sailpoint-api-client 1.5.0 → 1.6.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/v3/api.ts CHANGED
@@ -1146,6 +1146,12 @@ export interface AccessRequest {
1146
1146
  * @memberof AccessRequest
1147
1147
  */
1148
1148
  'clientMetadata'?: { [key: string]: string; };
1149
+ /**
1150
+ * Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
1151
+ * @type {Array<RequestedForDtoRef>}
1152
+ * @memberof AccessRequest
1153
+ */
1154
+ 'requestedForWithRequestedItems'?: Array<RequestedForDtoRef> | null;
1149
1155
  }
1150
1156
 
1151
1157
 
@@ -1228,6 +1234,18 @@ export interface AccessRequestItem {
1228
1234
  * @memberof AccessRequestItem
1229
1235
  */
1230
1236
  'removeDate'?: string;
1237
+ /**
1238
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
1239
+ * @type {string}
1240
+ * @memberof AccessRequestItem
1241
+ */
1242
+ 'assignmentId'?: string | null;
1243
+ /**
1244
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
1245
+ * @type {string}
1246
+ * @memberof AccessRequestItem
1247
+ */
1248
+ 'nativeIdentity'?: string | null;
1231
1249
  }
1232
1250
 
1233
1251
  export const AccessRequestItemTypeV3 = {
@@ -2544,6 +2562,25 @@ export interface AccountAttributesCreateAttributes {
2544
2562
  */
2545
2563
  'sourceId': string;
2546
2564
  }
2565
+ /**
2566
+ *
2567
+ * @export
2568
+ * @interface AccountItemRef
2569
+ */
2570
+ export interface AccountItemRef {
2571
+ /**
2572
+ * The uuid for the account, available under the \'objectguid\' attribute
2573
+ * @type {string}
2574
+ * @memberof AccountItemRef
2575
+ */
2576
+ 'accountUuid'?: string | null;
2577
+ /**
2578
+ * The \'distinguishedName\' attribute for the account
2579
+ * @type {string}
2580
+ * @memberof AccountItemRef
2581
+ */
2582
+ 'nativeIdentity'?: string;
2583
+ }
2547
2584
  /**
2548
2585
  *
2549
2586
  * @export
@@ -3628,7 +3665,8 @@ export const AttributeDefinitionType = {
3628
3665
  String: 'STRING',
3629
3666
  Long: 'LONG',
3630
3667
  Int: 'INT',
3631
- Boolean: 'BOOLEAN'
3668
+ Boolean: 'BOOLEAN',
3669
+ Date: 'DATE'
3632
3670
  } as const;
3633
3671
 
3634
3672
  export type AttributeDefinitionType = typeof AttributeDefinitionType[keyof typeof AttributeDefinitionType];
@@ -9835,6 +9873,188 @@ export const GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = {
9835
9873
 
9836
9874
  export type GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = typeof GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3[keyof typeof GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3];
9837
9875
 
9876
+ /**
9877
+ *
9878
+ * @export
9879
+ * @interface GetCampaign200Response
9880
+ */
9881
+ export interface GetCampaign200Response {
9882
+ /**
9883
+ * Id of the campaign
9884
+ * @type {string}
9885
+ * @memberof GetCampaign200Response
9886
+ */
9887
+ 'id'?: string;
9888
+ /**
9889
+ * The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
9890
+ * @type {string}
9891
+ * @memberof GetCampaign200Response
9892
+ */
9893
+ 'name': string;
9894
+ /**
9895
+ * The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
9896
+ * @type {string}
9897
+ * @memberof GetCampaign200Response
9898
+ */
9899
+ 'description': string | null;
9900
+ /**
9901
+ * The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
9902
+ * @type {string}
9903
+ * @memberof GetCampaign200Response
9904
+ */
9905
+ 'deadline'?: string;
9906
+ /**
9907
+ * The type of campaign. Could be extended in the future.
9908
+ * @type {string}
9909
+ * @memberof GetCampaign200Response
9910
+ */
9911
+ 'type': GetCampaign200ResponseTypeV3;
9912
+ /**
9913
+ * Enables email notification for this campaign
9914
+ * @type {boolean}
9915
+ * @memberof GetCampaign200Response
9916
+ */
9917
+ 'emailNotificationEnabled'?: boolean;
9918
+ /**
9919
+ * Allows auto revoke for this campaign
9920
+ * @type {boolean}
9921
+ * @memberof GetCampaign200Response
9922
+ */
9923
+ 'autoRevokeAllowed'?: boolean;
9924
+ /**
9925
+ * Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
9926
+ * @type {boolean}
9927
+ * @memberof GetCampaign200Response
9928
+ */
9929
+ 'recommendationsEnabled'?: boolean;
9930
+ /**
9931
+ * The campaign\'s current status.
9932
+ * @type {string}
9933
+ * @memberof GetCampaign200Response
9934
+ */
9935
+ 'status'?: GetCampaign200ResponseStatusV3;
9936
+ /**
9937
+ * The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
9938
+ * @type {string}
9939
+ * @memberof GetCampaign200Response
9940
+ */
9941
+ 'correlatedStatus'?: GetCampaign200ResponseCorrelatedStatusV3;
9942
+ /**
9943
+ * Created time of the campaign
9944
+ * @type {string}
9945
+ * @memberof GetCampaign200Response
9946
+ */
9947
+ 'created'?: string;
9948
+ /**
9949
+ * The total number of certifications in this campaign.
9950
+ * @type {number}
9951
+ * @memberof GetCampaign200Response
9952
+ */
9953
+ 'totalCertifications'?: number;
9954
+ /**
9955
+ * The number of completed certifications in this campaign.
9956
+ * @type {number}
9957
+ * @memberof GetCampaign200Response
9958
+ */
9959
+ 'completedCertifications'?: number;
9960
+ /**
9961
+ * A list of errors and warnings that have accumulated.
9962
+ * @type {Array<CampaignAlert>}
9963
+ * @memberof GetCampaign200Response
9964
+ */
9965
+ 'alerts'?: Array<CampaignAlert>;
9966
+ /**
9967
+ * Modified time of the campaign
9968
+ * @type {string}
9969
+ * @memberof GetCampaign200Response
9970
+ */
9971
+ 'modified'?: string;
9972
+ /**
9973
+ *
9974
+ * @type {CampaignAllOfFilter}
9975
+ * @memberof GetCampaign200Response
9976
+ */
9977
+ 'filter'?: CampaignAllOfFilter;
9978
+ /**
9979
+ * Determines if comments on sunset date changes are required.
9980
+ * @type {boolean}
9981
+ * @memberof GetCampaign200Response
9982
+ */
9983
+ 'sunsetCommentsRequired'?: boolean;
9984
+ /**
9985
+ *
9986
+ * @type {CampaignAllOfSourceOwnerCampaignInfo}
9987
+ * @memberof GetCampaign200Response
9988
+ */
9989
+ 'sourceOwnerCampaignInfo'?: CampaignAllOfSourceOwnerCampaignInfo;
9990
+ /**
9991
+ *
9992
+ * @type {CampaignAllOfSearchCampaignInfo}
9993
+ * @memberof GetCampaign200Response
9994
+ */
9995
+ 'searchCampaignInfo'?: CampaignAllOfSearchCampaignInfo;
9996
+ /**
9997
+ *
9998
+ * @type {CampaignAllOfRoleCompositionCampaignInfo}
9999
+ * @memberof GetCampaign200Response
10000
+ */
10001
+ 'roleCompositionCampaignInfo'?: CampaignAllOfRoleCompositionCampaignInfo;
10002
+ /**
10003
+ *
10004
+ * @type {CampaignAllOfMachineAccountCampaignInfo}
10005
+ * @memberof GetCampaign200Response
10006
+ */
10007
+ 'machineAccountCampaignInfo'?: CampaignAllOfMachineAccountCampaignInfo;
10008
+ /**
10009
+ * A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
10010
+ * @type {Array<CampaignAllOfSourcesWithOrphanEntitlements>}
10011
+ * @memberof GetCampaign200Response
10012
+ */
10013
+ 'sourcesWithOrphanEntitlements'?: Array<CampaignAllOfSourcesWithOrphanEntitlements>;
10014
+ /**
10015
+ * Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
10016
+ * @type {string}
10017
+ * @memberof GetCampaign200Response
10018
+ */
10019
+ 'mandatoryCommentRequirement'?: GetCampaign200ResponseMandatoryCommentRequirementV3;
10020
+ }
10021
+
10022
+ export const GetCampaign200ResponseTypeV3 = {
10023
+ Manager: 'MANAGER',
10024
+ SourceOwner: 'SOURCE_OWNER',
10025
+ Search: 'SEARCH',
10026
+ RoleComposition: 'ROLE_COMPOSITION',
10027
+ MachineAccount: 'MACHINE_ACCOUNT'
10028
+ } as const;
10029
+
10030
+ export type GetCampaign200ResponseTypeV3 = typeof GetCampaign200ResponseTypeV3[keyof typeof GetCampaign200ResponseTypeV3];
10031
+ export const GetCampaign200ResponseStatusV3 = {
10032
+ Pending: 'PENDING',
10033
+ Staged: 'STAGED',
10034
+ Canceling: 'CANCELING',
10035
+ Activating: 'ACTIVATING',
10036
+ Active: 'ACTIVE',
10037
+ Completing: 'COMPLETING',
10038
+ Completed: 'COMPLETED',
10039
+ Error: 'ERROR',
10040
+ Archived: 'ARCHIVED'
10041
+ } as const;
10042
+
10043
+ export type GetCampaign200ResponseStatusV3 = typeof GetCampaign200ResponseStatusV3[keyof typeof GetCampaign200ResponseStatusV3];
10044
+ export const GetCampaign200ResponseCorrelatedStatusV3 = {
10045
+ Correlated: 'CORRELATED',
10046
+ Uncorrelated: 'UNCORRELATED'
10047
+ } as const;
10048
+
10049
+ export type GetCampaign200ResponseCorrelatedStatusV3 = typeof GetCampaign200ResponseCorrelatedStatusV3[keyof typeof GetCampaign200ResponseCorrelatedStatusV3];
10050
+ export const GetCampaign200ResponseMandatoryCommentRequirementV3 = {
10051
+ AllDecisions: 'ALL_DECISIONS',
10052
+ RevokeOnlyDecisions: 'REVOKE_ONLY_DECISIONS',
10053
+ NoDecisions: 'NO_DECISIONS'
10054
+ } as const;
10055
+
10056
+ export type GetCampaign200ResponseMandatoryCommentRequirementV3 = typeof GetCampaign200ResponseMandatoryCommentRequirementV3[keyof typeof GetCampaign200ResponseMandatoryCommentRequirementV3];
10057
+
9838
10058
  /**
9839
10059
  * @type GetDiscoveredApplications200ResponseInner
9840
10060
  * @export
@@ -11576,7 +11796,7 @@ export interface IdpDetails {
11576
11796
  * @type {string}
11577
11797
  * @memberof IdpDetails
11578
11798
  */
11579
- 'authContext'?: string;
11799
+ 'authnContext'?: string;
11580
11800
  /**
11581
11801
  * The IDP logout URL. Used with IDP configurations.
11582
11802
  * @type {string}
@@ -11588,7 +11808,7 @@ export interface IdpDetails {
11588
11808
  * @type {boolean}
11589
11809
  * @memberof IdpDetails
11590
11810
  */
11591
- 'includeAuthContext'?: boolean;
11811
+ 'includeAuthnContext'?: boolean;
11592
11812
  /**
11593
11813
  * The name id format to use. Used with IDP configurations.
11594
11814
  * @type {string}
@@ -11624,7 +11844,7 @@ export interface IdpDetails {
11624
11844
  * @type {string}
11625
11845
  * @memberof IdpDetails
11626
11846
  */
11627
- 'mappingAttribute'?: string;
11847
+ 'mappingAttribute': string;
11628
11848
  /**
11629
11849
  * The expiration date extracted from the certificate.
11630
11850
  * @type {string}
@@ -11640,7 +11860,8 @@ export interface IdpDetails {
11640
11860
  }
11641
11861
 
11642
11862
  export const IdpDetailsRoleV3 = {
11643
- SamlIdp: 'SAML_IDP'
11863
+ SamlIdp: 'SAML_IDP',
11864
+ SamlSp: 'SAML_SP'
11644
11865
  } as const;
11645
11866
 
11646
11867
  export type IdpDetailsRoleV3 = typeof IdpDetailsRoleV3[keyof typeof IdpDetailsRoleV3];
@@ -15955,7 +16176,7 @@ export interface ProvisioningPolicy {
15955
16176
  * @type {string}
15956
16177
  * @memberof ProvisioningPolicy
15957
16178
  */
15958
- 'name': string;
16179
+ 'name': string | null;
15959
16180
  /**
15960
16181
  * the description of the provisioning policy
15961
16182
  * @type {string}
@@ -15988,7 +16209,7 @@ export interface ProvisioningPolicyDto {
15988
16209
  * @type {string}
15989
16210
  * @memberof ProvisioningPolicyDto
15990
16211
  */
15991
- 'name': string;
16212
+ 'name': string | null;
15992
16213
  /**
15993
16214
  * the description of the provisioning policy
15994
16215
  * @type {string}
@@ -17226,6 +17447,25 @@ export interface RequestedAccountRef {
17226
17447
  }
17227
17448
 
17228
17449
 
17450
+ /**
17451
+ *
17452
+ * @export
17453
+ * @interface RequestedForDtoRef
17454
+ */
17455
+ export interface RequestedForDtoRef {
17456
+ /**
17457
+ * The identity id for which the access is requested
17458
+ * @type {string}
17459
+ * @memberof RequestedForDtoRef
17460
+ */
17461
+ 'identityId': string;
17462
+ /**
17463
+ * the details for the access items that are requested for the identity
17464
+ * @type {Array<RequestedItemDtoRef>}
17465
+ * @memberof RequestedForDtoRef
17466
+ */
17467
+ 'requestedItems': Array<RequestedItemDtoRef>;
17468
+ }
17229
17469
  /**
17230
17470
  *
17231
17471
  * @export
@@ -17254,6 +17494,70 @@ export const RequestedItemDetailsTypeV3 = {
17254
17494
 
17255
17495
  export type RequestedItemDetailsTypeV3 = typeof RequestedItemDetailsTypeV3[keyof typeof RequestedItemDetailsTypeV3];
17256
17496
 
17497
+ /**
17498
+ *
17499
+ * @export
17500
+ * @interface RequestedItemDtoRef
17501
+ */
17502
+ export interface RequestedItemDtoRef {
17503
+ /**
17504
+ * The type of the item being requested.
17505
+ * @type {string}
17506
+ * @memberof RequestedItemDtoRef
17507
+ */
17508
+ 'type': RequestedItemDtoRefTypeV3;
17509
+ /**
17510
+ * ID of Role, Access Profile or Entitlement being requested.
17511
+ * @type {string}
17512
+ * @memberof RequestedItemDtoRef
17513
+ */
17514
+ 'id': string;
17515
+ /**
17516
+ * Comment provided by requester. * Comment is required when the request is of type Revoke Access.
17517
+ * @type {string}
17518
+ * @memberof RequestedItemDtoRef
17519
+ */
17520
+ 'comment'?: string;
17521
+ /**
17522
+ * Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
17523
+ * @type {{ [key: string]: string; }}
17524
+ * @memberof RequestedItemDtoRef
17525
+ */
17526
+ 'clientMetadata'?: { [key: string]: string; };
17527
+ /**
17528
+ * The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
17529
+ * @type {string}
17530
+ * @memberof RequestedItemDtoRef
17531
+ */
17532
+ 'removeDate'?: string;
17533
+ /**
17534
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
17535
+ * @type {string}
17536
+ * @memberof RequestedItemDtoRef
17537
+ */
17538
+ 'assignmentId'?: string | null;
17539
+ /**
17540
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
17541
+ * @type {string}
17542
+ * @memberof RequestedItemDtoRef
17543
+ */
17544
+ 'nativeIdentity'?: string | null;
17545
+ /**
17546
+ * The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
17547
+ * @type {Array<SourceItemRef>}
17548
+ * @memberof RequestedItemDtoRef
17549
+ */
17550
+ 'accountSelection'?: Array<SourceItemRef> | null;
17551
+ }
17552
+
17553
+ export const RequestedItemDtoRefTypeV3 = {
17554
+ AccessProfile: 'ACCESS_PROFILE',
17555
+ Role: 'ROLE',
17556
+ Entitlement: 'ENTITLEMENT'
17557
+ } as const;
17558
+
17559
+ export type RequestedItemDtoRefTypeV3 = typeof RequestedItemDtoRefTypeV3[keyof typeof RequestedItemDtoRefTypeV3];
17560
+
17257
17561
  /**
17258
17562
  *
17259
17563
  * @export
@@ -20714,10 +21018,121 @@ export interface ServiceProviderConfiguration {
20714
21018
  'federationProtocolDetails'?: Array<ServiceProviderConfigurationFederationProtocolDetailsInner>;
20715
21019
  }
20716
21020
  /**
20717
- * @type ServiceProviderConfigurationFederationProtocolDetailsInner
21021
+ *
20718
21022
  * @export
21023
+ * @interface ServiceProviderConfigurationFederationProtocolDetailsInner
20719
21024
  */
20720
- export type ServiceProviderConfigurationFederationProtocolDetailsInner = IdpDetails | SpDetails;
21025
+ export interface ServiceProviderConfigurationFederationProtocolDetailsInner {
21026
+ /**
21027
+ * Federation protocol role
21028
+ * @type {string}
21029
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21030
+ */
21031
+ 'role'?: ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3;
21032
+ /**
21033
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
21034
+ * @type {string}
21035
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21036
+ */
21037
+ 'entityId'?: string;
21038
+ /**
21039
+ * Defines the binding used for the SAML flow. Used with IDP configurations.
21040
+ * @type {string}
21041
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21042
+ */
21043
+ 'binding'?: string;
21044
+ /**
21045
+ * Specifies the SAML authentication method to use. Used with IDP configurations.
21046
+ * @type {string}
21047
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21048
+ */
21049
+ 'authnContext'?: string;
21050
+ /**
21051
+ * The IDP logout URL. Used with IDP configurations.
21052
+ * @type {string}
21053
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21054
+ */
21055
+ 'logoutUrl'?: string;
21056
+ /**
21057
+ * Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
21058
+ * @type {boolean}
21059
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21060
+ */
21061
+ 'includeAuthnContext'?: boolean;
21062
+ /**
21063
+ * The name id format to use. Used with IDP configurations.
21064
+ * @type {string}
21065
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21066
+ */
21067
+ 'nameId'?: string;
21068
+ /**
21069
+ *
21070
+ * @type {JITConfiguration}
21071
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21072
+ */
21073
+ 'jitConfiguration'?: JITConfiguration;
21074
+ /**
21075
+ * The Base64-encoded certificate used by the IDP. Used with IDP configurations.
21076
+ * @type {string}
21077
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21078
+ */
21079
+ 'cert'?: string;
21080
+ /**
21081
+ * The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
21082
+ * @type {string}
21083
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21084
+ */
21085
+ 'loginUrlPost'?: string;
21086
+ /**
21087
+ * The IDP Redirect URL. Used with IDP configurations.
21088
+ * @type {string}
21089
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21090
+ */
21091
+ 'loginUrlRedirect'?: string;
21092
+ /**
21093
+ * Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
21094
+ * @type {string}
21095
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21096
+ */
21097
+ 'mappingAttribute': string;
21098
+ /**
21099
+ * The expiration date extracted from the certificate.
21100
+ * @type {string}
21101
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21102
+ */
21103
+ 'certificateExpirationDate'?: string;
21104
+ /**
21105
+ * The name extracted from the certificate.
21106
+ * @type {string}
21107
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21108
+ */
21109
+ 'certificateName'?: string;
21110
+ /**
21111
+ * Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
21112
+ * @type {string}
21113
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21114
+ */
21115
+ 'alias'?: string;
21116
+ /**
21117
+ * The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
21118
+ * @type {string}
21119
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21120
+ */
21121
+ 'callbackUrl': string;
21122
+ /**
21123
+ * The legacy ACS URL used for SAML authentication. Used with SP configurations.
21124
+ * @type {string}
21125
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21126
+ */
21127
+ 'legacyAcsUrl'?: string;
21128
+ }
21129
+
21130
+ export const ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = {
21131
+ SamlIdp: 'SAML_IDP',
21132
+ SamlSp: 'SAML_SP'
21133
+ } as const;
21134
+
21135
+ export type ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = typeof ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3[keyof typeof ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3];
20721
21136
 
20722
21137
  /**
20723
21138
  *
@@ -21995,6 +22410,25 @@ export const SourceHealthDtoStatusV3 = {
21995
22410
 
21996
22411
  export type SourceHealthDtoStatusV3 = typeof SourceHealthDtoStatusV3[keyof typeof SourceHealthDtoStatusV3];
21997
22412
 
22413
+ /**
22414
+ *
22415
+ * @export
22416
+ * @interface SourceItemRef
22417
+ */
22418
+ export interface SourceItemRef {
22419
+ /**
22420
+ * The id for the source on which account selections are made
22421
+ * @type {string}
22422
+ * @memberof SourceItemRef
22423
+ */
22424
+ 'sourceId'?: string | null;
22425
+ /**
22426
+ * A list of account selections on the source. Currently, only one selection per source is supported.
22427
+ * @type {Array<AccountItemRef>}
22428
+ * @memberof SourceItemRef
22429
+ */
22430
+ 'accounts'?: Array<AccountItemRef> | null;
22431
+ }
21998
22432
  /**
21999
22433
  * Reference to management workgroup for the source.
22000
22434
  * @export
@@ -22268,10 +22702,17 @@ export interface SpDetails {
22268
22702
  * @type {string}
22269
22703
  * @memberof SpDetails
22270
22704
  */
22271
- 'callbackUrl'?: string;
22705
+ 'callbackUrl': string;
22706
+ /**
22707
+ * The legacy ACS URL used for SAML authentication. Used with SP configurations.
22708
+ * @type {string}
22709
+ * @memberof SpDetails
22710
+ */
22711
+ 'legacyAcsUrl'?: string;
22272
22712
  }
22273
22713
 
22274
22714
  export const SpDetailsRoleV3 = {
22715
+ SamlIdp: 'SAML_IDP',
22275
22716
  SamlSp: 'SAML_SP'
22276
22717
  } as const;
22277
22718
 
@@ -26554,7 +26995,7 @@ export const AccessRequestsApiAxiosParamCreator = function (configuration?: Conf
26554
26995
  };
26555
26996
  },
26556
26997
  /**
26557
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
26998
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
26558
26999
  * @summary Submit Access Request
26559
27000
  * @param {AccessRequest} accessRequest
26560
27001
  * @param {*} [axiosOptions] Override http request option.
@@ -26791,7 +27232,7 @@ export const AccessRequestsApiFp = function(configuration?: Configuration) {
26791
27232
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
26792
27233
  },
26793
27234
  /**
26794
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
27235
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
26795
27236
  * @summary Submit Access Request
26796
27237
  * @param {AccessRequest} accessRequest
26797
27238
  * @param {*} [axiosOptions] Override http request option.
@@ -26871,7 +27312,7 @@ export const AccessRequestsApiFactory = function (configuration?: Configuration,
26871
27312
  return localVarFp.cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then((request) => request(axios, basePath));
26872
27313
  },
26873
27314
  /**
26874
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
27315
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
26875
27316
  * @summary Submit Access Request
26876
27317
  * @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
26877
27318
  * @param {*} [axiosOptions] Override http request option.
@@ -27051,7 +27492,7 @@ export class AccessRequestsApi extends BaseAPI {
27051
27492
  }
27052
27493
 
27053
27494
  /**
27054
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
27495
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
27055
27496
  * @summary Submit Access Request
27056
27497
  * @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
27057
27498
  * @param {*} [axiosOptions] Override http request option.
@@ -31793,7 +32234,7 @@ export const CertificationCampaignsApiFp = function(configuration?: Configuratio
31793
32234
  * @param {*} [axiosOptions] Override http request option.
31794
32235
  * @throws {RequiredError}
31795
32236
  */
31796
- async getCampaign(id: string, detail?: GetCampaignDetailV3, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetActiveCampaigns200ResponseInner>> {
32237
+ async getCampaign(id: string, detail?: GetCampaignDetailV3, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetCampaign200Response>> {
31797
32238
  const localVarAxiosArgs = await localVarAxiosParamCreator.getCampaign(id, detail, axiosOptions);
31798
32239
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
31799
32240
  const localVarOperationServerBasePath = operationServerMap['CertificationCampaignsApi.getCampaign']?.[localVarOperationServerIndex]?.url;
@@ -32077,7 +32518,7 @@ export const CertificationCampaignsApiFactory = function (configuration?: Config
32077
32518
  * @param {*} [axiosOptions] Override http request option.
32078
32519
  * @throws {RequiredError}
32079
32520
  */
32080
- getCampaign(requestParameters: CertificationCampaignsApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetActiveCampaigns200ResponseInner> {
32521
+ getCampaign(requestParameters: CertificationCampaignsApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetCampaign200Response> {
32081
32522
  return localVarFp.getCampaign(requestParameters.id, requestParameters.detail, axiosOptions).then((request) => request(axios, basePath));
32082
32523
  },
32083
32524
  /**
@@ -63174,10 +63615,11 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
63174
63615
  * Get a single workflow by id.
63175
63616
  * @summary Get Workflow By Id
63176
63617
  * @param {string} id Id of the workflow
63618
+ * @param {boolean} [workflowMetrics] disable workflow metrics
63177
63619
  * @param {*} [axiosOptions] Override http request option.
63178
63620
  * @throws {RequiredError}
63179
63621
  */
63180
- getWorkflow: async (id: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
63622
+ getWorkflow: async (id: string, workflowMetrics?: boolean, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
63181
63623
  // verify required parameter 'id' is not null or undefined
63182
63624
  assertParamExists('getWorkflow', 'id', id)
63183
63625
  const localVarPath = `/workflows/{id}`
@@ -63201,6 +63643,10 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
63201
63643
  // oauth required
63202
63644
  await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
63203
63645
 
63646
+ if (workflowMetrics !== undefined) {
63647
+ localVarQueryParameter['workflowMetrics'] = workflowMetrics;
63648
+ }
63649
+
63204
63650
 
63205
63651
 
63206
63652
  setSearchParams(localVarUrlObj, localVarQueryParameter);
@@ -63553,10 +63999,14 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
63553
63999
  /**
63554
64000
  * List all workflows in the tenant.
63555
64001
  * @summary List Workflows
64002
+ * @param {string} [triggerId] Trigger ID
64003
+ * @param {string} [connectorInstanceId] Connector Instance ID
64004
+ * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
64005
+ * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
63556
64006
  * @param {*} [axiosOptions] Override http request option.
63557
64007
  * @throws {RequiredError}
63558
64008
  */
63559
- listWorkflows: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
64009
+ listWorkflows: async (triggerId?: string, connectorInstanceId?: string, limit?: number, offset?: number, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
63560
64010
  const localVarPath = `/workflows`;
63561
64011
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
63562
64012
  const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
@@ -63577,6 +64027,22 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
63577
64027
  // oauth required
63578
64028
  await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
63579
64029
 
64030
+ if (triggerId !== undefined) {
64031
+ localVarQueryParameter['triggerId'] = triggerId;
64032
+ }
64033
+
64034
+ if (connectorInstanceId !== undefined) {
64035
+ localVarQueryParameter['connectorInstanceId'] = connectorInstanceId;
64036
+ }
64037
+
64038
+ if (limit !== undefined) {
64039
+ localVarQueryParameter['limit'] = limit;
64040
+ }
64041
+
64042
+ if (offset !== undefined) {
64043
+ localVarQueryParameter['offset'] = offset;
64044
+ }
64045
+
63580
64046
 
63581
64047
 
63582
64048
  setSearchParams(localVarUrlObj, localVarQueryParameter);
@@ -63858,11 +64324,12 @@ export const WorkflowsApiFp = function(configuration?: Configuration) {
63858
64324
  * Get a single workflow by id.
63859
64325
  * @summary Get Workflow By Id
63860
64326
  * @param {string} id Id of the workflow
64327
+ * @param {boolean} [workflowMetrics] disable workflow metrics
63861
64328
  * @param {*} [axiosOptions] Override http request option.
63862
64329
  * @throws {RequiredError}
63863
64330
  */
63864
- async getWorkflow(id: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Workflow>> {
63865
- const localVarAxiosArgs = await localVarAxiosParamCreator.getWorkflow(id, axiosOptions);
64331
+ async getWorkflow(id: string, workflowMetrics?: boolean, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Workflow>> {
64332
+ const localVarAxiosArgs = await localVarAxiosParamCreator.getWorkflow(id, workflowMetrics, axiosOptions);
63866
64333
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
63867
64334
  const localVarOperationServerBasePath = operationServerMap['WorkflowsApi.getWorkflow']?.[localVarOperationServerIndex]?.url;
63868
64335
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
@@ -63969,11 +64436,15 @@ export const WorkflowsApiFp = function(configuration?: Configuration) {
63969
64436
  /**
63970
64437
  * List all workflows in the tenant.
63971
64438
  * @summary List Workflows
64439
+ * @param {string} [triggerId] Trigger ID
64440
+ * @param {string} [connectorInstanceId] Connector Instance ID
64441
+ * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
64442
+ * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
63972
64443
  * @param {*} [axiosOptions] Override http request option.
63973
64444
  * @throws {RequiredError}
63974
64445
  */
63975
- async listWorkflows(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<Workflow>>> {
63976
- const localVarAxiosArgs = await localVarAxiosParamCreator.listWorkflows(axiosOptions);
64446
+ async listWorkflows(triggerId?: string, connectorInstanceId?: string, limit?: number, offset?: number, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<Workflow>>> {
64447
+ const localVarAxiosArgs = await localVarAxiosParamCreator.listWorkflows(triggerId, connectorInstanceId, limit, offset, axiosOptions);
63977
64448
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
63978
64449
  const localVarOperationServerBasePath = operationServerMap['WorkflowsApi.listWorkflows']?.[localVarOperationServerIndex]?.url;
63979
64450
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
@@ -64102,7 +64573,7 @@ export const WorkflowsApiFactory = function (configuration?: Configuration, base
64102
64573
  * @throws {RequiredError}
64103
64574
  */
64104
64575
  getWorkflow(requestParameters: WorkflowsApiGetWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Workflow> {
64105
- return localVarFp.getWorkflow(requestParameters.id, axiosOptions).then((request) => request(axios, basePath));
64576
+ return localVarFp.getWorkflow(requestParameters.id, requestParameters.workflowMetrics, axiosOptions).then((request) => request(axios, basePath));
64106
64577
  },
64107
64578
  /**
64108
64579
  * Use this API to get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
@@ -64176,11 +64647,12 @@ export const WorkflowsApiFactory = function (configuration?: Configuration, base
64176
64647
  /**
64177
64648
  * List all workflows in the tenant.
64178
64649
  * @summary List Workflows
64650
+ * @param {WorkflowsApiListWorkflowsRequest} requestParameters Request parameters.
64179
64651
  * @param {*} [axiosOptions] Override http request option.
64180
64652
  * @throws {RequiredError}
64181
64653
  */
64182
- listWorkflows(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<Workflow>> {
64183
- return localVarFp.listWorkflows(axiosOptions).then((request) => request(axios, basePath));
64654
+ listWorkflows(requestParameters: WorkflowsApiListWorkflowsRequest = {}, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<Workflow>> {
64655
+ return localVarFp.listWorkflows(requestParameters.triggerId, requestParameters.connectorInstanceId, requestParameters.limit, requestParameters.offset, axiosOptions).then((request) => request(axios, basePath));
64184
64656
  },
64185
64657
  /**
64186
64658
  * Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
@@ -64314,6 +64786,13 @@ export interface WorkflowsApiGetWorkflowRequest {
64314
64786
  * @memberof WorkflowsApiGetWorkflow
64315
64787
  */
64316
64788
  readonly id: string
64789
+
64790
+ /**
64791
+ * disable workflow metrics
64792
+ * @type {boolean}
64793
+ * @memberof WorkflowsApiGetWorkflow
64794
+ */
64795
+ readonly workflowMetrics?: boolean
64317
64796
  }
64318
64797
 
64319
64798
  /**
@@ -64463,6 +64942,41 @@ export interface WorkflowsApiListWorkflowLibraryTriggersRequest {
64463
64942
  readonly filters?: string
64464
64943
  }
64465
64944
 
64945
+ /**
64946
+ * Request parameters for listWorkflows operation in WorkflowsApi.
64947
+ * @export
64948
+ * @interface WorkflowsApiListWorkflowsRequest
64949
+ */
64950
+ export interface WorkflowsApiListWorkflowsRequest {
64951
+ /**
64952
+ * Trigger ID
64953
+ * @type {string}
64954
+ * @memberof WorkflowsApiListWorkflows
64955
+ */
64956
+ readonly triggerId?: string
64957
+
64958
+ /**
64959
+ * Connector Instance ID
64960
+ * @type {string}
64961
+ * @memberof WorkflowsApiListWorkflows
64962
+ */
64963
+ readonly connectorInstanceId?: string
64964
+
64965
+ /**
64966
+ * Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
64967
+ * @type {number}
64968
+ * @memberof WorkflowsApiListWorkflows
64969
+ */
64970
+ readonly limit?: number
64971
+
64972
+ /**
64973
+ * Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
64974
+ * @type {number}
64975
+ * @memberof WorkflowsApiListWorkflows
64976
+ */
64977
+ readonly offset?: number
64978
+ }
64979
+
64466
64980
  /**
64467
64981
  * Request parameters for patchWorkflow operation in WorkflowsApi.
64468
64982
  * @export
@@ -64623,7 +65137,7 @@ export class WorkflowsApi extends BaseAPI {
64623
65137
  * @memberof WorkflowsApi
64624
65138
  */
64625
65139
  public getWorkflow(requestParameters: WorkflowsApiGetWorkflowRequest, axiosOptions?: RawAxiosRequestConfig) {
64626
- return WorkflowsApiFp(this.configuration).getWorkflow(requestParameters.id, axiosOptions).then((request) => request(this.axios, this.basePath));
65140
+ return WorkflowsApiFp(this.configuration).getWorkflow(requestParameters.id, requestParameters.workflowMetrics, axiosOptions).then((request) => request(this.axios, this.basePath));
64627
65141
  }
64628
65142
 
64629
65143
  /**
@@ -64712,12 +65226,13 @@ export class WorkflowsApi extends BaseAPI {
64712
65226
  /**
64713
65227
  * List all workflows in the tenant.
64714
65228
  * @summary List Workflows
65229
+ * @param {WorkflowsApiListWorkflowsRequest} requestParameters Request parameters.
64715
65230
  * @param {*} [axiosOptions] Override http request option.
64716
65231
  * @throws {RequiredError}
64717
65232
  * @memberof WorkflowsApi
64718
65233
  */
64719
- public listWorkflows(axiosOptions?: RawAxiosRequestConfig) {
64720
- return WorkflowsApiFp(this.configuration).listWorkflows(axiosOptions).then((request) => request(this.axios, this.basePath));
65234
+ public listWorkflows(requestParameters: WorkflowsApiListWorkflowsRequest = {}, axiosOptions?: RawAxiosRequestConfig) {
65235
+ return WorkflowsApiFp(this.configuration).listWorkflows(requestParameters.triggerId, requestParameters.connectorInstanceId, requestParameters.limit, requestParameters.offset, axiosOptions).then((request) => request(this.axios, this.basePath));
64721
65236
  }
64722
65237
 
64723
65238
  /**