sailpoint-api-client 1.5.0 → 1.6.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/beta/README.md +2 -2
- package/beta/api.ts +563 -174
- package/beta/common.ts +2 -2
- package/beta/package.json +1 -1
- package/dist/beta/api.d.ts +487 -129
- package/dist/beta/api.js +177 -114
- package/dist/beta/api.js.map +1 -1
- package/dist/beta/common.js +1 -1
- package/dist/v2024/api.d.ts +1200 -35
- package/dist/v2024/api.js +761 -36
- package/dist/v2024/api.js.map +1 -1
- package/dist/v2024/common.js +1 -1
- package/dist/v2025/api.d.ts +1468 -45
- package/dist/v2025/api.js +886 -53
- package/dist/v2025/api.js.map +1 -1
- package/dist/v2025/common.js +1 -1
- package/dist/v3/api.d.ts +611 -130
- package/dist/v3/api.js +155 -86
- package/dist/v3/api.js.map +1 -1
- package/dist/v3/common.js +1 -1
- package/package.json +1 -1
- package/v2024/README.md +2 -2
- package/v2024/api.ts +1544 -42
- package/v2024/common.ts +2 -2
- package/v2024/package.json +1 -1
- package/v2025/README.md +2 -2
- package/v2025/api.ts +1934 -124
- package/v2025/common.ts +2 -2
- package/v2025/package.json +1 -1
- package/v3/README.md +2 -2
- package/v3/api.ts +658 -143
- package/v3/common.ts +2 -2
- package/v3/package.json +1 -1
package/dist/v2025/api.d.ts
CHANGED
|
@@ -2156,6 +2156,63 @@ export interface AccessRequestDynamicApproverV2025 {
|
|
|
2156
2156
|
*/
|
|
2157
2157
|
'requestedBy': AccessItemRequesterDtoV2025;
|
|
2158
2158
|
}
|
|
2159
|
+
/**
|
|
2160
|
+
*
|
|
2161
|
+
* @export
|
|
2162
|
+
* @interface AccessRequestItem1V2025
|
|
2163
|
+
*/
|
|
2164
|
+
export interface AccessRequestItem1V2025 {
|
|
2165
|
+
/**
|
|
2166
|
+
* The type of the item being requested.
|
|
2167
|
+
* @type {string}
|
|
2168
|
+
* @memberof AccessRequestItem1V2025
|
|
2169
|
+
*/
|
|
2170
|
+
'type': AccessRequestItem1V2025TypeV2025;
|
|
2171
|
+
/**
|
|
2172
|
+
* ID of Role, Access Profile or Entitlement being requested.
|
|
2173
|
+
* @type {string}
|
|
2174
|
+
* @memberof AccessRequestItem1V2025
|
|
2175
|
+
*/
|
|
2176
|
+
'id': string;
|
|
2177
|
+
/**
|
|
2178
|
+
* Comment provided by requester. * Comment is required when the request is of type Revoke Access.
|
|
2179
|
+
* @type {string}
|
|
2180
|
+
* @memberof AccessRequestItem1V2025
|
|
2181
|
+
*/
|
|
2182
|
+
'comment'?: string;
|
|
2183
|
+
/**
|
|
2184
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
|
|
2185
|
+
* @type {{ [key: string]: string; }}
|
|
2186
|
+
* @memberof AccessRequestItem1V2025
|
|
2187
|
+
*/
|
|
2188
|
+
'clientMetadata'?: {
|
|
2189
|
+
[key: string]: string;
|
|
2190
|
+
};
|
|
2191
|
+
/**
|
|
2192
|
+
* The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
|
|
2193
|
+
* @type {string}
|
|
2194
|
+
* @memberof AccessRequestItem1V2025
|
|
2195
|
+
*/
|
|
2196
|
+
'removeDate'?: string;
|
|
2197
|
+
/**
|
|
2198
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
2199
|
+
* @type {string}
|
|
2200
|
+
* @memberof AccessRequestItem1V2025
|
|
2201
|
+
*/
|
|
2202
|
+
'assignmentId'?: string | null;
|
|
2203
|
+
/**
|
|
2204
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
2205
|
+
* @type {string}
|
|
2206
|
+
* @memberof AccessRequestItem1V2025
|
|
2207
|
+
*/
|
|
2208
|
+
'nativeIdentity'?: string | null;
|
|
2209
|
+
}
|
|
2210
|
+
export declare const AccessRequestItem1V2025TypeV2025: {
|
|
2211
|
+
readonly AccessProfile: "ACCESS_PROFILE";
|
|
2212
|
+
readonly Role: "ROLE";
|
|
2213
|
+
readonly Entitlement: "ENTITLEMENT";
|
|
2214
|
+
};
|
|
2215
|
+
export type AccessRequestItem1V2025TypeV2025 = typeof AccessRequestItem1V2025TypeV2025[keyof typeof AccessRequestItem1V2025TypeV2025];
|
|
2159
2216
|
/**
|
|
2160
2217
|
*
|
|
2161
2218
|
* @export
|
|
@@ -2904,6 +2961,12 @@ export interface AccessRequestV2025 {
|
|
|
2904
2961
|
'clientMetadata'?: {
|
|
2905
2962
|
[key: string]: string;
|
|
2906
2963
|
};
|
|
2964
|
+
/**
|
|
2965
|
+
* Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
|
|
2966
|
+
* @type {Array<RequestedForDtoRefV2025>}
|
|
2967
|
+
* @memberof AccessRequestV2025
|
|
2968
|
+
*/
|
|
2969
|
+
'requestedForWithRequestedItems'?: Array<RequestedForDtoRefV2025> | null;
|
|
2907
2970
|
}
|
|
2908
2971
|
/**
|
|
2909
2972
|
*
|
|
@@ -4428,6 +4491,62 @@ export interface AccountInfoDtoV2025 {
|
|
|
4428
4491
|
*/
|
|
4429
4492
|
'uuid'?: string;
|
|
4430
4493
|
}
|
|
4494
|
+
/**
|
|
4495
|
+
*
|
|
4496
|
+
* @export
|
|
4497
|
+
* @interface AccountInfoRefV2025
|
|
4498
|
+
*/
|
|
4499
|
+
export interface AccountInfoRefV2025 {
|
|
4500
|
+
/**
|
|
4501
|
+
* The uuid for the account, available under the \'objectguid\' attribute
|
|
4502
|
+
* @type {string}
|
|
4503
|
+
* @memberof AccountInfoRefV2025
|
|
4504
|
+
*/
|
|
4505
|
+
'uuid'?: string;
|
|
4506
|
+
/**
|
|
4507
|
+
* The \'distinguishedName\' attribute for the account
|
|
4508
|
+
* @type {string}
|
|
4509
|
+
* @memberof AccountInfoRefV2025
|
|
4510
|
+
*/
|
|
4511
|
+
'nativeIdentity'?: string;
|
|
4512
|
+
/**
|
|
4513
|
+
*
|
|
4514
|
+
* @type {DtoTypeV2025}
|
|
4515
|
+
* @memberof AccountInfoRefV2025
|
|
4516
|
+
*/
|
|
4517
|
+
'type'?: DtoTypeV2025;
|
|
4518
|
+
/**
|
|
4519
|
+
* The account id
|
|
4520
|
+
* @type {string}
|
|
4521
|
+
* @memberof AccountInfoRefV2025
|
|
4522
|
+
*/
|
|
4523
|
+
'id'?: string;
|
|
4524
|
+
/**
|
|
4525
|
+
* The account display name
|
|
4526
|
+
* @type {string}
|
|
4527
|
+
* @memberof AccountInfoRefV2025
|
|
4528
|
+
*/
|
|
4529
|
+
'name'?: string;
|
|
4530
|
+
}
|
|
4531
|
+
/**
|
|
4532
|
+
*
|
|
4533
|
+
* @export
|
|
4534
|
+
* @interface AccountItemRefV2025
|
|
4535
|
+
*/
|
|
4536
|
+
export interface AccountItemRefV2025 {
|
|
4537
|
+
/**
|
|
4538
|
+
* The uuid for the account, available under the \'objectguid\' attribute
|
|
4539
|
+
* @type {string}
|
|
4540
|
+
* @memberof AccountItemRefV2025
|
|
4541
|
+
*/
|
|
4542
|
+
'accountUuid'?: string | null;
|
|
4543
|
+
/**
|
|
4544
|
+
* The \'distinguishedName\' attribute for the account
|
|
4545
|
+
* @type {string}
|
|
4546
|
+
* @memberof AccountItemRefV2025
|
|
4547
|
+
*/
|
|
4548
|
+
'nativeIdentity'?: string;
|
|
4549
|
+
}
|
|
4431
4550
|
/**
|
|
4432
4551
|
* If an account activity item is associated with an access request, captures details of that request.
|
|
4433
4552
|
* @export
|
|
@@ -5191,6 +5310,52 @@ export interface AccountsExportReportArgumentsV2025 {
|
|
|
5191
5310
|
*/
|
|
5192
5311
|
'sourceName': string;
|
|
5193
5312
|
}
|
|
5313
|
+
/**
|
|
5314
|
+
*
|
|
5315
|
+
* @export
|
|
5316
|
+
* @interface AccountsSelectionRequestV2025
|
|
5317
|
+
*/
|
|
5318
|
+
export interface AccountsSelectionRequestV2025 {
|
|
5319
|
+
/**
|
|
5320
|
+
* A list of Identity IDs for whom the Access is requested.
|
|
5321
|
+
* @type {Array<string>}
|
|
5322
|
+
* @memberof AccountsSelectionRequestV2025
|
|
5323
|
+
*/
|
|
5324
|
+
'requestedFor': Array<string>;
|
|
5325
|
+
/**
|
|
5326
|
+
*
|
|
5327
|
+
* @type {AccessRequestTypeV2025}
|
|
5328
|
+
* @memberof AccountsSelectionRequestV2025
|
|
5329
|
+
*/
|
|
5330
|
+
'requestType'?: AccessRequestTypeV2025 | null;
|
|
5331
|
+
/**
|
|
5332
|
+
*
|
|
5333
|
+
* @type {Array<AccessRequestItem1V2025>}
|
|
5334
|
+
* @memberof AccountsSelectionRequestV2025
|
|
5335
|
+
*/
|
|
5336
|
+
'requestedItems': Array<AccessRequestItem1V2025>;
|
|
5337
|
+
/**
|
|
5338
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities.
|
|
5339
|
+
* @type {{ [key: string]: string; }}
|
|
5340
|
+
* @memberof AccountsSelectionRequestV2025
|
|
5341
|
+
*/
|
|
5342
|
+
'clientMetadata'?: {
|
|
5343
|
+
[key: string]: string;
|
|
5344
|
+
};
|
|
5345
|
+
}
|
|
5346
|
+
/**
|
|
5347
|
+
*
|
|
5348
|
+
* @export
|
|
5349
|
+
* @interface AccountsSelectionResponseV2025
|
|
5350
|
+
*/
|
|
5351
|
+
export interface AccountsSelectionResponseV2025 {
|
|
5352
|
+
/**
|
|
5353
|
+
* A list of available account selections per identity in the request, for all the requested items
|
|
5354
|
+
* @type {Array<IdentityAccountSelectionsV2025>}
|
|
5355
|
+
* @memberof AccountsSelectionResponseV2025
|
|
5356
|
+
*/
|
|
5357
|
+
'identities'?: Array<IdentityAccountSelectionsV2025>;
|
|
5358
|
+
}
|
|
5194
5359
|
/**
|
|
5195
5360
|
*
|
|
5196
5361
|
* @export
|
|
@@ -6513,6 +6678,7 @@ export declare const AttributeDefinitionTypeV2025: {
|
|
|
6513
6678
|
readonly Long: "LONG";
|
|
6514
6679
|
readonly Int: "INT";
|
|
6515
6680
|
readonly Boolean: "BOOLEAN";
|
|
6681
|
+
readonly Date: "DATE";
|
|
6516
6682
|
};
|
|
6517
6683
|
export type AttributeDefinitionTypeV2025 = typeof AttributeDefinitionTypeV2025[keyof typeof AttributeDefinitionTypeV2025];
|
|
6518
6684
|
/**
|
|
@@ -16039,6 +16205,30 @@ export interface FeatureValueDtoV2025 {
|
|
|
16039
16205
|
*/
|
|
16040
16206
|
'denominator'?: number;
|
|
16041
16207
|
}
|
|
16208
|
+
/**
|
|
16209
|
+
*
|
|
16210
|
+
* @export
|
|
16211
|
+
* @interface FederationProtocolDetailsV2025
|
|
16212
|
+
*/
|
|
16213
|
+
export interface FederationProtocolDetailsV2025 {
|
|
16214
|
+
/**
|
|
16215
|
+
* Federation protocol role
|
|
16216
|
+
* @type {string}
|
|
16217
|
+
* @memberof FederationProtocolDetailsV2025
|
|
16218
|
+
*/
|
|
16219
|
+
'role'?: FederationProtocolDetailsV2025RoleV2025;
|
|
16220
|
+
/**
|
|
16221
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
16222
|
+
* @type {string}
|
|
16223
|
+
* @memberof FederationProtocolDetailsV2025
|
|
16224
|
+
*/
|
|
16225
|
+
'entityId'?: string;
|
|
16226
|
+
}
|
|
16227
|
+
export declare const FederationProtocolDetailsV2025RoleV2025: {
|
|
16228
|
+
readonly SamlIdp: "SAML_IDP";
|
|
16229
|
+
readonly SamlSp: "SAML_SP";
|
|
16230
|
+
};
|
|
16231
|
+
export type FederationProtocolDetailsV2025RoleV2025 = typeof FederationProtocolDetailsV2025RoleV2025[keyof typeof FederationProtocolDetailsV2025RoleV2025];
|
|
16042
16232
|
/**
|
|
16043
16233
|
*
|
|
16044
16234
|
* @export
|
|
@@ -17229,6 +17419,182 @@ export declare const GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequ
|
|
|
17229
17419
|
readonly NoDecisions: "NO_DECISIONS";
|
|
17230
17420
|
};
|
|
17231
17421
|
export type GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025 = typeof GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025[keyof typeof GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025];
|
|
17422
|
+
/**
|
|
17423
|
+
*
|
|
17424
|
+
* @export
|
|
17425
|
+
* @interface GetCampaign200ResponseV2025
|
|
17426
|
+
*/
|
|
17427
|
+
export interface GetCampaign200ResponseV2025 {
|
|
17428
|
+
/**
|
|
17429
|
+
* Id of the campaign
|
|
17430
|
+
* @type {string}
|
|
17431
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17432
|
+
*/
|
|
17433
|
+
'id'?: string | null;
|
|
17434
|
+
/**
|
|
17435
|
+
* The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
17436
|
+
* @type {string}
|
|
17437
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17438
|
+
*/
|
|
17439
|
+
'name': string;
|
|
17440
|
+
/**
|
|
17441
|
+
* The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
17442
|
+
* @type {string}
|
|
17443
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17444
|
+
*/
|
|
17445
|
+
'description': string | null;
|
|
17446
|
+
/**
|
|
17447
|
+
* The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
|
|
17448
|
+
* @type {string}
|
|
17449
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17450
|
+
*/
|
|
17451
|
+
'deadline'?: string | null;
|
|
17452
|
+
/**
|
|
17453
|
+
* The type of campaign. Could be extended in the future.
|
|
17454
|
+
* @type {string}
|
|
17455
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17456
|
+
*/
|
|
17457
|
+
'type': GetCampaign200ResponseV2025TypeV2025;
|
|
17458
|
+
/**
|
|
17459
|
+
* Enables email notification for this campaign
|
|
17460
|
+
* @type {boolean}
|
|
17461
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17462
|
+
*/
|
|
17463
|
+
'emailNotificationEnabled'?: boolean;
|
|
17464
|
+
/**
|
|
17465
|
+
* Allows auto revoke for this campaign
|
|
17466
|
+
* @type {boolean}
|
|
17467
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17468
|
+
*/
|
|
17469
|
+
'autoRevokeAllowed'?: boolean;
|
|
17470
|
+
/**
|
|
17471
|
+
* Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
|
|
17472
|
+
* @type {boolean}
|
|
17473
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17474
|
+
*/
|
|
17475
|
+
'recommendationsEnabled'?: boolean;
|
|
17476
|
+
/**
|
|
17477
|
+
* The campaign\'s current status.
|
|
17478
|
+
* @type {string}
|
|
17479
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17480
|
+
*/
|
|
17481
|
+
'status'?: GetCampaign200ResponseV2025StatusV2025 | null;
|
|
17482
|
+
/**
|
|
17483
|
+
* The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
|
|
17484
|
+
* @type {string}
|
|
17485
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17486
|
+
*/
|
|
17487
|
+
'correlatedStatus'?: GetCampaign200ResponseV2025CorrelatedStatusV2025;
|
|
17488
|
+
/**
|
|
17489
|
+
* Created time of the campaign
|
|
17490
|
+
* @type {string}
|
|
17491
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17492
|
+
*/
|
|
17493
|
+
'created'?: string | null;
|
|
17494
|
+
/**
|
|
17495
|
+
* The total number of certifications in this campaign.
|
|
17496
|
+
* @type {number}
|
|
17497
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17498
|
+
*/
|
|
17499
|
+
'totalCertifications'?: number | null;
|
|
17500
|
+
/**
|
|
17501
|
+
* The number of completed certifications in this campaign.
|
|
17502
|
+
* @type {number}
|
|
17503
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17504
|
+
*/
|
|
17505
|
+
'completedCertifications'?: number | null;
|
|
17506
|
+
/**
|
|
17507
|
+
* A list of errors and warnings that have accumulated.
|
|
17508
|
+
* @type {Array<CampaignAlertV2025>}
|
|
17509
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17510
|
+
*/
|
|
17511
|
+
'alerts'?: Array<CampaignAlertV2025> | null;
|
|
17512
|
+
/**
|
|
17513
|
+
* Modified time of the campaign
|
|
17514
|
+
* @type {string}
|
|
17515
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17516
|
+
*/
|
|
17517
|
+
'modified'?: string | null;
|
|
17518
|
+
/**
|
|
17519
|
+
*
|
|
17520
|
+
* @type {CampaignAllOfFilterV2025}
|
|
17521
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17522
|
+
*/
|
|
17523
|
+
'filter'?: CampaignAllOfFilterV2025 | null;
|
|
17524
|
+
/**
|
|
17525
|
+
* Determines if comments on sunset date changes are required.
|
|
17526
|
+
* @type {boolean}
|
|
17527
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17528
|
+
*/
|
|
17529
|
+
'sunsetCommentsRequired'?: boolean;
|
|
17530
|
+
/**
|
|
17531
|
+
*
|
|
17532
|
+
* @type {CampaignAllOfSourceOwnerCampaignInfoV2025}
|
|
17533
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17534
|
+
*/
|
|
17535
|
+
'sourceOwnerCampaignInfo'?: CampaignAllOfSourceOwnerCampaignInfoV2025 | null;
|
|
17536
|
+
/**
|
|
17537
|
+
*
|
|
17538
|
+
* @type {CampaignAllOfSearchCampaignInfoV2025}
|
|
17539
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17540
|
+
*/
|
|
17541
|
+
'searchCampaignInfo'?: CampaignAllOfSearchCampaignInfoV2025 | null;
|
|
17542
|
+
/**
|
|
17543
|
+
*
|
|
17544
|
+
* @type {CampaignAllOfRoleCompositionCampaignInfoV2025}
|
|
17545
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17546
|
+
*/
|
|
17547
|
+
'roleCompositionCampaignInfo'?: CampaignAllOfRoleCompositionCampaignInfoV2025 | null;
|
|
17548
|
+
/**
|
|
17549
|
+
*
|
|
17550
|
+
* @type {CampaignAllOfMachineAccountCampaignInfoV2025}
|
|
17551
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17552
|
+
*/
|
|
17553
|
+
'machineAccountCampaignInfo'?: CampaignAllOfMachineAccountCampaignInfoV2025 | null;
|
|
17554
|
+
/**
|
|
17555
|
+
* A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
|
|
17556
|
+
* @type {Array<CampaignAllOfSourcesWithOrphanEntitlementsV2025>}
|
|
17557
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17558
|
+
*/
|
|
17559
|
+
'sourcesWithOrphanEntitlements'?: Array<CampaignAllOfSourcesWithOrphanEntitlementsV2025> | null;
|
|
17560
|
+
/**
|
|
17561
|
+
* Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
|
|
17562
|
+
* @type {string}
|
|
17563
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17564
|
+
*/
|
|
17565
|
+
'mandatoryCommentRequirement'?: GetCampaign200ResponseV2025MandatoryCommentRequirementV2025;
|
|
17566
|
+
}
|
|
17567
|
+
export declare const GetCampaign200ResponseV2025TypeV2025: {
|
|
17568
|
+
readonly Manager: "MANAGER";
|
|
17569
|
+
readonly SourceOwner: "SOURCE_OWNER";
|
|
17570
|
+
readonly Search: "SEARCH";
|
|
17571
|
+
readonly RoleComposition: "ROLE_COMPOSITION";
|
|
17572
|
+
readonly MachineAccount: "MACHINE_ACCOUNT";
|
|
17573
|
+
};
|
|
17574
|
+
export type GetCampaign200ResponseV2025TypeV2025 = typeof GetCampaign200ResponseV2025TypeV2025[keyof typeof GetCampaign200ResponseV2025TypeV2025];
|
|
17575
|
+
export declare const GetCampaign200ResponseV2025StatusV2025: {
|
|
17576
|
+
readonly Pending: "PENDING";
|
|
17577
|
+
readonly Staged: "STAGED";
|
|
17578
|
+
readonly Canceling: "CANCELING";
|
|
17579
|
+
readonly Activating: "ACTIVATING";
|
|
17580
|
+
readonly Active: "ACTIVE";
|
|
17581
|
+
readonly Completing: "COMPLETING";
|
|
17582
|
+
readonly Completed: "COMPLETED";
|
|
17583
|
+
readonly Error: "ERROR";
|
|
17584
|
+
readonly Archived: "ARCHIVED";
|
|
17585
|
+
};
|
|
17586
|
+
export type GetCampaign200ResponseV2025StatusV2025 = typeof GetCampaign200ResponseV2025StatusV2025[keyof typeof GetCampaign200ResponseV2025StatusV2025];
|
|
17587
|
+
export declare const GetCampaign200ResponseV2025CorrelatedStatusV2025: {
|
|
17588
|
+
readonly Correlated: "CORRELATED";
|
|
17589
|
+
readonly Uncorrelated: "UNCORRELATED";
|
|
17590
|
+
};
|
|
17591
|
+
export type GetCampaign200ResponseV2025CorrelatedStatusV2025 = typeof GetCampaign200ResponseV2025CorrelatedStatusV2025[keyof typeof GetCampaign200ResponseV2025CorrelatedStatusV2025];
|
|
17592
|
+
export declare const GetCampaign200ResponseV2025MandatoryCommentRequirementV2025: {
|
|
17593
|
+
readonly AllDecisions: "ALL_DECISIONS";
|
|
17594
|
+
readonly RevokeOnlyDecisions: "REVOKE_ONLY_DECISIONS";
|
|
17595
|
+
readonly NoDecisions: "NO_DECISIONS";
|
|
17596
|
+
};
|
|
17597
|
+
export type GetCampaign200ResponseV2025MandatoryCommentRequirementV2025 = typeof GetCampaign200ResponseV2025MandatoryCommentRequirementV2025[keyof typeof GetCampaign200ResponseV2025MandatoryCommentRequirementV2025];
|
|
17232
17598
|
/**
|
|
17233
17599
|
* @type GetDiscoveredApplications200ResponseInnerV2025
|
|
17234
17600
|
* @export
|
|
@@ -17790,6 +18156,43 @@ export type IdentityAccessV2025 = {
|
|
|
17790
18156
|
} & AccessProfileEntitlementV2025 | {
|
|
17791
18157
|
type: 'ROLE';
|
|
17792
18158
|
} & AccessProfileRoleV2025;
|
|
18159
|
+
/**
|
|
18160
|
+
*
|
|
18161
|
+
* @export
|
|
18162
|
+
* @interface IdentityAccountSelectionsV2025
|
|
18163
|
+
*/
|
|
18164
|
+
export interface IdentityAccountSelectionsV2025 {
|
|
18165
|
+
/**
|
|
18166
|
+
* Available account selections for the identity, per requested item
|
|
18167
|
+
* @type {Array<RequestedItemAccountSelectionsV2025>}
|
|
18168
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18169
|
+
*/
|
|
18170
|
+
'requestedItems'?: Array<RequestedItemAccountSelectionsV2025>;
|
|
18171
|
+
/**
|
|
18172
|
+
* A boolean indicating whether any account selections will be required for the user to raise an access request
|
|
18173
|
+
* @type {boolean}
|
|
18174
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18175
|
+
*/
|
|
18176
|
+
'accountsSelectionRequired'?: boolean;
|
|
18177
|
+
/**
|
|
18178
|
+
*
|
|
18179
|
+
* @type {DtoTypeV2025}
|
|
18180
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18181
|
+
*/
|
|
18182
|
+
'type'?: DtoTypeV2025;
|
|
18183
|
+
/**
|
|
18184
|
+
* The identity id for the user
|
|
18185
|
+
* @type {string}
|
|
18186
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18187
|
+
*/
|
|
18188
|
+
'id'?: string;
|
|
18189
|
+
/**
|
|
18190
|
+
* The name of the identity
|
|
18191
|
+
* @type {string}
|
|
18192
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18193
|
+
*/
|
|
18194
|
+
'name'?: string;
|
|
18195
|
+
}
|
|
17793
18196
|
/**
|
|
17794
18197
|
*
|
|
17795
18198
|
* @export
|
|
@@ -19073,6 +19476,165 @@ export interface IdentityEntitiesV2025 {
|
|
|
19073
19476
|
*/
|
|
19074
19477
|
'identityEntity'?: IdentityEntitiesIdentityEntityV2025;
|
|
19075
19478
|
}
|
|
19479
|
+
/**
|
|
19480
|
+
*
|
|
19481
|
+
* @export
|
|
19482
|
+
* @interface IdentityEntitlementDetailsAccountTargetV2025
|
|
19483
|
+
*/
|
|
19484
|
+
export interface IdentityEntitlementDetailsAccountTargetV2025 {
|
|
19485
|
+
/**
|
|
19486
|
+
* The id of account
|
|
19487
|
+
* @type {string}
|
|
19488
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19489
|
+
*/
|
|
19490
|
+
'accountId'?: string;
|
|
19491
|
+
/**
|
|
19492
|
+
* The name of account
|
|
19493
|
+
* @type {string}
|
|
19494
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19495
|
+
*/
|
|
19496
|
+
'accountName'?: string;
|
|
19497
|
+
/**
|
|
19498
|
+
* The UUID representation of the account if available
|
|
19499
|
+
* @type {string}
|
|
19500
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19501
|
+
*/
|
|
19502
|
+
'accountUUID'?: string | null;
|
|
19503
|
+
/**
|
|
19504
|
+
* The id of Source
|
|
19505
|
+
* @type {string}
|
|
19506
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19507
|
+
*/
|
|
19508
|
+
'sourceId'?: string;
|
|
19509
|
+
/**
|
|
19510
|
+
* The name of Source
|
|
19511
|
+
* @type {string}
|
|
19512
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19513
|
+
*/
|
|
19514
|
+
'sourceName'?: string;
|
|
19515
|
+
/**
|
|
19516
|
+
* The removal date scheduled for the entitlement on the Identity
|
|
19517
|
+
* @type {string}
|
|
19518
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19519
|
+
*/
|
|
19520
|
+
'removeDate'?: string | null;
|
|
19521
|
+
/**
|
|
19522
|
+
* The assignmentId of the entitlement on the Identity
|
|
19523
|
+
* @type {string}
|
|
19524
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19525
|
+
*/
|
|
19526
|
+
'assignmentId'?: string | null;
|
|
19527
|
+
/**
|
|
19528
|
+
* If the entitlement can be revoked
|
|
19529
|
+
* @type {boolean}
|
|
19530
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
19531
|
+
*/
|
|
19532
|
+
'revocable'?: boolean;
|
|
19533
|
+
}
|
|
19534
|
+
/**
|
|
19535
|
+
*
|
|
19536
|
+
* @export
|
|
19537
|
+
* @interface IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19538
|
+
*/
|
|
19539
|
+
export interface IdentityEntitlementDetailsEntitlementDtoV2025 {
|
|
19540
|
+
/**
|
|
19541
|
+
* The entitlement id
|
|
19542
|
+
* @type {string}
|
|
19543
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19544
|
+
*/
|
|
19545
|
+
'id'?: string;
|
|
19546
|
+
/**
|
|
19547
|
+
* The entitlement name
|
|
19548
|
+
* @type {string}
|
|
19549
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19550
|
+
*/
|
|
19551
|
+
'name'?: string;
|
|
19552
|
+
/**
|
|
19553
|
+
* Time when the entitlement was last modified
|
|
19554
|
+
* @type {string}
|
|
19555
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19556
|
+
*/
|
|
19557
|
+
'created'?: string;
|
|
19558
|
+
/**
|
|
19559
|
+
* Time when the entitlement was last modified
|
|
19560
|
+
* @type {string}
|
|
19561
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19562
|
+
*/
|
|
19563
|
+
'modified'?: string;
|
|
19564
|
+
/**
|
|
19565
|
+
* The description of the entitlement
|
|
19566
|
+
* @type {string}
|
|
19567
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19568
|
+
*/
|
|
19569
|
+
'description'?: string | null;
|
|
19570
|
+
/**
|
|
19571
|
+
* The type of the object, will always be \"ENTITLEMENT\"
|
|
19572
|
+
* @type {string}
|
|
19573
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19574
|
+
*/
|
|
19575
|
+
'type'?: string;
|
|
19576
|
+
/**
|
|
19577
|
+
* The source ID
|
|
19578
|
+
* @type {string}
|
|
19579
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19580
|
+
*/
|
|
19581
|
+
'sourceId'?: string;
|
|
19582
|
+
/**
|
|
19583
|
+
* The source name
|
|
19584
|
+
* @type {string}
|
|
19585
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19586
|
+
*/
|
|
19587
|
+
'sourceName'?: string;
|
|
19588
|
+
/**
|
|
19589
|
+
*
|
|
19590
|
+
* @type {OwnerDtoV2025}
|
|
19591
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19592
|
+
*/
|
|
19593
|
+
'owner'?: OwnerDtoV2025;
|
|
19594
|
+
/**
|
|
19595
|
+
* The value of the entitlement
|
|
19596
|
+
* @type {string}
|
|
19597
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19598
|
+
*/
|
|
19599
|
+
'value'?: string;
|
|
19600
|
+
/**
|
|
19601
|
+
* a list of properties informing the viewer about the entitlement
|
|
19602
|
+
* @type {Array<string>}
|
|
19603
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
19604
|
+
*/
|
|
19605
|
+
'flags'?: Array<string>;
|
|
19606
|
+
}
|
|
19607
|
+
/**
|
|
19608
|
+
*
|
|
19609
|
+
* @export
|
|
19610
|
+
* @interface IdentityEntitlementDetailsV2025
|
|
19611
|
+
*/
|
|
19612
|
+
export interface IdentityEntitlementDetailsV2025 {
|
|
19613
|
+
/**
|
|
19614
|
+
* Id of Identity
|
|
19615
|
+
* @type {string}
|
|
19616
|
+
* @memberof IdentityEntitlementDetailsV2025
|
|
19617
|
+
*/
|
|
19618
|
+
'identityId'?: string;
|
|
19619
|
+
/**
|
|
19620
|
+
*
|
|
19621
|
+
* @type {IdentityEntitlementDetailsEntitlementDtoV2025}
|
|
19622
|
+
* @memberof IdentityEntitlementDetailsV2025
|
|
19623
|
+
*/
|
|
19624
|
+
'entitlement'?: IdentityEntitlementDetailsEntitlementDtoV2025;
|
|
19625
|
+
/**
|
|
19626
|
+
* Id of Source
|
|
19627
|
+
* @type {string}
|
|
19628
|
+
* @memberof IdentityEntitlementDetailsV2025
|
|
19629
|
+
*/
|
|
19630
|
+
'sourceId'?: string;
|
|
19631
|
+
/**
|
|
19632
|
+
* A list of account targets on the identity provisioned with the requested entitlement.
|
|
19633
|
+
* @type {Array<IdentityEntitlementDetailsAccountTargetV2025>}
|
|
19634
|
+
* @memberof IdentityEntitlementDetailsV2025
|
|
19635
|
+
*/
|
|
19636
|
+
'accountTargets'?: Array<IdentityEntitlementDetailsAccountTargetV2025>;
|
|
19637
|
+
}
|
|
19076
19638
|
/**
|
|
19077
19639
|
*
|
|
19078
19640
|
* @export
|
|
@@ -19916,6 +20478,102 @@ export interface IdentityWithNewAccessV2025 {
|
|
|
19916
20478
|
*/
|
|
19917
20479
|
'accessRefs': Array<IdentityWithNewAccessAccessRefsInnerV2025>;
|
|
19918
20480
|
}
|
|
20481
|
+
/**
|
|
20482
|
+
*
|
|
20483
|
+
* @export
|
|
20484
|
+
* @interface IdpDetailsV2025
|
|
20485
|
+
*/
|
|
20486
|
+
export interface IdpDetailsV2025 {
|
|
20487
|
+
/**
|
|
20488
|
+
* Federation protocol role
|
|
20489
|
+
* @type {string}
|
|
20490
|
+
* @memberof IdpDetailsV2025
|
|
20491
|
+
*/
|
|
20492
|
+
'role'?: IdpDetailsV2025RoleV2025;
|
|
20493
|
+
/**
|
|
20494
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
20495
|
+
* @type {string}
|
|
20496
|
+
* @memberof IdpDetailsV2025
|
|
20497
|
+
*/
|
|
20498
|
+
'entityId'?: string;
|
|
20499
|
+
/**
|
|
20500
|
+
* Defines the binding used for the SAML flow. Used with IDP configurations.
|
|
20501
|
+
* @type {string}
|
|
20502
|
+
* @memberof IdpDetailsV2025
|
|
20503
|
+
*/
|
|
20504
|
+
'binding'?: string;
|
|
20505
|
+
/**
|
|
20506
|
+
* Specifies the SAML authentication method to use. Used with IDP configurations.
|
|
20507
|
+
* @type {string}
|
|
20508
|
+
* @memberof IdpDetailsV2025
|
|
20509
|
+
*/
|
|
20510
|
+
'authnContext'?: string;
|
|
20511
|
+
/**
|
|
20512
|
+
* The IDP logout URL. Used with IDP configurations.
|
|
20513
|
+
* @type {string}
|
|
20514
|
+
* @memberof IdpDetailsV2025
|
|
20515
|
+
*/
|
|
20516
|
+
'logoutUrl'?: string;
|
|
20517
|
+
/**
|
|
20518
|
+
* Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
|
|
20519
|
+
* @type {boolean}
|
|
20520
|
+
* @memberof IdpDetailsV2025
|
|
20521
|
+
*/
|
|
20522
|
+
'includeAuthnContext'?: boolean;
|
|
20523
|
+
/**
|
|
20524
|
+
* The name id format to use. Used with IDP configurations.
|
|
20525
|
+
* @type {string}
|
|
20526
|
+
* @memberof IdpDetailsV2025
|
|
20527
|
+
*/
|
|
20528
|
+
'nameId'?: string;
|
|
20529
|
+
/**
|
|
20530
|
+
*
|
|
20531
|
+
* @type {JITConfigurationV2025}
|
|
20532
|
+
* @memberof IdpDetailsV2025
|
|
20533
|
+
*/
|
|
20534
|
+
'jitConfiguration'?: JITConfigurationV2025;
|
|
20535
|
+
/**
|
|
20536
|
+
* The Base64-encoded certificate used by the IDP. Used with IDP configurations.
|
|
20537
|
+
* @type {string}
|
|
20538
|
+
* @memberof IdpDetailsV2025
|
|
20539
|
+
*/
|
|
20540
|
+
'cert'?: string;
|
|
20541
|
+
/**
|
|
20542
|
+
* The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
|
|
20543
|
+
* @type {string}
|
|
20544
|
+
* @memberof IdpDetailsV2025
|
|
20545
|
+
*/
|
|
20546
|
+
'loginUrlPost'?: string;
|
|
20547
|
+
/**
|
|
20548
|
+
* The IDP Redirect URL. Used with IDP configurations.
|
|
20549
|
+
* @type {string}
|
|
20550
|
+
* @memberof IdpDetailsV2025
|
|
20551
|
+
*/
|
|
20552
|
+
'loginUrlRedirect'?: string;
|
|
20553
|
+
/**
|
|
20554
|
+
* Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
|
|
20555
|
+
* @type {string}
|
|
20556
|
+
* @memberof IdpDetailsV2025
|
|
20557
|
+
*/
|
|
20558
|
+
'mappingAttribute': string;
|
|
20559
|
+
/**
|
|
20560
|
+
* The expiration date extracted from the certificate.
|
|
20561
|
+
* @type {string}
|
|
20562
|
+
* @memberof IdpDetailsV2025
|
|
20563
|
+
*/
|
|
20564
|
+
'certificateExpirationDate'?: string;
|
|
20565
|
+
/**
|
|
20566
|
+
* The name extracted from the certificate.
|
|
20567
|
+
* @type {string}
|
|
20568
|
+
* @memberof IdpDetailsV2025
|
|
20569
|
+
*/
|
|
20570
|
+
'certificateName'?: string;
|
|
20571
|
+
}
|
|
20572
|
+
export declare const IdpDetailsV2025RoleV2025: {
|
|
20573
|
+
readonly SamlIdp: "SAML_IDP";
|
|
20574
|
+
readonly SamlSp: "SAML_SP";
|
|
20575
|
+
};
|
|
20576
|
+
export type IdpDetailsV2025RoleV2025 = typeof IdpDetailsV2025RoleV2025[keyof typeof IdpDetailsV2025RoleV2025];
|
|
19919
20577
|
/**
|
|
19920
20578
|
*
|
|
19921
20579
|
* @export
|
|
@@ -20349,6 +21007,33 @@ export interface InvocationV2025 {
|
|
|
20349
21007
|
*/
|
|
20350
21008
|
'contentJson'?: object;
|
|
20351
21009
|
}
|
|
21010
|
+
/**
|
|
21011
|
+
*
|
|
21012
|
+
* @export
|
|
21013
|
+
* @interface JITConfigurationV2025
|
|
21014
|
+
*/
|
|
21015
|
+
export interface JITConfigurationV2025 {
|
|
21016
|
+
/**
|
|
21017
|
+
* The indicator for just-in-time provisioning enabled
|
|
21018
|
+
* @type {boolean}
|
|
21019
|
+
* @memberof JITConfigurationV2025
|
|
21020
|
+
*/
|
|
21021
|
+
'enabled'?: boolean;
|
|
21022
|
+
/**
|
|
21023
|
+
* the sourceId that mapped to just-in-time provisioning configuration
|
|
21024
|
+
* @type {string}
|
|
21025
|
+
* @memberof JITConfigurationV2025
|
|
21026
|
+
*/
|
|
21027
|
+
'sourceId'?: string;
|
|
21028
|
+
/**
|
|
21029
|
+
* A mapping of identity profile attribute names to SAML assertion attribute names
|
|
21030
|
+
* @type {{ [key: string]: string; }}
|
|
21031
|
+
* @memberof JITConfigurationV2025
|
|
21032
|
+
*/
|
|
21033
|
+
'sourceAttributeMappings'?: {
|
|
21034
|
+
[key: string]: string;
|
|
21035
|
+
};
|
|
21036
|
+
}
|
|
20352
21037
|
/**
|
|
20353
21038
|
* A JSONPatch Operation as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902)
|
|
20354
21039
|
* @export
|
|
@@ -20690,6 +21375,7 @@ export interface LifecyclestateDeletedV2025 {
|
|
|
20690
21375
|
}
|
|
20691
21376
|
export declare const LifecyclestateDeletedV2025TypeV2025: {
|
|
20692
21377
|
readonly LifecycleState: "LIFECYCLE_STATE";
|
|
21378
|
+
readonly TaskResult: "TASK_RESULT";
|
|
20693
21379
|
};
|
|
20694
21380
|
export type LifecyclestateDeletedV2025TypeV2025 = typeof LifecyclestateDeletedV2025TypeV2025[keyof typeof LifecyclestateDeletedV2025TypeV2025];
|
|
20695
21381
|
/**
|
|
@@ -21416,6 +22102,31 @@ export interface LocalizedMessageV2025 {
|
|
|
21416
22102
|
*/
|
|
21417
22103
|
'message': string;
|
|
21418
22104
|
}
|
|
22105
|
+
/**
|
|
22106
|
+
*
|
|
22107
|
+
* @export
|
|
22108
|
+
* @interface LockoutConfigurationV2025
|
|
22109
|
+
*/
|
|
22110
|
+
export interface LockoutConfigurationV2025 {
|
|
22111
|
+
/**
|
|
22112
|
+
* The maximum attempts allowed before lockout occurs.
|
|
22113
|
+
* @type {number}
|
|
22114
|
+
* @memberof LockoutConfigurationV2025
|
|
22115
|
+
*/
|
|
22116
|
+
'maximumAttempts'?: number;
|
|
22117
|
+
/**
|
|
22118
|
+
* The total time in minutes a user will be locked out.
|
|
22119
|
+
* @type {number}
|
|
22120
|
+
* @memberof LockoutConfigurationV2025
|
|
22121
|
+
*/
|
|
22122
|
+
'lockoutDuration'?: number;
|
|
22123
|
+
/**
|
|
22124
|
+
* A rolling window where authentication attempts in a series count towards the maximum before lockout occurs.
|
|
22125
|
+
* @type {number}
|
|
22126
|
+
* @memberof LockoutConfigurationV2025
|
|
22127
|
+
*/
|
|
22128
|
+
'lockoutWindow'?: number;
|
|
22129
|
+
}
|
|
21419
22130
|
/**
|
|
21420
22131
|
* The definition of an Identity according to the Reassignment Configuration service
|
|
21421
22132
|
* @export
|
|
@@ -26454,19 +27165,6 @@ export declare const PatchPotentialRoleRequestInnerV2025OpV2025: {
|
|
|
26454
27165
|
readonly Replace: "replace";
|
|
26455
27166
|
};
|
|
26456
27167
|
export type PatchPotentialRoleRequestInnerV2025OpV2025 = typeof PatchPotentialRoleRequestInnerV2025OpV2025[keyof typeof PatchPotentialRoleRequestInnerV2025OpV2025];
|
|
26457
|
-
/**
|
|
26458
|
-
* A JSONPatch document as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902). Only `replace` operations are accepted by this endpoint.
|
|
26459
|
-
* @export
|
|
26460
|
-
* @interface PatchServiceDeskIntegrationRequestV2025
|
|
26461
|
-
*/
|
|
26462
|
-
export interface PatchServiceDeskIntegrationRequestV2025 {
|
|
26463
|
-
/**
|
|
26464
|
-
* Operations to be applied
|
|
26465
|
-
* @type {Array<JsonPatchOperationV2025>}
|
|
26466
|
-
* @memberof PatchServiceDeskIntegrationRequestV2025
|
|
26467
|
-
*/
|
|
26468
|
-
'operations'?: Array<JsonPatchOperationV2025>;
|
|
26469
|
-
}
|
|
26470
27168
|
/**
|
|
26471
27169
|
*
|
|
26472
27170
|
* @export
|
|
@@ -27343,7 +28041,7 @@ export interface ProvisioningPolicyDtoV2025 {
|
|
|
27343
28041
|
* @type {string}
|
|
27344
28042
|
* @memberof ProvisioningPolicyDtoV2025
|
|
27345
28043
|
*/
|
|
27346
|
-
'name': string;
|
|
28044
|
+
'name': string | null;
|
|
27347
28045
|
/**
|
|
27348
28046
|
* the description of the provisioning policy
|
|
27349
28047
|
* @type {string}
|
|
@@ -27374,7 +28072,7 @@ export interface ProvisioningPolicyV2025 {
|
|
|
27374
28072
|
* @type {string}
|
|
27375
28073
|
* @memberof ProvisioningPolicyV2025
|
|
27376
28074
|
*/
|
|
27377
|
-
'name': string;
|
|
28075
|
+
'name': string | null;
|
|
27378
28076
|
/**
|
|
27379
28077
|
* the description of the provisioning policy
|
|
27380
28078
|
* @type {string}
|
|
@@ -28865,6 +29563,80 @@ export interface RequestedAccountRefV2025 {
|
|
|
28865
29563
|
*/
|
|
28866
29564
|
'sourceName'?: string;
|
|
28867
29565
|
}
|
|
29566
|
+
/**
|
|
29567
|
+
*
|
|
29568
|
+
* @export
|
|
29569
|
+
* @interface RequestedForDtoRefV2025
|
|
29570
|
+
*/
|
|
29571
|
+
export interface RequestedForDtoRefV2025 {
|
|
29572
|
+
/**
|
|
29573
|
+
* The identity id for which the access is requested
|
|
29574
|
+
* @type {string}
|
|
29575
|
+
* @memberof RequestedForDtoRefV2025
|
|
29576
|
+
*/
|
|
29577
|
+
'identityId': string;
|
|
29578
|
+
/**
|
|
29579
|
+
* the details for the access items that are requested for the identity
|
|
29580
|
+
* @type {Array<RequestedItemDtoRefV2025>}
|
|
29581
|
+
* @memberof RequestedForDtoRefV2025
|
|
29582
|
+
*/
|
|
29583
|
+
'requestedItems': Array<RequestedItemDtoRefV2025>;
|
|
29584
|
+
}
|
|
29585
|
+
/**
|
|
29586
|
+
*
|
|
29587
|
+
* @export
|
|
29588
|
+
* @interface RequestedItemAccountSelectionsV2025
|
|
29589
|
+
*/
|
|
29590
|
+
export interface RequestedItemAccountSelectionsV2025 {
|
|
29591
|
+
/**
|
|
29592
|
+
* The description for this requested item
|
|
29593
|
+
* @type {string}
|
|
29594
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29595
|
+
*/
|
|
29596
|
+
'description'?: string;
|
|
29597
|
+
/**
|
|
29598
|
+
* This field indicates if account selections are not allowed for this requested item. * If true, this field indicates that account selections will not be available for this item and user combination. In this case, no account selections should be provided in the access request for this item and user combination, irrespective of whether the user has single or multiple accounts on a source. * An example is where a user is requesting an access profile that is already assigned to one of their accounts.
|
|
29599
|
+
* @type {boolean}
|
|
29600
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29601
|
+
*/
|
|
29602
|
+
'accountsSelectionBlocked'?: boolean;
|
|
29603
|
+
/**
|
|
29604
|
+
* If account selections are not allowed for an item, this field will denote the reason.
|
|
29605
|
+
* @type {string}
|
|
29606
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29607
|
+
*/
|
|
29608
|
+
'accountsSelectionBlockedReason'?: string | null;
|
|
29609
|
+
/**
|
|
29610
|
+
* The type of the item being requested.
|
|
29611
|
+
* @type {string}
|
|
29612
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29613
|
+
*/
|
|
29614
|
+
'type'?: RequestedItemAccountSelectionsV2025TypeV2025;
|
|
29615
|
+
/**
|
|
29616
|
+
* The id of the requested item
|
|
29617
|
+
* @type {string}
|
|
29618
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29619
|
+
*/
|
|
29620
|
+
'id'?: string;
|
|
29621
|
+
/**
|
|
29622
|
+
* The name of the requested item
|
|
29623
|
+
* @type {string}
|
|
29624
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29625
|
+
*/
|
|
29626
|
+
'name'?: string;
|
|
29627
|
+
/**
|
|
29628
|
+
* The details for the sources and accounts for the requested item and identity combination
|
|
29629
|
+
* @type {Array<SourceAccountSelectionsV2025>}
|
|
29630
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
29631
|
+
*/
|
|
29632
|
+
'sources'?: Array<SourceAccountSelectionsV2025>;
|
|
29633
|
+
}
|
|
29634
|
+
export declare const RequestedItemAccountSelectionsV2025TypeV2025: {
|
|
29635
|
+
readonly AccessProfile: "ACCESS_PROFILE";
|
|
29636
|
+
readonly Role: "ROLE";
|
|
29637
|
+
readonly Entitlement: "ENTITLEMENT";
|
|
29638
|
+
};
|
|
29639
|
+
export type RequestedItemAccountSelectionsV2025TypeV2025 = typeof RequestedItemAccountSelectionsV2025TypeV2025[keyof typeof RequestedItemAccountSelectionsV2025TypeV2025];
|
|
28868
29640
|
/**
|
|
28869
29641
|
*
|
|
28870
29642
|
* @export
|
|
@@ -28890,6 +29662,69 @@ export declare const RequestedItemDetailsV2025TypeV2025: {
|
|
|
28890
29662
|
readonly Role: "ROLE";
|
|
28891
29663
|
};
|
|
28892
29664
|
export type RequestedItemDetailsV2025TypeV2025 = typeof RequestedItemDetailsV2025TypeV2025[keyof typeof RequestedItemDetailsV2025TypeV2025];
|
|
29665
|
+
/**
|
|
29666
|
+
*
|
|
29667
|
+
* @export
|
|
29668
|
+
* @interface RequestedItemDtoRefV2025
|
|
29669
|
+
*/
|
|
29670
|
+
export interface RequestedItemDtoRefV2025 {
|
|
29671
|
+
/**
|
|
29672
|
+
* The type of the item being requested.
|
|
29673
|
+
* @type {string}
|
|
29674
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29675
|
+
*/
|
|
29676
|
+
'type': RequestedItemDtoRefV2025TypeV2025;
|
|
29677
|
+
/**
|
|
29678
|
+
* ID of Role, Access Profile or Entitlement being requested.
|
|
29679
|
+
* @type {string}
|
|
29680
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29681
|
+
*/
|
|
29682
|
+
'id': string;
|
|
29683
|
+
/**
|
|
29684
|
+
* Comment provided by requester. * Comment is required when the request is of type Revoke Access.
|
|
29685
|
+
* @type {string}
|
|
29686
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29687
|
+
*/
|
|
29688
|
+
'comment'?: string;
|
|
29689
|
+
/**
|
|
29690
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
|
|
29691
|
+
* @type {{ [key: string]: string; }}
|
|
29692
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29693
|
+
*/
|
|
29694
|
+
'clientMetadata'?: {
|
|
29695
|
+
[key: string]: string;
|
|
29696
|
+
};
|
|
29697
|
+
/**
|
|
29698
|
+
* The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
|
|
29699
|
+
* @type {string}
|
|
29700
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29701
|
+
*/
|
|
29702
|
+
'removeDate'?: string;
|
|
29703
|
+
/**
|
|
29704
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
29705
|
+
* @type {string}
|
|
29706
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29707
|
+
*/
|
|
29708
|
+
'assignmentId'?: string | null;
|
|
29709
|
+
/**
|
|
29710
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
29711
|
+
* @type {string}
|
|
29712
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29713
|
+
*/
|
|
29714
|
+
'nativeIdentity'?: string | null;
|
|
29715
|
+
/**
|
|
29716
|
+
* The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
|
|
29717
|
+
* @type {Array<SourceItemRefV2025>}
|
|
29718
|
+
* @memberof RequestedItemDtoRefV2025
|
|
29719
|
+
*/
|
|
29720
|
+
'accountSelection'?: Array<SourceItemRefV2025> | null;
|
|
29721
|
+
}
|
|
29722
|
+
export declare const RequestedItemDtoRefV2025TypeV2025: {
|
|
29723
|
+
readonly AccessProfile: "ACCESS_PROFILE";
|
|
29724
|
+
readonly Role: "ROLE";
|
|
29725
|
+
readonly Entitlement: "ENTITLEMENT";
|
|
29726
|
+
};
|
|
29727
|
+
export type RequestedItemDtoRefV2025TypeV2025 = typeof RequestedItemDtoRefV2025TypeV2025[keyof typeof RequestedItemDtoRefV2025TypeV2025];
|
|
28893
29728
|
/**
|
|
28894
29729
|
*
|
|
28895
29730
|
* @export
|
|
@@ -34986,6 +35821,176 @@ export declare const ServiceDeskSourceV2025TypeV2025: {
|
|
|
34986
35821
|
readonly Source: "SOURCE";
|
|
34987
35822
|
};
|
|
34988
35823
|
export type ServiceDeskSourceV2025TypeV2025 = typeof ServiceDeskSourceV2025TypeV2025[keyof typeof ServiceDeskSourceV2025TypeV2025];
|
|
35824
|
+
/**
|
|
35825
|
+
*
|
|
35826
|
+
* @export
|
|
35827
|
+
* @interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35828
|
+
*/
|
|
35829
|
+
export interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2025 {
|
|
35830
|
+
/**
|
|
35831
|
+
* Federation protocol role
|
|
35832
|
+
* @type {string}
|
|
35833
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35834
|
+
*/
|
|
35835
|
+
'role'?: ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025;
|
|
35836
|
+
/**
|
|
35837
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
35838
|
+
* @type {string}
|
|
35839
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35840
|
+
*/
|
|
35841
|
+
'entityId'?: string;
|
|
35842
|
+
/**
|
|
35843
|
+
* Defines the binding used for the SAML flow. Used with IDP configurations.
|
|
35844
|
+
* @type {string}
|
|
35845
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35846
|
+
*/
|
|
35847
|
+
'binding'?: string;
|
|
35848
|
+
/**
|
|
35849
|
+
* Specifies the SAML authentication method to use. Used with IDP configurations.
|
|
35850
|
+
* @type {string}
|
|
35851
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35852
|
+
*/
|
|
35853
|
+
'authnContext'?: string;
|
|
35854
|
+
/**
|
|
35855
|
+
* The IDP logout URL. Used with IDP configurations.
|
|
35856
|
+
* @type {string}
|
|
35857
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35858
|
+
*/
|
|
35859
|
+
'logoutUrl'?: string;
|
|
35860
|
+
/**
|
|
35861
|
+
* Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
|
|
35862
|
+
* @type {boolean}
|
|
35863
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35864
|
+
*/
|
|
35865
|
+
'includeAuthnContext'?: boolean;
|
|
35866
|
+
/**
|
|
35867
|
+
* The name id format to use. Used with IDP configurations.
|
|
35868
|
+
* @type {string}
|
|
35869
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35870
|
+
*/
|
|
35871
|
+
'nameId'?: string;
|
|
35872
|
+
/**
|
|
35873
|
+
*
|
|
35874
|
+
* @type {JITConfigurationV2025}
|
|
35875
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35876
|
+
*/
|
|
35877
|
+
'jitConfiguration'?: JITConfigurationV2025;
|
|
35878
|
+
/**
|
|
35879
|
+
* The Base64-encoded certificate used by the IDP. Used with IDP configurations.
|
|
35880
|
+
* @type {string}
|
|
35881
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35882
|
+
*/
|
|
35883
|
+
'cert'?: string;
|
|
35884
|
+
/**
|
|
35885
|
+
* The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
|
|
35886
|
+
* @type {string}
|
|
35887
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35888
|
+
*/
|
|
35889
|
+
'loginUrlPost'?: string;
|
|
35890
|
+
/**
|
|
35891
|
+
* The IDP Redirect URL. Used with IDP configurations.
|
|
35892
|
+
* @type {string}
|
|
35893
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35894
|
+
*/
|
|
35895
|
+
'loginUrlRedirect'?: string;
|
|
35896
|
+
/**
|
|
35897
|
+
* Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
|
|
35898
|
+
* @type {string}
|
|
35899
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35900
|
+
*/
|
|
35901
|
+
'mappingAttribute': string;
|
|
35902
|
+
/**
|
|
35903
|
+
* The expiration date extracted from the certificate.
|
|
35904
|
+
* @type {string}
|
|
35905
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35906
|
+
*/
|
|
35907
|
+
'certificateExpirationDate'?: string;
|
|
35908
|
+
/**
|
|
35909
|
+
* The name extracted from the certificate.
|
|
35910
|
+
* @type {string}
|
|
35911
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35912
|
+
*/
|
|
35913
|
+
'certificateName'?: string;
|
|
35914
|
+
/**
|
|
35915
|
+
* Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
|
|
35916
|
+
* @type {string}
|
|
35917
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35918
|
+
*/
|
|
35919
|
+
'alias'?: string;
|
|
35920
|
+
/**
|
|
35921
|
+
* The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
|
|
35922
|
+
* @type {string}
|
|
35923
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35924
|
+
*/
|
|
35925
|
+
'callbackUrl': string;
|
|
35926
|
+
/**
|
|
35927
|
+
* The legacy ACS URL used for SAML authentication. Used with SP configurations.
|
|
35928
|
+
* @type {string}
|
|
35929
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
35930
|
+
*/
|
|
35931
|
+
'legacyAcsUrl'?: string;
|
|
35932
|
+
}
|
|
35933
|
+
export declare const ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025: {
|
|
35934
|
+
readonly SamlIdp: "SAML_IDP";
|
|
35935
|
+
readonly SamlSp: "SAML_SP";
|
|
35936
|
+
};
|
|
35937
|
+
export type ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025 = typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025[keyof typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025];
|
|
35938
|
+
/**
|
|
35939
|
+
* Represents the IdentityNow as Service Provider Configuration allowing customers to log into IDN via an Identity Provider
|
|
35940
|
+
* @export
|
|
35941
|
+
* @interface ServiceProviderConfigurationV2025
|
|
35942
|
+
*/
|
|
35943
|
+
export interface ServiceProviderConfigurationV2025 {
|
|
35944
|
+
/**
|
|
35945
|
+
* This determines whether or not the SAML authentication flow is enabled for an org
|
|
35946
|
+
* @type {boolean}
|
|
35947
|
+
* @memberof ServiceProviderConfigurationV2025
|
|
35948
|
+
*/
|
|
35949
|
+
'enabled'?: boolean;
|
|
35950
|
+
/**
|
|
35951
|
+
* This allows basic login with the parameter prompt=true. This is often toggled on when debugging SAML authentication setup. When false, only org admins with MFA-enabled can bypass the IDP.
|
|
35952
|
+
* @type {boolean}
|
|
35953
|
+
* @memberof ServiceProviderConfigurationV2025
|
|
35954
|
+
*/
|
|
35955
|
+
'bypassIdp'?: boolean;
|
|
35956
|
+
/**
|
|
35957
|
+
* This indicates whether or not the SAML configuration is valid.
|
|
35958
|
+
* @type {boolean}
|
|
35959
|
+
* @memberof ServiceProviderConfigurationV2025
|
|
35960
|
+
*/
|
|
35961
|
+
'samlConfigurationValid'?: boolean;
|
|
35962
|
+
/**
|
|
35963
|
+
* A list of the abstract implementations of the Federation Protocol details. Typically, this will include on SpDetails object and one IdpDetails object used in tandem to define a SAML integration between a customer\'s identity provider and a customer\'s SailPoint instance (i.e., the service provider).
|
|
35964
|
+
* @type {Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2025>}
|
|
35965
|
+
* @memberof ServiceProviderConfigurationV2025
|
|
35966
|
+
*/
|
|
35967
|
+
'federationProtocolDetails'?: Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2025>;
|
|
35968
|
+
}
|
|
35969
|
+
/**
|
|
35970
|
+
*
|
|
35971
|
+
* @export
|
|
35972
|
+
* @interface SessionConfigurationV2025
|
|
35973
|
+
*/
|
|
35974
|
+
export interface SessionConfigurationV2025 {
|
|
35975
|
+
/**
|
|
35976
|
+
* The maximum time in minutes a session can be idle.
|
|
35977
|
+
* @type {number}
|
|
35978
|
+
* @memberof SessionConfigurationV2025
|
|
35979
|
+
*/
|
|
35980
|
+
'maxIdleTime'?: number;
|
|
35981
|
+
/**
|
|
35982
|
+
* Denotes if \'remember me\' is enabled.
|
|
35983
|
+
* @type {boolean}
|
|
35984
|
+
* @memberof SessionConfigurationV2025
|
|
35985
|
+
*/
|
|
35986
|
+
'rememberMe'?: boolean;
|
|
35987
|
+
/**
|
|
35988
|
+
* The maximum allowable session time in minutes.
|
|
35989
|
+
* @type {number}
|
|
35990
|
+
* @memberof SessionConfigurationV2025
|
|
35991
|
+
*/
|
|
35992
|
+
'maxSessionTime'?: number;
|
|
35993
|
+
}
|
|
34989
35994
|
/**
|
|
34990
35995
|
*
|
|
34991
35996
|
* @export
|
|
@@ -35996,6 +37001,37 @@ export interface SourceAccountDeletedV2025 {
|
|
|
35996
37001
|
[key: string]: any;
|
|
35997
37002
|
};
|
|
35998
37003
|
}
|
|
37004
|
+
/**
|
|
37005
|
+
*
|
|
37006
|
+
* @export
|
|
37007
|
+
* @interface SourceAccountSelectionsV2025
|
|
37008
|
+
*/
|
|
37009
|
+
export interface SourceAccountSelectionsV2025 {
|
|
37010
|
+
/**
|
|
37011
|
+
*
|
|
37012
|
+
* @type {DtoTypeV2025}
|
|
37013
|
+
* @memberof SourceAccountSelectionsV2025
|
|
37014
|
+
*/
|
|
37015
|
+
'type'?: DtoTypeV2025;
|
|
37016
|
+
/**
|
|
37017
|
+
* The source id
|
|
37018
|
+
* @type {string}
|
|
37019
|
+
* @memberof SourceAccountSelectionsV2025
|
|
37020
|
+
*/
|
|
37021
|
+
'id'?: string;
|
|
37022
|
+
/**
|
|
37023
|
+
* The source name
|
|
37024
|
+
* @type {string}
|
|
37025
|
+
* @memberof SourceAccountSelectionsV2025
|
|
37026
|
+
*/
|
|
37027
|
+
'name'?: string;
|
|
37028
|
+
/**
|
|
37029
|
+
* The accounts information for a particular source in the requested item
|
|
37030
|
+
* @type {Array<AccountInfoRefV2025>}
|
|
37031
|
+
* @memberof SourceAccountSelectionsV2025
|
|
37032
|
+
*/
|
|
37033
|
+
'accounts'?: Array<AccountInfoRefV2025>;
|
|
37034
|
+
}
|
|
35999
37035
|
/**
|
|
36000
37036
|
*
|
|
36001
37037
|
* @export
|
|
@@ -36765,6 +37801,25 @@ export declare const SourceHealthDtoV2025StatusV2025: {
|
|
|
36765
37801
|
readonly SourceStateErrorAccountFileImport: "SOURCE_STATE_ERROR_ACCOUNT_FILE_IMPORT";
|
|
36766
37802
|
};
|
|
36767
37803
|
export type SourceHealthDtoV2025StatusV2025 = typeof SourceHealthDtoV2025StatusV2025[keyof typeof SourceHealthDtoV2025StatusV2025];
|
|
37804
|
+
/**
|
|
37805
|
+
*
|
|
37806
|
+
* @export
|
|
37807
|
+
* @interface SourceItemRefV2025
|
|
37808
|
+
*/
|
|
37809
|
+
export interface SourceItemRefV2025 {
|
|
37810
|
+
/**
|
|
37811
|
+
* The id for the source on which account selections are made
|
|
37812
|
+
* @type {string}
|
|
37813
|
+
* @memberof SourceItemRefV2025
|
|
37814
|
+
*/
|
|
37815
|
+
'sourceId'?: string | null;
|
|
37816
|
+
/**
|
|
37817
|
+
* A list of account selections on the source. Currently, only one selection per source is supported.
|
|
37818
|
+
* @type {Array<AccountItemRefV2025>}
|
|
37819
|
+
* @memberof SourceItemRefV2025
|
|
37820
|
+
*/
|
|
37821
|
+
'accounts'?: Array<AccountItemRefV2025> | null;
|
|
37822
|
+
}
|
|
36768
37823
|
/**
|
|
36769
37824
|
* Reference to management workgroup for the source.
|
|
36770
37825
|
* @export
|
|
@@ -37845,6 +38900,48 @@ export interface SpConfigRulesV2025 {
|
|
|
37845
38900
|
*/
|
|
37846
38901
|
'editable'?: boolean;
|
|
37847
38902
|
}
|
|
38903
|
+
/**
|
|
38904
|
+
*
|
|
38905
|
+
* @export
|
|
38906
|
+
* @interface SpDetailsV2025
|
|
38907
|
+
*/
|
|
38908
|
+
export interface SpDetailsV2025 {
|
|
38909
|
+
/**
|
|
38910
|
+
* Federation protocol role
|
|
38911
|
+
* @type {string}
|
|
38912
|
+
* @memberof SpDetailsV2025
|
|
38913
|
+
*/
|
|
38914
|
+
'role'?: SpDetailsV2025RoleV2025;
|
|
38915
|
+
/**
|
|
38916
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
38917
|
+
* @type {string}
|
|
38918
|
+
* @memberof SpDetailsV2025
|
|
38919
|
+
*/
|
|
38920
|
+
'entityId'?: string;
|
|
38921
|
+
/**
|
|
38922
|
+
* Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
|
|
38923
|
+
* @type {string}
|
|
38924
|
+
* @memberof SpDetailsV2025
|
|
38925
|
+
*/
|
|
38926
|
+
'alias'?: string;
|
|
38927
|
+
/**
|
|
38928
|
+
* The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
|
|
38929
|
+
* @type {string}
|
|
38930
|
+
* @memberof SpDetailsV2025
|
|
38931
|
+
*/
|
|
38932
|
+
'callbackUrl': string;
|
|
38933
|
+
/**
|
|
38934
|
+
* The legacy ACS URL used for SAML authentication. Used with SP configurations.
|
|
38935
|
+
* @type {string}
|
|
38936
|
+
* @memberof SpDetailsV2025
|
|
38937
|
+
*/
|
|
38938
|
+
'legacyAcsUrl'?: string;
|
|
38939
|
+
}
|
|
38940
|
+
export declare const SpDetailsV2025RoleV2025: {
|
|
38941
|
+
readonly SamlIdp: "SAML_IDP";
|
|
38942
|
+
readonly SamlSp: "SAML_SP";
|
|
38943
|
+
};
|
|
38944
|
+
export type SpDetailsV2025RoleV2025 = typeof SpDetailsV2025RoleV2025[keyof typeof SpDetailsV2025RoleV2025];
|
|
37848
38945
|
/**
|
|
37849
38946
|
*
|
|
37850
38947
|
* @export
|
|
@@ -41446,6 +42543,7 @@ export declare const WorkflowExecutionV2025StatusV2025: {
|
|
|
41446
42543
|
readonly Failed: "Failed";
|
|
41447
42544
|
readonly Canceled: "Canceled";
|
|
41448
42545
|
readonly Running: "Running";
|
|
42546
|
+
readonly Queued: "Queued";
|
|
41449
42547
|
};
|
|
41450
42548
|
export type WorkflowExecutionV2025StatusV2025 = typeof WorkflowExecutionV2025StatusV2025[keyof typeof WorkflowExecutionV2025StatusV2025];
|
|
41451
42549
|
/**
|
|
@@ -42509,7 +43607,7 @@ export declare class AccessModelMetadataV2025Api extends BaseAPI {
|
|
|
42509
43607
|
*/
|
|
42510
43608
|
export declare const AccessProfilesV2025ApiAxiosParamCreator: (configuration?: Configuration) => {
|
|
42511
43609
|
/**
|
|
42512
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
43610
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
42513
43611
|
* @summary Create Access Profile
|
|
42514
43612
|
* @param {AccessProfileV2025} accessProfileV2025
|
|
42515
43613
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -42593,7 +43691,7 @@ export declare const AccessProfilesV2025ApiAxiosParamCreator: (configuration?: C
|
|
|
42593
43691
|
*/
|
|
42594
43692
|
export declare const AccessProfilesV2025ApiFp: (configuration?: Configuration) => {
|
|
42595
43693
|
/**
|
|
42596
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
43694
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
42597
43695
|
* @summary Create Access Profile
|
|
42598
43696
|
* @param {AccessProfileV2025} accessProfileV2025
|
|
42599
43697
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -42677,7 +43775,7 @@ export declare const AccessProfilesV2025ApiFp: (configuration?: Configuration) =
|
|
|
42677
43775
|
*/
|
|
42678
43776
|
export declare const AccessProfilesV2025ApiFactory: (configuration?: Configuration, basePath?: string, axios?: AxiosInstance) => {
|
|
42679
43777
|
/**
|
|
42680
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
43778
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
42681
43779
|
* @summary Create Access Profile
|
|
42682
43780
|
* @param {AccessProfilesV2025ApiCreateAccessProfileRequest} requestParameters Request parameters.
|
|
42683
43781
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -42937,7 +44035,7 @@ export interface AccessProfilesV2025ApiUpdateAccessProfilesInBulkRequest {
|
|
|
42937
44035
|
*/
|
|
42938
44036
|
export declare class AccessProfilesV2025Api extends BaseAPI {
|
|
42939
44037
|
/**
|
|
42940
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
44038
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
42941
44039
|
* @summary Create Access Profile
|
|
42942
44040
|
* @param {AccessProfilesV2025ApiCreateAccessProfileRequest} requestParameters Request parameters.
|
|
42943
44041
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -43072,7 +44170,7 @@ export declare const AccessRequestApprovalsV2025ApiAxiosParamCreator: (configura
|
|
|
43072
44170
|
* @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
43073
44171
|
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
43074
44172
|
* @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count=true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
43075
|
-
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
|
|
44173
|
+
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
|
|
43076
44174
|
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified**
|
|
43077
44175
|
* @param {*} [axiosOptions] Override http request option.
|
|
43078
44176
|
* @throws {RequiredError}
|
|
@@ -43151,7 +44249,7 @@ export declare const AccessRequestApprovalsV2025ApiFp: (configuration?: Configur
|
|
|
43151
44249
|
* @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
43152
44250
|
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
43153
44251
|
* @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count=true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
43154
|
-
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
|
|
44252
|
+
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
|
|
43155
44253
|
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified**
|
|
43156
44254
|
* @param {*} [axiosOptions] Override http request option.
|
|
43157
44255
|
* @throws {RequiredError}
|
|
@@ -43391,7 +44489,7 @@ export interface AccessRequestApprovalsV2025ApiListPendingApprovalsRequest {
|
|
|
43391
44489
|
*/
|
|
43392
44490
|
readonly count?: boolean;
|
|
43393
44491
|
/**
|
|
43394
|
-
* Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
|
|
44492
|
+
* Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
|
|
43395
44493
|
* @type {string}
|
|
43396
44494
|
* @memberof AccessRequestApprovalsV2025ApiListPendingApprovals
|
|
43397
44495
|
*/
|
|
@@ -43629,7 +44727,7 @@ export declare const AccessRequestsV2025ApiAxiosParamCreator: (configuration?: C
|
|
|
43629
44727
|
*/
|
|
43630
44728
|
closeAccessRequest: (closeAccessRequestV2025: CloseAccessRequestV2025, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
43631
44729
|
/**
|
|
43632
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
44730
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
43633
44731
|
* @summary Submit Access Request
|
|
43634
44732
|
* @param {AccessRequestV2025} accessRequestV2025
|
|
43635
44733
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -43643,6 +44741,16 @@ export declare const AccessRequestsV2025ApiAxiosParamCreator: (configuration?: C
|
|
|
43643
44741
|
* @throws {RequiredError}
|
|
43644
44742
|
*/
|
|
43645
44743
|
getAccessRequestConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
44744
|
+
/**
|
|
44745
|
+
* Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
|
|
44746
|
+
* @summary Identity Entitlement Details
|
|
44747
|
+
* @param {string} identityId The identity ID.
|
|
44748
|
+
* @param {string} entitlementId The entitlement ID
|
|
44749
|
+
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
44750
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44751
|
+
* @throws {RequiredError}
|
|
44752
|
+
*/
|
|
44753
|
+
getEntitlementDetailsForIdentity: (identityId: string, entitlementId: string, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
43646
44754
|
/**
|
|
43647
44755
|
* Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
|
|
43648
44756
|
* @summary Access Request Status
|
|
@@ -43677,6 +44785,14 @@ export declare const AccessRequestsV2025ApiAxiosParamCreator: (configuration?: C
|
|
|
43677
44785
|
* @throws {RequiredError}
|
|
43678
44786
|
*/
|
|
43679
44787
|
listAdministratorsAccessRequestStatus: (requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
44788
|
+
/**
|
|
44789
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
44790
|
+
* @summary Get accounts selections for identity
|
|
44791
|
+
* @param {AccountsSelectionRequestV2025} accountsSelectionRequestV2025
|
|
44792
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44793
|
+
* @throws {RequiredError}
|
|
44794
|
+
*/
|
|
44795
|
+
loadAccountSelections: (accountsSelectionRequestV2025: AccountsSelectionRequestV2025, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
43680
44796
|
/**
|
|
43681
44797
|
* This endpoint replaces the current access-request configuration.
|
|
43682
44798
|
* @summary Update Access Request Configuration
|
|
@@ -43725,7 +44841,7 @@ export declare const AccessRequestsV2025ApiFp: (configuration?: Configuration) =
|
|
|
43725
44841
|
*/
|
|
43726
44842
|
closeAccessRequest(closeAccessRequestV2025: CloseAccessRequestV2025, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<object>>;
|
|
43727
44843
|
/**
|
|
43728
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
44844
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
43729
44845
|
* @summary Submit Access Request
|
|
43730
44846
|
* @param {AccessRequestV2025} accessRequestV2025
|
|
43731
44847
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -43739,6 +44855,16 @@ export declare const AccessRequestsV2025ApiFp: (configuration?: Configuration) =
|
|
|
43739
44855
|
* @throws {RequiredError}
|
|
43740
44856
|
*/
|
|
43741
44857
|
getAccessRequestConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AccessRequestConfigV2025>>;
|
|
44858
|
+
/**
|
|
44859
|
+
* Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
|
|
44860
|
+
* @summary Identity Entitlement Details
|
|
44861
|
+
* @param {string} identityId The identity ID.
|
|
44862
|
+
* @param {string} entitlementId The entitlement ID
|
|
44863
|
+
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
44864
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44865
|
+
* @throws {RequiredError}
|
|
44866
|
+
*/
|
|
44867
|
+
getEntitlementDetailsForIdentity(identityId: string, entitlementId: string, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IdentityEntitlementDetailsV2025>>;
|
|
43742
44868
|
/**
|
|
43743
44869
|
* Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
|
|
43744
44870
|
* @summary Access Request Status
|
|
@@ -43773,6 +44899,14 @@ export declare const AccessRequestsV2025ApiFp: (configuration?: Configuration) =
|
|
|
43773
44899
|
* @throws {RequiredError}
|
|
43774
44900
|
*/
|
|
43775
44901
|
listAdministratorsAccessRequestStatus(requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<AccessRequestAdminItemStatusV2025>>>;
|
|
44902
|
+
/**
|
|
44903
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
44904
|
+
* @summary Get accounts selections for identity
|
|
44905
|
+
* @param {AccountsSelectionRequestV2025} accountsSelectionRequestV2025
|
|
44906
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44907
|
+
* @throws {RequiredError}
|
|
44908
|
+
*/
|
|
44909
|
+
loadAccountSelections(accountsSelectionRequestV2025: AccountsSelectionRequestV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AccountsSelectionResponseV2025>>;
|
|
43776
44910
|
/**
|
|
43777
44911
|
* This endpoint replaces the current access-request configuration.
|
|
43778
44912
|
* @summary Update Access Request Configuration
|
|
@@ -43820,7 +44954,7 @@ export declare const AccessRequestsV2025ApiFactory: (configuration?: Configurati
|
|
|
43820
44954
|
*/
|
|
43821
44955
|
closeAccessRequest(requestParameters: AccessRequestsV2025ApiCloseAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<object>;
|
|
43822
44956
|
/**
|
|
43823
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
44957
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
43824
44958
|
* @summary Submit Access Request
|
|
43825
44959
|
* @param {AccessRequestsV2025ApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
43826
44960
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -43834,6 +44968,14 @@ export declare const AccessRequestsV2025ApiFactory: (configuration?: Configurati
|
|
|
43834
44968
|
* @throws {RequiredError}
|
|
43835
44969
|
*/
|
|
43836
44970
|
getAccessRequestConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<AccessRequestConfigV2025>;
|
|
44971
|
+
/**
|
|
44972
|
+
* Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
|
|
44973
|
+
* @summary Identity Entitlement Details
|
|
44974
|
+
* @param {AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest} requestParameters Request parameters.
|
|
44975
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
44976
|
+
* @throws {RequiredError}
|
|
44977
|
+
*/
|
|
44978
|
+
getEntitlementDetailsForIdentity(requestParameters: AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<IdentityEntitlementDetailsV2025>;
|
|
43837
44979
|
/**
|
|
43838
44980
|
* Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
|
|
43839
44981
|
* @summary Access Request Status
|
|
@@ -43850,6 +44992,14 @@ export declare const AccessRequestsV2025ApiFactory: (configuration?: Configurati
|
|
|
43850
44992
|
* @throws {RequiredError}
|
|
43851
44993
|
*/
|
|
43852
44994
|
listAdministratorsAccessRequestStatus(requestParameters?: AccessRequestsV2025ApiListAdministratorsAccessRequestStatusRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<AccessRequestAdminItemStatusV2025>>;
|
|
44995
|
+
/**
|
|
44996
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
44997
|
+
* @summary Get accounts selections for identity
|
|
44998
|
+
* @param {AccessRequestsV2025ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
|
|
44999
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
45000
|
+
* @throws {RequiredError}
|
|
45001
|
+
*/
|
|
45002
|
+
loadAccountSelections(requestParameters: AccessRequestsV2025ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<AccountsSelectionResponseV2025>;
|
|
43853
45003
|
/**
|
|
43854
45004
|
* This endpoint replaces the current access-request configuration.
|
|
43855
45005
|
* @summary Update Access Request Configuration
|
|
@@ -43930,6 +45080,31 @@ export interface AccessRequestsV2025ApiCreateAccessRequestRequest {
|
|
|
43930
45080
|
*/
|
|
43931
45081
|
readonly accessRequestV2025: AccessRequestV2025;
|
|
43932
45082
|
}
|
|
45083
|
+
/**
|
|
45084
|
+
* Request parameters for getEntitlementDetailsForIdentity operation in AccessRequestsV2025Api.
|
|
45085
|
+
* @export
|
|
45086
|
+
* @interface AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest
|
|
45087
|
+
*/
|
|
45088
|
+
export interface AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest {
|
|
45089
|
+
/**
|
|
45090
|
+
* The identity ID.
|
|
45091
|
+
* @type {string}
|
|
45092
|
+
* @memberof AccessRequestsV2025ApiGetEntitlementDetailsForIdentity
|
|
45093
|
+
*/
|
|
45094
|
+
readonly identityId: string;
|
|
45095
|
+
/**
|
|
45096
|
+
* The entitlement ID
|
|
45097
|
+
* @type {string}
|
|
45098
|
+
* @memberof AccessRequestsV2025ApiGetEntitlementDetailsForIdentity
|
|
45099
|
+
*/
|
|
45100
|
+
readonly entitlementId: string;
|
|
45101
|
+
/**
|
|
45102
|
+
* Use this header to enable this experimental API.
|
|
45103
|
+
* @type {string}
|
|
45104
|
+
* @memberof AccessRequestsV2025ApiGetEntitlementDetailsForIdentity
|
|
45105
|
+
*/
|
|
45106
|
+
readonly xSailPointExperimental?: string;
|
|
45107
|
+
}
|
|
43933
45108
|
/**
|
|
43934
45109
|
* Request parameters for listAccessRequestStatus operation in AccessRequestsV2025Api.
|
|
43935
45110
|
* @export
|
|
@@ -44064,6 +45239,19 @@ export interface AccessRequestsV2025ApiListAdministratorsAccessRequestStatusRequ
|
|
|
44064
45239
|
*/
|
|
44065
45240
|
readonly requestState?: string;
|
|
44066
45241
|
}
|
|
45242
|
+
/**
|
|
45243
|
+
* Request parameters for loadAccountSelections operation in AccessRequestsV2025Api.
|
|
45244
|
+
* @export
|
|
45245
|
+
* @interface AccessRequestsV2025ApiLoadAccountSelectionsRequest
|
|
45246
|
+
*/
|
|
45247
|
+
export interface AccessRequestsV2025ApiLoadAccountSelectionsRequest {
|
|
45248
|
+
/**
|
|
45249
|
+
*
|
|
45250
|
+
* @type {AccountsSelectionRequestV2025}
|
|
45251
|
+
* @memberof AccessRequestsV2025ApiLoadAccountSelections
|
|
45252
|
+
*/
|
|
45253
|
+
readonly accountsSelectionRequestV2025: AccountsSelectionRequestV2025;
|
|
45254
|
+
}
|
|
44067
45255
|
/**
|
|
44068
45256
|
* Request parameters for setAccessRequestConfig operation in AccessRequestsV2025Api.
|
|
44069
45257
|
* @export
|
|
@@ -44121,7 +45309,7 @@ export declare class AccessRequestsV2025Api extends BaseAPI {
|
|
|
44121
45309
|
*/
|
|
44122
45310
|
closeAccessRequest(requestParameters: AccessRequestsV2025ApiCloseAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<object, any>>;
|
|
44123
45311
|
/**
|
|
44124
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
45312
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
44125
45313
|
* @summary Submit Access Request
|
|
44126
45314
|
* @param {AccessRequestsV2025ApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
44127
45315
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -44137,6 +45325,15 @@ export declare class AccessRequestsV2025Api extends BaseAPI {
|
|
|
44137
45325
|
* @memberof AccessRequestsV2025Api
|
|
44138
45326
|
*/
|
|
44139
45327
|
getAccessRequestConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AccessRequestConfigV2025, any>>;
|
|
45328
|
+
/**
|
|
45329
|
+
* Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
|
|
45330
|
+
* @summary Identity Entitlement Details
|
|
45331
|
+
* @param {AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest} requestParameters Request parameters.
|
|
45332
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
45333
|
+
* @throws {RequiredError}
|
|
45334
|
+
* @memberof AccessRequestsV2025Api
|
|
45335
|
+
*/
|
|
45336
|
+
getEntitlementDetailsForIdentity(requestParameters: AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<IdentityEntitlementDetailsV2025, any>>;
|
|
44140
45337
|
/**
|
|
44141
45338
|
* Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
|
|
44142
45339
|
* @summary Access Request Status
|
|
@@ -44155,6 +45352,15 @@ export declare class AccessRequestsV2025Api extends BaseAPI {
|
|
|
44155
45352
|
* @memberof AccessRequestsV2025Api
|
|
44156
45353
|
*/
|
|
44157
45354
|
listAdministratorsAccessRequestStatus(requestParameters?: AccessRequestsV2025ApiListAdministratorsAccessRequestStatusRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AccessRequestAdminItemStatusV2025[], any>>;
|
|
45355
|
+
/**
|
|
45356
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
45357
|
+
* @summary Get accounts selections for identity
|
|
45358
|
+
* @param {AccessRequestsV2025ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
|
|
45359
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
45360
|
+
* @throws {RequiredError}
|
|
45361
|
+
* @memberof AccessRequestsV2025Api
|
|
45362
|
+
*/
|
|
45363
|
+
loadAccountSelections(requestParameters: AccessRequestsV2025ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AccountsSelectionResponseV2025, any>>;
|
|
44158
45364
|
/**
|
|
44159
45365
|
* This endpoint replaces the current access-request configuration.
|
|
44160
45366
|
* @summary Update Access Request Configuration
|
|
@@ -47998,7 +49204,7 @@ export declare const CertificationCampaignsV2025ApiFp: (configuration?: Configur
|
|
|
47998
49204
|
* @param {*} [axiosOptions] Override http request option.
|
|
47999
49205
|
* @throws {RequiredError}
|
|
48000
49206
|
*/
|
|
48001
|
-
getCampaign(id: string, detail?: GetCampaignDetailV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<
|
|
49207
|
+
getCampaign(id: string, detail?: GetCampaignDetailV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetCampaign200ResponseV2025>>;
|
|
48002
49208
|
/**
|
|
48003
49209
|
* Use this API to fetch all reports for a certification campaign by campaign ID.
|
|
48004
49210
|
* @summary Get Campaign Reports
|
|
@@ -48189,7 +49395,7 @@ export declare const CertificationCampaignsV2025ApiFactory: (configuration?: Con
|
|
|
48189
49395
|
* @param {*} [axiosOptions] Override http request option.
|
|
48190
49396
|
* @throws {RequiredError}
|
|
48191
49397
|
*/
|
|
48192
|
-
getCampaign(requestParameters: CertificationCampaignsV2025ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<
|
|
49398
|
+
getCampaign(requestParameters: CertificationCampaignsV2025ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetCampaign200ResponseV2025>;
|
|
48193
49399
|
/**
|
|
48194
49400
|
* Use this API to fetch all reports for a certification campaign by campaign ID.
|
|
48195
49401
|
* @summary Get Campaign Reports
|
|
@@ -48755,7 +49961,7 @@ export declare class CertificationCampaignsV2025Api extends BaseAPI {
|
|
|
48755
49961
|
* @throws {RequiredError}
|
|
48756
49962
|
* @memberof CertificationCampaignsV2025Api
|
|
48757
49963
|
*/
|
|
48758
|
-
getCampaign(requestParameters: CertificationCampaignsV2025ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<
|
|
49964
|
+
getCampaign(requestParameters: CertificationCampaignsV2025ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<GetCampaign200ResponseV2025, any>>;
|
|
48759
49965
|
/**
|
|
48760
49966
|
* Use this API to fetch all reports for a certification campaign by campaign ID.
|
|
48761
49967
|
* @summary Get Campaign Reports
|
|
@@ -55632,6 +56838,13 @@ export declare const GlobalTenantSecuritySettingsV2025ApiAxiosParamCreator: (con
|
|
|
55632
56838
|
* @throws {RequiredError}
|
|
55633
56839
|
*/
|
|
55634
56840
|
createAuthOrgNetworkConfig: (networkConfigurationV2025: NetworkConfigurationV2025, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56841
|
+
/**
|
|
56842
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
56843
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
56844
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56845
|
+
* @throws {RequiredError}
|
|
56846
|
+
*/
|
|
56847
|
+
getAuthOrgLockoutConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
55635
56848
|
/**
|
|
55636
56849
|
* This API returns the details of an org\'s network auth configuration.
|
|
55637
56850
|
* @summary Get security network configuration.
|
|
@@ -55639,6 +56852,28 @@ export declare const GlobalTenantSecuritySettingsV2025ApiAxiosParamCreator: (con
|
|
|
55639
56852
|
* @throws {RequiredError}
|
|
55640
56853
|
*/
|
|
55641
56854
|
getAuthOrgNetworkConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56855
|
+
/**
|
|
56856
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
56857
|
+
* @summary Get Service Provider Configuration.
|
|
56858
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56859
|
+
* @throws {RequiredError}
|
|
56860
|
+
*/
|
|
56861
|
+
getAuthOrgServiceProviderConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56862
|
+
/**
|
|
56863
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
56864
|
+
* @summary Get Auth Org Session Configuration.
|
|
56865
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56866
|
+
* @throws {RequiredError}
|
|
56867
|
+
*/
|
|
56868
|
+
getAuthOrgSessionConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56869
|
+
/**
|
|
56870
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
56871
|
+
* @summary Update Auth Org Lockout Configuration
|
|
56872
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
56873
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56874
|
+
* @throws {RequiredError}
|
|
56875
|
+
*/
|
|
56876
|
+
patchAuthOrgLockoutConfig: (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
55642
56877
|
/**
|
|
55643
56878
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
55644
56879
|
* @summary Update security network configuration.
|
|
@@ -55647,6 +56882,22 @@ export declare const GlobalTenantSecuritySettingsV2025ApiAxiosParamCreator: (con
|
|
|
55647
56882
|
* @throws {RequiredError}
|
|
55648
56883
|
*/
|
|
55649
56884
|
patchAuthOrgNetworkConfig: (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56885
|
+
/**
|
|
56886
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
56887
|
+
* @summary Update Service Provider Configuration
|
|
56888
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
56889
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56890
|
+
* @throws {RequiredError}
|
|
56891
|
+
*/
|
|
56892
|
+
patchAuthOrgServiceProviderConfig: (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
56893
|
+
/**
|
|
56894
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
56895
|
+
* @summary Update Auth Org Session Configuration
|
|
56896
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
56897
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56898
|
+
* @throws {RequiredError}
|
|
56899
|
+
*/
|
|
56900
|
+
patchAuthOrgSessionConfig: (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
55650
56901
|
};
|
|
55651
56902
|
/**
|
|
55652
56903
|
* GlobalTenantSecuritySettingsV2025Api - functional programming interface
|
|
@@ -55661,6 +56912,13 @@ export declare const GlobalTenantSecuritySettingsV2025ApiFp: (configuration?: Co
|
|
|
55661
56912
|
* @throws {RequiredError}
|
|
55662
56913
|
*/
|
|
55663
56914
|
createAuthOrgNetworkConfig(networkConfigurationV2025: NetworkConfigurationV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<NetworkConfigurationV2025>>;
|
|
56915
|
+
/**
|
|
56916
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
56917
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
56918
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56919
|
+
* @throws {RequiredError}
|
|
56920
|
+
*/
|
|
56921
|
+
getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2025>>;
|
|
55664
56922
|
/**
|
|
55665
56923
|
* This API returns the details of an org\'s network auth configuration.
|
|
55666
56924
|
* @summary Get security network configuration.
|
|
@@ -55668,6 +56926,28 @@ export declare const GlobalTenantSecuritySettingsV2025ApiFp: (configuration?: Co
|
|
|
55668
56926
|
* @throws {RequiredError}
|
|
55669
56927
|
*/
|
|
55670
56928
|
getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<NetworkConfigurationV2025>>;
|
|
56929
|
+
/**
|
|
56930
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
56931
|
+
* @summary Get Service Provider Configuration.
|
|
56932
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56933
|
+
* @throws {RequiredError}
|
|
56934
|
+
*/
|
|
56935
|
+
getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2025>>;
|
|
56936
|
+
/**
|
|
56937
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
56938
|
+
* @summary Get Auth Org Session Configuration.
|
|
56939
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56940
|
+
* @throws {RequiredError}
|
|
56941
|
+
*/
|
|
56942
|
+
getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2025>>;
|
|
56943
|
+
/**
|
|
56944
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
56945
|
+
* @summary Update Auth Org Lockout Configuration
|
|
56946
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
56947
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56948
|
+
* @throws {RequiredError}
|
|
56949
|
+
*/
|
|
56950
|
+
patchAuthOrgLockoutConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2025>>;
|
|
55671
56951
|
/**
|
|
55672
56952
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
55673
56953
|
* @summary Update security network configuration.
|
|
@@ -55676,6 +56956,22 @@ export declare const GlobalTenantSecuritySettingsV2025ApiFp: (configuration?: Co
|
|
|
55676
56956
|
* @throws {RequiredError}
|
|
55677
56957
|
*/
|
|
55678
56958
|
patchAuthOrgNetworkConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<NetworkConfigurationV2025>>;
|
|
56959
|
+
/**
|
|
56960
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
56961
|
+
* @summary Update Service Provider Configuration
|
|
56962
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
56963
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56964
|
+
* @throws {RequiredError}
|
|
56965
|
+
*/
|
|
56966
|
+
patchAuthOrgServiceProviderConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2025>>;
|
|
56967
|
+
/**
|
|
56968
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
56969
|
+
* @summary Update Auth Org Session Configuration
|
|
56970
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
56971
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56972
|
+
* @throws {RequiredError}
|
|
56973
|
+
*/
|
|
56974
|
+
patchAuthOrgSessionConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2025>>;
|
|
55679
56975
|
};
|
|
55680
56976
|
/**
|
|
55681
56977
|
* GlobalTenantSecuritySettingsV2025Api - factory interface
|
|
@@ -55690,6 +56986,13 @@ export declare const GlobalTenantSecuritySettingsV2025ApiFactory: (configuration
|
|
|
55690
56986
|
* @throws {RequiredError}
|
|
55691
56987
|
*/
|
|
55692
56988
|
createAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiCreateAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2025>;
|
|
56989
|
+
/**
|
|
56990
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
56991
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
56992
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
56993
|
+
* @throws {RequiredError}
|
|
56994
|
+
*/
|
|
56995
|
+
getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2025>;
|
|
55693
56996
|
/**
|
|
55694
56997
|
* This API returns the details of an org\'s network auth configuration.
|
|
55695
56998
|
* @summary Get security network configuration.
|
|
@@ -55697,6 +57000,28 @@ export declare const GlobalTenantSecuritySettingsV2025ApiFactory: (configuration
|
|
|
55697
57000
|
* @throws {RequiredError}
|
|
55698
57001
|
*/
|
|
55699
57002
|
getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2025>;
|
|
57003
|
+
/**
|
|
57004
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
57005
|
+
* @summary Get Service Provider Configuration.
|
|
57006
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57007
|
+
* @throws {RequiredError}
|
|
57008
|
+
*/
|
|
57009
|
+
getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2025>;
|
|
57010
|
+
/**
|
|
57011
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
57012
|
+
* @summary Get Auth Org Session Configuration.
|
|
57013
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57014
|
+
* @throws {RequiredError}
|
|
57015
|
+
*/
|
|
57016
|
+
getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2025>;
|
|
57017
|
+
/**
|
|
57018
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
57019
|
+
* @summary Update Auth Org Lockout Configuration
|
|
57020
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
|
|
57021
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57022
|
+
* @throws {RequiredError}
|
|
57023
|
+
*/
|
|
57024
|
+
patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2025>;
|
|
55700
57025
|
/**
|
|
55701
57026
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
55702
57027
|
* @summary Update security network configuration.
|
|
@@ -55705,6 +57030,22 @@ export declare const GlobalTenantSecuritySettingsV2025ApiFactory: (configuration
|
|
|
55705
57030
|
* @throws {RequiredError}
|
|
55706
57031
|
*/
|
|
55707
57032
|
patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2025>;
|
|
57033
|
+
/**
|
|
57034
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
57035
|
+
* @summary Update Service Provider Configuration
|
|
57036
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
|
|
57037
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57038
|
+
* @throws {RequiredError}
|
|
57039
|
+
*/
|
|
57040
|
+
patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2025>;
|
|
57041
|
+
/**
|
|
57042
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
57043
|
+
* @summary Update Auth Org Session Configuration
|
|
57044
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
|
|
57045
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57046
|
+
* @throws {RequiredError}
|
|
57047
|
+
*/
|
|
57048
|
+
patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2025>;
|
|
55708
57049
|
};
|
|
55709
57050
|
/**
|
|
55710
57051
|
* Request parameters for createAuthOrgNetworkConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
@@ -55719,6 +57060,19 @@ export interface GlobalTenantSecuritySettingsV2025ApiCreateAuthOrgNetworkConfigR
|
|
|
55719
57060
|
*/
|
|
55720
57061
|
readonly networkConfigurationV2025: NetworkConfigurationV2025;
|
|
55721
57062
|
}
|
|
57063
|
+
/**
|
|
57064
|
+
* Request parameters for patchAuthOrgLockoutConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
57065
|
+
* @export
|
|
57066
|
+
* @interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest
|
|
57067
|
+
*/
|
|
57068
|
+
export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest {
|
|
57069
|
+
/**
|
|
57070
|
+
* A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
57071
|
+
* @type {Array<JsonPatchOperationV2025>}
|
|
57072
|
+
* @memberof GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfig
|
|
57073
|
+
*/
|
|
57074
|
+
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>;
|
|
57075
|
+
}
|
|
55722
57076
|
/**
|
|
55723
57077
|
* Request parameters for patchAuthOrgNetworkConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
55724
57078
|
* @export
|
|
@@ -55732,6 +57086,32 @@ export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgNetworkConfigRe
|
|
|
55732
57086
|
*/
|
|
55733
57087
|
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>;
|
|
55734
57088
|
}
|
|
57089
|
+
/**
|
|
57090
|
+
* Request parameters for patchAuthOrgServiceProviderConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
57091
|
+
* @export
|
|
57092
|
+
* @interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest
|
|
57093
|
+
*/
|
|
57094
|
+
export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest {
|
|
57095
|
+
/**
|
|
57096
|
+
* A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
57097
|
+
* @type {Array<JsonPatchOperationV2025>}
|
|
57098
|
+
* @memberof GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfig
|
|
57099
|
+
*/
|
|
57100
|
+
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>;
|
|
57101
|
+
}
|
|
57102
|
+
/**
|
|
57103
|
+
* Request parameters for patchAuthOrgSessionConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
57104
|
+
* @export
|
|
57105
|
+
* @interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest
|
|
57106
|
+
*/
|
|
57107
|
+
export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest {
|
|
57108
|
+
/**
|
|
57109
|
+
* A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
57110
|
+
* @type {Array<JsonPatchOperationV2025>}
|
|
57111
|
+
* @memberof GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfig
|
|
57112
|
+
*/
|
|
57113
|
+
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>;
|
|
57114
|
+
}
|
|
55735
57115
|
/**
|
|
55736
57116
|
* GlobalTenantSecuritySettingsV2025Api - object-oriented interface
|
|
55737
57117
|
* @export
|
|
@@ -55748,6 +57128,14 @@ export declare class GlobalTenantSecuritySettingsV2025Api extends BaseAPI {
|
|
|
55748
57128
|
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
55749
57129
|
*/
|
|
55750
57130
|
createAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiCreateAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<NetworkConfigurationV2025, any>>;
|
|
57131
|
+
/**
|
|
57132
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
57133
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
57134
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57135
|
+
* @throws {RequiredError}
|
|
57136
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
57137
|
+
*/
|
|
57138
|
+
getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<LockoutConfigurationV2025, any>>;
|
|
55751
57139
|
/**
|
|
55752
57140
|
* This API returns the details of an org\'s network auth configuration.
|
|
55753
57141
|
* @summary Get security network configuration.
|
|
@@ -55756,6 +57144,31 @@ export declare class GlobalTenantSecuritySettingsV2025Api extends BaseAPI {
|
|
|
55756
57144
|
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
55757
57145
|
*/
|
|
55758
57146
|
getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<NetworkConfigurationV2025, any>>;
|
|
57147
|
+
/**
|
|
57148
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
57149
|
+
* @summary Get Service Provider Configuration.
|
|
57150
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57151
|
+
* @throws {RequiredError}
|
|
57152
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
57153
|
+
*/
|
|
57154
|
+
getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ServiceProviderConfigurationV2025, any>>;
|
|
57155
|
+
/**
|
|
57156
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
57157
|
+
* @summary Get Auth Org Session Configuration.
|
|
57158
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57159
|
+
* @throws {RequiredError}
|
|
57160
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
57161
|
+
*/
|
|
57162
|
+
getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SessionConfigurationV2025, any>>;
|
|
57163
|
+
/**
|
|
57164
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
57165
|
+
* @summary Update Auth Org Lockout Configuration
|
|
57166
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
|
|
57167
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57168
|
+
* @throws {RequiredError}
|
|
57169
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
57170
|
+
*/
|
|
57171
|
+
patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<LockoutConfigurationV2025, any>>;
|
|
55759
57172
|
/**
|
|
55760
57173
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
55761
57174
|
* @summary Update security network configuration.
|
|
@@ -55765,6 +57178,24 @@ export declare class GlobalTenantSecuritySettingsV2025Api extends BaseAPI {
|
|
|
55765
57178
|
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
55766
57179
|
*/
|
|
55767
57180
|
patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<NetworkConfigurationV2025, any>>;
|
|
57181
|
+
/**
|
|
57182
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
57183
|
+
* @summary Update Service Provider Configuration
|
|
57184
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
|
|
57185
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57186
|
+
* @throws {RequiredError}
|
|
57187
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
57188
|
+
*/
|
|
57189
|
+
patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ServiceProviderConfigurationV2025, any>>;
|
|
57190
|
+
/**
|
|
57191
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
57192
|
+
* @summary Update Auth Org Session Configuration
|
|
57193
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
|
|
57194
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
57195
|
+
* @throws {RequiredError}
|
|
57196
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
57197
|
+
*/
|
|
57198
|
+
patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SessionConfigurationV2025, any>>;
|
|
55768
57199
|
}
|
|
55769
57200
|
/**
|
|
55770
57201
|
* GovernanceGroupsV2025Api - axios parameter creator
|
|
@@ -76186,11 +77617,11 @@ export declare const ServiceDeskIntegrationV2025ApiAxiosParamCreator: (configura
|
|
|
76186
77617
|
* Update an existing Service Desk integration by ID with a PATCH request.
|
|
76187
77618
|
* @summary Patch a Service Desk Integration
|
|
76188
77619
|
* @param {string} id ID of the Service Desk integration to update
|
|
76189
|
-
* @param {
|
|
77620
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only `replace` operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
|
|
76190
77621
|
* @param {*} [axiosOptions] Override http request option.
|
|
76191
77622
|
* @throws {RequiredError}
|
|
76192
77623
|
*/
|
|
76193
|
-
patchServiceDeskIntegration: (id: string,
|
|
77624
|
+
patchServiceDeskIntegration: (id: string, jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
76194
77625
|
/**
|
|
76195
77626
|
* Update an existing Service Desk integration by ID.
|
|
76196
77627
|
* @summary Update a Service Desk integration
|
|
@@ -76276,11 +77707,11 @@ export declare const ServiceDeskIntegrationV2025ApiFp: (configuration?: Configur
|
|
|
76276
77707
|
* Update an existing Service Desk integration by ID with a PATCH request.
|
|
76277
77708
|
* @summary Patch a Service Desk Integration
|
|
76278
77709
|
* @param {string} id ID of the Service Desk integration to update
|
|
76279
|
-
* @param {
|
|
77710
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only `replace` operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
|
|
76280
77711
|
* @param {*} [axiosOptions] Override http request option.
|
|
76281
77712
|
* @throws {RequiredError}
|
|
76282
77713
|
*/
|
|
76283
|
-
patchServiceDeskIntegration(id: string,
|
|
77714
|
+
patchServiceDeskIntegration(id: string, jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceDeskIntegrationDtoV2025>>;
|
|
76284
77715
|
/**
|
|
76285
77716
|
* Update an existing Service Desk integration by ID.
|
|
76286
77717
|
* @summary Update a Service Desk integration
|
|
@@ -76486,10 +77917,10 @@ export interface ServiceDeskIntegrationV2025ApiPatchServiceDeskIntegrationReques
|
|
|
76486
77917
|
readonly id: string;
|
|
76487
77918
|
/**
|
|
76488
77919
|
* A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only `replace` operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
|
|
76489
|
-
* @type {
|
|
77920
|
+
* @type {Array<JsonPatchOperationV2025>}
|
|
76490
77921
|
* @memberof ServiceDeskIntegrationV2025ApiPatchServiceDeskIntegration
|
|
76491
77922
|
*/
|
|
76492
|
-
readonly
|
|
77923
|
+
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>;
|
|
76493
77924
|
}
|
|
76494
77925
|
/**
|
|
76495
77926
|
* Request parameters for putServiceDeskIntegration operation in ServiceDeskIntegrationV2025Api.
|
|
@@ -76996,13 +78427,12 @@ export declare const SourcesV2025ApiAxiosParamCreator: (configuration?: Configur
|
|
|
76996
78427
|
* Starts an account aggregation on the specified source. If the target source is a delimited file source, then the CSV file needs to be included in the request body. You will also need to set the Content-Type header to `multipart/form-data`.
|
|
76997
78428
|
* @summary Account Aggregation
|
|
76998
78429
|
* @param {string} id Source Id
|
|
76999
|
-
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
77000
78430
|
* @param {File} [file] The CSV file containing the source accounts to aggregate.
|
|
77001
78431
|
* @param {string} [disableOptimization] Use this flag to reprocess every account whether or not the data has changed.
|
|
77002
78432
|
* @param {*} [axiosOptions] Override http request option.
|
|
77003
78433
|
* @throws {RequiredError}
|
|
77004
78434
|
*/
|
|
77005
|
-
importAccounts: (id: string,
|
|
78435
|
+
importAccounts: (id: string, file?: File, disableOptimization?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
77006
78436
|
/**
|
|
77007
78437
|
* This API uploads a source schema template file to configure a source\'s account attributes. To retrieve the file to modify and upload, log into Identity Now. Click **Admin** -> **Connections** -> **Sources** -> **`{SourceName}`** -> **Import Data** -> **Account Schema** -> **Options** -> **Download Schema** >**NOTE: This API is designated only for Delimited File sources.**
|
|
77008
78438
|
* @summary Uploads source accounts schema template
|
|
@@ -77457,13 +78887,12 @@ export declare const SourcesV2025ApiFp: (configuration?: Configuration) => {
|
|
|
77457
78887
|
* Starts an account aggregation on the specified source. If the target source is a delimited file source, then the CSV file needs to be included in the request body. You will also need to set the Content-Type header to `multipart/form-data`.
|
|
77458
78888
|
* @summary Account Aggregation
|
|
77459
78889
|
* @param {string} id Source Id
|
|
77460
|
-
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
77461
78890
|
* @param {File} [file] The CSV file containing the source accounts to aggregate.
|
|
77462
78891
|
* @param {string} [disableOptimization] Use this flag to reprocess every account whether or not the data has changed.
|
|
77463
78892
|
* @param {*} [axiosOptions] Override http request option.
|
|
77464
78893
|
* @throws {RequiredError}
|
|
77465
78894
|
*/
|
|
77466
|
-
importAccounts(id: string,
|
|
78895
|
+
importAccounts(id: string, file?: File, disableOptimization?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LoadAccountsTaskV2025>>;
|
|
77467
78896
|
/**
|
|
77468
78897
|
* This API uploads a source schema template file to configure a source\'s account attributes. To retrieve the file to modify and upload, log into Identity Now. Click **Admin** -> **Connections** -> **Sources** -> **`{SourceName}`** -> **Import Data** -> **Account Schema** -> **Options** -> **Download Schema** >**NOTE: This API is designated only for Delimited File sources.**
|
|
77469
78898
|
* @summary Uploads source accounts schema template
|
|
@@ -78542,12 +79971,6 @@ export interface SourcesV2025ApiImportAccountsRequest {
|
|
|
78542
79971
|
* @memberof SourcesV2025ApiImportAccounts
|
|
78543
79972
|
*/
|
|
78544
79973
|
readonly id: string;
|
|
78545
|
-
/**
|
|
78546
|
-
* Use this header to enable this experimental API.
|
|
78547
|
-
* @type {string}
|
|
78548
|
-
* @memberof SourcesV2025ApiImportAccounts
|
|
78549
|
-
*/
|
|
78550
|
-
readonly xSailPointExperimental?: string;
|
|
78551
79974
|
/**
|
|
78552
79975
|
* The CSV file containing the source accounts to aggregate.
|
|
78553
79976
|
* @type {File}
|