sailpoint-api-client 1.5.0 → 1.6.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/v3/api.d.ts CHANGED
@@ -362,43 +362,43 @@ export interface AccessModelMetadataValuesInner {
362
362
  'status'?: string;
363
363
  }
364
364
  /**
365
- * Access Profile
365
+ * Access profile.
366
366
  * @export
367
367
  * @interface AccessProfile
368
368
  */
369
369
  export interface AccessProfile {
370
370
  /**
371
- * The ID of the Access Profile
371
+ * Access profile ID.
372
372
  * @type {string}
373
373
  * @memberof AccessProfile
374
374
  */
375
375
  'id'?: string;
376
376
  /**
377
- * Name of the Access Profile
377
+ * Access profile name.
378
378
  * @type {string}
379
379
  * @memberof AccessProfile
380
380
  */
381
381
  'name': string;
382
382
  /**
383
- * Information about the Access Profile
383
+ * Access profile description.
384
384
  * @type {string}
385
385
  * @memberof AccessProfile
386
386
  */
387
387
  'description'?: string | null;
388
388
  /**
389
- * Date the Access Profile was created
389
+ * Date and time when the access profile was created.
390
390
  * @type {string}
391
391
  * @memberof AccessProfile
392
392
  */
393
393
  'created'?: string;
394
394
  /**
395
- * Date the Access Profile was last modified.
395
+ * Date and time when the access profile was last modified.
396
396
  * @type {string}
397
397
  * @memberof AccessProfile
398
398
  */
399
399
  'modified'?: string;
400
400
  /**
401
- * Whether the Access Profile is enabled. If the Access Profile is enabled then you must include at least one Entitlement.
401
+ * Indicates whether the access profile is enabled. If it\'s enabled, you must include at least one entitlement.
402
402
  * @type {boolean}
403
403
  * @memberof AccessProfile
404
404
  */
@@ -416,13 +416,13 @@ export interface AccessProfile {
416
416
  */
417
417
  'source': AccessProfileSourceRef;
418
418
  /**
419
- * A list of entitlements associated with the Access Profile. If enabled is false this is allowed to be empty otherwise it needs to contain at least one Entitlement.
419
+ * List of entitlements associated with the access profile. If `enabled` is false, this can be empty. Otherwise, it must contain at least one entitlement.
420
420
  * @type {Array<EntitlementRef>}
421
421
  * @memberof AccessProfile
422
422
  */
423
423
  'entitlements'?: Array<EntitlementRef> | null;
424
424
  /**
425
- * Whether the Access Profile is requestable via access request. Currently, making an Access Profile non-requestable is only supported for customers enabled with the new Request Center. Otherwise, attempting to create an Access Profile with a value **false** in this field results in a 400 error.
425
+ * Indicates whether the access profile is requestable by access request. Currently, making an access profile non-requestable is only supported for customers enabled with the new Request Center. Otherwise, attempting to create an access profile with a value **false** in this field results in a 400 error.
426
426
  * @type {boolean}
427
427
  * @memberof AccessProfile
428
428
  */
@@ -440,7 +440,7 @@ export interface AccessProfile {
440
440
  */
441
441
  'revocationRequestConfig'?: Revocability | null;
442
442
  /**
443
- * List of IDs of segments, if any, to which this Access Profile is assigned.
443
+ * List of segment IDs, if any, that the access profile is assigned to.
444
444
  * @type {Array<string>}
445
445
  * @memberof AccessProfile
446
446
  */
@@ -459,13 +459,13 @@ export interface AccessProfile {
459
459
  */
460
460
  export interface AccessProfileApprovalScheme {
461
461
  /**
462
- * Describes the individual or group that is responsible for an approval step. Values are as follows. **APP_OWNER**: The owner of the Application **OWNER**: Owner of the associated Access Profile or Role **SOURCE_OWNER**: Owner of the Source associated with an Access Profile **MANAGER**: Manager of the Identity making the request **GOVERNANCE_GROUP**: A Governance Group, the ID of which is specified by the **approverId** field
462
+ * Describes the individual or group that is responsible for an approval step. These are the possible values: **APP_OWNER**: The owner of the Application **OWNER**: Owner of the associated Access Profile or Role **SOURCE_OWNER**: Owner of the Source associated with an Access Profile **MANAGER**: Manager of the Identity making the request **GOVERNANCE_GROUP**: A Governance Group, the ID of which is specified by the **approverId** field
463
463
  * @type {string}
464
464
  * @memberof AccessProfileApprovalScheme
465
465
  */
466
466
  'approverType'?: AccessProfileApprovalSchemeApproverTypeV3;
467
467
  /**
468
- * Id of the specific approver, used only when approverType is GOVERNANCE_GROUP
468
+ * Specific approver ID. Only use this when the `approverType` is `GOVERNANCE_GROUP`.
469
469
  * @type {string}
470
470
  * @memberof AccessProfileApprovalScheme
471
471
  */
@@ -948,19 +948,19 @@ export interface AccessProfileRole {
948
948
  */
949
949
  export interface AccessProfileSourceRef {
950
950
  /**
951
- * The ID of the Source with with which the Access Profile is associated
951
+ * ID of the source the access profile is associated with.
952
952
  * @type {string}
953
953
  * @memberof AccessProfileSourceRef
954
954
  */
955
955
  'id'?: string;
956
956
  /**
957
- * The type of the Source, will always be SOURCE
957
+ * Source\'s DTO type.
958
958
  * @type {string}
959
959
  * @memberof AccessProfileSourceRef
960
960
  */
961
961
  'type'?: AccessProfileSourceRefTypeV3;
962
962
  /**
963
- * The display name of the associated Source
963
+ * Source name.
964
964
  * @type {string}
965
965
  * @memberof AccessProfileSourceRef
966
966
  */
@@ -1105,6 +1105,12 @@ export interface AccessRequest {
1105
1105
  'clientMetadata'?: {
1106
1106
  [key: string]: string;
1107
1107
  };
1108
+ /**
1109
+ * Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
1110
+ * @type {Array<RequestedForDtoRef>}
1111
+ * @memberof AccessRequest
1112
+ */
1113
+ 'requestedForWithRequestedItems'?: Array<RequestedForDtoRef> | null;
1108
1114
  }
1109
1115
  /**
1110
1116
  *
@@ -1187,6 +1193,18 @@ export interface AccessRequestItem {
1187
1193
  * @memberof AccessRequestItem
1188
1194
  */
1189
1195
  'removeDate'?: string;
1196
+ /**
1197
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
1198
+ * @type {string}
1199
+ * @memberof AccessRequestItem
1200
+ */
1201
+ 'assignmentId'?: string | null;
1202
+ /**
1203
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
1204
+ * @type {string}
1205
+ * @memberof AccessRequestItem
1206
+ */
1207
+ 'nativeIdentity'?: string | null;
1190
1208
  }
1191
1209
  export declare const AccessRequestItemTypeV3: {
1192
1210
  readonly AccessProfile: "ACCESS_PROFILE";
@@ -2461,6 +2479,25 @@ export interface AccountAttributesCreateAttributes {
2461
2479
  */
2462
2480
  'sourceId': string;
2463
2481
  }
2482
+ /**
2483
+ *
2484
+ * @export
2485
+ * @interface AccountItemRef
2486
+ */
2487
+ export interface AccountItemRef {
2488
+ /**
2489
+ * The uuid for the account, available under the \'objectguid\' attribute
2490
+ * @type {string}
2491
+ * @memberof AccountItemRef
2492
+ */
2493
+ 'accountUuid'?: string | null;
2494
+ /**
2495
+ * The \'distinguishedName\' attribute for the account
2496
+ * @type {string}
2497
+ * @memberof AccountItemRef
2498
+ */
2499
+ 'nativeIdentity'?: string;
2500
+ }
2464
2501
  /**
2465
2502
  *
2466
2503
  * @export
@@ -3507,6 +3544,7 @@ export declare const AttributeDefinitionType: {
3507
3544
  readonly Long: "LONG";
3508
3545
  readonly Int: "INT";
3509
3546
  readonly Boolean: "BOOLEAN";
3547
+ readonly Date: "DATE";
3510
3548
  };
3511
3549
  export type AttributeDefinitionType = typeof AttributeDefinitionType[keyof typeof AttributeDefinitionType];
3512
3550
  /**
@@ -9558,6 +9596,182 @@ export declare const GetActiveCampaigns200ResponseInnerMandatoryCommentRequireme
9558
9596
  readonly NoDecisions: "NO_DECISIONS";
9559
9597
  };
9560
9598
  export type GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = typeof GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3[keyof typeof GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3];
9599
+ /**
9600
+ *
9601
+ * @export
9602
+ * @interface GetCampaign200Response
9603
+ */
9604
+ export interface GetCampaign200Response {
9605
+ /**
9606
+ * Id of the campaign
9607
+ * @type {string}
9608
+ * @memberof GetCampaign200Response
9609
+ */
9610
+ 'id'?: string;
9611
+ /**
9612
+ * The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
9613
+ * @type {string}
9614
+ * @memberof GetCampaign200Response
9615
+ */
9616
+ 'name': string;
9617
+ /**
9618
+ * The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
9619
+ * @type {string}
9620
+ * @memberof GetCampaign200Response
9621
+ */
9622
+ 'description': string | null;
9623
+ /**
9624
+ * The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
9625
+ * @type {string}
9626
+ * @memberof GetCampaign200Response
9627
+ */
9628
+ 'deadline'?: string;
9629
+ /**
9630
+ * The type of campaign. Could be extended in the future.
9631
+ * @type {string}
9632
+ * @memberof GetCampaign200Response
9633
+ */
9634
+ 'type': GetCampaign200ResponseTypeV3;
9635
+ /**
9636
+ * Enables email notification for this campaign
9637
+ * @type {boolean}
9638
+ * @memberof GetCampaign200Response
9639
+ */
9640
+ 'emailNotificationEnabled'?: boolean;
9641
+ /**
9642
+ * Allows auto revoke for this campaign
9643
+ * @type {boolean}
9644
+ * @memberof GetCampaign200Response
9645
+ */
9646
+ 'autoRevokeAllowed'?: boolean;
9647
+ /**
9648
+ * Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
9649
+ * @type {boolean}
9650
+ * @memberof GetCampaign200Response
9651
+ */
9652
+ 'recommendationsEnabled'?: boolean;
9653
+ /**
9654
+ * The campaign\'s current status.
9655
+ * @type {string}
9656
+ * @memberof GetCampaign200Response
9657
+ */
9658
+ 'status'?: GetCampaign200ResponseStatusV3;
9659
+ /**
9660
+ * The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
9661
+ * @type {string}
9662
+ * @memberof GetCampaign200Response
9663
+ */
9664
+ 'correlatedStatus'?: GetCampaign200ResponseCorrelatedStatusV3;
9665
+ /**
9666
+ * Created time of the campaign
9667
+ * @type {string}
9668
+ * @memberof GetCampaign200Response
9669
+ */
9670
+ 'created'?: string;
9671
+ /**
9672
+ * The total number of certifications in this campaign.
9673
+ * @type {number}
9674
+ * @memberof GetCampaign200Response
9675
+ */
9676
+ 'totalCertifications'?: number;
9677
+ /**
9678
+ * The number of completed certifications in this campaign.
9679
+ * @type {number}
9680
+ * @memberof GetCampaign200Response
9681
+ */
9682
+ 'completedCertifications'?: number;
9683
+ /**
9684
+ * A list of errors and warnings that have accumulated.
9685
+ * @type {Array<CampaignAlert>}
9686
+ * @memberof GetCampaign200Response
9687
+ */
9688
+ 'alerts'?: Array<CampaignAlert>;
9689
+ /**
9690
+ * Modified time of the campaign
9691
+ * @type {string}
9692
+ * @memberof GetCampaign200Response
9693
+ */
9694
+ 'modified'?: string;
9695
+ /**
9696
+ *
9697
+ * @type {CampaignAllOfFilter}
9698
+ * @memberof GetCampaign200Response
9699
+ */
9700
+ 'filter'?: CampaignAllOfFilter;
9701
+ /**
9702
+ * Determines if comments on sunset date changes are required.
9703
+ * @type {boolean}
9704
+ * @memberof GetCampaign200Response
9705
+ */
9706
+ 'sunsetCommentsRequired'?: boolean;
9707
+ /**
9708
+ *
9709
+ * @type {CampaignAllOfSourceOwnerCampaignInfo}
9710
+ * @memberof GetCampaign200Response
9711
+ */
9712
+ 'sourceOwnerCampaignInfo'?: CampaignAllOfSourceOwnerCampaignInfo;
9713
+ /**
9714
+ *
9715
+ * @type {CampaignAllOfSearchCampaignInfo}
9716
+ * @memberof GetCampaign200Response
9717
+ */
9718
+ 'searchCampaignInfo'?: CampaignAllOfSearchCampaignInfo;
9719
+ /**
9720
+ *
9721
+ * @type {CampaignAllOfRoleCompositionCampaignInfo}
9722
+ * @memberof GetCampaign200Response
9723
+ */
9724
+ 'roleCompositionCampaignInfo'?: CampaignAllOfRoleCompositionCampaignInfo;
9725
+ /**
9726
+ *
9727
+ * @type {CampaignAllOfMachineAccountCampaignInfo}
9728
+ * @memberof GetCampaign200Response
9729
+ */
9730
+ 'machineAccountCampaignInfo'?: CampaignAllOfMachineAccountCampaignInfo;
9731
+ /**
9732
+ * A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
9733
+ * @type {Array<CampaignAllOfSourcesWithOrphanEntitlements>}
9734
+ * @memberof GetCampaign200Response
9735
+ */
9736
+ 'sourcesWithOrphanEntitlements'?: Array<CampaignAllOfSourcesWithOrphanEntitlements>;
9737
+ /**
9738
+ * Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
9739
+ * @type {string}
9740
+ * @memberof GetCampaign200Response
9741
+ */
9742
+ 'mandatoryCommentRequirement'?: GetCampaign200ResponseMandatoryCommentRequirementV3;
9743
+ }
9744
+ export declare const GetCampaign200ResponseTypeV3: {
9745
+ readonly Manager: "MANAGER";
9746
+ readonly SourceOwner: "SOURCE_OWNER";
9747
+ readonly Search: "SEARCH";
9748
+ readonly RoleComposition: "ROLE_COMPOSITION";
9749
+ readonly MachineAccount: "MACHINE_ACCOUNT";
9750
+ };
9751
+ export type GetCampaign200ResponseTypeV3 = typeof GetCampaign200ResponseTypeV3[keyof typeof GetCampaign200ResponseTypeV3];
9752
+ export declare const GetCampaign200ResponseStatusV3: {
9753
+ readonly Pending: "PENDING";
9754
+ readonly Staged: "STAGED";
9755
+ readonly Canceling: "CANCELING";
9756
+ readonly Activating: "ACTIVATING";
9757
+ readonly Active: "ACTIVE";
9758
+ readonly Completing: "COMPLETING";
9759
+ readonly Completed: "COMPLETED";
9760
+ readonly Error: "ERROR";
9761
+ readonly Archived: "ARCHIVED";
9762
+ };
9763
+ export type GetCampaign200ResponseStatusV3 = typeof GetCampaign200ResponseStatusV3[keyof typeof GetCampaign200ResponseStatusV3];
9764
+ export declare const GetCampaign200ResponseCorrelatedStatusV3: {
9765
+ readonly Correlated: "CORRELATED";
9766
+ readonly Uncorrelated: "UNCORRELATED";
9767
+ };
9768
+ export type GetCampaign200ResponseCorrelatedStatusV3 = typeof GetCampaign200ResponseCorrelatedStatusV3[keyof typeof GetCampaign200ResponseCorrelatedStatusV3];
9769
+ export declare const GetCampaign200ResponseMandatoryCommentRequirementV3: {
9770
+ readonly AllDecisions: "ALL_DECISIONS";
9771
+ readonly RevokeOnlyDecisions: "REVOKE_ONLY_DECISIONS";
9772
+ readonly NoDecisions: "NO_DECISIONS";
9773
+ };
9774
+ export type GetCampaign200ResponseMandatoryCommentRequirementV3 = typeof GetCampaign200ResponseMandatoryCommentRequirementV3[keyof typeof GetCampaign200ResponseMandatoryCommentRequirementV3];
9561
9775
  /**
9562
9776
  * @type GetDiscoveredApplications200ResponseInner
9563
9777
  * @export
@@ -11286,7 +11500,7 @@ export interface IdpDetails {
11286
11500
  * @type {string}
11287
11501
  * @memberof IdpDetails
11288
11502
  */
11289
- 'authContext'?: string;
11503
+ 'authnContext'?: string;
11290
11504
  /**
11291
11505
  * The IDP logout URL. Used with IDP configurations.
11292
11506
  * @type {string}
@@ -11298,7 +11512,7 @@ export interface IdpDetails {
11298
11512
  * @type {boolean}
11299
11513
  * @memberof IdpDetails
11300
11514
  */
11301
- 'includeAuthContext'?: boolean;
11515
+ 'includeAuthnContext'?: boolean;
11302
11516
  /**
11303
11517
  * The name id format to use. Used with IDP configurations.
11304
11518
  * @type {string}
@@ -11334,7 +11548,7 @@ export interface IdpDetails {
11334
11548
  * @type {string}
11335
11549
  * @memberof IdpDetails
11336
11550
  */
11337
- 'mappingAttribute'?: string;
11551
+ 'mappingAttribute': string;
11338
11552
  /**
11339
11553
  * The expiration date extracted from the certificate.
11340
11554
  * @type {string}
@@ -11350,6 +11564,7 @@ export interface IdpDetails {
11350
11564
  }
11351
11565
  export declare const IdpDetailsRoleV3: {
11352
11566
  readonly SamlIdp: "SAML_IDP";
11567
+ readonly SamlSp: "SAML_SP";
11353
11568
  };
11354
11569
  export type IdpDetailsRoleV3 = typeof IdpDetailsRoleV3[keyof typeof IdpDetailsRoleV3];
11355
11570
  /**
@@ -14500,7 +14715,7 @@ export declare const OwnerDtoTypeV3: {
14500
14715
  };
14501
14716
  export type OwnerDtoTypeV3 = typeof OwnerDtoTypeV3[keyof typeof OwnerDtoTypeV3];
14502
14717
  /**
14503
- * The owner of this object.
14718
+ * Owner of the object.
14504
14719
  * @export
14505
14720
  * @interface OwnerReference
14506
14721
  */
@@ -14512,13 +14727,13 @@ export interface OwnerReference {
14512
14727
  */
14513
14728
  'type'?: OwnerReferenceTypeV3;
14514
14729
  /**
14515
- * Identity id
14730
+ * Owner\'s identity ID.
14516
14731
  * @type {string}
14517
14732
  * @memberof OwnerReference
14518
14733
  */
14519
14734
  'id'?: string;
14520
14735
  /**
14521
- * Human-readable display name of the owner. It may be left null or omitted in a POST or PATCH. If set, it must match the current value of the owner\'s display name, otherwise a 400 Bad Request error will result.
14736
+ * Owner\'s name. It may be left null or omitted in a POST or PATCH. If set, it must match the current value of the owner\'s display name, otherwise a 400 Bad Request error will result.
14522
14737
  * @type {string}
14523
14738
  * @memberof OwnerReference
14524
14739
  */
@@ -15082,19 +15297,6 @@ export declare const PatOwnerTypeV3: {
15082
15297
  readonly Identity: "IDENTITY";
15083
15298
  };
15084
15299
  export type PatOwnerTypeV3 = typeof PatOwnerTypeV3[keyof typeof PatOwnerTypeV3];
15085
- /**
15086
- * A JSONPatch document as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902). Only `replace` operations are accepted by this endpoint.
15087
- * @export
15088
- * @interface PatchServiceDeskIntegrationRequest
15089
- */
15090
- export interface PatchServiceDeskIntegrationRequest {
15091
- /**
15092
- * Operations to be applied
15093
- * @type {Array<JsonPatchOperation>}
15094
- * @memberof PatchServiceDeskIntegrationRequest
15095
- */
15096
- 'operations'?: Array<JsonPatchOperation>;
15097
- }
15098
15300
  /**
15099
15301
  *
15100
15302
  * @export
@@ -15413,7 +15615,7 @@ export interface ProvisioningConfigPlanInitializerScript {
15413
15615
  'source'?: string;
15414
15616
  }
15415
15617
  /**
15416
- * Defines matching criteria for an Account to be provisioned with a specific Access Profile
15618
+ * Defines matching criteria for an account to be provisioned with a specific access profile.
15417
15619
  * @export
15418
15620
  * @interface ProvisioningCriteriaLevel1
15419
15621
  */
@@ -15425,26 +15627,26 @@ export interface ProvisioningCriteriaLevel1 {
15425
15627
  */
15426
15628
  'operation'?: ProvisioningCriteriaOperation;
15427
15629
  /**
15428
- * Name of the Account attribute to be tested. If **operation** is one of EQUALS, NOT_EQUALS, CONTAINS, or HAS, this field is required. Otherwise, specifying it is an error.
15630
+ * Name of the account attribute to be tested. If **operation** is one of `EQUALS`, `NOT_EQUALS`, `CONTAINS`, or `HAS`, this field is required. Otherwise, specifying it results in an error.
15429
15631
  * @type {string}
15430
15632
  * @memberof ProvisioningCriteriaLevel1
15431
15633
  */
15432
15634
  'attribute'?: string | null;
15433
15635
  /**
15434
- * String value to test the Account attribute w/r/t the specified operation. If the operation is one of EQUALS, NOT_EQUALS, or CONTAINS, this field is required. Otherwise, specifying it is an error. If the Attribute is not String-typed, it will be converted to the appropriate type.
15636
+ * String value to test the account attribute w/r/t the specified operation. If the operation is one of `EQUALS`, `NOT_EQUALS`, or `CONTAINS`, this field is required. Otherwise, specifying it results in an error. If the attribute is not string-typed, the API will convert it to the appropriate type.
15435
15637
  * @type {string}
15436
15638
  * @memberof ProvisioningCriteriaLevel1
15437
15639
  */
15438
15640
  'value'?: string | null;
15439
15641
  /**
15440
- * Array of child criteria. Required if the operation is AND or OR, otherwise it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
15642
+ * Array of child criteria. This field is required if the operation is `AND` or `OR`. Otherwise, it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
15441
15643
  * @type {Array<ProvisioningCriteriaLevel2>}
15442
15644
  * @memberof ProvisioningCriteriaLevel1
15443
15645
  */
15444
15646
  'children'?: Array<ProvisioningCriteriaLevel2> | null;
15445
15647
  }
15446
15648
  /**
15447
- * Defines matching criteria for an Account to be provisioned with a specific Access Profile
15649
+ * Defines matching criteria for an account to be provisioned with a specific access profile.
15448
15650
  * @export
15449
15651
  * @interface ProvisioningCriteriaLevel2
15450
15652
  */
@@ -15456,26 +15658,26 @@ export interface ProvisioningCriteriaLevel2 {
15456
15658
  */
15457
15659
  'operation'?: ProvisioningCriteriaOperation;
15458
15660
  /**
15459
- * Name of the Account attribute to be tested. If **operation** is one of EQUALS, NOT_EQUALS, CONTAINS, or HAS, this field is required. Otherwise, specifying it is an error.
15661
+ * Name of the account attribute to be tested. If **operation** is one of `EQUALS`, `NOT_EQUALS`, `CONTAINS`, or `HAS`, this field is required. Otherwise, specifying it results in an error.
15460
15662
  * @type {string}
15461
15663
  * @memberof ProvisioningCriteriaLevel2
15462
15664
  */
15463
15665
  'attribute'?: string | null;
15464
15666
  /**
15465
- * String value to test the Account attribute w/r/t the specified operation. If the operation is one of EQUALS, NOT_EQUALS, or CONTAINS, this field is required. Otherwise, specifying it is an error. If the Attribute is not String-typed, it will be converted to the appropriate type.
15667
+ * String value to test the account attribute w/r/t the specified operation. If the operation is one of `EQUALS`, `NOT_EQUALS`, or `CONTAINS`, this field is required. Otherwise, specifying it results in an error. If the attribute is not string-typed, the API will convert it to the appropriate type.
15466
15668
  * @type {string}
15467
15669
  * @memberof ProvisioningCriteriaLevel2
15468
15670
  */
15469
15671
  'value'?: string | null;
15470
15672
  /**
15471
- * Array of child criteria. Required if the operation is AND or OR, otherwise it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
15673
+ * Array of child criteria. This field is required if the operation is `AND` or `OR`. Otherwise, it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
15472
15674
  * @type {Array<ProvisioningCriteriaLevel3>}
15473
15675
  * @memberof ProvisioningCriteriaLevel2
15474
15676
  */
15475
15677
  'children'?: Array<ProvisioningCriteriaLevel3> | null;
15476
15678
  }
15477
15679
  /**
15478
- * Defines matching criteria for an Account to be provisioned with a specific Access Profile
15680
+ * Defines matching criteria for an account to be provisioned with a specific access profile.
15479
15681
  * @export
15480
15682
  * @interface ProvisioningCriteriaLevel3
15481
15683
  */
@@ -15487,26 +15689,26 @@ export interface ProvisioningCriteriaLevel3 {
15487
15689
  */
15488
15690
  'operation'?: ProvisioningCriteriaOperation;
15489
15691
  /**
15490
- * Name of the Account attribute to be tested. If **operation** is one of EQUALS, NOT_EQUALS, CONTAINS, or HAS, this field is required. Otherwise, specifying it is an error.
15692
+ * Name of the account attribute to be tested. If **operation** is one of `EQUALS`, `NOT_EQUALS`, `CONTAINS`, or `HAS`, this field is required. Otherwise, specifying it results in an error.
15491
15693
  * @type {string}
15492
15694
  * @memberof ProvisioningCriteriaLevel3
15493
15695
  */
15494
15696
  'attribute'?: string | null;
15495
15697
  /**
15496
- * String value to test the Account attribute w/r/t the specified operation. If the operation is one of EQUALS, NOT_EQUALS, or CONTAINS, this field is required. Otherwise, specifying it is an error. If the Attribute is not String-typed, it will be converted to the appropriate type.
15698
+ * String value to test the account attribute w/r/t the specified operation. If the operation is one of `EQUALS`, `NOT_EQUALS`, or `CONTAINS`, this field is required. Otherwise, specifying it results in an error. If the attribute is not string-typed, the API will convert it to the appropriate type.
15497
15699
  * @type {string}
15498
15700
  * @memberof ProvisioningCriteriaLevel3
15499
15701
  */
15500
- 'value'?: string;
15702
+ 'value'?: string | null;
15501
15703
  /**
15502
- * Array of child criteria. Required if the operation is AND or OR, otherwise it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
15704
+ * Array of child criteria. This field is required if the operation is `AND` or `OR`. Otherwise, it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
15503
15705
  * @type {string}
15504
15706
  * @memberof ProvisioningCriteriaLevel3
15505
15707
  */
15506
15708
  'children'?: string | null;
15507
15709
  }
15508
15710
  /**
15509
- * Supported operations on ProvisioningCriteria
15711
+ * Supported operations on `ProvisioningCriteria`.
15510
15712
  * @export
15511
15713
  * @enum {string}
15512
15714
  */
@@ -15543,7 +15745,7 @@ export interface ProvisioningPolicy {
15543
15745
  * @type {string}
15544
15746
  * @memberof ProvisioningPolicy
15545
15747
  */
15546
- 'name': string;
15748
+ 'name': string | null;
15547
15749
  /**
15548
15750
  * the description of the provisioning policy
15549
15751
  * @type {string}
@@ -15574,7 +15776,7 @@ export interface ProvisioningPolicyDto {
15574
15776
  * @type {string}
15575
15777
  * @memberof ProvisioningPolicyDto
15576
15778
  */
15577
- 'name': string;
15779
+ 'name': string | null;
15578
15780
  /**
15579
15781
  * the description of the provisioning policy
15580
15782
  * @type {string}
@@ -16556,19 +16758,25 @@ export interface RequestOnBehalfOfConfig {
16556
16758
  */
16557
16759
  export interface Requestability {
16558
16760
  /**
16559
- * Whether the requester of the containing object must provide comments justifying the request
16761
+ * Indicates whether the requester of the containing object must provide comments justifying the request.
16560
16762
  * @type {boolean}
16561
16763
  * @memberof Requestability
16562
16764
  */
16563
16765
  'commentsRequired'?: boolean | null;
16564
16766
  /**
16565
- * Whether an approver must provide comments when denying the request
16767
+ * Indicates whether an approver must provide comments when denying the request.
16566
16768
  * @type {boolean}
16567
16769
  * @memberof Requestability
16568
16770
  */
16569
16771
  'denialCommentsRequired'?: boolean | null;
16570
16772
  /**
16571
- * List describing the steps in approving the request
16773
+ * Indicates whether reauthorization is required for the request.
16774
+ * @type {boolean}
16775
+ * @memberof Requestability
16776
+ */
16777
+ 'reauthorizationRequired'?: boolean | null;
16778
+ /**
16779
+ * List describing the steps involved in approving the request.
16572
16780
  * @type {Array<AccessProfileApprovalScheme>}
16573
16781
  * @memberof Requestability
16574
16782
  */
@@ -16592,6 +16800,12 @@ export interface RequestabilityForRole {
16592
16800
  * @memberof RequestabilityForRole
16593
16801
  */
16594
16802
  'denialCommentsRequired'?: boolean | null;
16803
+ /**
16804
+ * Indicates whether reauthorization is required for the request.
16805
+ * @type {boolean}
16806
+ * @memberof RequestabilityForRole
16807
+ */
16808
+ 'reauthorizationRequired'?: boolean | null;
16595
16809
  /**
16596
16810
  * List describing the steps in approving the request
16597
16811
  * @type {Array<ApprovalSchemeForRole>}
@@ -16762,6 +16976,25 @@ export interface RequestedAccountRef {
16762
16976
  */
16763
16977
  'sourceName'?: string;
16764
16978
  }
16979
+ /**
16980
+ *
16981
+ * @export
16982
+ * @interface RequestedForDtoRef
16983
+ */
16984
+ export interface RequestedForDtoRef {
16985
+ /**
16986
+ * The identity id for which the access is requested
16987
+ * @type {string}
16988
+ * @memberof RequestedForDtoRef
16989
+ */
16990
+ 'identityId': string;
16991
+ /**
16992
+ * the details for the access items that are requested for the identity
16993
+ * @type {Array<RequestedItemDtoRef>}
16994
+ * @memberof RequestedForDtoRef
16995
+ */
16996
+ 'requestedItems': Array<RequestedItemDtoRef>;
16997
+ }
16765
16998
  /**
16766
16999
  *
16767
17000
  * @export
@@ -16787,6 +17020,69 @@ export declare const RequestedItemDetailsTypeV3: {
16787
17020
  readonly Role: "ROLE";
16788
17021
  };
16789
17022
  export type RequestedItemDetailsTypeV3 = typeof RequestedItemDetailsTypeV3[keyof typeof RequestedItemDetailsTypeV3];
17023
+ /**
17024
+ *
17025
+ * @export
17026
+ * @interface RequestedItemDtoRef
17027
+ */
17028
+ export interface RequestedItemDtoRef {
17029
+ /**
17030
+ * The type of the item being requested.
17031
+ * @type {string}
17032
+ * @memberof RequestedItemDtoRef
17033
+ */
17034
+ 'type': RequestedItemDtoRefTypeV3;
17035
+ /**
17036
+ * ID of Role, Access Profile or Entitlement being requested.
17037
+ * @type {string}
17038
+ * @memberof RequestedItemDtoRef
17039
+ */
17040
+ 'id': string;
17041
+ /**
17042
+ * Comment provided by requester. * Comment is required when the request is of type Revoke Access.
17043
+ * @type {string}
17044
+ * @memberof RequestedItemDtoRef
17045
+ */
17046
+ 'comment'?: string;
17047
+ /**
17048
+ * Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
17049
+ * @type {{ [key: string]: string; }}
17050
+ * @memberof RequestedItemDtoRef
17051
+ */
17052
+ 'clientMetadata'?: {
17053
+ [key: string]: string;
17054
+ };
17055
+ /**
17056
+ * The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
17057
+ * @type {string}
17058
+ * @memberof RequestedItemDtoRef
17059
+ */
17060
+ 'removeDate'?: string;
17061
+ /**
17062
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
17063
+ * @type {string}
17064
+ * @memberof RequestedItemDtoRef
17065
+ */
17066
+ 'assignmentId'?: string | null;
17067
+ /**
17068
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
17069
+ * @type {string}
17070
+ * @memberof RequestedItemDtoRef
17071
+ */
17072
+ 'nativeIdentity'?: string | null;
17073
+ /**
17074
+ * The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
17075
+ * @type {Array<SourceItemRef>}
17076
+ * @memberof RequestedItemDtoRef
17077
+ */
17078
+ 'accountSelection'?: Array<SourceItemRef> | null;
17079
+ }
17080
+ export declare const RequestedItemDtoRefTypeV3: {
17081
+ readonly AccessProfile: "ACCESS_PROFILE";
17082
+ readonly Role: "ROLE";
17083
+ readonly Entitlement: "ENTITLEMENT";
17084
+ };
17085
+ export type RequestedItemDtoRefTypeV3 = typeof RequestedItemDtoRefTypeV3[keyof typeof RequestedItemDtoRefTypeV3];
16790
17086
  /**
16791
17087
  *
16792
17088
  * @export
@@ -17638,7 +17934,7 @@ export type ReviewerTypeV3 = typeof ReviewerTypeV3[keyof typeof ReviewerTypeV3];
17638
17934
  */
17639
17935
  export interface Revocability {
17640
17936
  /**
17641
- * List describing the steps in approving the revocation request
17937
+ * List describing the steps involved in approving the revocation request.
17642
17938
  * @type {Array<AccessProfileApprovalScheme>}
17643
17939
  * @memberof Revocability
17644
17940
  */
@@ -20147,10 +20443,119 @@ export interface ServiceProviderConfiguration {
20147
20443
  'federationProtocolDetails'?: Array<ServiceProviderConfigurationFederationProtocolDetailsInner>;
20148
20444
  }
20149
20445
  /**
20150
- * @type ServiceProviderConfigurationFederationProtocolDetailsInner
20446
+ *
20151
20447
  * @export
20448
+ * @interface ServiceProviderConfigurationFederationProtocolDetailsInner
20152
20449
  */
20153
- export type ServiceProviderConfigurationFederationProtocolDetailsInner = IdpDetails | SpDetails;
20450
+ export interface ServiceProviderConfigurationFederationProtocolDetailsInner {
20451
+ /**
20452
+ * Federation protocol role
20453
+ * @type {string}
20454
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20455
+ */
20456
+ 'role'?: ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3;
20457
+ /**
20458
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
20459
+ * @type {string}
20460
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20461
+ */
20462
+ 'entityId'?: string;
20463
+ /**
20464
+ * Defines the binding used for the SAML flow. Used with IDP configurations.
20465
+ * @type {string}
20466
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20467
+ */
20468
+ 'binding'?: string;
20469
+ /**
20470
+ * Specifies the SAML authentication method to use. Used with IDP configurations.
20471
+ * @type {string}
20472
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20473
+ */
20474
+ 'authnContext'?: string;
20475
+ /**
20476
+ * The IDP logout URL. Used with IDP configurations.
20477
+ * @type {string}
20478
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20479
+ */
20480
+ 'logoutUrl'?: string;
20481
+ /**
20482
+ * Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
20483
+ * @type {boolean}
20484
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20485
+ */
20486
+ 'includeAuthnContext'?: boolean;
20487
+ /**
20488
+ * The name id format to use. Used with IDP configurations.
20489
+ * @type {string}
20490
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20491
+ */
20492
+ 'nameId'?: string;
20493
+ /**
20494
+ *
20495
+ * @type {JITConfiguration}
20496
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20497
+ */
20498
+ 'jitConfiguration'?: JITConfiguration;
20499
+ /**
20500
+ * The Base64-encoded certificate used by the IDP. Used with IDP configurations.
20501
+ * @type {string}
20502
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20503
+ */
20504
+ 'cert'?: string;
20505
+ /**
20506
+ * The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
20507
+ * @type {string}
20508
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20509
+ */
20510
+ 'loginUrlPost'?: string;
20511
+ /**
20512
+ * The IDP Redirect URL. Used with IDP configurations.
20513
+ * @type {string}
20514
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20515
+ */
20516
+ 'loginUrlRedirect'?: string;
20517
+ /**
20518
+ * Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
20519
+ * @type {string}
20520
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20521
+ */
20522
+ 'mappingAttribute': string;
20523
+ /**
20524
+ * The expiration date extracted from the certificate.
20525
+ * @type {string}
20526
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20527
+ */
20528
+ 'certificateExpirationDate'?: string;
20529
+ /**
20530
+ * The name extracted from the certificate.
20531
+ * @type {string}
20532
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20533
+ */
20534
+ 'certificateName'?: string;
20535
+ /**
20536
+ * Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
20537
+ * @type {string}
20538
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20539
+ */
20540
+ 'alias'?: string;
20541
+ /**
20542
+ * The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
20543
+ * @type {string}
20544
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20545
+ */
20546
+ 'callbackUrl': string;
20547
+ /**
20548
+ * The legacy ACS URL used for SAML authentication. Used with SP configurations.
20549
+ * @type {string}
20550
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
20551
+ */
20552
+ 'legacyAcsUrl'?: string;
20553
+ }
20554
+ export declare const ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3: {
20555
+ readonly SamlIdp: "SAML_IDP";
20556
+ readonly SamlSp: "SAML_SP";
20557
+ };
20558
+ export type ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = typeof ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3[keyof typeof ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3];
20154
20559
  /**
20155
20560
  *
20156
20561
  * @export
@@ -21381,6 +21786,25 @@ export declare const SourceHealthDtoStatusV3: {
21381
21786
  readonly SourceStateUncheckedSourceNoAccounts: "SOURCE_STATE_UNCHECKED_SOURCE_NO_ACCOUNTS";
21382
21787
  };
21383
21788
  export type SourceHealthDtoStatusV3 = typeof SourceHealthDtoStatusV3[keyof typeof SourceHealthDtoStatusV3];
21789
+ /**
21790
+ *
21791
+ * @export
21792
+ * @interface SourceItemRef
21793
+ */
21794
+ export interface SourceItemRef {
21795
+ /**
21796
+ * The id for the source on which account selections are made
21797
+ * @type {string}
21798
+ * @memberof SourceItemRef
21799
+ */
21800
+ 'sourceId'?: string | null;
21801
+ /**
21802
+ * A list of account selections on the source. Currently, only one selection per source is supported.
21803
+ * @type {Array<AccountItemRef>}
21804
+ * @memberof SourceItemRef
21805
+ */
21806
+ 'accounts'?: Array<AccountItemRef> | null;
21807
+ }
21384
21808
  /**
21385
21809
  * Reference to management workgroup for the source.
21386
21810
  * @export
@@ -21638,9 +22062,16 @@ export interface SpDetails {
21638
22062
  * @type {string}
21639
22063
  * @memberof SpDetails
21640
22064
  */
21641
- 'callbackUrl'?: string;
22065
+ 'callbackUrl': string;
22066
+ /**
22067
+ * The legacy ACS URL used for SAML authentication. Used with SP configurations.
22068
+ * @type {string}
22069
+ * @memberof SpDetails
22070
+ */
22071
+ 'legacyAcsUrl'?: string;
21642
22072
  }
21643
22073
  export declare const SpDetailsRoleV3: {
22074
+ readonly SamlIdp: "SAML_IDP";
21644
22075
  readonly SamlSp: "SAML_SP";
21645
22076
  };
21646
22077
  export type SpDetailsRoleV3 = typeof SpDetailsRoleV3[keyof typeof SpDetailsRoleV3];
@@ -23600,6 +24031,7 @@ export declare const WorkflowExecutionStatusV3: {
23600
24031
  readonly Completed: "Completed";
23601
24032
  readonly Failed: "Failed";
23602
24033
  readonly Canceled: "Canceled";
24034
+ readonly Queued: "Queued";
23603
24035
  readonly Running: "Running";
23604
24036
  };
23605
24037
  export type WorkflowExecutionStatusV3 = typeof WorkflowExecutionStatusV3[keyof typeof WorkflowExecutionStatusV3];
@@ -24133,7 +24565,7 @@ export type WorkflowTriggerAttributesFrequencyV3 = typeof WorkflowTriggerAttribu
24133
24565
  */
24134
24566
  export declare const AccessProfilesApiAxiosParamCreator: (configuration?: Configuration) => {
24135
24567
  /**
24136
- * Create an access profile. A user with only ROLE_SUBADMIN or SOURCE_SUBADMIN authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
24568
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
24137
24569
  * @summary Create Access Profile
24138
24570
  * @param {AccessProfile} accessProfile
24139
24571
  * @param {*} [axiosOptions] Override http request option.
@@ -24178,13 +24610,13 @@ export declare const AccessProfilesApiAxiosParamCreator: (configuration?: Config
24178
24610
  */
24179
24611
  getAccessProfileEntitlements: (id: string, limit?: number, offset?: number, count?: boolean, filters?: string, sorters?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
24180
24612
  /**
24181
- * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
24613
+ * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
24182
24614
  * @summary List Access Profiles
24183
24615
  * @param {string} [forSubadmin] Filters the returned list according to what is visible to the indicated ROLE_SUBADMIN or SOURCE_SUBADMIN identity. The value of the parameter is either an identity ID or the special value **me**, which is shorthand for the calling identity\&#39;s ID. If you specify an identity that isn\&#39;t a subadmin, the API returns a 400 Bad Request error.
24184
24616
  * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
24185
24617
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
24186
24618
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
24187
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, lt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **source.id**: *eq, in* Supported composite operators are *and, or* Filtering is not supported for access profiles and entitlements that have the \&#39;+\&#39; symbol in their names.
24619
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **source.id**: *eq, in* Supported composite operators are *and, or* Filtering is not supported for access profiles and entitlements that have the \&#39;+\&#39; symbol in their names.
24188
24620
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **name, created, modified**
24189
24621
  * @param {string} [forSegmentIds] Filters access profiles to only those assigned to the segment(s) with the specified IDs. If segmentation is currently unavailable, specifying this parameter results in an error.
24190
24622
  * @param {boolean} [includeUnsegmented] Indicates whether the response list should contain unsegmented access profiles. If &#x60;for-segment-ids&#x60; is absent or empty, specifying *include-unsegmented* as &#x60;false&#x60; results in an error.
@@ -24208,7 +24640,7 @@ export declare const AccessProfilesApiAxiosParamCreator: (configuration?: Config
24208
24640
  */
24209
24641
  export declare const AccessProfilesApiFp: (configuration?: Configuration) => {
24210
24642
  /**
24211
- * Create an access profile. A user with only ROLE_SUBADMIN or SOURCE_SUBADMIN authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
24643
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
24212
24644
  * @summary Create Access Profile
24213
24645
  * @param {AccessProfile} accessProfile
24214
24646
  * @param {*} [axiosOptions] Override http request option.
@@ -24253,13 +24685,13 @@ export declare const AccessProfilesApiFp: (configuration?: Configuration) => {
24253
24685
  */
24254
24686
  getAccessProfileEntitlements(id: string, limit?: number, offset?: number, count?: boolean, filters?: string, sorters?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<Entitlement>>>;
24255
24687
  /**
24256
- * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
24688
+ * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
24257
24689
  * @summary List Access Profiles
24258
24690
  * @param {string} [forSubadmin] Filters the returned list according to what is visible to the indicated ROLE_SUBADMIN or SOURCE_SUBADMIN identity. The value of the parameter is either an identity ID or the special value **me**, which is shorthand for the calling identity\&#39;s ID. If you specify an identity that isn\&#39;t a subadmin, the API returns a 400 Bad Request error.
24259
24691
  * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
24260
24692
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
24261
24693
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
24262
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, lt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **source.id**: *eq, in* Supported composite operators are *and, or* Filtering is not supported for access profiles and entitlements that have the \&#39;+\&#39; symbol in their names.
24694
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **source.id**: *eq, in* Supported composite operators are *and, or* Filtering is not supported for access profiles and entitlements that have the \&#39;+\&#39; symbol in their names.
24263
24695
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **name, created, modified**
24264
24696
  * @param {string} [forSegmentIds] Filters access profiles to only those assigned to the segment(s) with the specified IDs. If segmentation is currently unavailable, specifying this parameter results in an error.
24265
24697
  * @param {boolean} [includeUnsegmented] Indicates whether the response list should contain unsegmented access profiles. If &#x60;for-segment-ids&#x60; is absent or empty, specifying *include-unsegmented* as &#x60;false&#x60; results in an error.
@@ -24283,7 +24715,7 @@ export declare const AccessProfilesApiFp: (configuration?: Configuration) => {
24283
24715
  */
24284
24716
  export declare const AccessProfilesApiFactory: (configuration?: Configuration, basePath?: string, axios?: AxiosInstance) => {
24285
24717
  /**
24286
- * Create an access profile. A user with only ROLE_SUBADMIN or SOURCE_SUBADMIN authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
24718
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
24287
24719
  * @summary Create Access Profile
24288
24720
  * @param {AccessProfilesApiCreateAccessProfileRequest} requestParameters Request parameters.
24289
24721
  * @param {*} [axiosOptions] Override http request option.
@@ -24323,7 +24755,7 @@ export declare const AccessProfilesApiFactory: (configuration?: Configuration, b
24323
24755
  */
24324
24756
  getAccessProfileEntitlements(requestParameters: AccessProfilesApiGetAccessProfileEntitlementsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<Entitlement>>;
24325
24757
  /**
24326
- * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
24758
+ * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
24327
24759
  * @summary List Access Profiles
24328
24760
  * @param {AccessProfilesApiListAccessProfilesRequest} requestParameters Request parameters.
24329
24761
  * @param {*} [axiosOptions] Override http request option.
@@ -24465,7 +24897,7 @@ export interface AccessProfilesApiListAccessProfilesRequest {
24465
24897
  */
24466
24898
  readonly count?: boolean;
24467
24899
  /**
24468
- * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, lt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **source.id**: *eq, in* Supported composite operators are *and, or* Filtering is not supported for access profiles and entitlements that have the \&#39;+\&#39; symbol in their names.
24900
+ * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **source.id**: *eq, in* Supported composite operators are *and, or* Filtering is not supported for access profiles and entitlements that have the \&#39;+\&#39; symbol in their names.
24469
24901
  * @type {string}
24470
24902
  * @memberof AccessProfilesApiListAccessProfiles
24471
24903
  */
@@ -24516,7 +24948,7 @@ export interface AccessProfilesApiPatchAccessProfileRequest {
24516
24948
  */
24517
24949
  export declare class AccessProfilesApi extends BaseAPI {
24518
24950
  /**
24519
- * Create an access profile. A user with only ROLE_SUBADMIN or SOURCE_SUBADMIN authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
24951
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
24520
24952
  * @summary Create Access Profile
24521
24953
  * @param {AccessProfilesApiCreateAccessProfileRequest} requestParameters Request parameters.
24522
24954
  * @param {*} [axiosOptions] Override http request option.
@@ -24561,7 +24993,7 @@ export declare class AccessProfilesApi extends BaseAPI {
24561
24993
  */
24562
24994
  getAccessProfileEntitlements(requestParameters: AccessProfilesApiGetAccessProfileEntitlementsRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<Entitlement[], any>>;
24563
24995
  /**
24564
- * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
24996
+ * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
24565
24997
  * @summary List Access Profiles
24566
24998
  * @param {AccessProfilesApiListAccessProfilesRequest} requestParameters Request parameters.
24567
24999
  * @param {*} [axiosOptions] Override http request option.
@@ -24631,7 +25063,7 @@ export declare const AccessRequestApprovalsApiAxiosParamCreator: (configuration?
24631
25063
  * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
24632
25064
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
24633
25065
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
24634
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
25066
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
24635
25067
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified**
24636
25068
  * @param {*} [axiosOptions] Override http request option.
24637
25069
  * @throws {RequiredError}
@@ -24699,7 +25131,7 @@ export declare const AccessRequestApprovalsApiFp: (configuration?: Configuration
24699
25131
  * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
24700
25132
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
24701
25133
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
24702
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
25134
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
24703
25135
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified**
24704
25136
  * @param {*} [axiosOptions] Override http request option.
24705
25137
  * @throws {RequiredError}
@@ -24900,7 +25332,7 @@ export interface AccessRequestApprovalsApiListPendingApprovalsRequest {
24900
25332
  */
24901
25333
  readonly count?: boolean;
24902
25334
  /**
24903
- * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
25335
+ * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
24904
25336
  * @type {string}
24905
25337
  * @memberof AccessRequestApprovalsApiListPendingApprovals
24906
25338
  */
@@ -25007,7 +25439,7 @@ export declare const AccessRequestsApiAxiosParamCreator: (configuration?: Config
25007
25439
  */
25008
25440
  cancelAccessRequest: (cancelAccessRequest: CancelAccessRequest, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
25009
25441
  /**
25010
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
25442
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
25011
25443
  * @summary Submit Access Request
25012
25444
  * @param {AccessRequest} accessRequest
25013
25445
  * @param {*} [axiosOptions] Override http request option.
@@ -25061,7 +25493,7 @@ export declare const AccessRequestsApiFp: (configuration?: Configuration) => {
25061
25493
  */
25062
25494
  cancelAccessRequest(cancelAccessRequest: CancelAccessRequest, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<object>>;
25063
25495
  /**
25064
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
25496
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
25065
25497
  * @summary Submit Access Request
25066
25498
  * @param {AccessRequest} accessRequest
25067
25499
  * @param {*} [axiosOptions] Override http request option.
@@ -25115,7 +25547,7 @@ export declare const AccessRequestsApiFactory: (configuration?: Configuration, b
25115
25547
  */
25116
25548
  cancelAccessRequest(requestParameters: AccessRequestsApiCancelAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<object>;
25117
25549
  /**
25118
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
25550
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
25119
25551
  * @summary Submit Access Request
25120
25552
  * @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
25121
25553
  * @param {*} [axiosOptions] Override http request option.
@@ -25269,7 +25701,7 @@ export declare class AccessRequestsApi extends BaseAPI {
25269
25701
  */
25270
25702
  cancelAccessRequest(requestParameters: AccessRequestsApiCancelAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<object, any>>;
25271
25703
  /**
25272
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
25704
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
25273
25705
  * @summary Submit Access Request
25274
25706
  * @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
25275
25707
  * @param {*} [axiosOptions] Override http request option.
@@ -27451,7 +27883,7 @@ export declare const CertificationCampaignsApiFp: (configuration?: Configuration
27451
27883
  * @param {*} [axiosOptions] Override http request option.
27452
27884
  * @throws {RequiredError}
27453
27885
  */
27454
- getCampaign(id: string, detail?: GetCampaignDetailV3, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetActiveCampaigns200ResponseInner>>;
27886
+ getCampaign(id: string, detail?: GetCampaignDetailV3, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetCampaign200Response>>;
27455
27887
  /**
27456
27888
  * Use this API to fetch all reports for a certification campaign by campaign ID.
27457
27889
  * @summary Get Campaign Reports
@@ -27642,7 +28074,7 @@ export declare const CertificationCampaignsApiFactory: (configuration?: Configur
27642
28074
  * @param {*} [axiosOptions] Override http request option.
27643
28075
  * @throws {RequiredError}
27644
28076
  */
27645
- getCampaign(requestParameters: CertificationCampaignsApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetActiveCampaigns200ResponseInner>;
28077
+ getCampaign(requestParameters: CertificationCampaignsApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetCampaign200Response>;
27646
28078
  /**
27647
28079
  * Use this API to fetch all reports for a certification campaign by campaign ID.
27648
28080
  * @summary Get Campaign Reports
@@ -28208,7 +28640,7 @@ export declare class CertificationCampaignsApi extends BaseAPI {
28208
28640
  * @throws {RequiredError}
28209
28641
  * @memberof CertificationCampaignsApi
28210
28642
  */
28211
- getCampaign(requestParameters: CertificationCampaignsApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<GetActiveCampaigns200ResponseInner, any>>;
28643
+ getCampaign(requestParameters: CertificationCampaignsApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<GetCampaign200Response, any>>;
28212
28644
  /**
28213
28645
  * Use this API to fetch all reports for a certification campaign by campaign ID.
28214
28646
  * @summary Get Campaign Reports
@@ -37260,17 +37692,17 @@ export declare const RolesApiAxiosParamCreator: (configuration?: Configuration)
37260
37692
  */
37261
37693
  deleteBulkRoles: (roleBulkDeleteRequest: RoleBulkDeleteRequest, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
37262
37694
  /**
37263
- * This API deletes a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
37264
- * @summary Delete a Role
37265
- * @param {string} id ID of the Role
37695
+ * Delete a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups the ROLE_SUBADMIN is a member of.
37696
+ * @summary Delete Role
37697
+ * @param {string} id Role ID.
37266
37698
  * @param {*} [axiosOptions] Override http request option.
37267
37699
  * @throws {RequiredError}
37268
37700
  */
37269
37701
  deleteRole: (id: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
37270
37702
  /**
37271
- * This API returns a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
37272
- * @summary Get a Role
37273
- * @param {string} id ID of the Role
37703
+ * Get a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of.
37704
+ * @summary Get Role
37705
+ * @param {string} id Role ID.
37274
37706
  * @param {*} [axiosOptions] Override http request option.
37275
37707
  * @throws {RequiredError}
37276
37708
  */
@@ -37295,7 +37727,7 @@ export declare const RolesApiAxiosParamCreator: (configuration?: Configuration)
37295
37727
  * @param {number} [limit] Note that for this API the maximum value for limit is 50. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
37296
37728
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
37297
37729
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
37298
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, lt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq*
37730
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, ge, le* **modified**: *lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **dimensional**: *eq*
37299
37731
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **name, created, modified**
37300
37732
  * @param {string} [forSegmentIds] If present and not empty, additionally filters Roles to those which are assigned to the Segment(s) with the specified IDs. If segmentation is currently unavailable, specifying this parameter results in an error.
37301
37733
  * @param {boolean} [includeUnsegmented] Whether or not the response list should contain unsegmented Roles. If *for-segment-ids* is absent or empty, specifying *include-unsegmented* as false results in an error.
@@ -37304,9 +37736,9 @@ export declare const RolesApiAxiosParamCreator: (configuration?: Configuration)
37304
37736
  */
37305
37737
  listRoles: (forSubadmin?: string, limit?: number, offset?: number, count?: boolean, filters?: string, sorters?: string, forSegmentIds?: string, includeUnsegmented?: boolean, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
37306
37738
  /**
37307
- * This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing roles, however, any new roles as well as any updates to existing descriptions will be limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
37308
- * @summary Patch a specified Role
37309
- * @param {string} id ID of the Role to patch
37739
+ * Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
37740
+ * @summary Patch Role
37741
+ * @param {string} id Role ID to patch
37310
37742
  * @param {Array<JsonPatchOperation>} jsonPatchOperation
37311
37743
  * @param {*} [axiosOptions] Override http request option.
37312
37744
  * @throws {RequiredError}
@@ -37335,17 +37767,17 @@ export declare const RolesApiFp: (configuration?: Configuration) => {
37335
37767
  */
37336
37768
  deleteBulkRoles(roleBulkDeleteRequest: RoleBulkDeleteRequest, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<TaskResultDto>>;
37337
37769
  /**
37338
- * This API deletes a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
37339
- * @summary Delete a Role
37340
- * @param {string} id ID of the Role
37770
+ * Delete a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups the ROLE_SUBADMIN is a member of.
37771
+ * @summary Delete Role
37772
+ * @param {string} id Role ID.
37341
37773
  * @param {*} [axiosOptions] Override http request option.
37342
37774
  * @throws {RequiredError}
37343
37775
  */
37344
37776
  deleteRole(id: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<void>>;
37345
37777
  /**
37346
- * This API returns a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
37347
- * @summary Get a Role
37348
- * @param {string} id ID of the Role
37778
+ * Get a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of.
37779
+ * @summary Get Role
37780
+ * @param {string} id Role ID.
37349
37781
  * @param {*} [axiosOptions] Override http request option.
37350
37782
  * @throws {RequiredError}
37351
37783
  */
@@ -37370,7 +37802,7 @@ export declare const RolesApiFp: (configuration?: Configuration) => {
37370
37802
  * @param {number} [limit] Note that for this API the maximum value for limit is 50. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
37371
37803
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
37372
37804
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
37373
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, lt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq*
37805
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, ge, le* **modified**: *lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **dimensional**: *eq*
37374
37806
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **name, created, modified**
37375
37807
  * @param {string} [forSegmentIds] If present and not empty, additionally filters Roles to those which are assigned to the Segment(s) with the specified IDs. If segmentation is currently unavailable, specifying this parameter results in an error.
37376
37808
  * @param {boolean} [includeUnsegmented] Whether or not the response list should contain unsegmented Roles. If *for-segment-ids* is absent or empty, specifying *include-unsegmented* as false results in an error.
@@ -37379,9 +37811,9 @@ export declare const RolesApiFp: (configuration?: Configuration) => {
37379
37811
  */
37380
37812
  listRoles(forSubadmin?: string, limit?: number, offset?: number, count?: boolean, filters?: string, sorters?: string, forSegmentIds?: string, includeUnsegmented?: boolean, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<Role>>>;
37381
37813
  /**
37382
- * This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing roles, however, any new roles as well as any updates to existing descriptions will be limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
37383
- * @summary Patch a specified Role
37384
- * @param {string} id ID of the Role to patch
37814
+ * Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
37815
+ * @summary Patch Role
37816
+ * @param {string} id Role ID to patch
37385
37817
  * @param {Array<JsonPatchOperation>} jsonPatchOperation
37386
37818
  * @param {*} [axiosOptions] Override http request option.
37387
37819
  * @throws {RequiredError}
@@ -37410,16 +37842,16 @@ export declare const RolesApiFactory: (configuration?: Configuration, basePath?:
37410
37842
  */
37411
37843
  deleteBulkRoles(requestParameters: RolesApiDeleteBulkRolesRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<TaskResultDto>;
37412
37844
  /**
37413
- * This API deletes a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
37414
- * @summary Delete a Role
37845
+ * Delete a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups the ROLE_SUBADMIN is a member of.
37846
+ * @summary Delete Role
37415
37847
  * @param {RolesApiDeleteRoleRequest} requestParameters Request parameters.
37416
37848
  * @param {*} [axiosOptions] Override http request option.
37417
37849
  * @throws {RequiredError}
37418
37850
  */
37419
37851
  deleteRole(requestParameters: RolesApiDeleteRoleRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<void>;
37420
37852
  /**
37421
- * This API returns a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
37422
- * @summary Get a Role
37853
+ * Get a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of.
37854
+ * @summary Get Role
37423
37855
  * @param {RolesApiGetRoleRequest} requestParameters Request parameters.
37424
37856
  * @param {*} [axiosOptions] Override http request option.
37425
37857
  * @throws {RequiredError}
@@ -37442,8 +37874,8 @@ export declare const RolesApiFactory: (configuration?: Configuration, basePath?:
37442
37874
  */
37443
37875
  listRoles(requestParameters?: RolesApiListRolesRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<Role>>;
37444
37876
  /**
37445
- * This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing roles, however, any new roles as well as any updates to existing descriptions will be limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
37446
- * @summary Patch a specified Role
37877
+ * Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
37878
+ * @summary Patch Role
37447
37879
  * @param {RolesApiPatchRoleRequest} requestParameters Request parameters.
37448
37880
  * @param {*} [axiosOptions] Override http request option.
37449
37881
  * @throws {RequiredError}
@@ -37483,7 +37915,7 @@ export interface RolesApiDeleteBulkRolesRequest {
37483
37915
  */
37484
37916
  export interface RolesApiDeleteRoleRequest {
37485
37917
  /**
37486
- * ID of the Role
37918
+ * Role ID.
37487
37919
  * @type {string}
37488
37920
  * @memberof RolesApiDeleteRole
37489
37921
  */
@@ -37496,7 +37928,7 @@ export interface RolesApiDeleteRoleRequest {
37496
37928
  */
37497
37929
  export interface RolesApiGetRoleRequest {
37498
37930
  /**
37499
- * ID of the Role
37931
+ * Role ID.
37500
37932
  * @type {string}
37501
37933
  * @memberof RolesApiGetRole
37502
37934
  */
@@ -37576,7 +38008,7 @@ export interface RolesApiListRolesRequest {
37576
38008
  */
37577
38009
  readonly count?: boolean;
37578
38010
  /**
37579
- * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, lt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq*
38011
+ * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, ge, le* **modified**: *lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **dimensional**: *eq*
37580
38012
  * @type {string}
37581
38013
  * @memberof RolesApiListRoles
37582
38014
  */
@@ -37607,7 +38039,7 @@ export interface RolesApiListRolesRequest {
37607
38039
  */
37608
38040
  export interface RolesApiPatchRoleRequest {
37609
38041
  /**
37610
- * ID of the Role to patch
38042
+ * Role ID to patch
37611
38043
  * @type {string}
37612
38044
  * @memberof RolesApiPatchRole
37613
38045
  */
@@ -37645,8 +38077,8 @@ export declare class RolesApi extends BaseAPI {
37645
38077
  */
37646
38078
  deleteBulkRoles(requestParameters: RolesApiDeleteBulkRolesRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<TaskResultDto, any>>;
37647
38079
  /**
37648
- * This API deletes a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
37649
- * @summary Delete a Role
38080
+ * Delete a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups the ROLE_SUBADMIN is a member of.
38081
+ * @summary Delete Role
37650
38082
  * @param {RolesApiDeleteRoleRequest} requestParameters Request parameters.
37651
38083
  * @param {*} [axiosOptions] Override http request option.
37652
38084
  * @throws {RequiredError}
@@ -37654,8 +38086,8 @@ export declare class RolesApi extends BaseAPI {
37654
38086
  */
37655
38087
  deleteRole(requestParameters: RolesApiDeleteRoleRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<void, any>>;
37656
38088
  /**
37657
- * This API returns a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
37658
- * @summary Get a Role
38089
+ * Get a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of.
38090
+ * @summary Get Role
37659
38091
  * @param {RolesApiGetRoleRequest} requestParameters Request parameters.
37660
38092
  * @param {*} [axiosOptions] Override http request option.
37661
38093
  * @throws {RequiredError}
@@ -37681,8 +38113,8 @@ export declare class RolesApi extends BaseAPI {
37681
38113
  */
37682
38114
  listRoles(requestParameters?: RolesApiListRolesRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<Role[], any>>;
37683
38115
  /**
37684
- * This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing roles, however, any new roles as well as any updates to existing descriptions will be limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
37685
- * @summary Patch a specified Role
38116
+ * Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
38117
+ * @summary Patch Role
37686
38118
  * @param {RolesApiPatchRoleRequest} requestParameters Request parameters.
37687
38119
  * @param {*} [axiosOptions] Override http request option.
37688
38120
  * @throws {RequiredError}
@@ -40252,11 +40684,11 @@ export declare const ServiceDeskIntegrationApiAxiosParamCreator: (configuration?
40252
40684
  * Update an existing Service Desk integration by ID with a PATCH request.
40253
40685
  * @summary Patch a Service Desk Integration
40254
40686
  * @param {string} id ID of the Service Desk integration to update
40255
- * @param {PatchServiceDeskIntegrationRequest} patchServiceDeskIntegrationRequest A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
40687
+ * @param {Array<JsonPatchOperation>} jsonPatchOperation A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
40256
40688
  * @param {*} [axiosOptions] Override http request option.
40257
40689
  * @throws {RequiredError}
40258
40690
  */
40259
- patchServiceDeskIntegration: (id: string, patchServiceDeskIntegrationRequest: PatchServiceDeskIntegrationRequest, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
40691
+ patchServiceDeskIntegration: (id: string, jsonPatchOperation: Array<JsonPatchOperation>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
40260
40692
  /**
40261
40693
  * Update an existing Service Desk integration by ID.
40262
40694
  * @summary Update a Service Desk integration
@@ -40342,11 +40774,11 @@ export declare const ServiceDeskIntegrationApiFp: (configuration?: Configuration
40342
40774
  * Update an existing Service Desk integration by ID with a PATCH request.
40343
40775
  * @summary Patch a Service Desk Integration
40344
40776
  * @param {string} id ID of the Service Desk integration to update
40345
- * @param {PatchServiceDeskIntegrationRequest} patchServiceDeskIntegrationRequest A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
40777
+ * @param {Array<JsonPatchOperation>} jsonPatchOperation A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
40346
40778
  * @param {*} [axiosOptions] Override http request option.
40347
40779
  * @throws {RequiredError}
40348
40780
  */
40349
- patchServiceDeskIntegration(id: string, patchServiceDeskIntegrationRequest: PatchServiceDeskIntegrationRequest, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceDeskIntegrationDto>>;
40781
+ patchServiceDeskIntegration(id: string, jsonPatchOperation: Array<JsonPatchOperation>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceDeskIntegrationDto>>;
40350
40782
  /**
40351
40783
  * Update an existing Service Desk integration by ID.
40352
40784
  * @summary Update a Service Desk integration
@@ -40552,10 +40984,10 @@ export interface ServiceDeskIntegrationApiPatchServiceDeskIntegrationRequest {
40552
40984
  readonly id: string;
40553
40985
  /**
40554
40986
  * A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
40555
- * @type {PatchServiceDeskIntegrationRequest}
40987
+ * @type {Array<JsonPatchOperation>}
40556
40988
  * @memberof ServiceDeskIntegrationApiPatchServiceDeskIntegration
40557
40989
  */
40558
- readonly patchServiceDeskIntegrationRequest: PatchServiceDeskIntegrationRequest;
40990
+ readonly jsonPatchOperation: Array<JsonPatchOperation>;
40559
40991
  }
40560
40992
  /**
40561
40993
  * Request parameters for putServiceDeskIntegration operation in ServiceDeskIntegrationApi.
@@ -44062,12 +44494,13 @@ export declare const WorkflowsApiAxiosParamCreator: (configuration?: Configurati
44062
44494
  * Get a single workflow by id.
44063
44495
  * @summary Get Workflow By Id
44064
44496
  * @param {string} id Id of the workflow
44497
+ * @param {boolean} [workflowMetrics] disable workflow metrics
44065
44498
  * @param {*} [axiosOptions] Override http request option.
44066
44499
  * @throws {RequiredError}
44067
44500
  */
44068
- getWorkflow: (id: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
44501
+ getWorkflow: (id: string, workflowMetrics?: boolean, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
44069
44502
  /**
44070
- * Use this API to get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
44503
+ * Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
44071
44504
  * @summary Get Workflow Execution
44072
44505
  * @param {string} id Workflow execution ID.
44073
44506
  * @param {*} [axiosOptions] Override http request option.
@@ -44133,10 +44566,14 @@ export declare const WorkflowsApiAxiosParamCreator: (configuration?: Configurati
44133
44566
  /**
44134
44567
  * List all workflows in the tenant.
44135
44568
  * @summary List Workflows
44569
+ * @param {string} [triggerId] Trigger ID
44570
+ * @param {string} [connectorInstanceId] Connector Instance ID
44571
+ * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
44572
+ * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
44136
44573
  * @param {*} [axiosOptions] Override http request option.
44137
44574
  * @throws {RequiredError}
44138
44575
  */
44139
- listWorkflows: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
44576
+ listWorkflows: (triggerId?: string, connectorInstanceId?: string, limit?: number, offset?: number, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
44140
44577
  /**
44141
44578
  * Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
44142
44579
  * @summary Patch Workflow
@@ -44224,12 +44661,13 @@ export declare const WorkflowsApiFp: (configuration?: Configuration) => {
44224
44661
  * Get a single workflow by id.
44225
44662
  * @summary Get Workflow By Id
44226
44663
  * @param {string} id Id of the workflow
44664
+ * @param {boolean} [workflowMetrics] disable workflow metrics
44227
44665
  * @param {*} [axiosOptions] Override http request option.
44228
44666
  * @throws {RequiredError}
44229
44667
  */
44230
- getWorkflow(id: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Workflow>>;
44668
+ getWorkflow(id: string, workflowMetrics?: boolean, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Workflow>>;
44231
44669
  /**
44232
- * Use this API to get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
44670
+ * Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
44233
44671
  * @summary Get Workflow Execution
44234
44672
  * @param {string} id Workflow execution ID.
44235
44673
  * @param {*} [axiosOptions] Override http request option.
@@ -44295,10 +44733,14 @@ export declare const WorkflowsApiFp: (configuration?: Configuration) => {
44295
44733
  /**
44296
44734
  * List all workflows in the tenant.
44297
44735
  * @summary List Workflows
44736
+ * @param {string} [triggerId] Trigger ID
44737
+ * @param {string} [connectorInstanceId] Connector Instance ID
44738
+ * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
44739
+ * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
44298
44740
  * @param {*} [axiosOptions] Override http request option.
44299
44741
  * @throws {RequiredError}
44300
44742
  */
44301
- listWorkflows(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<Workflow>>>;
44743
+ listWorkflows(triggerId?: string, connectorInstanceId?: string, limit?: number, offset?: number, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<Workflow>>>;
44302
44744
  /**
44303
44745
  * Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
44304
44746
  * @summary Patch Workflow
@@ -44390,7 +44832,7 @@ export declare const WorkflowsApiFactory: (configuration?: Configuration, basePa
44390
44832
  */
44391
44833
  getWorkflow(requestParameters: WorkflowsApiGetWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Workflow>;
44392
44834
  /**
44393
- * Use this API to get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
44835
+ * Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
44394
44836
  * @summary Get Workflow Execution
44395
44837
  * @param {WorkflowsApiGetWorkflowExecutionRequest} requestParameters Request parameters.
44396
44838
  * @param {*} [axiosOptions] Override http request option.
@@ -44447,10 +44889,11 @@ export declare const WorkflowsApiFactory: (configuration?: Configuration, basePa
44447
44889
  /**
44448
44890
  * List all workflows in the tenant.
44449
44891
  * @summary List Workflows
44892
+ * @param {WorkflowsApiListWorkflowsRequest} requestParameters Request parameters.
44450
44893
  * @param {*} [axiosOptions] Override http request option.
44451
44894
  * @throws {RequiredError}
44452
44895
  */
44453
- listWorkflows(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<Workflow>>;
44896
+ listWorkflows(requestParameters?: WorkflowsApiListWorkflowsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<Workflow>>;
44454
44897
  /**
44455
44898
  * Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
44456
44899
  * @summary Patch Workflow
@@ -44567,6 +45010,12 @@ export interface WorkflowsApiGetWorkflowRequest {
44567
45010
  * @memberof WorkflowsApiGetWorkflow
44568
45011
  */
44569
45012
  readonly id: string;
45013
+ /**
45014
+ * disable workflow metrics
45015
+ * @type {boolean}
45016
+ * @memberof WorkflowsApiGetWorkflow
45017
+ */
45018
+ readonly workflowMetrics?: boolean;
44570
45019
  }
44571
45020
  /**
44572
45021
  * Request parameters for getWorkflowExecution operation in WorkflowsApi.
@@ -44700,6 +45149,37 @@ export interface WorkflowsApiListWorkflowLibraryTriggersRequest {
44700
45149
  */
44701
45150
  readonly filters?: string;
44702
45151
  }
45152
+ /**
45153
+ * Request parameters for listWorkflows operation in WorkflowsApi.
45154
+ * @export
45155
+ * @interface WorkflowsApiListWorkflowsRequest
45156
+ */
45157
+ export interface WorkflowsApiListWorkflowsRequest {
45158
+ /**
45159
+ * Trigger ID
45160
+ * @type {string}
45161
+ * @memberof WorkflowsApiListWorkflows
45162
+ */
45163
+ readonly triggerId?: string;
45164
+ /**
45165
+ * Connector Instance ID
45166
+ * @type {string}
45167
+ * @memberof WorkflowsApiListWorkflows
45168
+ */
45169
+ readonly connectorInstanceId?: string;
45170
+ /**
45171
+ * Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
45172
+ * @type {number}
45173
+ * @memberof WorkflowsApiListWorkflows
45174
+ */
45175
+ readonly limit?: number;
45176
+ /**
45177
+ * Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
45178
+ * @type {number}
45179
+ * @memberof WorkflowsApiListWorkflows
45180
+ */
45181
+ readonly offset?: number;
45182
+ }
44703
45183
  /**
44704
45184
  * Request parameters for patchWorkflow operation in WorkflowsApi.
44705
45185
  * @export
@@ -44838,7 +45318,7 @@ export declare class WorkflowsApi extends BaseAPI {
44838
45318
  */
44839
45319
  getWorkflow(requestParameters: WorkflowsApiGetWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<Workflow, any>>;
44840
45320
  /**
44841
- * Use this API to get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
45321
+ * Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
44842
45322
  * @summary Get Workflow Execution
44843
45323
  * @param {WorkflowsApiGetWorkflowExecutionRequest} requestParameters Request parameters.
44844
45324
  * @param {*} [axiosOptions] Override http request option.
@@ -44902,11 +45382,12 @@ export declare class WorkflowsApi extends BaseAPI {
44902
45382
  /**
44903
45383
  * List all workflows in the tenant.
44904
45384
  * @summary List Workflows
45385
+ * @param {WorkflowsApiListWorkflowsRequest} requestParameters Request parameters.
44905
45386
  * @param {*} [axiosOptions] Override http request option.
44906
45387
  * @throws {RequiredError}
44907
45388
  * @memberof WorkflowsApi
44908
45389
  */
44909
- listWorkflows(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<Workflow[], any>>;
45390
+ listWorkflows(requestParameters?: WorkflowsApiListWorkflowsRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<Workflow[], any>>;
44910
45391
  /**
44911
45392
  * Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
44912
45393
  * @summary Patch Workflow