sailpoint-api-client 1.5.0 → 1.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/beta/README.md +2 -2
- package/beta/api.ts +499 -109
- package/beta/common.ts +2 -2
- package/beta/package.json +1 -1
- package/dist/beta/api.d.ts +429 -70
- package/dist/beta/api.js +162 -99
- package/dist/beta/api.js.map +1 -1
- package/dist/beta/common.js +1 -1
- package/dist/v2024/api.d.ts +1186 -9
- package/dist/v2024/api.js +811 -87
- package/dist/v2024/api.js.map +1 -1
- package/dist/v2024/common.js +1 -1
- package/dist/v2025/api.d.ts +1452 -9
- package/dist/v2025/api.js +912 -72
- package/dist/v2025/api.js.map +1 -1
- package/dist/v2025/common.js +1 -1
- package/dist/v3/api.d.ts +502 -21
- package/dist/v3/api.js +95 -27
- package/dist/v3/api.js.map +1 -1
- package/dist/v3/common.js +1 -1
- package/package.json +1 -1
- package/v2024/README.md +2 -2
- package/v2024/api.ts +1524 -10
- package/v2024/common.ts +2 -2
- package/v2024/package.json +1 -1
- package/v2025/README.md +2 -2
- package/v2025/api.ts +1908 -70
- package/v2025/common.ts +2 -2
- package/v2025/package.json +1 -1
- package/v3/README.md +2 -2
- package/v3/api.ts +543 -28
- package/v3/common.ts +2 -2
- package/v3/package.json +1 -1
package/v3/api.ts
CHANGED
|
@@ -1146,6 +1146,12 @@ export interface AccessRequest {
|
|
|
1146
1146
|
* @memberof AccessRequest
|
|
1147
1147
|
*/
|
|
1148
1148
|
'clientMetadata'?: { [key: string]: string; };
|
|
1149
|
+
/**
|
|
1150
|
+
* Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
|
|
1151
|
+
* @type {Array<RequestedForDtoRef>}
|
|
1152
|
+
* @memberof AccessRequest
|
|
1153
|
+
*/
|
|
1154
|
+
'requestedForWithRequestedItems'?: Array<RequestedForDtoRef> | null;
|
|
1149
1155
|
}
|
|
1150
1156
|
|
|
1151
1157
|
|
|
@@ -1228,6 +1234,18 @@ export interface AccessRequestItem {
|
|
|
1228
1234
|
* @memberof AccessRequestItem
|
|
1229
1235
|
*/
|
|
1230
1236
|
'removeDate'?: string;
|
|
1237
|
+
/**
|
|
1238
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
1239
|
+
* @type {string}
|
|
1240
|
+
* @memberof AccessRequestItem
|
|
1241
|
+
*/
|
|
1242
|
+
'assignmentId'?: string | null;
|
|
1243
|
+
/**
|
|
1244
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
1245
|
+
* @type {string}
|
|
1246
|
+
* @memberof AccessRequestItem
|
|
1247
|
+
*/
|
|
1248
|
+
'nativeIdentity'?: string | null;
|
|
1231
1249
|
}
|
|
1232
1250
|
|
|
1233
1251
|
export const AccessRequestItemTypeV3 = {
|
|
@@ -2544,6 +2562,25 @@ export interface AccountAttributesCreateAttributes {
|
|
|
2544
2562
|
*/
|
|
2545
2563
|
'sourceId': string;
|
|
2546
2564
|
}
|
|
2565
|
+
/**
|
|
2566
|
+
*
|
|
2567
|
+
* @export
|
|
2568
|
+
* @interface AccountItemRef
|
|
2569
|
+
*/
|
|
2570
|
+
export interface AccountItemRef {
|
|
2571
|
+
/**
|
|
2572
|
+
* The uuid for the account, available under the \'objectguid\' attribute
|
|
2573
|
+
* @type {string}
|
|
2574
|
+
* @memberof AccountItemRef
|
|
2575
|
+
*/
|
|
2576
|
+
'accountUuid'?: string | null;
|
|
2577
|
+
/**
|
|
2578
|
+
* The \'distinguishedName\' attribute for the account
|
|
2579
|
+
* @type {string}
|
|
2580
|
+
* @memberof AccountItemRef
|
|
2581
|
+
*/
|
|
2582
|
+
'nativeIdentity'?: string;
|
|
2583
|
+
}
|
|
2547
2584
|
/**
|
|
2548
2585
|
*
|
|
2549
2586
|
* @export
|
|
@@ -3628,7 +3665,8 @@ export const AttributeDefinitionType = {
|
|
|
3628
3665
|
String: 'STRING',
|
|
3629
3666
|
Long: 'LONG',
|
|
3630
3667
|
Int: 'INT',
|
|
3631
|
-
Boolean: 'BOOLEAN'
|
|
3668
|
+
Boolean: 'BOOLEAN',
|
|
3669
|
+
Date: 'DATE'
|
|
3632
3670
|
} as const;
|
|
3633
3671
|
|
|
3634
3672
|
export type AttributeDefinitionType = typeof AttributeDefinitionType[keyof typeof AttributeDefinitionType];
|
|
@@ -9835,6 +9873,188 @@ export const GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = {
|
|
|
9835
9873
|
|
|
9836
9874
|
export type GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = typeof GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3[keyof typeof GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3];
|
|
9837
9875
|
|
|
9876
|
+
/**
|
|
9877
|
+
*
|
|
9878
|
+
* @export
|
|
9879
|
+
* @interface GetCampaign200Response
|
|
9880
|
+
*/
|
|
9881
|
+
export interface GetCampaign200Response {
|
|
9882
|
+
/**
|
|
9883
|
+
* Id of the campaign
|
|
9884
|
+
* @type {string}
|
|
9885
|
+
* @memberof GetCampaign200Response
|
|
9886
|
+
*/
|
|
9887
|
+
'id'?: string;
|
|
9888
|
+
/**
|
|
9889
|
+
* The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
9890
|
+
* @type {string}
|
|
9891
|
+
* @memberof GetCampaign200Response
|
|
9892
|
+
*/
|
|
9893
|
+
'name': string;
|
|
9894
|
+
/**
|
|
9895
|
+
* The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
9896
|
+
* @type {string}
|
|
9897
|
+
* @memberof GetCampaign200Response
|
|
9898
|
+
*/
|
|
9899
|
+
'description': string | null;
|
|
9900
|
+
/**
|
|
9901
|
+
* The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
|
|
9902
|
+
* @type {string}
|
|
9903
|
+
* @memberof GetCampaign200Response
|
|
9904
|
+
*/
|
|
9905
|
+
'deadline'?: string;
|
|
9906
|
+
/**
|
|
9907
|
+
* The type of campaign. Could be extended in the future.
|
|
9908
|
+
* @type {string}
|
|
9909
|
+
* @memberof GetCampaign200Response
|
|
9910
|
+
*/
|
|
9911
|
+
'type': GetCampaign200ResponseTypeV3;
|
|
9912
|
+
/**
|
|
9913
|
+
* Enables email notification for this campaign
|
|
9914
|
+
* @type {boolean}
|
|
9915
|
+
* @memberof GetCampaign200Response
|
|
9916
|
+
*/
|
|
9917
|
+
'emailNotificationEnabled'?: boolean;
|
|
9918
|
+
/**
|
|
9919
|
+
* Allows auto revoke for this campaign
|
|
9920
|
+
* @type {boolean}
|
|
9921
|
+
* @memberof GetCampaign200Response
|
|
9922
|
+
*/
|
|
9923
|
+
'autoRevokeAllowed'?: boolean;
|
|
9924
|
+
/**
|
|
9925
|
+
* Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
|
|
9926
|
+
* @type {boolean}
|
|
9927
|
+
* @memberof GetCampaign200Response
|
|
9928
|
+
*/
|
|
9929
|
+
'recommendationsEnabled'?: boolean;
|
|
9930
|
+
/**
|
|
9931
|
+
* The campaign\'s current status.
|
|
9932
|
+
* @type {string}
|
|
9933
|
+
* @memberof GetCampaign200Response
|
|
9934
|
+
*/
|
|
9935
|
+
'status'?: GetCampaign200ResponseStatusV3;
|
|
9936
|
+
/**
|
|
9937
|
+
* The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
|
|
9938
|
+
* @type {string}
|
|
9939
|
+
* @memberof GetCampaign200Response
|
|
9940
|
+
*/
|
|
9941
|
+
'correlatedStatus'?: GetCampaign200ResponseCorrelatedStatusV3;
|
|
9942
|
+
/**
|
|
9943
|
+
* Created time of the campaign
|
|
9944
|
+
* @type {string}
|
|
9945
|
+
* @memberof GetCampaign200Response
|
|
9946
|
+
*/
|
|
9947
|
+
'created'?: string;
|
|
9948
|
+
/**
|
|
9949
|
+
* The total number of certifications in this campaign.
|
|
9950
|
+
* @type {number}
|
|
9951
|
+
* @memberof GetCampaign200Response
|
|
9952
|
+
*/
|
|
9953
|
+
'totalCertifications'?: number;
|
|
9954
|
+
/**
|
|
9955
|
+
* The number of completed certifications in this campaign.
|
|
9956
|
+
* @type {number}
|
|
9957
|
+
* @memberof GetCampaign200Response
|
|
9958
|
+
*/
|
|
9959
|
+
'completedCertifications'?: number;
|
|
9960
|
+
/**
|
|
9961
|
+
* A list of errors and warnings that have accumulated.
|
|
9962
|
+
* @type {Array<CampaignAlert>}
|
|
9963
|
+
* @memberof GetCampaign200Response
|
|
9964
|
+
*/
|
|
9965
|
+
'alerts'?: Array<CampaignAlert>;
|
|
9966
|
+
/**
|
|
9967
|
+
* Modified time of the campaign
|
|
9968
|
+
* @type {string}
|
|
9969
|
+
* @memberof GetCampaign200Response
|
|
9970
|
+
*/
|
|
9971
|
+
'modified'?: string;
|
|
9972
|
+
/**
|
|
9973
|
+
*
|
|
9974
|
+
* @type {CampaignAllOfFilter}
|
|
9975
|
+
* @memberof GetCampaign200Response
|
|
9976
|
+
*/
|
|
9977
|
+
'filter'?: CampaignAllOfFilter;
|
|
9978
|
+
/**
|
|
9979
|
+
* Determines if comments on sunset date changes are required.
|
|
9980
|
+
* @type {boolean}
|
|
9981
|
+
* @memberof GetCampaign200Response
|
|
9982
|
+
*/
|
|
9983
|
+
'sunsetCommentsRequired'?: boolean;
|
|
9984
|
+
/**
|
|
9985
|
+
*
|
|
9986
|
+
* @type {CampaignAllOfSourceOwnerCampaignInfo}
|
|
9987
|
+
* @memberof GetCampaign200Response
|
|
9988
|
+
*/
|
|
9989
|
+
'sourceOwnerCampaignInfo'?: CampaignAllOfSourceOwnerCampaignInfo;
|
|
9990
|
+
/**
|
|
9991
|
+
*
|
|
9992
|
+
* @type {CampaignAllOfSearchCampaignInfo}
|
|
9993
|
+
* @memberof GetCampaign200Response
|
|
9994
|
+
*/
|
|
9995
|
+
'searchCampaignInfo'?: CampaignAllOfSearchCampaignInfo;
|
|
9996
|
+
/**
|
|
9997
|
+
*
|
|
9998
|
+
* @type {CampaignAllOfRoleCompositionCampaignInfo}
|
|
9999
|
+
* @memberof GetCampaign200Response
|
|
10000
|
+
*/
|
|
10001
|
+
'roleCompositionCampaignInfo'?: CampaignAllOfRoleCompositionCampaignInfo;
|
|
10002
|
+
/**
|
|
10003
|
+
*
|
|
10004
|
+
* @type {CampaignAllOfMachineAccountCampaignInfo}
|
|
10005
|
+
* @memberof GetCampaign200Response
|
|
10006
|
+
*/
|
|
10007
|
+
'machineAccountCampaignInfo'?: CampaignAllOfMachineAccountCampaignInfo;
|
|
10008
|
+
/**
|
|
10009
|
+
* A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
|
|
10010
|
+
* @type {Array<CampaignAllOfSourcesWithOrphanEntitlements>}
|
|
10011
|
+
* @memberof GetCampaign200Response
|
|
10012
|
+
*/
|
|
10013
|
+
'sourcesWithOrphanEntitlements'?: Array<CampaignAllOfSourcesWithOrphanEntitlements>;
|
|
10014
|
+
/**
|
|
10015
|
+
* Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
|
|
10016
|
+
* @type {string}
|
|
10017
|
+
* @memberof GetCampaign200Response
|
|
10018
|
+
*/
|
|
10019
|
+
'mandatoryCommentRequirement'?: GetCampaign200ResponseMandatoryCommentRequirementV3;
|
|
10020
|
+
}
|
|
10021
|
+
|
|
10022
|
+
export const GetCampaign200ResponseTypeV3 = {
|
|
10023
|
+
Manager: 'MANAGER',
|
|
10024
|
+
SourceOwner: 'SOURCE_OWNER',
|
|
10025
|
+
Search: 'SEARCH',
|
|
10026
|
+
RoleComposition: 'ROLE_COMPOSITION',
|
|
10027
|
+
MachineAccount: 'MACHINE_ACCOUNT'
|
|
10028
|
+
} as const;
|
|
10029
|
+
|
|
10030
|
+
export type GetCampaign200ResponseTypeV3 = typeof GetCampaign200ResponseTypeV3[keyof typeof GetCampaign200ResponseTypeV3];
|
|
10031
|
+
export const GetCampaign200ResponseStatusV3 = {
|
|
10032
|
+
Pending: 'PENDING',
|
|
10033
|
+
Staged: 'STAGED',
|
|
10034
|
+
Canceling: 'CANCELING',
|
|
10035
|
+
Activating: 'ACTIVATING',
|
|
10036
|
+
Active: 'ACTIVE',
|
|
10037
|
+
Completing: 'COMPLETING',
|
|
10038
|
+
Completed: 'COMPLETED',
|
|
10039
|
+
Error: 'ERROR',
|
|
10040
|
+
Archived: 'ARCHIVED'
|
|
10041
|
+
} as const;
|
|
10042
|
+
|
|
10043
|
+
export type GetCampaign200ResponseStatusV3 = typeof GetCampaign200ResponseStatusV3[keyof typeof GetCampaign200ResponseStatusV3];
|
|
10044
|
+
export const GetCampaign200ResponseCorrelatedStatusV3 = {
|
|
10045
|
+
Correlated: 'CORRELATED',
|
|
10046
|
+
Uncorrelated: 'UNCORRELATED'
|
|
10047
|
+
} as const;
|
|
10048
|
+
|
|
10049
|
+
export type GetCampaign200ResponseCorrelatedStatusV3 = typeof GetCampaign200ResponseCorrelatedStatusV3[keyof typeof GetCampaign200ResponseCorrelatedStatusV3];
|
|
10050
|
+
export const GetCampaign200ResponseMandatoryCommentRequirementV3 = {
|
|
10051
|
+
AllDecisions: 'ALL_DECISIONS',
|
|
10052
|
+
RevokeOnlyDecisions: 'REVOKE_ONLY_DECISIONS',
|
|
10053
|
+
NoDecisions: 'NO_DECISIONS'
|
|
10054
|
+
} as const;
|
|
10055
|
+
|
|
10056
|
+
export type GetCampaign200ResponseMandatoryCommentRequirementV3 = typeof GetCampaign200ResponseMandatoryCommentRequirementV3[keyof typeof GetCampaign200ResponseMandatoryCommentRequirementV3];
|
|
10057
|
+
|
|
9838
10058
|
/**
|
|
9839
10059
|
* @type GetDiscoveredApplications200ResponseInner
|
|
9840
10060
|
* @export
|
|
@@ -11576,7 +11796,7 @@ export interface IdpDetails {
|
|
|
11576
11796
|
* @type {string}
|
|
11577
11797
|
* @memberof IdpDetails
|
|
11578
11798
|
*/
|
|
11579
|
-
'
|
|
11799
|
+
'authnContext'?: string;
|
|
11580
11800
|
/**
|
|
11581
11801
|
* The IDP logout URL. Used with IDP configurations.
|
|
11582
11802
|
* @type {string}
|
|
@@ -11588,7 +11808,7 @@ export interface IdpDetails {
|
|
|
11588
11808
|
* @type {boolean}
|
|
11589
11809
|
* @memberof IdpDetails
|
|
11590
11810
|
*/
|
|
11591
|
-
'
|
|
11811
|
+
'includeAuthnContext'?: boolean;
|
|
11592
11812
|
/**
|
|
11593
11813
|
* The name id format to use. Used with IDP configurations.
|
|
11594
11814
|
* @type {string}
|
|
@@ -11624,7 +11844,7 @@ export interface IdpDetails {
|
|
|
11624
11844
|
* @type {string}
|
|
11625
11845
|
* @memberof IdpDetails
|
|
11626
11846
|
*/
|
|
11627
|
-
'mappingAttribute'
|
|
11847
|
+
'mappingAttribute': string;
|
|
11628
11848
|
/**
|
|
11629
11849
|
* The expiration date extracted from the certificate.
|
|
11630
11850
|
* @type {string}
|
|
@@ -11640,7 +11860,8 @@ export interface IdpDetails {
|
|
|
11640
11860
|
}
|
|
11641
11861
|
|
|
11642
11862
|
export const IdpDetailsRoleV3 = {
|
|
11643
|
-
SamlIdp: 'SAML_IDP'
|
|
11863
|
+
SamlIdp: 'SAML_IDP',
|
|
11864
|
+
SamlSp: 'SAML_SP'
|
|
11644
11865
|
} as const;
|
|
11645
11866
|
|
|
11646
11867
|
export type IdpDetailsRoleV3 = typeof IdpDetailsRoleV3[keyof typeof IdpDetailsRoleV3];
|
|
@@ -15955,7 +16176,7 @@ export interface ProvisioningPolicy {
|
|
|
15955
16176
|
* @type {string}
|
|
15956
16177
|
* @memberof ProvisioningPolicy
|
|
15957
16178
|
*/
|
|
15958
|
-
'name': string;
|
|
16179
|
+
'name': string | null;
|
|
15959
16180
|
/**
|
|
15960
16181
|
* the description of the provisioning policy
|
|
15961
16182
|
* @type {string}
|
|
@@ -15988,7 +16209,7 @@ export interface ProvisioningPolicyDto {
|
|
|
15988
16209
|
* @type {string}
|
|
15989
16210
|
* @memberof ProvisioningPolicyDto
|
|
15990
16211
|
*/
|
|
15991
|
-
'name': string;
|
|
16212
|
+
'name': string | null;
|
|
15992
16213
|
/**
|
|
15993
16214
|
* the description of the provisioning policy
|
|
15994
16215
|
* @type {string}
|
|
@@ -17226,6 +17447,25 @@ export interface RequestedAccountRef {
|
|
|
17226
17447
|
}
|
|
17227
17448
|
|
|
17228
17449
|
|
|
17450
|
+
/**
|
|
17451
|
+
*
|
|
17452
|
+
* @export
|
|
17453
|
+
* @interface RequestedForDtoRef
|
|
17454
|
+
*/
|
|
17455
|
+
export interface RequestedForDtoRef {
|
|
17456
|
+
/**
|
|
17457
|
+
* The identity id for which the access is requested
|
|
17458
|
+
* @type {string}
|
|
17459
|
+
* @memberof RequestedForDtoRef
|
|
17460
|
+
*/
|
|
17461
|
+
'identityId': string;
|
|
17462
|
+
/**
|
|
17463
|
+
* the details for the access items that are requested for the identity
|
|
17464
|
+
* @type {Array<RequestedItemDtoRef>}
|
|
17465
|
+
* @memberof RequestedForDtoRef
|
|
17466
|
+
*/
|
|
17467
|
+
'requestedItems': Array<RequestedItemDtoRef>;
|
|
17468
|
+
}
|
|
17229
17469
|
/**
|
|
17230
17470
|
*
|
|
17231
17471
|
* @export
|
|
@@ -17254,6 +17494,70 @@ export const RequestedItemDetailsTypeV3 = {
|
|
|
17254
17494
|
|
|
17255
17495
|
export type RequestedItemDetailsTypeV3 = typeof RequestedItemDetailsTypeV3[keyof typeof RequestedItemDetailsTypeV3];
|
|
17256
17496
|
|
|
17497
|
+
/**
|
|
17498
|
+
*
|
|
17499
|
+
* @export
|
|
17500
|
+
* @interface RequestedItemDtoRef
|
|
17501
|
+
*/
|
|
17502
|
+
export interface RequestedItemDtoRef {
|
|
17503
|
+
/**
|
|
17504
|
+
* The type of the item being requested.
|
|
17505
|
+
* @type {string}
|
|
17506
|
+
* @memberof RequestedItemDtoRef
|
|
17507
|
+
*/
|
|
17508
|
+
'type': RequestedItemDtoRefTypeV3;
|
|
17509
|
+
/**
|
|
17510
|
+
* ID of Role, Access Profile or Entitlement being requested.
|
|
17511
|
+
* @type {string}
|
|
17512
|
+
* @memberof RequestedItemDtoRef
|
|
17513
|
+
*/
|
|
17514
|
+
'id': string;
|
|
17515
|
+
/**
|
|
17516
|
+
* Comment provided by requester. * Comment is required when the request is of type Revoke Access.
|
|
17517
|
+
* @type {string}
|
|
17518
|
+
* @memberof RequestedItemDtoRef
|
|
17519
|
+
*/
|
|
17520
|
+
'comment'?: string;
|
|
17521
|
+
/**
|
|
17522
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
|
|
17523
|
+
* @type {{ [key: string]: string; }}
|
|
17524
|
+
* @memberof RequestedItemDtoRef
|
|
17525
|
+
*/
|
|
17526
|
+
'clientMetadata'?: { [key: string]: string; };
|
|
17527
|
+
/**
|
|
17528
|
+
* The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
|
|
17529
|
+
* @type {string}
|
|
17530
|
+
* @memberof RequestedItemDtoRef
|
|
17531
|
+
*/
|
|
17532
|
+
'removeDate'?: string;
|
|
17533
|
+
/**
|
|
17534
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
17535
|
+
* @type {string}
|
|
17536
|
+
* @memberof RequestedItemDtoRef
|
|
17537
|
+
*/
|
|
17538
|
+
'assignmentId'?: string | null;
|
|
17539
|
+
/**
|
|
17540
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
17541
|
+
* @type {string}
|
|
17542
|
+
* @memberof RequestedItemDtoRef
|
|
17543
|
+
*/
|
|
17544
|
+
'nativeIdentity'?: string | null;
|
|
17545
|
+
/**
|
|
17546
|
+
* The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
|
|
17547
|
+
* @type {Array<SourceItemRef>}
|
|
17548
|
+
* @memberof RequestedItemDtoRef
|
|
17549
|
+
*/
|
|
17550
|
+
'accountSelection'?: Array<SourceItemRef> | null;
|
|
17551
|
+
}
|
|
17552
|
+
|
|
17553
|
+
export const RequestedItemDtoRefTypeV3 = {
|
|
17554
|
+
AccessProfile: 'ACCESS_PROFILE',
|
|
17555
|
+
Role: 'ROLE',
|
|
17556
|
+
Entitlement: 'ENTITLEMENT'
|
|
17557
|
+
} as const;
|
|
17558
|
+
|
|
17559
|
+
export type RequestedItemDtoRefTypeV3 = typeof RequestedItemDtoRefTypeV3[keyof typeof RequestedItemDtoRefTypeV3];
|
|
17560
|
+
|
|
17257
17561
|
/**
|
|
17258
17562
|
*
|
|
17259
17563
|
* @export
|
|
@@ -20714,10 +21018,121 @@ export interface ServiceProviderConfiguration {
|
|
|
20714
21018
|
'federationProtocolDetails'?: Array<ServiceProviderConfigurationFederationProtocolDetailsInner>;
|
|
20715
21019
|
}
|
|
20716
21020
|
/**
|
|
20717
|
-
*
|
|
21021
|
+
*
|
|
20718
21022
|
* @export
|
|
21023
|
+
* @interface ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
20719
21024
|
*/
|
|
20720
|
-
export
|
|
21025
|
+
export interface ServiceProviderConfigurationFederationProtocolDetailsInner {
|
|
21026
|
+
/**
|
|
21027
|
+
* Federation protocol role
|
|
21028
|
+
* @type {string}
|
|
21029
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21030
|
+
*/
|
|
21031
|
+
'role'?: ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3;
|
|
21032
|
+
/**
|
|
21033
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
21034
|
+
* @type {string}
|
|
21035
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21036
|
+
*/
|
|
21037
|
+
'entityId'?: string;
|
|
21038
|
+
/**
|
|
21039
|
+
* Defines the binding used for the SAML flow. Used with IDP configurations.
|
|
21040
|
+
* @type {string}
|
|
21041
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21042
|
+
*/
|
|
21043
|
+
'binding'?: string;
|
|
21044
|
+
/**
|
|
21045
|
+
* Specifies the SAML authentication method to use. Used with IDP configurations.
|
|
21046
|
+
* @type {string}
|
|
21047
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21048
|
+
*/
|
|
21049
|
+
'authnContext'?: string;
|
|
21050
|
+
/**
|
|
21051
|
+
* The IDP logout URL. Used with IDP configurations.
|
|
21052
|
+
* @type {string}
|
|
21053
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21054
|
+
*/
|
|
21055
|
+
'logoutUrl'?: string;
|
|
21056
|
+
/**
|
|
21057
|
+
* Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
|
|
21058
|
+
* @type {boolean}
|
|
21059
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21060
|
+
*/
|
|
21061
|
+
'includeAuthnContext'?: boolean;
|
|
21062
|
+
/**
|
|
21063
|
+
* The name id format to use. Used with IDP configurations.
|
|
21064
|
+
* @type {string}
|
|
21065
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21066
|
+
*/
|
|
21067
|
+
'nameId'?: string;
|
|
21068
|
+
/**
|
|
21069
|
+
*
|
|
21070
|
+
* @type {JITConfiguration}
|
|
21071
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21072
|
+
*/
|
|
21073
|
+
'jitConfiguration'?: JITConfiguration;
|
|
21074
|
+
/**
|
|
21075
|
+
* The Base64-encoded certificate used by the IDP. Used with IDP configurations.
|
|
21076
|
+
* @type {string}
|
|
21077
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21078
|
+
*/
|
|
21079
|
+
'cert'?: string;
|
|
21080
|
+
/**
|
|
21081
|
+
* The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
|
|
21082
|
+
* @type {string}
|
|
21083
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21084
|
+
*/
|
|
21085
|
+
'loginUrlPost'?: string;
|
|
21086
|
+
/**
|
|
21087
|
+
* The IDP Redirect URL. Used with IDP configurations.
|
|
21088
|
+
* @type {string}
|
|
21089
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21090
|
+
*/
|
|
21091
|
+
'loginUrlRedirect'?: string;
|
|
21092
|
+
/**
|
|
21093
|
+
* Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
|
|
21094
|
+
* @type {string}
|
|
21095
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21096
|
+
*/
|
|
21097
|
+
'mappingAttribute': string;
|
|
21098
|
+
/**
|
|
21099
|
+
* The expiration date extracted from the certificate.
|
|
21100
|
+
* @type {string}
|
|
21101
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21102
|
+
*/
|
|
21103
|
+
'certificateExpirationDate'?: string;
|
|
21104
|
+
/**
|
|
21105
|
+
* The name extracted from the certificate.
|
|
21106
|
+
* @type {string}
|
|
21107
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21108
|
+
*/
|
|
21109
|
+
'certificateName'?: string;
|
|
21110
|
+
/**
|
|
21111
|
+
* Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
|
|
21112
|
+
* @type {string}
|
|
21113
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21114
|
+
*/
|
|
21115
|
+
'alias'?: string;
|
|
21116
|
+
/**
|
|
21117
|
+
* The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
|
|
21118
|
+
* @type {string}
|
|
21119
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21120
|
+
*/
|
|
21121
|
+
'callbackUrl': string;
|
|
21122
|
+
/**
|
|
21123
|
+
* The legacy ACS URL used for SAML authentication. Used with SP configurations.
|
|
21124
|
+
* @type {string}
|
|
21125
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
|
|
21126
|
+
*/
|
|
21127
|
+
'legacyAcsUrl'?: string;
|
|
21128
|
+
}
|
|
21129
|
+
|
|
21130
|
+
export const ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = {
|
|
21131
|
+
SamlIdp: 'SAML_IDP',
|
|
21132
|
+
SamlSp: 'SAML_SP'
|
|
21133
|
+
} as const;
|
|
21134
|
+
|
|
21135
|
+
export type ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = typeof ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3[keyof typeof ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3];
|
|
20721
21136
|
|
|
20722
21137
|
/**
|
|
20723
21138
|
*
|
|
@@ -21995,6 +22410,25 @@ export const SourceHealthDtoStatusV3 = {
|
|
|
21995
22410
|
|
|
21996
22411
|
export type SourceHealthDtoStatusV3 = typeof SourceHealthDtoStatusV3[keyof typeof SourceHealthDtoStatusV3];
|
|
21997
22412
|
|
|
22413
|
+
/**
|
|
22414
|
+
*
|
|
22415
|
+
* @export
|
|
22416
|
+
* @interface SourceItemRef
|
|
22417
|
+
*/
|
|
22418
|
+
export interface SourceItemRef {
|
|
22419
|
+
/**
|
|
22420
|
+
* The id for the source on which account selections are made
|
|
22421
|
+
* @type {string}
|
|
22422
|
+
* @memberof SourceItemRef
|
|
22423
|
+
*/
|
|
22424
|
+
'sourceId'?: string | null;
|
|
22425
|
+
/**
|
|
22426
|
+
* A list of account selections on the source. Currently, only one selection per source is supported.
|
|
22427
|
+
* @type {Array<AccountItemRef>}
|
|
22428
|
+
* @memberof SourceItemRef
|
|
22429
|
+
*/
|
|
22430
|
+
'accounts'?: Array<AccountItemRef> | null;
|
|
22431
|
+
}
|
|
21998
22432
|
/**
|
|
21999
22433
|
* Reference to management workgroup for the source.
|
|
22000
22434
|
* @export
|
|
@@ -22268,10 +22702,17 @@ export interface SpDetails {
|
|
|
22268
22702
|
* @type {string}
|
|
22269
22703
|
* @memberof SpDetails
|
|
22270
22704
|
*/
|
|
22271
|
-
'callbackUrl'
|
|
22705
|
+
'callbackUrl': string;
|
|
22706
|
+
/**
|
|
22707
|
+
* The legacy ACS URL used for SAML authentication. Used with SP configurations.
|
|
22708
|
+
* @type {string}
|
|
22709
|
+
* @memberof SpDetails
|
|
22710
|
+
*/
|
|
22711
|
+
'legacyAcsUrl'?: string;
|
|
22272
22712
|
}
|
|
22273
22713
|
|
|
22274
22714
|
export const SpDetailsRoleV3 = {
|
|
22715
|
+
SamlIdp: 'SAML_IDP',
|
|
22275
22716
|
SamlSp: 'SAML_SP'
|
|
22276
22717
|
} as const;
|
|
22277
22718
|
|
|
@@ -26554,7 +26995,7 @@ export const AccessRequestsApiAxiosParamCreator = function (configuration?: Conf
|
|
|
26554
26995
|
};
|
|
26555
26996
|
},
|
|
26556
26997
|
/**
|
|
26557
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
26998
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
26558
26999
|
* @summary Submit Access Request
|
|
26559
27000
|
* @param {AccessRequest} accessRequest
|
|
26560
27001
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -26791,7 +27232,7 @@ export const AccessRequestsApiFp = function(configuration?: Configuration) {
|
|
|
26791
27232
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
26792
27233
|
},
|
|
26793
27234
|
/**
|
|
26794
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
27235
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
26795
27236
|
* @summary Submit Access Request
|
|
26796
27237
|
* @param {AccessRequest} accessRequest
|
|
26797
27238
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -26871,7 +27312,7 @@ export const AccessRequestsApiFactory = function (configuration?: Configuration,
|
|
|
26871
27312
|
return localVarFp.cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then((request) => request(axios, basePath));
|
|
26872
27313
|
},
|
|
26873
27314
|
/**
|
|
26874
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
27315
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
26875
27316
|
* @summary Submit Access Request
|
|
26876
27317
|
* @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
26877
27318
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -27051,7 +27492,7 @@ export class AccessRequestsApi extends BaseAPI {
|
|
|
27051
27492
|
}
|
|
27052
27493
|
|
|
27053
27494
|
/**
|
|
27054
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
27495
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
27055
27496
|
* @summary Submit Access Request
|
|
27056
27497
|
* @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
27057
27498
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -31793,7 +32234,7 @@ export const CertificationCampaignsApiFp = function(configuration?: Configuratio
|
|
|
31793
32234
|
* @param {*} [axiosOptions] Override http request option.
|
|
31794
32235
|
* @throws {RequiredError}
|
|
31795
32236
|
*/
|
|
31796
|
-
async getCampaign(id: string, detail?: GetCampaignDetailV3, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<
|
|
32237
|
+
async getCampaign(id: string, detail?: GetCampaignDetailV3, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetCampaign200Response>> {
|
|
31797
32238
|
const localVarAxiosArgs = await localVarAxiosParamCreator.getCampaign(id, detail, axiosOptions);
|
|
31798
32239
|
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
31799
32240
|
const localVarOperationServerBasePath = operationServerMap['CertificationCampaignsApi.getCampaign']?.[localVarOperationServerIndex]?.url;
|
|
@@ -32077,7 +32518,7 @@ export const CertificationCampaignsApiFactory = function (configuration?: Config
|
|
|
32077
32518
|
* @param {*} [axiosOptions] Override http request option.
|
|
32078
32519
|
* @throws {RequiredError}
|
|
32079
32520
|
*/
|
|
32080
|
-
getCampaign(requestParameters: CertificationCampaignsApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<
|
|
32521
|
+
getCampaign(requestParameters: CertificationCampaignsApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetCampaign200Response> {
|
|
32081
32522
|
return localVarFp.getCampaign(requestParameters.id, requestParameters.detail, axiosOptions).then((request) => request(axios, basePath));
|
|
32082
32523
|
},
|
|
32083
32524
|
/**
|
|
@@ -63174,10 +63615,11 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
|
|
|
63174
63615
|
* Get a single workflow by id.
|
|
63175
63616
|
* @summary Get Workflow By Id
|
|
63176
63617
|
* @param {string} id Id of the workflow
|
|
63618
|
+
* @param {boolean} [workflowMetrics] disable workflow metrics
|
|
63177
63619
|
* @param {*} [axiosOptions] Override http request option.
|
|
63178
63620
|
* @throws {RequiredError}
|
|
63179
63621
|
*/
|
|
63180
|
-
getWorkflow: async (id: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
63622
|
+
getWorkflow: async (id: string, workflowMetrics?: boolean, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
63181
63623
|
// verify required parameter 'id' is not null or undefined
|
|
63182
63624
|
assertParamExists('getWorkflow', 'id', id)
|
|
63183
63625
|
const localVarPath = `/workflows/{id}`
|
|
@@ -63201,6 +63643,10 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
|
|
|
63201
63643
|
// oauth required
|
|
63202
63644
|
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
63203
63645
|
|
|
63646
|
+
if (workflowMetrics !== undefined) {
|
|
63647
|
+
localVarQueryParameter['workflowMetrics'] = workflowMetrics;
|
|
63648
|
+
}
|
|
63649
|
+
|
|
63204
63650
|
|
|
63205
63651
|
|
|
63206
63652
|
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
@@ -63553,10 +63999,14 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
|
|
|
63553
63999
|
/**
|
|
63554
64000
|
* List all workflows in the tenant.
|
|
63555
64001
|
* @summary List Workflows
|
|
64002
|
+
* @param {string} [triggerId] Trigger ID
|
|
64003
|
+
* @param {string} [connectorInstanceId] Connector Instance ID
|
|
64004
|
+
* @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
64005
|
+
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
63556
64006
|
* @param {*} [axiosOptions] Override http request option.
|
|
63557
64007
|
* @throws {RequiredError}
|
|
63558
64008
|
*/
|
|
63559
|
-
listWorkflows: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
64009
|
+
listWorkflows: async (triggerId?: string, connectorInstanceId?: string, limit?: number, offset?: number, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
63560
64010
|
const localVarPath = `/workflows`;
|
|
63561
64011
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
63562
64012
|
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
@@ -63577,6 +64027,22 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
|
|
|
63577
64027
|
// oauth required
|
|
63578
64028
|
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
63579
64029
|
|
|
64030
|
+
if (triggerId !== undefined) {
|
|
64031
|
+
localVarQueryParameter['triggerId'] = triggerId;
|
|
64032
|
+
}
|
|
64033
|
+
|
|
64034
|
+
if (connectorInstanceId !== undefined) {
|
|
64035
|
+
localVarQueryParameter['connectorInstanceId'] = connectorInstanceId;
|
|
64036
|
+
}
|
|
64037
|
+
|
|
64038
|
+
if (limit !== undefined) {
|
|
64039
|
+
localVarQueryParameter['limit'] = limit;
|
|
64040
|
+
}
|
|
64041
|
+
|
|
64042
|
+
if (offset !== undefined) {
|
|
64043
|
+
localVarQueryParameter['offset'] = offset;
|
|
64044
|
+
}
|
|
64045
|
+
|
|
63580
64046
|
|
|
63581
64047
|
|
|
63582
64048
|
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
@@ -63858,11 +64324,12 @@ export const WorkflowsApiFp = function(configuration?: Configuration) {
|
|
|
63858
64324
|
* Get a single workflow by id.
|
|
63859
64325
|
* @summary Get Workflow By Id
|
|
63860
64326
|
* @param {string} id Id of the workflow
|
|
64327
|
+
* @param {boolean} [workflowMetrics] disable workflow metrics
|
|
63861
64328
|
* @param {*} [axiosOptions] Override http request option.
|
|
63862
64329
|
* @throws {RequiredError}
|
|
63863
64330
|
*/
|
|
63864
|
-
async getWorkflow(id: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Workflow>> {
|
|
63865
|
-
const localVarAxiosArgs = await localVarAxiosParamCreator.getWorkflow(id, axiosOptions);
|
|
64331
|
+
async getWorkflow(id: string, workflowMetrics?: boolean, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Workflow>> {
|
|
64332
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.getWorkflow(id, workflowMetrics, axiosOptions);
|
|
63866
64333
|
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
63867
64334
|
const localVarOperationServerBasePath = operationServerMap['WorkflowsApi.getWorkflow']?.[localVarOperationServerIndex]?.url;
|
|
63868
64335
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
@@ -63969,11 +64436,15 @@ export const WorkflowsApiFp = function(configuration?: Configuration) {
|
|
|
63969
64436
|
/**
|
|
63970
64437
|
* List all workflows in the tenant.
|
|
63971
64438
|
* @summary List Workflows
|
|
64439
|
+
* @param {string} [triggerId] Trigger ID
|
|
64440
|
+
* @param {string} [connectorInstanceId] Connector Instance ID
|
|
64441
|
+
* @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
64442
|
+
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
63972
64443
|
* @param {*} [axiosOptions] Override http request option.
|
|
63973
64444
|
* @throws {RequiredError}
|
|
63974
64445
|
*/
|
|
63975
|
-
async listWorkflows(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<Workflow>>> {
|
|
63976
|
-
const localVarAxiosArgs = await localVarAxiosParamCreator.listWorkflows(axiosOptions);
|
|
64446
|
+
async listWorkflows(triggerId?: string, connectorInstanceId?: string, limit?: number, offset?: number, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<Workflow>>> {
|
|
64447
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.listWorkflows(triggerId, connectorInstanceId, limit, offset, axiosOptions);
|
|
63977
64448
|
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
63978
64449
|
const localVarOperationServerBasePath = operationServerMap['WorkflowsApi.listWorkflows']?.[localVarOperationServerIndex]?.url;
|
|
63979
64450
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
@@ -64102,7 +64573,7 @@ export const WorkflowsApiFactory = function (configuration?: Configuration, base
|
|
|
64102
64573
|
* @throws {RequiredError}
|
|
64103
64574
|
*/
|
|
64104
64575
|
getWorkflow(requestParameters: WorkflowsApiGetWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Workflow> {
|
|
64105
|
-
return localVarFp.getWorkflow(requestParameters.id, axiosOptions).then((request) => request(axios, basePath));
|
|
64576
|
+
return localVarFp.getWorkflow(requestParameters.id, requestParameters.workflowMetrics, axiosOptions).then((request) => request(axios, basePath));
|
|
64106
64577
|
},
|
|
64107
64578
|
/**
|
|
64108
64579
|
* Use this API to get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
|
|
@@ -64176,11 +64647,12 @@ export const WorkflowsApiFactory = function (configuration?: Configuration, base
|
|
|
64176
64647
|
/**
|
|
64177
64648
|
* List all workflows in the tenant.
|
|
64178
64649
|
* @summary List Workflows
|
|
64650
|
+
* @param {WorkflowsApiListWorkflowsRequest} requestParameters Request parameters.
|
|
64179
64651
|
* @param {*} [axiosOptions] Override http request option.
|
|
64180
64652
|
* @throws {RequiredError}
|
|
64181
64653
|
*/
|
|
64182
|
-
listWorkflows(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<Workflow>> {
|
|
64183
|
-
return localVarFp.listWorkflows(axiosOptions).then((request) => request(axios, basePath));
|
|
64654
|
+
listWorkflows(requestParameters: WorkflowsApiListWorkflowsRequest = {}, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<Workflow>> {
|
|
64655
|
+
return localVarFp.listWorkflows(requestParameters.triggerId, requestParameters.connectorInstanceId, requestParameters.limit, requestParameters.offset, axiosOptions).then((request) => request(axios, basePath));
|
|
64184
64656
|
},
|
|
64185
64657
|
/**
|
|
64186
64658
|
* Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
|
|
@@ -64314,6 +64786,13 @@ export interface WorkflowsApiGetWorkflowRequest {
|
|
|
64314
64786
|
* @memberof WorkflowsApiGetWorkflow
|
|
64315
64787
|
*/
|
|
64316
64788
|
readonly id: string
|
|
64789
|
+
|
|
64790
|
+
/**
|
|
64791
|
+
* disable workflow metrics
|
|
64792
|
+
* @type {boolean}
|
|
64793
|
+
* @memberof WorkflowsApiGetWorkflow
|
|
64794
|
+
*/
|
|
64795
|
+
readonly workflowMetrics?: boolean
|
|
64317
64796
|
}
|
|
64318
64797
|
|
|
64319
64798
|
/**
|
|
@@ -64463,6 +64942,41 @@ export interface WorkflowsApiListWorkflowLibraryTriggersRequest {
|
|
|
64463
64942
|
readonly filters?: string
|
|
64464
64943
|
}
|
|
64465
64944
|
|
|
64945
|
+
/**
|
|
64946
|
+
* Request parameters for listWorkflows operation in WorkflowsApi.
|
|
64947
|
+
* @export
|
|
64948
|
+
* @interface WorkflowsApiListWorkflowsRequest
|
|
64949
|
+
*/
|
|
64950
|
+
export interface WorkflowsApiListWorkflowsRequest {
|
|
64951
|
+
/**
|
|
64952
|
+
* Trigger ID
|
|
64953
|
+
* @type {string}
|
|
64954
|
+
* @memberof WorkflowsApiListWorkflows
|
|
64955
|
+
*/
|
|
64956
|
+
readonly triggerId?: string
|
|
64957
|
+
|
|
64958
|
+
/**
|
|
64959
|
+
* Connector Instance ID
|
|
64960
|
+
* @type {string}
|
|
64961
|
+
* @memberof WorkflowsApiListWorkflows
|
|
64962
|
+
*/
|
|
64963
|
+
readonly connectorInstanceId?: string
|
|
64964
|
+
|
|
64965
|
+
/**
|
|
64966
|
+
* Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
64967
|
+
* @type {number}
|
|
64968
|
+
* @memberof WorkflowsApiListWorkflows
|
|
64969
|
+
*/
|
|
64970
|
+
readonly limit?: number
|
|
64971
|
+
|
|
64972
|
+
/**
|
|
64973
|
+
* Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
64974
|
+
* @type {number}
|
|
64975
|
+
* @memberof WorkflowsApiListWorkflows
|
|
64976
|
+
*/
|
|
64977
|
+
readonly offset?: number
|
|
64978
|
+
}
|
|
64979
|
+
|
|
64466
64980
|
/**
|
|
64467
64981
|
* Request parameters for patchWorkflow operation in WorkflowsApi.
|
|
64468
64982
|
* @export
|
|
@@ -64623,7 +65137,7 @@ export class WorkflowsApi extends BaseAPI {
|
|
|
64623
65137
|
* @memberof WorkflowsApi
|
|
64624
65138
|
*/
|
|
64625
65139
|
public getWorkflow(requestParameters: WorkflowsApiGetWorkflowRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
64626
|
-
return WorkflowsApiFp(this.configuration).getWorkflow(requestParameters.id, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
65140
|
+
return WorkflowsApiFp(this.configuration).getWorkflow(requestParameters.id, requestParameters.workflowMetrics, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
64627
65141
|
}
|
|
64628
65142
|
|
|
64629
65143
|
/**
|
|
@@ -64712,12 +65226,13 @@ export class WorkflowsApi extends BaseAPI {
|
|
|
64712
65226
|
/**
|
|
64713
65227
|
* List all workflows in the tenant.
|
|
64714
65228
|
* @summary List Workflows
|
|
65229
|
+
* @param {WorkflowsApiListWorkflowsRequest} requestParameters Request parameters.
|
|
64715
65230
|
* @param {*} [axiosOptions] Override http request option.
|
|
64716
65231
|
* @throws {RequiredError}
|
|
64717
65232
|
* @memberof WorkflowsApi
|
|
64718
65233
|
*/
|
|
64719
|
-
public listWorkflows(axiosOptions?: RawAxiosRequestConfig) {
|
|
64720
|
-
return WorkflowsApiFp(this.configuration).listWorkflows(axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
65234
|
+
public listWorkflows(requestParameters: WorkflowsApiListWorkflowsRequest = {}, axiosOptions?: RawAxiosRequestConfig) {
|
|
65235
|
+
return WorkflowsApiFp(this.configuration).listWorkflows(requestParameters.triggerId, requestParameters.connectorInstanceId, requestParameters.limit, requestParameters.offset, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
64721
65236
|
}
|
|
64722
65237
|
|
|
64723
65238
|
/**
|