@pulumi/okta 4.6.2 → 4.6.3
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +129 -10
- package/adminRoleCustom.js +24 -1
- package/adminRoleCustom.js.map +1 -1
- package/adminRoleCustomAssignments.d.ts +25 -10
- package/adminRoleCustomAssignments.js +13 -1
- package/adminRoleCustomAssignments.js.map +1 -1
- package/adminRoleTargets.d.ts +44 -14
- package/adminRoleTargets.js +30 -0
- package/adminRoleTargets.js.map +1 -1
- package/app/accessPolicyAssignment.d.ts +20 -1
- package/app/accessPolicyAssignment.js +20 -1
- package/app/accessPolicyAssignment.js.map +1 -1
- package/app/autoLogin.d.ts +119 -72
- package/app/autoLogin.js +47 -0
- package/app/autoLogin.js.map +1 -1
- package/app/basicAuth.d.ts +66 -38
- package/app/basicAuth.js +28 -0
- package/app/basicAuth.js.map +1 -1
- package/app/bookmark.d.ts +71 -35
- package/app/bookmark.js +27 -0
- package/app/bookmark.js.map +1 -1
- package/app/getApp.d.ts +25 -58
- package/app/getApp.js +2 -2
- package/app/getApp.js.map +1 -1
- package/app/getMetadataSaml.d.ts +5 -11
- package/app/getMetadataSaml.js +2 -2
- package/app/getMetadataSaml.js.map +1 -1
- package/app/getOauth.d.ts +34 -62
- package/app/getOauth.js +2 -2
- package/app/getOauth.js.map +1 -1
- package/app/getSaml.d.ts +55 -75
- package/app/getSaml.js +2 -2
- package/app/getSaml.js.map +1 -1
- package/app/groupAssignment.d.ts +15 -6
- package/app/groupAssignment.js +9 -0
- package/app/groupAssignment.js.map +1 -1
- package/app/oauth.d.ts +301 -123
- package/app/oauth.js +82 -0
- package/app/oauth.js.map +1 -1
- package/app/oauthPostLogoutRedirectUri.d.ts +38 -3
- package/app/oauthPostLogoutRedirectUri.js +35 -0
- package/app/oauthPostLogoutRedirectUri.js.map +1 -1
- package/app/oauthRedirectUri.d.ts +37 -3
- package/app/oauthRedirectUri.js +34 -0
- package/app/oauthRedirectUri.js.map +1 -1
- package/app/saml.d.ts +303 -133
- package/app/saml.js +161 -0
- package/app/saml.js.map +1 -1
- package/app/securePasswordStore.d.ts +109 -79
- package/app/securePasswordStore.js +30 -0
- package/app/securePasswordStore.js.map +1 -1
- package/app/swa.d.ts +102 -72
- package/app/swa.js +30 -0
- package/app/swa.js.map +1 -1
- package/app/threeField.d.ts +87 -72
- package/app/threeField.js +15 -0
- package/app/threeField.js.map +1 -1
- package/app/user.d.ts +37 -12
- package/app/user.js +22 -0
- package/app/user.js.map +1 -1
- package/appGroupAssignments.d.ts +40 -3
- package/appGroupAssignments.js +37 -0
- package/appGroupAssignments.js.map +1 -1
- package/appOauthApiScope.d.ts +36 -3
- package/appOauthApiScope.js +33 -0
- package/appOauthApiScope.js.map +1 -1
- package/appSamlAppSettings.d.ts +44 -6
- package/appSamlAppSettings.js +38 -0
- package/appSamlAppSettings.js.map +1 -1
- package/appSharedCredentials.d.ts +115 -72
- package/appSharedCredentials.js +43 -0
- package/appSharedCredentials.js.map +1 -1
- package/appSignonPolicy.d.ts +44 -6
- package/appSignonPolicy.js +38 -0
- package/appSignonPolicy.js.map +1 -1
- package/appSignonPolicyRule.d.ts +327 -68
- package/appSignonPolicyRule.js +244 -0
- package/appSignonPolicyRule.js.map +1 -1
- package/appUserBaseSchemaProperty.d.ts +52 -24
- package/appUserBaseSchemaProperty.js +28 -0
- package/appUserBaseSchemaProperty.js.map +1 -1
- package/appUserSchemaProperty.d.ts +80 -54
- package/appUserSchemaProperty.js +26 -0
- package/appUserSchemaProperty.js.map +1 -1
- package/auth/getServer.d.ts +11 -11
- package/auth/getServer.js +2 -2
- package/auth/getServerPolicy.d.ts +9 -15
- package/auth/getServerPolicy.js +2 -2
- package/auth/getServerPolicy.js.map +1 -1
- package/auth/getServerScopes.d.ts +5 -8
- package/auth/getServerScopes.js +2 -2
- package/auth/getServerScopes.js.map +1 -1
- package/auth/server.d.ts +49 -13
- package/auth/server.js +27 -0
- package/auth/server.js.map +1 -1
- package/auth/serverClaim.d.ts +54 -18
- package/auth/serverClaim.js +27 -0
- package/auth/serverClaim.js.map +1 -1
- package/auth/serverPolicy.d.ts +43 -6
- package/auth/serverPolicy.js +28 -0
- package/auth/serverPolicy.js.map +1 -1
- package/auth/serverPolicyRule.d.ts +72 -29
- package/auth/serverPolicyRule.js +25 -0
- package/auth/serverPolicyRule.js.map +1 -1
- package/auth/serverScope.d.ts +41 -15
- package/auth/serverScope.js +26 -0
- package/auth/serverScope.js.map +1 -1
- package/authServerClaimDefault.d.ts +50 -13
- package/authServerClaimDefault.js +31 -0
- package/authServerClaimDefault.js.map +1 -1
- package/authServerDefault.d.ts +47 -13
- package/authServerDefault.js +25 -0
- package/authServerDefault.js.map +1 -1
- package/authenticator.d.ts +94 -38
- package/authenticator.js +38 -0
- package/authenticator.js.map +1 -1
- package/behaviour.d.ts +78 -18
- package/behaviour.js +42 -0
- package/behaviour.js.map +1 -1
- package/brand.d.ts +28 -19
- package/brand.js +10 -1
- package/brand.js.map +1 -1
- package/captcha.d.ts +38 -12
- package/captcha.js +26 -0
- package/captcha.js.map +1 -1
- package/captchaOrgWideSettings.d.ts +51 -6
- package/captchaOrgWideSettings.js +45 -0
- package/captchaOrgWideSettings.js.map +1 -1
- package/domain.d.ts +39 -13
- package/domain.js +20 -0
- package/domain.js.map +1 -1
- package/domainCertificate.d.ts +63 -15
- package/domainCertificate.js +48 -0
- package/domainCertificate.js.map +1 -1
- package/domainVerification.d.ts +22 -3
- package/domainVerification.js +19 -0
- package/domainVerification.js.map +1 -1
- package/emailCustomization.d.ts +224 -3
- package/emailCustomization.js +41 -0
- package/emailCustomization.js.map +1 -1
- package/emailSender.d.ts +39 -13
- package/emailSender.js +26 -0
- package/emailSender.js.map +1 -1
- package/emailSenderVerification.d.ts +26 -3
- package/emailSenderVerification.js +23 -0
- package/emailSenderVerification.js.map +1 -1
- package/eventHook.d.ts +37 -0
- package/eventHook.js +37 -0
- package/eventHook.js.map +1 -1
- package/eventHookVerification.d.ts +37 -3
- package/eventHookVerification.js +34 -0
- package/eventHookVerification.js.map +1 -1
- package/factor/factor.d.ts +23 -6
- package/factor/factor.js +14 -0
- package/factor/factor.js.map +1 -1
- package/factorTotp.d.ts +44 -12
- package/factorTotp.js +23 -0
- package/factorTotp.js.map +1 -1
- package/getAppGroupAssignments.d.ts +6 -6
- package/getAppGroupAssignments.js +2 -2
- package/getAppSignonPolicy.d.ts +6 -16
- package/getAppSignonPolicy.js +4 -8
- package/getAppSignonPolicy.js.map +1 -1
- package/getAppUserAssignments.d.ts +6 -6
- package/getAppUserAssignments.js +2 -2
- package/getAuthServerClaim.d.ts +12 -15
- package/getAuthServerClaim.js +2 -2
- package/getAuthServerClaim.js.map +1 -1
- package/getAuthServerClaims.d.ts +5 -8
- package/getAuthServerClaims.js +2 -2
- package/getAuthServerClaims.js.map +1 -1
- package/getAuthenticator.d.ts +26 -24
- package/getAuthenticator.js +22 -14
- package/getAuthenticator.js.map +1 -1
- package/getBehaviour.d.ts +8 -6
- package/getBehaviour.js +2 -2
- package/getBehaviour.js.map +1 -1
- package/getBehaviours.d.ts +7 -7
- package/getBehaviours.js +2 -2
- package/getBrand.d.ts +6 -9
- package/getBrand.js +2 -2
- package/getBrand.js.map +1 -1
- package/getBrands.d.ts +2 -2
- package/getBrands.js +2 -2
- package/getEmailCustomization.d.ts +9 -14
- package/getEmailCustomization.js +6 -2
- package/getEmailCustomization.js.map +1 -1
- package/getEmailCustomizations.d.ts +9 -11
- package/getEmailCustomizations.js +6 -2
- package/getEmailCustomizations.js.map +1 -1
- package/getGroups.d.ts +25 -11
- package/getGroups.js +2 -2
- package/getGroups.js.map +1 -1
- package/getNetworkZone.d.ts +12 -12
- package/getNetworkZone.js +2 -2
- package/getRoleSubscription.d.ts +35 -13
- package/getRoleSubscription.js +2 -2
- package/getRoleSubscription.js.map +1 -1
- package/getTemplate.d.ts +8 -10
- package/getTemplate.js +6 -2
- package/getTemplate.js.map +1 -1
- package/getTemplates.d.ts +7 -6
- package/getTemplates.js +6 -2
- package/getTemplates.js.map +1 -1
- package/getTheme.d.ts +12 -14
- package/getTheme.js +6 -2
- package/getTheme.js.map +1 -1
- package/getThemes.d.ts +7 -6
- package/getThemes.js +6 -2
- package/getThemes.js.map +1 -1
- package/getTrustedOrigins.d.ts +4 -7
- package/getTrustedOrigins.js +2 -2
- package/getTrustedOrigins.js.map +1 -1
- package/getUserSecurityQuestions.d.ts +8 -4
- package/getUserSecurityQuestions.js +4 -0
- package/getUserSecurityQuestions.js.map +1 -1
- package/group/getEveryoneGroup.d.ts +5 -10
- package/group/getEveryoneGroup.js +2 -4
- package/group/getEveryoneGroup.js.map +1 -1
- package/group/getGroup.d.ts +26 -17
- package/group/getGroup.js +2 -2
- package/group/getGroup.js.map +1 -1
- package/group/getRule.d.ts +15 -6
- package/group/getRule.js +2 -2
- package/group/getRule.js.map +1 -1
- package/group/group.d.ts +46 -9
- package/group/group.js +37 -0
- package/group/group.js.map +1 -1
- package/group/role.d.ts +101 -15
- package/group/role.js +26 -0
- package/group/role.js.map +1 -1
- package/group/rule.d.ts +80 -6
- package/group/rule.js +23 -0
- package/group/rule.js.map +1 -1
- package/groupMemberships.d.ts +48 -7
- package/groupMemberships.js +42 -1
- package/groupMemberships.js.map +1 -1
- package/groupSchemaProperty.d.ts +94 -51
- package/groupSchemaProperty.js +25 -0
- package/groupSchemaProperty.js.map +1 -1
- package/idp/getMetadataSaml.d.ts +6 -9
- package/idp/getMetadataSaml.js +2 -2
- package/idp/getMetadataSaml.js.map +1 -1
- package/idp/getOidc.d.ts +9 -9
- package/idp/getOidc.js +2 -2
- package/idp/getSaml.d.ts +13 -16
- package/idp/getSaml.js +2 -2
- package/idp/getSaml.js.map +1 -1
- package/idp/getSocial.d.ts +2 -8
- package/idp/getSocial.js +2 -2
- package/idp/getSocial.js.map +1 -1
- package/idp/oidc.d.ts +297 -12
- package/idp/oidc.js +36 -0
- package/idp/oidc.js.map +1 -1
- package/idp/saml.d.ts +284 -18
- package/idp/saml.js +32 -0
- package/idp/saml.js.map +1 -1
- package/idp/samlKey.d.ts +48 -3
- package/idp/samlKey.js +9 -0
- package/idp/samlKey.js.map +1 -1
- package/idp/social.d.ts +251 -18
- package/idp/social.js +32 -0
- package/idp/social.js.map +1 -1
- package/index/emailDomain.d.ts +41 -16
- package/index/emailDomain.js +25 -0
- package/index/emailDomain.js.map +1 -1
- package/index/emailDomainVerification.d.ts +25 -3
- package/index/emailDomainVerification.js +22 -0
- package/index/emailDomainVerification.js.map +1 -1
- package/index/getDomain.d.ts +14 -11
- package/index/getDomain.js +8 -2
- package/index/getDomain.js.map +1 -1
- package/inline/hook.d.ts +89 -0
- package/inline/hook.js +35 -0
- package/inline/hook.js.map +1 -1
- package/linkDefinition.d.ts +30 -0
- package/linkDefinition.js +30 -0
- package/linkDefinition.js.map +1 -1
- package/linkValue.d.ts +59 -6
- package/linkValue.js +53 -0
- package/linkValue.js.map +1 -1
- package/network/zone.d.ts +74 -27
- package/network/zone.js +44 -0
- package/network/zone.js.map +1 -1
- package/orgConfiguration.d.ts +25 -0
- package/orgConfiguration.js +25 -0
- package/orgConfiguration.js.map +1 -1
- package/orgSupport.d.ts +20 -3
- package/orgSupport.js +17 -0
- package/orgSupport.js.map +1 -1
- package/package.json +1 -1
- package/policy/getDefaultPolicy.d.ts +7 -9
- package/policy/getDefaultPolicy.js +2 -6
- package/policy/getDefaultPolicy.js.map +1 -1
- package/policy/getPolicy.d.ts +10 -11
- package/policy/getPolicy.js +2 -2
- package/policy/getPolicy.js.map +1 -1
- package/policy/mfa.d.ts +259 -18
- package/policy/mfa.js +49 -0
- package/policy/mfa.js.map +1 -1
- package/policy/password.d.ts +117 -90
- package/policy/password.js +27 -0
- package/policy/password.js.map +1 -1
- package/policy/ruleIdpDiscovery.d.ts +149 -27
- package/policy/ruleIdpDiscovery.js +65 -0
- package/policy/ruleIdpDiscovery.js.map +1 -1
- package/policy/ruleMfa.d.ts +35 -24
- package/policy/ruleMfa.js +11 -0
- package/policy/ruleMfa.js.map +1 -1
- package/policy/rulePassword.d.ts +46 -33
- package/policy/rulePassword.js +13 -0
- package/policy/rulePassword.js.map +1 -1
- package/policy/ruleSignon.d.ts +170 -57
- package/policy/ruleSignon.js +92 -0
- package/policy/ruleSignon.js.map +1 -1
- package/policy/signon.d.ts +41 -15
- package/policy/signon.js +26 -0
- package/policy/signon.js.map +1 -1
- package/policyMfaDefault.d.ts +250 -13
- package/policyMfaDefault.js +45 -0
- package/policyMfaDefault.js.map +1 -1
- package/policyPasswordDefault.d.ts +88 -54
- package/policyPasswordDefault.js +22 -0
- package/policyPasswordDefault.js.map +1 -1
- package/policyProfileEnrollment.d.ts +28 -6
- package/policyProfileEnrollment.js +22 -0
- package/policyProfileEnrollment.js.map +1 -1
- package/policyProfileEnrollmentApps.d.ts +42 -5
- package/policyProfileEnrollmentApps.js +37 -0
- package/policyProfileEnrollmentApps.js.map +1 -1
- package/policyRuleProfileEnrollment.d.ts +88 -26
- package/policyRuleProfileEnrollment.js +62 -0
- package/policyRuleProfileEnrollment.js.map +1 -1
- package/profile/mapping.d.ts +95 -9
- package/profile/mapping.js +41 -0
- package/profile/mapping.js.map +1 -1
- package/rateLimiting.d.ts +43 -9
- package/rateLimiting.js +28 -0
- package/rateLimiting.js.map +1 -1
- package/resourceSet.d.ts +32 -10
- package/resourceSet.js +20 -1
- package/resourceSet.js.map +1 -1
- package/roleSubscription.d.ts +110 -9
- package/roleSubscription.js +26 -0
- package/roleSubscription.js.map +1 -1
- package/securityNotificationEmails.d.ts +45 -15
- package/securityNotificationEmails.js +30 -0
- package/securityNotificationEmails.js.map +1 -1
- package/templateSms.d.ts +47 -3
- package/templateSms.js +35 -0
- package/templateSms.js.map +1 -1
- package/theme.d.ts +59 -44
- package/theme.js +15 -0
- package/theme.js.map +1 -1
- package/threatInsightSettings.d.ts +58 -6
- package/threatInsightSettings.js +34 -0
- package/threatInsightSettings.js.map +1 -1
- package/trustedorigin/origin.d.ts +37 -12
- package/trustedorigin/origin.js +25 -0
- package/trustedorigin/origin.js.map +1 -1
- package/types/input.d.ts +227 -60
- package/types/output.d.ts +446 -56
- package/user/getUser.d.ts +104 -32
- package/user/getUser.js +2 -2
- package/user/getUser.js.map +1 -1
- package/user/getUserProfileMappingSource.d.ts +7 -9
- package/user/getUserProfileMappingSource.js +4 -6
- package/user/getUserProfileMappingSource.js.map +1 -1
- package/user/getUserType.d.ts +7 -7
- package/user/getUserType.js +2 -2
- package/user/getUsers.d.ts +57 -61
- package/user/getUsers.js +44 -30
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +215 -117
- package/user/user.js +71 -0
- package/user/user.js.map +1 -1
- package/user/userType.d.ts +34 -9
- package/user/userType.js +25 -0
- package/user/userType.js.map +1 -1
- package/userAdminRoles.d.ts +41 -10
- package/userAdminRoles.js +29 -1
- package/userAdminRoles.js.map +1 -1
- package/userBaseSchemaProperty.d.ts +67 -24
- package/userBaseSchemaProperty.js +43 -0
- package/userBaseSchemaProperty.js.map +1 -1
- package/userFactorQuestion.d.ts +52 -14
- package/userFactorQuestion.js +39 -1
- package/userFactorQuestion.js.map +1 -1
- package/userGroupMemberships.d.ts +23 -4
- package/userGroupMemberships.js +20 -1
- package/userGroupMemberships.js.map +1 -1
- package/userSchemaProperty.d.ts +107 -57
- package/userSchemaProperty.js +32 -0
- package/userSchemaProperty.js.map +1 -1
- package/utilities.d.ts +4 -0
- package/utilities.js +33 -1
- package/utilities.js.map +1 -1
|
@@ -6,9 +6,7 @@ exports.getDefaultPolicyOutput = exports.getDefaultPolicy = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
-
* Use this data source to retrieve a default policy from Okta. This
|
|
10
|
-
* same thing can be achieved using the `okta.policy.getPolicy` with default
|
|
11
|
-
* names, this is simply a shortcut.
|
|
9
|
+
* Use this data source to retrieve a default policy from Okta. This same thing can be achieved using the `okta.policy.getPolicy` with default names, this is simply a shortcut.
|
|
12
10
|
*
|
|
13
11
|
* ## Example Usage
|
|
14
12
|
*
|
|
@@ -29,9 +27,7 @@ function getDefaultPolicy(args, opts) {
|
|
|
29
27
|
}
|
|
30
28
|
exports.getDefaultPolicy = getDefaultPolicy;
|
|
31
29
|
/**
|
|
32
|
-
* Use this data source to retrieve a default policy from Okta. This
|
|
33
|
-
* same thing can be achieved using the `okta.policy.getPolicy` with default
|
|
34
|
-
* names, this is simply a shortcut.
|
|
30
|
+
* Use this data source to retrieve a default policy from Okta. This same thing can be achieved using the `okta.policy.getPolicy` with default names, this is simply a shortcut.
|
|
35
31
|
*
|
|
36
32
|
* ## Example Usage
|
|
37
33
|
*
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getDefaultPolicy.js","sourceRoot":"","sources":["../../policy/getDefaultPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"getDefaultPolicy.js","sourceRoot":"","sources":["../../policy/getDefaultPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;GAaG;AACH,SAAgB,gBAAgB,CAAC,IAA0B,EAAE,IAA2B;IAEpF,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,+CAA+C,EAAE;QAC1E,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAND,4CAMC;AA0BD;;;;;;;;;;;;;GAaG;AACH,SAAgB,sBAAsB,CAAC,IAAgC,EAAE,IAA2B;IAChG,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,gBAAgB,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AAC3E,CAAC;AAFD,wDAEC"}
|
package/policy/getPolicy.d.ts
CHANGED
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
3
|
+
* Use this data source to retrieve a policy from Okta.
|
|
4
4
|
*
|
|
5
5
|
* ## Example Usage
|
|
6
6
|
*
|
|
@@ -20,11 +20,12 @@ export declare function getPolicy(args: GetPolicyArgs, opts?: pulumi.InvokeOptio
|
|
|
20
20
|
*/
|
|
21
21
|
export interface GetPolicyArgs {
|
|
22
22
|
/**
|
|
23
|
-
* Name of
|
|
23
|
+
* Name of policy to retrieve.
|
|
24
24
|
*/
|
|
25
25
|
name: string;
|
|
26
26
|
/**
|
|
27
|
-
*
|
|
27
|
+
* Type of policy to retrieve. See https://developer.okta.com/docs/reference/api/policy/#policy-object for valid values. Currently:
|
|
28
|
+
* - All:
|
|
28
29
|
*/
|
|
29
30
|
type: string;
|
|
30
31
|
}
|
|
@@ -37,20 +38,17 @@ export interface GetPolicyResult {
|
|
|
37
38
|
*/
|
|
38
39
|
readonly id: string;
|
|
39
40
|
/**
|
|
40
|
-
*
|
|
41
|
+
* name of policy.
|
|
41
42
|
*/
|
|
42
43
|
readonly name: string;
|
|
43
|
-
/**
|
|
44
|
-
* Status of the policy
|
|
45
|
-
*/
|
|
46
44
|
readonly status: string;
|
|
47
45
|
/**
|
|
48
|
-
*
|
|
46
|
+
* type of policy.
|
|
49
47
|
*/
|
|
50
48
|
readonly type: string;
|
|
51
49
|
}
|
|
52
50
|
/**
|
|
53
|
-
*
|
|
51
|
+
* Use this data source to retrieve a policy from Okta.
|
|
54
52
|
*
|
|
55
53
|
* ## Example Usage
|
|
56
54
|
*
|
|
@@ -70,11 +68,12 @@ export declare function getPolicyOutput(args: GetPolicyOutputArgs, opts?: pulumi
|
|
|
70
68
|
*/
|
|
71
69
|
export interface GetPolicyOutputArgs {
|
|
72
70
|
/**
|
|
73
|
-
* Name of
|
|
71
|
+
* Name of policy to retrieve.
|
|
74
72
|
*/
|
|
75
73
|
name: pulumi.Input<string>;
|
|
76
74
|
/**
|
|
77
|
-
*
|
|
75
|
+
* Type of policy to retrieve. See https://developer.okta.com/docs/reference/api/policy/#policy-object for valid values. Currently:
|
|
76
|
+
* - All:
|
|
78
77
|
*/
|
|
79
78
|
type: pulumi.Input<string>;
|
|
80
79
|
}
|
package/policy/getPolicy.js
CHANGED
|
@@ -6,7 +6,7 @@ exports.getPolicyOutput = exports.getPolicy = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
9
|
+
* Use this data source to retrieve a policy from Okta.
|
|
10
10
|
*
|
|
11
11
|
* ## Example Usage
|
|
12
12
|
*
|
|
@@ -29,7 +29,7 @@ function getPolicy(args, opts) {
|
|
|
29
29
|
}
|
|
30
30
|
exports.getPolicy = getPolicy;
|
|
31
31
|
/**
|
|
32
|
-
*
|
|
32
|
+
* Use this data source to retrieve a policy from Okta.
|
|
33
33
|
*
|
|
34
34
|
* ## Example Usage
|
|
35
35
|
*
|
package/policy/getPolicy.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"getPolicy.js","sourceRoot":"","sources":["../../policy/getPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;GAcG;AACH,SAAgB,SAAS,CAAC,IAAmB,EAAE,IAA2B;IAEtE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,iCAAiC,EAAE;QAC5D,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,8BAOC;
|
|
1
|
+
{"version":3,"file":"getPolicy.js","sourceRoot":"","sources":["../../policy/getPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;GAcG;AACH,SAAgB,SAAS,CAAC,IAAmB,EAAE,IAA2B;IAEtE,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,IAAI,EAAE,CAAC,CAAC;IACzE,OAAO,MAAM,CAAC,OAAO,CAAC,MAAM,CAAC,iCAAiC,EAAE;QAC5D,MAAM,EAAE,IAAI,CAAC,IAAI;QACjB,MAAM,EAAE,IAAI,CAAC,IAAI;KACpB,EAAE,IAAI,CAAC,CAAC;AACb,CAAC;AAPD,8BAOC;AAmCD;;;;;;;;;;;;;;GAcG;AACH,SAAgB,eAAe,CAAC,IAAyB,EAAE,IAA2B;IAClF,OAAO,MAAM,CAAC,MAAM,CAAC,IAAI,CAAC,CAAC,KAAK,CAAC,CAAC,CAAM,EAAE,EAAE,CAAC,SAAS,CAAC,CAAC,EAAE,IAAI,CAAC,CAAC,CAAA;AACpE,CAAC;AAFD,0CAEC"}
|
package/policy/mfa.d.ts
CHANGED
|
@@ -1,4 +1,53 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
|
+
/**
|
|
3
|
+
* Creates an MFA Policy.
|
|
4
|
+
*
|
|
5
|
+
* This resource allows you to create and configure an MFA Policy.
|
|
6
|
+
*
|
|
7
|
+
* > Requires Org Feature Flag `OKTA_MFA_POLICY`. Contact support to have this feature flag ***enabled***.
|
|
8
|
+
*
|
|
9
|
+
* > Unless Org Feature Flag `ENG_ENABLE_OPTIONAL_PASSWORD_ENROLLMENT` is ***disabled*** `oktaPassword` or `oktaEmail` must be present and its `enroll` value set to `REQUIRED`. Contact support to have this feature flag ***disabled***.
|
|
10
|
+
*
|
|
11
|
+
* ## Example Usage
|
|
12
|
+
*
|
|
13
|
+
* ```typescript
|
|
14
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
+
* import * as okta from "@pulumi/okta";
|
|
16
|
+
*
|
|
17
|
+
* const classicExample = new okta.policy.Mfa("classicExample", {
|
|
18
|
+
* description: "Example MFA policy using Okta Classic engine with factors.",
|
|
19
|
+
* groupsIncludeds: [data.okta_group.everyone.id],
|
|
20
|
+
* isOie: false,
|
|
21
|
+
* oktaOtp: {
|
|
22
|
+
* enroll: "REQUIRED",
|
|
23
|
+
* },
|
|
24
|
+
* oktaPassword: {
|
|
25
|
+
* enroll: "REQUIRED",
|
|
26
|
+
* },
|
|
27
|
+
* status: "ACTIVE",
|
|
28
|
+
* });
|
|
29
|
+
* const oieExample = new okta.policy.Mfa("oieExample", {
|
|
30
|
+
* description: "Example MFA policy that uses Okta Identity Engine (OIE) with authenticators",
|
|
31
|
+
* groupsIncludeds: [data.okta_group.everyone.id],
|
|
32
|
+
* isOie: true,
|
|
33
|
+
* oktaPassword: {
|
|
34
|
+
* enroll: "REQUIRED",
|
|
35
|
+
* },
|
|
36
|
+
* oktaVerify: {
|
|
37
|
+
* enroll: "REQUIRED",
|
|
38
|
+
* },
|
|
39
|
+
* status: "ACTIVE",
|
|
40
|
+
* });
|
|
41
|
+
* ```
|
|
42
|
+
*
|
|
43
|
+
* ## Import
|
|
44
|
+
*
|
|
45
|
+
* An MFA Policy can be imported via the Okta ID.
|
|
46
|
+
*
|
|
47
|
+
* ```sh
|
|
48
|
+
* $ pulumi import okta:policy/mfa:Mfa example <policy id>
|
|
49
|
+
* ```
|
|
50
|
+
*/
|
|
2
51
|
export declare class Mfa extends pulumi.CustomResource {
|
|
3
52
|
/**
|
|
4
53
|
* Get an existing Mfa resource's state with the given name, ID, and optional extra
|
|
@@ -16,89 +65,153 @@ export declare class Mfa extends pulumi.CustomResource {
|
|
|
16
65
|
*/
|
|
17
66
|
static isInstance(obj: any): obj is Mfa;
|
|
18
67
|
/**
|
|
19
|
-
* Policy Description
|
|
68
|
+
* Policy Description.
|
|
20
69
|
*/
|
|
21
70
|
readonly description: pulumi.Output<string | undefined>;
|
|
71
|
+
/**
|
|
72
|
+
* DUO MFA policy settings (✓ Classic, ✓ OIE).
|
|
73
|
+
*/
|
|
22
74
|
readonly duo: pulumi.Output<{
|
|
23
75
|
[key: string]: string;
|
|
24
76
|
} | undefined>;
|
|
77
|
+
/**
|
|
78
|
+
* External IDP MFA policy settings (✓ OIE).
|
|
79
|
+
*/
|
|
25
80
|
readonly externalIdp: pulumi.Output<{
|
|
26
81
|
[key: string]: string;
|
|
27
82
|
} | undefined>;
|
|
83
|
+
/**
|
|
84
|
+
* Fido U2F MFA policy settings (✓ Classic).
|
|
85
|
+
*/
|
|
28
86
|
readonly fidoU2f: pulumi.Output<{
|
|
29
87
|
[key: string]: string;
|
|
30
88
|
} | undefined>;
|
|
89
|
+
/**
|
|
90
|
+
* Fido Web Authn MFA policy settings (✓ Classic).
|
|
91
|
+
*/
|
|
31
92
|
readonly fidoWebauthn: pulumi.Output<{
|
|
32
93
|
[key: string]: string;
|
|
33
94
|
} | undefined>;
|
|
95
|
+
/**
|
|
96
|
+
* Google OTP MFA policy settings (✓ Classic, ✓ OIE).
|
|
97
|
+
*/
|
|
34
98
|
readonly googleOtp: pulumi.Output<{
|
|
35
99
|
[key: string]: string;
|
|
36
100
|
} | undefined>;
|
|
37
101
|
/**
|
|
38
|
-
* List of Group IDs to Include
|
|
102
|
+
* List of Group IDs to Include.
|
|
39
103
|
*/
|
|
40
104
|
readonly groupsIncludeds: pulumi.Output<string[] | undefined>;
|
|
105
|
+
/**
|
|
106
|
+
* HMAC-based One-Time Password MFA policy settings (✓ Classic).
|
|
107
|
+
*/
|
|
41
108
|
readonly hotp: pulumi.Output<{
|
|
42
109
|
[key: string]: string;
|
|
43
110
|
} | undefined>;
|
|
44
111
|
/**
|
|
45
|
-
*
|
|
112
|
+
* Boolean that specifies whether to use the newer Okta Identity Engine (OIE) with policy authenticators instead of the classic engine with Factors. This value determines which of the following policy factor settings can be configured. (Default = `false`)
|
|
113
|
+
* > **WARNING:** Tenant must have the Okta Identity Engine enabled in order to use this feature.
|
|
46
114
|
*/
|
|
47
115
|
readonly isOie: pulumi.Output<boolean | undefined>;
|
|
48
116
|
/**
|
|
49
|
-
* Policy Name
|
|
117
|
+
* Policy Name.
|
|
50
118
|
*/
|
|
51
119
|
readonly name: pulumi.Output<string>;
|
|
120
|
+
/**
|
|
121
|
+
* Okta Call MFA policy settings (✓ Classic).
|
|
122
|
+
*/
|
|
52
123
|
readonly oktaCall: pulumi.Output<{
|
|
53
124
|
[key: string]: string;
|
|
54
125
|
} | undefined>;
|
|
126
|
+
/**
|
|
127
|
+
* Okta Email MFA policy settings (✓ Classic, ✓ OIE).
|
|
128
|
+
*/
|
|
55
129
|
readonly oktaEmail: pulumi.Output<{
|
|
56
130
|
[key: string]: string;
|
|
57
131
|
} | undefined>;
|
|
132
|
+
/**
|
|
133
|
+
* Okta OTP (via the Okta Verify app) MFA policy settings (✓ Classic).
|
|
134
|
+
*/
|
|
58
135
|
readonly oktaOtp: pulumi.Output<{
|
|
59
136
|
[key: string]: string;
|
|
60
137
|
} | undefined>;
|
|
138
|
+
/**
|
|
139
|
+
* Okta Password MFA policy settings (✓ Classic, ✓ OIE).
|
|
140
|
+
*/
|
|
61
141
|
readonly oktaPassword: pulumi.Output<{
|
|
62
142
|
[key: string]: string;
|
|
63
143
|
} | undefined>;
|
|
144
|
+
/**
|
|
145
|
+
* Okta Push MFA policy settings (✓ Classic).
|
|
146
|
+
*/
|
|
64
147
|
readonly oktaPush: pulumi.Output<{
|
|
65
148
|
[key: string]: string;
|
|
66
149
|
} | undefined>;
|
|
150
|
+
/**
|
|
151
|
+
* Okta Question MFA policy settings (✓ Classic).
|
|
152
|
+
*/
|
|
67
153
|
readonly oktaQuestion: pulumi.Output<{
|
|
68
154
|
[key: string]: string;
|
|
69
155
|
} | undefined>;
|
|
156
|
+
/**
|
|
157
|
+
* Okta SMS MFA policy settings (✓ Classic).
|
|
158
|
+
*/
|
|
70
159
|
readonly oktaSms: pulumi.Output<{
|
|
71
160
|
[key: string]: string;
|
|
72
161
|
} | undefined>;
|
|
162
|
+
/**
|
|
163
|
+
* Okta Verify MFA policy settings (✓ OIE).
|
|
164
|
+
*/
|
|
73
165
|
readonly oktaVerify: pulumi.Output<{
|
|
74
166
|
[key: string]: string;
|
|
75
167
|
} | undefined>;
|
|
168
|
+
/**
|
|
169
|
+
* On-Prem MFA MFA policy settings (✓ OIE).
|
|
170
|
+
*/
|
|
76
171
|
readonly onpremMfa: pulumi.Output<{
|
|
77
172
|
[key: string]: string;
|
|
78
173
|
} | undefined>;
|
|
174
|
+
/**
|
|
175
|
+
* Phone Number MFA policy settings (✓ OIE).
|
|
176
|
+
*/
|
|
79
177
|
readonly phoneNumber: pulumi.Output<{
|
|
80
178
|
[key: string]: string;
|
|
81
179
|
} | undefined>;
|
|
82
180
|
/**
|
|
83
|
-
*
|
|
181
|
+
* Priority of the policy.
|
|
84
182
|
*/
|
|
85
183
|
readonly priority: pulumi.Output<number | undefined>;
|
|
184
|
+
/**
|
|
185
|
+
* RSA Token MFA policy settings (✓ Classic, ✓ OIE).
|
|
186
|
+
*/
|
|
86
187
|
readonly rsaToken: pulumi.Output<{
|
|
87
188
|
[key: string]: string;
|
|
88
189
|
} | undefined>;
|
|
190
|
+
/**
|
|
191
|
+
* Security Question MFA policy settings (✓ OIE).
|
|
192
|
+
*/
|
|
89
193
|
readonly securityQuestion: pulumi.Output<{
|
|
90
194
|
[key: string]: string;
|
|
91
195
|
} | undefined>;
|
|
92
196
|
/**
|
|
93
|
-
* Policy Status: ACTIVE or INACTIVE
|
|
197
|
+
* Policy Status: `"ACTIVE"` or `"INACTIVE"`.
|
|
94
198
|
*/
|
|
95
199
|
readonly status: pulumi.Output<string | undefined>;
|
|
200
|
+
/**
|
|
201
|
+
* Symantec VIP MFA policy settings (✓ Classic).
|
|
202
|
+
*/
|
|
96
203
|
readonly symantecVip: pulumi.Output<{
|
|
97
204
|
[key: string]: string;
|
|
98
205
|
} | undefined>;
|
|
206
|
+
/**
|
|
207
|
+
* FIDO2 (WebAuthn) MFA policy settings (✓ OIE).
|
|
208
|
+
*/
|
|
99
209
|
readonly webauthn: pulumi.Output<{
|
|
100
210
|
[key: string]: string;
|
|
101
211
|
} | undefined>;
|
|
212
|
+
/**
|
|
213
|
+
* Yubikey Token MFA policy settings (✓ Classic, ✓ OIE).
|
|
214
|
+
*/
|
|
102
215
|
readonly yubikeyToken: pulumi.Output<{
|
|
103
216
|
[key: string]: string;
|
|
104
217
|
} | undefined>;
|
|
@@ -116,89 +229,153 @@ export declare class Mfa extends pulumi.CustomResource {
|
|
|
116
229
|
*/
|
|
117
230
|
export interface MfaState {
|
|
118
231
|
/**
|
|
119
|
-
* Policy Description
|
|
232
|
+
* Policy Description.
|
|
120
233
|
*/
|
|
121
234
|
description?: pulumi.Input<string>;
|
|
235
|
+
/**
|
|
236
|
+
* DUO MFA policy settings (✓ Classic, ✓ OIE).
|
|
237
|
+
*/
|
|
122
238
|
duo?: pulumi.Input<{
|
|
123
239
|
[key: string]: pulumi.Input<string>;
|
|
124
240
|
}>;
|
|
241
|
+
/**
|
|
242
|
+
* External IDP MFA policy settings (✓ OIE).
|
|
243
|
+
*/
|
|
125
244
|
externalIdp?: pulumi.Input<{
|
|
126
245
|
[key: string]: pulumi.Input<string>;
|
|
127
246
|
}>;
|
|
247
|
+
/**
|
|
248
|
+
* Fido U2F MFA policy settings (✓ Classic).
|
|
249
|
+
*/
|
|
128
250
|
fidoU2f?: pulumi.Input<{
|
|
129
251
|
[key: string]: pulumi.Input<string>;
|
|
130
252
|
}>;
|
|
253
|
+
/**
|
|
254
|
+
* Fido Web Authn MFA policy settings (✓ Classic).
|
|
255
|
+
*/
|
|
131
256
|
fidoWebauthn?: pulumi.Input<{
|
|
132
257
|
[key: string]: pulumi.Input<string>;
|
|
133
258
|
}>;
|
|
259
|
+
/**
|
|
260
|
+
* Google OTP MFA policy settings (✓ Classic, ✓ OIE).
|
|
261
|
+
*/
|
|
134
262
|
googleOtp?: pulumi.Input<{
|
|
135
263
|
[key: string]: pulumi.Input<string>;
|
|
136
264
|
}>;
|
|
137
265
|
/**
|
|
138
|
-
* List of Group IDs to Include
|
|
266
|
+
* List of Group IDs to Include.
|
|
139
267
|
*/
|
|
140
268
|
groupsIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
269
|
+
/**
|
|
270
|
+
* HMAC-based One-Time Password MFA policy settings (✓ Classic).
|
|
271
|
+
*/
|
|
141
272
|
hotp?: pulumi.Input<{
|
|
142
273
|
[key: string]: pulumi.Input<string>;
|
|
143
274
|
}>;
|
|
144
275
|
/**
|
|
145
|
-
*
|
|
276
|
+
* Boolean that specifies whether to use the newer Okta Identity Engine (OIE) with policy authenticators instead of the classic engine with Factors. This value determines which of the following policy factor settings can be configured. (Default = `false`)
|
|
277
|
+
* > **WARNING:** Tenant must have the Okta Identity Engine enabled in order to use this feature.
|
|
146
278
|
*/
|
|
147
279
|
isOie?: pulumi.Input<boolean>;
|
|
148
280
|
/**
|
|
149
|
-
* Policy Name
|
|
281
|
+
* Policy Name.
|
|
150
282
|
*/
|
|
151
283
|
name?: pulumi.Input<string>;
|
|
284
|
+
/**
|
|
285
|
+
* Okta Call MFA policy settings (✓ Classic).
|
|
286
|
+
*/
|
|
152
287
|
oktaCall?: pulumi.Input<{
|
|
153
288
|
[key: string]: pulumi.Input<string>;
|
|
154
289
|
}>;
|
|
290
|
+
/**
|
|
291
|
+
* Okta Email MFA policy settings (✓ Classic, ✓ OIE).
|
|
292
|
+
*/
|
|
155
293
|
oktaEmail?: pulumi.Input<{
|
|
156
294
|
[key: string]: pulumi.Input<string>;
|
|
157
295
|
}>;
|
|
296
|
+
/**
|
|
297
|
+
* Okta OTP (via the Okta Verify app) MFA policy settings (✓ Classic).
|
|
298
|
+
*/
|
|
158
299
|
oktaOtp?: pulumi.Input<{
|
|
159
300
|
[key: string]: pulumi.Input<string>;
|
|
160
301
|
}>;
|
|
302
|
+
/**
|
|
303
|
+
* Okta Password MFA policy settings (✓ Classic, ✓ OIE).
|
|
304
|
+
*/
|
|
161
305
|
oktaPassword?: pulumi.Input<{
|
|
162
306
|
[key: string]: pulumi.Input<string>;
|
|
163
307
|
}>;
|
|
308
|
+
/**
|
|
309
|
+
* Okta Push MFA policy settings (✓ Classic).
|
|
310
|
+
*/
|
|
164
311
|
oktaPush?: pulumi.Input<{
|
|
165
312
|
[key: string]: pulumi.Input<string>;
|
|
166
313
|
}>;
|
|
314
|
+
/**
|
|
315
|
+
* Okta Question MFA policy settings (✓ Classic).
|
|
316
|
+
*/
|
|
167
317
|
oktaQuestion?: pulumi.Input<{
|
|
168
318
|
[key: string]: pulumi.Input<string>;
|
|
169
319
|
}>;
|
|
320
|
+
/**
|
|
321
|
+
* Okta SMS MFA policy settings (✓ Classic).
|
|
322
|
+
*/
|
|
170
323
|
oktaSms?: pulumi.Input<{
|
|
171
324
|
[key: string]: pulumi.Input<string>;
|
|
172
325
|
}>;
|
|
326
|
+
/**
|
|
327
|
+
* Okta Verify MFA policy settings (✓ OIE).
|
|
328
|
+
*/
|
|
173
329
|
oktaVerify?: pulumi.Input<{
|
|
174
330
|
[key: string]: pulumi.Input<string>;
|
|
175
331
|
}>;
|
|
332
|
+
/**
|
|
333
|
+
* On-Prem MFA MFA policy settings (✓ OIE).
|
|
334
|
+
*/
|
|
176
335
|
onpremMfa?: pulumi.Input<{
|
|
177
336
|
[key: string]: pulumi.Input<string>;
|
|
178
337
|
}>;
|
|
338
|
+
/**
|
|
339
|
+
* Phone Number MFA policy settings (✓ OIE).
|
|
340
|
+
*/
|
|
179
341
|
phoneNumber?: pulumi.Input<{
|
|
180
342
|
[key: string]: pulumi.Input<string>;
|
|
181
343
|
}>;
|
|
182
344
|
/**
|
|
183
|
-
*
|
|
345
|
+
* Priority of the policy.
|
|
184
346
|
*/
|
|
185
347
|
priority?: pulumi.Input<number>;
|
|
348
|
+
/**
|
|
349
|
+
* RSA Token MFA policy settings (✓ Classic, ✓ OIE).
|
|
350
|
+
*/
|
|
186
351
|
rsaToken?: pulumi.Input<{
|
|
187
352
|
[key: string]: pulumi.Input<string>;
|
|
188
353
|
}>;
|
|
354
|
+
/**
|
|
355
|
+
* Security Question MFA policy settings (✓ OIE).
|
|
356
|
+
*/
|
|
189
357
|
securityQuestion?: pulumi.Input<{
|
|
190
358
|
[key: string]: pulumi.Input<string>;
|
|
191
359
|
}>;
|
|
192
360
|
/**
|
|
193
|
-
* Policy Status: ACTIVE or INACTIVE
|
|
361
|
+
* Policy Status: `"ACTIVE"` or `"INACTIVE"`.
|
|
194
362
|
*/
|
|
195
363
|
status?: pulumi.Input<string>;
|
|
364
|
+
/**
|
|
365
|
+
* Symantec VIP MFA policy settings (✓ Classic).
|
|
366
|
+
*/
|
|
196
367
|
symantecVip?: pulumi.Input<{
|
|
197
368
|
[key: string]: pulumi.Input<string>;
|
|
198
369
|
}>;
|
|
370
|
+
/**
|
|
371
|
+
* FIDO2 (WebAuthn) MFA policy settings (✓ OIE).
|
|
372
|
+
*/
|
|
199
373
|
webauthn?: pulumi.Input<{
|
|
200
374
|
[key: string]: pulumi.Input<string>;
|
|
201
375
|
}>;
|
|
376
|
+
/**
|
|
377
|
+
* Yubikey Token MFA policy settings (✓ Classic, ✓ OIE).
|
|
378
|
+
*/
|
|
202
379
|
yubikeyToken?: pulumi.Input<{
|
|
203
380
|
[key: string]: pulumi.Input<string>;
|
|
204
381
|
}>;
|
|
@@ -208,89 +385,153 @@ export interface MfaState {
|
|
|
208
385
|
*/
|
|
209
386
|
export interface MfaArgs {
|
|
210
387
|
/**
|
|
211
|
-
* Policy Description
|
|
388
|
+
* Policy Description.
|
|
212
389
|
*/
|
|
213
390
|
description?: pulumi.Input<string>;
|
|
391
|
+
/**
|
|
392
|
+
* DUO MFA policy settings (✓ Classic, ✓ OIE).
|
|
393
|
+
*/
|
|
214
394
|
duo?: pulumi.Input<{
|
|
215
395
|
[key: string]: pulumi.Input<string>;
|
|
216
396
|
}>;
|
|
397
|
+
/**
|
|
398
|
+
* External IDP MFA policy settings (✓ OIE).
|
|
399
|
+
*/
|
|
217
400
|
externalIdp?: pulumi.Input<{
|
|
218
401
|
[key: string]: pulumi.Input<string>;
|
|
219
402
|
}>;
|
|
403
|
+
/**
|
|
404
|
+
* Fido U2F MFA policy settings (✓ Classic).
|
|
405
|
+
*/
|
|
220
406
|
fidoU2f?: pulumi.Input<{
|
|
221
407
|
[key: string]: pulumi.Input<string>;
|
|
222
408
|
}>;
|
|
409
|
+
/**
|
|
410
|
+
* Fido Web Authn MFA policy settings (✓ Classic).
|
|
411
|
+
*/
|
|
223
412
|
fidoWebauthn?: pulumi.Input<{
|
|
224
413
|
[key: string]: pulumi.Input<string>;
|
|
225
414
|
}>;
|
|
415
|
+
/**
|
|
416
|
+
* Google OTP MFA policy settings (✓ Classic, ✓ OIE).
|
|
417
|
+
*/
|
|
226
418
|
googleOtp?: pulumi.Input<{
|
|
227
419
|
[key: string]: pulumi.Input<string>;
|
|
228
420
|
}>;
|
|
229
421
|
/**
|
|
230
|
-
* List of Group IDs to Include
|
|
422
|
+
* List of Group IDs to Include.
|
|
231
423
|
*/
|
|
232
424
|
groupsIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
425
|
+
/**
|
|
426
|
+
* HMAC-based One-Time Password MFA policy settings (✓ Classic).
|
|
427
|
+
*/
|
|
233
428
|
hotp?: pulumi.Input<{
|
|
234
429
|
[key: string]: pulumi.Input<string>;
|
|
235
430
|
}>;
|
|
236
431
|
/**
|
|
237
|
-
*
|
|
432
|
+
* Boolean that specifies whether to use the newer Okta Identity Engine (OIE) with policy authenticators instead of the classic engine with Factors. This value determines which of the following policy factor settings can be configured. (Default = `false`)
|
|
433
|
+
* > **WARNING:** Tenant must have the Okta Identity Engine enabled in order to use this feature.
|
|
238
434
|
*/
|
|
239
435
|
isOie?: pulumi.Input<boolean>;
|
|
240
436
|
/**
|
|
241
|
-
* Policy Name
|
|
437
|
+
* Policy Name.
|
|
242
438
|
*/
|
|
243
439
|
name?: pulumi.Input<string>;
|
|
440
|
+
/**
|
|
441
|
+
* Okta Call MFA policy settings (✓ Classic).
|
|
442
|
+
*/
|
|
244
443
|
oktaCall?: pulumi.Input<{
|
|
245
444
|
[key: string]: pulumi.Input<string>;
|
|
246
445
|
}>;
|
|
446
|
+
/**
|
|
447
|
+
* Okta Email MFA policy settings (✓ Classic, ✓ OIE).
|
|
448
|
+
*/
|
|
247
449
|
oktaEmail?: pulumi.Input<{
|
|
248
450
|
[key: string]: pulumi.Input<string>;
|
|
249
451
|
}>;
|
|
452
|
+
/**
|
|
453
|
+
* Okta OTP (via the Okta Verify app) MFA policy settings (✓ Classic).
|
|
454
|
+
*/
|
|
250
455
|
oktaOtp?: pulumi.Input<{
|
|
251
456
|
[key: string]: pulumi.Input<string>;
|
|
252
457
|
}>;
|
|
458
|
+
/**
|
|
459
|
+
* Okta Password MFA policy settings (✓ Classic, ✓ OIE).
|
|
460
|
+
*/
|
|
253
461
|
oktaPassword?: pulumi.Input<{
|
|
254
462
|
[key: string]: pulumi.Input<string>;
|
|
255
463
|
}>;
|
|
464
|
+
/**
|
|
465
|
+
* Okta Push MFA policy settings (✓ Classic).
|
|
466
|
+
*/
|
|
256
467
|
oktaPush?: pulumi.Input<{
|
|
257
468
|
[key: string]: pulumi.Input<string>;
|
|
258
469
|
}>;
|
|
470
|
+
/**
|
|
471
|
+
* Okta Question MFA policy settings (✓ Classic).
|
|
472
|
+
*/
|
|
259
473
|
oktaQuestion?: pulumi.Input<{
|
|
260
474
|
[key: string]: pulumi.Input<string>;
|
|
261
475
|
}>;
|
|
476
|
+
/**
|
|
477
|
+
* Okta SMS MFA policy settings (✓ Classic).
|
|
478
|
+
*/
|
|
262
479
|
oktaSms?: pulumi.Input<{
|
|
263
480
|
[key: string]: pulumi.Input<string>;
|
|
264
481
|
}>;
|
|
482
|
+
/**
|
|
483
|
+
* Okta Verify MFA policy settings (✓ OIE).
|
|
484
|
+
*/
|
|
265
485
|
oktaVerify?: pulumi.Input<{
|
|
266
486
|
[key: string]: pulumi.Input<string>;
|
|
267
487
|
}>;
|
|
488
|
+
/**
|
|
489
|
+
* On-Prem MFA MFA policy settings (✓ OIE).
|
|
490
|
+
*/
|
|
268
491
|
onpremMfa?: pulumi.Input<{
|
|
269
492
|
[key: string]: pulumi.Input<string>;
|
|
270
493
|
}>;
|
|
494
|
+
/**
|
|
495
|
+
* Phone Number MFA policy settings (✓ OIE).
|
|
496
|
+
*/
|
|
271
497
|
phoneNumber?: pulumi.Input<{
|
|
272
498
|
[key: string]: pulumi.Input<string>;
|
|
273
499
|
}>;
|
|
274
500
|
/**
|
|
275
|
-
*
|
|
501
|
+
* Priority of the policy.
|
|
276
502
|
*/
|
|
277
503
|
priority?: pulumi.Input<number>;
|
|
504
|
+
/**
|
|
505
|
+
* RSA Token MFA policy settings (✓ Classic, ✓ OIE).
|
|
506
|
+
*/
|
|
278
507
|
rsaToken?: pulumi.Input<{
|
|
279
508
|
[key: string]: pulumi.Input<string>;
|
|
280
509
|
}>;
|
|
510
|
+
/**
|
|
511
|
+
* Security Question MFA policy settings (✓ OIE).
|
|
512
|
+
*/
|
|
281
513
|
securityQuestion?: pulumi.Input<{
|
|
282
514
|
[key: string]: pulumi.Input<string>;
|
|
283
515
|
}>;
|
|
284
516
|
/**
|
|
285
|
-
* Policy Status: ACTIVE or INACTIVE
|
|
517
|
+
* Policy Status: `"ACTIVE"` or `"INACTIVE"`.
|
|
286
518
|
*/
|
|
287
519
|
status?: pulumi.Input<string>;
|
|
520
|
+
/**
|
|
521
|
+
* Symantec VIP MFA policy settings (✓ Classic).
|
|
522
|
+
*/
|
|
288
523
|
symantecVip?: pulumi.Input<{
|
|
289
524
|
[key: string]: pulumi.Input<string>;
|
|
290
525
|
}>;
|
|
526
|
+
/**
|
|
527
|
+
* FIDO2 (WebAuthn) MFA policy settings (✓ OIE).
|
|
528
|
+
*/
|
|
291
529
|
webauthn?: pulumi.Input<{
|
|
292
530
|
[key: string]: pulumi.Input<string>;
|
|
293
531
|
}>;
|
|
532
|
+
/**
|
|
533
|
+
* Yubikey Token MFA policy settings (✓ Classic, ✓ OIE).
|
|
534
|
+
*/
|
|
294
535
|
yubikeyToken?: pulumi.Input<{
|
|
295
536
|
[key: string]: pulumi.Input<string>;
|
|
296
537
|
}>;
|