@pulumi/okta 4.8.0 → 4.8.2
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +1 -1
- package/adminRoleCustom.js +1 -1
- package/adminRoleCustomAssignments.d.ts +1 -1
- package/adminRoleCustomAssignments.js +1 -1
- package/adminRoleTargets.d.ts +2 -2
- package/adminRoleTargets.js +2 -2
- package/app/autoLogin.d.ts +7 -7
- package/app/autoLogin.js +7 -7
- package/app/basicAuth.d.ts +1 -1
- package/app/basicAuth.js +1 -1
- package/app/getApp.d.ts +2 -2
- package/app/getSaml.d.ts +4 -3
- package/app/getSaml.js.map +1 -1
- package/app/groupAssignment.d.ts +1 -1
- package/app/groupAssignment.js +1 -1
- package/app/oauth.d.ts +13 -15
- package/app/oauth.js +11 -13
- package/app/oauth.js.map +1 -1
- package/app/oauthPostLogoutRedirectUri.d.ts +3 -3
- package/app/oauthPostLogoutRedirectUri.js +3 -3
- package/app/oauthRedirectUri.d.ts +3 -3
- package/app/oauthRedirectUri.js +3 -3
- package/app/oauthRoleAssignment.d.ts +23 -0
- package/app/oauthRoleAssignment.js +23 -0
- package/app/oauthRoleAssignment.js.map +1 -1
- package/app/saml.d.ts +52 -51
- package/app/saml.js +35 -34
- package/app/saml.js.map +1 -1
- package/app/securePasswordStore.d.ts +2 -2
- package/app/securePasswordStore.js +2 -2
- package/app/swa.d.ts +2 -2
- package/app/swa.js +2 -2
- package/app/threeField.d.ts +3 -3
- package/appGroupAssignments.d.ts +1 -1
- package/appGroupAssignments.js +1 -1
- package/appOauthApiScope.d.ts +0 -4
- package/appOauthApiScope.js +0 -4
- package/appOauthApiScope.js.map +1 -1
- package/appSamlAppSettings.d.ts +3 -3
- package/appSamlAppSettings.js +3 -3
- package/appSharedCredentials.d.ts +13 -13
- package/appSharedCredentials.js +13 -13
- package/appSignonPolicy.d.ts +12 -5
- package/appSignonPolicy.js +12 -5
- package/appSignonPolicy.js.map +1 -1
- package/appSignonPolicyRule.d.ts +81 -45
- package/appSignonPolicyRule.js +81 -45
- package/appSignonPolicyRule.js.map +1 -1
- package/appUserBaseSchemaProperty.d.ts +1 -1
- package/appUserBaseSchemaProperty.js +1 -1
- package/appUserSchemaProperty.d.ts +12 -12
- package/appUserSchemaProperty.js +3 -3
- package/auth/server.d.ts +1 -0
- package/auth/server.js +1 -0
- package/auth/server.js.map +1 -1
- package/auth/serverClaim.d.ts +3 -2
- package/auth/serverClaim.js +3 -2
- package/auth/serverClaim.js.map +1 -1
- package/auth/serverPolicy.d.ts +3 -2
- package/auth/serverPolicy.js +3 -2
- package/auth/serverPolicy.js.map +1 -1
- package/auth/serverPolicyClaim.d.ts +4 -3
- package/auth/serverPolicyClaim.js +4 -3
- package/auth/serverPolicyClaim.js.map +1 -1
- package/auth/serverPolicyRule.d.ts +4 -3
- package/auth/serverPolicyRule.js +4 -3
- package/auth/serverPolicyRule.js.map +1 -1
- package/auth/serverScope.d.ts +2 -1
- package/auth/serverScope.js +2 -1
- package/auth/serverScope.js.map +1 -1
- package/authServerClaimDefault.d.ts +2 -1
- package/authServerClaimDefault.js +2 -1
- package/authServerClaimDefault.js.map +1 -1
- package/authServerDefault.d.ts +1 -1
- package/authServerDefault.js +1 -1
- package/authenticator.d.ts +3 -1
- package/authenticator.js +3 -1
- package/authenticator.js.map +1 -1
- package/behaviour.d.ts +16 -11
- package/behaviour.js +16 -11
- package/behaviour.js.map +1 -1
- package/brand.d.ts +3 -0
- package/brand.js.map +1 -1
- package/captcha.d.ts +3 -2
- package/captcha.js +3 -2
- package/captcha.js.map +1 -1
- package/captchaOrgWideSettings.d.ts +10 -8
- package/captchaOrgWideSettings.js +10 -8
- package/captchaOrgWideSettings.js.map +1 -1
- package/{index/customizedSigninPage.d.ts → customizedSigninPage.d.ts} +35 -23
- package/{index/customizedSigninPage.js → customizedSigninPage.js} +11 -2
- package/customizedSigninPage.js.map +1 -0
- package/domain.d.ts +2 -2
- package/domain.js +2 -2
- package/domainCertificate.d.ts +17 -2
- package/domainCertificate.js +17 -2
- package/domainCertificate.js.map +1 -1
- package/domainVerification.d.ts +2 -2
- package/domainVerification.js +2 -2
- package/emailCustomization.d.ts +4 -4
- package/emailCustomization.js +1 -1
- package/{index/emailDomain.d.ts → emailDomain.d.ts} +7 -7
- package/{index/emailDomain.js → emailDomain.js} +5 -5
- package/emailDomain.js.map +1 -0
- package/{index/emailDomainVerification.d.ts → emailDomainVerification.d.ts} +2 -2
- package/{index/emailDomainVerification.js → emailDomainVerification.js} +4 -4
- package/emailDomainVerification.js.map +1 -0
- package/emailSender.d.ts +2 -2
- package/emailSender.js +2 -2
- package/emailSenderVerification.d.ts +3 -3
- package/emailSenderVerification.js +3 -3
- package/eventHook.d.ts +20 -10
- package/eventHook.js +11 -10
- package/eventHook.js.map +1 -1
- package/eventHookVerification.d.ts +3 -2
- package/eventHookVerification.js +3 -2
- package/eventHookVerification.js.map +1 -1
- package/factorTotp.d.ts +4 -3
- package/factorTotp.js +4 -3
- package/factorTotp.js.map +1 -1
- package/getAppGroupAssignments.d.ts +2 -2
- package/getAppGroupAssignments.js +2 -2
- package/getAppUserAssignments.d.ts +2 -2
- package/getAppUserAssignments.js +2 -2
- package/getDefaultSigninPage.d.ts +56 -0
- package/{index/getDefaultSigninPage.js → getDefaultSigninPage.js} +8 -2
- package/getDefaultSigninPage.js.map +1 -0
- package/{index/getDomain.d.ts → getDomain.d.ts} +8 -8
- package/{index/getDomain.js → getDomain.js} +8 -8
- package/getDomain.js.map +1 -0
- package/{index/getLogStream.d.ts → getLogStream.d.ts} +7 -7
- package/{index/getLogStream.js → getLogStream.js} +4 -4
- package/getLogStream.js.map +1 -0
- package/{index/getOrgMetadata.d.ts → getOrgMetadata.d.ts} +10 -10
- package/{index/getOrgMetadata.js → getOrgMetadata.js} +4 -4
- package/getOrgMetadata.js.map +1 -0
- package/getRoleSubscription.d.ts +2 -2
- package/getUserSecurityQuestions.d.ts +4 -4
- package/getUserSecurityQuestions.js +4 -4
- package/group/getRule.d.ts +2 -2
- package/group/getRule.js +2 -2
- package/group/group.d.ts +5 -1
- package/group/group.js +5 -1
- package/group/group.js.map +1 -1
- package/group/role.d.ts +3 -3
- package/group/rule.d.ts +3 -2
- package/group/rule.js +3 -2
- package/group/rule.js.map +1 -1
- package/groupMemberships.d.ts +9 -6
- package/groupMemberships.js +9 -6
- package/groupMemberships.js.map +1 -1
- package/groupSchemaProperty.d.ts +10 -10
- package/groupSchemaProperty.js +4 -4
- package/idp/oidc.d.ts +9 -23
- package/idp/oidc.js +9 -10
- package/idp/oidc.js.map +1 -1
- package/idp/saml.d.ts +6 -5
- package/idp/saml.js +6 -5
- package/idp/saml.js.map +1 -1
- package/idp/samlKey.d.ts +22 -0
- package/idp/samlKey.js +22 -0
- package/idp/samlKey.js.map +1 -1
- package/idp/social.d.ts +4 -3
- package/idp/social.js +4 -3
- package/idp/social.js.map +1 -1
- package/index.d.ts +28 -2
- package/index.js +40 -5
- package/index.js.map +1 -1
- package/inline/hook.d.ts +23 -13
- package/inline/hook.js +8 -7
- package/inline/hook.js.map +1 -1
- package/linkDefinition.d.ts +5 -5
- package/linkDefinition.js +5 -5
- package/linkValue.d.ts +1 -1
- package/linkValue.js +1 -1
- package/{index/logStream.d.ts → logStream.d.ts} +6 -22
- package/{index/logStream.js → logStream.js} +3 -19
- package/logStream.js.map +1 -0
- package/network/zone.d.ts +5 -2
- package/network/zone.js +5 -2
- package/network/zone.js.map +1 -1
- package/orgConfiguration.d.ts +7 -4
- package/orgConfiguration.js +1 -1
- package/orgConfiguration.js.map +1 -1
- package/package.json +4 -3
- package/policy/deviceAssuranceAndroid.d.ts +24 -15
- package/policy/deviceAssuranceAndroid.js +9 -0
- package/policy/deviceAssuranceAndroid.js.map +1 -1
- package/policy/deviceAssuranceChromeos.d.ts +37 -3
- package/policy/deviceAssuranceChromeos.js +34 -0
- package/policy/deviceAssuranceChromeos.js.map +1 -1
- package/policy/deviceAssuranceIos.d.ts +29 -20
- package/policy/deviceAssuranceIos.js +9 -0
- package/policy/deviceAssuranceIos.js.map +1 -1
- package/policy/deviceAssuranceMacos.d.ts +24 -15
- package/policy/deviceAssuranceMacos.js +9 -0
- package/policy/deviceAssuranceMacos.js.map +1 -1
- package/policy/deviceAssuranceWindows.d.ts +24 -15
- package/policy/deviceAssuranceWindows.js +9 -0
- package/policy/deviceAssuranceWindows.js.map +1 -1
- package/policy/getPolicy.d.ts +16 -0
- package/policy/getPolicy.js.map +1 -1
- package/policy/mfa.d.ts +10 -8
- package/policy/mfa.js +10 -8
- package/policy/mfa.js.map +1 -1
- package/policy/password.d.ts +3 -2
- package/policy/password.js +3 -2
- package/policy/password.js.map +1 -1
- package/policy/ruleIdpDiscovery.d.ts +20 -15
- package/policy/ruleIdpDiscovery.js +2 -0
- package/policy/ruleIdpDiscovery.js.map +1 -1
- package/policy/ruleMfa.d.ts +15 -6
- package/policy/ruleMfa.js.map +1 -1
- package/policy/ruleSignon.d.ts +21 -1
- package/policy/ruleSignon.js +5 -1
- package/policy/ruleSignon.js.map +1 -1
- package/policy/signon.d.ts +3 -2
- package/policy/signon.js +3 -2
- package/policy/signon.js.map +1 -1
- package/policyMfaDefault.d.ts +5 -5
- package/policyMfaDefault.js +5 -5
- package/policyPasswordDefault.d.ts +1 -1
- package/policyPasswordDefault.js +1 -1
- package/policyProfileEnrollment.d.ts +4 -1
- package/policyProfileEnrollment.js +4 -1
- package/policyProfileEnrollment.js.map +1 -1
- package/policyProfileEnrollmentApps.d.ts +4 -4
- package/policyProfileEnrollmentApps.js +4 -4
- package/policyRuleProfileEnrollment.d.ts +11 -7
- package/policyRuleProfileEnrollment.js +9 -5
- package/policyRuleProfileEnrollment.js.map +1 -1
- package/{index/previewSigninPage.d.ts → previewSigninPage.d.ts} +29 -23
- package/{index/previewSigninPage.js → previewSigninPage.js} +5 -2
- package/previewSigninPage.js.map +1 -0
- package/profile/mapping.d.ts +6 -6
- package/profile/mapping.js +6 -6
- package/rateLimiting.d.ts +2 -2
- package/rateLimiting.js +2 -2
- package/resourceSet.d.ts +1 -1
- package/resourceSet.js +1 -1
- package/roleSubscription.d.ts +5 -5
- package/roleSubscription.js +2 -2
- package/securityNotificationEmails.d.ts +1 -1
- package/securityNotificationEmails.js +1 -1
- package/templateSms.d.ts +4 -4
- package/templateSms.js +1 -1
- package/threatInsightSettings.d.ts +3 -2
- package/threatInsightSettings.js +3 -2
- package/threatInsightSettings.js.map +1 -1
- package/trustedorigin/origin.d.ts +1 -0
- package/trustedorigin/origin.js +1 -0
- package/trustedorigin/origin.js.map +1 -1
- package/types/input.d.ts +272 -305
- package/types/output.d.ts +217 -250
- package/user/getUser.d.ts +0 -26
- package/user/getUser.js +0 -26
- package/user/getUser.js.map +1 -1
- package/user/getUsers.d.ts +4 -26
- package/user/getUsers.js +4 -26
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +8 -17
- package/user/user.js +5 -5
- package/user/user.js.map +1 -1
- package/user/userType.d.ts +2 -1
- package/user/userType.js +2 -1
- package/user/userType.js.map +1 -1
- package/userAdminRoles.d.ts +3 -3
- package/userAdminRoles.js +3 -3
- package/userBaseSchemaProperty.d.ts +4 -4
- package/userBaseSchemaProperty.js +4 -4
- package/userFactorQuestion.d.ts +5 -5
- package/userFactorQuestion.js +5 -5
- package/userGroupMemberships.d.ts +5 -5
- package/userGroupMemberships.js +5 -5
- package/userSchemaProperty.d.ts +11 -11
- package/userSchemaProperty.js +5 -5
- package/index/customizedSigninPage.js.map +0 -1
- package/index/emailDomain.js.map +0 -1
- package/index/emailDomainVerification.js.map +0 -1
- package/index/getDefaultSigninPage.d.ts +0 -32
- package/index/getDefaultSigninPage.js.map +0 -1
- package/index/getDomain.js.map +0 -1
- package/index/getLogStream.js.map +0 -1
- package/index/getOrgMetadata.js.map +0 -1
- package/index/index.d.ts +0 -27
- package/index/index.js +0 -54
- package/index/index.js.map +0 -1
- package/index/logStream.js.map +0 -1
- package/index/previewSigninPage.js.map +0 -1
- package/package.json.bak +0 -27
|
@@ -13,24 +13,24 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
* import * as okta from "@pulumi/okta";
|
|
14
14
|
*
|
|
15
15
|
* const example = new okta.AppSharedCredentials("example", {
|
|
16
|
-
* accessibilityErrorRedirectUrl: "https://example.com/redirect_url_1",
|
|
17
|
-
* accessibilityLoginRedirectUrl: "https://example.com/redirect_url_2",
|
|
18
|
-
* accessibilitySelfService: true,
|
|
19
|
-
* autoSubmitToolbar: true,
|
|
20
|
-
* buttonField: "btn-login",
|
|
21
|
-
* checkbox: "checkbox_red",
|
|
22
|
-
* hideIos: true,
|
|
23
16
|
* label: "Example App",
|
|
24
|
-
* passwordField: "txtbox-password",
|
|
25
|
-
* redirectUrl: "https://example.com/redirect_url",
|
|
26
|
-
* sharedPassword: "sharedpass",
|
|
27
|
-
* sharedUsername: "sharedusername",
|
|
28
17
|
* status: "ACTIVE",
|
|
18
|
+
* buttonField: "btn-login",
|
|
19
|
+
* usernameField: "txtbox-username",
|
|
20
|
+
* passwordField: "txtbox-password",
|
|
29
21
|
* url: "https://example.com/login.html",
|
|
22
|
+
* redirectUrl: "https://example.com/redirect_url",
|
|
23
|
+
* checkbox: "checkbox_red",
|
|
30
24
|
* userNameTemplate: "user.firstName",
|
|
31
|
-
* userNameTemplateSuffix: "hello",
|
|
32
25
|
* userNameTemplateType: "CUSTOM",
|
|
33
|
-
*
|
|
26
|
+
* userNameTemplateSuffix: "hello",
|
|
27
|
+
* sharedPassword: "sharedpass",
|
|
28
|
+
* sharedUsername: "sharedusername",
|
|
29
|
+
* accessibilitySelfService: true,
|
|
30
|
+
* accessibilityErrorRedirectUrl: "https://example.com/redirect_url_1",
|
|
31
|
+
* accessibilityLoginRedirectUrl: "https://example.com/redirect_url_2",
|
|
32
|
+
* autoSubmitToolbar: true,
|
|
33
|
+
* hideIos: true,
|
|
34
34
|
* });
|
|
35
35
|
* ```
|
|
36
36
|
*
|
package/appSharedCredentials.js
CHANGED
|
@@ -19,24 +19,24 @@ const utilities = require("./utilities");
|
|
|
19
19
|
* import * as okta from "@pulumi/okta";
|
|
20
20
|
*
|
|
21
21
|
* const example = new okta.AppSharedCredentials("example", {
|
|
22
|
-
* accessibilityErrorRedirectUrl: "https://example.com/redirect_url_1",
|
|
23
|
-
* accessibilityLoginRedirectUrl: "https://example.com/redirect_url_2",
|
|
24
|
-
* accessibilitySelfService: true,
|
|
25
|
-
* autoSubmitToolbar: true,
|
|
26
|
-
* buttonField: "btn-login",
|
|
27
|
-
* checkbox: "checkbox_red",
|
|
28
|
-
* hideIos: true,
|
|
29
22
|
* label: "Example App",
|
|
30
|
-
* passwordField: "txtbox-password",
|
|
31
|
-
* redirectUrl: "https://example.com/redirect_url",
|
|
32
|
-
* sharedPassword: "sharedpass",
|
|
33
|
-
* sharedUsername: "sharedusername",
|
|
34
23
|
* status: "ACTIVE",
|
|
24
|
+
* buttonField: "btn-login",
|
|
25
|
+
* usernameField: "txtbox-username",
|
|
26
|
+
* passwordField: "txtbox-password",
|
|
35
27
|
* url: "https://example.com/login.html",
|
|
28
|
+
* redirectUrl: "https://example.com/redirect_url",
|
|
29
|
+
* checkbox: "checkbox_red",
|
|
36
30
|
* userNameTemplate: "user.firstName",
|
|
37
|
-
* userNameTemplateSuffix: "hello",
|
|
38
31
|
* userNameTemplateType: "CUSTOM",
|
|
39
|
-
*
|
|
32
|
+
* userNameTemplateSuffix: "hello",
|
|
33
|
+
* sharedPassword: "sharedpass",
|
|
34
|
+
* sharedUsername: "sharedusername",
|
|
35
|
+
* accessibilitySelfService: true,
|
|
36
|
+
* accessibilityErrorRedirectUrl: "https://example.com/redirect_url_1",
|
|
37
|
+
* accessibilityLoginRedirectUrl: "https://example.com/redirect_url_2",
|
|
38
|
+
* autoSubmitToolbar: true,
|
|
39
|
+
* hideIos: true,
|
|
40
40
|
* });
|
|
41
41
|
* ```
|
|
42
42
|
*
|
package/appSignonPolicy.d.ts
CHANGED
|
@@ -6,8 +6,11 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
6
6
|
* import * as pulumi from "@pulumi/pulumi";
|
|
7
7
|
* import * as okta from "@pulumi/okta";
|
|
8
8
|
*
|
|
9
|
-
* const myAppPolicy = new okta.AppSignonPolicy("
|
|
10
|
-
*
|
|
9
|
+
* const myAppPolicy = new okta.AppSignonPolicy("my_app_policy", {
|
|
10
|
+
* name: "My App Sign-On Policy",
|
|
11
|
+
* description: "Authentication Policy to be used on my app.",
|
|
12
|
+
* });
|
|
13
|
+
* const myApp = new okta.app.OAuth("my_app", {
|
|
11
14
|
* label: "My App",
|
|
12
15
|
* type: "web",
|
|
13
16
|
* grantTypes: ["authorization_code"],
|
|
@@ -24,9 +27,13 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
24
27
|
* import * as pulumi from "@pulumi/pulumi";
|
|
25
28
|
* import * as okta from "@pulumi/okta";
|
|
26
29
|
*
|
|
27
|
-
* const myAppPolicy = new okta.AppSignonPolicy("
|
|
28
|
-
*
|
|
29
|
-
*
|
|
30
|
+
* const myAppPolicy = new okta.AppSignonPolicy("my_app_policy", {
|
|
31
|
+
* name: "My App Sign-On Policy",
|
|
32
|
+
* description: "Authentication Policy to be used on my app.",
|
|
33
|
+
* });
|
|
34
|
+
* const someRule = new okta.AppSignonPolicyRule("some_rule", {
|
|
35
|
+
* policyId: oktaAppSignonPolicy.myAppPolicy.id,
|
|
36
|
+
* name: "Some Rule",
|
|
30
37
|
* factorMode: "1FA",
|
|
31
38
|
* reAuthenticationFrequency: "PT43800H",
|
|
32
39
|
* constraints: [JSON.stringify({
|
package/appSignonPolicy.js
CHANGED
|
@@ -12,8 +12,11 @@ const utilities = require("./utilities");
|
|
|
12
12
|
* import * as pulumi from "@pulumi/pulumi";
|
|
13
13
|
* import * as okta from "@pulumi/okta";
|
|
14
14
|
*
|
|
15
|
-
* const myAppPolicy = new okta.AppSignonPolicy("
|
|
16
|
-
*
|
|
15
|
+
* const myAppPolicy = new okta.AppSignonPolicy("my_app_policy", {
|
|
16
|
+
* name: "My App Sign-On Policy",
|
|
17
|
+
* description: "Authentication Policy to be used on my app.",
|
|
18
|
+
* });
|
|
19
|
+
* const myApp = new okta.app.OAuth("my_app", {
|
|
17
20
|
* label: "My App",
|
|
18
21
|
* type: "web",
|
|
19
22
|
* grantTypes: ["authorization_code"],
|
|
@@ -30,9 +33,13 @@ const utilities = require("./utilities");
|
|
|
30
33
|
* import * as pulumi from "@pulumi/pulumi";
|
|
31
34
|
* import * as okta from "@pulumi/okta";
|
|
32
35
|
*
|
|
33
|
-
* const myAppPolicy = new okta.AppSignonPolicy("
|
|
34
|
-
*
|
|
35
|
-
*
|
|
36
|
+
* const myAppPolicy = new okta.AppSignonPolicy("my_app_policy", {
|
|
37
|
+
* name: "My App Sign-On Policy",
|
|
38
|
+
* description: "Authentication Policy to be used on my app.",
|
|
39
|
+
* });
|
|
40
|
+
* const someRule = new okta.AppSignonPolicyRule("some_rule", {
|
|
41
|
+
* policyId: oktaAppSignonPolicy.myAppPolicy.id,
|
|
42
|
+
* name: "Some Rule",
|
|
36
43
|
* factorMode: "1FA",
|
|
37
44
|
* reAuthenticationFrequency: "PT43800H",
|
|
38
45
|
* constraints: [JSON.stringify({
|
package/appSignonPolicy.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"appSignonPolicy.js","sourceRoot":"","sources":["../appSignonPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"appSignonPolicy.js","sourceRoot":"","sources":["../appSignonPolicy.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA4CG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3D;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;SACzD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AA9DL,0CA+DC;AAjDG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
|
package/appSignonPolicyRule.d.ts
CHANGED
|
@@ -13,7 +13,40 @@ import * as outputs from "./types/output";
|
|
|
13
13
|
*
|
|
14
14
|
* ## Example Usage
|
|
15
15
|
*
|
|
16
|
+
* ### Simple usage
|
|
17
|
+
*
|
|
18
|
+
* ```typescript
|
|
19
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
20
|
+
* import * as okta from "@pulumi/okta";
|
|
21
|
+
*
|
|
22
|
+
* const testSaml = new okta.app.Saml("test", {
|
|
23
|
+
* label: "My App",
|
|
24
|
+
* ssoUrl: "https://google.com",
|
|
25
|
+
* recipient: "https://here.com",
|
|
26
|
+
* destination: "https://its-about-the-journey.com",
|
|
27
|
+
* audience: "https://audience.com",
|
|
28
|
+
* status: "ACTIVE",
|
|
29
|
+
* subjectNameIdTemplate: "${user.userName}",
|
|
30
|
+
* subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
|
|
31
|
+
* signatureAlgorithm: "RSA_SHA256",
|
|
32
|
+
* responseSigned: true,
|
|
33
|
+
* digestAlgorithm: "SHA256",
|
|
34
|
+
* honorForceAuthn: false,
|
|
35
|
+
* authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
|
|
36
|
+
* });
|
|
37
|
+
* const test = okta.getAppSignonPolicyOutput({
|
|
38
|
+
* appId: testSaml.id,
|
|
39
|
+
* });
|
|
40
|
+
* const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("test", {
|
|
41
|
+
* policyId: test.apply(test => test.id),
|
|
42
|
+
* name: "testAcc_replace_with_uuid",
|
|
43
|
+
* });
|
|
44
|
+
* ```
|
|
45
|
+
*
|
|
46
|
+
* This will create an app sign-on policy rule with the following `THEN` block:
|
|
47
|
+
*
|
|
16
48
|
* ### Rule with Constraints
|
|
49
|
+
*
|
|
17
50
|
* ### Example 1:
|
|
18
51
|
*
|
|
19
52
|
* ```typescript
|
|
@@ -21,7 +54,8 @@ import * as outputs from "./types/output";
|
|
|
21
54
|
* import * as okta from "@pulumi/okta";
|
|
22
55
|
*
|
|
23
56
|
* const test = new okta.AppSignonPolicyRule("test", {
|
|
24
|
-
* policyId:
|
|
57
|
+
* policyId: testOktaAppSignonPolicy.id,
|
|
58
|
+
* name: "testAcc_replace_with_uuid",
|
|
25
59
|
* constraints: [JSON.stringify({
|
|
26
60
|
* knowledge: {
|
|
27
61
|
* types: ["password"],
|
|
@@ -32,9 +66,6 @@ import * as outputs from "./types/output";
|
|
|
32
66
|
*
|
|
33
67
|
* This will create an app sign-on policy rule with the following `THEN` block:
|
|
34
68
|
*
|
|
35
|
-
* ```typescript
|
|
36
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
37
|
-
* ```
|
|
38
69
|
* ### Example 2:
|
|
39
70
|
*
|
|
40
71
|
* ```typescript
|
|
@@ -42,7 +73,8 @@ import * as outputs from "./types/output";
|
|
|
42
73
|
* import * as okta from "@pulumi/okta";
|
|
43
74
|
*
|
|
44
75
|
* const test = new okta.AppSignonPolicyRule("test", {
|
|
45
|
-
* policyId:
|
|
76
|
+
* policyId: testOktaAppSignonPolicy.id,
|
|
77
|
+
* name: "testAcc_replace_with_uuid",
|
|
46
78
|
* constraints: [JSON.stringify({
|
|
47
79
|
* knowledge: {
|
|
48
80
|
* reauthenticateIn: "PT2H",
|
|
@@ -58,19 +90,16 @@ import * as outputs from "./types/output";
|
|
|
58
90
|
*
|
|
59
91
|
* This will create an app sign-on policy rule with the following `THEN` block:
|
|
60
92
|
*
|
|
61
|
-
* ```typescript
|
|
62
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
63
|
-
* ```
|
|
64
|
-
*
|
|
65
93
|
* More examples can be
|
|
66
94
|
* found [here](https://developer.okta.com/docs/reference/api/policy/#verification-method-json-examples).
|
|
95
|
+
*
|
|
67
96
|
* ### Complex example
|
|
68
97
|
*
|
|
69
98
|
* ```typescript
|
|
70
99
|
* import * as pulumi from "@pulumi/pulumi";
|
|
71
100
|
* import * as okta from "@pulumi/okta";
|
|
72
101
|
*
|
|
73
|
-
* const testSaml = new okta.app.Saml("
|
|
102
|
+
* const testSaml = new okta.app.Saml("test", {
|
|
74
103
|
* label: "testAcc_replace_with_uuid",
|
|
75
104
|
* ssoUrl: "https://google.com",
|
|
76
105
|
* recipient: "https://here.com",
|
|
@@ -85,32 +114,32 @@ import * as outputs from "./types/output";
|
|
|
85
114
|
* authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
|
|
86
115
|
* singleLogoutIssuer: "https://dunshire.okta.com",
|
|
87
116
|
* singleLogoutUrl: "https://dunshire.okta.com/logout",
|
|
88
|
-
* singleLogoutCertificate: `MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV
|
|
89
|
-
* BAgMBU1haW5lMRAwDgYDVQQHDAdDYXJpYm91MRcwFQYDVQQKDA5Tbm93bWFrZXJzIEluYzEUMBIG
|
|
90
|
-
* A1UECwwLRW5naW5lZXJpbmcxDTALBgNVBAMMBFNub3cxIDAeBgkqhkiG9w0BCQEWEWVtYWlsQGV4
|
|
91
|
-
* YW1wbGUuY29tMB4XDTIwMTIwMzIyNDY0M1oXDTMwMTIwMTIyNDY0M1owgY8xCzAJBgNVBAYTAlVT
|
|
92
|
-
* MQ4wDAYDVQQIDAVNYWluZTEQMA4GA1UEBwwHQ2FyaWJvdTEXMBUGA1UECgwOU25vd21ha2VycyBJ
|
|
93
|
-
* bmMxFDASBgNVBAsMC0VuZ2luZWVyaW5nMQ0wCwYDVQQDDARTbm93MSAwHgYJKoZIhvcNAQkBFhFl
|
|
94
|
-
* bWFpbEBleGFtcGxlLmNvbTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANMmWDjXPdoa
|
|
95
|
-
* PyzIENqeY9njLan2FqCbQPSestWUUcb6NhDsJVGSQ7XR+ozQA5TaJzbP7cAJUj8vCcbqMZsgOQAu
|
|
96
|
-
* O/pzYyQEKptLmrGvPn7xkJ1A1xLkp2NY18cpDTeUPueJUoidZ9EJwEuyUZIktzxNNU1pA1lGijiu
|
|
97
|
-
* 2XNxs9d9JR/hm3tCu9Im8qLVB4JtX80YUa6QtlRjWR/H8a373AYCOASdoB3c57fIPD8ATDNy2w/c
|
|
98
|
-
* fCVGiyKDMFB+GA/WTsZpOP3iohRp8ltAncSuzypcztb2iE+jijtTsiC9kUA2abAJqqpoCJubNShi
|
|
99
|
-
* Vff4822czpziS44MV2guC9wANi8u3Uyl5MKsU95j01jzadKRP5S+2f0K+n8n4UoV9fnqZFyuGAKd
|
|
100
|
-
* CJi9K6NlSAP+TgPe/JP9FOSuxQOHWJfmdLHdJD+evoKi9E55sr5lRFK0xU1Fj5Ld7zjC0pXPhtJf
|
|
101
|
-
* sgjEZzD433AsHnRzvRT1KSNCPkLYomznZo5n9rWYgCQ8HcytlQDTesmKE+s05E/VSWNtH84XdDrt
|
|
102
|
-
* ieXwfwhHfaABSu+WjZYxi9CXdFCSvXhsgufUcK4FbYAHl/ga/cJxZc52yFC7Pcq0u9O2BSCjYPdQ
|
|
103
|
-
* DAHs9dhT1RhwVLM8RmoAzgxyyzau0gxnAlgSBD9FMW6dXqIHIp8yAAg9cRXhYRTNAgMBAAEwDQYJ
|
|
104
|
-
* KoZIhvcNAQELBQADggIBADofEC1SvG8qa7pmKCjB/E9Sxhk3mvUO9Gq43xzwVb721Ng3VYf4vGU3
|
|
105
|
-
* wLUwJeLt0wggnj26NJweN5T3q9T8UMxZhHSWvttEU3+S1nArRB0beti716HSlOCDx4wTmBu/D1MG
|
|
106
|
-
* t/kZYFJw+zuzvAcbYct2pK69AQhD8xAIbQvqADJI7cCK3yRry+aWtppc58P81KYabUlCfFXfhJ9E
|
|
107
|
-
* P72ffN4jVHpX3lxxYh7FKAdiKbY2FYzjsc7RdgKI1R3iAAZUCGBTvezNzaetGzTUjjl/g1tcVYij
|
|
108
|
-
* ltH9ZOQBPlUMI88lxUxqgRTerpPmAJH00CACx4JFiZrweLM1trZyy06wNDQgLrqHr3EOagBF/O2h
|
|
109
|
-
* hfTehNdVr6iq3YhKWBo4/+RL0RCzHMh4u86VbDDnDn4Y6HzLuyIAtBFoikoKM6UHTOa0Pqv2bBr5
|
|
110
|
-
* wbkRkVUxl9yJJw/HmTCdfnsM9dTOJUKzEglnGF2184Gg+qJDZB6fSf0EAO1F6sTqiSswl+uHQZiy
|
|
111
|
-
* DaZzyU7Gg5seKOZ20zTRaX3Ihj9Zij/ORnrARE7eM/usKMECp+7syUwAUKxDCZkGiUdskmOhhBGL
|
|
112
|
-
* JtbyK3F2UvoJoLsm3pIcvMak9KwMjSTGJB47ABUP1+w+zGcNk0D5Co3IJ6QekiLfWJyQ+kKsWLKt
|
|
113
|
-
* zOYQQatrnBagM7MI2/T4
|
|
117
|
+
* singleLogoutCertificate: `MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV\x0d
|
|
118
|
+
* BAgMBU1haW5lMRAwDgYDVQQHDAdDYXJpYm91MRcwFQYDVQQKDA5Tbm93bWFrZXJzIEluYzEUMBIG\x0d
|
|
119
|
+
* A1UECwwLRW5naW5lZXJpbmcxDTALBgNVBAMMBFNub3cxIDAeBgkqhkiG9w0BCQEWEWVtYWlsQGV4\x0d
|
|
120
|
+
* YW1wbGUuY29tMB4XDTIwMTIwMzIyNDY0M1oXDTMwMTIwMTIyNDY0M1owgY8xCzAJBgNVBAYTAlVT\x0d
|
|
121
|
+
* MQ4wDAYDVQQIDAVNYWluZTEQMA4GA1UEBwwHQ2FyaWJvdTEXMBUGA1UECgwOU25vd21ha2VycyBJ\x0d
|
|
122
|
+
* bmMxFDASBgNVBAsMC0VuZ2luZWVyaW5nMQ0wCwYDVQQDDARTbm93MSAwHgYJKoZIhvcNAQkBFhFl\x0d
|
|
123
|
+
* bWFpbEBleGFtcGxlLmNvbTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANMmWDjXPdoa\x0d
|
|
124
|
+
* PyzIENqeY9njLan2FqCbQPSestWUUcb6NhDsJVGSQ7XR+ozQA5TaJzbP7cAJUj8vCcbqMZsgOQAu\x0d
|
|
125
|
+
* O/pzYyQEKptLmrGvPn7xkJ1A1xLkp2NY18cpDTeUPueJUoidZ9EJwEuyUZIktzxNNU1pA1lGijiu\x0d
|
|
126
|
+
* 2XNxs9d9JR/hm3tCu9Im8qLVB4JtX80YUa6QtlRjWR/H8a373AYCOASdoB3c57fIPD8ATDNy2w/c\x0d
|
|
127
|
+
* fCVGiyKDMFB+GA/WTsZpOP3iohRp8ltAncSuzypcztb2iE+jijtTsiC9kUA2abAJqqpoCJubNShi\x0d
|
|
128
|
+
* Vff4822czpziS44MV2guC9wANi8u3Uyl5MKsU95j01jzadKRP5S+2f0K+n8n4UoV9fnqZFyuGAKd\x0d
|
|
129
|
+
* CJi9K6NlSAP+TgPe/JP9FOSuxQOHWJfmdLHdJD+evoKi9E55sr5lRFK0xU1Fj5Ld7zjC0pXPhtJf\x0d
|
|
130
|
+
* sgjEZzD433AsHnRzvRT1KSNCPkLYomznZo5n9rWYgCQ8HcytlQDTesmKE+s05E/VSWNtH84XdDrt\x0d
|
|
131
|
+
* ieXwfwhHfaABSu+WjZYxi9CXdFCSvXhsgufUcK4FbYAHl/ga/cJxZc52yFC7Pcq0u9O2BSCjYPdQ\x0d
|
|
132
|
+
* DAHs9dhT1RhwVLM8RmoAzgxyyzau0gxnAlgSBD9FMW6dXqIHIp8yAAg9cRXhYRTNAgMBAAEwDQYJ\x0d
|
|
133
|
+
* KoZIhvcNAQELBQADggIBADofEC1SvG8qa7pmKCjB/E9Sxhk3mvUO9Gq43xzwVb721Ng3VYf4vGU3\x0d
|
|
134
|
+
* wLUwJeLt0wggnj26NJweN5T3q9T8UMxZhHSWvttEU3+S1nArRB0beti716HSlOCDx4wTmBu/D1MG\x0d
|
|
135
|
+
* t/kZYFJw+zuzvAcbYct2pK69AQhD8xAIbQvqADJI7cCK3yRry+aWtppc58P81KYabUlCfFXfhJ9E\x0d
|
|
136
|
+
* P72ffN4jVHpX3lxxYh7FKAdiKbY2FYzjsc7RdgKI1R3iAAZUCGBTvezNzaetGzTUjjl/g1tcVYij\x0d
|
|
137
|
+
* ltH9ZOQBPlUMI88lxUxqgRTerpPmAJH00CACx4JFiZrweLM1trZyy06wNDQgLrqHr3EOagBF/O2h\x0d
|
|
138
|
+
* hfTehNdVr6iq3YhKWBo4/+RL0RCzHMh4u86VbDDnDn4Y6HzLuyIAtBFoikoKM6UHTOa0Pqv2bBr5\x0d
|
|
139
|
+
* wbkRkVUxl9yJJw/HmTCdfnsM9dTOJUKzEglnGF2184Gg+qJDZB6fSf0EAO1F6sTqiSswl+uHQZiy\x0d
|
|
140
|
+
* DaZzyU7Gg5seKOZ20zTRaX3Ihj9Zij/ORnrARE7eM/usKMECp+7syUwAUKxDCZkGiUdskmOhhBGL\x0d
|
|
141
|
+
* JtbyK3F2UvoJoLsm3pIcvMak9KwMjSTGJB47ABUP1+w+zGcNk0D5Co3IJ6QekiLfWJyQ+kKsWLKt\x0d
|
|
142
|
+
* zOYQQatrnBagM7MI2/T4\x0d
|
|
114
143
|
* `,
|
|
115
144
|
* attributeStatements: [{
|
|
116
145
|
* type: "GROUP",
|
|
@@ -119,12 +148,12 @@ import * as outputs from "./types/output";
|
|
|
119
148
|
* filterValue: ".*",
|
|
120
149
|
* }],
|
|
121
150
|
* });
|
|
122
|
-
* const
|
|
151
|
+
* const test = okta.getAppSignonPolicyOutput({
|
|
123
152
|
* appId: testSaml.id,
|
|
124
153
|
* });
|
|
125
154
|
* const testUser: okta.user.User[] = [];
|
|
126
155
|
* for (const range = {value: 0}; range.value < 5; range.value++) {
|
|
127
|
-
* testUser.push(new okta.user.User(`
|
|
156
|
+
* testUser.push(new okta.user.User(`test-${range.value}`, {
|
|
128
157
|
* firstName: "TestAcc",
|
|
129
158
|
* lastName: "Smith",
|
|
130
159
|
* login: `testAcc_${range.value}@example.com`,
|
|
@@ -133,13 +162,18 @@ import * as outputs from "./types/output";
|
|
|
133
162
|
* }
|
|
134
163
|
* const _this: okta.group.Group[] = [];
|
|
135
164
|
* for (const range = {value: 0}; range.value < 5; range.value++) {
|
|
136
|
-
* _this.push(new okta.group.Group(`this-${range.value}`, {
|
|
165
|
+
* _this.push(new okta.group.Group(`this-${range.value}`, {
|
|
166
|
+
* name: `testAcc_${range.value}`,
|
|
167
|
+
* description: `testAcc_${range.value}`,
|
|
168
|
+
* }));
|
|
137
169
|
* }
|
|
138
|
-
* const testUserType = new okta.user.UserType("
|
|
170
|
+
* const testUserType = new okta.user.UserType("test", {
|
|
171
|
+
* name: "testAcc_replace_with_uuid",
|
|
139
172
|
* displayName: "Terraform Acceptance Test User Type Updated",
|
|
140
173
|
* description: "Terraform Acceptance Test User Type Updated",
|
|
141
174
|
* });
|
|
142
|
-
* const testZone = new okta.network.Zone("
|
|
175
|
+
* const testZone = new okta.network.Zone("test", {
|
|
176
|
+
* name: "testAcc_replace_with_uuid",
|
|
143
177
|
* type: "IP",
|
|
144
178
|
* gateways: [
|
|
145
179
|
* "1.2.3.4/24",
|
|
@@ -153,12 +187,14 @@ import * as outputs from "./types/output";
|
|
|
153
187
|
* const default = okta.user.getUserType({
|
|
154
188
|
* name: "user",
|
|
155
189
|
* });
|
|
156
|
-
* const testDeviceAssuranceAndroid = new okta.policy.DeviceAssuranceAndroid("
|
|
190
|
+
* const testDeviceAssuranceAndroid = new okta.policy.DeviceAssuranceAndroid("test", {
|
|
191
|
+
* name: "test",
|
|
157
192
|
* osVersion: "12",
|
|
158
193
|
* jailbreak: false,
|
|
159
194
|
* });
|
|
160
|
-
* const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("
|
|
161
|
-
*
|
|
195
|
+
* const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("test", {
|
|
196
|
+
* name: "testAcc_replace_with_uuid",
|
|
197
|
+
* policyId: test.apply(test => test.id),
|
|
162
198
|
* access: "ALLOW",
|
|
163
199
|
* customExpression: "user.status == \"ACTIVE\"",
|
|
164
200
|
* deviceIsManaged: false,
|
|
@@ -246,7 +282,7 @@ import * as outputs from "./types/output";
|
|
|
246
282
|
* Okta app sign-on policy rule can be imported via the Okta ID.
|
|
247
283
|
*
|
|
248
284
|
* ```sh
|
|
249
|
-
*
|
|
285
|
+
* $ pulumi import okta:index/appSignonPolicyRule:AppSignonPolicyRule example <policy_id>/<rule_id>
|
|
250
286
|
* ```
|
|
251
287
|
*/
|
|
252
288
|
export declare class AppSignonPolicyRule extends pulumi.CustomResource {
|
package/appSignonPolicyRule.js
CHANGED
|
@@ -17,7 +17,40 @@ const utilities = require("./utilities");
|
|
|
17
17
|
*
|
|
18
18
|
* ## Example Usage
|
|
19
19
|
*
|
|
20
|
+
* ### Simple usage
|
|
21
|
+
*
|
|
22
|
+
* ```typescript
|
|
23
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
24
|
+
* import * as okta from "@pulumi/okta";
|
|
25
|
+
*
|
|
26
|
+
* const testSaml = new okta.app.Saml("test", {
|
|
27
|
+
* label: "My App",
|
|
28
|
+
* ssoUrl: "https://google.com",
|
|
29
|
+
* recipient: "https://here.com",
|
|
30
|
+
* destination: "https://its-about-the-journey.com",
|
|
31
|
+
* audience: "https://audience.com",
|
|
32
|
+
* status: "ACTIVE",
|
|
33
|
+
* subjectNameIdTemplate: "${user.userName}",
|
|
34
|
+
* subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
|
|
35
|
+
* signatureAlgorithm: "RSA_SHA256",
|
|
36
|
+
* responseSigned: true,
|
|
37
|
+
* digestAlgorithm: "SHA256",
|
|
38
|
+
* honorForceAuthn: false,
|
|
39
|
+
* authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
|
|
40
|
+
* });
|
|
41
|
+
* const test = okta.getAppSignonPolicyOutput({
|
|
42
|
+
* appId: testSaml.id,
|
|
43
|
+
* });
|
|
44
|
+
* const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("test", {
|
|
45
|
+
* policyId: test.apply(test => test.id),
|
|
46
|
+
* name: "testAcc_replace_with_uuid",
|
|
47
|
+
* });
|
|
48
|
+
* ```
|
|
49
|
+
*
|
|
50
|
+
* This will create an app sign-on policy rule with the following `THEN` block:
|
|
51
|
+
*
|
|
20
52
|
* ### Rule with Constraints
|
|
53
|
+
*
|
|
21
54
|
* ### Example 1:
|
|
22
55
|
*
|
|
23
56
|
* ```typescript
|
|
@@ -25,7 +58,8 @@ const utilities = require("./utilities");
|
|
|
25
58
|
* import * as okta from "@pulumi/okta";
|
|
26
59
|
*
|
|
27
60
|
* const test = new okta.AppSignonPolicyRule("test", {
|
|
28
|
-
* policyId:
|
|
61
|
+
* policyId: testOktaAppSignonPolicy.id,
|
|
62
|
+
* name: "testAcc_replace_with_uuid",
|
|
29
63
|
* constraints: [JSON.stringify({
|
|
30
64
|
* knowledge: {
|
|
31
65
|
* types: ["password"],
|
|
@@ -36,9 +70,6 @@ const utilities = require("./utilities");
|
|
|
36
70
|
*
|
|
37
71
|
* This will create an app sign-on policy rule with the following `THEN` block:
|
|
38
72
|
*
|
|
39
|
-
* ```typescript
|
|
40
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
41
|
-
* ```
|
|
42
73
|
* ### Example 2:
|
|
43
74
|
*
|
|
44
75
|
* ```typescript
|
|
@@ -46,7 +77,8 @@ const utilities = require("./utilities");
|
|
|
46
77
|
* import * as okta from "@pulumi/okta";
|
|
47
78
|
*
|
|
48
79
|
* const test = new okta.AppSignonPolicyRule("test", {
|
|
49
|
-
* policyId:
|
|
80
|
+
* policyId: testOktaAppSignonPolicy.id,
|
|
81
|
+
* name: "testAcc_replace_with_uuid",
|
|
50
82
|
* constraints: [JSON.stringify({
|
|
51
83
|
* knowledge: {
|
|
52
84
|
* reauthenticateIn: "PT2H",
|
|
@@ -62,19 +94,16 @@ const utilities = require("./utilities");
|
|
|
62
94
|
*
|
|
63
95
|
* This will create an app sign-on policy rule with the following `THEN` block:
|
|
64
96
|
*
|
|
65
|
-
* ```typescript
|
|
66
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
67
|
-
* ```
|
|
68
|
-
*
|
|
69
97
|
* More examples can be
|
|
70
98
|
* found [here](https://developer.okta.com/docs/reference/api/policy/#verification-method-json-examples).
|
|
99
|
+
*
|
|
71
100
|
* ### Complex example
|
|
72
101
|
*
|
|
73
102
|
* ```typescript
|
|
74
103
|
* import * as pulumi from "@pulumi/pulumi";
|
|
75
104
|
* import * as okta from "@pulumi/okta";
|
|
76
105
|
*
|
|
77
|
-
* const testSaml = new okta.app.Saml("
|
|
106
|
+
* const testSaml = new okta.app.Saml("test", {
|
|
78
107
|
* label: "testAcc_replace_with_uuid",
|
|
79
108
|
* ssoUrl: "https://google.com",
|
|
80
109
|
* recipient: "https://here.com",
|
|
@@ -89,32 +118,32 @@ const utilities = require("./utilities");
|
|
|
89
118
|
* authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
|
|
90
119
|
* singleLogoutIssuer: "https://dunshire.okta.com",
|
|
91
120
|
* singleLogoutUrl: "https://dunshire.okta.com/logout",
|
|
92
|
-
* singleLogoutCertificate: `MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV
|
|
93
|
-
* BAgMBU1haW5lMRAwDgYDVQQHDAdDYXJpYm91MRcwFQYDVQQKDA5Tbm93bWFrZXJzIEluYzEUMBIG
|
|
94
|
-
* A1UECwwLRW5naW5lZXJpbmcxDTALBgNVBAMMBFNub3cxIDAeBgkqhkiG9w0BCQEWEWVtYWlsQGV4
|
|
95
|
-
* YW1wbGUuY29tMB4XDTIwMTIwMzIyNDY0M1oXDTMwMTIwMTIyNDY0M1owgY8xCzAJBgNVBAYTAlVT
|
|
96
|
-
* MQ4wDAYDVQQIDAVNYWluZTEQMA4GA1UEBwwHQ2FyaWJvdTEXMBUGA1UECgwOU25vd21ha2VycyBJ
|
|
97
|
-
* bmMxFDASBgNVBAsMC0VuZ2luZWVyaW5nMQ0wCwYDVQQDDARTbm93MSAwHgYJKoZIhvcNAQkBFhFl
|
|
98
|
-
* bWFpbEBleGFtcGxlLmNvbTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANMmWDjXPdoa
|
|
99
|
-
* PyzIENqeY9njLan2FqCbQPSestWUUcb6NhDsJVGSQ7XR+ozQA5TaJzbP7cAJUj8vCcbqMZsgOQAu
|
|
100
|
-
* O/pzYyQEKptLmrGvPn7xkJ1A1xLkp2NY18cpDTeUPueJUoidZ9EJwEuyUZIktzxNNU1pA1lGijiu
|
|
101
|
-
* 2XNxs9d9JR/hm3tCu9Im8qLVB4JtX80YUa6QtlRjWR/H8a373AYCOASdoB3c57fIPD8ATDNy2w/c
|
|
102
|
-
* fCVGiyKDMFB+GA/WTsZpOP3iohRp8ltAncSuzypcztb2iE+jijtTsiC9kUA2abAJqqpoCJubNShi
|
|
103
|
-
* Vff4822czpziS44MV2guC9wANi8u3Uyl5MKsU95j01jzadKRP5S+2f0K+n8n4UoV9fnqZFyuGAKd
|
|
104
|
-
* CJi9K6NlSAP+TgPe/JP9FOSuxQOHWJfmdLHdJD+evoKi9E55sr5lRFK0xU1Fj5Ld7zjC0pXPhtJf
|
|
105
|
-
* sgjEZzD433AsHnRzvRT1KSNCPkLYomznZo5n9rWYgCQ8HcytlQDTesmKE+s05E/VSWNtH84XdDrt
|
|
106
|
-
* ieXwfwhHfaABSu+WjZYxi9CXdFCSvXhsgufUcK4FbYAHl/ga/cJxZc52yFC7Pcq0u9O2BSCjYPdQ
|
|
107
|
-
* DAHs9dhT1RhwVLM8RmoAzgxyyzau0gxnAlgSBD9FMW6dXqIHIp8yAAg9cRXhYRTNAgMBAAEwDQYJ
|
|
108
|
-
* KoZIhvcNAQELBQADggIBADofEC1SvG8qa7pmKCjB/E9Sxhk3mvUO9Gq43xzwVb721Ng3VYf4vGU3
|
|
109
|
-
* wLUwJeLt0wggnj26NJweN5T3q9T8UMxZhHSWvttEU3+S1nArRB0beti716HSlOCDx4wTmBu/D1MG
|
|
110
|
-
* t/kZYFJw+zuzvAcbYct2pK69AQhD8xAIbQvqADJI7cCK3yRry+aWtppc58P81KYabUlCfFXfhJ9E
|
|
111
|
-
* P72ffN4jVHpX3lxxYh7FKAdiKbY2FYzjsc7RdgKI1R3iAAZUCGBTvezNzaetGzTUjjl/g1tcVYij
|
|
112
|
-
* ltH9ZOQBPlUMI88lxUxqgRTerpPmAJH00CACx4JFiZrweLM1trZyy06wNDQgLrqHr3EOagBF/O2h
|
|
113
|
-
* hfTehNdVr6iq3YhKWBo4/+RL0RCzHMh4u86VbDDnDn4Y6HzLuyIAtBFoikoKM6UHTOa0Pqv2bBr5
|
|
114
|
-
* wbkRkVUxl9yJJw/HmTCdfnsM9dTOJUKzEglnGF2184Gg+qJDZB6fSf0EAO1F6sTqiSswl+uHQZiy
|
|
115
|
-
* DaZzyU7Gg5seKOZ20zTRaX3Ihj9Zij/ORnrARE7eM/usKMECp+7syUwAUKxDCZkGiUdskmOhhBGL
|
|
116
|
-
* JtbyK3F2UvoJoLsm3pIcvMak9KwMjSTGJB47ABUP1+w+zGcNk0D5Co3IJ6QekiLfWJyQ+kKsWLKt
|
|
117
|
-
* zOYQQatrnBagM7MI2/T4
|
|
121
|
+
* singleLogoutCertificate: `MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV\x0d
|
|
122
|
+
* BAgMBU1haW5lMRAwDgYDVQQHDAdDYXJpYm91MRcwFQYDVQQKDA5Tbm93bWFrZXJzIEluYzEUMBIG\x0d
|
|
123
|
+
* A1UECwwLRW5naW5lZXJpbmcxDTALBgNVBAMMBFNub3cxIDAeBgkqhkiG9w0BCQEWEWVtYWlsQGV4\x0d
|
|
124
|
+
* YW1wbGUuY29tMB4XDTIwMTIwMzIyNDY0M1oXDTMwMTIwMTIyNDY0M1owgY8xCzAJBgNVBAYTAlVT\x0d
|
|
125
|
+
* MQ4wDAYDVQQIDAVNYWluZTEQMA4GA1UEBwwHQ2FyaWJvdTEXMBUGA1UECgwOU25vd21ha2VycyBJ\x0d
|
|
126
|
+
* bmMxFDASBgNVBAsMC0VuZ2luZWVyaW5nMQ0wCwYDVQQDDARTbm93MSAwHgYJKoZIhvcNAQkBFhFl\x0d
|
|
127
|
+
* bWFpbEBleGFtcGxlLmNvbTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANMmWDjXPdoa\x0d
|
|
128
|
+
* PyzIENqeY9njLan2FqCbQPSestWUUcb6NhDsJVGSQ7XR+ozQA5TaJzbP7cAJUj8vCcbqMZsgOQAu\x0d
|
|
129
|
+
* O/pzYyQEKptLmrGvPn7xkJ1A1xLkp2NY18cpDTeUPueJUoidZ9EJwEuyUZIktzxNNU1pA1lGijiu\x0d
|
|
130
|
+
* 2XNxs9d9JR/hm3tCu9Im8qLVB4JtX80YUa6QtlRjWR/H8a373AYCOASdoB3c57fIPD8ATDNy2w/c\x0d
|
|
131
|
+
* fCVGiyKDMFB+GA/WTsZpOP3iohRp8ltAncSuzypcztb2iE+jijtTsiC9kUA2abAJqqpoCJubNShi\x0d
|
|
132
|
+
* Vff4822czpziS44MV2guC9wANi8u3Uyl5MKsU95j01jzadKRP5S+2f0K+n8n4UoV9fnqZFyuGAKd\x0d
|
|
133
|
+
* CJi9K6NlSAP+TgPe/JP9FOSuxQOHWJfmdLHdJD+evoKi9E55sr5lRFK0xU1Fj5Ld7zjC0pXPhtJf\x0d
|
|
134
|
+
* sgjEZzD433AsHnRzvRT1KSNCPkLYomznZo5n9rWYgCQ8HcytlQDTesmKE+s05E/VSWNtH84XdDrt\x0d
|
|
135
|
+
* ieXwfwhHfaABSu+WjZYxi9CXdFCSvXhsgufUcK4FbYAHl/ga/cJxZc52yFC7Pcq0u9O2BSCjYPdQ\x0d
|
|
136
|
+
* DAHs9dhT1RhwVLM8RmoAzgxyyzau0gxnAlgSBD9FMW6dXqIHIp8yAAg9cRXhYRTNAgMBAAEwDQYJ\x0d
|
|
137
|
+
* KoZIhvcNAQELBQADggIBADofEC1SvG8qa7pmKCjB/E9Sxhk3mvUO9Gq43xzwVb721Ng3VYf4vGU3\x0d
|
|
138
|
+
* wLUwJeLt0wggnj26NJweN5T3q9T8UMxZhHSWvttEU3+S1nArRB0beti716HSlOCDx4wTmBu/D1MG\x0d
|
|
139
|
+
* t/kZYFJw+zuzvAcbYct2pK69AQhD8xAIbQvqADJI7cCK3yRry+aWtppc58P81KYabUlCfFXfhJ9E\x0d
|
|
140
|
+
* P72ffN4jVHpX3lxxYh7FKAdiKbY2FYzjsc7RdgKI1R3iAAZUCGBTvezNzaetGzTUjjl/g1tcVYij\x0d
|
|
141
|
+
* ltH9ZOQBPlUMI88lxUxqgRTerpPmAJH00CACx4JFiZrweLM1trZyy06wNDQgLrqHr3EOagBF/O2h\x0d
|
|
142
|
+
* hfTehNdVr6iq3YhKWBo4/+RL0RCzHMh4u86VbDDnDn4Y6HzLuyIAtBFoikoKM6UHTOa0Pqv2bBr5\x0d
|
|
143
|
+
* wbkRkVUxl9yJJw/HmTCdfnsM9dTOJUKzEglnGF2184Gg+qJDZB6fSf0EAO1F6sTqiSswl+uHQZiy\x0d
|
|
144
|
+
* DaZzyU7Gg5seKOZ20zTRaX3Ihj9Zij/ORnrARE7eM/usKMECp+7syUwAUKxDCZkGiUdskmOhhBGL\x0d
|
|
145
|
+
* JtbyK3F2UvoJoLsm3pIcvMak9KwMjSTGJB47ABUP1+w+zGcNk0D5Co3IJ6QekiLfWJyQ+kKsWLKt\x0d
|
|
146
|
+
* zOYQQatrnBagM7MI2/T4\x0d
|
|
118
147
|
* `,
|
|
119
148
|
* attributeStatements: [{
|
|
120
149
|
* type: "GROUP",
|
|
@@ -123,12 +152,12 @@ const utilities = require("./utilities");
|
|
|
123
152
|
* filterValue: ".*",
|
|
124
153
|
* }],
|
|
125
154
|
* });
|
|
126
|
-
* const
|
|
155
|
+
* const test = okta.getAppSignonPolicyOutput({
|
|
127
156
|
* appId: testSaml.id,
|
|
128
157
|
* });
|
|
129
158
|
* const testUser: okta.user.User[] = [];
|
|
130
159
|
* for (const range = {value: 0}; range.value < 5; range.value++) {
|
|
131
|
-
* testUser.push(new okta.user.User(`
|
|
160
|
+
* testUser.push(new okta.user.User(`test-${range.value}`, {
|
|
132
161
|
* firstName: "TestAcc",
|
|
133
162
|
* lastName: "Smith",
|
|
134
163
|
* login: `testAcc_${range.value}@example.com`,
|
|
@@ -137,13 +166,18 @@ const utilities = require("./utilities");
|
|
|
137
166
|
* }
|
|
138
167
|
* const _this: okta.group.Group[] = [];
|
|
139
168
|
* for (const range = {value: 0}; range.value < 5; range.value++) {
|
|
140
|
-
* _this.push(new okta.group.Group(`this-${range.value}`, {
|
|
169
|
+
* _this.push(new okta.group.Group(`this-${range.value}`, {
|
|
170
|
+
* name: `testAcc_${range.value}`,
|
|
171
|
+
* description: `testAcc_${range.value}`,
|
|
172
|
+
* }));
|
|
141
173
|
* }
|
|
142
|
-
* const testUserType = new okta.user.UserType("
|
|
174
|
+
* const testUserType = new okta.user.UserType("test", {
|
|
175
|
+
* name: "testAcc_replace_with_uuid",
|
|
143
176
|
* displayName: "Terraform Acceptance Test User Type Updated",
|
|
144
177
|
* description: "Terraform Acceptance Test User Type Updated",
|
|
145
178
|
* });
|
|
146
|
-
* const testZone = new okta.network.Zone("
|
|
179
|
+
* const testZone = new okta.network.Zone("test", {
|
|
180
|
+
* name: "testAcc_replace_with_uuid",
|
|
147
181
|
* type: "IP",
|
|
148
182
|
* gateways: [
|
|
149
183
|
* "1.2.3.4/24",
|
|
@@ -157,12 +191,14 @@ const utilities = require("./utilities");
|
|
|
157
191
|
* const default = okta.user.getUserType({
|
|
158
192
|
* name: "user",
|
|
159
193
|
* });
|
|
160
|
-
* const testDeviceAssuranceAndroid = new okta.policy.DeviceAssuranceAndroid("
|
|
194
|
+
* const testDeviceAssuranceAndroid = new okta.policy.DeviceAssuranceAndroid("test", {
|
|
195
|
+
* name: "test",
|
|
161
196
|
* osVersion: "12",
|
|
162
197
|
* jailbreak: false,
|
|
163
198
|
* });
|
|
164
|
-
* const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("
|
|
165
|
-
*
|
|
199
|
+
* const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("test", {
|
|
200
|
+
* name: "testAcc_replace_with_uuid",
|
|
201
|
+
* policyId: test.apply(test => test.id),
|
|
166
202
|
* access: "ALLOW",
|
|
167
203
|
* customExpression: "user.status == \"ACTIVE\"",
|
|
168
204
|
* deviceIsManaged: false,
|
|
@@ -250,7 +286,7 @@ const utilities = require("./utilities");
|
|
|
250
286
|
* Okta app sign-on policy rule can be imported via the Okta ID.
|
|
251
287
|
*
|
|
252
288
|
* ```sh
|
|
253
|
-
*
|
|
289
|
+
* $ pulumi import okta:index/appSignonPolicyRule:AppSignonPolicyRule example <policy_id>/<rule_id>
|
|
254
290
|
* ```
|
|
255
291
|
*/
|
|
256
292
|
class AppSignonPolicyRule extends pulumi.CustomResource {
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"appSignonPolicyRule.js","sourceRoot":"","sources":["../appSignonPolicyRule.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"appSignonPolicyRule.js","sourceRoot":"","sources":["../appSignonPolicyRule.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AAGzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2RG;AACH,MAAa,mBAAoB,SAAQ,MAAM,CAAC,cAAc;IAC1D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAgC,EAAE,IAAmC;QAC9H,OAAO,IAAI,mBAAmB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC1E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,mBAAmB,CAAC,YAAY,CAAC;IACpE,CAAC;IAqHD,YAAY,IAAY,EAAE,WAAgE,EAAE,IAAmC;QAC3H,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAmD,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,YAAY,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,mBAAmB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,iBAAiB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,kBAAkB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,2BAA2B,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClG,cAAc,CAAC,WAAW,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,oBAAoB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YACpF,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,gBAAgB,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/E;aAAM;YACH,MAAM,IAAI,GAAG,WAAkD,CAAC;YAChE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,YAAY,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,UAAU,CAAC,CAAC,CAAC,SAAS,CAAC;YAClE,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,mBAAmB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,iBAAiB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChF,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,iBAAiB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,eAAe,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5E,cAAc,CAAC,kBAAkB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,gBAAgB,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9E,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,2BAA2B,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,yBAAyB,CAAC,CAAC,CAAC,SAAS,CAAC;YAChG,cAAc,CAAC,WAAW,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,SAAS,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,oBAAoB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,kBAAkB,CAAC,CAAC,CAAC,SAAS,CAAC;YAClF,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,gBAAgB,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,cAAc,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1E,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,mBAAmB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACxE,CAAC;;AAhNL,kDAiNC;AAnMG,gBAAgB;AACO,gCAAY,GAAG,oDAAoD,CAAC"}
|
|
@@ -13,9 +13,9 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
13
|
* const example = new okta.AppUserBaseSchemaProperty("example", {
|
|
14
14
|
* appId: "<app id>",
|
|
15
15
|
* index: "customPropertyName",
|
|
16
|
-
* master: "OKTA",
|
|
17
16
|
* title: "customPropertyName",
|
|
18
17
|
* type: "string",
|
|
18
|
+
* master: "OKTA",
|
|
19
19
|
* });
|
|
20
20
|
* ```
|
|
21
21
|
*
|
|
@@ -19,9 +19,9 @@ const utilities = require("./utilities");
|
|
|
19
19
|
* const example = new okta.AppUserBaseSchemaProperty("example", {
|
|
20
20
|
* appId: "<app id>",
|
|
21
21
|
* index: "customPropertyName",
|
|
22
|
-
* master: "OKTA",
|
|
23
22
|
* title: "customPropertyName",
|
|
24
23
|
* type: "string",
|
|
24
|
+
* master: "OKTA",
|
|
25
25
|
* });
|
|
26
26
|
* ```
|
|
27
27
|
*
|