sailpoint-api-client 1.5.0 → 1.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/v2025/api.ts CHANGED
@@ -2223,6 +2223,64 @@ export interface AccessRequestDynamicApproverV2025 {
2223
2223
  */
2224
2224
  'requestedBy': AccessItemRequesterDtoV2025;
2225
2225
  }
2226
+ /**
2227
+ *
2228
+ * @export
2229
+ * @interface AccessRequestItem1V2025
2230
+ */
2231
+ export interface AccessRequestItem1V2025 {
2232
+ /**
2233
+ * The type of the item being requested.
2234
+ * @type {string}
2235
+ * @memberof AccessRequestItem1V2025
2236
+ */
2237
+ 'type': AccessRequestItem1V2025TypeV2025;
2238
+ /**
2239
+ * ID of Role, Access Profile or Entitlement being requested.
2240
+ * @type {string}
2241
+ * @memberof AccessRequestItem1V2025
2242
+ */
2243
+ 'id': string;
2244
+ /**
2245
+ * Comment provided by requester. * Comment is required when the request is of type Revoke Access.
2246
+ * @type {string}
2247
+ * @memberof AccessRequestItem1V2025
2248
+ */
2249
+ 'comment'?: string;
2250
+ /**
2251
+ * Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
2252
+ * @type {{ [key: string]: string; }}
2253
+ * @memberof AccessRequestItem1V2025
2254
+ */
2255
+ 'clientMetadata'?: { [key: string]: string; };
2256
+ /**
2257
+ * The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
2258
+ * @type {string}
2259
+ * @memberof AccessRequestItem1V2025
2260
+ */
2261
+ 'removeDate'?: string;
2262
+ /**
2263
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
2264
+ * @type {string}
2265
+ * @memberof AccessRequestItem1V2025
2266
+ */
2267
+ 'assignmentId'?: string | null;
2268
+ /**
2269
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
2270
+ * @type {string}
2271
+ * @memberof AccessRequestItem1V2025
2272
+ */
2273
+ 'nativeIdentity'?: string | null;
2274
+ }
2275
+
2276
+ export const AccessRequestItem1V2025TypeV2025 = {
2277
+ AccessProfile: 'ACCESS_PROFILE',
2278
+ Role: 'ROLE',
2279
+ Entitlement: 'ENTITLEMENT'
2280
+ } as const;
2281
+
2282
+ export type AccessRequestItem1V2025TypeV2025 = typeof AccessRequestItem1V2025TypeV2025[keyof typeof AccessRequestItem1V2025TypeV2025];
2283
+
2226
2284
  /**
2227
2285
  *
2228
2286
  * @export
@@ -3001,6 +3059,12 @@ export interface AccessRequestV2025 {
3001
3059
  * @memberof AccessRequestV2025
3002
3060
  */
3003
3061
  'clientMetadata'?: { [key: string]: string; };
3062
+ /**
3063
+ * Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
3064
+ * @type {Array<RequestedForDtoRefV2025>}
3065
+ * @memberof AccessRequestV2025
3066
+ */
3067
+ 'requestedForWithRequestedItems'?: Array<RequestedForDtoRefV2025> | null;
3004
3068
  }
3005
3069
 
3006
3070
 
@@ -4584,6 +4648,64 @@ export interface AccountInfoDtoV2025 {
4584
4648
  */
4585
4649
  'uuid'?: string;
4586
4650
  }
4651
+ /**
4652
+ *
4653
+ * @export
4654
+ * @interface AccountInfoRefV2025
4655
+ */
4656
+ export interface AccountInfoRefV2025 {
4657
+ /**
4658
+ * The uuid for the account, available under the \'objectguid\' attribute
4659
+ * @type {string}
4660
+ * @memberof AccountInfoRefV2025
4661
+ */
4662
+ 'uuid'?: string;
4663
+ /**
4664
+ * The \'distinguishedName\' attribute for the account
4665
+ * @type {string}
4666
+ * @memberof AccountInfoRefV2025
4667
+ */
4668
+ 'nativeIdentity'?: string;
4669
+ /**
4670
+ *
4671
+ * @type {DtoTypeV2025}
4672
+ * @memberof AccountInfoRefV2025
4673
+ */
4674
+ 'type'?: DtoTypeV2025;
4675
+ /**
4676
+ * The account id
4677
+ * @type {string}
4678
+ * @memberof AccountInfoRefV2025
4679
+ */
4680
+ 'id'?: string;
4681
+ /**
4682
+ * The account display name
4683
+ * @type {string}
4684
+ * @memberof AccountInfoRefV2025
4685
+ */
4686
+ 'name'?: string;
4687
+ }
4688
+
4689
+
4690
+ /**
4691
+ *
4692
+ * @export
4693
+ * @interface AccountItemRefV2025
4694
+ */
4695
+ export interface AccountItemRefV2025 {
4696
+ /**
4697
+ * The uuid for the account, available under the \'objectguid\' attribute
4698
+ * @type {string}
4699
+ * @memberof AccountItemRefV2025
4700
+ */
4701
+ 'accountUuid'?: string | null;
4702
+ /**
4703
+ * The \'distinguishedName\' attribute for the account
4704
+ * @type {string}
4705
+ * @memberof AccountItemRefV2025
4706
+ */
4707
+ 'nativeIdentity'?: string;
4708
+ }
4587
4709
  /**
4588
4710
  * If an account activity item is associated with an access request, captures details of that request.
4589
4711
  * @export
@@ -5369,6 +5491,52 @@ export interface AccountsExportReportArgumentsV2025 {
5369
5491
  */
5370
5492
  'sourceName': string;
5371
5493
  }
5494
+ /**
5495
+ *
5496
+ * @export
5497
+ * @interface AccountsSelectionRequestV2025
5498
+ */
5499
+ export interface AccountsSelectionRequestV2025 {
5500
+ /**
5501
+ * A list of Identity IDs for whom the Access is requested.
5502
+ * @type {Array<string>}
5503
+ * @memberof AccountsSelectionRequestV2025
5504
+ */
5505
+ 'requestedFor': Array<string>;
5506
+ /**
5507
+ *
5508
+ * @type {AccessRequestTypeV2025}
5509
+ * @memberof AccountsSelectionRequestV2025
5510
+ */
5511
+ 'requestType'?: AccessRequestTypeV2025 | null;
5512
+ /**
5513
+ *
5514
+ * @type {Array<AccessRequestItem1V2025>}
5515
+ * @memberof AccountsSelectionRequestV2025
5516
+ */
5517
+ 'requestedItems': Array<AccessRequestItem1V2025>;
5518
+ /**
5519
+ * Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities.
5520
+ * @type {{ [key: string]: string; }}
5521
+ * @memberof AccountsSelectionRequestV2025
5522
+ */
5523
+ 'clientMetadata'?: { [key: string]: string; };
5524
+ }
5525
+
5526
+
5527
+ /**
5528
+ *
5529
+ * @export
5530
+ * @interface AccountsSelectionResponseV2025
5531
+ */
5532
+ export interface AccountsSelectionResponseV2025 {
5533
+ /**
5534
+ * A list of available account selections per identity in the request, for all the requested items
5535
+ * @type {Array<IdentityAccountSelectionsV2025>}
5536
+ * @memberof AccountsSelectionResponseV2025
5537
+ */
5538
+ 'identities'?: Array<IdentityAccountSelectionsV2025>;
5539
+ }
5372
5540
  /**
5373
5541
  *
5374
5542
  * @export
@@ -6739,7 +6907,8 @@ export const AttributeDefinitionTypeV2025 = {
6739
6907
  String: 'STRING',
6740
6908
  Long: 'LONG',
6741
6909
  Int: 'INT',
6742
- Boolean: 'BOOLEAN'
6910
+ Boolean: 'BOOLEAN',
6911
+ Date: 'DATE'
6743
6912
  } as const;
6744
6913
 
6745
6914
  export type AttributeDefinitionTypeV2025 = typeof AttributeDefinitionTypeV2025[keyof typeof AttributeDefinitionTypeV2025];
@@ -16549,6 +16718,33 @@ export interface FeatureValueDtoV2025 {
16549
16718
  */
16550
16719
  'denominator'?: number;
16551
16720
  }
16721
+ /**
16722
+ *
16723
+ * @export
16724
+ * @interface FederationProtocolDetailsV2025
16725
+ */
16726
+ export interface FederationProtocolDetailsV2025 {
16727
+ /**
16728
+ * Federation protocol role
16729
+ * @type {string}
16730
+ * @memberof FederationProtocolDetailsV2025
16731
+ */
16732
+ 'role'?: FederationProtocolDetailsV2025RoleV2025;
16733
+ /**
16734
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
16735
+ * @type {string}
16736
+ * @memberof FederationProtocolDetailsV2025
16737
+ */
16738
+ 'entityId'?: string;
16739
+ }
16740
+
16741
+ export const FederationProtocolDetailsV2025RoleV2025 = {
16742
+ SamlIdp: 'SAML_IDP',
16743
+ SamlSp: 'SAML_SP'
16744
+ } as const;
16745
+
16746
+ export type FederationProtocolDetailsV2025RoleV2025 = typeof FederationProtocolDetailsV2025RoleV2025[keyof typeof FederationProtocolDetailsV2025RoleV2025];
16747
+
16552
16748
  /**
16553
16749
  *
16554
16750
  * @export
@@ -17782,6 +17978,188 @@ export const GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV
17782
17978
 
17783
17979
  export type GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025 = typeof GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025[keyof typeof GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025];
17784
17980
 
17981
+ /**
17982
+ *
17983
+ * @export
17984
+ * @interface GetCampaign200ResponseV2025
17985
+ */
17986
+ export interface GetCampaign200ResponseV2025 {
17987
+ /**
17988
+ * Id of the campaign
17989
+ * @type {string}
17990
+ * @memberof GetCampaign200ResponseV2025
17991
+ */
17992
+ 'id'?: string | null;
17993
+ /**
17994
+ * The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
17995
+ * @type {string}
17996
+ * @memberof GetCampaign200ResponseV2025
17997
+ */
17998
+ 'name': string;
17999
+ /**
18000
+ * The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
18001
+ * @type {string}
18002
+ * @memberof GetCampaign200ResponseV2025
18003
+ */
18004
+ 'description': string | null;
18005
+ /**
18006
+ * The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
18007
+ * @type {string}
18008
+ * @memberof GetCampaign200ResponseV2025
18009
+ */
18010
+ 'deadline'?: string | null;
18011
+ /**
18012
+ * The type of campaign. Could be extended in the future.
18013
+ * @type {string}
18014
+ * @memberof GetCampaign200ResponseV2025
18015
+ */
18016
+ 'type': GetCampaign200ResponseV2025TypeV2025;
18017
+ /**
18018
+ * Enables email notification for this campaign
18019
+ * @type {boolean}
18020
+ * @memberof GetCampaign200ResponseV2025
18021
+ */
18022
+ 'emailNotificationEnabled'?: boolean;
18023
+ /**
18024
+ * Allows auto revoke for this campaign
18025
+ * @type {boolean}
18026
+ * @memberof GetCampaign200ResponseV2025
18027
+ */
18028
+ 'autoRevokeAllowed'?: boolean;
18029
+ /**
18030
+ * Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
18031
+ * @type {boolean}
18032
+ * @memberof GetCampaign200ResponseV2025
18033
+ */
18034
+ 'recommendationsEnabled'?: boolean;
18035
+ /**
18036
+ * The campaign\'s current status.
18037
+ * @type {string}
18038
+ * @memberof GetCampaign200ResponseV2025
18039
+ */
18040
+ 'status'?: GetCampaign200ResponseV2025StatusV2025 | null;
18041
+ /**
18042
+ * The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
18043
+ * @type {string}
18044
+ * @memberof GetCampaign200ResponseV2025
18045
+ */
18046
+ 'correlatedStatus'?: GetCampaign200ResponseV2025CorrelatedStatusV2025;
18047
+ /**
18048
+ * Created time of the campaign
18049
+ * @type {string}
18050
+ * @memberof GetCampaign200ResponseV2025
18051
+ */
18052
+ 'created'?: string | null;
18053
+ /**
18054
+ * The total number of certifications in this campaign.
18055
+ * @type {number}
18056
+ * @memberof GetCampaign200ResponseV2025
18057
+ */
18058
+ 'totalCertifications'?: number | null;
18059
+ /**
18060
+ * The number of completed certifications in this campaign.
18061
+ * @type {number}
18062
+ * @memberof GetCampaign200ResponseV2025
18063
+ */
18064
+ 'completedCertifications'?: number | null;
18065
+ /**
18066
+ * A list of errors and warnings that have accumulated.
18067
+ * @type {Array<CampaignAlertV2025>}
18068
+ * @memberof GetCampaign200ResponseV2025
18069
+ */
18070
+ 'alerts'?: Array<CampaignAlertV2025> | null;
18071
+ /**
18072
+ * Modified time of the campaign
18073
+ * @type {string}
18074
+ * @memberof GetCampaign200ResponseV2025
18075
+ */
18076
+ 'modified'?: string | null;
18077
+ /**
18078
+ *
18079
+ * @type {CampaignAllOfFilterV2025}
18080
+ * @memberof GetCampaign200ResponseV2025
18081
+ */
18082
+ 'filter'?: CampaignAllOfFilterV2025 | null;
18083
+ /**
18084
+ * Determines if comments on sunset date changes are required.
18085
+ * @type {boolean}
18086
+ * @memberof GetCampaign200ResponseV2025
18087
+ */
18088
+ 'sunsetCommentsRequired'?: boolean;
18089
+ /**
18090
+ *
18091
+ * @type {CampaignAllOfSourceOwnerCampaignInfoV2025}
18092
+ * @memberof GetCampaign200ResponseV2025
18093
+ */
18094
+ 'sourceOwnerCampaignInfo'?: CampaignAllOfSourceOwnerCampaignInfoV2025 | null;
18095
+ /**
18096
+ *
18097
+ * @type {CampaignAllOfSearchCampaignInfoV2025}
18098
+ * @memberof GetCampaign200ResponseV2025
18099
+ */
18100
+ 'searchCampaignInfo'?: CampaignAllOfSearchCampaignInfoV2025 | null;
18101
+ /**
18102
+ *
18103
+ * @type {CampaignAllOfRoleCompositionCampaignInfoV2025}
18104
+ * @memberof GetCampaign200ResponseV2025
18105
+ */
18106
+ 'roleCompositionCampaignInfo'?: CampaignAllOfRoleCompositionCampaignInfoV2025 | null;
18107
+ /**
18108
+ *
18109
+ * @type {CampaignAllOfMachineAccountCampaignInfoV2025}
18110
+ * @memberof GetCampaign200ResponseV2025
18111
+ */
18112
+ 'machineAccountCampaignInfo'?: CampaignAllOfMachineAccountCampaignInfoV2025 | null;
18113
+ /**
18114
+ * A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
18115
+ * @type {Array<CampaignAllOfSourcesWithOrphanEntitlementsV2025>}
18116
+ * @memberof GetCampaign200ResponseV2025
18117
+ */
18118
+ 'sourcesWithOrphanEntitlements'?: Array<CampaignAllOfSourcesWithOrphanEntitlementsV2025> | null;
18119
+ /**
18120
+ * Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
18121
+ * @type {string}
18122
+ * @memberof GetCampaign200ResponseV2025
18123
+ */
18124
+ 'mandatoryCommentRequirement'?: GetCampaign200ResponseV2025MandatoryCommentRequirementV2025;
18125
+ }
18126
+
18127
+ export const GetCampaign200ResponseV2025TypeV2025 = {
18128
+ Manager: 'MANAGER',
18129
+ SourceOwner: 'SOURCE_OWNER',
18130
+ Search: 'SEARCH',
18131
+ RoleComposition: 'ROLE_COMPOSITION',
18132
+ MachineAccount: 'MACHINE_ACCOUNT'
18133
+ } as const;
18134
+
18135
+ export type GetCampaign200ResponseV2025TypeV2025 = typeof GetCampaign200ResponseV2025TypeV2025[keyof typeof GetCampaign200ResponseV2025TypeV2025];
18136
+ export const GetCampaign200ResponseV2025StatusV2025 = {
18137
+ Pending: 'PENDING',
18138
+ Staged: 'STAGED',
18139
+ Canceling: 'CANCELING',
18140
+ Activating: 'ACTIVATING',
18141
+ Active: 'ACTIVE',
18142
+ Completing: 'COMPLETING',
18143
+ Completed: 'COMPLETED',
18144
+ Error: 'ERROR',
18145
+ Archived: 'ARCHIVED'
18146
+ } as const;
18147
+
18148
+ export type GetCampaign200ResponseV2025StatusV2025 = typeof GetCampaign200ResponseV2025StatusV2025[keyof typeof GetCampaign200ResponseV2025StatusV2025];
18149
+ export const GetCampaign200ResponseV2025CorrelatedStatusV2025 = {
18150
+ Correlated: 'CORRELATED',
18151
+ Uncorrelated: 'UNCORRELATED'
18152
+ } as const;
18153
+
18154
+ export type GetCampaign200ResponseV2025CorrelatedStatusV2025 = typeof GetCampaign200ResponseV2025CorrelatedStatusV2025[keyof typeof GetCampaign200ResponseV2025CorrelatedStatusV2025];
18155
+ export const GetCampaign200ResponseV2025MandatoryCommentRequirementV2025 = {
18156
+ AllDecisions: 'ALL_DECISIONS',
18157
+ RevokeOnlyDecisions: 'REVOKE_ONLY_DECISIONS',
18158
+ NoDecisions: 'NO_DECISIONS'
18159
+ } as const;
18160
+
18161
+ export type GetCampaign200ResponseV2025MandatoryCommentRequirementV2025 = typeof GetCampaign200ResponseV2025MandatoryCommentRequirementV2025[keyof typeof GetCampaign200ResponseV2025MandatoryCommentRequirementV2025];
18162
+
17785
18163
  /**
17786
18164
  * @type GetDiscoveredApplications200ResponseInnerV2025
17787
18165
  * @export
@@ -18353,6 +18731,45 @@ export interface Identity1V2025 {
18353
18731
  */
18354
18732
  export type IdentityAccessV2025 = { type: 'ACCESS_PROFILE' } & AccessProfileSummaryV2025 | { type: 'ENTITLEMENT' } & AccessProfileEntitlementV2025 | { type: 'ROLE' } & AccessProfileRoleV2025;
18355
18733
 
18734
+ /**
18735
+ *
18736
+ * @export
18737
+ * @interface IdentityAccountSelectionsV2025
18738
+ */
18739
+ export interface IdentityAccountSelectionsV2025 {
18740
+ /**
18741
+ * Available account selections for the identity, per requested item
18742
+ * @type {Array<RequestedItemAccountSelectionsV2025>}
18743
+ * @memberof IdentityAccountSelectionsV2025
18744
+ */
18745
+ 'requestedItems'?: Array<RequestedItemAccountSelectionsV2025>;
18746
+ /**
18747
+ * A boolean indicating whether any account selections will be required for the user to raise an access request
18748
+ * @type {boolean}
18749
+ * @memberof IdentityAccountSelectionsV2025
18750
+ */
18751
+ 'accountsSelectionRequired'?: boolean;
18752
+ /**
18753
+ *
18754
+ * @type {DtoTypeV2025}
18755
+ * @memberof IdentityAccountSelectionsV2025
18756
+ */
18757
+ 'type'?: DtoTypeV2025;
18758
+ /**
18759
+ * The identity id for the user
18760
+ * @type {string}
18761
+ * @memberof IdentityAccountSelectionsV2025
18762
+ */
18763
+ 'id'?: string;
18764
+ /**
18765
+ * The name of the identity
18766
+ * @type {string}
18767
+ * @memberof IdentityAccountSelectionsV2025
18768
+ */
18769
+ 'name'?: string;
18770
+ }
18771
+
18772
+
18356
18773
  /**
18357
18774
  *
18358
18775
  * @export
@@ -19636,6 +20053,165 @@ export interface IdentityEntitiesV2025 {
19636
20053
  */
19637
20054
  'identityEntity'?: IdentityEntitiesIdentityEntityV2025;
19638
20055
  }
20056
+ /**
20057
+ *
20058
+ * @export
20059
+ * @interface IdentityEntitlementDetailsAccountTargetV2025
20060
+ */
20061
+ export interface IdentityEntitlementDetailsAccountTargetV2025 {
20062
+ /**
20063
+ * The id of account
20064
+ * @type {string}
20065
+ * @memberof IdentityEntitlementDetailsAccountTargetV2025
20066
+ */
20067
+ 'accountId'?: string;
20068
+ /**
20069
+ * The name of account
20070
+ * @type {string}
20071
+ * @memberof IdentityEntitlementDetailsAccountTargetV2025
20072
+ */
20073
+ 'accountName'?: string;
20074
+ /**
20075
+ * The UUID representation of the account if available
20076
+ * @type {string}
20077
+ * @memberof IdentityEntitlementDetailsAccountTargetV2025
20078
+ */
20079
+ 'accountUUID'?: string | null;
20080
+ /**
20081
+ * The id of Source
20082
+ * @type {string}
20083
+ * @memberof IdentityEntitlementDetailsAccountTargetV2025
20084
+ */
20085
+ 'sourceId'?: string;
20086
+ /**
20087
+ * The name of Source
20088
+ * @type {string}
20089
+ * @memberof IdentityEntitlementDetailsAccountTargetV2025
20090
+ */
20091
+ 'sourceName'?: string;
20092
+ /**
20093
+ * The removal date scheduled for the entitlement on the Identity
20094
+ * @type {string}
20095
+ * @memberof IdentityEntitlementDetailsAccountTargetV2025
20096
+ */
20097
+ 'removeDate'?: string | null;
20098
+ /**
20099
+ * The assignmentId of the entitlement on the Identity
20100
+ * @type {string}
20101
+ * @memberof IdentityEntitlementDetailsAccountTargetV2025
20102
+ */
20103
+ 'assignmentId'?: string | null;
20104
+ /**
20105
+ * If the entitlement can be revoked
20106
+ * @type {boolean}
20107
+ * @memberof IdentityEntitlementDetailsAccountTargetV2025
20108
+ */
20109
+ 'revocable'?: boolean;
20110
+ }
20111
+ /**
20112
+ *
20113
+ * @export
20114
+ * @interface IdentityEntitlementDetailsEntitlementDtoV2025
20115
+ */
20116
+ export interface IdentityEntitlementDetailsEntitlementDtoV2025 {
20117
+ /**
20118
+ * The entitlement id
20119
+ * @type {string}
20120
+ * @memberof IdentityEntitlementDetailsEntitlementDtoV2025
20121
+ */
20122
+ 'id'?: string;
20123
+ /**
20124
+ * The entitlement name
20125
+ * @type {string}
20126
+ * @memberof IdentityEntitlementDetailsEntitlementDtoV2025
20127
+ */
20128
+ 'name'?: string;
20129
+ /**
20130
+ * Time when the entitlement was last modified
20131
+ * @type {string}
20132
+ * @memberof IdentityEntitlementDetailsEntitlementDtoV2025
20133
+ */
20134
+ 'created'?: string;
20135
+ /**
20136
+ * Time when the entitlement was last modified
20137
+ * @type {string}
20138
+ * @memberof IdentityEntitlementDetailsEntitlementDtoV2025
20139
+ */
20140
+ 'modified'?: string;
20141
+ /**
20142
+ * The description of the entitlement
20143
+ * @type {string}
20144
+ * @memberof IdentityEntitlementDetailsEntitlementDtoV2025
20145
+ */
20146
+ 'description'?: string | null;
20147
+ /**
20148
+ * The type of the object, will always be \"ENTITLEMENT\"
20149
+ * @type {string}
20150
+ * @memberof IdentityEntitlementDetailsEntitlementDtoV2025
20151
+ */
20152
+ 'type'?: string;
20153
+ /**
20154
+ * The source ID
20155
+ * @type {string}
20156
+ * @memberof IdentityEntitlementDetailsEntitlementDtoV2025
20157
+ */
20158
+ 'sourceId'?: string;
20159
+ /**
20160
+ * The source name
20161
+ * @type {string}
20162
+ * @memberof IdentityEntitlementDetailsEntitlementDtoV2025
20163
+ */
20164
+ 'sourceName'?: string;
20165
+ /**
20166
+ *
20167
+ * @type {OwnerDtoV2025}
20168
+ * @memberof IdentityEntitlementDetailsEntitlementDtoV2025
20169
+ */
20170
+ 'owner'?: OwnerDtoV2025;
20171
+ /**
20172
+ * The value of the entitlement
20173
+ * @type {string}
20174
+ * @memberof IdentityEntitlementDetailsEntitlementDtoV2025
20175
+ */
20176
+ 'value'?: string;
20177
+ /**
20178
+ * a list of properties informing the viewer about the entitlement
20179
+ * @type {Array<string>}
20180
+ * @memberof IdentityEntitlementDetailsEntitlementDtoV2025
20181
+ */
20182
+ 'flags'?: Array<string>;
20183
+ }
20184
+ /**
20185
+ *
20186
+ * @export
20187
+ * @interface IdentityEntitlementDetailsV2025
20188
+ */
20189
+ export interface IdentityEntitlementDetailsV2025 {
20190
+ /**
20191
+ * Id of Identity
20192
+ * @type {string}
20193
+ * @memberof IdentityEntitlementDetailsV2025
20194
+ */
20195
+ 'identityId'?: string;
20196
+ /**
20197
+ *
20198
+ * @type {IdentityEntitlementDetailsEntitlementDtoV2025}
20199
+ * @memberof IdentityEntitlementDetailsV2025
20200
+ */
20201
+ 'entitlement'?: IdentityEntitlementDetailsEntitlementDtoV2025;
20202
+ /**
20203
+ * Id of Source
20204
+ * @type {string}
20205
+ * @memberof IdentityEntitlementDetailsV2025
20206
+ */
20207
+ 'sourceId'?: string;
20208
+ /**
20209
+ * A list of account targets on the identity provisioned with the requested entitlement.
20210
+ * @type {Array<IdentityEntitlementDetailsAccountTargetV2025>}
20211
+ * @memberof IdentityEntitlementDetailsV2025
20212
+ */
20213
+ 'accountTargets'?: Array<IdentityEntitlementDetailsAccountTargetV2025>;
20214
+ }
19639
20215
  /**
19640
20216
  *
19641
20217
  * @export
@@ -20500,6 +21076,105 @@ export interface IdentityWithNewAccessV2025 {
20500
21076
  */
20501
21077
  'accessRefs': Array<IdentityWithNewAccessAccessRefsInnerV2025>;
20502
21078
  }
21079
+ /**
21080
+ *
21081
+ * @export
21082
+ * @interface IdpDetailsV2025
21083
+ */
21084
+ export interface IdpDetailsV2025 {
21085
+ /**
21086
+ * Federation protocol role
21087
+ * @type {string}
21088
+ * @memberof IdpDetailsV2025
21089
+ */
21090
+ 'role'?: IdpDetailsV2025RoleV2025;
21091
+ /**
21092
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
21093
+ * @type {string}
21094
+ * @memberof IdpDetailsV2025
21095
+ */
21096
+ 'entityId'?: string;
21097
+ /**
21098
+ * Defines the binding used for the SAML flow. Used with IDP configurations.
21099
+ * @type {string}
21100
+ * @memberof IdpDetailsV2025
21101
+ */
21102
+ 'binding'?: string;
21103
+ /**
21104
+ * Specifies the SAML authentication method to use. Used with IDP configurations.
21105
+ * @type {string}
21106
+ * @memberof IdpDetailsV2025
21107
+ */
21108
+ 'authnContext'?: string;
21109
+ /**
21110
+ * The IDP logout URL. Used with IDP configurations.
21111
+ * @type {string}
21112
+ * @memberof IdpDetailsV2025
21113
+ */
21114
+ 'logoutUrl'?: string;
21115
+ /**
21116
+ * Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
21117
+ * @type {boolean}
21118
+ * @memberof IdpDetailsV2025
21119
+ */
21120
+ 'includeAuthnContext'?: boolean;
21121
+ /**
21122
+ * The name id format to use. Used with IDP configurations.
21123
+ * @type {string}
21124
+ * @memberof IdpDetailsV2025
21125
+ */
21126
+ 'nameId'?: string;
21127
+ /**
21128
+ *
21129
+ * @type {JITConfigurationV2025}
21130
+ * @memberof IdpDetailsV2025
21131
+ */
21132
+ 'jitConfiguration'?: JITConfigurationV2025;
21133
+ /**
21134
+ * The Base64-encoded certificate used by the IDP. Used with IDP configurations.
21135
+ * @type {string}
21136
+ * @memberof IdpDetailsV2025
21137
+ */
21138
+ 'cert'?: string;
21139
+ /**
21140
+ * The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
21141
+ * @type {string}
21142
+ * @memberof IdpDetailsV2025
21143
+ */
21144
+ 'loginUrlPost'?: string;
21145
+ /**
21146
+ * The IDP Redirect URL. Used with IDP configurations.
21147
+ * @type {string}
21148
+ * @memberof IdpDetailsV2025
21149
+ */
21150
+ 'loginUrlRedirect'?: string;
21151
+ /**
21152
+ * Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
21153
+ * @type {string}
21154
+ * @memberof IdpDetailsV2025
21155
+ */
21156
+ 'mappingAttribute': string;
21157
+ /**
21158
+ * The expiration date extracted from the certificate.
21159
+ * @type {string}
21160
+ * @memberof IdpDetailsV2025
21161
+ */
21162
+ 'certificateExpirationDate'?: string;
21163
+ /**
21164
+ * The name extracted from the certificate.
21165
+ * @type {string}
21166
+ * @memberof IdpDetailsV2025
21167
+ */
21168
+ 'certificateName'?: string;
21169
+ }
21170
+
21171
+ export const IdpDetailsV2025RoleV2025 = {
21172
+ SamlIdp: 'SAML_IDP',
21173
+ SamlSp: 'SAML_SP'
21174
+ } as const;
21175
+
21176
+ export type IdpDetailsV2025RoleV2025 = typeof IdpDetailsV2025RoleV2025[keyof typeof IdpDetailsV2025RoleV2025];
21177
+
20503
21178
  /**
20504
21179
  *
20505
21180
  * @export
@@ -20945,6 +21620,31 @@ export interface InvocationV2025 {
20945
21620
  */
20946
21621
  'contentJson'?: object;
20947
21622
  }
21623
+ /**
21624
+ *
21625
+ * @export
21626
+ * @interface JITConfigurationV2025
21627
+ */
21628
+ export interface JITConfigurationV2025 {
21629
+ /**
21630
+ * The indicator for just-in-time provisioning enabled
21631
+ * @type {boolean}
21632
+ * @memberof JITConfigurationV2025
21633
+ */
21634
+ 'enabled'?: boolean;
21635
+ /**
21636
+ * the sourceId that mapped to just-in-time provisioning configuration
21637
+ * @type {string}
21638
+ * @memberof JITConfigurationV2025
21639
+ */
21640
+ 'sourceId'?: string;
21641
+ /**
21642
+ * A mapping of identity profile attribute names to SAML assertion attribute names
21643
+ * @type {{ [key: string]: string; }}
21644
+ * @memberof JITConfigurationV2025
21645
+ */
21646
+ 'sourceAttributeMappings'?: { [key: string]: string; };
21647
+ }
20948
21648
  /**
20949
21649
  * A JSONPatch Operation as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902)
20950
21650
  * @export
@@ -21290,7 +21990,8 @@ export interface LifecyclestateDeletedV2025 {
21290
21990
  }
21291
21991
 
21292
21992
  export const LifecyclestateDeletedV2025TypeV2025 = {
21293
- LifecycleState: 'LIFECYCLE_STATE'
21993
+ LifecycleState: 'LIFECYCLE_STATE',
21994
+ TaskResult: 'TASK_RESULT'
21294
21995
  } as const;
21295
21996
 
21296
21997
  export type LifecyclestateDeletedV2025TypeV2025 = typeof LifecyclestateDeletedV2025TypeV2025[keyof typeof LifecyclestateDeletedV2025TypeV2025];
@@ -22040,6 +22741,31 @@ export interface LocalizedMessageV2025 {
22040
22741
  */
22041
22742
  'message': string;
22042
22743
  }
22744
+ /**
22745
+ *
22746
+ * @export
22747
+ * @interface LockoutConfigurationV2025
22748
+ */
22749
+ export interface LockoutConfigurationV2025 {
22750
+ /**
22751
+ * The maximum attempts allowed before lockout occurs.
22752
+ * @type {number}
22753
+ * @memberof LockoutConfigurationV2025
22754
+ */
22755
+ 'maximumAttempts'?: number;
22756
+ /**
22757
+ * The total time in minutes a user will be locked out.
22758
+ * @type {number}
22759
+ * @memberof LockoutConfigurationV2025
22760
+ */
22761
+ 'lockoutDuration'?: number;
22762
+ /**
22763
+ * A rolling window where authentication attempts in a series count towards the maximum before lockout occurs.
22764
+ * @type {number}
22765
+ * @memberof LockoutConfigurationV2025
22766
+ */
22767
+ 'lockoutWindow'?: number;
22768
+ }
22043
22769
  /**
22044
22770
  * The definition of an Identity according to the Reassignment Configuration service
22045
22771
  * @export
@@ -28122,7 +28848,7 @@ export interface ProvisioningPolicyDtoV2025 {
28122
28848
  * @type {string}
28123
28849
  * @memberof ProvisioningPolicyDtoV2025
28124
28850
  */
28125
- 'name': string;
28851
+ 'name': string | null;
28126
28852
  /**
28127
28853
  * the description of the provisioning policy
28128
28854
  * @type {string}
@@ -28155,7 +28881,7 @@ export interface ProvisioningPolicyV2025 {
28155
28881
  * @type {string}
28156
28882
  * @memberof ProvisioningPolicyV2025
28157
28883
  */
28158
- 'name': string;
28884
+ 'name': string | null;
28159
28885
  /**
28160
28886
  * the description of the provisioning policy
28161
28887
  * @type {string}
@@ -29701,6 +30427,83 @@ export interface RequestedAccountRefV2025 {
29701
30427
  }
29702
30428
 
29703
30429
 
30430
+ /**
30431
+ *
30432
+ * @export
30433
+ * @interface RequestedForDtoRefV2025
30434
+ */
30435
+ export interface RequestedForDtoRefV2025 {
30436
+ /**
30437
+ * The identity id for which the access is requested
30438
+ * @type {string}
30439
+ * @memberof RequestedForDtoRefV2025
30440
+ */
30441
+ 'identityId': string;
30442
+ /**
30443
+ * the details for the access items that are requested for the identity
30444
+ * @type {Array<RequestedItemDtoRefV2025>}
30445
+ * @memberof RequestedForDtoRefV2025
30446
+ */
30447
+ 'requestedItems': Array<RequestedItemDtoRefV2025>;
30448
+ }
30449
+ /**
30450
+ *
30451
+ * @export
30452
+ * @interface RequestedItemAccountSelectionsV2025
30453
+ */
30454
+ export interface RequestedItemAccountSelectionsV2025 {
30455
+ /**
30456
+ * The description for this requested item
30457
+ * @type {string}
30458
+ * @memberof RequestedItemAccountSelectionsV2025
30459
+ */
30460
+ 'description'?: string;
30461
+ /**
30462
+ * This field indicates if account selections are not allowed for this requested item. * If true, this field indicates that account selections will not be available for this item and user combination. In this case, no account selections should be provided in the access request for this item and user combination, irrespective of whether the user has single or multiple accounts on a source. * An example is where a user is requesting an access profile that is already assigned to one of their accounts.
30463
+ * @type {boolean}
30464
+ * @memberof RequestedItemAccountSelectionsV2025
30465
+ */
30466
+ 'accountsSelectionBlocked'?: boolean;
30467
+ /**
30468
+ * If account selections are not allowed for an item, this field will denote the reason.
30469
+ * @type {string}
30470
+ * @memberof RequestedItemAccountSelectionsV2025
30471
+ */
30472
+ 'accountsSelectionBlockedReason'?: string | null;
30473
+ /**
30474
+ * The type of the item being requested.
30475
+ * @type {string}
30476
+ * @memberof RequestedItemAccountSelectionsV2025
30477
+ */
30478
+ 'type'?: RequestedItemAccountSelectionsV2025TypeV2025;
30479
+ /**
30480
+ * The id of the requested item
30481
+ * @type {string}
30482
+ * @memberof RequestedItemAccountSelectionsV2025
30483
+ */
30484
+ 'id'?: string;
30485
+ /**
30486
+ * The name of the requested item
30487
+ * @type {string}
30488
+ * @memberof RequestedItemAccountSelectionsV2025
30489
+ */
30490
+ 'name'?: string;
30491
+ /**
30492
+ * The details for the sources and accounts for the requested item and identity combination
30493
+ * @type {Array<SourceAccountSelectionsV2025>}
30494
+ * @memberof RequestedItemAccountSelectionsV2025
30495
+ */
30496
+ 'sources'?: Array<SourceAccountSelectionsV2025>;
30497
+ }
30498
+
30499
+ export const RequestedItemAccountSelectionsV2025TypeV2025 = {
30500
+ AccessProfile: 'ACCESS_PROFILE',
30501
+ Role: 'ROLE',
30502
+ Entitlement: 'ENTITLEMENT'
30503
+ } as const;
30504
+
30505
+ export type RequestedItemAccountSelectionsV2025TypeV2025 = typeof RequestedItemAccountSelectionsV2025TypeV2025[keyof typeof RequestedItemAccountSelectionsV2025TypeV2025];
30506
+
29704
30507
  /**
29705
30508
  *
29706
30509
  * @export
@@ -29729,6 +30532,70 @@ export const RequestedItemDetailsV2025TypeV2025 = {
29729
30532
 
29730
30533
  export type RequestedItemDetailsV2025TypeV2025 = typeof RequestedItemDetailsV2025TypeV2025[keyof typeof RequestedItemDetailsV2025TypeV2025];
29731
30534
 
30535
+ /**
30536
+ *
30537
+ * @export
30538
+ * @interface RequestedItemDtoRefV2025
30539
+ */
30540
+ export interface RequestedItemDtoRefV2025 {
30541
+ /**
30542
+ * The type of the item being requested.
30543
+ * @type {string}
30544
+ * @memberof RequestedItemDtoRefV2025
30545
+ */
30546
+ 'type': RequestedItemDtoRefV2025TypeV2025;
30547
+ /**
30548
+ * ID of Role, Access Profile or Entitlement being requested.
30549
+ * @type {string}
30550
+ * @memberof RequestedItemDtoRefV2025
30551
+ */
30552
+ 'id': string;
30553
+ /**
30554
+ * Comment provided by requester. * Comment is required when the request is of type Revoke Access.
30555
+ * @type {string}
30556
+ * @memberof RequestedItemDtoRefV2025
30557
+ */
30558
+ 'comment'?: string;
30559
+ /**
30560
+ * Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
30561
+ * @type {{ [key: string]: string; }}
30562
+ * @memberof RequestedItemDtoRefV2025
30563
+ */
30564
+ 'clientMetadata'?: { [key: string]: string; };
30565
+ /**
30566
+ * The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
30567
+ * @type {string}
30568
+ * @memberof RequestedItemDtoRefV2025
30569
+ */
30570
+ 'removeDate'?: string;
30571
+ /**
30572
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
30573
+ * @type {string}
30574
+ * @memberof RequestedItemDtoRefV2025
30575
+ */
30576
+ 'assignmentId'?: string | null;
30577
+ /**
30578
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
30579
+ * @type {string}
30580
+ * @memberof RequestedItemDtoRefV2025
30581
+ */
30582
+ 'nativeIdentity'?: string | null;
30583
+ /**
30584
+ * The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
30585
+ * @type {Array<SourceItemRefV2025>}
30586
+ * @memberof RequestedItemDtoRefV2025
30587
+ */
30588
+ 'accountSelection'?: Array<SourceItemRefV2025> | null;
30589
+ }
30590
+
30591
+ export const RequestedItemDtoRefV2025TypeV2025 = {
30592
+ AccessProfile: 'ACCESS_PROFILE',
30593
+ Role: 'ROLE',
30594
+ Entitlement: 'ENTITLEMENT'
30595
+ } as const;
30596
+
30597
+ export type RequestedItemDtoRefV2025TypeV2025 = typeof RequestedItemDtoRefV2025TypeV2025[keyof typeof RequestedItemDtoRefV2025TypeV2025];
30598
+
29732
30599
  /**
29733
30600
  *
29734
30601
  * @export
@@ -35990,6 +36857,179 @@ export const ServiceDeskSourceV2025TypeV2025 = {
35990
36857
 
35991
36858
  export type ServiceDeskSourceV2025TypeV2025 = typeof ServiceDeskSourceV2025TypeV2025[keyof typeof ServiceDeskSourceV2025TypeV2025];
35992
36859
 
36860
+ /**
36861
+ *
36862
+ * @export
36863
+ * @interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36864
+ */
36865
+ export interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2025 {
36866
+ /**
36867
+ * Federation protocol role
36868
+ * @type {string}
36869
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36870
+ */
36871
+ 'role'?: ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025;
36872
+ /**
36873
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
36874
+ * @type {string}
36875
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36876
+ */
36877
+ 'entityId'?: string;
36878
+ /**
36879
+ * Defines the binding used for the SAML flow. Used with IDP configurations.
36880
+ * @type {string}
36881
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36882
+ */
36883
+ 'binding'?: string;
36884
+ /**
36885
+ * Specifies the SAML authentication method to use. Used with IDP configurations.
36886
+ * @type {string}
36887
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36888
+ */
36889
+ 'authnContext'?: string;
36890
+ /**
36891
+ * The IDP logout URL. Used with IDP configurations.
36892
+ * @type {string}
36893
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36894
+ */
36895
+ 'logoutUrl'?: string;
36896
+ /**
36897
+ * Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
36898
+ * @type {boolean}
36899
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36900
+ */
36901
+ 'includeAuthnContext'?: boolean;
36902
+ /**
36903
+ * The name id format to use. Used with IDP configurations.
36904
+ * @type {string}
36905
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36906
+ */
36907
+ 'nameId'?: string;
36908
+ /**
36909
+ *
36910
+ * @type {JITConfigurationV2025}
36911
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36912
+ */
36913
+ 'jitConfiguration'?: JITConfigurationV2025;
36914
+ /**
36915
+ * The Base64-encoded certificate used by the IDP. Used with IDP configurations.
36916
+ * @type {string}
36917
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36918
+ */
36919
+ 'cert'?: string;
36920
+ /**
36921
+ * The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
36922
+ * @type {string}
36923
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36924
+ */
36925
+ 'loginUrlPost'?: string;
36926
+ /**
36927
+ * The IDP Redirect URL. Used with IDP configurations.
36928
+ * @type {string}
36929
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36930
+ */
36931
+ 'loginUrlRedirect'?: string;
36932
+ /**
36933
+ * Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
36934
+ * @type {string}
36935
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36936
+ */
36937
+ 'mappingAttribute': string;
36938
+ /**
36939
+ * The expiration date extracted from the certificate.
36940
+ * @type {string}
36941
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36942
+ */
36943
+ 'certificateExpirationDate'?: string;
36944
+ /**
36945
+ * The name extracted from the certificate.
36946
+ * @type {string}
36947
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36948
+ */
36949
+ 'certificateName'?: string;
36950
+ /**
36951
+ * Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
36952
+ * @type {string}
36953
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36954
+ */
36955
+ 'alias'?: string;
36956
+ /**
36957
+ * The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
36958
+ * @type {string}
36959
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36960
+ */
36961
+ 'callbackUrl': string;
36962
+ /**
36963
+ * The legacy ACS URL used for SAML authentication. Used with SP configurations.
36964
+ * @type {string}
36965
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
36966
+ */
36967
+ 'legacyAcsUrl'?: string;
36968
+ }
36969
+
36970
+ export const ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025 = {
36971
+ SamlIdp: 'SAML_IDP',
36972
+ SamlSp: 'SAML_SP'
36973
+ } as const;
36974
+
36975
+ export type ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025 = typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025[keyof typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025];
36976
+
36977
+ /**
36978
+ * Represents the IdentityNow as Service Provider Configuration allowing customers to log into IDN via an Identity Provider
36979
+ * @export
36980
+ * @interface ServiceProviderConfigurationV2025
36981
+ */
36982
+ export interface ServiceProviderConfigurationV2025 {
36983
+ /**
36984
+ * This determines whether or not the SAML authentication flow is enabled for an org
36985
+ * @type {boolean}
36986
+ * @memberof ServiceProviderConfigurationV2025
36987
+ */
36988
+ 'enabled'?: boolean;
36989
+ /**
36990
+ * This allows basic login with the parameter prompt=true. This is often toggled on when debugging SAML authentication setup. When false, only org admins with MFA-enabled can bypass the IDP.
36991
+ * @type {boolean}
36992
+ * @memberof ServiceProviderConfigurationV2025
36993
+ */
36994
+ 'bypassIdp'?: boolean;
36995
+ /**
36996
+ * This indicates whether or not the SAML configuration is valid.
36997
+ * @type {boolean}
36998
+ * @memberof ServiceProviderConfigurationV2025
36999
+ */
37000
+ 'samlConfigurationValid'?: boolean;
37001
+ /**
37002
+ * A list of the abstract implementations of the Federation Protocol details. Typically, this will include on SpDetails object and one IdpDetails object used in tandem to define a SAML integration between a customer\'s identity provider and a customer\'s SailPoint instance (i.e., the service provider).
37003
+ * @type {Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2025>}
37004
+ * @memberof ServiceProviderConfigurationV2025
37005
+ */
37006
+ 'federationProtocolDetails'?: Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2025>;
37007
+ }
37008
+ /**
37009
+ *
37010
+ * @export
37011
+ * @interface SessionConfigurationV2025
37012
+ */
37013
+ export interface SessionConfigurationV2025 {
37014
+ /**
37015
+ * The maximum time in minutes a session can be idle.
37016
+ * @type {number}
37017
+ * @memberof SessionConfigurationV2025
37018
+ */
37019
+ 'maxIdleTime'?: number;
37020
+ /**
37021
+ * Denotes if \'remember me\' is enabled.
37022
+ * @type {boolean}
37023
+ * @memberof SessionConfigurationV2025
37024
+ */
37025
+ 'rememberMe'?: boolean;
37026
+ /**
37027
+ * The maximum allowable session time in minutes.
37028
+ * @type {number}
37029
+ * @memberof SessionConfigurationV2025
37030
+ */
37031
+ 'maxSessionTime'?: number;
37032
+ }
35993
37033
  /**
35994
37034
  *
35995
37035
  * @export
@@ -37028,6 +38068,39 @@ export interface SourceAccountDeletedV2025 {
37028
38068
  */
37029
38069
  'attributes': { [key: string]: any; };
37030
38070
  }
38071
+ /**
38072
+ *
38073
+ * @export
38074
+ * @interface SourceAccountSelectionsV2025
38075
+ */
38076
+ export interface SourceAccountSelectionsV2025 {
38077
+ /**
38078
+ *
38079
+ * @type {DtoTypeV2025}
38080
+ * @memberof SourceAccountSelectionsV2025
38081
+ */
38082
+ 'type'?: DtoTypeV2025;
38083
+ /**
38084
+ * The source id
38085
+ * @type {string}
38086
+ * @memberof SourceAccountSelectionsV2025
38087
+ */
38088
+ 'id'?: string;
38089
+ /**
38090
+ * The source name
38091
+ * @type {string}
38092
+ * @memberof SourceAccountSelectionsV2025
38093
+ */
38094
+ 'name'?: string;
38095
+ /**
38096
+ * The accounts information for a particular source in the requested item
38097
+ * @type {Array<AccountInfoRefV2025>}
38098
+ * @memberof SourceAccountSelectionsV2025
38099
+ */
38100
+ 'accounts'?: Array<AccountInfoRefV2025>;
38101
+ }
38102
+
38103
+
37031
38104
  /**
37032
38105
  *
37033
38106
  * @export
@@ -37813,6 +38886,25 @@ export const SourceHealthDtoV2025StatusV2025 = {
37813
38886
 
37814
38887
  export type SourceHealthDtoV2025StatusV2025 = typeof SourceHealthDtoV2025StatusV2025[keyof typeof SourceHealthDtoV2025StatusV2025];
37815
38888
 
38889
+ /**
38890
+ *
38891
+ * @export
38892
+ * @interface SourceItemRefV2025
38893
+ */
38894
+ export interface SourceItemRefV2025 {
38895
+ /**
38896
+ * The id for the source on which account selections are made
38897
+ * @type {string}
38898
+ * @memberof SourceItemRefV2025
38899
+ */
38900
+ 'sourceId'?: string | null;
38901
+ /**
38902
+ * A list of account selections on the source. Currently, only one selection per source is supported.
38903
+ * @type {Array<AccountItemRefV2025>}
38904
+ * @memberof SourceItemRefV2025
38905
+ */
38906
+ 'accounts'?: Array<AccountItemRefV2025> | null;
38907
+ }
37816
38908
  /**
37817
38909
  * Reference to management workgroup for the source.
37818
38910
  * @export
@@ -38937,6 +40029,51 @@ export interface SpConfigRulesV2025 {
38937
40029
  */
38938
40030
  'editable'?: boolean;
38939
40031
  }
40032
+ /**
40033
+ *
40034
+ * @export
40035
+ * @interface SpDetailsV2025
40036
+ */
40037
+ export interface SpDetailsV2025 {
40038
+ /**
40039
+ * Federation protocol role
40040
+ * @type {string}
40041
+ * @memberof SpDetailsV2025
40042
+ */
40043
+ 'role'?: SpDetailsV2025RoleV2025;
40044
+ /**
40045
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
40046
+ * @type {string}
40047
+ * @memberof SpDetailsV2025
40048
+ */
40049
+ 'entityId'?: string;
40050
+ /**
40051
+ * Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
40052
+ * @type {string}
40053
+ * @memberof SpDetailsV2025
40054
+ */
40055
+ 'alias'?: string;
40056
+ /**
40057
+ * The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
40058
+ * @type {string}
40059
+ * @memberof SpDetailsV2025
40060
+ */
40061
+ 'callbackUrl': string;
40062
+ /**
40063
+ * The legacy ACS URL used for SAML authentication. Used with SP configurations.
40064
+ * @type {string}
40065
+ * @memberof SpDetailsV2025
40066
+ */
40067
+ 'legacyAcsUrl'?: string;
40068
+ }
40069
+
40070
+ export const SpDetailsV2025RoleV2025 = {
40071
+ SamlIdp: 'SAML_IDP',
40072
+ SamlSp: 'SAML_SP'
40073
+ } as const;
40074
+
40075
+ export type SpDetailsV2025RoleV2025 = typeof SpDetailsV2025RoleV2025[keyof typeof SpDetailsV2025RoleV2025];
40076
+
38940
40077
  /**
38941
40078
  *
38942
40079
  * @export
@@ -46211,7 +47348,7 @@ export const AccessRequestsV2025ApiAxiosParamCreator = function (configuration?:
46211
47348
  };
46212
47349
  },
46213
47350
  /**
46214
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
47351
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
46215
47352
  * @summary Submit Access Request
46216
47353
  * @param {AccessRequestV2025} accessRequestV2025
46217
47354
  * @param {*} [axiosOptions] Override http request option.
@@ -46293,23 +47430,26 @@ export const AccessRequestsV2025ApiAxiosParamCreator = function (configuration?:
46293
47430
  };
46294
47431
  },
46295
47432
  /**
46296
- * Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
46297
- * @summary Access Request Status
46298
- * @param {string} [requestedFor] Filter the results by the identity the requests were made for. *me* indicates the current user. Mutually exclusive with *regarding-identity*.
46299
- * @param {string} [requestedBy] Filter the results by the identity who made the requests. *me* indicates the current user. Mutually exclusive with *regarding-identity*.
46300
- * @param {string} [regardingIdentity] Filter the results by the specified identity who is either the requester or target of the requests. *me* indicates the current user. Mutually exclusive with *requested-for* and *requested-by*.
46301
- * @param {string} [assignedTo] Filter the results by the specified identity who is the owner of the Identity Request Work Item. *me* indicates the current user.
46302
- * @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
46303
- * @param {number} [limit] Max number of results to return.
46304
- * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
46305
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *in* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
46306
- * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name**
46307
- * @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
47433
+ * Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
47434
+ * @summary Identity Entitlement Details
47435
+ * @param {string} identityId The identity ID.
47436
+ * @param {string} entitlementId The entitlement ID
47437
+ * @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
46308
47438
  * @param {*} [axiosOptions] Override http request option.
46309
47439
  * @throws {RequiredError}
46310
47440
  */
46311
- listAccessRequestStatus: async (requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
46312
- const localVarPath = `/access-request-status`;
47441
+ getEntitlementDetailsForIdentity: async (identityId: string, entitlementId: string, xSailPointExperimental?: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
47442
+ // verify required parameter 'identityId' is not null or undefined
47443
+ assertParamExists('getEntitlementDetailsForIdentity', 'identityId', identityId)
47444
+ // verify required parameter 'entitlementId' is not null or undefined
47445
+ assertParamExists('getEntitlementDetailsForIdentity', 'entitlementId', entitlementId)
47446
+ if (xSailPointExperimental === undefined) {
47447
+ xSailPointExperimental = 'true';
47448
+ }
47449
+
47450
+ const localVarPath = `/access-requests/revocable-objects`
47451
+ .replace(`{${"identityId"}}`, encodeURIComponent(String(identityId)))
47452
+ .replace(`{${"entitlementId"}}`, encodeURIComponent(String(entitlementId)));
46313
47453
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
46314
47454
  const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
46315
47455
  let baseOptions;
@@ -46329,48 +47469,11 @@ export const AccessRequestsV2025ApiAxiosParamCreator = function (configuration?:
46329
47469
  // oauth required
46330
47470
  await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
46331
47471
 
46332
- if (requestedFor !== undefined) {
46333
- localVarQueryParameter['requested-for'] = requestedFor;
46334
- }
46335
-
46336
- if (requestedBy !== undefined) {
46337
- localVarQueryParameter['requested-by'] = requestedBy;
46338
- }
46339
-
46340
- if (regardingIdentity !== undefined) {
46341
- localVarQueryParameter['regarding-identity'] = regardingIdentity;
46342
- }
46343
-
46344
- if (assignedTo !== undefined) {
46345
- localVarQueryParameter['assigned-to'] = assignedTo;
46346
- }
46347
-
46348
- if (count !== undefined) {
46349
- localVarQueryParameter['count'] = count;
46350
- }
46351
-
46352
- if (limit !== undefined) {
46353
- localVarQueryParameter['limit'] = limit;
46354
- }
46355
-
46356
- if (offset !== undefined) {
46357
- localVarQueryParameter['offset'] = offset;
46358
- }
46359
-
46360
- if (filters !== undefined) {
46361
- localVarQueryParameter['filters'] = filters;
46362
- }
46363
-
46364
- if (sorters !== undefined) {
46365
- localVarQueryParameter['sorters'] = sorters;
46366
- }
46367
-
46368
- if (requestState !== undefined) {
46369
- localVarQueryParameter['request-state'] = requestState;
46370
- }
46371
-
46372
47472
 
46373
47473
 
47474
+ if (xSailPointExperimental != null) {
47475
+ localVarHeaderParameter['X-SailPoint-Experimental'] = String(xSailPointExperimental);
47476
+ }
46374
47477
  setSearchParams(localVarUrlObj, localVarQueryParameter);
46375
47478
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
46376
47479
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
@@ -46381,8 +47484,8 @@ export const AccessRequestsV2025ApiAxiosParamCreator = function (configuration?:
46381
47484
  };
46382
47485
  },
46383
47486
  /**
46384
- * Use this API to get access request statuses of all the access requests in the org based on the specified query parameters. Any user with user level ORG_ADMIN or scope idn:access-request-administration:read can access this endpoint to get the access request statuses
46385
- * @summary Access Request Status for Administrators
47487
+ * Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
47488
+ * @summary Access Request Status
46386
47489
  * @param {string} [requestedFor] Filter the results by the identity the requests were made for. *me* indicates the current user. Mutually exclusive with *regarding-identity*.
46387
47490
  * @param {string} [requestedBy] Filter the results by the identity who made the requests. *me* indicates the current user. Mutually exclusive with *regarding-identity*.
46388
47491
  * @param {string} [regardingIdentity] Filter the results by the specified identity who is either the requester or target of the requests. *me* indicates the current user. Mutually exclusive with *requested-for* and *requested-by*.
@@ -46390,14 +47493,14 @@ export const AccessRequestsV2025ApiAxiosParamCreator = function (configuration?:
46390
47493
  * @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
46391
47494
  * @param {number} [limit] Max number of results to return.
46392
47495
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
46393
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **accessRequestId**: *in* **status**: *in, eq, ne* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
46394
- * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name, accessRequestId**
47496
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *in* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
47497
+ * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name**
46395
47498
  * @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
46396
47499
  * @param {*} [axiosOptions] Override http request option.
46397
47500
  * @throws {RequiredError}
46398
47501
  */
46399
- listAdministratorsAccessRequestStatus: async (requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
46400
- const localVarPath = `/access-request-administration`;
47502
+ listAccessRequestStatus: async (requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
47503
+ const localVarPath = `/access-request-status`;
46401
47504
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
46402
47505
  const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
46403
47506
  let baseOptions;
@@ -46468,6 +47571,138 @@ export const AccessRequestsV2025ApiAxiosParamCreator = function (configuration?:
46468
47571
  axiosOptions: localVarRequestOptions,
46469
47572
  };
46470
47573
  },
47574
+ /**
47575
+ * Use this API to get access request statuses of all the access requests in the org based on the specified query parameters. Any user with user level ORG_ADMIN or scope idn:access-request-administration:read can access this endpoint to get the access request statuses
47576
+ * @summary Access Request Status for Administrators
47577
+ * @param {string} [requestedFor] Filter the results by the identity the requests were made for. *me* indicates the current user. Mutually exclusive with *regarding-identity*.
47578
+ * @param {string} [requestedBy] Filter the results by the identity who made the requests. *me* indicates the current user. Mutually exclusive with *regarding-identity*.
47579
+ * @param {string} [regardingIdentity] Filter the results by the specified identity who is either the requester or target of the requests. *me* indicates the current user. Mutually exclusive with *requested-for* and *requested-by*.
47580
+ * @param {string} [assignedTo] Filter the results by the specified identity who is the owner of the Identity Request Work Item. *me* indicates the current user.
47581
+ * @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
47582
+ * @param {number} [limit] Max number of results to return.
47583
+ * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
47584
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **accessRequestId**: *in* **status**: *in, eq, ne* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
47585
+ * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name, accessRequestId**
47586
+ * @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
47587
+ * @param {*} [axiosOptions] Override http request option.
47588
+ * @throws {RequiredError}
47589
+ */
47590
+ listAdministratorsAccessRequestStatus: async (requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
47591
+ const localVarPath = `/access-request-administration`;
47592
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
47593
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
47594
+ let baseOptions;
47595
+ if (configuration) {
47596
+ baseOptions = configuration.baseOptions;
47597
+ }
47598
+
47599
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
47600
+ const localVarHeaderParameter = {} as any;
47601
+ const localVarQueryParameter = {} as any;
47602
+
47603
+ // authentication userAuth required
47604
+ // oauth required
47605
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
47606
+
47607
+ // authentication userAuth required
47608
+ // oauth required
47609
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
47610
+
47611
+ if (requestedFor !== undefined) {
47612
+ localVarQueryParameter['requested-for'] = requestedFor;
47613
+ }
47614
+
47615
+ if (requestedBy !== undefined) {
47616
+ localVarQueryParameter['requested-by'] = requestedBy;
47617
+ }
47618
+
47619
+ if (regardingIdentity !== undefined) {
47620
+ localVarQueryParameter['regarding-identity'] = regardingIdentity;
47621
+ }
47622
+
47623
+ if (assignedTo !== undefined) {
47624
+ localVarQueryParameter['assigned-to'] = assignedTo;
47625
+ }
47626
+
47627
+ if (count !== undefined) {
47628
+ localVarQueryParameter['count'] = count;
47629
+ }
47630
+
47631
+ if (limit !== undefined) {
47632
+ localVarQueryParameter['limit'] = limit;
47633
+ }
47634
+
47635
+ if (offset !== undefined) {
47636
+ localVarQueryParameter['offset'] = offset;
47637
+ }
47638
+
47639
+ if (filters !== undefined) {
47640
+ localVarQueryParameter['filters'] = filters;
47641
+ }
47642
+
47643
+ if (sorters !== undefined) {
47644
+ localVarQueryParameter['sorters'] = sorters;
47645
+ }
47646
+
47647
+ if (requestState !== undefined) {
47648
+ localVarQueryParameter['request-state'] = requestState;
47649
+ }
47650
+
47651
+
47652
+
47653
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
47654
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
47655
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
47656
+
47657
+ return {
47658
+ url: toPathString(localVarUrlObj),
47659
+ axiosOptions: localVarRequestOptions,
47660
+ };
47661
+ },
47662
+ /**
47663
+ * Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
47664
+ * @summary Get accounts selections for identity
47665
+ * @param {AccountsSelectionRequestV2025} accountsSelectionRequestV2025
47666
+ * @param {*} [axiosOptions] Override http request option.
47667
+ * @throws {RequiredError}
47668
+ */
47669
+ loadAccountSelections: async (accountsSelectionRequestV2025: AccountsSelectionRequestV2025, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
47670
+ // verify required parameter 'accountsSelectionRequestV2025' is not null or undefined
47671
+ assertParamExists('loadAccountSelections', 'accountsSelectionRequestV2025', accountsSelectionRequestV2025)
47672
+ const localVarPath = `/access-requests/accounts-selection`;
47673
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
47674
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
47675
+ let baseOptions;
47676
+ if (configuration) {
47677
+ baseOptions = configuration.baseOptions;
47678
+ }
47679
+
47680
+ const localVarRequestOptions = { method: 'POST', ...baseOptions, ...axiosOptions};
47681
+ const localVarHeaderParameter = {} as any;
47682
+ const localVarQueryParameter = {} as any;
47683
+
47684
+ // authentication userAuth required
47685
+ // oauth required
47686
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
47687
+
47688
+ // authentication userAuth required
47689
+ // oauth required
47690
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
47691
+
47692
+
47693
+
47694
+ localVarHeaderParameter['Content-Type'] = 'application/json';
47695
+
47696
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
47697
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
47698
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
47699
+ localVarRequestOptions.data = serializeDataIfNeeded(accountsSelectionRequestV2025, localVarRequestOptions, configuration)
47700
+
47701
+ return {
47702
+ url: toPathString(localVarUrlObj),
47703
+ axiosOptions: localVarRequestOptions,
47704
+ };
47705
+ },
46471
47706
  /**
46472
47707
  * This endpoint replaces the current access-request configuration.
46473
47708
  * @summary Update Access Request Configuration
@@ -46576,7 +47811,7 @@ export const AccessRequestsV2025ApiFp = function(configuration?: Configuration)
46576
47811
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
46577
47812
  },
46578
47813
  /**
46579
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
47814
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
46580
47815
  * @summary Submit Access Request
46581
47816
  * @param {AccessRequestV2025} accessRequestV2025
46582
47817
  * @param {*} [axiosOptions] Override http request option.
@@ -46600,6 +47835,21 @@ export const AccessRequestsV2025ApiFp = function(configuration?: Configuration)
46600
47835
  const localVarOperationServerBasePath = operationServerMap['AccessRequestsV2025Api.getAccessRequestConfig']?.[localVarOperationServerIndex]?.url;
46601
47836
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
46602
47837
  },
47838
+ /**
47839
+ * Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
47840
+ * @summary Identity Entitlement Details
47841
+ * @param {string} identityId The identity ID.
47842
+ * @param {string} entitlementId The entitlement ID
47843
+ * @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
47844
+ * @param {*} [axiosOptions] Override http request option.
47845
+ * @throws {RequiredError}
47846
+ */
47847
+ async getEntitlementDetailsForIdentity(identityId: string, entitlementId: string, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IdentityEntitlementDetailsV2025>> {
47848
+ const localVarAxiosArgs = await localVarAxiosParamCreator.getEntitlementDetailsForIdentity(identityId, entitlementId, xSailPointExperimental, axiosOptions);
47849
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
47850
+ const localVarOperationServerBasePath = operationServerMap['AccessRequestsV2025Api.getEntitlementDetailsForIdentity']?.[localVarOperationServerIndex]?.url;
47851
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
47852
+ },
46603
47853
  /**
46604
47854
  * Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
46605
47855
  * @summary Access Request Status
@@ -46644,6 +47894,19 @@ export const AccessRequestsV2025ApiFp = function(configuration?: Configuration)
46644
47894
  const localVarOperationServerBasePath = operationServerMap['AccessRequestsV2025Api.listAdministratorsAccessRequestStatus']?.[localVarOperationServerIndex]?.url;
46645
47895
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
46646
47896
  },
47897
+ /**
47898
+ * Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
47899
+ * @summary Get accounts selections for identity
47900
+ * @param {AccountsSelectionRequestV2025} accountsSelectionRequestV2025
47901
+ * @param {*} [axiosOptions] Override http request option.
47902
+ * @throws {RequiredError}
47903
+ */
47904
+ async loadAccountSelections(accountsSelectionRequestV2025: AccountsSelectionRequestV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AccountsSelectionResponseV2025>> {
47905
+ const localVarAxiosArgs = await localVarAxiosParamCreator.loadAccountSelections(accountsSelectionRequestV2025, axiosOptions);
47906
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
47907
+ const localVarOperationServerBasePath = operationServerMap['AccessRequestsV2025Api.loadAccountSelections']?.[localVarOperationServerIndex]?.url;
47908
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
47909
+ },
46647
47910
  /**
46648
47911
  * This endpoint replaces the current access-request configuration.
46649
47912
  * @summary Update Access Request Configuration
@@ -46708,7 +47971,7 @@ export const AccessRequestsV2025ApiFactory = function (configuration?: Configura
46708
47971
  return localVarFp.closeAccessRequest(requestParameters.closeAccessRequestV2025, requestParameters.xSailPointExperimental, axiosOptions).then((request) => request(axios, basePath));
46709
47972
  },
46710
47973
  /**
46711
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
47974
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
46712
47975
  * @summary Submit Access Request
46713
47976
  * @param {AccessRequestsV2025ApiCreateAccessRequestRequest} requestParameters Request parameters.
46714
47977
  * @param {*} [axiosOptions] Override http request option.
@@ -46726,6 +47989,16 @@ export const AccessRequestsV2025ApiFactory = function (configuration?: Configura
46726
47989
  getAccessRequestConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<AccessRequestConfigV2025> {
46727
47990
  return localVarFp.getAccessRequestConfig(axiosOptions).then((request) => request(axios, basePath));
46728
47991
  },
47992
+ /**
47993
+ * Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
47994
+ * @summary Identity Entitlement Details
47995
+ * @param {AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest} requestParameters Request parameters.
47996
+ * @param {*} [axiosOptions] Override http request option.
47997
+ * @throws {RequiredError}
47998
+ */
47999
+ getEntitlementDetailsForIdentity(requestParameters: AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<IdentityEntitlementDetailsV2025> {
48000
+ return localVarFp.getEntitlementDetailsForIdentity(requestParameters.identityId, requestParameters.entitlementId, requestParameters.xSailPointExperimental, axiosOptions).then((request) => request(axios, basePath));
48001
+ },
46729
48002
  /**
46730
48003
  * Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
46731
48004
  * @summary Access Request Status
@@ -46746,6 +48019,16 @@ export const AccessRequestsV2025ApiFactory = function (configuration?: Configura
46746
48019
  listAdministratorsAccessRequestStatus(requestParameters: AccessRequestsV2025ApiListAdministratorsAccessRequestStatusRequest = {}, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<AccessRequestAdminItemStatusV2025>> {
46747
48020
  return localVarFp.listAdministratorsAccessRequestStatus(requestParameters.requestedFor, requestParameters.requestedBy, requestParameters.regardingIdentity, requestParameters.assignedTo, requestParameters.count, requestParameters.limit, requestParameters.offset, requestParameters.filters, requestParameters.sorters, requestParameters.requestState, axiosOptions).then((request) => request(axios, basePath));
46748
48021
  },
48022
+ /**
48023
+ * Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
48024
+ * @summary Get accounts selections for identity
48025
+ * @param {AccessRequestsV2025ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
48026
+ * @param {*} [axiosOptions] Override http request option.
48027
+ * @throws {RequiredError}
48028
+ */
48029
+ loadAccountSelections(requestParameters: AccessRequestsV2025ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<AccountsSelectionResponseV2025> {
48030
+ return localVarFp.loadAccountSelections(requestParameters.accountsSelectionRequestV2025, axiosOptions).then((request) => request(axios, basePath));
48031
+ },
46749
48032
  /**
46750
48033
  * This endpoint replaces the current access-request configuration.
46751
48034
  * @summary Update Access Request Configuration
@@ -46836,6 +48119,34 @@ export interface AccessRequestsV2025ApiCreateAccessRequestRequest {
46836
48119
  readonly accessRequestV2025: AccessRequestV2025
46837
48120
  }
46838
48121
 
48122
+ /**
48123
+ * Request parameters for getEntitlementDetailsForIdentity operation in AccessRequestsV2025Api.
48124
+ * @export
48125
+ * @interface AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest
48126
+ */
48127
+ export interface AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest {
48128
+ /**
48129
+ * The identity ID.
48130
+ * @type {string}
48131
+ * @memberof AccessRequestsV2025ApiGetEntitlementDetailsForIdentity
48132
+ */
48133
+ readonly identityId: string
48134
+
48135
+ /**
48136
+ * The entitlement ID
48137
+ * @type {string}
48138
+ * @memberof AccessRequestsV2025ApiGetEntitlementDetailsForIdentity
48139
+ */
48140
+ readonly entitlementId: string
48141
+
48142
+ /**
48143
+ * Use this header to enable this experimental API.
48144
+ * @type {string}
48145
+ * @memberof AccessRequestsV2025ApiGetEntitlementDetailsForIdentity
48146
+ */
48147
+ readonly xSailPointExperimental?: string
48148
+ }
48149
+
46839
48150
  /**
46840
48151
  * Request parameters for listAccessRequestStatus operation in AccessRequestsV2025Api.
46841
48152
  * @export
@@ -46990,6 +48301,20 @@ export interface AccessRequestsV2025ApiListAdministratorsAccessRequestStatusRequ
46990
48301
  readonly requestState?: string
46991
48302
  }
46992
48303
 
48304
+ /**
48305
+ * Request parameters for loadAccountSelections operation in AccessRequestsV2025Api.
48306
+ * @export
48307
+ * @interface AccessRequestsV2025ApiLoadAccountSelectionsRequest
48308
+ */
48309
+ export interface AccessRequestsV2025ApiLoadAccountSelectionsRequest {
48310
+ /**
48311
+ *
48312
+ * @type {AccountsSelectionRequestV2025}
48313
+ * @memberof AccessRequestsV2025ApiLoadAccountSelections
48314
+ */
48315
+ readonly accountsSelectionRequestV2025: AccountsSelectionRequestV2025
48316
+ }
48317
+
46993
48318
  /**
46994
48319
  * Request parameters for setAccessRequestConfig operation in AccessRequestsV2025Api.
46995
48320
  * @export
@@ -47060,7 +48385,7 @@ export class AccessRequestsV2025Api extends BaseAPI {
47060
48385
  }
47061
48386
 
47062
48387
  /**
47063
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
48388
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
47064
48389
  * @summary Submit Access Request
47065
48390
  * @param {AccessRequestsV2025ApiCreateAccessRequestRequest} requestParameters Request parameters.
47066
48391
  * @param {*} [axiosOptions] Override http request option.
@@ -47082,6 +48407,18 @@ export class AccessRequestsV2025Api extends BaseAPI {
47082
48407
  return AccessRequestsV2025ApiFp(this.configuration).getAccessRequestConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
47083
48408
  }
47084
48409
 
48410
+ /**
48411
+ * Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
48412
+ * @summary Identity Entitlement Details
48413
+ * @param {AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest} requestParameters Request parameters.
48414
+ * @param {*} [axiosOptions] Override http request option.
48415
+ * @throws {RequiredError}
48416
+ * @memberof AccessRequestsV2025Api
48417
+ */
48418
+ public getEntitlementDetailsForIdentity(requestParameters: AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest, axiosOptions?: RawAxiosRequestConfig) {
48419
+ return AccessRequestsV2025ApiFp(this.configuration).getEntitlementDetailsForIdentity(requestParameters.identityId, requestParameters.entitlementId, requestParameters.xSailPointExperimental, axiosOptions).then((request) => request(this.axios, this.basePath));
48420
+ }
48421
+
47085
48422
  /**
47086
48423
  * Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
47087
48424
  * @summary Access Request Status
@@ -47106,6 +48443,18 @@ export class AccessRequestsV2025Api extends BaseAPI {
47106
48443
  return AccessRequestsV2025ApiFp(this.configuration).listAdministratorsAccessRequestStatus(requestParameters.requestedFor, requestParameters.requestedBy, requestParameters.regardingIdentity, requestParameters.assignedTo, requestParameters.count, requestParameters.limit, requestParameters.offset, requestParameters.filters, requestParameters.sorters, requestParameters.requestState, axiosOptions).then((request) => request(this.axios, this.basePath));
47107
48444
  }
47108
48445
 
48446
+ /**
48447
+ * Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
48448
+ * @summary Get accounts selections for identity
48449
+ * @param {AccessRequestsV2025ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
48450
+ * @param {*} [axiosOptions] Override http request option.
48451
+ * @throws {RequiredError}
48452
+ * @memberof AccessRequestsV2025Api
48453
+ */
48454
+ public loadAccountSelections(requestParameters: AccessRequestsV2025ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig) {
48455
+ return AccessRequestsV2025ApiFp(this.configuration).loadAccountSelections(requestParameters.accountsSelectionRequestV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
48456
+ }
48457
+
47109
48458
  /**
47110
48459
  * This endpoint replaces the current access-request configuration.
47111
48460
  * @summary Update Access Request Configuration
@@ -55045,7 +56394,7 @@ export const CertificationCampaignsV2025ApiFp = function(configuration?: Configu
55045
56394
  * @param {*} [axiosOptions] Override http request option.
55046
56395
  * @throws {RequiredError}
55047
56396
  */
55048
- async getCampaign(id: string, detail?: GetCampaignDetailV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetActiveCampaigns200ResponseInnerV2025>> {
56397
+ async getCampaign(id: string, detail?: GetCampaignDetailV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetCampaign200ResponseV2025>> {
55049
56398
  const localVarAxiosArgs = await localVarAxiosParamCreator.getCampaign(id, detail, axiosOptions);
55050
56399
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
55051
56400
  const localVarOperationServerBasePath = operationServerMap['CertificationCampaignsV2025Api.getCampaign']?.[localVarOperationServerIndex]?.url;
@@ -55329,7 +56678,7 @@ export const CertificationCampaignsV2025ApiFactory = function (configuration?: C
55329
56678
  * @param {*} [axiosOptions] Override http request option.
55330
56679
  * @throws {RequiredError}
55331
56680
  */
55332
- getCampaign(requestParameters: CertificationCampaignsV2025ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetActiveCampaigns200ResponseInnerV2025> {
56681
+ getCampaign(requestParameters: CertificationCampaignsV2025ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetCampaign200ResponseV2025> {
55333
56682
  return localVarFp.getCampaign(requestParameters.id, requestParameters.detail, axiosOptions).then((request) => request(axios, basePath));
55334
56683
  },
55335
56684
  /**
@@ -68967,6 +70316,44 @@ export const GlobalTenantSecuritySettingsV2025ApiAxiosParamCreator = function (c
68967
70316
  axiosOptions: localVarRequestOptions,
68968
70317
  };
68969
70318
  },
70319
+ /**
70320
+ * This API returns the details of an org\'s lockout auth configuration.
70321
+ * @summary Get Auth Org Lockout Configuration.
70322
+ * @param {*} [axiosOptions] Override http request option.
70323
+ * @throws {RequiredError}
70324
+ */
70325
+ getAuthOrgLockoutConfig: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
70326
+ const localVarPath = `/auth-org/lockout-config`;
70327
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
70328
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
70329
+ let baseOptions;
70330
+ if (configuration) {
70331
+ baseOptions = configuration.baseOptions;
70332
+ }
70333
+
70334
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
70335
+ const localVarHeaderParameter = {} as any;
70336
+ const localVarQueryParameter = {} as any;
70337
+
70338
+ // authentication userAuth required
70339
+ // oauth required
70340
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70341
+
70342
+ // authentication userAuth required
70343
+ // oauth required
70344
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70345
+
70346
+
70347
+
70348
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
70349
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
70350
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
70351
+
70352
+ return {
70353
+ url: toPathString(localVarUrlObj),
70354
+ axiosOptions: localVarRequestOptions,
70355
+ };
70356
+ },
68970
70357
  /**
68971
70358
  * This API returns the details of an org\'s network auth configuration.
68972
70359
  * @summary Get security network configuration.
@@ -69005,6 +70392,126 @@ export const GlobalTenantSecuritySettingsV2025ApiAxiosParamCreator = function (c
69005
70392
  axiosOptions: localVarRequestOptions,
69006
70393
  };
69007
70394
  },
70395
+ /**
70396
+ * This API returns the details of an org\'s service provider auth configuration.
70397
+ * @summary Get Service Provider Configuration.
70398
+ * @param {*} [axiosOptions] Override http request option.
70399
+ * @throws {RequiredError}
70400
+ */
70401
+ getAuthOrgServiceProviderConfig: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
70402
+ const localVarPath = `/auth-org/service-provider-config`;
70403
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
70404
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
70405
+ let baseOptions;
70406
+ if (configuration) {
70407
+ baseOptions = configuration.baseOptions;
70408
+ }
70409
+
70410
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
70411
+ const localVarHeaderParameter = {} as any;
70412
+ const localVarQueryParameter = {} as any;
70413
+
70414
+ // authentication userAuth required
70415
+ // oauth required
70416
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70417
+
70418
+ // authentication userAuth required
70419
+ // oauth required
70420
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70421
+
70422
+
70423
+
70424
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
70425
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
70426
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
70427
+
70428
+ return {
70429
+ url: toPathString(localVarUrlObj),
70430
+ axiosOptions: localVarRequestOptions,
70431
+ };
70432
+ },
70433
+ /**
70434
+ * This API returns the details of an org\'s session auth configuration.
70435
+ * @summary Get Auth Org Session Configuration.
70436
+ * @param {*} [axiosOptions] Override http request option.
70437
+ * @throws {RequiredError}
70438
+ */
70439
+ getAuthOrgSessionConfig: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
70440
+ const localVarPath = `/auth-org/session-config`;
70441
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
70442
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
70443
+ let baseOptions;
70444
+ if (configuration) {
70445
+ baseOptions = configuration.baseOptions;
70446
+ }
70447
+
70448
+ const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
70449
+ const localVarHeaderParameter = {} as any;
70450
+ const localVarQueryParameter = {} as any;
70451
+
70452
+ // authentication userAuth required
70453
+ // oauth required
70454
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70455
+
70456
+ // authentication userAuth required
70457
+ // oauth required
70458
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70459
+
70460
+
70461
+
70462
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
70463
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
70464
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
70465
+
70466
+ return {
70467
+ url: toPathString(localVarUrlObj),
70468
+ axiosOptions: localVarRequestOptions,
70469
+ };
70470
+ },
70471
+ /**
70472
+ * This API updates an existing lockout configuration for an org using PATCH
70473
+ * @summary Update Auth Org Lockout Configuration
70474
+ * @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: &#x60;1. maximumAttempts &gt;&#x3D; 1 &amp;&amp; maximumAttempts &lt;&#x3D; 15 2. lockoutDuration &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60 3. lockoutWindow &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60&#x60;
70475
+ * @param {*} [axiosOptions] Override http request option.
70476
+ * @throws {RequiredError}
70477
+ */
70478
+ patchAuthOrgLockoutConfig: async (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
70479
+ // verify required parameter 'jsonPatchOperationV2025' is not null or undefined
70480
+ assertParamExists('patchAuthOrgLockoutConfig', 'jsonPatchOperationV2025', jsonPatchOperationV2025)
70481
+ const localVarPath = `/auth-org/lockout-config`;
70482
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
70483
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
70484
+ let baseOptions;
70485
+ if (configuration) {
70486
+ baseOptions = configuration.baseOptions;
70487
+ }
70488
+
70489
+ const localVarRequestOptions = { method: 'PATCH', ...baseOptions, ...axiosOptions};
70490
+ const localVarHeaderParameter = {} as any;
70491
+ const localVarQueryParameter = {} as any;
70492
+
70493
+ // authentication userAuth required
70494
+ // oauth required
70495
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70496
+
70497
+ // authentication userAuth required
70498
+ // oauth required
70499
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70500
+
70501
+
70502
+
70503
+ localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
70504
+
70505
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
70506
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
70507
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
70508
+ localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2025, localVarRequestOptions, configuration)
70509
+
70510
+ return {
70511
+ url: toPathString(localVarUrlObj),
70512
+ axiosOptions: localVarRequestOptions,
70513
+ };
70514
+ },
69008
70515
  /**
69009
70516
  * This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
69010
70517
  * @summary Update security network configuration.
@@ -69037,6 +70544,94 @@ export const GlobalTenantSecuritySettingsV2025ApiAxiosParamCreator = function (c
69037
70544
 
69038
70545
 
69039
70546
 
70547
+ localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
70548
+
70549
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
70550
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
70551
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
70552
+ localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2025, localVarRequestOptions, configuration)
70553
+
70554
+ return {
70555
+ url: toPathString(localVarUrlObj),
70556
+ axiosOptions: localVarRequestOptions,
70557
+ };
70558
+ },
70559
+ /**
70560
+ * This API updates an existing service provider configuration for an org using PATCH.
70561
+ * @summary Update Service Provider Configuration
70562
+ * @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
70563
+ * @param {*} [axiosOptions] Override http request option.
70564
+ * @throws {RequiredError}
70565
+ */
70566
+ patchAuthOrgServiceProviderConfig: async (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
70567
+ // verify required parameter 'jsonPatchOperationV2025' is not null or undefined
70568
+ assertParamExists('patchAuthOrgServiceProviderConfig', 'jsonPatchOperationV2025', jsonPatchOperationV2025)
70569
+ const localVarPath = `/auth-org/service-provider-config`;
70570
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
70571
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
70572
+ let baseOptions;
70573
+ if (configuration) {
70574
+ baseOptions = configuration.baseOptions;
70575
+ }
70576
+
70577
+ const localVarRequestOptions = { method: 'PATCH', ...baseOptions, ...axiosOptions};
70578
+ const localVarHeaderParameter = {} as any;
70579
+ const localVarQueryParameter = {} as any;
70580
+
70581
+ // authentication userAuth required
70582
+ // oauth required
70583
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70584
+
70585
+ // authentication userAuth required
70586
+ // oauth required
70587
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70588
+
70589
+
70590
+
70591
+ localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
70592
+
70593
+ setSearchParams(localVarUrlObj, localVarQueryParameter);
70594
+ let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
70595
+ localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
70596
+ localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2025, localVarRequestOptions, configuration)
70597
+
70598
+ return {
70599
+ url: toPathString(localVarUrlObj),
70600
+ axiosOptions: localVarRequestOptions,
70601
+ };
70602
+ },
70603
+ /**
70604
+ * This API updates an existing session configuration for an org using PATCH.
70605
+ * @summary Update Auth Org Session Configuration
70606
+ * @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: &#x60;1. maxSessionTime &gt;&#x3D; 1 &amp;&amp; maxSessionTime &lt;&#x3D; 10080 (1 week) 2. maxIdleTime &gt;&#x3D; 1 &amp;&amp; maxIdleTime &lt;&#x3D; 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.&#x60;
70607
+ * @param {*} [axiosOptions] Override http request option.
70608
+ * @throws {RequiredError}
70609
+ */
70610
+ patchAuthOrgSessionConfig: async (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
70611
+ // verify required parameter 'jsonPatchOperationV2025' is not null or undefined
70612
+ assertParamExists('patchAuthOrgSessionConfig', 'jsonPatchOperationV2025', jsonPatchOperationV2025)
70613
+ const localVarPath = `/auth-org/session-config`;
70614
+ // use dummy base URL string because the URL constructor only accepts absolute URLs.
70615
+ const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
70616
+ let baseOptions;
70617
+ if (configuration) {
70618
+ baseOptions = configuration.baseOptions;
70619
+ }
70620
+
70621
+ const localVarRequestOptions = { method: 'PATCH', ...baseOptions, ...axiosOptions};
70622
+ const localVarHeaderParameter = {} as any;
70623
+ const localVarQueryParameter = {} as any;
70624
+
70625
+ // authentication userAuth required
70626
+ // oauth required
70627
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70628
+
70629
+ // authentication userAuth required
70630
+ // oauth required
70631
+ await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
70632
+
70633
+
70634
+
69040
70635
  localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
69041
70636
 
69042
70637
  setSearchParams(localVarUrlObj, localVarQueryParameter);
@@ -69072,6 +70667,18 @@ export const GlobalTenantSecuritySettingsV2025ApiFp = function(configuration?: C
69072
70667
  const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.createAuthOrgNetworkConfig']?.[localVarOperationServerIndex]?.url;
69073
70668
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
69074
70669
  },
70670
+ /**
70671
+ * This API returns the details of an org\'s lockout auth configuration.
70672
+ * @summary Get Auth Org Lockout Configuration.
70673
+ * @param {*} [axiosOptions] Override http request option.
70674
+ * @throws {RequiredError}
70675
+ */
70676
+ async getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2025>> {
70677
+ const localVarAxiosArgs = await localVarAxiosParamCreator.getAuthOrgLockoutConfig(axiosOptions);
70678
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
70679
+ const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.getAuthOrgLockoutConfig']?.[localVarOperationServerIndex]?.url;
70680
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
70681
+ },
69075
70682
  /**
69076
70683
  * This API returns the details of an org\'s network auth configuration.
69077
70684
  * @summary Get security network configuration.
@@ -69084,6 +70691,43 @@ export const GlobalTenantSecuritySettingsV2025ApiFp = function(configuration?: C
69084
70691
  const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.getAuthOrgNetworkConfig']?.[localVarOperationServerIndex]?.url;
69085
70692
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
69086
70693
  },
70694
+ /**
70695
+ * This API returns the details of an org\'s service provider auth configuration.
70696
+ * @summary Get Service Provider Configuration.
70697
+ * @param {*} [axiosOptions] Override http request option.
70698
+ * @throws {RequiredError}
70699
+ */
70700
+ async getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2025>> {
70701
+ const localVarAxiosArgs = await localVarAxiosParamCreator.getAuthOrgServiceProviderConfig(axiosOptions);
70702
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
70703
+ const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.getAuthOrgServiceProviderConfig']?.[localVarOperationServerIndex]?.url;
70704
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
70705
+ },
70706
+ /**
70707
+ * This API returns the details of an org\'s session auth configuration.
70708
+ * @summary Get Auth Org Session Configuration.
70709
+ * @param {*} [axiosOptions] Override http request option.
70710
+ * @throws {RequiredError}
70711
+ */
70712
+ async getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2025>> {
70713
+ const localVarAxiosArgs = await localVarAxiosParamCreator.getAuthOrgSessionConfig(axiosOptions);
70714
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
70715
+ const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.getAuthOrgSessionConfig']?.[localVarOperationServerIndex]?.url;
70716
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
70717
+ },
70718
+ /**
70719
+ * This API updates an existing lockout configuration for an org using PATCH
70720
+ * @summary Update Auth Org Lockout Configuration
70721
+ * @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: &#x60;1. maximumAttempts &gt;&#x3D; 1 &amp;&amp; maximumAttempts &lt;&#x3D; 15 2. lockoutDuration &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60 3. lockoutWindow &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60&#x60;
70722
+ * @param {*} [axiosOptions] Override http request option.
70723
+ * @throws {RequiredError}
70724
+ */
70725
+ async patchAuthOrgLockoutConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2025>> {
70726
+ const localVarAxiosArgs = await localVarAxiosParamCreator.patchAuthOrgLockoutConfig(jsonPatchOperationV2025, axiosOptions);
70727
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
70728
+ const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.patchAuthOrgLockoutConfig']?.[localVarOperationServerIndex]?.url;
70729
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
70730
+ },
69087
70731
  /**
69088
70732
  * This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
69089
70733
  * @summary Update security network configuration.
@@ -69097,6 +70741,32 @@ export const GlobalTenantSecuritySettingsV2025ApiFp = function(configuration?: C
69097
70741
  const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.patchAuthOrgNetworkConfig']?.[localVarOperationServerIndex]?.url;
69098
70742
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
69099
70743
  },
70744
+ /**
70745
+ * This API updates an existing service provider configuration for an org using PATCH.
70746
+ * @summary Update Service Provider Configuration
70747
+ * @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
70748
+ * @param {*} [axiosOptions] Override http request option.
70749
+ * @throws {RequiredError}
70750
+ */
70751
+ async patchAuthOrgServiceProviderConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2025>> {
70752
+ const localVarAxiosArgs = await localVarAxiosParamCreator.patchAuthOrgServiceProviderConfig(jsonPatchOperationV2025, axiosOptions);
70753
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
70754
+ const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.patchAuthOrgServiceProviderConfig']?.[localVarOperationServerIndex]?.url;
70755
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
70756
+ },
70757
+ /**
70758
+ * This API updates an existing session configuration for an org using PATCH.
70759
+ * @summary Update Auth Org Session Configuration
70760
+ * @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: &#x60;1. maxSessionTime &gt;&#x3D; 1 &amp;&amp; maxSessionTime &lt;&#x3D; 10080 (1 week) 2. maxIdleTime &gt;&#x3D; 1 &amp;&amp; maxIdleTime &lt;&#x3D; 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.&#x60;
70761
+ * @param {*} [axiosOptions] Override http request option.
70762
+ * @throws {RequiredError}
70763
+ */
70764
+ async patchAuthOrgSessionConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2025>> {
70765
+ const localVarAxiosArgs = await localVarAxiosParamCreator.patchAuthOrgSessionConfig(jsonPatchOperationV2025, axiosOptions);
70766
+ const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
70767
+ const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.patchAuthOrgSessionConfig']?.[localVarOperationServerIndex]?.url;
70768
+ return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
70769
+ },
69100
70770
  }
69101
70771
  };
69102
70772
 
@@ -69117,6 +70787,15 @@ export const GlobalTenantSecuritySettingsV2025ApiFactory = function (configurati
69117
70787
  createAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiCreateAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2025> {
69118
70788
  return localVarFp.createAuthOrgNetworkConfig(requestParameters.networkConfigurationV2025, axiosOptions).then((request) => request(axios, basePath));
69119
70789
  },
70790
+ /**
70791
+ * This API returns the details of an org\'s lockout auth configuration.
70792
+ * @summary Get Auth Org Lockout Configuration.
70793
+ * @param {*} [axiosOptions] Override http request option.
70794
+ * @throws {RequiredError}
70795
+ */
70796
+ getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2025> {
70797
+ return localVarFp.getAuthOrgLockoutConfig(axiosOptions).then((request) => request(axios, basePath));
70798
+ },
69120
70799
  /**
69121
70800
  * This API returns the details of an org\'s network auth configuration.
69122
70801
  * @summary Get security network configuration.
@@ -69126,6 +70805,34 @@ export const GlobalTenantSecuritySettingsV2025ApiFactory = function (configurati
69126
70805
  getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2025> {
69127
70806
  return localVarFp.getAuthOrgNetworkConfig(axiosOptions).then((request) => request(axios, basePath));
69128
70807
  },
70808
+ /**
70809
+ * This API returns the details of an org\'s service provider auth configuration.
70810
+ * @summary Get Service Provider Configuration.
70811
+ * @param {*} [axiosOptions] Override http request option.
70812
+ * @throws {RequiredError}
70813
+ */
70814
+ getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2025> {
70815
+ return localVarFp.getAuthOrgServiceProviderConfig(axiosOptions).then((request) => request(axios, basePath));
70816
+ },
70817
+ /**
70818
+ * This API returns the details of an org\'s session auth configuration.
70819
+ * @summary Get Auth Org Session Configuration.
70820
+ * @param {*} [axiosOptions] Override http request option.
70821
+ * @throws {RequiredError}
70822
+ */
70823
+ getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2025> {
70824
+ return localVarFp.getAuthOrgSessionConfig(axiosOptions).then((request) => request(axios, basePath));
70825
+ },
70826
+ /**
70827
+ * This API updates an existing lockout configuration for an org using PATCH
70828
+ * @summary Update Auth Org Lockout Configuration
70829
+ * @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
70830
+ * @param {*} [axiosOptions] Override http request option.
70831
+ * @throws {RequiredError}
70832
+ */
70833
+ patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2025> {
70834
+ return localVarFp.patchAuthOrgLockoutConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(axios, basePath));
70835
+ },
69129
70836
  /**
69130
70837
  * This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
69131
70838
  * @summary Update security network configuration.
@@ -69136,6 +70843,26 @@ export const GlobalTenantSecuritySettingsV2025ApiFactory = function (configurati
69136
70843
  patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2025> {
69137
70844
  return localVarFp.patchAuthOrgNetworkConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(axios, basePath));
69138
70845
  },
70846
+ /**
70847
+ * This API updates an existing service provider configuration for an org using PATCH.
70848
+ * @summary Update Service Provider Configuration
70849
+ * @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
70850
+ * @param {*} [axiosOptions] Override http request option.
70851
+ * @throws {RequiredError}
70852
+ */
70853
+ patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2025> {
70854
+ return localVarFp.patchAuthOrgServiceProviderConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(axios, basePath));
70855
+ },
70856
+ /**
70857
+ * This API updates an existing session configuration for an org using PATCH.
70858
+ * @summary Update Auth Org Session Configuration
70859
+ * @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
70860
+ * @param {*} [axiosOptions] Override http request option.
70861
+ * @throws {RequiredError}
70862
+ */
70863
+ patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2025> {
70864
+ return localVarFp.patchAuthOrgSessionConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(axios, basePath));
70865
+ },
69139
70866
  };
69140
70867
  };
69141
70868
 
@@ -69153,6 +70880,20 @@ export interface GlobalTenantSecuritySettingsV2025ApiCreateAuthOrgNetworkConfigR
69153
70880
  readonly networkConfigurationV2025: NetworkConfigurationV2025
69154
70881
  }
69155
70882
 
70883
+ /**
70884
+ * Request parameters for patchAuthOrgLockoutConfig operation in GlobalTenantSecuritySettingsV2025Api.
70885
+ * @export
70886
+ * @interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest
70887
+ */
70888
+ export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest {
70889
+ /**
70890
+ * A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: &#x60;1. maximumAttempts &gt;&#x3D; 1 &amp;&amp; maximumAttempts &lt;&#x3D; 15 2. lockoutDuration &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60 3. lockoutWindow &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60&#x60;
70891
+ * @type {Array<JsonPatchOperationV2025>}
70892
+ * @memberof GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfig
70893
+ */
70894
+ readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>
70895
+ }
70896
+
69156
70897
  /**
69157
70898
  * Request parameters for patchAuthOrgNetworkConfig operation in GlobalTenantSecuritySettingsV2025Api.
69158
70899
  * @export
@@ -69167,6 +70908,34 @@ export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgNetworkConfigRe
69167
70908
  readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>
69168
70909
  }
69169
70910
 
70911
+ /**
70912
+ * Request parameters for patchAuthOrgServiceProviderConfig operation in GlobalTenantSecuritySettingsV2025Api.
70913
+ * @export
70914
+ * @interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest
70915
+ */
70916
+ export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest {
70917
+ /**
70918
+ * A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
70919
+ * @type {Array<JsonPatchOperationV2025>}
70920
+ * @memberof GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfig
70921
+ */
70922
+ readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>
70923
+ }
70924
+
70925
+ /**
70926
+ * Request parameters for patchAuthOrgSessionConfig operation in GlobalTenantSecuritySettingsV2025Api.
70927
+ * @export
70928
+ * @interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest
70929
+ */
70930
+ export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest {
70931
+ /**
70932
+ * A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: &#x60;1. maxSessionTime &gt;&#x3D; 1 &amp;&amp; maxSessionTime &lt;&#x3D; 10080 (1 week) 2. maxIdleTime &gt;&#x3D; 1 &amp;&amp; maxIdleTime &lt;&#x3D; 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.&#x60;
70933
+ * @type {Array<JsonPatchOperationV2025>}
70934
+ * @memberof GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfig
70935
+ */
70936
+ readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>
70937
+ }
70938
+
69170
70939
  /**
69171
70940
  * GlobalTenantSecuritySettingsV2025Api - object-oriented interface
69172
70941
  * @export
@@ -69186,6 +70955,17 @@ export class GlobalTenantSecuritySettingsV2025Api extends BaseAPI {
69186
70955
  return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).createAuthOrgNetworkConfig(requestParameters.networkConfigurationV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
69187
70956
  }
69188
70957
 
70958
+ /**
70959
+ * This API returns the details of an org\'s lockout auth configuration.
70960
+ * @summary Get Auth Org Lockout Configuration.
70961
+ * @param {*} [axiosOptions] Override http request option.
70962
+ * @throws {RequiredError}
70963
+ * @memberof GlobalTenantSecuritySettingsV2025Api
70964
+ */
70965
+ public getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig) {
70966
+ return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).getAuthOrgLockoutConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
70967
+ }
70968
+
69189
70969
  /**
69190
70970
  * This API returns the details of an org\'s network auth configuration.
69191
70971
  * @summary Get security network configuration.
@@ -69197,6 +70977,40 @@ export class GlobalTenantSecuritySettingsV2025Api extends BaseAPI {
69197
70977
  return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).getAuthOrgNetworkConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
69198
70978
  }
69199
70979
 
70980
+ /**
70981
+ * This API returns the details of an org\'s service provider auth configuration.
70982
+ * @summary Get Service Provider Configuration.
70983
+ * @param {*} [axiosOptions] Override http request option.
70984
+ * @throws {RequiredError}
70985
+ * @memberof GlobalTenantSecuritySettingsV2025Api
70986
+ */
70987
+ public getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig) {
70988
+ return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).getAuthOrgServiceProviderConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
70989
+ }
70990
+
70991
+ /**
70992
+ * This API returns the details of an org\'s session auth configuration.
70993
+ * @summary Get Auth Org Session Configuration.
70994
+ * @param {*} [axiosOptions] Override http request option.
70995
+ * @throws {RequiredError}
70996
+ * @memberof GlobalTenantSecuritySettingsV2025Api
70997
+ */
70998
+ public getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig) {
70999
+ return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).getAuthOrgSessionConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
71000
+ }
71001
+
71002
+ /**
71003
+ * This API updates an existing lockout configuration for an org using PATCH
71004
+ * @summary Update Auth Org Lockout Configuration
71005
+ * @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
71006
+ * @param {*} [axiosOptions] Override http request option.
71007
+ * @throws {RequiredError}
71008
+ * @memberof GlobalTenantSecuritySettingsV2025Api
71009
+ */
71010
+ public patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
71011
+ return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).patchAuthOrgLockoutConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
71012
+ }
71013
+
69200
71014
  /**
69201
71015
  * This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
69202
71016
  * @summary Update security network configuration.
@@ -69208,6 +71022,30 @@ export class GlobalTenantSecuritySettingsV2025Api extends BaseAPI {
69208
71022
  public patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
69209
71023
  return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).patchAuthOrgNetworkConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
69210
71024
  }
71025
+
71026
+ /**
71027
+ * This API updates an existing service provider configuration for an org using PATCH.
71028
+ * @summary Update Service Provider Configuration
71029
+ * @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
71030
+ * @param {*} [axiosOptions] Override http request option.
71031
+ * @throws {RequiredError}
71032
+ * @memberof GlobalTenantSecuritySettingsV2025Api
71033
+ */
71034
+ public patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
71035
+ return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).patchAuthOrgServiceProviderConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
71036
+ }
71037
+
71038
+ /**
71039
+ * This API updates an existing session configuration for an org using PATCH.
71040
+ * @summary Update Auth Org Session Configuration
71041
+ * @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
71042
+ * @param {*} [axiosOptions] Override http request option.
71043
+ * @throws {RequiredError}
71044
+ * @memberof GlobalTenantSecuritySettingsV2025Api
71045
+ */
71046
+ public patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
71047
+ return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).patchAuthOrgSessionConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
71048
+ }
69211
71049
  }
69212
71050
 
69213
71051