@pulumi/okta 4.9.0-alpha.1718431198 → 4.9.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (405) hide show
  1. package/adminRoleCustom.d.ts +105 -107
  2. package/adminRoleCustom.js +3 -5
  3. package/adminRoleCustom.js.map +1 -1
  4. package/adminRoleCustomAssignments.d.ts +12 -18
  5. package/adminRoleCustomAssignments.js +3 -6
  6. package/adminRoleCustomAssignments.js.map +1 -1
  7. package/adminRoleTargets.d.ts +14 -16
  8. package/adminRoleTargets.js +0 -2
  9. package/adminRoleTargets.js.map +1 -1
  10. package/app/accessPolicyAssignment.d.ts +23 -2
  11. package/app/accessPolicyAssignment.js +23 -2
  12. package/app/accessPolicyAssignment.js.map +1 -1
  13. package/app/autoLogin.d.ts +63 -97
  14. package/app/autoLogin.js +3 -37
  15. package/app/autoLogin.js.map +1 -1
  16. package/app/basicAuth.d.ts +30 -33
  17. package/app/basicAuth.js +4 -7
  18. package/app/basicAuth.js.map +1 -1
  19. package/app/bookmark.d.ts +30 -33
  20. package/app/bookmark.js +3 -6
  21. package/app/bookmark.js.map +1 -1
  22. package/app/getApp.d.ts +58 -25
  23. package/app/getApp.js +2 -2
  24. package/app/getApp.js.map +1 -1
  25. package/app/getMetadataSaml.d.ts +11 -5
  26. package/app/getMetadataSaml.js +2 -2
  27. package/app/getMetadataSaml.js.map +1 -1
  28. package/app/getOauth.d.ts +62 -34
  29. package/app/getOauth.js +2 -2
  30. package/app/getOauth.js.map +1 -1
  31. package/app/getSaml.d.ts +75 -56
  32. package/app/getSaml.js +2 -2
  33. package/app/getSaml.js.map +1 -1
  34. package/app/groupAssignment.d.ts +23 -9
  35. package/app/groupAssignment.js +17 -3
  36. package/app/groupAssignment.js.map +1 -1
  37. package/app/oauth.d.ts +135 -273
  38. package/app/oauth.js +6 -60
  39. package/app/oauth.js.map +1 -1
  40. package/app/oauthPostLogoutRedirectUri.d.ts +4 -6
  41. package/app/oauthPostLogoutRedirectUri.js +1 -3
  42. package/app/oauthPostLogoutRedirectUri.js.map +1 -1
  43. package/app/oauthRedirectUri.d.ts +4 -6
  44. package/app/oauthRedirectUri.js +1 -3
  45. package/app/oauthRedirectUri.js.map +1 -1
  46. package/app/oauthRoleAssignment.d.ts +4 -29
  47. package/app/oauthRoleAssignment.js +4 -29
  48. package/app/oauthRoleAssignment.js.map +1 -1
  49. package/app/saml.d.ts +161 -289
  50. package/app/saml.js +6 -152
  51. package/app/saml.js.map +1 -1
  52. package/app/securePasswordStore.d.ts +79 -80
  53. package/app/securePasswordStore.js +6 -7
  54. package/app/securePasswordStore.js.map +1 -1
  55. package/app/swa.d.ts +70 -71
  56. package/app/swa.js +4 -5
  57. package/app/swa.js.map +1 -1
  58. package/app/threeField.d.ts +74 -76
  59. package/app/threeField.js +5 -7
  60. package/app/threeField.js.map +1 -1
  61. package/app/user.d.ts +12 -17
  62. package/app/user.js +0 -2
  63. package/app/user.js.map +1 -1
  64. package/appGroupAssignments.d.ts +6 -8
  65. package/appGroupAssignments.js +3 -5
  66. package/appGroupAssignments.js.map +1 -1
  67. package/appOauthApiScope.d.ts +5 -7
  68. package/appOauthApiScope.js +2 -4
  69. package/appOauthApiScope.js.map +1 -1
  70. package/appSamlAppSettings.d.ts +6 -7
  71. package/appSamlAppSettings.js +3 -4
  72. package/appSamlAppSettings.js.map +1 -1
  73. package/appSharedCredentials.d.ts +61 -63
  74. package/appSharedCredentials.js +4 -6
  75. package/appSharedCredentials.js.map +1 -1
  76. package/appSignonPolicy.d.ts +3 -39
  77. package/appSignonPolicy.js +3 -39
  78. package/appSignonPolicy.js.map +1 -1
  79. package/appSignonPolicyRule.d.ts +69 -361
  80. package/appSignonPolicyRule.js +1 -278
  81. package/appSignonPolicyRule.js.map +1 -1
  82. package/appUserBaseSchemaProperty.d.ts +25 -29
  83. package/appUserBaseSchemaProperty.js +1 -5
  84. package/appUserBaseSchemaProperty.js.map +1 -1
  85. package/appUserSchemaProperty.d.ts +51 -41
  86. package/appUserSchemaProperty.js +0 -2
  87. package/appUserSchemaProperty.js.map +1 -1
  88. package/auth/getServer.d.ts +11 -11
  89. package/auth/getServer.js +2 -2
  90. package/auth/getServerPolicy.d.ts +15 -9
  91. package/auth/getServerPolicy.js +2 -2
  92. package/auth/getServerPolicy.js.map +1 -1
  93. package/auth/getServerScopes.d.ts +8 -5
  94. package/auth/getServerScopes.js +2 -2
  95. package/auth/getServerScopes.js.map +1 -1
  96. package/auth/server.d.ts +15 -19
  97. package/auth/server.js +1 -5
  98. package/auth/server.js.map +1 -1
  99. package/auth/serverClaim.d.ts +13 -17
  100. package/auth/serverClaim.js +1 -5
  101. package/auth/serverClaim.js.map +1 -1
  102. package/auth/serverPolicy.d.ts +10 -14
  103. package/auth/serverPolicy.js +1 -5
  104. package/auth/serverPolicy.js.map +1 -1
  105. package/auth/serverPolicyClaim.d.ts +50 -66
  106. package/auth/serverPolicyClaim.js +0 -25
  107. package/auth/serverPolicyClaim.js.map +1 -1
  108. package/auth/serverPolicyRule.d.ts +32 -43
  109. package/auth/serverPolicyRule.js +0 -2
  110. package/auth/serverPolicyRule.js.map +1 -1
  111. package/auth/serverScope.d.ts +16 -20
  112. package/auth/serverScope.js +1 -5
  113. package/auth/serverScope.js.map +1 -1
  114. package/authServerClaimDefault.d.ts +10 -25
  115. package/authServerClaimDefault.js +0 -9
  116. package/authServerClaimDefault.js.map +1 -1
  117. package/authServerDefault.d.ts +15 -19
  118. package/authServerDefault.js +1 -5
  119. package/authServerDefault.js.map +1 -1
  120. package/authenticator.d.ts +53 -61
  121. package/authenticator.js +11 -11
  122. package/authenticator.js.map +1 -1
  123. package/behaviour.d.ts +21 -41
  124. package/behaviour.js +0 -2
  125. package/behaviour.js.map +1 -1
  126. package/brand.d.ts +23 -22
  127. package/brand.js +8 -4
  128. package/brand.js.map +1 -1
  129. package/captcha.d.ts +15 -17
  130. package/captcha.js +3 -5
  131. package/captcha.js.map +1 -1
  132. package/captchaOrgWideSettings.d.ts +8 -43
  133. package/captchaOrgWideSettings.js +2 -37
  134. package/captchaOrgWideSettings.js.map +1 -1
  135. package/domain.d.ts +13 -21
  136. package/domain.js +0 -2
  137. package/domain.js.map +1 -1
  138. package/domainCertificate.d.ts +17 -24
  139. package/domainCertificate.js +2 -9
  140. package/domainCertificate.js.map +1 -1
  141. package/domainVerification.d.ts +4 -10
  142. package/domainVerification.js +1 -7
  143. package/domainVerification.js.map +1 -1
  144. package/emailCustomization.d.ts +38 -222
  145. package/emailCustomization.js +29 -33
  146. package/emailCustomization.js.map +1 -1
  147. package/emailDomain.d.ts +4 -8
  148. package/emailDomain.js +0 -4
  149. package/emailDomain.js.map +1 -1
  150. package/emailDomainVerification.d.ts +3 -7
  151. package/emailDomainVerification.js +0 -4
  152. package/emailDomainVerification.js.map +1 -1
  153. package/emailSender.d.ts +15 -17
  154. package/emailSender.js +2 -4
  155. package/emailSender.js.map +1 -1
  156. package/emailSenderVerification.d.ts +5 -9
  157. package/emailSenderVerification.js +2 -6
  158. package/emailSenderVerification.js.map +1 -1
  159. package/eventHook.d.ts +16 -11
  160. package/eventHook.js +1 -5
  161. package/eventHook.js.map +1 -1
  162. package/eventHookVerification.d.ts +4 -10
  163. package/eventHookVerification.js +1 -7
  164. package/eventHookVerification.js.map +1 -1
  165. package/factor/factor.d.ts +4 -9
  166. package/factor/factor.js +1 -3
  167. package/factor/factor.js.map +1 -1
  168. package/factorTotp.d.ts +12 -21
  169. package/factorTotp.js +3 -3
  170. package/factorTotp.js.map +1 -1
  171. package/getAppGroupAssignments.d.ts +6 -6
  172. package/getAppGroupAssignments.js +2 -2
  173. package/getAppSignonPolicy.d.ts +16 -6
  174. package/getAppSignonPolicy.js +8 -4
  175. package/getAppSignonPolicy.js.map +1 -1
  176. package/getAppUserAssignments.d.ts +6 -6
  177. package/getAppUserAssignments.js +2 -2
  178. package/getAuthServerClaim.d.ts +15 -12
  179. package/getAuthServerClaim.js +2 -2
  180. package/getAuthServerClaim.js.map +1 -1
  181. package/getAuthServerClaims.d.ts +8 -5
  182. package/getAuthServerClaims.js +2 -2
  183. package/getAuthServerClaims.js.map +1 -1
  184. package/getAuthenticator.d.ts +24 -26
  185. package/getAuthenticator.js +14 -22
  186. package/getAuthenticator.js.map +1 -1
  187. package/getBehaviour.d.ts +6 -8
  188. package/getBehaviour.js +2 -2
  189. package/getBehaviour.js.map +1 -1
  190. package/getBehaviours.d.ts +7 -7
  191. package/getBehaviours.js +2 -2
  192. package/getBrand.d.ts +9 -6
  193. package/getBrand.js +2 -2
  194. package/getBrand.js.map +1 -1
  195. package/getBrands.d.ts +2 -2
  196. package/getBrands.js +2 -2
  197. package/getDomain.d.ts +11 -14
  198. package/getDomain.js +2 -8
  199. package/getDomain.js.map +1 -1
  200. package/getEmailCustomization.d.ts +14 -9
  201. package/getEmailCustomization.js +2 -6
  202. package/getEmailCustomization.js.map +1 -1
  203. package/getEmailCustomizations.d.ts +11 -9
  204. package/getEmailCustomizations.js +2 -6
  205. package/getEmailCustomizations.js.map +1 -1
  206. package/getGroups.d.ts +11 -25
  207. package/getGroups.js +2 -2
  208. package/getGroups.js.map +1 -1
  209. package/getLogStream.d.ts +8 -39
  210. package/getLogStream.js +2 -24
  211. package/getLogStream.js.map +1 -1
  212. package/getNetworkZone.d.ts +12 -12
  213. package/getNetworkZone.js +2 -2
  214. package/getOrgMetadata.d.ts +0 -22
  215. package/getOrgMetadata.js +0 -22
  216. package/getOrgMetadata.js.map +1 -1
  217. package/getRoleSubscription.d.ts +13 -35
  218. package/getRoleSubscription.js +2 -2
  219. package/getRoleSubscription.js.map +1 -1
  220. package/getTemplate.d.ts +10 -8
  221. package/getTemplate.js +2 -6
  222. package/getTemplate.js.map +1 -1
  223. package/getTemplates.d.ts +6 -7
  224. package/getTemplates.js +2 -6
  225. package/getTemplates.js.map +1 -1
  226. package/getTheme.d.ts +14 -12
  227. package/getTheme.js +2 -6
  228. package/getTheme.js.map +1 -1
  229. package/getThemes.d.ts +6 -7
  230. package/getThemes.js +2 -6
  231. package/getThemes.js.map +1 -1
  232. package/getTrustedOrigins.d.ts +7 -4
  233. package/getTrustedOrigins.js +2 -2
  234. package/getTrustedOrigins.js.map +1 -1
  235. package/getUserSecurityQuestions.d.ts +4 -8
  236. package/getUserSecurityQuestions.js +0 -4
  237. package/getUserSecurityQuestions.js.map +1 -1
  238. package/group/getEveryoneGroup.d.ts +10 -5
  239. package/group/getEveryoneGroup.js +4 -2
  240. package/group/getEveryoneGroup.js.map +1 -1
  241. package/group/getGroup.d.ts +17 -26
  242. package/group/getGroup.js +2 -2
  243. package/group/getGroup.js.map +1 -1
  244. package/group/getRule.d.ts +9 -9
  245. package/group/getRule.js +2 -2
  246. package/group/group.d.ts +4 -36
  247. package/group/group.js +1 -33
  248. package/group/group.js.map +1 -1
  249. package/group/role.d.ts +37 -81
  250. package/group/role.js +1 -6
  251. package/group/role.js.map +1 -1
  252. package/group/rule.d.ts +12 -20
  253. package/group/rule.js +0 -2
  254. package/group/rule.js.map +1 -1
  255. package/groupMemberships.d.ts +8 -10
  256. package/groupMemberships.js +2 -4
  257. package/groupMemberships.js.map +1 -1
  258. package/groupSchemaProperty.d.ts +57 -59
  259. package/groupSchemaProperty.js +0 -2
  260. package/groupSchemaProperty.js.map +1 -1
  261. package/idp/getMetadataSaml.d.ts +9 -6
  262. package/idp/getMetadataSaml.js +2 -2
  263. package/idp/getMetadataSaml.js.map +1 -1
  264. package/idp/getOidc.d.ts +9 -9
  265. package/idp/getOidc.js +2 -2
  266. package/idp/getSaml.d.ts +16 -13
  267. package/idp/getSaml.js +2 -2
  268. package/idp/getSaml.js.map +1 -1
  269. package/idp/getSocial.d.ts +8 -2
  270. package/idp/getSocial.js +2 -2
  271. package/idp/getSocial.js.map +1 -1
  272. package/idp/oidc.d.ts +70 -62
  273. package/idp/oidc.js +3 -5
  274. package/idp/oidc.js.map +1 -1
  275. package/idp/saml.d.ts +64 -86
  276. package/idp/saml.js +1 -5
  277. package/idp/saml.js.map +1 -1
  278. package/idp/samlKey.d.ts +3 -5
  279. package/idp/samlKey.js +0 -2
  280. package/idp/samlKey.js.map +1 -1
  281. package/idp/social.d.ts +99 -69
  282. package/idp/social.js +11 -5
  283. package/idp/social.js.map +1 -1
  284. package/inline/hook.d.ts +4 -26
  285. package/inline/hook.js +1 -5
  286. package/inline/hook.js.map +1 -1
  287. package/linkDefinition.d.ts +2 -3
  288. package/linkDefinition.js +2 -3
  289. package/linkDefinition.js.map +1 -1
  290. package/linkValue.d.ts +7 -9
  291. package/linkValue.js +1 -3
  292. package/linkValue.js.map +1 -1
  293. package/logStream.d.ts +32 -27
  294. package/logStream.js +23 -9
  295. package/logStream.js.map +1 -1
  296. package/network/zone.d.ts +25 -66
  297. package/network/zone.js +1 -39
  298. package/network/zone.js.map +1 -1
  299. package/orgConfiguration.d.ts +4 -9
  300. package/orgConfiguration.js +1 -3
  301. package/orgConfiguration.js.map +1 -1
  302. package/orgSupport.d.ts +4 -7
  303. package/orgSupport.js +1 -4
  304. package/orgSupport.js.map +1 -1
  305. package/package.json +3 -3
  306. package/policy/getDefaultPolicy.d.ts +9 -7
  307. package/policy/getDefaultPolicy.js +6 -2
  308. package/policy/getDefaultPolicy.js.map +1 -1
  309. package/policy/getPolicy.d.ts +11 -26
  310. package/policy/getPolicy.js +2 -2
  311. package/policy/getPolicy.js.map +1 -1
  312. package/policy/mfa.d.ts +18 -220
  313. package/policy/mfa.js +0 -10
  314. package/policy/mfa.js.map +1 -1
  315. package/policy/password.d.ts +91 -95
  316. package/policy/password.js +1 -5
  317. package/policy/password.js.map +1 -1
  318. package/policy/ruleIdpDiscovery.d.ts +111 -93
  319. package/policy/ruleIdpDiscovery.js +48 -57
  320. package/policy/ruleIdpDiscovery.js.map +1 -1
  321. package/policy/ruleMfa.d.ts +40 -30
  322. package/policy/ruleMfa.js +1 -3
  323. package/policy/ruleMfa.js.map +1 -1
  324. package/policy/rulePassword.d.ts +34 -38
  325. package/policy/rulePassword.js +1 -5
  326. package/policy/rulePassword.js.map +1 -1
  327. package/policy/ruleSignon.d.ts +94 -85
  328. package/policy/ruleSignon.js +1 -4
  329. package/policy/ruleSignon.js.map +1 -1
  330. package/policy/signon.d.ts +16 -20
  331. package/policy/signon.js +1 -5
  332. package/policy/signon.js.map +1 -1
  333. package/policyMfaDefault.d.ts +15 -214
  334. package/policyMfaDefault.js +2 -9
  335. package/policyMfaDefault.js.map +1 -1
  336. package/policyPasswordDefault.d.ts +85 -101
  337. package/policyPasswordDefault.js +1 -5
  338. package/policyPasswordDefault.js.map +1 -1
  339. package/policyProfileEnrollment.d.ts +8 -9
  340. package/policyProfileEnrollment.js +2 -3
  341. package/policyProfileEnrollment.js.map +1 -1
  342. package/policyProfileEnrollmentApps.d.ts +8 -11
  343. package/policyProfileEnrollmentApps.js +3 -6
  344. package/policyProfileEnrollmentApps.js.map +1 -1
  345. package/policyRuleProfileEnrollment.d.ts +42 -31
  346. package/policyRuleProfileEnrollment.js +2 -3
  347. package/policyRuleProfileEnrollment.js.map +1 -1
  348. package/profile/mapping.d.ts +19 -34
  349. package/profile/mapping.js +4 -4
  350. package/profile/mapping.js.map +1 -1
  351. package/rateLimiting.d.ts +8 -17
  352. package/rateLimiting.js +2 -5
  353. package/rateLimiting.js.map +1 -1
  354. package/resourceSet.d.ts +18 -26
  355. package/resourceSet.js +9 -14
  356. package/resourceSet.js.map +1 -1
  357. package/roleSubscription.d.ts +35 -86
  358. package/roleSubscription.js +2 -2
  359. package/roleSubscription.js.map +1 -1
  360. package/securityNotificationEmails.d.ts +4 -7
  361. package/securityNotificationEmails.js +4 -7
  362. package/securityNotificationEmails.js.map +1 -1
  363. package/templateSms.d.ts +4 -8
  364. package/templateSms.js +1 -5
  365. package/templateSms.js.map +1 -1
  366. package/theme.d.ts +46 -46
  367. package/theme.js +2 -2
  368. package/threatInsightSettings.d.ts +7 -27
  369. package/threatInsightSettings.js +1 -3
  370. package/threatInsightSettings.js.map +1 -1
  371. package/trustedorigin/origin.d.ts +13 -17
  372. package/trustedorigin/origin.js +1 -5
  373. package/trustedorigin/origin.js.map +1 -1
  374. package/types/input.d.ts +65 -162
  375. package/types/output.d.ts +75 -275
  376. package/user/getUser.d.ts +32 -104
  377. package/user/getUser.js +2 -2
  378. package/user/getUser.js.map +1 -1
  379. package/user/getUserProfileMappingSource.d.ts +9 -7
  380. package/user/getUserProfileMappingSource.js +6 -4
  381. package/user/getUserProfileMappingSource.js.map +1 -1
  382. package/user/getUserType.d.ts +7 -7
  383. package/user/getUserType.js +2 -2
  384. package/user/getUsers.d.ts +95 -37
  385. package/user/getUsers.js +64 -24
  386. package/user/getUsers.js.map +1 -1
  387. package/user/user.d.ts +160 -209
  388. package/user/user.js +43 -65
  389. package/user/user.js.map +1 -1
  390. package/user/userType.d.ts +1 -5
  391. package/user/userType.js +1 -5
  392. package/user/userType.js.map +1 -1
  393. package/userAdminRoles.d.ts +10 -17
  394. package/userAdminRoles.js +1 -5
  395. package/userAdminRoles.js.map +1 -1
  396. package/userBaseSchemaProperty.d.ts +26 -34
  397. package/userBaseSchemaProperty.js +2 -10
  398. package/userBaseSchemaProperty.js.map +1 -1
  399. package/userFactorQuestion.d.ts +1 -5
  400. package/userFactorQuestion.js +1 -5
  401. package/userFactorQuestion.js.map +1 -1
  402. package/userGroupMemberships.d.ts +3 -3
  403. package/userSchemaProperty.d.ts +57 -56
  404. package/userSchemaProperty.js +0 -8
  405. package/userSchemaProperty.js.map +1 -1
@@ -1,8 +1,8 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
- * These operations allow the creation and manipulation of custom roles as custom collections of permissions.
3
+ * Resource to manage administrative Role assignments for a User
4
4
  *
5
- * > **NOTE:** This an `Early Access` feature.
5
+ * These operations allow the creation and manipulation of custom roles as custom collections of permissions.
6
6
  *
7
7
  * ## Example Usage
8
8
  *
@@ -19,10 +19,8 @@ import * as pulumi from "@pulumi/pulumi";
19
19
  *
20
20
  * ## Import
21
21
  *
22
- * Okta Custom Admin Role can be imported via the Okta ID.
23
- *
24
22
  * ```sh
25
- * $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example <custom role id>
23
+ * $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example <custom role id&#62
26
24
  * ```
27
25
  */
28
26
  export declare class AdminRoleCustom extends pulumi.CustomResource {
@@ -42,47 +40,47 @@ export declare class AdminRoleCustom extends pulumi.CustomResource {
42
40
  */
43
41
  static isInstance(obj: any): obj is AdminRoleCustom;
44
42
  /**
45
- * A human-readable description of the new Role.
43
+ * A human-readable description of the new Role
46
44
  */
47
45
  readonly description: pulumi.Output<string>;
48
46
  /**
49
- * The name given to the new Role.
47
+ * The name given to the new Role
50
48
  */
51
49
  readonly label: pulumi.Output<string>;
52
50
  /**
53
51
  * The permissions that the new Role grants. At least one
54
- * permission must be specified when creating custom role. Valid values: `"okta.authzServers.manage"`,
55
- * `"okta.authzServers.read"`,
56
- * `"okta.apps.assignment.manage"`,
57
- * `"okta.apps.manage"`,
58
- * `"okta.apps.read"`,
59
- * `"okta.customizations.manage"`,
60
- * `"okta.customizations.read"`,
61
- * `"okta.groups.appAssignment.manage"`,
62
- * `"okta.groups.create"`,
63
- * `"okta.groups.manage"`,
64
- * `"okta.groups.members.manage"`,
65
- * `"okta.groups.read"`,
66
- * `"okta.profilesources.import.run"`,
67
- * `"okta.users.appAssignment.manage"`,
68
- * `"okta.users.create"`,
69
- * `"okta.users.credentials.expirePassword"`,
70
- * `"okta.users.credentials.manage"`,
71
- * `"okta.users.credentials.resetFactors"`,
72
- * `"okta.users.credentials.resetPassword"`,
73
- * `"okta.users.groupMembership.manage"`,
74
- * `"okta.users.lifecycle.activate"`,
75
- * `"okta.users.lifecycle.clearSessions"`,
76
- * `"okta.users.lifecycle.deactivate"`,
77
- * `"okta.users.lifecycle.delete"`,
78
- * `"okta.users.lifecycle.manage"`,
79
- * `"okta.users.lifecycle.suspend"`,
80
- * `"okta.users.lifecycle.unlock"`,
81
- * `"okta.users.lifecycle.unsuspend"`,
82
- * `"okta.users.manage"`,
83
- * `"okta.users.read"`,
84
- * `"okta.users.userprofile.manage"`,
85
- * `"okta.workflows.invoke"`.,
52
+ * permission must be specified when creating custom role. Valid values: "okta.authzServers.manage",
53
+ * "okta.authzServers.read",
54
+ * "okta.apps.assignment.manage",
55
+ * "okta.apps.manage",
56
+ * "okta.apps.read",
57
+ * "okta.customizations.manage",
58
+ * "okta.customizations.read",
59
+ * "okta.groups.appAssignment.manage",
60
+ * "okta.groups.create",
61
+ * "okta.groups.manage",
62
+ * "okta.groups.members.manage",
63
+ * "okta.groups.read",
64
+ * "okta.profilesources.import.run",
65
+ * "okta.users.appAssignment.manage",
66
+ * "okta.users.create",
67
+ * "okta.users.credentials.expirePassword",
68
+ * "okta.users.credentials.manage",
69
+ * "okta.users.credentials.resetFactors",
70
+ * "okta.users.credentials.resetPassword",
71
+ * "okta.users.groupMembership.manage",
72
+ * "okta.users.lifecycle.activate",
73
+ * "okta.users.lifecycle.clearSessions",
74
+ * "okta.users.lifecycle.deactivate",
75
+ * "okta.users.lifecycle.delete",
76
+ * "okta.users.lifecycle.manage",
77
+ * "okta.users.lifecycle.suspend",
78
+ * "okta.users.lifecycle.unlock",
79
+ * "okta.users.lifecycle.unsuspend",
80
+ * "okta.users.manage",
81
+ * "okta.users.read",
82
+ * "okta.users.userprofile.manage",
83
+ * "okta.workflows.invoke".,
86
84
  */
87
85
  readonly permissions: pulumi.Output<string[] | undefined>;
88
86
  /**
@@ -99,47 +97,47 @@ export declare class AdminRoleCustom extends pulumi.CustomResource {
99
97
  */
100
98
  export interface AdminRoleCustomState {
101
99
  /**
102
- * A human-readable description of the new Role.
100
+ * A human-readable description of the new Role
103
101
  */
104
102
  description?: pulumi.Input<string>;
105
103
  /**
106
- * The name given to the new Role.
104
+ * The name given to the new Role
107
105
  */
108
106
  label?: pulumi.Input<string>;
109
107
  /**
110
108
  * The permissions that the new Role grants. At least one
111
- * permission must be specified when creating custom role. Valid values: `"okta.authzServers.manage"`,
112
- * `"okta.authzServers.read"`,
113
- * `"okta.apps.assignment.manage"`,
114
- * `"okta.apps.manage"`,
115
- * `"okta.apps.read"`,
116
- * `"okta.customizations.manage"`,
117
- * `"okta.customizations.read"`,
118
- * `"okta.groups.appAssignment.manage"`,
119
- * `"okta.groups.create"`,
120
- * `"okta.groups.manage"`,
121
- * `"okta.groups.members.manage"`,
122
- * `"okta.groups.read"`,
123
- * `"okta.profilesources.import.run"`,
124
- * `"okta.users.appAssignment.manage"`,
125
- * `"okta.users.create"`,
126
- * `"okta.users.credentials.expirePassword"`,
127
- * `"okta.users.credentials.manage"`,
128
- * `"okta.users.credentials.resetFactors"`,
129
- * `"okta.users.credentials.resetPassword"`,
130
- * `"okta.users.groupMembership.manage"`,
131
- * `"okta.users.lifecycle.activate"`,
132
- * `"okta.users.lifecycle.clearSessions"`,
133
- * `"okta.users.lifecycle.deactivate"`,
134
- * `"okta.users.lifecycle.delete"`,
135
- * `"okta.users.lifecycle.manage"`,
136
- * `"okta.users.lifecycle.suspend"`,
137
- * `"okta.users.lifecycle.unlock"`,
138
- * `"okta.users.lifecycle.unsuspend"`,
139
- * `"okta.users.manage"`,
140
- * `"okta.users.read"`,
141
- * `"okta.users.userprofile.manage"`,
142
- * `"okta.workflows.invoke"`.,
109
+ * permission must be specified when creating custom role. Valid values: "okta.authzServers.manage",
110
+ * "okta.authzServers.read",
111
+ * "okta.apps.assignment.manage",
112
+ * "okta.apps.manage",
113
+ * "okta.apps.read",
114
+ * "okta.customizations.manage",
115
+ * "okta.customizations.read",
116
+ * "okta.groups.appAssignment.manage",
117
+ * "okta.groups.create",
118
+ * "okta.groups.manage",
119
+ * "okta.groups.members.manage",
120
+ * "okta.groups.read",
121
+ * "okta.profilesources.import.run",
122
+ * "okta.users.appAssignment.manage",
123
+ * "okta.users.create",
124
+ * "okta.users.credentials.expirePassword",
125
+ * "okta.users.credentials.manage",
126
+ * "okta.users.credentials.resetFactors",
127
+ * "okta.users.credentials.resetPassword",
128
+ * "okta.users.groupMembership.manage",
129
+ * "okta.users.lifecycle.activate",
130
+ * "okta.users.lifecycle.clearSessions",
131
+ * "okta.users.lifecycle.deactivate",
132
+ * "okta.users.lifecycle.delete",
133
+ * "okta.users.lifecycle.manage",
134
+ * "okta.users.lifecycle.suspend",
135
+ * "okta.users.lifecycle.unlock",
136
+ * "okta.users.lifecycle.unsuspend",
137
+ * "okta.users.manage",
138
+ * "okta.users.read",
139
+ * "okta.users.userprofile.manage",
140
+ * "okta.workflows.invoke".,
143
141
  */
144
142
  permissions?: pulumi.Input<pulumi.Input<string>[]>;
145
143
  }
@@ -148,47 +146,47 @@ export interface AdminRoleCustomState {
148
146
  */
149
147
  export interface AdminRoleCustomArgs {
150
148
  /**
151
- * A human-readable description of the new Role.
149
+ * A human-readable description of the new Role
152
150
  */
153
151
  description: pulumi.Input<string>;
154
152
  /**
155
- * The name given to the new Role.
153
+ * The name given to the new Role
156
154
  */
157
155
  label: pulumi.Input<string>;
158
156
  /**
159
157
  * The permissions that the new Role grants. At least one
160
- * permission must be specified when creating custom role. Valid values: `"okta.authzServers.manage"`,
161
- * `"okta.authzServers.read"`,
162
- * `"okta.apps.assignment.manage"`,
163
- * `"okta.apps.manage"`,
164
- * `"okta.apps.read"`,
165
- * `"okta.customizations.manage"`,
166
- * `"okta.customizations.read"`,
167
- * `"okta.groups.appAssignment.manage"`,
168
- * `"okta.groups.create"`,
169
- * `"okta.groups.manage"`,
170
- * `"okta.groups.members.manage"`,
171
- * `"okta.groups.read"`,
172
- * `"okta.profilesources.import.run"`,
173
- * `"okta.users.appAssignment.manage"`,
174
- * `"okta.users.create"`,
175
- * `"okta.users.credentials.expirePassword"`,
176
- * `"okta.users.credentials.manage"`,
177
- * `"okta.users.credentials.resetFactors"`,
178
- * `"okta.users.credentials.resetPassword"`,
179
- * `"okta.users.groupMembership.manage"`,
180
- * `"okta.users.lifecycle.activate"`,
181
- * `"okta.users.lifecycle.clearSessions"`,
182
- * `"okta.users.lifecycle.deactivate"`,
183
- * `"okta.users.lifecycle.delete"`,
184
- * `"okta.users.lifecycle.manage"`,
185
- * `"okta.users.lifecycle.suspend"`,
186
- * `"okta.users.lifecycle.unlock"`,
187
- * `"okta.users.lifecycle.unsuspend"`,
188
- * `"okta.users.manage"`,
189
- * `"okta.users.read"`,
190
- * `"okta.users.userprofile.manage"`,
191
- * `"okta.workflows.invoke"`.,
158
+ * permission must be specified when creating custom role. Valid values: "okta.authzServers.manage",
159
+ * "okta.authzServers.read",
160
+ * "okta.apps.assignment.manage",
161
+ * "okta.apps.manage",
162
+ * "okta.apps.read",
163
+ * "okta.customizations.manage",
164
+ * "okta.customizations.read",
165
+ * "okta.groups.appAssignment.manage",
166
+ * "okta.groups.create",
167
+ * "okta.groups.manage",
168
+ * "okta.groups.members.manage",
169
+ * "okta.groups.read",
170
+ * "okta.profilesources.import.run",
171
+ * "okta.users.appAssignment.manage",
172
+ * "okta.users.create",
173
+ * "okta.users.credentials.expirePassword",
174
+ * "okta.users.credentials.manage",
175
+ * "okta.users.credentials.resetFactors",
176
+ * "okta.users.credentials.resetPassword",
177
+ * "okta.users.groupMembership.manage",
178
+ * "okta.users.lifecycle.activate",
179
+ * "okta.users.lifecycle.clearSessions",
180
+ * "okta.users.lifecycle.deactivate",
181
+ * "okta.users.lifecycle.delete",
182
+ * "okta.users.lifecycle.manage",
183
+ * "okta.users.lifecycle.suspend",
184
+ * "okta.users.lifecycle.unlock",
185
+ * "okta.users.lifecycle.unsuspend",
186
+ * "okta.users.manage",
187
+ * "okta.users.read",
188
+ * "okta.users.userprofile.manage",
189
+ * "okta.workflows.invoke".,
192
190
  */
193
191
  permissions?: pulumi.Input<pulumi.Input<string>[]>;
194
192
  }
@@ -6,9 +6,9 @@ exports.AdminRoleCustom = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
- * These operations allow the creation and manipulation of custom roles as custom collections of permissions.
9
+ * Resource to manage administrative Role assignments for a User
10
10
  *
11
- * > **NOTE:** This an `Early Access` feature.
11
+ * These operations allow the creation and manipulation of custom roles as custom collections of permissions.
12
12
  *
13
13
  * ## Example Usage
14
14
  *
@@ -25,10 +25,8 @@ const utilities = require("./utilities");
25
25
  *
26
26
  * ## Import
27
27
  *
28
- * Okta Custom Admin Role can be imported via the Okta ID.
29
- *
30
28
  * ```sh
31
- * $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example &#60;custom role id&#62;
29
+ * $ pulumi import okta:index/adminRoleCustom:AdminRoleCustom example &#60;custom role id&#62
32
30
  * ```
33
31
  */
34
32
  class AdminRoleCustom extends pulumi.CustomResource {
@@ -1 +1 @@
1
- {"version":3,"file":"adminRoleCustom.js","sourceRoot":"","sources":["../adminRoleCustom.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;GAyBG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAuDD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAvGL,0CAwGC;AA1FG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
1
+ {"version":3,"file":"adminRoleCustom.js","sourceRoot":"","sources":["../adminRoleCustom.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;GAuBG;AACH,MAAa,eAAgB,SAAQ,MAAM,CAAC,cAAc;IACtD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA4B,EAAE,IAAmC;QAC1H,OAAO,IAAI,eAAe,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACtE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,eAAe,CAAC,YAAY,CAAC;IAChE,CAAC;IAuDD,YAAY,IAAY,EAAE,WAAwD,EAAE,IAAmC;QACnH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA+C,CAAC;YAC9D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,aAAa,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACzE;aAAM;YACH,MAAM,IAAI,GAAG,WAA8C,CAAC;YAC5D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,WAAW,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACxD,MAAM,IAAI,KAAK,CAAC,yCAAyC,CAAC,CAAC;aAC9D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;YACpE,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,aAAa,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,WAAW,CAAC,CAAC,CAAC,SAAS,CAAC;SACvE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,eAAe,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACpE,CAAC;;AAvGL,0CAwGC;AA1FG,gBAAgB;AACO,4BAAY,GAAG,4CAA4C,CAAC"}
@@ -1,15 +1,12 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
- * This resource allows the assignment and unassignment of Custom Roles. The `members` field supports these type of resources:
4
- * - Groups
5
- * - Users
3
+ * Resource to manage the assignment and unassignment of Custom Roles
4
+ * These operations allow the creation and manipulation of custom roles as custom collections of permissions.
6
5
  *
7
- * > **NOTE:** This an `Early Access` feature.
6
+ * > **NOTE:** This an Early Access feature.
8
7
  *
9
8
  * ## Import
10
9
  *
11
- * Okta Custom Admin Role Assignments can be imported via the Okta ID.
12
- *
13
10
  * ```sh
14
11
  * $ pulumi import okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments example &#60;resource_set_id&#62;/&#60;custom_role_id&#62;
15
12
  * ```
@@ -31,16 +28,15 @@ export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
31
28
  */
32
29
  static isInstance(obj: any): obj is AdminRoleCustomAssignments;
33
30
  /**
34
- * ID of the Custom Role.
31
+ * ID of the Custom Role
35
32
  */
36
33
  readonly customRoleId: pulumi.Output<string>;
37
34
  /**
38
- * The hrefs that point to User(s) and/or Group(s) that receive the Role. At least one
39
- * permission must be specified when creating custom role.
35
+ * The hrefs that point to User(s) and/or Group(s) that receive the Role
40
36
  */
41
37
  readonly members: pulumi.Output<string[] | undefined>;
42
38
  /**
43
- * ID of the target Resource Set.
39
+ * ID of the target Resource Set
44
40
  */
45
41
  readonly resourceSetId: pulumi.Output<string>;
46
42
  /**
@@ -57,16 +53,15 @@ export declare class AdminRoleCustomAssignments extends pulumi.CustomResource {
57
53
  */
58
54
  export interface AdminRoleCustomAssignmentsState {
59
55
  /**
60
- * ID of the Custom Role.
56
+ * ID of the Custom Role
61
57
  */
62
58
  customRoleId?: pulumi.Input<string>;
63
59
  /**
64
- * The hrefs that point to User(s) and/or Group(s) that receive the Role. At least one
65
- * permission must be specified when creating custom role.
60
+ * The hrefs that point to User(s) and/or Group(s) that receive the Role
66
61
  */
67
62
  members?: pulumi.Input<pulumi.Input<string>[]>;
68
63
  /**
69
- * ID of the target Resource Set.
64
+ * ID of the target Resource Set
70
65
  */
71
66
  resourceSetId?: pulumi.Input<string>;
72
67
  }
@@ -75,16 +70,15 @@ export interface AdminRoleCustomAssignmentsState {
75
70
  */
76
71
  export interface AdminRoleCustomAssignmentsArgs {
77
72
  /**
78
- * ID of the Custom Role.
73
+ * ID of the Custom Role
79
74
  */
80
75
  customRoleId: pulumi.Input<string>;
81
76
  /**
82
- * The hrefs that point to User(s) and/or Group(s) that receive the Role. At least one
83
- * permission must be specified when creating custom role.
77
+ * The hrefs that point to User(s) and/or Group(s) that receive the Role
84
78
  */
85
79
  members?: pulumi.Input<pulumi.Input<string>[]>;
86
80
  /**
87
- * ID of the target Resource Set.
81
+ * ID of the target Resource Set
88
82
  */
89
83
  resourceSetId: pulumi.Input<string>;
90
84
  }
@@ -6,16 +6,13 @@ exports.AdminRoleCustomAssignments = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("./utilities");
8
8
  /**
9
- * This resource allows the assignment and unassignment of Custom Roles. The `members` field supports these type of resources:
10
- * - Groups
11
- * - Users
9
+ * Resource to manage the assignment and unassignment of Custom Roles
10
+ * These operations allow the creation and manipulation of custom roles as custom collections of permissions.
12
11
  *
13
- * > **NOTE:** This an `Early Access` feature.
12
+ * > **NOTE:** This an Early Access feature.
14
13
  *
15
14
  * ## Import
16
15
  *
17
- * Okta Custom Admin Role Assignments can be imported via the Okta ID.
18
- *
19
16
  * ```sh
20
17
  * $ pulumi import okta:index/adminRoleCustomAssignments:AdminRoleCustomAssignments example &#60;resource_set_id&#62;/&#60;custom_role_id&#62;
21
18
  * ```
@@ -1 +1 @@
1
- {"version":3,"file":"adminRoleCustomAssignments.js","sourceRoot":"","sources":["../adminRoleCustomAssignments.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;GAcG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IAwBD,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAxEL,gEAyEC;AA3DG,gBAAgB;AACO,uCAAY,GAAG,kEAAkE,CAAC"}
1
+ {"version":3,"file":"adminRoleCustomAssignments.js","sourceRoot":"","sources":["../adminRoleCustomAssignments.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;GAWG;AACH,MAAa,0BAA2B,SAAQ,MAAM,CAAC,cAAc;IACjE;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAuC,EAAE,IAAmC;QACrI,OAAO,IAAI,0BAA0B,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACjF,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,0BAA0B,CAAC,YAAY,CAAC;IAC3E,CAAC;IAuBD,YAAY,IAAY,EAAE,WAA8E,EAAE,IAAmC;QACzI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAA0D,CAAC;YACzE,cAAc,CAAC,cAAc,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACxE,cAAc,CAAC,SAAS,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,eAAe,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC7E;aAAM;YACH,MAAM,IAAI,GAAG,WAAyD,CAAC;YACvE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,YAAY,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACzD,MAAM,IAAI,KAAK,CAAC,0CAA0C,CAAC,CAAC;aAC/D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,aAAa,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAC1D,MAAM,IAAI,KAAK,CAAC,2CAA2C,CAAC,CAAC;aAChE;YACD,cAAc,CAAC,cAAc,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,YAAY,CAAC,CAAC,CAAC,SAAS,CAAC;YACtE,cAAc,CAAC,SAAS,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,OAAO,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,eAAe,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,aAAa,CAAC,CAAC,CAAC,SAAS,CAAC;SAC3E;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,0BAA0B,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC/E,CAAC;;AAvEL,gEAwEC;AA1DG,gBAAgB;AACO,uCAAY,GAAG,kEAAkE,CAAC"}
@@ -23,8 +23,6 @@ import * as pulumi from "@pulumi/pulumi";
23
23
  *
24
24
  * ## Import
25
25
  *
26
- * Okta Admin Role Targets can be imported via the Okta ID.
27
- *
28
26
  * ```sh
29
27
  * $ pulumi import okta:index/adminRoleTargets:AdminRoleTargets example &#60;user id&#62;/&#60;role type&#62;
30
28
  * ```
@@ -46,23 +44,23 @@ export declare class AdminRoleTargets extends pulumi.CustomResource {
46
44
  */
47
45
  static isInstance(obj: any): obj is AdminRoleTargets;
48
46
  /**
49
- * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3').
47
+ * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
50
48
  */
51
49
  readonly apps: pulumi.Output<string[] | undefined>;
52
50
  /**
53
- * List of group IDs. Conflicts with `apps`.
51
+ * List of group IDs. Conflicts with apps
54
52
  */
55
53
  readonly groups: pulumi.Output<string[] | undefined>;
56
54
  /**
57
- * Role ID.
55
+ * ID of a role
58
56
  */
59
57
  readonly roleId: pulumi.Output<string>;
60
58
  /**
61
- * Name of the role associated with the user. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
59
+ * Type of the role that is assigned to the user and supports optional targets. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types)
62
60
  */
63
61
  readonly roleType: pulumi.Output<string>;
64
62
  /**
65
- * ID of the user.
63
+ * User associated with the role
66
64
  */
67
65
  readonly userId: pulumi.Output<string>;
68
66
  /**
@@ -79,23 +77,23 @@ export declare class AdminRoleTargets extends pulumi.CustomResource {
79
77
  */
80
78
  export interface AdminRoleTargetsState {
81
79
  /**
82
- * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3').
80
+ * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
83
81
  */
84
82
  apps?: pulumi.Input<pulumi.Input<string>[]>;
85
83
  /**
86
- * List of group IDs. Conflicts with `apps`.
84
+ * List of group IDs. Conflicts with apps
87
85
  */
88
86
  groups?: pulumi.Input<pulumi.Input<string>[]>;
89
87
  /**
90
- * Role ID.
88
+ * ID of a role
91
89
  */
92
90
  roleId?: pulumi.Input<string>;
93
91
  /**
94
- * Name of the role associated with the user. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
92
+ * Type of the role that is assigned to the user and supports optional targets. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types)
95
93
  */
96
94
  roleType?: pulumi.Input<string>;
97
95
  /**
98
- * ID of the user.
96
+ * User associated with the role
99
97
  */
100
98
  userId?: pulumi.Input<string>;
101
99
  }
@@ -104,19 +102,19 @@ export interface AdminRoleTargetsState {
104
102
  */
105
103
  export interface AdminRoleTargetsArgs {
106
104
  /**
107
- * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3').
105
+ * List of app names (name represents set of app instances) or a combination of app name and app instance ID (like 'salesforce' or 'facebook.0oapsqQ6dv19pqyEo0g3')
108
106
  */
109
107
  apps?: pulumi.Input<pulumi.Input<string>[]>;
110
108
  /**
111
- * List of group IDs. Conflicts with `apps`.
109
+ * List of group IDs. Conflicts with apps
112
110
  */
113
111
  groups?: pulumi.Input<pulumi.Input<string>[]>;
114
112
  /**
115
- * Name of the role associated with the user. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types).
113
+ * Type of the role that is assigned to the user and supports optional targets. See [API Docs](https://developer.okta.com/docs/reference/api/roles/#role-types)
116
114
  */
117
115
  roleType: pulumi.Input<string>;
118
116
  /**
119
- * ID of the user.
117
+ * User associated with the role
120
118
  */
121
119
  userId: pulumi.Input<string>;
122
120
  }
@@ -29,8 +29,6 @@ const utilities = require("./utilities");
29
29
  *
30
30
  * ## Import
31
31
  *
32
- * Okta Admin Role Targets can be imported via the Okta ID.
33
- *
34
32
  * ```sh
35
33
  * $ pulumi import okta:index/adminRoleTargets:AdminRoleTargets example &#60;user id&#62;/&#60;role type&#62;
36
34
  * ```
@@ -1 +1 @@
1
- {"version":3,"file":"adminRoleTargets.js","sourceRoot":"","sources":["../adminRoleTargets.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA6BG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IA+BD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAnFL,4CAoFC;AAtEG,gBAAgB;AACO,6BAAY,GAAG,8CAA8C,CAAC"}
1
+ {"version":3,"file":"adminRoleTargets.js","sourceRoot":"","sources":["../adminRoleTargets.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,yCAAyC;AAEzC;;;;;;;;;;;;;;;;;;;;;;;;;;;GA2BG;AACH,MAAa,gBAAiB,SAAQ,MAAM,CAAC,cAAc;IACvD;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAA6B,EAAE,IAAmC;QAC3H,OAAO,IAAI,gBAAgB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IACvE,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,gBAAgB,CAAC,YAAY,CAAC;IACjE,CAAC;IA+BD,YAAY,IAAY,EAAE,WAA0D,EAAE,IAAmC;QACrH,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAgD,CAAC;YAC/D,cAAc,CAAC,MAAM,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC5D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAChE,cAAc,CAAC,QAAQ,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;SAC/D;aAAM;YACH,MAAM,IAAI,GAAG,WAA+C,CAAC;YAC7D,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,MAAM,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACnD,MAAM,IAAI,KAAK,CAAC,oCAAoC,CAAC,CAAC;aACzD;YACD,cAAc,CAAC,MAAM,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,IAAI,CAAC,CAAC,CAAC,SAAS,CAAC;YACtD,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;YAC9D,cAAc,CAAC,QAAQ,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,MAAM,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,QAAQ,CAAC,GAAG,SAAS,CAAC,OAAO,CAAC;SAChD;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,gBAAgB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IACrE,CAAC;;AAnFL,4CAoFC;AAtEG,gBAAgB;AACO,6BAAY,GAAG,8CAA8C,CAAC"}
@@ -1,5 +1,9 @@
1
1
  import * as pulumi from "@pulumi/pulumi";
2
2
  /**
3
+ * Manages assignment of Access Policy to an Application.
4
+ *
5
+ * **Warning**: do not use as this will update okta_app_*.authentication_policy and vice versa
6
+ *
3
7
  * Assigns an access policy (colloquially known as a sign-on policy and/or an
4
8
  * authentication policy) to an application. This resource does not perform true
5
9
  * delete as it will not delete an application and the app's access policy can't be
@@ -13,9 +17,26 @@ import * as pulumi from "@pulumi/pulumi";
13
17
  * policy_, in the public API the policy is of type
14
18
  * [`ACCESS_POLICY`](https://developer.okta.com/docs/reference/api/policy/#policy-object).
15
19
  *
16
- * ## Import
20
+ * ## Example Usage
21
+ *
22
+ * ```typescript
23
+ * import * as pulumi from "@pulumi/pulumi";
24
+ * import * as okta from "@pulumi/okta";
17
25
  *
18
- * An Okta App's Access Policy Assignment can be imported via its associated Application ID.
26
+ * const access = okta.policy.getPolicy({
27
+ * name: "Any two factors",
28
+ * type: "ACCESS_POLICY",
29
+ * });
30
+ * const example = okta.app.getApp({
31
+ * label: "Example App",
32
+ * });
33
+ * const assignment = new okta.app.AccessPolicyAssignment("assignment", {
34
+ * appId: example.then(example => example.id),
35
+ * policyId: access.then(access => access.id),
36
+ * });
37
+ * ```
38
+ *
39
+ * ## Import
19
40
  *
20
41
  * ```sh
21
42
  * $ pulumi import okta:app/accessPolicyAssignment:AccessPolicyAssignment example &#60;app id&#62;
@@ -6,6 +6,10 @@ exports.AccessPolicyAssignment = void 0;
6
6
  const pulumi = require("@pulumi/pulumi");
7
7
  const utilities = require("../utilities");
8
8
  /**
9
+ * Manages assignment of Access Policy to an Application.
10
+ *
11
+ * **Warning**: do not use as this will update okta_app_*.authentication_policy and vice versa
12
+ *
9
13
  * Assigns an access policy (colloquially known as a sign-on policy and/or an
10
14
  * authentication policy) to an application. This resource does not perform true
11
15
  * delete as it will not delete an application and the app's access policy can't be
@@ -19,9 +23,26 @@ const utilities = require("../utilities");
19
23
  * policy_, in the public API the policy is of type
20
24
  * [`ACCESS_POLICY`](https://developer.okta.com/docs/reference/api/policy/#policy-object).
21
25
  *
22
- * ## Import
26
+ * ## Example Usage
27
+ *
28
+ * ```typescript
29
+ * import * as pulumi from "@pulumi/pulumi";
30
+ * import * as okta from "@pulumi/okta";
23
31
  *
24
- * An Okta App's Access Policy Assignment can be imported via its associated Application ID.
32
+ * const access = okta.policy.getPolicy({
33
+ * name: "Any two factors",
34
+ * type: "ACCESS_POLICY",
35
+ * });
36
+ * const example = okta.app.getApp({
37
+ * label: "Example App",
38
+ * });
39
+ * const assignment = new okta.app.AccessPolicyAssignment("assignment", {
40
+ * appId: example.then(example => example.id),
41
+ * policyId: access.then(access => access.id),
42
+ * });
43
+ * ```
44
+ *
45
+ * ## Import
25
46
  *
26
47
  * ```sh
27
48
  * $ pulumi import okta:app/accessPolicyAssignment:AccessPolicyAssignment example &#60;app id&#62;
@@ -1 +1 @@
1
- {"version":3,"file":"accessPolicyAssignment.js","sourceRoot":"","sources":["../../app/accessPolicyAssignment.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;GAqBG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAjEL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,wDAAwD,CAAC"}
1
+ {"version":3,"file":"accessPolicyAssignment.js","sourceRoot":"","sources":["../../app/accessPolicyAssignment.ts"],"names":[],"mappings":";AAAA,wFAAwF;AACxF,iFAAiF;;;AAEjF,yCAAyC;AACzC,0CAA0C;AAE1C;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;GA0CG;AACH,MAAa,sBAAuB,SAAQ,MAAM,CAAC,cAAc;IAC7D;;;;;;;;OAQG;IACI,MAAM,CAAC,GAAG,CAAC,IAAY,EAAE,EAA2B,EAAE,KAAmC,EAAE,IAAmC;QACjI,OAAO,IAAI,sBAAsB,CAAC,IAAI,EAAO,KAAK,kCAAO,IAAI,KAAE,EAAE,EAAE,EAAE,IAAG,CAAC;IAC7E,CAAC;IAKD;;;OAGG;IACI,MAAM,CAAC,UAAU,CAAC,GAAQ;QAC7B,IAAI,GAAG,KAAK,SAAS,IAAI,GAAG,KAAK,IAAI,EAAE;YACnC,OAAO,KAAK,CAAC;SAChB;QACD,OAAO,GAAG,CAAC,cAAc,CAAC,KAAK,sBAAsB,CAAC,YAAY,CAAC;IACvE,CAAC;IAmBD,YAAY,IAAY,EAAE,WAAsE,EAAE,IAAmC;QACjI,IAAI,cAAc,GAAkB,EAAE,CAAC;QACvC,IAAI,GAAG,IAAI,IAAI,EAAE,CAAC;QAClB,IAAI,IAAI,CAAC,EAAE,EAAE;YACT,MAAM,KAAK,GAAG,WAAsD,CAAC;YACrE,cAAc,CAAC,OAAO,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YAC1D,cAAc,CAAC,UAAU,CAAC,GAAG,KAAK,CAAC,CAAC,CAAC,KAAK,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACnE;aAAM;YACH,MAAM,IAAI,GAAG,WAAqD,CAAC;YACnE,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,KAAK,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBAClD,MAAM,IAAI,KAAK,CAAC,mCAAmC,CAAC,CAAC;aACxD;YACD,IAAI,CAAC,CAAC,IAAI,IAAI,IAAI,CAAC,QAAQ,KAAK,SAAS,CAAC,IAAI,CAAC,IAAI,CAAC,GAAG,EAAE;gBACrD,MAAM,IAAI,KAAK,CAAC,sCAAsC,CAAC,CAAC;aAC3D;YACD,cAAc,CAAC,OAAO,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,KAAK,CAAC,CAAC,CAAC,SAAS,CAAC;YACxD,cAAc,CAAC,UAAU,CAAC,GAAG,IAAI,CAAC,CAAC,CAAC,IAAI,CAAC,QAAQ,CAAC,CAAC,CAAC,SAAS,CAAC;SACjE;QACD,IAAI,GAAG,MAAM,CAAC,YAAY,CAAC,SAAS,CAAC,oBAAoB,EAAE,EAAE,IAAI,CAAC,CAAC;QACnE,KAAK,CAAC,sBAAsB,CAAC,YAAY,EAAE,IAAI,EAAE,cAAc,EAAE,IAAI,CAAC,CAAC;IAC3E,CAAC;;AAjEL,wDAkEC;AApDG,gBAAgB;AACO,mCAAY,GAAG,wDAAwD,CAAC"}