sailpoint-api-client 1.5.0 → 1.6.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/beta/README.md +2 -2
- package/beta/api.ts +563 -174
- package/beta/common.ts +2 -2
- package/beta/package.json +1 -1
- package/dist/beta/api.d.ts +487 -129
- package/dist/beta/api.js +177 -114
- package/dist/beta/api.js.map +1 -1
- package/dist/beta/common.js +1 -1
- package/dist/v2024/api.d.ts +1200 -35
- package/dist/v2024/api.js +761 -36
- package/dist/v2024/api.js.map +1 -1
- package/dist/v2024/common.js +1 -1
- package/dist/v2025/api.d.ts +1468 -45
- package/dist/v2025/api.js +886 -53
- package/dist/v2025/api.js.map +1 -1
- package/dist/v2025/common.js +1 -1
- package/dist/v3/api.d.ts +611 -130
- package/dist/v3/api.js +155 -86
- package/dist/v3/api.js.map +1 -1
- package/dist/v3/common.js +1 -1
- package/package.json +1 -1
- package/v2024/README.md +2 -2
- package/v2024/api.ts +1544 -42
- package/v2024/common.ts +2 -2
- package/v2024/package.json +1 -1
- package/v2025/README.md +2 -2
- package/v2025/api.ts +1934 -124
- package/v2025/common.ts +2 -2
- package/v2025/package.json +1 -1
- package/v3/README.md +2 -2
- package/v3/api.ts +658 -143
- package/v3/common.ts +2 -2
- package/v3/package.json +1 -1
package/v2024/api.ts
CHANGED
|
@@ -2322,6 +2322,18 @@ export interface AccessRequestItemV2024 {
|
|
|
2322
2322
|
* @memberof AccessRequestItemV2024
|
|
2323
2323
|
*/
|
|
2324
2324
|
'removeDate'?: string;
|
|
2325
|
+
/**
|
|
2326
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
2327
|
+
* @type {string}
|
|
2328
|
+
* @memberof AccessRequestItemV2024
|
|
2329
|
+
*/
|
|
2330
|
+
'assignmentId'?: string | null;
|
|
2331
|
+
/**
|
|
2332
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
2333
|
+
* @type {string}
|
|
2334
|
+
* @memberof AccessRequestItemV2024
|
|
2335
|
+
*/
|
|
2336
|
+
'nativeIdentity'?: string | null;
|
|
2325
2337
|
}
|
|
2326
2338
|
|
|
2327
2339
|
export const AccessRequestItemV2024TypeV2024 = {
|
|
@@ -3001,6 +3013,12 @@ export interface AccessRequestV2024 {
|
|
|
3001
3013
|
* @memberof AccessRequestV2024
|
|
3002
3014
|
*/
|
|
3003
3015
|
'clientMetadata'?: { [key: string]: string; };
|
|
3016
|
+
/**
|
|
3017
|
+
* Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
|
|
3018
|
+
* @type {Array<RequestedForDtoRefV2024>}
|
|
3019
|
+
* @memberof AccessRequestV2024
|
|
3020
|
+
*/
|
|
3021
|
+
'requestedForWithRequestedItems'?: Array<RequestedForDtoRefV2024> | null;
|
|
3004
3022
|
}
|
|
3005
3023
|
|
|
3006
3024
|
|
|
@@ -4584,6 +4602,64 @@ export interface AccountInfoDtoV2024 {
|
|
|
4584
4602
|
*/
|
|
4585
4603
|
'uuid'?: string;
|
|
4586
4604
|
}
|
|
4605
|
+
/**
|
|
4606
|
+
*
|
|
4607
|
+
* @export
|
|
4608
|
+
* @interface AccountInfoRefV2024
|
|
4609
|
+
*/
|
|
4610
|
+
export interface AccountInfoRefV2024 {
|
|
4611
|
+
/**
|
|
4612
|
+
* The uuid for the account, available under the \'objectguid\' attribute
|
|
4613
|
+
* @type {string}
|
|
4614
|
+
* @memberof AccountInfoRefV2024
|
|
4615
|
+
*/
|
|
4616
|
+
'uuid'?: string;
|
|
4617
|
+
/**
|
|
4618
|
+
* The \'distinguishedName\' attribute for the account
|
|
4619
|
+
* @type {string}
|
|
4620
|
+
* @memberof AccountInfoRefV2024
|
|
4621
|
+
*/
|
|
4622
|
+
'nativeIdentity'?: string;
|
|
4623
|
+
/**
|
|
4624
|
+
*
|
|
4625
|
+
* @type {DtoTypeV2024}
|
|
4626
|
+
* @memberof AccountInfoRefV2024
|
|
4627
|
+
*/
|
|
4628
|
+
'type'?: DtoTypeV2024;
|
|
4629
|
+
/**
|
|
4630
|
+
* The account id
|
|
4631
|
+
* @type {string}
|
|
4632
|
+
* @memberof AccountInfoRefV2024
|
|
4633
|
+
*/
|
|
4634
|
+
'id'?: string;
|
|
4635
|
+
/**
|
|
4636
|
+
* The account display name
|
|
4637
|
+
* @type {string}
|
|
4638
|
+
* @memberof AccountInfoRefV2024
|
|
4639
|
+
*/
|
|
4640
|
+
'name'?: string;
|
|
4641
|
+
}
|
|
4642
|
+
|
|
4643
|
+
|
|
4644
|
+
/**
|
|
4645
|
+
*
|
|
4646
|
+
* @export
|
|
4647
|
+
* @interface AccountItemRefV2024
|
|
4648
|
+
*/
|
|
4649
|
+
export interface AccountItemRefV2024 {
|
|
4650
|
+
/**
|
|
4651
|
+
* The uuid for the account, available under the \'objectguid\' attribute
|
|
4652
|
+
* @type {string}
|
|
4653
|
+
* @memberof AccountItemRefV2024
|
|
4654
|
+
*/
|
|
4655
|
+
'accountUuid'?: string | null;
|
|
4656
|
+
/**
|
|
4657
|
+
* The \'distinguishedName\' attribute for the account
|
|
4658
|
+
* @type {string}
|
|
4659
|
+
* @memberof AccountItemRefV2024
|
|
4660
|
+
*/
|
|
4661
|
+
'nativeIdentity'?: string;
|
|
4662
|
+
}
|
|
4587
4663
|
/**
|
|
4588
4664
|
* If an account activity item is associated with an access request, captures details of that request.
|
|
4589
4665
|
* @export
|
|
@@ -5369,6 +5445,52 @@ export interface AccountsExportReportArgumentsV2024 {
|
|
|
5369
5445
|
*/
|
|
5370
5446
|
'sourceName': string;
|
|
5371
5447
|
}
|
|
5448
|
+
/**
|
|
5449
|
+
*
|
|
5450
|
+
* @export
|
|
5451
|
+
* @interface AccountsSelectionRequestV2024
|
|
5452
|
+
*/
|
|
5453
|
+
export interface AccountsSelectionRequestV2024 {
|
|
5454
|
+
/**
|
|
5455
|
+
* A list of Identity IDs for whom the Access is requested.
|
|
5456
|
+
* @type {Array<string>}
|
|
5457
|
+
* @memberof AccountsSelectionRequestV2024
|
|
5458
|
+
*/
|
|
5459
|
+
'requestedFor': Array<string>;
|
|
5460
|
+
/**
|
|
5461
|
+
*
|
|
5462
|
+
* @type {AccessRequestTypeV2024}
|
|
5463
|
+
* @memberof AccountsSelectionRequestV2024
|
|
5464
|
+
*/
|
|
5465
|
+
'requestType'?: AccessRequestTypeV2024 | null;
|
|
5466
|
+
/**
|
|
5467
|
+
*
|
|
5468
|
+
* @type {Array<AccessRequestItemV2024>}
|
|
5469
|
+
* @memberof AccountsSelectionRequestV2024
|
|
5470
|
+
*/
|
|
5471
|
+
'requestedItems': Array<AccessRequestItemV2024>;
|
|
5472
|
+
/**
|
|
5473
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities.
|
|
5474
|
+
* @type {{ [key: string]: string; }}
|
|
5475
|
+
* @memberof AccountsSelectionRequestV2024
|
|
5476
|
+
*/
|
|
5477
|
+
'clientMetadata'?: { [key: string]: string; };
|
|
5478
|
+
}
|
|
5479
|
+
|
|
5480
|
+
|
|
5481
|
+
/**
|
|
5482
|
+
*
|
|
5483
|
+
* @export
|
|
5484
|
+
* @interface AccountsSelectionResponseV2024
|
|
5485
|
+
*/
|
|
5486
|
+
export interface AccountsSelectionResponseV2024 {
|
|
5487
|
+
/**
|
|
5488
|
+
* A list of available account selections per identity in the request, for all the requested items
|
|
5489
|
+
* @type {Array<IdentityAccountSelectionsV2024>}
|
|
5490
|
+
* @memberof AccountsSelectionResponseV2024
|
|
5491
|
+
*/
|
|
5492
|
+
'identities'?: Array<IdentityAccountSelectionsV2024>;
|
|
5493
|
+
}
|
|
5372
5494
|
/**
|
|
5373
5495
|
*
|
|
5374
5496
|
* @export
|
|
@@ -6739,7 +6861,8 @@ export const AttributeDefinitionTypeV2024 = {
|
|
|
6739
6861
|
String: 'STRING',
|
|
6740
6862
|
Long: 'LONG',
|
|
6741
6863
|
Int: 'INT',
|
|
6742
|
-
Boolean: 'BOOLEAN'
|
|
6864
|
+
Boolean: 'BOOLEAN',
|
|
6865
|
+
Date: 'DATE'
|
|
6743
6866
|
} as const;
|
|
6744
6867
|
|
|
6745
6868
|
export type AttributeDefinitionTypeV2024 = typeof AttributeDefinitionTypeV2024[keyof typeof AttributeDefinitionTypeV2024];
|
|
@@ -16297,6 +16420,33 @@ export interface FeatureValueDtoV2024 {
|
|
|
16297
16420
|
*/
|
|
16298
16421
|
'denominator'?: number;
|
|
16299
16422
|
}
|
|
16423
|
+
/**
|
|
16424
|
+
*
|
|
16425
|
+
* @export
|
|
16426
|
+
* @interface FederationProtocolDetailsV2024
|
|
16427
|
+
*/
|
|
16428
|
+
export interface FederationProtocolDetailsV2024 {
|
|
16429
|
+
/**
|
|
16430
|
+
* Federation protocol role
|
|
16431
|
+
* @type {string}
|
|
16432
|
+
* @memberof FederationProtocolDetailsV2024
|
|
16433
|
+
*/
|
|
16434
|
+
'role'?: FederationProtocolDetailsV2024RoleV2024;
|
|
16435
|
+
/**
|
|
16436
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
16437
|
+
* @type {string}
|
|
16438
|
+
* @memberof FederationProtocolDetailsV2024
|
|
16439
|
+
*/
|
|
16440
|
+
'entityId'?: string;
|
|
16441
|
+
}
|
|
16442
|
+
|
|
16443
|
+
export const FederationProtocolDetailsV2024RoleV2024 = {
|
|
16444
|
+
SamlIdp: 'SAML_IDP',
|
|
16445
|
+
SamlSp: 'SAML_SP'
|
|
16446
|
+
} as const;
|
|
16447
|
+
|
|
16448
|
+
export type FederationProtocolDetailsV2024RoleV2024 = typeof FederationProtocolDetailsV2024RoleV2024[keyof typeof FederationProtocolDetailsV2024RoleV2024];
|
|
16449
|
+
|
|
16300
16450
|
/**
|
|
16301
16451
|
*
|
|
16302
16452
|
* @export
|
|
@@ -17530,6 +17680,188 @@ export const GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV
|
|
|
17530
17680
|
|
|
17531
17681
|
export type GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024 = typeof GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024[keyof typeof GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024];
|
|
17532
17682
|
|
|
17683
|
+
/**
|
|
17684
|
+
*
|
|
17685
|
+
* @export
|
|
17686
|
+
* @interface GetCampaign200ResponseV2024
|
|
17687
|
+
*/
|
|
17688
|
+
export interface GetCampaign200ResponseV2024 {
|
|
17689
|
+
/**
|
|
17690
|
+
* Id of the campaign
|
|
17691
|
+
* @type {string}
|
|
17692
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17693
|
+
*/
|
|
17694
|
+
'id'?: string | null;
|
|
17695
|
+
/**
|
|
17696
|
+
* The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
17697
|
+
* @type {string}
|
|
17698
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17699
|
+
*/
|
|
17700
|
+
'name': string;
|
|
17701
|
+
/**
|
|
17702
|
+
* The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
17703
|
+
* @type {string}
|
|
17704
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17705
|
+
*/
|
|
17706
|
+
'description': string | null;
|
|
17707
|
+
/**
|
|
17708
|
+
* The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
|
|
17709
|
+
* @type {string}
|
|
17710
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17711
|
+
*/
|
|
17712
|
+
'deadline'?: string | null;
|
|
17713
|
+
/**
|
|
17714
|
+
* The type of campaign. Could be extended in the future.
|
|
17715
|
+
* @type {string}
|
|
17716
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17717
|
+
*/
|
|
17718
|
+
'type': GetCampaign200ResponseV2024TypeV2024;
|
|
17719
|
+
/**
|
|
17720
|
+
* Enables email notification for this campaign
|
|
17721
|
+
* @type {boolean}
|
|
17722
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17723
|
+
*/
|
|
17724
|
+
'emailNotificationEnabled'?: boolean;
|
|
17725
|
+
/**
|
|
17726
|
+
* Allows auto revoke for this campaign
|
|
17727
|
+
* @type {boolean}
|
|
17728
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17729
|
+
*/
|
|
17730
|
+
'autoRevokeAllowed'?: boolean;
|
|
17731
|
+
/**
|
|
17732
|
+
* Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
|
|
17733
|
+
* @type {boolean}
|
|
17734
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17735
|
+
*/
|
|
17736
|
+
'recommendationsEnabled'?: boolean;
|
|
17737
|
+
/**
|
|
17738
|
+
* The campaign\'s current status.
|
|
17739
|
+
* @type {string}
|
|
17740
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17741
|
+
*/
|
|
17742
|
+
'status'?: GetCampaign200ResponseV2024StatusV2024 | null;
|
|
17743
|
+
/**
|
|
17744
|
+
* The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
|
|
17745
|
+
* @type {string}
|
|
17746
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17747
|
+
*/
|
|
17748
|
+
'correlatedStatus'?: GetCampaign200ResponseV2024CorrelatedStatusV2024;
|
|
17749
|
+
/**
|
|
17750
|
+
* Created time of the campaign
|
|
17751
|
+
* @type {string}
|
|
17752
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17753
|
+
*/
|
|
17754
|
+
'created'?: string | null;
|
|
17755
|
+
/**
|
|
17756
|
+
* The total number of certifications in this campaign.
|
|
17757
|
+
* @type {number}
|
|
17758
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17759
|
+
*/
|
|
17760
|
+
'totalCertifications'?: number | null;
|
|
17761
|
+
/**
|
|
17762
|
+
* The number of completed certifications in this campaign.
|
|
17763
|
+
* @type {number}
|
|
17764
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17765
|
+
*/
|
|
17766
|
+
'completedCertifications'?: number | null;
|
|
17767
|
+
/**
|
|
17768
|
+
* A list of errors and warnings that have accumulated.
|
|
17769
|
+
* @type {Array<CampaignAlertV2024>}
|
|
17770
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17771
|
+
*/
|
|
17772
|
+
'alerts'?: Array<CampaignAlertV2024> | null;
|
|
17773
|
+
/**
|
|
17774
|
+
* Modified time of the campaign
|
|
17775
|
+
* @type {string}
|
|
17776
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17777
|
+
*/
|
|
17778
|
+
'modified'?: string | null;
|
|
17779
|
+
/**
|
|
17780
|
+
*
|
|
17781
|
+
* @type {CampaignAllOfFilterV2024}
|
|
17782
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17783
|
+
*/
|
|
17784
|
+
'filter'?: CampaignAllOfFilterV2024 | null;
|
|
17785
|
+
/**
|
|
17786
|
+
* Determines if comments on sunset date changes are required.
|
|
17787
|
+
* @type {boolean}
|
|
17788
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17789
|
+
*/
|
|
17790
|
+
'sunsetCommentsRequired'?: boolean;
|
|
17791
|
+
/**
|
|
17792
|
+
*
|
|
17793
|
+
* @type {CampaignAllOfSourceOwnerCampaignInfoV2024}
|
|
17794
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17795
|
+
*/
|
|
17796
|
+
'sourceOwnerCampaignInfo'?: CampaignAllOfSourceOwnerCampaignInfoV2024 | null;
|
|
17797
|
+
/**
|
|
17798
|
+
*
|
|
17799
|
+
* @type {CampaignAllOfSearchCampaignInfoV2024}
|
|
17800
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17801
|
+
*/
|
|
17802
|
+
'searchCampaignInfo'?: CampaignAllOfSearchCampaignInfoV2024 | null;
|
|
17803
|
+
/**
|
|
17804
|
+
*
|
|
17805
|
+
* @type {CampaignAllOfRoleCompositionCampaignInfoV2024}
|
|
17806
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17807
|
+
*/
|
|
17808
|
+
'roleCompositionCampaignInfo'?: CampaignAllOfRoleCompositionCampaignInfoV2024 | null;
|
|
17809
|
+
/**
|
|
17810
|
+
*
|
|
17811
|
+
* @type {CampaignAllOfMachineAccountCampaignInfoV2024}
|
|
17812
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17813
|
+
*/
|
|
17814
|
+
'machineAccountCampaignInfo'?: CampaignAllOfMachineAccountCampaignInfoV2024 | null;
|
|
17815
|
+
/**
|
|
17816
|
+
* A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
|
|
17817
|
+
* @type {Array<CampaignAllOfSourcesWithOrphanEntitlementsV2024>}
|
|
17818
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17819
|
+
*/
|
|
17820
|
+
'sourcesWithOrphanEntitlements'?: Array<CampaignAllOfSourcesWithOrphanEntitlementsV2024> | null;
|
|
17821
|
+
/**
|
|
17822
|
+
* Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
|
|
17823
|
+
* @type {string}
|
|
17824
|
+
* @memberof GetCampaign200ResponseV2024
|
|
17825
|
+
*/
|
|
17826
|
+
'mandatoryCommentRequirement'?: GetCampaign200ResponseV2024MandatoryCommentRequirementV2024;
|
|
17827
|
+
}
|
|
17828
|
+
|
|
17829
|
+
export const GetCampaign200ResponseV2024TypeV2024 = {
|
|
17830
|
+
Manager: 'MANAGER',
|
|
17831
|
+
SourceOwner: 'SOURCE_OWNER',
|
|
17832
|
+
Search: 'SEARCH',
|
|
17833
|
+
RoleComposition: 'ROLE_COMPOSITION',
|
|
17834
|
+
MachineAccount: 'MACHINE_ACCOUNT'
|
|
17835
|
+
} as const;
|
|
17836
|
+
|
|
17837
|
+
export type GetCampaign200ResponseV2024TypeV2024 = typeof GetCampaign200ResponseV2024TypeV2024[keyof typeof GetCampaign200ResponseV2024TypeV2024];
|
|
17838
|
+
export const GetCampaign200ResponseV2024StatusV2024 = {
|
|
17839
|
+
Pending: 'PENDING',
|
|
17840
|
+
Staged: 'STAGED',
|
|
17841
|
+
Canceling: 'CANCELING',
|
|
17842
|
+
Activating: 'ACTIVATING',
|
|
17843
|
+
Active: 'ACTIVE',
|
|
17844
|
+
Completing: 'COMPLETING',
|
|
17845
|
+
Completed: 'COMPLETED',
|
|
17846
|
+
Error: 'ERROR',
|
|
17847
|
+
Archived: 'ARCHIVED'
|
|
17848
|
+
} as const;
|
|
17849
|
+
|
|
17850
|
+
export type GetCampaign200ResponseV2024StatusV2024 = typeof GetCampaign200ResponseV2024StatusV2024[keyof typeof GetCampaign200ResponseV2024StatusV2024];
|
|
17851
|
+
export const GetCampaign200ResponseV2024CorrelatedStatusV2024 = {
|
|
17852
|
+
Correlated: 'CORRELATED',
|
|
17853
|
+
Uncorrelated: 'UNCORRELATED'
|
|
17854
|
+
} as const;
|
|
17855
|
+
|
|
17856
|
+
export type GetCampaign200ResponseV2024CorrelatedStatusV2024 = typeof GetCampaign200ResponseV2024CorrelatedStatusV2024[keyof typeof GetCampaign200ResponseV2024CorrelatedStatusV2024];
|
|
17857
|
+
export const GetCampaign200ResponseV2024MandatoryCommentRequirementV2024 = {
|
|
17858
|
+
AllDecisions: 'ALL_DECISIONS',
|
|
17859
|
+
RevokeOnlyDecisions: 'REVOKE_ONLY_DECISIONS',
|
|
17860
|
+
NoDecisions: 'NO_DECISIONS'
|
|
17861
|
+
} as const;
|
|
17862
|
+
|
|
17863
|
+
export type GetCampaign200ResponseV2024MandatoryCommentRequirementV2024 = typeof GetCampaign200ResponseV2024MandatoryCommentRequirementV2024[keyof typeof GetCampaign200ResponseV2024MandatoryCommentRequirementV2024];
|
|
17864
|
+
|
|
17533
17865
|
/**
|
|
17534
17866
|
* @type GetDiscoveredApplications200ResponseInnerV2024
|
|
17535
17867
|
* @export
|
|
@@ -18101,6 +18433,45 @@ export interface Identity1V2024 {
|
|
|
18101
18433
|
*/
|
|
18102
18434
|
export type IdentityAccessV2024 = { type: 'ACCESS_PROFILE' } & AccessProfileSummaryV2024 | { type: 'ENTITLEMENT' } & AccessProfileEntitlementV2024 | { type: 'ROLE' } & AccessProfileRoleV2024;
|
|
18103
18435
|
|
|
18436
|
+
/**
|
|
18437
|
+
*
|
|
18438
|
+
* @export
|
|
18439
|
+
* @interface IdentityAccountSelectionsV2024
|
|
18440
|
+
*/
|
|
18441
|
+
export interface IdentityAccountSelectionsV2024 {
|
|
18442
|
+
/**
|
|
18443
|
+
* Available account selections for the identity, per requested item
|
|
18444
|
+
* @type {Array<RequestedItemAccountSelectionsV2024>}
|
|
18445
|
+
* @memberof IdentityAccountSelectionsV2024
|
|
18446
|
+
*/
|
|
18447
|
+
'requestedItems'?: Array<RequestedItemAccountSelectionsV2024>;
|
|
18448
|
+
/**
|
|
18449
|
+
* A boolean indicating whether any account selections will be required for the user to raise an access request
|
|
18450
|
+
* @type {boolean}
|
|
18451
|
+
* @memberof IdentityAccountSelectionsV2024
|
|
18452
|
+
*/
|
|
18453
|
+
'accountsSelectionRequired'?: boolean;
|
|
18454
|
+
/**
|
|
18455
|
+
*
|
|
18456
|
+
* @type {DtoTypeV2024}
|
|
18457
|
+
* @memberof IdentityAccountSelectionsV2024
|
|
18458
|
+
*/
|
|
18459
|
+
'type'?: DtoTypeV2024;
|
|
18460
|
+
/**
|
|
18461
|
+
* The identity id for the user
|
|
18462
|
+
* @type {string}
|
|
18463
|
+
* @memberof IdentityAccountSelectionsV2024
|
|
18464
|
+
*/
|
|
18465
|
+
'id'?: string;
|
|
18466
|
+
/**
|
|
18467
|
+
* The name of the identity
|
|
18468
|
+
* @type {string}
|
|
18469
|
+
* @memberof IdentityAccountSelectionsV2024
|
|
18470
|
+
*/
|
|
18471
|
+
'name'?: string;
|
|
18472
|
+
}
|
|
18473
|
+
|
|
18474
|
+
|
|
18104
18475
|
/**
|
|
18105
18476
|
*
|
|
18106
18477
|
* @export
|
|
@@ -20248,6 +20619,105 @@ export interface IdentityWithNewAccessV2024 {
|
|
|
20248
20619
|
*/
|
|
20249
20620
|
'accessRefs': Array<IdentityWithNewAccessAccessRefsInnerV2024>;
|
|
20250
20621
|
}
|
|
20622
|
+
/**
|
|
20623
|
+
*
|
|
20624
|
+
* @export
|
|
20625
|
+
* @interface IdpDetailsV2024
|
|
20626
|
+
*/
|
|
20627
|
+
export interface IdpDetailsV2024 {
|
|
20628
|
+
/**
|
|
20629
|
+
* Federation protocol role
|
|
20630
|
+
* @type {string}
|
|
20631
|
+
* @memberof IdpDetailsV2024
|
|
20632
|
+
*/
|
|
20633
|
+
'role'?: IdpDetailsV2024RoleV2024;
|
|
20634
|
+
/**
|
|
20635
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
20636
|
+
* @type {string}
|
|
20637
|
+
* @memberof IdpDetailsV2024
|
|
20638
|
+
*/
|
|
20639
|
+
'entityId'?: string;
|
|
20640
|
+
/**
|
|
20641
|
+
* Defines the binding used for the SAML flow. Used with IDP configurations.
|
|
20642
|
+
* @type {string}
|
|
20643
|
+
* @memberof IdpDetailsV2024
|
|
20644
|
+
*/
|
|
20645
|
+
'binding'?: string;
|
|
20646
|
+
/**
|
|
20647
|
+
* Specifies the SAML authentication method to use. Used with IDP configurations.
|
|
20648
|
+
* @type {string}
|
|
20649
|
+
* @memberof IdpDetailsV2024
|
|
20650
|
+
*/
|
|
20651
|
+
'authnContext'?: string;
|
|
20652
|
+
/**
|
|
20653
|
+
* The IDP logout URL. Used with IDP configurations.
|
|
20654
|
+
* @type {string}
|
|
20655
|
+
* @memberof IdpDetailsV2024
|
|
20656
|
+
*/
|
|
20657
|
+
'logoutUrl'?: string;
|
|
20658
|
+
/**
|
|
20659
|
+
* Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
|
|
20660
|
+
* @type {boolean}
|
|
20661
|
+
* @memberof IdpDetailsV2024
|
|
20662
|
+
*/
|
|
20663
|
+
'includeAuthnContext'?: boolean;
|
|
20664
|
+
/**
|
|
20665
|
+
* The name id format to use. Used with IDP configurations.
|
|
20666
|
+
* @type {string}
|
|
20667
|
+
* @memberof IdpDetailsV2024
|
|
20668
|
+
*/
|
|
20669
|
+
'nameId'?: string;
|
|
20670
|
+
/**
|
|
20671
|
+
*
|
|
20672
|
+
* @type {JITConfigurationV2024}
|
|
20673
|
+
* @memberof IdpDetailsV2024
|
|
20674
|
+
*/
|
|
20675
|
+
'jitConfiguration'?: JITConfigurationV2024;
|
|
20676
|
+
/**
|
|
20677
|
+
* The Base64-encoded certificate used by the IDP. Used with IDP configurations.
|
|
20678
|
+
* @type {string}
|
|
20679
|
+
* @memberof IdpDetailsV2024
|
|
20680
|
+
*/
|
|
20681
|
+
'cert'?: string;
|
|
20682
|
+
/**
|
|
20683
|
+
* The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
|
|
20684
|
+
* @type {string}
|
|
20685
|
+
* @memberof IdpDetailsV2024
|
|
20686
|
+
*/
|
|
20687
|
+
'loginUrlPost'?: string;
|
|
20688
|
+
/**
|
|
20689
|
+
* The IDP Redirect URL. Used with IDP configurations.
|
|
20690
|
+
* @type {string}
|
|
20691
|
+
* @memberof IdpDetailsV2024
|
|
20692
|
+
*/
|
|
20693
|
+
'loginUrlRedirect'?: string;
|
|
20694
|
+
/**
|
|
20695
|
+
* Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
|
|
20696
|
+
* @type {string}
|
|
20697
|
+
* @memberof IdpDetailsV2024
|
|
20698
|
+
*/
|
|
20699
|
+
'mappingAttribute': string;
|
|
20700
|
+
/**
|
|
20701
|
+
* The expiration date extracted from the certificate.
|
|
20702
|
+
* @type {string}
|
|
20703
|
+
* @memberof IdpDetailsV2024
|
|
20704
|
+
*/
|
|
20705
|
+
'certificateExpirationDate'?: string;
|
|
20706
|
+
/**
|
|
20707
|
+
* The name extracted from the certificate.
|
|
20708
|
+
* @type {string}
|
|
20709
|
+
* @memberof IdpDetailsV2024
|
|
20710
|
+
*/
|
|
20711
|
+
'certificateName'?: string;
|
|
20712
|
+
}
|
|
20713
|
+
|
|
20714
|
+
export const IdpDetailsV2024RoleV2024 = {
|
|
20715
|
+
SamlIdp: 'SAML_IDP',
|
|
20716
|
+
SamlSp: 'SAML_SP'
|
|
20717
|
+
} as const;
|
|
20718
|
+
|
|
20719
|
+
export type IdpDetailsV2024RoleV2024 = typeof IdpDetailsV2024RoleV2024[keyof typeof IdpDetailsV2024RoleV2024];
|
|
20720
|
+
|
|
20251
20721
|
/**
|
|
20252
20722
|
*
|
|
20253
20723
|
* @export
|
|
@@ -20693,6 +21163,31 @@ export interface InvocationV2024 {
|
|
|
20693
21163
|
*/
|
|
20694
21164
|
'contentJson'?: object;
|
|
20695
21165
|
}
|
|
21166
|
+
/**
|
|
21167
|
+
*
|
|
21168
|
+
* @export
|
|
21169
|
+
* @interface JITConfigurationV2024
|
|
21170
|
+
*/
|
|
21171
|
+
export interface JITConfigurationV2024 {
|
|
21172
|
+
/**
|
|
21173
|
+
* The indicator for just-in-time provisioning enabled
|
|
21174
|
+
* @type {boolean}
|
|
21175
|
+
* @memberof JITConfigurationV2024
|
|
21176
|
+
*/
|
|
21177
|
+
'enabled'?: boolean;
|
|
21178
|
+
/**
|
|
21179
|
+
* the sourceId that mapped to just-in-time provisioning configuration
|
|
21180
|
+
* @type {string}
|
|
21181
|
+
* @memberof JITConfigurationV2024
|
|
21182
|
+
*/
|
|
21183
|
+
'sourceId'?: string;
|
|
21184
|
+
/**
|
|
21185
|
+
* A mapping of identity profile attribute names to SAML assertion attribute names
|
|
21186
|
+
* @type {{ [key: string]: string; }}
|
|
21187
|
+
* @memberof JITConfigurationV2024
|
|
21188
|
+
*/
|
|
21189
|
+
'sourceAttributeMappings'?: { [key: string]: string; };
|
|
21190
|
+
}
|
|
20696
21191
|
/**
|
|
20697
21192
|
* A JSONPatch Operation as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902)
|
|
20698
21193
|
* @export
|
|
@@ -21038,7 +21533,8 @@ export interface LifecyclestateDeletedV2024 {
|
|
|
21038
21533
|
}
|
|
21039
21534
|
|
|
21040
21535
|
export const LifecyclestateDeletedV2024TypeV2024 = {
|
|
21041
|
-
LifecycleState: 'LIFECYCLE_STATE'
|
|
21536
|
+
LifecycleState: 'LIFECYCLE_STATE',
|
|
21537
|
+
TaskResult: 'TASK_RESULT'
|
|
21042
21538
|
} as const;
|
|
21043
21539
|
|
|
21044
21540
|
export type LifecyclestateDeletedV2024TypeV2024 = typeof LifecyclestateDeletedV2024TypeV2024[keyof typeof LifecyclestateDeletedV2024TypeV2024];
|
|
@@ -21788,6 +22284,31 @@ export interface LocalizedMessageV2024 {
|
|
|
21788
22284
|
*/
|
|
21789
22285
|
'message': string;
|
|
21790
22286
|
}
|
|
22287
|
+
/**
|
|
22288
|
+
*
|
|
22289
|
+
* @export
|
|
22290
|
+
* @interface LockoutConfigurationV2024
|
|
22291
|
+
*/
|
|
22292
|
+
export interface LockoutConfigurationV2024 {
|
|
22293
|
+
/**
|
|
22294
|
+
* The maximum attempts allowed before lockout occurs.
|
|
22295
|
+
* @type {number}
|
|
22296
|
+
* @memberof LockoutConfigurationV2024
|
|
22297
|
+
*/
|
|
22298
|
+
'maximumAttempts'?: number;
|
|
22299
|
+
/**
|
|
22300
|
+
* The total time in minutes a user will be locked out.
|
|
22301
|
+
* @type {number}
|
|
22302
|
+
* @memberof LockoutConfigurationV2024
|
|
22303
|
+
*/
|
|
22304
|
+
'lockoutDuration'?: number;
|
|
22305
|
+
/**
|
|
22306
|
+
* A rolling window where authentication attempts in a series count towards the maximum before lockout occurs.
|
|
22307
|
+
* @type {number}
|
|
22308
|
+
* @memberof LockoutConfigurationV2024
|
|
22309
|
+
*/
|
|
22310
|
+
'lockoutWindow'?: number;
|
|
22311
|
+
}
|
|
21791
22312
|
/**
|
|
21792
22313
|
* The definition of an Identity according to the Reassignment Configuration service
|
|
21793
22314
|
* @export
|
|
@@ -27029,19 +27550,6 @@ export const PatchPotentialRoleRequestInnerV2024OpV2024 = {
|
|
|
27029
27550
|
|
|
27030
27551
|
export type PatchPotentialRoleRequestInnerV2024OpV2024 = typeof PatchPotentialRoleRequestInnerV2024OpV2024[keyof typeof PatchPotentialRoleRequestInnerV2024OpV2024];
|
|
27031
27552
|
|
|
27032
|
-
/**
|
|
27033
|
-
* A JSONPatch document as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902). Only `replace` operations are accepted by this endpoint.
|
|
27034
|
-
* @export
|
|
27035
|
-
* @interface PatchServiceDeskIntegrationRequestV2024
|
|
27036
|
-
*/
|
|
27037
|
-
export interface PatchServiceDeskIntegrationRequestV2024 {
|
|
27038
|
-
/**
|
|
27039
|
-
* Operations to be applied
|
|
27040
|
-
* @type {Array<JsonPatchOperationV2024>}
|
|
27041
|
-
* @memberof PatchServiceDeskIntegrationRequestV2024
|
|
27042
|
-
*/
|
|
27043
|
-
'operations'?: Array<JsonPatchOperationV2024>;
|
|
27044
|
-
}
|
|
27045
27553
|
/**
|
|
27046
27554
|
*
|
|
27047
27555
|
* @export
|
|
@@ -27952,7 +28460,7 @@ export interface ProvisioningPolicyDtoV2024 {
|
|
|
27952
28460
|
* @type {string}
|
|
27953
28461
|
* @memberof ProvisioningPolicyDtoV2024
|
|
27954
28462
|
*/
|
|
27955
|
-
'name': string;
|
|
28463
|
+
'name': string | null;
|
|
27956
28464
|
/**
|
|
27957
28465
|
* the description of the provisioning policy
|
|
27958
28466
|
* @type {string}
|
|
@@ -27985,7 +28493,7 @@ export interface ProvisioningPolicyV2024 {
|
|
|
27985
28493
|
* @type {string}
|
|
27986
28494
|
* @memberof ProvisioningPolicyV2024
|
|
27987
28495
|
*/
|
|
27988
|
-
'name': string;
|
|
28496
|
+
'name': string | null;
|
|
27989
28497
|
/**
|
|
27990
28498
|
* the description of the provisioning policy
|
|
27991
28499
|
* @type {string}
|
|
@@ -29531,6 +30039,83 @@ export interface RequestedAccountRefV2024 {
|
|
|
29531
30039
|
}
|
|
29532
30040
|
|
|
29533
30041
|
|
|
30042
|
+
/**
|
|
30043
|
+
*
|
|
30044
|
+
* @export
|
|
30045
|
+
* @interface RequestedForDtoRefV2024
|
|
30046
|
+
*/
|
|
30047
|
+
export interface RequestedForDtoRefV2024 {
|
|
30048
|
+
/**
|
|
30049
|
+
* The identity id for which the access is requested
|
|
30050
|
+
* @type {string}
|
|
30051
|
+
* @memberof RequestedForDtoRefV2024
|
|
30052
|
+
*/
|
|
30053
|
+
'identityId': string;
|
|
30054
|
+
/**
|
|
30055
|
+
* the details for the access items that are requested for the identity
|
|
30056
|
+
* @type {Array<RequestedItemDtoRefV2024>}
|
|
30057
|
+
* @memberof RequestedForDtoRefV2024
|
|
30058
|
+
*/
|
|
30059
|
+
'requestedItems': Array<RequestedItemDtoRefV2024>;
|
|
30060
|
+
}
|
|
30061
|
+
/**
|
|
30062
|
+
*
|
|
30063
|
+
* @export
|
|
30064
|
+
* @interface RequestedItemAccountSelectionsV2024
|
|
30065
|
+
*/
|
|
30066
|
+
export interface RequestedItemAccountSelectionsV2024 {
|
|
30067
|
+
/**
|
|
30068
|
+
* The description for this requested item
|
|
30069
|
+
* @type {string}
|
|
30070
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
30071
|
+
*/
|
|
30072
|
+
'description'?: string;
|
|
30073
|
+
/**
|
|
30074
|
+
* This field indicates if account selections are not allowed for this requested item. * If true, this field indicates that account selections will not be available for this item and user combination. In this case, no account selections should be provided in the access request for this item and user combination, irrespective of whether the user has single or multiple accounts on a source. * An example is where a user is requesting an access profile that is already assigned to one of their accounts.
|
|
30075
|
+
* @type {boolean}
|
|
30076
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
30077
|
+
*/
|
|
30078
|
+
'accountsSelectionBlocked'?: boolean;
|
|
30079
|
+
/**
|
|
30080
|
+
* If account selections are not allowed for an item, this field will denote the reason.
|
|
30081
|
+
* @type {string}
|
|
30082
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
30083
|
+
*/
|
|
30084
|
+
'accountsSelectionBlockedReason'?: string | null;
|
|
30085
|
+
/**
|
|
30086
|
+
* The type of the item being requested.
|
|
30087
|
+
* @type {string}
|
|
30088
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
30089
|
+
*/
|
|
30090
|
+
'type'?: RequestedItemAccountSelectionsV2024TypeV2024;
|
|
30091
|
+
/**
|
|
30092
|
+
* The id of the requested item
|
|
30093
|
+
* @type {string}
|
|
30094
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
30095
|
+
*/
|
|
30096
|
+
'id'?: string;
|
|
30097
|
+
/**
|
|
30098
|
+
* The name of the requested item
|
|
30099
|
+
* @type {string}
|
|
30100
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
30101
|
+
*/
|
|
30102
|
+
'name'?: string;
|
|
30103
|
+
/**
|
|
30104
|
+
* The details for the sources and accounts for the requested item and identity combination
|
|
30105
|
+
* @type {Array<SourceAccountSelectionsV2024>}
|
|
30106
|
+
* @memberof RequestedItemAccountSelectionsV2024
|
|
30107
|
+
*/
|
|
30108
|
+
'sources'?: Array<SourceAccountSelectionsV2024>;
|
|
30109
|
+
}
|
|
30110
|
+
|
|
30111
|
+
export const RequestedItemAccountSelectionsV2024TypeV2024 = {
|
|
30112
|
+
AccessProfile: 'ACCESS_PROFILE',
|
|
30113
|
+
Role: 'ROLE',
|
|
30114
|
+
Entitlement: 'ENTITLEMENT'
|
|
30115
|
+
} as const;
|
|
30116
|
+
|
|
30117
|
+
export type RequestedItemAccountSelectionsV2024TypeV2024 = typeof RequestedItemAccountSelectionsV2024TypeV2024[keyof typeof RequestedItemAccountSelectionsV2024TypeV2024];
|
|
30118
|
+
|
|
29534
30119
|
/**
|
|
29535
30120
|
*
|
|
29536
30121
|
* @export
|
|
@@ -29559,6 +30144,70 @@ export const RequestedItemDetailsV2024TypeV2024 = {
|
|
|
29559
30144
|
|
|
29560
30145
|
export type RequestedItemDetailsV2024TypeV2024 = typeof RequestedItemDetailsV2024TypeV2024[keyof typeof RequestedItemDetailsV2024TypeV2024];
|
|
29561
30146
|
|
|
30147
|
+
/**
|
|
30148
|
+
*
|
|
30149
|
+
* @export
|
|
30150
|
+
* @interface RequestedItemDtoRefV2024
|
|
30151
|
+
*/
|
|
30152
|
+
export interface RequestedItemDtoRefV2024 {
|
|
30153
|
+
/**
|
|
30154
|
+
* The type of the item being requested.
|
|
30155
|
+
* @type {string}
|
|
30156
|
+
* @memberof RequestedItemDtoRefV2024
|
|
30157
|
+
*/
|
|
30158
|
+
'type': RequestedItemDtoRefV2024TypeV2024;
|
|
30159
|
+
/**
|
|
30160
|
+
* ID of Role, Access Profile or Entitlement being requested.
|
|
30161
|
+
* @type {string}
|
|
30162
|
+
* @memberof RequestedItemDtoRefV2024
|
|
30163
|
+
*/
|
|
30164
|
+
'id': string;
|
|
30165
|
+
/**
|
|
30166
|
+
* Comment provided by requester. * Comment is required when the request is of type Revoke Access.
|
|
30167
|
+
* @type {string}
|
|
30168
|
+
* @memberof RequestedItemDtoRefV2024
|
|
30169
|
+
*/
|
|
30170
|
+
'comment'?: string;
|
|
30171
|
+
/**
|
|
30172
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
|
|
30173
|
+
* @type {{ [key: string]: string; }}
|
|
30174
|
+
* @memberof RequestedItemDtoRefV2024
|
|
30175
|
+
*/
|
|
30176
|
+
'clientMetadata'?: { [key: string]: string; };
|
|
30177
|
+
/**
|
|
30178
|
+
* The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
|
|
30179
|
+
* @type {string}
|
|
30180
|
+
* @memberof RequestedItemDtoRefV2024
|
|
30181
|
+
*/
|
|
30182
|
+
'removeDate'?: string;
|
|
30183
|
+
/**
|
|
30184
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
30185
|
+
* @type {string}
|
|
30186
|
+
* @memberof RequestedItemDtoRefV2024
|
|
30187
|
+
*/
|
|
30188
|
+
'assignmentId'?: string | null;
|
|
30189
|
+
/**
|
|
30190
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
30191
|
+
* @type {string}
|
|
30192
|
+
* @memberof RequestedItemDtoRefV2024
|
|
30193
|
+
*/
|
|
30194
|
+
'nativeIdentity'?: string | null;
|
|
30195
|
+
/**
|
|
30196
|
+
* The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
|
|
30197
|
+
* @type {Array<SourceItemRefV2024>}
|
|
30198
|
+
* @memberof RequestedItemDtoRefV2024
|
|
30199
|
+
*/
|
|
30200
|
+
'accountSelection'?: Array<SourceItemRefV2024> | null;
|
|
30201
|
+
}
|
|
30202
|
+
|
|
30203
|
+
export const RequestedItemDtoRefV2024TypeV2024 = {
|
|
30204
|
+
AccessProfile: 'ACCESS_PROFILE',
|
|
30205
|
+
Role: 'ROLE',
|
|
30206
|
+
Entitlement: 'ENTITLEMENT'
|
|
30207
|
+
} as const;
|
|
30208
|
+
|
|
30209
|
+
export type RequestedItemDtoRefV2024TypeV2024 = typeof RequestedItemDtoRefV2024TypeV2024[keyof typeof RequestedItemDtoRefV2024TypeV2024];
|
|
30210
|
+
|
|
29562
30211
|
/**
|
|
29563
30212
|
*
|
|
29564
30213
|
* @export
|
|
@@ -35820,6 +36469,179 @@ export const ServiceDeskSourceV2024TypeV2024 = {
|
|
|
35820
36469
|
|
|
35821
36470
|
export type ServiceDeskSourceV2024TypeV2024 = typeof ServiceDeskSourceV2024TypeV2024[keyof typeof ServiceDeskSourceV2024TypeV2024];
|
|
35822
36471
|
|
|
36472
|
+
/**
|
|
36473
|
+
*
|
|
36474
|
+
* @export
|
|
36475
|
+
* @interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36476
|
+
*/
|
|
36477
|
+
export interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2024 {
|
|
36478
|
+
/**
|
|
36479
|
+
* Federation protocol role
|
|
36480
|
+
* @type {string}
|
|
36481
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36482
|
+
*/
|
|
36483
|
+
'role'?: ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024;
|
|
36484
|
+
/**
|
|
36485
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
36486
|
+
* @type {string}
|
|
36487
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36488
|
+
*/
|
|
36489
|
+
'entityId'?: string;
|
|
36490
|
+
/**
|
|
36491
|
+
* Defines the binding used for the SAML flow. Used with IDP configurations.
|
|
36492
|
+
* @type {string}
|
|
36493
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36494
|
+
*/
|
|
36495
|
+
'binding'?: string;
|
|
36496
|
+
/**
|
|
36497
|
+
* Specifies the SAML authentication method to use. Used with IDP configurations.
|
|
36498
|
+
* @type {string}
|
|
36499
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36500
|
+
*/
|
|
36501
|
+
'authnContext'?: string;
|
|
36502
|
+
/**
|
|
36503
|
+
* The IDP logout URL. Used with IDP configurations.
|
|
36504
|
+
* @type {string}
|
|
36505
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36506
|
+
*/
|
|
36507
|
+
'logoutUrl'?: string;
|
|
36508
|
+
/**
|
|
36509
|
+
* Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
|
|
36510
|
+
* @type {boolean}
|
|
36511
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36512
|
+
*/
|
|
36513
|
+
'includeAuthnContext'?: boolean;
|
|
36514
|
+
/**
|
|
36515
|
+
* The name id format to use. Used with IDP configurations.
|
|
36516
|
+
* @type {string}
|
|
36517
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36518
|
+
*/
|
|
36519
|
+
'nameId'?: string;
|
|
36520
|
+
/**
|
|
36521
|
+
*
|
|
36522
|
+
* @type {JITConfigurationV2024}
|
|
36523
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36524
|
+
*/
|
|
36525
|
+
'jitConfiguration'?: JITConfigurationV2024;
|
|
36526
|
+
/**
|
|
36527
|
+
* The Base64-encoded certificate used by the IDP. Used with IDP configurations.
|
|
36528
|
+
* @type {string}
|
|
36529
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36530
|
+
*/
|
|
36531
|
+
'cert'?: string;
|
|
36532
|
+
/**
|
|
36533
|
+
* The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
|
|
36534
|
+
* @type {string}
|
|
36535
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36536
|
+
*/
|
|
36537
|
+
'loginUrlPost'?: string;
|
|
36538
|
+
/**
|
|
36539
|
+
* The IDP Redirect URL. Used with IDP configurations.
|
|
36540
|
+
* @type {string}
|
|
36541
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36542
|
+
*/
|
|
36543
|
+
'loginUrlRedirect'?: string;
|
|
36544
|
+
/**
|
|
36545
|
+
* Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
|
|
36546
|
+
* @type {string}
|
|
36547
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36548
|
+
*/
|
|
36549
|
+
'mappingAttribute': string;
|
|
36550
|
+
/**
|
|
36551
|
+
* The expiration date extracted from the certificate.
|
|
36552
|
+
* @type {string}
|
|
36553
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36554
|
+
*/
|
|
36555
|
+
'certificateExpirationDate'?: string;
|
|
36556
|
+
/**
|
|
36557
|
+
* The name extracted from the certificate.
|
|
36558
|
+
* @type {string}
|
|
36559
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36560
|
+
*/
|
|
36561
|
+
'certificateName'?: string;
|
|
36562
|
+
/**
|
|
36563
|
+
* Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
|
|
36564
|
+
* @type {string}
|
|
36565
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36566
|
+
*/
|
|
36567
|
+
'alias'?: string;
|
|
36568
|
+
/**
|
|
36569
|
+
* The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
|
|
36570
|
+
* @type {string}
|
|
36571
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36572
|
+
*/
|
|
36573
|
+
'callbackUrl': string;
|
|
36574
|
+
/**
|
|
36575
|
+
* The legacy ACS URL used for SAML authentication. Used with SP configurations.
|
|
36576
|
+
* @type {string}
|
|
36577
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
|
|
36578
|
+
*/
|
|
36579
|
+
'legacyAcsUrl'?: string;
|
|
36580
|
+
}
|
|
36581
|
+
|
|
36582
|
+
export const ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024 = {
|
|
36583
|
+
SamlIdp: 'SAML_IDP',
|
|
36584
|
+
SamlSp: 'SAML_SP'
|
|
36585
|
+
} as const;
|
|
36586
|
+
|
|
36587
|
+
export type ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024 = typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024[keyof typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024];
|
|
36588
|
+
|
|
36589
|
+
/**
|
|
36590
|
+
* Represents the IdentityNow as Service Provider Configuration allowing customers to log into IDN via an Identity Provider
|
|
36591
|
+
* @export
|
|
36592
|
+
* @interface ServiceProviderConfigurationV2024
|
|
36593
|
+
*/
|
|
36594
|
+
export interface ServiceProviderConfigurationV2024 {
|
|
36595
|
+
/**
|
|
36596
|
+
* This determines whether or not the SAML authentication flow is enabled for an org
|
|
36597
|
+
* @type {boolean}
|
|
36598
|
+
* @memberof ServiceProviderConfigurationV2024
|
|
36599
|
+
*/
|
|
36600
|
+
'enabled'?: boolean;
|
|
36601
|
+
/**
|
|
36602
|
+
* This allows basic login with the parameter prompt=true. This is often toggled on when debugging SAML authentication setup. When false, only org admins with MFA-enabled can bypass the IDP.
|
|
36603
|
+
* @type {boolean}
|
|
36604
|
+
* @memberof ServiceProviderConfigurationV2024
|
|
36605
|
+
*/
|
|
36606
|
+
'bypassIdp'?: boolean;
|
|
36607
|
+
/**
|
|
36608
|
+
* This indicates whether or not the SAML configuration is valid.
|
|
36609
|
+
* @type {boolean}
|
|
36610
|
+
* @memberof ServiceProviderConfigurationV2024
|
|
36611
|
+
*/
|
|
36612
|
+
'samlConfigurationValid'?: boolean;
|
|
36613
|
+
/**
|
|
36614
|
+
* A list of the abstract implementations of the Federation Protocol details. Typically, this will include on SpDetails object and one IdpDetails object used in tandem to define a SAML integration between a customer\'s identity provider and a customer\'s SailPoint instance (i.e., the service provider).
|
|
36615
|
+
* @type {Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2024>}
|
|
36616
|
+
* @memberof ServiceProviderConfigurationV2024
|
|
36617
|
+
*/
|
|
36618
|
+
'federationProtocolDetails'?: Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2024>;
|
|
36619
|
+
}
|
|
36620
|
+
/**
|
|
36621
|
+
*
|
|
36622
|
+
* @export
|
|
36623
|
+
* @interface SessionConfigurationV2024
|
|
36624
|
+
*/
|
|
36625
|
+
export interface SessionConfigurationV2024 {
|
|
36626
|
+
/**
|
|
36627
|
+
* The maximum time in minutes a session can be idle.
|
|
36628
|
+
* @type {number}
|
|
36629
|
+
* @memberof SessionConfigurationV2024
|
|
36630
|
+
*/
|
|
36631
|
+
'maxIdleTime'?: number;
|
|
36632
|
+
/**
|
|
36633
|
+
* Denotes if \'remember me\' is enabled.
|
|
36634
|
+
* @type {boolean}
|
|
36635
|
+
* @memberof SessionConfigurationV2024
|
|
36636
|
+
*/
|
|
36637
|
+
'rememberMe'?: boolean;
|
|
36638
|
+
/**
|
|
36639
|
+
* The maximum allowable session time in minutes.
|
|
36640
|
+
* @type {number}
|
|
36641
|
+
* @memberof SessionConfigurationV2024
|
|
36642
|
+
*/
|
|
36643
|
+
'maxSessionTime'?: number;
|
|
36644
|
+
}
|
|
35823
36645
|
/**
|
|
35824
36646
|
*
|
|
35825
36647
|
* @export
|
|
@@ -36858,6 +37680,39 @@ export interface SourceAccountDeletedV2024 {
|
|
|
36858
37680
|
*/
|
|
36859
37681
|
'attributes': { [key: string]: any; };
|
|
36860
37682
|
}
|
|
37683
|
+
/**
|
|
37684
|
+
*
|
|
37685
|
+
* @export
|
|
37686
|
+
* @interface SourceAccountSelectionsV2024
|
|
37687
|
+
*/
|
|
37688
|
+
export interface SourceAccountSelectionsV2024 {
|
|
37689
|
+
/**
|
|
37690
|
+
*
|
|
37691
|
+
* @type {DtoTypeV2024}
|
|
37692
|
+
* @memberof SourceAccountSelectionsV2024
|
|
37693
|
+
*/
|
|
37694
|
+
'type'?: DtoTypeV2024;
|
|
37695
|
+
/**
|
|
37696
|
+
* The source id
|
|
37697
|
+
* @type {string}
|
|
37698
|
+
* @memberof SourceAccountSelectionsV2024
|
|
37699
|
+
*/
|
|
37700
|
+
'id'?: string;
|
|
37701
|
+
/**
|
|
37702
|
+
* The source name
|
|
37703
|
+
* @type {string}
|
|
37704
|
+
* @memberof SourceAccountSelectionsV2024
|
|
37705
|
+
*/
|
|
37706
|
+
'name'?: string;
|
|
37707
|
+
/**
|
|
37708
|
+
* The accounts information for a particular source in the requested item
|
|
37709
|
+
* @type {Array<AccountInfoRefV2024>}
|
|
37710
|
+
* @memberof SourceAccountSelectionsV2024
|
|
37711
|
+
*/
|
|
37712
|
+
'accounts'?: Array<AccountInfoRefV2024>;
|
|
37713
|
+
}
|
|
37714
|
+
|
|
37715
|
+
|
|
36861
37716
|
/**
|
|
36862
37717
|
*
|
|
36863
37718
|
* @export
|
|
@@ -37643,6 +38498,25 @@ export const SourceHealthDtoV2024StatusV2024 = {
|
|
|
37643
38498
|
|
|
37644
38499
|
export type SourceHealthDtoV2024StatusV2024 = typeof SourceHealthDtoV2024StatusV2024[keyof typeof SourceHealthDtoV2024StatusV2024];
|
|
37645
38500
|
|
|
38501
|
+
/**
|
|
38502
|
+
*
|
|
38503
|
+
* @export
|
|
38504
|
+
* @interface SourceItemRefV2024
|
|
38505
|
+
*/
|
|
38506
|
+
export interface SourceItemRefV2024 {
|
|
38507
|
+
/**
|
|
38508
|
+
* The id for the source on which account selections are made
|
|
38509
|
+
* @type {string}
|
|
38510
|
+
* @memberof SourceItemRefV2024
|
|
38511
|
+
*/
|
|
38512
|
+
'sourceId'?: string | null;
|
|
38513
|
+
/**
|
|
38514
|
+
* A list of account selections on the source. Currently, only one selection per source is supported.
|
|
38515
|
+
* @type {Array<AccountItemRefV2024>}
|
|
38516
|
+
* @memberof SourceItemRefV2024
|
|
38517
|
+
*/
|
|
38518
|
+
'accounts'?: Array<AccountItemRefV2024> | null;
|
|
38519
|
+
}
|
|
37646
38520
|
/**
|
|
37647
38521
|
* Reference to management workgroup for the source.
|
|
37648
38522
|
* @export
|
|
@@ -38767,6 +39641,51 @@ export interface SpConfigRulesV2024 {
|
|
|
38767
39641
|
*/
|
|
38768
39642
|
'editable'?: boolean;
|
|
38769
39643
|
}
|
|
39644
|
+
/**
|
|
39645
|
+
*
|
|
39646
|
+
* @export
|
|
39647
|
+
* @interface SpDetailsV2024
|
|
39648
|
+
*/
|
|
39649
|
+
export interface SpDetailsV2024 {
|
|
39650
|
+
/**
|
|
39651
|
+
* Federation protocol role
|
|
39652
|
+
* @type {string}
|
|
39653
|
+
* @memberof SpDetailsV2024
|
|
39654
|
+
*/
|
|
39655
|
+
'role'?: SpDetailsV2024RoleV2024;
|
|
39656
|
+
/**
|
|
39657
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
39658
|
+
* @type {string}
|
|
39659
|
+
* @memberof SpDetailsV2024
|
|
39660
|
+
*/
|
|
39661
|
+
'entityId'?: string;
|
|
39662
|
+
/**
|
|
39663
|
+
* Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
|
|
39664
|
+
* @type {string}
|
|
39665
|
+
* @memberof SpDetailsV2024
|
|
39666
|
+
*/
|
|
39667
|
+
'alias'?: string;
|
|
39668
|
+
/**
|
|
39669
|
+
* The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
|
|
39670
|
+
* @type {string}
|
|
39671
|
+
* @memberof SpDetailsV2024
|
|
39672
|
+
*/
|
|
39673
|
+
'callbackUrl': string;
|
|
39674
|
+
/**
|
|
39675
|
+
* The legacy ACS URL used for SAML authentication. Used with SP configurations.
|
|
39676
|
+
* @type {string}
|
|
39677
|
+
* @memberof SpDetailsV2024
|
|
39678
|
+
*/
|
|
39679
|
+
'legacyAcsUrl'?: string;
|
|
39680
|
+
}
|
|
39681
|
+
|
|
39682
|
+
export const SpDetailsV2024RoleV2024 = {
|
|
39683
|
+
SamlIdp: 'SAML_IDP',
|
|
39684
|
+
SamlSp: 'SAML_SP'
|
|
39685
|
+
} as const;
|
|
39686
|
+
|
|
39687
|
+
export type SpDetailsV2024RoleV2024 = typeof SpDetailsV2024RoleV2024[keyof typeof SpDetailsV2024RoleV2024];
|
|
39688
|
+
|
|
38770
39689
|
/**
|
|
38771
39690
|
*
|
|
38772
39691
|
* @export
|
|
@@ -42485,6 +43404,7 @@ export const WorkflowExecutionV2024StatusV2024 = {
|
|
|
42485
43404
|
Completed: 'Completed',
|
|
42486
43405
|
Failed: 'Failed',
|
|
42487
43406
|
Canceled: 'Canceled',
|
|
43407
|
+
Queued: 'Queued',
|
|
42488
43408
|
Running: 'Running'
|
|
42489
43409
|
} as const;
|
|
42490
43410
|
|
|
@@ -43805,7 +44725,7 @@ export class AccessModelMetadataV2024Api extends BaseAPI {
|
|
|
43805
44725
|
export const AccessProfilesV2024ApiAxiosParamCreator = function (configuration?: Configuration) {
|
|
43806
44726
|
return {
|
|
43807
44727
|
/**
|
|
43808
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
44728
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
43809
44729
|
* @summary Create Access Profile
|
|
43810
44730
|
* @param {AccessProfileV2024} accessProfileV2024
|
|
43811
44731
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -44260,7 +45180,7 @@ export const AccessProfilesV2024ApiFp = function(configuration?: Configuration)
|
|
|
44260
45180
|
const localVarAxiosParamCreator = AccessProfilesV2024ApiAxiosParamCreator(configuration)
|
|
44261
45181
|
return {
|
|
44262
45182
|
/**
|
|
44263
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
45183
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
44264
45184
|
* @summary Create Access Profile
|
|
44265
45185
|
* @param {AccessProfileV2024} accessProfileV2024
|
|
44266
45186
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -44388,7 +45308,7 @@ export const AccessProfilesV2024ApiFactory = function (configuration?: Configura
|
|
|
44388
45308
|
const localVarFp = AccessProfilesV2024ApiFp(configuration)
|
|
44389
45309
|
return {
|
|
44390
45310
|
/**
|
|
44391
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
45311
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
44392
45312
|
* @summary Create Access Profile
|
|
44393
45313
|
* @param {AccessProfilesV2024ApiCreateAccessProfileRequest} requestParameters Request parameters.
|
|
44394
45314
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -44688,7 +45608,7 @@ export interface AccessProfilesV2024ApiUpdateAccessProfilesInBulkRequest {
|
|
|
44688
45608
|
*/
|
|
44689
45609
|
export class AccessProfilesV2024Api extends BaseAPI {
|
|
44690
45610
|
/**
|
|
44691
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
45611
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
44692
45612
|
* @summary Create Access Profile
|
|
44693
45613
|
* @param {AccessProfilesV2024ApiCreateAccessProfileRequest} requestParameters Request parameters.
|
|
44694
45614
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -45066,7 +45986,7 @@ export const AccessRequestApprovalsV2024ApiAxiosParamCreator = function (configu
|
|
|
45066
45986
|
* @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
45067
45987
|
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
45068
45988
|
* @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count=true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
45069
|
-
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
|
|
45989
|
+
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
|
|
45070
45990
|
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified**
|
|
45071
45991
|
* @param {*} [axiosOptions] Override http request option.
|
|
45072
45992
|
* @throws {RequiredError}
|
|
@@ -45268,7 +46188,7 @@ export const AccessRequestApprovalsV2024ApiFp = function(configuration?: Configu
|
|
|
45268
46188
|
* @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
45269
46189
|
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
45270
46190
|
* @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count=true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
45271
|
-
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
|
|
46191
|
+
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
|
|
45272
46192
|
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified**
|
|
45273
46193
|
* @param {*} [axiosOptions] Override http request option.
|
|
45274
46194
|
* @throws {RequiredError}
|
|
@@ -45558,7 +46478,7 @@ export interface AccessRequestApprovalsV2024ApiListPendingApprovalsRequest {
|
|
|
45558
46478
|
readonly count?: boolean
|
|
45559
46479
|
|
|
45560
46480
|
/**
|
|
45561
|
-
* Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
|
|
46481
|
+
* Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
|
|
45562
46482
|
* @type {string}
|
|
45563
46483
|
* @memberof AccessRequestApprovalsV2024ApiListPendingApprovals
|
|
45564
46484
|
*/
|
|
@@ -46041,7 +46961,7 @@ export const AccessRequestsV2024ApiAxiosParamCreator = function (configuration?:
|
|
|
46041
46961
|
};
|
|
46042
46962
|
},
|
|
46043
46963
|
/**
|
|
46044
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
46964
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
46045
46965
|
* @summary Submit Access Request
|
|
46046
46966
|
* @param {AccessRequestV2024} accessRequestV2024
|
|
46047
46967
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -46298,6 +47218,50 @@ export const AccessRequestsV2024ApiAxiosParamCreator = function (configuration?:
|
|
|
46298
47218
|
axiosOptions: localVarRequestOptions,
|
|
46299
47219
|
};
|
|
46300
47220
|
},
|
|
47221
|
+
/**
|
|
47222
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
47223
|
+
* @summary Get accounts selections for identity
|
|
47224
|
+
* @param {AccountsSelectionRequestV2024} accountsSelectionRequestV2024
|
|
47225
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
47226
|
+
* @throws {RequiredError}
|
|
47227
|
+
*/
|
|
47228
|
+
loadAccountSelections: async (accountsSelectionRequestV2024: AccountsSelectionRequestV2024, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
47229
|
+
// verify required parameter 'accountsSelectionRequestV2024' is not null or undefined
|
|
47230
|
+
assertParamExists('loadAccountSelections', 'accountsSelectionRequestV2024', accountsSelectionRequestV2024)
|
|
47231
|
+
const localVarPath = `/access-requests/accounts-selection`;
|
|
47232
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
47233
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
47234
|
+
let baseOptions;
|
|
47235
|
+
if (configuration) {
|
|
47236
|
+
baseOptions = configuration.baseOptions;
|
|
47237
|
+
}
|
|
47238
|
+
|
|
47239
|
+
const localVarRequestOptions = { method: 'POST', ...baseOptions, ...axiosOptions};
|
|
47240
|
+
const localVarHeaderParameter = {} as any;
|
|
47241
|
+
const localVarQueryParameter = {} as any;
|
|
47242
|
+
|
|
47243
|
+
// authentication userAuth required
|
|
47244
|
+
// oauth required
|
|
47245
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
47246
|
+
|
|
47247
|
+
// authentication userAuth required
|
|
47248
|
+
// oauth required
|
|
47249
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
47250
|
+
|
|
47251
|
+
|
|
47252
|
+
|
|
47253
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
47254
|
+
|
|
47255
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
47256
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
47257
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
47258
|
+
localVarRequestOptions.data = serializeDataIfNeeded(accountsSelectionRequestV2024, localVarRequestOptions, configuration)
|
|
47259
|
+
|
|
47260
|
+
return {
|
|
47261
|
+
url: toPathString(localVarUrlObj),
|
|
47262
|
+
axiosOptions: localVarRequestOptions,
|
|
47263
|
+
};
|
|
47264
|
+
},
|
|
46301
47265
|
/**
|
|
46302
47266
|
* This endpoint replaces the current access-request configuration.
|
|
46303
47267
|
* @summary Update Access Request Configuration
|
|
@@ -46406,7 +47370,7 @@ export const AccessRequestsV2024ApiFp = function(configuration?: Configuration)
|
|
|
46406
47370
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
46407
47371
|
},
|
|
46408
47372
|
/**
|
|
46409
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
47373
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
46410
47374
|
* @summary Submit Access Request
|
|
46411
47375
|
* @param {AccessRequestV2024} accessRequestV2024
|
|
46412
47376
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -46474,6 +47438,19 @@ export const AccessRequestsV2024ApiFp = function(configuration?: Configuration)
|
|
|
46474
47438
|
const localVarOperationServerBasePath = operationServerMap['AccessRequestsV2024Api.listAdministratorsAccessRequestStatus']?.[localVarOperationServerIndex]?.url;
|
|
46475
47439
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
46476
47440
|
},
|
|
47441
|
+
/**
|
|
47442
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
47443
|
+
* @summary Get accounts selections for identity
|
|
47444
|
+
* @param {AccountsSelectionRequestV2024} accountsSelectionRequestV2024
|
|
47445
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
47446
|
+
* @throws {RequiredError}
|
|
47447
|
+
*/
|
|
47448
|
+
async loadAccountSelections(accountsSelectionRequestV2024: AccountsSelectionRequestV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AccountsSelectionResponseV2024>> {
|
|
47449
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.loadAccountSelections(accountsSelectionRequestV2024, axiosOptions);
|
|
47450
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
47451
|
+
const localVarOperationServerBasePath = operationServerMap['AccessRequestsV2024Api.loadAccountSelections']?.[localVarOperationServerIndex]?.url;
|
|
47452
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
47453
|
+
},
|
|
46477
47454
|
/**
|
|
46478
47455
|
* This endpoint replaces the current access-request configuration.
|
|
46479
47456
|
* @summary Update Access Request Configuration
|
|
@@ -46538,7 +47515,7 @@ export const AccessRequestsV2024ApiFactory = function (configuration?: Configura
|
|
|
46538
47515
|
return localVarFp.closeAccessRequest(requestParameters.closeAccessRequestV2024, requestParameters.xSailPointExperimental, axiosOptions).then((request) => request(axios, basePath));
|
|
46539
47516
|
},
|
|
46540
47517
|
/**
|
|
46541
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
47518
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
46542
47519
|
* @summary Submit Access Request
|
|
46543
47520
|
* @param {AccessRequestsV2024ApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
46544
47521
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -46576,6 +47553,16 @@ export const AccessRequestsV2024ApiFactory = function (configuration?: Configura
|
|
|
46576
47553
|
listAdministratorsAccessRequestStatus(requestParameters: AccessRequestsV2024ApiListAdministratorsAccessRequestStatusRequest = {}, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<AccessRequestAdminItemStatusV2024>> {
|
|
46577
47554
|
return localVarFp.listAdministratorsAccessRequestStatus(requestParameters.requestedFor, requestParameters.requestedBy, requestParameters.regardingIdentity, requestParameters.assignedTo, requestParameters.count, requestParameters.limit, requestParameters.offset, requestParameters.filters, requestParameters.sorters, requestParameters.requestState, axiosOptions).then((request) => request(axios, basePath));
|
|
46578
47555
|
},
|
|
47556
|
+
/**
|
|
47557
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
47558
|
+
* @summary Get accounts selections for identity
|
|
47559
|
+
* @param {AccessRequestsV2024ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
|
|
47560
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
47561
|
+
* @throws {RequiredError}
|
|
47562
|
+
*/
|
|
47563
|
+
loadAccountSelections(requestParameters: AccessRequestsV2024ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<AccountsSelectionResponseV2024> {
|
|
47564
|
+
return localVarFp.loadAccountSelections(requestParameters.accountsSelectionRequestV2024, axiosOptions).then((request) => request(axios, basePath));
|
|
47565
|
+
},
|
|
46579
47566
|
/**
|
|
46580
47567
|
* This endpoint replaces the current access-request configuration.
|
|
46581
47568
|
* @summary Update Access Request Configuration
|
|
@@ -46820,6 +47807,20 @@ export interface AccessRequestsV2024ApiListAdministratorsAccessRequestStatusRequ
|
|
|
46820
47807
|
readonly requestState?: string
|
|
46821
47808
|
}
|
|
46822
47809
|
|
|
47810
|
+
/**
|
|
47811
|
+
* Request parameters for loadAccountSelections operation in AccessRequestsV2024Api.
|
|
47812
|
+
* @export
|
|
47813
|
+
* @interface AccessRequestsV2024ApiLoadAccountSelectionsRequest
|
|
47814
|
+
*/
|
|
47815
|
+
export interface AccessRequestsV2024ApiLoadAccountSelectionsRequest {
|
|
47816
|
+
/**
|
|
47817
|
+
*
|
|
47818
|
+
* @type {AccountsSelectionRequestV2024}
|
|
47819
|
+
* @memberof AccessRequestsV2024ApiLoadAccountSelections
|
|
47820
|
+
*/
|
|
47821
|
+
readonly accountsSelectionRequestV2024: AccountsSelectionRequestV2024
|
|
47822
|
+
}
|
|
47823
|
+
|
|
46823
47824
|
/**
|
|
46824
47825
|
* Request parameters for setAccessRequestConfig operation in AccessRequestsV2024Api.
|
|
46825
47826
|
* @export
|
|
@@ -46890,7 +47891,7 @@ export class AccessRequestsV2024Api extends BaseAPI {
|
|
|
46890
47891
|
}
|
|
46891
47892
|
|
|
46892
47893
|
/**
|
|
46893
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
47894
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
46894
47895
|
* @summary Submit Access Request
|
|
46895
47896
|
* @param {AccessRequestsV2024ApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
46896
47897
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -46936,6 +47937,18 @@ export class AccessRequestsV2024Api extends BaseAPI {
|
|
|
46936
47937
|
return AccessRequestsV2024ApiFp(this.configuration).listAdministratorsAccessRequestStatus(requestParameters.requestedFor, requestParameters.requestedBy, requestParameters.regardingIdentity, requestParameters.assignedTo, requestParameters.count, requestParameters.limit, requestParameters.offset, requestParameters.filters, requestParameters.sorters, requestParameters.requestState, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
46937
47938
|
}
|
|
46938
47939
|
|
|
47940
|
+
/**
|
|
47941
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
47942
|
+
* @summary Get accounts selections for identity
|
|
47943
|
+
* @param {AccessRequestsV2024ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
|
|
47944
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
47945
|
+
* @throws {RequiredError}
|
|
47946
|
+
* @memberof AccessRequestsV2024Api
|
|
47947
|
+
*/
|
|
47948
|
+
public loadAccountSelections(requestParameters: AccessRequestsV2024ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
47949
|
+
return AccessRequestsV2024ApiFp(this.configuration).loadAccountSelections(requestParameters.accountsSelectionRequestV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
47950
|
+
}
|
|
47951
|
+
|
|
46939
47952
|
/**
|
|
46940
47953
|
* This endpoint replaces the current access-request configuration.
|
|
46941
47954
|
* @summary Update Access Request Configuration
|
|
@@ -54875,7 +55888,7 @@ export const CertificationCampaignsV2024ApiFp = function(configuration?: Configu
|
|
|
54875
55888
|
* @param {*} [axiosOptions] Override http request option.
|
|
54876
55889
|
* @throws {RequiredError}
|
|
54877
55890
|
*/
|
|
54878
|
-
async getCampaign(id: string, detail?: GetCampaignDetailV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<
|
|
55891
|
+
async getCampaign(id: string, detail?: GetCampaignDetailV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetCampaign200ResponseV2024>> {
|
|
54879
55892
|
const localVarAxiosArgs = await localVarAxiosParamCreator.getCampaign(id, detail, axiosOptions);
|
|
54880
55893
|
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
54881
55894
|
const localVarOperationServerBasePath = operationServerMap['CertificationCampaignsV2024Api.getCampaign']?.[localVarOperationServerIndex]?.url;
|
|
@@ -55159,7 +56172,7 @@ export const CertificationCampaignsV2024ApiFactory = function (configuration?: C
|
|
|
55159
56172
|
* @param {*} [axiosOptions] Override http request option.
|
|
55160
56173
|
* @throws {RequiredError}
|
|
55161
56174
|
*/
|
|
55162
|
-
getCampaign(requestParameters: CertificationCampaignsV2024ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<
|
|
56175
|
+
getCampaign(requestParameters: CertificationCampaignsV2024ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetCampaign200ResponseV2024> {
|
|
55163
56176
|
return localVarFp.getCampaign(requestParameters.id, requestParameters.detail, axiosOptions).then((request) => request(axios, basePath));
|
|
55164
56177
|
},
|
|
55165
56178
|
/**
|
|
@@ -68797,6 +69810,44 @@ export const GlobalTenantSecuritySettingsV2024ApiAxiosParamCreator = function (c
|
|
|
68797
69810
|
axiosOptions: localVarRequestOptions,
|
|
68798
69811
|
};
|
|
68799
69812
|
},
|
|
69813
|
+
/**
|
|
69814
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
69815
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
69816
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
69817
|
+
* @throws {RequiredError}
|
|
69818
|
+
*/
|
|
69819
|
+
getAuthOrgLockoutConfig: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
69820
|
+
const localVarPath = `/auth-org/lockout-config`;
|
|
69821
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
69822
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
69823
|
+
let baseOptions;
|
|
69824
|
+
if (configuration) {
|
|
69825
|
+
baseOptions = configuration.baseOptions;
|
|
69826
|
+
}
|
|
69827
|
+
|
|
69828
|
+
const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
|
|
69829
|
+
const localVarHeaderParameter = {} as any;
|
|
69830
|
+
const localVarQueryParameter = {} as any;
|
|
69831
|
+
|
|
69832
|
+
// authentication userAuth required
|
|
69833
|
+
// oauth required
|
|
69834
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
69835
|
+
|
|
69836
|
+
// authentication userAuth required
|
|
69837
|
+
// oauth required
|
|
69838
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
69839
|
+
|
|
69840
|
+
|
|
69841
|
+
|
|
69842
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
69843
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
69844
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
69845
|
+
|
|
69846
|
+
return {
|
|
69847
|
+
url: toPathString(localVarUrlObj),
|
|
69848
|
+
axiosOptions: localVarRequestOptions,
|
|
69849
|
+
};
|
|
69850
|
+
},
|
|
68800
69851
|
/**
|
|
68801
69852
|
* This API returns the details of an org\'s network auth configuration.
|
|
68802
69853
|
* @summary Get security network configuration.
|
|
@@ -68835,6 +69886,126 @@ export const GlobalTenantSecuritySettingsV2024ApiAxiosParamCreator = function (c
|
|
|
68835
69886
|
axiosOptions: localVarRequestOptions,
|
|
68836
69887
|
};
|
|
68837
69888
|
},
|
|
69889
|
+
/**
|
|
69890
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
69891
|
+
* @summary Get Service Provider Configuration.
|
|
69892
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
69893
|
+
* @throws {RequiredError}
|
|
69894
|
+
*/
|
|
69895
|
+
getAuthOrgServiceProviderConfig: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
69896
|
+
const localVarPath = `/auth-org/service-provider-config`;
|
|
69897
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
69898
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
69899
|
+
let baseOptions;
|
|
69900
|
+
if (configuration) {
|
|
69901
|
+
baseOptions = configuration.baseOptions;
|
|
69902
|
+
}
|
|
69903
|
+
|
|
69904
|
+
const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
|
|
69905
|
+
const localVarHeaderParameter = {} as any;
|
|
69906
|
+
const localVarQueryParameter = {} as any;
|
|
69907
|
+
|
|
69908
|
+
// authentication userAuth required
|
|
69909
|
+
// oauth required
|
|
69910
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
69911
|
+
|
|
69912
|
+
// authentication userAuth required
|
|
69913
|
+
// oauth required
|
|
69914
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
69915
|
+
|
|
69916
|
+
|
|
69917
|
+
|
|
69918
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
69919
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
69920
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
69921
|
+
|
|
69922
|
+
return {
|
|
69923
|
+
url: toPathString(localVarUrlObj),
|
|
69924
|
+
axiosOptions: localVarRequestOptions,
|
|
69925
|
+
};
|
|
69926
|
+
},
|
|
69927
|
+
/**
|
|
69928
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
69929
|
+
* @summary Get Auth Org Session Configuration.
|
|
69930
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
69931
|
+
* @throws {RequiredError}
|
|
69932
|
+
*/
|
|
69933
|
+
getAuthOrgSessionConfig: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
69934
|
+
const localVarPath = `/auth-org/session-config`;
|
|
69935
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
69936
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
69937
|
+
let baseOptions;
|
|
69938
|
+
if (configuration) {
|
|
69939
|
+
baseOptions = configuration.baseOptions;
|
|
69940
|
+
}
|
|
69941
|
+
|
|
69942
|
+
const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
|
|
69943
|
+
const localVarHeaderParameter = {} as any;
|
|
69944
|
+
const localVarQueryParameter = {} as any;
|
|
69945
|
+
|
|
69946
|
+
// authentication userAuth required
|
|
69947
|
+
// oauth required
|
|
69948
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
69949
|
+
|
|
69950
|
+
// authentication userAuth required
|
|
69951
|
+
// oauth required
|
|
69952
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
69953
|
+
|
|
69954
|
+
|
|
69955
|
+
|
|
69956
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
69957
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
69958
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
69959
|
+
|
|
69960
|
+
return {
|
|
69961
|
+
url: toPathString(localVarUrlObj),
|
|
69962
|
+
axiosOptions: localVarRequestOptions,
|
|
69963
|
+
};
|
|
69964
|
+
},
|
|
69965
|
+
/**
|
|
69966
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
69967
|
+
* @summary Update Auth Org Lockout Configuration
|
|
69968
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
69969
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
69970
|
+
* @throws {RequiredError}
|
|
69971
|
+
*/
|
|
69972
|
+
patchAuthOrgLockoutConfig: async (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
69973
|
+
// verify required parameter 'jsonPatchOperationV2024' is not null or undefined
|
|
69974
|
+
assertParamExists('patchAuthOrgLockoutConfig', 'jsonPatchOperationV2024', jsonPatchOperationV2024)
|
|
69975
|
+
const localVarPath = `/auth-org/lockout-config`;
|
|
69976
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
69977
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
69978
|
+
let baseOptions;
|
|
69979
|
+
if (configuration) {
|
|
69980
|
+
baseOptions = configuration.baseOptions;
|
|
69981
|
+
}
|
|
69982
|
+
|
|
69983
|
+
const localVarRequestOptions = { method: 'PATCH', ...baseOptions, ...axiosOptions};
|
|
69984
|
+
const localVarHeaderParameter = {} as any;
|
|
69985
|
+
const localVarQueryParameter = {} as any;
|
|
69986
|
+
|
|
69987
|
+
// authentication userAuth required
|
|
69988
|
+
// oauth required
|
|
69989
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
69990
|
+
|
|
69991
|
+
// authentication userAuth required
|
|
69992
|
+
// oauth required
|
|
69993
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
69994
|
+
|
|
69995
|
+
|
|
69996
|
+
|
|
69997
|
+
localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
|
|
69998
|
+
|
|
69999
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
70000
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
70001
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
70002
|
+
localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2024, localVarRequestOptions, configuration)
|
|
70003
|
+
|
|
70004
|
+
return {
|
|
70005
|
+
url: toPathString(localVarUrlObj),
|
|
70006
|
+
axiosOptions: localVarRequestOptions,
|
|
70007
|
+
};
|
|
70008
|
+
},
|
|
68838
70009
|
/**
|
|
68839
70010
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
68840
70011
|
* @summary Update security network configuration.
|
|
@@ -68867,6 +70038,94 @@ export const GlobalTenantSecuritySettingsV2024ApiAxiosParamCreator = function (c
|
|
|
68867
70038
|
|
|
68868
70039
|
|
|
68869
70040
|
|
|
70041
|
+
localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
|
|
70042
|
+
|
|
70043
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
70044
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
70045
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
70046
|
+
localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2024, localVarRequestOptions, configuration)
|
|
70047
|
+
|
|
70048
|
+
return {
|
|
70049
|
+
url: toPathString(localVarUrlObj),
|
|
70050
|
+
axiosOptions: localVarRequestOptions,
|
|
70051
|
+
};
|
|
70052
|
+
},
|
|
70053
|
+
/**
|
|
70054
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
70055
|
+
* @summary Update Service Provider Configuration
|
|
70056
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
70057
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70058
|
+
* @throws {RequiredError}
|
|
70059
|
+
*/
|
|
70060
|
+
patchAuthOrgServiceProviderConfig: async (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
70061
|
+
// verify required parameter 'jsonPatchOperationV2024' is not null or undefined
|
|
70062
|
+
assertParamExists('patchAuthOrgServiceProviderConfig', 'jsonPatchOperationV2024', jsonPatchOperationV2024)
|
|
70063
|
+
const localVarPath = `/auth-org/service-provider-config`;
|
|
70064
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
70065
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
70066
|
+
let baseOptions;
|
|
70067
|
+
if (configuration) {
|
|
70068
|
+
baseOptions = configuration.baseOptions;
|
|
70069
|
+
}
|
|
70070
|
+
|
|
70071
|
+
const localVarRequestOptions = { method: 'PATCH', ...baseOptions, ...axiosOptions};
|
|
70072
|
+
const localVarHeaderParameter = {} as any;
|
|
70073
|
+
const localVarQueryParameter = {} as any;
|
|
70074
|
+
|
|
70075
|
+
// authentication userAuth required
|
|
70076
|
+
// oauth required
|
|
70077
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70078
|
+
|
|
70079
|
+
// authentication userAuth required
|
|
70080
|
+
// oauth required
|
|
70081
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70082
|
+
|
|
70083
|
+
|
|
70084
|
+
|
|
70085
|
+
localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
|
|
70086
|
+
|
|
70087
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
70088
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
70089
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
70090
|
+
localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2024, localVarRequestOptions, configuration)
|
|
70091
|
+
|
|
70092
|
+
return {
|
|
70093
|
+
url: toPathString(localVarUrlObj),
|
|
70094
|
+
axiosOptions: localVarRequestOptions,
|
|
70095
|
+
};
|
|
70096
|
+
},
|
|
70097
|
+
/**
|
|
70098
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
70099
|
+
* @summary Update Auth Org Session Configuration
|
|
70100
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
70101
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70102
|
+
* @throws {RequiredError}
|
|
70103
|
+
*/
|
|
70104
|
+
patchAuthOrgSessionConfig: async (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
70105
|
+
// verify required parameter 'jsonPatchOperationV2024' is not null or undefined
|
|
70106
|
+
assertParamExists('patchAuthOrgSessionConfig', 'jsonPatchOperationV2024', jsonPatchOperationV2024)
|
|
70107
|
+
const localVarPath = `/auth-org/session-config`;
|
|
70108
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
70109
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
70110
|
+
let baseOptions;
|
|
70111
|
+
if (configuration) {
|
|
70112
|
+
baseOptions = configuration.baseOptions;
|
|
70113
|
+
}
|
|
70114
|
+
|
|
70115
|
+
const localVarRequestOptions = { method: 'PATCH', ...baseOptions, ...axiosOptions};
|
|
70116
|
+
const localVarHeaderParameter = {} as any;
|
|
70117
|
+
const localVarQueryParameter = {} as any;
|
|
70118
|
+
|
|
70119
|
+
// authentication userAuth required
|
|
70120
|
+
// oauth required
|
|
70121
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70122
|
+
|
|
70123
|
+
// authentication userAuth required
|
|
70124
|
+
// oauth required
|
|
70125
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70126
|
+
|
|
70127
|
+
|
|
70128
|
+
|
|
68870
70129
|
localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
|
|
68871
70130
|
|
|
68872
70131
|
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
@@ -68902,6 +70161,18 @@ export const GlobalTenantSecuritySettingsV2024ApiFp = function(configuration?: C
|
|
|
68902
70161
|
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.createAuthOrgNetworkConfig']?.[localVarOperationServerIndex]?.url;
|
|
68903
70162
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
68904
70163
|
},
|
|
70164
|
+
/**
|
|
70165
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
70166
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
70167
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70168
|
+
* @throws {RequiredError}
|
|
70169
|
+
*/
|
|
70170
|
+
async getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2024>> {
|
|
70171
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.getAuthOrgLockoutConfig(axiosOptions);
|
|
70172
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
70173
|
+
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.getAuthOrgLockoutConfig']?.[localVarOperationServerIndex]?.url;
|
|
70174
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
70175
|
+
},
|
|
68905
70176
|
/**
|
|
68906
70177
|
* This API returns the details of an org\'s network auth configuration.
|
|
68907
70178
|
* @summary Get security network configuration.
|
|
@@ -68914,6 +70185,43 @@ export const GlobalTenantSecuritySettingsV2024ApiFp = function(configuration?: C
|
|
|
68914
70185
|
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.getAuthOrgNetworkConfig']?.[localVarOperationServerIndex]?.url;
|
|
68915
70186
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
68916
70187
|
},
|
|
70188
|
+
/**
|
|
70189
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
70190
|
+
* @summary Get Service Provider Configuration.
|
|
70191
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70192
|
+
* @throws {RequiredError}
|
|
70193
|
+
*/
|
|
70194
|
+
async getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2024>> {
|
|
70195
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.getAuthOrgServiceProviderConfig(axiosOptions);
|
|
70196
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
70197
|
+
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.getAuthOrgServiceProviderConfig']?.[localVarOperationServerIndex]?.url;
|
|
70198
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
70199
|
+
},
|
|
70200
|
+
/**
|
|
70201
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
70202
|
+
* @summary Get Auth Org Session Configuration.
|
|
70203
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70204
|
+
* @throws {RequiredError}
|
|
70205
|
+
*/
|
|
70206
|
+
async getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2024>> {
|
|
70207
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.getAuthOrgSessionConfig(axiosOptions);
|
|
70208
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
70209
|
+
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.getAuthOrgSessionConfig']?.[localVarOperationServerIndex]?.url;
|
|
70210
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
70211
|
+
},
|
|
70212
|
+
/**
|
|
70213
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
70214
|
+
* @summary Update Auth Org Lockout Configuration
|
|
70215
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
70216
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70217
|
+
* @throws {RequiredError}
|
|
70218
|
+
*/
|
|
70219
|
+
async patchAuthOrgLockoutConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2024>> {
|
|
70220
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.patchAuthOrgLockoutConfig(jsonPatchOperationV2024, axiosOptions);
|
|
70221
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
70222
|
+
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.patchAuthOrgLockoutConfig']?.[localVarOperationServerIndex]?.url;
|
|
70223
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
70224
|
+
},
|
|
68917
70225
|
/**
|
|
68918
70226
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
68919
70227
|
* @summary Update security network configuration.
|
|
@@ -68927,6 +70235,32 @@ export const GlobalTenantSecuritySettingsV2024ApiFp = function(configuration?: C
|
|
|
68927
70235
|
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.patchAuthOrgNetworkConfig']?.[localVarOperationServerIndex]?.url;
|
|
68928
70236
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
68929
70237
|
},
|
|
70238
|
+
/**
|
|
70239
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
70240
|
+
* @summary Update Service Provider Configuration
|
|
70241
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
70242
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70243
|
+
* @throws {RequiredError}
|
|
70244
|
+
*/
|
|
70245
|
+
async patchAuthOrgServiceProviderConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2024>> {
|
|
70246
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.patchAuthOrgServiceProviderConfig(jsonPatchOperationV2024, axiosOptions);
|
|
70247
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
70248
|
+
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.patchAuthOrgServiceProviderConfig']?.[localVarOperationServerIndex]?.url;
|
|
70249
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
70250
|
+
},
|
|
70251
|
+
/**
|
|
70252
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
70253
|
+
* @summary Update Auth Org Session Configuration
|
|
70254
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
70255
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70256
|
+
* @throws {RequiredError}
|
|
70257
|
+
*/
|
|
70258
|
+
async patchAuthOrgSessionConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2024>> {
|
|
70259
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.patchAuthOrgSessionConfig(jsonPatchOperationV2024, axiosOptions);
|
|
70260
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
70261
|
+
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2024Api.patchAuthOrgSessionConfig']?.[localVarOperationServerIndex]?.url;
|
|
70262
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
70263
|
+
},
|
|
68930
70264
|
}
|
|
68931
70265
|
};
|
|
68932
70266
|
|
|
@@ -68947,6 +70281,15 @@ export const GlobalTenantSecuritySettingsV2024ApiFactory = function (configurati
|
|
|
68947
70281
|
createAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiCreateAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2024> {
|
|
68948
70282
|
return localVarFp.createAuthOrgNetworkConfig(requestParameters.networkConfigurationV2024, axiosOptions).then((request) => request(axios, basePath));
|
|
68949
70283
|
},
|
|
70284
|
+
/**
|
|
70285
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
70286
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
70287
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70288
|
+
* @throws {RequiredError}
|
|
70289
|
+
*/
|
|
70290
|
+
getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2024> {
|
|
70291
|
+
return localVarFp.getAuthOrgLockoutConfig(axiosOptions).then((request) => request(axios, basePath));
|
|
70292
|
+
},
|
|
68950
70293
|
/**
|
|
68951
70294
|
* This API returns the details of an org\'s network auth configuration.
|
|
68952
70295
|
* @summary Get security network configuration.
|
|
@@ -68956,6 +70299,34 @@ export const GlobalTenantSecuritySettingsV2024ApiFactory = function (configurati
|
|
|
68956
70299
|
getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2024> {
|
|
68957
70300
|
return localVarFp.getAuthOrgNetworkConfig(axiosOptions).then((request) => request(axios, basePath));
|
|
68958
70301
|
},
|
|
70302
|
+
/**
|
|
70303
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
70304
|
+
* @summary Get Service Provider Configuration.
|
|
70305
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70306
|
+
* @throws {RequiredError}
|
|
70307
|
+
*/
|
|
70308
|
+
getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2024> {
|
|
70309
|
+
return localVarFp.getAuthOrgServiceProviderConfig(axiosOptions).then((request) => request(axios, basePath));
|
|
70310
|
+
},
|
|
70311
|
+
/**
|
|
70312
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
70313
|
+
* @summary Get Auth Org Session Configuration.
|
|
70314
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70315
|
+
* @throws {RequiredError}
|
|
70316
|
+
*/
|
|
70317
|
+
getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2024> {
|
|
70318
|
+
return localVarFp.getAuthOrgSessionConfig(axiosOptions).then((request) => request(axios, basePath));
|
|
70319
|
+
},
|
|
70320
|
+
/**
|
|
70321
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
70322
|
+
* @summary Update Auth Org Lockout Configuration
|
|
70323
|
+
* @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
|
|
70324
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70325
|
+
* @throws {RequiredError}
|
|
70326
|
+
*/
|
|
70327
|
+
patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2024> {
|
|
70328
|
+
return localVarFp.patchAuthOrgLockoutConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(axios, basePath));
|
|
70329
|
+
},
|
|
68959
70330
|
/**
|
|
68960
70331
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
68961
70332
|
* @summary Update security network configuration.
|
|
@@ -68966,6 +70337,26 @@ export const GlobalTenantSecuritySettingsV2024ApiFactory = function (configurati
|
|
|
68966
70337
|
patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2024> {
|
|
68967
70338
|
return localVarFp.patchAuthOrgNetworkConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(axios, basePath));
|
|
68968
70339
|
},
|
|
70340
|
+
/**
|
|
70341
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
70342
|
+
* @summary Update Service Provider Configuration
|
|
70343
|
+
* @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
|
|
70344
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70345
|
+
* @throws {RequiredError}
|
|
70346
|
+
*/
|
|
70347
|
+
patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2024> {
|
|
70348
|
+
return localVarFp.patchAuthOrgServiceProviderConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(axios, basePath));
|
|
70349
|
+
},
|
|
70350
|
+
/**
|
|
70351
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
70352
|
+
* @summary Update Auth Org Session Configuration
|
|
70353
|
+
* @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
|
|
70354
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70355
|
+
* @throws {RequiredError}
|
|
70356
|
+
*/
|
|
70357
|
+
patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2024> {
|
|
70358
|
+
return localVarFp.patchAuthOrgSessionConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(axios, basePath));
|
|
70359
|
+
},
|
|
68969
70360
|
};
|
|
68970
70361
|
};
|
|
68971
70362
|
|
|
@@ -68983,6 +70374,20 @@ export interface GlobalTenantSecuritySettingsV2024ApiCreateAuthOrgNetworkConfigR
|
|
|
68983
70374
|
readonly networkConfigurationV2024: NetworkConfigurationV2024
|
|
68984
70375
|
}
|
|
68985
70376
|
|
|
70377
|
+
/**
|
|
70378
|
+
* Request parameters for patchAuthOrgLockoutConfig operation in GlobalTenantSecuritySettingsV2024Api.
|
|
70379
|
+
* @export
|
|
70380
|
+
* @interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest
|
|
70381
|
+
*/
|
|
70382
|
+
export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest {
|
|
70383
|
+
/**
|
|
70384
|
+
* A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
70385
|
+
* @type {Array<JsonPatchOperationV2024>}
|
|
70386
|
+
* @memberof GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfig
|
|
70387
|
+
*/
|
|
70388
|
+
readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>
|
|
70389
|
+
}
|
|
70390
|
+
|
|
68986
70391
|
/**
|
|
68987
70392
|
* Request parameters for patchAuthOrgNetworkConfig operation in GlobalTenantSecuritySettingsV2024Api.
|
|
68988
70393
|
* @export
|
|
@@ -68997,6 +70402,34 @@ export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgNetworkConfigRe
|
|
|
68997
70402
|
readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>
|
|
68998
70403
|
}
|
|
68999
70404
|
|
|
70405
|
+
/**
|
|
70406
|
+
* Request parameters for patchAuthOrgServiceProviderConfig operation in GlobalTenantSecuritySettingsV2024Api.
|
|
70407
|
+
* @export
|
|
70408
|
+
* @interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest
|
|
70409
|
+
*/
|
|
70410
|
+
export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest {
|
|
70411
|
+
/**
|
|
70412
|
+
* A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
70413
|
+
* @type {Array<JsonPatchOperationV2024>}
|
|
70414
|
+
* @memberof GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfig
|
|
70415
|
+
*/
|
|
70416
|
+
readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>
|
|
70417
|
+
}
|
|
70418
|
+
|
|
70419
|
+
/**
|
|
70420
|
+
* Request parameters for patchAuthOrgSessionConfig operation in GlobalTenantSecuritySettingsV2024Api.
|
|
70421
|
+
* @export
|
|
70422
|
+
* @interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest
|
|
70423
|
+
*/
|
|
70424
|
+
export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest {
|
|
70425
|
+
/**
|
|
70426
|
+
* A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
70427
|
+
* @type {Array<JsonPatchOperationV2024>}
|
|
70428
|
+
* @memberof GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfig
|
|
70429
|
+
*/
|
|
70430
|
+
readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>
|
|
70431
|
+
}
|
|
70432
|
+
|
|
69000
70433
|
/**
|
|
69001
70434
|
* GlobalTenantSecuritySettingsV2024Api - object-oriented interface
|
|
69002
70435
|
* @export
|
|
@@ -69016,6 +70449,17 @@ export class GlobalTenantSecuritySettingsV2024Api extends BaseAPI {
|
|
|
69016
70449
|
return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).createAuthOrgNetworkConfig(requestParameters.networkConfigurationV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
69017
70450
|
}
|
|
69018
70451
|
|
|
70452
|
+
/**
|
|
70453
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
70454
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
70455
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70456
|
+
* @throws {RequiredError}
|
|
70457
|
+
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
70458
|
+
*/
|
|
70459
|
+
public getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig) {
|
|
70460
|
+
return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).getAuthOrgLockoutConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
70461
|
+
}
|
|
70462
|
+
|
|
69019
70463
|
/**
|
|
69020
70464
|
* This API returns the details of an org\'s network auth configuration.
|
|
69021
70465
|
* @summary Get security network configuration.
|
|
@@ -69027,6 +70471,40 @@ export class GlobalTenantSecuritySettingsV2024Api extends BaseAPI {
|
|
|
69027
70471
|
return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).getAuthOrgNetworkConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
69028
70472
|
}
|
|
69029
70473
|
|
|
70474
|
+
/**
|
|
70475
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
70476
|
+
* @summary Get Service Provider Configuration.
|
|
70477
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70478
|
+
* @throws {RequiredError}
|
|
70479
|
+
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
70480
|
+
*/
|
|
70481
|
+
public getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig) {
|
|
70482
|
+
return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).getAuthOrgServiceProviderConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
70483
|
+
}
|
|
70484
|
+
|
|
70485
|
+
/**
|
|
70486
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
70487
|
+
* @summary Get Auth Org Session Configuration.
|
|
70488
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70489
|
+
* @throws {RequiredError}
|
|
70490
|
+
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
70491
|
+
*/
|
|
70492
|
+
public getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig) {
|
|
70493
|
+
return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).getAuthOrgSessionConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
70494
|
+
}
|
|
70495
|
+
|
|
70496
|
+
/**
|
|
70497
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
70498
|
+
* @summary Update Auth Org Lockout Configuration
|
|
70499
|
+
* @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
|
|
70500
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70501
|
+
* @throws {RequiredError}
|
|
70502
|
+
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
70503
|
+
*/
|
|
70504
|
+
public patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
70505
|
+
return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).patchAuthOrgLockoutConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
70506
|
+
}
|
|
70507
|
+
|
|
69030
70508
|
/**
|
|
69031
70509
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
69032
70510
|
* @summary Update security network configuration.
|
|
@@ -69038,6 +70516,30 @@ export class GlobalTenantSecuritySettingsV2024Api extends BaseAPI {
|
|
|
69038
70516
|
public patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
69039
70517
|
return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).patchAuthOrgNetworkConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
69040
70518
|
}
|
|
70519
|
+
|
|
70520
|
+
/**
|
|
70521
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
70522
|
+
* @summary Update Service Provider Configuration
|
|
70523
|
+
* @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
|
|
70524
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70525
|
+
* @throws {RequiredError}
|
|
70526
|
+
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
70527
|
+
*/
|
|
70528
|
+
public patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
70529
|
+
return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).patchAuthOrgServiceProviderConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
70530
|
+
}
|
|
70531
|
+
|
|
70532
|
+
/**
|
|
70533
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
70534
|
+
* @summary Update Auth Org Session Configuration
|
|
70535
|
+
* @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
|
|
70536
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70537
|
+
* @throws {RequiredError}
|
|
70538
|
+
* @memberof GlobalTenantSecuritySettingsV2024Api
|
|
70539
|
+
*/
|
|
70540
|
+
public patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
70541
|
+
return GlobalTenantSecuritySettingsV2024ApiFp(this.configuration).patchAuthOrgSessionConfig(requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
70542
|
+
}
|
|
69041
70543
|
}
|
|
69042
70544
|
|
|
69043
70545
|
|
|
@@ -108373,15 +109875,15 @@ export const ServiceDeskIntegrationV2024ApiAxiosParamCreator = function (configu
|
|
|
108373
109875
|
* Update an existing Service Desk integration by ID with a PATCH request.
|
|
108374
109876
|
* @summary Patch a Service Desk Integration
|
|
108375
109877
|
* @param {string} id ID of the Service Desk integration to update
|
|
108376
|
-
* @param {
|
|
109878
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only `replace` operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
|
|
108377
109879
|
* @param {*} [axiosOptions] Override http request option.
|
|
108378
109880
|
* @throws {RequiredError}
|
|
108379
109881
|
*/
|
|
108380
|
-
patchServiceDeskIntegration: async (id: string,
|
|
109882
|
+
patchServiceDeskIntegration: async (id: string, jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
108381
109883
|
// verify required parameter 'id' is not null or undefined
|
|
108382
109884
|
assertParamExists('patchServiceDeskIntegration', 'id', id)
|
|
108383
|
-
// verify required parameter '
|
|
108384
|
-
assertParamExists('patchServiceDeskIntegration', '
|
|
109885
|
+
// verify required parameter 'jsonPatchOperationV2024' is not null or undefined
|
|
109886
|
+
assertParamExists('patchServiceDeskIntegration', 'jsonPatchOperationV2024', jsonPatchOperationV2024)
|
|
108385
109887
|
const localVarPath = `/service-desk-integrations/{id}`
|
|
108386
109888
|
.replace(`{${"id"}}`, encodeURIComponent(String(id)));
|
|
108387
109889
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
@@ -108410,7 +109912,7 @@ export const ServiceDeskIntegrationV2024ApiAxiosParamCreator = function (configu
|
|
|
108410
109912
|
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
108411
109913
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
108412
109914
|
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
108413
|
-
localVarRequestOptions.data = serializeDataIfNeeded(
|
|
109915
|
+
localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2024, localVarRequestOptions, configuration)
|
|
108414
109916
|
|
|
108415
109917
|
return {
|
|
108416
109918
|
url: toPathString(localVarUrlObj),
|
|
@@ -108616,12 +110118,12 @@ export const ServiceDeskIntegrationV2024ApiFp = function(configuration?: Configu
|
|
|
108616
110118
|
* Update an existing Service Desk integration by ID with a PATCH request.
|
|
108617
110119
|
* @summary Patch a Service Desk Integration
|
|
108618
110120
|
* @param {string} id ID of the Service Desk integration to update
|
|
108619
|
-
* @param {
|
|
110121
|
+
* @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only `replace` operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
|
|
108620
110122
|
* @param {*} [axiosOptions] Override http request option.
|
|
108621
110123
|
* @throws {RequiredError}
|
|
108622
110124
|
*/
|
|
108623
|
-
async patchServiceDeskIntegration(id: string,
|
|
108624
|
-
const localVarAxiosArgs = await localVarAxiosParamCreator.patchServiceDeskIntegration(id,
|
|
110125
|
+
async patchServiceDeskIntegration(id: string, jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceDeskIntegrationDtoV2024>> {
|
|
110126
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.patchServiceDeskIntegration(id, jsonPatchOperationV2024, axiosOptions);
|
|
108625
110127
|
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
108626
110128
|
const localVarOperationServerBasePath = operationServerMap['ServiceDeskIntegrationV2024Api.patchServiceDeskIntegration']?.[localVarOperationServerIndex]?.url;
|
|
108627
110129
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
@@ -108739,7 +110241,7 @@ export const ServiceDeskIntegrationV2024ApiFactory = function (configuration?: C
|
|
|
108739
110241
|
* @throws {RequiredError}
|
|
108740
110242
|
*/
|
|
108741
110243
|
patchServiceDeskIntegration(requestParameters: ServiceDeskIntegrationV2024ApiPatchServiceDeskIntegrationRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceDeskIntegrationDtoV2024> {
|
|
108742
|
-
return localVarFp.patchServiceDeskIntegration(requestParameters.id, requestParameters.
|
|
110244
|
+
return localVarFp.patchServiceDeskIntegration(requestParameters.id, requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(axios, basePath));
|
|
108743
110245
|
},
|
|
108744
110246
|
/**
|
|
108745
110247
|
* Update an existing Service Desk integration by ID.
|
|
@@ -108877,10 +110379,10 @@ export interface ServiceDeskIntegrationV2024ApiPatchServiceDeskIntegrationReques
|
|
|
108877
110379
|
|
|
108878
110380
|
/**
|
|
108879
110381
|
* A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only `replace` operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
|
|
108880
|
-
* @type {
|
|
110382
|
+
* @type {Array<JsonPatchOperationV2024>}
|
|
108881
110383
|
* @memberof ServiceDeskIntegrationV2024ApiPatchServiceDeskIntegration
|
|
108882
110384
|
*/
|
|
108883
|
-
readonly
|
|
110385
|
+
readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>
|
|
108884
110386
|
}
|
|
108885
110387
|
|
|
108886
110388
|
/**
|
|
@@ -109016,7 +110518,7 @@ export class ServiceDeskIntegrationV2024Api extends BaseAPI {
|
|
|
109016
110518
|
* @memberof ServiceDeskIntegrationV2024Api
|
|
109017
110519
|
*/
|
|
109018
110520
|
public patchServiceDeskIntegration(requestParameters: ServiceDeskIntegrationV2024ApiPatchServiceDeskIntegrationRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
109019
|
-
return ServiceDeskIntegrationV2024ApiFp(this.configuration).patchServiceDeskIntegration(requestParameters.id, requestParameters.
|
|
110521
|
+
return ServiceDeskIntegrationV2024ApiFp(this.configuration).patchServiceDeskIntegration(requestParameters.id, requestParameters.jsonPatchOperationV2024, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
109020
110522
|
}
|
|
109021
110523
|
|
|
109022
110524
|
/**
|