@pulumi/okta 4.9.0-alpha.1718431198 → 4.9.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (405) hide show
  1. package/adminRoleCustom.d.ts +105 -107
  2. package/adminRoleCustom.js +3 -5
  3. package/adminRoleCustom.js.map +1 -1
  4. package/adminRoleCustomAssignments.d.ts +12 -18
  5. package/adminRoleCustomAssignments.js +3 -6
  6. package/adminRoleCustomAssignments.js.map +1 -1
  7. package/adminRoleTargets.d.ts +14 -16
  8. package/adminRoleTargets.js +0 -2
  9. package/adminRoleTargets.js.map +1 -1
  10. package/app/accessPolicyAssignment.d.ts +23 -2
  11. package/app/accessPolicyAssignment.js +23 -2
  12. package/app/accessPolicyAssignment.js.map +1 -1
  13. package/app/autoLogin.d.ts +63 -97
  14. package/app/autoLogin.js +3 -37
  15. package/app/autoLogin.js.map +1 -1
  16. package/app/basicAuth.d.ts +30 -33
  17. package/app/basicAuth.js +4 -7
  18. package/app/basicAuth.js.map +1 -1
  19. package/app/bookmark.d.ts +30 -33
  20. package/app/bookmark.js +3 -6
  21. package/app/bookmark.js.map +1 -1
  22. package/app/getApp.d.ts +58 -25
  23. package/app/getApp.js +2 -2
  24. package/app/getApp.js.map +1 -1
  25. package/app/getMetadataSaml.d.ts +11 -5
  26. package/app/getMetadataSaml.js +2 -2
  27. package/app/getMetadataSaml.js.map +1 -1
  28. package/app/getOauth.d.ts +62 -34
  29. package/app/getOauth.js +2 -2
  30. package/app/getOauth.js.map +1 -1
  31. package/app/getSaml.d.ts +75 -56
  32. package/app/getSaml.js +2 -2
  33. package/app/getSaml.js.map +1 -1
  34. package/app/groupAssignment.d.ts +23 -9
  35. package/app/groupAssignment.js +17 -3
  36. package/app/groupAssignment.js.map +1 -1
  37. package/app/oauth.d.ts +135 -273
  38. package/app/oauth.js +6 -60
  39. package/app/oauth.js.map +1 -1
  40. package/app/oauthPostLogoutRedirectUri.d.ts +4 -6
  41. package/app/oauthPostLogoutRedirectUri.js +1 -3
  42. package/app/oauthPostLogoutRedirectUri.js.map +1 -1
  43. package/app/oauthRedirectUri.d.ts +4 -6
  44. package/app/oauthRedirectUri.js +1 -3
  45. package/app/oauthRedirectUri.js.map +1 -1
  46. package/app/oauthRoleAssignment.d.ts +4 -29
  47. package/app/oauthRoleAssignment.js +4 -29
  48. package/app/oauthRoleAssignment.js.map +1 -1
  49. package/app/saml.d.ts +161 -289
  50. package/app/saml.js +6 -152
  51. package/app/saml.js.map +1 -1
  52. package/app/securePasswordStore.d.ts +79 -80
  53. package/app/securePasswordStore.js +6 -7
  54. package/app/securePasswordStore.js.map +1 -1
  55. package/app/swa.d.ts +70 -71
  56. package/app/swa.js +4 -5
  57. package/app/swa.js.map +1 -1
  58. package/app/threeField.d.ts +74 -76
  59. package/app/threeField.js +5 -7
  60. package/app/threeField.js.map +1 -1
  61. package/app/user.d.ts +12 -17
  62. package/app/user.js +0 -2
  63. package/app/user.js.map +1 -1
  64. package/appGroupAssignments.d.ts +6 -8
  65. package/appGroupAssignments.js +3 -5
  66. package/appGroupAssignments.js.map +1 -1
  67. package/appOauthApiScope.d.ts +5 -7
  68. package/appOauthApiScope.js +2 -4
  69. package/appOauthApiScope.js.map +1 -1
  70. package/appSamlAppSettings.d.ts +6 -7
  71. package/appSamlAppSettings.js +3 -4
  72. package/appSamlAppSettings.js.map +1 -1
  73. package/appSharedCredentials.d.ts +61 -63
  74. package/appSharedCredentials.js +4 -6
  75. package/appSharedCredentials.js.map +1 -1
  76. package/appSignonPolicy.d.ts +3 -39
  77. package/appSignonPolicy.js +3 -39
  78. package/appSignonPolicy.js.map +1 -1
  79. package/appSignonPolicyRule.d.ts +69 -361
  80. package/appSignonPolicyRule.js +1 -278
  81. package/appSignonPolicyRule.js.map +1 -1
  82. package/appUserBaseSchemaProperty.d.ts +25 -29
  83. package/appUserBaseSchemaProperty.js +1 -5
  84. package/appUserBaseSchemaProperty.js.map +1 -1
  85. package/appUserSchemaProperty.d.ts +51 -41
  86. package/appUserSchemaProperty.js +0 -2
  87. package/appUserSchemaProperty.js.map +1 -1
  88. package/auth/getServer.d.ts +11 -11
  89. package/auth/getServer.js +2 -2
  90. package/auth/getServerPolicy.d.ts +15 -9
  91. package/auth/getServerPolicy.js +2 -2
  92. package/auth/getServerPolicy.js.map +1 -1
  93. package/auth/getServerScopes.d.ts +8 -5
  94. package/auth/getServerScopes.js +2 -2
  95. package/auth/getServerScopes.js.map +1 -1
  96. package/auth/server.d.ts +15 -19
  97. package/auth/server.js +1 -5
  98. package/auth/server.js.map +1 -1
  99. package/auth/serverClaim.d.ts +13 -17
  100. package/auth/serverClaim.js +1 -5
  101. package/auth/serverClaim.js.map +1 -1
  102. package/auth/serverPolicy.d.ts +10 -14
  103. package/auth/serverPolicy.js +1 -5
  104. package/auth/serverPolicy.js.map +1 -1
  105. package/auth/serverPolicyClaim.d.ts +50 -66
  106. package/auth/serverPolicyClaim.js +0 -25
  107. package/auth/serverPolicyClaim.js.map +1 -1
  108. package/auth/serverPolicyRule.d.ts +32 -43
  109. package/auth/serverPolicyRule.js +0 -2
  110. package/auth/serverPolicyRule.js.map +1 -1
  111. package/auth/serverScope.d.ts +16 -20
  112. package/auth/serverScope.js +1 -5
  113. package/auth/serverScope.js.map +1 -1
  114. package/authServerClaimDefault.d.ts +10 -25
  115. package/authServerClaimDefault.js +0 -9
  116. package/authServerClaimDefault.js.map +1 -1
  117. package/authServerDefault.d.ts +15 -19
  118. package/authServerDefault.js +1 -5
  119. package/authServerDefault.js.map +1 -1
  120. package/authenticator.d.ts +53 -61
  121. package/authenticator.js +11 -11
  122. package/authenticator.js.map +1 -1
  123. package/behaviour.d.ts +21 -41
  124. package/behaviour.js +0 -2
  125. package/behaviour.js.map +1 -1
  126. package/brand.d.ts +23 -22
  127. package/brand.js +8 -4
  128. package/brand.js.map +1 -1
  129. package/captcha.d.ts +15 -17
  130. package/captcha.js +3 -5
  131. package/captcha.js.map +1 -1
  132. package/captchaOrgWideSettings.d.ts +8 -43
  133. package/captchaOrgWideSettings.js +2 -37
  134. package/captchaOrgWideSettings.js.map +1 -1
  135. package/domain.d.ts +13 -21
  136. package/domain.js +0 -2
  137. package/domain.js.map +1 -1
  138. package/domainCertificate.d.ts +17 -24
  139. package/domainCertificate.js +2 -9
  140. package/domainCertificate.js.map +1 -1
  141. package/domainVerification.d.ts +4 -10
  142. package/domainVerification.js +1 -7
  143. package/domainVerification.js.map +1 -1
  144. package/emailCustomization.d.ts +38 -222
  145. package/emailCustomization.js +29 -33
  146. package/emailCustomization.js.map +1 -1
  147. package/emailDomain.d.ts +4 -8
  148. package/emailDomain.js +0 -4
  149. package/emailDomain.js.map +1 -1
  150. package/emailDomainVerification.d.ts +3 -7
  151. package/emailDomainVerification.js +0 -4
  152. package/emailDomainVerification.js.map +1 -1
  153. package/emailSender.d.ts +15 -17
  154. package/emailSender.js +2 -4
  155. package/emailSender.js.map +1 -1
  156. package/emailSenderVerification.d.ts +5 -9
  157. package/emailSenderVerification.js +2 -6
  158. package/emailSenderVerification.js.map +1 -1
  159. package/eventHook.d.ts +16 -11
  160. package/eventHook.js +1 -5
  161. package/eventHook.js.map +1 -1
  162. package/eventHookVerification.d.ts +4 -10
  163. package/eventHookVerification.js +1 -7
  164. package/eventHookVerification.js.map +1 -1
  165. package/factor/factor.d.ts +4 -9
  166. package/factor/factor.js +1 -3
  167. package/factor/factor.js.map +1 -1
  168. package/factorTotp.d.ts +12 -21
  169. package/factorTotp.js +3 -3
  170. package/factorTotp.js.map +1 -1
  171. package/getAppGroupAssignments.d.ts +6 -6
  172. package/getAppGroupAssignments.js +2 -2
  173. package/getAppSignonPolicy.d.ts +16 -6
  174. package/getAppSignonPolicy.js +8 -4
  175. package/getAppSignonPolicy.js.map +1 -1
  176. package/getAppUserAssignments.d.ts +6 -6
  177. package/getAppUserAssignments.js +2 -2
  178. package/getAuthServerClaim.d.ts +15 -12
  179. package/getAuthServerClaim.js +2 -2
  180. package/getAuthServerClaim.js.map +1 -1
  181. package/getAuthServerClaims.d.ts +8 -5
  182. package/getAuthServerClaims.js +2 -2
  183. package/getAuthServerClaims.js.map +1 -1
  184. package/getAuthenticator.d.ts +24 -26
  185. package/getAuthenticator.js +14 -22
  186. package/getAuthenticator.js.map +1 -1
  187. package/getBehaviour.d.ts +6 -8
  188. package/getBehaviour.js +2 -2
  189. package/getBehaviour.js.map +1 -1
  190. package/getBehaviours.d.ts +7 -7
  191. package/getBehaviours.js +2 -2
  192. package/getBrand.d.ts +9 -6
  193. package/getBrand.js +2 -2
  194. package/getBrand.js.map +1 -1
  195. package/getBrands.d.ts +2 -2
  196. package/getBrands.js +2 -2
  197. package/getDomain.d.ts +11 -14
  198. package/getDomain.js +2 -8
  199. package/getDomain.js.map +1 -1
  200. package/getEmailCustomization.d.ts +14 -9
  201. package/getEmailCustomization.js +2 -6
  202. package/getEmailCustomization.js.map +1 -1
  203. package/getEmailCustomizations.d.ts +11 -9
  204. package/getEmailCustomizations.js +2 -6
  205. package/getEmailCustomizations.js.map +1 -1
  206. package/getGroups.d.ts +11 -25
  207. package/getGroups.js +2 -2
  208. package/getGroups.js.map +1 -1
  209. package/getLogStream.d.ts +8 -39
  210. package/getLogStream.js +2 -24
  211. package/getLogStream.js.map +1 -1
  212. package/getNetworkZone.d.ts +12 -12
  213. package/getNetworkZone.js +2 -2
  214. package/getOrgMetadata.d.ts +0 -22
  215. package/getOrgMetadata.js +0 -22
  216. package/getOrgMetadata.js.map +1 -1
  217. package/getRoleSubscription.d.ts +13 -35
  218. package/getRoleSubscription.js +2 -2
  219. package/getRoleSubscription.js.map +1 -1
  220. package/getTemplate.d.ts +10 -8
  221. package/getTemplate.js +2 -6
  222. package/getTemplate.js.map +1 -1
  223. package/getTemplates.d.ts +6 -7
  224. package/getTemplates.js +2 -6
  225. package/getTemplates.js.map +1 -1
  226. package/getTheme.d.ts +14 -12
  227. package/getTheme.js +2 -6
  228. package/getTheme.js.map +1 -1
  229. package/getThemes.d.ts +6 -7
  230. package/getThemes.js +2 -6
  231. package/getThemes.js.map +1 -1
  232. package/getTrustedOrigins.d.ts +7 -4
  233. package/getTrustedOrigins.js +2 -2
  234. package/getTrustedOrigins.js.map +1 -1
  235. package/getUserSecurityQuestions.d.ts +4 -8
  236. package/getUserSecurityQuestions.js +0 -4
  237. package/getUserSecurityQuestions.js.map +1 -1
  238. package/group/getEveryoneGroup.d.ts +10 -5
  239. package/group/getEveryoneGroup.js +4 -2
  240. package/group/getEveryoneGroup.js.map +1 -1
  241. package/group/getGroup.d.ts +17 -26
  242. package/group/getGroup.js +2 -2
  243. package/group/getGroup.js.map +1 -1
  244. package/group/getRule.d.ts +9 -9
  245. package/group/getRule.js +2 -2
  246. package/group/group.d.ts +4 -36
  247. package/group/group.js +1 -33
  248. package/group/group.js.map +1 -1
  249. package/group/role.d.ts +37 -81
  250. package/group/role.js +1 -6
  251. package/group/role.js.map +1 -1
  252. package/group/rule.d.ts +12 -20
  253. package/group/rule.js +0 -2
  254. package/group/rule.js.map +1 -1
  255. package/groupMemberships.d.ts +8 -10
  256. package/groupMemberships.js +2 -4
  257. package/groupMemberships.js.map +1 -1
  258. package/groupSchemaProperty.d.ts +57 -59
  259. package/groupSchemaProperty.js +0 -2
  260. package/groupSchemaProperty.js.map +1 -1
  261. package/idp/getMetadataSaml.d.ts +9 -6
  262. package/idp/getMetadataSaml.js +2 -2
  263. package/idp/getMetadataSaml.js.map +1 -1
  264. package/idp/getOidc.d.ts +9 -9
  265. package/idp/getOidc.js +2 -2
  266. package/idp/getSaml.d.ts +16 -13
  267. package/idp/getSaml.js +2 -2
  268. package/idp/getSaml.js.map +1 -1
  269. package/idp/getSocial.d.ts +8 -2
  270. package/idp/getSocial.js +2 -2
  271. package/idp/getSocial.js.map +1 -1
  272. package/idp/oidc.d.ts +70 -62
  273. package/idp/oidc.js +3 -5
  274. package/idp/oidc.js.map +1 -1
  275. package/idp/saml.d.ts +64 -86
  276. package/idp/saml.js +1 -5
  277. package/idp/saml.js.map +1 -1
  278. package/idp/samlKey.d.ts +3 -5
  279. package/idp/samlKey.js +0 -2
  280. package/idp/samlKey.js.map +1 -1
  281. package/idp/social.d.ts +99 -69
  282. package/idp/social.js +11 -5
  283. package/idp/social.js.map +1 -1
  284. package/inline/hook.d.ts +4 -26
  285. package/inline/hook.js +1 -5
  286. package/inline/hook.js.map +1 -1
  287. package/linkDefinition.d.ts +2 -3
  288. package/linkDefinition.js +2 -3
  289. package/linkDefinition.js.map +1 -1
  290. package/linkValue.d.ts +7 -9
  291. package/linkValue.js +1 -3
  292. package/linkValue.js.map +1 -1
  293. package/logStream.d.ts +32 -27
  294. package/logStream.js +23 -9
  295. package/logStream.js.map +1 -1
  296. package/network/zone.d.ts +25 -66
  297. package/network/zone.js +1 -39
  298. package/network/zone.js.map +1 -1
  299. package/orgConfiguration.d.ts +4 -9
  300. package/orgConfiguration.js +1 -3
  301. package/orgConfiguration.js.map +1 -1
  302. package/orgSupport.d.ts +4 -7
  303. package/orgSupport.js +1 -4
  304. package/orgSupport.js.map +1 -1
  305. package/package.json +3 -3
  306. package/policy/getDefaultPolicy.d.ts +9 -7
  307. package/policy/getDefaultPolicy.js +6 -2
  308. package/policy/getDefaultPolicy.js.map +1 -1
  309. package/policy/getPolicy.d.ts +11 -26
  310. package/policy/getPolicy.js +2 -2
  311. package/policy/getPolicy.js.map +1 -1
  312. package/policy/mfa.d.ts +18 -220
  313. package/policy/mfa.js +0 -10
  314. package/policy/mfa.js.map +1 -1
  315. package/policy/password.d.ts +91 -95
  316. package/policy/password.js +1 -5
  317. package/policy/password.js.map +1 -1
  318. package/policy/ruleIdpDiscovery.d.ts +111 -93
  319. package/policy/ruleIdpDiscovery.js +48 -57
  320. package/policy/ruleIdpDiscovery.js.map +1 -1
  321. package/policy/ruleMfa.d.ts +40 -30
  322. package/policy/ruleMfa.js +1 -3
  323. package/policy/ruleMfa.js.map +1 -1
  324. package/policy/rulePassword.d.ts +34 -38
  325. package/policy/rulePassword.js +1 -5
  326. package/policy/rulePassword.js.map +1 -1
  327. package/policy/ruleSignon.d.ts +94 -85
  328. package/policy/ruleSignon.js +1 -4
  329. package/policy/ruleSignon.js.map +1 -1
  330. package/policy/signon.d.ts +16 -20
  331. package/policy/signon.js +1 -5
  332. package/policy/signon.js.map +1 -1
  333. package/policyMfaDefault.d.ts +15 -214
  334. package/policyMfaDefault.js +2 -9
  335. package/policyMfaDefault.js.map +1 -1
  336. package/policyPasswordDefault.d.ts +85 -101
  337. package/policyPasswordDefault.js +1 -5
  338. package/policyPasswordDefault.js.map +1 -1
  339. package/policyProfileEnrollment.d.ts +8 -9
  340. package/policyProfileEnrollment.js +2 -3
  341. package/policyProfileEnrollment.js.map +1 -1
  342. package/policyProfileEnrollmentApps.d.ts +8 -11
  343. package/policyProfileEnrollmentApps.js +3 -6
  344. package/policyProfileEnrollmentApps.js.map +1 -1
  345. package/policyRuleProfileEnrollment.d.ts +42 -31
  346. package/policyRuleProfileEnrollment.js +2 -3
  347. package/policyRuleProfileEnrollment.js.map +1 -1
  348. package/profile/mapping.d.ts +19 -34
  349. package/profile/mapping.js +4 -4
  350. package/profile/mapping.js.map +1 -1
  351. package/rateLimiting.d.ts +8 -17
  352. package/rateLimiting.js +2 -5
  353. package/rateLimiting.js.map +1 -1
  354. package/resourceSet.d.ts +18 -26
  355. package/resourceSet.js +9 -14
  356. package/resourceSet.js.map +1 -1
  357. package/roleSubscription.d.ts +35 -86
  358. package/roleSubscription.js +2 -2
  359. package/roleSubscription.js.map +1 -1
  360. package/securityNotificationEmails.d.ts +4 -7
  361. package/securityNotificationEmails.js +4 -7
  362. package/securityNotificationEmails.js.map +1 -1
  363. package/templateSms.d.ts +4 -8
  364. package/templateSms.js +1 -5
  365. package/templateSms.js.map +1 -1
  366. package/theme.d.ts +46 -46
  367. package/theme.js +2 -2
  368. package/threatInsightSettings.d.ts +7 -27
  369. package/threatInsightSettings.js +1 -3
  370. package/threatInsightSettings.js.map +1 -1
  371. package/trustedorigin/origin.d.ts +13 -17
  372. package/trustedorigin/origin.js +1 -5
  373. package/trustedorigin/origin.js.map +1 -1
  374. package/types/input.d.ts +65 -162
  375. package/types/output.d.ts +75 -275
  376. package/user/getUser.d.ts +32 -104
  377. package/user/getUser.js +2 -2
  378. package/user/getUser.js.map +1 -1
  379. package/user/getUserProfileMappingSource.d.ts +9 -7
  380. package/user/getUserProfileMappingSource.js +6 -4
  381. package/user/getUserProfileMappingSource.js.map +1 -1
  382. package/user/getUserType.d.ts +7 -7
  383. package/user/getUserType.js +2 -2
  384. package/user/getUsers.d.ts +95 -37
  385. package/user/getUsers.js +64 -24
  386. package/user/getUsers.js.map +1 -1
  387. package/user/user.d.ts +160 -209
  388. package/user/user.js +43 -65
  389. package/user/user.js.map +1 -1
  390. package/user/userType.d.ts +1 -5
  391. package/user/userType.js +1 -5
  392. package/user/userType.js.map +1 -1
  393. package/userAdminRoles.d.ts +10 -17
  394. package/userAdminRoles.js +1 -5
  395. package/userAdminRoles.js.map +1 -1
  396. package/userBaseSchemaProperty.d.ts +26 -34
  397. package/userBaseSchemaProperty.js +2 -10
  398. package/userBaseSchemaProperty.js.map +1 -1
  399. package/userFactorQuestion.d.ts +1 -5
  400. package/userFactorQuestion.js +1 -5
  401. package/userFactorQuestion.js.map +1 -1
  402. package/userGroupMemberships.d.ts +3 -3
  403. package/userSchemaProperty.d.ts +57 -56
  404. package/userSchemaProperty.js +0 -8
  405. package/userSchemaProperty.js.map +1 -1
package/app/saml.d.ts CHANGED
@@ -3,164 +3,18 @@ import * as inputs from "../types/input";
3
3
  import * as outputs from "../types/output";
4
4
  /**
5
5
  * This resource allows you to create and configure a SAML Application.
6
- *
7
- * > During an apply if there is change in `status` the app will first be
8
- * activated or deactivated in accordance with the `status` change. Then, all
6
+ * > During an apply if there is change in 'status' the app will first be
7
+ * activated or deactivated in accordance with the 'status' change. Then, all
9
8
  * other arguments that changed will be applied.
10
9
  *
11
- * > If you receive the error `You do not have permission to access the feature
12
- * you are requesting` contact support and
13
- * request feature flag `ADVANCED_SSO` be applied to your org.
14
- *
15
- * ## Example Usage
16
- *
17
- * ```typescript
18
- * import * as pulumi from "@pulumi/pulumi";
19
- * import * as okta from "@pulumi/okta";
20
- *
21
- * const example = new okta.app.Saml("example", {
22
- * label: "example",
23
- * ssoUrl: "https://example.com",
24
- * recipient: "https://example.com",
25
- * destination: "https://example.com",
26
- * audience: "https://example.com/audience",
27
- * subjectNameIdTemplate: "${user.userName}",
28
- * subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
29
- * responseSigned: true,
30
- * signatureAlgorithm: "RSA_SHA256",
31
- * digestAlgorithm: "SHA256",
32
- * honorForceAuthn: false,
33
- * authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
34
- * attributeStatements: [{
35
- * type: "GROUP",
36
- * name: "groups",
37
- * filterType: "REGEX",
38
- * filterValue: ".*",
39
- * }],
40
- * });
41
- * ```
42
- *
43
- * ### With inline hook
44
- *
45
- * ```typescript
46
- * import * as pulumi from "@pulumi/pulumi";
47
- * import * as okta from "@pulumi/okta";
48
- *
49
- * const test = new okta.inline.Hook("test", {
50
- * name: "testAcc_replace_with_uuid",
51
- * status: "ACTIVE",
52
- * type: "com.okta.saml.tokens.transform",
53
- * version: "1.0.2",
54
- * channel: {
55
- * type: "HTTP",
56
- * version: "1.0.0",
57
- * uri: "https://example.com/test1",
58
- * method: "POST",
59
- * },
60
- * auth: {
61
- * key: "Authorization",
62
- * type: "HEADER",
63
- * value: "secret",
64
- * },
65
- * });
66
- * const testSaml = new okta.app.Saml("test", {
67
- * label: "testAcc_replace_with_uuid",
68
- * ssoUrl: "https://google.com",
69
- * recipient: "https://here.com",
70
- * destination: "https://its-about-the-journey.com",
71
- * audience: "https://audience.com",
72
- * subjectNameIdTemplate: "${user.userName}",
73
- * subjectNameIdFormat: "urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress",
74
- * responseSigned: true,
75
- * signatureAlgorithm: "RSA_SHA256",
76
- * digestAlgorithm: "SHA256",
77
- * honorForceAuthn: false,
78
- * authnContextClassRef: "urn:oasis:names:tc:SAML:2.0:ac:classes:PasswordProtectedTransport",
79
- * inlineHookId: test.id,
80
- * attributeStatements: [{
81
- * type: "GROUP",
82
- * name: "groups",
83
- * filterType: "REGEX",
84
- * filterValue: ".*",
85
- * }],
86
- * }, {
87
- * dependsOn: [test],
88
- * });
89
- * ```
90
- *
91
- * ### Pre-configured app with SAML 1.1 sign-on mode
92
- *
93
- * ```typescript
94
- * import * as pulumi from "@pulumi/pulumi";
95
- * import * as okta from "@pulumi/okta";
96
- *
97
- * const test = new okta.app.Saml("test", {
98
- * appSettingsJson: `{
99
- * "groupFilter": "app1.*",
100
- * "siteURL": "https://www.okta.com"
101
- * }
102
- * `,
103
- * label: "SharePoint (On-Premise)",
104
- * preconfiguredApp: "sharepoint_onpremise",
105
- * samlVersion: "1.1",
106
- * status: "ACTIVE",
107
- * userNameTemplate: "${source.login}",
108
- * userNameTemplateType: "BUILT_IN",
109
- * });
110
- * ```
111
- *
112
- * ### Pre-configured app with SAML 1.1 sign-on mode, `appSettingsJson` and `appLinksJson`
113
- *
114
- * ```typescript
115
- * import * as pulumi from "@pulumi/pulumi";
116
- * import * as okta from "@pulumi/okta";
117
- *
118
- * const office365 = new okta.app.Saml("office365", {
119
- * preconfiguredApp: "office365",
120
- * label: "Microsoft Office 365",
121
- * status: "ACTIVE",
122
- * samlVersion: "1.1",
123
- * appSettingsJson: ` {
124
- * "wsFedConfigureType": "AUTO",
125
- * "windowsTransportEnabled": false,
126
- * "domain": "okta.com",
127
- * "msftTenant": "okta",
128
- * "domains": [],
129
- * "requireAdminConsent": false
130
- * }
131
- * `,
132
- * appLinksJson: ` {
133
- * "calendar": false,
134
- * "crm": false,
135
- * "delve": false,
136
- * "excel": false,
137
- * "forms": false,
138
- * "mail": false,
139
- * "newsfeed": false,
140
- * "onedrive": false,
141
- * "people": false,
142
- * "planner": false,
143
- * "powerbi": false,
144
- * "powerpoint": false,
145
- * "sites": false,
146
- * "sway": false,
147
- * "tasks": false,
148
- * "teams": false,
149
- * "video": false,
150
- * "word": false,
151
- * "yammer": false,
152
- * "login": true
153
- * }
154
- * `,
155
- * });
156
- * ```
10
+ * > If you receive the error 'You do not have permission to access the feature
11
+ * you are requesting' contact support and
12
+ * request feature flag 'ADVANCED_SSO' be applied to your org.
157
13
  *
158
14
  * ## Import
159
15
  *
160
- * A SAML App can be imported via the Okta ID.
161
- *
162
16
  * ```sh
163
- * $ pulumi import okta:app/saml:Saml example <app id>
17
+ * $ pulumi import okta:app/saml:Saml example <app id&#62
164
18
  * ```
165
19
  */
166
20
  export declare class Saml extends pulumi.CustomResource {
@@ -180,15 +34,15 @@ export declare class Saml extends pulumi.CustomResource {
180
34
  */
181
35
  static isInstance(obj: any): obj is Saml;
182
36
  /**
183
- * Custom error page URL.
37
+ * Custom error page URL
184
38
  */
185
39
  readonly accessibilityErrorRedirectUrl: pulumi.Output<string | undefined>;
186
40
  /**
187
- * Custom login page for this application.
41
+ * Custom login page URL
188
42
  */
189
43
  readonly accessibilityLoginRedirectUrl: pulumi.Output<string | undefined>;
190
44
  /**
191
- * Enable self-service. Default is: `false`.
45
+ * Enable self service. Default is `false`
192
46
  */
193
47
  readonly accessibilitySelfService: pulumi.Output<boolean | undefined>;
194
48
  /**
@@ -204,27 +58,24 @@ export declare class Saml extends pulumi.CustomResource {
204
58
  */
205
59
  readonly appLinksJson: pulumi.Output<string | undefined>;
206
60
  /**
207
- * Application settings in JSON format.
61
+ * Application settings in JSON format
208
62
  */
209
63
  readonly appSettingsJson: pulumi.Output<string | undefined>;
210
64
  /**
211
- * Determines whether the SAML assertion is digitally signed.
65
+ * Determines whether the SAML assertion is digitally signed
212
66
  */
213
67
  readonly assertionSigned: pulumi.Output<boolean | undefined>;
214
- /**
215
- * List of SAML Attribute statements.
216
- */
217
68
  readonly attributeStatements: pulumi.Output<outputs.app.SamlAttributeStatement[] | undefined>;
218
69
  /**
219
- * Audience restriction.
70
+ * Audience Restriction
220
71
  */
221
72
  readonly audience: pulumi.Output<string | undefined>;
222
73
  /**
223
- * The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.
74
+ * The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.y
224
75
  */
225
- readonly authenticationPolicy: pulumi.Output<string | undefined>;
76
+ readonly authenticationPolicy: pulumi.Output<string>;
226
77
  /**
227
- * Identifies the SAML authentication context class for the assertion’s authentication statement.
78
+ * Identifies the SAML authentication context class for the assertion’s authentication statement
228
79
  */
229
80
  readonly authnContextClassRef: pulumi.Output<string | undefined>;
230
81
  /**
@@ -232,7 +83,7 @@ export declare class Saml extends pulumi.CustomResource {
232
83
  */
233
84
  readonly autoSubmitToolbar: pulumi.Output<boolean | undefined>;
234
85
  /**
235
- * The raw signing certificate.
86
+ * cert from SAML XML metadata payload
236
87
  */
237
88
  readonly certificate: pulumi.Output<string>;
238
89
  /**
@@ -240,15 +91,15 @@ export declare class Saml extends pulumi.CustomResource {
240
91
  */
241
92
  readonly defaultRelayState: pulumi.Output<string | undefined>;
242
93
  /**
243
- * Identifies the location where the SAML response is intended to be sent inside the SAML assertion.
94
+ * Identifies the location where the SAML response is intended to be sent inside of the SAML assertion
244
95
  */
245
96
  readonly destination: pulumi.Output<string | undefined>;
246
97
  /**
247
- * Determines the digest algorithm used to digitally sign the SAML assertion and response.
98
+ * Determines the digest algorithm used to digitally sign the SAML assertion and response
248
99
  */
249
100
  readonly digestAlgorithm: pulumi.Output<string | undefined>;
250
101
  /**
251
- * Url that can be used to embed this application into another portal.
102
+ * The url that can be used to embed this application in other portals.
252
103
  */
253
104
  readonly embedUrl: pulumi.Output<string>;
254
105
  /**
@@ -256,23 +107,23 @@ export declare class Saml extends pulumi.CustomResource {
256
107
  */
257
108
  readonly enduserNote: pulumi.Output<string | undefined>;
258
109
  /**
259
- * Entity ID, the ID portion of the `entityUrl`.
110
+ * Entity ID, the ID portion of the entity_url
260
111
  */
261
112
  readonly entityKey: pulumi.Output<string>;
262
113
  /**
263
- * Entity URL for instance [http://www.okta.com/exk1fcia6d6EMsf331d8](http://www.okta.com/exk1fcia6d6EMsf331d8).
114
+ * Entity URL for instance http://www.okta.com/exk1fcia6d6EMsf331d8
264
115
  */
265
116
  readonly entityUrl: pulumi.Output<string>;
266
117
  /**
267
- * features enabled. Notice: you can't currently configure provisioning features via the API.
118
+ * features to enable
268
119
  */
269
120
  readonly features: pulumi.Output<string[]>;
270
121
  /**
271
- * Do not display application icon on mobile app. Default is: `false`
122
+ * Do not display application icon on mobile app
272
123
  */
273
124
  readonly hideIos: pulumi.Output<boolean | undefined>;
274
125
  /**
275
- * Do not display application icon to users. Default is: `false`
126
+ * Do not display application icon to users
276
127
  */
277
128
  readonly hideWeb: pulumi.Output<boolean | undefined>;
278
129
  /**
@@ -280,31 +131,31 @@ export declare class Saml extends pulumi.CustomResource {
280
131
  */
281
132
  readonly honorForceAuthn: pulumi.Output<boolean | undefined>;
282
133
  /**
283
- * `urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Post` location from the SAML metadata.
134
+ * urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Post location from the SAML metadata.
284
135
  */
285
136
  readonly httpPostBinding: pulumi.Output<string>;
286
137
  /**
287
- * `urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect` location from the SAML metadata.
138
+ * urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect location from the SAML metadata.
288
139
  */
289
140
  readonly httpRedirectBinding: pulumi.Output<string>;
290
141
  /**
291
- * SAML issuer ID.
142
+ * SAML issuer ID
292
143
  */
293
144
  readonly idpIssuer: pulumi.Output<string | undefined>;
294
145
  /**
295
- * _Early Access Property_. Enables [Federation Broker Mode](https://help.okta.com/en/prod/Content/Topics/Apps/apps-fbm-enable.htm).
146
+ * *Early Access Property*. Enable Federation Broker Mode.
296
147
  */
297
148
  readonly implicitAssignment: pulumi.Output<boolean | undefined>;
298
149
  /**
299
- * Saml Inline Hook associated with the application.
150
+ * Saml Inline Hook setting
300
151
  */
301
152
  readonly inlineHookId: pulumi.Output<string | undefined>;
302
153
  /**
303
- * Certificate key ID.
154
+ * Certificate ID
304
155
  */
305
156
  readonly keyId: pulumi.Output<string>;
306
157
  /**
307
- * Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid`.
158
+ * Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid`
308
159
  */
309
160
  readonly keyName: pulumi.Output<string | undefined>;
310
161
  /**
@@ -312,11 +163,11 @@ export declare class Saml extends pulumi.CustomResource {
312
163
  */
313
164
  readonly keyYearsValid: pulumi.Output<number | undefined>;
314
165
  /**
315
- * An array of all key credentials for the application. Format of each entry is as follows:
166
+ * Application keys
316
167
  */
317
168
  readonly keys: pulumi.Output<outputs.app.SamlKey[]>;
318
169
  /**
319
- * label of application.
170
+ * The Application's display name.
320
171
  */
321
172
  readonly label: pulumi.Output<string>;
322
173
  /**
@@ -324,27 +175,36 @@ export declare class Saml extends pulumi.CustomResource {
324
175
  */
325
176
  readonly logo: pulumi.Output<string | undefined>;
326
177
  /**
327
- * Direct link of application logo.
178
+ * URL of the application's logo
328
179
  */
329
180
  readonly logoUrl: pulumi.Output<string>;
330
181
  /**
331
- * The raw SAML metadata in XML.
182
+ * SAML xml metadata payload
332
183
  */
333
184
  readonly metadata: pulumi.Output<string>;
334
185
  /**
335
- * SAML xml metadata URL.
186
+ * SAML xml metadata URL
336
187
  */
337
188
  readonly metadataUrl: pulumi.Output<string>;
338
189
  /**
339
- * Name assigned to the application by Okta.
190
+ * Name of the app.
340
191
  */
341
192
  readonly name: pulumi.Output<string>;
342
193
  /**
343
- * name of application from the Okta Integration Network, if not included a custom app will be created. If not provided the following arguments are required:
194
+ * Name of application from the Okta Integration Network. For instance 'slack'. If not included a custom app will be created. If not provided the following arguments are required:
195
+ * 'sso*url'
196
+ * 'recipient'
197
+ * 'destination'
198
+ * 'audience'
199
+ * 'subject*name*id*template'
200
+ * 'subject*name*id*format'
201
+ * 'signature*algorithm'
202
+ * 'digest*algorithm'
203
+ * 'authn*context*class*ref'
344
204
  */
345
205
  readonly preconfiguredApp: pulumi.Output<string | undefined>;
346
206
  /**
347
- * The location where the app may present the SAML assertion.
207
+ * The location where the app may present the SAML assertion
348
208
  */
349
209
  readonly recipient: pulumi.Output<string | undefined>;
350
210
  /**
@@ -352,7 +212,7 @@ export declare class Saml extends pulumi.CustomResource {
352
212
  */
353
213
  readonly requestCompressed: pulumi.Output<boolean | undefined>;
354
214
  /**
355
- * Determines whether the SAML auth response message is digitally signed.
215
+ * Determines whether the SAML auth response message is digitally signed
356
216
  */
357
217
  readonly responseSigned: pulumi.Output<boolean | undefined>;
358
218
  /**
@@ -360,39 +220,39 @@ export declare class Saml extends pulumi.CustomResource {
360
220
  */
361
221
  readonly samlSignedRequestEnabled: pulumi.Output<boolean | undefined>;
362
222
  /**
363
- * SAML version for the app's sign-on mode. Valid values are: `"2.0"` or `"1.1"`. Default is `"2.0"`.
223
+ * SAML version for the app's sign-on mode. Valid values are: `2.0` or `1.1`. Default is `2.0`
364
224
  */
365
225
  readonly samlVersion: pulumi.Output<string | undefined>;
366
226
  /**
367
- * Sign-on mode of application.
227
+ * Sign on mode of application.
368
228
  */
369
229
  readonly signOnMode: pulumi.Output<string>;
370
230
  /**
371
- * Signature algorithm used to digitally sign the assertion and response.
231
+ * Signature algorithm used to digitally sign the assertion and response
372
232
  */
373
233
  readonly signatureAlgorithm: pulumi.Output<string | undefined>;
374
234
  /**
375
- * x509 encoded certificate that the Service Provider uses to sign Single Logout requests. Note: should be provided without `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`, see [official documentation](https://developer.okta.com/docs/reference/api/apps/#service-provider-certificate).
235
+ * x509 encoded certificate that the Service Provider uses to sign Single Logout requests. Note: should be provided without `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`, see [official documentation](https://developer.okta.com/docs/reference/api/apps/#service-provider-certificate).
376
236
  */
377
237
  readonly singleLogoutCertificate: pulumi.Output<string | undefined>;
378
238
  /**
379
- * The issuer of the Service Provider that generates the Single Logout request.
239
+ * The issuer of the Service Provider that generates the Single Logout request
380
240
  */
381
241
  readonly singleLogoutIssuer: pulumi.Output<string | undefined>;
382
242
  /**
383
- * The location where the logout response is sent.
243
+ * The location where the logout response is sent
384
244
  */
385
245
  readonly singleLogoutUrl: pulumi.Output<string | undefined>;
386
246
  /**
387
- * SAML service provider issuer.
247
+ * SAML SP issuer ID
388
248
  */
389
249
  readonly spIssuer: pulumi.Output<string | undefined>;
390
250
  /**
391
- * Single Sign-on Url.
251
+ * Single Sign On URL
392
252
  */
393
253
  readonly ssoUrl: pulumi.Output<string | undefined>;
394
254
  /**
395
- * status of application.
255
+ * Status of application. By default, it is `ACTIVE`
396
256
  */
397
257
  readonly status: pulumi.Output<string | undefined>;
398
258
  /**
@@ -400,23 +260,23 @@ export declare class Saml extends pulumi.CustomResource {
400
260
  */
401
261
  readonly subjectNameIdFormat: pulumi.Output<string | undefined>;
402
262
  /**
403
- * Template for app user's username when a user is assigned to the app.
263
+ * Template for app user's username when a user is assigned to the app
404
264
  */
405
265
  readonly subjectNameIdTemplate: pulumi.Output<string | undefined>;
406
266
  /**
407
- * Username template. Default is: `"${source.login}"`
267
+ * Username template. Default: `${source.login}`
408
268
  */
409
269
  readonly userNameTemplate: pulumi.Output<string | undefined>;
410
270
  /**
411
- * Push username on update. Valid values: `"PUSH"` and `"DONT_PUSH"`.
271
+ * Push username on update. Valid values: `PUSH` and `DONT_PUSH`
412
272
  */
413
273
  readonly userNameTemplatePushStatus: pulumi.Output<string | undefined>;
414
274
  /**
415
- * Username template suffix.
275
+ * Username template suffix
416
276
  */
417
277
  readonly userNameTemplateSuffix: pulumi.Output<string | undefined>;
418
278
  /**
419
- * Username template type. Default is: `"BUILT_IN"`.
279
+ * Username template type. Default: `BUILT_IN`
420
280
  */
421
281
  readonly userNameTemplateType: pulumi.Output<string | undefined>;
422
282
  /**
@@ -433,15 +293,15 @@ export declare class Saml extends pulumi.CustomResource {
433
293
  */
434
294
  export interface SamlState {
435
295
  /**
436
- * Custom error page URL.
296
+ * Custom error page URL
437
297
  */
438
298
  accessibilityErrorRedirectUrl?: pulumi.Input<string>;
439
299
  /**
440
- * Custom login page for this application.
300
+ * Custom login page URL
441
301
  */
442
302
  accessibilityLoginRedirectUrl?: pulumi.Input<string>;
443
303
  /**
444
- * Enable self-service. Default is: `false`.
304
+ * Enable self service. Default is `false`
445
305
  */
446
306
  accessibilitySelfService?: pulumi.Input<boolean>;
447
307
  /**
@@ -457,27 +317,24 @@ export interface SamlState {
457
317
  */
458
318
  appLinksJson?: pulumi.Input<string>;
459
319
  /**
460
- * Application settings in JSON format.
320
+ * Application settings in JSON format
461
321
  */
462
322
  appSettingsJson?: pulumi.Input<string>;
463
323
  /**
464
- * Determines whether the SAML assertion is digitally signed.
324
+ * Determines whether the SAML assertion is digitally signed
465
325
  */
466
326
  assertionSigned?: pulumi.Input<boolean>;
467
- /**
468
- * List of SAML Attribute statements.
469
- */
470
327
  attributeStatements?: pulumi.Input<pulumi.Input<inputs.app.SamlAttributeStatement>[]>;
471
328
  /**
472
- * Audience restriction.
329
+ * Audience Restriction
473
330
  */
474
331
  audience?: pulumi.Input<string>;
475
332
  /**
476
- * The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.
333
+ * The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.y
477
334
  */
478
335
  authenticationPolicy?: pulumi.Input<string>;
479
336
  /**
480
- * Identifies the SAML authentication context class for the assertion’s authentication statement.
337
+ * Identifies the SAML authentication context class for the assertion’s authentication statement
481
338
  */
482
339
  authnContextClassRef?: pulumi.Input<string>;
483
340
  /**
@@ -485,7 +342,7 @@ export interface SamlState {
485
342
  */
486
343
  autoSubmitToolbar?: pulumi.Input<boolean>;
487
344
  /**
488
- * The raw signing certificate.
345
+ * cert from SAML XML metadata payload
489
346
  */
490
347
  certificate?: pulumi.Input<string>;
491
348
  /**
@@ -493,15 +350,15 @@ export interface SamlState {
493
350
  */
494
351
  defaultRelayState?: pulumi.Input<string>;
495
352
  /**
496
- * Identifies the location where the SAML response is intended to be sent inside the SAML assertion.
353
+ * Identifies the location where the SAML response is intended to be sent inside of the SAML assertion
497
354
  */
498
355
  destination?: pulumi.Input<string>;
499
356
  /**
500
- * Determines the digest algorithm used to digitally sign the SAML assertion and response.
357
+ * Determines the digest algorithm used to digitally sign the SAML assertion and response
501
358
  */
502
359
  digestAlgorithm?: pulumi.Input<string>;
503
360
  /**
504
- * Url that can be used to embed this application into another portal.
361
+ * The url that can be used to embed this application in other portals.
505
362
  */
506
363
  embedUrl?: pulumi.Input<string>;
507
364
  /**
@@ -509,23 +366,23 @@ export interface SamlState {
509
366
  */
510
367
  enduserNote?: pulumi.Input<string>;
511
368
  /**
512
- * Entity ID, the ID portion of the `entityUrl`.
369
+ * Entity ID, the ID portion of the entity_url
513
370
  */
514
371
  entityKey?: pulumi.Input<string>;
515
372
  /**
516
- * Entity URL for instance [http://www.okta.com/exk1fcia6d6EMsf331d8](http://www.okta.com/exk1fcia6d6EMsf331d8).
373
+ * Entity URL for instance http://www.okta.com/exk1fcia6d6EMsf331d8
517
374
  */
518
375
  entityUrl?: pulumi.Input<string>;
519
376
  /**
520
- * features enabled. Notice: you can't currently configure provisioning features via the API.
377
+ * features to enable
521
378
  */
522
379
  features?: pulumi.Input<pulumi.Input<string>[]>;
523
380
  /**
524
- * Do not display application icon on mobile app. Default is: `false`
381
+ * Do not display application icon on mobile app
525
382
  */
526
383
  hideIos?: pulumi.Input<boolean>;
527
384
  /**
528
- * Do not display application icon to users. Default is: `false`
385
+ * Do not display application icon to users
529
386
  */
530
387
  hideWeb?: pulumi.Input<boolean>;
531
388
  /**
@@ -533,31 +390,31 @@ export interface SamlState {
533
390
  */
534
391
  honorForceAuthn?: pulumi.Input<boolean>;
535
392
  /**
536
- * `urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Post` location from the SAML metadata.
393
+ * urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Post location from the SAML metadata.
537
394
  */
538
395
  httpPostBinding?: pulumi.Input<string>;
539
396
  /**
540
- * `urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect` location from the SAML metadata.
397
+ * urn:oasis:names:tc:SAML:2.0:bindings:HTTP-Redirect location from the SAML metadata.
541
398
  */
542
399
  httpRedirectBinding?: pulumi.Input<string>;
543
400
  /**
544
- * SAML issuer ID.
401
+ * SAML issuer ID
545
402
  */
546
403
  idpIssuer?: pulumi.Input<string>;
547
404
  /**
548
- * _Early Access Property_. Enables [Federation Broker Mode](https://help.okta.com/en/prod/Content/Topics/Apps/apps-fbm-enable.htm).
405
+ * *Early Access Property*. Enable Federation Broker Mode.
549
406
  */
550
407
  implicitAssignment?: pulumi.Input<boolean>;
551
408
  /**
552
- * Saml Inline Hook associated with the application.
409
+ * Saml Inline Hook setting
553
410
  */
554
411
  inlineHookId?: pulumi.Input<string>;
555
412
  /**
556
- * Certificate key ID.
413
+ * Certificate ID
557
414
  */
558
415
  keyId?: pulumi.Input<string>;
559
416
  /**
560
- * Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid`.
417
+ * Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid`
561
418
  */
562
419
  keyName?: pulumi.Input<string>;
563
420
  /**
@@ -565,11 +422,11 @@ export interface SamlState {
565
422
  */
566
423
  keyYearsValid?: pulumi.Input<number>;
567
424
  /**
568
- * An array of all key credentials for the application. Format of each entry is as follows:
425
+ * Application keys
569
426
  */
570
427
  keys?: pulumi.Input<pulumi.Input<inputs.app.SamlKey>[]>;
571
428
  /**
572
- * label of application.
429
+ * The Application's display name.
573
430
  */
574
431
  label?: pulumi.Input<string>;
575
432
  /**
@@ -577,27 +434,36 @@ export interface SamlState {
577
434
  */
578
435
  logo?: pulumi.Input<string>;
579
436
  /**
580
- * Direct link of application logo.
437
+ * URL of the application's logo
581
438
  */
582
439
  logoUrl?: pulumi.Input<string>;
583
440
  /**
584
- * The raw SAML metadata in XML.
441
+ * SAML xml metadata payload
585
442
  */
586
443
  metadata?: pulumi.Input<string>;
587
444
  /**
588
- * SAML xml metadata URL.
445
+ * SAML xml metadata URL
589
446
  */
590
447
  metadataUrl?: pulumi.Input<string>;
591
448
  /**
592
- * Name assigned to the application by Okta.
449
+ * Name of the app.
593
450
  */
594
451
  name?: pulumi.Input<string>;
595
452
  /**
596
- * name of application from the Okta Integration Network, if not included a custom app will be created. If not provided the following arguments are required:
453
+ * Name of application from the Okta Integration Network. For instance 'slack'. If not included a custom app will be created. If not provided the following arguments are required:
454
+ * 'sso*url'
455
+ * 'recipient'
456
+ * 'destination'
457
+ * 'audience'
458
+ * 'subject*name*id*template'
459
+ * 'subject*name*id*format'
460
+ * 'signature*algorithm'
461
+ * 'digest*algorithm'
462
+ * 'authn*context*class*ref'
597
463
  */
598
464
  preconfiguredApp?: pulumi.Input<string>;
599
465
  /**
600
- * The location where the app may present the SAML assertion.
466
+ * The location where the app may present the SAML assertion
601
467
  */
602
468
  recipient?: pulumi.Input<string>;
603
469
  /**
@@ -605,7 +471,7 @@ export interface SamlState {
605
471
  */
606
472
  requestCompressed?: pulumi.Input<boolean>;
607
473
  /**
608
- * Determines whether the SAML auth response message is digitally signed.
474
+ * Determines whether the SAML auth response message is digitally signed
609
475
  */
610
476
  responseSigned?: pulumi.Input<boolean>;
611
477
  /**
@@ -613,39 +479,39 @@ export interface SamlState {
613
479
  */
614
480
  samlSignedRequestEnabled?: pulumi.Input<boolean>;
615
481
  /**
616
- * SAML version for the app's sign-on mode. Valid values are: `"2.0"` or `"1.1"`. Default is `"2.0"`.
482
+ * SAML version for the app's sign-on mode. Valid values are: `2.0` or `1.1`. Default is `2.0`
617
483
  */
618
484
  samlVersion?: pulumi.Input<string>;
619
485
  /**
620
- * Sign-on mode of application.
486
+ * Sign on mode of application.
621
487
  */
622
488
  signOnMode?: pulumi.Input<string>;
623
489
  /**
624
- * Signature algorithm used to digitally sign the assertion and response.
490
+ * Signature algorithm used to digitally sign the assertion and response
625
491
  */
626
492
  signatureAlgorithm?: pulumi.Input<string>;
627
493
  /**
628
- * x509 encoded certificate that the Service Provider uses to sign Single Logout requests. Note: should be provided without `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`, see [official documentation](https://developer.okta.com/docs/reference/api/apps/#service-provider-certificate).
494
+ * x509 encoded certificate that the Service Provider uses to sign Single Logout requests. Note: should be provided without `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`, see [official documentation](https://developer.okta.com/docs/reference/api/apps/#service-provider-certificate).
629
495
  */
630
496
  singleLogoutCertificate?: pulumi.Input<string>;
631
497
  /**
632
- * The issuer of the Service Provider that generates the Single Logout request.
498
+ * The issuer of the Service Provider that generates the Single Logout request
633
499
  */
634
500
  singleLogoutIssuer?: pulumi.Input<string>;
635
501
  /**
636
- * The location where the logout response is sent.
502
+ * The location where the logout response is sent
637
503
  */
638
504
  singleLogoutUrl?: pulumi.Input<string>;
639
505
  /**
640
- * SAML service provider issuer.
506
+ * SAML SP issuer ID
641
507
  */
642
508
  spIssuer?: pulumi.Input<string>;
643
509
  /**
644
- * Single Sign-on Url.
510
+ * Single Sign On URL
645
511
  */
646
512
  ssoUrl?: pulumi.Input<string>;
647
513
  /**
648
- * status of application.
514
+ * Status of application. By default, it is `ACTIVE`
649
515
  */
650
516
  status?: pulumi.Input<string>;
651
517
  /**
@@ -653,23 +519,23 @@ export interface SamlState {
653
519
  */
654
520
  subjectNameIdFormat?: pulumi.Input<string>;
655
521
  /**
656
- * Template for app user's username when a user is assigned to the app.
522
+ * Template for app user's username when a user is assigned to the app
657
523
  */
658
524
  subjectNameIdTemplate?: pulumi.Input<string>;
659
525
  /**
660
- * Username template. Default is: `"${source.login}"`
526
+ * Username template. Default: `${source.login}`
661
527
  */
662
528
  userNameTemplate?: pulumi.Input<string>;
663
529
  /**
664
- * Push username on update. Valid values: `"PUSH"` and `"DONT_PUSH"`.
530
+ * Push username on update. Valid values: `PUSH` and `DONT_PUSH`
665
531
  */
666
532
  userNameTemplatePushStatus?: pulumi.Input<string>;
667
533
  /**
668
- * Username template suffix.
534
+ * Username template suffix
669
535
  */
670
536
  userNameTemplateSuffix?: pulumi.Input<string>;
671
537
  /**
672
- * Username template type. Default is: `"BUILT_IN"`.
538
+ * Username template type. Default: `BUILT_IN`
673
539
  */
674
540
  userNameTemplateType?: pulumi.Input<string>;
675
541
  }
@@ -678,15 +544,15 @@ export interface SamlState {
678
544
  */
679
545
  export interface SamlArgs {
680
546
  /**
681
- * Custom error page URL.
547
+ * Custom error page URL
682
548
  */
683
549
  accessibilityErrorRedirectUrl?: pulumi.Input<string>;
684
550
  /**
685
- * Custom login page for this application.
551
+ * Custom login page URL
686
552
  */
687
553
  accessibilityLoginRedirectUrl?: pulumi.Input<string>;
688
554
  /**
689
- * Enable self-service. Default is: `false`.
555
+ * Enable self service. Default is `false`
690
556
  */
691
557
  accessibilitySelfService?: pulumi.Input<boolean>;
692
558
  /**
@@ -702,27 +568,24 @@ export interface SamlArgs {
702
568
  */
703
569
  appLinksJson?: pulumi.Input<string>;
704
570
  /**
705
- * Application settings in JSON format.
571
+ * Application settings in JSON format
706
572
  */
707
573
  appSettingsJson?: pulumi.Input<string>;
708
574
  /**
709
- * Determines whether the SAML assertion is digitally signed.
575
+ * Determines whether the SAML assertion is digitally signed
710
576
  */
711
577
  assertionSigned?: pulumi.Input<boolean>;
712
- /**
713
- * List of SAML Attribute statements.
714
- */
715
578
  attributeStatements?: pulumi.Input<pulumi.Input<inputs.app.SamlAttributeStatement>[]>;
716
579
  /**
717
- * Audience restriction.
580
+ * Audience Restriction
718
581
  */
719
582
  audience?: pulumi.Input<string>;
720
583
  /**
721
- * The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.
584
+ * The ID of the associated `appSignonPolicy`. If this property is removed from the application the `default` sign-on-policy will be associated with this application.y
722
585
  */
723
586
  authenticationPolicy?: pulumi.Input<string>;
724
587
  /**
725
- * Identifies the SAML authentication context class for the assertion’s authentication statement.
588
+ * Identifies the SAML authentication context class for the assertion’s authentication statement
726
589
  */
727
590
  authnContextClassRef?: pulumi.Input<string>;
728
591
  /**
@@ -734,11 +597,11 @@ export interface SamlArgs {
734
597
  */
735
598
  defaultRelayState?: pulumi.Input<string>;
736
599
  /**
737
- * Identifies the location where the SAML response is intended to be sent inside the SAML assertion.
600
+ * Identifies the location where the SAML response is intended to be sent inside of the SAML assertion
738
601
  */
739
602
  destination?: pulumi.Input<string>;
740
603
  /**
741
- * Determines the digest algorithm used to digitally sign the SAML assertion and response.
604
+ * Determines the digest algorithm used to digitally sign the SAML assertion and response
742
605
  */
743
606
  digestAlgorithm?: pulumi.Input<string>;
744
607
  /**
@@ -746,11 +609,11 @@ export interface SamlArgs {
746
609
  */
747
610
  enduserNote?: pulumi.Input<string>;
748
611
  /**
749
- * Do not display application icon on mobile app. Default is: `false`
612
+ * Do not display application icon on mobile app
750
613
  */
751
614
  hideIos?: pulumi.Input<boolean>;
752
615
  /**
753
- * Do not display application icon to users. Default is: `false`
616
+ * Do not display application icon to users
754
617
  */
755
618
  hideWeb?: pulumi.Input<boolean>;
756
619
  /**
@@ -758,19 +621,19 @@ export interface SamlArgs {
758
621
  */
759
622
  honorForceAuthn?: pulumi.Input<boolean>;
760
623
  /**
761
- * SAML issuer ID.
624
+ * SAML issuer ID
762
625
  */
763
626
  idpIssuer?: pulumi.Input<string>;
764
627
  /**
765
- * _Early Access Property_. Enables [Federation Broker Mode](https://help.okta.com/en/prod/Content/Topics/Apps/apps-fbm-enable.htm).
628
+ * *Early Access Property*. Enable Federation Broker Mode.
766
629
  */
767
630
  implicitAssignment?: pulumi.Input<boolean>;
768
631
  /**
769
- * Saml Inline Hook associated with the application.
632
+ * Saml Inline Hook setting
770
633
  */
771
634
  inlineHookId?: pulumi.Input<string>;
772
635
  /**
773
- * Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid`.
636
+ * Certificate name. This modulates the rotation of keys. New name == new key. Required to be set with `keyYearsValid`
774
637
  */
775
638
  keyName?: pulumi.Input<string>;
776
639
  /**
@@ -778,7 +641,7 @@ export interface SamlArgs {
778
641
  */
779
642
  keyYearsValid?: pulumi.Input<number>;
780
643
  /**
781
- * label of application.
644
+ * The Application's display name.
782
645
  */
783
646
  label: pulumi.Input<string>;
784
647
  /**
@@ -786,11 +649,20 @@ export interface SamlArgs {
786
649
  */
787
650
  logo?: pulumi.Input<string>;
788
651
  /**
789
- * name of application from the Okta Integration Network, if not included a custom app will be created. If not provided the following arguments are required:
652
+ * Name of application from the Okta Integration Network. For instance 'slack'. If not included a custom app will be created. If not provided the following arguments are required:
653
+ * 'sso*url'
654
+ * 'recipient'
655
+ * 'destination'
656
+ * 'audience'
657
+ * 'subject*name*id*template'
658
+ * 'subject*name*id*format'
659
+ * 'signature*algorithm'
660
+ * 'digest*algorithm'
661
+ * 'authn*context*class*ref'
790
662
  */
791
663
  preconfiguredApp?: pulumi.Input<string>;
792
664
  /**
793
- * The location where the app may present the SAML assertion.
665
+ * The location where the app may present the SAML assertion
794
666
  */
795
667
  recipient?: pulumi.Input<string>;
796
668
  /**
@@ -798,7 +670,7 @@ export interface SamlArgs {
798
670
  */
799
671
  requestCompressed?: pulumi.Input<boolean>;
800
672
  /**
801
- * Determines whether the SAML auth response message is digitally signed.
673
+ * Determines whether the SAML auth response message is digitally signed
802
674
  */
803
675
  responseSigned?: pulumi.Input<boolean>;
804
676
  /**
@@ -806,35 +678,35 @@ export interface SamlArgs {
806
678
  */
807
679
  samlSignedRequestEnabled?: pulumi.Input<boolean>;
808
680
  /**
809
- * SAML version for the app's sign-on mode. Valid values are: `"2.0"` or `"1.1"`. Default is `"2.0"`.
681
+ * SAML version for the app's sign-on mode. Valid values are: `2.0` or `1.1`. Default is `2.0`
810
682
  */
811
683
  samlVersion?: pulumi.Input<string>;
812
684
  /**
813
- * Signature algorithm used to digitally sign the assertion and response.
685
+ * Signature algorithm used to digitally sign the assertion and response
814
686
  */
815
687
  signatureAlgorithm?: pulumi.Input<string>;
816
688
  /**
817
- * x509 encoded certificate that the Service Provider uses to sign Single Logout requests. Note: should be provided without `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`, see [official documentation](https://developer.okta.com/docs/reference/api/apps/#service-provider-certificate).
689
+ * x509 encoded certificate that the Service Provider uses to sign Single Logout requests. Note: should be provided without `-----BEGIN CERTIFICATE-----` and `-----END CERTIFICATE-----`, see [official documentation](https://developer.okta.com/docs/reference/api/apps/#service-provider-certificate).
818
690
  */
819
691
  singleLogoutCertificate?: pulumi.Input<string>;
820
692
  /**
821
- * The issuer of the Service Provider that generates the Single Logout request.
693
+ * The issuer of the Service Provider that generates the Single Logout request
822
694
  */
823
695
  singleLogoutIssuer?: pulumi.Input<string>;
824
696
  /**
825
- * The location where the logout response is sent.
697
+ * The location where the logout response is sent
826
698
  */
827
699
  singleLogoutUrl?: pulumi.Input<string>;
828
700
  /**
829
- * SAML service provider issuer.
701
+ * SAML SP issuer ID
830
702
  */
831
703
  spIssuer?: pulumi.Input<string>;
832
704
  /**
833
- * Single Sign-on Url.
705
+ * Single Sign On URL
834
706
  */
835
707
  ssoUrl?: pulumi.Input<string>;
836
708
  /**
837
- * status of application.
709
+ * Status of application. By default, it is `ACTIVE`
838
710
  */
839
711
  status?: pulumi.Input<string>;
840
712
  /**
@@ -842,23 +714,23 @@ export interface SamlArgs {
842
714
  */
843
715
  subjectNameIdFormat?: pulumi.Input<string>;
844
716
  /**
845
- * Template for app user's username when a user is assigned to the app.
717
+ * Template for app user's username when a user is assigned to the app
846
718
  */
847
719
  subjectNameIdTemplate?: pulumi.Input<string>;
848
720
  /**
849
- * Username template. Default is: `"${source.login}"`
721
+ * Username template. Default: `${source.login}`
850
722
  */
851
723
  userNameTemplate?: pulumi.Input<string>;
852
724
  /**
853
- * Push username on update. Valid values: `"PUSH"` and `"DONT_PUSH"`.
725
+ * Push username on update. Valid values: `PUSH` and `DONT_PUSH`
854
726
  */
855
727
  userNameTemplatePushStatus?: pulumi.Input<string>;
856
728
  /**
857
- * Username template suffix.
729
+ * Username template suffix
858
730
  */
859
731
  userNameTemplateSuffix?: pulumi.Input<string>;
860
732
  /**
861
- * Username template type. Default is: `"BUILT_IN"`.
733
+ * Username template type. Default: `BUILT_IN`
862
734
  */
863
735
  userNameTemplateType?: pulumi.Input<string>;
864
736
  }