@pulumi/okta 4.9.0-alpha.1718344922 → 4.9.0-alpha.1718755579
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +105 -107
- package/adminRoleCustom.js +3 -5
- package/adminRoleCustom.js.map +1 -1
- package/adminRoleCustomAssignments.d.ts +12 -18
- package/adminRoleCustomAssignments.js +3 -6
- package/adminRoleCustomAssignments.js.map +1 -1
- package/adminRoleTargets.d.ts +14 -16
- package/adminRoleTargets.js +0 -2
- package/adminRoleTargets.js.map +1 -1
- package/app/accessPolicyAssignment.d.ts +23 -2
- package/app/accessPolicyAssignment.js +23 -2
- package/app/accessPolicyAssignment.js.map +1 -1
- package/app/autoLogin.d.ts +63 -97
- package/app/autoLogin.js +3 -37
- package/app/autoLogin.js.map +1 -1
- package/app/basicAuth.d.ts +30 -33
- package/app/basicAuth.js +4 -7
- package/app/basicAuth.js.map +1 -1
- package/app/bookmark.d.ts +30 -33
- package/app/bookmark.js +3 -6
- package/app/bookmark.js.map +1 -1
- package/app/getApp.d.ts +58 -25
- package/app/getApp.js +2 -2
- package/app/getApp.js.map +1 -1
- package/app/getMetadataSaml.d.ts +11 -5
- package/app/getMetadataSaml.js +2 -2
- package/app/getMetadataSaml.js.map +1 -1
- package/app/getOauth.d.ts +62 -34
- package/app/getOauth.js +2 -2
- package/app/getOauth.js.map +1 -1
- package/app/getSaml.d.ts +75 -56
- package/app/getSaml.js +2 -2
- package/app/getSaml.js.map +1 -1
- package/app/groupAssignment.d.ts +23 -9
- package/app/groupAssignment.js +17 -3
- package/app/groupAssignment.js.map +1 -1
- package/app/oauth.d.ts +135 -273
- package/app/oauth.js +6 -60
- package/app/oauth.js.map +1 -1
- package/app/oauthPostLogoutRedirectUri.d.ts +4 -6
- package/app/oauthPostLogoutRedirectUri.js +1 -3
- package/app/oauthPostLogoutRedirectUri.js.map +1 -1
- package/app/oauthRedirectUri.d.ts +4 -6
- package/app/oauthRedirectUri.js +1 -3
- package/app/oauthRedirectUri.js.map +1 -1
- package/app/oauthRoleAssignment.d.ts +4 -29
- package/app/oauthRoleAssignment.js +4 -29
- package/app/oauthRoleAssignment.js.map +1 -1
- package/app/saml.d.ts +161 -289
- package/app/saml.js +6 -152
- package/app/saml.js.map +1 -1
- package/app/securePasswordStore.d.ts +79 -80
- package/app/securePasswordStore.js +6 -7
- package/app/securePasswordStore.js.map +1 -1
- package/app/swa.d.ts +70 -71
- package/app/swa.js +4 -5
- package/app/swa.js.map +1 -1
- package/app/threeField.d.ts +74 -76
- package/app/threeField.js +5 -7
- package/app/threeField.js.map +1 -1
- package/app/user.d.ts +12 -17
- package/app/user.js +0 -2
- package/app/user.js.map +1 -1
- package/appGroupAssignments.d.ts +6 -8
- package/appGroupAssignments.js +3 -5
- package/appGroupAssignments.js.map +1 -1
- package/appOauthApiScope.d.ts +5 -7
- package/appOauthApiScope.js +2 -4
- package/appOauthApiScope.js.map +1 -1
- package/appSamlAppSettings.d.ts +6 -7
- package/appSamlAppSettings.js +3 -4
- package/appSamlAppSettings.js.map +1 -1
- package/appSharedCredentials.d.ts +61 -63
- package/appSharedCredentials.js +4 -6
- package/appSharedCredentials.js.map +1 -1
- package/appSignonPolicy.d.ts +3 -39
- package/appSignonPolicy.js +3 -39
- package/appSignonPolicy.js.map +1 -1
- package/appSignonPolicyRule.d.ts +69 -361
- package/appSignonPolicyRule.js +1 -278
- package/appSignonPolicyRule.js.map +1 -1
- package/appUserBaseSchemaProperty.d.ts +25 -29
- package/appUserBaseSchemaProperty.js +1 -5
- package/appUserBaseSchemaProperty.js.map +1 -1
- package/appUserSchemaProperty.d.ts +51 -41
- package/appUserSchemaProperty.js +0 -2
- package/appUserSchemaProperty.js.map +1 -1
- package/auth/getServer.d.ts +11 -11
- package/auth/getServer.js +2 -2
- package/auth/getServerPolicy.d.ts +15 -9
- package/auth/getServerPolicy.js +2 -2
- package/auth/getServerPolicy.js.map +1 -1
- package/auth/getServerScopes.d.ts +8 -5
- package/auth/getServerScopes.js +2 -2
- package/auth/getServerScopes.js.map +1 -1
- package/auth/server.d.ts +15 -19
- package/auth/server.js +1 -5
- package/auth/server.js.map +1 -1
- package/auth/serverClaim.d.ts +13 -17
- package/auth/serverClaim.js +1 -5
- package/auth/serverClaim.js.map +1 -1
- package/auth/serverPolicy.d.ts +10 -14
- package/auth/serverPolicy.js +1 -5
- package/auth/serverPolicy.js.map +1 -1
- package/auth/serverPolicyClaim.d.ts +50 -66
- package/auth/serverPolicyClaim.js +0 -25
- package/auth/serverPolicyClaim.js.map +1 -1
- package/auth/serverPolicyRule.d.ts +32 -43
- package/auth/serverPolicyRule.js +0 -2
- package/auth/serverPolicyRule.js.map +1 -1
- package/auth/serverScope.d.ts +16 -20
- package/auth/serverScope.js +1 -5
- package/auth/serverScope.js.map +1 -1
- package/authServerClaimDefault.d.ts +10 -25
- package/authServerClaimDefault.js +0 -9
- package/authServerClaimDefault.js.map +1 -1
- package/authServerDefault.d.ts +15 -19
- package/authServerDefault.js +1 -5
- package/authServerDefault.js.map +1 -1
- package/authenticator.d.ts +53 -61
- package/authenticator.js +11 -11
- package/authenticator.js.map +1 -1
- package/behaviour.d.ts +21 -41
- package/behaviour.js +0 -2
- package/behaviour.js.map +1 -1
- package/brand.d.ts +23 -22
- package/brand.js +8 -4
- package/brand.js.map +1 -1
- package/captcha.d.ts +15 -17
- package/captcha.js +3 -5
- package/captcha.js.map +1 -1
- package/captchaOrgWideSettings.d.ts +8 -43
- package/captchaOrgWideSettings.js +2 -37
- package/captchaOrgWideSettings.js.map +1 -1
- package/domain.d.ts +13 -21
- package/domain.js +0 -2
- package/domain.js.map +1 -1
- package/domainCertificate.d.ts +17 -24
- package/domainCertificate.js +2 -9
- package/domainCertificate.js.map +1 -1
- package/domainVerification.d.ts +4 -10
- package/domainVerification.js +1 -7
- package/domainVerification.js.map +1 -1
- package/emailCustomization.d.ts +38 -222
- package/emailCustomization.js +29 -33
- package/emailCustomization.js.map +1 -1
- package/emailDomain.d.ts +4 -8
- package/emailDomain.js +0 -4
- package/emailDomain.js.map +1 -1
- package/emailDomainVerification.d.ts +3 -7
- package/emailDomainVerification.js +0 -4
- package/emailDomainVerification.js.map +1 -1
- package/emailSender.d.ts +15 -17
- package/emailSender.js +2 -4
- package/emailSender.js.map +1 -1
- package/emailSenderVerification.d.ts +5 -9
- package/emailSenderVerification.js +2 -6
- package/emailSenderVerification.js.map +1 -1
- package/eventHook.d.ts +16 -11
- package/eventHook.js +1 -5
- package/eventHook.js.map +1 -1
- package/eventHookVerification.d.ts +4 -10
- package/eventHookVerification.js +1 -7
- package/eventHookVerification.js.map +1 -1
- package/factor/factor.d.ts +4 -9
- package/factor/factor.js +1 -3
- package/factor/factor.js.map +1 -1
- package/factorTotp.d.ts +12 -21
- package/factorTotp.js +3 -3
- package/factorTotp.js.map +1 -1
- package/getAppGroupAssignments.d.ts +6 -6
- package/getAppGroupAssignments.js +2 -2
- package/getAppSignonPolicy.d.ts +16 -6
- package/getAppSignonPolicy.js +8 -4
- package/getAppSignonPolicy.js.map +1 -1
- package/getAppUserAssignments.d.ts +6 -6
- package/getAppUserAssignments.js +2 -2
- package/getAuthServerClaim.d.ts +15 -12
- package/getAuthServerClaim.js +2 -2
- package/getAuthServerClaim.js.map +1 -1
- package/getAuthServerClaims.d.ts +8 -5
- package/getAuthServerClaims.js +2 -2
- package/getAuthServerClaims.js.map +1 -1
- package/getAuthenticator.d.ts +24 -26
- package/getAuthenticator.js +14 -22
- package/getAuthenticator.js.map +1 -1
- package/getBehaviour.d.ts +6 -8
- package/getBehaviour.js +2 -2
- package/getBehaviour.js.map +1 -1
- package/getBehaviours.d.ts +7 -7
- package/getBehaviours.js +2 -2
- package/getBrand.d.ts +9 -6
- package/getBrand.js +2 -2
- package/getBrand.js.map +1 -1
- package/getBrands.d.ts +2 -2
- package/getBrands.js +2 -2
- package/getDomain.d.ts +11 -14
- package/getDomain.js +2 -8
- package/getDomain.js.map +1 -1
- package/getEmailCustomization.d.ts +14 -9
- package/getEmailCustomization.js +2 -6
- package/getEmailCustomization.js.map +1 -1
- package/getEmailCustomizations.d.ts +11 -9
- package/getEmailCustomizations.js +2 -6
- package/getEmailCustomizations.js.map +1 -1
- package/getGroups.d.ts +11 -25
- package/getGroups.js +2 -2
- package/getGroups.js.map +1 -1
- package/getLogStream.d.ts +8 -39
- package/getLogStream.js +2 -24
- package/getLogStream.js.map +1 -1
- package/getNetworkZone.d.ts +12 -12
- package/getNetworkZone.js +2 -2
- package/getOrgMetadata.d.ts +0 -22
- package/getOrgMetadata.js +0 -22
- package/getOrgMetadata.js.map +1 -1
- package/getRoleSubscription.d.ts +13 -35
- package/getRoleSubscription.js +2 -2
- package/getRoleSubscription.js.map +1 -1
- package/getTemplate.d.ts +10 -8
- package/getTemplate.js +2 -6
- package/getTemplate.js.map +1 -1
- package/getTemplates.d.ts +6 -7
- package/getTemplates.js +2 -6
- package/getTemplates.js.map +1 -1
- package/getTheme.d.ts +14 -12
- package/getTheme.js +2 -6
- package/getTheme.js.map +1 -1
- package/getThemes.d.ts +6 -7
- package/getThemes.js +2 -6
- package/getThemes.js.map +1 -1
- package/getTrustedOrigins.d.ts +7 -4
- package/getTrustedOrigins.js +2 -2
- package/getTrustedOrigins.js.map +1 -1
- package/getUserSecurityQuestions.d.ts +4 -8
- package/getUserSecurityQuestions.js +0 -4
- package/getUserSecurityQuestions.js.map +1 -1
- package/group/getEveryoneGroup.d.ts +10 -5
- package/group/getEveryoneGroup.js +4 -2
- package/group/getEveryoneGroup.js.map +1 -1
- package/group/getGroup.d.ts +17 -26
- package/group/getGroup.js +2 -2
- package/group/getGroup.js.map +1 -1
- package/group/getRule.d.ts +9 -9
- package/group/getRule.js +2 -2
- package/group/group.d.ts +4 -36
- package/group/group.js +1 -33
- package/group/group.js.map +1 -1
- package/group/role.d.ts +37 -81
- package/group/role.js +1 -6
- package/group/role.js.map +1 -1
- package/group/rule.d.ts +12 -20
- package/group/rule.js +0 -2
- package/group/rule.js.map +1 -1
- package/groupMemberships.d.ts +8 -10
- package/groupMemberships.js +2 -4
- package/groupMemberships.js.map +1 -1
- package/groupSchemaProperty.d.ts +57 -59
- package/groupSchemaProperty.js +0 -2
- package/groupSchemaProperty.js.map +1 -1
- package/idp/getMetadataSaml.d.ts +9 -6
- package/idp/getMetadataSaml.js +2 -2
- package/idp/getMetadataSaml.js.map +1 -1
- package/idp/getOidc.d.ts +9 -9
- package/idp/getOidc.js +2 -2
- package/idp/getSaml.d.ts +16 -13
- package/idp/getSaml.js +2 -2
- package/idp/getSaml.js.map +1 -1
- package/idp/getSocial.d.ts +8 -2
- package/idp/getSocial.js +2 -2
- package/idp/getSocial.js.map +1 -1
- package/idp/oidc.d.ts +70 -62
- package/idp/oidc.js +3 -5
- package/idp/oidc.js.map +1 -1
- package/idp/saml.d.ts +64 -86
- package/idp/saml.js +1 -5
- package/idp/saml.js.map +1 -1
- package/idp/samlKey.d.ts +3 -5
- package/idp/samlKey.js +0 -2
- package/idp/samlKey.js.map +1 -1
- package/idp/social.d.ts +99 -69
- package/idp/social.js +11 -5
- package/idp/social.js.map +1 -1
- package/inline/hook.d.ts +4 -26
- package/inline/hook.js +1 -5
- package/inline/hook.js.map +1 -1
- package/linkDefinition.d.ts +2 -3
- package/linkDefinition.js +2 -3
- package/linkDefinition.js.map +1 -1
- package/linkValue.d.ts +7 -9
- package/linkValue.js +1 -3
- package/linkValue.js.map +1 -1
- package/logStream.d.ts +32 -27
- package/logStream.js +23 -9
- package/logStream.js.map +1 -1
- package/network/zone.d.ts +25 -66
- package/network/zone.js +1 -39
- package/network/zone.js.map +1 -1
- package/orgConfiguration.d.ts +4 -9
- package/orgConfiguration.js +1 -3
- package/orgConfiguration.js.map +1 -1
- package/orgSupport.d.ts +4 -7
- package/orgSupport.js +1 -4
- package/orgSupport.js.map +1 -1
- package/package.json +3 -3
- package/policy/getDefaultPolicy.d.ts +9 -7
- package/policy/getDefaultPolicy.js +6 -2
- package/policy/getDefaultPolicy.js.map +1 -1
- package/policy/getPolicy.d.ts +11 -26
- package/policy/getPolicy.js +2 -2
- package/policy/getPolicy.js.map +1 -1
- package/policy/mfa.d.ts +18 -220
- package/policy/mfa.js +0 -10
- package/policy/mfa.js.map +1 -1
- package/policy/password.d.ts +91 -95
- package/policy/password.js +1 -5
- package/policy/password.js.map +1 -1
- package/policy/ruleIdpDiscovery.d.ts +111 -93
- package/policy/ruleIdpDiscovery.js +48 -57
- package/policy/ruleIdpDiscovery.js.map +1 -1
- package/policy/ruleMfa.d.ts +40 -30
- package/policy/ruleMfa.js +1 -3
- package/policy/ruleMfa.js.map +1 -1
- package/policy/rulePassword.d.ts +34 -38
- package/policy/rulePassword.js +1 -5
- package/policy/rulePassword.js.map +1 -1
- package/policy/ruleSignon.d.ts +94 -85
- package/policy/ruleSignon.js +1 -4
- package/policy/ruleSignon.js.map +1 -1
- package/policy/signon.d.ts +16 -20
- package/policy/signon.js +1 -5
- package/policy/signon.js.map +1 -1
- package/policyMfaDefault.d.ts +15 -214
- package/policyMfaDefault.js +2 -9
- package/policyMfaDefault.js.map +1 -1
- package/policyPasswordDefault.d.ts +85 -101
- package/policyPasswordDefault.js +1 -5
- package/policyPasswordDefault.js.map +1 -1
- package/policyProfileEnrollment.d.ts +8 -9
- package/policyProfileEnrollment.js +2 -3
- package/policyProfileEnrollment.js.map +1 -1
- package/policyProfileEnrollmentApps.d.ts +8 -11
- package/policyProfileEnrollmentApps.js +3 -6
- package/policyProfileEnrollmentApps.js.map +1 -1
- package/policyRuleProfileEnrollment.d.ts +42 -31
- package/policyRuleProfileEnrollment.js +2 -3
- package/policyRuleProfileEnrollment.js.map +1 -1
- package/profile/mapping.d.ts +19 -34
- package/profile/mapping.js +4 -4
- package/profile/mapping.js.map +1 -1
- package/rateLimiting.d.ts +8 -17
- package/rateLimiting.js +2 -5
- package/rateLimiting.js.map +1 -1
- package/resourceSet.d.ts +18 -26
- package/resourceSet.js +9 -14
- package/resourceSet.js.map +1 -1
- package/roleSubscription.d.ts +35 -86
- package/roleSubscription.js +2 -2
- package/roleSubscription.js.map +1 -1
- package/securityNotificationEmails.d.ts +4 -7
- package/securityNotificationEmails.js +4 -7
- package/securityNotificationEmails.js.map +1 -1
- package/templateSms.d.ts +4 -8
- package/templateSms.js +1 -5
- package/templateSms.js.map +1 -1
- package/theme.d.ts +46 -46
- package/theme.js +2 -2
- package/threatInsightSettings.d.ts +7 -27
- package/threatInsightSettings.js +1 -3
- package/threatInsightSettings.js.map +1 -1
- package/trustedorigin/origin.d.ts +13 -17
- package/trustedorigin/origin.js +1 -5
- package/trustedorigin/origin.js.map +1 -1
- package/types/input.d.ts +65 -162
- package/types/output.d.ts +75 -275
- package/user/getUser.d.ts +32 -104
- package/user/getUser.js +2 -2
- package/user/getUser.js.map +1 -1
- package/user/getUserProfileMappingSource.d.ts +9 -7
- package/user/getUserProfileMappingSource.js +6 -4
- package/user/getUserProfileMappingSource.js.map +1 -1
- package/user/getUserType.d.ts +7 -7
- package/user/getUserType.js +2 -2
- package/user/getUsers.d.ts +95 -37
- package/user/getUsers.js +64 -24
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +160 -209
- package/user/user.js +43 -65
- package/user/user.js.map +1 -1
- package/user/userType.d.ts +1 -5
- package/user/userType.js +1 -5
- package/user/userType.js.map +1 -1
- package/userAdminRoles.d.ts +10 -17
- package/userAdminRoles.js +1 -5
- package/userAdminRoles.js.map +1 -1
- package/userBaseSchemaProperty.d.ts +26 -34
- package/userBaseSchemaProperty.js +2 -10
- package/userBaseSchemaProperty.js.map +1 -1
- package/userFactorQuestion.d.ts +1 -5
- package/userFactorQuestion.js +1 -5
- package/userFactorQuestion.js.map +1 -1
- package/userGroupMemberships.d.ts +3 -3
- package/userSchemaProperty.d.ts +57 -56
- package/userSchemaProperty.js +0 -8
- package/userSchemaProperty.js.map +1 -1
package/app/oauth.d.ts
CHANGED
|
@@ -3,65 +3,13 @@ import * as inputs from "../types/input";
|
|
|
3
3
|
import * as outputs from "../types/output";
|
|
4
4
|
/**
|
|
5
5
|
* This resource allows you to create and configure an OIDC Application.
|
|
6
|
-
*
|
|
7
|
-
*
|
|
8
|
-
* activated or deactivated in accordance with the `status` change. Then, all
|
|
6
|
+
* > During an apply if there is change in status the app will first be
|
|
7
|
+
* activated or deactivated in accordance with the status change. Then, all
|
|
9
8
|
* other arguments that changed will be applied.
|
|
10
9
|
*
|
|
11
|
-
*
|
|
12
|
-
*
|
|
13
|
-
*
|
|
14
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
15
|
-
* import * as okta from "@pulumi/okta";
|
|
16
|
-
*
|
|
17
|
-
* const example = new okta.app.OAuth("example", {
|
|
18
|
-
* label: "example",
|
|
19
|
-
* type: "web",
|
|
20
|
-
* grantTypes: ["authorization_code"],
|
|
21
|
-
* redirectUris: ["https://example.com/"],
|
|
22
|
-
* responseTypes: ["code"],
|
|
23
|
-
* });
|
|
24
|
-
* ```
|
|
25
|
-
*
|
|
26
|
-
* ### With JWKS value
|
|
27
|
-
*
|
|
28
|
-
* See also Advanced PEM secrets and JWKS example.
|
|
29
|
-
*
|
|
30
|
-
* ```typescript
|
|
31
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
32
|
-
* import * as okta from "@pulumi/okta";
|
|
33
|
-
*
|
|
34
|
-
* const example = new okta.app.OAuth("example", {
|
|
35
|
-
* label: "example",
|
|
36
|
-
* type: "service",
|
|
37
|
-
* responseTypes: ["token"],
|
|
38
|
-
* grantTypes: ["client_credentials"],
|
|
39
|
-
* tokenEndpointAuthMethod: "private_key_jwt",
|
|
40
|
-
* jwks: [
|
|
41
|
-
* {
|
|
42
|
-
* kty: "RSA",
|
|
43
|
-
* kid: "SIGNING_KEY_RSA",
|
|
44
|
-
* e: "AQAB",
|
|
45
|
-
* n: "xyz",
|
|
46
|
-
* },
|
|
47
|
-
* {
|
|
48
|
-
* kty: "EC",
|
|
49
|
-
* kid: "SIGNING_KEY_EC",
|
|
50
|
-
* x: "K37X78mXJHHldZYMzrwipjKR-YZUS2SMye0KindHp6I",
|
|
51
|
-
* y: "8IfvsvXWzbFWOZoVOMwgF5p46mUj3kbOVf9Fk0vVVHo",
|
|
52
|
-
* },
|
|
53
|
-
* ],
|
|
54
|
-
* });
|
|
55
|
-
* ```
|
|
56
|
-
*
|
|
57
|
-
* ## Etc.
|
|
58
|
-
*
|
|
59
|
-
* ### Resetting client secret
|
|
60
|
-
*
|
|
61
|
-
* If the client secret needs to be reset run an apply with `omitSecret` set to
|
|
62
|
-
* true in the resource. This causes `clientSecret` to be set to blank. Remove
|
|
63
|
-
* `omitSecret` and run apply again. The resource will set a new `clientSecret`
|
|
64
|
-
* for the app.
|
|
10
|
+
* > `okta.app.OAuthRedirectUri` has been marked deprecated and will be removed
|
|
11
|
+
* in the v5 release of the provider. Operators should manage the redirect URIs for
|
|
12
|
+
* an oauth app directly on that resource.
|
|
65
13
|
*
|
|
66
14
|
* ### Private Keys
|
|
67
15
|
*
|
|
@@ -75,10 +23,8 @@ import * as outputs from "../types/output";
|
|
|
75
23
|
*
|
|
76
24
|
* ## Import
|
|
77
25
|
*
|
|
78
|
-
* An OIDC Application can be imported via the Okta ID.
|
|
79
|
-
*
|
|
80
26
|
* ```sh
|
|
81
|
-
* $ pulumi import okta:app/oAuth:OAuth example <app id>
|
|
27
|
+
* $ pulumi import okta:app/oAuth:OAuth example <app id>
|
|
82
28
|
* ```
|
|
83
29
|
*/
|
|
84
30
|
export declare class OAuth extends pulumi.CustomResource {
|
|
@@ -98,15 +44,15 @@ export declare class OAuth extends pulumi.CustomResource {
|
|
|
98
44
|
*/
|
|
99
45
|
static isInstance(obj: any): obj is OAuth;
|
|
100
46
|
/**
|
|
101
|
-
* Custom error page URL
|
|
47
|
+
* Custom error page URL
|
|
102
48
|
*/
|
|
103
49
|
readonly accessibilityErrorRedirectUrl: pulumi.Output<string | undefined>;
|
|
104
50
|
/**
|
|
105
|
-
* Custom login page
|
|
51
|
+
* Custom login page URL
|
|
106
52
|
*/
|
|
107
53
|
readonly accessibilityLoginRedirectUrl: pulumi.Output<string | undefined>;
|
|
108
54
|
/**
|
|
109
|
-
* Enable self
|
|
55
|
+
* Enable self service. Default is `false`
|
|
110
56
|
*/
|
|
111
57
|
readonly accessibilitySelfService: pulumi.Output<boolean | undefined>;
|
|
112
58
|
/**
|
|
@@ -118,35 +64,35 @@ export declare class OAuth extends pulumi.CustomResource {
|
|
|
118
64
|
*/
|
|
119
65
|
readonly appLinksJson: pulumi.Output<string | undefined>;
|
|
120
66
|
/**
|
|
121
|
-
* Application settings in JSON format
|
|
67
|
+
* Application settings in JSON format
|
|
122
68
|
*/
|
|
123
69
|
readonly appSettingsJson: pulumi.Output<string | undefined>;
|
|
124
70
|
/**
|
|
125
|
-
* The ID of the associated
|
|
71
|
+
* The ID of the associated app*signon*policy. If this property is removed from the application the default sign-on-policy will be associated with this application.
|
|
126
72
|
*/
|
|
127
|
-
readonly authenticationPolicy: pulumi.Output<string
|
|
73
|
+
readonly authenticationPolicy: pulumi.Output<string>;
|
|
128
74
|
/**
|
|
129
|
-
* Requested key rotation mode.
|
|
130
|
-
*
|
|
131
|
-
*
|
|
132
|
-
*
|
|
133
|
-
*
|
|
75
|
+
* Requested key rotation mode. If
|
|
76
|
+
* auto*key*rotation isn't specified, the client automatically opts in for Okta's
|
|
77
|
+
* key rotation. You can update this property via the API or via the administrator
|
|
78
|
+
* UI.
|
|
79
|
+
* See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object"
|
|
134
80
|
*/
|
|
135
81
|
readonly autoKeyRotation: pulumi.Output<boolean | undefined>;
|
|
136
82
|
/**
|
|
137
|
-
* Display auto submit toolbar
|
|
83
|
+
* Display auto submit toolbar
|
|
138
84
|
*/
|
|
139
85
|
readonly autoSubmitToolbar: pulumi.Output<boolean | undefined>;
|
|
140
86
|
/**
|
|
141
|
-
* The user provided OAuth client secret key value, this can be set when
|
|
87
|
+
* The user provided OAuth client secret key value, this can be set when token*endpoint*auth*method is client*secret*basic. This does nothing when `omit*secret is set to true.
|
|
142
88
|
*/
|
|
143
89
|
readonly clientBasicSecret: pulumi.Output<string | undefined>;
|
|
144
90
|
/**
|
|
145
|
-
* OAuth client ID. If set during creation, app is created with this id.
|
|
91
|
+
* OAuth client ID. If set during creation, app is created with this id.
|
|
146
92
|
*/
|
|
147
93
|
readonly clientId: pulumi.Output<string>;
|
|
148
94
|
/**
|
|
149
|
-
* OAuth client secret value, this is output only. This will be in plain text in your statefile unless you set omitSecret above.
|
|
95
|
+
* OAuth client secret value, this is output only. This will be in plain text in your statefile unless you set omitSecret above.
|
|
150
96
|
*/
|
|
151
97
|
readonly clientSecret: pulumi.Output<string>;
|
|
152
98
|
/**
|
|
@@ -154,7 +100,7 @@ export declare class OAuth extends pulumi.CustomResource {
|
|
|
154
100
|
*/
|
|
155
101
|
readonly clientUri: pulumi.Output<string | undefined>;
|
|
156
102
|
/**
|
|
157
|
-
* Indicates whether user consent is required or implicit. Valid values:
|
|
103
|
+
* *Early Access Property*. Indicates whether user consent is required or implicit. Valid values: REQUIRED, TRUSTED. Default value is TRUSTED
|
|
158
104
|
*/
|
|
159
105
|
readonly consentMethod: pulumi.Output<string | undefined>;
|
|
160
106
|
/**
|
|
@@ -162,39 +108,32 @@ export declare class OAuth extends pulumi.CustomResource {
|
|
|
162
108
|
*/
|
|
163
109
|
readonly enduserNote: pulumi.Output<string | undefined>;
|
|
164
110
|
/**
|
|
165
|
-
* List of OAuth 2.0 grant types. Conditional validation params found
|
|
166
|
-
* Defaults to minimum requirements per app type. Valid values: `"authorizationCode"`, `"implicit"`, `"password"`, `"refreshToken"`, `"clientCredentials"`,
|
|
167
|
-
* `"urn:ietf:params:oauth:grant-type:saml2-bearer"` (*Early Access Property*), `"urn:ietf:params:oauth:grant-type:token-exchange"` (*Early Access Property*),
|
|
168
|
-
* `"interactionCode"` (*OIE only*).
|
|
111
|
+
* List of OAuth 2.0 grant types. Conditional validation params found here https://developer.okta.com/docs/api/resources/apps#credentials-settings-details. Defaults to minimum requirements per app type.
|
|
169
112
|
*/
|
|
170
113
|
readonly grantTypes: pulumi.Output<string[] | undefined>;
|
|
171
114
|
/**
|
|
172
|
-
* Groups claim for an OpenID Connect client application
|
|
115
|
+
* Groups claim for an OpenID Connect client application (argument is ignored when API auth is done with OAuth 2.0 credentials)
|
|
173
116
|
*/
|
|
174
117
|
readonly groupsClaim: pulumi.Output<outputs.app.OAuthGroupsClaim | undefined>;
|
|
175
118
|
/**
|
|
176
|
-
* Do not display application icon on mobile app
|
|
119
|
+
* Do not display application icon on mobile app
|
|
177
120
|
*/
|
|
178
121
|
readonly hideIos: pulumi.Output<boolean | undefined>;
|
|
179
122
|
/**
|
|
180
|
-
* Do not display application icon to users
|
|
123
|
+
* Do not display application icon to users
|
|
181
124
|
*/
|
|
182
125
|
readonly hideWeb: pulumi.Output<boolean | undefined>;
|
|
183
126
|
/**
|
|
184
|
-
* *Early Access Property*.
|
|
127
|
+
* *Early Access Property*. Enable Federation Broker Mode.
|
|
185
128
|
*/
|
|
186
129
|
readonly implicitAssignment: pulumi.Output<boolean | undefined>;
|
|
187
130
|
/**
|
|
188
|
-
* Indicates whether the Okta Authorization Server uses the original Okta org domain URL or a custom domain URL as the issuer of ID token for this client.
|
|
189
|
-
* Valid values: `"CUSTOM_URL"`,`"ORG_URL"` or `"DYNAMIC"`. Default is `"ORG_URL"`.
|
|
131
|
+
* *Early Access Property*. Indicates whether the Okta Authorization Server uses the original Okta org domain URL or a custom domain URL as the issuer of ID token for this client.
|
|
190
132
|
*/
|
|
191
133
|
readonly issuerMode: pulumi.Output<string | undefined>;
|
|
192
|
-
/**
|
|
193
|
-
* JSON Web Key set. Multiple jwks are supported[Admin Console JWK Reference](https://developer.okta.com/docs/guides/implement-oauth-for-okta-serviceapp/main/#generate-the-jwk-in-the-admin-console). Use kty=RSA e=[value] n=[value] for RSA jwks, and kty=EC x=[value] y=[value] for EC jwks
|
|
194
|
-
*/
|
|
195
134
|
readonly jwks: pulumi.Output<outputs.app.OAuthJwk[] | undefined>;
|
|
196
135
|
/**
|
|
197
|
-
* URL
|
|
136
|
+
* URL reference to JWKS
|
|
198
137
|
*/
|
|
199
138
|
readonly jwksUri: pulumi.Output<string | undefined>;
|
|
200
139
|
/**
|
|
@@ -202,15 +141,15 @@ export declare class OAuth extends pulumi.CustomResource {
|
|
|
202
141
|
*/
|
|
203
142
|
readonly label: pulumi.Output<string>;
|
|
204
143
|
/**
|
|
205
|
-
* The type of Idp-Initiated login that the client supports, if any
|
|
144
|
+
* The type of Idp-Initiated login that the client supports, if any
|
|
206
145
|
*/
|
|
207
146
|
readonly loginMode: pulumi.Output<string | undefined>;
|
|
208
147
|
/**
|
|
209
|
-
* List of scopes to use for the request
|
|
148
|
+
* List of scopes to use for the request
|
|
210
149
|
*/
|
|
211
150
|
readonly loginScopes: pulumi.Output<string[] | undefined>;
|
|
212
151
|
/**
|
|
213
|
-
* URI that initiates login.
|
|
152
|
+
* URI that initiates login.
|
|
214
153
|
*/
|
|
215
154
|
readonly loginUri: pulumi.Output<string | undefined>;
|
|
216
155
|
/**
|
|
@@ -222,23 +161,19 @@ export declare class OAuth extends pulumi.CustomResource {
|
|
|
222
161
|
*/
|
|
223
162
|
readonly logoUri: pulumi.Output<string | undefined>;
|
|
224
163
|
/**
|
|
225
|
-
*
|
|
164
|
+
* URL of the application's logo
|
|
226
165
|
*/
|
|
227
166
|
readonly logoUrl: pulumi.Output<string>;
|
|
228
167
|
/**
|
|
229
|
-
* Name
|
|
168
|
+
* Name of the app.
|
|
230
169
|
*/
|
|
231
170
|
readonly name: pulumi.Output<string>;
|
|
232
171
|
/**
|
|
233
|
-
* This tells the provider not manage the
|
|
172
|
+
* This tells the provider not manage the client*secret value in state. When this is false (the default), it will cause the auto-generated client*secret to be persisted in the clientSecret attribute in state. This also means that every time an update to this app is run, this value is also set on the API. If this changes from false => true, the `clientSecret` is dropped from state and the secret at the time of the apply is what remains. If this is ever changes from true => false your app will be recreated, due to the need to regenerate a secret we can store in state.
|
|
234
173
|
*/
|
|
235
174
|
readonly omitSecret: pulumi.Output<boolean | undefined>;
|
|
236
175
|
/**
|
|
237
|
-
* Require Proof Key for Code Exchange (PKCE) for
|
|
238
|
-
* additional verification. If `pkceRequired` isn't specified when adding a new
|
|
239
|
-
* application, Okta sets it to `true` by default for `"browser"` and `"native"`
|
|
240
|
-
* application types.
|
|
241
|
-
* See https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
|
|
176
|
+
* Require Proof Key for Code Exchange (PKCE) for additional verification key rotation mode. See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
|
|
242
177
|
*/
|
|
243
178
|
readonly pkceRequired: pulumi.Output<boolean>;
|
|
244
179
|
/**
|
|
@@ -246,56 +181,39 @@ export declare class OAuth extends pulumi.CustomResource {
|
|
|
246
181
|
*/
|
|
247
182
|
readonly policyUri: pulumi.Output<string | undefined>;
|
|
248
183
|
/**
|
|
249
|
-
* List of URIs for redirection after logout.
|
|
184
|
+
* List of URIs for redirection after logout. Note: see okta*app*oauth*post*logout*redirect*uri for appending to this list in a decentralized way.
|
|
250
185
|
*/
|
|
251
186
|
readonly postLogoutRedirectUris: pulumi.Output<string[] | undefined>;
|
|
252
187
|
/**
|
|
253
|
-
* Custom JSON that represents an OAuth application's profile
|
|
188
|
+
* Custom JSON that represents an OAuth application's profile
|
|
254
189
|
*/
|
|
255
190
|
readonly profile: pulumi.Output<string | undefined>;
|
|
256
191
|
/**
|
|
257
|
-
* List of URIs for use in the redirect-based flow. This is required for all application types except service.
|
|
192
|
+
* List of URIs for use in the redirect-based flow. This is required for all application types except service. Note: see okta*app*oauth*redirect*uri for appending to this list in a decentralized way.
|
|
258
193
|
*/
|
|
259
194
|
readonly redirectUris: pulumi.Output<string[] | undefined>;
|
|
260
195
|
/**
|
|
261
|
-
* Grace period for token rotation
|
|
196
|
+
* *Early Access Property* Grace period for token rotation, required with grant types refresh_token
|
|
262
197
|
*/
|
|
263
198
|
readonly refreshTokenLeeway: pulumi.Output<number | undefined>;
|
|
264
199
|
/**
|
|
265
|
-
* Refresh token rotation behavior
|
|
200
|
+
* *Early Access Property* Refresh token rotation behavior, required with grant types refresh_token
|
|
266
201
|
*/
|
|
267
202
|
readonly refreshTokenRotation: pulumi.Output<string | undefined>;
|
|
268
203
|
/**
|
|
269
|
-
* List of OAuth 2.0 response type strings.
|
|
270
|
-
* values of `"code"`, `"token"`, `"idToken"`. The `grantTypes` and `responseTypes`
|
|
271
|
-
* values described are partially orthogonal, as they refer to arguments
|
|
272
|
-
* passed to different endpoints in the OAuth 2.0 protocol (opens new window).
|
|
273
|
-
* However, they are related in that the `grantTypes` available to a client
|
|
274
|
-
* influence the `responseTypes` that the client is allowed to use, and vice versa.
|
|
275
|
-
* For instance, a grantTypes value that includes authorizationCode implies a
|
|
276
|
-
* `responseTypes` value that includes code, as both values are defined as part of
|
|
277
|
-
* the OAuth 2.0 authorization code grant.
|
|
278
|
-
* See: https://developer.okta.com/docs/reference/api/apps/#add-oauth-2-0-client-application
|
|
204
|
+
* List of OAuth 2.0 response type strings.
|
|
279
205
|
*/
|
|
280
206
|
readonly responseTypes: pulumi.Output<string[] | undefined>;
|
|
281
207
|
/**
|
|
282
|
-
* Sign
|
|
208
|
+
* Sign on mode of application.
|
|
283
209
|
*/
|
|
284
210
|
readonly signOnMode: pulumi.Output<string>;
|
|
285
211
|
/**
|
|
286
|
-
*
|
|
212
|
+
* Status of application. By default, it is `ACTIVE`
|
|
287
213
|
*/
|
|
288
214
|
readonly status: pulumi.Output<string | undefined>;
|
|
289
215
|
/**
|
|
290
|
-
* Requested authentication method for
|
|
291
|
-
* the token endpoint. It can be set to `"none"`, `"clientSecretPost"`,
|
|
292
|
-
* `"clientSecretBasic"`, `"clientSecretJwt"`, `"privateKeyJwt"`. Use
|
|
293
|
-
* `pkceRequired` to require PKCE for your confidential clients using the
|
|
294
|
-
* Authorization Code flow. If `"tokenEndpointAuthMethod"` is `"none"`,
|
|
295
|
-
* `pkceRequired` needs to be `true`. If `pkceRequired` isn't specified when
|
|
296
|
-
* adding a new application, Okta sets it to `true` by default for `"browser"` and
|
|
297
|
-
* `"native"` application types.
|
|
298
|
-
* See https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
|
|
216
|
+
* Requested authentication method for the token endpoint.
|
|
299
217
|
*/
|
|
300
218
|
readonly tokenEndpointAuthMethod: pulumi.Output<string | undefined>;
|
|
301
219
|
/**
|
|
@@ -303,27 +221,27 @@ export declare class OAuth extends pulumi.CustomResource {
|
|
|
303
221
|
*/
|
|
304
222
|
readonly tosUri: pulumi.Output<string | undefined>;
|
|
305
223
|
/**
|
|
306
|
-
* The type of
|
|
224
|
+
* The type of client application.
|
|
307
225
|
*/
|
|
308
226
|
readonly type: pulumi.Output<string>;
|
|
309
227
|
/**
|
|
310
|
-
* Username template. Default:
|
|
228
|
+
* Username template. Default: `${source.login}`
|
|
311
229
|
*/
|
|
312
230
|
readonly userNameTemplate: pulumi.Output<string | undefined>;
|
|
313
231
|
/**
|
|
314
|
-
* Push username on update. Valid values: `
|
|
232
|
+
* Push username on update. Valid values: `PUSH` and `DONT_PUSH`
|
|
315
233
|
*/
|
|
316
234
|
readonly userNameTemplatePushStatus: pulumi.Output<string | undefined>;
|
|
317
235
|
/**
|
|
318
|
-
* Username template suffix
|
|
236
|
+
* Username template suffix
|
|
319
237
|
*/
|
|
320
238
|
readonly userNameTemplateSuffix: pulumi.Output<string | undefined>;
|
|
321
239
|
/**
|
|
322
|
-
* Username template type. Default: `
|
|
240
|
+
* Username template type. Default: `BUILT_IN`
|
|
323
241
|
*/
|
|
324
242
|
readonly userNameTemplateType: pulumi.Output<string | undefined>;
|
|
325
243
|
/**
|
|
326
|
-
* *Early Access Property*. Indicates if the client is allowed to use wildcard matching of
|
|
244
|
+
* *Early Access Property*. Indicates if the client is allowed to use wildcard matching of redirect_uris
|
|
327
245
|
*/
|
|
328
246
|
readonly wildcardRedirect: pulumi.Output<string | undefined>;
|
|
329
247
|
/**
|
|
@@ -340,15 +258,15 @@ export declare class OAuth extends pulumi.CustomResource {
|
|
|
340
258
|
*/
|
|
341
259
|
export interface OAuthState {
|
|
342
260
|
/**
|
|
343
|
-
* Custom error page URL
|
|
261
|
+
* Custom error page URL
|
|
344
262
|
*/
|
|
345
263
|
accessibilityErrorRedirectUrl?: pulumi.Input<string>;
|
|
346
264
|
/**
|
|
347
|
-
* Custom login page
|
|
265
|
+
* Custom login page URL
|
|
348
266
|
*/
|
|
349
267
|
accessibilityLoginRedirectUrl?: pulumi.Input<string>;
|
|
350
268
|
/**
|
|
351
|
-
* Enable self
|
|
269
|
+
* Enable self service. Default is `false`
|
|
352
270
|
*/
|
|
353
271
|
accessibilitySelfService?: pulumi.Input<boolean>;
|
|
354
272
|
/**
|
|
@@ -360,35 +278,35 @@ export interface OAuthState {
|
|
|
360
278
|
*/
|
|
361
279
|
appLinksJson?: pulumi.Input<string>;
|
|
362
280
|
/**
|
|
363
|
-
* Application settings in JSON format
|
|
281
|
+
* Application settings in JSON format
|
|
364
282
|
*/
|
|
365
283
|
appSettingsJson?: pulumi.Input<string>;
|
|
366
284
|
/**
|
|
367
|
-
* The ID of the associated
|
|
285
|
+
* The ID of the associated app*signon*policy. If this property is removed from the application the default sign-on-policy will be associated with this application.
|
|
368
286
|
*/
|
|
369
287
|
authenticationPolicy?: pulumi.Input<string>;
|
|
370
288
|
/**
|
|
371
|
-
* Requested key rotation mode.
|
|
372
|
-
*
|
|
373
|
-
*
|
|
374
|
-
*
|
|
375
|
-
*
|
|
289
|
+
* Requested key rotation mode. If
|
|
290
|
+
* auto*key*rotation isn't specified, the client automatically opts in for Okta's
|
|
291
|
+
* key rotation. You can update this property via the API or via the administrator
|
|
292
|
+
* UI.
|
|
293
|
+
* See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object"
|
|
376
294
|
*/
|
|
377
295
|
autoKeyRotation?: pulumi.Input<boolean>;
|
|
378
296
|
/**
|
|
379
|
-
* Display auto submit toolbar
|
|
297
|
+
* Display auto submit toolbar
|
|
380
298
|
*/
|
|
381
299
|
autoSubmitToolbar?: pulumi.Input<boolean>;
|
|
382
300
|
/**
|
|
383
|
-
* The user provided OAuth client secret key value, this can be set when
|
|
301
|
+
* The user provided OAuth client secret key value, this can be set when token*endpoint*auth*method is client*secret*basic. This does nothing when `omit*secret is set to true.
|
|
384
302
|
*/
|
|
385
303
|
clientBasicSecret?: pulumi.Input<string>;
|
|
386
304
|
/**
|
|
387
|
-
* OAuth client ID. If set during creation, app is created with this id.
|
|
305
|
+
* OAuth client ID. If set during creation, app is created with this id.
|
|
388
306
|
*/
|
|
389
307
|
clientId?: pulumi.Input<string>;
|
|
390
308
|
/**
|
|
391
|
-
* OAuth client secret value, this is output only. This will be in plain text in your statefile unless you set omitSecret above.
|
|
309
|
+
* OAuth client secret value, this is output only. This will be in plain text in your statefile unless you set omitSecret above.
|
|
392
310
|
*/
|
|
393
311
|
clientSecret?: pulumi.Input<string>;
|
|
394
312
|
/**
|
|
@@ -396,7 +314,7 @@ export interface OAuthState {
|
|
|
396
314
|
*/
|
|
397
315
|
clientUri?: pulumi.Input<string>;
|
|
398
316
|
/**
|
|
399
|
-
* Indicates whether user consent is required or implicit. Valid values:
|
|
317
|
+
* *Early Access Property*. Indicates whether user consent is required or implicit. Valid values: REQUIRED, TRUSTED. Default value is TRUSTED
|
|
400
318
|
*/
|
|
401
319
|
consentMethod?: pulumi.Input<string>;
|
|
402
320
|
/**
|
|
@@ -404,39 +322,32 @@ export interface OAuthState {
|
|
|
404
322
|
*/
|
|
405
323
|
enduserNote?: pulumi.Input<string>;
|
|
406
324
|
/**
|
|
407
|
-
* List of OAuth 2.0 grant types. Conditional validation params found
|
|
408
|
-
* Defaults to minimum requirements per app type. Valid values: `"authorizationCode"`, `"implicit"`, `"password"`, `"refreshToken"`, `"clientCredentials"`,
|
|
409
|
-
* `"urn:ietf:params:oauth:grant-type:saml2-bearer"` (*Early Access Property*), `"urn:ietf:params:oauth:grant-type:token-exchange"` (*Early Access Property*),
|
|
410
|
-
* `"interactionCode"` (*OIE only*).
|
|
325
|
+
* List of OAuth 2.0 grant types. Conditional validation params found here https://developer.okta.com/docs/api/resources/apps#credentials-settings-details. Defaults to minimum requirements per app type.
|
|
411
326
|
*/
|
|
412
327
|
grantTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
413
328
|
/**
|
|
414
|
-
* Groups claim for an OpenID Connect client application
|
|
329
|
+
* Groups claim for an OpenID Connect client application (argument is ignored when API auth is done with OAuth 2.0 credentials)
|
|
415
330
|
*/
|
|
416
331
|
groupsClaim?: pulumi.Input<inputs.app.OAuthGroupsClaim>;
|
|
417
332
|
/**
|
|
418
|
-
* Do not display application icon on mobile app
|
|
333
|
+
* Do not display application icon on mobile app
|
|
419
334
|
*/
|
|
420
335
|
hideIos?: pulumi.Input<boolean>;
|
|
421
336
|
/**
|
|
422
|
-
* Do not display application icon to users
|
|
337
|
+
* Do not display application icon to users
|
|
423
338
|
*/
|
|
424
339
|
hideWeb?: pulumi.Input<boolean>;
|
|
425
340
|
/**
|
|
426
|
-
* *Early Access Property*.
|
|
341
|
+
* *Early Access Property*. Enable Federation Broker Mode.
|
|
427
342
|
*/
|
|
428
343
|
implicitAssignment?: pulumi.Input<boolean>;
|
|
429
344
|
/**
|
|
430
|
-
* Indicates whether the Okta Authorization Server uses the original Okta org domain URL or a custom domain URL as the issuer of ID token for this client.
|
|
431
|
-
* Valid values: `"CUSTOM_URL"`,`"ORG_URL"` or `"DYNAMIC"`. Default is `"ORG_URL"`.
|
|
345
|
+
* *Early Access Property*. Indicates whether the Okta Authorization Server uses the original Okta org domain URL or a custom domain URL as the issuer of ID token for this client.
|
|
432
346
|
*/
|
|
433
347
|
issuerMode?: pulumi.Input<string>;
|
|
434
|
-
/**
|
|
435
|
-
* JSON Web Key set. Multiple jwks are supported[Admin Console JWK Reference](https://developer.okta.com/docs/guides/implement-oauth-for-okta-serviceapp/main/#generate-the-jwk-in-the-admin-console). Use kty=RSA e=[value] n=[value] for RSA jwks, and kty=EC x=[value] y=[value] for EC jwks
|
|
436
|
-
*/
|
|
437
348
|
jwks?: pulumi.Input<pulumi.Input<inputs.app.OAuthJwk>[]>;
|
|
438
349
|
/**
|
|
439
|
-
* URL
|
|
350
|
+
* URL reference to JWKS
|
|
440
351
|
*/
|
|
441
352
|
jwksUri?: pulumi.Input<string>;
|
|
442
353
|
/**
|
|
@@ -444,15 +355,15 @@ export interface OAuthState {
|
|
|
444
355
|
*/
|
|
445
356
|
label?: pulumi.Input<string>;
|
|
446
357
|
/**
|
|
447
|
-
* The type of Idp-Initiated login that the client supports, if any
|
|
358
|
+
* The type of Idp-Initiated login that the client supports, if any
|
|
448
359
|
*/
|
|
449
360
|
loginMode?: pulumi.Input<string>;
|
|
450
361
|
/**
|
|
451
|
-
* List of scopes to use for the request
|
|
362
|
+
* List of scopes to use for the request
|
|
452
363
|
*/
|
|
453
364
|
loginScopes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
454
365
|
/**
|
|
455
|
-
* URI that initiates login.
|
|
366
|
+
* URI that initiates login.
|
|
456
367
|
*/
|
|
457
368
|
loginUri?: pulumi.Input<string>;
|
|
458
369
|
/**
|
|
@@ -464,23 +375,19 @@ export interface OAuthState {
|
|
|
464
375
|
*/
|
|
465
376
|
logoUri?: pulumi.Input<string>;
|
|
466
377
|
/**
|
|
467
|
-
*
|
|
378
|
+
* URL of the application's logo
|
|
468
379
|
*/
|
|
469
380
|
logoUrl?: pulumi.Input<string>;
|
|
470
381
|
/**
|
|
471
|
-
* Name
|
|
382
|
+
* Name of the app.
|
|
472
383
|
*/
|
|
473
384
|
name?: pulumi.Input<string>;
|
|
474
385
|
/**
|
|
475
|
-
* This tells the provider not manage the
|
|
386
|
+
* This tells the provider not manage the client*secret value in state. When this is false (the default), it will cause the auto-generated client*secret to be persisted in the clientSecret attribute in state. This also means that every time an update to this app is run, this value is also set on the API. If this changes from false => true, the `clientSecret` is dropped from state and the secret at the time of the apply is what remains. If this is ever changes from true => false your app will be recreated, due to the need to regenerate a secret we can store in state.
|
|
476
387
|
*/
|
|
477
388
|
omitSecret?: pulumi.Input<boolean>;
|
|
478
389
|
/**
|
|
479
|
-
* Require Proof Key for Code Exchange (PKCE) for
|
|
480
|
-
* additional verification. If `pkceRequired` isn't specified when adding a new
|
|
481
|
-
* application, Okta sets it to `true` by default for `"browser"` and `"native"`
|
|
482
|
-
* application types.
|
|
483
|
-
* See https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
|
|
390
|
+
* Require Proof Key for Code Exchange (PKCE) for additional verification key rotation mode. See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
|
|
484
391
|
*/
|
|
485
392
|
pkceRequired?: pulumi.Input<boolean>;
|
|
486
393
|
/**
|
|
@@ -488,56 +395,39 @@ export interface OAuthState {
|
|
|
488
395
|
*/
|
|
489
396
|
policyUri?: pulumi.Input<string>;
|
|
490
397
|
/**
|
|
491
|
-
* List of URIs for redirection after logout.
|
|
398
|
+
* List of URIs for redirection after logout. Note: see okta*app*oauth*post*logout*redirect*uri for appending to this list in a decentralized way.
|
|
492
399
|
*/
|
|
493
400
|
postLogoutRedirectUris?: pulumi.Input<pulumi.Input<string>[]>;
|
|
494
401
|
/**
|
|
495
|
-
* Custom JSON that represents an OAuth application's profile
|
|
402
|
+
* Custom JSON that represents an OAuth application's profile
|
|
496
403
|
*/
|
|
497
404
|
profile?: pulumi.Input<string>;
|
|
498
405
|
/**
|
|
499
|
-
* List of URIs for use in the redirect-based flow. This is required for all application types except service.
|
|
406
|
+
* List of URIs for use in the redirect-based flow. This is required for all application types except service. Note: see okta*app*oauth*redirect*uri for appending to this list in a decentralized way.
|
|
500
407
|
*/
|
|
501
408
|
redirectUris?: pulumi.Input<pulumi.Input<string>[]>;
|
|
502
409
|
/**
|
|
503
|
-
* Grace period for token rotation
|
|
410
|
+
* *Early Access Property* Grace period for token rotation, required with grant types refresh_token
|
|
504
411
|
*/
|
|
505
412
|
refreshTokenLeeway?: pulumi.Input<number>;
|
|
506
413
|
/**
|
|
507
|
-
* Refresh token rotation behavior
|
|
414
|
+
* *Early Access Property* Refresh token rotation behavior, required with grant types refresh_token
|
|
508
415
|
*/
|
|
509
416
|
refreshTokenRotation?: pulumi.Input<string>;
|
|
510
417
|
/**
|
|
511
|
-
* List of OAuth 2.0 response type strings.
|
|
512
|
-
* values of `"code"`, `"token"`, `"idToken"`. The `grantTypes` and `responseTypes`
|
|
513
|
-
* values described are partially orthogonal, as they refer to arguments
|
|
514
|
-
* passed to different endpoints in the OAuth 2.0 protocol (opens new window).
|
|
515
|
-
* However, they are related in that the `grantTypes` available to a client
|
|
516
|
-
* influence the `responseTypes` that the client is allowed to use, and vice versa.
|
|
517
|
-
* For instance, a grantTypes value that includes authorizationCode implies a
|
|
518
|
-
* `responseTypes` value that includes code, as both values are defined as part of
|
|
519
|
-
* the OAuth 2.0 authorization code grant.
|
|
520
|
-
* See: https://developer.okta.com/docs/reference/api/apps/#add-oauth-2-0-client-application
|
|
418
|
+
* List of OAuth 2.0 response type strings.
|
|
521
419
|
*/
|
|
522
420
|
responseTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
523
421
|
/**
|
|
524
|
-
* Sign
|
|
422
|
+
* Sign on mode of application.
|
|
525
423
|
*/
|
|
526
424
|
signOnMode?: pulumi.Input<string>;
|
|
527
425
|
/**
|
|
528
|
-
*
|
|
426
|
+
* Status of application. By default, it is `ACTIVE`
|
|
529
427
|
*/
|
|
530
428
|
status?: pulumi.Input<string>;
|
|
531
429
|
/**
|
|
532
|
-
* Requested authentication method for
|
|
533
|
-
* the token endpoint. It can be set to `"none"`, `"clientSecretPost"`,
|
|
534
|
-
* `"clientSecretBasic"`, `"clientSecretJwt"`, `"privateKeyJwt"`. Use
|
|
535
|
-
* `pkceRequired` to require PKCE for your confidential clients using the
|
|
536
|
-
* Authorization Code flow. If `"tokenEndpointAuthMethod"` is `"none"`,
|
|
537
|
-
* `pkceRequired` needs to be `true`. If `pkceRequired` isn't specified when
|
|
538
|
-
* adding a new application, Okta sets it to `true` by default for `"browser"` and
|
|
539
|
-
* `"native"` application types.
|
|
540
|
-
* See https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
|
|
430
|
+
* Requested authentication method for the token endpoint.
|
|
541
431
|
*/
|
|
542
432
|
tokenEndpointAuthMethod?: pulumi.Input<string>;
|
|
543
433
|
/**
|
|
@@ -545,27 +435,27 @@ export interface OAuthState {
|
|
|
545
435
|
*/
|
|
546
436
|
tosUri?: pulumi.Input<string>;
|
|
547
437
|
/**
|
|
548
|
-
* The type of
|
|
438
|
+
* The type of client application.
|
|
549
439
|
*/
|
|
550
440
|
type?: pulumi.Input<string>;
|
|
551
441
|
/**
|
|
552
|
-
* Username template. Default:
|
|
442
|
+
* Username template. Default: `${source.login}`
|
|
553
443
|
*/
|
|
554
444
|
userNameTemplate?: pulumi.Input<string>;
|
|
555
445
|
/**
|
|
556
|
-
* Push username on update. Valid values: `
|
|
446
|
+
* Push username on update. Valid values: `PUSH` and `DONT_PUSH`
|
|
557
447
|
*/
|
|
558
448
|
userNameTemplatePushStatus?: pulumi.Input<string>;
|
|
559
449
|
/**
|
|
560
|
-
* Username template suffix
|
|
450
|
+
* Username template suffix
|
|
561
451
|
*/
|
|
562
452
|
userNameTemplateSuffix?: pulumi.Input<string>;
|
|
563
453
|
/**
|
|
564
|
-
* Username template type. Default: `
|
|
454
|
+
* Username template type. Default: `BUILT_IN`
|
|
565
455
|
*/
|
|
566
456
|
userNameTemplateType?: pulumi.Input<string>;
|
|
567
457
|
/**
|
|
568
|
-
* *Early Access Property*. Indicates if the client is allowed to use wildcard matching of
|
|
458
|
+
* *Early Access Property*. Indicates if the client is allowed to use wildcard matching of redirect_uris
|
|
569
459
|
*/
|
|
570
460
|
wildcardRedirect?: pulumi.Input<string>;
|
|
571
461
|
}
|
|
@@ -574,15 +464,15 @@ export interface OAuthState {
|
|
|
574
464
|
*/
|
|
575
465
|
export interface OAuthArgs {
|
|
576
466
|
/**
|
|
577
|
-
* Custom error page URL
|
|
467
|
+
* Custom error page URL
|
|
578
468
|
*/
|
|
579
469
|
accessibilityErrorRedirectUrl?: pulumi.Input<string>;
|
|
580
470
|
/**
|
|
581
|
-
* Custom login page
|
|
471
|
+
* Custom login page URL
|
|
582
472
|
*/
|
|
583
473
|
accessibilityLoginRedirectUrl?: pulumi.Input<string>;
|
|
584
474
|
/**
|
|
585
|
-
* Enable self
|
|
475
|
+
* Enable self service. Default is `false`
|
|
586
476
|
*/
|
|
587
477
|
accessibilitySelfService?: pulumi.Input<boolean>;
|
|
588
478
|
/**
|
|
@@ -594,31 +484,31 @@ export interface OAuthArgs {
|
|
|
594
484
|
*/
|
|
595
485
|
appLinksJson?: pulumi.Input<string>;
|
|
596
486
|
/**
|
|
597
|
-
* Application settings in JSON format
|
|
487
|
+
* Application settings in JSON format
|
|
598
488
|
*/
|
|
599
489
|
appSettingsJson?: pulumi.Input<string>;
|
|
600
490
|
/**
|
|
601
|
-
* The ID of the associated
|
|
491
|
+
* The ID of the associated app*signon*policy. If this property is removed from the application the default sign-on-policy will be associated with this application.
|
|
602
492
|
*/
|
|
603
493
|
authenticationPolicy?: pulumi.Input<string>;
|
|
604
494
|
/**
|
|
605
|
-
* Requested key rotation mode.
|
|
606
|
-
*
|
|
607
|
-
*
|
|
608
|
-
*
|
|
609
|
-
*
|
|
495
|
+
* Requested key rotation mode. If
|
|
496
|
+
* auto*key*rotation isn't specified, the client automatically opts in for Okta's
|
|
497
|
+
* key rotation. You can update this property via the API or via the administrator
|
|
498
|
+
* UI.
|
|
499
|
+
* See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object"
|
|
610
500
|
*/
|
|
611
501
|
autoKeyRotation?: pulumi.Input<boolean>;
|
|
612
502
|
/**
|
|
613
|
-
* Display auto submit toolbar
|
|
503
|
+
* Display auto submit toolbar
|
|
614
504
|
*/
|
|
615
505
|
autoSubmitToolbar?: pulumi.Input<boolean>;
|
|
616
506
|
/**
|
|
617
|
-
* The user provided OAuth client secret key value, this can be set when
|
|
507
|
+
* The user provided OAuth client secret key value, this can be set when token*endpoint*auth*method is client*secret*basic. This does nothing when `omit*secret is set to true.
|
|
618
508
|
*/
|
|
619
509
|
clientBasicSecret?: pulumi.Input<string>;
|
|
620
510
|
/**
|
|
621
|
-
* OAuth client ID. If set during creation, app is created with this id.
|
|
511
|
+
* OAuth client ID. If set during creation, app is created with this id.
|
|
622
512
|
*/
|
|
623
513
|
clientId?: pulumi.Input<string>;
|
|
624
514
|
/**
|
|
@@ -626,7 +516,7 @@ export interface OAuthArgs {
|
|
|
626
516
|
*/
|
|
627
517
|
clientUri?: pulumi.Input<string>;
|
|
628
518
|
/**
|
|
629
|
-
* Indicates whether user consent is required or implicit. Valid values:
|
|
519
|
+
* *Early Access Property*. Indicates whether user consent is required or implicit. Valid values: REQUIRED, TRUSTED. Default value is TRUSTED
|
|
630
520
|
*/
|
|
631
521
|
consentMethod?: pulumi.Input<string>;
|
|
632
522
|
/**
|
|
@@ -634,39 +524,32 @@ export interface OAuthArgs {
|
|
|
634
524
|
*/
|
|
635
525
|
enduserNote?: pulumi.Input<string>;
|
|
636
526
|
/**
|
|
637
|
-
* List of OAuth 2.0 grant types. Conditional validation params found
|
|
638
|
-
* Defaults to minimum requirements per app type. Valid values: `"authorizationCode"`, `"implicit"`, `"password"`, `"refreshToken"`, `"clientCredentials"`,
|
|
639
|
-
* `"urn:ietf:params:oauth:grant-type:saml2-bearer"` (*Early Access Property*), `"urn:ietf:params:oauth:grant-type:token-exchange"` (*Early Access Property*),
|
|
640
|
-
* `"interactionCode"` (*OIE only*).
|
|
527
|
+
* List of OAuth 2.0 grant types. Conditional validation params found here https://developer.okta.com/docs/api/resources/apps#credentials-settings-details. Defaults to minimum requirements per app type.
|
|
641
528
|
*/
|
|
642
529
|
grantTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
643
530
|
/**
|
|
644
|
-
* Groups claim for an OpenID Connect client application
|
|
531
|
+
* Groups claim for an OpenID Connect client application (argument is ignored when API auth is done with OAuth 2.0 credentials)
|
|
645
532
|
*/
|
|
646
533
|
groupsClaim?: pulumi.Input<inputs.app.OAuthGroupsClaim>;
|
|
647
534
|
/**
|
|
648
|
-
* Do not display application icon on mobile app
|
|
535
|
+
* Do not display application icon on mobile app
|
|
649
536
|
*/
|
|
650
537
|
hideIos?: pulumi.Input<boolean>;
|
|
651
538
|
/**
|
|
652
|
-
* Do not display application icon to users
|
|
539
|
+
* Do not display application icon to users
|
|
653
540
|
*/
|
|
654
541
|
hideWeb?: pulumi.Input<boolean>;
|
|
655
542
|
/**
|
|
656
|
-
* *Early Access Property*.
|
|
543
|
+
* *Early Access Property*. Enable Federation Broker Mode.
|
|
657
544
|
*/
|
|
658
545
|
implicitAssignment?: pulumi.Input<boolean>;
|
|
659
546
|
/**
|
|
660
|
-
* Indicates whether the Okta Authorization Server uses the original Okta org domain URL or a custom domain URL as the issuer of ID token for this client.
|
|
661
|
-
* Valid values: `"CUSTOM_URL"`,`"ORG_URL"` or `"DYNAMIC"`. Default is `"ORG_URL"`.
|
|
547
|
+
* *Early Access Property*. Indicates whether the Okta Authorization Server uses the original Okta org domain URL or a custom domain URL as the issuer of ID token for this client.
|
|
662
548
|
*/
|
|
663
549
|
issuerMode?: pulumi.Input<string>;
|
|
664
|
-
/**
|
|
665
|
-
* JSON Web Key set. Multiple jwks are supported[Admin Console JWK Reference](https://developer.okta.com/docs/guides/implement-oauth-for-okta-serviceapp/main/#generate-the-jwk-in-the-admin-console). Use kty=RSA e=[value] n=[value] for RSA jwks, and kty=EC x=[value] y=[value] for EC jwks
|
|
666
|
-
*/
|
|
667
550
|
jwks?: pulumi.Input<pulumi.Input<inputs.app.OAuthJwk>[]>;
|
|
668
551
|
/**
|
|
669
|
-
* URL
|
|
552
|
+
* URL reference to JWKS
|
|
670
553
|
*/
|
|
671
554
|
jwksUri?: pulumi.Input<string>;
|
|
672
555
|
/**
|
|
@@ -674,15 +557,15 @@ export interface OAuthArgs {
|
|
|
674
557
|
*/
|
|
675
558
|
label: pulumi.Input<string>;
|
|
676
559
|
/**
|
|
677
|
-
* The type of Idp-Initiated login that the client supports, if any
|
|
560
|
+
* The type of Idp-Initiated login that the client supports, if any
|
|
678
561
|
*/
|
|
679
562
|
loginMode?: pulumi.Input<string>;
|
|
680
563
|
/**
|
|
681
|
-
* List of scopes to use for the request
|
|
564
|
+
* List of scopes to use for the request
|
|
682
565
|
*/
|
|
683
566
|
loginScopes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
684
567
|
/**
|
|
685
|
-
* URI that initiates login.
|
|
568
|
+
* URI that initiates login.
|
|
686
569
|
*/
|
|
687
570
|
loginUri?: pulumi.Input<string>;
|
|
688
571
|
/**
|
|
@@ -694,15 +577,11 @@ export interface OAuthArgs {
|
|
|
694
577
|
*/
|
|
695
578
|
logoUri?: pulumi.Input<string>;
|
|
696
579
|
/**
|
|
697
|
-
* This tells the provider not manage the
|
|
580
|
+
* This tells the provider not manage the client*secret value in state. When this is false (the default), it will cause the auto-generated client*secret to be persisted in the clientSecret attribute in state. This also means that every time an update to this app is run, this value is also set on the API. If this changes from false => true, the `clientSecret` is dropped from state and the secret at the time of the apply is what remains. If this is ever changes from true => false your app will be recreated, due to the need to regenerate a secret we can store in state.
|
|
698
581
|
*/
|
|
699
582
|
omitSecret?: pulumi.Input<boolean>;
|
|
700
583
|
/**
|
|
701
|
-
* Require Proof Key for Code Exchange (PKCE) for
|
|
702
|
-
* additional verification. If `pkceRequired` isn't specified when adding a new
|
|
703
|
-
* application, Okta sets it to `true` by default for `"browser"` and `"native"`
|
|
704
|
-
* application types.
|
|
705
|
-
* See https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
|
|
584
|
+
* Require Proof Key for Code Exchange (PKCE) for additional verification key rotation mode. See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
|
|
706
585
|
*/
|
|
707
586
|
pkceRequired?: pulumi.Input<boolean>;
|
|
708
587
|
/**
|
|
@@ -710,52 +589,35 @@ export interface OAuthArgs {
|
|
|
710
589
|
*/
|
|
711
590
|
policyUri?: pulumi.Input<string>;
|
|
712
591
|
/**
|
|
713
|
-
* List of URIs for redirection after logout.
|
|
592
|
+
* List of URIs for redirection after logout. Note: see okta*app*oauth*post*logout*redirect*uri for appending to this list in a decentralized way.
|
|
714
593
|
*/
|
|
715
594
|
postLogoutRedirectUris?: pulumi.Input<pulumi.Input<string>[]>;
|
|
716
595
|
/**
|
|
717
|
-
* Custom JSON that represents an OAuth application's profile
|
|
596
|
+
* Custom JSON that represents an OAuth application's profile
|
|
718
597
|
*/
|
|
719
598
|
profile?: pulumi.Input<string>;
|
|
720
599
|
/**
|
|
721
|
-
* List of URIs for use in the redirect-based flow. This is required for all application types except service.
|
|
600
|
+
* List of URIs for use in the redirect-based flow. This is required for all application types except service. Note: see okta*app*oauth*redirect*uri for appending to this list in a decentralized way.
|
|
722
601
|
*/
|
|
723
602
|
redirectUris?: pulumi.Input<pulumi.Input<string>[]>;
|
|
724
603
|
/**
|
|
725
|
-
* Grace period for token rotation
|
|
604
|
+
* *Early Access Property* Grace period for token rotation, required with grant types refresh_token
|
|
726
605
|
*/
|
|
727
606
|
refreshTokenLeeway?: pulumi.Input<number>;
|
|
728
607
|
/**
|
|
729
|
-
* Refresh token rotation behavior
|
|
608
|
+
* *Early Access Property* Refresh token rotation behavior, required with grant types refresh_token
|
|
730
609
|
*/
|
|
731
610
|
refreshTokenRotation?: pulumi.Input<string>;
|
|
732
611
|
/**
|
|
733
|
-
* List of OAuth 2.0 response type strings.
|
|
734
|
-
* values of `"code"`, `"token"`, `"idToken"`. The `grantTypes` and `responseTypes`
|
|
735
|
-
* values described are partially orthogonal, as they refer to arguments
|
|
736
|
-
* passed to different endpoints in the OAuth 2.0 protocol (opens new window).
|
|
737
|
-
* However, they are related in that the `grantTypes` available to a client
|
|
738
|
-
* influence the `responseTypes` that the client is allowed to use, and vice versa.
|
|
739
|
-
* For instance, a grantTypes value that includes authorizationCode implies a
|
|
740
|
-
* `responseTypes` value that includes code, as both values are defined as part of
|
|
741
|
-
* the OAuth 2.0 authorization code grant.
|
|
742
|
-
* See: https://developer.okta.com/docs/reference/api/apps/#add-oauth-2-0-client-application
|
|
612
|
+
* List of OAuth 2.0 response type strings.
|
|
743
613
|
*/
|
|
744
614
|
responseTypes?: pulumi.Input<pulumi.Input<string>[]>;
|
|
745
615
|
/**
|
|
746
|
-
*
|
|
616
|
+
* Status of application. By default, it is `ACTIVE`
|
|
747
617
|
*/
|
|
748
618
|
status?: pulumi.Input<string>;
|
|
749
619
|
/**
|
|
750
|
-
* Requested authentication method for
|
|
751
|
-
* the token endpoint. It can be set to `"none"`, `"clientSecretPost"`,
|
|
752
|
-
* `"clientSecretBasic"`, `"clientSecretJwt"`, `"privateKeyJwt"`. Use
|
|
753
|
-
* `pkceRequired` to require PKCE for your confidential clients using the
|
|
754
|
-
* Authorization Code flow. If `"tokenEndpointAuthMethod"` is `"none"`,
|
|
755
|
-
* `pkceRequired` needs to be `true`. If `pkceRequired` isn't specified when
|
|
756
|
-
* adding a new application, Okta sets it to `true` by default for `"browser"` and
|
|
757
|
-
* `"native"` application types.
|
|
758
|
-
* See https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
|
|
620
|
+
* Requested authentication method for the token endpoint.
|
|
759
621
|
*/
|
|
760
622
|
tokenEndpointAuthMethod?: pulumi.Input<string>;
|
|
761
623
|
/**
|
|
@@ -763,27 +625,27 @@ export interface OAuthArgs {
|
|
|
763
625
|
*/
|
|
764
626
|
tosUri?: pulumi.Input<string>;
|
|
765
627
|
/**
|
|
766
|
-
* The type of
|
|
628
|
+
* The type of client application.
|
|
767
629
|
*/
|
|
768
630
|
type: pulumi.Input<string>;
|
|
769
631
|
/**
|
|
770
|
-
* Username template. Default:
|
|
632
|
+
* Username template. Default: `${source.login}`
|
|
771
633
|
*/
|
|
772
634
|
userNameTemplate?: pulumi.Input<string>;
|
|
773
635
|
/**
|
|
774
|
-
* Push username on update. Valid values: `
|
|
636
|
+
* Push username on update. Valid values: `PUSH` and `DONT_PUSH`
|
|
775
637
|
*/
|
|
776
638
|
userNameTemplatePushStatus?: pulumi.Input<string>;
|
|
777
639
|
/**
|
|
778
|
-
* Username template suffix
|
|
640
|
+
* Username template suffix
|
|
779
641
|
*/
|
|
780
642
|
userNameTemplateSuffix?: pulumi.Input<string>;
|
|
781
643
|
/**
|
|
782
|
-
* Username template type. Default: `
|
|
644
|
+
* Username template type. Default: `BUILT_IN`
|
|
783
645
|
*/
|
|
784
646
|
userNameTemplateType?: pulumi.Input<string>;
|
|
785
647
|
/**
|
|
786
|
-
* *Early Access Property*. Indicates if the client is allowed to use wildcard matching of
|
|
648
|
+
* *Early Access Property*. Indicates if the client is allowed to use wildcard matching of redirect_uris
|
|
787
649
|
*/
|
|
788
650
|
wildcardRedirect?: pulumi.Input<string>;
|
|
789
651
|
}
|