
21
21
  /**
22
- * Id of idp.
22
+ * The id of the idp to retrieve, conflicts with `name`.
23
23
  */
24
24
  id?: string;
25
25
  /**
26
- * Name of the idp.
26
+ * The name of the idp to retrieve, conflicts with `id`.
27
27
  */
28
28
  name?: string;
29
29
  }
@@ -31,9 +31,6 @@ export interface GetSamlArgs {
31
31
  * A collection of values returned by getSaml.
32
32
  */
33
33
  export interface GetSamlResult {
34
- /**
35
- * ACS binding
36
- */
37
34
  readonly acsBinding: string;
38
35
  /**
39
36
  * Determines whether to publish an instance-specific (trust) or organization (shared) ACS endpoint in the SAML metadata.
@@ -44,7 +41,7 @@ export interface GetSamlResult {
44
41
  */
45
42
  readonly audience: string;
46
43
  /**
47
- * Id of idp.
44
+ * id of idp.
48
45
  */
49
46
  readonly id?: string;
50
47
  /**
@@ -52,7 +49,7 @@ export interface GetSamlResult {
52
49
  */
53
50
  readonly issuer: string;
54
51
  /**
55
- * Indicates whether Okta uses the original Okta org domain URL, or a custom domain URL in the request to the IdP.
52
+ * indicates whether Okta uses the original Okta org domain URL, or a custom domain URL in the request to the IdP.
56
53
  */
57
54
  readonly issuerMode: string;
58
55
  /**
@@ -60,11 +57,11 @@ export interface GetSamlResult {
60
57
  */
61
58
  readonly kid: string;
62
59
  /**
63
- * Name of the idp.
60
+ * name of the idp.
64
61
  */
65
62
  readonly name?: string;
66
63
  /**
67
- * Single sign-on binding.
64
+ * single sign-on binding.
68
65
  */
69
66
  readonly ssoBinding: string;
70
67
  /**
@@ -72,11 +69,11 @@ export interface GetSamlResult {
72
69
  */
73
70
  readonly ssoDestination: string;
74
71
  /**
75
- * Single sign-on url.
72
+ * single sign-on url.
76
73
  */
77
74
  readonly ssoUrl: string;
78
75
  /**
79
- * Regular expression pattern used to filter untrusted IdP usernames.
76
+ * regular expression pattern used to filter untrusted IdP usernames.
80
77
  */
81
78
  readonly subjectFilter: string;
82
79
  /**
@@ -84,12 +81,12 @@ export interface GetSamlResult {
84
81
  */
85
82
  readonly subjectFormats: string[];
86
83
  /**
87
- * Type of idp.
84
+ * type of idp.
88
85
  */
89
86
  readonly type: string;
90
87
  }
91
88
  /**
92
- * Get a SAML IdP from Okta.
89
+ * Use this data source to retrieve a SAML IdP from Okta.
93
90
  *
94
91
  * ## Example Usage
95
92
  *
@@ -108,11 +105,11 @@ export declare function getSamlOutput(args?: GetSamlOutputArgs, opts?: pulumi.In
108
105
  */
109
106
  export interface GetSamlOutputArgs {
110
107
  /**
111
- * Id of idp.
108
+ * The id of the idp to retrieve, conflicts with `name`.
112
109
  */
113
110
  id?: pulumi.Input<string>;
114
111
  /**
115
- * Name of the idp.
112
+ * The name of the idp to retrieve, conflicts with `id`.
116
113
  */
117
114
  name?: pulumi.Input<string>;
118
115
  }
package/idp/getSaml.js CHANGED
@@ -6,7 +6,7 @@ exports.getSamlOutput = exports.getSaml = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
9
- * Get a SAML IdP from Okta.
9
+ * Use this data source to retrieve a SAML IdP from Okta.
10
10
  *
11
11
  * ## Example Usage
12
12
  *
@@ -29,7 +29,7 @@ function getSaml(args, opts) {
29
29
  }
30
30
  exports.getSaml = getSaml;
31
31
  /**
32
- * Get a SAML IdP from Okta.
32
+ * Use this data source to retrieve a SAML IdP from Okta.
33
33
  *
34
34
  * ## Example Usage
35
35
  *
@@ -1 +1 @@
1
- {"version":3,"file":"getSaml.js","sourceRoot":"","sources":["../../idp/getSaml.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,OAAO,CAAC,IAAkB,EAAE,IAA2B;IACnE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,0BAA0B,EAAE;QACrD,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,0BAQC;AA6ED;;;;;;;;;;;;;GAaG;AACH,SAAgB,aAAa,CAAC,IAAwB,EAAE,IAA2B;IAC/E,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,OAAO,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAClE,CAAC;AAFD,sCAEC"}
1
+ {"version":3,"file":"getSaml.js","sourceRoot":"","sources":["../../idp/getSaml.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,OAAO,CAAC,IAAkB,EAAE,IAA2B;IACnE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,0BAA0B,EAAE;QACrD,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,0BAQC;AA0ED;;;;;;;;;;;;;GAaG;AACH,SAAgB,aAAa,CAAC,IAAwB,EAAE,IAA2B;IAC/E,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,OAAO,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAClE,CAAC;AAFD,sCAEC"}
@@ -1,6 +1,6 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
- * Get a social IdP from Okta.
3
+ * Use this data source to retrieve a social IdP from Okta, namely `APPLE`, `FACEBOOK`, `LINKEDIN`, `MICROSOFT`, or `GOOGLE`.
4
4
  *
5
5
  * ## Example Usage
6
6
  *
@@ -75,9 +75,6 @@ export interface GetSocialResult {
75
75
  * Whitelist of Okta Group identifiers.
76
76
  */
77
77
  readonly groupsFilters: string[];
78
- /**
79
- * The id of the social idp to retrieve, conflicts with `name`.
80
- */
81
78
  readonly id?: string;
82
79
  /**
83
80
  * Indicates whether Okta uses the original Okta org domain URL, or a custom domain URL.
@@ -87,9 +84,6 @@ export interface GetSocialResult {
87
84
  * Maximum allowable clock-skew when processing messages from the IdP.
88
85
  */
89
86
  readonly maxClockSkew: number;
90
- /**
91
- * The name of the social idp to retrieve, conflicts with `id`.
92
- */
93
87
  readonly name?: string;
94
88
  /**
95
89
  * Determines if the IdP should act as a source of truth for user profile attributes.
@@ -141,7 +135,7 @@ export interface GetSocialResult {
141
135
  readonly usernameTemplate: string;
142
136
  }
143
137
  /**
144
- * Get a social IdP from Okta.
138
+ * Use this data source to retrieve a social IdP from Okta, namely `APPLE`, `FACEBOOK`, `LINKEDIN`, `MICROSOFT`, or `GOOGLE`.
145
139
  *
146
140
  * ## Example Usage
147
141
  *
package/idp/getSocial.js CHANGED
@@ -6,7 +6,7 @@ exports.getSocialOutput = exports.getSocial = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
9
- * Get a social IdP from Okta.
9
+ * Use this data source to retrieve a social IdP from Okta, namely `APPLE`, `FACEBOOK`, `LINKEDIN`, `MICROSOFT`, or `GOOGLE`.
10
10
  *
11
11
  * ## Example Usage
12
12
  *
@@ -29,7 +29,7 @@ function getSocial(args, opts) {
29
29
  }
30
30
  exports.getSocial = getSocial;
31
31
  /**
32
- * Get a social IdP from Okta.
32
+ * Use this data source to retrieve a social IdP from Okta, namely `APPLE`, `FACEBOOK`, `LINKEDIN`, `MICROSOFT`, or `GOOGLE`.
33
33
  *
34
34
  * ## Example Usage
35
35
  *
@@ -1 +1 @@
1
- {"version":3,"file":"getSocial.js","sourceRoot":"","sources":["../../idp/getSocial.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,SAAS,CAAC,IAAoB,EAAE,IAA2B;IACvE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,8BAA8B,EAAE;QACzD,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,8BAQC;AAiID;;;;;;;;;;;;;GAaG;AACH,SAAgB,eAAe,CAAC,IAA0B,EAAE,IAA2B;IACnF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACpE,CAAC;AAFD,0CAEC"}
1
+ {"version":3,"file":"getSocial.js","sourceRoot":"","sources":["../../idp/getSocial.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,SAAS,CAAC,IAAoB,EAAE,IAA2B;IACvE,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;IAElB,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,8BAA8B,EAAE;QACzD,IAAI,EAAE,IAAI,CAAC,EAAE;QACb,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AARD,8BAQC;AA2HD;;;;;;;;;;;;;GAaG;AACH,SAAgB,eAAe,CAAC,IAA0B,EAAE,IAA2B;IACnF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACpE,CAAC;AAFD,0CAEC"}
package/idp/oidc.d.ts CHANGED
@@ -1,4 +1,40 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
+ /**
3
+ * Creates an OIDC Identity Provider.
4
+ *
5
+ * This resource allows you to create and configure an OIDC Identity Provider.
6
+ *
7
+ * ## Example Usage
8
+ *
9
+ * ```typescript
10
+ * import * as pulumi from "@pulumi/pulumi";
11
+ * import * as okta from "@pulumi/okta";
12
+ *
13
+ * const example = new okta.idp.Oidc("example", {
14
+ * authorizationBinding: "HTTP-REDIRECT",
15
+ * authorizationUrl: "https://idp.example.com/authorize",
16
+ * clientId: "efg456",
17
+ * clientSecret: "efg456",
18
+ * issuerUrl: "https://id.example.com",
19
+ * jwksBinding: "HTTP-REDIRECT",
20
+ * jwksUrl: "https://idp.example.com/keys",
21
+ * scopes: ["openid"],
22
+ * tokenBinding: "HTTP-POST",
23
+ * tokenUrl: "https://idp.example.com/token",
24
+ * userInfoBinding: "HTTP-REDIRECT",
25
+ * userInfoUrl: "https://idp.example.com/userinfo",
26
+ * usernameTemplate: "idpuser.email",
27
+ * });
28
+ * ```
29
+ *
30
+ * ## Import
31
+ *
32
+ * An OIDC IdP can be imported via the Okta ID.
33
+ *
34
+ * ```sh
35
+ * $ pulumi import okta:idp/oidc:Oidc example &#60;idp id&#62;
36
+ * ```
37
+ */
2
38
  export declare class Oidc extends pulumi.CustomResource {
3
39
  /**
4
40
  * Get an existing Oidc resource's state with the given name, ID, and optional extra
@@ -15,54 +51,138 @@ export declare class Oidc extends pulumi.CustomResource {
15
51
  * when multiple copies of the Pulumi SDK have been loaded into the same process.
16
52
  */
17
53
  static isInstance(obj: any): obj is Oidc;
54
+ /**
55
+ * Specifies the account linking action for an IdP user.
56
+ */
18
57
  readonly accountLinkAction: pulumi.Output<string | undefined>;
58
+ /**
59
+ * Group memberships to determine link candidates.
60
+ */
19
61
  readonly accountLinkGroupIncludes: pulumi.Output<string[] | undefined>;
62
+ /**
63
+ * The method of making an authorization request. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
64
+ */
20
65
  readonly authorizationBinding: pulumi.Output<string>;
66
+ /**
67
+ * IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
68
+ */
21
69
  readonly authorizationUrl: pulumi.Output<string>;
70
+ /**
71
+ * Unique identifier issued by AS for the Okta IdP instance.
72
+ */
22
73
  readonly clientId: pulumi.Output<string>;
74
+ /**
75
+ * Client secret issued by AS for the Okta IdP instance.
76
+ */
23
77
  readonly clientSecret: pulumi.Output<string>;
78
+ /**
79
+ * Action for a previously deprovisioned IdP user during authentication. Can be `"NONE"` or `"REACTIVATE"`.
80
+ */
24
81
  readonly deprovisionedAction: pulumi.Output<string | undefined>;
82
+ /**
83
+ * Provisioning action for IdP user's group memberships. It can be `"NONE"`, `"SYNC"`, `"APPEND"`, or `"ASSIGN"`.
84
+ */
25
85
  readonly groupsAction: pulumi.Output<string | undefined>;
86
+ /**
87
+ * List of Okta Group IDs to add an IdP user as a member with the `"ASSIGN"` `groupsAction`.
88
+ */
26
89
  readonly groupsAssignments: pulumi.Output<string[] | undefined>;
90
+ /**
91
+ * IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
92
+ */
27
93
  readonly groupsAttribute: pulumi.Output<string | undefined>;
94
+ /**
95
+ * Whitelist of Okta Group identifiers that are allowed for the `"APPEND"` or `"SYNC"` `groupsAction`.
96
+ */
28
97
  readonly groupsFilters: pulumi.Output<string[] | undefined>;
29
98
  /**
30
- * Indicates whether Okta uses the original Okta org domain URL, custom domain URL, or dynamic. See Identity Provider attributes - issuerMode - https://developer.okta.com/docs/reference/api/idps/#identity-provider-attributes
99
+ * Indicates whether Okta uses the original Okta org domain URL, a custom domain URL, or dynamic. It can be `"ORG_URL"`, `"CUSTOM_URL"`, or `"DYNAMIC"`.
31
100
  */
32
101
  readonly issuerMode: pulumi.Output<string | undefined>;
102
+ /**
103
+ * URI that identifies the issuer.
104
+ */
33
105
  readonly issuerUrl: pulumi.Output<string>;
106
+ /**
107
+ * The method of making a request for the OIDC JWKS. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
108
+ */
34
109
  readonly jwksBinding: pulumi.Output<string>;
110
+ /**
111
+ * Endpoint where the keys signer publishes its keys in a JWK Set.
112
+ */
35
113
  readonly jwksUrl: pulumi.Output<string>;
114
+ /**
115
+ * Maximum allowable clock-skew when processing messages from the IdP.
116
+ */
36
117
  readonly maxClockSkew: pulumi.Output<number | undefined>;
37
118
  /**
38
- * Name of the IdP
119
+ * The Application's display name.
39
120
  */
40
121
  readonly name: pulumi.Output<string>;
122
+ /**
123
+ * Determines if the IdP should act as a source of truth for user profile attributes.
124
+ */
41
125
  readonly profileMaster: pulumi.Output<boolean | undefined>;
126
+ /**
127
+ * The type of protocol to use. It can be `"OIDC"` or `"OAUTH2"`.
128
+ */
42
129
  readonly protocolType: pulumi.Output<string | undefined>;
130
+ /**
131
+ * Provisioning action for an IdP user during authentication.
132
+ */
43
133
  readonly provisioningAction: pulumi.Output<string | undefined>;
44
134
  /**
45
- * The HMAC Signature Algorithm used when signing an authorization request
135
+ * The HMAC Signature Algorithm used when signing an authorization request. Defaults to `"HS256"`. It can be `"HS256"`, `"HS384"`, `"HS512"`, `"SHA-256"`. `"RS256"`, `"RS384"`, or `"RS512"`. NOTE: `"SHA-256"` an undocumented legacy value and not continue to be valid. See API docs https://developer.okta.com/docs/reference/api/idps/#oidc-request-signature-algorithm-object
46
136
  */
47
137
  readonly requestSignatureAlgorithm: pulumi.Output<string | undefined>;
48
138
  /**
49
- * Specifies whether to digitally sign an authorization request to the IdP
139
+ * Specifies whether to digitally sign an AuthnRequest messages to the IdP. Defaults to `"REQUEST"`. It can be `"REQUEST"` or `"NONE"`.
50
140
  */
51
141
  readonly requestSignatureScope: pulumi.Output<string | undefined>;
142
+ /**
143
+ * The scopes of the IdP.
144
+ */
52
145
  readonly scopes: pulumi.Output<string[]>;
146
+ /**
147
+ * Status of the IdP.
148
+ */
53
149
  readonly status: pulumi.Output<string | undefined>;
150
+ /**
151
+ * Okta user profile attribute for matching transformed IdP username. Only for matchType `"CUSTOM_ATTRIBUTE"`.
152
+ */
54
153
  readonly subjectMatchAttribute: pulumi.Output<string | undefined>;
154
+ /**
155
+ * Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default, it is set to `"USERNAME"`. It can be set to `"USERNAME"`, `"EMAIL"`, `"USERNAME_OR_EMAIL"` or `"CUSTOM_ATTRIBUTE"`.
156
+ */
55
157
  readonly subjectMatchType: pulumi.Output<string | undefined>;
158
+ /**
159
+ * Action for a previously suspended IdP user during authentication. Can be set to `"NONE"` or `"UNSUSPEND"`
160
+ */
56
161
  readonly suspendedAction: pulumi.Output<string | undefined>;
162
+ /**
163
+ * The method of making a token request. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
164
+ */
57
165
  readonly tokenBinding: pulumi.Output<string>;
166
+ /**
167
+ * IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
168
+ */
58
169
  readonly tokenUrl: pulumi.Output<string>;
59
170
  /**
60
171
  * Type of OIDC IdP.
61
172
  */
62
173
  readonly type: pulumi.Output<string>;
63
174
  readonly userInfoBinding: pulumi.Output<string | undefined>;
175
+ /**
176
+ * Protected resource endpoint that returns claims about the authenticated user.
177
+ */
64
178
  readonly userInfoUrl: pulumi.Output<string | undefined>;
179
+ /**
180
+ * User type ID. Can be used as `targetId` in the `okta.profile.Mapping` resource.
181
+ */
65
182
  readonly userTypeId: pulumi.Output<string>;
183
+ /**
184
+ * Okta EL Expression to generate or transform a unique username for the IdP user.
185
+ */
66
186
  readonly usernameTemplate: pulumi.Output<string | undefined>;
67
187
  /**
68
188
  * Create a Oidc resource with the given unique name, arguments, and options.
@@ -77,102 +197,267 @@ export declare class Oidc extends pulumi.CustomResource {
77
197
  * Input properties used for looking up and filtering Oidc resources.
78
198
  */
79
199
  export interface OidcState {
200
+ /**
201
+ * Specifies the account linking action for an IdP user.
202
+ */
80
203
  accountLinkAction?: pulumi.Input<string>;
204
+ /**
205
+ * Group memberships to determine link candidates.
206
+ */
81
207
  accountLinkGroupIncludes?: pulumi.Input<pulumi.Input<string>[]>;
208
+ /**
209
+ * The method of making an authorization request. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
210
+ */
82
211
  authorizationBinding?: pulumi.Input<string>;
212
+ /**
213
+ * IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
214
+ */
83
215
  authorizationUrl?: pulumi.Input<string>;
216
+ /**
217
+ * Unique identifier issued by AS for the Okta IdP instance.
218
+ */
84
219
  clientId?: pulumi.Input<string>;
220
+ /**
221
+ * Client secret issued by AS for the Okta IdP instance.
222
+ */
85
223
  clientSecret?: pulumi.Input<string>;
224
+ /**
225
+ * Action for a previously deprovisioned IdP user during authentication. Can be `"NONE"` or `"REACTIVATE"`.
226
+ */
86
227
  deprovisionedAction?: pulumi.Input<string>;
228
+ /**
229
+ * Provisioning action for IdP user's group memberships. It can be `"NONE"`, `"SYNC"`, `"APPEND"`, or `"ASSIGN"`.
230
+ */
87
231
  groupsAction?: pulumi.Input<string>;
232
+ /**
233
+ * List of Okta Group IDs to add an IdP user as a member with the `"ASSIGN"` `groupsAction`.
234
+ */
88
235
  groupsAssignments?: pulumi.Input<pulumi.Input<string>[]>;
236
+ /**
237
+ * IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
238
+ */
89
239
  groupsAttribute?: pulumi.Input<string>;
240
+ /**
241
+ * Whitelist of Okta Group identifiers that are allowed for the `"APPEND"` or `"SYNC"` `groupsAction`.
242
+ */
90
243
  groupsFilters?: pulumi.Input<pulumi.Input<string>[]>;
91
244
  /**
92
- * Indicates whether Okta uses the original Okta org domain URL, custom domain URL, or dynamic. See Identity Provider attributes - issuerMode - https://developer.okta.com/docs/reference/api/idps/#identity-provider-attributes
245
+ * Indicates whether Okta uses the original Okta org domain URL, a custom domain URL, or dynamic. It can be `"ORG_URL"`, `"CUSTOM_URL"`, or `"DYNAMIC"`.
93
246
  */
94
247
  issuerMode?: pulumi.Input<string>;
248
+ /**
249
+ * URI that identifies the issuer.
250
+ */
95
251
  issuerUrl?: pulumi.Input<string>;
252
+ /**
253
+ * The method of making a request for the OIDC JWKS. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
254
+ */
96
255
  jwksBinding?: pulumi.Input<string>;
256
+ /**
257
+ * Endpoint where the keys signer publishes its keys in a JWK Set.
258
+ */
97
259
  jwksUrl?: pulumi.Input<string>;
260
+ /**
261
+ * Maximum allowable clock-skew when processing messages from the IdP.
262
+ */
98
263
  maxClockSkew?: pulumi.Input<number>;
99
264
  /**
100
- * Name of the IdP
265
+ * The Application's display name.
101
266
  */
102
267
  name?: pulumi.Input<string>;
268
+ /**
269
+ * Determines if the IdP should act as a source of truth for user profile attributes.
270
+ */
103
271
  profileMaster?: pulumi.Input<boolean>;
272
+ /**
273
+ * The type of protocol to use. It can be `"OIDC"` or `"OAUTH2"`.
274
+ */
104
275
  protocolType?: pulumi.Input<string>;
276
+ /**
277
+ * Provisioning action for an IdP user during authentication.
278
+ */
105
279
  provisioningAction?: pulumi.Input<string>;
106
280
  /**
107
- * The HMAC Signature Algorithm used when signing an authorization request
281
+ * The HMAC Signature Algorithm used when signing an authorization request. Defaults to `"HS256"`. It can be `"HS256"`, `"HS384"`, `"HS512"`, `"SHA-256"`. `"RS256"`, `"RS384"`, or `"RS512"`. NOTE: `"SHA-256"` an undocumented legacy value and not continue to be valid. See API docs https://developer.okta.com/docs/reference/api/idps/#oidc-request-signature-algorithm-object
108
282
  */
109
283
  requestSignatureAlgorithm?: pulumi.Input<string>;
110
284
  /**
111
- * Specifies whether to digitally sign an authorization request to the IdP
285
+ * Specifies whether to digitally sign an AuthnRequest messages to the IdP. Defaults to `"REQUEST"`. It can be `"REQUEST"` or `"NONE"`.
112
286
  */
113
287
  requestSignatureScope?: pulumi.Input<string>;
288
+ /**
289
+ * The scopes of the IdP.
290
+ */
114
291
  scopes?: pulumi.Input<pulumi.Input<string>[]>;
292
+ /**
293
+ * Status of the IdP.
294
+ */
115
295
  status?: pulumi.Input<string>;
296
+ /**
297
+ * Okta user profile attribute for matching transformed IdP username. Only for matchType `"CUSTOM_ATTRIBUTE"`.
298
+ */
116
299
  subjectMatchAttribute?: pulumi.Input<string>;
300
+ /**
301
+ * Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default, it is set to `"USERNAME"`. It can be set to `"USERNAME"`, `"EMAIL"`, `"USERNAME_OR_EMAIL"` or `"CUSTOM_ATTRIBUTE"`.
302
+ */
117
303
  subjectMatchType?: pulumi.Input<string>;
304
+ /**
305
+ * Action for a previously suspended IdP user during authentication. Can be set to `"NONE"` or `"UNSUSPEND"`
306
+ */
118
307
  suspendedAction?: pulumi.Input<string>;
308
+ /**
309
+ * The method of making a token request. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
310
+ */
119
311
  tokenBinding?: pulumi.Input<string>;
312
+ /**
313
+ * IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
314
+ */
120
315
  tokenUrl?: pulumi.Input<string>;
121
316
  /**
122
317
  * Type of OIDC IdP.
123
318
  */
124
319
  type?: pulumi.Input<string>;
125
320
  userInfoBinding?: pulumi.Input<string>;
321
+ /**
322
+ * Protected resource endpoint that returns claims about the authenticated user.
323
+ */
126
324
  userInfoUrl?: pulumi.Input<string>;
325
+ /**
326
+ * User type ID. Can be used as `targetId` in the `okta.profile.Mapping` resource.
327
+ */
127
328
  userTypeId?: pulumi.Input<string>;
329
+ /**
330
+ * Okta EL Expression to generate or transform a unique username for the IdP user.
331
+ */
128
332
  usernameTemplate?: pulumi.Input<string>;
129
333
  }
130
334
  /**
131
335
  * The set of arguments for constructing a Oidc resource.
132
336
  */
133
337
  export interface OidcArgs {
338
+ /**
339
+ * Specifies the account linking action for an IdP user.
340
+ */
134
341
  accountLinkAction?: pulumi.Input<string>;
342
+ /**
343
+ * Group memberships to determine link candidates.
344
+ */
135
345
  accountLinkGroupIncludes?: pulumi.Input<pulumi.Input<string>[]>;
346
+ /**
347
+ * The method of making an authorization request. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
348
+ */
136
349
  authorizationBinding: pulumi.Input<string>;
350
+ /**
351
+ * IdP Authorization Server (AS) endpoint to request consent from the user and obtain an authorization code grant.
352
+ */
137
353
  authorizationUrl: pulumi.Input<string>;
354
+ /**
355
+ * Unique identifier issued by AS for the Okta IdP instance.
356
+ */
138
357
  clientId: pulumi.Input<string>;
358
+ /**
359
+ * Client secret issued by AS for the Okta IdP instance.
360
+ */
139
361
  clientSecret: pulumi.Input<string>;
362
+ /**
363
+ * Action for a previously deprovisioned IdP user during authentication. Can be `"NONE"` or `"REACTIVATE"`.
364
+ */
140
365
  deprovisionedAction?: pulumi.Input<string>;
366
+ /**
367
+ * Provisioning action for IdP user's group memberships. It can be `"NONE"`, `"SYNC"`, `"APPEND"`, or `"ASSIGN"`.
368
+ */
141
369
  groupsAction?: pulumi.Input<string>;
370
+ /**
371
+ * List of Okta Group IDs to add an IdP user as a member with the `"ASSIGN"` `groupsAction`.
372
+ */
142
373
  groupsAssignments?: pulumi.Input<pulumi.Input<string>[]>;
374
+ /**
375
+ * IdP user profile attribute name (case-insensitive) for an array value that contains group memberships.
376
+ */
143
377
  groupsAttribute?: pulumi.Input<string>;
378
+ /**
379
+ * Whitelist of Okta Group identifiers that are allowed for the `"APPEND"` or `"SYNC"` `groupsAction`.
380
+ */
144
381
  groupsFilters?: pulumi.Input<pulumi.Input<string>[]>;
145
382
  /**
146
- * Indicates whether Okta uses the original Okta org domain URL, custom domain URL, or dynamic. See Identity Provider attributes - issuerMode - https://developer.okta.com/docs/reference/api/idps/#identity-provider-attributes
383
+ * Indicates whether Okta uses the original Okta org domain URL, a custom domain URL, or dynamic. It can be `"ORG_URL"`, `"CUSTOM_URL"`, or `"DYNAMIC"`.
147
384
  */
148
385
  issuerMode?: pulumi.Input<string>;
386
+ /**
387
+ * URI that identifies the issuer.
388
+ */
149
389
  issuerUrl: pulumi.Input<string>;
390
+ /**
391
+ * The method of making a request for the OIDC JWKS. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
392
+ */
150
393
  jwksBinding: pulumi.Input<string>;
394
+ /**
395
+ * Endpoint where the keys signer publishes its keys in a JWK Set.
396
+ */
151
397
  jwksUrl: pulumi.Input<string>;
398
+ /**
399
+ * Maximum allowable clock-skew when processing messages from the IdP.
400
+ */
152
401
  maxClockSkew?: pulumi.Input<number>;
153
402
  /**
154
- * Name of the IdP
403
+ * The Application's display name.
155
404
  */
156
405
  name?: pulumi.Input<string>;
406
+ /**
407
+ * Determines if the IdP should act as a source of truth for user profile attributes.
408
+ */
157
409
  profileMaster?: pulumi.Input<boolean>;
410
+ /**
411
+ * The type of protocol to use. It can be `"OIDC"` or `"OAUTH2"`.
412
+ */
158
413
  protocolType?: pulumi.Input<string>;
414
+ /**
415
+ * Provisioning action for an IdP user during authentication.
416
+ */
159
417
  provisioningAction?: pulumi.Input<string>;
160
418
  /**
161
- * The HMAC Signature Algorithm used when signing an authorization request
419
+ * The HMAC Signature Algorithm used when signing an authorization request. Defaults to `"HS256"`. It can be `"HS256"`, `"HS384"`, `"HS512"`, `"SHA-256"`. `"RS256"`, `"RS384"`, or `"RS512"`. NOTE: `"SHA-256"` an undocumented legacy value and not continue to be valid. See API docs https://developer.okta.com/docs/reference/api/idps/#oidc-request-signature-algorithm-object
162
420
  */
163
421
  requestSignatureAlgorithm?: pulumi.Input<string>;
164
422
  /**
165
- * Specifies whether to digitally sign an authorization request to the IdP
423
+ * Specifies whether to digitally sign an AuthnRequest messages to the IdP. Defaults to `"REQUEST"`. It can be `"REQUEST"` or `"NONE"`.
166
424
  */
167
425
  requestSignatureScope?: pulumi.Input<string>;
426
+ /**
427
+ * The scopes of the IdP.
428
+ */
168
429
  scopes: pulumi.Input<pulumi.Input<string>[]>;
430
+ /**
431
+ * Status of the IdP.
432
+ */
169
433
  status?: pulumi.Input<string>;
434
+ /**
435
+ * Okta user profile attribute for matching transformed IdP username. Only for matchType `"CUSTOM_ATTRIBUTE"`.
436
+ */
170
437
  subjectMatchAttribute?: pulumi.Input<string>;
438
+ /**
439
+ * Determines the Okta user profile attribute match conditions for account linking and authentication of the transformed IdP username. By default, it is set to `"USERNAME"`. It can be set to `"USERNAME"`, `"EMAIL"`, `"USERNAME_OR_EMAIL"` or `"CUSTOM_ATTRIBUTE"`.
440
+ */
171
441
  subjectMatchType?: pulumi.Input<string>;
442
+ /**
443
+ * Action for a previously suspended IdP user during authentication. Can be set to `"NONE"` or `"UNSUSPEND"`
444
+ */
172
445
  suspendedAction?: pulumi.Input<string>;
446
+ /**
447
+ * The method of making a token request. It can be set to `"HTTP-POST"` or `"HTTP-REDIRECT"`.
448
+ */
173
449
  tokenBinding: pulumi.Input<string>;
450
+ /**
451
+ * IdP Authorization Server (AS) endpoint to exchange the authorization code grant for an access token.
452
+ */
174
453
  tokenUrl: pulumi.Input<string>;
175
454
  userInfoBinding?: pulumi.Input<string>;
455
+ /**
456
+ * Protected resource endpoint that returns claims about the authenticated user.
457
+ */
176
458
  userInfoUrl?: pulumi.Input<string>;
459
+ /**
460
+ * Okta EL Expression to generate or transform a unique username for the IdP user.
461
+ */
177
462
  usernameTemplate?: pulumi.Input<string>;
178
463
  }