sailpoint-api-client 1.5.0 → 1.6.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/beta/README.md +2 -2
- package/beta/api.ts +499 -109
- package/beta/common.ts +2 -2
- package/beta/package.json +1 -1
- package/dist/beta/api.d.ts +429 -70
- package/dist/beta/api.js +162 -99
- package/dist/beta/api.js.map +1 -1
- package/dist/beta/common.js +1 -1
- package/dist/v2024/api.d.ts +1186 -9
- package/dist/v2024/api.js +811 -87
- package/dist/v2024/api.js.map +1 -1
- package/dist/v2024/common.js +1 -1
- package/dist/v2025/api.d.ts +1452 -9
- package/dist/v2025/api.js +912 -72
- package/dist/v2025/api.js.map +1 -1
- package/dist/v2025/common.js +1 -1
- package/dist/v3/api.d.ts +502 -21
- package/dist/v3/api.js +95 -27
- package/dist/v3/api.js.map +1 -1
- package/dist/v3/common.js +1 -1
- package/package.json +1 -1
- package/v2024/README.md +2 -2
- package/v2024/api.ts +1524 -10
- package/v2024/common.ts +2 -2
- package/v2024/package.json +1 -1
- package/v2025/README.md +2 -2
- package/v2025/api.ts +1908 -70
- package/v2025/common.ts +2 -2
- package/v2025/package.json +1 -1
- package/v3/README.md +2 -2
- package/v3/api.ts +543 -28
- package/v3/common.ts +2 -2
- package/v3/package.json +1 -1
package/dist/v2024/api.d.ts
CHANGED
|
@@ -2254,6 +2254,18 @@ export interface AccessRequestItemV2024 {
|
|
|
2254
2254
|
* @memberof AccessRequestItemV2024
|
|
2255
2255
|
*/
|
|
2256
2256
|
'removeDate'?: string;
|
|
2257
|
+
/**
|
|
2258
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
2259
|
+
* @type {string}
|
|
2260
|
+
* @memberof AccessRequestItemV2024
|
|
2261
|
+
*/
|
|
2262
|
+
'assignmentId'?: string | null;
|
|
2263
|
+
/**
|
|
2264
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
2265
|
+
* @type {string}
|
|
2266
|
+
* @memberof AccessRequestItemV2024
|
|
2267
|
+
*/
|
|
2268
|
+
'nativeIdentity'?: string | null;
|
|
2257
2269
|
}
|
|
2258
2270
|
export declare const AccessRequestItemV2024TypeV2024: {
|
|
2259
2271
|
readonly AccessProfile: "ACCESS_PROFILE";
|
|
@@ -2904,6 +2916,12 @@ export interface AccessRequestV2024 {
|
|
|
2904
2916
|
'clientMetadata'?: {
|
|
2905
2917
|
[key: string]: string;
|
|
2906
2918
|
};
|
|
2919
|
+
/**
|
|
2920
|
+
* Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
|
|
2921
|
+
* @type {Array<RequestedForDtoRefV2024>}
|
|
2922
|
+
* @memberof AccessRequestV2024
|
|
2923
|
+
*/
|
|
2924
|
+
'requestedForWithRequestedItems'?: Array<RequestedForDtoRefV2024> | null;
|
|
2907
2925
|
}
|
|
2908
2926
|
/**
|
|
2909
2927
|
*
|
|
@@ -4428,6 +4446,62 @@ export interface AccountInfoDtoV2024 {
|
|
|
4428
4446
|
*/
|
|
4429
4447
|
'uuid'?: string;
|
|
4430
4448
|
}
|
|
4449
|
+
/**
|
|
4450
|
+
*
|
|
4451
|
+
* @export
|
|
4452
|
+
* @interface AccountInfoRefV2024
|
|
4453
|
+
*/
|
|
4454
|
+
export interface AccountInfoRefV2024 {
|
|
4455
|
+
/**
|
|
4456
|
+
* The uuid for the account, available under the \'objectguid\' attribute
|
|
4457
|
+
* @type {string}
|
|
4458
|
+
* @memberof AccountInfoRefV2024
|
|
4459
|
+
*/
|
|
4460
|
+
'uuid'?: string;
|
|
4461
|
+
/**
|
|
4462
|
+
* The \'distinguishedName\' attribute for the account
|
|
4463
|
+
* @type {string}
|
|
4464
|
+
* @memberof AccountInfoRefV2024
|
|
4465
|
+
*/
|
|
4466
|
+
'nativeIdentity'?: string;
|
|
4467
|
+
/**
|
|
4468
|
+
*
|
|
4469
|
+
* @type {DtoTypeV2024}
|
|
4470
|
+
* @memberof AccountInfoRefV2024
|
|
4471
|
+
*/
|
|
4472
|
+
'type'?: DtoTypeV2024;
|
|
4473
|
+
/**
|
|
4474
|
+
* The account id
|
|
4475
|
+
* @type {string}
|
|
4476
|
+
* @memberof AccountInfoRefV2024
|
|
4477
|
+
*/
|
|
4478
|
+
'id'?: string;
|
|
4479
|
+
/**
|
|
4480
|
+
* The account display name
|
|
4481
|
+
* @type {string}
|
|
4482
|
+
* @memberof AccountInfoRefV2024
|
|
4483
|
+
*/
|
|
4484
|
+
'name'?: string;
|
|
4485
|
+
}
|
|
4486
|
+
/**
|
|
4487
|
+
*
|
|
4488
|
+
* @export
|
|
4489
|
+
* @interface AccountItemRefV2024
|
|
4490
|
+
*/
|
|
4491
|
+
export interface AccountItemRefV2024 {
|
|
4492
|
+
/**
|
|
4493
|
+
* The uuid for the account, available under the \'objectguid\' attribute
|
|
4494
|
+
* @type {string}
|
|
4495
|
+
* @memberof AccountItemRefV2024
|
|
4496
|
+
*/
|
|
4497
|
+
'accountUuid'?: string | null;
|
|
4498
|
+
/**
|
|
4499
|
+
* The \'distinguishedName\' attribute for the account
|
|
4500
|
+
* @type {string}
|
|
4501
|
+
* @memberof AccountItemRefV2024
|
|
4502
|
+
*/
|
|
4503
|
+
'nativeIdentity'?: string;
|
|
4504
|
+
}
|
|
4431
4505
|
/**
|
|
4432
4506
|
* If an account activity item is associated with an access request, captures details of that request.
|
|
4433
4507
|
* @export
|
|
@@ -5191,6 +5265,52 @@ export interface AccountsExportReportArgumentsV2024 {
|
|
|
5191
5265
|
*/
|
|
5192
5266
|
'sourceName': string;
|
|
5193
5267
|
}
|
|
5268
|
+
/**
|
|
5269
|
+
*
|
|
5270
|
+
* @export
|
|
5271
|
+
* @interface AccountsSelectionRequestV2024
|
|
5272
|
+
*/
|
|
5273
|
+
export interface AccountsSelectionRequestV2024 {
|
|
5274
|
+
/**
|
|
5275
|
+
* A list of Identity IDs for whom the Access is requested.
|
|
5276
|
+
* @type {Array<string>}
|
|
5277
|
+
* @memberof AccountsSelectionRequestV2024
|
|
5278
|
+
*/
|
|
5279
|
+
'requestedFor': Array<string>;
|
|
5280
|
+
/**
|
|
5281
|
+
*
|
|
5282
|
+
* @type {AccessRequestTypeV2024}
|
|
5283
|
+
* @memberof AccountsSelectionRequestV2024
|
|
5284
|
+
*/
|
|
5285
|
+
'requestType'?: AccessRequestTypeV2024 | null;
|
|
5286
|
+
/**
|
|
5287
|
+
*
|
|
5288
|
+
* @type {Array<AccessRequestItemV2024>}
|
|
5289
|
+
* @memberof AccountsSelectionRequestV2024
|
|
5290
|
+
*/
|
|
5291
|
+
'requestedItems': Array<AccessRequestItemV2024>;
|
|
5292
|
+
/**
|
|
5293
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities.
|
|
5294
|
+
* @type {{ [key: string]: string; }}
|
|
5295
|
+
* @memberof AccountsSelectionRequestV2024
|
|
5296
|
+
*/
|
|
5297
|
+
'clientMetadata'?: {
|
|
5298
|
+
[key: string]: string;
|
|
5299
|
+
};
|
|
5300
|
+
}
|
|
5301
|
+
/**
|
|
5302
|
+
*
|
|
5303
|
+
* @export
|
|
5304
|
+
* @interface AccountsSelectionResponseV2024
|
|
5305
|
+
*/
|
|
5306
|
+
export interface AccountsSelectionResponseV2024 {
|
|
5307
|
+
/**
|
|
5308
|
+
* A list of available account selections per identity in the request, for all the requested items
|
|
5309
|
+
* @type {Array<IdentityAccountSelectionsV2024>}
|
|
5310
|
+
* @memberof AccountsSelectionResponseV2024
|
|
5311
|
+
*/
|
|
5312
|
+
'identities'?: Array<IdentityAccountSelectionsV2024>;
|
|
5313
|
+
}
|
|
5194
5314
|
/**
|
|
5195
5315
|
*
|
|
5196
5316
|
* @export
|
|
@@ -6513,6 +6633,7 @@ export declare const AttributeDefinitionTypeV2024: {
|
|
|
6513
6633
|
readonly Long: "LONG";
|
|
6514
6634
|
readonly Int: "INT";
|
|
6515
6635
|
readonly Boolean: "BOOLEAN";
|
|
6636
|
+
readonly Date: "DATE";
|
|
6516
6637
|
};
|
|
6517
6638
|
export type AttributeDefinitionTypeV2024 = typeof AttributeDefinitionTypeV2024[keyof typeof AttributeDefinitionTypeV2024];
|
|
6518
6639
|
/**
|
|
@@ -15797,6 +15918,30 @@ export interface FeatureValueDtoV2024 {
|
|
|
15797
15918
|
*/
|
|
15798
15919
|
'denominator'?: number;
|
|
15799
15920
|
}
|
|
15921
|
+
/**
|
|
15922
|
+
*
|
|
15923
|
+
* @export
|
|
15924
|
+
* @interface FederationProtocolDetailsV2024
|
|
15925
|
+
*/
|
|
15926
|
+
export interface FederationProtocolDetailsV2024 {
|
|
15927
|
+
/**
|
|
15928
|
+
* Federation protocol role
|
|
15929
|
+
* @type {string}
|
|
15930
|
+
* @memberof FederationProtocolDetailsV2024
|
|
15931
|
+
*/
|
|
15932
|
+
'role'?: FederationProtocolDetailsV2024RoleV2024;
|
|
15933
|
+
/**
|
|
15934
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
15935
|
+
* @type {string}
|
|
15936
|
+
* @memberof FederationProtocolDetailsV2024
|
|
15937
|
+
*/
|
|
15938
|
+
'entityId'?: string;
|
|
15939
|
+
}
|
|
15940
|
+
export declare const FederationProtocolDetailsV2024RoleV2024: {
|
|
15941
|
+
readonly SamlIdp: "SAML_IDP";
|
|
15942
|
+
readonly SamlSp: "SAML_SP";
|
|
15943
|
+
};
|
|
15944
|
+
export type FederationProtocolDetailsV2024RoleV2024 = typeof FederationProtocolDetailsV2024RoleV2024[keyof typeof FederationProtocolDetailsV2024RoleV2024];
|
|
15800
15945
|
/**
|
|
15801
15946
|
*
|
|
15802
15947
|
* @export
|
|
@@ -16987,6 +17132,182 @@ export declare const GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequ
|
|
|
16987
17132
|
readonly NoDecisions: "NO_DECISIONS";
|
|
16988
17133
|
};
|
|
16989
17134
|
export type GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024 = typeof GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024[keyof typeof GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024];
|
|
17135
|
+
/**
|
|
17136
|
+
*
|
|
17137
|
+
* @export
|
|
17138
|
+
* @interface GetCampaign200ResponseV2024
|
|
17139
|
+
*/
|
|
17140
|
+
export interface GetCampaign200ResponseV2024 {
|
|
17141
|
+
/**
|
|
17142
|
+
* Id of the campaign
|
|
17143
|
+
* @type {string}
|
|
17144
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17145
|
+
*/
|
|
17146
|
+
'id'?: string | null;
|
|
17147
|
+
/**
|
|
17148
|
+
* The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
17149
|
+
* @type {string}
|
|
17150
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17151
|
+
*/
|
|
17152
|
+
'name': string;
|
|
17153
|
+
/**
|
|
17154
|
+
* The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
17155
|
+
* @type {string}
|
|
17156
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17157
|
+
*/
|
|
17158
|
+
'description': string | null;
|
|
17159
|
+
/**
|
|
17160
|
+
* The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
|
|
17161
|
+
* @type {string}
|
|
17162
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17163
|
+
*/
|
|
17164
|
+
'deadline'?: string | null;
|
|
17165
|
+
/**
|
|
17166
|
+
* The type of campaign. Could be extended in the future.
|
|
17167
|
+
* @type {string}
|
|
17168
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17169
|
+
*/
|
|
17170
|
+
'type': GetCampaign200ResponseV2024TypeV2024;
|
|
17171
|
+
/**
|
|
17172
|
+
* Enables email notification for this campaign
|
|
17173
|
+
* @type {boolean}
|
|
17174
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17175
|
+
*/
|
|
17176
|
+
'emailNotificationEnabled'?: boolean;
|
|
17177
|
+
/**
|
|
17178
|
+
* Allows auto revoke for this campaign
|
|
17179
|
+
* @type {boolean}
|
|
17180
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17181
|
+
*/
|
|
17182
|
+
'autoRevokeAllowed'?: boolean;
|
|
17183
|
+
/**
|
|
17184
|
+
* Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
|
|
17185
|
+
* @type {boolean}
|
|
17186
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17187
|
+
*/
|
|
17188
|
+
'recommendationsEnabled'?: boolean;
|
|
17189
|
+
/**
|
|
17190
|
+
* The campaign\'s current status.
|
|
17191
|
+
* @type {string}
|
|
17192
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17193
|
+
*/
|
|
17194
|
+
'status'?: GetCampaign200ResponseV2024StatusV2024 | null;
|
|
17195
|
+
/**
|
|
17196
|
+
* The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
|
|
17197
|
+
* @type {string}
|
|
17198
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17199
|
+
*/
|
|
17200
|
+
'correlatedStatus'?: GetCampaign200ResponseV2024CorrelatedStatusV2024;
|
|
17201
|
+
/**
|
|
17202
|
+
* Created time of the campaign
|
|
17203
|
+
* @type {string}
|
|
17204
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17205
|
+
*/
|
|
17206
|
+
'created'?: string | null;
|
|
17207
|
+
/**
|
|
17208
|
+
* The total number of certifications in this campaign.
|
|
17209
|
+
* @type {number}
|
|
17210
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17211
|
+
*/
|
|
17212
|
+
'totalCertifications'?: number | null;
|
|
17213
|
+
/**
|
|
17214
|
+
* The number of completed certifications in this campaign.
|
|
17215
|
+
* @type {number}
|
|
17216
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17217
|
+
*/
|
|
17218
|
+
'completedCertifications'?: number | null;
|
|
17219
|
+
/**
|
|
17220
|
+
* A list of errors and warnings that have accumulated.
|
|
17221
|
+
* @type {Array<CampaignAlertV2024>}
|
|
17222
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17223
|
+
*/
|
|
17224
|
+
'alerts'?: Array<CampaignAlertV2024> | null;
|
|
17225
|
+
/**
|
|
17226
|
+
* Modified time of the campaign
|
|
17227
|
+
* @type {string}
|
|
17228
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17229
|
+
*/
|
|
17230
|
+
'modified'?: string | null;
|
|
17231
|
+
/**
|
|
17232
|
+
*
|
|
17233
|
+
* @type {CampaignAllOfFilterV2024}
|
|
17234
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17235
|
+
*/
|
|
17236
|
+
'filter'?: CampaignAllOfFilterV2024 | null;
|
|
17237
|
+
/**
|
|
17238
|
+
* Determines if comments on sunset date changes are required.
|
|
17239
|
+
* @type {boolean}
|
|
17240
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17241
|
+
*/
|
|
17242
|
+
'sunsetCommentsRequired'?: boolean;
|
|
17243
|
+
/**
|
|
17244
|
+
*
|
|
17245
|
+
* @type {CampaignAllOfSourceOwnerCampaignInfoV2024}
|
|
17246
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17247
|
+
*/
|
|
17248
|
+
'sourceOwnerCampaignInfo'?: CampaignAllOfSourceOwnerCampaignInfoV2024 | null;
|
|
17249
|
+
/**
|
|
17250
|
+
*
|
|
17251
|
+
* @type {CampaignAllOfSearchCampaignInfoV2024}
|
|
17252
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17253
|
+
*/
|
|
17254
|
+
'searchCampaignInfo'?: CampaignAllOfSearchCampaignInfoV2024 | null;
|
|
17255
|
+
/**
|
|
17256
|
+
*
|
|
17257
|
+
* @type {CampaignAllOfRoleCompositionCampaignInfoV2024}
|
|
17258
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17259
|
+
*/
|
|
17260
|
+
'roleCompositionCampaignInfo'?: CampaignAllOfRoleCompositionCampaignInfoV2024 | null;
|
|
17261
|
+
/**
|
|
17262
|
+
*
|
|
17263
|
+
* @type {CampaignAllOfMachineAccountCampaignInfoV2024}
|
|
17264
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17265
|
+
*/
|
|
17266
|
+
'machineAccountCampaignInfo'?: CampaignAllOfMachineAccountCampaignInfoV2024 | null;
|
|
17267
|
+
/**
|
|
17268
|
+
* A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
|
|
17269
|
+
* @type {Array<CampaignAllOfSourcesWithOrphanEntitlementsV2024>}
|
|
17270
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17271
|
+
*/
|
|
17272
|
+
'sourcesWithOrphanEntitlements'?: Array<CampaignAllOfSourcesWithOrphanEntitlementsV2024> | null;
|
|
17273
|
+
/**
|
|
17274
|
+
* Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
|
|
17275
|
+
* @type {string}
|
|
17276
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17277
|
+
*/
|
|
17278
|
+
'mandatoryCommentRequirement'?: GetCampaign200ResponseV2024MandatoryCommentRequirementV2024;
|
|
17279
|
+
}
|
|
17280
|
+
export declare const GetCampaign200ResponseV2024TypeV2024: {
|
|
17281
|
+
readonly Manager: "MANAGER";
|
|
17282
|
+
readonly SourceOwner: "SOURCE_OWNER";
|
|
17283
|
+
readonly Search: "SEARCH";
|
|
17284
|
+
readonly RoleComposition: "ROLE_COMPOSITION";
|
|
17285
|
+
readonly MachineAccount: "MACHINE_ACCOUNT";
|
|
17286
|
+
};
|
|
17287
|
+
export type GetCampaign200ResponseV2024TypeV2024 = typeof GetCampaign200ResponseV2024TypeV2024[keyof typeof GetCampaign200ResponseV2024TypeV2024];
|
|
17288
|
+
export declare const GetCampaign200ResponseV2024StatusV2024: {
|
|
17289
|
+
readonly Pending: "PENDING";
|
|
17290
|
+
readonly Staged: "STAGED";
|
|
17291
|
+
readonly Canceling: "CANCELING";
|
|
17292
|
+
readonly Activating: "ACTIVATING";
|
|
17293
|
+
readonly Active: "ACTIVE";
|
|
17294
|
+
readonly Completing: "COMPLETING";
|
|
17295
|
+
readonly Completed: "COMPLETED";
|
|
17296
|
+
readonly Error: "ERROR";
|
|
17297
|
+
readonly Archived: "ARCHIVED";
|
|
17298
|
+
};
|
|
17299
|
+
export type GetCampaign200ResponseV2024StatusV2024 = typeof GetCampaign200ResponseV2024StatusV2024[keyof typeof GetCampaign200ResponseV2024StatusV2024];
|
|
17300
|
+
export declare const GetCampaign200ResponseV2024CorrelatedStatusV2024: {
|
|
17301
|
+
readonly Correlated: "CORRELATED";
|
|
17302
|
+
readonly Uncorrelated: "UNCORRELATED";
|
|
17303
|
+
};
|
|
17304
|
+
export type GetCampaign200ResponseV2024CorrelatedStatusV2024 = typeof GetCampaign200ResponseV2024CorrelatedStatusV2024[keyof typeof GetCampaign200ResponseV2024CorrelatedStatusV2024];
|
|
17305
|
+
export declare const GetCampaign200ResponseV2024MandatoryCommentRequirementV2024: {
|
|
17306
|
+
readonly AllDecisions: "ALL_DECISIONS";
|
|
17307
|
+
readonly RevokeOnlyDecisions: "REVOKE_ONLY_DECISIONS";
|
|
17308
|
+
readonly NoDecisions: "NO_DECISIONS";
|
|
17309
|
+
};
|
|
17310
|
+
export type GetCampaign200ResponseV2024MandatoryCommentRequirementV2024 = typeof GetCampaign200ResponseV2024MandatoryCommentRequirementV2024[keyof typeof GetCampaign200ResponseV2024MandatoryCommentRequirementV2024];
|
|
16990
17311
|
/**
|
|
16991
17312
|
* @type GetDiscoveredApplications200ResponseInnerV2024
|
|
16992
17313
|
* @export
|
|
@@ -17548,6 +17869,43 @@ export type IdentityAccessV2024 = {
|
|
|
17548
17869
|
} & AccessProfileEntitlementV2024 | {
|
|
17549
17870
|
type: 'ROLE';
|
|
17550
17871
|
} & AccessProfileRoleV2024;
|
|
17872
|
+
/**
|
|
17873
|
+
*
|
|
17874
|
+
* @export
|
|
17875
|
+
* @interface IdentityAccountSelectionsV2024
|
|
17876
|
+
*/
|
|
17877
|
+
export interface IdentityAccountSelectionsV2024 {
|
|
17878
|
+
/**
|
|
17879
|
+
* Available account selections for the identity, per requested item
|
|
17880
|
+
* @type {Array<RequestedItemAccountSelectionsV2024>}
|
|
17881
|
+
* @memberof IdentityAccountSelectionsV2024
|
|
17882
|
+
*/
|
|
17883
|
+
'requestedItems'?: Array<RequestedItemAccountSelectionsV2024>;
|
|
17884
|
+
/**
|
|
17885
|
+
* A boolean indicating whether any account selections will be required for the user to raise an access request
|
|
17886
|
+
* @type {boolean}
|
|
17887
|
+
* @memberof IdentityAccountSelectionsV2024
|
|
17888
|
+
*/
|
|
17889
|
+
'accountsSelectionRequired'?: boolean;
|
|
17890
|
+
/**
|
|
17891
|
+
*
|
|
17892
|
+
* @type {DtoTypeV2024}
|
|
17893
|
+
* @memberof IdentityAccountSelectionsV2024
|
|
17894
|
+
*/
|
|
17895
|
+
'type'?: DtoTypeV2024;
|
|
17896
|
+
/**
|
|
17897
|
+
* The identity id for the user
|
|
17898
|
+
* @type {string}
|
|
17899
|
+
* @memberof IdentityAccountSelectionsV2024
|
|
17900
|
+
*/
|
|
17901
|
+
'id'?: string;
|
|
17902
|
+
/**
|
|
17903
|
+
* The name of the identity
|
|
17904
|
+
* @type {string}
|
|
17905
|
+
* @memberof IdentityAccountSelectionsV2024
|
|
17906
|
+
*/
|
|
17907
|
+
'name'?: string;
|
|
17908
|
+
}
|
|
17551
17909
|
/**
|
|
17552
17910
|
*
|
|
17553
17911
|
* @export
|
|
@@ -19674,6 +20032,102 @@ export interface IdentityWithNewAccessV2024 {
|
|
|
19674
20032
|
*/
|
|
19675
20033
|
'accessRefs': Array<IdentityWithNewAccessAccessRefsInnerV2024>;
|
|
19676
20034
|
}
|
|
20035
|
+
/**
|
|
20036
|
+
*
|
|
20037
|
+
* @export
|
|
20038
|
+
* @interface IdpDetailsV2024
|
|
20039
|
+
*/
|
|
20040
|
+
export interface IdpDetailsV2024 {
|
|
20041
|
+
/**
|
|
20042
|
+
* Federation protocol role
|
|
20043
|
+
* @type {string}
|
|
20044
|
+
* @memberof IdpDetailsV2024
|
|
20045
|
+
*/
|
|
20046
|
+
'role'?: IdpDetailsV2024RoleV2024;
|
|
20047
|
+
/**
|
|
20048
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
20049
|
+
* @type {string}
|
|
20050
|
+
* @memberof IdpDetailsV2024
|
|
20051
|
+
*/
|
|
20052
|
+
'entityId'?: string;
|
|
20053
|
+
/**
|
|
20054
|
+
* Defines the binding used for the SAML flow. Used with IDP configurations.
|
|
20055
|
+
* @type {string}
|
|
20056
|
+
* @memberof IdpDetailsV2024
|
|
20057
|
+
*/
|
|
20058
|
+
'binding'?: string;
|
|
20059
|
+
/**
|
|
20060
|
+
* Specifies the SAML authentication method to use. Used with IDP configurations.
|
|
20061
|
+
* @type {string}
|
|
20062
|
+
* @memberof IdpDetailsV2024
|
|
20063
|
+
*/
|
|
20064
|
+
'authnContext'?: string;
|
|
20065
|
+
/**
|
|
20066
|
+
* The IDP logout URL. Used with IDP configurations.
|
|
20067
|
+
* @type {string}
|
|
20068
|
+
* @memberof IdpDetailsV2024
|
|
20069
|
+
*/
|
|
20070
|
+
'logoutUrl'?: string;
|
|
20071
|
+
/**
|
|
20072
|
+
* Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
|
|
20073
|
+
* @type {boolean}
|
|
20074
|
+
* @memberof IdpDetailsV2024
|
|
20075
|
+
*/
|
|
20076
|
+
'includeAuthnContext'?: boolean;
|
|
20077
|
+
/**
|
|
20078
|
+
* The name id format to use. Used with IDP configurations.
|
|
20079
|
+
* @type {string}
|
|
20080
|
+
* @memberof IdpDetailsV2024
|
|
20081
|
+
*/
|
|
20082
|
+
'nameId'?: string;
|
|
20083
|
+
/**
|
|
20084
|
+
*
|
|
20085
|
+
* @type {JITConfigurationV2024}
|
|
20086
|
+
* @memberof IdpDetailsV2024
|
|
20087
|
+
*/
|
|
20088
|
+
'jitConfiguration'?: JITConfigurationV2024;
|
|
20089
|
+
/**
|
|
20090
|
+
* The Base64-encoded certificate used by the IDP. Used with IDP configurations.
|
|
20091
|
+
* @type {string}
|
|
20092
|
+
* @memberof IdpDetailsV2024
|
|
20093
|
+
*/
|
|
20094
|
+
'cert'?: string;
|
|
20095
|
+
/**
|
|
20096
|
+
* The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
|
|
20097
|
+
* @type {string}
|
|
20098
|
+
* @memberof IdpDetailsV2024
|
|
20099
|
+
*/
|
|
20100
|
+
'loginUrlPost'?: string;
|
|
20101
|
+
/**
|
|
20102
|
+
* The IDP Redirect URL. Used with IDP configurations.
|
|
20103
|
+
* @type {string}
|
|
20104
|
+
* @memberof IdpDetailsV2024
|
|
20105
|
+
*/
|
|
20106
|
+
'loginUrlRedirect'?: string;
|
|
20107
|
+
/**
|
|
20108
|
+
* Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
|
|
20109
|
+
* @type {string}
|
|
20110
|
+
* @memberof IdpDetailsV2024
|
|
20111
|
+
*/
|
|
20112
|
+
'mappingAttribute': string;
|
|
20113
|
+
/**
|
|
20114
|
+
* The expiration date extracted from the certificate.
|
|
20115
|
+
* @type {string}
|
|
20116
|
+
* @memberof IdpDetailsV2024
|
|
20117
|
+
*/
|
|
20118
|
+
'certificateExpirationDate'?: string;
|
|
20119
|
+
/**
|
|
20120
|
+
* The name extracted from the certificate.
|
|
20121
|
+
* @type {string}
|
|
20122
|
+
* @memberof IdpDetailsV2024
|
|
20123
|
+
*/
|
|
20124
|
+
'certificateName'?: string;
|
|
20125
|
+
}
|
|
20126
|
+
export declare const IdpDetailsV2024RoleV2024: {
|
|
20127
|
+
readonly SamlIdp: "SAML_IDP";
|
|
20128
|
+
readonly SamlSp: "SAML_SP";
|
|
20129
|
+
};
|
|
20130
|
+
export type IdpDetailsV2024RoleV2024 = typeof IdpDetailsV2024RoleV2024[keyof typeof IdpDetailsV2024RoleV2024];
|
|
19677
20131
|
/**
|
|
19678
20132
|
*
|
|
19679
20133
|
* @export
|
|
@@ -20107,6 +20561,33 @@ export interface InvocationV2024 {
|
|
|
20107
20561
|
*/
|
|
20108
20562
|
'contentJson'?: object;
|
|
20109
20563
|
}
|
|
20564
|
+
/**
|
|
20565
|
+
*
|
|
20566
|
+
* @export
|
|
20567
|
+
* @interface JITConfigurationV2024
|
|
20568
|
+
*/
|
|
20569
|
+
export interface JITConfigurationV2024 {
|
|
20570
|
+
/**
|
|
20571
|
+
* The indicator for just-in-time provisioning enabled
|
|
20572
|
+
* @type {boolean}
|
|
20573
|
+
* @memberof JITConfigurationV2024
|
|
20574
|
+
*/
|
|
20575
|
+
'enabled'?: boolean;
|
|
20576
|
+
/**
|
|
20577
|
+
* the sourceId that mapped to just-in-time provisioning configuration
|
|
20578
|
+
* @type {string}
|
|
20579
|
+
* @memberof JITConfigurationV2024
|
|
20580
|
+
*/
|
|
20581
|
+
'sourceId'?: string;
|
|
20582
|
+
/**
|
|
20583
|
+
* A mapping of identity profile attribute names to SAML assertion attribute names
|
|
20584
|
+
* @type {{ [key: string]: string; }}
|
|
20585
|
+
* @memberof JITConfigurationV2024
|
|
20586
|
+
*/
|
|
20587
|
+
'sourceAttributeMappings'?: {
|
|
20588
|
+
[key: string]: string;
|
|
20589
|
+
};
|
|
20590
|
+
}
|
|
20110
20591
|
/**
|
|
20111
20592
|
* A JSONPatch Operation as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902)
|
|
20112
20593
|
* @export
|
|
@@ -20448,6 +20929,7 @@ export interface LifecyclestateDeletedV2024 {
|
|
|
20448
20929
|
}
|
|
20449
20930
|
export declare const LifecyclestateDeletedV2024TypeV2024: {
|
|
20450
20931
|
readonly LifecycleState: "LIFECYCLE_STATE";
|
|
20932
|
+
readonly TaskResult: "TASK_RESULT";
|
|
20451
20933
|
};
|
|
20452
20934
|
export type LifecyclestateDeletedV2024TypeV2024 = typeof LifecyclestateDeletedV2024TypeV2024[keyof typeof LifecyclestateDeletedV2024TypeV2024];
|
|
20453
20935
|
/**
|
|
@@ -21174,6 +21656,31 @@ export interface LocalizedMessageV2024 {
|
|
|
21174
21656
|
*/
|
|
21175
21657
|
'message': string;
|
|
21176
21658
|
}
|
|
21659
|
+
/**
|
|
21660
|
+
*
|
|
21661
|
+
* @export
|
|
21662
|
+
* @interface LockoutConfigurationV2024
|
|
21663
|
+
*/
|
|
21664
|
+
export interface LockoutConfigurationV2024 {
|
|
21665
|
+
/**
|
|
21666
|
+
* The maximum attempts allowed before lockout occurs.
|
|
21667
|
+
* @type {number}
|
|
21668
|
+
* @memberof LockoutConfigurationV2024
|
|
21669
|
+
*/
|
|
21670
|
+
'maximumAttempts'?: number;
|
|
21671
|
+
/**
|
|
21672
|
+
* The total time in minutes a user will be locked out.
|
|
21673
|
+
* @type {number}
|
|
21674
|
+
* @memberof LockoutConfigurationV2024
|
|
21675
|
+
*/
|
|
21676
|
+
'lockoutDuration'?: number;
|
|
21677
|
+
/**
|
|
21678
|
+
* A rolling window where authentication attempts in a series count towards the maximum before lockout occurs.
|
|
21679
|
+
* @type {number}
|
|
21680
|
+
* @memberof LockoutConfigurationV2024
|
|
21681
|
+
*/
|
|
21682
|
+
'lockoutWindow'?: number;
|
|
21683
|
+
}
|
|
21177
21684
|
/**
|
|
21178
21685
|
* The definition of an Identity according to the Reassignment Configuration service
|
|
21179
21686
|
* @export
|
|
@@ -27179,7 +27686,7 @@ export interface ProvisioningPolicyDtoV2024 {
|
|
|
27179
27686
|
* @type {string}
|
|
27180
27687
|
* @memberof ProvisioningPolicyDtoV2024
|
|
27181
27688
|
*/
|
|
27182
|
-
'name': string;
|
|
27689
|
+
'name': string | null;
|
|
27183
27690
|
/**
|
|
27184
27691
|
* the description of the provisioning policy
|
|
27185
27692
|
* @type {string}
|
|
@@ -27210,7 +27717,7 @@ export interface ProvisioningPolicyV2024 {
|
|
|
27210
27717
|
* @type {string}
|
|
27211
27718
|
* @memberof ProvisioningPolicyV2024
|
|
27212
27719
|
*/
|
|
27213
|
-
'name': string;
|
|
27720
|
+
'name': string | null;
|
|
27214
27721
|
/**
|
|
27215
27722
|
* the description of the provisioning policy
|
|
27216
27723
|
* @type {string}
|
|
@@ -28701,6 +29208,80 @@ export interface RequestedAccountRefV2024 {
|
|
|
28701
29208
|
*/
|
|
28702
29209
|
'sourceName'?: string;
|
|
28703
29210
|
}
|
|
29211
|
+
/**
|
|
29212
|
+
*
|
|
29213
|
+
* @export
|
|
29214
|
+
* @interface RequestedForDtoRefV2024
|
|
29215
|
+
*/
|
|
29216
|
+
export interface RequestedForDtoRefV2024 {
|
|
29217
|
+
/**
|
|
29218
|
+
* The identity id for which the access is requested
|
|
29219
|
+
* @type {string}
|
|
29220
|
+
* @memberof RequestedForDtoRefV2024
|
|
29221
|
+
*/
|
|
29222
|
+
'identityId': string;
|
|
29223
|
+
/**
|
|
29224
|
+
* the details for the access items that are requested for the identity
|
|
29225
|
+
* @type {Array<RequestedItemDtoRefV2024>}
|
|
29226
|
+
* @memberof RequestedForDtoRefV2024
|
|
29227
|
+
*/
|
|
29228
|
+
'requestedItems': Array<RequestedItemDtoRefV2024>;
|
|
29229
|
+
}
|
|
29230
|
+
/**
|
|
29231
|
+
*
|
|
29232
|
+
* @export
|
|
29233
|
+
* @interface RequestedItemAccountSelectionsV2024
|
|
29234
|
+
*/
|
|
29235
|
+
export interface RequestedItemAccountSelectionsV2024 {
|
|
29236
|
+
/**
|
|
29237
|
+
* The description for this requested item
|
|
29238
|
+
* @type {string}
|
|
29239
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
29240
|
+
*/
|
|
29241
|
+
'description'?: string;
|
|
29242
|
+
/**
|
|
29243
|
+
* This field indicates if account selections are not allowed for this requested item. * If true, this field indicates that account selections will not be available for this item and user combination. In this case, no account selections should be provided in the access request for this item and user combination, irrespective of whether the user has single or multiple accounts on a source. * An example is where a user is requesting an access profile that is already assigned to one of their accounts.
|
|
29244
|
+
* @type {boolean}
|
|
29245
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
29246
|
+
*/
|
|
29247
|
+
'accountsSelectionBlocked'?: boolean;
|
|
29248
|
+
/**
|
|
29249
|
+
* If account selections are not allowed for an item, this field will denote the reason.
|
|
29250
|
+
* @type {string}
|
|
29251
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
29252
|
+
*/
|
|
29253
|
+
'accountsSelectionBlockedReason'?: string | null;
|
|
29254
|
+
/**
|
|
29255
|
+
* The type of the item being requested.
|
|
29256
|
+
* @type {string}
|
|
29257
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
29258
|
+
*/
|
|
29259
|
+
'type'?: RequestedItemAccountSelectionsV2024TypeV2024;
|
|
29260
|
+
/**
|
|
29261
|
+
* The id of the requested item
|
|
29262
|
+
* @type {string}
|
|
29263
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
29264
|
+
*/
|
|
29265
|
+
'id'?: string;
|
|
29266
|
+
/**
|
|
29267
|
+
* The name of the requested item
|
|
29268
|
+
* @type {string}
|
|
29269
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
29270
|
+
*/
|
|
29271
|
+
'name'?: string;
|
|
29272
|
+
/**
|
|
29273
|
+
* The details for the sources and accounts for the requested item and identity combination
|
|
29274
|
+
* @type {Array<SourceAccountSelectionsV2024>}
|
|
29275
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
29276
|
+
*/
|
|
29277
|
+
'sources'?: Array<SourceAccountSelectionsV2024>;
|
|
29278
|
+
}
|
|
29279
|
+
export declare const RequestedItemAccountSelectionsV2024TypeV2024: {
|
|
29280
|
+
readonly AccessProfile: "ACCESS_PROFILE";
|
|
29281
|
+
readonly Role: "ROLE";
|
|
29282
|
+
readonly Entitlement: "ENTITLEMENT";
|
|
29283
|
+
};
|
|
29284
|
+
export type RequestedItemAccountSelectionsV2024TypeV2024 = typeof RequestedItemAccountSelectionsV2024TypeV2024[keyof typeof RequestedItemAccountSelectionsV2024TypeV2024];
|
|
28704
29285
|
/**
|
|
28705
29286
|
*
|
|
28706
29287
|
* @export
|
|
@@ -28726,6 +29307,69 @@ export declare const RequestedItemDetailsV2024TypeV2024: {
|
|
|
28726
29307
|
readonly Role: "ROLE";
|
|
28727
29308
|
};
|
|
28728
29309
|
export type RequestedItemDetailsV2024TypeV2024 = typeof RequestedItemDetailsV2024TypeV2024[keyof typeof RequestedItemDetailsV2024TypeV2024];
|
|
29310
|
+
/**
|
|
29311
|
+
*
|
|
29312
|
+
* @export
|
|
29313
|
+
* @interface RequestedItemDtoRefV2024
|
|
29314
|
+
*/
|
|
29315
|
+
export interface RequestedItemDtoRefV2024 {
|
|
29316
|
+
/**
|
|
29317
|
+
* The type of the item being requested.
|
|
29318
|
+
* @type {string}
|
|
29319
|
+
* @memberof RequestedItemDtoRefV2024
|
|
29320
|
+
*/
|
|
29321
|
+
'type': RequestedItemDtoRefV2024TypeV2024;
|
|
29322
|
+
/**
|
|
29323
|
+
* ID of Role, Access Profile or Entitlement being requested.
|
|
29324
|
+
* @type {string}
|
|
29325
|
+
* @memberof RequestedItemDtoRefV2024
|
|
29326
|
+
*/
|
|
29327
|
+
'id': string;
|
|
29328
|
+
/**
|
|
29329
|
+
* Comment provided by requester. * Comment is required when the request is of type Revoke Access.
|
|
29330
|
+
* @type {string}
|
|
29331
|
+
* @memberof RequestedItemDtoRefV2024
|
|
29332
|
+
*/
|
|
29333
|
+
'comment'?: string;
|
|
29334
|
+
/**
|
|
29335
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
|
|
29336
|
+
* @type {{ [key: string]: string; }}
|
|
29337
|
+
* @memberof RequestedItemDtoRefV2024
|
|
29338
|
+
*/
|
|
29339
|
+
'clientMetadata'?: {
|
|
29340
|
+
[key: string]: string;
|
|
29341
|
+
};
|
|
29342
|
+
/**
|
|
29343
|
+
* The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
|
|
29344
|
+
* @type {string}
|
|
29345
|
+
* @memberof RequestedItemDtoRefV2024
|
|
29346
|
+
*/
|
|
29347
|
+
'removeDate'?: string;
|
|
29348
|
+
/**
|
|
29349
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
29350
|
+
* @type {string}
|
|
29351
|
+
* @memberof RequestedItemDtoRefV2024
|
|
29352
|
+
*/
|
|
29353
|
+
'assignmentId'?: string | null;
|
|
29354
|
+
/**
|
|
29355
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
29356
|
+
* @type {string}
|
|
29357
|
+
* @memberof RequestedItemDtoRefV2024
|
|
29358
|
+
*/
|
|
29359
|
+
'nativeIdentity'?: string | null;
|
|
29360
|
+
/**
|
|
29361
|
+
* The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
|
|
29362
|
+
* @type {Array<SourceItemRefV2024>}
|
|
29363
|
+
* @memberof RequestedItemDtoRefV2024
|
|
29364
|
+
*/
|
|
29365
|
+
'accountSelection'?: Array<SourceItemRefV2024> | null;
|
|
29366
|
+
}
|
|
29367
|
+
export declare const RequestedItemDtoRefV2024TypeV2024: {
|
|
29368
|
+
readonly AccessProfile: "ACCESS_PROFILE";
|
|
29369
|
+
readonly Role: "ROLE";
|
|
29370
|
+
readonly Entitlement: "ENTITLEMENT";
|
|
29371
|
+
};
|
|
29372
|
+
export type RequestedItemDtoRefV2024TypeV2024 = typeof RequestedItemDtoRefV2024TypeV2024[keyof typeof RequestedItemDtoRefV2024TypeV2024];
|
|
28729
29373
|
/**
|
|
28730
29374
|
*
|
|
28731
29375
|
* @export
|
|
@@ -34822,6 +35466,176 @@ export declare const ServiceDeskSourceV2024TypeV2024: {
|
|
|
34822
35466
|
readonly Source: "SOURCE";
|
|
34823
35467
|
};
|
|
34824
35468
|
export type ServiceDeskSourceV2024TypeV2024 = typeof ServiceDeskSourceV2024TypeV2024[keyof typeof ServiceDeskSourceV2024TypeV2024];
|
|
35469
|
+
/**
|
|
35470
|
+
*
|
|
35471
|
+
* @export
|
|
35472
|
+
* @interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35473
|
+
*/
|
|
35474
|
+
export interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2024 {
|
|
35475
|
+
/**
|
|
35476
|
+
* Federation protocol role
|
|
35477
|
+
* @type {string}
|
|
35478
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35479
|
+
*/
|
|
35480
|
+
'role'?: ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024;
|
|
35481
|
+
/**
|
|
35482
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
35483
|
+
* @type {string}
|
|
35484
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35485
|
+
*/
|
|
35486
|
+
'entityId'?: string;
|
|
35487
|
+
/**
|
|
35488
|
+
* Defines the binding used for the SAML flow. Used with IDP configurations.
|
|
35489
|
+
* @type {string}
|
|
35490
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35491
|
+
*/
|
|
35492
|
+
'binding'?: string;
|
|
35493
|
+
/**
|
|
35494
|
+
* Specifies the SAML authentication method to use. Used with IDP configurations.
|
|
35495
|
+
* @type {string}
|
|
35496
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35497
|
+
*/
|
|
35498
|
+
'authnContext'?: string;
|
|
35499
|
+
/**
|
|
35500
|
+
* The IDP logout URL. Used with IDP configurations.
|
|
35501
|
+
* @type {string}
|
|
35502
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35503
|
+
*/
|
|
35504
|
+
'logoutUrl'?: string;
|
|
35505
|
+
/**
|
|
35506
|
+
* Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
|
|
35507
|
+
* @type {boolean}
|
|
35508
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35509
|
+
*/
|
|
35510
|
+
'includeAuthnContext'?: boolean;
|
|
35511
|
+
/**
|
|
35512
|
+
* The name id format to use. Used with IDP configurations.
|
|
35513
|
+
* @type {string}
|
|
35514
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35515
|
+
*/
|
|
35516
|
+
'nameId'?: string;
|
|
35517
|
+
/**
|
|
35518
|
+
*
|
|
35519
|
+
* @type {JITConfigurationV2024}
|
|
35520
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35521
|
+
*/
|
|
35522
|
+
'jitConfiguration'?: JITConfigurationV2024;
|
|
35523
|
+
/**
|
|
35524
|
+
* The Base64-encoded certificate used by the IDP. Used with IDP configurations.
|
|
35525
|
+
* @type {string}
|
|
35526
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35527
|
+
*/
|
|
35528
|
+
'cert'?: string;
|
|
35529
|
+
/**
|
|
35530
|
+
* The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
|
|
35531
|
+
* @type {string}
|
|
35532
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35533
|
+
*/
|
|
35534
|
+
'loginUrlPost'?: string;
|
|
35535
|
+
/**
|
|
35536
|
+
* The IDP Redirect URL. Used with IDP configurations.
|
|
35537
|
+
* @type {string}
|
|
35538
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35539
|
+
*/
|
|
35540
|
+
'loginUrlRedirect'?: string;
|
|
35541
|
+
/**
|
|
35542
|
+
* Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
|
|
35543
|
+
* @type {string}
|
|
35544
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35545
|
+
*/
|
|
35546
|
+
'mappingAttribute': string;
|
|
35547
|
+
/**
|
|
35548
|
+
* The expiration date extracted from the certificate.
|
|
35549
|
+
* @type {string}
|
|
35550
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35551
|
+
*/
|
|
35552
|
+
'certificateExpirationDate'?: string;
|
|
35553
|
+
/**
|
|
35554
|
+
* The name extracted from the certificate.
|
|
35555
|
+
* @type {string}
|
|
35556
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35557
|
+
*/
|
|
35558
|
+
'certificateName'?: string;
|
|
35559
|
+
/**
|
|
35560
|
+
* Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
|
|
35561
|
+
* @type {string}
|
|
35562
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35563
|
+
*/
|
|
35564
|
+
'alias'?: string;
|
|
35565
|
+
/**
|
|
35566
|
+
* The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
|
|
35567
|
+
* @type {string}
|
|
35568
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35569
|
+
*/
|
|
35570
|
+
'callbackUrl': string;
|
|
35571
|
+
/**
|
|
35572
|
+
* The legacy ACS URL used for SAML authentication. Used with SP configurations.
|
|
35573
|
+
* @type {string}
|
|
35574
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
35575
|
+
*/
|
|
35576
|
+
'legacyAcsUrl'?: string;
|
|
35577
|
+
}
|
|
35578
|
+
export declare const ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024: {
|
|
35579
|
+
readonly SamlIdp: "SAML_IDP";
|
|
35580
|
+
readonly SamlSp: "SAML_SP";
|
|
35581
|
+
};
|
|
35582
|
+
export type ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024 = typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024[keyof typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024];
|
|
35583
|
+
/**
|
|
35584
|
+
* Represents the IdentityNow as Service Provider Configuration allowing customers to log into IDN via an Identity Provider
|
|
35585
|
+
* @export
|
|
35586
|
+
* @interface ServiceProviderConfigurationV2024
|
|
35587
|
+
*/
|
|
35588
|
+
export interface ServiceProviderConfigurationV2024 {
|
|
35589
|
+
/**
|
|
35590
|
+
* This determines whether or not the SAML authentication flow is enabled for an org
|
|
35591
|
+
* @type {boolean}
|
|
35592
|
+
* @memberof ServiceProviderConfigurationV2024
|
|
35593
|
+
*/
|
|
35594
|
+
'enabled'?: boolean;
|
|
35595
|
+
/**
|
|
35596
|
+
* This allows basic login with the parameter prompt=true. This is often toggled on when debugging SAML authentication setup. When false, only org admins with MFA-enabled can bypass the IDP.
|
|
35597
|
+
* @type {boolean}
|
|
35598
|
+
* @memberof ServiceProviderConfigurationV2024
|
|
35599
|
+
*/
|
|
35600
|
+
'bypassIdp'?: boolean;
|
|
35601
|
+
/**
|
|
35602
|
+
* This indicates whether or not the SAML configuration is valid.
|
|
35603
|
+
* @type {boolean}
|
|
35604
|
+
* @memberof ServiceProviderConfigurationV2024
|
|
35605
|
+
*/
|
|
35606
|
+
'samlConfigurationValid'?: boolean;
|
|
35607
|
+
/**
|
|
35608
|
+
* A list of the abstract implementations of the Federation Protocol details. Typically, this will include on SpDetails object and one IdpDetails object used in tandem to define a SAML integration between a customer\'s identity provider and a customer\'s SailPoint instance (i.e., the service provider).
|
|
35609
|
+
* @type {Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2024>}
|
|
35610
|
+
* @memberof ServiceProviderConfigurationV2024
|
|
35611
|
+
*/
|
|
35612
|
+
'federationProtocolDetails'?: Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2024>;
|
|
35613
|
+
}
|
|
35614
|
+
/**
|
|
35615
|
+
*
|
|
35616
|
+
* @export
|
|
35617
|
+
* @interface SessionConfigurationV2024
|
|
35618
|
+
*/
|
|
35619
|
+
export interface SessionConfigurationV2024 {
|
|
35620
|
+
/**
|
|
35621
|
+
* The maximum time in minutes a session can be idle.
|
|
35622
|
+
* @type {number}
|
|
35623
|
+
* @memberof SessionConfigurationV2024
|
|
35624
|
+
*/
|
|
35625
|
+
'maxIdleTime'?: number;
|
|
35626
|
+
/**
|
|
35627
|
+
* Denotes if \'remember me\' is enabled.
|
|
35628
|
+
* @type {boolean}
|
|
35629
|
+
* @memberof SessionConfigurationV2024
|
|
35630
|
+
*/
|
|
35631
|
+
'rememberMe'?: boolean;
|
|
35632
|
+
/**
|
|
35633
|
+
* The maximum allowable session time in minutes.
|
|
35634
|
+
* @type {number}
|
|
35635
|
+
* @memberof SessionConfigurationV2024
|
|
35636
|
+
*/
|
|
35637
|
+
'maxSessionTime'?: number;
|
|
35638
|
+
}
|
|
34825
35639
|
/**
|
|
34826
35640
|
*
|
|
34827
35641
|
* @export
|
|
@@ -35832,6 +36646,37 @@ export interface SourceAccountDeletedV2024 {
|
|
|
35832
36646
|
[key: string]: any;
|
|
35833
36647
|
};
|
|
35834
36648
|
}
|
|
36649
|
+
/**
|
|
36650
|
+
*
|
|
36651
|
+
* @export
|
|
36652
|
+
* @interface SourceAccountSelectionsV2024
|
|
36653
|
+
*/
|
|
36654
|
+
export interface SourceAccountSelectionsV2024 {
|
|
36655
|
+
/**
|
|
36656
|
+
*
|
|
36657
|
+
* @type {DtoTypeV2024}
|
|
36658
|
+
* @memberof SourceAccountSelectionsV2024
|
|
36659
|
+
*/
|
|
36660
|
+
'type'?: DtoTypeV2024;
|
|
36661
|
+
/**
|
|
36662
|
+
* The source id
|
|
36663
|
+
* @type {string}
|
|
36664
|
+
* @memberof SourceAccountSelectionsV2024
|
|
36665
|
+
*/
|
|
36666
|
+
'id'?: string;
|
|
36667
|
+
/**
|
|
36668
|
+
* The source name
|
|
36669
|
+
* @type {string}
|
|
36670
|
+
* @memberof SourceAccountSelectionsV2024
|
|
36671
|
+
*/
|
|
36672
|
+
'name'?: string;
|
|
36673
|
+
/**
|
|
36674
|
+
* The accounts information for a particular source in the requested item
|
|
36675
|
+
* @type {Array<AccountInfoRefV2024>}
|
|
36676
|
+
* @memberof SourceAccountSelectionsV2024
|
|
36677
|
+
*/
|
|
36678
|
+
'accounts'?: Array<AccountInfoRefV2024>;
|
|
36679
|
+
}
|
|
35835
36680
|
/**
|
|
35836
36681
|
*
|
|
35837
36682
|
* @export
|
|
@@ -36601,6 +37446,25 @@ export declare const SourceHealthDtoV2024StatusV2024: {
|
|
|
36601
37446
|
readonly SourceStateErrorAccountFileImport: "SOURCE_STATE_ERROR_ACCOUNT_FILE_IMPORT";
|
|
36602
37447
|
};
|
|
36603
37448
|
export type SourceHealthDtoV2024StatusV2024 = typeof SourceHealthDtoV2024StatusV2024[keyof typeof SourceHealthDtoV2024StatusV2024];
|
|
37449
|
+
/**
|
|
37450
|
+
*
|
|
37451
|
+
* @export
|
|
37452
|
+
* @interface SourceItemRefV2024
|
|
37453
|
+
*/
|
|
37454
|
+
export interface SourceItemRefV2024 {
|
|
37455
|
+
/**
|
|
37456
|
+
* The id for the source on which account selections are made
|
|
37457
|
+
* @type {string}
|
|
37458
|
+
* @memberof SourceItemRefV2024
|
|
37459
|
+
*/
|
|
37460
|
+
'sourceId'?: string | null;
|
|
37461
|
+
/**
|
|
37462
|
+
* A list of account selections on the source. Currently, only one selection per source is supported.
|
|
37463
|
+
* @type {Array<AccountItemRefV2024>}
|
|
37464
|
+
* @memberof SourceItemRefV2024
|
|
37465
|
+
*/
|
|
37466
|
+
'accounts'?: Array<AccountItemRefV2024> | null;
|
|
37467
|
+
}
|
|
36604
37468
|
/**
|
|
36605
37469
|
* Reference to management workgroup for the source.
|
|
36606
37470
|
* @export
|
|
@@ -37681,6 +38545,48 @@ export interface SpConfigRulesV2024 {
|
|
|
37681
38545
|
*/
|
|
37682
38546
|
'editable'?: boolean;
|
|
37683
38547
|
}
|
|
38548
|
+
/**
|
|
38549
|
+
*
|
|
38550
|
+
* @export
|
|
38551
|
+
* @interface SpDetailsV2024
|
|
38552
|
+
*/
|
|
38553
|
+
export interface SpDetailsV2024 {
|
|
38554
|
+
/**
|
|
38555
|
+
* Federation protocol role
|
|
38556
|
+
* @type {string}
|
|
38557
|
+
* @memberof SpDetailsV2024
|
|
38558
|
+
*/
|
|
38559
|
+
'role'?: SpDetailsV2024RoleV2024;
|
|
38560
|
+
/**
|
|
38561
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
38562
|
+
* @type {string}
|
|
38563
|
+
* @memberof SpDetailsV2024
|
|
38564
|
+
*/
|
|
38565
|
+
'entityId'?: string;
|
|
38566
|
+
/**
|
|
38567
|
+
* Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
|
|
38568
|
+
* @type {string}
|
|
38569
|
+
* @memberof SpDetailsV2024
|
|
38570
|
+
*/
|
|
38571
|
+
'alias'?: string;
|
|
38572
|
+
/**
|
|
38573
|
+
* The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
|
|
38574
|
+
* @type {string}
|
|
38575
|
+
* @memberof SpDetailsV2024
|
|
38576
|
+
*/
|
|
38577
|
+
'callbackUrl': string;
|
|
38578
|
+
/**
|
|
38579
|
+
* The legacy ACS URL used for SAML authentication. Used with SP configurations.
|
|
38580
|
+
* @type {string}
|
|
38581
|
+
* @memberof SpDetailsV2024
|
|
38582
|
+
*/
|
|
38583
|
+
'legacyAcsUrl'?: string;
|
|
38584
|
+
}
|
|
38585
|
+
export declare const SpDetailsV2024RoleV2024: {
|
|
38586
|
+
readonly SamlIdp: "SAML_IDP";
|
|
38587
|
+
readonly SamlSp: "SAML_SP";
|
|
38588
|
+
};
|
|
38589
|
+
export type SpDetailsV2024RoleV2024 = typeof SpDetailsV2024RoleV2024[keyof typeof SpDetailsV2024RoleV2024];
|
|
37684
38590
|
/**
|
|
37685
38591
|
*
|
|
37686
38592
|
* @export
|
|
@@ -43465,7 +44371,7 @@ export declare const AccessRequestsV2024ApiAxiosParamCreator: (configuration?: C
|
|
|
43465
44371
|
*/
|
|
43466
44372
|
closeAccessRequest: (closeAccessRequestV2024: CloseAccessRequestV2024, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
43467
44373
|
/**
|
|
43468
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
44374
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
43469
44375
|
* @summary Submit Access Request
|
|
43470
44376
|
* @param {AccessRequestV2024} accessRequestV2024
|
|
43471
44377
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -43513,6 +44419,14 @@ export declare const AccessRequestsV2024ApiAxiosParamCreator: (configuration?: C
|
|
|
43513
44419
|
* @throws {RequiredError}
|
|
43514
44420
|
*/
|
|
43515
44421
|
listAdministratorsAccessRequestStatus: (requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
44422
|
+
/**
|
|
44423
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
44424
|
+
* @summary Get accounts selections for identity
|
|
44425
|
+
* @param {AccountsSelectionRequestV2024} accountsSelectionRequestV2024
|
|
44426
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44427
|
+
* @throws {RequiredError}
|
|
44428
|
+
*/
|
|
44429
|
+
loadAccountSelections: (accountsSelectionRequestV2024: AccountsSelectionRequestV2024, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
43516
44430
|
/**
|
|
43517
44431
|
* This endpoint replaces the current access-request configuration.
|
|
43518
44432
|
* @summary Update Access Request Configuration
|
|
@@ -43561,7 +44475,7 @@ export declare const AccessRequestsV2024ApiFp: (configuration?: Configuration) =
|
|
|
43561
44475
|
*/
|
|
43562
44476
|
closeAccessRequest(closeAccessRequestV2024: CloseAccessRequestV2024, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<object>>;
|
|
43563
44477
|
/**
|
|
43564
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
44478
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
43565
44479
|
* @summary Submit Access Request
|
|
43566
44480
|
* @param {AccessRequestV2024} accessRequestV2024
|
|
43567
44481
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -43609,6 +44523,14 @@ export declare const AccessRequestsV2024ApiFp: (configuration?: Configuration) =
|
|
|
43609
44523
|
* @throws {RequiredError}
|
|
43610
44524
|
*/
|
|
43611
44525
|
listAdministratorsAccessRequestStatus(requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<AccessRequestAdminItemStatusV2024>>>;
|
|
44526
|
+
/**
|
|
44527
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
44528
|
+
* @summary Get accounts selections for identity
|
|
44529
|
+
* @param {AccountsSelectionRequestV2024} accountsSelectionRequestV2024
|
|
44530
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44531
|
+
* @throws {RequiredError}
|
|
44532
|
+
*/
|
|
44533
|
+
loadAccountSelections(accountsSelectionRequestV2024: AccountsSelectionRequestV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AccountsSelectionResponseV2024>>;
|
|
43612
44534
|
/**
|
|
43613
44535
|
* This endpoint replaces the current access-request configuration.
|
|
43614
44536
|
* @summary Update Access Request Configuration
|
|
@@ -43656,7 +44578,7 @@ export declare const AccessRequestsV2024ApiFactory: (configuration?: Configurati
|
|
|
43656
44578
|
*/
|
|
43657
44579
|
closeAccessRequest(requestParameters: AccessRequestsV2024ApiCloseAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<object>;
|
|
43658
44580
|
/**
|
|
43659
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
44581
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
43660
44582
|
* @summary Submit Access Request
|
|
43661
44583
|
* @param {AccessRequestsV2024ApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
43662
44584
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -43686,6 +44608,14 @@ export declare const AccessRequestsV2024ApiFactory: (configuration?: Configurati
|
|
|
43686
44608
|
* @throws {RequiredError}
|
|
43687
44609
|
*/
|
|
43688
44610
|
listAdministratorsAccessRequestStatus(requestParameters?: AccessRequestsV2024ApiListAdministratorsAccessRequestStatusRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<AccessRequestAdminItemStatusV2024>>;
|
|
44611
|
+
/**
|
|
44612
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
44613
|
+
* @summary Get accounts selections for identity
|
|
44614
|
+
* @param {AccessRequestsV2024ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
|
|
44615
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44616
|
+
* @throws {RequiredError}
|
|
44617
|
+
*/
|
|
44618
|
+
loadAccountSelections(requestParameters: AccessRequestsV2024ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<AccountsSelectionResponseV2024>;
|
|
43689
44619
|
/**
|
|
43690
44620
|
* This endpoint replaces the current access-request configuration.
|
|
43691
44621
|
* @summary Update Access Request Configuration
|
|
@@ -43900,6 +44830,19 @@ export interface AccessRequestsV2024ApiListAdministratorsAccessRequestStatusRequ
|
|
|
43900
44830
|
*/
|
|
43901
44831
|
readonly requestState?: string;
|
|
43902
44832
|
}
|
|
44833
|
+
/**
|
|
44834
|
+
* Request parameters for loadAccountSelections operation in AccessRequestsV2024Api.
|
|
44835
|
+
* @export
|
|
44836
|
+
* @interface AccessRequestsV2024ApiLoadAccountSelectionsRequest
|
|
44837
|
+
*/
|
|
44838
|
+
export interface AccessRequestsV2024ApiLoadAccountSelectionsRequest {
|
|
44839
|
+
/**
|
|
44840
|
+
*
|
|
44841
|
+
* @type {AccountsSelectionRequestV2024}
|
|
44842
|
+
* @memberof AccessRequestsV2024ApiLoadAccountSelections
|
|
44843
|
+
*/
|
|
44844
|
+
readonly accountsSelectionRequestV2024: AccountsSelectionRequestV2024;
|
|
44845
|
+
}
|
|
43903
44846
|
/**
|
|
43904
44847
|
* Request parameters for setAccessRequestConfig operation in AccessRequestsV2024Api.
|
|
43905
44848
|
* @export
|
|
@@ -43957,7 +44900,7 @@ export declare class AccessRequestsV2024Api extends BaseAPI {
|
|
|
43957
44900
|
*/
|
|
43958
44901
|
closeAccessRequest(requestParameters: AccessRequestsV2024ApiCloseAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<object, any>>;
|
|
43959
44902
|
/**
|
|
43960
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
44903
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
43961
44904
|
* @summary Submit Access Request
|
|
43962
44905
|
* @param {AccessRequestsV2024ApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
43963
44906
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -43991,6 +44934,15 @@ export declare class AccessRequestsV2024Api extends BaseAPI {
|
|
|
43991
44934
|
* @memberof AccessRequestsV2024Api
|
|
43992
44935
|
*/
|
|
43993
44936
|
listAdministratorsAccessRequestStatus(requestParameters?: AccessRequestsV2024ApiListAdministratorsAccessRequestStatusRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AccessRequestAdminItemStatusV2024[], any>>;
|
|
44937
|
+
/**
|
|
44938
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
44939
|
+
* @summary Get accounts selections for identity
|
|
44940
|
+
* @param {AccessRequestsV2024ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
|
|
44941
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44942
|
+
* @throws {RequiredError}
|
|
44943
|
+
* @memberof AccessRequestsV2024Api
|
|
44944
|
+
*/
|
|
44945
|
+
loadAccountSelections(requestParameters: AccessRequestsV2024ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AccountsSelectionResponseV2024, any>>;
|
|
43994
44946
|
/**
|
|
43995
44947
|
* This endpoint replaces the current access-request configuration.
|
|
43996
44948
|
* @summary Update Access Request Configuration
|
|
@@ -47834,7 +48786,7 @@ export declare const CertificationCampaignsV2024ApiFp: (configuration?: Configur
|
|
|
47834
48786
|
* @param {*} [axiosOptions] Override http request option.
|
|
47835
48787
|
* @throws {RequiredError}
|
|
47836
48788
|
*/
|
|
47837
|
-
getCampaign(id: string, detail?: GetCampaignDetailV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<
|
|
48789
|
+
getCampaign(id: string, detail?: GetCampaignDetailV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetCampaign200ResponseV2024>>;
|
|
47838
48790
|
/**
|
|
47839
48791
|
* Use this API to fetch all reports for a certification campaign by campaign ID.
|
|
47840
48792
|
* @summary Get Campaign Reports
|
|
@@ -48025,7 +48977,7 @@ export declare const CertificationCampaignsV2024ApiFactory: (configuration?: Con
|
|
|
48025
48977
|
* @param {*} [axiosOptions] Override http request option.
|
|
48026
48978
|
* @throws {RequiredError}
|
|
48027
48979
|
*/
|
|
48028
|
-
getCampaign(requestParameters: CertificationCampaignsV2024ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<
|
|
48980
|
+
getCampaign(requestParameters: CertificationCampaignsV2024ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetCampaign200ResponseV2024>;
|
|
48029
48981
|
/**
|
|
48030
48982
|
* Use this API to fetch all reports for a certification campaign by campaign ID.
|
|
48031
48983
|
* @summary Get Campaign Reports
|
|
@@ -48591,7 +49543,7 @@ export declare class CertificationCampaignsV2024Api extends BaseAPI {
|
|
|
48591
49543
|
* @throws {RequiredError}
|
|
48592
49544
|
* @memberof CertificationCampaignsV2024Api
|
|
48593
49545
|
*/
|
|
48594
|
-
getCampaign(requestParameters: CertificationCampaignsV2024ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<
|
|
49546
|
+
getCampaign(requestParameters: CertificationCampaignsV2024ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<GetCampaign200ResponseV2024, any>>;
|
|
48595
49547
|
/**
|
|
48596
49548
|
* Use this API to fetch all reports for a certification campaign by campaign ID.
|
|
48597
49549
|
* @summary Get Campaign Reports
|
|
@@ -55468,6 +56420,13 @@ export declare const GlobalTenantSecuritySettingsV2024ApiAxiosParamCreator: (con
|
|
|
55468
56420
|
* @throws {RequiredError}
|
|
55469
56421
|
*/
|
|
55470
56422
|
createAuthOrgNetworkConfig: (networkConfigurationV2024: NetworkConfigurationV2024, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56423
|
+
/**
|
|
56424
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
56425
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
56426
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56427
|
+
* @throws {RequiredError}
|
|
56428
|
+
*/
|
|
56429
|
+
getAuthOrgLockoutConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
55471
56430
|
/**
|
|
55472
56431
|
* This API returns the details of an org\'s network auth configuration.
|
|
55473
56432
|
* @summary Get security network configuration.
|
|
@@ -55475,6 +56434,28 @@ export declare const GlobalTenantSecuritySettingsV2024ApiAxiosParamCreator: (con
|
|
|
55475
56434
|
* @throws {RequiredError}
|
|
55476
56435
|
*/
|
|
55477
56436
|
getAuthOrgNetworkConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56437
|
+
/**
|
|
56438
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
56439
|
+
* @summary Get Service Provider Configuration.
|
|
56440
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56441
|
+
* @throws {RequiredError}
|
|
56442
|
+
*/
|
|
56443
|
+
getAuthOrgServiceProviderConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56444
|
+
/**
|
|
56445
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
56446
|
+
* @summary Get Auth Org Session Configuration.
|
|
56447
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56448
|
+
* @throws {RequiredError}
|
|
56449
|
+
*/
|
|
56450
|
+
getAuthOrgSessionConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56451
|
+
/**
|
|
56452
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
56453
|
+
* @summary Update Auth Org Lockout Configuration
|
|
56454
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
56455
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56456
|
+
* @throws {RequiredError}
|
|
56457
|
+
*/
|
|
56458
|
+
patchAuthOrgLockoutConfig: (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
55478
56459
|
/**
|
|
55479
56460
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
55480
56461
|
* @summary Update security network configuration.
|
|
@@ -55483,6 +56464,22 @@ export declare const GlobalTenantSecuritySettingsV2024ApiAxiosParamCreator: (con
|
|
|
55483
56464
|
* @throws {RequiredError}
|
|
55484
56465
|
*/
|
|
55485
56466
|
patchAuthOrgNetworkConfig: (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56467
|
+
/**
|
|
56468
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
56469
|
+
* @summary Update Service Provider Configuration
|
|
56470
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
56471
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56472
|
+
* @throws {RequiredError}
|
|
56473
|
+
*/
|
|
56474
|
+
patchAuthOrgServiceProviderConfig: (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56475
|
+
/**
|
|
56476
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
56477
|
+
* @summary Update Auth Org Session Configuration
|
|
56478
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
56479
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56480
|
+
* @throws {RequiredError}
|
|
56481
|
+
*/
|
|
56482
|
+
patchAuthOrgSessionConfig: (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
55486
56483
|
};
|
|
55487
56484
|
/**
|
|
55488
56485
|
* GlobalTenantSecuritySettingsV2024Api - functional programming interface
|
|
@@ -55497,6 +56494,13 @@ export declare const GlobalTenantSecuritySettingsV2024ApiFp: (configuration?: Co
|
|
|
55497
56494
|
* @throws {RequiredError}
|
|
55498
56495
|
*/
|
|
55499
56496
|
createAuthOrgNetworkConfig(networkConfigurationV2024: NetworkConfigurationV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<NetworkConfigurationV2024>>;
|
|
56497
|
+
/**
|
|
56498
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
56499
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
56500
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56501
|
+
* @throws {RequiredError}
|
|
56502
|
+
*/
|
|
56503
|
+
getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2024>>;
|
|
55500
56504
|
/**
|
|
55501
56505
|
* This API returns the details of an org\'s network auth configuration.
|
|
55502
56506
|
* @summary Get security network configuration.
|
|
@@ -55504,6 +56508,28 @@ export declare const GlobalTenantSecuritySettingsV2024ApiFp: (configuration?: Co
|
|
|
55504
56508
|
* @throws {RequiredError}
|
|
55505
56509
|
*/
|
|
55506
56510
|
getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<NetworkConfigurationV2024>>;
|
|
56511
|
+
/**
|
|
56512
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
56513
|
+
* @summary Get Service Provider Configuration.
|
|
56514
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56515
|
+
* @throws {RequiredError}
|
|
56516
|
+
*/
|
|
56517
|
+
getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2024>>;
|
|
56518
|
+
/**
|
|
56519
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
56520
|
+
* @summary Get Auth Org Session Configuration.
|
|
56521
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56522
|
+
* @throws {RequiredError}
|
|
56523
|
+
*/
|
|
56524
|
+
getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2024>>;
|
|
56525
|
+
/**
|
|
56526
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
56527
|
+
* @summary Update Auth Org Lockout Configuration
|
|
56528
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
56529
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56530
|
+
* @throws {RequiredError}
|
|
56531
|
+
*/
|
|
56532
|
+
patchAuthOrgLockoutConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2024>>;
|
|
55507
56533
|
/**
|
|
55508
56534
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
55509
56535
|
* @summary Update security network configuration.
|
|
@@ -55512,6 +56538,22 @@ export declare const GlobalTenantSecuritySettingsV2024ApiFp: (configuration?: Co
|
|
|
55512
56538
|
* @throws {RequiredError}
|
|
55513
56539
|
*/
|
|
55514
56540
|
patchAuthOrgNetworkConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<NetworkConfigurationV2024>>;
|
|
56541
|
+
/**
|
|
56542
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
56543
|
+
* @summary Update Service Provider Configuration
|
|
56544
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
56545
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56546
|
+
* @throws {RequiredError}
|
|
56547
|
+
*/
|
|
56548
|
+
patchAuthOrgServiceProviderConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2024>>;
|
|
56549
|
+
/**
|
|
56550
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
56551
|
+
* @summary Update Auth Org Session Configuration
|
|
56552
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
56553
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56554
|
+
* @throws {RequiredError}
|
|
56555
|
+
*/
|
|
56556
|
+
patchAuthOrgSessionConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2024>>;
|
|
55515
56557
|
};
|
|
55516
56558
|
/**
|
|
55517
56559
|
* GlobalTenantSecuritySettingsV2024Api - factory interface
|
|
@@ -55526,6 +56568,13 @@ export declare const GlobalTenantSecuritySettingsV2024ApiFactory: (configuration
|
|
|
55526
56568
|
* @throws {RequiredError}
|
|
55527
56569
|
*/
|
|
55528
56570
|
createAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiCreateAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2024>;
|
|
56571
|
+
/**
|
|
56572
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
56573
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
56574
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56575
|
+
* @throws {RequiredError}
|
|
56576
|
+
*/
|
|
56577
|
+
getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2024>;
|
|
55529
56578
|
/**
|
|
55530
56579
|
* This API returns the details of an org\'s network auth configuration.
|
|
55531
56580
|
* @summary Get security network configuration.
|
|
@@ -55533,6 +56582,28 @@ export declare const GlobalTenantSecuritySettingsV2024ApiFactory: (configuration
|
|
|
55533
56582
|
* @throws {RequiredError}
|
|
55534
56583
|
*/
|
|
55535
56584
|
getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2024>;
|
|
56585
|
+
/**
|
|
56586
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
56587
|
+
* @summary Get Service Provider Configuration.
|
|
56588
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56589
|
+
* @throws {RequiredError}
|
|
56590
|
+
*/
|
|
56591
|
+
getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2024>;
|
|
56592
|
+
/**
|
|
56593
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
56594
|
+
* @summary Get Auth Org Session Configuration.
|
|
56595
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56596
|
+
* @throws {RequiredError}
|
|
56597
|
+
*/
|
|
56598
|
+
getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2024>;
|
|
56599
|
+
/**
|
|
56600
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
56601
|
+
* @summary Update Auth Org Lockout Configuration
|
|
56602
|
+
* @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
|
|
56603
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56604
|
+
* @throws {RequiredError}
|
|
56605
|
+
*/
|
|
56606
|
+
patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2024>;
|
|
55536
56607
|
/**
|
|
55537
56608
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
55538
56609
|
* @summary Update security network configuration.
|
|
@@ -55541,6 +56612,22 @@ export declare const GlobalTenantSecuritySettingsV2024ApiFactory: (configuration
|
|
|
55541
56612
|
* @throws {RequiredError}
|
|
55542
56613
|
*/
|
|
55543
56614
|
patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2024>;
|
|
56615
|
+
/**
|
|
56616
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
56617
|
+
* @summary Update Service Provider Configuration
|
|
56618
|
+
* @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
|
|
56619
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56620
|
+
* @throws {RequiredError}
|
|
56621
|
+
*/
|
|
56622
|
+
patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2024>;
|
|
56623
|
+
/**
|
|
56624
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
56625
|
+
* @summary Update Auth Org Session Configuration
|
|
56626
|
+
* @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
|
|
56627
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56628
|
+
* @throws {RequiredError}
|
|
56629
|
+
*/
|
|
56630
|
+
patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2024>;
|
|
55544
56631
|
};
|
|
55545
56632
|
/**
|
|
55546
56633
|
* Request parameters for createAuthOrgNetworkConfig operation in GlobalTenantSecuritySettingsV2024Api.
|
|
@@ -55555,6 +56642,19 @@ export interface GlobalTenantSecuritySettingsV2024ApiCreateAuthOrgNetworkConfigR
|
|
|
55555
56642
|
*/
|
|
55556
56643
|
readonly networkConfigurationV2024: NetworkConfigurationV2024;
|
|
55557
56644
|
}
|
|
56645
|
+
/**
|
|
56646
|
+
* Request parameters for patchAuthOrgLockoutConfig operation in GlobalTenantSecuritySettingsV2024Api.
|
|
56647
|
+
* @export
|
|
56648
|
+
* @interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest
|
|
56649
|
+
*/
|
|
56650
|
+
export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest {
|
|
56651
|
+
/**
|
|
56652
|
+
* A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
56653
|
+
* @type {Array<JsonPatchOperationV2024>}
|
|
56654
|
+
* @memberof GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfig
|
|
56655
|
+
*/
|
|
56656
|
+
readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>;
|
|
56657
|
+
}
|
|
55558
56658
|
/**
|
|
55559
56659
|
* Request parameters for patchAuthOrgNetworkConfig operation in GlobalTenantSecuritySettingsV2024Api.
|
|
55560
56660
|
* @export
|
|
@@ -55568,6 +56668,32 @@ export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgNetworkConfigRe
|
|
|
55568
56668
|
*/
|
|
55569
56669
|
readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>;
|
|
55570
56670
|
}
|
|
56671
|
+
/**
|
|
56672
|
+
* Request parameters for patchAuthOrgServiceProviderConfig operation in GlobalTenantSecuritySettingsV2024Api.
|
|
56673
|
+
* @export
|
|
56674
|
+
* @interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest
|
|
56675
|
+
*/
|
|
56676
|
+
export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest {
|
|
56677
|
+
/**
|
|
56678
|
+
* A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
56679
|
+
* @type {Array<JsonPatchOperationV2024>}
|
|
56680
|
+
* @memberof GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfig
|
|
56681
|
+
*/
|
|
56682
|
+
readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>;
|
|
56683
|
+
}
|
|
56684
|
+
/**
|
|
56685
|
+
* Request parameters for patchAuthOrgSessionConfig operation in GlobalTenantSecuritySettingsV2024Api.
|
|
56686
|
+
* @export
|
|
56687
|
+
* @interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest
|
|
56688
|
+
*/
|
|
56689
|
+
export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest {
|
|
56690
|
+
/**
|
|
56691
|
+
* A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
56692
|
+
* @type {Array<JsonPatchOperationV2024>}
|
|
56693
|
+
* @memberof GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfig
|
|
56694
|
+
*/
|
|
56695
|
+
readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>;
|
|
56696
|
+
}
|
|
55571
56697
|
/**
|
|
55572
56698
|
* GlobalTenantSecuritySettingsV2024Api - object-oriented interface
|
|
55573
56699
|
* @export
|
|
@@ -55584,6 +56710,14 @@ export declare class GlobalTenantSecuritySettingsV2024Api extends BaseAPI {
|
|
|
55584
56710
|
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
55585
56711
|
*/
|
|
55586
56712
|
createAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiCreateAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<NetworkConfigurationV2024, any>>;
|
|
56713
|
+
/**
|
|
56714
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
56715
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
56716
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56717
|
+
* @throws {RequiredError}
|
|
56718
|
+
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
56719
|
+
*/
|
|
56720
|
+
getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<LockoutConfigurationV2024, any>>;
|
|
55587
56721
|
/**
|
|
55588
56722
|
* This API returns the details of an org\'s network auth configuration.
|
|
55589
56723
|
* @summary Get security network configuration.
|
|
@@ -55592,6 +56726,31 @@ export declare class GlobalTenantSecuritySettingsV2024Api extends BaseAPI {
|
|
|
55592
56726
|
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
55593
56727
|
*/
|
|
55594
56728
|
getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<NetworkConfigurationV2024, any>>;
|
|
56729
|
+
/**
|
|
56730
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
56731
|
+
* @summary Get Service Provider Configuration.
|
|
56732
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56733
|
+
* @throws {RequiredError}
|
|
56734
|
+
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
56735
|
+
*/
|
|
56736
|
+
getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ServiceProviderConfigurationV2024, any>>;
|
|
56737
|
+
/**
|
|
56738
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
56739
|
+
* @summary Get Auth Org Session Configuration.
|
|
56740
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56741
|
+
* @throws {RequiredError}
|
|
56742
|
+
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
56743
|
+
*/
|
|
56744
|
+
getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SessionConfigurationV2024, any>>;
|
|
56745
|
+
/**
|
|
56746
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
56747
|
+
* @summary Update Auth Org Lockout Configuration
|
|
56748
|
+
* @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
|
|
56749
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56750
|
+
* @throws {RequiredError}
|
|
56751
|
+
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
56752
|
+
*/
|
|
56753
|
+
patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<LockoutConfigurationV2024, any>>;
|
|
55595
56754
|
/**
|
|
55596
56755
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
55597
56756
|
* @summary Update security network configuration.
|
|
@@ -55601,6 +56760,24 @@ export declare class GlobalTenantSecuritySettingsV2024Api extends BaseAPI {
|
|
|
55601
56760
|
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
55602
56761
|
*/
|
|
55603
56762
|
patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<NetworkConfigurationV2024, any>>;
|
|
56763
|
+
/**
|
|
56764
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
56765
|
+
* @summary Update Service Provider Configuration
|
|
56766
|
+
* @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
|
|
56767
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56768
|
+
* @throws {RequiredError}
|
|
56769
|
+
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
56770
|
+
*/
|
|
56771
|
+
patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ServiceProviderConfigurationV2024, any>>;
|
|
56772
|
+
/**
|
|
56773
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
56774
|
+
* @summary Update Auth Org Session Configuration
|
|
56775
|
+
* @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
|
|
56776
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56777
|
+
* @throws {RequiredError}
|
|
56778
|
+
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
56779
|
+
*/
|
|
56780
|
+
patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SessionConfigurationV2024, any>>;
|
|
55604
56781
|
}
|
|
55605
56782
|
/**
|
|
55606
56783
|
* GovernanceGroupsV2024Api - axios parameter creator
|