@pulumi/okta 4.8.0 → 4.8.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (290) hide show
  1. package/adminRoleCustom.d.ts +1 -1
  2. package/adminRoleCustom.js +1 -1
  3. package/adminRoleCustomAssignments.d.ts +1 -1
  4. package/adminRoleCustomAssignments.js +1 -1
  5. package/adminRoleTargets.d.ts +2 -2
  6. package/adminRoleTargets.js +2 -2
  7. package/app/autoLogin.d.ts +7 -7
  8. package/app/autoLogin.js +7 -7
  9. package/app/basicAuth.d.ts +1 -1
  10. package/app/basicAuth.js +1 -1
  11. package/app/getApp.d.ts +2 -2
  12. package/app/getSaml.d.ts +4 -3
  13. package/app/getSaml.js.map +1 -1
  14. package/app/groupAssignment.d.ts +1 -1
  15. package/app/groupAssignment.js +1 -1
  16. package/app/oauth.d.ts +13 -15
  17. package/app/oauth.js +11 -13
  18. package/app/oauth.js.map +1 -1
  19. package/app/oauthPostLogoutRedirectUri.d.ts +3 -3
  20. package/app/oauthPostLogoutRedirectUri.js +3 -3
  21. package/app/oauthRedirectUri.d.ts +3 -3
  22. package/app/oauthRedirectUri.js +3 -3
  23. package/app/oauthRoleAssignment.d.ts +23 -0
  24. package/app/oauthRoleAssignment.js +23 -0
  25. package/app/oauthRoleAssignment.js.map +1 -1
  26. package/app/saml.d.ts +52 -51
  27. package/app/saml.js +35 -34
  28. package/app/saml.js.map +1 -1
  29. package/app/securePasswordStore.d.ts +2 -2
  30. package/app/securePasswordStore.js +2 -2
  31. package/app/swa.d.ts +2 -2
  32. package/app/swa.js +2 -2
  33. package/app/threeField.d.ts +3 -3
  34. package/appGroupAssignments.d.ts +1 -1
  35. package/appGroupAssignments.js +1 -1
  36. package/appOauthApiScope.d.ts +0 -4
  37. package/appOauthApiScope.js +0 -4
  38. package/appOauthApiScope.js.map +1 -1
  39. package/appSamlAppSettings.d.ts +3 -3
  40. package/appSamlAppSettings.js +3 -3
  41. package/appSharedCredentials.d.ts +13 -13
  42. package/appSharedCredentials.js +13 -13
  43. package/appSignonPolicy.d.ts +12 -5
  44. package/appSignonPolicy.js +12 -5
  45. package/appSignonPolicy.js.map +1 -1
  46. package/appSignonPolicyRule.d.ts +81 -45
  47. package/appSignonPolicyRule.js +81 -45
  48. package/appSignonPolicyRule.js.map +1 -1
  49. package/appUserBaseSchemaProperty.d.ts +1 -1
  50. package/appUserBaseSchemaProperty.js +1 -1
  51. package/appUserSchemaProperty.d.ts +12 -12
  52. package/appUserSchemaProperty.js +3 -3
  53. package/auth/server.d.ts +1 -0
  54. package/auth/server.js +1 -0
  55. package/auth/server.js.map +1 -1
  56. package/auth/serverClaim.d.ts +3 -2
  57. package/auth/serverClaim.js +3 -2
  58. package/auth/serverClaim.js.map +1 -1
  59. package/auth/serverPolicy.d.ts +3 -2
  60. package/auth/serverPolicy.js +3 -2
  61. package/auth/serverPolicy.js.map +1 -1
  62. package/auth/serverPolicyClaim.d.ts +4 -3
  63. package/auth/serverPolicyClaim.js +4 -3
  64. package/auth/serverPolicyClaim.js.map +1 -1
  65. package/auth/serverPolicyRule.d.ts +4 -3
  66. package/auth/serverPolicyRule.js +4 -3
  67. package/auth/serverPolicyRule.js.map +1 -1
  68. package/auth/serverScope.d.ts +2 -1
  69. package/auth/serverScope.js +2 -1
  70. package/auth/serverScope.js.map +1 -1
  71. package/authServerClaimDefault.d.ts +2 -1
  72. package/authServerClaimDefault.js +2 -1
  73. package/authServerClaimDefault.js.map +1 -1
  74. package/authServerDefault.d.ts +1 -1
  75. package/authServerDefault.js +1 -1
  76. package/authenticator.d.ts +3 -1
  77. package/authenticator.js +3 -1
  78. package/authenticator.js.map +1 -1
  79. package/behaviour.d.ts +16 -11
  80. package/behaviour.js +16 -11
  81. package/behaviour.js.map +1 -1
  82. package/brand.d.ts +3 -0
  83. package/brand.js.map +1 -1
  84. package/captcha.d.ts +3 -2
  85. package/captcha.js +3 -2
  86. package/captcha.js.map +1 -1
  87. package/captchaOrgWideSettings.d.ts +10 -8
  88. package/captchaOrgWideSettings.js +10 -8
  89. package/captchaOrgWideSettings.js.map +1 -1
  90. package/{index/customizedSigninPage.d.ts → customizedSigninPage.d.ts} +35 -23
  91. package/{index/customizedSigninPage.js → customizedSigninPage.js} +11 -2
  92. package/customizedSigninPage.js.map +1 -0
  93. package/domain.d.ts +2 -2
  94. package/domain.js +2 -2
  95. package/domainCertificate.d.ts +17 -2
  96. package/domainCertificate.js +17 -2
  97. package/domainCertificate.js.map +1 -1
  98. package/domainVerification.d.ts +2 -2
  99. package/domainVerification.js +2 -2
  100. package/emailCustomization.d.ts +4 -4
  101. package/emailCustomization.js +1 -1
  102. package/{index/emailDomain.d.ts → emailDomain.d.ts} +7 -7
  103. package/{index/emailDomain.js → emailDomain.js} +5 -5
  104. package/emailDomain.js.map +1 -0
  105. package/{index/emailDomainVerification.d.ts → emailDomainVerification.d.ts} +2 -2
  106. package/{index/emailDomainVerification.js → emailDomainVerification.js} +4 -4
  107. package/emailDomainVerification.js.map +1 -0
  108. package/emailSender.d.ts +2 -2
  109. package/emailSender.js +2 -2
  110. package/emailSenderVerification.d.ts +3 -3
  111. package/emailSenderVerification.js +3 -3
  112. package/eventHook.d.ts +20 -10
  113. package/eventHook.js +11 -10
  114. package/eventHook.js.map +1 -1
  115. package/eventHookVerification.d.ts +3 -2
  116. package/eventHookVerification.js +3 -2
  117. package/eventHookVerification.js.map +1 -1
  118. package/factorTotp.d.ts +4 -3
  119. package/factorTotp.js +4 -3
  120. package/factorTotp.js.map +1 -1
  121. package/getAppGroupAssignments.d.ts +2 -2
  122. package/getAppGroupAssignments.js +2 -2
  123. package/getAppUserAssignments.d.ts +2 -2
  124. package/getAppUserAssignments.js +2 -2
  125. package/getDefaultSigninPage.d.ts +56 -0
  126. package/{index/getDefaultSigninPage.js → getDefaultSigninPage.js} +8 -2
  127. package/getDefaultSigninPage.js.map +1 -0
  128. package/{index/getDomain.d.ts → getDomain.d.ts} +8 -8
  129. package/{index/getDomain.js → getDomain.js} +8 -8
  130. package/getDomain.js.map +1 -0
  131. package/{index/getLogStream.d.ts → getLogStream.d.ts} +7 -7
  132. package/{index/getLogStream.js → getLogStream.js} +4 -4
  133. package/getLogStream.js.map +1 -0
  134. package/{index/getOrgMetadata.d.ts → getOrgMetadata.d.ts} +10 -10
  135. package/{index/getOrgMetadata.js → getOrgMetadata.js} +4 -4
  136. package/getOrgMetadata.js.map +1 -0
  137. package/getRoleSubscription.d.ts +2 -2
  138. package/getUserSecurityQuestions.d.ts +4 -4
  139. package/getUserSecurityQuestions.js +4 -4
  140. package/group/getRule.d.ts +2 -2
  141. package/group/getRule.js +2 -2
  142. package/group/group.d.ts +5 -1
  143. package/group/group.js +5 -1
  144. package/group/group.js.map +1 -1
  145. package/group/role.d.ts +3 -3
  146. package/group/rule.d.ts +3 -2
  147. package/group/rule.js +3 -2
  148. package/group/rule.js.map +1 -1
  149. package/groupMemberships.d.ts +9 -6
  150. package/groupMemberships.js +9 -6
  151. package/groupMemberships.js.map +1 -1
  152. package/groupSchemaProperty.d.ts +10 -10
  153. package/groupSchemaProperty.js +4 -4
  154. package/idp/oidc.d.ts +9 -23
  155. package/idp/oidc.js +9 -10
  156. package/idp/oidc.js.map +1 -1
  157. package/idp/saml.d.ts +6 -5
  158. package/idp/saml.js +6 -5
  159. package/idp/saml.js.map +1 -1
  160. package/idp/samlKey.d.ts +22 -0
  161. package/idp/samlKey.js +22 -0
  162. package/idp/samlKey.js.map +1 -1
  163. package/idp/social.d.ts +4 -3
  164. package/idp/social.js +4 -3
  165. package/idp/social.js.map +1 -1
  166. package/index.d.ts +28 -2
  167. package/index.js +40 -5
  168. package/index.js.map +1 -1
  169. package/inline/hook.d.ts +23 -13
  170. package/inline/hook.js +8 -7
  171. package/inline/hook.js.map +1 -1
  172. package/linkDefinition.d.ts +5 -5
  173. package/linkDefinition.js +5 -5
  174. package/linkValue.d.ts +1 -1
  175. package/linkValue.js +1 -1
  176. package/{index/logStream.d.ts → logStream.d.ts} +6 -22
  177. package/{index/logStream.js → logStream.js} +3 -19
  178. package/logStream.js.map +1 -0
  179. package/network/zone.d.ts +5 -2
  180. package/network/zone.js +5 -2
  181. package/network/zone.js.map +1 -1
  182. package/orgConfiguration.d.ts +7 -4
  183. package/orgConfiguration.js +1 -1
  184. package/orgConfiguration.js.map +1 -1
  185. package/package.json +4 -3
  186. package/policy/deviceAssuranceAndroid.d.ts +24 -15
  187. package/policy/deviceAssuranceAndroid.js +9 -0
  188. package/policy/deviceAssuranceAndroid.js.map +1 -1
  189. package/policy/deviceAssuranceChromeos.d.ts +37 -3
  190. package/policy/deviceAssuranceChromeos.js +34 -0
  191. package/policy/deviceAssuranceChromeos.js.map +1 -1
  192. package/policy/deviceAssuranceIos.d.ts +29 -20
  193. package/policy/deviceAssuranceIos.js +9 -0
  194. package/policy/deviceAssuranceIos.js.map +1 -1
  195. package/policy/deviceAssuranceMacos.d.ts +24 -15
  196. package/policy/deviceAssuranceMacos.js +9 -0
  197. package/policy/deviceAssuranceMacos.js.map +1 -1
  198. package/policy/deviceAssuranceWindows.d.ts +24 -15
  199. package/policy/deviceAssuranceWindows.js +9 -0
  200. package/policy/deviceAssuranceWindows.js.map +1 -1
  201. package/policy/getPolicy.d.ts +16 -0
  202. package/policy/getPolicy.js.map +1 -1
  203. package/policy/mfa.d.ts +10 -8
  204. package/policy/mfa.js +10 -8
  205. package/policy/mfa.js.map +1 -1
  206. package/policy/password.d.ts +3 -2
  207. package/policy/password.js +3 -2
  208. package/policy/password.js.map +1 -1
  209. package/policy/ruleIdpDiscovery.d.ts +20 -15
  210. package/policy/ruleIdpDiscovery.js +2 -0
  211. package/policy/ruleIdpDiscovery.js.map +1 -1
  212. package/policy/ruleMfa.d.ts +15 -6
  213. package/policy/ruleMfa.js.map +1 -1
  214. package/policy/ruleSignon.d.ts +21 -1
  215. package/policy/ruleSignon.js +5 -1
  216. package/policy/ruleSignon.js.map +1 -1
  217. package/policy/signon.d.ts +3 -2
  218. package/policy/signon.js +3 -2
  219. package/policy/signon.js.map +1 -1
  220. package/policyMfaDefault.d.ts +5 -5
  221. package/policyMfaDefault.js +5 -5
  222. package/policyPasswordDefault.d.ts +1 -1
  223. package/policyPasswordDefault.js +1 -1
  224. package/policyProfileEnrollment.d.ts +4 -1
  225. package/policyProfileEnrollment.js +4 -1
  226. package/policyProfileEnrollment.js.map +1 -1
  227. package/policyProfileEnrollmentApps.d.ts +4 -4
  228. package/policyProfileEnrollmentApps.js +4 -4
  229. package/policyRuleProfileEnrollment.d.ts +11 -7
  230. package/policyRuleProfileEnrollment.js +9 -5
  231. package/policyRuleProfileEnrollment.js.map +1 -1
  232. package/{index/previewSigninPage.d.ts → previewSigninPage.d.ts} +29 -23
  233. package/{index/previewSigninPage.js → previewSigninPage.js} +5 -2
  234. package/previewSigninPage.js.map +1 -0
  235. package/profile/mapping.d.ts +6 -6
  236. package/profile/mapping.js +6 -6
  237. package/rateLimiting.d.ts +2 -2
  238. package/rateLimiting.js +2 -2
  239. package/resourceSet.d.ts +1 -1
  240. package/resourceSet.js +1 -1
  241. package/roleSubscription.d.ts +5 -5
  242. package/roleSubscription.js +2 -2
  243. package/securityNotificationEmails.d.ts +1 -1
  244. package/securityNotificationEmails.js +1 -1
  245. package/templateSms.d.ts +4 -4
  246. package/templateSms.js +1 -1
  247. package/threatInsightSettings.d.ts +3 -2
  248. package/threatInsightSettings.js +3 -2
  249. package/threatInsightSettings.js.map +1 -1
  250. package/trustedorigin/origin.d.ts +1 -0
  251. package/trustedorigin/origin.js +1 -0
  252. package/trustedorigin/origin.js.map +1 -1
  253. package/types/input.d.ts +272 -305
  254. package/types/output.d.ts +217 -250
  255. package/user/getUser.d.ts +0 -26
  256. package/user/getUser.js +0 -26
  257. package/user/getUser.js.map +1 -1
  258. package/user/getUsers.d.ts +4 -26
  259. package/user/getUsers.js +4 -26
  260. package/user/getUsers.js.map +1 -1
  261. package/user/user.d.ts +8 -17
  262. package/user/user.js +5 -5
  263. package/user/user.js.map +1 -1
  264. package/user/userType.d.ts +2 -1
  265. package/user/userType.js +2 -1
  266. package/user/userType.js.map +1 -1
  267. package/userAdminRoles.d.ts +3 -3
  268. package/userAdminRoles.js +3 -3
  269. package/userBaseSchemaProperty.d.ts +4 -4
  270. package/userBaseSchemaProperty.js +4 -4
  271. package/userFactorQuestion.d.ts +5 -5
  272. package/userFactorQuestion.js +5 -5
  273. package/userGroupMemberships.d.ts +5 -5
  274. package/userGroupMemberships.js +5 -5
  275. package/userSchemaProperty.d.ts +11 -11
  276. package/userSchemaProperty.js +5 -5
  277. package/index/customizedSigninPage.js.map +0 -1
  278. package/index/emailDomain.js.map +0 -1
  279. package/index/emailDomainVerification.js.map +0 -1
  280. package/index/getDefaultSigninPage.d.ts +0 -32
  281. package/index/getDefaultSigninPage.js.map +0 -1
  282. package/index/getDomain.js.map +0 -1
  283. package/index/getLogStream.js.map +0 -1
  284. package/index/getOrgMetadata.js.map +0 -1
  285. package/index/index.d.ts +0 -27
  286. package/index/index.js +0 -54
  287. package/index/index.js.map +0 -1
  288. package/index/logStream.js.map +0 -1
  289. package/index/previewSigninPage.js.map +0 -1
  290. package/package.json.bak +0 -27
@@ -13,24 +13,24 @@ import * as pulumi from "@pulumi/pulumi";
13
13
  * import * as okta from "@pulumi/okta";
14
14
  *
15
15
  * const example = new okta.AppSharedCredentials("example", {
16
- * accessibilityErrorRedirectUrl: "https://example.com/redirect_url_1",
17
- * accessibilityLoginRedirectUrl: "https://example.com/redirect_url_2",
18
- * accessibilitySelfService: true,
19
- * autoSubmitToolbar: true,
20
- * buttonField: "btn-login",
21
- * checkbox: "checkbox_red",
22
- * hideIos: true,
23
16
  * label: "Example App",
24
- * passwordField: "txtbox-password",
25
- * redirectUrl: "https://example.com/redirect_url",
26
- * sharedPassword: "sharedpass",
27
- * sharedUsername: "sharedusername",
28
17
  * status: "ACTIVE",
18
+ * buttonField: "btn-login",
19
+ * usernameField: "txtbox-username",
20
+ * passwordField: "txtbox-password",
29
21
  * url: "https://example.com/login.html",
22
+ * redirectUrl: "https://example.com/redirect_url",
23
+ * checkbox: "checkbox_red",
30
24
  * userNameTemplate: "user.firstName",
31
- * userNameTemplateSuffix: "hello",
32
25
  * userNameTemplateType: "CUSTOM",
33
- * usernameField: "txtbox-username",
26
+ * userNameTemplateSuffix: "hello",
27
+ * sharedPassword: "sharedpass",
28
+ * sharedUsername: "sharedusername",
29
+ * accessibilitySelfService: true,
30
+ * accessibilityErrorRedirectUrl: "https://example.com/redirect_url_1",
31
+ * accessibilityLoginRedirectUrl: "https://example.com/redirect_url_2",
32
+ * autoSubmitToolbar: true,
33
+ * hideIos: true,
34
34
  * });
35
35
  * ```
36
36
  *
@@ -19,24 +19,24 @@ const utilities = require("./utilities");
19
19
  * import * as okta from "@pulumi/okta";
20
20
  *
21
21
  * const example = new okta.AppSharedCredentials("example", {
22
- * accessibilityErrorRedirectUrl: "https://example.com/redirect_url_1",
23
- * accessibilityLoginRedirectUrl: "https://example.com/redirect_url_2",
24
- * accessibilitySelfService: true,
25
- * autoSubmitToolbar: true,
26
- * buttonField: "btn-login",
27
- * checkbox: "checkbox_red",
28
- * hideIos: true,
29
22
  * label: "Example App",
30
- * passwordField: "txtbox-password",
31
- * redirectUrl: "https://example.com/redirect_url",
32
- * sharedPassword: "sharedpass",
33
- * sharedUsername: "sharedusername",
34
23
  * status: "ACTIVE",
24
+ * buttonField: "btn-login",
25
+ * usernameField: "txtbox-username",
26
+ * passwordField: "txtbox-password",
35
27
  * url: "https://example.com/login.html",
28
+ * redirectUrl: "https://example.com/redirect_url",
29
+ * checkbox: "checkbox_red",
36
30
  * userNameTemplate: "user.firstName",
37
- * userNameTemplateSuffix: "hello",
38
31
  * userNameTemplateType: "CUSTOM",
39
- * usernameField: "txtbox-username",
32
+ * userNameTemplateSuffix: "hello",
33
+ * sharedPassword: "sharedpass",
34
+ * sharedUsername: "sharedusername",
35
+ * accessibilitySelfService: true,
36
+ * accessibilityErrorRedirectUrl: "https://example.com/redirect_url_1",
37
+ * accessibilityLoginRedirectUrl: "https://example.com/redirect_url_2",
38
+ * autoSubmitToolbar: true,
39
+ * hideIos: true,
40
40
  * });
41
41
  * ```
42
42
  *
@@ -6,8 +6,11 @@ import * as pulumi from "@pulumi/pulumi";
6
6
  * import * as pulumi from "@pulumi/pulumi";
7
7
  * import * as okta from "@pulumi/okta";
8
8
  *
9
- * const myAppPolicy = new okta.AppSignonPolicy("myAppPolicy", {description: "Authentication Policy to be used on my app."});
10
- * const myApp = new okta.app.OAuth("myApp", {
9
+ * const myAppPolicy = new okta.AppSignonPolicy("my_app_policy", {
10
+ * name: "My App Sign-On Policy",
11
+ * description: "Authentication Policy to be used on my app.",
12
+ * });
13
+ * const myApp = new okta.app.OAuth("my_app", {
11
14
  * label: "My App",
12
15
  * type: "web",
13
16
  * grantTypes: ["authorization_code"],
@@ -24,9 +27,13 @@ import * as pulumi from "@pulumi/pulumi";
24
27
  * import * as pulumi from "@pulumi/pulumi";
25
28
  * import * as okta from "@pulumi/okta";
26
29
  *
27
- * const myAppPolicy = new okta.AppSignonPolicy("myAppPolicy", {description: "Authentication Policy to be used on my app."});
28
- * const someRule = new okta.AppSignonPolicyRule("someRule", {
29
- * policyId: resource.okta_app_signon_policy.my_app_policy.id,
30
+ * const myAppPolicy = new okta.AppSignonPolicy("my_app_policy", {
31
+ * name: "My App Sign-On Policy",
32
+ * description: "Authentication Policy to be used on my app.",
33
+ * });
34
+ * const someRule = new okta.AppSignonPolicyRule("some_rule", {
35
+ * policyId: oktaAppSignonPolicy.myAppPolicy.id,
36
+ * name: "Some Rule",
30
37
  * factorMode: "1FA",
31
38
  * reAuthenticationFrequency: "PT43800H",
32
39
  * constraints: [JSON.stringify({
@@ -12,8 +12,11 @@ const utilities = require("./utilities");
12
12
  * import * as pulumi from "@pulumi/pulumi";
13
13
  * import * as okta from "@pulumi/okta";
14
14
  *
15
- * const myAppPolicy = new okta.AppSignonPolicy("myAppPolicy", {description: "Authentication Policy to be used on my app."});
16
- * const myApp = new okta.app.OAuth("myApp", {
15
+ * const myAppPolicy = new okta.AppSignonPolicy("my_app_policy", {
16
+ * name: "My App Sign-On Policy",
17
+ * description: "Authentication Policy to be used on my app.",
18
+ * });
19
+ * const myApp = new okta.app.OAuth("my_app", {
17
20
  * label: "My App",
18
21
  * type: "web",
19
22
  * grantTypes: ["authorization_code"],
@@ -30,9 +33,13 @@ const utilities = require("./utilities");
30
33
  * import * as pulumi from "@pulumi/pulumi";
31
34
  * import * as okta from "@pulumi/okta";
32
35
  *
33
- * const myAppPolicy = new okta.AppSignonPolicy("myAppPolicy", {description: "Authentication Policy to be used on my app."});
34
- * const someRule = new okta.AppSignonPolicyRule("someRule", {
35
- * policyId: resource.okta_app_signon_policy.my_app_policy.id,
36
+ * const myAppPolicy = new okta.AppSignonPolicy("my_app_policy", {
37
+ * name: "My App Sign-On Policy",
38
+ * description: "Authentication Policy to be used on my app.",
39
+ * });
40
+ * const someRule = new okta.AppSignonPolicyRule("some_rule", {
41
+ * policyId: oktaAppSignonPolicy.myAppPolicy.id,
42
+ * name: "Some Rule",
36
43
  * factorMode: "1FA",
37
44
  * reAuthenticationFrequency: "PT43800H",
38
45
  * constraints: [JSON.stringify({
@@ -1 +1 @@
1
- {"version":3,"file":"appSignonPolicy.js","sourceRoot":"","sources":["../appSignonPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAqCG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AA9DL,0CA+DC;AAjDG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
1
+ {"version":3,"file":"appSignonPolicy.js","sourceRoot":"","sources":["../appSignonPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4CG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AA9DL,0CA+DC;AAjDG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
@@ -13,7 +13,40 @@ import * as outputs from "./types/output";
13
13
  *
14
14
  * ## Example Usage
15
15
  *
16
+ * ### Simple usage
17
+ *
18
+ * ```typescript
19
+ * import * as pulumi from "@pulumi/pulumi";
20
+ * import * as okta from "@pulumi/okta";
21
+ *
22
+ * const testSaml = new okta.app.Saml("test", {
23
+ * label: "My App",
24
+ * ssoUrl: "https://google.com",
25
+ * recipient: "https://here.com",
26
+ * destination: "https://its-about-the-journey.com",
27
+ * audience: "https://audience.com",
28
+ * status: "ACTIVE",
29
+ * subjectNameIdTemplate: "${user.userName}",
30
+ * subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
31
+ * signatureAlgorithm: "RSA_SHA256",
32
+ * responseSigned: true,
33
+ * digestAlgorithm: "SHA256",
34
+ * honorForceAuthn: false,
35
+ * authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
36
+ * });
37
+ * const test = okta.getAppSignonPolicyOutput({
38
+ * appId: testSaml.id,
39
+ * });
40
+ * const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("test", {
41
+ * policyId: test.apply(test => test.id),
42
+ * name: "testAcc_replace_with_uuid",
43
+ * });
44
+ * ```
45
+ *
46
+ * This will create an app sign-on policy rule with the following `THEN` block:
47
+ *
16
48
  * ### Rule with Constraints
49
+ *
17
50
  * ### Example 1:
18
51
  *
19
52
  * ```typescript
@@ -21,7 +54,8 @@ import * as outputs from "./types/output";
21
54
  * import * as okta from "@pulumi/okta";
22
55
  *
23
56
  * const test = new okta.AppSignonPolicyRule("test", {
24
- * policyId: data.okta_app_signon_policy.test.id,
57
+ * policyId: testOktaAppSignonPolicy.id,
58
+ * name: "testAcc_replace_with_uuid",
25
59
  * constraints: [JSON.stringify({
26
60
  * knowledge: {
27
61
  * types: ["password"],
@@ -32,9 +66,6 @@ import * as outputs from "./types/output";
32
66
  *
33
67
  * This will create an app sign-on policy rule with the following `THEN` block:
34
68
  *
35
- * ```typescript
36
- * import * as pulumi from "@pulumi/pulumi";
37
- * ```
38
69
  * ### Example 2:
39
70
  *
40
71
  * ```typescript
@@ -42,7 +73,8 @@ import * as outputs from "./types/output";
42
73
  * import * as okta from "@pulumi/okta";
43
74
  *
44
75
  * const test = new okta.AppSignonPolicyRule("test", {
45
- * policyId: data.okta_app_signon_policy.test.id,
76
+ * policyId: testOktaAppSignonPolicy.id,
77
+ * name: "testAcc_replace_with_uuid",
46
78
  * constraints: [JSON.stringify({
47
79
  * knowledge: {
48
80
  * reauthenticateIn: "PT2H",
@@ -58,19 +90,16 @@ import * as outputs from "./types/output";
58
90
  *
59
91
  * This will create an app sign-on policy rule with the following `THEN` block:
60
92
  *
61
- * ```typescript
62
- * import * as pulumi from "@pulumi/pulumi";
63
- * ```
64
- *
65
93
  * More examples can be
66
94
  * found [here](https://developer.okta.com/docs/reference/api/policy/#verification-method-json-examples).
95
+ *
67
96
  * ### Complex example
68
97
  *
69
98
  * ```typescript
70
99
  * import * as pulumi from "@pulumi/pulumi";
71
100
  * import * as okta from "@pulumi/okta";
72
101
  *
73
- * const testSaml = new okta.app.Saml("testSaml", {
102
+ * const testSaml = new okta.app.Saml("test", {
74
103
  * label: "testAcc_replace_with_uuid",
75
104
  * ssoUrl: "https://google.com",
76
105
  * recipient: "https://here.com",
@@ -85,32 +114,32 @@ import * as outputs from "./types/output";
85
114
  * authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
86
115
  * singleLogoutIssuer: "https://dunshire.okta.com",
87
116
  * singleLogoutUrl: "https://dunshire.okta.com/logout",
88
- * singleLogoutCertificate: `MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV
89
- * BAgMBU1haW5lMRAwDgYDVQQHDAdDYXJpYm91MRcwFQYDVQQKDA5Tbm93bWFrZXJzIEluYzEUMBIG
90
- * A1UECwwLRW5naW5lZXJpbmcxDTALBgNVBAMMBFNub3cxIDAeBgkqhkiG9w0BCQEWEWVtYWlsQGV4
91
- * YW1wbGUuY29tMB4XDTIwMTIwMzIyNDY0M1oXDTMwMTIwMTIyNDY0M1owgY8xCzAJBgNVBAYTAlVT
92
- * MQ4wDAYDVQQIDAVNYWluZTEQMA4GA1UEBwwHQ2FyaWJvdTEXMBUGA1UECgwOU25vd21ha2VycyBJ
93
- * bmMxFDASBgNVBAsMC0VuZ2luZWVyaW5nMQ0wCwYDVQQDDARTbm93MSAwHgYJKoZIhvcNAQkBFhFl
94
- * bWFpbEBleGFtcGxlLmNvbTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANMmWDjXPdoa
95
- * PyzIENqeY9njLan2FqCbQPSestWUUcb6NhDsJVGSQ7XR+ozQA5TaJzbP7cAJUj8vCcbqMZsgOQAu
96
- * O/pzYyQEKptLmrGvPn7xkJ1A1xLkp2NY18cpDTeUPueJUoidZ9EJwEuyUZIktzxNNU1pA1lGijiu
97
- * 2XNxs9d9JR/hm3tCu9Im8qLVB4JtX80YUa6QtlRjWR/H8a373AYCOASdoB3c57fIPD8ATDNy2w/c
98
- * fCVGiyKDMFB+GA/WTsZpOP3iohRp8ltAncSuzypcztb2iE+jijtTsiC9kUA2abAJqqpoCJubNShi
99
- * Vff4822czpziS44MV2guC9wANi8u3Uyl5MKsU95j01jzadKRP5S+2f0K+n8n4UoV9fnqZFyuGAKd
100
- * CJi9K6NlSAP+TgPe/JP9FOSuxQOHWJfmdLHdJD+evoKi9E55sr5lRFK0xU1Fj5Ld7zjC0pXPhtJf
101
- * sgjEZzD433AsHnRzvRT1KSNCPkLYomznZo5n9rWYgCQ8HcytlQDTesmKE+s05E/VSWNtH84XdDrt
102
- * ieXwfwhHfaABSu+WjZYxi9CXdFCSvXhsgufUcK4FbYAHl/ga/cJxZc52yFC7Pcq0u9O2BSCjYPdQ
103
- * DAHs9dhT1RhwVLM8RmoAzgxyyzau0gxnAlgSBD9FMW6dXqIHIp8yAAg9cRXhYRTNAgMBAAEwDQYJ
104
- * KoZIhvcNAQELBQADggIBADofEC1SvG8qa7pmKCjB/E9Sxhk3mvUO9Gq43xzwVb721Ng3VYf4vGU3
105
- * wLUwJeLt0wggnj26NJweN5T3q9T8UMxZhHSWvttEU3+S1nArRB0beti716HSlOCDx4wTmBu/D1MG
106
- * t/kZYFJw+zuzvAcbYct2pK69AQhD8xAIbQvqADJI7cCK3yRry+aWtppc58P81KYabUlCfFXfhJ9E
107
- * P72ffN4jVHpX3lxxYh7FKAdiKbY2FYzjsc7RdgKI1R3iAAZUCGBTvezNzaetGzTUjjl/g1tcVYij
108
- * ltH9ZOQBPlUMI88lxUxqgRTerpPmAJH00CACx4JFiZrweLM1trZyy06wNDQgLrqHr3EOagBF/O2h
109
- * hfTehNdVr6iq3YhKWBo4/+RL0RCzHMh4u86VbDDnDn4Y6HzLuyIAtBFoikoKM6UHTOa0Pqv2bBr5
110
- * wbkRkVUxl9yJJw/HmTCdfnsM9dTOJUKzEglnGF2184Gg+qJDZB6fSf0EAO1F6sTqiSswl+uHQZiy
111
- * DaZzyU7Gg5seKOZ20zTRaX3Ihj9Zij/ORnrARE7eM/usKMECp+7syUwAUKxDCZkGiUdskmOhhBGL
112
- * JtbyK3F2UvoJoLsm3pIcvMak9KwMjSTGJB47ABUP1+w+zGcNk0D5Co3IJ6QekiLfWJyQ+kKsWLKt
113
- * zOYQQatrnBagM7MI2/T4
117
+ * singleLogoutCertificate: `MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV\x0d
118
+ * BAgMBU1haW5lMRAwDgYDVQQHDAdDYXJpYm91MRcwFQYDVQQKDA5Tbm93bWFrZXJzIEluYzEUMBIG\x0d
119
+ * A1UECwwLRW5naW5lZXJpbmcxDTALBgNVBAMMBFNub3cxIDAeBgkqhkiG9w0BCQEWEWVtYWlsQGV4\x0d
120
+ * YW1wbGUuY29tMB4XDTIwMTIwMzIyNDY0M1oXDTMwMTIwMTIyNDY0M1owgY8xCzAJBgNVBAYTAlVT\x0d
121
+ * MQ4wDAYDVQQIDAVNYWluZTEQMA4GA1UEBwwHQ2FyaWJvdTEXMBUGA1UECgwOU25vd21ha2VycyBJ\x0d
122
+ * bmMxFDASBgNVBAsMC0VuZ2luZWVyaW5nMQ0wCwYDVQQDDARTbm93MSAwHgYJKoZIhvcNAQkBFhFl\x0d
123
+ * bWFpbEBleGFtcGxlLmNvbTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANMmWDjXPdoa\x0d
124
+ * PyzIENqeY9njLan2FqCbQPSestWUUcb6NhDsJVGSQ7XR+ozQA5TaJzbP7cAJUj8vCcbqMZsgOQAu\x0d
125
+ * O/pzYyQEKptLmrGvPn7xkJ1A1xLkp2NY18cpDTeUPueJUoidZ9EJwEuyUZIktzxNNU1pA1lGijiu\x0d
126
+ * 2XNxs9d9JR/hm3tCu9Im8qLVB4JtX80YUa6QtlRjWR/H8a373AYCOASdoB3c57fIPD8ATDNy2w/c\x0d
127
+ * fCVGiyKDMFB+GA/WTsZpOP3iohRp8ltAncSuzypcztb2iE+jijtTsiC9kUA2abAJqqpoCJubNShi\x0d
128
+ * Vff4822czpziS44MV2guC9wANi8u3Uyl5MKsU95j01jzadKRP5S+2f0K+n8n4UoV9fnqZFyuGAKd\x0d
129
+ * CJi9K6NlSAP+TgPe/JP9FOSuxQOHWJfmdLHdJD+evoKi9E55sr5lRFK0xU1Fj5Ld7zjC0pXPhtJf\x0d
130
+ * sgjEZzD433AsHnRzvRT1KSNCPkLYomznZo5n9rWYgCQ8HcytlQDTesmKE+s05E/VSWNtH84XdDrt\x0d
131
+ * ieXwfwhHfaABSu+WjZYxi9CXdFCSvXhsgufUcK4FbYAHl/ga/cJxZc52yFC7Pcq0u9O2BSCjYPdQ\x0d
132
+ * DAHs9dhT1RhwVLM8RmoAzgxyyzau0gxnAlgSBD9FMW6dXqIHIp8yAAg9cRXhYRTNAgMBAAEwDQYJ\x0d
133
+ * KoZIhvcNAQELBQADggIBADofEC1SvG8qa7pmKCjB/E9Sxhk3mvUO9Gq43xzwVb721Ng3VYf4vGU3\x0d
134
+ * wLUwJeLt0wggnj26NJweN5T3q9T8UMxZhHSWvttEU3+S1nArRB0beti716HSlOCDx4wTmBu/D1MG\x0d
135
+ * t/kZYFJw+zuzvAcbYct2pK69AQhD8xAIbQvqADJI7cCK3yRry+aWtppc58P81KYabUlCfFXfhJ9E\x0d
136
+ * P72ffN4jVHpX3lxxYh7FKAdiKbY2FYzjsc7RdgKI1R3iAAZUCGBTvezNzaetGzTUjjl/g1tcVYij\x0d
137
+ * ltH9ZOQBPlUMI88lxUxqgRTerpPmAJH00CACx4JFiZrweLM1trZyy06wNDQgLrqHr3EOagBF/O2h\x0d
138
+ * hfTehNdVr6iq3YhKWBo4/+RL0RCzHMh4u86VbDDnDn4Y6HzLuyIAtBFoikoKM6UHTOa0Pqv2bBr5\x0d
139
+ * wbkRkVUxl9yJJw/HmTCdfnsM9dTOJUKzEglnGF2184Gg+qJDZB6fSf0EAO1F6sTqiSswl+uHQZiy\x0d
140
+ * DaZzyU7Gg5seKOZ20zTRaX3Ihj9Zij/ORnrARE7eM/usKMECp+7syUwAUKxDCZkGiUdskmOhhBGL\x0d
141
+ * JtbyK3F2UvoJoLsm3pIcvMak9KwMjSTGJB47ABUP1+w+zGcNk0D5Co3IJ6QekiLfWJyQ+kKsWLKt\x0d
142
+ * zOYQQatrnBagM7MI2/T4\x0d
114
143
  * `,
115
144
  * attributeStatements: [{
116
145
  * type: "GROUP",
@@ -119,12 +148,12 @@ import * as outputs from "./types/output";
119
148
  * filterValue: ".*",
120
149
  * }],
121
150
  * });
122
- * const testAppSignonPolicy = okta.getAppSignonPolicyOutput({
151
+ * const test = okta.getAppSignonPolicyOutput({
123
152
  * appId: testSaml.id,
124
153
  * });
125
154
  * const testUser: okta.user.User[] = [];
126
155
  * for (const range = {value: 0}; range.value < 5; range.value++) {
127
- * testUser.push(new okta.user.User(`testUser-${range.value}`, {
156
+ * testUser.push(new okta.user.User(`test-${range.value}`, {
128
157
  * firstName: "TestAcc",
129
158
  * lastName: "Smith",
130
159
  * login: `testAcc_${range.value}@example.com`,
@@ -133,13 +162,18 @@ import * as outputs from "./types/output";
133
162
  * }
134
163
  * const _this: okta.group.Group[] = [];
135
164
  * for (const range = {value: 0}; range.value < 5; range.value++) {
136
- * _this.push(new okta.group.Group(`this-${range.value}`, {description: `testAcc_${range.value}`}));
165
+ * _this.push(new okta.group.Group(`this-${range.value}`, {
166
+ * name: `testAcc_${range.value}`,
167
+ * description: `testAcc_${range.value}`,
168
+ * }));
137
169
  * }
138
- * const testUserType = new okta.user.UserType("testUserType", {
170
+ * const testUserType = new okta.user.UserType("test", {
171
+ * name: "testAcc_replace_with_uuid",
139
172
  * displayName: "Terraform Acceptance Test User Type Updated",
140
173
  * description: "Terraform Acceptance Test User Type Updated",
141
174
  * });
142
- * const testZone = new okta.network.Zone("testZone", {
175
+ * const testZone = new okta.network.Zone("test", {
176
+ * name: "testAcc_replace_with_uuid",
143
177
  * type: "IP",
144
178
  * gateways: [
145
179
  * "1.2.3.4/24",
@@ -153,12 +187,14 @@ import * as outputs from "./types/output";
153
187
  * const default = okta.user.getUserType({
154
188
  * name: "user",
155
189
  * });
156
- * const testDeviceAssuranceAndroid = new okta.policy.DeviceAssuranceAndroid("testDeviceAssuranceAndroid", {
190
+ * const testDeviceAssuranceAndroid = new okta.policy.DeviceAssuranceAndroid("test", {
191
+ * name: "test",
157
192
  * osVersion: "12",
158
193
  * jailbreak: false,
159
194
  * });
160
- * const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("testAppSignonPolicyRule", {
161
- * policyId: testAppSignonPolicy.apply(testAppSignonPolicy => testAppSignonPolicy.id),
195
+ * const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("test", {
196
+ * name: "testAcc_replace_with_uuid",
197
+ * policyId: test.apply(test => test.id),
162
198
  * access: "ALLOW",
163
199
  * customExpression: "user.status == \"ACTIVE\"",
164
200
  * deviceIsManaged: false,
@@ -246,7 +282,7 @@ import * as outputs from "./types/output";
246
282
  * Okta app sign-on policy rule can be imported via the Okta ID.
247
283
  *
248
284
  * ```sh
249
- * $ pulumi import okta:index/appSignonPolicyRule:AppSignonPolicyRule example &#60;policy_id&#62;/&#60;rule_id&#62;
285
+ * $ pulumi import okta:index/appSignonPolicyRule:AppSignonPolicyRule example &#60;policy_id&#62;/&#60;rule_id&#62;
250
286
  * ```
251
287
  */
252
288
  export declare class AppSignonPolicyRule extends pulumi.CustomResource {
@@ -17,7 +17,40 @@ const utilities = require("./utilities");
17
17
  *
18
18
  * ## Example Usage
19
19
  *
20
+ * ### Simple usage
21
+ *
22
+ * ```typescript
23
+ * import * as pulumi from "@pulumi/pulumi";
24
+ * import * as okta from "@pulumi/okta";
25
+ *
26
+ * const testSaml = new okta.app.Saml("test", {
27
+ * label: "My App",
28
+ * ssoUrl: "https://google.com",
29
+ * recipient: "https://here.com",
30
+ * destination: "https://its-about-the-journey.com",
31
+ * audience: "https://audience.com",
32
+ * status: "ACTIVE",
33
+ * subjectNameIdTemplate: "${user.userName}",
34
+ * subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
35
+ * signatureAlgorithm: "RSA_SHA256",
36
+ * responseSigned: true,
37
+ * digestAlgorithm: "SHA256",
38
+ * honorForceAuthn: false,
39
+ * authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
40
+ * });
41
+ * const test = okta.getAppSignonPolicyOutput({
42
+ * appId: testSaml.id,
43
+ * });
44
+ * const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("test", {
45
+ * policyId: test.apply(test => test.id),
46
+ * name: "testAcc_replace_with_uuid",
47
+ * });
48
+ * ```
49
+ *
50
+ * This will create an app sign-on policy rule with the following `THEN` block:
51
+ *
20
52
  * ### Rule with Constraints
53
+ *
21
54
  * ### Example 1:
22
55
  *
23
56
  * ```typescript
@@ -25,7 +58,8 @@ const utilities = require("./utilities");
25
58
  * import * as okta from "@pulumi/okta";
26
59
  *
27
60
  * const test = new okta.AppSignonPolicyRule("test", {
28
- * policyId: data.okta_app_signon_policy.test.id,
61
+ * policyId: testOktaAppSignonPolicy.id,
62
+ * name: "testAcc_replace_with_uuid",
29
63
  * constraints: [JSON.stringify({
30
64
  * knowledge: {
31
65
  * types: ["password"],
@@ -36,9 +70,6 @@ const utilities = require("./utilities");
36
70
  *
37
71
  * This will create an app sign-on policy rule with the following `THEN` block:
38
72
  *
39
- * ```typescript
40
- * import * as pulumi from "@pulumi/pulumi";
41
- * ```
42
73
  * ### Example 2:
43
74
  *
44
75
  * ```typescript
@@ -46,7 +77,8 @@ const utilities = require("./utilities");
46
77
  * import * as okta from "@pulumi/okta";
47
78
  *
48
79
  * const test = new okta.AppSignonPolicyRule("test", {
49
- * policyId: data.okta_app_signon_policy.test.id,
80
+ * policyId: testOktaAppSignonPolicy.id,
81
+ * name: "testAcc_replace_with_uuid",
50
82
  * constraints: [JSON.stringify({
51
83
  * knowledge: {
52
84
  * reauthenticateIn: "PT2H",
@@ -62,19 +94,16 @@ const utilities = require("./utilities");
62
94
  *
63
95
  * This will create an app sign-on policy rule with the following `THEN` block:
64
96
  *
65
- * ```typescript
66
- * import * as pulumi from "@pulumi/pulumi";
67
- * ```
68
- *
69
97
  * More examples can be
70
98
  * found [here](https://developer.okta.com/docs/reference/api/policy/#verification-method-json-examples).
99
+ *
71
100
  * ### Complex example
72
101
  *
73
102
  * ```typescript
74
103
  * import * as pulumi from "@pulumi/pulumi";
75
104
  * import * as okta from "@pulumi/okta";
76
105
  *
77
- * const testSaml = new okta.app.Saml("testSaml", {
106
+ * const testSaml = new okta.app.Saml("test", {
78
107
  * label: "testAcc_replace_with_uuid",
79
108
  * ssoUrl: "https://google.com",
80
109
  * recipient: "https://here.com",
@@ -89,32 +118,32 @@ const utilities = require("./utilities");
89
118
  * authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
90
119
  * singleLogoutIssuer: "https://dunshire.okta.com",
91
120
  * singleLogoutUrl: "https://dunshire.okta.com/logout",
92
- * singleLogoutCertificate: `MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV
93
- * BAgMBU1haW5lMRAwDgYDVQQHDAdDYXJpYm91MRcwFQYDVQQKDA5Tbm93bWFrZXJzIEluYzEUMBIG
94
- * A1UECwwLRW5naW5lZXJpbmcxDTALBgNVBAMMBFNub3cxIDAeBgkqhkiG9w0BCQEWEWVtYWlsQGV4
95
- * YW1wbGUuY29tMB4XDTIwMTIwMzIyNDY0M1oXDTMwMTIwMTIyNDY0M1owgY8xCzAJBgNVBAYTAlVT
96
- * MQ4wDAYDVQQIDAVNYWluZTEQMA4GA1UEBwwHQ2FyaWJvdTEXMBUGA1UECgwOU25vd21ha2VycyBJ
97
- * bmMxFDASBgNVBAsMC0VuZ2luZWVyaW5nMQ0wCwYDVQQDDARTbm93MSAwHgYJKoZIhvcNAQkBFhFl
98
- * bWFpbEBleGFtcGxlLmNvbTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANMmWDjXPdoa
99
- * PyzIENqeY9njLan2FqCbQPSestWUUcb6NhDsJVGSQ7XR+ozQA5TaJzbP7cAJUj8vCcbqMZsgOQAu
100
- * O/pzYyQEKptLmrGvPn7xkJ1A1xLkp2NY18cpDTeUPueJUoidZ9EJwEuyUZIktzxNNU1pA1lGijiu
101
- * 2XNxs9d9JR/hm3tCu9Im8qLVB4JtX80YUa6QtlRjWR/H8a373AYCOASdoB3c57fIPD8ATDNy2w/c
102
- * fCVGiyKDMFB+GA/WTsZpOP3iohRp8ltAncSuzypcztb2iE+jijtTsiC9kUA2abAJqqpoCJubNShi
103
- * Vff4822czpziS44MV2guC9wANi8u3Uyl5MKsU95j01jzadKRP5S+2f0K+n8n4UoV9fnqZFyuGAKd
104
- * CJi9K6NlSAP+TgPe/JP9FOSuxQOHWJfmdLHdJD+evoKi9E55sr5lRFK0xU1Fj5Ld7zjC0pXPhtJf
105
- * sgjEZzD433AsHnRzvRT1KSNCPkLYomznZo5n9rWYgCQ8HcytlQDTesmKE+s05E/VSWNtH84XdDrt
106
- * ieXwfwhHfaABSu+WjZYxi9CXdFCSvXhsgufUcK4FbYAHl/ga/cJxZc52yFC7Pcq0u9O2BSCjYPdQ
107
- * DAHs9dhT1RhwVLM8RmoAzgxyyzau0gxnAlgSBD9FMW6dXqIHIp8yAAg9cRXhYRTNAgMBAAEwDQYJ
108
- * KoZIhvcNAQELBQADggIBADofEC1SvG8qa7pmKCjB/E9Sxhk3mvUO9Gq43xzwVb721Ng3VYf4vGU3
109
- * wLUwJeLt0wggnj26NJweN5T3q9T8UMxZhHSWvttEU3+S1nArRB0beti716HSlOCDx4wTmBu/D1MG
110
- * t/kZYFJw+zuzvAcbYct2pK69AQhD8xAIbQvqADJI7cCK3yRry+aWtppc58P81KYabUlCfFXfhJ9E
111
- * P72ffN4jVHpX3lxxYh7FKAdiKbY2FYzjsc7RdgKI1R3iAAZUCGBTvezNzaetGzTUjjl/g1tcVYij
112
- * ltH9ZOQBPlUMI88lxUxqgRTerpPmAJH00CACx4JFiZrweLM1trZyy06wNDQgLrqHr3EOagBF/O2h
113
- * hfTehNdVr6iq3YhKWBo4/+RL0RCzHMh4u86VbDDnDn4Y6HzLuyIAtBFoikoKM6UHTOa0Pqv2bBr5
114
- * wbkRkVUxl9yJJw/HmTCdfnsM9dTOJUKzEglnGF2184Gg+qJDZB6fSf0EAO1F6sTqiSswl+uHQZiy
115
- * DaZzyU7Gg5seKOZ20zTRaX3Ihj9Zij/ORnrARE7eM/usKMECp+7syUwAUKxDCZkGiUdskmOhhBGL
116
- * JtbyK3F2UvoJoLsm3pIcvMak9KwMjSTGJB47ABUP1+w+zGcNk0D5Co3IJ6QekiLfWJyQ+kKsWLKt
117
- * zOYQQatrnBagM7MI2/T4
121
+ * singleLogoutCertificate: `MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV\x0d
122
+ * BAgMBU1haW5lMRAwDgYDVQQHDAdDYXJpYm91MRcwFQYDVQQKDA5Tbm93bWFrZXJzIEluYzEUMBIG\x0d
123
+ * A1UECwwLRW5naW5lZXJpbmcxDTALBgNVBAMMBFNub3cxIDAeBgkqhkiG9w0BCQEWEWVtYWlsQGV4\x0d
124
+ * YW1wbGUuY29tMB4XDTIwMTIwMzIyNDY0M1oXDTMwMTIwMTIyNDY0M1owgY8xCzAJBgNVBAYTAlVT\x0d
125
+ * MQ4wDAYDVQQIDAVNYWluZTEQMA4GA1UEBwwHQ2FyaWJvdTEXMBUGA1UECgwOU25vd21ha2VycyBJ\x0d
126
+ * bmMxFDASBgNVBAsMC0VuZ2luZWVyaW5nMQ0wCwYDVQQDDARTbm93MSAwHgYJKoZIhvcNAQkBFhFl\x0d
127
+ * bWFpbEBleGFtcGxlLmNvbTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANMmWDjXPdoa\x0d
128
+ * PyzIENqeY9njLan2FqCbQPSestWUUcb6NhDsJVGSQ7XR+ozQA5TaJzbP7cAJUj8vCcbqMZsgOQAu\x0d
129
+ * O/pzYyQEKptLmrGvPn7xkJ1A1xLkp2NY18cpDTeUPueJUoidZ9EJwEuyUZIktzxNNU1pA1lGijiu\x0d
130
+ * 2XNxs9d9JR/hm3tCu9Im8qLVB4JtX80YUa6QtlRjWR/H8a373AYCOASdoB3c57fIPD8ATDNy2w/c\x0d
131
+ * fCVGiyKDMFB+GA/WTsZpOP3iohRp8ltAncSuzypcztb2iE+jijtTsiC9kUA2abAJqqpoCJubNShi\x0d
132
+ * Vff4822czpziS44MV2guC9wANi8u3Uyl5MKsU95j01jzadKRP5S+2f0K+n8n4UoV9fnqZFyuGAKd\x0d
133
+ * CJi9K6NlSAP+TgPe/JP9FOSuxQOHWJfmdLHdJD+evoKi9E55sr5lRFK0xU1Fj5Ld7zjC0pXPhtJf\x0d
134
+ * sgjEZzD433AsHnRzvRT1KSNCPkLYomznZo5n9rWYgCQ8HcytlQDTesmKE+s05E/VSWNtH84XdDrt\x0d
135
+ * ieXwfwhHfaABSu+WjZYxi9CXdFCSvXhsgufUcK4FbYAHl/ga/cJxZc52yFC7Pcq0u9O2BSCjYPdQ\x0d
136
+ * DAHs9dhT1RhwVLM8RmoAzgxyyzau0gxnAlgSBD9FMW6dXqIHIp8yAAg9cRXhYRTNAgMBAAEwDQYJ\x0d
137
+ * KoZIhvcNAQELBQADggIBADofEC1SvG8qa7pmKCjB/E9Sxhk3mvUO9Gq43xzwVb721Ng3VYf4vGU3\x0d
138
+ * wLUwJeLt0wggnj26NJweN5T3q9T8UMxZhHSWvttEU3+S1nArRB0beti716HSlOCDx4wTmBu/D1MG\x0d
139
+ * t/kZYFJw+zuzvAcbYct2pK69AQhD8xAIbQvqADJI7cCK3yRry+aWtppc58P81KYabUlCfFXfhJ9E\x0d
140
+ * P72ffN4jVHpX3lxxYh7FKAdiKbY2FYzjsc7RdgKI1R3iAAZUCGBTvezNzaetGzTUjjl/g1tcVYij\x0d
141
+ * ltH9ZOQBPlUMI88lxUxqgRTerpPmAJH00CACx4JFiZrweLM1trZyy06wNDQgLrqHr3EOagBF/O2h\x0d
142
+ * hfTehNdVr6iq3YhKWBo4/+RL0RCzHMh4u86VbDDnDn4Y6HzLuyIAtBFoikoKM6UHTOa0Pqv2bBr5\x0d
143
+ * wbkRkVUxl9yJJw/HmTCdfnsM9dTOJUKzEglnGF2184Gg+qJDZB6fSf0EAO1F6sTqiSswl+uHQZiy\x0d
144
+ * DaZzyU7Gg5seKOZ20zTRaX3Ihj9Zij/ORnrARE7eM/usKMECp+7syUwAUKxDCZkGiUdskmOhhBGL\x0d
145
+ * JtbyK3F2UvoJoLsm3pIcvMak9KwMjSTGJB47ABUP1+w+zGcNk0D5Co3IJ6QekiLfWJyQ+kKsWLKt\x0d
146
+ * zOYQQatrnBagM7MI2/T4\x0d
118
147
  * `,
119
148
  * attributeStatements: [{
120
149
  * type: "GROUP",
@@ -123,12 +152,12 @@ const utilities = require("./utilities");
123
152
  * filterValue: ".*",
124
153
  * }],
125
154
  * });
126
- * const testAppSignonPolicy = okta.getAppSignonPolicyOutput({
155
+ * const test = okta.getAppSignonPolicyOutput({
127
156
  * appId: testSaml.id,
128
157
  * });
129
158
  * const testUser: okta.user.User[] = [];
130
159
  * for (const range = {value: 0}; range.value < 5; range.value++) {
131
- * testUser.push(new okta.user.User(`testUser-${range.value}`, {
160
+ * testUser.push(new okta.user.User(`test-${range.value}`, {
132
161
  * firstName: "TestAcc",
133
162
  * lastName: "Smith",
134
163
  * login: `testAcc_${range.value}@example.com`,
@@ -137,13 +166,18 @@ const utilities = require("./utilities");
137
166
  * }
138
167
  * const _this: okta.group.Group[] = [];
139
168
  * for (const range = {value: 0}; range.value < 5; range.value++) {
140
- * _this.push(new okta.group.Group(`this-${range.value}`, {description: `testAcc_${range.value}`}));
169
+ * _this.push(new okta.group.Group(`this-${range.value}`, {
170
+ * name: `testAcc_${range.value}`,
171
+ * description: `testAcc_${range.value}`,
172
+ * }));
141
173
  * }
142
- * const testUserType = new okta.user.UserType("testUserType", {
174
+ * const testUserType = new okta.user.UserType("test", {
175
+ * name: "testAcc_replace_with_uuid",
143
176
  * displayName: "Terraform Acceptance Test User Type Updated",
144
177
  * description: "Terraform Acceptance Test User Type Updated",
145
178
  * });
146
- * const testZone = new okta.network.Zone("testZone", {
179
+ * const testZone = new okta.network.Zone("test", {
180
+ * name: "testAcc_replace_with_uuid",
147
181
  * type: "IP",
148
182
  * gateways: [
149
183
  * "1.2.3.4/24",
@@ -157,12 +191,14 @@ const utilities = require("./utilities");
157
191
  * const default = okta.user.getUserType({
158
192
  * name: "user",
159
193
  * });
160
- * const testDeviceAssuranceAndroid = new okta.policy.DeviceAssuranceAndroid("testDeviceAssuranceAndroid", {
194
+ * const testDeviceAssuranceAndroid = new okta.policy.DeviceAssuranceAndroid("test", {
195
+ * name: "test",
161
196
  * osVersion: "12",
162
197
  * jailbreak: false,
163
198
  * });
164
- * const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("testAppSignonPolicyRule", {
165
- * policyId: testAppSignonPolicy.apply(testAppSignonPolicy => testAppSignonPolicy.id),
199
+ * const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("test", {
200
+ * name: "testAcc_replace_with_uuid",
201
+ * policyId: test.apply(test => test.id),
166
202
  * access: "ALLOW",
167
203
  * customExpression: "user.status == \"ACTIVE\"",
168
204
  * deviceIsManaged: false,
@@ -250,7 +286,7 @@ const utilities = require("./utilities");
250
286
  * Okta app sign-on policy rule can be imported via the Okta ID.
251
287
  *
252
288
  * ```sh
253
- * $ pulumi import okta:index/appSignonPolicyRule:AppSignonPolicyRule example &#60;policy_id&#62;/&#60;rule_id&#62;
289
+ * $ pulumi import okta:index/appSignonPolicyRule:AppSignonPolicyRule example &#60;policy_id&#62;/&#60;rule_id&#62;
254
290
  * ```
255
291
  */
256
292
  class AppSignonPolicyRule extends pulumi.CustomResource {
@@ -1 +1 @@
1
- {"version":3,"file":"appSignonPolicyRule.js","sourceRoot":"","sources":["../appSignonPolicyRule.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GAuPG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IAC1D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;IAqHD,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxE,CAAC;;AAhNL,kDAiNC;AAnMG,gBAAgB;AACO,gCAAY,GAAG,oDAAoD,CAAC"}
1
+ {"version":3,"file":"appSignonPolicyRule.js","sourceRoot":"","sources":["../appSignonPolicyRule.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2RG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IAC1D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;IAqHD,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxE,CAAC;;AAhNL,kDAiNC;AAnMG,gBAAgB;AACO,gCAAY,GAAG,oDAAoD,CAAC"}
@@ -13,9 +13,9 @@ import * as pulumi from "@pulumi/pulumi";
13
13
  * const example = new okta.AppUserBaseSchemaProperty("example", {
14
14
  * appId: "<app id>",
15
15
  * index: "customPropertyName",
16
- * master: "OKTA",
17
16
  * title: "customPropertyName",
18
17
  * type: "string",
18
+ * master: "OKTA",
19
19
  * });
20
20
  * ```
21
21
  *
@@ -19,9 +19,9 @@ const utilities = require("./utilities");
19
19
  * const example = new okta.AppUserBaseSchemaProperty("example", {
20
20
  * appId: "<app id>",
21
21
  * index: "customPropertyName",
22
- * master: "OKTA",
23
22
  * title: "customPropertyName",
24
23
  * type: "string",
24
+ * master: "OKTA",
25
25
  * });
26
26
  * ```
27
27
  *