@pulumi/okta 4.9.0-alpha.1718344922 → 4.9.0-alpha.1718755579

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (405) hide show
  1. package/adminRoleCustom.d.ts +105 -107
  2. package/adminRoleCustom.js +3 -5
  3. package/adminRoleCustom.js.map +1 -1
  4. package/adminRoleCustomAssignments.d.ts +12 -18
  5. package/adminRoleCustomAssignments.js +3 -6
  6. package/adminRoleCustomAssignments.js.map +1 -1
  7. package/adminRoleTargets.d.ts +14 -16
  8. package/adminRoleTargets.js +0 -2
  9. package/adminRoleTargets.js.map +1 -1
  10. package/app/accessPolicyAssignment.d.ts +23 -2
  11. package/app/accessPolicyAssignment.js +23 -2
  12. package/app/accessPolicyAssignment.js.map +1 -1
  13. package/app/autoLogin.d.ts +63 -97
  14. package/app/autoLogin.js +3 -37
  15. package/app/autoLogin.js.map +1 -1
  16. package/app/basicAuth.d.ts +30 -33
  17. package/app/basicAuth.js +4 -7
  18. package/app/basicAuth.js.map +1 -1
  19. package/app/bookmark.d.ts +30 -33
  20. package/app/bookmark.js +3 -6
  21. package/app/bookmark.js.map +1 -1
  22. package/app/getApp.d.ts +58 -25
  23. package/app/getApp.js +2 -2
  24. package/app/getApp.js.map +1 -1
  25. package/app/getMetadataSaml.d.ts +11 -5
  26. package/app/getMetadataSaml.js +2 -2
  27. package/app/getMetadataSaml.js.map +1 -1
  28. package/app/getOauth.d.ts +62 -34
  29. package/app/getOauth.js +2 -2
  30. package/app/getOauth.js.map +1 -1
  31. package/app/getSaml.d.ts +75 -56
  32. package/app/getSaml.js +2 -2
  33. package/app/getSaml.js.map +1 -1
  34. package/app/groupAssignment.d.ts +23 -9
  35. package/app/groupAssignment.js +17 -3
  36. package/app/groupAssignment.js.map +1 -1
  37. package/app/oauth.d.ts +135 -273
  38. package/app/oauth.js +6 -60
  39. package/app/oauth.js.map +1 -1
  40. package/app/oauthPostLogoutRedirectUri.d.ts +4 -6
  41. package/app/oauthPostLogoutRedirectUri.js +1 -3
  42. package/app/oauthPostLogoutRedirectUri.js.map +1 -1
  43. package/app/oauthRedirectUri.d.ts +4 -6
  44. package/app/oauthRedirectUri.js +1 -3
  45. package/app/oauthRedirectUri.js.map +1 -1
  46. package/app/oauthRoleAssignment.d.ts +4 -29
  47. package/app/oauthRoleAssignment.js +4 -29
  48. package/app/oauthRoleAssignment.js.map +1 -1
  49. package/app/saml.d.ts +161 -289
  50. package/app/saml.js +6 -152
  51. package/app/saml.js.map +1 -1
  52. package/app/securePasswordStore.d.ts +79 -80
  53. package/app/securePasswordStore.js +6 -7
  54. package/app/securePasswordStore.js.map +1 -1
  55. package/app/swa.d.ts +70 -71
  56. package/app/swa.js +4 -5
  57. package/app/swa.js.map +1 -1
  58. package/app/threeField.d.ts +74 -76
  59. package/app/threeField.js +5 -7
  60. package/app/threeField.js.map +1 -1
  61. package/app/user.d.ts +12 -17
  62. package/app/user.js +0 -2
  63. package/app/user.js.map +1 -1
  64. package/appGroupAssignments.d.ts +6 -8
  65. package/appGroupAssignments.js +3 -5
  66. package/appGroupAssignments.js.map +1 -1
  67. package/appOauthApiScope.d.ts +5 -7
  68. package/appOauthApiScope.js +2 -4
  69. package/appOauthApiScope.js.map +1 -1
  70. package/appSamlAppSettings.d.ts +6 -7
  71. package/appSamlAppSettings.js +3 -4
  72. package/appSamlAppSettings.js.map +1 -1
  73. package/appSharedCredentials.d.ts +61 -63
  74. package/appSharedCredentials.js +4 -6
  75. package/appSharedCredentials.js.map +1 -1
  76. package/appSignonPolicy.d.ts +3 -39
  77. package/appSignonPolicy.js +3 -39
  78. package/appSignonPolicy.js.map +1 -1
  79. package/appSignonPolicyRule.d.ts +69 -361
  80. package/appSignonPolicyRule.js +1 -278
  81. package/appSignonPolicyRule.js.map +1 -1
  82. package/appUserBaseSchemaProperty.d.ts +25 -29
  83. package/appUserBaseSchemaProperty.js +1 -5
  84. package/appUserBaseSchemaProperty.js.map +1 -1
  85. package/appUserSchemaProperty.d.ts +51 -41
  86. package/appUserSchemaProperty.js +0 -2
  87. package/appUserSchemaProperty.js.map +1 -1
  88. package/auth/getServer.d.ts +11 -11
  89. package/auth/getServer.js +2 -2
  90. package/auth/getServerPolicy.d.ts +15 -9
  91. package/auth/getServerPolicy.js +2 -2
  92. package/auth/getServerPolicy.js.map +1 -1
  93. package/auth/getServerScopes.d.ts +8 -5
  94. package/auth/getServerScopes.js +2 -2
  95. package/auth/getServerScopes.js.map +1 -1
  96. package/auth/server.d.ts +15 -19
  97. package/auth/server.js +1 -5
  98. package/auth/server.js.map +1 -1
  99. package/auth/serverClaim.d.ts +13 -17
  100. package/auth/serverClaim.js +1 -5
  101. package/auth/serverClaim.js.map +1 -1
  102. package/auth/serverPolicy.d.ts +10 -14
  103. package/auth/serverPolicy.js +1 -5
  104. package/auth/serverPolicy.js.map +1 -1
  105. package/auth/serverPolicyClaim.d.ts +50 -66
  106. package/auth/serverPolicyClaim.js +0 -25
  107. package/auth/serverPolicyClaim.js.map +1 -1
  108. package/auth/serverPolicyRule.d.ts +32 -43
  109. package/auth/serverPolicyRule.js +0 -2
  110. package/auth/serverPolicyRule.js.map +1 -1
  111. package/auth/serverScope.d.ts +16 -20
  112. package/auth/serverScope.js +1 -5
  113. package/auth/serverScope.js.map +1 -1
  114. package/authServerClaimDefault.d.ts +10 -25
  115. package/authServerClaimDefault.js +0 -9
  116. package/authServerClaimDefault.js.map +1 -1
  117. package/authServerDefault.d.ts +15 -19
  118. package/authServerDefault.js +1 -5
  119. package/authServerDefault.js.map +1 -1
  120. package/authenticator.d.ts +53 -61
  121. package/authenticator.js +11 -11
  122. package/authenticator.js.map +1 -1
  123. package/behaviour.d.ts +21 -41
  124. package/behaviour.js +0 -2
  125. package/behaviour.js.map +1 -1
  126. package/brand.d.ts +23 -22
  127. package/brand.js +8 -4
  128. package/brand.js.map +1 -1
  129. package/captcha.d.ts +15 -17
  130. package/captcha.js +3 -5
  131. package/captcha.js.map +1 -1
  132. package/captchaOrgWideSettings.d.ts +8 -43
  133. package/captchaOrgWideSettings.js +2 -37
  134. package/captchaOrgWideSettings.js.map +1 -1
  135. package/domain.d.ts +13 -21
  136. package/domain.js +0 -2
  137. package/domain.js.map +1 -1
  138. package/domainCertificate.d.ts +17 -24
  139. package/domainCertificate.js +2 -9
  140. package/domainCertificate.js.map +1 -1
  141. package/domainVerification.d.ts +4 -10
  142. package/domainVerification.js +1 -7
  143. package/domainVerification.js.map +1 -1
  144. package/emailCustomization.d.ts +38 -222
  145. package/emailCustomization.js +29 -33
  146. package/emailCustomization.js.map +1 -1
  147. package/emailDomain.d.ts +4 -8
  148. package/emailDomain.js +0 -4
  149. package/emailDomain.js.map +1 -1
  150. package/emailDomainVerification.d.ts +3 -7
  151. package/emailDomainVerification.js +0 -4
  152. package/emailDomainVerification.js.map +1 -1
  153. package/emailSender.d.ts +15 -17
  154. package/emailSender.js +2 -4
  155. package/emailSender.js.map +1 -1
  156. package/emailSenderVerification.d.ts +5 -9
  157. package/emailSenderVerification.js +2 -6
  158. package/emailSenderVerification.js.map +1 -1
  159. package/eventHook.d.ts +16 -11
  160. package/eventHook.js +1 -5
  161. package/eventHook.js.map +1 -1
  162. package/eventHookVerification.d.ts +4 -10
  163. package/eventHookVerification.js +1 -7
  164. package/eventHookVerification.js.map +1 -1
  165. package/factor/factor.d.ts +4 -9
  166. package/factor/factor.js +1 -3
  167. package/factor/factor.js.map +1 -1
  168. package/factorTotp.d.ts +12 -21
  169. package/factorTotp.js +3 -3
  170. package/factorTotp.js.map +1 -1
  171. package/getAppGroupAssignments.d.ts +6 -6
  172. package/getAppGroupAssignments.js +2 -2
  173. package/getAppSignonPolicy.d.ts +16 -6
  174. package/getAppSignonPolicy.js +8 -4
  175. package/getAppSignonPolicy.js.map +1 -1
  176. package/getAppUserAssignments.d.ts +6 -6
  177. package/getAppUserAssignments.js +2 -2
  178. package/getAuthServerClaim.d.ts +15 -12
  179. package/getAuthServerClaim.js +2 -2
  180. package/getAuthServerClaim.js.map +1 -1
  181. package/getAuthServerClaims.d.ts +8 -5
  182. package/getAuthServerClaims.js +2 -2
  183. package/getAuthServerClaims.js.map +1 -1
  184. package/getAuthenticator.d.ts +24 -26
  185. package/getAuthenticator.js +14 -22
  186. package/getAuthenticator.js.map +1 -1
  187. package/getBehaviour.d.ts +6 -8
  188. package/getBehaviour.js +2 -2
  189. package/getBehaviour.js.map +1 -1
  190. package/getBehaviours.d.ts +7 -7
  191. package/getBehaviours.js +2 -2
  192. package/getBrand.d.ts +9 -6
  193. package/getBrand.js +2 -2
  194. package/getBrand.js.map +1 -1
  195. package/getBrands.d.ts +2 -2
  196. package/getBrands.js +2 -2
  197. package/getDomain.d.ts +11 -14
  198. package/getDomain.js +2 -8
  199. package/getDomain.js.map +1 -1
  200. package/getEmailCustomization.d.ts +14 -9
  201. package/getEmailCustomization.js +2 -6
  202. package/getEmailCustomization.js.map +1 -1
  203. package/getEmailCustomizations.d.ts +11 -9
  204. package/getEmailCustomizations.js +2 -6
  205. package/getEmailCustomizations.js.map +1 -1
  206. package/getGroups.d.ts +11 -25
  207. package/getGroups.js +2 -2
  208. package/getGroups.js.map +1 -1
  209. package/getLogStream.d.ts +8 -39
  210. package/getLogStream.js +2 -24
  211. package/getLogStream.js.map +1 -1
  212. package/getNetworkZone.d.ts +12 -12
  213. package/getNetworkZone.js +2 -2
  214. package/getOrgMetadata.d.ts +0 -22
  215. package/getOrgMetadata.js +0 -22
  216. package/getOrgMetadata.js.map +1 -1
  217. package/getRoleSubscription.d.ts +13 -35
  218. package/getRoleSubscription.js +2 -2
  219. package/getRoleSubscription.js.map +1 -1
  220. package/getTemplate.d.ts +10 -8
  221. package/getTemplate.js +2 -6
  222. package/getTemplate.js.map +1 -1
  223. package/getTemplates.d.ts +6 -7
  224. package/getTemplates.js +2 -6
  225. package/getTemplates.js.map +1 -1
  226. package/getTheme.d.ts +14 -12
  227. package/getTheme.js +2 -6
  228. package/getTheme.js.map +1 -1
  229. package/getThemes.d.ts +6 -7
  230. package/getThemes.js +2 -6
  231. package/getThemes.js.map +1 -1
  232. package/getTrustedOrigins.d.ts +7 -4
  233. package/getTrustedOrigins.js +2 -2
  234. package/getTrustedOrigins.js.map +1 -1
  235. package/getUserSecurityQuestions.d.ts +4 -8
  236. package/getUserSecurityQuestions.js +0 -4
  237. package/getUserSecurityQuestions.js.map +1 -1
  238. package/group/getEveryoneGroup.d.ts +10 -5
  239. package/group/getEveryoneGroup.js +4 -2
  240. package/group/getEveryoneGroup.js.map +1 -1
  241. package/group/getGroup.d.ts +17 -26
  242. package/group/getGroup.js +2 -2
  243. package/group/getGroup.js.map +1 -1
  244. package/group/getRule.d.ts +9 -9
  245. package/group/getRule.js +2 -2
  246. package/group/group.d.ts +4 -36
  247. package/group/group.js +1 -33
  248. package/group/group.js.map +1 -1
  249. package/group/role.d.ts +37 -81
  250. package/group/role.js +1 -6
  251. package/group/role.js.map +1 -1
  252. package/group/rule.d.ts +12 -20
  253. package/group/rule.js +0 -2
  254. package/group/rule.js.map +1 -1
  255. package/groupMemberships.d.ts +8 -10
  256. package/groupMemberships.js +2 -4
  257. package/groupMemberships.js.map +1 -1
  258. package/groupSchemaProperty.d.ts +57 -59
  259. package/groupSchemaProperty.js +0 -2
  260. package/groupSchemaProperty.js.map +1 -1
  261. package/idp/getMetadataSaml.d.ts +9 -6
  262. package/idp/getMetadataSaml.js +2 -2
  263. package/idp/getMetadataSaml.js.map +1 -1
  264. package/idp/getOidc.d.ts +9 -9
  265. package/idp/getOidc.js +2 -2
  266. package/idp/getSaml.d.ts +16 -13
  267. package/idp/getSaml.js +2 -2
  268. package/idp/getSaml.js.map +1 -1
  269. package/idp/getSocial.d.ts +8 -2
  270. package/idp/getSocial.js +2 -2
  271. package/idp/getSocial.js.map +1 -1
  272. package/idp/oidc.d.ts +70 -62
  273. package/idp/oidc.js +3 -5
  274. package/idp/oidc.js.map +1 -1
  275. package/idp/saml.d.ts +64 -86
  276. package/idp/saml.js +1 -5
  277. package/idp/saml.js.map +1 -1
  278. package/idp/samlKey.d.ts +3 -5
  279. package/idp/samlKey.js +0 -2
  280. package/idp/samlKey.js.map +1 -1
  281. package/idp/social.d.ts +99 -69
  282. package/idp/social.js +11 -5
  283. package/idp/social.js.map +1 -1
  284. package/inline/hook.d.ts +4 -26
  285. package/inline/hook.js +1 -5
  286. package/inline/hook.js.map +1 -1
  287. package/linkDefinition.d.ts +2 -3
  288. package/linkDefinition.js +2 -3
  289. package/linkDefinition.js.map +1 -1
  290. package/linkValue.d.ts +7 -9
  291. package/linkValue.js +1 -3
  292. package/linkValue.js.map +1 -1
  293. package/logStream.d.ts +32 -27
  294. package/logStream.js +23 -9
  295. package/logStream.js.map +1 -1
  296. package/network/zone.d.ts +25 -66
  297. package/network/zone.js +1 -39
  298. package/network/zone.js.map +1 -1
  299. package/orgConfiguration.d.ts +4 -9
  300. package/orgConfiguration.js +1 -3
  301. package/orgConfiguration.js.map +1 -1
  302. package/orgSupport.d.ts +4 -7
  303. package/orgSupport.js +1 -4
  304. package/orgSupport.js.map +1 -1
  305. package/package.json +3 -3
  306. package/policy/getDefaultPolicy.d.ts +9 -7
  307. package/policy/getDefaultPolicy.js +6 -2
  308. package/policy/getDefaultPolicy.js.map +1 -1
  309. package/policy/getPolicy.d.ts +11 -26
  310. package/policy/getPolicy.js +2 -2
  311. package/policy/getPolicy.js.map +1 -1
  312. package/policy/mfa.d.ts +18 -220
  313. package/policy/mfa.js +0 -10
  314. package/policy/mfa.js.map +1 -1
  315. package/policy/password.d.ts +91 -95
  316. package/policy/password.js +1 -5
  317. package/policy/password.js.map +1 -1
  318. package/policy/ruleIdpDiscovery.d.ts +111 -93
  319. package/policy/ruleIdpDiscovery.js +48 -57
  320. package/policy/ruleIdpDiscovery.js.map +1 -1
  321. package/policy/ruleMfa.d.ts +40 -30
  322. package/policy/ruleMfa.js +1 -3
  323. package/policy/ruleMfa.js.map +1 -1
  324. package/policy/rulePassword.d.ts +34 -38
  325. package/policy/rulePassword.js +1 -5
  326. package/policy/rulePassword.js.map +1 -1
  327. package/policy/ruleSignon.d.ts +94 -85
  328. package/policy/ruleSignon.js +1 -4
  329. package/policy/ruleSignon.js.map +1 -1
  330. package/policy/signon.d.ts +16 -20
  331. package/policy/signon.js +1 -5
  332. package/policy/signon.js.map +1 -1
  333. package/policyMfaDefault.d.ts +15 -214
  334. package/policyMfaDefault.js +2 -9
  335. package/policyMfaDefault.js.map +1 -1
  336. package/policyPasswordDefault.d.ts +85 -101
  337. package/policyPasswordDefault.js +1 -5
  338. package/policyPasswordDefault.js.map +1 -1
  339. package/policyProfileEnrollment.d.ts +8 -9
  340. package/policyProfileEnrollment.js +2 -3
  341. package/policyProfileEnrollment.js.map +1 -1
  342. package/policyProfileEnrollmentApps.d.ts +8 -11
  343. package/policyProfileEnrollmentApps.js +3 -6
  344. package/policyProfileEnrollmentApps.js.map +1 -1
  345. package/policyRuleProfileEnrollment.d.ts +42 -31
  346. package/policyRuleProfileEnrollment.js +2 -3
  347. package/policyRuleProfileEnrollment.js.map +1 -1
  348. package/profile/mapping.d.ts +19 -34
  349. package/profile/mapping.js +4 -4
  350. package/profile/mapping.js.map +1 -1
  351. package/rateLimiting.d.ts +8 -17
  352. package/rateLimiting.js +2 -5
  353. package/rateLimiting.js.map +1 -1
  354. package/resourceSet.d.ts +18 -26
  355. package/resourceSet.js +9 -14
  356. package/resourceSet.js.map +1 -1
  357. package/roleSubscription.d.ts +35 -86
  358. package/roleSubscription.js +2 -2
  359. package/roleSubscription.js.map +1 -1
  360. package/securityNotificationEmails.d.ts +4 -7
  361. package/securityNotificationEmails.js +4 -7
  362. package/securityNotificationEmails.js.map +1 -1
  363. package/templateSms.d.ts +4 -8
  364. package/templateSms.js +1 -5
  365. package/templateSms.js.map +1 -1
  366. package/theme.d.ts +46 -46
  367. package/theme.js +2 -2
  368. package/threatInsightSettings.d.ts +7 -27
  369. package/threatInsightSettings.js +1 -3
  370. package/threatInsightSettings.js.map +1 -1
  371. package/trustedorigin/origin.d.ts +13 -17
  372. package/trustedorigin/origin.js +1 -5
  373. package/trustedorigin/origin.js.map +1 -1
  374. package/types/input.d.ts +65 -162
  375. package/types/output.d.ts +75 -275
  376. package/user/getUser.d.ts +32 -104
  377. package/user/getUser.js +2 -2
  378. package/user/getUser.js.map +1 -1
  379. package/user/getUserProfileMappingSource.d.ts +9 -7
  380. package/user/getUserProfileMappingSource.js +6 -4
  381. package/user/getUserProfileMappingSource.js.map +1 -1
  382. package/user/getUserType.d.ts +7 -7
  383. package/user/getUserType.js +2 -2
  384. package/user/getUsers.d.ts +95 -37
  385. package/user/getUsers.js +64 -24
  386. package/user/getUsers.js.map +1 -1
  387. package/user/user.d.ts +160 -209
  388. package/user/user.js +43 -65
  389. package/user/user.js.map +1 -1
  390. package/user/userType.d.ts +1 -5
  391. package/user/userType.js +1 -5
  392. package/user/userType.js.map +1 -1
  393. package/userAdminRoles.d.ts +10 -17
  394. package/userAdminRoles.js +1 -5
  395. package/userAdminRoles.js.map +1 -1
  396. package/userBaseSchemaProperty.d.ts +26 -34
  397. package/userBaseSchemaProperty.js +2 -10
  398. package/userBaseSchemaProperty.js.map +1 -1
  399. package/userFactorQuestion.d.ts +1 -5
  400. package/userFactorQuestion.js +1 -5
  401. package/userFactorQuestion.js.map +1 -1
  402. package/userGroupMemberships.d.ts +3 -3
  403. package/userSchemaProperty.d.ts +57 -56
  404. package/userSchemaProperty.js +0 -8
  405. package/userSchemaProperty.js.map +1 -1
@@ -2,287 +2,10 @@ import * as pulumi from "@pulumi/pulumi";
2
2
  import * as inputs from "./types/input";
3
3
  import * as outputs from "./types/output";
4
4
  /**
5
- * > **WARNING:** This feature is only available as a part of the Identity Engine. Contact support for further information.
6
- *
7
- * This resource allows you to create and configure a sign-on policy rule for the application.
8
- *
9
- * A default or `Catch-all Rule` sign-on policy rule can be imported and managed as a custom rule.
10
- * The only difference is that these fields are immutable and can not be managed: `networkConnection`, `networkExcludes`,
11
- * `networkIncludes`, `platformInclude`, `customExpression`, `deviceIsRegistered`, `deviceIsManaged`, `usersExcluded`,
12
- * `usersIncluded`, `groupsExcluded`, `groupsIncluded`, `userTypesExcluded` and `userTypesIncluded`.
13
- *
14
- * ## Example Usage
15
- *
16
- * ### Simple usage
17
- *
18
- * ```typescript
19
- * import * as pulumi from "@pulumi/pulumi";
20
- * import * as okta from "@pulumi/okta";
21
- *
22
- * const testSaml = new okta.app.Saml("test", {
23
- * label: "My App",
24
- * ssoUrl: "https://google.com",
25
- * recipient: "https://here.com",
26
- * destination: "https://its-about-the-journey.com",
27
- * audience: "https://audience.com",
28
- * status: "ACTIVE",
29
- * subjectNameIdTemplate: "${user.userName}",
30
- * subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
31
- * signatureAlgorithm: "RSA_SHA256",
32
- * responseSigned: true,
33
- * digestAlgorithm: "SHA256",
34
- * honorForceAuthn: false,
35
- * authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
36
- * });
37
- * const test = okta.getAppSignonPolicyOutput({
38
- * appId: testSaml.id,
39
- * });
40
- * const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("test", {
41
- * policyId: test.apply(test => test.id),
42
- * name: "testAcc_replace_with_uuid",
43
- * });
44
- * ```
45
- *
46
- * This will create an app sign-on policy rule with the following `THEN` block:
47
- *
48
- * ### Rule with Constraints
49
- *
50
- * ### Example 1:
51
- *
52
- * ```typescript
53
- * import * as pulumi from "@pulumi/pulumi";
54
- * import * as okta from "@pulumi/okta";
55
- *
56
- * const test = new okta.AppSignonPolicyRule("test", {
57
- * policyId: testOktaAppSignonPolicy.id,
58
- * name: "testAcc_replace_with_uuid",
59
- * constraints: [JSON.stringify({
60
- * knowledge: {
61
- * types: ["password"],
62
- * },
63
- * })],
64
- * });
65
- * ```
66
- *
67
- * This will create an app sign-on policy rule with the following `THEN` block:
68
- *
69
- * ### Example 2:
70
- *
71
- * ```typescript
72
- * import * as pulumi from "@pulumi/pulumi";
73
- * import * as okta from "@pulumi/okta";
74
- *
75
- * const test = new okta.AppSignonPolicyRule("test", {
76
- * policyId: testOktaAppSignonPolicy.id,
77
- * name: "testAcc_replace_with_uuid",
78
- * constraints: [JSON.stringify({
79
- * knowledge: {
80
- * reauthenticateIn: "PT2H",
81
- * types: ["password"],
82
- * },
83
- * possession: {
84
- * deviceBound: "REQUIRED",
85
- * hardwareProtection: "REQUIRED",
86
- * },
87
- * })],
88
- * });
89
- * ```
90
- *
91
- * This will create an app sign-on policy rule with the following `THEN` block:
92
- *
93
- * More examples can be
94
- * found [here](https://developer.okta.com/docs/reference/api/policy/#verification-method-json-examples).
95
- *
96
- * ### Complex example
97
- *
98
- * ```typescript
99
- * import * as pulumi from "@pulumi/pulumi";
100
- * import * as okta from "@pulumi/okta";
101
- *
102
- * const testSaml = new okta.app.Saml("test", {
103
- * label: "testAcc_replace_with_uuid",
104
- * ssoUrl: "https://google.com",
105
- * recipient: "https://here.com",
106
- * destination: "https://its-about-the-journey.com",
107
- * audience: "https://audience.com",
108
- * subjectNameIdTemplate: "${user.userName}",
109
- * subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
110
- * responseSigned: true,
111
- * signatureAlgorithm: "RSA_SHA256",
112
- * digestAlgorithm: "SHA256",
113
- * honorForceAuthn: false,
114
- * authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
115
- * singleLogoutIssuer: "https://dunshire.okta.com",
116
- * singleLogoutUrl: "https://dunshire.okta.com/logout",
117
- * singleLogoutCertificate: `MIIFnDCCA4QCCQDBSLbiON2T1zANBgkqhkiG9w0BAQsFADCBjzELMAkGA1UEBhMCVVMxDjAMBgNV\x0d
118
- * BAgMBU1haW5lMRAwDgYDVQQHDAdDYXJpYm91MRcwFQYDVQQKDA5Tbm93bWFrZXJzIEluYzEUMBIG\x0d
119
- * A1UECwwLRW5naW5lZXJpbmcxDTALBgNVBAMMBFNub3cxIDAeBgkqhkiG9w0BCQEWEWVtYWlsQGV4\x0d
120
- * YW1wbGUuY29tMB4XDTIwMTIwMzIyNDY0M1oXDTMwMTIwMTIyNDY0M1owgY8xCzAJBgNVBAYTAlVT\x0d
121
- * MQ4wDAYDVQQIDAVNYWluZTEQMA4GA1UEBwwHQ2FyaWJvdTEXMBUGA1UECgwOU25vd21ha2VycyBJ\x0d
122
- * bmMxFDASBgNVBAsMC0VuZ2luZWVyaW5nMQ0wCwYDVQQDDARTbm93MSAwHgYJKoZIhvcNAQkBFhFl\x0d
123
- * bWFpbEBleGFtcGxlLmNvbTCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBANMmWDjXPdoa\x0d
124
- * PyzIENqeY9njLan2FqCbQPSestWUUcb6NhDsJVGSQ7XR+ozQA5TaJzbP7cAJUj8vCcbqMZsgOQAu\x0d
125
- * O/pzYyQEKptLmrGvPn7xkJ1A1xLkp2NY18cpDTeUPueJUoidZ9EJwEuyUZIktzxNNU1pA1lGijiu\x0d
126
- * 2XNxs9d9JR/hm3tCu9Im8qLVB4JtX80YUa6QtlRjWR/H8a373AYCOASdoB3c57fIPD8ATDNy2w/c\x0d
127
- * fCVGiyKDMFB+GA/WTsZpOP3iohRp8ltAncSuzypcztb2iE+jijtTsiC9kUA2abAJqqpoCJubNShi\x0d
128
- * Vff4822czpziS44MV2guC9wANi8u3Uyl5MKsU95j01jzadKRP5S+2f0K+n8n4UoV9fnqZFyuGAKd\x0d
129
- * CJi9K6NlSAP+TgPe/JP9FOSuxQOHWJfmdLHdJD+evoKi9E55sr5lRFK0xU1Fj5Ld7zjC0pXPhtJf\x0d
130
- * sgjEZzD433AsHnRzvRT1KSNCPkLYomznZo5n9rWYgCQ8HcytlQDTesmKE+s05E/VSWNtH84XdDrt\x0d
131
- * ieXwfwhHfaABSu+WjZYxi9CXdFCSvXhsgufUcK4FbYAHl/ga/cJxZc52yFC7Pcq0u9O2BSCjYPdQ\x0d
132
- * DAHs9dhT1RhwVLM8RmoAzgxyyzau0gxnAlgSBD9FMW6dXqIHIp8yAAg9cRXhYRTNAgMBAAEwDQYJ\x0d
133
- * KoZIhvcNAQELBQADggIBADofEC1SvG8qa7pmKCjB/E9Sxhk3mvUO9Gq43xzwVb721Ng3VYf4vGU3\x0d
134
- * wLUwJeLt0wggnj26NJweN5T3q9T8UMxZhHSWvttEU3+S1nArRB0beti716HSlOCDx4wTmBu/D1MG\x0d
135
- * t/kZYFJw+zuzvAcbYct2pK69AQhD8xAIbQvqADJI7cCK3yRry+aWtppc58P81KYabUlCfFXfhJ9E\x0d
136
- * P72ffN4jVHpX3lxxYh7FKAdiKbY2FYzjsc7RdgKI1R3iAAZUCGBTvezNzaetGzTUjjl/g1tcVYij\x0d
137
- * ltH9ZOQBPlUMI88lxUxqgRTerpPmAJH00CACx4JFiZrweLM1trZyy06wNDQgLrqHr3EOagBF/O2h\x0d
138
- * hfTehNdVr6iq3YhKWBo4/+RL0RCzHMh4u86VbDDnDn4Y6HzLuyIAtBFoikoKM6UHTOa0Pqv2bBr5\x0d
139
- * wbkRkVUxl9yJJw/HmTCdfnsM9dTOJUKzEglnGF2184Gg+qJDZB6fSf0EAO1F6sTqiSswl+uHQZiy\x0d
140
- * DaZzyU7Gg5seKOZ20zTRaX3Ihj9Zij/ORnrARE7eM/usKMECp+7syUwAUKxDCZkGiUdskmOhhBGL\x0d
141
- * JtbyK3F2UvoJoLsm3pIcvMak9KwMjSTGJB47ABUP1+w+zGcNk0D5Co3IJ6QekiLfWJyQ+kKsWLKt\x0d
142
- * zOYQQatrnBagM7MI2/T4\x0d
143
- * `,
144
- * attributeStatements: [{
145
- * type: "GROUP",
146
- * name: "groups",
147
- * filterType: "REGEX",
148
- * filterValue: ".*",
149
- * }],
150
- * });
151
- * const test = okta.getAppSignonPolicyOutput({
152
- * appId: testSaml.id,
153
- * });
154
- * const testUser: okta.user.User[] = [];
155
- * for (const range = {value: 0}; range.value < 5; range.value++) {
156
- * testUser.push(new okta.user.User(`test-${range.value}`, {
157
- * firstName: "TestAcc",
158
- * lastName: "Smith",
159
- * login: `testAcc_${range.value}@example.com`,
160
- * email: `testAcc_${range.value}@example.com`,
161
- * }));
162
- * }
163
- * const _this: okta.group.Group[] = [];
164
- * for (const range = {value: 0}; range.value < 5; range.value++) {
165
- * _this.push(new okta.group.Group(`this-${range.value}`, {
166
- * name: `testAcc_${range.value}`,
167
- * description: `testAcc_${range.value}`,
168
- * }));
169
- * }
170
- * const testUserType = new okta.user.UserType("test", {
171
- * name: "testAcc_replace_with_uuid",
172
- * displayName: "Terraform Acceptance Test User Type Updated",
173
- * description: "Terraform Acceptance Test User Type Updated",
174
- * });
175
- * const testZone = new okta.network.Zone("test", {
176
- * name: "testAcc_replace_with_uuid",
177
- * type: "IP",
178
- * gateways: [
179
- * "1.2.3.4/24",
180
- * "2.3.4.5-2.3.4.15",
181
- * ],
182
- * proxies: [
183
- * "2.2.3.4/24",
184
- * "3.3.4.5-3.3.4.15",
185
- * ],
186
- * });
187
- * const default = okta.user.getUserType({
188
- * name: "user",
189
- * });
190
- * const testDeviceAssuranceAndroid = new okta.policy.DeviceAssuranceAndroid("test", {
191
- * name: "test",
192
- * osVersion: "12",
193
- * jailbreak: false,
194
- * });
195
- * const testAppSignonPolicyRule = new okta.AppSignonPolicyRule("test", {
196
- * name: "testAcc_replace_with_uuid",
197
- * policyId: test.apply(test => test.id),
198
- * access: "ALLOW",
199
- * customExpression: "user.status == \"ACTIVE\"",
200
- * deviceIsManaged: false,
201
- * deviceIsRegistered: true,
202
- * factorMode: "2FA",
203
- * groupsExcludeds: [
204
- * _this[2].id,
205
- * _this[3].id,
206
- * _this[4].id,
207
- * ],
208
- * groupsIncludeds: [
209
- * _this[0].id,
210
- * _this[1].id,
211
- * ],
212
- * deviceAssurancesIncludeds: [testDeviceAssuranceAndroid.id],
213
- * networkConnection: "ZONE",
214
- * networkIncludes: [testZone.id],
215
- * platformIncludes: [
216
- * {
217
- * osType: "ANDROID",
218
- * type: "MOBILE",
219
- * },
220
- * {
221
- * osType: "IOS",
222
- * type: "MOBILE",
223
- * },
224
- * {
225
- * osType: "MACOS",
226
- * type: "DESKTOP",
227
- * },
228
- * {
229
- * osType: "OTHER",
230
- * type: "DESKTOP",
231
- * },
232
- * {
233
- * osType: "OTHER",
234
- * type: "MOBILE",
235
- * },
236
- * {
237
- * osType: "WINDOWS",
238
- * type: "DESKTOP",
239
- * },
240
- * {
241
- * osType: "CHROMEOS",
242
- * type: "DESKTOP",
243
- * },
244
- * ],
245
- * priority: 98,
246
- * reAuthenticationFrequency: "PT43800H",
247
- * type: "ASSURANCE",
248
- * userTypesExcludeds: [testUserType.id],
249
- * userTypesIncludeds: [_default.then(_default => _default.id)],
250
- * usersExcludeds: [
251
- * testUser[2].id,
252
- * testUser[3].id,
253
- * testUser[4].id,
254
- * ],
255
- * usersIncludeds: [
256
- * testUser[0].id,
257
- * testUser[1].id,
258
- * ],
259
- * constraints: [
260
- * JSON.stringify({
261
- * knowledge: {
262
- * reauthenticateIn: "PT2H",
263
- * types: ["password"],
264
- * },
265
- * possession: {
266
- * deviceBound: "REQUIRED",
267
- * },
268
- * }),
269
- * JSON.stringify({
270
- * possession: {
271
- * deviceBound: "REQUIRED",
272
- * hardwareProtection: "REQUIRED",
273
- * userPresence: "OPTIONAL",
274
- * },
275
- * }),
276
- * ],
277
- * });
278
- * ```
279
- *
280
5
  * ## Import
281
6
  *
282
- * Okta app sign-on policy rule can be imported via the Okta ID.
283
- *
284
7
  * ```sh
285
- * $ pulumi import okta:index/appSignonPolicyRule:AppSignonPolicyRule example &#60;policy_id&#62;/&#60;rule_id&#62;
8
+ * $ pulumi import okta:index/appSignonPolicyRule:AppSignonPolicyRule example &#60;policy_id&#62;/&#60;rule_id&#62
286
9
  * ```
287
10
  */
288
11
  export declare class AppSignonPolicyRule extends pulumi.CustomResource {
@@ -302,69 +25,64 @@ export declare class AppSignonPolicyRule extends pulumi.CustomResource {
302
25
  */
303
26
  static isInstance(obj: any): obj is AppSignonPolicyRule;
304
27
  /**
305
- * Allow or deny access based on the rule conditions. It can be set to `"ALLOW"` or `"DENY"`. Default is `"ALLOW"`.
28
+ * Allow or deny access based on the rule conditions: ALLOW or DENY
306
29
  */
307
30
  readonly access: pulumi.Output<string | undefined>;
308
31
  /**
309
- * An array that contains nested Authenticator Constraint objects that are organized by the Authenticator class. Each element should be in JSON format.
32
+ * An array that contains nested Authenticator Constraint objects that are organized by the Authenticator class
310
33
  */
311
34
  readonly constraints: pulumi.Output<string[] | undefined>;
312
35
  /**
313
- * This is an advanced optional setting. If the expression is formatted incorrectly or conflicts with conditions set above, the rule may not match any users.
36
+ * This is an optional advanced setting. If the expression is formatted incorrectly or conflicts with conditions set above, the rule may not match any users.
314
37
  */
315
38
  readonly customExpression: pulumi.Output<string | undefined>;
316
39
  /**
317
- * List of device assurances IDs to be included.
40
+ * List of device assurance IDs to include
318
41
  */
319
42
  readonly deviceAssurancesIncludeds: pulumi.Output<string[] | undefined>;
320
43
  /**
321
- * If the device is managed. A device is managed if it's managed by a device management
322
- * system. When managed is passed, `deviceIsRegistered` must also be included and must be set to `true`.
44
+ * If the device is managed. A device is managed if it's managed by a device management system. When managed is passed, registered must also be included and must be set to true.
323
45
  */
324
46
  readonly deviceIsManaged: pulumi.Output<boolean | undefined>;
325
47
  /**
326
- * If the device is registered. A device is registered if the User enrolls with Okta
327
- * Verify that is installed on the device. Can only be set to `true`.
48
+ * If the device is registered. A device is registered if the User enrolls with Okta Verify that is installed on the device.
328
49
  */
329
50
  readonly deviceIsRegistered: pulumi.Output<boolean | undefined>;
330
51
  /**
331
- * The number of factors required to satisfy this assurance level. It can be set to `"1FA"` or `"2FA"`. Default is `"2FA"`.
52
+ * The number of factors required to satisfy this assurance level
332
53
  */
333
54
  readonly factorMode: pulumi.Output<string | undefined>;
334
55
  /**
335
- * List of groups IDs to be excluded.
56
+ * List of group IDs to exclude
336
57
  */
337
58
  readonly groupsExcludeds: pulumi.Output<string[] | undefined>;
338
59
  /**
339
- * List of groups IDs to be included.
60
+ * List of group IDs to include
340
61
  */
341
62
  readonly groupsIncludeds: pulumi.Output<string[] | undefined>;
342
63
  /**
343
- * The inactivity duration after which the end user must re-authenticate. Use the ISO 8601 Period format for recurring time intervals. Default is `"PT1H"`.
64
+ * The inactivity duration after which the end user must re-authenticate. Use the ISO 8601 Period format for recurring time intervals.
344
65
  */
345
66
  readonly inactivityPeriod: pulumi.Output<string | undefined>;
346
67
  /**
347
- * Name of the policy rule.
68
+ * Policy Rule Name
348
69
  */
349
70
  readonly name: pulumi.Output<string>;
350
71
  /**
351
- * Network selection mode: `"ANYWHERE"`, `"ZONE"`, `"ON_NETWORK"`, or `"OFF_NETWORK"`.
72
+ * Network selection mode: ANYWHERE, ZONE, ON*NETWORK, or OFF*NETWORK.
352
73
  */
353
74
  readonly networkConnection: pulumi.Output<string | undefined>;
354
75
  /**
355
- * List of network zones IDs to exclude. Conflicts with `networkIncludes`.
76
+ * The zones to exclude
356
77
  */
357
78
  readonly networkExcludes: pulumi.Output<string[] | undefined>;
358
79
  /**
359
- * List of network zones IDs to include. Conflicts with `networkExcludes`.
80
+ * The zones to include
360
81
  */
361
82
  readonly networkIncludes: pulumi.Output<string[] | undefined>;
362
- /**
363
- * List of particular platforms or devices to match on.
364
- */
365
83
  readonly platformIncludes: pulumi.Output<outputs.AppSignonPolicyRulePlatformInclude[] | undefined>;
366
84
  /**
367
- * ID of the app sign-on policy.
85
+ * ID of the policy
368
86
  */
369
87
  readonly policyId: pulumi.Output<string>;
370
88
  /**
@@ -372,11 +90,11 @@ export declare class AppSignonPolicyRule extends pulumi.CustomResource {
372
90
  */
373
91
  readonly priority: pulumi.Output<number | undefined>;
374
92
  /**
375
- * The duration after which the end user must re-authenticate, regardless of user activity. Use the ISO 8601 Period format for recurring time intervals. `"PT0S"` - every sign-in attempt, `"PT43800H"` - once per session. Default is `"PT2H"`.
93
+ * The duration after which the end user must re-authenticate, regardless of user activity. Use the ISO 8601 Period format for recurring time intervals. PT0S - Every sign-in attempt, PT43800H - Once per session
376
94
  */
377
95
  readonly reAuthenticationFrequency: pulumi.Output<string | undefined>;
378
96
  /**
379
- * The risk score specifies a particular level of risk to match on. Valid values are: `"ANY"`, `"LOW"`, `"MEDIUM"`, `"HIGH"`. Default is `"ANY"`.
97
+ * The risk score specifies a particular level of risk to match on: ANY, LOW, MEDIUM, HIGH
380
98
  */
381
99
  readonly riskScore: pulumi.Output<string>;
382
100
  /**
@@ -384,27 +102,27 @@ export declare class AppSignonPolicyRule extends pulumi.CustomResource {
384
102
  */
385
103
  readonly status: pulumi.Output<string | undefined>;
386
104
  /**
387
- * Often the "Catch-all Rule" this rule is the system (default) rule for its associated policy.
105
+ * Often the `Catch-all Rule` this rule is the system (default) rule for its associated policy
388
106
  */
389
107
  readonly system: pulumi.Output<boolean>;
390
108
  /**
391
- * The Verification Method type. It can be set to `"ASSURANCE"`. Default is `"ASSURANCE"`.
109
+ * The Verification Method type
392
110
  */
393
111
  readonly type: pulumi.Output<string | undefined>;
394
112
  /**
395
- * List of user types IDs to be excluded.
113
+ * Set of User Type IDs to exclude
396
114
  */
397
115
  readonly userTypesExcludeds: pulumi.Output<string[] | undefined>;
398
116
  /**
399
- * List of user types IDs to be included.
117
+ * Set of User Type IDs to include
400
118
  */
401
119
  readonly userTypesIncludeds: pulumi.Output<string[] | undefined>;
402
120
  /**
403
- * List of users IDs to be excluded.
121
+ * Set of User IDs to exclude
404
122
  */
405
123
  readonly usersExcludeds: pulumi.Output<string[] | undefined>;
406
124
  /**
407
- * List of users IDs to be included.
125
+ * Set of User IDs to include
408
126
  */
409
127
  readonly usersIncludeds: pulumi.Output<string[] | undefined>;
410
128
  /**
@@ -421,69 +139,64 @@ export declare class AppSignonPolicyRule extends pulumi.CustomResource {
421
139
  */
422
140
  export interface AppSignonPolicyRuleState {
423
141
  /**
424
- * Allow or deny access based on the rule conditions. It can be set to `"ALLOW"` or `"DENY"`. Default is `"ALLOW"`.
142
+ * Allow or deny access based on the rule conditions: ALLOW or DENY
425
143
  */
426
144
  access?: pulumi.Input<string>;
427
145
  /**
428
- * An array that contains nested Authenticator Constraint objects that are organized by the Authenticator class. Each element should be in JSON format.
146
+ * An array that contains nested Authenticator Constraint objects that are organized by the Authenticator class
429
147
  */
430
148
  constraints?: pulumi.Input<pulumi.Input<string>[]>;
431
149
  /**
432
- * This is an advanced optional setting. If the expression is formatted incorrectly or conflicts with conditions set above, the rule may not match any users.
150
+ * This is an optional advanced setting. If the expression is formatted incorrectly or conflicts with conditions set above, the rule may not match any users.
433
151
  */
434
152
  customExpression?: pulumi.Input<string>;
435
153
  /**
436
- * List of device assurances IDs to be included.
154
+ * List of device assurance IDs to include
437
155
  */
438
156
  deviceAssurancesIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
439
157
  /**
440
- * If the device is managed. A device is managed if it's managed by a device management
441
- * system. When managed is passed, `deviceIsRegistered` must also be included and must be set to `true`.
158
+ * If the device is managed. A device is managed if it's managed by a device management system. When managed is passed, registered must also be included and must be set to true.
442
159
  */
443
160
  deviceIsManaged?: pulumi.Input<boolean>;
444
161
  /**
445
- * If the device is registered. A device is registered if the User enrolls with Okta
446
- * Verify that is installed on the device. Can only be set to `true`.
162
+ * If the device is registered. A device is registered if the User enrolls with Okta Verify that is installed on the device.
447
163
  */
448
164
  deviceIsRegistered?: pulumi.Input<boolean>;
449
165
  /**
450
- * The number of factors required to satisfy this assurance level. It can be set to `"1FA"` or `"2FA"`. Default is `"2FA"`.
166
+ * The number of factors required to satisfy this assurance level
451
167
  */
452
168
  factorMode?: pulumi.Input<string>;
453
169
  /**
454
- * List of groups IDs to be excluded.
170
+ * List of group IDs to exclude
455
171
  */
456
172
  groupsExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
457
173
  /**
458
- * List of groups IDs to be included.
174
+ * List of group IDs to include
459
175
  */
460
176
  groupsIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
461
177
  /**
462
- * The inactivity duration after which the end user must re-authenticate. Use the ISO 8601 Period format for recurring time intervals. Default is `"PT1H"`.
178
+ * The inactivity duration after which the end user must re-authenticate. Use the ISO 8601 Period format for recurring time intervals.
463
179
  */
464
180
  inactivityPeriod?: pulumi.Input<string>;
465
181
  /**
466
- * Name of the policy rule.
182
+ * Policy Rule Name
467
183
  */
468
184
  name?: pulumi.Input<string>;
469
185
  /**
470
- * Network selection mode: `"ANYWHERE"`, `"ZONE"`, `"ON_NETWORK"`, or `"OFF_NETWORK"`.
186
+ * Network selection mode: ANYWHERE, ZONE, ON*NETWORK, or OFF*NETWORK.
471
187
  */
472
188
  networkConnection?: pulumi.Input<string>;
473
189
  /**
474
- * List of network zones IDs to exclude. Conflicts with `networkIncludes`.
190
+ * The zones to exclude
475
191
  */
476
192
  networkExcludes?: pulumi.Input<pulumi.Input<string>[]>;
477
193
  /**
478
- * List of network zones IDs to include. Conflicts with `networkExcludes`.
194
+ * The zones to include
479
195
  */
480
196
  networkIncludes?: pulumi.Input<pulumi.Input<string>[]>;
481
- /**
482
- * List of particular platforms or devices to match on.
483
- */
484
197
  platformIncludes?: pulumi.Input<pulumi.Input<inputs.AppSignonPolicyRulePlatformInclude>[]>;
485
198
  /**
486
- * ID of the app sign-on policy.
199
+ * ID of the policy
487
200
  */
488
201
  policyId?: pulumi.Input<string>;
489
202
  /**
@@ -491,11 +204,11 @@ export interface AppSignonPolicyRuleState {
491
204
  */
492
205
  priority?: pulumi.Input<number>;
493
206
  /**
494
- * The duration after which the end user must re-authenticate, regardless of user activity. Use the ISO 8601 Period format for recurring time intervals. `"PT0S"` - every sign-in attempt, `"PT43800H"` - once per session. Default is `"PT2H"`.
207
+ * The duration after which the end user must re-authenticate, regardless of user activity. Use the ISO 8601 Period format for recurring time intervals. PT0S - Every sign-in attempt, PT43800H - Once per session
495
208
  */
496
209
  reAuthenticationFrequency?: pulumi.Input<string>;
497
210
  /**
498
- * The risk score specifies a particular level of risk to match on. Valid values are: `"ANY"`, `"LOW"`, `"MEDIUM"`, `"HIGH"`. Default is `"ANY"`.
211
+ * The risk score specifies a particular level of risk to match on: ANY, LOW, MEDIUM, HIGH
499
212
  */
500
213
  riskScore?: pulumi.Input<string>;
501
214
  /**
@@ -503,27 +216,27 @@ export interface AppSignonPolicyRuleState {
503
216
  */
504
217
  status?: pulumi.Input<string>;
505
218
  /**
506
- * Often the "Catch-all Rule" this rule is the system (default) rule for its associated policy.
219
+ * Often the `Catch-all Rule` this rule is the system (default) rule for its associated policy
507
220
  */
508
221
  system?: pulumi.Input<boolean>;
509
222
  /**
510
- * The Verification Method type. It can be set to `"ASSURANCE"`. Default is `"ASSURANCE"`.
223
+ * The Verification Method type
511
224
  */
512
225
  type?: pulumi.Input<string>;
513
226
  /**
514
- * List of user types IDs to be excluded.
227
+ * Set of User Type IDs to exclude
515
228
  */
516
229
  userTypesExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
517
230
  /**
518
- * List of user types IDs to be included.
231
+ * Set of User Type IDs to include
519
232
  */
520
233
  userTypesIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
521
234
  /**
522
- * List of users IDs to be excluded.
235
+ * Set of User IDs to exclude
523
236
  */
524
237
  usersExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
525
238
  /**
526
- * List of users IDs to be included.
239
+ * Set of User IDs to include
527
240
  */
528
241
  usersIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
529
242
  }
@@ -532,69 +245,64 @@ export interface AppSignonPolicyRuleState {
532
245
  */
533
246
  export interface AppSignonPolicyRuleArgs {
534
247
  /**
535
- * Allow or deny access based on the rule conditions. It can be set to `"ALLOW"` or `"DENY"`. Default is `"ALLOW"`.
248
+ * Allow or deny access based on the rule conditions: ALLOW or DENY
536
249
  */
537
250
  access?: pulumi.Input<string>;
538
251
  /**
539
- * An array that contains nested Authenticator Constraint objects that are organized by the Authenticator class. Each element should be in JSON format.
252
+ * An array that contains nested Authenticator Constraint objects that are organized by the Authenticator class
540
253
  */
541
254
  constraints?: pulumi.Input<pulumi.Input<string>[]>;
542
255
  /**
543
- * This is an advanced optional setting. If the expression is formatted incorrectly or conflicts with conditions set above, the rule may not match any users.
256
+ * This is an optional advanced setting. If the expression is formatted incorrectly or conflicts with conditions set above, the rule may not match any users.
544
257
  */
545
258
  customExpression?: pulumi.Input<string>;
546
259
  /**
547
- * List of device assurances IDs to be included.
260
+ * List of device assurance IDs to include
548
261
  */
549
262
  deviceAssurancesIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
550
263
  /**
551
- * If the device is managed. A device is managed if it's managed by a device management
552
- * system. When managed is passed, `deviceIsRegistered` must also be included and must be set to `true`.
264
+ * If the device is managed. A device is managed if it's managed by a device management system. When managed is passed, registered must also be included and must be set to true.
553
265
  */
554
266
  deviceIsManaged?: pulumi.Input<boolean>;
555
267
  /**
556
- * If the device is registered. A device is registered if the User enrolls with Okta
557
- * Verify that is installed on the device. Can only be set to `true`.
268
+ * If the device is registered. A device is registered if the User enrolls with Okta Verify that is installed on the device.
558
269
  */
559
270
  deviceIsRegistered?: pulumi.Input<boolean>;
560
271
  /**
561
- * The number of factors required to satisfy this assurance level. It can be set to `"1FA"` or `"2FA"`. Default is `"2FA"`.
272
+ * The number of factors required to satisfy this assurance level
562
273
  */
563
274
  factorMode?: pulumi.Input<string>;
564
275
  /**
565
- * List of groups IDs to be excluded.
276
+ * List of group IDs to exclude
566
277
  */
567
278
  groupsExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
568
279
  /**
569
- * List of groups IDs to be included.
280
+ * List of group IDs to include
570
281
  */
571
282
  groupsIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
572
283
  /**
573
- * The inactivity duration after which the end user must re-authenticate. Use the ISO 8601 Period format for recurring time intervals. Default is `"PT1H"`.
284
+ * The inactivity duration after which the end user must re-authenticate. Use the ISO 8601 Period format for recurring time intervals.
574
285
  */
575
286
  inactivityPeriod?: pulumi.Input<string>;
576
287
  /**
577
- * Name of the policy rule.
288
+ * Policy Rule Name
578
289
  */
579
290
  name?: pulumi.Input<string>;
580
291
  /**
581
- * Network selection mode: `"ANYWHERE"`, `"ZONE"`, `"ON_NETWORK"`, or `"OFF_NETWORK"`.
292
+ * Network selection mode: ANYWHERE, ZONE, ON*NETWORK, or OFF*NETWORK.
582
293
  */
583
294
  networkConnection?: pulumi.Input<string>;
584
295
  /**
585
- * List of network zones IDs to exclude. Conflicts with `networkIncludes`.
296
+ * The zones to exclude
586
297
  */
587
298
  networkExcludes?: pulumi.Input<pulumi.Input<string>[]>;
588
299
  /**
589
- * List of network zones IDs to include. Conflicts with `networkExcludes`.
300
+ * The zones to include
590
301
  */
591
302
  networkIncludes?: pulumi.Input<pulumi.Input<string>[]>;
592
- /**
593
- * List of particular platforms or devices to match on.
594
- */
595
303
  platformIncludes?: pulumi.Input<pulumi.Input<inputs.AppSignonPolicyRulePlatformInclude>[]>;
596
304
  /**
597
- * ID of the app sign-on policy.
305
+ * ID of the policy
598
306
  */
599
307
  policyId: pulumi.Input<string>;
600
308
  /**
@@ -602,11 +310,11 @@ export interface AppSignonPolicyRuleArgs {
602
310
  */
603
311
  priority?: pulumi.Input<number>;
604
312
  /**
605
- * The duration after which the end user must re-authenticate, regardless of user activity. Use the ISO 8601 Period format for recurring time intervals. `"PT0S"` - every sign-in attempt, `"PT43800H"` - once per session. Default is `"PT2H"`.
313
+ * The duration after which the end user must re-authenticate, regardless of user activity. Use the ISO 8601 Period format for recurring time intervals. PT0S - Every sign-in attempt, PT43800H - Once per session
606
314
  */
607
315
  reAuthenticationFrequency?: pulumi.Input<string>;
608
316
  /**
609
- * The risk score specifies a particular level of risk to match on. Valid values are: `"ANY"`, `"LOW"`, `"MEDIUM"`, `"HIGH"`. Default is `"ANY"`.
317
+ * The risk score specifies a particular level of risk to match on: ANY, LOW, MEDIUM, HIGH
610
318
  */
611
319
  riskScore?: pulumi.Input<string>;
612
320
  /**
@@ -614,23 +322,23 @@ export interface AppSignonPolicyRuleArgs {
614
322
  */
615
323
  status?: pulumi.Input<string>;
616
324
  /**
617
- * The Verification Method type. It can be set to `"ASSURANCE"`. Default is `"ASSURANCE"`.
325
+ * The Verification Method type
618
326
  */
619
327
  type?: pulumi.Input<string>;
620
328
  /**
621
- * List of user types IDs to be excluded.
329
+ * Set of User Type IDs to exclude
622
330
  */
623
331
  userTypesExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
624
332
  /**
625
- * List of user types IDs to be included.
333
+ * Set of User Type IDs to include
626
334
  */
627
335
  userTypesIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
628
336
  /**
629
- * List of users IDs to be excluded.
337
+ * Set of User IDs to exclude
630
338
  */
631
339
  usersExcludeds?: pulumi.Input<pulumi.Input<string>[]>;
632
340
  /**
633
- * List of users IDs to be included.
341
+ * Set of User IDs to include
634
342
  */
635
343
  usersIncludeds?: pulumi.Input<pulumi.Input<string>[]>;
636
344
  }