@pulumi/okta 4.9.0-alpha.1718344922 → 4.9.0-alpha.1718755579
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +105 -107
- package/adminRoleCustom.js +3 -5
- package/adminRoleCustom.js.map +1 -1
- package/adminRoleCustomAssignments.d.ts +12 -18
- package/adminRoleCustomAssignments.js +3 -6
- package/adminRoleCustomAssignments.js.map +1 -1
- package/adminRoleTargets.d.ts +14 -16
- package/adminRoleTargets.js +0 -2
- package/adminRoleTargets.js.map +1 -1
- package/app/accessPolicyAssignment.d.ts +23 -2
- package/app/accessPolicyAssignment.js +23 -2
- package/app/accessPolicyAssignment.js.map +1 -1
- package/app/autoLogin.d.ts +63 -97
- package/app/autoLogin.js +3 -37
- package/app/autoLogin.js.map +1 -1
- package/app/basicAuth.d.ts +30 -33
- package/app/basicAuth.js +4 -7
- package/app/basicAuth.js.map +1 -1
- package/app/bookmark.d.ts +30 -33
- package/app/bookmark.js +3 -6
- package/app/bookmark.js.map +1 -1
- package/app/getApp.d.ts +58 -25
- package/app/getApp.js +2 -2
- package/app/getApp.js.map +1 -1
- package/app/getMetadataSaml.d.ts +11 -5
- package/app/getMetadataSaml.js +2 -2
- package/app/getMetadataSaml.js.map +1 -1
- package/app/getOauth.d.ts +62 -34
- package/app/getOauth.js +2 -2
- package/app/getOauth.js.map +1 -1
- package/app/getSaml.d.ts +75 -56
- package/app/getSaml.js +2 -2
- package/app/getSaml.js.map +1 -1
- package/app/groupAssignment.d.ts +23 -9
- package/app/groupAssignment.js +17 -3
- package/app/groupAssignment.js.map +1 -1
- package/app/oauth.d.ts +135 -273
- package/app/oauth.js +6 -60
- package/app/oauth.js.map +1 -1
- package/app/oauthPostLogoutRedirectUri.d.ts +4 -6
- package/app/oauthPostLogoutRedirectUri.js +1 -3
- package/app/oauthPostLogoutRedirectUri.js.map +1 -1
- package/app/oauthRedirectUri.d.ts +4 -6
- package/app/oauthRedirectUri.js +1 -3
- package/app/oauthRedirectUri.js.map +1 -1
- package/app/oauthRoleAssignment.d.ts +4 -29
- package/app/oauthRoleAssignment.js +4 -29
- package/app/oauthRoleAssignment.js.map +1 -1
- package/app/saml.d.ts +161 -289
- package/app/saml.js +6 -152
- package/app/saml.js.map +1 -1
- package/app/securePasswordStore.d.ts +79 -80
- package/app/securePasswordStore.js +6 -7
- package/app/securePasswordStore.js.map +1 -1
- package/app/swa.d.ts +70 -71
- package/app/swa.js +4 -5
- package/app/swa.js.map +1 -1
- package/app/threeField.d.ts +74 -76
- package/app/threeField.js +5 -7
- package/app/threeField.js.map +1 -1
- package/app/user.d.ts +12 -17
- package/app/user.js +0 -2
- package/app/user.js.map +1 -1
- package/appGroupAssignments.d.ts +6 -8
- package/appGroupAssignments.js +3 -5
- package/appGroupAssignments.js.map +1 -1
- package/appOauthApiScope.d.ts +5 -7
- package/appOauthApiScope.js +2 -4
- package/appOauthApiScope.js.map +1 -1
- package/appSamlAppSettings.d.ts +6 -7
- package/appSamlAppSettings.js +3 -4
- package/appSamlAppSettings.js.map +1 -1
- package/appSharedCredentials.d.ts +61 -63
- package/appSharedCredentials.js +4 -6
- package/appSharedCredentials.js.map +1 -1
- package/appSignonPolicy.d.ts +3 -39
- package/appSignonPolicy.js +3 -39
- package/appSignonPolicy.js.map +1 -1
- package/appSignonPolicyRule.d.ts +69 -361
- package/appSignonPolicyRule.js +1 -278
- package/appSignonPolicyRule.js.map +1 -1
- package/appUserBaseSchemaProperty.d.ts +25 -29
- package/appUserBaseSchemaProperty.js +1 -5
- package/appUserBaseSchemaProperty.js.map +1 -1
- package/appUserSchemaProperty.d.ts +51 -41
- package/appUserSchemaProperty.js +0 -2
- package/appUserSchemaProperty.js.map +1 -1
- package/auth/getServer.d.ts +11 -11
- package/auth/getServer.js +2 -2
- package/auth/getServerPolicy.d.ts +15 -9
- package/auth/getServerPolicy.js +2 -2
- package/auth/getServerPolicy.js.map +1 -1
- package/auth/getServerScopes.d.ts +8 -5
- package/auth/getServerScopes.js +2 -2
- package/auth/getServerScopes.js.map +1 -1
- package/auth/server.d.ts +15 -19
- package/auth/server.js +1 -5
- package/auth/server.js.map +1 -1
- package/auth/serverClaim.d.ts +13 -17
- package/auth/serverClaim.js +1 -5
- package/auth/serverClaim.js.map +1 -1
- package/auth/serverPolicy.d.ts +10 -14
- package/auth/serverPolicy.js +1 -5
- package/auth/serverPolicy.js.map +1 -1
- package/auth/serverPolicyClaim.d.ts +50 -66
- package/auth/serverPolicyClaim.js +0 -25
- package/auth/serverPolicyClaim.js.map +1 -1
- package/auth/serverPolicyRule.d.ts +32 -43
- package/auth/serverPolicyRule.js +0 -2
- package/auth/serverPolicyRule.js.map +1 -1
- package/auth/serverScope.d.ts +16 -20
- package/auth/serverScope.js +1 -5
- package/auth/serverScope.js.map +1 -1
- package/authServerClaimDefault.d.ts +10 -25
- package/authServerClaimDefault.js +0 -9
- package/authServerClaimDefault.js.map +1 -1
- package/authServerDefault.d.ts +15 -19
- package/authServerDefault.js +1 -5
- package/authServerDefault.js.map +1 -1
- package/authenticator.d.ts +53 -61
- package/authenticator.js +11 -11
- package/authenticator.js.map +1 -1
- package/behaviour.d.ts +21 -41
- package/behaviour.js +0 -2
- package/behaviour.js.map +1 -1
- package/brand.d.ts +23 -22
- package/brand.js +8 -4
- package/brand.js.map +1 -1
- package/captcha.d.ts +15 -17
- package/captcha.js +3 -5
- package/captcha.js.map +1 -1
- package/captchaOrgWideSettings.d.ts +8 -43
- package/captchaOrgWideSettings.js +2 -37
- package/captchaOrgWideSettings.js.map +1 -1
- package/domain.d.ts +13 -21
- package/domain.js +0 -2
- package/domain.js.map +1 -1
- package/domainCertificate.d.ts +17 -24
- package/domainCertificate.js +2 -9
- package/domainCertificate.js.map +1 -1
- package/domainVerification.d.ts +4 -10
- package/domainVerification.js +1 -7
- package/domainVerification.js.map +1 -1
- package/emailCustomization.d.ts +38 -222
- package/emailCustomization.js +29 -33
- package/emailCustomization.js.map +1 -1
- package/emailDomain.d.ts +4 -8
- package/emailDomain.js +0 -4
- package/emailDomain.js.map +1 -1
- package/emailDomainVerification.d.ts +3 -7
- package/emailDomainVerification.js +0 -4
- package/emailDomainVerification.js.map +1 -1
- package/emailSender.d.ts +15 -17
- package/emailSender.js +2 -4
- package/emailSender.js.map +1 -1
- package/emailSenderVerification.d.ts +5 -9
- package/emailSenderVerification.js +2 -6
- package/emailSenderVerification.js.map +1 -1
- package/eventHook.d.ts +16 -11
- package/eventHook.js +1 -5
- package/eventHook.js.map +1 -1
- package/eventHookVerification.d.ts +4 -10
- package/eventHookVerification.js +1 -7
- package/eventHookVerification.js.map +1 -1
- package/factor/factor.d.ts +4 -9
- package/factor/factor.js +1 -3
- package/factor/factor.js.map +1 -1
- package/factorTotp.d.ts +12 -21
- package/factorTotp.js +3 -3
- package/factorTotp.js.map +1 -1
- package/getAppGroupAssignments.d.ts +6 -6
- package/getAppGroupAssignments.js +2 -2
- package/getAppSignonPolicy.d.ts +16 -6
- package/getAppSignonPolicy.js +8 -4
- package/getAppSignonPolicy.js.map +1 -1
- package/getAppUserAssignments.d.ts +6 -6
- package/getAppUserAssignments.js +2 -2
- package/getAuthServerClaim.d.ts +15 -12
- package/getAuthServerClaim.js +2 -2
- package/getAuthServerClaim.js.map +1 -1
- package/getAuthServerClaims.d.ts +8 -5
- package/getAuthServerClaims.js +2 -2
- package/getAuthServerClaims.js.map +1 -1
- package/getAuthenticator.d.ts +24 -26
- package/getAuthenticator.js +14 -22
- package/getAuthenticator.js.map +1 -1
- package/getBehaviour.d.ts +6 -8
- package/getBehaviour.js +2 -2
- package/getBehaviour.js.map +1 -1
- package/getBehaviours.d.ts +7 -7
- package/getBehaviours.js +2 -2
- package/getBrand.d.ts +9 -6
- package/getBrand.js +2 -2
- package/getBrand.js.map +1 -1
- package/getBrands.d.ts +2 -2
- package/getBrands.js +2 -2
- package/getDomain.d.ts +11 -14
- package/getDomain.js +2 -8
- package/getDomain.js.map +1 -1
- package/getEmailCustomization.d.ts +14 -9
- package/getEmailCustomization.js +2 -6
- package/getEmailCustomization.js.map +1 -1
- package/getEmailCustomizations.d.ts +11 -9
- package/getEmailCustomizations.js +2 -6
- package/getEmailCustomizations.js.map +1 -1
- package/getGroups.d.ts +11 -25
- package/getGroups.js +2 -2
- package/getGroups.js.map +1 -1
- package/getLogStream.d.ts +8 -39
- package/getLogStream.js +2 -24
- package/getLogStream.js.map +1 -1
- package/getNetworkZone.d.ts +12 -12
- package/getNetworkZone.js +2 -2
- package/getOrgMetadata.d.ts +0 -22
- package/getOrgMetadata.js +0 -22
- package/getOrgMetadata.js.map +1 -1
- package/getRoleSubscription.d.ts +13 -35
- package/getRoleSubscription.js +2 -2
- package/getRoleSubscription.js.map +1 -1
- package/getTemplate.d.ts +10 -8
- package/getTemplate.js +2 -6
- package/getTemplate.js.map +1 -1
- package/getTemplates.d.ts +6 -7
- package/getTemplates.js +2 -6
- package/getTemplates.js.map +1 -1
- package/getTheme.d.ts +14 -12
- package/getTheme.js +2 -6
- package/getTheme.js.map +1 -1
- package/getThemes.d.ts +6 -7
- package/getThemes.js +2 -6
- package/getThemes.js.map +1 -1
- package/getTrustedOrigins.d.ts +7 -4
- package/getTrustedOrigins.js +2 -2
- package/getTrustedOrigins.js.map +1 -1
- package/getUserSecurityQuestions.d.ts +4 -8
- package/getUserSecurityQuestions.js +0 -4
- package/getUserSecurityQuestions.js.map +1 -1
- package/group/getEveryoneGroup.d.ts +10 -5
- package/group/getEveryoneGroup.js +4 -2
- package/group/getEveryoneGroup.js.map +1 -1
- package/group/getGroup.d.ts +17 -26
- package/group/getGroup.js +2 -2
- package/group/getGroup.js.map +1 -1
- package/group/getRule.d.ts +9 -9
- package/group/getRule.js +2 -2
- package/group/group.d.ts +4 -36
- package/group/group.js +1 -33
- package/group/group.js.map +1 -1
- package/group/role.d.ts +37 -81
- package/group/role.js +1 -6
- package/group/role.js.map +1 -1
- package/group/rule.d.ts +12 -20
- package/group/rule.js +0 -2
- package/group/rule.js.map +1 -1
- package/groupMemberships.d.ts +8 -10
- package/groupMemberships.js +2 -4
- package/groupMemberships.js.map +1 -1
- package/groupSchemaProperty.d.ts +57 -59
- package/groupSchemaProperty.js +0 -2
- package/groupSchemaProperty.js.map +1 -1
- package/idp/getMetadataSaml.d.ts +9 -6
- package/idp/getMetadataSaml.js +2 -2
- package/idp/getMetadataSaml.js.map +1 -1
- package/idp/getOidc.d.ts +9 -9
- package/idp/getOidc.js +2 -2
- package/idp/getSaml.d.ts +16 -13
- package/idp/getSaml.js +2 -2
- package/idp/getSaml.js.map +1 -1
- package/idp/getSocial.d.ts +8 -2
- package/idp/getSocial.js +2 -2
- package/idp/getSocial.js.map +1 -1
- package/idp/oidc.d.ts +70 -62
- package/idp/oidc.js +3 -5
- package/idp/oidc.js.map +1 -1
- package/idp/saml.d.ts +64 -86
- package/idp/saml.js +1 -5
- package/idp/saml.js.map +1 -1
- package/idp/samlKey.d.ts +3 -5
- package/idp/samlKey.js +0 -2
- package/idp/samlKey.js.map +1 -1
- package/idp/social.d.ts +99 -69
- package/idp/social.js +11 -5
- package/idp/social.js.map +1 -1
- package/inline/hook.d.ts +4 -26
- package/inline/hook.js +1 -5
- package/inline/hook.js.map +1 -1
- package/linkDefinition.d.ts +2 -3
- package/linkDefinition.js +2 -3
- package/linkDefinition.js.map +1 -1
- package/linkValue.d.ts +7 -9
- package/linkValue.js +1 -3
- package/linkValue.js.map +1 -1
- package/logStream.d.ts +32 -27
- package/logStream.js +23 -9
- package/logStream.js.map +1 -1
- package/network/zone.d.ts +25 -66
- package/network/zone.js +1 -39
- package/network/zone.js.map +1 -1
- package/orgConfiguration.d.ts +4 -9
- package/orgConfiguration.js +1 -3
- package/orgConfiguration.js.map +1 -1
- package/orgSupport.d.ts +4 -7
- package/orgSupport.js +1 -4
- package/orgSupport.js.map +1 -1
- package/package.json +3 -3
- package/policy/getDefaultPolicy.d.ts +9 -7
- package/policy/getDefaultPolicy.js +6 -2
- package/policy/getDefaultPolicy.js.map +1 -1
- package/policy/getPolicy.d.ts +11 -26
- package/policy/getPolicy.js +2 -2
- package/policy/getPolicy.js.map +1 -1
- package/policy/mfa.d.ts +18 -220
- package/policy/mfa.js +0 -10
- package/policy/mfa.js.map +1 -1
- package/policy/password.d.ts +91 -95
- package/policy/password.js +1 -5
- package/policy/password.js.map +1 -1
- package/policy/ruleIdpDiscovery.d.ts +111 -93
- package/policy/ruleIdpDiscovery.js +48 -57
- package/policy/ruleIdpDiscovery.js.map +1 -1
- package/policy/ruleMfa.d.ts +40 -30
- package/policy/ruleMfa.js +1 -3
- package/policy/ruleMfa.js.map +1 -1
- package/policy/rulePassword.d.ts +34 -38
- package/policy/rulePassword.js +1 -5
- package/policy/rulePassword.js.map +1 -1
- package/policy/ruleSignon.d.ts +94 -85
- package/policy/ruleSignon.js +1 -4
- package/policy/ruleSignon.js.map +1 -1
- package/policy/signon.d.ts +16 -20
- package/policy/signon.js +1 -5
- package/policy/signon.js.map +1 -1
- package/policyMfaDefault.d.ts +15 -214
- package/policyMfaDefault.js +2 -9
- package/policyMfaDefault.js.map +1 -1
- package/policyPasswordDefault.d.ts +85 -101
- package/policyPasswordDefault.js +1 -5
- package/policyPasswordDefault.js.map +1 -1
- package/policyProfileEnrollment.d.ts +8 -9
- package/policyProfileEnrollment.js +2 -3
- package/policyProfileEnrollment.js.map +1 -1
- package/policyProfileEnrollmentApps.d.ts +8 -11
- package/policyProfileEnrollmentApps.js +3 -6
- package/policyProfileEnrollmentApps.js.map +1 -1
- package/policyRuleProfileEnrollment.d.ts +42 -31
- package/policyRuleProfileEnrollment.js +2 -3
- package/policyRuleProfileEnrollment.js.map +1 -1
- package/profile/mapping.d.ts +19 -34
- package/profile/mapping.js +4 -4
- package/profile/mapping.js.map +1 -1
- package/rateLimiting.d.ts +8 -17
- package/rateLimiting.js +2 -5
- package/rateLimiting.js.map +1 -1
- package/resourceSet.d.ts +18 -26
- package/resourceSet.js +9 -14
- package/resourceSet.js.map +1 -1
- package/roleSubscription.d.ts +35 -86
- package/roleSubscription.js +2 -2
- package/roleSubscription.js.map +1 -1
- package/securityNotificationEmails.d.ts +4 -7
- package/securityNotificationEmails.js +4 -7
- package/securityNotificationEmails.js.map +1 -1
- package/templateSms.d.ts +4 -8
- package/templateSms.js +1 -5
- package/templateSms.js.map +1 -1
- package/theme.d.ts +46 -46
- package/theme.js +2 -2
- package/threatInsightSettings.d.ts +7 -27
- package/threatInsightSettings.js +1 -3
- package/threatInsightSettings.js.map +1 -1
- package/trustedorigin/origin.d.ts +13 -17
- package/trustedorigin/origin.js +1 -5
- package/trustedorigin/origin.js.map +1 -1
- package/types/input.d.ts +65 -162
- package/types/output.d.ts +75 -275
- package/user/getUser.d.ts +32 -104
- package/user/getUser.js +2 -2
- package/user/getUser.js.map +1 -1
- package/user/getUserProfileMappingSource.d.ts +9 -7
- package/user/getUserProfileMappingSource.js +6 -4
- package/user/getUserProfileMappingSource.js.map +1 -1
- package/user/getUserType.d.ts +7 -7
- package/user/getUserType.js +2 -2
- package/user/getUsers.d.ts +95 -37
- package/user/getUsers.js +64 -24
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +160 -209
- package/user/user.js +43 -65
- package/user/user.js.map +1 -1
- package/user/userType.d.ts +1 -5
- package/user/userType.js +1 -5
- package/user/userType.js.map +1 -1
- package/userAdminRoles.d.ts +10 -17
- package/userAdminRoles.js +1 -5
- package/userAdminRoles.js.map +1 -1
- package/userBaseSchemaProperty.d.ts +26 -34
- package/userBaseSchemaProperty.js +2 -10
- package/userBaseSchemaProperty.js.map +1 -1
- package/userFactorQuestion.d.ts +1 -5
- package/userFactorQuestion.js +1 -5
- package/userFactorQuestion.js.map +1 -1
- package/userGroupMemberships.d.ts +3 -3
- package/userSchemaProperty.d.ts +57 -56
- package/userSchemaProperty.js +0 -8
- package/userSchemaProperty.js.map +1 -1
package/adminRoleCustom.d.ts
CHANGED
|
@@ -1,8 +1,8 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
3
|
+
* Resource to manage administrative Role assignments for a User
|
|
4
4
|
*
|
|
5
|
-
*
|
|
5
|
+
* These operations allow the creation and manipulation of custom roles as custom collections of permissions.
|
|
6
6
|
*
|
|
7
7
|
* ## Example Usage
|
|
8
8
|
*
|
|
@@ -19,10 +19,8 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
19
19
|
*
|
|
20
20
|
* ## Import
|
|
21
21
|
*
|
|
22
|
-
* Okta Custom Admin Role can be imported via the Okta ID.
|
|
23
|
-
*
|
|
24
22
|
* ```sh
|
|
25
|
-
* $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example <custom role id>
|
|
23
|
+
* $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example <custom role id>
|
|
26
24
|
* ```
|
|
27
25
|
*/
|
|
28
26
|
export declare class AdminRoleCustom extends pulumi.CustomResource {
|
|
@@ -42,47 +40,47 @@ export declare class AdminRoleCustom extends pulumi.CustomResource {
|
|
|
42
40
|
*/
|
|
43
41
|
static isInstance(obj: any): obj is AdminRoleCustom;
|
|
44
42
|
/**
|
|
45
|
-
* A human-readable description of the new Role
|
|
43
|
+
* A human-readable description of the new Role
|
|
46
44
|
*/
|
|
47
45
|
readonly description: pulumi.Output<string>;
|
|
48
46
|
/**
|
|
49
|
-
* The name given to the new Role
|
|
47
|
+
* The name given to the new Role
|
|
50
48
|
*/
|
|
51
49
|
readonly label: pulumi.Output<string>;
|
|
52
50
|
/**
|
|
53
51
|
* The permissions that the new Role grants. At least one
|
|
54
|
-
*
|
|
55
|
-
*
|
|
56
|
-
*
|
|
57
|
-
*
|
|
58
|
-
*
|
|
59
|
-
*
|
|
60
|
-
*
|
|
61
|
-
*
|
|
62
|
-
*
|
|
63
|
-
*
|
|
64
|
-
*
|
|
65
|
-
*
|
|
66
|
-
*
|
|
67
|
-
*
|
|
68
|
-
*
|
|
69
|
-
*
|
|
70
|
-
*
|
|
71
|
-
*
|
|
72
|
-
*
|
|
73
|
-
*
|
|
74
|
-
*
|
|
75
|
-
*
|
|
76
|
-
*
|
|
77
|
-
*
|
|
78
|
-
*
|
|
79
|
-
*
|
|
80
|
-
*
|
|
81
|
-
*
|
|
82
|
-
*
|
|
83
|
-
*
|
|
84
|
-
*
|
|
85
|
-
*
|
|
52
|
+
* permission must be specified when creating custom role. Valid values: "okta.authzServers.manage",
|
|
53
|
+
* "okta.authzServers.read",
|
|
54
|
+
* "okta.apps.assignment.manage",
|
|
55
|
+
* "okta.apps.manage",
|
|
56
|
+
* "okta.apps.read",
|
|
57
|
+
* "okta.customizations.manage",
|
|
58
|
+
* "okta.customizations.read",
|
|
59
|
+
* "okta.groups.appAssignment.manage",
|
|
60
|
+
* "okta.groups.create",
|
|
61
|
+
* "okta.groups.manage",
|
|
62
|
+
* "okta.groups.members.manage",
|
|
63
|
+
* "okta.groups.read",
|
|
64
|
+
* "okta.profilesources.import.run",
|
|
65
|
+
* "okta.users.appAssignment.manage",
|
|
66
|
+
* "okta.users.create",
|
|
67
|
+
* "okta.users.credentials.expirePassword",
|
|
68
|
+
* "okta.users.credentials.manage",
|
|
69
|
+
* "okta.users.credentials.resetFactors",
|
|
70
|
+
* "okta.users.credentials.resetPassword",
|
|
71
|
+
* "okta.users.groupMembership.manage",
|
|
72
|
+
* "okta.users.lifecycle.activate",
|
|
73
|
+
* "okta.users.lifecycle.clearSessions",
|
|
74
|
+
* "okta.users.lifecycle.deactivate",
|
|
75
|
+
* "okta.users.lifecycle.delete",
|
|
76
|
+
* "okta.users.lifecycle.manage",
|
|
77
|
+
* "okta.users.lifecycle.suspend",
|
|
78
|
+
* "okta.users.lifecycle.unlock",
|
|
79
|
+
* "okta.users.lifecycle.unsuspend",
|
|
80
|
+
* "okta.users.manage",
|
|
81
|
+
* "okta.users.read",
|
|
82
|
+
* "okta.users.userprofile.manage",
|
|
83
|
+
* "okta.workflows.invoke".,
|
|
86
84
|
*/
|
|
87
85
|
readonly permissions: pulumi.Output<string[] | undefined>;
|
|
88
86
|
/**
|
|
@@ -99,47 +97,47 @@ export declare class AdminRoleCustom extends pulumi.CustomResource {
|
|
|
99
97
|
*/
|
|
100
98
|
export interface AdminRoleCustomState {
|
|
101
99
|
/**
|
|
102
|
-
* A human-readable description of the new Role
|
|
100
|
+
* A human-readable description of the new Role
|
|
103
101
|
*/
|
|
104
102
|
description?: pulumi.Input<string>;
|
|
105
103
|
/**
|
|
106
|
-
* The name given to the new Role
|
|
104
|
+
* The name given to the new Role
|
|
107
105
|
*/
|
|
108
106
|
label?: pulumi.Input<string>;
|
|
109
107
|
/**
|
|
110
108
|
* The permissions that the new Role grants. At least one
|
|
111
|
-
*
|
|
112
|
-
*
|
|
113
|
-
*
|
|
114
|
-
*
|
|
115
|
-
*
|
|
116
|
-
*
|
|
117
|
-
*
|
|
118
|
-
*
|
|
119
|
-
*
|
|
120
|
-
*
|
|
121
|
-
*
|
|
122
|
-
*
|
|
123
|
-
*
|
|
124
|
-
*
|
|
125
|
-
*
|
|
126
|
-
*
|
|
127
|
-
*
|
|
128
|
-
*
|
|
129
|
-
*
|
|
130
|
-
*
|
|
131
|
-
*
|
|
132
|
-
*
|
|
133
|
-
*
|
|
134
|
-
*
|
|
135
|
-
*
|
|
136
|
-
*
|
|
137
|
-
*
|
|
138
|
-
*
|
|
139
|
-
*
|
|
140
|
-
*
|
|
141
|
-
*
|
|
142
|
-
*
|
|
109
|
+
* permission must be specified when creating custom role. Valid values: "okta.authzServers.manage",
|
|
110
|
+
* "okta.authzServers.read",
|
|
111
|
+
* "okta.apps.assignment.manage",
|
|
112
|
+
* "okta.apps.manage",
|
|
113
|
+
* "okta.apps.read",
|
|
114
|
+
* "okta.customizations.manage",
|
|
115
|
+
* "okta.customizations.read",
|
|
116
|
+
* "okta.groups.appAssignment.manage",
|
|
117
|
+
* "okta.groups.create",
|
|
118
|
+
* "okta.groups.manage",
|
|
119
|
+
* "okta.groups.members.manage",
|
|
120
|
+
* "okta.groups.read",
|
|
121
|
+
* "okta.profilesources.import.run",
|
|
122
|
+
* "okta.users.appAssignment.manage",
|
|
123
|
+
* "okta.users.create",
|
|
124
|
+
* "okta.users.credentials.expirePassword",
|
|
125
|
+
* "okta.users.credentials.manage",
|
|
126
|
+
* "okta.users.credentials.resetFactors",
|
|
127
|
+
* "okta.users.credentials.resetPassword",
|
|
128
|
+
* "okta.users.groupMembership.manage",
|
|
129
|
+
* "okta.users.lifecycle.activate",
|
|
130
|
+
* "okta.users.lifecycle.clearSessions",
|
|
131
|
+
* "okta.users.lifecycle.deactivate",
|
|
132
|
+
* "okta.users.lifecycle.delete",
|
|
133
|
+
* "okta.users.lifecycle.manage",
|
|
134
|
+
* "okta.users.lifecycle.suspend",
|
|
135
|
+
* "okta.users.lifecycle.unlock",
|
|
136
|
+
* "okta.users.lifecycle.unsuspend",
|
|
137
|
+
* "okta.users.manage",
|
|
138
|
+
* "okta.users.read",
|
|
139
|
+
* "okta.users.userprofile.manage",
|
|
140
|
+
* "okta.workflows.invoke".,
|
|
143
141
|
*/
|
|
144
142
|
permissions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
145
143
|
}
|
|
@@ -148,47 +146,47 @@ export interface AdminRoleCustomState {
|
|
|
148
146
|
*/
|
|
149
147
|
export interface AdminRoleCustomArgs {
|
|
150
148
|
/**
|
|
151
|
-
* A human-readable description of the new Role
|
|
149
|
+
* A human-readable description of the new Role
|
|
152
150
|
*/
|
|
153
151
|
description: pulumi.Input<string>;
|
|
154
152
|
/**
|
|
155
|
-
* The name given to the new Role
|
|
153
|
+
* The name given to the new Role
|
|
156
154
|
*/
|
|
157
155
|
label: pulumi.Input<string>;
|
|
158
156
|
/**
|
|
159
157
|
* The permissions that the new Role grants. At least one
|
|
160
|
-
*
|
|
161
|
-
*
|
|
162
|
-
*
|
|
163
|
-
*
|
|
164
|
-
*
|
|
165
|
-
*
|
|
166
|
-
*
|
|
167
|
-
*
|
|
168
|
-
*
|
|
169
|
-
*
|
|
170
|
-
*
|
|
171
|
-
*
|
|
172
|
-
*
|
|
173
|
-
*
|
|
174
|
-
*
|
|
175
|
-
*
|
|
176
|
-
*
|
|
177
|
-
*
|
|
178
|
-
*
|
|
179
|
-
*
|
|
180
|
-
*
|
|
181
|
-
*
|
|
182
|
-
*
|
|
183
|
-
*
|
|
184
|
-
*
|
|
185
|
-
*
|
|
186
|
-
*
|
|
187
|
-
*
|
|
188
|
-
*
|
|
189
|
-
*
|
|
190
|
-
*
|
|
191
|
-
*
|
|
158
|
+
* permission must be specified when creating custom role. Valid values: "okta.authzServers.manage",
|
|
159
|
+
* "okta.authzServers.read",
|
|
160
|
+
* "okta.apps.assignment.manage",
|
|
161
|
+
* "okta.apps.manage",
|
|
162
|
+
* "okta.apps.read",
|
|
163
|
+
* "okta.customizations.manage",
|
|
164
|
+
* "okta.customizations.read",
|
|
165
|
+
* "okta.groups.appAssignment.manage",
|
|
166
|
+
* "okta.groups.create",
|
|
167
|
+
* "okta.groups.manage",
|
|
168
|
+
* "okta.groups.members.manage",
|
|
169
|
+
* "okta.groups.read",
|
|
170
|
+
* "okta.profilesources.import.run",
|
|
171
|
+
* "okta.users.appAssignment.manage",
|
|
172
|
+
* "okta.users.create",
|
|
173
|
+
* "okta.users.credentials.expirePassword",
|
|
174
|
+
* "okta.users.credentials.manage",
|
|
175
|
+
* "okta.users.credentials.resetFactors",
|
|
176
|
+
* "okta.users.credentials.resetPassword",
|
|
177
|
+
* "okta.users.groupMembership.manage",
|
|
178
|
+
* "okta.users.lifecycle.activate",
|
|
179
|
+
* "okta.users.lifecycle.clearSessions",
|
|
180
|
+
* "okta.users.lifecycle.deactivate",
|
|
181
|
+
* "okta.users.lifecycle.delete",
|
|
182
|
+
* "okta.users.lifecycle.manage",
|
|
183
|
+
* "okta.users.lifecycle.suspend",
|
|
184
|
+
* "okta.users.lifecycle.unlock",
|
|
185
|
+
* "okta.users.lifecycle.unsuspend",
|
|
186
|
+
* "okta.users.manage",
|
|
187
|
+
* "okta.users.read",
|
|
188
|
+
* "okta.users.userprofile.manage",
|
|
189
|
+
* "okta.workflows.invoke".,
|
|
192
190
|
*/
|
|
193
191
|
permissions?: pulumi.Input<pulumi.Input<string>[]>;
|
|
194
192
|
}
|
package/adminRoleCustom.js
CHANGED
|
@@ -6,9 +6,9 @@ exports.AdminRoleCustom = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
9
|
+
* Resource to manage administrative Role assignments for a User
|
|
10
10
|
*
|
|
11
|
-
*
|
|
11
|
+
* These operations allow the creation and manipulation of custom roles as custom collections of permissions.
|
|
12
12
|
*
|
|
13
13
|
* ## Example Usage
|
|
14
14
|
*
|
|
@@ -25,10 +25,8 @@ const utilities = require("./utilities");
|
|
|
25
25
|
*
|
|
26
26
|
* ## Import
|
|
27
27
|
*
|
|
28
|
-
* Okta Custom Admin Role can be imported via the Okta ID.
|
|
29
|
-
*
|
|
30
28
|
* ```sh
|
|
31
|
-
* $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example <custom role id>
|
|
29
|
+
* $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example <custom role id>
|
|
32
30
|
* ```
|
|
33
31
|
*/
|
|
34
32
|
class AdminRoleCustom extends pulumi.CustomResource {
|
package/adminRoleCustom.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"adminRoleCustom.js","sourceRoot":"","sources":["../adminRoleCustom.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"adminRoleCustom.js","sourceRoot":"","sources":["../adminRoleCustom.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAuDD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAvGL,0CAwGC;AA1FG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
|
|
@@ -1,15 +1,12 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
-
*
|
|
4
|
-
*
|
|
5
|
-
* - Users
|
|
3
|
+
* Resource to manage the assignment and unassignment of Custom Roles
|
|
4
|
+
* These operations allow the creation and manipulation of custom roles as custom collections of permissions.
|
|
6
5
|
*
|
|
7
|
-
* > **NOTE:** This an
|
|
6
|
+
* > **NOTE:** This an Early Access feature.
|
|
8
7
|
*
|
|
9
8
|
* ## Import
|
|
10
9
|
*
|
|
11
|
-
* Okta Custom Admin Role Assignments can be imported via the Okta ID.
|
|
12
|
-
*
|
|
13
10
|
* ```sh
|
|
14
11
|
* $ pulumi import okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments example <resource_set_id>/<custom_role_id>
|
|
15
12
|
* ```
|
|
@@ -31,16 +28,15 @@ export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
|
|
|
31
28
|
*/
|
|
32
29
|
static isInstance(obj: any): obj is AdminRoleCustomAssignments;
|
|
33
30
|
/**
|
|
34
|
-
* ID of the Custom Role
|
|
31
|
+
* ID of the Custom Role
|
|
35
32
|
*/
|
|
36
33
|
readonly customRoleId: pulumi.Output<string>;
|
|
37
34
|
/**
|
|
38
|
-
* The hrefs that point to User(s) and/or Group(s) that receive the Role
|
|
39
|
-
* permission must be specified when creating custom role.
|
|
35
|
+
* The hrefs that point to User(s) and/or Group(s) that receive the Role
|
|
40
36
|
*/
|
|
41
37
|
readonly members: pulumi.Output<string[] | undefined>;
|
|
42
38
|
/**
|
|
43
|
-
* ID of the target Resource Set
|
|
39
|
+
* ID of the target Resource Set
|
|
44
40
|
*/
|
|
45
41
|
readonly resourceSetId: pulumi.Output<string>;
|
|
46
42
|
/**
|
|
@@ -57,16 +53,15 @@ export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
|
|
|
57
53
|
*/
|
|
58
54
|
export interface AdminRoleCustomAssignmentsState {
|
|
59
55
|
/**
|
|
60
|
-
* ID of the Custom Role
|
|
56
|
+
* ID of the Custom Role
|
|
61
57
|
*/
|
|
62
58
|
customRoleId?: pulumi.Input<string>;
|
|
63
59
|
/**
|
|
64
|
-
* The hrefs that point to User(s) and/or Group(s) that receive the Role
|
|
65
|
-
* permission must be specified when creating custom role.
|
|
60
|
+
* The hrefs that point to User(s) and/or Group(s) that receive the Role
|
|
66
61
|
*/
|
|
67
62
|
members?: pulumi.Input<pulumi.Input<string>[]>;
|
|
68
63
|
/**
|
|
69
|
-
* ID of the target Resource Set
|
|
64
|
+
* ID of the target Resource Set
|
|
70
65
|
*/
|
|
71
66
|
resourceSetId?: pulumi.Input<string>;
|
|
72
67
|
}
|
|
@@ -75,16 +70,15 @@ export interface AdminRoleCustomAssignmentsState {
|
|
|
75
70
|
*/
|
|
76
71
|
export interface AdminRoleCustomAssignmentsArgs {
|
|
77
72
|
/**
|
|
78
|
-
* ID of the Custom Role
|
|
73
|
+
* ID of the Custom Role
|
|
79
74
|
*/
|
|
80
75
|
customRoleId: pulumi.Input<string>;
|
|
81
76
|
/**
|
|
82
|
-
* The hrefs that point to User(s) and/or Group(s) that receive the Role
|
|
83
|
-
* permission must be specified when creating custom role.
|
|
77
|
+
* The hrefs that point to User(s) and/or Group(s) that receive the Role
|
|
84
78
|
*/
|
|
85
79
|
members?: pulumi.Input<pulumi.Input<string>[]>;
|
|
86
80
|
/**
|
|
87
|
-
* ID of the target Resource Set
|
|
81
|
+
* ID of the target Resource Set
|
|
88
82
|
*/
|
|
89
83
|
resourceSetId: pulumi.Input<string>;
|
|
90
84
|
}
|
|
@@ -6,16 +6,13 @@ exports.AdminRoleCustomAssignments = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("./utilities");
|
|
8
8
|
/**
|
|
9
|
-
*
|
|
10
|
-
*
|
|
11
|
-
* - Users
|
|
9
|
+
* Resource to manage the assignment and unassignment of Custom Roles
|
|
10
|
+
* These operations allow the creation and manipulation of custom roles as custom collections of permissions.
|
|
12
11
|
*
|
|
13
|
-
* > **NOTE:** This an
|
|
12
|
+
* > **NOTE:** This an Early Access feature.
|
|
14
13
|
*
|
|
15
14
|
* ## Import
|
|
16
15
|
*
|
|
17
|
-
* Okta Custom Admin Role Assignments can be imported via the Okta ID.
|
|
18
|
-
*
|
|
19
16
|
* ```sh
|
|
20
17
|
* $ pulumi import okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments example <resource_set_id>/<custom_role_id>
|
|
21
18
|
* ```
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"adminRoleCustomAssignments.js","sourceRoot":"","sources":["../adminRoleCustomAssignments.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"adminRoleCustomAssignments.js","sourceRoot":"","sources":["../adminRoleCustomAssignments.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;GAWG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IAuBD,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAvEL,gEAwEC;AA1DG,gBAAgB;AACO,uCAAY,GAAG,kEAAkE,CAAC"}
|
package/adminRoleTargets.d.ts
CHANGED
|
@@ -23,8 +23,6 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
23
23
|
*
|
|
24
24
|
* ## Import
|
|
25
25
|
*
|
|
26
|
-
* Okta Admin Role Targets can be imported via the Okta ID.
|
|
27
|
-
*
|
|
28
26
|
* ```sh
|
|
29
27
|
* $ pulumi import okta:index/adminRoleTargets:AdminRoleTargets example <user id>/<role type>
|
|
30
28
|
* ```
|
|
@@ -46,23 +44,23 @@ export declare class AdminRoleTargets extends pulumi.CustomResource {
|
|
|
46
44
|
*/
|
|
47
45
|
static isInstance(obj: any): obj is AdminRoleTargets;
|
|
48
46
|
/**
|
|
49
|
-
* List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
|
|
47
|
+
* List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
|
|
50
48
|
*/
|
|
51
49
|
readonly apps: pulumi.Output<string[] | undefined>;
|
|
52
50
|
/**
|
|
53
|
-
* List of group IDs. Conflicts with
|
|
51
|
+
* List of group IDs. Conflicts with apps
|
|
54
52
|
*/
|
|
55
53
|
readonly groups: pulumi.Output<string[] | undefined>;
|
|
56
54
|
/**
|
|
57
|
-
*
|
|
55
|
+
* ID of a role
|
|
58
56
|
*/
|
|
59
57
|
readonly roleId: pulumi.Output<string>;
|
|
60
58
|
/**
|
|
61
|
-
*
|
|
59
|
+
* Type of the role that is assigned to the user and supports optional targets. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types)
|
|
62
60
|
*/
|
|
63
61
|
readonly roleType: pulumi.Output<string>;
|
|
64
62
|
/**
|
|
65
|
-
*
|
|
63
|
+
* User associated with the role
|
|
66
64
|
*/
|
|
67
65
|
readonly userId: pulumi.Output<string>;
|
|
68
66
|
/**
|
|
@@ -79,23 +77,23 @@ export declare class AdminRoleTargets extends pulumi.CustomResource {
|
|
|
79
77
|
*/
|
|
80
78
|
export interface AdminRoleTargetsState {
|
|
81
79
|
/**
|
|
82
|
-
* List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
|
|
80
|
+
* List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
|
|
83
81
|
*/
|
|
84
82
|
apps?: pulumi.Input<pulumi.Input<string>[]>;
|
|
85
83
|
/**
|
|
86
|
-
* List of group IDs. Conflicts with
|
|
84
|
+
* List of group IDs. Conflicts with apps
|
|
87
85
|
*/
|
|
88
86
|
groups?: pulumi.Input<pulumi.Input<string>[]>;
|
|
89
87
|
/**
|
|
90
|
-
*
|
|
88
|
+
* ID of a role
|
|
91
89
|
*/
|
|
92
90
|
roleId?: pulumi.Input<string>;
|
|
93
91
|
/**
|
|
94
|
-
*
|
|
92
|
+
* Type of the role that is assigned to the user and supports optional targets. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types)
|
|
95
93
|
*/
|
|
96
94
|
roleType?: pulumi.Input<string>;
|
|
97
95
|
/**
|
|
98
|
-
*
|
|
96
|
+
* User associated with the role
|
|
99
97
|
*/
|
|
100
98
|
userId?: pulumi.Input<string>;
|
|
101
99
|
}
|
|
@@ -104,19 +102,19 @@ export interface AdminRoleTargetsState {
|
|
|
104
102
|
*/
|
|
105
103
|
export interface AdminRoleTargetsArgs {
|
|
106
104
|
/**
|
|
107
|
-
* List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
|
|
105
|
+
* List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
|
|
108
106
|
*/
|
|
109
107
|
apps?: pulumi.Input<pulumi.Input<string>[]>;
|
|
110
108
|
/**
|
|
111
|
-
* List of group IDs. Conflicts with
|
|
109
|
+
* List of group IDs. Conflicts with apps
|
|
112
110
|
*/
|
|
113
111
|
groups?: pulumi.Input<pulumi.Input<string>[]>;
|
|
114
112
|
/**
|
|
115
|
-
*
|
|
113
|
+
* Type of the role that is assigned to the user and supports optional targets. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types)
|
|
116
114
|
*/
|
|
117
115
|
roleType: pulumi.Input<string>;
|
|
118
116
|
/**
|
|
119
|
-
*
|
|
117
|
+
* User associated with the role
|
|
120
118
|
*/
|
|
121
119
|
userId: pulumi.Input<string>;
|
|
122
120
|
}
|
package/adminRoleTargets.js
CHANGED
|
@@ -29,8 +29,6 @@ const utilities = require("./utilities");
|
|
|
29
29
|
*
|
|
30
30
|
* ## Import
|
|
31
31
|
*
|
|
32
|
-
* Okta Admin Role Targets can be imported via the Okta ID.
|
|
33
|
-
*
|
|
34
32
|
* ```sh
|
|
35
33
|
* $ pulumi import okta:index/adminRoleTargets:AdminRoleTargets example <user id>/<role type>
|
|
36
34
|
* ```
|
package/adminRoleTargets.js.map
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"adminRoleTargets.js","sourceRoot":"","sources":["../adminRoleTargets.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC
|
|
1
|
+
{"version":3,"file":"adminRoleTargets.js","sourceRoot":"","sources":["../adminRoleTargets.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IA+BD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAnFL,4CAoFC;AAtEG,gBAAgB;AACO,6BAAY,GAAG,8CAA8C,CAAC"}
|
|
@@ -1,5 +1,9 @@
|
|
|
1
1
|
import * as pulumi from "@pulumi/pulumi";
|
|
2
2
|
/**
|
|
3
|
+
* Manages assignment of Access Policy to an Application.
|
|
4
|
+
*
|
|
5
|
+
* **Warning**: do not use as this will update okta_app_*.authentication_policy and vice versa
|
|
6
|
+
*
|
|
3
7
|
* Assigns an access policy (colloquially known as a sign-on policy and/or an
|
|
4
8
|
* authentication policy) to an application. This resource does not perform true
|
|
5
9
|
* delete as it will not delete an application and the app's access policy can't be
|
|
@@ -13,9 +17,26 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
13
17
|
* policy_, in the public API the policy is of type
|
|
14
18
|
* [`ACCESS_POLICY`](https://developer.okta.com/docs/reference/api/policy/#policy-object).
|
|
15
19
|
*
|
|
16
|
-
* ##
|
|
20
|
+
* ## Example Usage
|
|
21
|
+
*
|
|
22
|
+
* ```typescript
|
|
23
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
24
|
+
* import * as okta from "@pulumi/okta";
|
|
17
25
|
*
|
|
18
|
-
*
|
|
26
|
+
* const access = okta.policy.getPolicy({
|
|
27
|
+
* name: "Any two factors",
|
|
28
|
+
* type: "ACCESS_POLICY",
|
|
29
|
+
* });
|
|
30
|
+
* const example = okta.app.getApp({
|
|
31
|
+
* label: "Example App",
|
|
32
|
+
* });
|
|
33
|
+
* const assignment = new okta.app.AccessPolicyAssignment("assignment", {
|
|
34
|
+
* appId: example.then(example => example.id),
|
|
35
|
+
* policyId: access.then(access => access.id),
|
|
36
|
+
* });
|
|
37
|
+
* ```
|
|
38
|
+
*
|
|
39
|
+
* ## Import
|
|
19
40
|
*
|
|
20
41
|
* ```sh
|
|
21
42
|
* $ pulumi import okta:app/accessPolicyAssignment:AccessPolicyAssignment example <app id>
|
|
@@ -6,6 +6,10 @@ exports.AccessPolicyAssignment = void 0;
|
|
|
6
6
|
const pulumi = require("@pulumi/pulumi");
|
|
7
7
|
const utilities = require("../utilities");
|
|
8
8
|
/**
|
|
9
|
+
* Manages assignment of Access Policy to an Application.
|
|
10
|
+
*
|
|
11
|
+
* **Warning**: do not use as this will update okta_app_*.authentication_policy and vice versa
|
|
12
|
+
*
|
|
9
13
|
* Assigns an access policy (colloquially known as a sign-on policy and/or an
|
|
10
14
|
* authentication policy) to an application. This resource does not perform true
|
|
11
15
|
* delete as it will not delete an application and the app's access policy can't be
|
|
@@ -19,9 +23,26 @@ const utilities = require("../utilities");
|
|
|
19
23
|
* policy_, in the public API the policy is of type
|
|
20
24
|
* [`ACCESS_POLICY`](https://developer.okta.com/docs/reference/api/policy/#policy-object).
|
|
21
25
|
*
|
|
22
|
-
* ##
|
|
26
|
+
* ## Example Usage
|
|
27
|
+
*
|
|
28
|
+
* ```typescript
|
|
29
|
+
* import * as pulumi from "@pulumi/pulumi";
|
|
30
|
+
* import * as okta from "@pulumi/okta";
|
|
23
31
|
*
|
|
24
|
-
*
|
|
32
|
+
* const access = okta.policy.getPolicy({
|
|
33
|
+
* name: "Any two factors",
|
|
34
|
+
* type: "ACCESS_POLICY",
|
|
35
|
+
* });
|
|
36
|
+
* const example = okta.app.getApp({
|
|
37
|
+
* label: "Example App",
|
|
38
|
+
* });
|
|
39
|
+
* const assignment = new okta.app.AccessPolicyAssignment("assignment", {
|
|
40
|
+
* appId: example.then(example => example.id),
|
|
41
|
+
* policyId: access.then(access => access.id),
|
|
42
|
+
* });
|
|
43
|
+
* ```
|
|
44
|
+
*
|
|
45
|
+
* ## Import
|
|
25
46
|
*
|
|
26
47
|
* ```sh
|
|
27
48
|
* $ pulumi import okta:app/accessPolicyAssignment:AccessPolicyAssignment example <app id>
|
|
@@ -1 +1 @@
|
|
|
1
|
-
{"version":3,"file":"accessPolicyAssignment.js","sourceRoot":"","sources":["../../app/accessPolicyAssignment.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C
|
|
1
|
+
{"version":3,"file":"accessPolicyAssignment.js","sourceRoot":"","sources":["../../app/accessPolicyAssignment.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0CG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAjEL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,wDAAwD,CAAC"}
|