@pulumi/okta 4.9.0-alpha.1718344922 → 4.9.0-alpha.1718755579
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +105 -107
- package/adminRoleCustom.js +3 -5
- package/adminRoleCustom.js.map +1 -1
- package/adminRoleCustomAssignments.d.ts +12 -18
- package/adminRoleCustomAssignments.js +3 -6
- package/adminRoleCustomAssignments.js.map +1 -1
- package/adminRoleTargets.d.ts +14 -16
- package/adminRoleTargets.js +0 -2
- package/adminRoleTargets.js.map +1 -1
- package/app/accessPolicyAssignment.d.ts +23 -2
- package/app/accessPolicyAssignment.js +23 -2
- package/app/accessPolicyAssignment.js.map +1 -1
- package/app/autoLogin.d.ts +63 -97
- package/app/autoLogin.js +3 -37
- package/app/autoLogin.js.map +1 -1
- package/app/basicAuth.d.ts +30 -33
- package/app/basicAuth.js +4 -7
- package/app/basicAuth.js.map +1 -1
- package/app/bookmark.d.ts +30 -33
- package/app/bookmark.js +3 -6
- package/app/bookmark.js.map +1 -1
- package/app/getApp.d.ts +58 -25
- package/app/getApp.js +2 -2
- package/app/getApp.js.map +1 -1
- package/app/getMetadataSaml.d.ts +11 -5
- package/app/getMetadataSaml.js +2 -2
- package/app/getMetadataSaml.js.map +1 -1
- package/app/getOauth.d.ts +62 -34
- package/app/getOauth.js +2 -2
- package/app/getOauth.js.map +1 -1
- package/app/getSaml.d.ts +75 -56
- package/app/getSaml.js +2 -2
- package/app/getSaml.js.map +1 -1
- package/app/groupAssignment.d.ts +23 -9
- package/app/groupAssignment.js +17 -3
- package/app/groupAssignment.js.map +1 -1
- package/app/oauth.d.ts +135 -273
- package/app/oauth.js +6 -60
- package/app/oauth.js.map +1 -1
- package/app/oauthPostLogoutRedirectUri.d.ts +4 -6
- package/app/oauthPostLogoutRedirectUri.js +1 -3
- package/app/oauthPostLogoutRedirectUri.js.map +1 -1
- package/app/oauthRedirectUri.d.ts +4 -6
- package/app/oauthRedirectUri.js +1 -3
- package/app/oauthRedirectUri.js.map +1 -1
- package/app/oauthRoleAssignment.d.ts +4 -29
- package/app/oauthRoleAssignment.js +4 -29
- package/app/oauthRoleAssignment.js.map +1 -1
- package/app/saml.d.ts +161 -289
- package/app/saml.js +6 -152
- package/app/saml.js.map +1 -1
- package/app/securePasswordStore.d.ts +79 -80
- package/app/securePasswordStore.js +6 -7
- package/app/securePasswordStore.js.map +1 -1
- package/app/swa.d.ts +70 -71
- package/app/swa.js +4 -5
- package/app/swa.js.map +1 -1
- package/app/threeField.d.ts +74 -76
- package/app/threeField.js +5 -7
- package/app/threeField.js.map +1 -1
- package/app/user.d.ts +12 -17
- package/app/user.js +0 -2
- package/app/user.js.map +1 -1
- package/appGroupAssignments.d.ts +6 -8
- package/appGroupAssignments.js +3 -5
- package/appGroupAssignments.js.map +1 -1
- package/appOauthApiScope.d.ts +5 -7
- package/appOauthApiScope.js +2 -4
- package/appOauthApiScope.js.map +1 -1
- package/appSamlAppSettings.d.ts +6 -7
- package/appSamlAppSettings.js +3 -4
- package/appSamlAppSettings.js.map +1 -1
- package/appSharedCredentials.d.ts +61 -63
- package/appSharedCredentials.js +4 -6
- package/appSharedCredentials.js.map +1 -1
- package/appSignonPolicy.d.ts +3 -39
- package/appSignonPolicy.js +3 -39
- package/appSignonPolicy.js.map +1 -1
- package/appSignonPolicyRule.d.ts +69 -361
- package/appSignonPolicyRule.js +1 -278
- package/appSignonPolicyRule.js.map +1 -1
- package/appUserBaseSchemaProperty.d.ts +25 -29
- package/appUserBaseSchemaProperty.js +1 -5
- package/appUserBaseSchemaProperty.js.map +1 -1
- package/appUserSchemaProperty.d.ts +51 -41
- package/appUserSchemaProperty.js +0 -2
- package/appUserSchemaProperty.js.map +1 -1
- package/auth/getServer.d.ts +11 -11
- package/auth/getServer.js +2 -2
- package/auth/getServerPolicy.d.ts +15 -9
- package/auth/getServerPolicy.js +2 -2
- package/auth/getServerPolicy.js.map +1 -1
- package/auth/getServerScopes.d.ts +8 -5
- package/auth/getServerScopes.js +2 -2
- package/auth/getServerScopes.js.map +1 -1
- package/auth/server.d.ts +15 -19
- package/auth/server.js +1 -5
- package/auth/server.js.map +1 -1
- package/auth/serverClaim.d.ts +13 -17
- package/auth/serverClaim.js +1 -5
- package/auth/serverClaim.js.map +1 -1
- package/auth/serverPolicy.d.ts +10 -14
- package/auth/serverPolicy.js +1 -5
- package/auth/serverPolicy.js.map +1 -1
- package/auth/serverPolicyClaim.d.ts +50 -66
- package/auth/serverPolicyClaim.js +0 -25
- package/auth/serverPolicyClaim.js.map +1 -1
- package/auth/serverPolicyRule.d.ts +32 -43
- package/auth/serverPolicyRule.js +0 -2
- package/auth/serverPolicyRule.js.map +1 -1
- package/auth/serverScope.d.ts +16 -20
- package/auth/serverScope.js +1 -5
- package/auth/serverScope.js.map +1 -1
- package/authServerClaimDefault.d.ts +10 -25
- package/authServerClaimDefault.js +0 -9
- package/authServerClaimDefault.js.map +1 -1
- package/authServerDefault.d.ts +15 -19
- package/authServerDefault.js +1 -5
- package/authServerDefault.js.map +1 -1
- package/authenticator.d.ts +53 -61
- package/authenticator.js +11 -11
- package/authenticator.js.map +1 -1
- package/behaviour.d.ts +21 -41
- package/behaviour.js +0 -2
- package/behaviour.js.map +1 -1
- package/brand.d.ts +23 -22
- package/brand.js +8 -4
- package/brand.js.map +1 -1
- package/captcha.d.ts +15 -17
- package/captcha.js +3 -5
- package/captcha.js.map +1 -1
- package/captchaOrgWideSettings.d.ts +8 -43
- package/captchaOrgWideSettings.js +2 -37
- package/captchaOrgWideSettings.js.map +1 -1
- package/domain.d.ts +13 -21
- package/domain.js +0 -2
- package/domain.js.map +1 -1
- package/domainCertificate.d.ts +17 -24
- package/domainCertificate.js +2 -9
- package/domainCertificate.js.map +1 -1
- package/domainVerification.d.ts +4 -10
- package/domainVerification.js +1 -7
- package/domainVerification.js.map +1 -1
- package/emailCustomization.d.ts +38 -222
- package/emailCustomization.js +29 -33
- package/emailCustomization.js.map +1 -1
- package/emailDomain.d.ts +4 -8
- package/emailDomain.js +0 -4
- package/emailDomain.js.map +1 -1
- package/emailDomainVerification.d.ts +3 -7
- package/emailDomainVerification.js +0 -4
- package/emailDomainVerification.js.map +1 -1
- package/emailSender.d.ts +15 -17
- package/emailSender.js +2 -4
- package/emailSender.js.map +1 -1
- package/emailSenderVerification.d.ts +5 -9
- package/emailSenderVerification.js +2 -6
- package/emailSenderVerification.js.map +1 -1
- package/eventHook.d.ts +16 -11
- package/eventHook.js +1 -5
- package/eventHook.js.map +1 -1
- package/eventHookVerification.d.ts +4 -10
- package/eventHookVerification.js +1 -7
- package/eventHookVerification.js.map +1 -1
- package/factor/factor.d.ts +4 -9
- package/factor/factor.js +1 -3
- package/factor/factor.js.map +1 -1
- package/factorTotp.d.ts +12 -21
- package/factorTotp.js +3 -3
- package/factorTotp.js.map +1 -1
- package/getAppGroupAssignments.d.ts +6 -6
- package/getAppGroupAssignments.js +2 -2
- package/getAppSignonPolicy.d.ts +16 -6
- package/getAppSignonPolicy.js +8 -4
- package/getAppSignonPolicy.js.map +1 -1
- package/getAppUserAssignments.d.ts +6 -6
- package/getAppUserAssignments.js +2 -2
- package/getAuthServerClaim.d.ts +15 -12
- package/getAuthServerClaim.js +2 -2
- package/getAuthServerClaim.js.map +1 -1
- package/getAuthServerClaims.d.ts +8 -5
- package/getAuthServerClaims.js +2 -2
- package/getAuthServerClaims.js.map +1 -1
- package/getAuthenticator.d.ts +24 -26
- package/getAuthenticator.js +14 -22
- package/getAuthenticator.js.map +1 -1
- package/getBehaviour.d.ts +6 -8
- package/getBehaviour.js +2 -2
- package/getBehaviour.js.map +1 -1
- package/getBehaviours.d.ts +7 -7
- package/getBehaviours.js +2 -2
- package/getBrand.d.ts +9 -6
- package/getBrand.js +2 -2
- package/getBrand.js.map +1 -1
- package/getBrands.d.ts +2 -2
- package/getBrands.js +2 -2
- package/getDomain.d.ts +11 -14
- package/getDomain.js +2 -8
- package/getDomain.js.map +1 -1
- package/getEmailCustomization.d.ts +14 -9
- package/getEmailCustomization.js +2 -6
- package/getEmailCustomization.js.map +1 -1
- package/getEmailCustomizations.d.ts +11 -9
- package/getEmailCustomizations.js +2 -6
- package/getEmailCustomizations.js.map +1 -1
- package/getGroups.d.ts +11 -25
- package/getGroups.js +2 -2
- package/getGroups.js.map +1 -1
- package/getLogStream.d.ts +8 -39
- package/getLogStream.js +2 -24
- package/getLogStream.js.map +1 -1
- package/getNetworkZone.d.ts +12 -12
- package/getNetworkZone.js +2 -2
- package/getOrgMetadata.d.ts +0 -22
- package/getOrgMetadata.js +0 -22
- package/getOrgMetadata.js.map +1 -1
- package/getRoleSubscription.d.ts +13 -35
- package/getRoleSubscription.js +2 -2
- package/getRoleSubscription.js.map +1 -1
- package/getTemplate.d.ts +10 -8
- package/getTemplate.js +2 -6
- package/getTemplate.js.map +1 -1
- package/getTemplates.d.ts +6 -7
- package/getTemplates.js +2 -6
- package/getTemplates.js.map +1 -1
- package/getTheme.d.ts +14 -12
- package/getTheme.js +2 -6
- package/getTheme.js.map +1 -1
- package/getThemes.d.ts +6 -7
- package/getThemes.js +2 -6
- package/getThemes.js.map +1 -1
- package/getTrustedOrigins.d.ts +7 -4
- package/getTrustedOrigins.js +2 -2
- package/getTrustedOrigins.js.map +1 -1
- package/getUserSecurityQuestions.d.ts +4 -8
- package/getUserSecurityQuestions.js +0 -4
- package/getUserSecurityQuestions.js.map +1 -1
- package/group/getEveryoneGroup.d.ts +10 -5
- package/group/getEveryoneGroup.js +4 -2
- package/group/getEveryoneGroup.js.map +1 -1
- package/group/getGroup.d.ts +17 -26
- package/group/getGroup.js +2 -2
- package/group/getGroup.js.map +1 -1
- package/group/getRule.d.ts +9 -9
- package/group/getRule.js +2 -2
- package/group/group.d.ts +4 -36
- package/group/group.js +1 -33
- package/group/group.js.map +1 -1
- package/group/role.d.ts +37 -81
- package/group/role.js +1 -6
- package/group/role.js.map +1 -1
- package/group/rule.d.ts +12 -20
- package/group/rule.js +0 -2
- package/group/rule.js.map +1 -1
- package/groupMemberships.d.ts +8 -10
- package/groupMemberships.js +2 -4
- package/groupMemberships.js.map +1 -1
- package/groupSchemaProperty.d.ts +57 -59
- package/groupSchemaProperty.js +0 -2
- package/groupSchemaProperty.js.map +1 -1
- package/idp/getMetadataSaml.d.ts +9 -6
- package/idp/getMetadataSaml.js +2 -2
- package/idp/getMetadataSaml.js.map +1 -1
- package/idp/getOidc.d.ts +9 -9
- package/idp/getOidc.js +2 -2
- package/idp/getSaml.d.ts +16 -13
- package/idp/getSaml.js +2 -2
- package/idp/getSaml.js.map +1 -1
- package/idp/getSocial.d.ts +8 -2
- package/idp/getSocial.js +2 -2
- package/idp/getSocial.js.map +1 -1
- package/idp/oidc.d.ts +70 -62
- package/idp/oidc.js +3 -5
- package/idp/oidc.js.map +1 -1
- package/idp/saml.d.ts +64 -86
- package/idp/saml.js +1 -5
- package/idp/saml.js.map +1 -1
- package/idp/samlKey.d.ts +3 -5
- package/idp/samlKey.js +0 -2
- package/idp/samlKey.js.map +1 -1
- package/idp/social.d.ts +99 -69
- package/idp/social.js +11 -5
- package/idp/social.js.map +1 -1
- package/inline/hook.d.ts +4 -26
- package/inline/hook.js +1 -5
- package/inline/hook.js.map +1 -1
- package/linkDefinition.d.ts +2 -3
- package/linkDefinition.js +2 -3
- package/linkDefinition.js.map +1 -1
- package/linkValue.d.ts +7 -9
- package/linkValue.js +1 -3
- package/linkValue.js.map +1 -1
- package/logStream.d.ts +32 -27
- package/logStream.js +23 -9
- package/logStream.js.map +1 -1
- package/network/zone.d.ts +25 -66
- package/network/zone.js +1 -39
- package/network/zone.js.map +1 -1
- package/orgConfiguration.d.ts +4 -9
- package/orgConfiguration.js +1 -3
- package/orgConfiguration.js.map +1 -1
- package/orgSupport.d.ts +4 -7
- package/orgSupport.js +1 -4
- package/orgSupport.js.map +1 -1
- package/package.json +3 -3
- package/policy/getDefaultPolicy.d.ts +9 -7
- package/policy/getDefaultPolicy.js +6 -2
- package/policy/getDefaultPolicy.js.map +1 -1
- package/policy/getPolicy.d.ts +11 -26
- package/policy/getPolicy.js +2 -2
- package/policy/getPolicy.js.map +1 -1
- package/policy/mfa.d.ts +18 -220
- package/policy/mfa.js +0 -10
- package/policy/mfa.js.map +1 -1
- package/policy/password.d.ts +91 -95
- package/policy/password.js +1 -5
- package/policy/password.js.map +1 -1
- package/policy/ruleIdpDiscovery.d.ts +111 -93
- package/policy/ruleIdpDiscovery.js +48 -57
- package/policy/ruleIdpDiscovery.js.map +1 -1
- package/policy/ruleMfa.d.ts +40 -30
- package/policy/ruleMfa.js +1 -3
- package/policy/ruleMfa.js.map +1 -1
- package/policy/rulePassword.d.ts +34 -38
- package/policy/rulePassword.js +1 -5
- package/policy/rulePassword.js.map +1 -1
- package/policy/ruleSignon.d.ts +94 -85
- package/policy/ruleSignon.js +1 -4
- package/policy/ruleSignon.js.map +1 -1
- package/policy/signon.d.ts +16 -20
- package/policy/signon.js +1 -5
- package/policy/signon.js.map +1 -1
- package/policyMfaDefault.d.ts +15 -214
- package/policyMfaDefault.js +2 -9
- package/policyMfaDefault.js.map +1 -1
- package/policyPasswordDefault.d.ts +85 -101
- package/policyPasswordDefault.js +1 -5
- package/policyPasswordDefault.js.map +1 -1
- package/policyProfileEnrollment.d.ts +8 -9
- package/policyProfileEnrollment.js +2 -3
- package/policyProfileEnrollment.js.map +1 -1
- package/policyProfileEnrollmentApps.d.ts +8 -11
- package/policyProfileEnrollmentApps.js +3 -6
- package/policyProfileEnrollmentApps.js.map +1 -1
- package/policyRuleProfileEnrollment.d.ts +42 -31
- package/policyRuleProfileEnrollment.js +2 -3
- package/policyRuleProfileEnrollment.js.map +1 -1
- package/profile/mapping.d.ts +19 -34
- package/profile/mapping.js +4 -4
- package/profile/mapping.js.map +1 -1
- package/rateLimiting.d.ts +8 -17
- package/rateLimiting.js +2 -5
- package/rateLimiting.js.map +1 -1
- package/resourceSet.d.ts +18 -26
- package/resourceSet.js +9 -14
- package/resourceSet.js.map +1 -1
- package/roleSubscription.d.ts +35 -86
- package/roleSubscription.js +2 -2
- package/roleSubscription.js.map +1 -1
- package/securityNotificationEmails.d.ts +4 -7
- package/securityNotificationEmails.js +4 -7
- package/securityNotificationEmails.js.map +1 -1
- package/templateSms.d.ts +4 -8
- package/templateSms.js +1 -5
- package/templateSms.js.map +1 -1
- package/theme.d.ts +46 -46
- package/theme.js +2 -2
- package/threatInsightSettings.d.ts +7 -27
- package/threatInsightSettings.js +1 -3
- package/threatInsightSettings.js.map +1 -1
- package/trustedorigin/origin.d.ts +13 -17
- package/trustedorigin/origin.js +1 -5
- package/trustedorigin/origin.js.map +1 -1
- package/types/input.d.ts +65 -162
- package/types/output.d.ts +75 -275
- package/user/getUser.d.ts +32 -104
- package/user/getUser.js +2 -2
- package/user/getUser.js.map +1 -1
- package/user/getUserProfileMappingSource.d.ts +9 -7
- package/user/getUserProfileMappingSource.js +6 -4
- package/user/getUserProfileMappingSource.js.map +1 -1
- package/user/getUserType.d.ts +7 -7
- package/user/getUserType.js +2 -2
- package/user/getUsers.d.ts +95 -37
- package/user/getUsers.js +64 -24
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +160 -209
- package/user/user.js +43 -65
- package/user/user.js.map +1 -1
- package/user/userType.d.ts +1 -5
- package/user/userType.js +1 -5
- package/user/userType.js.map +1 -1
- package/userAdminRoles.d.ts +10 -17
- package/userAdminRoles.js +1 -5
- package/userAdminRoles.js.map +1 -1
- package/userBaseSchemaProperty.d.ts +26 -34
- package/userBaseSchemaProperty.js +2 -10
- package/userBaseSchemaProperty.js.map +1 -1
- package/userFactorQuestion.d.ts +1 -5
- package/userFactorQuestion.js +1 -5
- package/userFactorQuestion.js.map +1 -1
- package/userGroupMemberships.d.ts +3 -3
- package/userSchemaProperty.d.ts +57 -56
- package/userSchemaProperty.js +0 -8
- package/userSchemaProperty.js.map +1 -1
package/appSignonPolicyRule.d.ts
CHANGED
|
@@ -2,287 +2,10 @@ import * as pulumi from "@pulumi/pulumi";
|
|
|
2
2
|
import * as inputs from "./types/input";
|
|
3
3
|
import * as outputs from "./types/output";
|
|
4
4
|
/**
|
|
5
|
-
* > **WARNING:** This feature is only available as a part of the Identity Engine. Contact support for further information.
|
|
6
|
-
*
|
|
7
|
-
* This resource allows you to create and configure a sign-on policy rule for the application.
|
|
8
|
-
*
|
|
9
|
-
* A default or `Catch-all Rule` sign-on policy rule can be imported and managed as a custom rule.
|
|
10
|
-
* The only difference is that these fields are immutable and can not be managed: `networkConnection`, `networkExcludes`,
|
|
11
|
-
* `networkIncludes`, `platformInclude`, `customExpression`, `deviceIsRegistered`, `deviceIsManaged`, `usersExcluded`,
|
|
12
|
-
* `usersIncluded`, `groupsExcluded`, `groupsIncluded`, `userTypesExcluded` and `userTypesIncluded`.
|
|
13
|
-
*
|
|
14
|
-
* ## Example Usage
|
|
15
|
-
*
|
|
16
|
-
* ### Simple usage
|
|
17
|
-
*
|
|
18
|
-
* ```typescript
|
|
19
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
20
|
-
* import * as okta from "@pulumi/okta";
|
|
21
|
-
*
|
|
22
|
-
* const testSaml = new okta.app.Saml("test", {
|
|
23
|
-
* label: "My App",
|
|
24
|
-
* ssoUrl: "https://google.com",
|
|
25
|
-
* recipient: "https://here.com",
|
|
26
|
-
* destination: "https://its-about-the-journey.com",
|
|
27
|
-
* audience: "https://audience.com",
|
|
28
|
-
* status: "ACTIVE",
|
|
29
|
-
* subjectNameIdTemplate: "${user.userName}",
|
|
30
|
-
* subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
|
|
31
|
-
* signatureAlgorithm: "RSA_SHA256",
|
|
32
|
-
* responseSigned: true,
|
|
33
|
-
* digestAlgorithm: "SHA256",
|
|
34
|
-
* honorForceAuthn: false,
|
|
35
|
-
* authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
|
|
36
|
-
* });
|
|
37
|
-
* const test = okta.getAppSignonPolicyOutput({
|
|
38
|
-
* appId: testSaml.id,
|
|
39
|
-
* });
|
|
40
|
-
* const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("test", {
|
|
41
|
-
* policyId: test.apply(test => test.id),
|
|
42
|
-
* name: "testAcc_replace_with_uuid",
|
|
43
|
-
* });
|
|
44
|
-
* ```
|
|
45
|
-
*
|
|
46
|
-
* This will create an app sign-on policy rule with the following `THEN` block:
|
|
47
|
-
*
|
|
48
|
-
* ### Rule with Constraints
|
|
49
|
-
*
|
|
50
|
-
* ### Example 1:
|
|
51
|
-
*
|
|
52
|
-
* ```typescript
|
|
53
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
54
|
-
* import * as okta from "@pulumi/okta";
|
|
55
|
-
*
|
|
56
|
-
* const test = new okta.AppSignonPolicyRule("test", {
|
|
57
|
-
* policyId: testOktaAppSignonPolicy.id,
|
|
58
|
-
* name: "testAcc_replace_with_uuid",
|
|
59
|
-
* constraints: [JSON.stringify({
|
|
60
|
-
* knowledge: {
|
|
61
|
-
* types: ["password"],
|
|
62
|
-
* },
|
|
63
|
-
* })],
|
|
64
|
-
* });
|
|
65
|
-
* ```
|
|
66
|
-
*
|
|
67
|
-
* This will create an app sign-on policy rule with the following `THEN` block:
|
|
68
|
-
*
|
|
69
|
-
* ### Example 2:
|
|
70
|
-
*
|
|
71
|
-
* ```typescript
|
|
72
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
73
|
-
* import * as okta from "@pulumi/okta";
|
|
74
|
-
*
|
|
75
|
-
* const test = new okta.AppSignonPolicyRule("test", {
|
|
76
|
-
* policyId: testOktaAppSignonPolicy.id,
|
|
77
|
-
* name: "testAcc_replace_with_uuid",
|
|
78
|
-
* constraints: [JSON.stringify({
|
|
79
|
-
* knowledge: {
|
|
80
|
-
* reauthenticateIn: "PT2H",
|
|
81
|
-
* types: ["password"],
|
|
82
|
-
* },
|
|
83
|
-
* possession: {
|
|
84
|
-
* deviceBound: "REQUIRED",
|
|
85
|
-
* hardwareProtection: "REQUIRED",
|
|
86
|
-
* },
|
|
87
|
-
* })],
|
|
88
|
-
* });
|
|
89
|
-
* ```
|
|
90
|
-
*
|
|
91
|
-
* This will create an app sign-on policy rule with the following `THEN` block:
|
|
92
|
-
*
|
|
93
|
-
* More examples can be
|
|
94
|
-
* found [here](https://developer.okta.com/docs/reference/api/policy/#verification-method-json-examples).
|
|
95
|
-
*
|
|
96
|
-
* ### Complex example
|
|
97
|
-
*
|
|
98
|
-
* ```typescript
|
|
99
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
100
|
-
* import * as okta from "@pulumi/okta";
|
|
101
|
-
*
|
|
102
|
-
* const testSaml = new okta.app.Saml("test", {
|
|
103
|
-
* label: "testAcc_replace_with_uuid",
|
|
104
|
-
* ssoUrl: "https://google.com",
|
|
105
|
-
* recipient: "https://here.com",
|
|
106
|
-
* destination: "https://its-about-the-journey.com",
|
|
107
|
-
* audience: "https://audience.com",
|
|
108
|
-
* subjectNameIdTemplate: "${user.userName}",
|
|
109
|
-
* subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
|
|
110
|
-
* responseSigned: true,
|
|
111
|
-
* signatureAlgorithm: "RSA_SHA256",
|
|
112
|
-
* digestAlgorithm: "SHA256",
|
|
113
|
-
* honorForceAuthn: false,
|
|
114
|
-
* authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
|
|
115
|
-
* singleLogoutIssuer: "https://dunshire.okta.com",
|
|
116
|
-
* singleLogoutUrl: "https://dunshire.okta.com/logout",
|
|
117
|
-
* singleLogoutCertificate: `MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV\x0d
|
|
118
|
-
* BAgMBU1haW5lMRAwDgYDVQQHDAdDYXJpYm91MRcwFQYDVQQKDA5Tbm93bWFrZXJzIEluYzEUMBIG\x0d
|
|
119
|
-
* A1UECwwLRW5naW5lZXJpbmcxDTALBgNVBAMMBFNub3cxIDAeBgkqhkiG9w0BCQEWEWVtYWlsQGV4\x0d
|
|
120
|
-
* YW1wbGUuY29tMB4XDTIwMTIwMzIyNDY0M1oXDTMwMTIwMTIyNDY0M1owgY8xCzAJBgNVBAYTAlVT\x0d
|
|
121
|
-
* MQ4wDAYDVQQIDAVNYWluZTEQMA4GA1UEBwwHQ2FyaWJvdTEXMBUGA1UECgwOU25vd21ha2VycyBJ\x0d
|
|
122
|
-
* bmMxFDASBgNVBAsMC0VuZ2luZWVyaW5nMQ0wCwYDVQQDDARTbm93MSAwHgYJKoZIhvcNAQkBFhFl\x0d
|
|
123
|
-
* bWFpbEBleGFtcGxlLmNvbTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANMmWDjXPdoa\x0d
|
|
124
|
-
* PyzIENqeY9njLan2FqCbQPSestWUUcb6NhDsJVGSQ7XR+ozQA5TaJzbP7cAJUj8vCcbqMZsgOQAu\x0d
|
|
125
|
-
* O/pzYyQEKptLmrGvPn7xkJ1A1xLkp2NY18cpDTeUPueJUoidZ9EJwEuyUZIktzxNNU1pA1lGijiu\x0d
|
|
126
|
-
* 2XNxs9d9JR/hm3tCu9Im8qLVB4JtX80YUa6QtlRjWR/H8a373AYCOASdoB3c57fIPD8ATDNy2w/c\x0d
|
|
127
|
-
* fCVGiyKDMFB+GA/WTsZpOP3iohRp8ltAncSuzypcztb2iE+jijtTsiC9kUA2abAJqqpoCJubNShi\x0d
|
|
128
|
-
* Vff4822czpziS44MV2guC9wANi8u3Uyl5MKsU95j01jzadKRP5S+2f0K+n8n4UoV9fnqZFyuGAKd\x0d
|
|
129
|
-
* CJi9K6NlSAP+TgPe/JP9FOSuxQOHWJfmdLHdJD+evoKi9E55sr5lRFK0xU1Fj5Ld7zjC0pXPhtJf\x0d
|
|
130
|
-
* sgjEZzD433AsHnRzvRT1KSNCPkLYomznZo5n9rWYgCQ8HcytlQDTesmKE+s05E/VSWNtH84XdDrt\x0d
|
|
131
|
-
* ieXwfwhHfaABSu+WjZYxi9CXdFCSvXhsgufUcK4FbYAHl/ga/cJxZc52yFC7Pcq0u9O2BSCjYPdQ\x0d
|
|
132
|
-
* DAHs9dhT1RhwVLM8RmoAzgxyyzau0gxnAlgSBD9FMW6dXqIHIp8yAAg9cRXhYRTNAgMBAAEwDQYJ\x0d
|
|
133
|
-
* KoZIhvcNAQELBQADggIBADofEC1SvG8qa7pmKCjB/E9Sxhk3mvUO9Gq43xzwVb721Ng3VYf4vGU3\x0d
|
|
134
|
-
* wLUwJeLt0wggnj26NJweN5T3q9T8UMxZhHSWvttEU3+S1nArRB0beti716HSlOCDx4wTmBu/D1MG\x0d
|
|
135
|
-
* t/kZYFJw+zuzvAcbYct2pK69AQhD8xAIbQvqADJI7cCK3yRry+aWtppc58P81KYabUlCfFXfhJ9E\x0d
|
|
136
|
-
* P72ffN4jVHpX3lxxYh7FKAdiKbY2FYzjsc7RdgKI1R3iAAZUCGBTvezNzaetGzTUjjl/g1tcVYij\x0d
|
|
137
|
-
* ltH9ZOQBPlUMI88lxUxqgRTerpPmAJH00CACx4JFiZrweLM1trZyy06wNDQgLrqHr3EOagBF/O2h\x0d
|
|
138
|
-
* hfTehNdVr6iq3YhKWBo4/+RL0RCzHMh4u86VbDDnDn4Y6HzLuyIAtBFoikoKM6UHTOa0Pqv2bBr5\x0d
|
|
139
|
-
* wbkRkVUxl9yJJw/HmTCdfnsM9dTOJUKzEglnGF2184Gg+qJDZB6fSf0EAO1F6sTqiSswl+uHQZiy\x0d
|
|
140
|
-
* DaZzyU7Gg5seKOZ20zTRaX3Ihj9Zij/ORnrARE7eM/usKMECp+7syUwAUKxDCZkGiUdskmOhhBGL\x0d
|
|
141
|
-
* JtbyK3F2UvoJoLsm3pIcvMak9KwMjSTGJB47ABUP1+w+zGcNk0D5Co3IJ6QekiLfWJyQ+kKsWLKt\x0d
|
|
142
|
-
* zOYQQatrnBagM7MI2/T4\x0d
|
|
143
|
-
* `,
|
|
144
|
-
* attributeStatements: [{
|
|
145
|
-
* type: "GROUP",
|
|
146
|
-
* name: "groups",
|
|
147
|
-
* filterType: "REGEX",
|
|
148
|
-
* filterValue: ".*",
|
|
149
|
-
* }],
|
|
150
|
-
* });
|
|
151
|
-
* const test = okta.getAppSignonPolicyOutput({
|
|
152
|
-
* appId: testSaml.id,
|
|
153
|
-
* });
|
|
154
|
-
* const testUser: okta.user.User[] = [];
|
|
155
|
-
* for (const range = {value: 0}; range.value < 5; range.value++) {
|
|
156
|
-
* testUser.push(new okta.user.User(`test-${range.value}`, {
|
|
157
|
-
* firstName: "TestAcc",
|
|
158
|
-
* lastName: "Smith",
|
|
159
|
-
* login: `testAcc_${range.value}@example.com`,
|
|
160
|
-
* email: `testAcc_${range.value}@example.com`,
|
|
161
|
-
* }));
|
|
162
|
-
* }
|
|
163
|
-
* const _this: okta.group.Group[] = [];
|
|
164
|
-
* for (const range = {value: 0}; range.value < 5; range.value++) {
|
|
165
|
-
* _this.push(new okta.group.Group(`this-${range.value}`, {
|
|
166
|
-
* name: `testAcc_${range.value}`,
|
|
167
|
-
* description: `testAcc_${range.value}`,
|
|
168
|
-
* }));
|
|
169
|
-
* }
|
|
170
|
-
* const testUserType = new okta.user.UserType("test", {
|
|
171
|
-
* name: "testAcc_replace_with_uuid",
|
|
172
|
-
* displayName: "Terraform Acceptance Test User Type Updated",
|
|
173
|
-
* description: "Terraform Acceptance Test User Type Updated",
|
|
174
|
-
* });
|
|
175
|
-
* const testZone = new okta.network.Zone("test", {
|
|
176
|
-
* name: "testAcc_replace_with_uuid",
|
|
177
|
-
* type: "IP",
|
|
178
|
-
* gateways: [
|
|
179
|
-
* "1.2.3.4/24",
|
|
180
|
-
* "2.3.4.5-2.3.4.15",
|
|
181
|
-
* ],
|
|
182
|
-
* proxies: [
|
|
183
|
-
* "2.2.3.4/24",
|
|
184
|
-
* "3.3.4.5-3.3.4.15",
|
|
185
|
-
* ],
|
|
186
|
-
* });
|
|
187
|
-
* const default = okta.user.getUserType({
|
|
188
|
-
* name: "user",
|
|
189
|
-
* });
|
|
190
|
-
* const testDeviceAssuranceAndroid = new okta.policy.DeviceAssuranceAndroid("test", {
|
|
191
|
-
* name: "test",
|
|
192
|
-
* osVersion: "12",
|
|
193
|
-
* jailbreak: false,
|
|
194
|
-
* });
|
|
195
|
-
* const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("test", {
|
|
196
|
-
* name: "testAcc_replace_with_uuid",
|
|
197
|
-
* policyId: test.apply(test => test.id),
|
|
198
|
-
* access: "ALLOW",
|
|
199
|
-
* customExpression: "user.status == \"ACTIVE\"",
|
|
200
|
-
* deviceIsManaged: false,
|
|
201
|
-
* deviceIsRegistered: true,
|
|
202
|
-
* factorMode: "2FA",
|
|
203
|
-
* groupsExcludeds: [
|
|
204
|
-
* _this[2].id,
|
|
205
|
-
* _this[3].id,
|
|
206
|
-
* _this[4].id,
|
|
207
|
-
* ],
|
|
208
|
-
* groupsIncludeds: [
|
|
209
|
-
* _this[0].id,
|
|
210
|
-
* _this[1].id,
|
|
211
|
-
* ],
|
|
212
|
-
* deviceAssurancesIncludeds: [testDeviceAssuranceAndroid.id],
|
|
213
|
-
* networkConnection: "ZONE",
|
|
214
|
-
* networkIncludes: [testZone.id],
|
|
215
|
-
* platformIncludes: [
|
|
216
|
-
* {
|
|
217
|
-
* osType: "ANDROID",
|
|
218
|
-
* type: "MOBILE",
|
|
219
|
-
* },
|
|
220
|
-
* {
|
|
221
|
-
* osType: "IOS",
|
|
222
|
-
* type: "MOBILE",
|
|
223
|
-
* },
|
|
224
|
-
* {
|
|
225
|
-
* osType: "MACOS",
|
|
226
|
-
* type: "DESKTOP",
|
|
227
|
-
* },
|
|
228
|
-
* {
|
|
229
|
-
* osType: "OTHER",
|
|
230
|
-
* type: "DESKTOP",
|
|
231
|
-
* },
|
|
232
|
-
* {
|
|
233
|
-
* osType: "OTHER",
|
|
234
|
-
* type: "MOBILE",
|
|
235
|
-
* },
|
|
236
|
-
* {
|
|
237
|
-
* osType: "WINDOWS",
|
|
238
|
-
* type: "DESKTOP",
|
|
239
|
-
* },
|
|
240
|
-
* {
|
|
241
|
-
* osType: "CHROMEOS",
|
|
242
|
-
* type: "DESKTOP",
|
|
243
|
-
* },
|
|
244
|
-
* ],
|
|
245
|
-
* priority: 98,
|
|
246
|
-
* reAuthenticationFrequency: "PT43800H",
|
|
247
|
-
* type: "ASSURANCE",
|
|
248
|
-
* userTypesExcludeds: [testUserType.id],
|
|
249
|
-
* userTypesIncludeds: [_default.then(_default => _default.id)],
|
|
250
|
-
* usersExcludeds: [
|
|
251
|
-
* testUser[2].id,
|
|
252
|
-
* testUser[3].id,
|
|
253
|
-
* testUser[4].id,
|
|
254
|
-
* ],
|
|
255
|
-
* usersIncludeds: [
|
|
256
|
-
* testUser[0].id,
|
|
257
|
-
* testUser[1].id,
|
|
258
|
-
* ],
|
|
259
|
-
* constraints: [
|
|
260
|
-
* JSON.stringify({
|
|
261
|
-
* knowledge: {
|
|
262
|
-
* reauthenticateIn: "PT2H",
|
|
263
|
-
* types: ["password"],
|
|
264
|
-
* },
|
|
265
|
-
* possession: {
|
|
266
|
-
* deviceBound: "REQUIRED",
|
|
267
|
-
* },
|
|
268
|
-
* }),
|
|
269
|
-
* JSON.stringify({
|
|
270
|
-
* possession: {
|
|
271
|
-
* deviceBound: "REQUIRED",
|
|
272
|
-
* hardwareProtection: "REQUIRED",
|
|
273
|
-
* userPresence: "OPTIONAL",
|
|
274
|
-
* },
|
|
275
|
-
* }),
|
|
276
|
-
* ],
|
|
277
|
-
* });
|
|
278
|
-
* ```
|
|
279
|
-
*
|
|
280
5
|
* ## Import
|
|
281
6
|
*
|
|
282
|
-
* Okta app sign-on policy rule can be imported via the Okta ID.
|
|
283
|
-
*
|
|
284
7
|
* ```sh
|
|
285
|
-
* $ pulumi import okta:index/appSignonPolicyRule:AppSignonPolicyRule example <policy_id>/<rule_id>
|
|
8
|
+
* $ pulumi import okta:index/appSignonPolicyRule:AppSignonPolicyRule example <policy_id>/<rule_id>
|
|
286
9
|
* ```
|
|
287
10
|
*/
|
|
288
11
|
export declare class AppSignonPolicyRule extends pulumi.CustomResource {
|
|
@@ -302,69 +25,64 @@ export declare class AppSignonPolicyRule extends pulumi.CustomResource {
|
|
|
302
25
|
*/
|
|
303
26
|
static isInstance(obj: any): obj is AppSignonPolicyRule;
|
|
304
27
|
/**
|
|
305
|
-
* Allow or deny access based on the rule conditions
|
|
28
|
+
* Allow or deny access based on the rule conditions: ALLOW or DENY
|
|
306
29
|
*/
|
|
307
30
|
readonly access: pulumi.Output<string | undefined>;
|
|
308
31
|
/**
|
|
309
|
-
* An array that contains nested Authenticator Constraint objects that are organized by the Authenticator class
|
|
32
|
+
* An array that contains nested Authenticator Constraint objects that are organized by the Authenticator class
|
|
310
33
|
*/
|
|
311
34
|
readonly constraints: pulumi.Output<string[] | undefined>;
|
|
312
35
|
/**
|
|
313
|
-
* This is an advanced
|
|
36
|
+
* This is an optional advanced setting. If the expression is formatted incorrectly or conflicts with conditions set above, the rule may not match any users.
|
|
314
37
|
*/
|
|
315
38
|
readonly customExpression: pulumi.Output<string | undefined>;
|
|
316
39
|
/**
|
|
317
|
-
* List of device
|
|
40
|
+
* List of device assurance IDs to include
|
|
318
41
|
*/
|
|
319
42
|
readonly deviceAssurancesIncludeds: pulumi.Output<string[] | undefined>;
|
|
320
43
|
/**
|
|
321
|
-
* If the device is managed. A device is managed if it's managed by a device management
|
|
322
|
-
* system. When managed is passed, `deviceIsRegistered` must also be included and must be set to `true`.
|
|
44
|
+
* If the device is managed. A device is managed if it's managed by a device management system. When managed is passed, registered must also be included and must be set to true.
|
|
323
45
|
*/
|
|
324
46
|
readonly deviceIsManaged: pulumi.Output<boolean | undefined>;
|
|
325
47
|
/**
|
|
326
|
-
* If the device is registered. A device is registered if the User enrolls with Okta
|
|
327
|
-
* Verify that is installed on the device. Can only be set to `true`.
|
|
48
|
+
* If the device is registered. A device is registered if the User enrolls with Okta Verify that is installed on the device.
|
|
328
49
|
*/
|
|
329
50
|
readonly deviceIsRegistered: pulumi.Output<boolean | undefined>;
|
|
330
51
|
/**
|
|
331
|
-
* The number of factors required to satisfy this assurance level
|
|
52
|
+
* The number of factors required to satisfy this assurance level
|
|
332
53
|
*/
|
|
333
54
|
readonly factorMode: pulumi.Output<string | undefined>;
|
|
334
55
|
/**
|
|
335
|
-
* List of
|
|
56
|
+
* List of group IDs to exclude
|
|
336
57
|
*/
|
|
337
58
|
readonly groupsExcludeds: pulumi.Output<string[] | undefined>;
|
|
338
59
|
/**
|
|
339
|
-
* List of
|
|
60
|
+
* List of group IDs to include
|
|
340
61
|
*/
|
|
341
62
|
readonly groupsIncludeds: pulumi.Output<string[] | undefined>;
|
|
342
63
|
/**
|
|
343
|
-
* The inactivity duration after which the end user must re-authenticate. Use the ISO 8601 Period format for recurring time intervals.
|
|
64
|
+
* The inactivity duration after which the end user must re-authenticate. Use the ISO 8601 Period format for recurring time intervals.
|
|
344
65
|
*/
|
|
345
66
|
readonly inactivityPeriod: pulumi.Output<string | undefined>;
|
|
346
67
|
/**
|
|
347
|
-
*
|
|
68
|
+
* Policy Rule Name
|
|
348
69
|
*/
|
|
349
70
|
readonly name: pulumi.Output<string>;
|
|
350
71
|
/**
|
|
351
|
-
* Network selection mode:
|
|
72
|
+
* Network selection mode: ANYWHERE, ZONE, ON*NETWORK, or OFF*NETWORK.
|
|
352
73
|
*/
|
|
353
74
|
readonly networkConnection: pulumi.Output<string | undefined>;
|
|
354
75
|
/**
|
|
355
|
-
*
|
|
76
|
+
* The zones to exclude
|
|
356
77
|
*/
|
|
357
78
|
readonly networkExcludes: pulumi.Output<string[] | undefined>;
|
|
358
79
|
/**
|
|
359
|
-
*
|
|
80
|
+
* The zones to include
|
|
360
81
|
*/
|
|
361
82
|
readonly networkIncludes: pulumi.Output<string[] | undefined>;
|
|
362
|
-
/**
|
|
363
|
-
* List of particular platforms or devices to match on.
|
|
364
|
-
*/
|
|
365
83
|
readonly platformIncludes: pulumi.Output<outputs.AppSignonPolicyRulePlatformInclude[] | undefined>;
|
|
366
84
|
/**
|
|
367
|
-
* ID of the
|
|
85
|
+
* ID of the policy
|
|
368
86
|
*/
|
|
369
87
|
readonly policyId: pulumi.Output<string>;
|
|
370
88
|
/**
|
|
@@ -372,11 +90,11 @@ export declare class AppSignonPolicyRule extends pulumi.CustomResource {
|
|
|
372
90
|
*/
|
|
373
91
|
readonly priority: pulumi.Output<number | undefined>;
|
|
374
92
|
/**
|
|
375
|
-
* The duration after which the end user must re-authenticate, regardless of user activity. Use the ISO 8601 Period format for recurring time intervals.
|
|
93
|
+
* The duration after which the end user must re-authenticate, regardless of user activity. Use the ISO 8601 Period format for recurring time intervals. PT0S - Every sign-in attempt, PT43800H - Once per session
|
|
376
94
|
*/
|
|
377
95
|
readonly reAuthenticationFrequency: pulumi.Output<string | undefined>;
|
|
378
96
|
/**
|
|
379
|
-
* The risk score specifies a particular level of risk to match on
|
|
97
|
+
* The risk score specifies a particular level of risk to match on: ANY, LOW, MEDIUM, HIGH
|
|
380
98
|
*/
|
|
381
99
|
readonly riskScore: pulumi.Output<string>;
|
|
382
100
|
/**
|
|
@@ -384,27 +102,27 @@ export declare class AppSignonPolicyRule extends pulumi.CustomResource {
|
|
|
384
102
|
*/
|
|
385
103
|
readonly status: pulumi.Output<string | undefined>;
|
|
386
104
|
/**
|
|
387
|
-
* Often the
|
|
105
|
+
* Often the `Catch-all Rule` this rule is the system (default) rule for its associated policy
|
|
388
106
|
*/
|
|
389
107
|
readonly system: pulumi.Output<boolean>;
|
|
390
108
|
/**
|
|
391
|
-
* The Verification Method type
|
|
109
|
+
* The Verification Method type
|
|
392
110
|
*/
|
|
393
111
|
readonly type: pulumi.Output<string | undefined>;
|
|
394
112
|
/**
|
|
395
|
-
*
|
|
113
|
+
* Set of User Type IDs to exclude
|
|
396
114
|
*/
|
|
397
115
|
readonly userTypesExcludeds: pulumi.Output<string[] | undefined>;
|
|
398
116
|
/**
|
|
399
|
-
*
|
|
117
|
+
* Set of User Type IDs to include
|
|
400
118
|
*/
|
|
401
119
|
readonly userTypesIncludeds: pulumi.Output<string[] | undefined>;
|
|
402
120
|
/**
|
|
403
|
-
*
|
|
121
|
+
* Set of User IDs to exclude
|
|
404
122
|
*/
|
|
405
123
|
readonly usersExcludeds: pulumi.Output<string[] | undefined>;
|
|
406
124
|
/**
|
|
407
|
-
*
|
|
125
|
+
* Set of User IDs to include
|
|
408
126
|
*/
|
|
409
127
|
readonly usersIncludeds: pulumi.Output<string[] | undefined>;
|
|
410
128
|
/**
|
|
@@ -421,69 +139,64 @@ export declare class AppSignonPolicyRule extends pulumi.CustomResource {
|
|
|
421
139
|
*/
|
|
422
140
|
export interface AppSignonPolicyRuleState {
|
|
423
141
|
/**
|
|
424
|
-
* Allow or deny access based on the rule conditions
|
|
142
|
+
* Allow or deny access based on the rule conditions: ALLOW or DENY
|
|
425
143
|
*/
|
|
426
144
|
access?: pulumi.Input<string>;
|
|
427
145
|
/**
|
|
428
|
-
* An array that contains nested Authenticator Constraint objects that are organized by the Authenticator class
|
|
146
|
+
* An array that contains nested Authenticator Constraint objects that are organized by the Authenticator class
|
|
429
147
|
*/
|
|
430
148
|
constraints?: pulumi.Input<pulumi.Input<string>[]>;
|
|
431
149
|
/**
|
|
432
|
-
* This is an advanced
|
|
150
|
+
* This is an optional advanced setting. If the expression is formatted incorrectly or conflicts with conditions set above, the rule may not match any users.
|
|
433
151
|
*/
|
|
434
152
|
customExpression?: pulumi.Input<string>;
|
|
435
153
|
/**
|
|
436
|
-
* List of device
|
|
154
|
+
* List of device assurance IDs to include
|
|
437
155
|
*/
|
|
438
156
|
deviceAssurancesIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
439
157
|
/**
|
|
440
|
-
* If the device is managed. A device is managed if it's managed by a device management
|
|
441
|
-
* system. When managed is passed, `deviceIsRegistered` must also be included and must be set to `true`.
|
|
158
|
+
* If the device is managed. A device is managed if it's managed by a device management system. When managed is passed, registered must also be included and must be set to true.
|
|
442
159
|
*/
|
|
443
160
|
deviceIsManaged?: pulumi.Input<boolean>;
|
|
444
161
|
/**
|
|
445
|
-
* If the device is registered. A device is registered if the User enrolls with Okta
|
|
446
|
-
* Verify that is installed on the device. Can only be set to `true`.
|
|
162
|
+
* If the device is registered. A device is registered if the User enrolls with Okta Verify that is installed on the device.
|
|
447
163
|
*/
|
|
448
164
|
deviceIsRegistered?: pulumi.Input<boolean>;
|
|
449
165
|
/**
|
|
450
|
-
* The number of factors required to satisfy this assurance level
|
|
166
|
+
* The number of factors required to satisfy this assurance level
|
|
451
167
|
*/
|
|
452
168
|
factorMode?: pulumi.Input<string>;
|
|
453
169
|
/**
|
|
454
|
-
* List of
|
|
170
|
+
* List of group IDs to exclude
|
|
455
171
|
*/
|
|
456
172
|
groupsExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
457
173
|
/**
|
|
458
|
-
* List of
|
|
174
|
+
* List of group IDs to include
|
|
459
175
|
*/
|
|
460
176
|
groupsIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
461
177
|
/**
|
|
462
|
-
* The inactivity duration after which the end user must re-authenticate. Use the ISO 8601 Period format for recurring time intervals.
|
|
178
|
+
* The inactivity duration after which the end user must re-authenticate. Use the ISO 8601 Period format for recurring time intervals.
|
|
463
179
|
*/
|
|
464
180
|
inactivityPeriod?: pulumi.Input<string>;
|
|
465
181
|
/**
|
|
466
|
-
*
|
|
182
|
+
* Policy Rule Name
|
|
467
183
|
*/
|
|
468
184
|
name?: pulumi.Input<string>;
|
|
469
185
|
/**
|
|
470
|
-
* Network selection mode:
|
|
186
|
+
* Network selection mode: ANYWHERE, ZONE, ON*NETWORK, or OFF*NETWORK.
|
|
471
187
|
*/
|
|
472
188
|
networkConnection?: pulumi.Input<string>;
|
|
473
189
|
/**
|
|
474
|
-
*
|
|
190
|
+
* The zones to exclude
|
|
475
191
|
*/
|
|
476
192
|
networkExcludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
477
193
|
/**
|
|
478
|
-
*
|
|
194
|
+
* The zones to include
|
|
479
195
|
*/
|
|
480
196
|
networkIncludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
481
|
-
/**
|
|
482
|
-
* List of particular platforms or devices to match on.
|
|
483
|
-
*/
|
|
484
197
|
platformIncludes?: pulumi.Input<pulumi.Input<inputs.AppSignonPolicyRulePlatformInclude>[]>;
|
|
485
198
|
/**
|
|
486
|
-
* ID of the
|
|
199
|
+
* ID of the policy
|
|
487
200
|
*/
|
|
488
201
|
policyId?: pulumi.Input<string>;
|
|
489
202
|
/**
|
|
@@ -491,11 +204,11 @@ export interface AppSignonPolicyRuleState {
|
|
|
491
204
|
*/
|
|
492
205
|
priority?: pulumi.Input<number>;
|
|
493
206
|
/**
|
|
494
|
-
* The duration after which the end user must re-authenticate, regardless of user activity. Use the ISO 8601 Period format for recurring time intervals.
|
|
207
|
+
* The duration after which the end user must re-authenticate, regardless of user activity. Use the ISO 8601 Period format for recurring time intervals. PT0S - Every sign-in attempt, PT43800H - Once per session
|
|
495
208
|
*/
|
|
496
209
|
reAuthenticationFrequency?: pulumi.Input<string>;
|
|
497
210
|
/**
|
|
498
|
-
* The risk score specifies a particular level of risk to match on
|
|
211
|
+
* The risk score specifies a particular level of risk to match on: ANY, LOW, MEDIUM, HIGH
|
|
499
212
|
*/
|
|
500
213
|
riskScore?: pulumi.Input<string>;
|
|
501
214
|
/**
|
|
@@ -503,27 +216,27 @@ export interface AppSignonPolicyRuleState {
|
|
|
503
216
|
*/
|
|
504
217
|
status?: pulumi.Input<string>;
|
|
505
218
|
/**
|
|
506
|
-
* Often the
|
|
219
|
+
* Often the `Catch-all Rule` this rule is the system (default) rule for its associated policy
|
|
507
220
|
*/
|
|
508
221
|
system?: pulumi.Input<boolean>;
|
|
509
222
|
/**
|
|
510
|
-
* The Verification Method type
|
|
223
|
+
* The Verification Method type
|
|
511
224
|
*/
|
|
512
225
|
type?: pulumi.Input<string>;
|
|
513
226
|
/**
|
|
514
|
-
*
|
|
227
|
+
* Set of User Type IDs to exclude
|
|
515
228
|
*/
|
|
516
229
|
userTypesExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
517
230
|
/**
|
|
518
|
-
*
|
|
231
|
+
* Set of User Type IDs to include
|
|
519
232
|
*/
|
|
520
233
|
userTypesIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
521
234
|
/**
|
|
522
|
-
*
|
|
235
|
+
* Set of User IDs to exclude
|
|
523
236
|
*/
|
|
524
237
|
usersExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
525
238
|
/**
|
|
526
|
-
*
|
|
239
|
+
* Set of User IDs to include
|
|
527
240
|
*/
|
|
528
241
|
usersIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
529
242
|
}
|
|
@@ -532,69 +245,64 @@ export interface AppSignonPolicyRuleState {
|
|
|
532
245
|
*/
|
|
533
246
|
export interface AppSignonPolicyRuleArgs {
|
|
534
247
|
/**
|
|
535
|
-
* Allow or deny access based on the rule conditions
|
|
248
|
+
* Allow or deny access based on the rule conditions: ALLOW or DENY
|
|
536
249
|
*/
|
|
537
250
|
access?: pulumi.Input<string>;
|
|
538
251
|
/**
|
|
539
|
-
* An array that contains nested Authenticator Constraint objects that are organized by the Authenticator class
|
|
252
|
+
* An array that contains nested Authenticator Constraint objects that are organized by the Authenticator class
|
|
540
253
|
*/
|
|
541
254
|
constraints?: pulumi.Input<pulumi.Input<string>[]>;
|
|
542
255
|
/**
|
|
543
|
-
* This is an advanced
|
|
256
|
+
* This is an optional advanced setting. If the expression is formatted incorrectly or conflicts with conditions set above, the rule may not match any users.
|
|
544
257
|
*/
|
|
545
258
|
customExpression?: pulumi.Input<string>;
|
|
546
259
|
/**
|
|
547
|
-
* List of device
|
|
260
|
+
* List of device assurance IDs to include
|
|
548
261
|
*/
|
|
549
262
|
deviceAssurancesIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
550
263
|
/**
|
|
551
|
-
* If the device is managed. A device is managed if it's managed by a device management
|
|
552
|
-
* system. When managed is passed, `deviceIsRegistered` must also be included and must be set to `true`.
|
|
264
|
+
* If the device is managed. A device is managed if it's managed by a device management system. When managed is passed, registered must also be included and must be set to true.
|
|
553
265
|
*/
|
|
554
266
|
deviceIsManaged?: pulumi.Input<boolean>;
|
|
555
267
|
/**
|
|
556
|
-
* If the device is registered. A device is registered if the User enrolls with Okta
|
|
557
|
-
* Verify that is installed on the device. Can only be set to `true`.
|
|
268
|
+
* If the device is registered. A device is registered if the User enrolls with Okta Verify that is installed on the device.
|
|
558
269
|
*/
|
|
559
270
|
deviceIsRegistered?: pulumi.Input<boolean>;
|
|
560
271
|
/**
|
|
561
|
-
* The number of factors required to satisfy this assurance level
|
|
272
|
+
* The number of factors required to satisfy this assurance level
|
|
562
273
|
*/
|
|
563
274
|
factorMode?: pulumi.Input<string>;
|
|
564
275
|
/**
|
|
565
|
-
* List of
|
|
276
|
+
* List of group IDs to exclude
|
|
566
277
|
*/
|
|
567
278
|
groupsExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
568
279
|
/**
|
|
569
|
-
* List of
|
|
280
|
+
* List of group IDs to include
|
|
570
281
|
*/
|
|
571
282
|
groupsIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
572
283
|
/**
|
|
573
|
-
* The inactivity duration after which the end user must re-authenticate. Use the ISO 8601 Period format for recurring time intervals.
|
|
284
|
+
* The inactivity duration after which the end user must re-authenticate. Use the ISO 8601 Period format for recurring time intervals.
|
|
574
285
|
*/
|
|
575
286
|
inactivityPeriod?: pulumi.Input<string>;
|
|
576
287
|
/**
|
|
577
|
-
*
|
|
288
|
+
* Policy Rule Name
|
|
578
289
|
*/
|
|
579
290
|
name?: pulumi.Input<string>;
|
|
580
291
|
/**
|
|
581
|
-
* Network selection mode:
|
|
292
|
+
* Network selection mode: ANYWHERE, ZONE, ON*NETWORK, or OFF*NETWORK.
|
|
582
293
|
*/
|
|
583
294
|
networkConnection?: pulumi.Input<string>;
|
|
584
295
|
/**
|
|
585
|
-
*
|
|
296
|
+
* The zones to exclude
|
|
586
297
|
*/
|
|
587
298
|
networkExcludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
588
299
|
/**
|
|
589
|
-
*
|
|
300
|
+
* The zones to include
|
|
590
301
|
*/
|
|
591
302
|
networkIncludes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
592
|
-
/**
|
|
593
|
-
* List of particular platforms or devices to match on.
|
|
594
|
-
*/
|
|
595
303
|
platformIncludes?: pulumi.Input<pulumi.Input<inputs.AppSignonPolicyRulePlatformInclude>[]>;
|
|
596
304
|
/**
|
|
597
|
-
* ID of the
|
|
305
|
+
* ID of the policy
|
|
598
306
|
*/
|
|
599
307
|
policyId: pulumi.Input<string>;
|
|
600
308
|
/**
|
|
@@ -602,11 +310,11 @@ export interface AppSignonPolicyRuleArgs {
|
|
|
602
310
|
*/
|
|
603
311
|
priority?: pulumi.Input<number>;
|
|
604
312
|
/**
|
|
605
|
-
* The duration after which the end user must re-authenticate, regardless of user activity. Use the ISO 8601 Period format for recurring time intervals.
|
|
313
|
+
* The duration after which the end user must re-authenticate, regardless of user activity. Use the ISO 8601 Period format for recurring time intervals. PT0S - Every sign-in attempt, PT43800H - Once per session
|
|
606
314
|
*/
|
|
607
315
|
reAuthenticationFrequency?: pulumi.Input<string>;
|
|
608
316
|
/**
|
|
609
|
-
* The risk score specifies a particular level of risk to match on
|
|
317
|
+
* The risk score specifies a particular level of risk to match on: ANY, LOW, MEDIUM, HIGH
|
|
610
318
|
*/
|
|
611
319
|
riskScore?: pulumi.Input<string>;
|
|
612
320
|
/**
|
|
@@ -614,23 +322,23 @@ export interface AppSignonPolicyRuleArgs {
|
|
|
614
322
|
*/
|
|
615
323
|
status?: pulumi.Input<string>;
|
|
616
324
|
/**
|
|
617
|
-
* The Verification Method type
|
|
325
|
+
* The Verification Method type
|
|
618
326
|
*/
|
|
619
327
|
type?: pulumi.Input<string>;
|
|
620
328
|
/**
|
|
621
|
-
*
|
|
329
|
+
* Set of User Type IDs to exclude
|
|
622
330
|
*/
|
|
623
331
|
userTypesExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
624
332
|
/**
|
|
625
|
-
*
|
|
333
|
+
* Set of User Type IDs to include
|
|
626
334
|
*/
|
|
627
335
|
userTypesIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
628
336
|
/**
|
|
629
|
-
*
|
|
337
|
+
* Set of User IDs to exclude
|
|
630
338
|
*/
|
|
631
339
|
usersExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
632
340
|
/**
|
|
633
|
-
*
|
|
341
|
+
* Set of User IDs to include
|
|
634
342
|
*/
|
|
635
343
|
usersIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
|
|
636
344
|
}
|