@pulumi/okta 4.9.0-alpha.1718431198 → 4.9.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (405) hide show
  1. package/adminRoleCustom.d.ts +105 -107
  2. package/adminRoleCustom.js +3 -5
  3. package/adminRoleCustom.js.map +1 -1
  4. package/adminRoleCustomAssignments.d.ts +12 -18
  5. package/adminRoleCustomAssignments.js +3 -6
  6. package/adminRoleCustomAssignments.js.map +1 -1
  7. package/adminRoleTargets.d.ts +14 -16
  8. package/adminRoleTargets.js +0 -2
  9. package/adminRoleTargets.js.map +1 -1
  10. package/app/accessPolicyAssignment.d.ts +23 -2
  11. package/app/accessPolicyAssignment.js +23 -2
  12. package/app/accessPolicyAssignment.js.map +1 -1
  13. package/app/autoLogin.d.ts +63 -97
  14. package/app/autoLogin.js +3 -37
  15. package/app/autoLogin.js.map +1 -1
  16. package/app/basicAuth.d.ts +30 -33
  17. package/app/basicAuth.js +4 -7
  18. package/app/basicAuth.js.map +1 -1
  19. package/app/bookmark.d.ts +30 -33
  20. package/app/bookmark.js +3 -6
  21. package/app/bookmark.js.map +1 -1
  22. package/app/getApp.d.ts +58 -25
  23. package/app/getApp.js +2 -2
  24. package/app/getApp.js.map +1 -1
  25. package/app/getMetadataSaml.d.ts +11 -5
  26. package/app/getMetadataSaml.js +2 -2
  27. package/app/getMetadataSaml.js.map +1 -1
  28. package/app/getOauth.d.ts +62 -34
  29. package/app/getOauth.js +2 -2
  30. package/app/getOauth.js.map +1 -1
  31. package/app/getSaml.d.ts +75 -56
  32. package/app/getSaml.js +2 -2
  33. package/app/getSaml.js.map +1 -1
  34. package/app/groupAssignment.d.ts +23 -9
  35. package/app/groupAssignment.js +17 -3
  36. package/app/groupAssignment.js.map +1 -1
  37. package/app/oauth.d.ts +135 -273
  38. package/app/oauth.js +6 -60
  39. package/app/oauth.js.map +1 -1
  40. package/app/oauthPostLogoutRedirectUri.d.ts +4 -6
  41. package/app/oauthPostLogoutRedirectUri.js +1 -3
  42. package/app/oauthPostLogoutRedirectUri.js.map +1 -1
  43. package/app/oauthRedirectUri.d.ts +4 -6
  44. package/app/oauthRedirectUri.js +1 -3
  45. package/app/oauthRedirectUri.js.map +1 -1
  46. package/app/oauthRoleAssignment.d.ts +4 -29
  47. package/app/oauthRoleAssignment.js +4 -29
  48. package/app/oauthRoleAssignment.js.map +1 -1
  49. package/app/saml.d.ts +161 -289
  50. package/app/saml.js +6 -152
  51. package/app/saml.js.map +1 -1
  52. package/app/securePasswordStore.d.ts +79 -80
  53. package/app/securePasswordStore.js +6 -7
  54. package/app/securePasswordStore.js.map +1 -1
  55. package/app/swa.d.ts +70 -71
  56. package/app/swa.js +4 -5
  57. package/app/swa.js.map +1 -1
  58. package/app/threeField.d.ts +74 -76
  59. package/app/threeField.js +5 -7
  60. package/app/threeField.js.map +1 -1
  61. package/app/user.d.ts +12 -17
  62. package/app/user.js +0 -2
  63. package/app/user.js.map +1 -1
  64. package/appGroupAssignments.d.ts +6 -8
  65. package/appGroupAssignments.js +3 -5
  66. package/appGroupAssignments.js.map +1 -1
  67. package/appOauthApiScope.d.ts +5 -7
  68. package/appOauthApiScope.js +2 -4
  69. package/appOauthApiScope.js.map +1 -1
  70. package/appSamlAppSettings.d.ts +6 -7
  71. package/appSamlAppSettings.js +3 -4
  72. package/appSamlAppSettings.js.map +1 -1
  73. package/appSharedCredentials.d.ts +61 -63
  74. package/appSharedCredentials.js +4 -6
  75. package/appSharedCredentials.js.map +1 -1
  76. package/appSignonPolicy.d.ts +3 -39
  77. package/appSignonPolicy.js +3 -39
  78. package/appSignonPolicy.js.map +1 -1
  79. package/appSignonPolicyRule.d.ts +69 -361
  80. package/appSignonPolicyRule.js +1 -278
  81. package/appSignonPolicyRule.js.map +1 -1
  82. package/appUserBaseSchemaProperty.d.ts +25 -29
  83. package/appUserBaseSchemaProperty.js +1 -5
  84. package/appUserBaseSchemaProperty.js.map +1 -1
  85. package/appUserSchemaProperty.d.ts +51 -41
  86. package/appUserSchemaProperty.js +0 -2
  87. package/appUserSchemaProperty.js.map +1 -1
  88. package/auth/getServer.d.ts +11 -11
  89. package/auth/getServer.js +2 -2
  90. package/auth/getServerPolicy.d.ts +15 -9
  91. package/auth/getServerPolicy.js +2 -2
  92. package/auth/getServerPolicy.js.map +1 -1
  93. package/auth/getServerScopes.d.ts +8 -5
  94. package/auth/getServerScopes.js +2 -2
  95. package/auth/getServerScopes.js.map +1 -1
  96. package/auth/server.d.ts +15 -19
  97. package/auth/server.js +1 -5
  98. package/auth/server.js.map +1 -1
  99. package/auth/serverClaim.d.ts +13 -17
  100. package/auth/serverClaim.js +1 -5
  101. package/auth/serverClaim.js.map +1 -1
  102. package/auth/serverPolicy.d.ts +10 -14
  103. package/auth/serverPolicy.js +1 -5
  104. package/auth/serverPolicy.js.map +1 -1
  105. package/auth/serverPolicyClaim.d.ts +50 -66
  106. package/auth/serverPolicyClaim.js +0 -25
  107. package/auth/serverPolicyClaim.js.map +1 -1
  108. package/auth/serverPolicyRule.d.ts +32 -43
  109. package/auth/serverPolicyRule.js +0 -2
  110. package/auth/serverPolicyRule.js.map +1 -1
  111. package/auth/serverScope.d.ts +16 -20
  112. package/auth/serverScope.js +1 -5
  113. package/auth/serverScope.js.map +1 -1
  114. package/authServerClaimDefault.d.ts +10 -25
  115. package/authServerClaimDefault.js +0 -9
  116. package/authServerClaimDefault.js.map +1 -1
  117. package/authServerDefault.d.ts +15 -19
  118. package/authServerDefault.js +1 -5
  119. package/authServerDefault.js.map +1 -1
  120. package/authenticator.d.ts +53 -61
  121. package/authenticator.js +11 -11
  122. package/authenticator.js.map +1 -1
  123. package/behaviour.d.ts +21 -41
  124. package/behaviour.js +0 -2
  125. package/behaviour.js.map +1 -1
  126. package/brand.d.ts +23 -22
  127. package/brand.js +8 -4
  128. package/brand.js.map +1 -1
  129. package/captcha.d.ts +15 -17
  130. package/captcha.js +3 -5
  131. package/captcha.js.map +1 -1
  132. package/captchaOrgWideSettings.d.ts +8 -43
  133. package/captchaOrgWideSettings.js +2 -37
  134. package/captchaOrgWideSettings.js.map +1 -1
  135. package/domain.d.ts +13 -21
  136. package/domain.js +0 -2
  137. package/domain.js.map +1 -1
  138. package/domainCertificate.d.ts +17 -24
  139. package/domainCertificate.js +2 -9
  140. package/domainCertificate.js.map +1 -1
  141. package/domainVerification.d.ts +4 -10
  142. package/domainVerification.js +1 -7
  143. package/domainVerification.js.map +1 -1
  144. package/emailCustomization.d.ts +38 -222
  145. package/emailCustomization.js +29 -33
  146. package/emailCustomization.js.map +1 -1
  147. package/emailDomain.d.ts +4 -8
  148. package/emailDomain.js +0 -4
  149. package/emailDomain.js.map +1 -1
  150. package/emailDomainVerification.d.ts +3 -7
  151. package/emailDomainVerification.js +0 -4
  152. package/emailDomainVerification.js.map +1 -1
  153. package/emailSender.d.ts +15 -17
  154. package/emailSender.js +2 -4
  155. package/emailSender.js.map +1 -1
  156. package/emailSenderVerification.d.ts +5 -9
  157. package/emailSenderVerification.js +2 -6
  158. package/emailSenderVerification.js.map +1 -1
  159. package/eventHook.d.ts +16 -11
  160. package/eventHook.js +1 -5
  161. package/eventHook.js.map +1 -1
  162. package/eventHookVerification.d.ts +4 -10
  163. package/eventHookVerification.js +1 -7
  164. package/eventHookVerification.js.map +1 -1
  165. package/factor/factor.d.ts +4 -9
  166. package/factor/factor.js +1 -3
  167. package/factor/factor.js.map +1 -1
  168. package/factorTotp.d.ts +12 -21
  169. package/factorTotp.js +3 -3
  170. package/factorTotp.js.map +1 -1
  171. package/getAppGroupAssignments.d.ts +6 -6
  172. package/getAppGroupAssignments.js +2 -2
  173. package/getAppSignonPolicy.d.ts +16 -6
  174. package/getAppSignonPolicy.js +8 -4
  175. package/getAppSignonPolicy.js.map +1 -1
  176. package/getAppUserAssignments.d.ts +6 -6
  177. package/getAppUserAssignments.js +2 -2
  178. package/getAuthServerClaim.d.ts +15 -12
  179. package/getAuthServerClaim.js +2 -2
  180. package/getAuthServerClaim.js.map +1 -1
  181. package/getAuthServerClaims.d.ts +8 -5
  182. package/getAuthServerClaims.js +2 -2
  183. package/getAuthServerClaims.js.map +1 -1
  184. package/getAuthenticator.d.ts +24 -26
  185. package/getAuthenticator.js +14 -22
  186. package/getAuthenticator.js.map +1 -1
  187. package/getBehaviour.d.ts +6 -8
  188. package/getBehaviour.js +2 -2
  189. package/getBehaviour.js.map +1 -1
  190. package/getBehaviours.d.ts +7 -7
  191. package/getBehaviours.js +2 -2
  192. package/getBrand.d.ts +9 -6
  193. package/getBrand.js +2 -2
  194. package/getBrand.js.map +1 -1
  195. package/getBrands.d.ts +2 -2
  196. package/getBrands.js +2 -2
  197. package/getDomain.d.ts +11 -14
  198. package/getDomain.js +2 -8
  199. package/getDomain.js.map +1 -1
  200. package/getEmailCustomization.d.ts +14 -9
  201. package/getEmailCustomization.js +2 -6
  202. package/getEmailCustomization.js.map +1 -1
  203. package/getEmailCustomizations.d.ts +11 -9
  204. package/getEmailCustomizations.js +2 -6
  205. package/getEmailCustomizations.js.map +1 -1
  206. package/getGroups.d.ts +11 -25
  207. package/getGroups.js +2 -2
  208. package/getGroups.js.map +1 -1
  209. package/getLogStream.d.ts +8 -39
  210. package/getLogStream.js +2 -24
  211. package/getLogStream.js.map +1 -1
  212. package/getNetworkZone.d.ts +12 -12
  213. package/getNetworkZone.js +2 -2
  214. package/getOrgMetadata.d.ts +0 -22
  215. package/getOrgMetadata.js +0 -22
  216. package/getOrgMetadata.js.map +1 -1
  217. package/getRoleSubscription.d.ts +13 -35
  218. package/getRoleSubscription.js +2 -2
  219. package/getRoleSubscription.js.map +1 -1
  220. package/getTemplate.d.ts +10 -8
  221. package/getTemplate.js +2 -6
  222. package/getTemplate.js.map +1 -1
  223. package/getTemplates.d.ts +6 -7
  224. package/getTemplates.js +2 -6
  225. package/getTemplates.js.map +1 -1
  226. package/getTheme.d.ts +14 -12
  227. package/getTheme.js +2 -6
  228. package/getTheme.js.map +1 -1
  229. package/getThemes.d.ts +6 -7
  230. package/getThemes.js +2 -6
  231. package/getThemes.js.map +1 -1
  232. package/getTrustedOrigins.d.ts +7 -4
  233. package/getTrustedOrigins.js +2 -2
  234. package/getTrustedOrigins.js.map +1 -1
  235. package/getUserSecurityQuestions.d.ts +4 -8
  236. package/getUserSecurityQuestions.js +0 -4
  237. package/getUserSecurityQuestions.js.map +1 -1
  238. package/group/getEveryoneGroup.d.ts +10 -5
  239. package/group/getEveryoneGroup.js +4 -2
  240. package/group/getEveryoneGroup.js.map +1 -1
  241. package/group/getGroup.d.ts +17 -26
  242. package/group/getGroup.js +2 -2
  243. package/group/getGroup.js.map +1 -1
  244. package/group/getRule.d.ts +9 -9
  245. package/group/getRule.js +2 -2
  246. package/group/group.d.ts +4 -36
  247. package/group/group.js +1 -33
  248. package/group/group.js.map +1 -1
  249. package/group/role.d.ts +37 -81
  250. package/group/role.js +1 -6
  251. package/group/role.js.map +1 -1
  252. package/group/rule.d.ts +12 -20
  253. package/group/rule.js +0 -2
  254. package/group/rule.js.map +1 -1
  255. package/groupMemberships.d.ts +8 -10
  256. package/groupMemberships.js +2 -4
  257. package/groupMemberships.js.map +1 -1
  258. package/groupSchemaProperty.d.ts +57 -59
  259. package/groupSchemaProperty.js +0 -2
  260. package/groupSchemaProperty.js.map +1 -1
  261. package/idp/getMetadataSaml.d.ts +9 -6
  262. package/idp/getMetadataSaml.js +2 -2
  263. package/idp/getMetadataSaml.js.map +1 -1
  264. package/idp/getOidc.d.ts +9 -9
  265. package/idp/getOidc.js +2 -2
  266. package/idp/getSaml.d.ts +16 -13
  267. package/idp/getSaml.js +2 -2
  268. package/idp/getSaml.js.map +1 -1
  269. package/idp/getSocial.d.ts +8 -2
  270. package/idp/getSocial.js +2 -2
  271. package/idp/getSocial.js.map +1 -1
  272. package/idp/oidc.d.ts +70 -62
  273. package/idp/oidc.js +3 -5
  274. package/idp/oidc.js.map +1 -1
  275. package/idp/saml.d.ts +64 -86
  276. package/idp/saml.js +1 -5
  277. package/idp/saml.js.map +1 -1
  278. package/idp/samlKey.d.ts +3 -5
  279. package/idp/samlKey.js +0 -2
  280. package/idp/samlKey.js.map +1 -1
  281. package/idp/social.d.ts +99 -69
  282. package/idp/social.js +11 -5
  283. package/idp/social.js.map +1 -1
  284. package/inline/hook.d.ts +4 -26
  285. package/inline/hook.js +1 -5
  286. package/inline/hook.js.map +1 -1
  287. package/linkDefinition.d.ts +2 -3
  288. package/linkDefinition.js +2 -3
  289. package/linkDefinition.js.map +1 -1
  290. package/linkValue.d.ts +7 -9
  291. package/linkValue.js +1 -3
  292. package/linkValue.js.map +1 -1
  293. package/logStream.d.ts +32 -27
  294. package/logStream.js +23 -9
  295. package/logStream.js.map +1 -1
  296. package/network/zone.d.ts +25 -66
  297. package/network/zone.js +1 -39
  298. package/network/zone.js.map +1 -1
  299. package/orgConfiguration.d.ts +4 -9
  300. package/orgConfiguration.js +1 -3
  301. package/orgConfiguration.js.map +1 -1
  302. package/orgSupport.d.ts +4 -7
  303. package/orgSupport.js +1 -4
  304. package/orgSupport.js.map +1 -1
  305. package/package.json +3 -3
  306. package/policy/getDefaultPolicy.d.ts +9 -7
  307. package/policy/getDefaultPolicy.js +6 -2
  308. package/policy/getDefaultPolicy.js.map +1 -1
  309. package/policy/getPolicy.d.ts +11 -26
  310. package/policy/getPolicy.js +2 -2
  311. package/policy/getPolicy.js.map +1 -1
  312. package/policy/mfa.d.ts +18 -220
  313. package/policy/mfa.js +0 -10
  314. package/policy/mfa.js.map +1 -1
  315. package/policy/password.d.ts +91 -95
  316. package/policy/password.js +1 -5
  317. package/policy/password.js.map +1 -1
  318. package/policy/ruleIdpDiscovery.d.ts +111 -93
  319. package/policy/ruleIdpDiscovery.js +48 -57
  320. package/policy/ruleIdpDiscovery.js.map +1 -1
  321. package/policy/ruleMfa.d.ts +40 -30
  322. package/policy/ruleMfa.js +1 -3
  323. package/policy/ruleMfa.js.map +1 -1
  324. package/policy/rulePassword.d.ts +34 -38
  325. package/policy/rulePassword.js +1 -5
  326. package/policy/rulePassword.js.map +1 -1
  327. package/policy/ruleSignon.d.ts +94 -85
  328. package/policy/ruleSignon.js +1 -4
  329. package/policy/ruleSignon.js.map +1 -1
  330. package/policy/signon.d.ts +16 -20
  331. package/policy/signon.js +1 -5
  332. package/policy/signon.js.map +1 -1
  333. package/policyMfaDefault.d.ts +15 -214
  334. package/policyMfaDefault.js +2 -9
  335. package/policyMfaDefault.js.map +1 -1
  336. package/policyPasswordDefault.d.ts +85 -101
  337. package/policyPasswordDefault.js +1 -5
  338. package/policyPasswordDefault.js.map +1 -1
  339. package/policyProfileEnrollment.d.ts +8 -9
  340. package/policyProfileEnrollment.js +2 -3
  341. package/policyProfileEnrollment.js.map +1 -1
  342. package/policyProfileEnrollmentApps.d.ts +8 -11
  343. package/policyProfileEnrollmentApps.js +3 -6
  344. package/policyProfileEnrollmentApps.js.map +1 -1
  345. package/policyRuleProfileEnrollment.d.ts +42 -31
  346. package/policyRuleProfileEnrollment.js +2 -3
  347. package/policyRuleProfileEnrollment.js.map +1 -1
  348. package/profile/mapping.d.ts +19 -34
  349. package/profile/mapping.js +4 -4
  350. package/profile/mapping.js.map +1 -1
  351. package/rateLimiting.d.ts +8 -17
  352. package/rateLimiting.js +2 -5
  353. package/rateLimiting.js.map +1 -1
  354. package/resourceSet.d.ts +18 -26
  355. package/resourceSet.js +9 -14
  356. package/resourceSet.js.map +1 -1
  357. package/roleSubscription.d.ts +35 -86
  358. package/roleSubscription.js +2 -2
  359. package/roleSubscription.js.map +1 -1
  360. package/securityNotificationEmails.d.ts +4 -7
  361. package/securityNotificationEmails.js +4 -7
  362. package/securityNotificationEmails.js.map +1 -1
  363. package/templateSms.d.ts +4 -8
  364. package/templateSms.js +1 -5
  365. package/templateSms.js.map +1 -1
  366. package/theme.d.ts +46 -46
  367. package/theme.js +2 -2
  368. package/threatInsightSettings.d.ts +7 -27
  369. package/threatInsightSettings.js +1 -3
  370. package/threatInsightSettings.js.map +1 -1
  371. package/trustedorigin/origin.d.ts +13 -17
  372. package/trustedorigin/origin.js +1 -5
  373. package/trustedorigin/origin.js.map +1 -1
  374. package/types/input.d.ts +65 -162
  375. package/types/output.d.ts +75 -275
  376. package/user/getUser.d.ts +32 -104
  377. package/user/getUser.js +2 -2
  378. package/user/getUser.js.map +1 -1
  379. package/user/getUserProfileMappingSource.d.ts +9 -7
  380. package/user/getUserProfileMappingSource.js +6 -4
  381. package/user/getUserProfileMappingSource.js.map +1 -1
  382. package/user/getUserType.d.ts +7 -7
  383. package/user/getUserType.js +2 -2
  384. package/user/getUsers.d.ts +95 -37
  385. package/user/getUsers.js +64 -24
  386. package/user/getUsers.js.map +1 -1
  387. package/user/user.d.ts +160 -209
  388. package/user/user.js +43 -65
  389. package/user/user.js.map +1 -1
  390. package/user/userType.d.ts +1 -5
  391. package/user/userType.js +1 -5
  392. package/user/userType.js.map +1 -1
  393. package/userAdminRoles.d.ts +10 -17
  394. package/userAdminRoles.js +1 -5
  395. package/userAdminRoles.js.map +1 -1
  396. package/userBaseSchemaProperty.d.ts +26 -34
  397. package/userBaseSchemaProperty.js +2 -10
  398. package/userBaseSchemaProperty.js.map +1 -1
  399. package/userFactorQuestion.d.ts +1 -5
  400. package/userFactorQuestion.js +1 -5
  401. package/userFactorQuestion.js.map +1 -1
  402. package/userGroupMemberships.d.ts +3 -3
  403. package/userSchemaProperty.d.ts +57 -56
  404. package/userSchemaProperty.js +0 -8
  405. package/userSchemaProperty.js.map +1 -1
package/app/oauth.d.ts CHANGED
@@ -3,65 +3,13 @@ import * as inputs from "../types/input";
3
3
  import * as outputs from "../types/output";
4
4
  /**
5
5
  * This resource allows you to create and configure an OIDC Application.
6
- *
7
- * > During an apply if there is change in `status` the app will first be
8
- * activated or deactivated in accordance with the `status` change. Then, all
6
+ * > During an apply if there is change in status the app will first be
7
+ * activated or deactivated in accordance with the status change. Then, all
9
8
  * other arguments that changed will be applied.
10
9
  *
11
- * ## Example Usage
12
- *
13
- * ```typescript
14
- * import * as pulumi from "@pulumi/pulumi";
15
- * import * as okta from "@pulumi/okta";
16
- *
17
- * const example = new okta.app.OAuth("example", {
18
- * label: "example",
19
- * type: "web",
20
- * grantTypes: ["authorization_code"],
21
- * redirectUris: ["https://example.com/"],
22
- * responseTypes: ["code"],
23
- * });
24
- * ```
25
- *
26
- * ### With JWKS value
27
- *
28
- * See also Advanced PEM secrets and JWKS example.
29
- *
30
- * ```typescript
31
- * import * as pulumi from "@pulumi/pulumi";
32
- * import * as okta from "@pulumi/okta";
33
- *
34
- * const example = new okta.app.OAuth("example", {
35
- * label: "example",
36
- * type: "service",
37
- * responseTypes: ["token"],
38
- * grantTypes: ["client_credentials"],
39
- * tokenEndpointAuthMethod: "private_key_jwt",
40
- * jwks: [
41
- * {
42
- * kty: "RSA",
43
- * kid: "SIGNING_KEY_RSA",
44
- * e: "AQAB",
45
- * n: "xyz",
46
- * },
47
- * {
48
- * kty: "EC",
49
- * kid: "SIGNING_KEY_EC",
50
- * x: "K37X78mXJHHldZYMzrwipjKR-YZUS2SMye0KindHp6I",
51
- * y: "8IfvsvXWzbFWOZoVOMwgF5p46mUj3kbOVf9Fk0vVVHo",
52
- * },
53
- * ],
54
- * });
55
- * ```
56
- *
57
- * ## Etc.
58
- *
59
- * ### Resetting client secret
60
- *
61
- * If the client secret needs to be reset run an apply with `omitSecret` set to
62
- * true in the resource. This causes `clientSecret` to be set to blank. Remove
63
- * `omitSecret` and run apply again. The resource will set a new `clientSecret`
64
- * for the app.
10
+ * > `okta.app.OAuthRedirectUri` has been marked deprecated and will be removed
11
+ * in the v5 release of the provider. Operators should manage the redirect URIs for
12
+ * an oauth app directly on that resource.
65
13
  *
66
14
  * ### Private Keys
67
15
  *
@@ -75,10 +23,8 @@ import * as outputs from "../types/output";
75
23
  *
76
24
  * ## Import
77
25
  *
78
- * An OIDC Application can be imported via the Okta ID.
79
- *
80
26
  * ```sh
81
- * $ pulumi import okta:app/oAuth:OAuth example <app id>
27
+ * $ pulumi import okta:app/oAuth:OAuth example <app id&#62
82
28
  * ```
83
29
  */
84
30
  export declare class OAuth extends pulumi.CustomResource {
@@ -98,15 +44,15 @@ export declare class OAuth extends pulumi.CustomResource {
98
44
  */
99
45
  static isInstance(obj: any): obj is OAuth;
100
46
  /**
101
- * Custom error page URL.
47
+ * Custom error page URL
102
48
  */
103
49
  readonly accessibilityErrorRedirectUrl: pulumi.Output<string | undefined>;
104
50
  /**
105
- * Custom login page for this application.
51
+ * Custom login page URL
106
52
  */
107
53
  readonly accessibilityLoginRedirectUrl: pulumi.Output<string | undefined>;
108
54
  /**
109
- * Enable self-service. By default, it is `false`.
55
+ * Enable self service. Default is `false`
110
56
  */
111
57
  readonly accessibilitySelfService: pulumi.Output<boolean | undefined>;
112
58
  /**
@@ -118,35 +64,35 @@ export declare class OAuth extends pulumi.CustomResource {
118
64
  */
119
65
  readonly appLinksJson: pulumi.Output<string | undefined>;
120
66
  /**
121
- * Application settings in JSON format.
67
+ * Application settings in JSON format
122
68
  */
123
69
  readonly appSettingsJson: pulumi.Output<string | undefined>;
124
70
  /**
125
- * The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.
71
+ * The ID of the associated app*signon*policy. If this property is removed from the application the default sign-on-policy will be associated with this application.
126
72
  */
127
- readonly authenticationPolicy: pulumi.Output<string | undefined>;
73
+ readonly authenticationPolicy: pulumi.Output<string>;
128
74
  /**
129
- * Requested key rotation mode. If
130
- * `autoKeyRotation` isn't specified, the client automatically opts in for Okta's
131
- * key rotation. You can update this property via the API or via the administrator
132
- * UI.
133
- * See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
75
+ * Requested key rotation mode. If
76
+ * auto*key*rotation isn't specified, the client automatically opts in for Okta's
77
+ * key rotation. You can update this property via the API or via the administrator
78
+ * UI.
79
+ * See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object"
134
80
  */
135
81
  readonly autoKeyRotation: pulumi.Output<boolean | undefined>;
136
82
  /**
137
- * Display auto submit toolbar.
83
+ * Display auto submit toolbar
138
84
  */
139
85
  readonly autoSubmitToolbar: pulumi.Output<boolean | undefined>;
140
86
  /**
141
- * The user provided OAuth client secret key value, this can be set when `tokenEndpointAuthMethod` is `"clientSecretBasic"`. This does nothing when `omitSecret` is set to true.
87
+ * The user provided OAuth client secret key value, this can be set when token*endpoint*auth*method is client*secret*basic. This does nothing when `omit*secret is set to true.
142
88
  */
143
89
  readonly clientBasicSecret: pulumi.Output<string | undefined>;
144
90
  /**
145
- * OAuth client ID. If set during creation, app is created with this id. See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
91
+ * OAuth client ID. If set during creation, app is created with this id.
146
92
  */
147
93
  readonly clientId: pulumi.Output<string>;
148
94
  /**
149
- * OAuth client secret value, this is output only. This will be in plain text in your statefile unless you set omitSecret above. See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
95
+ * OAuth client secret value, this is output only. This will be in plain text in your statefile unless you set omitSecret above.
150
96
  */
151
97
  readonly clientSecret: pulumi.Output<string>;
152
98
  /**
@@ -154,7 +100,7 @@ export declare class OAuth extends pulumi.CustomResource {
154
100
  */
155
101
  readonly clientUri: pulumi.Output<string | undefined>;
156
102
  /**
157
- * Indicates whether user consent is required or implicit. Valid values: `"REQUIRED"`, `"TRUSTED"`. Default value is `"TRUSTED"`.
103
+ * *Early Access Property*. Indicates whether user consent is required or implicit. Valid values: REQUIRED, TRUSTED. Default value is TRUSTED
158
104
  */
159
105
  readonly consentMethod: pulumi.Output<string | undefined>;
160
106
  /**
@@ -162,39 +108,32 @@ export declare class OAuth extends pulumi.CustomResource {
162
108
  */
163
109
  readonly enduserNote: pulumi.Output<string | undefined>;
164
110
  /**
165
- * List of OAuth 2.0 grant types. Conditional validation params found [here](https://developer.okta.com/docs/api/resources/apps#credentials-settings-details).
166
- * Defaults to minimum requirements per app type. Valid values: `"authorizationCode"`, `"implicit"`, `"password"`, `"refreshToken"`, `"clientCredentials"`,
167
- * `"urn:ietf:params:oauth:grant-type:saml2-bearer"` (*Early Access Property*), `"urn:ietf:params:oauth:grant-type:token-exchange"` (*Early Access Property*),
168
- * `"interactionCode"` (*OIE only*).
111
+ * List of OAuth 2.0 grant types. Conditional validation params found here https://developer.okta.com/docs/api/resources/apps#credentials-settings-details. Defaults to minimum requirements per app type.
169
112
  */
170
113
  readonly grantTypes: pulumi.Output<string[] | undefined>;
171
114
  /**
172
- * Groups claim for an OpenID Connect client application. **IMPORTANT**: this argument is ignored when Okta API authentication is done with OAuth 2.0 credentials
115
+ * Groups claim for an OpenID Connect client application (argument is ignored when API auth is done with OAuth 2.0 credentials)
173
116
  */
174
117
  readonly groupsClaim: pulumi.Output<outputs.app.OAuthGroupsClaim | undefined>;
175
118
  /**
176
- * Do not display application icon on mobile app.
119
+ * Do not display application icon on mobile app
177
120
  */
178
121
  readonly hideIos: pulumi.Output<boolean | undefined>;
179
122
  /**
180
- * Do not display application icon to users.
123
+ * Do not display application icon to users
181
124
  */
182
125
  readonly hideWeb: pulumi.Output<boolean | undefined>;
183
126
  /**
184
- * *Early Access Property*. Enables [Federation Broker Mode](https://help.okta.com/en/prod/Content/Topics/Apps/apps-fbm-enable.htm). When this mode is enabled, `users` and `groups` arguments are ignored.
127
+ * *Early Access Property*. Enable Federation Broker Mode.
185
128
  */
186
129
  readonly implicitAssignment: pulumi.Output<boolean | undefined>;
187
130
  /**
188
- * Indicates whether the Okta Authorization Server uses the original Okta org domain URL or a custom domain URL as the issuer of ID token for this client.
189
- * Valid values: `"CUSTOM_URL"`,`"ORG_URL"` or `"DYNAMIC"`. Default is `"ORG_URL"`.
131
+ * *Early Access Property*. Indicates whether the Okta Authorization Server uses the original Okta org domain URL or a custom domain URL as the issuer of ID token for this client.
190
132
  */
191
133
  readonly issuerMode: pulumi.Output<string | undefined>;
192
- /**
193
- * JSON Web Key set. Multiple jwks are supported[Admin Console JWK Reference](https://developer.okta.com/docs/guides/implement-oauth-for-okta-serviceapp/main/#generate-the-jwk-in-the-admin-console). Use kty=RSA e=[value] n=[value] for RSA jwks, and kty=EC x=[value] y=[value] for EC jwks
194
- */
195
134
  readonly jwks: pulumi.Output<outputs.app.OAuthJwk[] | undefined>;
196
135
  /**
197
- * URL of the custom authorization server's JSON Web Key Set document.
136
+ * URL reference to JWKS
198
137
  */
199
138
  readonly jwksUri: pulumi.Output<string | undefined>;
200
139
  /**
@@ -202,15 +141,15 @@ export declare class OAuth extends pulumi.CustomResource {
202
141
  */
203
142
  readonly label: pulumi.Output<string>;
204
143
  /**
205
- * The type of Idp-Initiated login that the client supports, if any. Valid values: `"DISABLED"`, `"SPEC"`, `"OKTA"`. Default is `"DISABLED"`.
144
+ * The type of Idp-Initiated login that the client supports, if any
206
145
  */
207
146
  readonly loginMode: pulumi.Output<string | undefined>;
208
147
  /**
209
- * List of scopes to use for the request. Valid values: `"openid"`, `"profile"`, `"email"`, `"address"`, `"phone"`. Required when `loginMode` is NOT `DISABLED`.
148
+ * List of scopes to use for the request
210
149
  */
211
150
  readonly loginScopes: pulumi.Output<string[] | undefined>;
212
151
  /**
213
- * URI that initiates login. Required when `loginMode` is NOT `DISABLED`.
152
+ * URI that initiates login.
214
153
  */
215
154
  readonly loginUri: pulumi.Output<string | undefined>;
216
155
  /**
@@ -222,23 +161,19 @@ export declare class OAuth extends pulumi.CustomResource {
222
161
  */
223
162
  readonly logoUri: pulumi.Output<string | undefined>;
224
163
  /**
225
- * Direct link of application logo.
164
+ * URL of the application's logo
226
165
  */
227
166
  readonly logoUrl: pulumi.Output<string>;
228
167
  /**
229
- * Name assigned to the application by Okta.
168
+ * Name of the app.
230
169
  */
231
170
  readonly name: pulumi.Output<string>;
232
171
  /**
233
- * This tells the provider not manage the `clientSecret` value in state. When this is false (the default), it will cause the auto-generated `clientSecret` to be persisted in the `clientSecret` attribute in state. This also means that every time an update to this app is run, this value is also set on the API. If this changes from false => true, the `clientSecret` is dropped from state and the secret at the time of the apply is what remains. If this is ever changes from true => false your app will be recreated, due to the need to regenerate a secret we can store in state.
172
+ * This tells the provider not manage the client*secret value in state. When this is false (the default), it will cause the auto-generated client*secret to be persisted in the clientSecret attribute in state. This also means that every time an update to this app is run, this value is also set on the API. If this changes from false => true, the `clientSecret` is dropped from state and the secret at the time of the apply is what remains. If this is ever changes from true => false your app will be recreated, due to the need to regenerate a secret we can store in state.
234
173
  */
235
174
  readonly omitSecret: pulumi.Output<boolean | undefined>;
236
175
  /**
237
- * Require Proof Key for Code Exchange (PKCE) for
238
- * additional verification. If `pkceRequired` isn't specified when adding a new
239
- * application, Okta sets it to `true` by default for `"browser"` and `"native"`
240
- * application types.
241
- * See https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
176
+ * Require Proof Key for Code Exchange (PKCE) for additional verification key rotation mode. See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
242
177
  */
243
178
  readonly pkceRequired: pulumi.Output<boolean>;
244
179
  /**
@@ -246,56 +181,39 @@ export declare class OAuth extends pulumi.CustomResource {
246
181
  */
247
182
  readonly policyUri: pulumi.Output<string | undefined>;
248
183
  /**
249
- * List of URIs for redirection after logout.
184
+ * List of URIs for redirection after logout. Note: see okta*app*oauth*post*logout*redirect*uri for appending to this list in a decentralized way.
250
185
  */
251
186
  readonly postLogoutRedirectUris: pulumi.Output<string[] | undefined>;
252
187
  /**
253
- * Custom JSON that represents an OAuth application's profile.
188
+ * Custom JSON that represents an OAuth application's profile
254
189
  */
255
190
  readonly profile: pulumi.Output<string | undefined>;
256
191
  /**
257
- * List of URIs for use in the redirect-based flow. This is required for all application types except service.
192
+ * List of URIs for use in the redirect-based flow. This is required for all application types except service. Note: see okta*app*oauth*redirect*uri for appending to this list in a decentralized way.
258
193
  */
259
194
  readonly redirectUris: pulumi.Output<string[] | undefined>;
260
195
  /**
261
- * Grace period for token rotation. Valid values: 0 to 60 seconds.
196
+ * *Early Access Property* Grace period for token rotation, required with grant types refresh_token
262
197
  */
263
198
  readonly refreshTokenLeeway: pulumi.Output<number | undefined>;
264
199
  /**
265
- * Refresh token rotation behavior. Valid values: `"STATIC"` or `"ROTATE"`.
200
+ * *Early Access Property* Refresh token rotation behavior, required with grant types refresh_token
266
201
  */
267
202
  readonly refreshTokenRotation: pulumi.Output<string | undefined>;
268
203
  /**
269
- * List of OAuth 2.0 response type strings. Array
270
- * values of `"code"`, `"token"`, `"idToken"`. The `grantTypes` and `responseTypes`
271
- * values described are partially orthogonal, as they refer to arguments
272
- * passed to different endpoints in the OAuth 2.0 protocol (opens new window).
273
- * However, they are related in that the `grantTypes` available to a client
274
- * influence the `responseTypes` that the client is allowed to use, and vice versa.
275
- * For instance, a grantTypes value that includes authorizationCode implies a
276
- * `responseTypes` value that includes code, as both values are defined as part of
277
- * the OAuth 2.0 authorization code grant.
278
- * See: https://developer.okta.com/docs/reference/api/apps/#add-oauth-2-0-client-application
204
+ * List of OAuth 2.0 response type strings.
279
205
  */
280
206
  readonly responseTypes: pulumi.Output<string[] | undefined>;
281
207
  /**
282
- * Sign-on mode of application.
208
+ * Sign on mode of application.
283
209
  */
284
210
  readonly signOnMode: pulumi.Output<string>;
285
211
  /**
286
- * The status of the application, by default, it is `"ACTIVE"`.
212
+ * Status of application. By default, it is `ACTIVE`
287
213
  */
288
214
  readonly status: pulumi.Output<string | undefined>;
289
215
  /**
290
- * Requested authentication method for
291
- * the token endpoint. It can be set to `"none"`, `"clientSecretPost"`,
292
- * `"clientSecretBasic"`, `"clientSecretJwt"`, `"privateKeyJwt"`. Use
293
- * `pkceRequired` to require PKCE for your confidential clients using the
294
- * Authorization Code flow. If `"tokenEndpointAuthMethod"` is `"none"`,
295
- * `pkceRequired` needs to be `true`. If `pkceRequired` isn't specified when
296
- * adding a new application, Okta sets it to `true` by default for `"browser"` and
297
- * `"native"` application types.
298
- * See https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
216
+ * Requested authentication method for the token endpoint.
299
217
  */
300
218
  readonly tokenEndpointAuthMethod: pulumi.Output<string | undefined>;
301
219
  /**
@@ -303,27 +221,27 @@ export declare class OAuth extends pulumi.CustomResource {
303
221
  */
304
222
  readonly tosUri: pulumi.Output<string | undefined>;
305
223
  /**
306
- * The type of OAuth application. Valid values: `"web"`, `"native"`, `"browser"`, `"service"`. For SPA apps use `browser`.
224
+ * The type of client application.
307
225
  */
308
226
  readonly type: pulumi.Output<string>;
309
227
  /**
310
- * Username template. Default: `"${source.login}"`
228
+ * Username template. Default: `${source.login}`
311
229
  */
312
230
  readonly userNameTemplate: pulumi.Output<string | undefined>;
313
231
  /**
314
- * Push username on update. Valid values: `"PUSH"` and `"DONT_PUSH"`.
232
+ * Push username on update. Valid values: `PUSH` and `DONT_PUSH`
315
233
  */
316
234
  readonly userNameTemplatePushStatus: pulumi.Output<string | undefined>;
317
235
  /**
318
- * Username template suffix.
236
+ * Username template suffix
319
237
  */
320
238
  readonly userNameTemplateSuffix: pulumi.Output<string | undefined>;
321
239
  /**
322
- * Username template type. Default: `"BUILT_IN"`.
240
+ * Username template type. Default: `BUILT_IN`
323
241
  */
324
242
  readonly userNameTemplateType: pulumi.Output<string | undefined>;
325
243
  /**
326
- * *Early Access Property*. Indicates if the client is allowed to use wildcard matching of `redirectUris`. Valid values: `"DISABLED"`, `"SUBDOMAIN"`. Default value is `"DISABLED"`.
244
+ * *Early Access Property*. Indicates if the client is allowed to use wildcard matching of redirect_uris
327
245
  */
328
246
  readonly wildcardRedirect: pulumi.Output<string | undefined>;
329
247
  /**
@@ -340,15 +258,15 @@ export declare class OAuth extends pulumi.CustomResource {
340
258
  */
341
259
  export interface OAuthState {
342
260
  /**
343
- * Custom error page URL.
261
+ * Custom error page URL
344
262
  */
345
263
  accessibilityErrorRedirectUrl?: pulumi.Input<string>;
346
264
  /**
347
- * Custom login page for this application.
265
+ * Custom login page URL
348
266
  */
349
267
  accessibilityLoginRedirectUrl?: pulumi.Input<string>;
350
268
  /**
351
- * Enable self-service. By default, it is `false`.
269
+ * Enable self service. Default is `false`
352
270
  */
353
271
  accessibilitySelfService?: pulumi.Input<boolean>;
354
272
  /**
@@ -360,35 +278,35 @@ export interface OAuthState {
360
278
  */
361
279
  appLinksJson?: pulumi.Input<string>;
362
280
  /**
363
- * Application settings in JSON format.
281
+ * Application settings in JSON format
364
282
  */
365
283
  appSettingsJson?: pulumi.Input<string>;
366
284
  /**
367
- * The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.
285
+ * The ID of the associated app*signon*policy. If this property is removed from the application the default sign-on-policy will be associated with this application.
368
286
  */
369
287
  authenticationPolicy?: pulumi.Input<string>;
370
288
  /**
371
- * Requested key rotation mode. If
372
- * `autoKeyRotation` isn't specified, the client automatically opts in for Okta's
373
- * key rotation. You can update this property via the API or via the administrator
374
- * UI.
375
- * See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
289
+ * Requested key rotation mode. If
290
+ * auto*key*rotation isn't specified, the client automatically opts in for Okta's
291
+ * key rotation. You can update this property via the API or via the administrator
292
+ * UI.
293
+ * See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object"
376
294
  */
377
295
  autoKeyRotation?: pulumi.Input<boolean>;
378
296
  /**
379
- * Display auto submit toolbar.
297
+ * Display auto submit toolbar
380
298
  */
381
299
  autoSubmitToolbar?: pulumi.Input<boolean>;
382
300
  /**
383
- * The user provided OAuth client secret key value, this can be set when `tokenEndpointAuthMethod` is `"clientSecretBasic"`. This does nothing when `omitSecret` is set to true.
301
+ * The user provided OAuth client secret key value, this can be set when token*endpoint*auth*method is client*secret*basic. This does nothing when `omit*secret is set to true.
384
302
  */
385
303
  clientBasicSecret?: pulumi.Input<string>;
386
304
  /**
387
- * OAuth client ID. If set during creation, app is created with this id. See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
305
+ * OAuth client ID. If set during creation, app is created with this id.
388
306
  */
389
307
  clientId?: pulumi.Input<string>;
390
308
  /**
391
- * OAuth client secret value, this is output only. This will be in plain text in your statefile unless you set omitSecret above. See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
309
+ * OAuth client secret value, this is output only. This will be in plain text in your statefile unless you set omitSecret above.
392
310
  */
393
311
  clientSecret?: pulumi.Input<string>;
394
312
  /**
@@ -396,7 +314,7 @@ export interface OAuthState {
396
314
  */
397
315
  clientUri?: pulumi.Input<string>;
398
316
  /**
399
- * Indicates whether user consent is required or implicit. Valid values: `"REQUIRED"`, `"TRUSTED"`. Default value is `"TRUSTED"`.
317
+ * *Early Access Property*. Indicates whether user consent is required or implicit. Valid values: REQUIRED, TRUSTED. Default value is TRUSTED
400
318
  */
401
319
  consentMethod?: pulumi.Input<string>;
402
320
  /**
@@ -404,39 +322,32 @@ export interface OAuthState {
404
322
  */
405
323
  enduserNote?: pulumi.Input<string>;
406
324
  /**
407
- * List of OAuth 2.0 grant types. Conditional validation params found [here](https://developer.okta.com/docs/api/resources/apps#credentials-settings-details).
408
- * Defaults to minimum requirements per app type. Valid values: `"authorizationCode"`, `"implicit"`, `"password"`, `"refreshToken"`, `"clientCredentials"`,
409
- * `"urn:ietf:params:oauth:grant-type:saml2-bearer"` (*Early Access Property*), `"urn:ietf:params:oauth:grant-type:token-exchange"` (*Early Access Property*),
410
- * `"interactionCode"` (*OIE only*).
325
+ * List of OAuth 2.0 grant types. Conditional validation params found here https://developer.okta.com/docs/api/resources/apps#credentials-settings-details. Defaults to minimum requirements per app type.
411
326
  */
412
327
  grantTypes?: pulumi.Input<pulumi.Input<string>[]>;
413
328
  /**
414
- * Groups claim for an OpenID Connect client application. **IMPORTANT**: this argument is ignored when Okta API authentication is done with OAuth 2.0 credentials
329
+ * Groups claim for an OpenID Connect client application (argument is ignored when API auth is done with OAuth 2.0 credentials)
415
330
  */
416
331
  groupsClaim?: pulumi.Input<inputs.app.OAuthGroupsClaim>;
417
332
  /**
418
- * Do not display application icon on mobile app.
333
+ * Do not display application icon on mobile app
419
334
  */
420
335
  hideIos?: pulumi.Input<boolean>;
421
336
  /**
422
- * Do not display application icon to users.
337
+ * Do not display application icon to users
423
338
  */
424
339
  hideWeb?: pulumi.Input<boolean>;
425
340
  /**
426
- * *Early Access Property*. Enables [Federation Broker Mode](https://help.okta.com/en/prod/Content/Topics/Apps/apps-fbm-enable.htm). When this mode is enabled, `users` and `groups` arguments are ignored.
341
+ * *Early Access Property*. Enable Federation Broker Mode.
427
342
  */
428
343
  implicitAssignment?: pulumi.Input<boolean>;
429
344
  /**
430
- * Indicates whether the Okta Authorization Server uses the original Okta org domain URL or a custom domain URL as the issuer of ID token for this client.
431
- * Valid values: `"CUSTOM_URL"`,`"ORG_URL"` or `"DYNAMIC"`. Default is `"ORG_URL"`.
345
+ * *Early Access Property*. Indicates whether the Okta Authorization Server uses the original Okta org domain URL or a custom domain URL as the issuer of ID token for this client.
432
346
  */
433
347
  issuerMode?: pulumi.Input<string>;
434
- /**
435
- * JSON Web Key set. Multiple jwks are supported[Admin Console JWK Reference](https://developer.okta.com/docs/guides/implement-oauth-for-okta-serviceapp/main/#generate-the-jwk-in-the-admin-console). Use kty=RSA e=[value] n=[value] for RSA jwks, and kty=EC x=[value] y=[value] for EC jwks
436
- */
437
348
  jwks?: pulumi.Input<pulumi.Input<inputs.app.OAuthJwk>[]>;
438
349
  /**
439
- * URL of the custom authorization server's JSON Web Key Set document.
350
+ * URL reference to JWKS
440
351
  */
441
352
  jwksUri?: pulumi.Input<string>;
442
353
  /**
@@ -444,15 +355,15 @@ export interface OAuthState {
444
355
  */
445
356
  label?: pulumi.Input<string>;
446
357
  /**
447
- * The type of Idp-Initiated login that the client supports, if any. Valid values: `"DISABLED"`, `"SPEC"`, `"OKTA"`. Default is `"DISABLED"`.
358
+ * The type of Idp-Initiated login that the client supports, if any
448
359
  */
449
360
  loginMode?: pulumi.Input<string>;
450
361
  /**
451
- * List of scopes to use for the request. Valid values: `"openid"`, `"profile"`, `"email"`, `"address"`, `"phone"`. Required when `loginMode` is NOT `DISABLED`.
362
+ * List of scopes to use for the request
452
363
  */
453
364
  loginScopes?: pulumi.Input<pulumi.Input<string>[]>;
454
365
  /**
455
- * URI that initiates login. Required when `loginMode` is NOT `DISABLED`.
366
+ * URI that initiates login.
456
367
  */
457
368
  loginUri?: pulumi.Input<string>;
458
369
  /**
@@ -464,23 +375,19 @@ export interface OAuthState {
464
375
  */
465
376
  logoUri?: pulumi.Input<string>;
466
377
  /**
467
- * Direct link of application logo.
378
+ * URL of the application's logo
468
379
  */
469
380
  logoUrl?: pulumi.Input<string>;
470
381
  /**
471
- * Name assigned to the application by Okta.
382
+ * Name of the app.
472
383
  */
473
384
  name?: pulumi.Input<string>;
474
385
  /**
475
- * This tells the provider not manage the `clientSecret` value in state. When this is false (the default), it will cause the auto-generated `clientSecret` to be persisted in the `clientSecret` attribute in state. This also means that every time an update to this app is run, this value is also set on the API. If this changes from false => true, the `clientSecret` is dropped from state and the secret at the time of the apply is what remains. If this is ever changes from true => false your app will be recreated, due to the need to regenerate a secret we can store in state.
386
+ * This tells the provider not manage the client*secret value in state. When this is false (the default), it will cause the auto-generated client*secret to be persisted in the clientSecret attribute in state. This also means that every time an update to this app is run, this value is also set on the API. If this changes from false => true, the `clientSecret` is dropped from state and the secret at the time of the apply is what remains. If this is ever changes from true => false your app will be recreated, due to the need to regenerate a secret we can store in state.
476
387
  */
477
388
  omitSecret?: pulumi.Input<boolean>;
478
389
  /**
479
- * Require Proof Key for Code Exchange (PKCE) for
480
- * additional verification. If `pkceRequired` isn't specified when adding a new
481
- * application, Okta sets it to `true` by default for `"browser"` and `"native"`
482
- * application types.
483
- * See https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
390
+ * Require Proof Key for Code Exchange (PKCE) for additional verification key rotation mode. See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
484
391
  */
485
392
  pkceRequired?: pulumi.Input<boolean>;
486
393
  /**
@@ -488,56 +395,39 @@ export interface OAuthState {
488
395
  */
489
396
  policyUri?: pulumi.Input<string>;
490
397
  /**
491
- * List of URIs for redirection after logout.
398
+ * List of URIs for redirection after logout. Note: see okta*app*oauth*post*logout*redirect*uri for appending to this list in a decentralized way.
492
399
  */
493
400
  postLogoutRedirectUris?: pulumi.Input<pulumi.Input<string>[]>;
494
401
  /**
495
- * Custom JSON that represents an OAuth application's profile.
402
+ * Custom JSON that represents an OAuth application's profile
496
403
  */
497
404
  profile?: pulumi.Input<string>;
498
405
  /**
499
- * List of URIs for use in the redirect-based flow. This is required for all application types except service.
406
+ * List of URIs for use in the redirect-based flow. This is required for all application types except service. Note: see okta*app*oauth*redirect*uri for appending to this list in a decentralized way.
500
407
  */
501
408
  redirectUris?: pulumi.Input<pulumi.Input<string>[]>;
502
409
  /**
503
- * Grace period for token rotation. Valid values: 0 to 60 seconds.
410
+ * *Early Access Property* Grace period for token rotation, required with grant types refresh_token
504
411
  */
505
412
  refreshTokenLeeway?: pulumi.Input<number>;
506
413
  /**
507
- * Refresh token rotation behavior. Valid values: `"STATIC"` or `"ROTATE"`.
414
+ * *Early Access Property* Refresh token rotation behavior, required with grant types refresh_token
508
415
  */
509
416
  refreshTokenRotation?: pulumi.Input<string>;
510
417
  /**
511
- * List of OAuth 2.0 response type strings. Array
512
- * values of `"code"`, `"token"`, `"idToken"`. The `grantTypes` and `responseTypes`
513
- * values described are partially orthogonal, as they refer to arguments
514
- * passed to different endpoints in the OAuth 2.0 protocol (opens new window).
515
- * However, they are related in that the `grantTypes` available to a client
516
- * influence the `responseTypes` that the client is allowed to use, and vice versa.
517
- * For instance, a grantTypes value that includes authorizationCode implies a
518
- * `responseTypes` value that includes code, as both values are defined as part of
519
- * the OAuth 2.0 authorization code grant.
520
- * See: https://developer.okta.com/docs/reference/api/apps/#add-oauth-2-0-client-application
418
+ * List of OAuth 2.0 response type strings.
521
419
  */
522
420
  responseTypes?: pulumi.Input<pulumi.Input<string>[]>;
523
421
  /**
524
- * Sign-on mode of application.
422
+ * Sign on mode of application.
525
423
  */
526
424
  signOnMode?: pulumi.Input<string>;
527
425
  /**
528
- * The status of the application, by default, it is `"ACTIVE"`.
426
+ * Status of application. By default, it is `ACTIVE`
529
427
  */
530
428
  status?: pulumi.Input<string>;
531
429
  /**
532
- * Requested authentication method for
533
- * the token endpoint. It can be set to `"none"`, `"clientSecretPost"`,
534
- * `"clientSecretBasic"`, `"clientSecretJwt"`, `"privateKeyJwt"`. Use
535
- * `pkceRequired` to require PKCE for your confidential clients using the
536
- * Authorization Code flow. If `"tokenEndpointAuthMethod"` is `"none"`,
537
- * `pkceRequired` needs to be `true`. If `pkceRequired` isn't specified when
538
- * adding a new application, Okta sets it to `true` by default for `"browser"` and
539
- * `"native"` application types.
540
- * See https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
430
+ * Requested authentication method for the token endpoint.
541
431
  */
542
432
  tokenEndpointAuthMethod?: pulumi.Input<string>;
543
433
  /**
@@ -545,27 +435,27 @@ export interface OAuthState {
545
435
  */
546
436
  tosUri?: pulumi.Input<string>;
547
437
  /**
548
- * The type of OAuth application. Valid values: `"web"`, `"native"`, `"browser"`, `"service"`. For SPA apps use `browser`.
438
+ * The type of client application.
549
439
  */
550
440
  type?: pulumi.Input<string>;
551
441
  /**
552
- * Username template. Default: `"${source.login}"`
442
+ * Username template. Default: `${source.login}`
553
443
  */
554
444
  userNameTemplate?: pulumi.Input<string>;
555
445
  /**
556
- * Push username on update. Valid values: `"PUSH"` and `"DONT_PUSH"`.
446
+ * Push username on update. Valid values: `PUSH` and `DONT_PUSH`
557
447
  */
558
448
  userNameTemplatePushStatus?: pulumi.Input<string>;
559
449
  /**
560
- * Username template suffix.
450
+ * Username template suffix
561
451
  */
562
452
  userNameTemplateSuffix?: pulumi.Input<string>;
563
453
  /**
564
- * Username template type. Default: `"BUILT_IN"`.
454
+ * Username template type. Default: `BUILT_IN`
565
455
  */
566
456
  userNameTemplateType?: pulumi.Input<string>;
567
457
  /**
568
- * *Early Access Property*. Indicates if the client is allowed to use wildcard matching of `redirectUris`. Valid values: `"DISABLED"`, `"SUBDOMAIN"`. Default value is `"DISABLED"`.
458
+ * *Early Access Property*. Indicates if the client is allowed to use wildcard matching of redirect_uris
569
459
  */
570
460
  wildcardRedirect?: pulumi.Input<string>;
571
461
  }
@@ -574,15 +464,15 @@ export interface OAuthState {
574
464
  */
575
465
  export interface OAuthArgs {
576
466
  /**
577
- * Custom error page URL.
467
+ * Custom error page URL
578
468
  */
579
469
  accessibilityErrorRedirectUrl?: pulumi.Input<string>;
580
470
  /**
581
- * Custom login page for this application.
471
+ * Custom login page URL
582
472
  */
583
473
  accessibilityLoginRedirectUrl?: pulumi.Input<string>;
584
474
  /**
585
- * Enable self-service. By default, it is `false`.
475
+ * Enable self service. Default is `false`
586
476
  */
587
477
  accessibilitySelfService?: pulumi.Input<boolean>;
588
478
  /**
@@ -594,31 +484,31 @@ export interface OAuthArgs {
594
484
  */
595
485
  appLinksJson?: pulumi.Input<string>;
596
486
  /**
597
- * Application settings in JSON format.
487
+ * Application settings in JSON format
598
488
  */
599
489
  appSettingsJson?: pulumi.Input<string>;
600
490
  /**
601
- * The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.
491
+ * The ID of the associated app*signon*policy. If this property is removed from the application the default sign-on-policy will be associated with this application.
602
492
  */
603
493
  authenticationPolicy?: pulumi.Input<string>;
604
494
  /**
605
- * Requested key rotation mode. If
606
- * `autoKeyRotation` isn't specified, the client automatically opts in for Okta's
607
- * key rotation. You can update this property via the API or via the administrator
608
- * UI.
609
- * See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
495
+ * Requested key rotation mode. If
496
+ * auto*key*rotation isn't specified, the client automatically opts in for Okta's
497
+ * key rotation. You can update this property via the API or via the administrator
498
+ * UI.
499
+ * See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object"
610
500
  */
611
501
  autoKeyRotation?: pulumi.Input<boolean>;
612
502
  /**
613
- * Display auto submit toolbar.
503
+ * Display auto submit toolbar
614
504
  */
615
505
  autoSubmitToolbar?: pulumi.Input<boolean>;
616
506
  /**
617
- * The user provided OAuth client secret key value, this can be set when `tokenEndpointAuthMethod` is `"clientSecretBasic"`. This does nothing when `omitSecret` is set to true.
507
+ * The user provided OAuth client secret key value, this can be set when token*endpoint*auth*method is client*secret*basic. This does nothing when `omit*secret is set to true.
618
508
  */
619
509
  clientBasicSecret?: pulumi.Input<string>;
620
510
  /**
621
- * OAuth client ID. If set during creation, app is created with this id. See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
511
+ * OAuth client ID. If set during creation, app is created with this id.
622
512
  */
623
513
  clientId?: pulumi.Input<string>;
624
514
  /**
@@ -626,7 +516,7 @@ export interface OAuthArgs {
626
516
  */
627
517
  clientUri?: pulumi.Input<string>;
628
518
  /**
629
- * Indicates whether user consent is required or implicit. Valid values: `"REQUIRED"`, `"TRUSTED"`. Default value is `"TRUSTED"`.
519
+ * *Early Access Property*. Indicates whether user consent is required or implicit. Valid values: REQUIRED, TRUSTED. Default value is TRUSTED
630
520
  */
631
521
  consentMethod?: pulumi.Input<string>;
632
522
  /**
@@ -634,39 +524,32 @@ export interface OAuthArgs {
634
524
  */
635
525
  enduserNote?: pulumi.Input<string>;
636
526
  /**
637
- * List of OAuth 2.0 grant types. Conditional validation params found [here](https://developer.okta.com/docs/api/resources/apps#credentials-settings-details).
638
- * Defaults to minimum requirements per app type. Valid values: `"authorizationCode"`, `"implicit"`, `"password"`, `"refreshToken"`, `"clientCredentials"`,
639
- * `"urn:ietf:params:oauth:grant-type:saml2-bearer"` (*Early Access Property*), `"urn:ietf:params:oauth:grant-type:token-exchange"` (*Early Access Property*),
640
- * `"interactionCode"` (*OIE only*).
527
+ * List of OAuth 2.0 grant types. Conditional validation params found here https://developer.okta.com/docs/api/resources/apps#credentials-settings-details. Defaults to minimum requirements per app type.
641
528
  */
642
529
  grantTypes?: pulumi.Input<pulumi.Input<string>[]>;
643
530
  /**
644
- * Groups claim for an OpenID Connect client application. **IMPORTANT**: this argument is ignored when Okta API authentication is done with OAuth 2.0 credentials
531
+ * Groups claim for an OpenID Connect client application (argument is ignored when API auth is done with OAuth 2.0 credentials)
645
532
  */
646
533
  groupsClaim?: pulumi.Input<inputs.app.OAuthGroupsClaim>;
647
534
  /**
648
- * Do not display application icon on mobile app.
535
+ * Do not display application icon on mobile app
649
536
  */
650
537
  hideIos?: pulumi.Input<boolean>;
651
538
  /**
652
- * Do not display application icon to users.
539
+ * Do not display application icon to users
653
540
  */
654
541
  hideWeb?: pulumi.Input<boolean>;
655
542
  /**
656
- * *Early Access Property*. Enables [Federation Broker Mode](https://help.okta.com/en/prod/Content/Topics/Apps/apps-fbm-enable.htm). When this mode is enabled, `users` and `groups` arguments are ignored.
543
+ * *Early Access Property*. Enable Federation Broker Mode.
657
544
  */
658
545
  implicitAssignment?: pulumi.Input<boolean>;
659
546
  /**
660
- * Indicates whether the Okta Authorization Server uses the original Okta org domain URL or a custom domain URL as the issuer of ID token for this client.
661
- * Valid values: `"CUSTOM_URL"`,`"ORG_URL"` or `"DYNAMIC"`. Default is `"ORG_URL"`.
547
+ * *Early Access Property*. Indicates whether the Okta Authorization Server uses the original Okta org domain URL or a custom domain URL as the issuer of ID token for this client.
662
548
  */
663
549
  issuerMode?: pulumi.Input<string>;
664
- /**
665
- * JSON Web Key set. Multiple jwks are supported[Admin Console JWK Reference](https://developer.okta.com/docs/guides/implement-oauth-for-okta-serviceapp/main/#generate-the-jwk-in-the-admin-console). Use kty=RSA e=[value] n=[value] for RSA jwks, and kty=EC x=[value] y=[value] for EC jwks
666
- */
667
550
  jwks?: pulumi.Input<pulumi.Input<inputs.app.OAuthJwk>[]>;
668
551
  /**
669
- * URL of the custom authorization server's JSON Web Key Set document.
552
+ * URL reference to JWKS
670
553
  */
671
554
  jwksUri?: pulumi.Input<string>;
672
555
  /**
@@ -674,15 +557,15 @@ export interface OAuthArgs {
674
557
  */
675
558
  label: pulumi.Input<string>;
676
559
  /**
677
- * The type of Idp-Initiated login that the client supports, if any. Valid values: `"DISABLED"`, `"SPEC"`, `"OKTA"`. Default is `"DISABLED"`.
560
+ * The type of Idp-Initiated login that the client supports, if any
678
561
  */
679
562
  loginMode?: pulumi.Input<string>;
680
563
  /**
681
- * List of scopes to use for the request. Valid values: `"openid"`, `"profile"`, `"email"`, `"address"`, `"phone"`. Required when `loginMode` is NOT `DISABLED`.
564
+ * List of scopes to use for the request
682
565
  */
683
566
  loginScopes?: pulumi.Input<pulumi.Input<string>[]>;
684
567
  /**
685
- * URI that initiates login. Required when `loginMode` is NOT `DISABLED`.
568
+ * URI that initiates login.
686
569
  */
687
570
  loginUri?: pulumi.Input<string>;
688
571
  /**
@@ -694,15 +577,11 @@ export interface OAuthArgs {
694
577
  */
695
578
  logoUri?: pulumi.Input<string>;
696
579
  /**
697
- * This tells the provider not manage the `clientSecret` value in state. When this is false (the default), it will cause the auto-generated `clientSecret` to be persisted in the `clientSecret` attribute in state. This also means that every time an update to this app is run, this value is also set on the API. If this changes from false => true, the `clientSecret` is dropped from state and the secret at the time of the apply is what remains. If this is ever changes from true => false your app will be recreated, due to the need to regenerate a secret we can store in state.
580
+ * This tells the provider not manage the client*secret value in state. When this is false (the default), it will cause the auto-generated client*secret to be persisted in the clientSecret attribute in state. This also means that every time an update to this app is run, this value is also set on the API. If this changes from false => true, the `clientSecret` is dropped from state and the secret at the time of the apply is what remains. If this is ever changes from true => false your app will be recreated, due to the need to regenerate a secret we can store in state.
698
581
  */
699
582
  omitSecret?: pulumi.Input<boolean>;
700
583
  /**
701
- * Require Proof Key for Code Exchange (PKCE) for
702
- * additional verification. If `pkceRequired` isn't specified when adding a new
703
- * application, Okta sets it to `true` by default for `"browser"` and `"native"`
704
- * application types.
705
- * See https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
584
+ * Require Proof Key for Code Exchange (PKCE) for additional verification key rotation mode. See: https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
706
585
  */
707
586
  pkceRequired?: pulumi.Input<boolean>;
708
587
  /**
@@ -710,52 +589,35 @@ export interface OAuthArgs {
710
589
  */
711
590
  policyUri?: pulumi.Input<string>;
712
591
  /**
713
- * List of URIs for redirection after logout.
592
+ * List of URIs for redirection after logout. Note: see okta*app*oauth*post*logout*redirect*uri for appending to this list in a decentralized way.
714
593
  */
715
594
  postLogoutRedirectUris?: pulumi.Input<pulumi.Input<string>[]>;
716
595
  /**
717
- * Custom JSON that represents an OAuth application's profile.
596
+ * Custom JSON that represents an OAuth application's profile
718
597
  */
719
598
  profile?: pulumi.Input<string>;
720
599
  /**
721
- * List of URIs for use in the redirect-based flow. This is required for all application types except service.
600
+ * List of URIs for use in the redirect-based flow. This is required for all application types except service. Note: see okta*app*oauth*redirect*uri for appending to this list in a decentralized way.
722
601
  */
723
602
  redirectUris?: pulumi.Input<pulumi.Input<string>[]>;
724
603
  /**
725
- * Grace period for token rotation. Valid values: 0 to 60 seconds.
604
+ * *Early Access Property* Grace period for token rotation, required with grant types refresh_token
726
605
  */
727
606
  refreshTokenLeeway?: pulumi.Input<number>;
728
607
  /**
729
- * Refresh token rotation behavior. Valid values: `"STATIC"` or `"ROTATE"`.
608
+ * *Early Access Property* Refresh token rotation behavior, required with grant types refresh_token
730
609
  */
731
610
  refreshTokenRotation?: pulumi.Input<string>;
732
611
  /**
733
- * List of OAuth 2.0 response type strings. Array
734
- * values of `"code"`, `"token"`, `"idToken"`. The `grantTypes` and `responseTypes`
735
- * values described are partially orthogonal, as they refer to arguments
736
- * passed to different endpoints in the OAuth 2.0 protocol (opens new window).
737
- * However, they are related in that the `grantTypes` available to a client
738
- * influence the `responseTypes` that the client is allowed to use, and vice versa.
739
- * For instance, a grantTypes value that includes authorizationCode implies a
740
- * `responseTypes` value that includes code, as both values are defined as part of
741
- * the OAuth 2.0 authorization code grant.
742
- * See: https://developer.okta.com/docs/reference/api/apps/#add-oauth-2-0-client-application
612
+ * List of OAuth 2.0 response type strings.
743
613
  */
744
614
  responseTypes?: pulumi.Input<pulumi.Input<string>[]>;
745
615
  /**
746
- * The status of the application, by default, it is `"ACTIVE"`.
616
+ * Status of application. By default, it is `ACTIVE`
747
617
  */
748
618
  status?: pulumi.Input<string>;
749
619
  /**
750
- * Requested authentication method for
751
- * the token endpoint. It can be set to `"none"`, `"clientSecretPost"`,
752
- * `"clientSecretBasic"`, `"clientSecretJwt"`, `"privateKeyJwt"`. Use
753
- * `pkceRequired` to require PKCE for your confidential clients using the
754
- * Authorization Code flow. If `"tokenEndpointAuthMethod"` is `"none"`,
755
- * `pkceRequired` needs to be `true`. If `pkceRequired` isn't specified when
756
- * adding a new application, Okta sets it to `true` by default for `"browser"` and
757
- * `"native"` application types.
758
- * See https://developer.okta.com/docs/reference/api/apps/#oauth-credential-object
620
+ * Requested authentication method for the token endpoint.
759
621
  */
760
622
  tokenEndpointAuthMethod?: pulumi.Input<string>;
761
623
  /**
@@ -763,27 +625,27 @@ export interface OAuthArgs {
763
625
  */
764
626
  tosUri?: pulumi.Input<string>;
765
627
  /**
766
- * The type of OAuth application. Valid values: `"web"`, `"native"`, `"browser"`, `"service"`. For SPA apps use `browser`.
628
+ * The type of client application.
767
629
  */
768
630
  type: pulumi.Input<string>;
769
631
  /**
770
- * Username template. Default: `"${source.login}"`
632
+ * Username template. Default: `${source.login}`
771
633
  */
772
634
  userNameTemplate?: pulumi.Input<string>;
773
635
  /**
774
- * Push username on update. Valid values: `"PUSH"` and `"DONT_PUSH"`.
636
+ * Push username on update. Valid values: `PUSH` and `DONT_PUSH`
775
637
  */
776
638
  userNameTemplatePushStatus?: pulumi.Input<string>;
777
639
  /**
778
- * Username template suffix.
640
+ * Username template suffix
779
641
  */
780
642
  userNameTemplateSuffix?: pulumi.Input<string>;
781
643
  /**
782
- * Username template type. Default: `"BUILT_IN"`.
644
+ * Username template type. Default: `BUILT_IN`
783
645
  */
784
646
  userNameTemplateType?: pulumi.Input<string>;
785
647
  /**
786
- * *Early Access Property*. Indicates if the client is allowed to use wildcard matching of `redirectUris`. Valid values: `"DISABLED"`, `"SUBDOMAIN"`. Default value is `"DISABLED"`.
648
+ * *Early Access Property*. Indicates if the client is allowed to use wildcard matching of redirect_uris
787
649
  */
788
650
  wildcardRedirect?: pulumi.Input<string>;
789
651
  }