sailpoint-api-client 1.5.0 → 1.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/v2024/api.ts CHANGED
@@ -2322,6 +2322,18 @@ export interface AccessRequestItemV2024 {
2322
2322
  * @memberof AccessRequestItemV2024
2323
2323
  */
2324
2324
  'removeDate'?: string;
2325
+ /**
2326
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
2327
+ * @type {string}
2328
+ * @memberof AccessRequestItemV2024
2329
+ */
2330
+ 'assignmentId'?: string | null;
2331
+ /**
2332
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
2333
+ * @type {string}
2334
+ * @memberof AccessRequestItemV2024
2335
+ */
2336
+ 'nativeIdentity'?: string | null;
2325
2337
  }
2326
2338
 
2327
2339
  export const AccessRequestItemV2024TypeV2024 = {
@@ -3001,6 +3013,12 @@ export interface AccessRequestV2024 {
3001
3013
  * @memberof AccessRequestV2024
3002
3014
  */
3003
3015
  'clientMetadata'?: { [key: string]: string; };
3016
+ /**
3017
+ * Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
3018
+ * @type {Array<RequestedForDtoRefV2024>}
3019
+ * @memberof AccessRequestV2024
3020
+ */
3021
+ 'requestedForWithRequestedItems'?: Array<RequestedForDtoRefV2024> | null;
3004
3022
  }
3005
3023
 
3006
3024
 
@@ -4584,6 +4602,64 @@ export interface AccountInfoDtoV2024 {
4584
4602
  */
4585
4603
  'uuid'?: string;
4586
4604
  }
4605
+ /**
4606
+ *
4607
+ * @export
4608
+ * @interface AccountInfoRefV2024
4609
+ */
4610
+ export interface AccountInfoRefV2024 {
4611
+ /**
4612
+ * The uuid for the account, available under the \'objectguid\' attribute
4613
+ * @type {string}
4614
+ * @memberof AccountInfoRefV2024
4615
+ */
4616
+ 'uuid'?: string;
4617
+ /**
4618
+ * The \'distinguishedName\' attribute for the account
4619
+ * @type {string}
4620
+ * @memberof AccountInfoRefV2024
4621
+ */
4622
+ 'nativeIdentity'?: string;
4623
+ /**
4624
+ *
4625
+ * @type {DtoTypeV2024}
4626
+ * @memberof AccountInfoRefV2024
4627
+ */
4628
+ 'type'?: DtoTypeV2024;
4629
+ /**
4630
+ * The account id
4631
+ * @type {string}
4632
+ * @memberof AccountInfoRefV2024
4633
+ */
4634
+ 'id'?: string;
4635
+ /**
4636
+ * The account display name
4637
+ * @type {string}
4638
+ * @memberof AccountInfoRefV2024
4639
+ */
4640
+ 'name'?: string;
4641
+ }
4642
+
4643
+
4644
+ /**
4645
+ *
4646
+ * @export
4647
+ * @interface AccountItemRefV2024
4648
+ */
4649
+ export interface AccountItemRefV2024 {
4650
+ /**
4651
+ * The uuid for the account, available under the \'objectguid\' attribute
4652
+ * @type {string}
4653
+ * @memberof AccountItemRefV2024
4654
+ */
4655
+ 'accountUuid'?: string | null;
4656
+ /**
4657
+ * The \'distinguishedName\' attribute for the account
4658
+ * @type {string}
4659
+ * @memberof AccountItemRefV2024
4660
+ */
4661
+ 'nativeIdentity'?: string;
4662
+ }
4587
4663
  /**
4588
4664
  * If an account activity item is associated with an access request, captures details of that request.
4589
4665
  * @export
@@ -5369,6 +5445,52 @@ export interface AccountsExportReportArgumentsV2024 {
5369
5445
  */
5370
5446
  'sourceName': string;
5371
5447
  }
5448
+ /**
5449
+ *
5450
+ * @export
5451
+ * @interface AccountsSelectionRequestV2024
5452
+ */
5453
+ export interface AccountsSelectionRequestV2024 {
5454
+ /**
5455
+ * A list of Identity IDs for whom the Access is requested.
5456
+ * @type {Array<string>}
5457
+ * @memberof AccountsSelectionRequestV2024
5458
+ */
5459
+ 'requestedFor': Array<string>;
5460
+ /**
5461
+ *
5462
+ * @type {AccessRequestTypeV2024}
5463
+ * @memberof AccountsSelectionRequestV2024
5464
+ */
5465
+ 'requestType'?: AccessRequestTypeV2024 | null;
5466
+ /**
5467
+ *
5468
+ * @type {Array<AccessRequestItemV2024>}
5469
+ * @memberof AccountsSelectionRequestV2024
5470
+ */
5471
+ 'requestedItems': Array<AccessRequestItemV2024>;
5472
+ /**
5473
+ * Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities.
5474
+ * @type {{ [key: string]: string; }}
5475
+ * @memberof AccountsSelectionRequestV2024
5476
+ */
5477
+ 'clientMetadata'?: { [key: string]: string; };
5478
+ }
5479
+
5480
+
5481
+ /**
5482
+ *
5483
+ * @export
5484
+ * @interface AccountsSelectionResponseV2024
5485
+ */
5486
+ export interface AccountsSelectionResponseV2024 {
5487
+ /**
5488
+ * A list of available account selections per identity in the request, for all the requested items
5489
+ * @type {Array<IdentityAccountSelectionsV2024>}
5490
+ * @memberof AccountsSelectionResponseV2024
5491
+ */
5492
+ 'identities'?: Array<IdentityAccountSelectionsV2024>;
5493
+ }
5372
5494
  /**
5373
5495
  *
5374
5496
  * @export
@@ -6739,7 +6861,8 @@ export const AttributeDefinitionTypeV2024 = {
6739
6861
  String: 'STRING',
6740
6862
  Long: 'LONG',
6741
6863
  Int: 'INT',
6742
- Boolean: 'BOOLEAN'
6864
+ Boolean: 'BOOLEAN',
6865
+ Date: 'DATE'
6743
6866
  } as const;
6744
6867
 
6745
6868
  export type AttributeDefinitionTypeV2024 = typeof AttributeDefinitionTypeV2024[keyof typeof AttributeDefinitionTypeV2024];
@@ -16297,6 +16420,33 @@ export interface FeatureValueDtoV2024 {
16297
16420
  */
16298
16421
  'denominator'?: number;
16299
16422
  }
16423
+ /**
16424
+ *
16425
+ * @export
16426
+ * @interface FederationProtocolDetailsV2024
16427
+ */
16428
+ export interface FederationProtocolDetailsV2024 {
16429
+ /**
16430
+ * Federation protocol role
16431
+ * @type {string}
16432
+ * @memberof FederationProtocolDetailsV2024
16433
+ */
16434
+ 'role'?: FederationProtocolDetailsV2024RoleV2024;
16435
+ /**
16436
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
16437
+ * @type {string}
16438
+ * @memberof FederationProtocolDetailsV2024
16439
+ */
16440
+ 'entityId'?: string;
16441
+ }
16442
+
16443
+ export const FederationProtocolDetailsV2024RoleV2024 = {
16444
+ SamlIdp: 'SAML_IDP',
16445
+ SamlSp: 'SAML_SP'
16446
+ } as const;
16447
+
16448
+ export type FederationProtocolDetailsV2024RoleV2024 = typeof FederationProtocolDetailsV2024RoleV2024[keyof typeof FederationProtocolDetailsV2024RoleV2024];
16449
+
16300
16450
  /**
16301
16451
  *
16302
16452
  * @export
@@ -17530,6 +17680,188 @@ export const GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV
17530
17680
 
17531
17681
  export type GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024 = typeof GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024[keyof typeof GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024];
17532
17682
 
17683
+ /**
17684
+ *
17685
+ * @export
17686
+ * @interface GetCampaign200ResponseV2024
17687
+ */
17688
+ export interface GetCampaign200ResponseV2024 {
17689
+ /**
17690
+ * Id of the campaign
17691
+ * @type {string}
17692
+ * @memberof GetCampaign200ResponseV2024
17693
+ */
17694
+ 'id'?: string | null;
17695
+ /**
17696
+ * The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
17697
+ * @type {string}
17698
+ * @memberof GetCampaign200ResponseV2024
17699
+ */
17700
+ 'name': string;
17701
+ /**
17702
+ * The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
17703
+ * @type {string}
17704
+ * @memberof GetCampaign200ResponseV2024
17705
+ */
17706
+ 'description': string | null;
17707
+ /**
17708
+ * The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
17709
+ * @type {string}
17710
+ * @memberof GetCampaign200ResponseV2024
17711
+ */
17712
+ 'deadline'?: string | null;
17713
+ /**
17714
+ * The type of campaign. Could be extended in the future.
17715
+ * @type {string}
17716
+ * @memberof GetCampaign200ResponseV2024
17717
+ */
17718
+ 'type': GetCampaign200ResponseV2024TypeV2024;
17719
+ /**
17720
+ * Enables email notification for this campaign
17721
+ * @type {boolean}
17722
+ * @memberof GetCampaign200ResponseV2024
17723
+ */
17724
+ 'emailNotificationEnabled'?: boolean;
17725
+ /**
17726
+ * Allows auto revoke for this campaign
17727
+ * @type {boolean}
17728
+ * @memberof GetCampaign200ResponseV2024
17729
+ */
17730
+ 'autoRevokeAllowed'?: boolean;
17731
+ /**
17732
+ * Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
17733
+ * @type {boolean}
17734
+ * @memberof GetCampaign200ResponseV2024
17735
+ */
17736
+ 'recommendationsEnabled'?: boolean;
17737
+ /**
17738
+ * The campaign\'s current status.
17739
+ * @type {string}
17740
+ * @memberof GetCampaign200ResponseV2024
17741
+ */
17742
+ 'status'?: GetCampaign200ResponseV2024StatusV2024 | null;
17743
+ /**
17744
+ * The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
17745
+ * @type {string}
17746
+ * @memberof GetCampaign200ResponseV2024
17747
+ */
17748
+ 'correlatedStatus'?: GetCampaign200ResponseV2024CorrelatedStatusV2024;
17749
+ /**
17750
+ * Created time of the campaign
17751
+ * @type {string}
17752
+ * @memberof GetCampaign200ResponseV2024
17753
+ */
17754
+ 'created'?: string | null;
17755
+ /**
17756
+ * The total number of certifications in this campaign.
17757
+ * @type {number}
17758
+ * @memberof GetCampaign200ResponseV2024
17759
+ */
17760
+ 'totalCertifications'?: number | null;
17761
+ /**
17762
+ * The number of completed certifications in this campaign.
17763
+ * @type {number}
17764
+ * @memberof GetCampaign200ResponseV2024
17765
+ */
17766
+ 'completedCertifications'?: number | null;
17767
+ /**
17768
+ * A list of errors and warnings that have accumulated.
17769
+ * @type {Array<CampaignAlertV2024>}
17770
+ * @memberof GetCampaign200ResponseV2024
17771
+ */
17772
+ 'alerts'?: Array<CampaignAlertV2024> | null;
17773
+ /**
17774
+ * Modified time of the campaign
17775
+ * @type {string}
17776
+ * @memberof GetCampaign200ResponseV2024
17777
+ */
17778
+ 'modified'?: string | null;
17779
+ /**
17780
+ *
17781
+ * @type {CampaignAllOfFilterV2024}
17782
+ * @memberof GetCampaign200ResponseV2024
17783
+ */
17784
+ 'filter'?: CampaignAllOfFilterV2024 | null;
17785
+ /**
17786
+ * Determines if comments on sunset date changes are required.
17787
+ * @type {boolean}
17788
+ * @memberof GetCampaign200ResponseV2024
17789
+ */
17790
+ 'sunsetCommentsRequired'?: boolean;
17791
+ /**
17792
+ *
17793
+ * @type {CampaignAllOfSourceOwnerCampaignInfoV2024}
17794
+ * @memberof GetCampaign200ResponseV2024
17795
+ */
17796
+ 'sourceOwnerCampaignInfo'?: CampaignAllOfSourceOwnerCampaignInfoV2024 | null;
17797
+ /**
17798
+ *
17799
+ * @type {CampaignAllOfSearchCampaignInfoV2024}
17800
+ * @memberof GetCampaign200ResponseV2024
17801
+ */
17802
+ 'searchCampaignInfo'?: CampaignAllOfSearchCampaignInfoV2024 | null;
17803
+ /**
17804
+ *
17805
+ * @type {CampaignAllOfRoleCompositionCampaignInfoV2024}
17806
+ * @memberof GetCampaign200ResponseV2024
17807
+ */
17808
+ 'roleCompositionCampaignInfo'?: CampaignAllOfRoleCompositionCampaignInfoV2024 | null;
17809
+ /**
17810
+ *
17811
+ * @type {CampaignAllOfMachineAccountCampaignInfoV2024}
17812
+ * @memberof GetCampaign200ResponseV2024
17813
+ */
17814
+ 'machineAccountCampaignInfo'?: CampaignAllOfMachineAccountCampaignInfoV2024 | null;
17815
+ /**
17816
+ * A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
17817
+ * @type {Array<CampaignAllOfSourcesWithOrphanEntitlementsV2024>}
17818
+ * @memberof GetCampaign200ResponseV2024
17819
+ */
17820
+ 'sourcesWithOrphanEntitlements'?: Array<CampaignAllOfSourcesWithOrphanEntitlementsV2024> | null;
17821
+ /**
17822
+ * Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
17823
+ * @type {string}
17824
+ * @memberof GetCampaign200ResponseV2024
17825
+ */
17826
+ 'mandatoryCommentRequirement'?: GetCampaign200ResponseV2024MandatoryCommentRequirementV2024;
17827
+ }
17828
+
17829
+ export const GetCampaign200ResponseV2024TypeV2024 = {
17830
+ Manager: 'MANAGER',
17831
+ SourceOwner: 'SOURCE_OWNER',
17832
+ Search: 'SEARCH',
17833
+ RoleComposition: 'ROLE_COMPOSITION',
17834
+ MachineAccount: 'MACHINE_ACCOUNT'
17835
+ } as const;
17836
+
17837
+ export type GetCampaign200ResponseV2024TypeV2024 = typeof GetCampaign200ResponseV2024TypeV2024[keyof typeof GetCampaign200ResponseV2024TypeV2024];
17838
+ export const GetCampaign200ResponseV2024StatusV2024 = {
17839
+ Pending: 'PENDING',
17840
+ Staged: 'STAGED',
17841
+ Canceling: 'CANCELING',
17842
+ Activating: 'ACTIVATING',
17843
+ Active: 'ACTIVE',
17844
+ Completing: 'COMPLETING',
17845
+ Completed: 'COMPLETED',
17846
+ Error: 'ERROR',
17847
+ Archived: 'ARCHIVED'
17848
+ } as const;
17849
+
17850
+ export type GetCampaign200ResponseV2024StatusV2024 = typeof GetCampaign200ResponseV2024StatusV2024[keyof typeof GetCampaign200ResponseV2024StatusV2024];
17851
+ export const GetCampaign200ResponseV2024CorrelatedStatusV2024 = {
17852
+ Correlated: 'CORRELATED',
17853
+ Uncorrelated: 'UNCORRELATED'
17854
+ } as const;
17855
+
17856
+ export type GetCampaign200ResponseV2024CorrelatedStatusV2024 = typeof GetCampaign200ResponseV2024CorrelatedStatusV2024[keyof typeof GetCampaign200ResponseV2024CorrelatedStatusV2024];
17857
+ export const GetCampaign200ResponseV2024MandatoryCommentRequirementV2024 = {
17858
+ AllDecisions: 'ALL_DECISIONS',
17859
+ RevokeOnlyDecisions: 'REVOKE_ONLY_DECISIONS',
17860
+ NoDecisions: 'NO_DECISIONS'
17861
+ } as const;
17862
+
17863
+ export type GetCampaign200ResponseV2024MandatoryCommentRequirementV2024 = typeof GetCampaign200ResponseV2024MandatoryCommentRequirementV2024[keyof typeof GetCampaign200ResponseV2024MandatoryCommentRequirementV2024];
17864
+
17533
17865
  /**
17534
17866
  * @type GetDiscoveredApplications200ResponseInnerV2024
17535
17867
  * @export
@@ -18101,6 +18433,45 @@ export interface Identity1V2024 {
18101
18433
  */
18102
18434
  export type IdentityAccessV2024 = { type: 'ACCESS_PROFILE' } & AccessProfileSummaryV2024 | { type: 'ENTITLEMENT' } & AccessProfileEntitlementV2024 | { type: 'ROLE' } & AccessProfileRoleV2024;
18103
18435
 
18436
+ /**
18437
+ *
18438
+ * @export
18439
+ * @interface IdentityAccountSelectionsV2024
18440
+ */
18441
+ export interface IdentityAccountSelectionsV2024 {
18442
+ /**
18443
+ * Available account selections for the identity, per requested item
18444
+ * @type {Array<RequestedItemAccountSelectionsV2024>}
18445
+ * @memberof IdentityAccountSelectionsV2024
18446
+ */
18447
+ 'requestedItems'?: Array<RequestedItemAccountSelectionsV2024>;
18448
+ /**
18449
+ * A boolean indicating whether any account selections will be required for the user to raise an access request
18450
+ * @type {boolean}
18451
+ * @memberof IdentityAccountSelectionsV2024
18452
+ */
18453
+ 'accountsSelectionRequired'?: boolean;
18454
+ /**
18455
+ *
18456
+ * @type {DtoTypeV2024}
18457
+ * @memberof IdentityAccountSelectionsV2024
18458
+ */
18459
+ 'type'?: DtoTypeV2024;
18460
+ /**
18461
+ * The identity id for the user
18462
+ * @type {string}
18463
+ * @memberof IdentityAccountSelectionsV2024
18464
+ */
18465
+ 'id'?: string;
18466
+ /**
18467
+ * The name of the identity
18468
+ * @type {string}
18469
+ * @memberof IdentityAccountSelectionsV2024
18470
+ */
18471
+ 'name'?: string;
18472
+ }
18473
+
18474
+
18104
18475
  /**
18105
18476
  *
18106
18477
  * @export
@@ -20248,6 +20619,105 @@ export interface IdentityWithNewAccessV2024 {
20248
20619
  */
20249
20620
  'accessRefs': Array<IdentityWithNewAccessAccessRefsInnerV2024>;
20250
20621
  }
20622
+ /**
20623
+ *
20624
+ * @export
20625
+ * @interface IdpDetailsV2024
20626
+ */
20627
+ export interface IdpDetailsV2024 {
20628
+ /**
20629
+ * Federation protocol role
20630
+ * @type {string}
20631
+ * @memberof IdpDetailsV2024
20632
+ */
20633
+ 'role'?: IdpDetailsV2024RoleV2024;
20634
+ /**
20635
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
20636
+ * @type {string}
20637
+ * @memberof IdpDetailsV2024
20638
+ */
20639
+ 'entityId'?: string;
20640
+ /**
20641
+ * Defines the binding used for the SAML flow. Used with IDP configurations.
20642
+ * @type {string}
20643
+ * @memberof IdpDetailsV2024
20644
+ */
20645
+ 'binding'?: string;
20646
+ /**
20647
+ * Specifies the SAML authentication method to use. Used with IDP configurations.
20648
+ * @type {string}
20649
+ * @memberof IdpDetailsV2024
20650
+ */
20651
+ 'authnContext'?: string;
20652
+ /**
20653
+ * The IDP logout URL. Used with IDP configurations.
20654
+ * @type {string}
20655
+ * @memberof IdpDetailsV2024
20656
+ */
20657
+ 'logoutUrl'?: string;
20658
+ /**
20659
+ * Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
20660
+ * @type {boolean}
20661
+ * @memberof IdpDetailsV2024
20662
+ */
20663
+ 'includeAuthnContext'?: boolean;
20664
+ /**
20665
+ * The name id format to use. Used with IDP configurations.
20666
+ * @type {string}
20667
+ * @memberof IdpDetailsV2024
20668
+ */
20669
+ 'nameId'?: string;
20670
+ /**
20671
+ *
20672
+ * @type {JITConfigurationV2024}
20673
+ * @memberof IdpDetailsV2024
20674
+ */
20675
+ 'jitConfiguration'?: JITConfigurationV2024;
20676
+ /**
20677
+ * The Base64-encoded certificate used by the IDP. Used with IDP configurations.
20678
+ * @type {string}
20679
+ * @memberof IdpDetailsV2024
20680
+ */
20681
+ 'cert'?: string;
20682
+ /**
20683
+ * The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
20684
+ * @type {string}
20685
+ * @memberof IdpDetailsV2024
20686
+ */
20687
+ 'loginUrlPost'?: string;
20688
+ /**
20689
+ * The IDP Redirect URL. Used with IDP configurations.
20690
+ * @type {string}
20691
+ * @memberof IdpDetailsV2024
20692
+ */
20693
+ 'loginUrlRedirect'?: string;
20694
+ /**
20695
+ * Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
20696
+ * @type {string}
20697
+ * @memberof IdpDetailsV2024
20698
+ */
20699
+ 'mappingAttribute': string;
20700
+ /**
20701
+ * The expiration date extracted from the certificate.
20702
+ * @type {string}
20703
+ * @memberof IdpDetailsV2024
20704
+ */
20705
+ 'certificateExpirationDate'?: string;
20706
+ /**
20707
+ * The name extracted from the certificate.
20708
+ * @type {string}
20709
+ * @memberof IdpDetailsV2024
20710
+ */
20711
+ 'certificateName'?: string;
20712
+ }
20713
+
20714
+ export const IdpDetailsV2024RoleV2024 = {
20715
+ SamlIdp: 'SAML_IDP',
20716
+ SamlSp: 'SAML_SP'
20717
+ } as const;
20718
+
20719
+ export type IdpDetailsV2024RoleV2024 = typeof IdpDetailsV2024RoleV2024[keyof typeof IdpDetailsV2024RoleV2024];
20720
+
20251
20721
  /**
20252
20722
  *
20253
20723
  * @export
@@ -20693,6 +21163,31 @@ export interface InvocationV2024 {
20693
21163
  */
20694
21164
  'contentJson'?: object;
20695
21165
  }
21166
+ /**
21167
+ *
21168
+ * @export
21169
+ * @interface JITConfigurationV2024
21170
+ */
21171
+ export interface JITConfigurationV2024 {
21172
+ /**
21173
+ * The indicator for just-in-time provisioning enabled
21174
+ * @type {boolean}
21175
+ * @memberof JITConfigurationV2024
21176
+ */
21177
+ 'enabled'?: boolean;
21178
+ /**
21179
+ * the sourceId that mapped to just-in-time provisioning configuration
21180
+ * @type {string}
21181
+ * @memberof JITConfigurationV2024
21182
+ */
21183
+ 'sourceId'?: string;
21184
+ /**
21185
+ * A mapping of identity profile attribute names to SAML assertion attribute names
21186
+ * @type {{ [key: string]: string; }}
21187
+ * @memberof JITConfigurationV2024
21188
+ */
21189
+ 'sourceAttributeMappings'?: { [key: string]: string; };
21190
+ }
20696
21191
  /**
20697
21192
  * A JSONPatch Operation as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902)
20698
21193
  * @export
@@ -21038,7 +21533,8 @@ export interface LifecyclestateDeletedV2024 {
21038
21533
  }
21039
21534
 
21040
21535
  export const LifecyclestateDeletedV2024TypeV2024 = {
21041
- LifecycleState: 'LIFECYCLE_STATE'
21536
+ LifecycleState: 'LIFECYCLE_STATE',
21537
+ TaskResult: 'TASK_RESULT'
21042
21538
  } as const;
21043
21539
 
21044
21540
  export type LifecyclestateDeletedV2024TypeV2024 = typeof LifecyclestateDeletedV2024TypeV2024[keyof typeof LifecyclestateDeletedV2024TypeV2024];
@@ -21788,6 +22284,31 @@ export interface LocalizedMessageV2024 {
21788
22284
  */
21789
22285
  'message': string;
21790
22286
  }
22287
+ /**
22288
+ *
22289
+ * @export
22290
+ * @interface LockoutConfigurationV2024
22291
+ */
22292
+ export interface LockoutConfigurationV2024 {
22293
+ /**
22294
+ * The maximum attempts allowed before lockout occurs.
22295
+ * @type {number}
22296
+ * @memberof LockoutConfigurationV2024
22297
+ */
22298
+ 'maximumAttempts'?: number;
22299
+ /**
22300
+ * The total time in minutes a user will be locked out.
22301
+ * @type {number}
22302
+ * @memberof LockoutConfigurationV2024
22303
+ */
22304
+ 'lockoutDuration'?: number;
22305
+ /**
22306
+ * A rolling window where authentication attempts in a series count towards the maximum before lockout occurs.
22307
+ * @type {number}
22308
+ * @memberof LockoutConfigurationV2024
22309
+ */
22310
+ 'lockoutWindow'?: number;
22311
+ }
21791
22312
  /**
21792
22313
  * The definition of an Identity according to the Reassignment Configuration service
21793
22314
  * @export
@@ -27952,7 +28473,7 @@ export interface ProvisioningPolicyDtoV2024 {
27952
28473
  * @type {string}
27953
28474
  * @memberof ProvisioningPolicyDtoV2024
27954
28475
  */
27955
- 'name': string;
28476
+ 'name': string | null;
27956
28477
  /**
27957
28478
  * the description of the provisioning policy
27958
28479
  * @type {string}
@@ -27985,7 +28506,7 @@ export interface ProvisioningPolicyV2024 {
27985
28506
  * @type {string}
27986
28507
  * @memberof ProvisioningPolicyV2024
27987
28508
  */
27988
- 'name': string;
28509
+ 'name': string | null;
27989
28510
  /**
27990
28511
  * the description of the provisioning policy
27991
28512
  * @type {string}
@@ -29531,6 +30052,83 @@ export interface RequestedAccountRefV2024 {
29531
30052
  }
29532
30053
 
29533
30054
 
30055
+ /**
30056
+ *
30057
+ * @export
30058
+ * @interface RequestedForDtoRefV2024
30059
+ */
30060
+ export interface RequestedForDtoRefV2024 {
30061
+ /**
30062
+ * The identity id for which the access is requested
30063
+ * @type {string}
30064
+ * @memberof RequestedForDtoRefV2024
30065
+ */
30066
+ 'identityId': string;
30067
+ /**
30068
+ * the details for the access items that are requested for the identity
30069
+ * @type {Array<RequestedItemDtoRefV2024>}
30070
+ * @memberof RequestedForDtoRefV2024
30071
+ */
30072
+ 'requestedItems': Array<RequestedItemDtoRefV2024>;
30073
+ }
30074
+ /**
30075
+ *
30076
+ * @export
30077
+ * @interface RequestedItemAccountSelectionsV2024
30078
+ */
30079
+ export interface RequestedItemAccountSelectionsV2024 {
30080
+ /**
30081
+ * The description for this requested item
30082
+ * @type {string}
30083
+ * @memberof RequestedItemAccountSelectionsV2024
30084
+ */
30085
+ 'description'?: string;
30086
+ /**
30087
+ * This field indicates if account selections are not allowed for this requested item. * If true, this field indicates that account selections will not be available for this item and user combination. In this case, no account selections should be provided in the access request for this item and user combination, irrespective of whether the user has single or multiple accounts on a source. * An example is where a user is requesting an access profile that is already assigned to one of their accounts.
30088
+ * @type {boolean}
30089
+ * @memberof RequestedItemAccountSelectionsV2024
30090
+ */
30091
+ 'accountsSelectionBlocked'?: boolean;
30092
+ /**
30093
+ * If account selections are not allowed for an item, this field will denote the reason.
30094
+ * @type {string}
30095
+ * @memberof RequestedItemAccountSelectionsV2024
30096
+ */
30097
+ 'accountsSelectionBlockedReason'?: string | null;
30098
+ /**
30099
+ * The type of the item being requested.
30100
+ * @type {string}
30101
+ * @memberof RequestedItemAccountSelectionsV2024
30102
+ */
30103
+ 'type'?: RequestedItemAccountSelectionsV2024TypeV2024;
30104
+ /**
30105
+ * The id of the requested item
30106
+ * @type {string}
30107
+ * @memberof RequestedItemAccountSelectionsV2024
30108
+ */
30109
+ 'id'?: string;
30110
+ /**
30111
+ * The name of the requested item
30112
+ * @type {string}
30113
+ * @memberof RequestedItemAccountSelectionsV2024
30114
+ */
30115
+ 'name'?: string;
30116
+ /**
30117
+ * The details for the sources and accounts for the requested item and identity combination
30118
+ * @type {Array<SourceAccountSelectionsV2024>}
30119
+ * @memberof RequestedItemAccountSelectionsV2024
30120
+ */
30121
+ 'sources'?: Array<SourceAccountSelectionsV2024>;
30122
+ }
30123
+
30124
+ export const RequestedItemAccountSelectionsV2024TypeV2024 = {
30125
+ AccessProfile: 'ACCESS_PROFILE',
30126
+ Role: 'ROLE',
30127
+ Entitlement: 'ENTITLEMENT'
30128
+ } as const;
30129
+
30130
+ export type RequestedItemAccountSelectionsV2024TypeV2024 = typeof RequestedItemAccountSelectionsV2024TypeV2024[keyof typeof RequestedItemAccountSelectionsV2024TypeV2024];
30131
+
29534
30132
  /**
29535
30133
  *
29536
30134
  * @export
@@ -29559,6 +30157,70 @@ export const RequestedItemDetailsV2024TypeV2024 = {
29559
30157
 
29560
30158
  export type RequestedItemDetailsV2024TypeV2024 = typeof RequestedItemDetailsV2024TypeV2024[keyof typeof RequestedItemDetailsV2024TypeV2024];
29561
30159
 
30160
+ /**
30161
+ *
30162
+ * @export
30163
+ * @interface RequestedItemDtoRefV2024
30164
+ */
30165
+ export interface RequestedItemDtoRefV2024 {
30166
+ /**
30167
+ * The type of the item being requested.
30168
+ * @type {string}
30169
+ * @memberof RequestedItemDtoRefV2024
30170
+ */
30171
+ 'type': RequestedItemDtoRefV2024TypeV2024;
30172
+ /**
30173
+ * ID of Role, Access Profile or Entitlement being requested.
30174
+ * @type {string}
30175
+ * @memberof RequestedItemDtoRefV2024
30176
+ */
30177
+ 'id': string;
30178
+ /**
30179
+ * Comment provided by requester. * Comment is required when the request is of type Revoke Access.
30180
+ * @type {string}
30181
+ * @memberof RequestedItemDtoRefV2024
30182
+ */
30183
+ 'comment'?: string;
30184
+ /**
30185
+ * Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
30186
+ * @type {{ [key: string]: string; }}
30187
+ * @memberof RequestedItemDtoRefV2024
30188
+ */
30189
+ 'clientMetadata'?: { [key: string]: string; };
30190
+ /**
30191
+ * The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
30192
+ * @type {string}
30193
+ * @memberof RequestedItemDtoRefV2024
30194
+ */
30195
+ 'removeDate'?: string;
30196
+ /**
30197
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
30198
+ * @type {string}
30199
+ * @memberof RequestedItemDtoRefV2024
30200
+ */
30201
+ 'assignmentId'?: string | null;
30202
+ /**
30203
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
30204
+ * @type {string}
30205
+ * @memberof RequestedItemDtoRefV2024
30206
+ */
30207
+ 'nativeIdentity'?: string | null;
30208
+ /**
30209
+ * The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
30210
+ * @type {Array<SourceItemRefV2024>}
30211
+ * @memberof RequestedItemDtoRefV2024
30212
+ */
30213
+ 'accountSelection'?: Array<SourceItemRefV2024> | null;
30214
+ }
30215
+
30216
+ export const RequestedItemDtoRefV2024TypeV2024 = {
30217
+ AccessProfile: 'ACCESS_PROFILE',
30218
+ Role: 'ROLE',
30219
+ Entitlement: 'ENTITLEMENT'
30220
+ } as const;
30221
+
30222
+ export type RequestedItemDtoRefV2024TypeV2024 = typeof RequestedItemDtoRefV2024TypeV2024[keyof typeof RequestedItemDtoRefV2024TypeV2024];
30223
+
29562
30224
  /**
29563
30225
  *
29564
30226
  * @export
@@ -35820,6 +36482,179 @@ export const ServiceDeskSourceV2024TypeV2024 = {
35820
36482
 
35821
36483
  export type ServiceDeskSourceV2024TypeV2024 = typeof ServiceDeskSourceV2024TypeV2024[keyof typeof ServiceDeskSourceV2024TypeV2024];
35822
36484
 
36485
+ /**
36486
+ *
36487
+ * @export
36488
+ * @interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36489
+ */
36490
+ export interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2024 {
36491
+ /**
36492
+ * Federation protocol role
36493
+ * @type {string}
36494
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36495
+ */
36496
+ 'role'?: ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024;
36497
+ /**
36498
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
36499
+ * @type {string}
36500
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36501
+ */
36502
+ 'entityId'?: string;
36503
+ /**
36504
+ * Defines the binding used for the SAML flow. Used with IDP configurations.
36505
+ * @type {string}
36506
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36507
+ */
36508
+ 'binding'?: string;
36509
+ /**
36510
+ * Specifies the SAML authentication method to use. Used with IDP configurations.
36511
+ * @type {string}
36512
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36513
+ */
36514
+ 'authnContext'?: string;
36515
+ /**
36516
+ * The IDP logout URL. Used with IDP configurations.
36517
+ * @type {string}
36518
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36519
+ */
36520
+ 'logoutUrl'?: string;
36521
+ /**
36522
+ * Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
36523
+ * @type {boolean}
36524
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36525
+ */
36526
+ 'includeAuthnContext'?: boolean;
36527
+ /**
36528
+ * The name id format to use. Used with IDP configurations.
36529
+ * @type {string}
36530
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36531
+ */
36532
+ 'nameId'?: string;
36533
+ /**
36534
+ *
36535
+ * @type {JITConfigurationV2024}
36536
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36537
+ */
36538
+ 'jitConfiguration'?: JITConfigurationV2024;
36539
+ /**
36540
+ * The Base64-encoded certificate used by the IDP. Used with IDP configurations.
36541
+ * @type {string}
36542
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36543
+ */
36544
+ 'cert'?: string;
36545
+ /**
36546
+ * The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
36547
+ * @type {string}
36548
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36549
+ */
36550
+ 'loginUrlPost'?: string;
36551
+ /**
36552
+ * The IDP Redirect URL. Used with IDP configurations.
36553
+ * @type {string}
36554
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36555
+ */
36556
+ 'loginUrlRedirect'?: string;
36557
+ /**
36558
+ * Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
36559
+ * @type {string}
36560
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36561
+ */
36562
+ 'mappingAttribute': string;
36563
+ /**
36564
+ * The expiration date extracted from the certificate.
36565
+ * @type {string}
36566
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36567
+ */
36568
+ 'certificateExpirationDate'?: string;
36569
+ /**
36570
+ * The name extracted from the certificate.
36571
+ * @type {string}
36572
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36573
+ */
36574
+ 'certificateName'?: string;
36575
+ /**
36576
+ * Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
36577
+ * @type {string}
36578
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36579
+ */
36580
+ 'alias'?: string;
36581
+ /**
36582
+ * The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
36583
+ * @type {string}
36584
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36585
+ */
36586
+ 'callbackUrl': string;
36587
+ /**
36588
+ * The legacy ACS URL used for SAML authentication. Used with SP configurations.
36589
+ * @type {string}
36590
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
36591
+ */
36592
+ 'legacyAcsUrl'?: string;
36593
+ }
36594
+
36595
+ export const ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024 = {
36596
+ SamlIdp: 'SAML_IDP',
36597
+ SamlSp: 'SAML_SP'
36598
+ } as const;
36599
+
36600
+ export type ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024 = typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024[keyof typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024];
36601
+
36602
+ /**
36603
+ * Represents the IdentityNow as Service Provider Configuration allowing customers to log into IDN via an Identity Provider
36604
+ * @export
36605
+ * @interface ServiceProviderConfigurationV2024
36606
+ */
36607
+ export interface ServiceProviderConfigurationV2024 {
36608
+ /**
36609
+ * This determines whether or not the SAML authentication flow is enabled for an org
36610
+ * @type {boolean}
36611
+ * @memberof ServiceProviderConfigurationV2024
36612
+ */
36613
+ 'enabled'?: boolean;
36614
+ /**
36615
+ * This allows basic login with the parameter prompt=true. This is often toggled on when debugging SAML authentication setup. When false, only org admins with MFA-enabled can bypass the IDP.
36616
+ * @type {boolean}
36617
+ * @memberof ServiceProviderConfigurationV2024
36618
+ */
36619
+ 'bypassIdp'?: boolean;
36620
+ /**
36621
+ * This indicates whether or not the SAML configuration is valid.
36622
+ * @type {boolean}
36623
+ * @memberof ServiceProviderConfigurationV2024
36624
+ */
36625
+ 'samlConfigurationValid'?: boolean;
36626
+ /**
36627
+ * A list of the abstract implementations of the Federation Protocol details. Typically, this will include on SpDetails object and one IdpDetails object used in tandem to define a SAML integration between a customer\'s identity provider and a customer\'s SailPoint instance (i.e., the service provider).
36628
+ * @type {Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2024>}
36629
+ * @memberof ServiceProviderConfigurationV2024
36630
+ */
36631
+ 'federationProtocolDetails'?: Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2024>;
36632
+ }
36633
+ /**
36634
+ *
36635
+ * @export
36636
+ * @interface SessionConfigurationV2024
36637
+ */
36638
+ export interface SessionConfigurationV2024 {
36639
+ /**
36640
+ * The maximum time in minutes a session can be idle.
36641
+ * @type {number}
36642
+ * @memberof SessionConfigurationV2024
36643
+ */
36644
+ 'maxIdleTime'?: number;
36645
+ /**
36646
+ * Denotes if \'remember me\' is enabled.
36647
+ * @type {boolean}
36648
+ * @memberof SessionConfigurationV2024
36649
+ */
36650
+ 'rememberMe'?: boolean;
36651
+ /**
36652
+ * The maximum allowable session time in minutes.
36653
+ * @type {number}
36654
+ * @memberof SessionConfigurationV2024
36655
+ */
36656
+ 'maxSessionTime'?: number;
36657
+ }
35823
36658
  /**
35824
36659
  *
35825
36660
  * @export
@@ -36858,6 +37693,39 @@ export interface SourceAccountDeletedV2024 {
36858
37693
  */
36859
37694
  'attributes': { [key: string]: any; };
36860
37695
  }
37696
+ /**
37697
+ *
37698
+ * @export
37699
+ * @interface SourceAccountSelectionsV2024
37700
+ */
37701
+ export interface SourceAccountSelectionsV2024 {
37702
+ /**
37703
+ *
37704
+ * @type {DtoTypeV2024}
37705
+ * @memberof SourceAccountSelectionsV2024
37706
+ */
37707
+ 'type'?: DtoTypeV2024;
37708
+ /**
37709
+ * The source id
37710
+ * @type {string}
37711
+ * @memberof SourceAccountSelectionsV2024
37712
+ */
37713
+ 'id'?: string;
37714
+ /**
37715
+ * The source name
37716
+ * @type {string}
37717
+ * @memberof SourceAccountSelectionsV2024
37718
+ */
37719
+ 'name'?: string;
37720
+ /**
37721
+ * The accounts information for a particular source in the requested item
37722
+ * @type {Array<AccountInfoRefV2024>}
37723
+ * @memberof SourceAccountSelectionsV2024
37724
+ */
37725
+ 'accounts'?: Array<AccountInfoRefV2024>;
37726
+ }
37727
+
37728
+
36861
37729
  /**
36862
37730
  *
36863
37731
  * @export
@@ -37643,6 +38511,25 @@ export const SourceHealthDtoV2024StatusV2024 = {
37643
38511
 
37644
38512
  export type SourceHealthDtoV2024StatusV2024 = typeof SourceHealthDtoV2024StatusV2024[keyof typeof SourceHealthDtoV2024StatusV2024];
37645
38513
 
38514
+ /**
38515
+ *
38516
+ * @export
38517
+ * @interface SourceItemRefV2024
38518
+ */
38519
+ export interface SourceItemRefV2024 {
38520
+ /**
38521
+ * The id for the source on which account selections are made
38522
+ * @type {string}
38523
+ * @memberof SourceItemRefV2024
38524
+ */
38525
+ 'sourceId'?: string | null;
38526
+ /**
38527
+ * A list of account selections on the source. Currently, only one selection per source is supported.
38528
+ * @type {Array<AccountItemRefV2024>}
38529
+ * @memberof SourceItemRefV2024
38530
+ */
38531
+ 'accounts'?: Array<AccountItemRefV2024> | null;
38532
+ }
37646
38533
  /**
37647
38534
  * Reference to management workgroup for the source.
37648
38535
  * @export
@@ -38767,6 +39654,51 @@ export interface SpConfigRulesV2024 {
38767
39654
  */
38768
39655
  'editable'?: boolean;
38769
39656
  }
39657
+ /**
39658
+ *
39659
+ * @export
39660
+ * @interface SpDetailsV2024
39661
+ */
39662
+ export interface SpDetailsV2024 {
39663
+ /**
39664
+ * Federation protocol role
39665
+ * @type {string}
39666
+ * @memberof SpDetailsV2024
39667
+ */
39668
+ 'role'?: SpDetailsV2024RoleV2024;
39669
+ /**
39670
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
39671
+ * @type {string}
39672
+ * @memberof SpDetailsV2024
39673
+ */
39674
+ 'entityId'?: string;
39675
+ /**
39676
+ * Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
39677
+ * @type {string}
39678
+ * @memberof SpDetailsV2024
39679
+ */
39680
+ 'alias'?: string;
39681
+ /**
39682
+ * The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
39683
+ * @type {string}
39684
+ * @memberof SpDetailsV2024
39685
+ */
39686
+ 'callbackUrl': string;
39687
+ /**
39688
+ * The legacy ACS URL used for SAML authentication. Used with SP configurations.
39689
+ * @type {string}
39690
+ * @memberof SpDetailsV2024
39691
+ */
39692
+ 'legacyAcsUrl'?: string;
39693
+ }
39694
+
39695
+ export const SpDetailsV2024RoleV2024 = {
39696
+ SamlIdp: 'SAML_IDP',
39697
+ SamlSp: 'SAML_SP'
39698
+ } as const;
39699
+
39700
+ export type SpDetailsV2024RoleV2024 = typeof SpDetailsV2024RoleV2024[keyof typeof SpDetailsV2024RoleV2024];
39701
+
38770
39702
  /**
38771
39703
  *
38772
39704
  * @export
@@ -46041,7 +46973,7 @@ export const AccessRequestsV2024ApiAxiosParamCreator = function (configuration?:
46041
46973
  };
46042
46974
  },
46043
46975
  /**
46044
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
46976
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
46045
46977
  * @summary Submit Access Request
46046
46978
  * @param {AccessRequestV2024} accessRequestV2024
46047
46979
  * @param {*} [axiosOptions] Override http request option.
@@ -46298,6 +47230,50 @@ export const AccessRequestsV2024ApiAxiosParamCreator = function (configuration?:
46298
47230
  axiosOptions: localVarRequestOptions,
46299
47231
  };
46300
47232
  },
47233
+ /**
47234
+ * Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
47235
+ * @summary Get accounts selections for identity
47236
+ * @param {AccountsSelectionRequestV2024} accountsSelectionRequestV2024
47237
+ * @param {*} [axiosOptions] Override http request option.
47238
+ * @throws {RequiredError}
47239
+ */
47240
+ loadAccountSelections: async (accountsSelectionRequestV2024: AccountsSelectionRequestV2024, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
47241
+ // verify required parameter 'accountsSelectionRequestV2024' is not null or undefined
47242
+ assertParamExists('loadAccountSelections', 'accountsSelectionRequestV2024', accountsSelectionRequestV2024)
47243
+ const localVarPath = `/access-requests/accounts-selection`;
47244
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
47245
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
47246
+ let baseOptions;
47247
+ if (configuration) {
47248
+ baseOptions = configuration.baseOptions;
47249
+ }
47250
+
47251
+ const localVarRequestOptions = { method: 'POST', ...baseOptions, ...axiosOptions};
47252
+ const localVarHeaderParameter = {} as any;
47253
+ const localVarQueryParameter = {} as any;
47254
+
47255
+ // authentication userAuth required
47256
+ // oauth required
47257
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
47258
+
47259
+ // authentication userAuth required
47260
+ // oauth required
47261
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
47262
+
47263
+
47264
+
47265
+ localVarHeaderParameter['Content-Type'] = 'application/json';
47266
+
47267
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
47268
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
47269
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
47270
+ localVarRequestOptions.data = serializeDataIfNeeded(accountsSelectionRequestV2024, localVarRequestOptions, configuration)
47271
+
47272
+ return {
47273
+ url: toPathString(localVarUrlObj),
47274
+ axiosOptions: localVarRequestOptions,
47275
+ };
47276
+ },
46301
47277
  /**
46302
47278
  * This endpoint replaces the current access-request configuration.
46303
47279
  * @summary Update Access Request Configuration
@@ -46406,7 +47382,7 @@ export const AccessRequestsV2024ApiFp = function(configuration?: Configuration)
46406
47382
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
46407
47383
  },
46408
47384
  /**
46409
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
47385
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
46410
47386
  * @summary Submit Access Request
46411
47387
  * @param {AccessRequestV2024} accessRequestV2024
46412
47388
  * @param {*} [axiosOptions] Override http request option.
@@ -46474,6 +47450,19 @@ export const AccessRequestsV2024ApiFp = function(configuration?: Configuration)
46474
47450
  const localVarOperationServerBasePath = operationServerMap['AccessRequestsV2024Api.listAdministratorsAccessRequestStatus']?.[localVarOperationServerIndex]?.url;
46475
47451
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
46476
47452
  },
47453
+ /**
47454
+ * Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
47455
+ * @summary Get accounts selections for identity
47456
+ * @param {AccountsSelectionRequestV2024} accountsSelectionRequestV2024
47457
+ * @param {*} [axiosOptions] Override http request option.
47458
+ * @throws {RequiredError}
47459
+ */
47460
+ async loadAccountSelections(accountsSelectionRequestV2024: AccountsSelectionRequestV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AccountsSelectionResponseV2024>> {
47461
+ const localVarAxiosArgs = await localVarAxiosParamCreator.loadAccountSelections(accountsSelectionRequestV2024, axiosOptions);
47462
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
47463
+ const localVarOperationServerBasePath = operationServerMap['AccessRequestsV2024Api.loadAccountSelections']?.[localVarOperationServerIndex]?.url;
47464
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
47465
+ },
46477
47466
  /**
46478
47467
  * This endpoint replaces the current access-request configuration.
46479
47468
  * @summary Update Access Request Configuration
@@ -46538,7 +47527,7 @@ export const AccessRequestsV2024ApiFactory = function (configuration?: Configura
46538
47527
  return localVarFp.closeAccessRequest(requestParameters.closeAccessRequestV2024, requestParameters.xSailPointExperimental, axiosOptions).then((request) => request(axios, basePath));
46539
47528
  },
46540
47529
  /**
46541
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
47530
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
46542
47531
  * @summary Submit Access Request
46543
47532
  * @param {AccessRequestsV2024ApiCreateAccessRequestRequest} requestParameters Request parameters.
46544
47533
  * @param {*} [axiosOptions] Override http request option.
@@ -46576,6 +47565,16 @@ export const AccessRequestsV2024ApiFactory = function (configuration?: Configura
46576
47565
  listAdministratorsAccessRequestStatus(requestParameters: AccessRequestsV2024ApiListAdministratorsAccessRequestStatusRequest = {}, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<AccessRequestAdminItemStatusV2024>> {
46577
47566
  return localVarFp.listAdministratorsAccessRequestStatus(requestParameters.requestedFor, requestParameters.requestedBy, requestParameters.regardingIdentity, requestParameters.assignedTo, requestParameters.count, requestParameters.limit, requestParameters.offset, requestParameters.filters, requestParameters.sorters, requestParameters.requestState, axiosOptions).then((request) => request(axios, basePath));
46578
47567
  },
47568
+ /**
47569
+ * Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
47570
+ * @summary Get accounts selections for identity
47571
+ * @param {AccessRequestsV2024ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
47572
+ * @param {*} [axiosOptions] Override http request option.
47573
+ * @throws {RequiredError}
47574
+ */
47575
+ loadAccountSelections(requestParameters: AccessRequestsV2024ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<AccountsSelectionResponseV2024> {
47576
+ return localVarFp.loadAccountSelections(requestParameters.accountsSelectionRequestV2024, axiosOptions).then((request) => request(axios, basePath));
47577
+ },
46579
47578
  /**
46580
47579
  * This endpoint replaces the current access-request configuration.
46581
47580
  * @summary Update Access Request Configuration
@@ -46820,6 +47819,20 @@ export interface AccessRequestsV2024ApiListAdministratorsAccessRequestStatusRequ
46820
47819
  readonly requestState?: string
46821
47820
  }
46822
47821
 
47822
+ /**
47823
+ * Request parameters for loadAccountSelections operation in AccessRequestsV2024Api.
47824
+ * @export
47825
+ * @interface AccessRequestsV2024ApiLoadAccountSelectionsRequest
47826
+ */
47827
+ export interface AccessRequestsV2024ApiLoadAccountSelectionsRequest {
47828
+ /**
47829
+ *
47830
+ * @type {AccountsSelectionRequestV2024}
47831
+ * @memberof AccessRequestsV2024ApiLoadAccountSelections
47832
+ */
47833
+ readonly accountsSelectionRequestV2024: AccountsSelectionRequestV2024
47834
+ }
47835
+
46823
47836
  /**
46824
47837
  * Request parameters for setAccessRequestConfig operation in AccessRequestsV2024Api.
46825
47838
  * @export
@@ -46890,7 +47903,7 @@ export class AccessRequestsV2024Api extends BaseAPI {
46890
47903
  }
46891
47904
 
46892
47905
  /**
46893
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
47906
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
46894
47907
  * @summary Submit Access Request
46895
47908
  * @param {AccessRequestsV2024ApiCreateAccessRequestRequest} requestParameters Request parameters.
46896
47909
  * @param {*} [axiosOptions] Override http request option.
@@ -46936,6 +47949,18 @@ export class AccessRequestsV2024Api extends BaseAPI {
46936
47949
  return AccessRequestsV2024ApiFp(this.configuration).listAdministratorsAccessRequestStatus(requestParameters.requestedFor, requestParameters.requestedBy, requestParameters.regardingIdentity, requestParameters.assignedTo, requestParameters.count, requestParameters.limit, requestParameters.offset, requestParameters.filters, requestParameters.sorters, requestParameters.requestState, axiosOptions).then((request) => request(this.axios, this.basePath));
46937
47950
  }
46938
47951
 
47952
+ /**
47953
+ * Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
47954
+ * @summary Get accounts selections for identity
47955
+ * @param {AccessRequestsV2024ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
47956
+ * @param {*} [axiosOptions] Override http request option.
47957
+ * @throws {RequiredError}
47958
+ * @memberof AccessRequestsV2024Api
47959
+ */
47960
+ public loadAccountSelections(requestParameters: AccessRequestsV2024ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig) {
47961
+ return AccessRequestsV2024ApiFp(this.configuration).loadAccountSelections(requestParameters.accountsSelectionRequestV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
47962
+ }
47963
+
46939
47964
  /**
46940
47965
  * This endpoint replaces the current access-request configuration.
46941
47966
  * @summary Update Access Request Configuration
@@ -54875,7 +55900,7 @@ export const CertificationCampaignsV2024ApiFp = function(configuration?: Configu
54875
55900
  * @param {*} [axiosOptions] Override http request option.
54876
55901
  * @throws {RequiredError}
54877
55902
  */
54878
- async getCampaign(id: string, detail?: GetCampaignDetailV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetActiveCampaigns200ResponseInnerV2024>> {
55903
+ async getCampaign(id: string, detail?: GetCampaignDetailV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetCampaign200ResponseV2024>> {
54879
55904
  const localVarAxiosArgs = await localVarAxiosParamCreator.getCampaign(id, detail, axiosOptions);
54880
55905
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
54881
55906
  const localVarOperationServerBasePath = operationServerMap['CertificationCampaignsV2024Api.getCampaign']?.[localVarOperationServerIndex]?.url;
@@ -55159,7 +56184,7 @@ export const CertificationCampaignsV2024ApiFactory = function (configuration?: C
55159
56184
  * @param {*} [axiosOptions] Override http request option.
55160
56185
  * @throws {RequiredError}
55161
56186
  */
55162
- getCampaign(requestParameters: CertificationCampaignsV2024ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetActiveCampaigns200ResponseInnerV2024> {
56187
+ getCampaign(requestParameters: CertificationCampaignsV2024ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetCampaign200ResponseV2024> {
55163
56188
  return localVarFp.getCampaign(requestParameters.id, requestParameters.detail, axiosOptions).then((request) => request(axios, basePath));
55164
56189
  },
55165
56190
  /**
@@ -68797,6 +69822,44 @@ export const GlobalTenantSecuritySettingsV2024ApiAxiosParamCreator = function (c
68797
69822
  axiosOptions: localVarRequestOptions,
68798
69823
  };
68799
69824
  },
69825
+ /**
69826
+ * This API returns the details of an org\'s lockout auth configuration.
69827
+ * @summary Get Auth Org Lockout Configuration.
69828
+ * @param {*} [axiosOptions] Override http request option.
69829
+ * @throws {RequiredError}
69830
+ */
69831
+ getAuthOrgLockoutConfig: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
69832
+ const localVarPath = `/auth-org/lockout-config`;
69833
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
69834
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
69835
+ let baseOptions;
69836
+ if (configuration) {
69837
+ baseOptions = configuration.baseOptions;
69838
+ }
69839
+
69840
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
69841
+ const localVarHeaderParameter = {} as any;
69842
+ const localVarQueryParameter = {} as any;
69843
+
69844
+ // authentication userAuth required
69845
+ // oauth required
69846
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
69847
+
69848
+ // authentication userAuth required
69849
+ // oauth required
69850
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
69851
+
69852
+
69853
+
69854
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
69855
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
69856
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
69857
+
69858
+ return {
69859
+ url: toPathString(localVarUrlObj),
69860
+ axiosOptions: localVarRequestOptions,
69861
+ };
69862
+ },
68800
69863
  /**
68801
69864
  * This API returns the details of an org\'s network auth configuration.
68802
69865
  * @summary Get security network configuration.
@@ -68835,6 +69898,126 @@ export const GlobalTenantSecuritySettingsV2024ApiAxiosParamCreator = function (c
68835
69898
  axiosOptions: localVarRequestOptions,
68836
69899
  };
68837
69900
  },
69901
+ /**
69902
+ * This API returns the details of an org\'s service provider auth configuration.
69903
+ * @summary Get Service Provider Configuration.
69904
+ * @param {*} [axiosOptions] Override http request option.
69905
+ * @throws {RequiredError}
69906
+ */
69907
+ getAuthOrgServiceProviderConfig: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
69908
+ const localVarPath = `/auth-org/service-provider-config`;
69909
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
69910
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
69911
+ let baseOptions;
69912
+ if (configuration) {
69913
+ baseOptions = configuration.baseOptions;
69914
+ }
69915
+
69916
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
69917
+ const localVarHeaderParameter = {} as any;
69918
+ const localVarQueryParameter = {} as any;
69919
+
69920
+ // authentication userAuth required
69921
+ // oauth required
69922
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
69923
+
69924
+ // authentication userAuth required
69925
+ // oauth required
69926
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
69927
+
69928
+
69929
+
69930
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
69931
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
69932
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
69933
+
69934
+ return {
69935
+ url: toPathString(localVarUrlObj),
69936
+ axiosOptions: localVarRequestOptions,
69937
+ };
69938
+ },
69939
+ /**
69940
+ * This API returns the details of an org\'s session auth configuration.
69941
+ * @summary Get Auth Org Session Configuration.
69942
+ * @param {*} [axiosOptions] Override http request option.
69943
+ * @throws {RequiredError}
69944
+ */
69945
+ getAuthOrgSessionConfig: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
69946
+ const localVarPath = `/auth-org/session-config`;
69947
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
69948
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
69949
+ let baseOptions;
69950
+ if (configuration) {
69951
+ baseOptions = configuration.baseOptions;
69952
+ }
69953
+
69954
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
69955
+ const localVarHeaderParameter = {} as any;
69956
+ const localVarQueryParameter = {} as any;
69957
+
69958
+ // authentication userAuth required
69959
+ // oauth required
69960
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
69961
+
69962
+ // authentication userAuth required
69963
+ // oauth required
69964
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
69965
+
69966
+
69967
+
69968
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
69969
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
69970
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
69971
+
69972
+ return {
69973
+ url: toPathString(localVarUrlObj),
69974
+ axiosOptions: localVarRequestOptions,
69975
+ };
69976
+ },
69977
+ /**
69978
+ * This API updates an existing lockout configuration for an org using PATCH
69979
+ * @summary Update Auth Org Lockout Configuration
69980
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: &#x60;1. maximumAttempts &gt;&#x3D; 1 &amp;&amp; maximumAttempts &lt;&#x3D; 15 2. lockoutDuration &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60 3. lockoutWindow &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60&#x60;
69981
+ * @param {*} [axiosOptions] Override http request option.
69982
+ * @throws {RequiredError}
69983
+ */
69984
+ patchAuthOrgLockoutConfig: async (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
69985
+ // verify required parameter 'jsonPatchOperationV2024' is not null or undefined
69986
+ assertParamExists('patchAuthOrgLockoutConfig', 'jsonPatchOperationV2024', jsonPatchOperationV2024)
69987
+ const localVarPath = `/auth-org/lockout-config`;
69988
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
69989
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
69990
+ let baseOptions;
69991
+ if (configuration) {
69992
+ baseOptions = configuration.baseOptions;
69993
+ }
69994
+
69995
+ const localVarRequestOptions = { method: 'PATCH', ...baseOptions, ...axiosOptions};
69996
+ const localVarHeaderParameter = {} as any;
69997
+ const localVarQueryParameter = {} as any;
69998
+
69999
+ // authentication userAuth required
70000
+ // oauth required
70001
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70002
+
70003
+ // authentication userAuth required
70004
+ // oauth required
70005
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70006
+
70007
+
70008
+
70009
+ localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
70010
+
70011
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
70012
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
70013
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
70014
+ localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2024, localVarRequestOptions, configuration)
70015
+
70016
+ return {
70017
+ url: toPathString(localVarUrlObj),
70018
+ axiosOptions: localVarRequestOptions,
70019
+ };
70020
+ },
68838
70021
  /**
68839
70022
  * This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
68840
70023
  * @summary Update security network configuration.
@@ -68867,6 +70050,94 @@ export const GlobalTenantSecuritySettingsV2024ApiAxiosParamCreator = function (c
68867
70050
 
68868
70051
 
68869
70052
 
70053
+ localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
70054
+
70055
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
70056
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
70057
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
70058
+ localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2024, localVarRequestOptions, configuration)
70059
+
70060
+ return {
70061
+ url: toPathString(localVarUrlObj),
70062
+ axiosOptions: localVarRequestOptions,
70063
+ };
70064
+ },
70065
+ /**
70066
+ * This API updates an existing service provider configuration for an org using PATCH.
70067
+ * @summary Update Service Provider Configuration
70068
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
70069
+ * @param {*} [axiosOptions] Override http request option.
70070
+ * @throws {RequiredError}
70071
+ */
70072
+ patchAuthOrgServiceProviderConfig: async (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
70073
+ // verify required parameter 'jsonPatchOperationV2024' is not null or undefined
70074
+ assertParamExists('patchAuthOrgServiceProviderConfig', 'jsonPatchOperationV2024', jsonPatchOperationV2024)
70075
+ const localVarPath = `/auth-org/service-provider-config`;
70076
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
70077
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
70078
+ let baseOptions;
70079
+ if (configuration) {
70080
+ baseOptions = configuration.baseOptions;
70081
+ }
70082
+
70083
+ const localVarRequestOptions = { method: 'PATCH', ...baseOptions, ...axiosOptions};
70084
+ const localVarHeaderParameter = {} as any;
70085
+ const localVarQueryParameter = {} as any;
70086
+
70087
+ // authentication userAuth required
70088
+ // oauth required
70089
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70090
+
70091
+ // authentication userAuth required
70092
+ // oauth required
70093
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70094
+
70095
+
70096
+
70097
+ localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
70098
+
70099
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
70100
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
70101
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
70102
+ localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2024, localVarRequestOptions, configuration)
70103
+
70104
+ return {
70105
+ url: toPathString(localVarUrlObj),
70106
+ axiosOptions: localVarRequestOptions,
70107
+ };
70108
+ },
70109
+ /**
70110
+ * This API updates an existing session configuration for an org using PATCH.
70111
+ * @summary Update Auth Org Session Configuration
70112
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: &#x60;1. maxSessionTime &gt;&#x3D; 1 &amp;&amp; maxSessionTime &lt;&#x3D; 10080 (1 week) 2. maxIdleTime &gt;&#x3D; 1 &amp;&amp; maxIdleTime &lt;&#x3D; 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.&#x60;
70113
+ * @param {*} [axiosOptions] Override http request option.
70114
+ * @throws {RequiredError}
70115
+ */
70116
+ patchAuthOrgSessionConfig: async (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
70117
+ // verify required parameter 'jsonPatchOperationV2024' is not null or undefined
70118
+ assertParamExists('patchAuthOrgSessionConfig', 'jsonPatchOperationV2024', jsonPatchOperationV2024)
70119
+ const localVarPath = `/auth-org/session-config`;
70120
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
70121
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
70122
+ let baseOptions;
70123
+ if (configuration) {
70124
+ baseOptions = configuration.baseOptions;
70125
+ }
70126
+
70127
+ const localVarRequestOptions = { method: 'PATCH', ...baseOptions, ...axiosOptions};
70128
+ const localVarHeaderParameter = {} as any;
70129
+ const localVarQueryParameter = {} as any;
70130
+
70131
+ // authentication userAuth required
70132
+ // oauth required
70133
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70134
+
70135
+ // authentication userAuth required
70136
+ // oauth required
70137
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70138
+
70139
+
70140
+
68870
70141
  localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
68871
70142
 
68872
70143
  setSearchParams(localVarUrlObj, localVarQueryParameter);
@@ -68902,6 +70173,18 @@ export const GlobalTenantSecuritySettingsV2024ApiFp = function(configuration?: C
68902
70173
  const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.createAuthOrgNetworkConfig']?.[localVarOperationServerIndex]?.url;
68903
70174
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
68904
70175
  },
70176
+ /**
70177
+ * This API returns the details of an org\'s lockout auth configuration.
70178
+ * @summary Get Auth Org Lockout Configuration.
70179
+ * @param {*} [axiosOptions] Override http request option.
70180
+ * @throws {RequiredError}
70181
+ */
70182
+ async getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2024>> {
70183
+ const localVarAxiosArgs = await localVarAxiosParamCreator.getAuthOrgLockoutConfig(axiosOptions);
70184
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
70185
+ const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.getAuthOrgLockoutConfig']?.[localVarOperationServerIndex]?.url;
70186
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
70187
+ },
68905
70188
  /**
68906
70189
  * This API returns the details of an org\'s network auth configuration.
68907
70190
  * @summary Get security network configuration.
@@ -68914,6 +70197,43 @@ export const GlobalTenantSecuritySettingsV2024ApiFp = function(configuration?: C
68914
70197
  const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.getAuthOrgNetworkConfig']?.[localVarOperationServerIndex]?.url;
68915
70198
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
68916
70199
  },
70200
+ /**
70201
+ * This API returns the details of an org\'s service provider auth configuration.
70202
+ * @summary Get Service Provider Configuration.
70203
+ * @param {*} [axiosOptions] Override http request option.
70204
+ * @throws {RequiredError}
70205
+ */
70206
+ async getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2024>> {
70207
+ const localVarAxiosArgs = await localVarAxiosParamCreator.getAuthOrgServiceProviderConfig(axiosOptions);
70208
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
70209
+ const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.getAuthOrgServiceProviderConfig']?.[localVarOperationServerIndex]?.url;
70210
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
70211
+ },
70212
+ /**
70213
+ * This API returns the details of an org\'s session auth configuration.
70214
+ * @summary Get Auth Org Session Configuration.
70215
+ * @param {*} [axiosOptions] Override http request option.
70216
+ * @throws {RequiredError}
70217
+ */
70218
+ async getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2024>> {
70219
+ const localVarAxiosArgs = await localVarAxiosParamCreator.getAuthOrgSessionConfig(axiosOptions);
70220
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
70221
+ const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.getAuthOrgSessionConfig']?.[localVarOperationServerIndex]?.url;
70222
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
70223
+ },
70224
+ /**
70225
+ * This API updates an existing lockout configuration for an org using PATCH
70226
+ * @summary Update Auth Org Lockout Configuration
70227
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: &#x60;1. maximumAttempts &gt;&#x3D; 1 &amp;&amp; maximumAttempts &lt;&#x3D; 15 2. lockoutDuration &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60 3. lockoutWindow &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60&#x60;
70228
+ * @param {*} [axiosOptions] Override http request option.
70229
+ * @throws {RequiredError}
70230
+ */
70231
+ async patchAuthOrgLockoutConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2024>> {
70232
+ const localVarAxiosArgs = await localVarAxiosParamCreator.patchAuthOrgLockoutConfig(jsonPatchOperationV2024, axiosOptions);
70233
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
70234
+ const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.patchAuthOrgLockoutConfig']?.[localVarOperationServerIndex]?.url;
70235
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
70236
+ },
68917
70237
  /**
68918
70238
  * This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
68919
70239
  * @summary Update security network configuration.
@@ -68927,6 +70247,32 @@ export const GlobalTenantSecuritySettingsV2024ApiFp = function(configuration?: C
68927
70247
  const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.patchAuthOrgNetworkConfig']?.[localVarOperationServerIndex]?.url;
68928
70248
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
68929
70249
  },
70250
+ /**
70251
+ * This API updates an existing service provider configuration for an org using PATCH.
70252
+ * @summary Update Service Provider Configuration
70253
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
70254
+ * @param {*} [axiosOptions] Override http request option.
70255
+ * @throws {RequiredError}
70256
+ */
70257
+ async patchAuthOrgServiceProviderConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2024>> {
70258
+ const localVarAxiosArgs = await localVarAxiosParamCreator.patchAuthOrgServiceProviderConfig(jsonPatchOperationV2024, axiosOptions);
70259
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
70260
+ const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.patchAuthOrgServiceProviderConfig']?.[localVarOperationServerIndex]?.url;
70261
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
70262
+ },
70263
+ /**
70264
+ * This API updates an existing session configuration for an org using PATCH.
70265
+ * @summary Update Auth Org Session Configuration
70266
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: &#x60;1. maxSessionTime &gt;&#x3D; 1 &amp;&amp; maxSessionTime &lt;&#x3D; 10080 (1 week) 2. maxIdleTime &gt;&#x3D; 1 &amp;&amp; maxIdleTime &lt;&#x3D; 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.&#x60;
70267
+ * @param {*} [axiosOptions] Override http request option.
70268
+ * @throws {RequiredError}
70269
+ */
70270
+ async patchAuthOrgSessionConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2024>> {
70271
+ const localVarAxiosArgs = await localVarAxiosParamCreator.patchAuthOrgSessionConfig(jsonPatchOperationV2024, axiosOptions);
70272
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
70273
+ const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.patchAuthOrgSessionConfig']?.[localVarOperationServerIndex]?.url;
70274
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
70275
+ },
68930
70276
  }
68931
70277
  };
68932
70278
 
@@ -68947,6 +70293,15 @@ export const GlobalTenantSecuritySettingsV2024ApiFactory = function (configurati
68947
70293
  createAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiCreateAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2024> {
68948
70294
  return localVarFp.createAuthOrgNetworkConfig(requestParameters.networkConfigurationV2024, axiosOptions).then((request) => request(axios, basePath));
68949
70295
  },
70296
+ /**
70297
+ * This API returns the details of an org\'s lockout auth configuration.
70298
+ * @summary Get Auth Org Lockout Configuration.
70299
+ * @param {*} [axiosOptions] Override http request option.
70300
+ * @throws {RequiredError}
70301
+ */
70302
+ getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2024> {
70303
+ return localVarFp.getAuthOrgLockoutConfig(axiosOptions).then((request) => request(axios, basePath));
70304
+ },
68950
70305
  /**
68951
70306
  * This API returns the details of an org\'s network auth configuration.
68952
70307
  * @summary Get security network configuration.
@@ -68956,6 +70311,34 @@ export const GlobalTenantSecuritySettingsV2024ApiFactory = function (configurati
68956
70311
  getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2024> {
68957
70312
  return localVarFp.getAuthOrgNetworkConfig(axiosOptions).then((request) => request(axios, basePath));
68958
70313
  },
70314
+ /**
70315
+ * This API returns the details of an org\'s service provider auth configuration.
70316
+ * @summary Get Service Provider Configuration.
70317
+ * @param {*} [axiosOptions] Override http request option.
70318
+ * @throws {RequiredError}
70319
+ */
70320
+ getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2024> {
70321
+ return localVarFp.getAuthOrgServiceProviderConfig(axiosOptions).then((request) => request(axios, basePath));
70322
+ },
70323
+ /**
70324
+ * This API returns the details of an org\'s session auth configuration.
70325
+ * @summary Get Auth Org Session Configuration.
70326
+ * @param {*} [axiosOptions] Override http request option.
70327
+ * @throws {RequiredError}
70328
+ */
70329
+ getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2024> {
70330
+ return localVarFp.getAuthOrgSessionConfig(axiosOptions).then((request) => request(axios, basePath));
70331
+ },
70332
+ /**
70333
+ * This API updates an existing lockout configuration for an org using PATCH
70334
+ * @summary Update Auth Org Lockout Configuration
70335
+ * @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
70336
+ * @param {*} [axiosOptions] Override http request option.
70337
+ * @throws {RequiredError}
70338
+ */
70339
+ patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2024> {
70340
+ return localVarFp.patchAuthOrgLockoutConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(axios, basePath));
70341
+ },
68959
70342
  /**
68960
70343
  * This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
68961
70344
  * @summary Update security network configuration.
@@ -68966,6 +70349,26 @@ export const GlobalTenantSecuritySettingsV2024ApiFactory = function (configurati
68966
70349
  patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2024> {
68967
70350
  return localVarFp.patchAuthOrgNetworkConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(axios, basePath));
68968
70351
  },
70352
+ /**
70353
+ * This API updates an existing service provider configuration for an org using PATCH.
70354
+ * @summary Update Service Provider Configuration
70355
+ * @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
70356
+ * @param {*} [axiosOptions] Override http request option.
70357
+ * @throws {RequiredError}
70358
+ */
70359
+ patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2024> {
70360
+ return localVarFp.patchAuthOrgServiceProviderConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(axios, basePath));
70361
+ },
70362
+ /**
70363
+ * This API updates an existing session configuration for an org using PATCH.
70364
+ * @summary Update Auth Org Session Configuration
70365
+ * @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
70366
+ * @param {*} [axiosOptions] Override http request option.
70367
+ * @throws {RequiredError}
70368
+ */
70369
+ patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2024> {
70370
+ return localVarFp.patchAuthOrgSessionConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(axios, basePath));
70371
+ },
68969
70372
  };
68970
70373
  };
68971
70374
 
@@ -68983,6 +70386,20 @@ export interface GlobalTenantSecuritySettingsV2024ApiCreateAuthOrgNetworkConfigR
68983
70386
  readonly networkConfigurationV2024: NetworkConfigurationV2024
68984
70387
  }
68985
70388
 
70389
+ /**
70390
+ * Request parameters for patchAuthOrgLockoutConfig operation in GlobalTenantSecuritySettingsV2024Api.
70391
+ * @export
70392
+ * @interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest
70393
+ */
70394
+ export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest {
70395
+ /**
70396
+ * A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: &#x60;1. maximumAttempts &gt;&#x3D; 1 &amp;&amp; maximumAttempts &lt;&#x3D; 15 2. lockoutDuration &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60 3. lockoutWindow &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60&#x60;
70397
+ * @type {Array<JsonPatchOperationV2024>}
70398
+ * @memberof GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfig
70399
+ */
70400
+ readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>
70401
+ }
70402
+
68986
70403
  /**
68987
70404
  * Request parameters for patchAuthOrgNetworkConfig operation in GlobalTenantSecuritySettingsV2024Api.
68988
70405
  * @export
@@ -68997,6 +70414,34 @@ export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgNetworkConfigRe
68997
70414
  readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>
68998
70415
  }
68999
70416
 
70417
+ /**
70418
+ * Request parameters for patchAuthOrgServiceProviderConfig operation in GlobalTenantSecuritySettingsV2024Api.
70419
+ * @export
70420
+ * @interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest
70421
+ */
70422
+ export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest {
70423
+ /**
70424
+ * A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
70425
+ * @type {Array<JsonPatchOperationV2024>}
70426
+ * @memberof GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfig
70427
+ */
70428
+ readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>
70429
+ }
70430
+
70431
+ /**
70432
+ * Request parameters for patchAuthOrgSessionConfig operation in GlobalTenantSecuritySettingsV2024Api.
70433
+ * @export
70434
+ * @interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest
70435
+ */
70436
+ export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest {
70437
+ /**
70438
+ * A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: &#x60;1. maxSessionTime &gt;&#x3D; 1 &amp;&amp; maxSessionTime &lt;&#x3D; 10080 (1 week) 2. maxIdleTime &gt;&#x3D; 1 &amp;&amp; maxIdleTime &lt;&#x3D; 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.&#x60;
70439
+ * @type {Array<JsonPatchOperationV2024>}
70440
+ * @memberof GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfig
70441
+ */
70442
+ readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>
70443
+ }
70444
+
69000
70445
  /**
69001
70446
  * GlobalTenantSecuritySettingsV2024Api - object-oriented interface
69002
70447
  * @export
@@ -69016,6 +70461,17 @@ export class GlobalTenantSecuritySettingsV2024Api extends BaseAPI {
69016
70461
  return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).createAuthOrgNetworkConfig(requestParameters.networkConfigurationV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
69017
70462
  }
69018
70463
 
70464
+ /**
70465
+ * This API returns the details of an org\'s lockout auth configuration.
70466
+ * @summary Get Auth Org Lockout Configuration.
70467
+ * @param {*} [axiosOptions] Override http request option.
70468
+ * @throws {RequiredError}
70469
+ * @memberof GlobalTenantSecuritySettingsV2024Api
70470
+ */
70471
+ public getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig) {
70472
+ return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).getAuthOrgLockoutConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
70473
+ }
70474
+
69019
70475
  /**
69020
70476
  * This API returns the details of an org\'s network auth configuration.
69021
70477
  * @summary Get security network configuration.
@@ -69027,6 +70483,40 @@ export class GlobalTenantSecuritySettingsV2024Api extends BaseAPI {
69027
70483
  return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).getAuthOrgNetworkConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
69028
70484
  }
69029
70485
 
70486
+ /**
70487
+ * This API returns the details of an org\'s service provider auth configuration.
70488
+ * @summary Get Service Provider Configuration.
70489
+ * @param {*} [axiosOptions] Override http request option.
70490
+ * @throws {RequiredError}
70491
+ * @memberof GlobalTenantSecuritySettingsV2024Api
70492
+ */
70493
+ public getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig) {
70494
+ return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).getAuthOrgServiceProviderConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
70495
+ }
70496
+
70497
+ /**
70498
+ * This API returns the details of an org\'s session auth configuration.
70499
+ * @summary Get Auth Org Session Configuration.
70500
+ * @param {*} [axiosOptions] Override http request option.
70501
+ * @throws {RequiredError}
70502
+ * @memberof GlobalTenantSecuritySettingsV2024Api
70503
+ */
70504
+ public getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig) {
70505
+ return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).getAuthOrgSessionConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
70506
+ }
70507
+
70508
+ /**
70509
+ * This API updates an existing lockout configuration for an org using PATCH
70510
+ * @summary Update Auth Org Lockout Configuration
70511
+ * @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
70512
+ * @param {*} [axiosOptions] Override http request option.
70513
+ * @throws {RequiredError}
70514
+ * @memberof GlobalTenantSecuritySettingsV2024Api
70515
+ */
70516
+ public patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
70517
+ return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).patchAuthOrgLockoutConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
70518
+ }
70519
+
69030
70520
  /**
69031
70521
  * This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
69032
70522
  * @summary Update security network configuration.
@@ -69038,6 +70528,30 @@ export class GlobalTenantSecuritySettingsV2024Api extends BaseAPI {
69038
70528
  public patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
69039
70529
  return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).patchAuthOrgNetworkConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
69040
70530
  }
70531
+
70532
+ /**
70533
+ * This API updates an existing service provider configuration for an org using PATCH.
70534
+ * @summary Update Service Provider Configuration
70535
+ * @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
70536
+ * @param {*} [axiosOptions] Override http request option.
70537
+ * @throws {RequiredError}
70538
+ * @memberof GlobalTenantSecuritySettingsV2024Api
70539
+ */
70540
+ public patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
70541
+ return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).patchAuthOrgServiceProviderConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
70542
+ }
70543
+
70544
+ /**
70545
+ * This API updates an existing session configuration for an org using PATCH.
70546
+ * @summary Update Auth Org Session Configuration
70547
+ * @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
70548
+ * @param {*} [axiosOptions] Override http request option.
70549
+ * @throws {RequiredError}
70550
+ * @memberof GlobalTenantSecuritySettingsV2024Api
70551
+ */
70552
+ public patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
70553
+ return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).patchAuthOrgSessionConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
70554
+ }
69041
70555
  }
69042
70556
 
69043
70557