sailpoint-api-client 1.5.0 → 1.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/beta/README.md +2 -2
- package/beta/api.ts +499 -109
- package/beta/common.ts +2 -2
- package/beta/package.json +1 -1
- package/dist/beta/api.d.ts +429 -70
- package/dist/beta/api.js +162 -99
- package/dist/beta/api.js.map +1 -1
- package/dist/beta/common.js +1 -1
- package/dist/v2024/api.d.ts +1186 -9
- package/dist/v2024/api.js +811 -87
- package/dist/v2024/api.js.map +1 -1
- package/dist/v2024/common.js +1 -1
- package/dist/v2025/api.d.ts +1452 -9
- package/dist/v2025/api.js +912 -72
- package/dist/v2025/api.js.map +1 -1
- package/dist/v2025/common.js +1 -1
- package/dist/v3/api.d.ts +502 -21
- package/dist/v3/api.js +95 -27
- package/dist/v3/api.js.map +1 -1
- package/dist/v3/common.js +1 -1
- package/package.json +1 -1
- package/v2024/README.md +2 -2
- package/v2024/api.ts +1524 -10
- package/v2024/common.ts +2 -2
- package/v2024/package.json +1 -1
- package/v2025/README.md +2 -2
- package/v2025/api.ts +1908 -70
- package/v2025/common.ts +2 -2
- package/v2025/package.json +1 -1
- package/v3/README.md +2 -2
- package/v3/api.ts +543 -28
- package/v3/common.ts +2 -2
- package/v3/package.json +1 -1
package/dist/v2025/api.d.ts
CHANGED
|
@@ -2156,6 +2156,63 @@ export interface AccessRequestDynamicApproverV2025 {
|
|
|
2156
2156
|
*/
|
|
2157
2157
|
'requestedBy': AccessItemRequesterDtoV2025;
|
|
2158
2158
|
}
|
|
2159
|
+
/**
|
|
2160
|
+
*
|
|
2161
|
+
* @export
|
|
2162
|
+
* @interface AccessRequestItem1V2025
|
|
2163
|
+
*/
|
|
2164
|
+
export interface AccessRequestItem1V2025 {
|
|
2165
|
+
/**
|
|
2166
|
+
* The type of the item being requested.
|
|
2167
|
+
* @type {string}
|
|
2168
|
+
* @memberof AccessRequestItem1V2025
|
|
2169
|
+
*/
|
|
2170
|
+
'type': AccessRequestItem1V2025TypeV2025;
|
|
2171
|
+
/**
|
|
2172
|
+
* ID of Role, Access Profile or Entitlement being requested.
|
|
2173
|
+
* @type {string}
|
|
2174
|
+
* @memberof AccessRequestItem1V2025
|
|
2175
|
+
*/
|
|
2176
|
+
'id': string;
|
|
2177
|
+
/**
|
|
2178
|
+
* Comment provided by requester. * Comment is required when the request is of type Revoke Access.
|
|
2179
|
+
* @type {string}
|
|
2180
|
+
* @memberof AccessRequestItem1V2025
|
|
2181
|
+
*/
|
|
2182
|
+
'comment'?: string;
|
|
2183
|
+
/**
|
|
2184
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
|
|
2185
|
+
* @type {{ [key: string]: string; }}
|
|
2186
|
+
* @memberof AccessRequestItem1V2025
|
|
2187
|
+
*/
|
|
2188
|
+
'clientMetadata'?: {
|
|
2189
|
+
[key: string]: string;
|
|
2190
|
+
};
|
|
2191
|
+
/**
|
|
2192
|
+
* The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
|
|
2193
|
+
* @type {string}
|
|
2194
|
+
* @memberof AccessRequestItem1V2025
|
|
2195
|
+
*/
|
|
2196
|
+
'removeDate'?: string;
|
|
2197
|
+
/**
|
|
2198
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
2199
|
+
* @type {string}
|
|
2200
|
+
* @memberof AccessRequestItem1V2025
|
|
2201
|
+
*/
|
|
2202
|
+
'assignmentId'?: string | null;
|
|
2203
|
+
/**
|
|
2204
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
2205
|
+
* @type {string}
|
|
2206
|
+
* @memberof AccessRequestItem1V2025
|
|
2207
|
+
*/
|
|
2208
|
+
'nativeIdentity'?: string | null;
|
|
2209
|
+
}
|
|
2210
|
+
export declare const AccessRequestItem1V2025TypeV2025: {
|
|
2211
|
+
readonly AccessProfile: "ACCESS_PROFILE";
|
|
2212
|
+
readonly Role: "ROLE";
|
|
2213
|
+
readonly Entitlement: "ENTITLEMENT";
|
|
2214
|
+
};
|
|
2215
|
+
export type AccessRequestItem1V2025TypeV2025 = typeof AccessRequestItem1V2025TypeV2025[keyof typeof AccessRequestItem1V2025TypeV2025];
|
|
2159
2216
|
/**
|
|
2160
2217
|
*
|
|
2161
2218
|
* @export
|
|
@@ -2904,6 +2961,12 @@ export interface AccessRequestV2025 {
|
|
|
2904
2961
|
'clientMetadata'?: {
|
|
2905
2962
|
[key: string]: string;
|
|
2906
2963
|
};
|
|
2964
|
+
/**
|
|
2965
|
+
* Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
|
|
2966
|
+
* @type {Array<RequestedForDtoRefV2025>}
|
|
2967
|
+
* @memberof AccessRequestV2025
|
|
2968
|
+
*/
|
|
2969
|
+
'requestedForWithRequestedItems'?: Array<RequestedForDtoRefV2025> | null;
|
|
2907
2970
|
}
|
|
2908
2971
|
/**
|
|
2909
2972
|
*
|
|
@@ -4428,6 +4491,62 @@ export interface AccountInfoDtoV2025 {
|
|
|
4428
4491
|
*/
|
|
4429
4492
|
'uuid'?: string;
|
|
4430
4493
|
}
|
|
4494
|
+
/**
|
|
4495
|
+
*
|
|
4496
|
+
* @export
|
|
4497
|
+
* @interface AccountInfoRefV2025
|
|
4498
|
+
*/
|
|
4499
|
+
export interface AccountInfoRefV2025 {
|
|
4500
|
+
/**
|
|
4501
|
+
* The uuid for the account, available under the \'objectguid\' attribute
|
|
4502
|
+
* @type {string}
|
|
4503
|
+
* @memberof AccountInfoRefV2025
|
|
4504
|
+
*/
|
|
4505
|
+
'uuid'?: string;
|
|
4506
|
+
/**
|
|
4507
|
+
* The \'distinguishedName\' attribute for the account
|
|
4508
|
+
* @type {string}
|
|
4509
|
+
* @memberof AccountInfoRefV2025
|
|
4510
|
+
*/
|
|
4511
|
+
'nativeIdentity'?: string;
|
|
4512
|
+
/**
|
|
4513
|
+
*
|
|
4514
|
+
* @type {DtoTypeV2025}
|
|
4515
|
+
* @memberof AccountInfoRefV2025
|
|
4516
|
+
*/
|
|
4517
|
+
'type'?: DtoTypeV2025;
|
|
4518
|
+
/**
|
|
4519
|
+
* The account id
|
|
4520
|
+
* @type {string}
|
|
4521
|
+
* @memberof AccountInfoRefV2025
|
|
4522
|
+
*/
|
|
4523
|
+
'id'?: string;
|
|
4524
|
+
/**
|
|
4525
|
+
* The account display name
|
|
4526
|
+
* @type {string}
|
|
4527
|
+
* @memberof AccountInfoRefV2025
|
|
4528
|
+
*/
|
|
4529
|
+
'name'?: string;
|
|
4530
|
+
}
|
|
4531
|
+
/**
|
|
4532
|
+
*
|
|
4533
|
+
* @export
|
|
4534
|
+
* @interface AccountItemRefV2025
|
|
4535
|
+
*/
|
|
4536
|
+
export interface AccountItemRefV2025 {
|
|
4537
|
+
/**
|
|
4538
|
+
* The uuid for the account, available under the \'objectguid\' attribute
|
|
4539
|
+
* @type {string}
|
|
4540
|
+
* @memberof AccountItemRefV2025
|
|
4541
|
+
*/
|
|
4542
|
+
'accountUuid'?: string | null;
|
|
4543
|
+
/**
|
|
4544
|
+
* The \'distinguishedName\' attribute for the account
|
|
4545
|
+
* @type {string}
|
|
4546
|
+
* @memberof AccountItemRefV2025
|
|
4547
|
+
*/
|
|
4548
|
+
'nativeIdentity'?: string;
|
|
4549
|
+
}
|
|
4431
4550
|
/**
|
|
4432
4551
|
* If an account activity item is associated with an access request, captures details of that request.
|
|
4433
4552
|
* @export
|
|
@@ -5191,6 +5310,52 @@ export interface AccountsExportReportArgumentsV2025 {
|
|
|
5191
5310
|
*/
|
|
5192
5311
|
'sourceName': string;
|
|
5193
5312
|
}
|
|
5313
|
+
/**
|
|
5314
|
+
*
|
|
5315
|
+
* @export
|
|
5316
|
+
* @interface AccountsSelectionRequestV2025
|
|
5317
|
+
*/
|
|
5318
|
+
export interface AccountsSelectionRequestV2025 {
|
|
5319
|
+
/**
|
|
5320
|
+
* A list of Identity IDs for whom the Access is requested.
|
|
5321
|
+
* @type {Array<string>}
|
|
5322
|
+
* @memberof AccountsSelectionRequestV2025
|
|
5323
|
+
*/
|
|
5324
|
+
'requestedFor': Array<string>;
|
|
5325
|
+
/**
|
|
5326
|
+
*
|
|
5327
|
+
* @type {AccessRequestTypeV2025}
|
|
5328
|
+
* @memberof AccountsSelectionRequestV2025
|
|
5329
|
+
*/
|
|
5330
|
+
'requestType'?: AccessRequestTypeV2025 | null;
|
|
5331
|
+
/**
|
|
5332
|
+
*
|
|
5333
|
+
* @type {Array<AccessRequestItem1V2025>}
|
|
5334
|
+
* @memberof AccountsSelectionRequestV2025
|
|
5335
|
+
*/
|
|
5336
|
+
'requestedItems': Array<AccessRequestItem1V2025>;
|
|
5337
|
+
/**
|
|
5338
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities.
|
|
5339
|
+
* @type {{ [key: string]: string; }}
|
|
5340
|
+
* @memberof AccountsSelectionRequestV2025
|
|
5341
|
+
*/
|
|
5342
|
+
'clientMetadata'?: {
|
|
5343
|
+
[key: string]: string;
|
|
5344
|
+
};
|
|
5345
|
+
}
|
|
5346
|
+
/**
|
|
5347
|
+
*
|
|
5348
|
+
* @export
|
|
5349
|
+
* @interface AccountsSelectionResponseV2025
|
|
5350
|
+
*/
|
|
5351
|
+
export interface AccountsSelectionResponseV2025 {
|
|
5352
|
+
/**
|
|
5353
|
+
* A list of available account selections per identity in the request, for all the requested items
|
|
5354
|
+
* @type {Array<IdentityAccountSelectionsV2025>}
|
|
5355
|
+
* @memberof AccountsSelectionResponseV2025
|
|
5356
|
+
*/
|
|
5357
|
+
'identities'?: Array<IdentityAccountSelectionsV2025>;
|
|
5358
|
+
}
|
|
5194
5359
|
/**
|
|
5195
5360
|
*
|
|
5196
5361
|
* @export
|
|
@@ -6513,6 +6678,7 @@ export declare const AttributeDefinitionTypeV2025: {
|
|
|
6513
6678
|
readonly Long: "LONG";
|
|
6514
6679
|
readonly Int: "INT";
|
|
6515
6680
|
readonly Boolean: "BOOLEAN";
|
|
6681
|
+
readonly Date: "DATE";
|
|
6516
6682
|
};
|
|
6517
6683
|
export type AttributeDefinitionTypeV2025 = typeof AttributeDefinitionTypeV2025[keyof typeof AttributeDefinitionTypeV2025];
|
|
6518
6684
|
/**
|
|
@@ -16039,6 +16205,30 @@ export interface FeatureValueDtoV2025 {
|
|
|
16039
16205
|
*/
|
|
16040
16206
|
'denominator'?: number;
|
|
16041
16207
|
}
|
|
16208
|
+
/**
|
|
16209
|
+
*
|
|
16210
|
+
* @export
|
|
16211
|
+
* @interface FederationProtocolDetailsV2025
|
|
16212
|
+
*/
|
|
16213
|
+
export interface FederationProtocolDetailsV2025 {
|
|
16214
|
+
/**
|
|
16215
|
+
* Federation protocol role
|
|
16216
|
+
* @type {string}
|
|
16217
|
+
* @memberof FederationProtocolDetailsV2025
|
|
16218
|
+
*/
|
|
16219
|
+
'role'?: FederationProtocolDetailsV2025RoleV2025;
|
|
16220
|
+
/**
|
|
16221
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
16222
|
+
* @type {string}
|
|
16223
|
+
* @memberof FederationProtocolDetailsV2025
|
|
16224
|
+
*/
|
|
16225
|
+
'entityId'?: string;
|
|
16226
|
+
}
|
|
16227
|
+
export declare const FederationProtocolDetailsV2025RoleV2025: {
|
|
16228
|
+
readonly SamlIdp: "SAML_IDP";
|
|
16229
|
+
readonly SamlSp: "SAML_SP";
|
|
16230
|
+
};
|
|
16231
|
+
export type FederationProtocolDetailsV2025RoleV2025 = typeof FederationProtocolDetailsV2025RoleV2025[keyof typeof FederationProtocolDetailsV2025RoleV2025];
|
|
16042
16232
|
/**
|
|
16043
16233
|
*
|
|
16044
16234
|
* @export
|
|
@@ -17229,6 +17419,182 @@ export declare const GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequ
|
|
|
17229
17419
|
readonly NoDecisions: "NO_DECISIONS";
|
|
17230
17420
|
};
|
|
17231
17421
|
export type GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025 = typeof GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025[keyof typeof GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025];
|
|
17422
|
+
/**
|
|
17423
|
+
*
|
|
17424
|
+
* @export
|
|
17425
|
+
* @interface GetCampaign200ResponseV2025
|
|
17426
|
+
*/
|
|
17427
|
+
export interface GetCampaign200ResponseV2025 {
|
|
17428
|
+
/**
|
|
17429
|
+
* Id of the campaign
|
|
17430
|
+
* @type {string}
|
|
17431
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17432
|
+
*/
|
|
17433
|
+
'id'?: string | null;
|
|
17434
|
+
/**
|
|
17435
|
+
* The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
17436
|
+
* @type {string}
|
|
17437
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17438
|
+
*/
|
|
17439
|
+
'name': string;
|
|
17440
|
+
/**
|
|
17441
|
+
* The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
17442
|
+
* @type {string}
|
|
17443
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17444
|
+
*/
|
|
17445
|
+
'description': string | null;
|
|
17446
|
+
/**
|
|
17447
|
+
* The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
|
|
17448
|
+
* @type {string}
|
|
17449
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17450
|
+
*/
|
|
17451
|
+
'deadline'?: string | null;
|
|
17452
|
+
/**
|
|
17453
|
+
* The type of campaign. Could be extended in the future.
|
|
17454
|
+
* @type {string}
|
|
17455
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17456
|
+
*/
|
|
17457
|
+
'type': GetCampaign200ResponseV2025TypeV2025;
|
|
17458
|
+
/**
|
|
17459
|
+
* Enables email notification for this campaign
|
|
17460
|
+
* @type {boolean}
|
|
17461
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17462
|
+
*/
|
|
17463
|
+
'emailNotificationEnabled'?: boolean;
|
|
17464
|
+
/**
|
|
17465
|
+
* Allows auto revoke for this campaign
|
|
17466
|
+
* @type {boolean}
|
|
17467
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17468
|
+
*/
|
|
17469
|
+
'autoRevokeAllowed'?: boolean;
|
|
17470
|
+
/**
|
|
17471
|
+
* Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
|
|
17472
|
+
* @type {boolean}
|
|
17473
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17474
|
+
*/
|
|
17475
|
+
'recommendationsEnabled'?: boolean;
|
|
17476
|
+
/**
|
|
17477
|
+
* The campaign\'s current status.
|
|
17478
|
+
* @type {string}
|
|
17479
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17480
|
+
*/
|
|
17481
|
+
'status'?: GetCampaign200ResponseV2025StatusV2025 | null;
|
|
17482
|
+
/**
|
|
17483
|
+
* The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
|
|
17484
|
+
* @type {string}
|
|
17485
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17486
|
+
*/
|
|
17487
|
+
'correlatedStatus'?: GetCampaign200ResponseV2025CorrelatedStatusV2025;
|
|
17488
|
+
/**
|
|
17489
|
+
* Created time of the campaign
|
|
17490
|
+
* @type {string}
|
|
17491
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17492
|
+
*/
|
|
17493
|
+
'created'?: string | null;
|
|
17494
|
+
/**
|
|
17495
|
+
* The total number of certifications in this campaign.
|
|
17496
|
+
* @type {number}
|
|
17497
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17498
|
+
*/
|
|
17499
|
+
'totalCertifications'?: number | null;
|
|
17500
|
+
/**
|
|
17501
|
+
* The number of completed certifications in this campaign.
|
|
17502
|
+
* @type {number}
|
|
17503
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17504
|
+
*/
|
|
17505
|
+
'completedCertifications'?: number | null;
|
|
17506
|
+
/**
|
|
17507
|
+
* A list of errors and warnings that have accumulated.
|
|
17508
|
+
* @type {Array<CampaignAlertV2025>}
|
|
17509
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17510
|
+
*/
|
|
17511
|
+
'alerts'?: Array<CampaignAlertV2025> | null;
|
|
17512
|
+
/**
|
|
17513
|
+
* Modified time of the campaign
|
|
17514
|
+
* @type {string}
|
|
17515
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17516
|
+
*/
|
|
17517
|
+
'modified'?: string | null;
|
|
17518
|
+
/**
|
|
17519
|
+
*
|
|
17520
|
+
* @type {CampaignAllOfFilterV2025}
|
|
17521
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17522
|
+
*/
|
|
17523
|
+
'filter'?: CampaignAllOfFilterV2025 | null;
|
|
17524
|
+
/**
|
|
17525
|
+
* Determines if comments on sunset date changes are required.
|
|
17526
|
+
* @type {boolean}
|
|
17527
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17528
|
+
*/
|
|
17529
|
+
'sunsetCommentsRequired'?: boolean;
|
|
17530
|
+
/**
|
|
17531
|
+
*
|
|
17532
|
+
* @type {CampaignAllOfSourceOwnerCampaignInfoV2025}
|
|
17533
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17534
|
+
*/
|
|
17535
|
+
'sourceOwnerCampaignInfo'?: CampaignAllOfSourceOwnerCampaignInfoV2025 | null;
|
|
17536
|
+
/**
|
|
17537
|
+
*
|
|
17538
|
+
* @type {CampaignAllOfSearchCampaignInfoV2025}
|
|
17539
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17540
|
+
*/
|
|
17541
|
+
'searchCampaignInfo'?: CampaignAllOfSearchCampaignInfoV2025 | null;
|
|
17542
|
+
/**
|
|
17543
|
+
*
|
|
17544
|
+
* @type {CampaignAllOfRoleCompositionCampaignInfoV2025}
|
|
17545
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17546
|
+
*/
|
|
17547
|
+
'roleCompositionCampaignInfo'?: CampaignAllOfRoleCompositionCampaignInfoV2025 | null;
|
|
17548
|
+
/**
|
|
17549
|
+
*
|
|
17550
|
+
* @type {CampaignAllOfMachineAccountCampaignInfoV2025}
|
|
17551
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17552
|
+
*/
|
|
17553
|
+
'machineAccountCampaignInfo'?: CampaignAllOfMachineAccountCampaignInfoV2025 | null;
|
|
17554
|
+
/**
|
|
17555
|
+
* A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
|
|
17556
|
+
* @type {Array<CampaignAllOfSourcesWithOrphanEntitlementsV2025>}
|
|
17557
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17558
|
+
*/
|
|
17559
|
+
'sourcesWithOrphanEntitlements'?: Array<CampaignAllOfSourcesWithOrphanEntitlementsV2025> | null;
|
|
17560
|
+
/**
|
|
17561
|
+
* Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
|
|
17562
|
+
* @type {string}
|
|
17563
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17564
|
+
*/
|
|
17565
|
+
'mandatoryCommentRequirement'?: GetCampaign200ResponseV2025MandatoryCommentRequirementV2025;
|
|
17566
|
+
}
|
|
17567
|
+
export declare const GetCampaign200ResponseV2025TypeV2025: {
|
|
17568
|
+
readonly Manager: "MANAGER";
|
|
17569
|
+
readonly SourceOwner: "SOURCE_OWNER";
|
|
17570
|
+
readonly Search: "SEARCH";
|
|
17571
|
+
readonly RoleComposition: "ROLE_COMPOSITION";
|
|
17572
|
+
readonly MachineAccount: "MACHINE_ACCOUNT";
|
|
17573
|
+
};
|
|
17574
|
+
export type GetCampaign200ResponseV2025TypeV2025 = typeof GetCampaign200ResponseV2025TypeV2025[keyof typeof GetCampaign200ResponseV2025TypeV2025];
|
|
17575
|
+
export declare const GetCampaign200ResponseV2025StatusV2025: {
|
|
17576
|
+
readonly Pending: "PENDING";
|
|
17577
|
+
readonly Staged: "STAGED";
|
|
17578
|
+
readonly Canceling: "CANCELING";
|
|
17579
|
+
readonly Activating: "ACTIVATING";
|
|
17580
|
+
readonly Active: "ACTIVE";
|
|
17581
|
+
readonly Completing: "COMPLETING";
|
|
17582
|
+
readonly Completed: "COMPLETED";
|
|
17583
|
+
readonly Error: "ERROR";
|
|
17584
|
+
readonly Archived: "ARCHIVED";
|
|
17585
|
+
};
|
|
17586
|
+
export type GetCampaign200ResponseV2025StatusV2025 = typeof GetCampaign200ResponseV2025StatusV2025[keyof typeof GetCampaign200ResponseV2025StatusV2025];
|
|
17587
|
+
export declare const GetCampaign200ResponseV2025CorrelatedStatusV2025: {
|
|
17588
|
+
readonly Correlated: "CORRELATED";
|
|
17589
|
+
readonly Uncorrelated: "UNCORRELATED";
|
|
17590
|
+
};
|
|
17591
|
+
export type GetCampaign200ResponseV2025CorrelatedStatusV2025 = typeof GetCampaign200ResponseV2025CorrelatedStatusV2025[keyof typeof GetCampaign200ResponseV2025CorrelatedStatusV2025];
|
|
17592
|
+
export declare const GetCampaign200ResponseV2025MandatoryCommentRequirementV2025: {
|
|
17593
|
+
readonly AllDecisions: "ALL_DECISIONS";
|
|
17594
|
+
readonly RevokeOnlyDecisions: "REVOKE_ONLY_DECISIONS";
|
|
17595
|
+
readonly NoDecisions: "NO_DECISIONS";
|
|
17596
|
+
};
|
|
17597
|
+
export type GetCampaign200ResponseV2025MandatoryCommentRequirementV2025 = typeof GetCampaign200ResponseV2025MandatoryCommentRequirementV2025[keyof typeof GetCampaign200ResponseV2025MandatoryCommentRequirementV2025];
|
|
17232
17598
|
/**
|
|
17233
17599
|
* @type GetDiscoveredApplications200ResponseInnerV2025
|
|
17234
17600
|
* @export
|
|
@@ -17790,6 +18156,43 @@ export type IdentityAccessV2025 = {
|
|
|
17790
18156
|
} & AccessProfileEntitlementV2025 | {
|
|
17791
18157
|
type: 'ROLE';
|
|
17792
18158
|
} & AccessProfileRoleV2025;
|
|
18159
|
+
/**
|
|
18160
|
+
*
|
|
18161
|
+
* @export
|
|
18162
|
+
* @interface IdentityAccountSelectionsV2025
|
|
18163
|
+
*/
|
|
18164
|
+
export interface IdentityAccountSelectionsV2025 {
|
|
18165
|
+
/**
|
|
18166
|
+
* Available account selections for the identity, per requested item
|
|
18167
|
+
* @type {Array<RequestedItemAccountSelectionsV2025>}
|
|
18168
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18169
|
+
*/
|
|
18170
|
+
'requestedItems'?: Array<RequestedItemAccountSelectionsV2025>;
|
|
18171
|
+
/**
|
|
18172
|
+
* A boolean indicating whether any account selections will be required for the user to raise an access request
|
|
18173
|
+
* @type {boolean}
|
|
18174
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18175
|
+
*/
|
|
18176
|
+
'accountsSelectionRequired'?: boolean;
|
|
18177
|
+
/**
|
|
18178
|
+
*
|
|
18179
|
+
* @type {DtoTypeV2025}
|
|
18180
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18181
|
+
*/
|
|
18182
|
+
'type'?: DtoTypeV2025;
|
|
18183
|
+
/**
|
|
18184
|
+
* The identity id for the user
|
|
18185
|
+
* @type {string}
|
|
18186
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18187
|
+
*/
|
|
18188
|
+
'id'?: string;
|
|
18189
|
+
/**
|
|
18190
|
+
* The name of the identity
|
|
18191
|
+
* @type {string}
|
|
18192
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18193
|
+
*/
|
|
18194
|
+
'name'?: string;
|
|
18195
|
+
}
|
|
17793
18196
|
/**
|
|
17794
18197
|
*
|
|
17795
18198
|
* @export
|
|
@@ -19073,6 +19476,165 @@ export interface IdentityEntitiesV2025 {
|
|
|
19073
19476
|
*/
|
|
19074
19477
|
'identityEntity'?: IdentityEntitiesIdentityEntityV2025;
|
|
19075
19478
|
}
|
|
19479
|
+
/**
|
|
19480
|
+
*
|
|
19481
|
+
* @export
|
|
19482
|
+
* @interface IdentityEntitlementDetailsAccountTargetV2025
|
|
19483
|
+
*/
|
|
19484
|
+
export interface IdentityEntitlementDetailsAccountTargetV2025 {
|
|
19485
|
+
/**
|
|
19486
|
+
* The id of account
|
|
19487
|
+
* @type {string}
|
|
19488
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19489
|
+
*/
|
|
19490
|
+
'accountId'?: string;
|
|
19491
|
+
/**
|
|
19492
|
+
* The name of account
|
|
19493
|
+
* @type {string}
|
|
19494
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19495
|
+
*/
|
|
19496
|
+
'accountName'?: string;
|
|
19497
|
+
/**
|
|
19498
|
+
* The UUID representation of the account if available
|
|
19499
|
+
* @type {string}
|
|
19500
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19501
|
+
*/
|
|
19502
|
+
'accountUUID'?: string | null;
|
|
19503
|
+
/**
|
|
19504
|
+
* The id of Source
|
|
19505
|
+
* @type {string}
|
|
19506
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19507
|
+
*/
|
|
19508
|
+
'sourceId'?: string;
|
|
19509
|
+
/**
|
|
19510
|
+
* The name of Source
|
|
19511
|
+
* @type {string}
|
|
19512
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19513
|
+
*/
|
|
19514
|
+
'sourceName'?: string;
|
|
19515
|
+
/**
|
|
19516
|
+
* The removal date scheduled for the entitlement on the Identity
|
|
19517
|
+
* @type {string}
|
|
19518
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19519
|
+
*/
|
|
19520
|
+
'removeDate'?: string | null;
|
|
19521
|
+
/**
|
|
19522
|
+
* The assignmentId of the entitlement on the Identity
|
|
19523
|
+
* @type {string}
|
|
19524
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19525
|
+
*/
|
|
19526
|
+
'assignmentId'?: string | null;
|
|
19527
|
+
/**
|
|
19528
|
+
* If the entitlement can be revoked
|
|
19529
|
+
* @type {boolean}
|
|
19530
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19531
|
+
*/
|
|
19532
|
+
'revocable'?: boolean;
|
|
19533
|
+
}
|
|
19534
|
+
/**
|
|
19535
|
+
*
|
|
19536
|
+
* @export
|
|
19537
|
+
* @interface IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19538
|
+
*/
|
|
19539
|
+
export interface IdentityEntitlementDetailsEntitlementDtoV2025 {
|
|
19540
|
+
/**
|
|
19541
|
+
* The entitlement id
|
|
19542
|
+
* @type {string}
|
|
19543
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19544
|
+
*/
|
|
19545
|
+
'id'?: string;
|
|
19546
|
+
/**
|
|
19547
|
+
* The entitlement name
|
|
19548
|
+
* @type {string}
|
|
19549
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19550
|
+
*/
|
|
19551
|
+
'name'?: string;
|
|
19552
|
+
/**
|
|
19553
|
+
* Time when the entitlement was last modified
|
|
19554
|
+
* @type {string}
|
|
19555
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19556
|
+
*/
|
|
19557
|
+
'created'?: string;
|
|
19558
|
+
/**
|
|
19559
|
+
* Time when the entitlement was last modified
|
|
19560
|
+
* @type {string}
|
|
19561
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19562
|
+
*/
|
|
19563
|
+
'modified'?: string;
|
|
19564
|
+
/**
|
|
19565
|
+
* The description of the entitlement
|
|
19566
|
+
* @type {string}
|
|
19567
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19568
|
+
*/
|
|
19569
|
+
'description'?: string | null;
|
|
19570
|
+
/**
|
|
19571
|
+
* The type of the object, will always be \"ENTITLEMENT\"
|
|
19572
|
+
* @type {string}
|
|
19573
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19574
|
+
*/
|
|
19575
|
+
'type'?: string;
|
|
19576
|
+
/**
|
|
19577
|
+
* The source ID
|
|
19578
|
+
* @type {string}
|
|
19579
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19580
|
+
*/
|
|
19581
|
+
'sourceId'?: string;
|
|
19582
|
+
/**
|
|
19583
|
+
* The source name
|
|
19584
|
+
* @type {string}
|
|
19585
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19586
|
+
*/
|
|
19587
|
+
'sourceName'?: string;
|
|
19588
|
+
/**
|
|
19589
|
+
*
|
|
19590
|
+
* @type {OwnerDtoV2025}
|
|
19591
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19592
|
+
*/
|
|
19593
|
+
'owner'?: OwnerDtoV2025;
|
|
19594
|
+
/**
|
|
19595
|
+
* The value of the entitlement
|
|
19596
|
+
* @type {string}
|
|
19597
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19598
|
+
*/
|
|
19599
|
+
'value'?: string;
|
|
19600
|
+
/**
|
|
19601
|
+
* a list of properties informing the viewer about the entitlement
|
|
19602
|
+
* @type {Array<string>}
|
|
19603
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19604
|
+
*/
|
|
19605
|
+
'flags'?: Array<string>;
|
|
19606
|
+
}
|
|
19607
|
+
/**
|
|
19608
|
+
*
|
|
19609
|
+
* @export
|
|
19610
|
+
* @interface IdentityEntitlementDetailsV2025
|
|
19611
|
+
*/
|
|
19612
|
+
export interface IdentityEntitlementDetailsV2025 {
|
|
19613
|
+
/**
|
|
19614
|
+
* Id of Identity
|
|
19615
|
+
* @type {string}
|
|
19616
|
+
* @memberof IdentityEntitlementDetailsV2025
|
|
19617
|
+
*/
|
|
19618
|
+
'identityId'?: string;
|
|
19619
|
+
/**
|
|
19620
|
+
*
|
|
19621
|
+
* @type {IdentityEntitlementDetailsEntitlementDtoV2025}
|
|
19622
|
+
* @memberof IdentityEntitlementDetailsV2025
|
|
19623
|
+
*/
|
|
19624
|
+
'entitlement'?: IdentityEntitlementDetailsEntitlementDtoV2025;
|
|
19625
|
+
/**
|
|
19626
|
+
* Id of Source
|
|
19627
|
+
* @type {string}
|
|
19628
|
+
* @memberof IdentityEntitlementDetailsV2025
|
|
19629
|
+
*/
|
|
19630
|
+
'sourceId'?: string;
|
|
19631
|
+
/**
|
|
19632
|
+
* A list of account targets on the identity provisioned with the requested entitlement.
|
|
19633
|
+
* @type {Array<IdentityEntitlementDetailsAccountTargetV2025>}
|
|
19634
|
+
* @memberof IdentityEntitlementDetailsV2025
|
|
19635
|
+
*/
|
|
19636
|
+
'accountTargets'?: Array<IdentityEntitlementDetailsAccountTargetV2025>;
|
|
19637
|
+
}
|
|
19076
19638
|
/**
|
|
19077
19639
|
*
|
|
19078
19640
|
* @export
|
|
@@ -19916,6 +20478,102 @@ export interface IdentityWithNewAccessV2025 {
|
|
|
19916
20478
|
*/
|
|
19917
20479
|
'accessRefs': Array<IdentityWithNewAccessAccessRefsInnerV2025>;
|
|
19918
20480
|
}
|
|
20481
|
+
/**
|
|
20482
|
+
*
|
|
20483
|
+
* @export
|
|
20484
|
+
* @interface IdpDetailsV2025
|
|
20485
|
+
*/
|
|
20486
|
+
export interface IdpDetailsV2025 {
|
|
20487
|
+
/**
|
|
20488
|
+
* Federation protocol role
|
|
20489
|
+
* @type {string}
|
|
20490
|
+
* @memberof IdpDetailsV2025
|
|
20491
|
+
*/
|
|
20492
|
+
'role'?: IdpDetailsV2025RoleV2025;
|
|
20493
|
+
/**
|
|
20494
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
20495
|
+
* @type {string}
|
|
20496
|
+
* @memberof IdpDetailsV2025
|
|
20497
|
+
*/
|
|
20498
|
+
'entityId'?: string;
|
|
20499
|
+
/**
|
|
20500
|
+
* Defines the binding used for the SAML flow. Used with IDP configurations.
|
|
20501
|
+
* @type {string}
|
|
20502
|
+
* @memberof IdpDetailsV2025
|
|
20503
|
+
*/
|
|
20504
|
+
'binding'?: string;
|
|
20505
|
+
/**
|
|
20506
|
+
* Specifies the SAML authentication method to use. Used with IDP configurations.
|
|
20507
|
+
* @type {string}
|
|
20508
|
+
* @memberof IdpDetailsV2025
|
|
20509
|
+
*/
|
|
20510
|
+
'authnContext'?: string;
|
|
20511
|
+
/**
|
|
20512
|
+
* The IDP logout URL. Used with IDP configurations.
|
|
20513
|
+
* @type {string}
|
|
20514
|
+
* @memberof IdpDetailsV2025
|
|
20515
|
+
*/
|
|
20516
|
+
'logoutUrl'?: string;
|
|
20517
|
+
/**
|
|
20518
|
+
* Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
|
|
20519
|
+
* @type {boolean}
|
|
20520
|
+
* @memberof IdpDetailsV2025
|
|
20521
|
+
*/
|
|
20522
|
+
'includeAuthnContext'?: boolean;
|
|
20523
|
+
/**
|
|
20524
|
+
* The name id format to use. Used with IDP configurations.
|
|
20525
|
+
* @type {string}
|
|
20526
|
+
* @memberof IdpDetailsV2025
|
|
20527
|
+
*/
|
|
20528
|
+
'nameId'?: string;
|
|
20529
|
+
/**
|
|
20530
|
+
*
|
|
20531
|
+
* @type {JITConfigurationV2025}
|
|
20532
|
+
* @memberof IdpDetailsV2025
|
|
20533
|
+
*/
|
|
20534
|
+
'jitConfiguration'?: JITConfigurationV2025;
|
|
20535
|
+
/**
|
|
20536
|
+
* The Base64-encoded certificate used by the IDP. Used with IDP configurations.
|
|
20537
|
+
* @type {string}
|
|
20538
|
+
* @memberof IdpDetailsV2025
|
|
20539
|
+
*/
|
|
20540
|
+
'cert'?: string;
|
|
20541
|
+
/**
|
|
20542
|
+
* The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
|
|
20543
|
+
* @type {string}
|
|
20544
|
+
* @memberof IdpDetailsV2025
|
|
20545
|
+
*/
|
|
20546
|
+
'loginUrlPost'?: string;
|
|
20547
|
+
/**
|
|
20548
|
+
* The IDP Redirect URL. Used with IDP configurations.
|
|
20549
|
+
* @type {string}
|
|
20550
|
+
* @memberof IdpDetailsV2025
|
|
20551
|
+
*/
|
|
20552
|
+
'loginUrlRedirect'?: string;
|
|
20553
|
+
/**
|
|
20554
|
+
* Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
|
|
20555
|
+
* @type {string}
|
|
20556
|
+
* @memberof IdpDetailsV2025
|
|
20557
|
+
*/
|
|
20558
|
+
'mappingAttribute': string;
|
|
20559
|
+
/**
|
|
20560
|
+
* The expiration date extracted from the certificate.
|
|
20561
|
+
* @type {string}
|
|
20562
|
+
* @memberof IdpDetailsV2025
|
|
20563
|
+
*/
|
|
20564
|
+
'certificateExpirationDate'?: string;
|
|
20565
|
+
/**
|
|
20566
|
+
* The name extracted from the certificate.
|
|
20567
|
+
* @type {string}
|
|
20568
|
+
* @memberof IdpDetailsV2025
|
|
20569
|
+
*/
|
|
20570
|
+
'certificateName'?: string;
|
|
20571
|
+
}
|
|
20572
|
+
export declare const IdpDetailsV2025RoleV2025: {
|
|
20573
|
+
readonly SamlIdp: "SAML_IDP";
|
|
20574
|
+
readonly SamlSp: "SAML_SP";
|
|
20575
|
+
};
|
|
20576
|
+
export type IdpDetailsV2025RoleV2025 = typeof IdpDetailsV2025RoleV2025[keyof typeof IdpDetailsV2025RoleV2025];
|
|
19919
20577
|
/**
|
|
19920
20578
|
*
|
|
19921
20579
|
* @export
|
|
@@ -20349,6 +21007,33 @@ export interface InvocationV2025 {
|
|
|
20349
21007
|
*/
|
|
20350
21008
|
'contentJson'?: object;
|
|
20351
21009
|
}
|
|
21010
|
+
/**
|
|
21011
|
+
*
|
|
21012
|
+
* @export
|
|
21013
|
+
* @interface JITConfigurationV2025
|
|
21014
|
+
*/
|
|
21015
|
+
export interface JITConfigurationV2025 {
|
|
21016
|
+
/**
|
|
21017
|
+
* The indicator for just-in-time provisioning enabled
|
|
21018
|
+
* @type {boolean}
|
|
21019
|
+
* @memberof JITConfigurationV2025
|
|
21020
|
+
*/
|
|
21021
|
+
'enabled'?: boolean;
|
|
21022
|
+
/**
|
|
21023
|
+
* the sourceId that mapped to just-in-time provisioning configuration
|
|
21024
|
+
* @type {string}
|
|
21025
|
+
* @memberof JITConfigurationV2025
|
|
21026
|
+
*/
|
|
21027
|
+
'sourceId'?: string;
|
|
21028
|
+
/**
|
|
21029
|
+
* A mapping of identity profile attribute names to SAML assertion attribute names
|
|
21030
|
+
* @type {{ [key: string]: string; }}
|
|
21031
|
+
* @memberof JITConfigurationV2025
|
|
21032
|
+
*/
|
|
21033
|
+
'sourceAttributeMappings'?: {
|
|
21034
|
+
[key: string]: string;
|
|
21035
|
+
};
|
|
21036
|
+
}
|
|
20352
21037
|
/**
|
|
20353
21038
|
* A JSONPatch Operation as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902)
|
|
20354
21039
|
* @export
|
|
@@ -20690,6 +21375,7 @@ export interface LifecyclestateDeletedV2025 {
|
|
|
20690
21375
|
}
|
|
20691
21376
|
export declare const LifecyclestateDeletedV2025TypeV2025: {
|
|
20692
21377
|
readonly LifecycleState: "LIFECYCLE_STATE";
|
|
21378
|
+
readonly TaskResult: "TASK_RESULT";
|
|
20693
21379
|
};
|
|
20694
21380
|
export type LifecyclestateDeletedV2025TypeV2025 = typeof LifecyclestateDeletedV2025TypeV2025[keyof typeof LifecyclestateDeletedV2025TypeV2025];
|
|
20695
21381
|
/**
|
|
@@ -21416,6 +22102,31 @@ export interface LocalizedMessageV2025 {
|
|
|
21416
22102
|
*/
|
|
21417
22103
|
'message': string;
|
|
21418
22104
|
}
|
|
22105
|
+
/**
|
|
22106
|
+
*
|
|
22107
|
+
* @export
|
|
22108
|
+
* @interface LockoutConfigurationV2025
|
|
22109
|
+
*/
|
|
22110
|
+
export interface LockoutConfigurationV2025 {
|
|
22111
|
+
/**
|
|
22112
|
+
* The maximum attempts allowed before lockout occurs.
|
|
22113
|
+
* @type {number}
|
|
22114
|
+
* @memberof LockoutConfigurationV2025
|
|
22115
|
+
*/
|
|
22116
|
+
'maximumAttempts'?: number;
|
|
22117
|
+
/**
|
|
22118
|
+
* The total time in minutes a user will be locked out.
|
|
22119
|
+
* @type {number}
|
|
22120
|
+
* @memberof LockoutConfigurationV2025
|
|
22121
|
+
*/
|
|
22122
|
+
'lockoutDuration'?: number;
|
|
22123
|
+
/**
|
|
22124
|
+
* A rolling window where authentication attempts in a series count towards the maximum before lockout occurs.
|
|
22125
|
+
* @type {number}
|
|
22126
|
+
* @memberof LockoutConfigurationV2025
|
|
22127
|
+
*/
|
|
22128
|
+
'lockoutWindow'?: number;
|
|
22129
|
+
}
|
|
21419
22130
|
/**
|
|
21420
22131
|
* The definition of an Identity according to the Reassignment Configuration service
|
|
21421
22132
|
* @export
|
|
@@ -27343,7 +28054,7 @@ export interface ProvisioningPolicyDtoV2025 {
|
|
|
27343
28054
|
* @type {string}
|
|
27344
28055
|
* @memberof ProvisioningPolicyDtoV2025
|
|
27345
28056
|
*/
|
|
27346
|
-
'name': string;
|
|
28057
|
+
'name': string | null;
|
|
27347
28058
|
/**
|
|
27348
28059
|
* the description of the provisioning policy
|
|
27349
28060
|
* @type {string}
|
|
@@ -27374,7 +28085,7 @@ export interface ProvisioningPolicyV2025 {
|
|
|
27374
28085
|
* @type {string}
|
|
27375
28086
|
* @memberof ProvisioningPolicyV2025
|
|
27376
28087
|
*/
|
|
27377
|
-
'name': string;
|
|
28088
|
+
'name': string | null;
|
|
27378
28089
|
/**
|
|
27379
28090
|
* the description of the provisioning policy
|
|
27380
28091
|
* @type {string}
|
|
@@ -28865,6 +29576,80 @@ export interface RequestedAccountRefV2025 {
|
|
|
28865
29576
|
*/
|
|
28866
29577
|
'sourceName'?: string;
|
|
28867
29578
|
}
|
|
29579
|
+
/**
|
|
29580
|
+
*
|
|
29581
|
+
* @export
|
|
29582
|
+
* @interface RequestedForDtoRefV2025
|
|
29583
|
+
*/
|
|
29584
|
+
export interface RequestedForDtoRefV2025 {
|
|
29585
|
+
/**
|
|
29586
|
+
* The identity id for which the access is requested
|
|
29587
|
+
* @type {string}
|
|
29588
|
+
* @memberof RequestedForDtoRefV2025
|
|
29589
|
+
*/
|
|
29590
|
+
'identityId': string;
|
|
29591
|
+
/**
|
|
29592
|
+
* the details for the access items that are requested for the identity
|
|
29593
|
+
* @type {Array<RequestedItemDtoRefV2025>}
|
|
29594
|
+
* @memberof RequestedForDtoRefV2025
|
|
29595
|
+
*/
|
|
29596
|
+
'requestedItems': Array<RequestedItemDtoRefV2025>;
|
|
29597
|
+
}
|
|
29598
|
+
/**
|
|
29599
|
+
*
|
|
29600
|
+
* @export
|
|
29601
|
+
* @interface RequestedItemAccountSelectionsV2025
|
|
29602
|
+
*/
|
|
29603
|
+
export interface RequestedItemAccountSelectionsV2025 {
|
|
29604
|
+
/**
|
|
29605
|
+
* The description for this requested item
|
|
29606
|
+
* @type {string}
|
|
29607
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29608
|
+
*/
|
|
29609
|
+
'description'?: string;
|
|
29610
|
+
/**
|
|
29611
|
+
* This field indicates if account selections are not allowed for this requested item. * If true, this field indicates that account selections will not be available for this item and user combination. In this case, no account selections should be provided in the access request for this item and user combination, irrespective of whether the user has single or multiple accounts on a source. * An example is where a user is requesting an access profile that is already assigned to one of their accounts.
|
|
29612
|
+
* @type {boolean}
|
|
29613
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29614
|
+
*/
|
|
29615
|
+
'accountsSelectionBlocked'?: boolean;
|
|
29616
|
+
/**
|
|
29617
|
+
* If account selections are not allowed for an item, this field will denote the reason.
|
|
29618
|
+
* @type {string}
|
|
29619
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29620
|
+
*/
|
|
29621
|
+
'accountsSelectionBlockedReason'?: string | null;
|
|
29622
|
+
/**
|
|
29623
|
+
* The type of the item being requested.
|
|
29624
|
+
* @type {string}
|
|
29625
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29626
|
+
*/
|
|
29627
|
+
'type'?: RequestedItemAccountSelectionsV2025TypeV2025;
|
|
29628
|
+
/**
|
|
29629
|
+
* The id of the requested item
|
|
29630
|
+
* @type {string}
|
|
29631
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29632
|
+
*/
|
|
29633
|
+
'id'?: string;
|
|
29634
|
+
/**
|
|
29635
|
+
* The name of the requested item
|
|
29636
|
+
* @type {string}
|
|
29637
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29638
|
+
*/
|
|
29639
|
+
'name'?: string;
|
|
29640
|
+
/**
|
|
29641
|
+
* The details for the sources and accounts for the requested item and identity combination
|
|
29642
|
+
* @type {Array<SourceAccountSelectionsV2025>}
|
|
29643
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29644
|
+
*/
|
|
29645
|
+
'sources'?: Array<SourceAccountSelectionsV2025>;
|
|
29646
|
+
}
|
|
29647
|
+
export declare const RequestedItemAccountSelectionsV2025TypeV2025: {
|
|
29648
|
+
readonly AccessProfile: "ACCESS_PROFILE";
|
|
29649
|
+
readonly Role: "ROLE";
|
|
29650
|
+
readonly Entitlement: "ENTITLEMENT";
|
|
29651
|
+
};
|
|
29652
|
+
export type RequestedItemAccountSelectionsV2025TypeV2025 = typeof RequestedItemAccountSelectionsV2025TypeV2025[keyof typeof RequestedItemAccountSelectionsV2025TypeV2025];
|
|
28868
29653
|
/**
|
|
28869
29654
|
*
|
|
28870
29655
|
* @export
|
|
@@ -28890,6 +29675,69 @@ export declare const RequestedItemDetailsV2025TypeV2025: {
|
|
|
28890
29675
|
readonly Role: "ROLE";
|
|
28891
29676
|
};
|
|
28892
29677
|
export type RequestedItemDetailsV2025TypeV2025 = typeof RequestedItemDetailsV2025TypeV2025[keyof typeof RequestedItemDetailsV2025TypeV2025];
|
|
29678
|
+
/**
|
|
29679
|
+
*
|
|
29680
|
+
* @export
|
|
29681
|
+
* @interface RequestedItemDtoRefV2025
|
|
29682
|
+
*/
|
|
29683
|
+
export interface RequestedItemDtoRefV2025 {
|
|
29684
|
+
/**
|
|
29685
|
+
* The type of the item being requested.
|
|
29686
|
+
* @type {string}
|
|
29687
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29688
|
+
*/
|
|
29689
|
+
'type': RequestedItemDtoRefV2025TypeV2025;
|
|
29690
|
+
/**
|
|
29691
|
+
* ID of Role, Access Profile or Entitlement being requested.
|
|
29692
|
+
* @type {string}
|
|
29693
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29694
|
+
*/
|
|
29695
|
+
'id': string;
|
|
29696
|
+
/**
|
|
29697
|
+
* Comment provided by requester. * Comment is required when the request is of type Revoke Access.
|
|
29698
|
+
* @type {string}
|
|
29699
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29700
|
+
*/
|
|
29701
|
+
'comment'?: string;
|
|
29702
|
+
/**
|
|
29703
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
|
|
29704
|
+
* @type {{ [key: string]: string; }}
|
|
29705
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29706
|
+
*/
|
|
29707
|
+
'clientMetadata'?: {
|
|
29708
|
+
[key: string]: string;
|
|
29709
|
+
};
|
|
29710
|
+
/**
|
|
29711
|
+
* The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
|
|
29712
|
+
* @type {string}
|
|
29713
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29714
|
+
*/
|
|
29715
|
+
'removeDate'?: string;
|
|
29716
|
+
/**
|
|
29717
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
29718
|
+
* @type {string}
|
|
29719
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29720
|
+
*/
|
|
29721
|
+
'assignmentId'?: string | null;
|
|
29722
|
+
/**
|
|
29723
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
29724
|
+
* @type {string}
|
|
29725
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29726
|
+
*/
|
|
29727
|
+
'nativeIdentity'?: string | null;
|
|
29728
|
+
/**
|
|
29729
|
+
* The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
|
|
29730
|
+
* @type {Array<SourceItemRefV2025>}
|
|
29731
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29732
|
+
*/
|
|
29733
|
+
'accountSelection'?: Array<SourceItemRefV2025> | null;
|
|
29734
|
+
}
|
|
29735
|
+
export declare const RequestedItemDtoRefV2025TypeV2025: {
|
|
29736
|
+
readonly AccessProfile: "ACCESS_PROFILE";
|
|
29737
|
+
readonly Role: "ROLE";
|
|
29738
|
+
readonly Entitlement: "ENTITLEMENT";
|
|
29739
|
+
};
|
|
29740
|
+
export type RequestedItemDtoRefV2025TypeV2025 = typeof RequestedItemDtoRefV2025TypeV2025[keyof typeof RequestedItemDtoRefV2025TypeV2025];
|
|
28893
29741
|
/**
|
|
28894
29742
|
*
|
|
28895
29743
|
* @export
|
|
@@ -34986,6 +35834,176 @@ export declare const ServiceDeskSourceV2025TypeV2025: {
|
|
|
34986
35834
|
readonly Source: "SOURCE";
|
|
34987
35835
|
};
|
|
34988
35836
|
export type ServiceDeskSourceV2025TypeV2025 = typeof ServiceDeskSourceV2025TypeV2025[keyof typeof ServiceDeskSourceV2025TypeV2025];
|
|
35837
|
+
/**
|
|
35838
|
+
*
|
|
35839
|
+
* @export
|
|
35840
|
+
* @interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35841
|
+
*/
|
|
35842
|
+
export interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2025 {
|
|
35843
|
+
/**
|
|
35844
|
+
* Federation protocol role
|
|
35845
|
+
* @type {string}
|
|
35846
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35847
|
+
*/
|
|
35848
|
+
'role'?: ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025;
|
|
35849
|
+
/**
|
|
35850
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
35851
|
+
* @type {string}
|
|
35852
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35853
|
+
*/
|
|
35854
|
+
'entityId'?: string;
|
|
35855
|
+
/**
|
|
35856
|
+
* Defines the binding used for the SAML flow. Used with IDP configurations.
|
|
35857
|
+
* @type {string}
|
|
35858
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35859
|
+
*/
|
|
35860
|
+
'binding'?: string;
|
|
35861
|
+
/**
|
|
35862
|
+
* Specifies the SAML authentication method to use. Used with IDP configurations.
|
|
35863
|
+
* @type {string}
|
|
35864
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35865
|
+
*/
|
|
35866
|
+
'authnContext'?: string;
|
|
35867
|
+
/**
|
|
35868
|
+
* The IDP logout URL. Used with IDP configurations.
|
|
35869
|
+
* @type {string}
|
|
35870
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35871
|
+
*/
|
|
35872
|
+
'logoutUrl'?: string;
|
|
35873
|
+
/**
|
|
35874
|
+
* Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
|
|
35875
|
+
* @type {boolean}
|
|
35876
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35877
|
+
*/
|
|
35878
|
+
'includeAuthnContext'?: boolean;
|
|
35879
|
+
/**
|
|
35880
|
+
* The name id format to use. Used with IDP configurations.
|
|
35881
|
+
* @type {string}
|
|
35882
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35883
|
+
*/
|
|
35884
|
+
'nameId'?: string;
|
|
35885
|
+
/**
|
|
35886
|
+
*
|
|
35887
|
+
* @type {JITConfigurationV2025}
|
|
35888
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35889
|
+
*/
|
|
35890
|
+
'jitConfiguration'?: JITConfigurationV2025;
|
|
35891
|
+
/**
|
|
35892
|
+
* The Base64-encoded certificate used by the IDP. Used with IDP configurations.
|
|
35893
|
+
* @type {string}
|
|
35894
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35895
|
+
*/
|
|
35896
|
+
'cert'?: string;
|
|
35897
|
+
/**
|
|
35898
|
+
* The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
|
|
35899
|
+
* @type {string}
|
|
35900
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35901
|
+
*/
|
|
35902
|
+
'loginUrlPost'?: string;
|
|
35903
|
+
/**
|
|
35904
|
+
* The IDP Redirect URL. Used with IDP configurations.
|
|
35905
|
+
* @type {string}
|
|
35906
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35907
|
+
*/
|
|
35908
|
+
'loginUrlRedirect'?: string;
|
|
35909
|
+
/**
|
|
35910
|
+
* Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
|
|
35911
|
+
* @type {string}
|
|
35912
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35913
|
+
*/
|
|
35914
|
+
'mappingAttribute': string;
|
|
35915
|
+
/**
|
|
35916
|
+
* The expiration date extracted from the certificate.
|
|
35917
|
+
* @type {string}
|
|
35918
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35919
|
+
*/
|
|
35920
|
+
'certificateExpirationDate'?: string;
|
|
35921
|
+
/**
|
|
35922
|
+
* The name extracted from the certificate.
|
|
35923
|
+
* @type {string}
|
|
35924
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35925
|
+
*/
|
|
35926
|
+
'certificateName'?: string;
|
|
35927
|
+
/**
|
|
35928
|
+
* Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
|
|
35929
|
+
* @type {string}
|
|
35930
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35931
|
+
*/
|
|
35932
|
+
'alias'?: string;
|
|
35933
|
+
/**
|
|
35934
|
+
* The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
|
|
35935
|
+
* @type {string}
|
|
35936
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35937
|
+
*/
|
|
35938
|
+
'callbackUrl': string;
|
|
35939
|
+
/**
|
|
35940
|
+
* The legacy ACS URL used for SAML authentication. Used with SP configurations.
|
|
35941
|
+
* @type {string}
|
|
35942
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35943
|
+
*/
|
|
35944
|
+
'legacyAcsUrl'?: string;
|
|
35945
|
+
}
|
|
35946
|
+
export declare const ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025: {
|
|
35947
|
+
readonly SamlIdp: "SAML_IDP";
|
|
35948
|
+
readonly SamlSp: "SAML_SP";
|
|
35949
|
+
};
|
|
35950
|
+
export type ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025 = typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025[keyof typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025];
|
|
35951
|
+
/**
|
|
35952
|
+
* Represents the IdentityNow as Service Provider Configuration allowing customers to log into IDN via an Identity Provider
|
|
35953
|
+
* @export
|
|
35954
|
+
* @interface ServiceProviderConfigurationV2025
|
|
35955
|
+
*/
|
|
35956
|
+
export interface ServiceProviderConfigurationV2025 {
|
|
35957
|
+
/**
|
|
35958
|
+
* This determines whether or not the SAML authentication flow is enabled for an org
|
|
35959
|
+
* @type {boolean}
|
|
35960
|
+
* @memberof ServiceProviderConfigurationV2025
|
|
35961
|
+
*/
|
|
35962
|
+
'enabled'?: boolean;
|
|
35963
|
+
/**
|
|
35964
|
+
* This allows basic login with the parameter prompt=true. This is often toggled on when debugging SAML authentication setup. When false, only org admins with MFA-enabled can bypass the IDP.
|
|
35965
|
+
* @type {boolean}
|
|
35966
|
+
* @memberof ServiceProviderConfigurationV2025
|
|
35967
|
+
*/
|
|
35968
|
+
'bypassIdp'?: boolean;
|
|
35969
|
+
/**
|
|
35970
|
+
* This indicates whether or not the SAML configuration is valid.
|
|
35971
|
+
* @type {boolean}
|
|
35972
|
+
* @memberof ServiceProviderConfigurationV2025
|
|
35973
|
+
*/
|
|
35974
|
+
'samlConfigurationValid'?: boolean;
|
|
35975
|
+
/**
|
|
35976
|
+
* A list of the abstract implementations of the Federation Protocol details. Typically, this will include on SpDetails object and one IdpDetails object used in tandem to define a SAML integration between a customer\'s identity provider and a customer\'s SailPoint instance (i.e., the service provider).
|
|
35977
|
+
* @type {Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2025>}
|
|
35978
|
+
* @memberof ServiceProviderConfigurationV2025
|
|
35979
|
+
*/
|
|
35980
|
+
'federationProtocolDetails'?: Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2025>;
|
|
35981
|
+
}
|
|
35982
|
+
/**
|
|
35983
|
+
*
|
|
35984
|
+
* @export
|
|
35985
|
+
* @interface SessionConfigurationV2025
|
|
35986
|
+
*/
|
|
35987
|
+
export interface SessionConfigurationV2025 {
|
|
35988
|
+
/**
|
|
35989
|
+
* The maximum time in minutes a session can be idle.
|
|
35990
|
+
* @type {number}
|
|
35991
|
+
* @memberof SessionConfigurationV2025
|
|
35992
|
+
*/
|
|
35993
|
+
'maxIdleTime'?: number;
|
|
35994
|
+
/**
|
|
35995
|
+
* Denotes if \'remember me\' is enabled.
|
|
35996
|
+
* @type {boolean}
|
|
35997
|
+
* @memberof SessionConfigurationV2025
|
|
35998
|
+
*/
|
|
35999
|
+
'rememberMe'?: boolean;
|
|
36000
|
+
/**
|
|
36001
|
+
* The maximum allowable session time in minutes.
|
|
36002
|
+
* @type {number}
|
|
36003
|
+
* @memberof SessionConfigurationV2025
|
|
36004
|
+
*/
|
|
36005
|
+
'maxSessionTime'?: number;
|
|
36006
|
+
}
|
|
34989
36007
|
/**
|
|
34990
36008
|
*
|
|
34991
36009
|
* @export
|
|
@@ -35996,6 +37014,37 @@ export interface SourceAccountDeletedV2025 {
|
|
|
35996
37014
|
[key: string]: any;
|
|
35997
37015
|
};
|
|
35998
37016
|
}
|
|
37017
|
+
/**
|
|
37018
|
+
*
|
|
37019
|
+
* @export
|
|
37020
|
+
* @interface SourceAccountSelectionsV2025
|
|
37021
|
+
*/
|
|
37022
|
+
export interface SourceAccountSelectionsV2025 {
|
|
37023
|
+
/**
|
|
37024
|
+
*
|
|
37025
|
+
* @type {DtoTypeV2025}
|
|
37026
|
+
* @memberof SourceAccountSelectionsV2025
|
|
37027
|
+
*/
|
|
37028
|
+
'type'?: DtoTypeV2025;
|
|
37029
|
+
/**
|
|
37030
|
+
* The source id
|
|
37031
|
+
* @type {string}
|
|
37032
|
+
* @memberof SourceAccountSelectionsV2025
|
|
37033
|
+
*/
|
|
37034
|
+
'id'?: string;
|
|
37035
|
+
/**
|
|
37036
|
+
* The source name
|
|
37037
|
+
* @type {string}
|
|
37038
|
+
* @memberof SourceAccountSelectionsV2025
|
|
37039
|
+
*/
|
|
37040
|
+
'name'?: string;
|
|
37041
|
+
/**
|
|
37042
|
+
* The accounts information for a particular source in the requested item
|
|
37043
|
+
* @type {Array<AccountInfoRefV2025>}
|
|
37044
|
+
* @memberof SourceAccountSelectionsV2025
|
|
37045
|
+
*/
|
|
37046
|
+
'accounts'?: Array<AccountInfoRefV2025>;
|
|
37047
|
+
}
|
|
35999
37048
|
/**
|
|
36000
37049
|
*
|
|
36001
37050
|
* @export
|
|
@@ -36765,6 +37814,25 @@ export declare const SourceHealthDtoV2025StatusV2025: {
|
|
|
36765
37814
|
readonly SourceStateErrorAccountFileImport: "SOURCE_STATE_ERROR_ACCOUNT_FILE_IMPORT";
|
|
36766
37815
|
};
|
|
36767
37816
|
export type SourceHealthDtoV2025StatusV2025 = typeof SourceHealthDtoV2025StatusV2025[keyof typeof SourceHealthDtoV2025StatusV2025];
|
|
37817
|
+
/**
|
|
37818
|
+
*
|
|
37819
|
+
* @export
|
|
37820
|
+
* @interface SourceItemRefV2025
|
|
37821
|
+
*/
|
|
37822
|
+
export interface SourceItemRefV2025 {
|
|
37823
|
+
/**
|
|
37824
|
+
* The id for the source on which account selections are made
|
|
37825
|
+
* @type {string}
|
|
37826
|
+
* @memberof SourceItemRefV2025
|
|
37827
|
+
*/
|
|
37828
|
+
'sourceId'?: string | null;
|
|
37829
|
+
/**
|
|
37830
|
+
* A list of account selections on the source. Currently, only one selection per source is supported.
|
|
37831
|
+
* @type {Array<AccountItemRefV2025>}
|
|
37832
|
+
* @memberof SourceItemRefV2025
|
|
37833
|
+
*/
|
|
37834
|
+
'accounts'?: Array<AccountItemRefV2025> | null;
|
|
37835
|
+
}
|
|
36768
37836
|
/**
|
|
36769
37837
|
* Reference to management workgroup for the source.
|
|
36770
37838
|
* @export
|
|
@@ -37845,6 +38913,48 @@ export interface SpConfigRulesV2025 {
|
|
|
37845
38913
|
*/
|
|
37846
38914
|
'editable'?: boolean;
|
|
37847
38915
|
}
|
|
38916
|
+
/**
|
|
38917
|
+
*
|
|
38918
|
+
* @export
|
|
38919
|
+
* @interface SpDetailsV2025
|
|
38920
|
+
*/
|
|
38921
|
+
export interface SpDetailsV2025 {
|
|
38922
|
+
/**
|
|
38923
|
+
* Federation protocol role
|
|
38924
|
+
* @type {string}
|
|
38925
|
+
* @memberof SpDetailsV2025
|
|
38926
|
+
*/
|
|
38927
|
+
'role'?: SpDetailsV2025RoleV2025;
|
|
38928
|
+
/**
|
|
38929
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
38930
|
+
* @type {string}
|
|
38931
|
+
* @memberof SpDetailsV2025
|
|
38932
|
+
*/
|
|
38933
|
+
'entityId'?: string;
|
|
38934
|
+
/**
|
|
38935
|
+
* Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
|
|
38936
|
+
* @type {string}
|
|
38937
|
+
* @memberof SpDetailsV2025
|
|
38938
|
+
*/
|
|
38939
|
+
'alias'?: string;
|
|
38940
|
+
/**
|
|
38941
|
+
* The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
|
|
38942
|
+
* @type {string}
|
|
38943
|
+
* @memberof SpDetailsV2025
|
|
38944
|
+
*/
|
|
38945
|
+
'callbackUrl': string;
|
|
38946
|
+
/**
|
|
38947
|
+
* The legacy ACS URL used for SAML authentication. Used with SP configurations.
|
|
38948
|
+
* @type {string}
|
|
38949
|
+
* @memberof SpDetailsV2025
|
|
38950
|
+
*/
|
|
38951
|
+
'legacyAcsUrl'?: string;
|
|
38952
|
+
}
|
|
38953
|
+
export declare const SpDetailsV2025RoleV2025: {
|
|
38954
|
+
readonly SamlIdp: "SAML_IDP";
|
|
38955
|
+
readonly SamlSp: "SAML_SP";
|
|
38956
|
+
};
|
|
38957
|
+
export type SpDetailsV2025RoleV2025 = typeof SpDetailsV2025RoleV2025[keyof typeof SpDetailsV2025RoleV2025];
|
|
37848
38958
|
/**
|
|
37849
38959
|
*
|
|
37850
38960
|
* @export
|
|
@@ -43629,7 +44739,7 @@ export declare const AccessRequestsV2025ApiAxiosParamCreator: (configuration?: C
|
|
|
43629
44739
|
*/
|
|
43630
44740
|
closeAccessRequest: (closeAccessRequestV2025: CloseAccessRequestV2025, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
43631
44741
|
/**
|
|
43632
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
44742
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
43633
44743
|
* @summary Submit Access Request
|
|
43634
44744
|
* @param {AccessRequestV2025} accessRequestV2025
|
|
43635
44745
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -43643,6 +44753,16 @@ export declare const AccessRequestsV2025ApiAxiosParamCreator: (configuration?: C
|
|
|
43643
44753
|
* @throws {RequiredError}
|
|
43644
44754
|
*/
|
|
43645
44755
|
getAccessRequestConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
44756
|
+
/**
|
|
44757
|
+
* Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
|
|
44758
|
+
* @summary Identity Entitlement Details
|
|
44759
|
+
* @param {string} identityId The identity ID.
|
|
44760
|
+
* @param {string} entitlementId The entitlement ID
|
|
44761
|
+
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
44762
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44763
|
+
* @throws {RequiredError}
|
|
44764
|
+
*/
|
|
44765
|
+
getEntitlementDetailsForIdentity: (identityId: string, entitlementId: string, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
43646
44766
|
/**
|
|
43647
44767
|
* Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
|
|
43648
44768
|
* @summary Access Request Status
|
|
@@ -43677,6 +44797,14 @@ export declare const AccessRequestsV2025ApiAxiosParamCreator: (configuration?: C
|
|
|
43677
44797
|
* @throws {RequiredError}
|
|
43678
44798
|
*/
|
|
43679
44799
|
listAdministratorsAccessRequestStatus: (requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
44800
|
+
/**
|
|
44801
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
44802
|
+
* @summary Get accounts selections for identity
|
|
44803
|
+
* @param {AccountsSelectionRequestV2025} accountsSelectionRequestV2025
|
|
44804
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44805
|
+
* @throws {RequiredError}
|
|
44806
|
+
*/
|
|
44807
|
+
loadAccountSelections: (accountsSelectionRequestV2025: AccountsSelectionRequestV2025, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
43680
44808
|
/**
|
|
43681
44809
|
* This endpoint replaces the current access-request configuration.
|
|
43682
44810
|
* @summary Update Access Request Configuration
|
|
@@ -43725,7 +44853,7 @@ export declare const AccessRequestsV2025ApiFp: (configuration?: Configuration) =
|
|
|
43725
44853
|
*/
|
|
43726
44854
|
closeAccessRequest(closeAccessRequestV2025: CloseAccessRequestV2025, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<object>>;
|
|
43727
44855
|
/**
|
|
43728
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
44856
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
43729
44857
|
* @summary Submit Access Request
|
|
43730
44858
|
* @param {AccessRequestV2025} accessRequestV2025
|
|
43731
44859
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -43739,6 +44867,16 @@ export declare const AccessRequestsV2025ApiFp: (configuration?: Configuration) =
|
|
|
43739
44867
|
* @throws {RequiredError}
|
|
43740
44868
|
*/
|
|
43741
44869
|
getAccessRequestConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AccessRequestConfigV2025>>;
|
|
44870
|
+
/**
|
|
44871
|
+
* Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
|
|
44872
|
+
* @summary Identity Entitlement Details
|
|
44873
|
+
* @param {string} identityId The identity ID.
|
|
44874
|
+
* @param {string} entitlementId The entitlement ID
|
|
44875
|
+
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
44876
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44877
|
+
* @throws {RequiredError}
|
|
44878
|
+
*/
|
|
44879
|
+
getEntitlementDetailsForIdentity(identityId: string, entitlementId: string, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IdentityEntitlementDetailsV2025>>;
|
|
43742
44880
|
/**
|
|
43743
44881
|
* Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
|
|
43744
44882
|
* @summary Access Request Status
|
|
@@ -43773,6 +44911,14 @@ export declare const AccessRequestsV2025ApiFp: (configuration?: Configuration) =
|
|
|
43773
44911
|
* @throws {RequiredError}
|
|
43774
44912
|
*/
|
|
43775
44913
|
listAdministratorsAccessRequestStatus(requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<AccessRequestAdminItemStatusV2025>>>;
|
|
44914
|
+
/**
|
|
44915
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
44916
|
+
* @summary Get accounts selections for identity
|
|
44917
|
+
* @param {AccountsSelectionRequestV2025} accountsSelectionRequestV2025
|
|
44918
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44919
|
+
* @throws {RequiredError}
|
|
44920
|
+
*/
|
|
44921
|
+
loadAccountSelections(accountsSelectionRequestV2025: AccountsSelectionRequestV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AccountsSelectionResponseV2025>>;
|
|
43776
44922
|
/**
|
|
43777
44923
|
* This endpoint replaces the current access-request configuration.
|
|
43778
44924
|
* @summary Update Access Request Configuration
|
|
@@ -43820,7 +44966,7 @@ export declare const AccessRequestsV2025ApiFactory: (configuration?: Configurati
|
|
|
43820
44966
|
*/
|
|
43821
44967
|
closeAccessRequest(requestParameters: AccessRequestsV2025ApiCloseAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<object>;
|
|
43822
44968
|
/**
|
|
43823
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
44969
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
43824
44970
|
* @summary Submit Access Request
|
|
43825
44971
|
* @param {AccessRequestsV2025ApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
43826
44972
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -43834,6 +44980,14 @@ export declare const AccessRequestsV2025ApiFactory: (configuration?: Configurati
|
|
|
43834
44980
|
* @throws {RequiredError}
|
|
43835
44981
|
*/
|
|
43836
44982
|
getAccessRequestConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<AccessRequestConfigV2025>;
|
|
44983
|
+
/**
|
|
44984
|
+
* Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
|
|
44985
|
+
* @summary Identity Entitlement Details
|
|
44986
|
+
* @param {AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest} requestParameters Request parameters.
|
|
44987
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44988
|
+
* @throws {RequiredError}
|
|
44989
|
+
*/
|
|
44990
|
+
getEntitlementDetailsForIdentity(requestParameters: AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<IdentityEntitlementDetailsV2025>;
|
|
43837
44991
|
/**
|
|
43838
44992
|
* Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
|
|
43839
44993
|
* @summary Access Request Status
|
|
@@ -43850,6 +45004,14 @@ export declare const AccessRequestsV2025ApiFactory: (configuration?: Configurati
|
|
|
43850
45004
|
* @throws {RequiredError}
|
|
43851
45005
|
*/
|
|
43852
45006
|
listAdministratorsAccessRequestStatus(requestParameters?: AccessRequestsV2025ApiListAdministratorsAccessRequestStatusRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<AccessRequestAdminItemStatusV2025>>;
|
|
45007
|
+
/**
|
|
45008
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
45009
|
+
* @summary Get accounts selections for identity
|
|
45010
|
+
* @param {AccessRequestsV2025ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
|
|
45011
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
45012
|
+
* @throws {RequiredError}
|
|
45013
|
+
*/
|
|
45014
|
+
loadAccountSelections(requestParameters: AccessRequestsV2025ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<AccountsSelectionResponseV2025>;
|
|
43853
45015
|
/**
|
|
43854
45016
|
* This endpoint replaces the current access-request configuration.
|
|
43855
45017
|
* @summary Update Access Request Configuration
|
|
@@ -43930,6 +45092,31 @@ export interface AccessRequestsV2025ApiCreateAccessRequestRequest {
|
|
|
43930
45092
|
*/
|
|
43931
45093
|
readonly accessRequestV2025: AccessRequestV2025;
|
|
43932
45094
|
}
|
|
45095
|
+
/**
|
|
45096
|
+
* Request parameters for getEntitlementDetailsForIdentity operation in AccessRequestsV2025Api.
|
|
45097
|
+
* @export
|
|
45098
|
+
* @interface AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest
|
|
45099
|
+
*/
|
|
45100
|
+
export interface AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest {
|
|
45101
|
+
/**
|
|
45102
|
+
* The identity ID.
|
|
45103
|
+
* @type {string}
|
|
45104
|
+
* @memberof AccessRequestsV2025ApiGetEntitlementDetailsForIdentity
|
|
45105
|
+
*/
|
|
45106
|
+
readonly identityId: string;
|
|
45107
|
+
/**
|
|
45108
|
+
* The entitlement ID
|
|
45109
|
+
* @type {string}
|
|
45110
|
+
* @memberof AccessRequestsV2025ApiGetEntitlementDetailsForIdentity
|
|
45111
|
+
*/
|
|
45112
|
+
readonly entitlementId: string;
|
|
45113
|
+
/**
|
|
45114
|
+
* Use this header to enable this experimental API.
|
|
45115
|
+
* @type {string}
|
|
45116
|
+
* @memberof AccessRequestsV2025ApiGetEntitlementDetailsForIdentity
|
|
45117
|
+
*/
|
|
45118
|
+
readonly xSailPointExperimental?: string;
|
|
45119
|
+
}
|
|
43933
45120
|
/**
|
|
43934
45121
|
* Request parameters for listAccessRequestStatus operation in AccessRequestsV2025Api.
|
|
43935
45122
|
* @export
|
|
@@ -44064,6 +45251,19 @@ export interface AccessRequestsV2025ApiListAdministratorsAccessRequestStatusRequ
|
|
|
44064
45251
|
*/
|
|
44065
45252
|
readonly requestState?: string;
|
|
44066
45253
|
}
|
|
45254
|
+
/**
|
|
45255
|
+
* Request parameters for loadAccountSelections operation in AccessRequestsV2025Api.
|
|
45256
|
+
* @export
|
|
45257
|
+
* @interface AccessRequestsV2025ApiLoadAccountSelectionsRequest
|
|
45258
|
+
*/
|
|
45259
|
+
export interface AccessRequestsV2025ApiLoadAccountSelectionsRequest {
|
|
45260
|
+
/**
|
|
45261
|
+
*
|
|
45262
|
+
* @type {AccountsSelectionRequestV2025}
|
|
45263
|
+
* @memberof AccessRequestsV2025ApiLoadAccountSelections
|
|
45264
|
+
*/
|
|
45265
|
+
readonly accountsSelectionRequestV2025: AccountsSelectionRequestV2025;
|
|
45266
|
+
}
|
|
44067
45267
|
/**
|
|
44068
45268
|
* Request parameters for setAccessRequestConfig operation in AccessRequestsV2025Api.
|
|
44069
45269
|
* @export
|
|
@@ -44121,7 +45321,7 @@ export declare class AccessRequestsV2025Api extends BaseAPI {
|
|
|
44121
45321
|
*/
|
|
44122
45322
|
closeAccessRequest(requestParameters: AccessRequestsV2025ApiCloseAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<object, any>>;
|
|
44123
45323
|
/**
|
|
44124
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
45324
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
44125
45325
|
* @summary Submit Access Request
|
|
44126
45326
|
* @param {AccessRequestsV2025ApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
44127
45327
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -44137,6 +45337,15 @@ export declare class AccessRequestsV2025Api extends BaseAPI {
|
|
|
44137
45337
|
* @memberof AccessRequestsV2025Api
|
|
44138
45338
|
*/
|
|
44139
45339
|
getAccessRequestConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AccessRequestConfigV2025, any>>;
|
|
45340
|
+
/**
|
|
45341
|
+
* Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
|
|
45342
|
+
* @summary Identity Entitlement Details
|
|
45343
|
+
* @param {AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest} requestParameters Request parameters.
|
|
45344
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
45345
|
+
* @throws {RequiredError}
|
|
45346
|
+
* @memberof AccessRequestsV2025Api
|
|
45347
|
+
*/
|
|
45348
|
+
getEntitlementDetailsForIdentity(requestParameters: AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<IdentityEntitlementDetailsV2025, any>>;
|
|
44140
45349
|
/**
|
|
44141
45350
|
* Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
|
|
44142
45351
|
* @summary Access Request Status
|
|
@@ -44155,6 +45364,15 @@ export declare class AccessRequestsV2025Api extends BaseAPI {
|
|
|
44155
45364
|
* @memberof AccessRequestsV2025Api
|
|
44156
45365
|
*/
|
|
44157
45366
|
listAdministratorsAccessRequestStatus(requestParameters?: AccessRequestsV2025ApiListAdministratorsAccessRequestStatusRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AccessRequestAdminItemStatusV2025[], any>>;
|
|
45367
|
+
/**
|
|
45368
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
45369
|
+
* @summary Get accounts selections for identity
|
|
45370
|
+
* @param {AccessRequestsV2025ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
|
|
45371
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
45372
|
+
* @throws {RequiredError}
|
|
45373
|
+
* @memberof AccessRequestsV2025Api
|
|
45374
|
+
*/
|
|
45375
|
+
loadAccountSelections(requestParameters: AccessRequestsV2025ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AccountsSelectionResponseV2025, any>>;
|
|
44158
45376
|
/**
|
|
44159
45377
|
* This endpoint replaces the current access-request configuration.
|
|
44160
45378
|
* @summary Update Access Request Configuration
|
|
@@ -47998,7 +49216,7 @@ export declare const CertificationCampaignsV2025ApiFp: (configuration?: Configur
|
|
|
47998
49216
|
* @param {*} [axiosOptions] Override http request option.
|
|
47999
49217
|
* @throws {RequiredError}
|
|
48000
49218
|
*/
|
|
48001
|
-
getCampaign(id: string, detail?: GetCampaignDetailV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<
|
|
49219
|
+
getCampaign(id: string, detail?: GetCampaignDetailV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetCampaign200ResponseV2025>>;
|
|
48002
49220
|
/**
|
|
48003
49221
|
* Use this API to fetch all reports for a certification campaign by campaign ID.
|
|
48004
49222
|
* @summary Get Campaign Reports
|
|
@@ -48189,7 +49407,7 @@ export declare const CertificationCampaignsV2025ApiFactory: (configuration?: Con
|
|
|
48189
49407
|
* @param {*} [axiosOptions] Override http request option.
|
|
48190
49408
|
* @throws {RequiredError}
|
|
48191
49409
|
*/
|
|
48192
|
-
getCampaign(requestParameters: CertificationCampaignsV2025ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<
|
|
49410
|
+
getCampaign(requestParameters: CertificationCampaignsV2025ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetCampaign200ResponseV2025>;
|
|
48193
49411
|
/**
|
|
48194
49412
|
* Use this API to fetch all reports for a certification campaign by campaign ID.
|
|
48195
49413
|
* @summary Get Campaign Reports
|
|
@@ -48755,7 +49973,7 @@ export declare class CertificationCampaignsV2025Api extends BaseAPI {
|
|
|
48755
49973
|
* @throws {RequiredError}
|
|
48756
49974
|
* @memberof CertificationCampaignsV2025Api
|
|
48757
49975
|
*/
|
|
48758
|
-
getCampaign(requestParameters: CertificationCampaignsV2025ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<
|
|
49976
|
+
getCampaign(requestParameters: CertificationCampaignsV2025ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<GetCampaign200ResponseV2025, any>>;
|
|
48759
49977
|
/**
|
|
48760
49978
|
* Use this API to fetch all reports for a certification campaign by campaign ID.
|
|
48761
49979
|
* @summary Get Campaign Reports
|
|
@@ -55632,6 +56850,13 @@ export declare const GlobalTenantSecuritySettingsV2025ApiAxiosParamCreator: (con
|
|
|
55632
56850
|
* @throws {RequiredError}
|
|
55633
56851
|
*/
|
|
55634
56852
|
createAuthOrgNetworkConfig: (networkConfigurationV2025: NetworkConfigurationV2025, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56853
|
+
/**
|
|
56854
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
56855
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
56856
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56857
|
+
* @throws {RequiredError}
|
|
56858
|
+
*/
|
|
56859
|
+
getAuthOrgLockoutConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
55635
56860
|
/**
|
|
55636
56861
|
* This API returns the details of an org\'s network auth configuration.
|
|
55637
56862
|
* @summary Get security network configuration.
|
|
@@ -55639,6 +56864,28 @@ export declare const GlobalTenantSecuritySettingsV2025ApiAxiosParamCreator: (con
|
|
|
55639
56864
|
* @throws {RequiredError}
|
|
55640
56865
|
*/
|
|
55641
56866
|
getAuthOrgNetworkConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56867
|
+
/**
|
|
56868
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
56869
|
+
* @summary Get Service Provider Configuration.
|
|
56870
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56871
|
+
* @throws {RequiredError}
|
|
56872
|
+
*/
|
|
56873
|
+
getAuthOrgServiceProviderConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56874
|
+
/**
|
|
56875
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
56876
|
+
* @summary Get Auth Org Session Configuration.
|
|
56877
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56878
|
+
* @throws {RequiredError}
|
|
56879
|
+
*/
|
|
56880
|
+
getAuthOrgSessionConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56881
|
+
/**
|
|
56882
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
56883
|
+
* @summary Update Auth Org Lockout Configuration
|
|
56884
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
56885
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56886
|
+
* @throws {RequiredError}
|
|
56887
|
+
*/
|
|
56888
|
+
patchAuthOrgLockoutConfig: (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
55642
56889
|
/**
|
|
55643
56890
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
55644
56891
|
* @summary Update security network configuration.
|
|
@@ -55647,6 +56894,22 @@ export declare const GlobalTenantSecuritySettingsV2025ApiAxiosParamCreator: (con
|
|
|
55647
56894
|
* @throws {RequiredError}
|
|
55648
56895
|
*/
|
|
55649
56896
|
patchAuthOrgNetworkConfig: (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56897
|
+
/**
|
|
56898
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
56899
|
+
* @summary Update Service Provider Configuration
|
|
56900
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
56901
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56902
|
+
* @throws {RequiredError}
|
|
56903
|
+
*/
|
|
56904
|
+
patchAuthOrgServiceProviderConfig: (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56905
|
+
/**
|
|
56906
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
56907
|
+
* @summary Update Auth Org Session Configuration
|
|
56908
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
56909
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56910
|
+
* @throws {RequiredError}
|
|
56911
|
+
*/
|
|
56912
|
+
patchAuthOrgSessionConfig: (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
55650
56913
|
};
|
|
55651
56914
|
/**
|
|
55652
56915
|
* GlobalTenantSecuritySettingsV2025Api - functional programming interface
|
|
@@ -55661,6 +56924,13 @@ export declare const GlobalTenantSecuritySettingsV2025ApiFp: (configuration?: Co
|
|
|
55661
56924
|
* @throws {RequiredError}
|
|
55662
56925
|
*/
|
|
55663
56926
|
createAuthOrgNetworkConfig(networkConfigurationV2025: NetworkConfigurationV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<NetworkConfigurationV2025>>;
|
|
56927
|
+
/**
|
|
56928
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
56929
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
56930
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56931
|
+
* @throws {RequiredError}
|
|
56932
|
+
*/
|
|
56933
|
+
getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2025>>;
|
|
55664
56934
|
/**
|
|
55665
56935
|
* This API returns the details of an org\'s network auth configuration.
|
|
55666
56936
|
* @summary Get security network configuration.
|
|
@@ -55668,6 +56938,28 @@ export declare const GlobalTenantSecuritySettingsV2025ApiFp: (configuration?: Co
|
|
|
55668
56938
|
* @throws {RequiredError}
|
|
55669
56939
|
*/
|
|
55670
56940
|
getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<NetworkConfigurationV2025>>;
|
|
56941
|
+
/**
|
|
56942
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
56943
|
+
* @summary Get Service Provider Configuration.
|
|
56944
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56945
|
+
* @throws {RequiredError}
|
|
56946
|
+
*/
|
|
56947
|
+
getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2025>>;
|
|
56948
|
+
/**
|
|
56949
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
56950
|
+
* @summary Get Auth Org Session Configuration.
|
|
56951
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56952
|
+
* @throws {RequiredError}
|
|
56953
|
+
*/
|
|
56954
|
+
getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2025>>;
|
|
56955
|
+
/**
|
|
56956
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
56957
|
+
* @summary Update Auth Org Lockout Configuration
|
|
56958
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
56959
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56960
|
+
* @throws {RequiredError}
|
|
56961
|
+
*/
|
|
56962
|
+
patchAuthOrgLockoutConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2025>>;
|
|
55671
56963
|
/**
|
|
55672
56964
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
55673
56965
|
* @summary Update security network configuration.
|
|
@@ -55676,6 +56968,22 @@ export declare const GlobalTenantSecuritySettingsV2025ApiFp: (configuration?: Co
|
|
|
55676
56968
|
* @throws {RequiredError}
|
|
55677
56969
|
*/
|
|
55678
56970
|
patchAuthOrgNetworkConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<NetworkConfigurationV2025>>;
|
|
56971
|
+
/**
|
|
56972
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
56973
|
+
* @summary Update Service Provider Configuration
|
|
56974
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
56975
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56976
|
+
* @throws {RequiredError}
|
|
56977
|
+
*/
|
|
56978
|
+
patchAuthOrgServiceProviderConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2025>>;
|
|
56979
|
+
/**
|
|
56980
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
56981
|
+
* @summary Update Auth Org Session Configuration
|
|
56982
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
56983
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56984
|
+
* @throws {RequiredError}
|
|
56985
|
+
*/
|
|
56986
|
+
patchAuthOrgSessionConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2025>>;
|
|
55679
56987
|
};
|
|
55680
56988
|
/**
|
|
55681
56989
|
* GlobalTenantSecuritySettingsV2025Api - factory interface
|
|
@@ -55690,6 +56998,13 @@ export declare const GlobalTenantSecuritySettingsV2025ApiFactory: (configuration
|
|
|
55690
56998
|
* @throws {RequiredError}
|
|
55691
56999
|
*/
|
|
55692
57000
|
createAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiCreateAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2025>;
|
|
57001
|
+
/**
|
|
57002
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
57003
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
57004
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57005
|
+
* @throws {RequiredError}
|
|
57006
|
+
*/
|
|
57007
|
+
getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2025>;
|
|
55693
57008
|
/**
|
|
55694
57009
|
* This API returns the details of an org\'s network auth configuration.
|
|
55695
57010
|
* @summary Get security network configuration.
|
|
@@ -55697,6 +57012,28 @@ export declare const GlobalTenantSecuritySettingsV2025ApiFactory: (configuration
|
|
|
55697
57012
|
* @throws {RequiredError}
|
|
55698
57013
|
*/
|
|
55699
57014
|
getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2025>;
|
|
57015
|
+
/**
|
|
57016
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
57017
|
+
* @summary Get Service Provider Configuration.
|
|
57018
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57019
|
+
* @throws {RequiredError}
|
|
57020
|
+
*/
|
|
57021
|
+
getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2025>;
|
|
57022
|
+
/**
|
|
57023
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
57024
|
+
* @summary Get Auth Org Session Configuration.
|
|
57025
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57026
|
+
* @throws {RequiredError}
|
|
57027
|
+
*/
|
|
57028
|
+
getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2025>;
|
|
57029
|
+
/**
|
|
57030
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
57031
|
+
* @summary Update Auth Org Lockout Configuration
|
|
57032
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
|
|
57033
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57034
|
+
* @throws {RequiredError}
|
|
57035
|
+
*/
|
|
57036
|
+
patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2025>;
|
|
55700
57037
|
/**
|
|
55701
57038
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
55702
57039
|
* @summary Update security network configuration.
|
|
@@ -55705,6 +57042,22 @@ export declare const GlobalTenantSecuritySettingsV2025ApiFactory: (configuration
|
|
|
55705
57042
|
* @throws {RequiredError}
|
|
55706
57043
|
*/
|
|
55707
57044
|
patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2025>;
|
|
57045
|
+
/**
|
|
57046
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
57047
|
+
* @summary Update Service Provider Configuration
|
|
57048
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
|
|
57049
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57050
|
+
* @throws {RequiredError}
|
|
57051
|
+
*/
|
|
57052
|
+
patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2025>;
|
|
57053
|
+
/**
|
|
57054
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
57055
|
+
* @summary Update Auth Org Session Configuration
|
|
57056
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
|
|
57057
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57058
|
+
* @throws {RequiredError}
|
|
57059
|
+
*/
|
|
57060
|
+
patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2025>;
|
|
55708
57061
|
};
|
|
55709
57062
|
/**
|
|
55710
57063
|
* Request parameters for createAuthOrgNetworkConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
@@ -55719,6 +57072,19 @@ export interface GlobalTenantSecuritySettingsV2025ApiCreateAuthOrgNetworkConfigR
|
|
|
55719
57072
|
*/
|
|
55720
57073
|
readonly networkConfigurationV2025: NetworkConfigurationV2025;
|
|
55721
57074
|
}
|
|
57075
|
+
/**
|
|
57076
|
+
* Request parameters for patchAuthOrgLockoutConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
57077
|
+
* @export
|
|
57078
|
+
* @interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest
|
|
57079
|
+
*/
|
|
57080
|
+
export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest {
|
|
57081
|
+
/**
|
|
57082
|
+
* A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
57083
|
+
* @type {Array<JsonPatchOperationV2025>}
|
|
57084
|
+
* @memberof GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfig
|
|
57085
|
+
*/
|
|
57086
|
+
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>;
|
|
57087
|
+
}
|
|
55722
57088
|
/**
|
|
55723
57089
|
* Request parameters for patchAuthOrgNetworkConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
55724
57090
|
* @export
|
|
@@ -55732,6 +57098,32 @@ export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgNetworkConfigRe
|
|
|
55732
57098
|
*/
|
|
55733
57099
|
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>;
|
|
55734
57100
|
}
|
|
57101
|
+
/**
|
|
57102
|
+
* Request parameters for patchAuthOrgServiceProviderConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
57103
|
+
* @export
|
|
57104
|
+
* @interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest
|
|
57105
|
+
*/
|
|
57106
|
+
export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest {
|
|
57107
|
+
/**
|
|
57108
|
+
* A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
57109
|
+
* @type {Array<JsonPatchOperationV2025>}
|
|
57110
|
+
* @memberof GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfig
|
|
57111
|
+
*/
|
|
57112
|
+
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>;
|
|
57113
|
+
}
|
|
57114
|
+
/**
|
|
57115
|
+
* Request parameters for patchAuthOrgSessionConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
57116
|
+
* @export
|
|
57117
|
+
* @interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest
|
|
57118
|
+
*/
|
|
57119
|
+
export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest {
|
|
57120
|
+
/**
|
|
57121
|
+
* A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
57122
|
+
* @type {Array<JsonPatchOperationV2025>}
|
|
57123
|
+
* @memberof GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfig
|
|
57124
|
+
*/
|
|
57125
|
+
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>;
|
|
57126
|
+
}
|
|
55735
57127
|
/**
|
|
55736
57128
|
* GlobalTenantSecuritySettingsV2025Api - object-oriented interface
|
|
55737
57129
|
* @export
|
|
@@ -55748,6 +57140,14 @@ export declare class GlobalTenantSecuritySettingsV2025Api extends BaseAPI {
|
|
|
55748
57140
|
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
55749
57141
|
*/
|
|
55750
57142
|
createAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiCreateAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<NetworkConfigurationV2025, any>>;
|
|
57143
|
+
/**
|
|
57144
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
57145
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
57146
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57147
|
+
* @throws {RequiredError}
|
|
57148
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
57149
|
+
*/
|
|
57150
|
+
getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<LockoutConfigurationV2025, any>>;
|
|
55751
57151
|
/**
|
|
55752
57152
|
* This API returns the details of an org\'s network auth configuration.
|
|
55753
57153
|
* @summary Get security network configuration.
|
|
@@ -55756,6 +57156,31 @@ export declare class GlobalTenantSecuritySettingsV2025Api extends BaseAPI {
|
|
|
55756
57156
|
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
55757
57157
|
*/
|
|
55758
57158
|
getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<NetworkConfigurationV2025, any>>;
|
|
57159
|
+
/**
|
|
57160
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
57161
|
+
* @summary Get Service Provider Configuration.
|
|
57162
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57163
|
+
* @throws {RequiredError}
|
|
57164
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
57165
|
+
*/
|
|
57166
|
+
getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ServiceProviderConfigurationV2025, any>>;
|
|
57167
|
+
/**
|
|
57168
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
57169
|
+
* @summary Get Auth Org Session Configuration.
|
|
57170
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57171
|
+
* @throws {RequiredError}
|
|
57172
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
57173
|
+
*/
|
|
57174
|
+
getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SessionConfigurationV2025, any>>;
|
|
57175
|
+
/**
|
|
57176
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
57177
|
+
* @summary Update Auth Org Lockout Configuration
|
|
57178
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
|
|
57179
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57180
|
+
* @throws {RequiredError}
|
|
57181
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
57182
|
+
*/
|
|
57183
|
+
patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<LockoutConfigurationV2025, any>>;
|
|
55759
57184
|
/**
|
|
55760
57185
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
55761
57186
|
* @summary Update security network configuration.
|
|
@@ -55765,6 +57190,24 @@ export declare class GlobalTenantSecuritySettingsV2025Api extends BaseAPI {
|
|
|
55765
57190
|
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
55766
57191
|
*/
|
|
55767
57192
|
patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<NetworkConfigurationV2025, any>>;
|
|
57193
|
+
/**
|
|
57194
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
57195
|
+
* @summary Update Service Provider Configuration
|
|
57196
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
|
|
57197
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57198
|
+
* @throws {RequiredError}
|
|
57199
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
57200
|
+
*/
|
|
57201
|
+
patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ServiceProviderConfigurationV2025, any>>;
|
|
57202
|
+
/**
|
|
57203
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
57204
|
+
* @summary Update Auth Org Session Configuration
|
|
57205
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
|
|
57206
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57207
|
+
* @throws {RequiredError}
|
|
57208
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
57209
|
+
*/
|
|
57210
|
+
patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SessionConfigurationV2025, any>>;
|
|
55768
57211
|
}
|
|
55769
57212
|
/**
|
|
55770
57213
|
* GovernanceGroupsV2025Api - axios parameter creator
|