@pulumi/okta 4.9.0-alpha.1718344922 → 4.9.0-alpha.1718755579
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/adminRoleCustom.d.ts +105 -107
- package/adminRoleCustom.js +3 -5
- package/adminRoleCustom.js.map +1 -1
- package/adminRoleCustomAssignments.d.ts +12 -18
- package/adminRoleCustomAssignments.js +3 -6
- package/adminRoleCustomAssignments.js.map +1 -1
- package/adminRoleTargets.d.ts +14 -16
- package/adminRoleTargets.js +0 -2
- package/adminRoleTargets.js.map +1 -1
- package/app/accessPolicyAssignment.d.ts +23 -2
- package/app/accessPolicyAssignment.js +23 -2
- package/app/accessPolicyAssignment.js.map +1 -1
- package/app/autoLogin.d.ts +63 -97
- package/app/autoLogin.js +3 -37
- package/app/autoLogin.js.map +1 -1
- package/app/basicAuth.d.ts +30 -33
- package/app/basicAuth.js +4 -7
- package/app/basicAuth.js.map +1 -1
- package/app/bookmark.d.ts +30 -33
- package/app/bookmark.js +3 -6
- package/app/bookmark.js.map +1 -1
- package/app/getApp.d.ts +58 -25
- package/app/getApp.js +2 -2
- package/app/getApp.js.map +1 -1
- package/app/getMetadataSaml.d.ts +11 -5
- package/app/getMetadataSaml.js +2 -2
- package/app/getMetadataSaml.js.map +1 -1
- package/app/getOauth.d.ts +62 -34
- package/app/getOauth.js +2 -2
- package/app/getOauth.js.map +1 -1
- package/app/getSaml.d.ts +75 -56
- package/app/getSaml.js +2 -2
- package/app/getSaml.js.map +1 -1
- package/app/groupAssignment.d.ts +23 -9
- package/app/groupAssignment.js +17 -3
- package/app/groupAssignment.js.map +1 -1
- package/app/oauth.d.ts +135 -273
- package/app/oauth.js +6 -60
- package/app/oauth.js.map +1 -1
- package/app/oauthPostLogoutRedirectUri.d.ts +4 -6
- package/app/oauthPostLogoutRedirectUri.js +1 -3
- package/app/oauthPostLogoutRedirectUri.js.map +1 -1
- package/app/oauthRedirectUri.d.ts +4 -6
- package/app/oauthRedirectUri.js +1 -3
- package/app/oauthRedirectUri.js.map +1 -1
- package/app/oauthRoleAssignment.d.ts +4 -29
- package/app/oauthRoleAssignment.js +4 -29
- package/app/oauthRoleAssignment.js.map +1 -1
- package/app/saml.d.ts +161 -289
- package/app/saml.js +6 -152
- package/app/saml.js.map +1 -1
- package/app/securePasswordStore.d.ts +79 -80
- package/app/securePasswordStore.js +6 -7
- package/app/securePasswordStore.js.map +1 -1
- package/app/swa.d.ts +70 -71
- package/app/swa.js +4 -5
- package/app/swa.js.map +1 -1
- package/app/threeField.d.ts +74 -76
- package/app/threeField.js +5 -7
- package/app/threeField.js.map +1 -1
- package/app/user.d.ts +12 -17
- package/app/user.js +0 -2
- package/app/user.js.map +1 -1
- package/appGroupAssignments.d.ts +6 -8
- package/appGroupAssignments.js +3 -5
- package/appGroupAssignments.js.map +1 -1
- package/appOauthApiScope.d.ts +5 -7
- package/appOauthApiScope.js +2 -4
- package/appOauthApiScope.js.map +1 -1
- package/appSamlAppSettings.d.ts +6 -7
- package/appSamlAppSettings.js +3 -4
- package/appSamlAppSettings.js.map +1 -1
- package/appSharedCredentials.d.ts +61 -63
- package/appSharedCredentials.js +4 -6
- package/appSharedCredentials.js.map +1 -1
- package/appSignonPolicy.d.ts +3 -39
- package/appSignonPolicy.js +3 -39
- package/appSignonPolicy.js.map +1 -1
- package/appSignonPolicyRule.d.ts +69 -361
- package/appSignonPolicyRule.js +1 -278
- package/appSignonPolicyRule.js.map +1 -1
- package/appUserBaseSchemaProperty.d.ts +25 -29
- package/appUserBaseSchemaProperty.js +1 -5
- package/appUserBaseSchemaProperty.js.map +1 -1
- package/appUserSchemaProperty.d.ts +51 -41
- package/appUserSchemaProperty.js +0 -2
- package/appUserSchemaProperty.js.map +1 -1
- package/auth/getServer.d.ts +11 -11
- package/auth/getServer.js +2 -2
- package/auth/getServerPolicy.d.ts +15 -9
- package/auth/getServerPolicy.js +2 -2
- package/auth/getServerPolicy.js.map +1 -1
- package/auth/getServerScopes.d.ts +8 -5
- package/auth/getServerScopes.js +2 -2
- package/auth/getServerScopes.js.map +1 -1
- package/auth/server.d.ts +15 -19
- package/auth/server.js +1 -5
- package/auth/server.js.map +1 -1
- package/auth/serverClaim.d.ts +13 -17
- package/auth/serverClaim.js +1 -5
- package/auth/serverClaim.js.map +1 -1
- package/auth/serverPolicy.d.ts +10 -14
- package/auth/serverPolicy.js +1 -5
- package/auth/serverPolicy.js.map +1 -1
- package/auth/serverPolicyClaim.d.ts +50 -66
- package/auth/serverPolicyClaim.js +0 -25
- package/auth/serverPolicyClaim.js.map +1 -1
- package/auth/serverPolicyRule.d.ts +32 -43
- package/auth/serverPolicyRule.js +0 -2
- package/auth/serverPolicyRule.js.map +1 -1
- package/auth/serverScope.d.ts +16 -20
- package/auth/serverScope.js +1 -5
- package/auth/serverScope.js.map +1 -1
- package/authServerClaimDefault.d.ts +10 -25
- package/authServerClaimDefault.js +0 -9
- package/authServerClaimDefault.js.map +1 -1
- package/authServerDefault.d.ts +15 -19
- package/authServerDefault.js +1 -5
- package/authServerDefault.js.map +1 -1
- package/authenticator.d.ts +53 -61
- package/authenticator.js +11 -11
- package/authenticator.js.map +1 -1
- package/behaviour.d.ts +21 -41
- package/behaviour.js +0 -2
- package/behaviour.js.map +1 -1
- package/brand.d.ts +23 -22
- package/brand.js +8 -4
- package/brand.js.map +1 -1
- package/captcha.d.ts +15 -17
- package/captcha.js +3 -5
- package/captcha.js.map +1 -1
- package/captchaOrgWideSettings.d.ts +8 -43
- package/captchaOrgWideSettings.js +2 -37
- package/captchaOrgWideSettings.js.map +1 -1
- package/domain.d.ts +13 -21
- package/domain.js +0 -2
- package/domain.js.map +1 -1
- package/domainCertificate.d.ts +17 -24
- package/domainCertificate.js +2 -9
- package/domainCertificate.js.map +1 -1
- package/domainVerification.d.ts +4 -10
- package/domainVerification.js +1 -7
- package/domainVerification.js.map +1 -1
- package/emailCustomization.d.ts +38 -222
- package/emailCustomization.js +29 -33
- package/emailCustomization.js.map +1 -1
- package/emailDomain.d.ts +4 -8
- package/emailDomain.js +0 -4
- package/emailDomain.js.map +1 -1
- package/emailDomainVerification.d.ts +3 -7
- package/emailDomainVerification.js +0 -4
- package/emailDomainVerification.js.map +1 -1
- package/emailSender.d.ts +15 -17
- package/emailSender.js +2 -4
- package/emailSender.js.map +1 -1
- package/emailSenderVerification.d.ts +5 -9
- package/emailSenderVerification.js +2 -6
- package/emailSenderVerification.js.map +1 -1
- package/eventHook.d.ts +16 -11
- package/eventHook.js +1 -5
- package/eventHook.js.map +1 -1
- package/eventHookVerification.d.ts +4 -10
- package/eventHookVerification.js +1 -7
- package/eventHookVerification.js.map +1 -1
- package/factor/factor.d.ts +4 -9
- package/factor/factor.js +1 -3
- package/factor/factor.js.map +1 -1
- package/factorTotp.d.ts +12 -21
- package/factorTotp.js +3 -3
- package/factorTotp.js.map +1 -1
- package/getAppGroupAssignments.d.ts +6 -6
- package/getAppGroupAssignments.js +2 -2
- package/getAppSignonPolicy.d.ts +16 -6
- package/getAppSignonPolicy.js +8 -4
- package/getAppSignonPolicy.js.map +1 -1
- package/getAppUserAssignments.d.ts +6 -6
- package/getAppUserAssignments.js +2 -2
- package/getAuthServerClaim.d.ts +15 -12
- package/getAuthServerClaim.js +2 -2
- package/getAuthServerClaim.js.map +1 -1
- package/getAuthServerClaims.d.ts +8 -5
- package/getAuthServerClaims.js +2 -2
- package/getAuthServerClaims.js.map +1 -1
- package/getAuthenticator.d.ts +24 -26
- package/getAuthenticator.js +14 -22
- package/getAuthenticator.js.map +1 -1
- package/getBehaviour.d.ts +6 -8
- package/getBehaviour.js +2 -2
- package/getBehaviour.js.map +1 -1
- package/getBehaviours.d.ts +7 -7
- package/getBehaviours.js +2 -2
- package/getBrand.d.ts +9 -6
- package/getBrand.js +2 -2
- package/getBrand.js.map +1 -1
- package/getBrands.d.ts +2 -2
- package/getBrands.js +2 -2
- package/getDomain.d.ts +11 -14
- package/getDomain.js +2 -8
- package/getDomain.js.map +1 -1
- package/getEmailCustomization.d.ts +14 -9
- package/getEmailCustomization.js +2 -6
- package/getEmailCustomization.js.map +1 -1
- package/getEmailCustomizations.d.ts +11 -9
- package/getEmailCustomizations.js +2 -6
- package/getEmailCustomizations.js.map +1 -1
- package/getGroups.d.ts +11 -25
- package/getGroups.js +2 -2
- package/getGroups.js.map +1 -1
- package/getLogStream.d.ts +8 -39
- package/getLogStream.js +2 -24
- package/getLogStream.js.map +1 -1
- package/getNetworkZone.d.ts +12 -12
- package/getNetworkZone.js +2 -2
- package/getOrgMetadata.d.ts +0 -22
- package/getOrgMetadata.js +0 -22
- package/getOrgMetadata.js.map +1 -1
- package/getRoleSubscription.d.ts +13 -35
- package/getRoleSubscription.js +2 -2
- package/getRoleSubscription.js.map +1 -1
- package/getTemplate.d.ts +10 -8
- package/getTemplate.js +2 -6
- package/getTemplate.js.map +1 -1
- package/getTemplates.d.ts +6 -7
- package/getTemplates.js +2 -6
- package/getTemplates.js.map +1 -1
- package/getTheme.d.ts +14 -12
- package/getTheme.js +2 -6
- package/getTheme.js.map +1 -1
- package/getThemes.d.ts +6 -7
- package/getThemes.js +2 -6
- package/getThemes.js.map +1 -1
- package/getTrustedOrigins.d.ts +7 -4
- package/getTrustedOrigins.js +2 -2
- package/getTrustedOrigins.js.map +1 -1
- package/getUserSecurityQuestions.d.ts +4 -8
- package/getUserSecurityQuestions.js +0 -4
- package/getUserSecurityQuestions.js.map +1 -1
- package/group/getEveryoneGroup.d.ts +10 -5
- package/group/getEveryoneGroup.js +4 -2
- package/group/getEveryoneGroup.js.map +1 -1
- package/group/getGroup.d.ts +17 -26
- package/group/getGroup.js +2 -2
- package/group/getGroup.js.map +1 -1
- package/group/getRule.d.ts +9 -9
- package/group/getRule.js +2 -2
- package/group/group.d.ts +4 -36
- package/group/group.js +1 -33
- package/group/group.js.map +1 -1
- package/group/role.d.ts +37 -81
- package/group/role.js +1 -6
- package/group/role.js.map +1 -1
- package/group/rule.d.ts +12 -20
- package/group/rule.js +0 -2
- package/group/rule.js.map +1 -1
- package/groupMemberships.d.ts +8 -10
- package/groupMemberships.js +2 -4
- package/groupMemberships.js.map +1 -1
- package/groupSchemaProperty.d.ts +57 -59
- package/groupSchemaProperty.js +0 -2
- package/groupSchemaProperty.js.map +1 -1
- package/idp/getMetadataSaml.d.ts +9 -6
- package/idp/getMetadataSaml.js +2 -2
- package/idp/getMetadataSaml.js.map +1 -1
- package/idp/getOidc.d.ts +9 -9
- package/idp/getOidc.js +2 -2
- package/idp/getSaml.d.ts +16 -13
- package/idp/getSaml.js +2 -2
- package/idp/getSaml.js.map +1 -1
- package/idp/getSocial.d.ts +8 -2
- package/idp/getSocial.js +2 -2
- package/idp/getSocial.js.map +1 -1
- package/idp/oidc.d.ts +70 -62
- package/idp/oidc.js +3 -5
- package/idp/oidc.js.map +1 -1
- package/idp/saml.d.ts +64 -86
- package/idp/saml.js +1 -5
- package/idp/saml.js.map +1 -1
- package/idp/samlKey.d.ts +3 -5
- package/idp/samlKey.js +0 -2
- package/idp/samlKey.js.map +1 -1
- package/idp/social.d.ts +99 -69
- package/idp/social.js +11 -5
- package/idp/social.js.map +1 -1
- package/inline/hook.d.ts +4 -26
- package/inline/hook.js +1 -5
- package/inline/hook.js.map +1 -1
- package/linkDefinition.d.ts +2 -3
- package/linkDefinition.js +2 -3
- package/linkDefinition.js.map +1 -1
- package/linkValue.d.ts +7 -9
- package/linkValue.js +1 -3
- package/linkValue.js.map +1 -1
- package/logStream.d.ts +32 -27
- package/logStream.js +23 -9
- package/logStream.js.map +1 -1
- package/network/zone.d.ts +25 -66
- package/network/zone.js +1 -39
- package/network/zone.js.map +1 -1
- package/orgConfiguration.d.ts +4 -9
- package/orgConfiguration.js +1 -3
- package/orgConfiguration.js.map +1 -1
- package/orgSupport.d.ts +4 -7
- package/orgSupport.js +1 -4
- package/orgSupport.js.map +1 -1
- package/package.json +3 -3
- package/policy/getDefaultPolicy.d.ts +9 -7
- package/policy/getDefaultPolicy.js +6 -2
- package/policy/getDefaultPolicy.js.map +1 -1
- package/policy/getPolicy.d.ts +11 -26
- package/policy/getPolicy.js +2 -2
- package/policy/getPolicy.js.map +1 -1
- package/policy/mfa.d.ts +18 -220
- package/policy/mfa.js +0 -10
- package/policy/mfa.js.map +1 -1
- package/policy/password.d.ts +91 -95
- package/policy/password.js +1 -5
- package/policy/password.js.map +1 -1
- package/policy/ruleIdpDiscovery.d.ts +111 -93
- package/policy/ruleIdpDiscovery.js +48 -57
- package/policy/ruleIdpDiscovery.js.map +1 -1
- package/policy/ruleMfa.d.ts +40 -30
- package/policy/ruleMfa.js +1 -3
- package/policy/ruleMfa.js.map +1 -1
- package/policy/rulePassword.d.ts +34 -38
- package/policy/rulePassword.js +1 -5
- package/policy/rulePassword.js.map +1 -1
- package/policy/ruleSignon.d.ts +94 -85
- package/policy/ruleSignon.js +1 -4
- package/policy/ruleSignon.js.map +1 -1
- package/policy/signon.d.ts +16 -20
- package/policy/signon.js +1 -5
- package/policy/signon.js.map +1 -1
- package/policyMfaDefault.d.ts +15 -214
- package/policyMfaDefault.js +2 -9
- package/policyMfaDefault.js.map +1 -1
- package/policyPasswordDefault.d.ts +85 -101
- package/policyPasswordDefault.js +1 -5
- package/policyPasswordDefault.js.map +1 -1
- package/policyProfileEnrollment.d.ts +8 -9
- package/policyProfileEnrollment.js +2 -3
- package/policyProfileEnrollment.js.map +1 -1
- package/policyProfileEnrollmentApps.d.ts +8 -11
- package/policyProfileEnrollmentApps.js +3 -6
- package/policyProfileEnrollmentApps.js.map +1 -1
- package/policyRuleProfileEnrollment.d.ts +42 -31
- package/policyRuleProfileEnrollment.js +2 -3
- package/policyRuleProfileEnrollment.js.map +1 -1
- package/profile/mapping.d.ts +19 -34
- package/profile/mapping.js +4 -4
- package/profile/mapping.js.map +1 -1
- package/rateLimiting.d.ts +8 -17
- package/rateLimiting.js +2 -5
- package/rateLimiting.js.map +1 -1
- package/resourceSet.d.ts +18 -26
- package/resourceSet.js +9 -14
- package/resourceSet.js.map +1 -1
- package/roleSubscription.d.ts +35 -86
- package/roleSubscription.js +2 -2
- package/roleSubscription.js.map +1 -1
- package/securityNotificationEmails.d.ts +4 -7
- package/securityNotificationEmails.js +4 -7
- package/securityNotificationEmails.js.map +1 -1
- package/templateSms.d.ts +4 -8
- package/templateSms.js +1 -5
- package/templateSms.js.map +1 -1
- package/theme.d.ts +46 -46
- package/theme.js +2 -2
- package/threatInsightSettings.d.ts +7 -27
- package/threatInsightSettings.js +1 -3
- package/threatInsightSettings.js.map +1 -1
- package/trustedorigin/origin.d.ts +13 -17
- package/trustedorigin/origin.js +1 -5
- package/trustedorigin/origin.js.map +1 -1
- package/types/input.d.ts +65 -162
- package/types/output.d.ts +75 -275
- package/user/getUser.d.ts +32 -104
- package/user/getUser.js +2 -2
- package/user/getUser.js.map +1 -1
- package/user/getUserProfileMappingSource.d.ts +9 -7
- package/user/getUserProfileMappingSource.js +6 -4
- package/user/getUserProfileMappingSource.js.map +1 -1
- package/user/getUserType.d.ts +7 -7
- package/user/getUserType.js +2 -2
- package/user/getUsers.d.ts +95 -37
- package/user/getUsers.js +64 -24
- package/user/getUsers.js.map +1 -1
- package/user/user.d.ts +160 -209
- package/user/user.js +43 -65
- package/user/user.js.map +1 -1
- package/user/userType.d.ts +1 -5
- package/user/userType.js +1 -5
- package/user/userType.js.map +1 -1
- package/userAdminRoles.d.ts +10 -17
- package/userAdminRoles.js +1 -5
- package/userAdminRoles.js.map +1 -1
- package/userBaseSchemaProperty.d.ts +26 -34
- package/userBaseSchemaProperty.js +2 -10
- package/userBaseSchemaProperty.js.map +1 -1
- package/userFactorQuestion.d.ts +1 -5
- package/userFactorQuestion.js +1 -5
- package/userFactorQuestion.js.map +1 -1
- package/userGroupMemberships.d.ts +3 -3
- package/userSchemaProperty.d.ts +57 -56
- package/userSchemaProperty.js +0 -8
- package/userSchemaProperty.js.map +1 -1
package/app/saml.d.ts
CHANGED
|
@@ -3,164 +3,18 @@ import * as inputs from "../types/input";
|
|
|
3
3
|
import * as outputs from "../types/output";
|
|
4
4
|
/**
|
|
5
5
|
* This resource allows you to create and configure a SAML Application.
|
|
6
|
-
*
|
|
7
|
-
*
|
|
8
|
-
* activated or deactivated in accordance with the `status` change. Then, all
|
|
6
|
+
* > During an apply if there is change in 'status' the app will first be
|
|
7
|
+
* activated or deactivated in accordance with the 'status' change. Then, all
|
|
9
8
|
* other arguments that changed will be applied.
|
|
10
9
|
*
|
|
11
|
-
* > If you receive the error
|
|
12
|
-
* you are requesting
|
|
13
|
-
* request feature flag
|
|
14
|
-
*
|
|
15
|
-
* ## Example Usage
|
|
16
|
-
*
|
|
17
|
-
* ```typescript
|
|
18
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
19
|
-
* import * as okta from "@pulumi/okta";
|
|
20
|
-
*
|
|
21
|
-
* const example = new okta.app.Saml("example", {
|
|
22
|
-
* label: "example",
|
|
23
|
-
* ssoUrl: "https://example.com",
|
|
24
|
-
* recipient: "https://example.com",
|
|
25
|
-
* destination: "https://example.com",
|
|
26
|
-
* audience: "https://example.com/audience",
|
|
27
|
-
* subjectNameIdTemplate: "${user.userName}",
|
|
28
|
-
* subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
|
|
29
|
-
* responseSigned: true,
|
|
30
|
-
* signatureAlgorithm: "RSA_SHA256",
|
|
31
|
-
* digestAlgorithm: "SHA256",
|
|
32
|
-
* honorForceAuthn: false,
|
|
33
|
-
* authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
|
|
34
|
-
* attributeStatements: [{
|
|
35
|
-
* type: "GROUP",
|
|
36
|
-
* name: "groups",
|
|
37
|
-
* filterType: "REGEX",
|
|
38
|
-
* filterValue: ".*",
|
|
39
|
-
* }],
|
|
40
|
-
* });
|
|
41
|
-
* ```
|
|
42
|
-
*
|
|
43
|
-
* ### With inline hook
|
|
44
|
-
*
|
|
45
|
-
* ```typescript
|
|
46
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
47
|
-
* import * as okta from "@pulumi/okta";
|
|
48
|
-
*
|
|
49
|
-
* const test = new okta.inline.Hook("test", {
|
|
50
|
-
* name: "testAcc_replace_with_uuid",
|
|
51
|
-
* status: "ACTIVE",
|
|
52
|
-
* type: "com.okta.saml.tokens.transform",
|
|
53
|
-
* version: "1.0.2",
|
|
54
|
-
* channel: {
|
|
55
|
-
* type: "HTTP",
|
|
56
|
-
* version: "1.0.0",
|
|
57
|
-
* uri: "https://example.com/test1",
|
|
58
|
-
* method: "POST",
|
|
59
|
-
* },
|
|
60
|
-
* auth: {
|
|
61
|
-
* key: "Authorization",
|
|
62
|
-
* type: "HEADER",
|
|
63
|
-
* value: "secret",
|
|
64
|
-
* },
|
|
65
|
-
* });
|
|
66
|
-
* const testSaml = new okta.app.Saml("test", {
|
|
67
|
-
* label: "testAcc_replace_with_uuid",
|
|
68
|
-
* ssoUrl: "https://google.com",
|
|
69
|
-
* recipient: "https://here.com",
|
|
70
|
-
* destination: "https://its-about-the-journey.com",
|
|
71
|
-
* audience: "https://audience.com",
|
|
72
|
-
* subjectNameIdTemplate: "${user.userName}",
|
|
73
|
-
* subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
|
|
74
|
-
* responseSigned: true,
|
|
75
|
-
* signatureAlgorithm: "RSA_SHA256",
|
|
76
|
-
* digestAlgorithm: "SHA256",
|
|
77
|
-
* honorForceAuthn: false,
|
|
78
|
-
* authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
|
|
79
|
-
* inlineHookId: test.id,
|
|
80
|
-
* attributeStatements: [{
|
|
81
|
-
* type: "GROUP",
|
|
82
|
-
* name: "groups",
|
|
83
|
-
* filterType: "REGEX",
|
|
84
|
-
* filterValue: ".*",
|
|
85
|
-
* }],
|
|
86
|
-
* }, {
|
|
87
|
-
* dependsOn: [test],
|
|
88
|
-
* });
|
|
89
|
-
* ```
|
|
90
|
-
*
|
|
91
|
-
* ### Pre-configured app with SAML 1.1 sign-on mode
|
|
92
|
-
*
|
|
93
|
-
* ```typescript
|
|
94
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
95
|
-
* import * as okta from "@pulumi/okta";
|
|
96
|
-
*
|
|
97
|
-
* const test = new okta.app.Saml("test", {
|
|
98
|
-
* appSettingsJson: `{
|
|
99
|
-
* "groupFilter": "app1.*",
|
|
100
|
-
* "siteURL": "https://www.okta.com"
|
|
101
|
-
* }
|
|
102
|
-
* `,
|
|
103
|
-
* label: "SharePoint (On-Premise)",
|
|
104
|
-
* preconfiguredApp: "sharepoint_onpremise",
|
|
105
|
-
* samlVersion: "1.1",
|
|
106
|
-
* status: "ACTIVE",
|
|
107
|
-
* userNameTemplate: "${source.login}",
|
|
108
|
-
* userNameTemplateType: "BUILT_IN",
|
|
109
|
-
* });
|
|
110
|
-
* ```
|
|
111
|
-
*
|
|
112
|
-
* ### Pre-configured app with SAML 1.1 sign-on mode, `appSettingsJson` and `appLinksJson`
|
|
113
|
-
*
|
|
114
|
-
* ```typescript
|
|
115
|
-
* import * as pulumi from "@pulumi/pulumi";
|
|
116
|
-
* import * as okta from "@pulumi/okta";
|
|
117
|
-
*
|
|
118
|
-
* const office365 = new okta.app.Saml("office365", {
|
|
119
|
-
* preconfiguredApp: "office365",
|
|
120
|
-
* label: "Microsoft Office 365",
|
|
121
|
-
* status: "ACTIVE",
|
|
122
|
-
* samlVersion: "1.1",
|
|
123
|
-
* appSettingsJson: ` {
|
|
124
|
-
* "wsFedConfigureType": "AUTO",
|
|
125
|
-
* "windowsTransportEnabled": false,
|
|
126
|
-
* "domain": "okta.com",
|
|
127
|
-
* "msftTenant": "okta",
|
|
128
|
-
* "domains": [],
|
|
129
|
-
* "requireAdminConsent": false
|
|
130
|
-
* }
|
|
131
|
-
* `,
|
|
132
|
-
* appLinksJson: ` {
|
|
133
|
-
* "calendar": false,
|
|
134
|
-
* "crm": false,
|
|
135
|
-
* "delve": false,
|
|
136
|
-
* "excel": false,
|
|
137
|
-
* "forms": false,
|
|
138
|
-
* "mail": false,
|
|
139
|
-
* "newsfeed": false,
|
|
140
|
-
* "onedrive": false,
|
|
141
|
-
* "people": false,
|
|
142
|
-
* "planner": false,
|
|
143
|
-
* "powerbi": false,
|
|
144
|
-
* "powerpoint": false,
|
|
145
|
-
* "sites": false,
|
|
146
|
-
* "sway": false,
|
|
147
|
-
* "tasks": false,
|
|
148
|
-
* "teams": false,
|
|
149
|
-
* "video": false,
|
|
150
|
-
* "word": false,
|
|
151
|
-
* "yammer": false,
|
|
152
|
-
* "login": true
|
|
153
|
-
* }
|
|
154
|
-
* `,
|
|
155
|
-
* });
|
|
156
|
-
* ```
|
|
10
|
+
* > If you receive the error 'You do not have permission to access the feature
|
|
11
|
+
* you are requesting' contact support and
|
|
12
|
+
* request feature flag 'ADVANCED_SSO' be applied to your org.
|
|
157
13
|
*
|
|
158
14
|
* ## Import
|
|
159
15
|
*
|
|
160
|
-
* A SAML App can be imported via the Okta ID.
|
|
161
|
-
*
|
|
162
16
|
* ```sh
|
|
163
|
-
* $ pulumi import okta:app/saml:Saml example <app id>
|
|
17
|
+
* $ pulumi import okta:app/saml:Saml example <app id>
|
|
164
18
|
* ```
|
|
165
19
|
*/
|
|
166
20
|
export declare class Saml extends pulumi.CustomResource {
|
|
@@ -180,15 +34,15 @@ export declare class Saml extends pulumi.CustomResource {
|
|
|
180
34
|
*/
|
|
181
35
|
static isInstance(obj: any): obj is Saml;
|
|
182
36
|
/**
|
|
183
|
-
* Custom error page URL
|
|
37
|
+
* Custom error page URL
|
|
184
38
|
*/
|
|
185
39
|
readonly accessibilityErrorRedirectUrl: pulumi.Output<string | undefined>;
|
|
186
40
|
/**
|
|
187
|
-
* Custom login page
|
|
41
|
+
* Custom login page URL
|
|
188
42
|
*/
|
|
189
43
|
readonly accessibilityLoginRedirectUrl: pulumi.Output<string | undefined>;
|
|
190
44
|
/**
|
|
191
|
-
* Enable self
|
|
45
|
+
* Enable self service. Default is `false`
|
|
192
46
|
*/
|
|
193
47
|
readonly accessibilitySelfService: pulumi.Output<boolean | undefined>;
|
|
194
48
|
/**
|
|
@@ -204,27 +58,24 @@ export declare class Saml extends pulumi.CustomResource {
|
|
|
204
58
|
*/
|
|
205
59
|
readonly appLinksJson: pulumi.Output<string | undefined>;
|
|
206
60
|
/**
|
|
207
|
-
* Application settings in JSON format
|
|
61
|
+
* Application settings in JSON format
|
|
208
62
|
*/
|
|
209
63
|
readonly appSettingsJson: pulumi.Output<string | undefined>;
|
|
210
64
|
/**
|
|
211
|
-
* Determines whether the SAML assertion is digitally signed
|
|
65
|
+
* Determines whether the SAML assertion is digitally signed
|
|
212
66
|
*/
|
|
213
67
|
readonly assertionSigned: pulumi.Output<boolean | undefined>;
|
|
214
|
-
/**
|
|
215
|
-
* List of SAML Attribute statements.
|
|
216
|
-
*/
|
|
217
68
|
readonly attributeStatements: pulumi.Output<outputs.app.SamlAttributeStatement[] | undefined>;
|
|
218
69
|
/**
|
|
219
|
-
* Audience
|
|
70
|
+
* Audience Restriction
|
|
220
71
|
*/
|
|
221
72
|
readonly audience: pulumi.Output<string | undefined>;
|
|
222
73
|
/**
|
|
223
|
-
* The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.
|
|
74
|
+
* The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.y
|
|
224
75
|
*/
|
|
225
|
-
readonly authenticationPolicy: pulumi.Output<string
|
|
76
|
+
readonly authenticationPolicy: pulumi.Output<string>;
|
|
226
77
|
/**
|
|
227
|
-
* Identifies the SAML authentication context class for the assertion’s authentication statement
|
|
78
|
+
* Identifies the SAML authentication context class for the assertion’s authentication statement
|
|
228
79
|
*/
|
|
229
80
|
readonly authnContextClassRef: pulumi.Output<string | undefined>;
|
|
230
81
|
/**
|
|
@@ -232,7 +83,7 @@ export declare class Saml extends pulumi.CustomResource {
|
|
|
232
83
|
*/
|
|
233
84
|
readonly autoSubmitToolbar: pulumi.Output<boolean | undefined>;
|
|
234
85
|
/**
|
|
235
|
-
*
|
|
86
|
+
* cert from SAML XML metadata payload
|
|
236
87
|
*/
|
|
237
88
|
readonly certificate: pulumi.Output<string>;
|
|
238
89
|
/**
|
|
@@ -240,15 +91,15 @@ export declare class Saml extends pulumi.CustomResource {
|
|
|
240
91
|
*/
|
|
241
92
|
readonly defaultRelayState: pulumi.Output<string | undefined>;
|
|
242
93
|
/**
|
|
243
|
-
* Identifies the location where the SAML response is intended to be sent inside the SAML assertion
|
|
94
|
+
* Identifies the location where the SAML response is intended to be sent inside of the SAML assertion
|
|
244
95
|
*/
|
|
245
96
|
readonly destination: pulumi.Output<string | undefined>;
|
|
246
97
|
/**
|
|
247
|
-
* Determines the digest algorithm used to digitally sign the SAML assertion and response
|
|
98
|
+
* Determines the digest algorithm used to digitally sign the SAML assertion and response
|
|
248
99
|
*/
|
|
249
100
|
readonly digestAlgorithm: pulumi.Output<string | undefined>;
|
|
250
101
|
/**
|
|
251
|
-
*
|
|
102
|
+
* The url that can be used to embed this application in other portals.
|
|
252
103
|
*/
|
|
253
104
|
readonly embedUrl: pulumi.Output<string>;
|
|
254
105
|
/**
|
|
@@ -256,23 +107,23 @@ export declare class Saml extends pulumi.CustomResource {
|
|
|
256
107
|
*/
|
|
257
108
|
readonly enduserNote: pulumi.Output<string | undefined>;
|
|
258
109
|
/**
|
|
259
|
-
* Entity ID, the ID portion of the
|
|
110
|
+
* Entity ID, the ID portion of the entity_url
|
|
260
111
|
*/
|
|
261
112
|
readonly entityKey: pulumi.Output<string>;
|
|
262
113
|
/**
|
|
263
|
-
* Entity URL for instance
|
|
114
|
+
* Entity URL for instance http://www.okta.com/exk1fcia6d6EMsf331d8
|
|
264
115
|
*/
|
|
265
116
|
readonly entityUrl: pulumi.Output<string>;
|
|
266
117
|
/**
|
|
267
|
-
* features
|
|
118
|
+
* features to enable
|
|
268
119
|
*/
|
|
269
120
|
readonly features: pulumi.Output<string[]>;
|
|
270
121
|
/**
|
|
271
|
-
* Do not display application icon on mobile app
|
|
122
|
+
* Do not display application icon on mobile app
|
|
272
123
|
*/
|
|
273
124
|
readonly hideIos: pulumi.Output<boolean | undefined>;
|
|
274
125
|
/**
|
|
275
|
-
* Do not display application icon to users
|
|
126
|
+
* Do not display application icon to users
|
|
276
127
|
*/
|
|
277
128
|
readonly hideWeb: pulumi.Output<boolean | undefined>;
|
|
278
129
|
/**
|
|
@@ -280,31 +131,31 @@ export declare class Saml extends pulumi.CustomResource {
|
|
|
280
131
|
*/
|
|
281
132
|
readonly honorForceAuthn: pulumi.Output<boolean | undefined>;
|
|
282
133
|
/**
|
|
283
|
-
*
|
|
134
|
+
* urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Post location from the SAML metadata.
|
|
284
135
|
*/
|
|
285
136
|
readonly httpPostBinding: pulumi.Output<string>;
|
|
286
137
|
/**
|
|
287
|
-
*
|
|
138
|
+
* urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect location from the SAML metadata.
|
|
288
139
|
*/
|
|
289
140
|
readonly httpRedirectBinding: pulumi.Output<string>;
|
|
290
141
|
/**
|
|
291
|
-
* SAML issuer ID
|
|
142
|
+
* SAML issuer ID
|
|
292
143
|
*/
|
|
293
144
|
readonly idpIssuer: pulumi.Output<string | undefined>;
|
|
294
145
|
/**
|
|
295
|
-
*
|
|
146
|
+
* *Early Access Property*. Enable Federation Broker Mode.
|
|
296
147
|
*/
|
|
297
148
|
readonly implicitAssignment: pulumi.Output<boolean | undefined>;
|
|
298
149
|
/**
|
|
299
|
-
* Saml Inline Hook
|
|
150
|
+
* Saml Inline Hook setting
|
|
300
151
|
*/
|
|
301
152
|
readonly inlineHookId: pulumi.Output<string | undefined>;
|
|
302
153
|
/**
|
|
303
|
-
* Certificate
|
|
154
|
+
* Certificate ID
|
|
304
155
|
*/
|
|
305
156
|
readonly keyId: pulumi.Output<string>;
|
|
306
157
|
/**
|
|
307
|
-
* Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid
|
|
158
|
+
* Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid`
|
|
308
159
|
*/
|
|
309
160
|
readonly keyName: pulumi.Output<string | undefined>;
|
|
310
161
|
/**
|
|
@@ -312,11 +163,11 @@ export declare class Saml extends pulumi.CustomResource {
|
|
|
312
163
|
*/
|
|
313
164
|
readonly keyYearsValid: pulumi.Output<number | undefined>;
|
|
314
165
|
/**
|
|
315
|
-
*
|
|
166
|
+
* Application keys
|
|
316
167
|
*/
|
|
317
168
|
readonly keys: pulumi.Output<outputs.app.SamlKey[]>;
|
|
318
169
|
/**
|
|
319
|
-
*
|
|
170
|
+
* The Application's display name.
|
|
320
171
|
*/
|
|
321
172
|
readonly label: pulumi.Output<string>;
|
|
322
173
|
/**
|
|
@@ -324,27 +175,36 @@ export declare class Saml extends pulumi.CustomResource {
|
|
|
324
175
|
*/
|
|
325
176
|
readonly logo: pulumi.Output<string | undefined>;
|
|
326
177
|
/**
|
|
327
|
-
*
|
|
178
|
+
* URL of the application's logo
|
|
328
179
|
*/
|
|
329
180
|
readonly logoUrl: pulumi.Output<string>;
|
|
330
181
|
/**
|
|
331
|
-
*
|
|
182
|
+
* SAML xml metadata payload
|
|
332
183
|
*/
|
|
333
184
|
readonly metadata: pulumi.Output<string>;
|
|
334
185
|
/**
|
|
335
|
-
* SAML xml metadata URL
|
|
186
|
+
* SAML xml metadata URL
|
|
336
187
|
*/
|
|
337
188
|
readonly metadataUrl: pulumi.Output<string>;
|
|
338
189
|
/**
|
|
339
|
-
* Name
|
|
190
|
+
* Name of the app.
|
|
340
191
|
*/
|
|
341
192
|
readonly name: pulumi.Output<string>;
|
|
342
193
|
/**
|
|
343
|
-
*
|
|
194
|
+
* Name of application from the Okta Integration Network. For instance 'slack'. If not included a custom app will be created. If not provided the following arguments are required:
|
|
195
|
+
* 'sso*url'
|
|
196
|
+
* 'recipient'
|
|
197
|
+
* 'destination'
|
|
198
|
+
* 'audience'
|
|
199
|
+
* 'subject*name*id*template'
|
|
200
|
+
* 'subject*name*id*format'
|
|
201
|
+
* 'signature*algorithm'
|
|
202
|
+
* 'digest*algorithm'
|
|
203
|
+
* 'authn*context*class*ref'
|
|
344
204
|
*/
|
|
345
205
|
readonly preconfiguredApp: pulumi.Output<string | undefined>;
|
|
346
206
|
/**
|
|
347
|
-
* The location where the app may present the SAML assertion
|
|
207
|
+
* The location where the app may present the SAML assertion
|
|
348
208
|
*/
|
|
349
209
|
readonly recipient: pulumi.Output<string | undefined>;
|
|
350
210
|
/**
|
|
@@ -352,7 +212,7 @@ export declare class Saml extends pulumi.CustomResource {
|
|
|
352
212
|
*/
|
|
353
213
|
readonly requestCompressed: pulumi.Output<boolean | undefined>;
|
|
354
214
|
/**
|
|
355
|
-
* Determines whether the SAML auth response message is digitally signed
|
|
215
|
+
* Determines whether the SAML auth response message is digitally signed
|
|
356
216
|
*/
|
|
357
217
|
readonly responseSigned: pulumi.Output<boolean | undefined>;
|
|
358
218
|
/**
|
|
@@ -360,39 +220,39 @@ export declare class Saml extends pulumi.CustomResource {
|
|
|
360
220
|
*/
|
|
361
221
|
readonly samlSignedRequestEnabled: pulumi.Output<boolean | undefined>;
|
|
362
222
|
/**
|
|
363
|
-
* SAML version for the app's sign-on mode. Valid values are: `
|
|
223
|
+
* SAML version for the app's sign-on mode. Valid values are: `2.0` or `1.1`. Default is `2.0`
|
|
364
224
|
*/
|
|
365
225
|
readonly samlVersion: pulumi.Output<string | undefined>;
|
|
366
226
|
/**
|
|
367
|
-
* Sign
|
|
227
|
+
* Sign on mode of application.
|
|
368
228
|
*/
|
|
369
229
|
readonly signOnMode: pulumi.Output<string>;
|
|
370
230
|
/**
|
|
371
|
-
* Signature algorithm used to digitally sign the assertion and response
|
|
231
|
+
* Signature algorithm used to digitally sign the assertion and response
|
|
372
232
|
*/
|
|
373
233
|
readonly signatureAlgorithm: pulumi.Output<string | undefined>;
|
|
374
234
|
/**
|
|
375
|
-
* x509 encoded certificate that the Service Provider uses to sign Single Logout requests.
|
|
235
|
+
* x509 encoded certificate that the Service Provider uses to sign Single Logout requests. Note: should be provided without `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`, see [official documentation](https://developer.okta.com/docs/reference/api/apps/#service-provider-certificate).
|
|
376
236
|
*/
|
|
377
237
|
readonly singleLogoutCertificate: pulumi.Output<string | undefined>;
|
|
378
238
|
/**
|
|
379
|
-
* The issuer of the Service Provider that generates the Single Logout request
|
|
239
|
+
* The issuer of the Service Provider that generates the Single Logout request
|
|
380
240
|
*/
|
|
381
241
|
readonly singleLogoutIssuer: pulumi.Output<string | undefined>;
|
|
382
242
|
/**
|
|
383
|
-
* The location where the logout response is sent
|
|
243
|
+
* The location where the logout response is sent
|
|
384
244
|
*/
|
|
385
245
|
readonly singleLogoutUrl: pulumi.Output<string | undefined>;
|
|
386
246
|
/**
|
|
387
|
-
* SAML
|
|
247
|
+
* SAML SP issuer ID
|
|
388
248
|
*/
|
|
389
249
|
readonly spIssuer: pulumi.Output<string | undefined>;
|
|
390
250
|
/**
|
|
391
|
-
* Single Sign
|
|
251
|
+
* Single Sign On URL
|
|
392
252
|
*/
|
|
393
253
|
readonly ssoUrl: pulumi.Output<string | undefined>;
|
|
394
254
|
/**
|
|
395
|
-
*
|
|
255
|
+
* Status of application. By default, it is `ACTIVE`
|
|
396
256
|
*/
|
|
397
257
|
readonly status: pulumi.Output<string | undefined>;
|
|
398
258
|
/**
|
|
@@ -400,23 +260,23 @@ export declare class Saml extends pulumi.CustomResource {
|
|
|
400
260
|
*/
|
|
401
261
|
readonly subjectNameIdFormat: pulumi.Output<string | undefined>;
|
|
402
262
|
/**
|
|
403
|
-
* Template for app user's username when a user is assigned to the app
|
|
263
|
+
* Template for app user's username when a user is assigned to the app
|
|
404
264
|
*/
|
|
405
265
|
readonly subjectNameIdTemplate: pulumi.Output<string | undefined>;
|
|
406
266
|
/**
|
|
407
|
-
* Username template. Default
|
|
267
|
+
* Username template. Default: `${source.login}`
|
|
408
268
|
*/
|
|
409
269
|
readonly userNameTemplate: pulumi.Output<string | undefined>;
|
|
410
270
|
/**
|
|
411
|
-
* Push username on update. Valid values: `
|
|
271
|
+
* Push username on update. Valid values: `PUSH` and `DONT_PUSH`
|
|
412
272
|
*/
|
|
413
273
|
readonly userNameTemplatePushStatus: pulumi.Output<string | undefined>;
|
|
414
274
|
/**
|
|
415
|
-
* Username template suffix
|
|
275
|
+
* Username template suffix
|
|
416
276
|
*/
|
|
417
277
|
readonly userNameTemplateSuffix: pulumi.Output<string | undefined>;
|
|
418
278
|
/**
|
|
419
|
-
* Username template type. Default
|
|
279
|
+
* Username template type. Default: `BUILT_IN`
|
|
420
280
|
*/
|
|
421
281
|
readonly userNameTemplateType: pulumi.Output<string | undefined>;
|
|
422
282
|
/**
|
|
@@ -433,15 +293,15 @@ export declare class Saml extends pulumi.CustomResource {
|
|
|
433
293
|
*/
|
|
434
294
|
export interface SamlState {
|
|
435
295
|
/**
|
|
436
|
-
* Custom error page URL
|
|
296
|
+
* Custom error page URL
|
|
437
297
|
*/
|
|
438
298
|
accessibilityErrorRedirectUrl?: pulumi.Input<string>;
|
|
439
299
|
/**
|
|
440
|
-
* Custom login page
|
|
300
|
+
* Custom login page URL
|
|
441
301
|
*/
|
|
442
302
|
accessibilityLoginRedirectUrl?: pulumi.Input<string>;
|
|
443
303
|
/**
|
|
444
|
-
* Enable self
|
|
304
|
+
* Enable self service. Default is `false`
|
|
445
305
|
*/
|
|
446
306
|
accessibilitySelfService?: pulumi.Input<boolean>;
|
|
447
307
|
/**
|
|
@@ -457,27 +317,24 @@ export interface SamlState {
|
|
|
457
317
|
*/
|
|
458
318
|
appLinksJson?: pulumi.Input<string>;
|
|
459
319
|
/**
|
|
460
|
-
* Application settings in JSON format
|
|
320
|
+
* Application settings in JSON format
|
|
461
321
|
*/
|
|
462
322
|
appSettingsJson?: pulumi.Input<string>;
|
|
463
323
|
/**
|
|
464
|
-
* Determines whether the SAML assertion is digitally signed
|
|
324
|
+
* Determines whether the SAML assertion is digitally signed
|
|
465
325
|
*/
|
|
466
326
|
assertionSigned?: pulumi.Input<boolean>;
|
|
467
|
-
/**
|
|
468
|
-
* List of SAML Attribute statements.
|
|
469
|
-
*/
|
|
470
327
|
attributeStatements?: pulumi.Input<pulumi.Input<inputs.app.SamlAttributeStatement>[]>;
|
|
471
328
|
/**
|
|
472
|
-
* Audience
|
|
329
|
+
* Audience Restriction
|
|
473
330
|
*/
|
|
474
331
|
audience?: pulumi.Input<string>;
|
|
475
332
|
/**
|
|
476
|
-
* The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.
|
|
333
|
+
* The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.y
|
|
477
334
|
*/
|
|
478
335
|
authenticationPolicy?: pulumi.Input<string>;
|
|
479
336
|
/**
|
|
480
|
-
* Identifies the SAML authentication context class for the assertion’s authentication statement
|
|
337
|
+
* Identifies the SAML authentication context class for the assertion’s authentication statement
|
|
481
338
|
*/
|
|
482
339
|
authnContextClassRef?: pulumi.Input<string>;
|
|
483
340
|
/**
|
|
@@ -485,7 +342,7 @@ export interface SamlState {
|
|
|
485
342
|
*/
|
|
486
343
|
autoSubmitToolbar?: pulumi.Input<boolean>;
|
|
487
344
|
/**
|
|
488
|
-
*
|
|
345
|
+
* cert from SAML XML metadata payload
|
|
489
346
|
*/
|
|
490
347
|
certificate?: pulumi.Input<string>;
|
|
491
348
|
/**
|
|
@@ -493,15 +350,15 @@ export interface SamlState {
|
|
|
493
350
|
*/
|
|
494
351
|
defaultRelayState?: pulumi.Input<string>;
|
|
495
352
|
/**
|
|
496
|
-
* Identifies the location where the SAML response is intended to be sent inside the SAML assertion
|
|
353
|
+
* Identifies the location where the SAML response is intended to be sent inside of the SAML assertion
|
|
497
354
|
*/
|
|
498
355
|
destination?: pulumi.Input<string>;
|
|
499
356
|
/**
|
|
500
|
-
* Determines the digest algorithm used to digitally sign the SAML assertion and response
|
|
357
|
+
* Determines the digest algorithm used to digitally sign the SAML assertion and response
|
|
501
358
|
*/
|
|
502
359
|
digestAlgorithm?: pulumi.Input<string>;
|
|
503
360
|
/**
|
|
504
|
-
*
|
|
361
|
+
* The url that can be used to embed this application in other portals.
|
|
505
362
|
*/
|
|
506
363
|
embedUrl?: pulumi.Input<string>;
|
|
507
364
|
/**
|
|
@@ -509,23 +366,23 @@ export interface SamlState {
|
|
|
509
366
|
*/
|
|
510
367
|
enduserNote?: pulumi.Input<string>;
|
|
511
368
|
/**
|
|
512
|
-
* Entity ID, the ID portion of the
|
|
369
|
+
* Entity ID, the ID portion of the entity_url
|
|
513
370
|
*/
|
|
514
371
|
entityKey?: pulumi.Input<string>;
|
|
515
372
|
/**
|
|
516
|
-
* Entity URL for instance
|
|
373
|
+
* Entity URL for instance http://www.okta.com/exk1fcia6d6EMsf331d8
|
|
517
374
|
*/
|
|
518
375
|
entityUrl?: pulumi.Input<string>;
|
|
519
376
|
/**
|
|
520
|
-
* features
|
|
377
|
+
* features to enable
|
|
521
378
|
*/
|
|
522
379
|
features?: pulumi.Input<pulumi.Input<string>[]>;
|
|
523
380
|
/**
|
|
524
|
-
* Do not display application icon on mobile app
|
|
381
|
+
* Do not display application icon on mobile app
|
|
525
382
|
*/
|
|
526
383
|
hideIos?: pulumi.Input<boolean>;
|
|
527
384
|
/**
|
|
528
|
-
* Do not display application icon to users
|
|
385
|
+
* Do not display application icon to users
|
|
529
386
|
*/
|
|
530
387
|
hideWeb?: pulumi.Input<boolean>;
|
|
531
388
|
/**
|
|
@@ -533,31 +390,31 @@ export interface SamlState {
|
|
|
533
390
|
*/
|
|
534
391
|
honorForceAuthn?: pulumi.Input<boolean>;
|
|
535
392
|
/**
|
|
536
|
-
*
|
|
393
|
+
* urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Post location from the SAML metadata.
|
|
537
394
|
*/
|
|
538
395
|
httpPostBinding?: pulumi.Input<string>;
|
|
539
396
|
/**
|
|
540
|
-
*
|
|
397
|
+
* urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect location from the SAML metadata.
|
|
541
398
|
*/
|
|
542
399
|
httpRedirectBinding?: pulumi.Input<string>;
|
|
543
400
|
/**
|
|
544
|
-
* SAML issuer ID
|
|
401
|
+
* SAML issuer ID
|
|
545
402
|
*/
|
|
546
403
|
idpIssuer?: pulumi.Input<string>;
|
|
547
404
|
/**
|
|
548
|
-
*
|
|
405
|
+
* *Early Access Property*. Enable Federation Broker Mode.
|
|
549
406
|
*/
|
|
550
407
|
implicitAssignment?: pulumi.Input<boolean>;
|
|
551
408
|
/**
|
|
552
|
-
* Saml Inline Hook
|
|
409
|
+
* Saml Inline Hook setting
|
|
553
410
|
*/
|
|
554
411
|
inlineHookId?: pulumi.Input<string>;
|
|
555
412
|
/**
|
|
556
|
-
* Certificate
|
|
413
|
+
* Certificate ID
|
|
557
414
|
*/
|
|
558
415
|
keyId?: pulumi.Input<string>;
|
|
559
416
|
/**
|
|
560
|
-
* Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid
|
|
417
|
+
* Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid`
|
|
561
418
|
*/
|
|
562
419
|
keyName?: pulumi.Input<string>;
|
|
563
420
|
/**
|
|
@@ -565,11 +422,11 @@ export interface SamlState {
|
|
|
565
422
|
*/
|
|
566
423
|
keyYearsValid?: pulumi.Input<number>;
|
|
567
424
|
/**
|
|
568
|
-
*
|
|
425
|
+
* Application keys
|
|
569
426
|
*/
|
|
570
427
|
keys?: pulumi.Input<pulumi.Input<inputs.app.SamlKey>[]>;
|
|
571
428
|
/**
|
|
572
|
-
*
|
|
429
|
+
* The Application's display name.
|
|
573
430
|
*/
|
|
574
431
|
label?: pulumi.Input<string>;
|
|
575
432
|
/**
|
|
@@ -577,27 +434,36 @@ export interface SamlState {
|
|
|
577
434
|
*/
|
|
578
435
|
logo?: pulumi.Input<string>;
|
|
579
436
|
/**
|
|
580
|
-
*
|
|
437
|
+
* URL of the application's logo
|
|
581
438
|
*/
|
|
582
439
|
logoUrl?: pulumi.Input<string>;
|
|
583
440
|
/**
|
|
584
|
-
*
|
|
441
|
+
* SAML xml metadata payload
|
|
585
442
|
*/
|
|
586
443
|
metadata?: pulumi.Input<string>;
|
|
587
444
|
/**
|
|
588
|
-
* SAML xml metadata URL
|
|
445
|
+
* SAML xml metadata URL
|
|
589
446
|
*/
|
|
590
447
|
metadataUrl?: pulumi.Input<string>;
|
|
591
448
|
/**
|
|
592
|
-
* Name
|
|
449
|
+
* Name of the app.
|
|
593
450
|
*/
|
|
594
451
|
name?: pulumi.Input<string>;
|
|
595
452
|
/**
|
|
596
|
-
*
|
|
453
|
+
* Name of application from the Okta Integration Network. For instance 'slack'. If not included a custom app will be created. If not provided the following arguments are required:
|
|
454
|
+
* 'sso*url'
|
|
455
|
+
* 'recipient'
|
|
456
|
+
* 'destination'
|
|
457
|
+
* 'audience'
|
|
458
|
+
* 'subject*name*id*template'
|
|
459
|
+
* 'subject*name*id*format'
|
|
460
|
+
* 'signature*algorithm'
|
|
461
|
+
* 'digest*algorithm'
|
|
462
|
+
* 'authn*context*class*ref'
|
|
597
463
|
*/
|
|
598
464
|
preconfiguredApp?: pulumi.Input<string>;
|
|
599
465
|
/**
|
|
600
|
-
* The location where the app may present the SAML assertion
|
|
466
|
+
* The location where the app may present the SAML assertion
|
|
601
467
|
*/
|
|
602
468
|
recipient?: pulumi.Input<string>;
|
|
603
469
|
/**
|
|
@@ -605,7 +471,7 @@ export interface SamlState {
|
|
|
605
471
|
*/
|
|
606
472
|
requestCompressed?: pulumi.Input<boolean>;
|
|
607
473
|
/**
|
|
608
|
-
* Determines whether the SAML auth response message is digitally signed
|
|
474
|
+
* Determines whether the SAML auth response message is digitally signed
|
|
609
475
|
*/
|
|
610
476
|
responseSigned?: pulumi.Input<boolean>;
|
|
611
477
|
/**
|
|
@@ -613,39 +479,39 @@ export interface SamlState {
|
|
|
613
479
|
*/
|
|
614
480
|
samlSignedRequestEnabled?: pulumi.Input<boolean>;
|
|
615
481
|
/**
|
|
616
|
-
* SAML version for the app's sign-on mode. Valid values are: `
|
|
482
|
+
* SAML version for the app's sign-on mode. Valid values are: `2.0` or `1.1`. Default is `2.0`
|
|
617
483
|
*/
|
|
618
484
|
samlVersion?: pulumi.Input<string>;
|
|
619
485
|
/**
|
|
620
|
-
* Sign
|
|
486
|
+
* Sign on mode of application.
|
|
621
487
|
*/
|
|
622
488
|
signOnMode?: pulumi.Input<string>;
|
|
623
489
|
/**
|
|
624
|
-
* Signature algorithm used to digitally sign the assertion and response
|
|
490
|
+
* Signature algorithm used to digitally sign the assertion and response
|
|
625
491
|
*/
|
|
626
492
|
signatureAlgorithm?: pulumi.Input<string>;
|
|
627
493
|
/**
|
|
628
|
-
* x509 encoded certificate that the Service Provider uses to sign Single Logout requests.
|
|
494
|
+
* x509 encoded certificate that the Service Provider uses to sign Single Logout requests. Note: should be provided without `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`, see [official documentation](https://developer.okta.com/docs/reference/api/apps/#service-provider-certificate).
|
|
629
495
|
*/
|
|
630
496
|
singleLogoutCertificate?: pulumi.Input<string>;
|
|
631
497
|
/**
|
|
632
|
-
* The issuer of the Service Provider that generates the Single Logout request
|
|
498
|
+
* The issuer of the Service Provider that generates the Single Logout request
|
|
633
499
|
*/
|
|
634
500
|
singleLogoutIssuer?: pulumi.Input<string>;
|
|
635
501
|
/**
|
|
636
|
-
* The location where the logout response is sent
|
|
502
|
+
* The location where the logout response is sent
|
|
637
503
|
*/
|
|
638
504
|
singleLogoutUrl?: pulumi.Input<string>;
|
|
639
505
|
/**
|
|
640
|
-
* SAML
|
|
506
|
+
* SAML SP issuer ID
|
|
641
507
|
*/
|
|
642
508
|
spIssuer?: pulumi.Input<string>;
|
|
643
509
|
/**
|
|
644
|
-
* Single Sign
|
|
510
|
+
* Single Sign On URL
|
|
645
511
|
*/
|
|
646
512
|
ssoUrl?: pulumi.Input<string>;
|
|
647
513
|
/**
|
|
648
|
-
*
|
|
514
|
+
* Status of application. By default, it is `ACTIVE`
|
|
649
515
|
*/
|
|
650
516
|
status?: pulumi.Input<string>;
|
|
651
517
|
/**
|
|
@@ -653,23 +519,23 @@ export interface SamlState {
|
|
|
653
519
|
*/
|
|
654
520
|
subjectNameIdFormat?: pulumi.Input<string>;
|
|
655
521
|
/**
|
|
656
|
-
* Template for app user's username when a user is assigned to the app
|
|
522
|
+
* Template for app user's username when a user is assigned to the app
|
|
657
523
|
*/
|
|
658
524
|
subjectNameIdTemplate?: pulumi.Input<string>;
|
|
659
525
|
/**
|
|
660
|
-
* Username template. Default
|
|
526
|
+
* Username template. Default: `${source.login}`
|
|
661
527
|
*/
|
|
662
528
|
userNameTemplate?: pulumi.Input<string>;
|
|
663
529
|
/**
|
|
664
|
-
* Push username on update. Valid values: `
|
|
530
|
+
* Push username on update. Valid values: `PUSH` and `DONT_PUSH`
|
|
665
531
|
*/
|
|
666
532
|
userNameTemplatePushStatus?: pulumi.Input<string>;
|
|
667
533
|
/**
|
|
668
|
-
* Username template suffix
|
|
534
|
+
* Username template suffix
|
|
669
535
|
*/
|
|
670
536
|
userNameTemplateSuffix?: pulumi.Input<string>;
|
|
671
537
|
/**
|
|
672
|
-
* Username template type. Default
|
|
538
|
+
* Username template type. Default: `BUILT_IN`
|
|
673
539
|
*/
|
|
674
540
|
userNameTemplateType?: pulumi.Input<string>;
|
|
675
541
|
}
|
|
@@ -678,15 +544,15 @@ export interface SamlState {
|
|
|
678
544
|
*/
|
|
679
545
|
export interface SamlArgs {
|
|
680
546
|
/**
|
|
681
|
-
* Custom error page URL
|
|
547
|
+
* Custom error page URL
|
|
682
548
|
*/
|
|
683
549
|
accessibilityErrorRedirectUrl?: pulumi.Input<string>;
|
|
684
550
|
/**
|
|
685
|
-
* Custom login page
|
|
551
|
+
* Custom login page URL
|
|
686
552
|
*/
|
|
687
553
|
accessibilityLoginRedirectUrl?: pulumi.Input<string>;
|
|
688
554
|
/**
|
|
689
|
-
* Enable self
|
|
555
|
+
* Enable self service. Default is `false`
|
|
690
556
|
*/
|
|
691
557
|
accessibilitySelfService?: pulumi.Input<boolean>;
|
|
692
558
|
/**
|
|
@@ -702,27 +568,24 @@ export interface SamlArgs {
|
|
|
702
568
|
*/
|
|
703
569
|
appLinksJson?: pulumi.Input<string>;
|
|
704
570
|
/**
|
|
705
|
-
* Application settings in JSON format
|
|
571
|
+
* Application settings in JSON format
|
|
706
572
|
*/
|
|
707
573
|
appSettingsJson?: pulumi.Input<string>;
|
|
708
574
|
/**
|
|
709
|
-
* Determines whether the SAML assertion is digitally signed
|
|
575
|
+
* Determines whether the SAML assertion is digitally signed
|
|
710
576
|
*/
|
|
711
577
|
assertionSigned?: pulumi.Input<boolean>;
|
|
712
|
-
/**
|
|
713
|
-
* List of SAML Attribute statements.
|
|
714
|
-
*/
|
|
715
578
|
attributeStatements?: pulumi.Input<pulumi.Input<inputs.app.SamlAttributeStatement>[]>;
|
|
716
579
|
/**
|
|
717
|
-
* Audience
|
|
580
|
+
* Audience Restriction
|
|
718
581
|
*/
|
|
719
582
|
audience?: pulumi.Input<string>;
|
|
720
583
|
/**
|
|
721
|
-
* The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.
|
|
584
|
+
* The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.y
|
|
722
585
|
*/
|
|
723
586
|
authenticationPolicy?: pulumi.Input<string>;
|
|
724
587
|
/**
|
|
725
|
-
* Identifies the SAML authentication context class for the assertion’s authentication statement
|
|
588
|
+
* Identifies the SAML authentication context class for the assertion’s authentication statement
|
|
726
589
|
*/
|
|
727
590
|
authnContextClassRef?: pulumi.Input<string>;
|
|
728
591
|
/**
|
|
@@ -734,11 +597,11 @@ export interface SamlArgs {
|
|
|
734
597
|
*/
|
|
735
598
|
defaultRelayState?: pulumi.Input<string>;
|
|
736
599
|
/**
|
|
737
|
-
* Identifies the location where the SAML response is intended to be sent inside the SAML assertion
|
|
600
|
+
* Identifies the location where the SAML response is intended to be sent inside of the SAML assertion
|
|
738
601
|
*/
|
|
739
602
|
destination?: pulumi.Input<string>;
|
|
740
603
|
/**
|
|
741
|
-
* Determines the digest algorithm used to digitally sign the SAML assertion and response
|
|
604
|
+
* Determines the digest algorithm used to digitally sign the SAML assertion and response
|
|
742
605
|
*/
|
|
743
606
|
digestAlgorithm?: pulumi.Input<string>;
|
|
744
607
|
/**
|
|
@@ -746,11 +609,11 @@ export interface SamlArgs {
|
|
|
746
609
|
*/
|
|
747
610
|
enduserNote?: pulumi.Input<string>;
|
|
748
611
|
/**
|
|
749
|
-
* Do not display application icon on mobile app
|
|
612
|
+
* Do not display application icon on mobile app
|
|
750
613
|
*/
|
|
751
614
|
hideIos?: pulumi.Input<boolean>;
|
|
752
615
|
/**
|
|
753
|
-
* Do not display application icon to users
|
|
616
|
+
* Do not display application icon to users
|
|
754
617
|
*/
|
|
755
618
|
hideWeb?: pulumi.Input<boolean>;
|
|
756
619
|
/**
|
|
@@ -758,19 +621,19 @@ export interface SamlArgs {
|
|
|
758
621
|
*/
|
|
759
622
|
honorForceAuthn?: pulumi.Input<boolean>;
|
|
760
623
|
/**
|
|
761
|
-
* SAML issuer ID
|
|
624
|
+
* SAML issuer ID
|
|
762
625
|
*/
|
|
763
626
|
idpIssuer?: pulumi.Input<string>;
|
|
764
627
|
/**
|
|
765
|
-
*
|
|
628
|
+
* *Early Access Property*. Enable Federation Broker Mode.
|
|
766
629
|
*/
|
|
767
630
|
implicitAssignment?: pulumi.Input<boolean>;
|
|
768
631
|
/**
|
|
769
|
-
* Saml Inline Hook
|
|
632
|
+
* Saml Inline Hook setting
|
|
770
633
|
*/
|
|
771
634
|
inlineHookId?: pulumi.Input<string>;
|
|
772
635
|
/**
|
|
773
|
-
* Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid
|
|
636
|
+
* Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid`
|
|
774
637
|
*/
|
|
775
638
|
keyName?: pulumi.Input<string>;
|
|
776
639
|
/**
|
|
@@ -778,7 +641,7 @@ export interface SamlArgs {
|
|
|
778
641
|
*/
|
|
779
642
|
keyYearsValid?: pulumi.Input<number>;
|
|
780
643
|
/**
|
|
781
|
-
*
|
|
644
|
+
* The Application's display name.
|
|
782
645
|
*/
|
|
783
646
|
label: pulumi.Input<string>;
|
|
784
647
|
/**
|
|
@@ -786,11 +649,20 @@ export interface SamlArgs {
|
|
|
786
649
|
*/
|
|
787
650
|
logo?: pulumi.Input<string>;
|
|
788
651
|
/**
|
|
789
|
-
*
|
|
652
|
+
* Name of application from the Okta Integration Network. For instance 'slack'. If not included a custom app will be created. If not provided the following arguments are required:
|
|
653
|
+
* 'sso*url'
|
|
654
|
+
* 'recipient'
|
|
655
|
+
* 'destination'
|
|
656
|
+
* 'audience'
|
|
657
|
+
* 'subject*name*id*template'
|
|
658
|
+
* 'subject*name*id*format'
|
|
659
|
+
* 'signature*algorithm'
|
|
660
|
+
* 'digest*algorithm'
|
|
661
|
+
* 'authn*context*class*ref'
|
|
790
662
|
*/
|
|
791
663
|
preconfiguredApp?: pulumi.Input<string>;
|
|
792
664
|
/**
|
|
793
|
-
* The location where the app may present the SAML assertion
|
|
665
|
+
* The location where the app may present the SAML assertion
|
|
794
666
|
*/
|
|
795
667
|
recipient?: pulumi.Input<string>;
|
|
796
668
|
/**
|
|
@@ -798,7 +670,7 @@ export interface SamlArgs {
|
|
|
798
670
|
*/
|
|
799
671
|
requestCompressed?: pulumi.Input<boolean>;
|
|
800
672
|
/**
|
|
801
|
-
* Determines whether the SAML auth response message is digitally signed
|
|
673
|
+
* Determines whether the SAML auth response message is digitally signed
|
|
802
674
|
*/
|
|
803
675
|
responseSigned?: pulumi.Input<boolean>;
|
|
804
676
|
/**
|
|
@@ -806,35 +678,35 @@ export interface SamlArgs {
|
|
|
806
678
|
*/
|
|
807
679
|
samlSignedRequestEnabled?: pulumi.Input<boolean>;
|
|
808
680
|
/**
|
|
809
|
-
* SAML version for the app's sign-on mode. Valid values are: `
|
|
681
|
+
* SAML version for the app's sign-on mode. Valid values are: `2.0` or `1.1`. Default is `2.0`
|
|
810
682
|
*/
|
|
811
683
|
samlVersion?: pulumi.Input<string>;
|
|
812
684
|
/**
|
|
813
|
-
* Signature algorithm used to digitally sign the assertion and response
|
|
685
|
+
* Signature algorithm used to digitally sign the assertion and response
|
|
814
686
|
*/
|
|
815
687
|
signatureAlgorithm?: pulumi.Input<string>;
|
|
816
688
|
/**
|
|
817
|
-
* x509 encoded certificate that the Service Provider uses to sign Single Logout requests.
|
|
689
|
+
* x509 encoded certificate that the Service Provider uses to sign Single Logout requests. Note: should be provided without `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`, see [official documentation](https://developer.okta.com/docs/reference/api/apps/#service-provider-certificate).
|
|
818
690
|
*/
|
|
819
691
|
singleLogoutCertificate?: pulumi.Input<string>;
|
|
820
692
|
/**
|
|
821
|
-
* The issuer of the Service Provider that generates the Single Logout request
|
|
693
|
+
* The issuer of the Service Provider that generates the Single Logout request
|
|
822
694
|
*/
|
|
823
695
|
singleLogoutIssuer?: pulumi.Input<string>;
|
|
824
696
|
/**
|
|
825
|
-
* The location where the logout response is sent
|
|
697
|
+
* The location where the logout response is sent
|
|
826
698
|
*/
|
|
827
699
|
singleLogoutUrl?: pulumi.Input<string>;
|
|
828
700
|
/**
|
|
829
|
-
* SAML
|
|
701
|
+
* SAML SP issuer ID
|
|
830
702
|
*/
|
|
831
703
|
spIssuer?: pulumi.Input<string>;
|
|
832
704
|
/**
|
|
833
|
-
* Single Sign
|
|
705
|
+
* Single Sign On URL
|
|
834
706
|
*/
|
|
835
707
|
ssoUrl?: pulumi.Input<string>;
|
|
836
708
|
/**
|
|
837
|
-
*
|
|
709
|
+
* Status of application. By default, it is `ACTIVE`
|
|
838
710
|
*/
|
|
839
711
|
status?: pulumi.Input<string>;
|
|
840
712
|
/**
|
|
@@ -842,23 +714,23 @@ export interface SamlArgs {
|
|
|
842
714
|
*/
|
|
843
715
|
subjectNameIdFormat?: pulumi.Input<string>;
|
|
844
716
|
/**
|
|
845
|
-
* Template for app user's username when a user is assigned to the app
|
|
717
|
+
* Template for app user's username when a user is assigned to the app
|
|
846
718
|
*/
|
|
847
719
|
subjectNameIdTemplate?: pulumi.Input<string>;
|
|
848
720
|
/**
|
|
849
|
-
* Username template. Default
|
|
721
|
+
* Username template. Default: `${source.login}`
|
|
850
722
|
*/
|
|
851
723
|
userNameTemplate?: pulumi.Input<string>;
|
|
852
724
|
/**
|
|
853
|
-
* Push username on update. Valid values: `
|
|
725
|
+
* Push username on update. Valid values: `PUSH` and `DONT_PUSH`
|
|
854
726
|
*/
|
|
855
727
|
userNameTemplatePushStatus?: pulumi.Input<string>;
|
|
856
728
|
/**
|
|
857
|
-
* Username template suffix
|
|
729
|
+
* Username template suffix
|
|
858
730
|
*/
|
|
859
731
|
userNameTemplateSuffix?: pulumi.Input<string>;
|
|
860
732
|
/**
|
|
861
|
-
* Username template type. Default
|
|
733
|
+
* Username template type. Default: `BUILT_IN`
|
|
862
734
|
*/
|
|
863
735
|
userNameTemplateType?: pulumi.Input<string>;
|
|
864
736
|
}
|