sailpoint-api-client 1.5.0 → 1.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/beta/README.md +2 -2
- package/beta/api.ts +499 -109
- package/beta/common.ts +2 -2
- package/beta/package.json +1 -1
- package/dist/beta/api.d.ts +429 -70
- package/dist/beta/api.js +162 -99
- package/dist/beta/api.js.map +1 -1
- package/dist/beta/common.js +1 -1
- package/dist/v2024/api.d.ts +1186 -9
- package/dist/v2024/api.js +811 -87
- package/dist/v2024/api.js.map +1 -1
- package/dist/v2024/common.js +1 -1
- package/dist/v2025/api.d.ts +1452 -9
- package/dist/v2025/api.js +912 -72
- package/dist/v2025/api.js.map +1 -1
- package/dist/v2025/common.js +1 -1
- package/dist/v3/api.d.ts +502 -21
- package/dist/v3/api.js +95 -27
- package/dist/v3/api.js.map +1 -1
- package/dist/v3/common.js +1 -1
- package/package.json +1 -1
- package/v2024/README.md +2 -2
- package/v2024/api.ts +1524 -10
- package/v2024/common.ts +2 -2
- package/v2024/package.json +1 -1
- package/v2025/README.md +2 -2
- package/v2025/api.ts +1908 -70
- package/v2025/common.ts +2 -2
- package/v2025/package.json +1 -1
- package/v3/README.md +2 -2
- package/v3/api.ts +543 -28
- package/v3/common.ts +2 -2
- package/v3/package.json +1 -1
package/dist/v3/api.js
CHANGED
|
@@ -79,15 +79,15 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
79
79
|
};
|
|
80
80
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
81
81
|
exports.CampaignAlertLevelV3 = exports.CampaignMandatoryCommentRequirementV3 = exports.CampaignCorrelatedStatusV3 = exports.CampaignStatusV3 = exports.CampaignTypeV3 = exports.BulkAddTaggedObjectOperationV3 = exports.BucketType = exports.BeforeProvisioningRuleDtoTypeV3 = exports.BaseAccessOwnerTypeV3 = exports.BackupResponseCloudStorageStatusV3 = exports.BackupResponseHydrationStatusV3 = exports.BackupResponseBackupTypeV3 = exports.BackupResponseTypeV3 = exports.BackupResponseStatusV3 = exports.BackupOptionsIncludeTypesV3 = exports.AuthUserCapabilitiesV3 = exports.AttributeDefinitionType = exports.AttributeDefinitionSchemaTypeV3 = exports.ApprovalStatusDtoOriginalOwnerTypeV3 = exports.ApprovalStatusDtoCurrentOwnerTypeV3 = exports.ApprovalStatus = exports.ApprovalSchemeForRoleApproverTypeV3 = exports.ApprovalScheme = exports.AggregationType = exports.AdminReviewReassignReassignToTypeV3 = exports.ActivityInsightsUsageDaysStateV3 = exports.AccountAllOfSourceOwnerTypeV3 = exports.AccountAllOfRecommendationMethodV3 = exports.AccountAllOfRecommendationTypeV3 = exports.AccountAllOfIdentityTypeV3 = exports.AccountActivityItemOperation = exports.AccountActivityApprovalStatus = exports.AccountActionActionV3 = exports.AccountOriginV3 = exports.AccessType = exports.AccessRequestType = exports.AccessRequestPhasesResultV3 = exports.AccessRequestPhasesStateV3 = exports.AccessRequestItemTypeV3 = exports.AccessProfileUsageUsedByInnerTypeV3 = exports.AccessProfileSourceRefTypeV3 = exports.AccessProfileRefTypeV3 = exports.AccessProfileApprovalSchemeApproverTypeV3 = exports.AccessItemReviewedByTypeV3 = exports.AccessItemRequesterTypeV3 = exports.AccessItemRequestedForTypeV3 = exports.AccessCriteriaCriteriaListInnerTypeV3 = exports.AccessConstraintOperatorV3 = exports.AccessConstraintTypeV3 = exports.AccessAppsOwnerTypeV3 = void 0;
|
|
82
|
-
exports.
|
|
83
|
-
exports.
|
|
84
|
-
exports.
|
|
85
|
-
exports.
|
|
86
|
-
exports.
|
|
87
|
-
exports.
|
|
88
|
-
exports.
|
|
89
|
-
exports.
|
|
90
|
-
exports.WorkflowsApi = exports.WorkflowsApiFactory = exports.WorkflowsApiFp = exports.WorkflowsApiAxiosParamCreator = exports.WorkItemsApi = exports.WorkItemsApiFactory = exports.WorkItemsApiFp = exports.WorkItemsApiAxiosParamCreator = exports.VendorConnectorMappingsApi = exports.VendorConnectorMappingsApiFactory = exports.VendorConnectorMappingsApiFp = exports.VendorConnectorMappingsApiAxiosParamCreator = void 0;
|
|
82
|
+
exports.GetCampaign200ResponseMandatoryCommentRequirementV3 = exports.GetCampaign200ResponseCorrelatedStatusV3 = exports.GetCampaign200ResponseStatusV3 = exports.GetCampaign200ResponseTypeV3 = exports.GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = exports.GetActiveCampaigns200ResponseInnerCorrelatedStatusV3 = exports.GetActiveCampaigns200ResponseInnerStatusV3 = exports.GetActiveCampaigns200ResponseInnerTypeV3 = exports.FilterType = exports.FederationProtocolDetailsRoleV3 = exports.ExpressionChildrenInnerOperatorV3 = exports.ExpressionOperatorV3 = exports.ExecutionStatus = exports.ExceptionCriteriaCriteriaListInnerTypeV3 = exports.EntitlementRef1TypeV3 = exports.EntitlementRefTypeV3 = exports.EntitlementOwnerTypeV3 = exports.DtoType = exports.DocumentType = exports.DimensionRefTypeV3 = exports.DependantConnectionsMissingDtoDependencyTypeV3 = exports.DeleteSource202ResponseTypeV3 = exports.DateCompareOperatorV3 = exports.CriteriaType = exports.ConnectorDetailStatusV3 = exports.CompletionStatus = exports.CompletedApprovalState = exports.CommentDtoAuthorTypeV3 = exports.ClientType = exports.CertificationTaskStatusV3 = exports.CertificationTaskTargetTypeV3 = exports.CertificationTaskTypeV3 = exports.CertificationReferenceTypeV3 = exports.CertificationPhase = exports.CertificationDecision = exports.CampaignTemplateOwnerRefTypeV3 = exports.CampaignReportStatusV3 = exports.CampaignReportTypeV3 = exports.CampaignReferenceMandatoryCommentRequirementV3 = exports.CampaignReferenceCorrelatedStatusV3 = exports.CampaignReferenceCampaignTypeV3 = exports.CampaignReferenceTypeV3 = exports.CampaignFilterDetailsModeV3 = exports.CampaignCompleteOptionsAutoCompleteActionV3 = exports.CampaignAllOfSourcesWithOrphanEntitlementsTypeV3 = exports.CampaignAllOfSearchCampaignInfoReviewerTypeV3 = exports.CampaignAllOfSearchCampaignInfoTypeV3 = exports.CampaignAllOfRoleCompositionCampaignInfoRemediatorRefTypeV3 = exports.CampaignAllOfMachineAccountCampaignInfoReviewerTypeV3 = exports.CampaignAllOfFilterTypeV3 = void 0;
|
|
83
|
+
exports.ReassignmentType = exports.ReassignmentReferenceTypeV3 = exports.ReassignReferenceTypeV3 = exports.QueryType = exports.PublicIdentityIdentityStateV3 = exports.ProvisioningState = exports.ProvisioningCriteriaOperation = exports.PreApprovalTriggerDetailsDecisionV3 = exports.PendingApprovalOwnerTypeV3 = exports.PendingApprovalAction = exports.PatOwnerTypeV3 = exports.PasswordStatusStateV3 = exports.PasswordChangeResponseStateV3 = exports.OwnerReferenceSegmentsTypeV3 = exports.OwnerReferenceTypeV3 = exports.OwnerDtoTypeV3 = exports.OrphanIdentitiesReportArgumentsSelectedFormatsV3 = exports.Operation = exports.ObjectMappingResponseObjectTypeV3 = exports.ObjectMappingRequestObjectTypeV3 = exports.NonEmployeeSchemaAttributeType = exports.NonEmployeeIdentityDtoType = exports.NonEmployeeBulkUploadStatusStatusV3 = exports.NonEmployeeBulkUploadJobStatusV3 = exports.NamedConstructs = exports.MfaConfigTestResponseStateV3 = exports.MetricType = exports.ManualWorkItemState = exports.ManualWorkItemDetailsOriginalOwnerTypeV3 = exports.ManualWorkItemDetailsCurrentOwnerTypeV3 = exports.ManagedClusterTypes = exports.ManagedClusterStatusV3 = exports.ManagedClientType = exports.ManagedClientStatusCode = exports.ManagedClientProvisionStatusV3 = exports.ManagedClientClusterTypeV3 = exports.ManagedClientStatusV3 = exports.LocaleOrigin = exports.LifecyclestateDeletedTypeV3 = exports.KbaAuthResponseStatusV3 = exports.JsonPatchOperationOpV3 = exports.Index = exports.ImportObjectTypeV3 = exports.IdpDetailsRoleV3 = exports.IdentityWithNewAccessAccessRefsInnerTypeV3 = exports.IdentityProfileExportedObjectSelfTypeV3 = exports.IdentityProfileAllOfOwnerTypeV3 = exports.IdentityProfileAllOfAuthoritativeSourceTypeV3 = exports.IdentityPreviewResponseIdentityTypeV3 = exports.GrantType = void 0;
|
|
84
|
+
exports.SodReportResultDtoTypeV3 = exports.SodRecipientTypeV3 = exports.SodPolicyOwnerRefTypeV3 = exports.SodPolicyDtoTypeV3 = exports.SodPolicyTypeV3 = exports.SodPolicyStateV3 = exports.SlimCampaignCorrelatedStatusV3 = exports.SlimCampaignStatusV3 = exports.SlimCampaignTypeV3 = exports.ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = exports.ServiceDeskSourceTypeV3 = exports.SendTokenResponseStatusV3 = exports.SendTokenRequestDeliveryTypeV3 = exports.SelectorType = exports.SearchScheduleRecipientsInnerTypeV3 = exports.SearchFilterType = exports.SchemaFeaturesV3 = exports.ScheduledSearchAllOfOwnerTypeV3 = exports.ScheduledAttributesFrequencyV3 = exports.ScheduleType = exports.ScheduleMonthsTypeV3 = exports.ScheduleHoursTypeV3 = exports.ScheduleDaysTypeV3 = exports.ScheduleTypeV3 = exports.RoleMembershipSelectorType = exports.RoleCriteriaOperation = exports.RoleCriteriaKeyType = exports.RoleAssignmentSourceType = exports.ReviewerTypeV3 = exports.ReviewableEntitlementAccountOwnerTypeV3 = exports.RequestedItemStatusSodViolationContextStateV3 = exports.RequestedItemStatusRequestedForTypeV3 = exports.RequestedItemStatusRequestState = exports.RequestedItemStatusPreApprovalTriggerDetailsDecisionV3 = exports.RequestedItemStatusTypeV3 = exports.RequestedItemDtoRefTypeV3 = exports.RequestedItemDetailsTypeV3 = exports.RequestableObjectType = exports.RequestableObjectRequestStatus = exports.RequestableObjectReferenceTypeV3 = exports.ReportType = exports.ReportResultsAvailableFormatsV3 = exports.ReportResultsStatusV3 = exports.ReportResultsReportTypeV3 = exports.ReportResultReferenceStatusV3 = exports.ReportResultReferenceTypeV3 = exports.ReportDetailsArgumentsSelectedFormatsV3 = exports.ReportDetailsReportTypeV3 = exports.RecommendationMethodV3 = exports.RecommendationTypeV3 = void 0;
|
|
85
|
+
exports.AccessProfilesApiAxiosParamCreator = exports.WorkflowTriggerAttributesFrequencyV3 = exports.WorkflowTriggerTypeV3 = exports.WorkflowModifiedByTypeV3 = exports.WorkflowLibraryTriggerTypeV3 = exports.WorkflowLibraryFormFieldsTypeV3 = exports.WorkflowExecutionEventTypeV3 = exports.WorkflowExecutionStatusV3 = exports.WorkflowBodyOwnerTypeV3 = exports.WorkflowAllOfCreatorTypeV3 = exports.WorkItemTypeManualWorkItems = exports.WorkItemStateManualWorkItems = exports.WorkItemState = exports.ViolationOwnerAssignmentConfigOwnerRefTypeV3 = exports.ViolationOwnerAssignmentConfigAssignmentRuleV3 = exports.ViolationContextPolicyTypeV3 = exports.VerificationResponseStatusV3 = exports.V3CreateConnectorDtoStatusV3 = exports.V3ConnectorDtoStatusV3 = exports.UsageType = exports.UpdateDetailStatusV3 = exports.UncorrelatedAccountsReportArgumentsSelectedFormatsV3 = exports.TransformReadTypeV3 = exports.TransformTypeV3 = exports.TokenAuthResponseStatusV3 = exports.TokenAuthRequestDeliveryTypeV3 = exports.TaskResultSimplifiedCompletionStatusV3 = exports.TaskResultDtoTypeV3 = exports.TaskResultDetailsMessagesInnerTypeV3 = exports.TaskResultDetailsCompletionStatusV3 = exports.TaskResultDetailsReportTypeV3 = exports.TaskResultDetailsTypeV3 = exports.TaggedObjectDtoTypeV3 = exports.StandardLevel = exports.SpDetailsRoleV3 = exports.SourceUsageStatusStatusV3 = exports.SourceSchemasInnerTypeV3 = exports.SourcePasswordPoliciesInnerTypeV3 = exports.SourceOwnerTypeV3 = exports.SourceManagerCorrelationRuleTypeV3 = exports.SourceManagementWorkgroupTypeV3 = exports.SourceHealthDtoStatusV3 = exports.SourceClusterDtoTypeV3 = exports.SourceClusterTypeV3 = exports.SourceBeforeProvisioningRuleTypeV3 = exports.SourceAccountCorrelationRuleTypeV3 = exports.SourceAccountCorrelationConfigTypeV3 = exports.SourceStatusV3 = exports.SourceFeaturesV3 = exports.SodViolationContextCheckCompletedStateV3 = void 0;
|
|
86
|
+
exports.CertificationSummariesApiFactory = exports.CertificationSummariesApiFp = exports.CertificationSummariesApiAxiosParamCreator = exports.GetCampaignDetailV3 = exports.GetActiveCampaignsDetailV3 = exports.CertificationCampaignsApi = exports.CertificationCampaignsApiFactory = exports.CertificationCampaignsApiFp = exports.CertificationCampaignsApiAxiosParamCreator = exports.CertificationCampaignFiltersApi = exports.CertificationCampaignFiltersApiFactory = exports.CertificationCampaignFiltersApiFp = exports.CertificationCampaignFiltersApiAxiosParamCreator = exports.BrandingApi = exports.BrandingApiFactory = exports.BrandingApiFp = exports.BrandingApiAxiosParamCreator = exports.AuthUsersApi = exports.AuthUsersApiFactory = exports.AuthUsersApiFp = exports.AuthUsersApiAxiosParamCreator = exports.GetDiscoveredApplicationsDetailV3 = exports.ApplicationDiscoveryApi = exports.ApplicationDiscoveryApiFactory = exports.ApplicationDiscoveryApiFp = exports.ApplicationDiscoveryApiAxiosParamCreator = exports.ListAccountsDetailLevelV3 = exports.AccountsApi = exports.AccountsApiFactory = exports.AccountsApiFp = exports.AccountsApiAxiosParamCreator = exports.AccountUsagesApi = exports.AccountUsagesApiFactory = exports.AccountUsagesApiFp = exports.AccountUsagesApiAxiosParamCreator = exports.AccountActivitiesApi = exports.AccountActivitiesApiFactory = exports.AccountActivitiesApiFp = exports.AccountActivitiesApiAxiosParamCreator = exports.AccessRequestsApi = exports.AccessRequestsApiFactory = exports.AccessRequestsApiFp = exports.AccessRequestsApiAxiosParamCreator = exports.AccessRequestApprovalsApi = exports.AccessRequestApprovalsApiFactory = exports.AccessRequestApprovalsApiFp = exports.AccessRequestApprovalsApiAxiosParamCreator = exports.AccessProfilesApi = exports.AccessProfilesApiFactory = exports.AccessProfilesApiFp = void 0;
|
|
87
|
+
exports.NonEmployeeLifecycleManagementApiAxiosParamCreator = exports.ManagedClustersApi = exports.ManagedClustersApiFactory = exports.ManagedClustersApiFp = exports.ManagedClustersApiAxiosParamCreator = exports.ManagedClientsApi = exports.ManagedClientsApiFactory = exports.ManagedClientsApiFp = exports.ManagedClientsApiAxiosParamCreator = exports.PingVerificationStatusMethodV3 = exports.MFAControllerApi = exports.MFAControllerApiFactory = exports.MFAControllerApiFp = exports.MFAControllerApiAxiosParamCreator = exports.TestMFAConfigMethodV3 = exports.DeleteMFAConfigMethodV3 = exports.MFAConfigurationApi = exports.MFAConfigurationApiFactory = exports.MFAConfigurationApiFp = exports.MFAConfigurationApiAxiosParamCreator = exports.LifecycleStatesApi = exports.LifecycleStatesApiFactory = exports.LifecycleStatesApiFp = exports.LifecycleStatesApiAxiosParamCreator = exports.IdentityProfilesApi = exports.IdentityProfilesApiFactory = exports.IdentityProfilesApiFp = exports.IdentityProfilesApiAxiosParamCreator = exports.GlobalTenantSecuritySettingsApi = exports.GlobalTenantSecuritySettingsApiFactory = exports.GlobalTenantSecuritySettingsApiFp = exports.GlobalTenantSecuritySettingsApiAxiosParamCreator = exports.PutConnectorTranslationsLocaleV3 = exports.GetConnectorTranslationsLocaleV3 = exports.GetConnectorListLocaleV3 = exports.GetConnectorLocaleV3 = exports.ConnectorsApi = exports.ConnectorsApiFactory = exports.ConnectorsApiFp = exports.ConnectorsApiAxiosParamCreator = exports.ConfigurationHubApi = exports.ConfigurationHubApiFactory = exports.ConfigurationHubApiFp = exports.ConfigurationHubApiAxiosParamCreator = exports.CertificationsApi = exports.CertificationsApiFactory = exports.CertificationsApiFp = exports.CertificationsApiAxiosParamCreator = exports.GetIdentityAccessSummariesTypeV3 = exports.CertificationSummariesApi = void 0;
|
|
88
|
+
exports.RolesApiFp = exports.RolesApiAxiosParamCreator = exports.RequestableObjectsApi = exports.RequestableObjectsApiFactory = exports.RequestableObjectsApiFp = exports.RequestableObjectsApiAxiosParamCreator = exports.GetReportFileFormatV3 = exports.ReportsDataExtractionApi = exports.ReportsDataExtractionApiFactory = exports.ReportsDataExtractionApiFp = exports.ReportsDataExtractionApiAxiosParamCreator = exports.PublicIdentitiesConfigApi = exports.PublicIdentitiesConfigApiFactory = exports.PublicIdentitiesConfigApiFp = exports.PublicIdentitiesConfigApiAxiosParamCreator = exports.PublicIdentitiesApi = exports.PublicIdentitiesApiFactory = exports.PublicIdentitiesApiFp = exports.PublicIdentitiesApiAxiosParamCreator = exports.PersonalAccessTokensApi = exports.PersonalAccessTokensApiFactory = exports.PersonalAccessTokensApiFp = exports.PersonalAccessTokensApiAxiosParamCreator = exports.PasswordSyncGroupsApi = exports.PasswordSyncGroupsApiFactory = exports.PasswordSyncGroupsApiFp = exports.PasswordSyncGroupsApiAxiosParamCreator = exports.PasswordPoliciesApi = exports.PasswordPoliciesApiFactory = exports.PasswordPoliciesApiFp = exports.PasswordPoliciesApiAxiosParamCreator = exports.PasswordManagementApi = exports.PasswordManagementApiFactory = exports.PasswordManagementApiFp = exports.PasswordManagementApiAxiosParamCreator = exports.PasswordDictionaryApi = exports.PasswordDictionaryApiFactory = exports.PasswordDictionaryApiFp = exports.PasswordDictionaryApiAxiosParamCreator = exports.PasswordConfigurationApi = exports.PasswordConfigurationApiFactory = exports.PasswordConfigurationApiFp = exports.PasswordConfigurationApiAxiosParamCreator = exports.OAuthClientsApi = exports.OAuthClientsApiFactory = exports.OAuthClientsApiFp = exports.OAuthClientsApiAxiosParamCreator = exports.NonEmployeeLifecycleManagementApi = exports.NonEmployeeLifecycleManagementApiFactory = exports.NonEmployeeLifecycleManagementApiFp = void 0;
|
|
89
|
+
exports.GetTaggedObjectTypeV3 = exports.DeleteTaggedObjectTypeV3 = exports.TaggedObjectsApi = exports.TaggedObjectsApiFactory = exports.TaggedObjectsApiFp = exports.TaggedObjectsApiAxiosParamCreator = exports.GetSourceSchemasIncludeTypesV3 = exports.SourcesApi = exports.SourcesApiFactory = exports.SourcesApiFp = exports.SourcesApiAxiosParamCreator = exports.SourceUsagesApi = exports.SourceUsagesApiFactory = exports.SourceUsagesApiFp = exports.SourceUsagesApiAxiosParamCreator = exports.ServiceDeskIntegrationApi = exports.ServiceDeskIntegrationApiFactory = exports.ServiceDeskIntegrationApiFp = exports.ServiceDeskIntegrationApiAxiosParamCreator = exports.SegmentsApi = exports.SegmentsApiFactory = exports.SegmentsApiFp = exports.SegmentsApiAxiosParamCreator = exports.SearchAttributeConfigurationApi = exports.SearchAttributeConfigurationApiFactory = exports.SearchAttributeConfigurationApiFp = exports.SearchAttributeConfigurationApiAxiosParamCreator = exports.SearchGetIndexV3 = exports.SearchApi = exports.SearchApiFactory = exports.SearchApiFp = exports.SearchApiAxiosParamCreator = exports.ScheduledSearchApi = exports.ScheduledSearchApiFactory = exports.ScheduledSearchApiFp = exports.ScheduledSearchApiAxiosParamCreator = exports.SavedSearchApi = exports.SavedSearchApiFactory = exports.SavedSearchApiFp = exports.SavedSearchApiAxiosParamCreator = exports.SODViolationsApi = exports.SODViolationsApiFactory = exports.SODViolationsApiFp = exports.SODViolationsApiAxiosParamCreator = exports.SODPoliciesApi = exports.SODPoliciesApiFactory = exports.SODPoliciesApiFp = exports.SODPoliciesApiAxiosParamCreator = exports.RolesApi = exports.RolesApiFactory = void 0;
|
|
90
|
+
exports.WorkflowsApi = exports.WorkflowsApiFactory = exports.WorkflowsApiFp = exports.WorkflowsApiAxiosParamCreator = exports.WorkItemsApi = exports.WorkItemsApiFactory = exports.WorkItemsApiFp = exports.WorkItemsApiAxiosParamCreator = exports.VendorConnectorMappingsApi = exports.VendorConnectorMappingsApiFactory = exports.VendorConnectorMappingsApiFp = exports.VendorConnectorMappingsApiAxiosParamCreator = exports.TransformsApi = exports.TransformsApiFactory = exports.TransformsApiFp = exports.TransformsApiAxiosParamCreator = exports.PutTaggedObjectTypeV3 = exports.ListTaggedObjectsByTypeTypeV3 = void 0;
|
|
91
91
|
var axios_1 = __importDefault(require("axios"));
|
|
92
92
|
// Some imports not used depending on template conditions
|
|
93
93
|
// @ts-ignore
|
|
@@ -287,7 +287,8 @@ exports.AttributeDefinitionType = {
|
|
|
287
287
|
String: 'STRING',
|
|
288
288
|
Long: 'LONG',
|
|
289
289
|
Int: 'INT',
|
|
290
|
-
Boolean: 'BOOLEAN'
|
|
290
|
+
Boolean: 'BOOLEAN',
|
|
291
|
+
Date: 'DATE'
|
|
291
292
|
};
|
|
292
293
|
exports.AuthUserCapabilitiesV3 = {
|
|
293
294
|
CertAdmin: 'CERT_ADMIN',
|
|
@@ -711,6 +712,33 @@ exports.GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = {
|
|
|
711
712
|
RevokeOnlyDecisions: 'REVOKE_ONLY_DECISIONS',
|
|
712
713
|
NoDecisions: 'NO_DECISIONS'
|
|
713
714
|
};
|
|
715
|
+
exports.GetCampaign200ResponseTypeV3 = {
|
|
716
|
+
Manager: 'MANAGER',
|
|
717
|
+
SourceOwner: 'SOURCE_OWNER',
|
|
718
|
+
Search: 'SEARCH',
|
|
719
|
+
RoleComposition: 'ROLE_COMPOSITION',
|
|
720
|
+
MachineAccount: 'MACHINE_ACCOUNT'
|
|
721
|
+
};
|
|
722
|
+
exports.GetCampaign200ResponseStatusV3 = {
|
|
723
|
+
Pending: 'PENDING',
|
|
724
|
+
Staged: 'STAGED',
|
|
725
|
+
Canceling: 'CANCELING',
|
|
726
|
+
Activating: 'ACTIVATING',
|
|
727
|
+
Active: 'ACTIVE',
|
|
728
|
+
Completing: 'COMPLETING',
|
|
729
|
+
Completed: 'COMPLETED',
|
|
730
|
+
Error: 'ERROR',
|
|
731
|
+
Archived: 'ARCHIVED'
|
|
732
|
+
};
|
|
733
|
+
exports.GetCampaign200ResponseCorrelatedStatusV3 = {
|
|
734
|
+
Correlated: 'CORRELATED',
|
|
735
|
+
Uncorrelated: 'UNCORRELATED'
|
|
736
|
+
};
|
|
737
|
+
exports.GetCampaign200ResponseMandatoryCommentRequirementV3 = {
|
|
738
|
+
AllDecisions: 'ALL_DECISIONS',
|
|
739
|
+
RevokeOnlyDecisions: 'REVOKE_ONLY_DECISIONS',
|
|
740
|
+
NoDecisions: 'NO_DECISIONS'
|
|
741
|
+
};
|
|
714
742
|
/**
|
|
715
743
|
* OAuth2 Grant Type
|
|
716
744
|
* @export
|
|
@@ -760,7 +788,8 @@ exports.IdentityWithNewAccessAccessRefsInnerTypeV3 = {
|
|
|
760
788
|
Entitlement: 'ENTITLEMENT'
|
|
761
789
|
};
|
|
762
790
|
exports.IdpDetailsRoleV3 = {
|
|
763
|
-
SamlIdp: 'SAML_IDP'
|
|
791
|
+
SamlIdp: 'SAML_IDP',
|
|
792
|
+
SamlSp: 'SAML_SP'
|
|
764
793
|
};
|
|
765
794
|
exports.ImportObjectTypeV3 = {
|
|
766
795
|
ConnectorRule: 'CONNECTOR_RULE',
|
|
@@ -1227,6 +1256,11 @@ exports.RequestedItemDetailsTypeV3 = {
|
|
|
1227
1256
|
Entitlement: 'ENTITLEMENT',
|
|
1228
1257
|
Role: 'ROLE'
|
|
1229
1258
|
};
|
|
1259
|
+
exports.RequestedItemDtoRefTypeV3 = {
|
|
1260
|
+
AccessProfile: 'ACCESS_PROFILE',
|
|
1261
|
+
Role: 'ROLE',
|
|
1262
|
+
Entitlement: 'ENTITLEMENT'
|
|
1263
|
+
};
|
|
1230
1264
|
exports.RequestedItemStatusTypeV3 = {
|
|
1231
1265
|
AccessProfile: 'ACCESS_PROFILE',
|
|
1232
1266
|
Role: 'ROLE',
|
|
@@ -1416,6 +1450,10 @@ exports.SendTokenResponseStatusV3 = {
|
|
|
1416
1450
|
exports.ServiceDeskSourceTypeV3 = {
|
|
1417
1451
|
Source: 'SOURCE'
|
|
1418
1452
|
};
|
|
1453
|
+
exports.ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = {
|
|
1454
|
+
SamlIdp: 'SAML_IDP',
|
|
1455
|
+
SamlSp: 'SAML_SP'
|
|
1456
|
+
};
|
|
1419
1457
|
exports.SlimCampaignTypeV3 = {
|
|
1420
1458
|
Manager: 'MANAGER',
|
|
1421
1459
|
SourceOwner: 'SOURCE_OWNER',
|
|
@@ -1557,6 +1595,7 @@ exports.SourceUsageStatusStatusV3 = {
|
|
|
1557
1595
|
Incomplete: 'INCOMPLETE'
|
|
1558
1596
|
};
|
|
1559
1597
|
exports.SpDetailsRoleV3 = {
|
|
1598
|
+
SamlIdp: 'SAML_IDP',
|
|
1560
1599
|
SamlSp: 'SAML_SP'
|
|
1561
1600
|
};
|
|
1562
1601
|
/**
|
|
@@ -3538,7 +3577,7 @@ var AccessRequestsApiAxiosParamCreator = function (configuration) {
|
|
|
3538
3577
|
});
|
|
3539
3578
|
},
|
|
3540
3579
|
/**
|
|
3541
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
3580
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
3542
3581
|
* @summary Submit Access Request
|
|
3543
3582
|
* @param {AccessRequest} accessRequest
|
|
3544
3583
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -3817,7 +3856,7 @@ var AccessRequestsApiFp = function (configuration) {
|
|
|
3817
3856
|
});
|
|
3818
3857
|
},
|
|
3819
3858
|
/**
|
|
3820
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
3859
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
3821
3860
|
* @summary Submit Access Request
|
|
3822
3861
|
* @param {AccessRequest} accessRequest
|
|
3823
3862
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -3937,7 +3976,7 @@ var AccessRequestsApiFactory = function (configuration, basePath, axios) {
|
|
|
3937
3976
|
return localVarFp.cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
3938
3977
|
},
|
|
3939
3978
|
/**
|
|
3940
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
3979
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
3941
3980
|
* @summary Submit Access Request
|
|
3942
3981
|
* @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
3943
3982
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -4003,7 +4042,7 @@ var AccessRequestsApi = /** @class */ (function (_super) {
|
|
|
4003
4042
|
return (0, exports.AccessRequestsApiFp)(this.configuration).cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
4004
4043
|
};
|
|
4005
4044
|
/**
|
|
4006
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
4045
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
4007
4046
|
* @summary Submit Access Request
|
|
4008
4047
|
* @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
4009
4048
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -40475,10 +40514,11 @@ var WorkflowsApiAxiosParamCreator = function (configuration) {
|
|
|
40475
40514
|
* Get a single workflow by id.
|
|
40476
40515
|
* @summary Get Workflow By Id
|
|
40477
40516
|
* @param {string} id Id of the workflow
|
|
40517
|
+
* @param {boolean} [workflowMetrics] disable workflow metrics
|
|
40478
40518
|
* @param {*} [axiosOptions] Override http request option.
|
|
40479
40519
|
* @throws {RequiredError}
|
|
40480
40520
|
*/
|
|
40481
|
-
getWorkflow: function (id, axiosOptions) {
|
|
40521
|
+
getWorkflow: function (id, workflowMetrics, axiosOptions) {
|
|
40482
40522
|
if (axiosOptions === void 0) { axiosOptions = {}; }
|
|
40483
40523
|
return __awaiter(_this, void 0, void 0, function () {
|
|
40484
40524
|
var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
|
|
@@ -40513,6 +40553,9 @@ var WorkflowsApiAxiosParamCreator = function (configuration) {
|
|
|
40513
40553
|
// authentication userAuth required
|
|
40514
40554
|
// oauth required
|
|
40515
40555
|
_a.sent();
|
|
40556
|
+
if (workflowMetrics !== undefined) {
|
|
40557
|
+
localVarQueryParameter['workflowMetrics'] = workflowMetrics;
|
|
40558
|
+
}
|
|
40516
40559
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
40517
40560
|
headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
40518
40561
|
localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
|
|
@@ -40930,10 +40973,14 @@ var WorkflowsApiAxiosParamCreator = function (configuration) {
|
|
|
40930
40973
|
/**
|
|
40931
40974
|
* List all workflows in the tenant.
|
|
40932
40975
|
* @summary List Workflows
|
|
40976
|
+
* @param {string} [triggerId] Trigger ID
|
|
40977
|
+
* @param {string} [connectorInstanceId] Connector Instance ID
|
|
40978
|
+
* @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
40979
|
+
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
40933
40980
|
* @param {*} [axiosOptions] Override http request option.
|
|
40934
40981
|
* @throws {RequiredError}
|
|
40935
40982
|
*/
|
|
40936
|
-
listWorkflows: function (axiosOptions) {
|
|
40983
|
+
listWorkflows: function (triggerId, connectorInstanceId, limit, offset, axiosOptions) {
|
|
40937
40984
|
if (axiosOptions === void 0) { axiosOptions = {}; }
|
|
40938
40985
|
return __awaiter(_this, void 0, void 0, function () {
|
|
40939
40986
|
var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
|
|
@@ -40965,6 +41012,18 @@ var WorkflowsApiAxiosParamCreator = function (configuration) {
|
|
|
40965
41012
|
// authentication userAuth required
|
|
40966
41013
|
// oauth required
|
|
40967
41014
|
_a.sent();
|
|
41015
|
+
if (triggerId !== undefined) {
|
|
41016
|
+
localVarQueryParameter['triggerId'] = triggerId;
|
|
41017
|
+
}
|
|
41018
|
+
if (connectorInstanceId !== undefined) {
|
|
41019
|
+
localVarQueryParameter['connectorInstanceId'] = connectorInstanceId;
|
|
41020
|
+
}
|
|
41021
|
+
if (limit !== undefined) {
|
|
41022
|
+
localVarQueryParameter['limit'] = limit;
|
|
41023
|
+
}
|
|
41024
|
+
if (offset !== undefined) {
|
|
41025
|
+
localVarQueryParameter['offset'] = offset;
|
|
41026
|
+
}
|
|
40968
41027
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
40969
41028
|
headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
40970
41029
|
localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
|
|
@@ -41336,16 +41395,17 @@ var WorkflowsApiFp = function (configuration) {
|
|
|
41336
41395
|
* Get a single workflow by id.
|
|
41337
41396
|
* @summary Get Workflow By Id
|
|
41338
41397
|
* @param {string} id Id of the workflow
|
|
41398
|
+
* @param {boolean} [workflowMetrics] disable workflow metrics
|
|
41339
41399
|
* @param {*} [axiosOptions] Override http request option.
|
|
41340
41400
|
* @throws {RequiredError}
|
|
41341
41401
|
*/
|
|
41342
|
-
getWorkflow: function (id, axiosOptions) {
|
|
41402
|
+
getWorkflow: function (id, workflowMetrics, axiosOptions) {
|
|
41343
41403
|
var _a, _b, _c;
|
|
41344
41404
|
return __awaiter(this, void 0, void 0, function () {
|
|
41345
41405
|
var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
|
|
41346
41406
|
return __generator(this, function (_d) {
|
|
41347
41407
|
switch (_d.label) {
|
|
41348
|
-
case 0: return [4 /*yield*/, localVarAxiosParamCreator.getWorkflow(id, axiosOptions)];
|
|
41408
|
+
case 0: return [4 /*yield*/, localVarAxiosParamCreator.getWorkflow(id, workflowMetrics, axiosOptions)];
|
|
41349
41409
|
case 1:
|
|
41350
41410
|
localVarAxiosArgs = _d.sent();
|
|
41351
41411
|
localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
@@ -41527,16 +41587,20 @@ var WorkflowsApiFp = function (configuration) {
|
|
|
41527
41587
|
/**
|
|
41528
41588
|
* List all workflows in the tenant.
|
|
41529
41589
|
* @summary List Workflows
|
|
41590
|
+
* @param {string} [triggerId] Trigger ID
|
|
41591
|
+
* @param {string} [connectorInstanceId] Connector Instance ID
|
|
41592
|
+
* @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
41593
|
+
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
41530
41594
|
* @param {*} [axiosOptions] Override http request option.
|
|
41531
41595
|
* @throws {RequiredError}
|
|
41532
41596
|
*/
|
|
41533
|
-
listWorkflows: function (axiosOptions) {
|
|
41597
|
+
listWorkflows: function (triggerId, connectorInstanceId, limit, offset, axiosOptions) {
|
|
41534
41598
|
var _a, _b, _c;
|
|
41535
41599
|
return __awaiter(this, void 0, void 0, function () {
|
|
41536
41600
|
var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
|
|
41537
41601
|
return __generator(this, function (_d) {
|
|
41538
41602
|
switch (_d.label) {
|
|
41539
|
-
case 0: return [4 /*yield*/, localVarAxiosParamCreator.listWorkflows(axiosOptions)];
|
|
41603
|
+
case 0: return [4 /*yield*/, localVarAxiosParamCreator.listWorkflows(triggerId, connectorInstanceId, limit, offset, axiosOptions)];
|
|
41540
41604
|
case 1:
|
|
41541
41605
|
localVarAxiosArgs = _d.sent();
|
|
41542
41606
|
localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
@@ -41710,7 +41774,7 @@ var WorkflowsApiFactory = function (configuration, basePath, axios) {
|
|
|
41710
41774
|
* @throws {RequiredError}
|
|
41711
41775
|
*/
|
|
41712
41776
|
getWorkflow: function (requestParameters, axiosOptions) {
|
|
41713
|
-
return localVarFp.getWorkflow(requestParameters.id, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
41777
|
+
return localVarFp.getWorkflow(requestParameters.id, requestParameters.workflowMetrics, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
41714
41778
|
},
|
|
41715
41779
|
/**
|
|
41716
41780
|
* Use this API to get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
|
|
@@ -41787,11 +41851,13 @@ var WorkflowsApiFactory = function (configuration, basePath, axios) {
|
|
|
41787
41851
|
/**
|
|
41788
41852
|
* List all workflows in the tenant.
|
|
41789
41853
|
* @summary List Workflows
|
|
41854
|
+
* @param {WorkflowsApiListWorkflowsRequest} requestParameters Request parameters.
|
|
41790
41855
|
* @param {*} [axiosOptions] Override http request option.
|
|
41791
41856
|
* @throws {RequiredError}
|
|
41792
41857
|
*/
|
|
41793
|
-
listWorkflows: function (axiosOptions) {
|
|
41794
|
-
|
|
41858
|
+
listWorkflows: function (requestParameters, axiosOptions) {
|
|
41859
|
+
if (requestParameters === void 0) { requestParameters = {}; }
|
|
41860
|
+
return localVarFp.listWorkflows(requestParameters.triggerId, requestParameters.connectorInstanceId, requestParameters.limit, requestParameters.offset, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
41795
41861
|
},
|
|
41796
41862
|
/**
|
|
41797
41863
|
* Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
|
|
@@ -41917,7 +41983,7 @@ var WorkflowsApi = /** @class */ (function (_super) {
|
|
|
41917
41983
|
*/
|
|
41918
41984
|
WorkflowsApi.prototype.getWorkflow = function (requestParameters, axiosOptions) {
|
|
41919
41985
|
var _this = this;
|
|
41920
|
-
return (0, exports.WorkflowsApiFp)(this.configuration).getWorkflow(requestParameters.id, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
41986
|
+
return (0, exports.WorkflowsApiFp)(this.configuration).getWorkflow(requestParameters.id, requestParameters.workflowMetrics, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
41921
41987
|
};
|
|
41922
41988
|
/**
|
|
41923
41989
|
* Use this API to get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
|
|
@@ -42008,13 +42074,15 @@ var WorkflowsApi = /** @class */ (function (_super) {
|
|
|
42008
42074
|
/**
|
|
42009
42075
|
* List all workflows in the tenant.
|
|
42010
42076
|
* @summary List Workflows
|
|
42077
|
+
* @param {WorkflowsApiListWorkflowsRequest} requestParameters Request parameters.
|
|
42011
42078
|
* @param {*} [axiosOptions] Override http request option.
|
|
42012
42079
|
* @throws {RequiredError}
|
|
42013
42080
|
* @memberof WorkflowsApi
|
|
42014
42081
|
*/
|
|
42015
|
-
WorkflowsApi.prototype.listWorkflows = function (axiosOptions) {
|
|
42082
|
+
WorkflowsApi.prototype.listWorkflows = function (requestParameters, axiosOptions) {
|
|
42016
42083
|
var _this = this;
|
|
42017
|
-
|
|
42084
|
+
if (requestParameters === void 0) { requestParameters = {}; }
|
|
42085
|
+
return (0, exports.WorkflowsApiFp)(this.configuration).listWorkflows(requestParameters.triggerId, requestParameters.connectorInstanceId, requestParameters.limit, requestParameters.offset, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
42018
42086
|
};
|
|
42019
42087
|
/**
|
|
42020
42088
|
* Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
|