sailpoint-api-client 1.5.0 → 1.6.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/beta/README.md +2 -2
- package/beta/api.ts +563 -174
- package/beta/common.ts +2 -2
- package/beta/package.json +1 -1
- package/dist/beta/api.d.ts +487 -129
- package/dist/beta/api.js +177 -114
- package/dist/beta/api.js.map +1 -1
- package/dist/beta/common.js +1 -1
- package/dist/v2024/api.d.ts +1200 -35
- package/dist/v2024/api.js +761 -36
- package/dist/v2024/api.js.map +1 -1
- package/dist/v2024/common.js +1 -1
- package/dist/v2025/api.d.ts +1468 -45
- package/dist/v2025/api.js +886 -53
- package/dist/v2025/api.js.map +1 -1
- package/dist/v2025/common.js +1 -1
- package/dist/v3/api.d.ts +611 -130
- package/dist/v3/api.js +155 -86
- package/dist/v3/api.js.map +1 -1
- package/dist/v3/common.js +1 -1
- package/package.json +1 -1
- package/v2024/README.md +2 -2
- package/v2024/api.ts +1544 -42
- package/v2024/common.ts +2 -2
- package/v2024/package.json +1 -1
- package/v2025/README.md +2 -2
- package/v2025/api.ts +1934 -124
- package/v2025/common.ts +2 -2
- package/v2025/package.json +1 -1
- package/v3/README.md +2 -2
- package/v3/api.ts +658 -143
- package/v3/common.ts +2 -2
- package/v3/package.json +1 -1
package/v2025/api.ts
CHANGED
|
@@ -2223,6 +2223,64 @@ export interface AccessRequestDynamicApproverV2025 {
|
|
|
2223
2223
|
*/
|
|
2224
2224
|
'requestedBy': AccessItemRequesterDtoV2025;
|
|
2225
2225
|
}
|
|
2226
|
+
/**
|
|
2227
|
+
*
|
|
2228
|
+
* @export
|
|
2229
|
+
* @interface AccessRequestItem1V2025
|
|
2230
|
+
*/
|
|
2231
|
+
export interface AccessRequestItem1V2025 {
|
|
2232
|
+
/**
|
|
2233
|
+
* The type of the item being requested.
|
|
2234
|
+
* @type {string}
|
|
2235
|
+
* @memberof AccessRequestItem1V2025
|
|
2236
|
+
*/
|
|
2237
|
+
'type': AccessRequestItem1V2025TypeV2025;
|
|
2238
|
+
/**
|
|
2239
|
+
* ID of Role, Access Profile or Entitlement being requested.
|
|
2240
|
+
* @type {string}
|
|
2241
|
+
* @memberof AccessRequestItem1V2025
|
|
2242
|
+
*/
|
|
2243
|
+
'id': string;
|
|
2244
|
+
/**
|
|
2245
|
+
* Comment provided by requester. * Comment is required when the request is of type Revoke Access.
|
|
2246
|
+
* @type {string}
|
|
2247
|
+
* @memberof AccessRequestItem1V2025
|
|
2248
|
+
*/
|
|
2249
|
+
'comment'?: string;
|
|
2250
|
+
/**
|
|
2251
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
|
|
2252
|
+
* @type {{ [key: string]: string; }}
|
|
2253
|
+
* @memberof AccessRequestItem1V2025
|
|
2254
|
+
*/
|
|
2255
|
+
'clientMetadata'?: { [key: string]: string; };
|
|
2256
|
+
/**
|
|
2257
|
+
* The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
|
|
2258
|
+
* @type {string}
|
|
2259
|
+
* @memberof AccessRequestItem1V2025
|
|
2260
|
+
*/
|
|
2261
|
+
'removeDate'?: string;
|
|
2262
|
+
/**
|
|
2263
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
2264
|
+
* @type {string}
|
|
2265
|
+
* @memberof AccessRequestItem1V2025
|
|
2266
|
+
*/
|
|
2267
|
+
'assignmentId'?: string | null;
|
|
2268
|
+
/**
|
|
2269
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
2270
|
+
* @type {string}
|
|
2271
|
+
* @memberof AccessRequestItem1V2025
|
|
2272
|
+
*/
|
|
2273
|
+
'nativeIdentity'?: string | null;
|
|
2274
|
+
}
|
|
2275
|
+
|
|
2276
|
+
export const AccessRequestItem1V2025TypeV2025 = {
|
|
2277
|
+
AccessProfile: 'ACCESS_PROFILE',
|
|
2278
|
+
Role: 'ROLE',
|
|
2279
|
+
Entitlement: 'ENTITLEMENT'
|
|
2280
|
+
} as const;
|
|
2281
|
+
|
|
2282
|
+
export type AccessRequestItem1V2025TypeV2025 = typeof AccessRequestItem1V2025TypeV2025[keyof typeof AccessRequestItem1V2025TypeV2025];
|
|
2283
|
+
|
|
2226
2284
|
/**
|
|
2227
2285
|
*
|
|
2228
2286
|
* @export
|
|
@@ -3001,6 +3059,12 @@ export interface AccessRequestV2025 {
|
|
|
3001
3059
|
* @memberof AccessRequestV2025
|
|
3002
3060
|
*/
|
|
3003
3061
|
'clientMetadata'?: { [key: string]: string; };
|
|
3062
|
+
/**
|
|
3063
|
+
* Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
|
|
3064
|
+
* @type {Array<RequestedForDtoRefV2025>}
|
|
3065
|
+
* @memberof AccessRequestV2025
|
|
3066
|
+
*/
|
|
3067
|
+
'requestedForWithRequestedItems'?: Array<RequestedForDtoRefV2025> | null;
|
|
3004
3068
|
}
|
|
3005
3069
|
|
|
3006
3070
|
|
|
@@ -4584,6 +4648,64 @@ export interface AccountInfoDtoV2025 {
|
|
|
4584
4648
|
*/
|
|
4585
4649
|
'uuid'?: string;
|
|
4586
4650
|
}
|
|
4651
|
+
/**
|
|
4652
|
+
*
|
|
4653
|
+
* @export
|
|
4654
|
+
* @interface AccountInfoRefV2025
|
|
4655
|
+
*/
|
|
4656
|
+
export interface AccountInfoRefV2025 {
|
|
4657
|
+
/**
|
|
4658
|
+
* The uuid for the account, available under the \'objectguid\' attribute
|
|
4659
|
+
* @type {string}
|
|
4660
|
+
* @memberof AccountInfoRefV2025
|
|
4661
|
+
*/
|
|
4662
|
+
'uuid'?: string;
|
|
4663
|
+
/**
|
|
4664
|
+
* The \'distinguishedName\' attribute for the account
|
|
4665
|
+
* @type {string}
|
|
4666
|
+
* @memberof AccountInfoRefV2025
|
|
4667
|
+
*/
|
|
4668
|
+
'nativeIdentity'?: string;
|
|
4669
|
+
/**
|
|
4670
|
+
*
|
|
4671
|
+
* @type {DtoTypeV2025}
|
|
4672
|
+
* @memberof AccountInfoRefV2025
|
|
4673
|
+
*/
|
|
4674
|
+
'type'?: DtoTypeV2025;
|
|
4675
|
+
/**
|
|
4676
|
+
* The account id
|
|
4677
|
+
* @type {string}
|
|
4678
|
+
* @memberof AccountInfoRefV2025
|
|
4679
|
+
*/
|
|
4680
|
+
'id'?: string;
|
|
4681
|
+
/**
|
|
4682
|
+
* The account display name
|
|
4683
|
+
* @type {string}
|
|
4684
|
+
* @memberof AccountInfoRefV2025
|
|
4685
|
+
*/
|
|
4686
|
+
'name'?: string;
|
|
4687
|
+
}
|
|
4688
|
+
|
|
4689
|
+
|
|
4690
|
+
/**
|
|
4691
|
+
*
|
|
4692
|
+
* @export
|
|
4693
|
+
* @interface AccountItemRefV2025
|
|
4694
|
+
*/
|
|
4695
|
+
export interface AccountItemRefV2025 {
|
|
4696
|
+
/**
|
|
4697
|
+
* The uuid for the account, available under the \'objectguid\' attribute
|
|
4698
|
+
* @type {string}
|
|
4699
|
+
* @memberof AccountItemRefV2025
|
|
4700
|
+
*/
|
|
4701
|
+
'accountUuid'?: string | null;
|
|
4702
|
+
/**
|
|
4703
|
+
* The \'distinguishedName\' attribute for the account
|
|
4704
|
+
* @type {string}
|
|
4705
|
+
* @memberof AccountItemRefV2025
|
|
4706
|
+
*/
|
|
4707
|
+
'nativeIdentity'?: string;
|
|
4708
|
+
}
|
|
4587
4709
|
/**
|
|
4588
4710
|
* If an account activity item is associated with an access request, captures details of that request.
|
|
4589
4711
|
* @export
|
|
@@ -5369,6 +5491,52 @@ export interface AccountsExportReportArgumentsV2025 {
|
|
|
5369
5491
|
*/
|
|
5370
5492
|
'sourceName': string;
|
|
5371
5493
|
}
|
|
5494
|
+
/**
|
|
5495
|
+
*
|
|
5496
|
+
* @export
|
|
5497
|
+
* @interface AccountsSelectionRequestV2025
|
|
5498
|
+
*/
|
|
5499
|
+
export interface AccountsSelectionRequestV2025 {
|
|
5500
|
+
/**
|
|
5501
|
+
* A list of Identity IDs for whom the Access is requested.
|
|
5502
|
+
* @type {Array<string>}
|
|
5503
|
+
* @memberof AccountsSelectionRequestV2025
|
|
5504
|
+
*/
|
|
5505
|
+
'requestedFor': Array<string>;
|
|
5506
|
+
/**
|
|
5507
|
+
*
|
|
5508
|
+
* @type {AccessRequestTypeV2025}
|
|
5509
|
+
* @memberof AccountsSelectionRequestV2025
|
|
5510
|
+
*/
|
|
5511
|
+
'requestType'?: AccessRequestTypeV2025 | null;
|
|
5512
|
+
/**
|
|
5513
|
+
*
|
|
5514
|
+
* @type {Array<AccessRequestItem1V2025>}
|
|
5515
|
+
* @memberof AccountsSelectionRequestV2025
|
|
5516
|
+
*/
|
|
5517
|
+
'requestedItems': Array<AccessRequestItem1V2025>;
|
|
5518
|
+
/**
|
|
5519
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities.
|
|
5520
|
+
* @type {{ [key: string]: string; }}
|
|
5521
|
+
* @memberof AccountsSelectionRequestV2025
|
|
5522
|
+
*/
|
|
5523
|
+
'clientMetadata'?: { [key: string]: string; };
|
|
5524
|
+
}
|
|
5525
|
+
|
|
5526
|
+
|
|
5527
|
+
/**
|
|
5528
|
+
*
|
|
5529
|
+
* @export
|
|
5530
|
+
* @interface AccountsSelectionResponseV2025
|
|
5531
|
+
*/
|
|
5532
|
+
export interface AccountsSelectionResponseV2025 {
|
|
5533
|
+
/**
|
|
5534
|
+
* A list of available account selections per identity in the request, for all the requested items
|
|
5535
|
+
* @type {Array<IdentityAccountSelectionsV2025>}
|
|
5536
|
+
* @memberof AccountsSelectionResponseV2025
|
|
5537
|
+
*/
|
|
5538
|
+
'identities'?: Array<IdentityAccountSelectionsV2025>;
|
|
5539
|
+
}
|
|
5372
5540
|
/**
|
|
5373
5541
|
*
|
|
5374
5542
|
* @export
|
|
@@ -6739,7 +6907,8 @@ export const AttributeDefinitionTypeV2025 = {
|
|
|
6739
6907
|
String: 'STRING',
|
|
6740
6908
|
Long: 'LONG',
|
|
6741
6909
|
Int: 'INT',
|
|
6742
|
-
Boolean: 'BOOLEAN'
|
|
6910
|
+
Boolean: 'BOOLEAN',
|
|
6911
|
+
Date: 'DATE'
|
|
6743
6912
|
} as const;
|
|
6744
6913
|
|
|
6745
6914
|
export type AttributeDefinitionTypeV2025 = typeof AttributeDefinitionTypeV2025[keyof typeof AttributeDefinitionTypeV2025];
|
|
@@ -16549,6 +16718,33 @@ export interface FeatureValueDtoV2025 {
|
|
|
16549
16718
|
*/
|
|
16550
16719
|
'denominator'?: number;
|
|
16551
16720
|
}
|
|
16721
|
+
/**
|
|
16722
|
+
*
|
|
16723
|
+
* @export
|
|
16724
|
+
* @interface FederationProtocolDetailsV2025
|
|
16725
|
+
*/
|
|
16726
|
+
export interface FederationProtocolDetailsV2025 {
|
|
16727
|
+
/**
|
|
16728
|
+
* Federation protocol role
|
|
16729
|
+
* @type {string}
|
|
16730
|
+
* @memberof FederationProtocolDetailsV2025
|
|
16731
|
+
*/
|
|
16732
|
+
'role'?: FederationProtocolDetailsV2025RoleV2025;
|
|
16733
|
+
/**
|
|
16734
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
16735
|
+
* @type {string}
|
|
16736
|
+
* @memberof FederationProtocolDetailsV2025
|
|
16737
|
+
*/
|
|
16738
|
+
'entityId'?: string;
|
|
16739
|
+
}
|
|
16740
|
+
|
|
16741
|
+
export const FederationProtocolDetailsV2025RoleV2025 = {
|
|
16742
|
+
SamlIdp: 'SAML_IDP',
|
|
16743
|
+
SamlSp: 'SAML_SP'
|
|
16744
|
+
} as const;
|
|
16745
|
+
|
|
16746
|
+
export type FederationProtocolDetailsV2025RoleV2025 = typeof FederationProtocolDetailsV2025RoleV2025[keyof typeof FederationProtocolDetailsV2025RoleV2025];
|
|
16747
|
+
|
|
16552
16748
|
/**
|
|
16553
16749
|
*
|
|
16554
16750
|
* @export
|
|
@@ -17782,6 +17978,188 @@ export const GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV
|
|
|
17782
17978
|
|
|
17783
17979
|
export type GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025 = typeof GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025[keyof typeof GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025];
|
|
17784
17980
|
|
|
17981
|
+
/**
|
|
17982
|
+
*
|
|
17983
|
+
* @export
|
|
17984
|
+
* @interface GetCampaign200ResponseV2025
|
|
17985
|
+
*/
|
|
17986
|
+
export interface GetCampaign200ResponseV2025 {
|
|
17987
|
+
/**
|
|
17988
|
+
* Id of the campaign
|
|
17989
|
+
* @type {string}
|
|
17990
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17991
|
+
*/
|
|
17992
|
+
'id'?: string | null;
|
|
17993
|
+
/**
|
|
17994
|
+
* The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
17995
|
+
* @type {string}
|
|
17996
|
+
* @memberof GetCampaign200ResponseV2025
|
|
17997
|
+
*/
|
|
17998
|
+
'name': string;
|
|
17999
|
+
/**
|
|
18000
|
+
* The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
18001
|
+
* @type {string}
|
|
18002
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18003
|
+
*/
|
|
18004
|
+
'description': string | null;
|
|
18005
|
+
/**
|
|
18006
|
+
* The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
|
|
18007
|
+
* @type {string}
|
|
18008
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18009
|
+
*/
|
|
18010
|
+
'deadline'?: string | null;
|
|
18011
|
+
/**
|
|
18012
|
+
* The type of campaign. Could be extended in the future.
|
|
18013
|
+
* @type {string}
|
|
18014
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18015
|
+
*/
|
|
18016
|
+
'type': GetCampaign200ResponseV2025TypeV2025;
|
|
18017
|
+
/**
|
|
18018
|
+
* Enables email notification for this campaign
|
|
18019
|
+
* @type {boolean}
|
|
18020
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18021
|
+
*/
|
|
18022
|
+
'emailNotificationEnabled'?: boolean;
|
|
18023
|
+
/**
|
|
18024
|
+
* Allows auto revoke for this campaign
|
|
18025
|
+
* @type {boolean}
|
|
18026
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18027
|
+
*/
|
|
18028
|
+
'autoRevokeAllowed'?: boolean;
|
|
18029
|
+
/**
|
|
18030
|
+
* Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
|
|
18031
|
+
* @type {boolean}
|
|
18032
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18033
|
+
*/
|
|
18034
|
+
'recommendationsEnabled'?: boolean;
|
|
18035
|
+
/**
|
|
18036
|
+
* The campaign\'s current status.
|
|
18037
|
+
* @type {string}
|
|
18038
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18039
|
+
*/
|
|
18040
|
+
'status'?: GetCampaign200ResponseV2025StatusV2025 | null;
|
|
18041
|
+
/**
|
|
18042
|
+
* The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
|
|
18043
|
+
* @type {string}
|
|
18044
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18045
|
+
*/
|
|
18046
|
+
'correlatedStatus'?: GetCampaign200ResponseV2025CorrelatedStatusV2025;
|
|
18047
|
+
/**
|
|
18048
|
+
* Created time of the campaign
|
|
18049
|
+
* @type {string}
|
|
18050
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18051
|
+
*/
|
|
18052
|
+
'created'?: string | null;
|
|
18053
|
+
/**
|
|
18054
|
+
* The total number of certifications in this campaign.
|
|
18055
|
+
* @type {number}
|
|
18056
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18057
|
+
*/
|
|
18058
|
+
'totalCertifications'?: number | null;
|
|
18059
|
+
/**
|
|
18060
|
+
* The number of completed certifications in this campaign.
|
|
18061
|
+
* @type {number}
|
|
18062
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18063
|
+
*/
|
|
18064
|
+
'completedCertifications'?: number | null;
|
|
18065
|
+
/**
|
|
18066
|
+
* A list of errors and warnings that have accumulated.
|
|
18067
|
+
* @type {Array<CampaignAlertV2025>}
|
|
18068
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18069
|
+
*/
|
|
18070
|
+
'alerts'?: Array<CampaignAlertV2025> | null;
|
|
18071
|
+
/**
|
|
18072
|
+
* Modified time of the campaign
|
|
18073
|
+
* @type {string}
|
|
18074
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18075
|
+
*/
|
|
18076
|
+
'modified'?: string | null;
|
|
18077
|
+
/**
|
|
18078
|
+
*
|
|
18079
|
+
* @type {CampaignAllOfFilterV2025}
|
|
18080
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18081
|
+
*/
|
|
18082
|
+
'filter'?: CampaignAllOfFilterV2025 | null;
|
|
18083
|
+
/**
|
|
18084
|
+
* Determines if comments on sunset date changes are required.
|
|
18085
|
+
* @type {boolean}
|
|
18086
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18087
|
+
*/
|
|
18088
|
+
'sunsetCommentsRequired'?: boolean;
|
|
18089
|
+
/**
|
|
18090
|
+
*
|
|
18091
|
+
* @type {CampaignAllOfSourceOwnerCampaignInfoV2025}
|
|
18092
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18093
|
+
*/
|
|
18094
|
+
'sourceOwnerCampaignInfo'?: CampaignAllOfSourceOwnerCampaignInfoV2025 | null;
|
|
18095
|
+
/**
|
|
18096
|
+
*
|
|
18097
|
+
* @type {CampaignAllOfSearchCampaignInfoV2025}
|
|
18098
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18099
|
+
*/
|
|
18100
|
+
'searchCampaignInfo'?: CampaignAllOfSearchCampaignInfoV2025 | null;
|
|
18101
|
+
/**
|
|
18102
|
+
*
|
|
18103
|
+
* @type {CampaignAllOfRoleCompositionCampaignInfoV2025}
|
|
18104
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18105
|
+
*/
|
|
18106
|
+
'roleCompositionCampaignInfo'?: CampaignAllOfRoleCompositionCampaignInfoV2025 | null;
|
|
18107
|
+
/**
|
|
18108
|
+
*
|
|
18109
|
+
* @type {CampaignAllOfMachineAccountCampaignInfoV2025}
|
|
18110
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18111
|
+
*/
|
|
18112
|
+
'machineAccountCampaignInfo'?: CampaignAllOfMachineAccountCampaignInfoV2025 | null;
|
|
18113
|
+
/**
|
|
18114
|
+
* A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
|
|
18115
|
+
* @type {Array<CampaignAllOfSourcesWithOrphanEntitlementsV2025>}
|
|
18116
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18117
|
+
*/
|
|
18118
|
+
'sourcesWithOrphanEntitlements'?: Array<CampaignAllOfSourcesWithOrphanEntitlementsV2025> | null;
|
|
18119
|
+
/**
|
|
18120
|
+
* Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
|
|
18121
|
+
* @type {string}
|
|
18122
|
+
* @memberof GetCampaign200ResponseV2025
|
|
18123
|
+
*/
|
|
18124
|
+
'mandatoryCommentRequirement'?: GetCampaign200ResponseV2025MandatoryCommentRequirementV2025;
|
|
18125
|
+
}
|
|
18126
|
+
|
|
18127
|
+
export const GetCampaign200ResponseV2025TypeV2025 = {
|
|
18128
|
+
Manager: 'MANAGER',
|
|
18129
|
+
SourceOwner: 'SOURCE_OWNER',
|
|
18130
|
+
Search: 'SEARCH',
|
|
18131
|
+
RoleComposition: 'ROLE_COMPOSITION',
|
|
18132
|
+
MachineAccount: 'MACHINE_ACCOUNT'
|
|
18133
|
+
} as const;
|
|
18134
|
+
|
|
18135
|
+
export type GetCampaign200ResponseV2025TypeV2025 = typeof GetCampaign200ResponseV2025TypeV2025[keyof typeof GetCampaign200ResponseV2025TypeV2025];
|
|
18136
|
+
export const GetCampaign200ResponseV2025StatusV2025 = {
|
|
18137
|
+
Pending: 'PENDING',
|
|
18138
|
+
Staged: 'STAGED',
|
|
18139
|
+
Canceling: 'CANCELING',
|
|
18140
|
+
Activating: 'ACTIVATING',
|
|
18141
|
+
Active: 'ACTIVE',
|
|
18142
|
+
Completing: 'COMPLETING',
|
|
18143
|
+
Completed: 'COMPLETED',
|
|
18144
|
+
Error: 'ERROR',
|
|
18145
|
+
Archived: 'ARCHIVED'
|
|
18146
|
+
} as const;
|
|
18147
|
+
|
|
18148
|
+
export type GetCampaign200ResponseV2025StatusV2025 = typeof GetCampaign200ResponseV2025StatusV2025[keyof typeof GetCampaign200ResponseV2025StatusV2025];
|
|
18149
|
+
export const GetCampaign200ResponseV2025CorrelatedStatusV2025 = {
|
|
18150
|
+
Correlated: 'CORRELATED',
|
|
18151
|
+
Uncorrelated: 'UNCORRELATED'
|
|
18152
|
+
} as const;
|
|
18153
|
+
|
|
18154
|
+
export type GetCampaign200ResponseV2025CorrelatedStatusV2025 = typeof GetCampaign200ResponseV2025CorrelatedStatusV2025[keyof typeof GetCampaign200ResponseV2025CorrelatedStatusV2025];
|
|
18155
|
+
export const GetCampaign200ResponseV2025MandatoryCommentRequirementV2025 = {
|
|
18156
|
+
AllDecisions: 'ALL_DECISIONS',
|
|
18157
|
+
RevokeOnlyDecisions: 'REVOKE_ONLY_DECISIONS',
|
|
18158
|
+
NoDecisions: 'NO_DECISIONS'
|
|
18159
|
+
} as const;
|
|
18160
|
+
|
|
18161
|
+
export type GetCampaign200ResponseV2025MandatoryCommentRequirementV2025 = typeof GetCampaign200ResponseV2025MandatoryCommentRequirementV2025[keyof typeof GetCampaign200ResponseV2025MandatoryCommentRequirementV2025];
|
|
18162
|
+
|
|
17785
18163
|
/**
|
|
17786
18164
|
* @type GetDiscoveredApplications200ResponseInnerV2025
|
|
17787
18165
|
* @export
|
|
@@ -18353,6 +18731,45 @@ export interface Identity1V2025 {
|
|
|
18353
18731
|
*/
|
|
18354
18732
|
export type IdentityAccessV2025 = { type: 'ACCESS_PROFILE' } & AccessProfileSummaryV2025 | { type: 'ENTITLEMENT' } & AccessProfileEntitlementV2025 | { type: 'ROLE' } & AccessProfileRoleV2025;
|
|
18355
18733
|
|
|
18734
|
+
/**
|
|
18735
|
+
*
|
|
18736
|
+
* @export
|
|
18737
|
+
* @interface IdentityAccountSelectionsV2025
|
|
18738
|
+
*/
|
|
18739
|
+
export interface IdentityAccountSelectionsV2025 {
|
|
18740
|
+
/**
|
|
18741
|
+
* Available account selections for the identity, per requested item
|
|
18742
|
+
* @type {Array<RequestedItemAccountSelectionsV2025>}
|
|
18743
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18744
|
+
*/
|
|
18745
|
+
'requestedItems'?: Array<RequestedItemAccountSelectionsV2025>;
|
|
18746
|
+
/**
|
|
18747
|
+
* A boolean indicating whether any account selections will be required for the user to raise an access request
|
|
18748
|
+
* @type {boolean}
|
|
18749
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18750
|
+
*/
|
|
18751
|
+
'accountsSelectionRequired'?: boolean;
|
|
18752
|
+
/**
|
|
18753
|
+
*
|
|
18754
|
+
* @type {DtoTypeV2025}
|
|
18755
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18756
|
+
*/
|
|
18757
|
+
'type'?: DtoTypeV2025;
|
|
18758
|
+
/**
|
|
18759
|
+
* The identity id for the user
|
|
18760
|
+
* @type {string}
|
|
18761
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18762
|
+
*/
|
|
18763
|
+
'id'?: string;
|
|
18764
|
+
/**
|
|
18765
|
+
* The name of the identity
|
|
18766
|
+
* @type {string}
|
|
18767
|
+
* @memberof IdentityAccountSelectionsV2025
|
|
18768
|
+
*/
|
|
18769
|
+
'name'?: string;
|
|
18770
|
+
}
|
|
18771
|
+
|
|
18772
|
+
|
|
18356
18773
|
/**
|
|
18357
18774
|
*
|
|
18358
18775
|
* @export
|
|
@@ -19636,6 +20053,165 @@ export interface IdentityEntitiesV2025 {
|
|
|
19636
20053
|
*/
|
|
19637
20054
|
'identityEntity'?: IdentityEntitiesIdentityEntityV2025;
|
|
19638
20055
|
}
|
|
20056
|
+
/**
|
|
20057
|
+
*
|
|
20058
|
+
* @export
|
|
20059
|
+
* @interface IdentityEntitlementDetailsAccountTargetV2025
|
|
20060
|
+
*/
|
|
20061
|
+
export interface IdentityEntitlementDetailsAccountTargetV2025 {
|
|
20062
|
+
/**
|
|
20063
|
+
* The id of account
|
|
20064
|
+
* @type {string}
|
|
20065
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
20066
|
+
*/
|
|
20067
|
+
'accountId'?: string;
|
|
20068
|
+
/**
|
|
20069
|
+
* The name of account
|
|
20070
|
+
* @type {string}
|
|
20071
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
20072
|
+
*/
|
|
20073
|
+
'accountName'?: string;
|
|
20074
|
+
/**
|
|
20075
|
+
* The UUID representation of the account if available
|
|
20076
|
+
* @type {string}
|
|
20077
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
20078
|
+
*/
|
|
20079
|
+
'accountUUID'?: string | null;
|
|
20080
|
+
/**
|
|
20081
|
+
* The id of Source
|
|
20082
|
+
* @type {string}
|
|
20083
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
20084
|
+
*/
|
|
20085
|
+
'sourceId'?: string;
|
|
20086
|
+
/**
|
|
20087
|
+
* The name of Source
|
|
20088
|
+
* @type {string}
|
|
20089
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
20090
|
+
*/
|
|
20091
|
+
'sourceName'?: string;
|
|
20092
|
+
/**
|
|
20093
|
+
* The removal date scheduled for the entitlement on the Identity
|
|
20094
|
+
* @type {string}
|
|
20095
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
20096
|
+
*/
|
|
20097
|
+
'removeDate'?: string | null;
|
|
20098
|
+
/**
|
|
20099
|
+
* The assignmentId of the entitlement on the Identity
|
|
20100
|
+
* @type {string}
|
|
20101
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
20102
|
+
*/
|
|
20103
|
+
'assignmentId'?: string | null;
|
|
20104
|
+
/**
|
|
20105
|
+
* If the entitlement can be revoked
|
|
20106
|
+
* @type {boolean}
|
|
20107
|
+
* @memberof IdentityEntitlementDetailsAccountTargetV2025
|
|
20108
|
+
*/
|
|
20109
|
+
'revocable'?: boolean;
|
|
20110
|
+
}
|
|
20111
|
+
/**
|
|
20112
|
+
*
|
|
20113
|
+
* @export
|
|
20114
|
+
* @interface IdentityEntitlementDetailsEntitlementDtoV2025
|
|
20115
|
+
*/
|
|
20116
|
+
export interface IdentityEntitlementDetailsEntitlementDtoV2025 {
|
|
20117
|
+
/**
|
|
20118
|
+
* The entitlement id
|
|
20119
|
+
* @type {string}
|
|
20120
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
20121
|
+
*/
|
|
20122
|
+
'id'?: string;
|
|
20123
|
+
/**
|
|
20124
|
+
* The entitlement name
|
|
20125
|
+
* @type {string}
|
|
20126
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
20127
|
+
*/
|
|
20128
|
+
'name'?: string;
|
|
20129
|
+
/**
|
|
20130
|
+
* Time when the entitlement was last modified
|
|
20131
|
+
* @type {string}
|
|
20132
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
20133
|
+
*/
|
|
20134
|
+
'created'?: string;
|
|
20135
|
+
/**
|
|
20136
|
+
* Time when the entitlement was last modified
|
|
20137
|
+
* @type {string}
|
|
20138
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
20139
|
+
*/
|
|
20140
|
+
'modified'?: string;
|
|
20141
|
+
/**
|
|
20142
|
+
* The description of the entitlement
|
|
20143
|
+
* @type {string}
|
|
20144
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
20145
|
+
*/
|
|
20146
|
+
'description'?: string | null;
|
|
20147
|
+
/**
|
|
20148
|
+
* The type of the object, will always be \"ENTITLEMENT\"
|
|
20149
|
+
* @type {string}
|
|
20150
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
20151
|
+
*/
|
|
20152
|
+
'type'?: string;
|
|
20153
|
+
/**
|
|
20154
|
+
* The source ID
|
|
20155
|
+
* @type {string}
|
|
20156
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
20157
|
+
*/
|
|
20158
|
+
'sourceId'?: string;
|
|
20159
|
+
/**
|
|
20160
|
+
* The source name
|
|
20161
|
+
* @type {string}
|
|
20162
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
20163
|
+
*/
|
|
20164
|
+
'sourceName'?: string;
|
|
20165
|
+
/**
|
|
20166
|
+
*
|
|
20167
|
+
* @type {OwnerDtoV2025}
|
|
20168
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
20169
|
+
*/
|
|
20170
|
+
'owner'?: OwnerDtoV2025;
|
|
20171
|
+
/**
|
|
20172
|
+
* The value of the entitlement
|
|
20173
|
+
* @type {string}
|
|
20174
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
20175
|
+
*/
|
|
20176
|
+
'value'?: string;
|
|
20177
|
+
/**
|
|
20178
|
+
* a list of properties informing the viewer about the entitlement
|
|
20179
|
+
* @type {Array<string>}
|
|
20180
|
+
* @memberof IdentityEntitlementDetailsEntitlementDtoV2025
|
|
20181
|
+
*/
|
|
20182
|
+
'flags'?: Array<string>;
|
|
20183
|
+
}
|
|
20184
|
+
/**
|
|
20185
|
+
*
|
|
20186
|
+
* @export
|
|
20187
|
+
* @interface IdentityEntitlementDetailsV2025
|
|
20188
|
+
*/
|
|
20189
|
+
export interface IdentityEntitlementDetailsV2025 {
|
|
20190
|
+
/**
|
|
20191
|
+
* Id of Identity
|
|
20192
|
+
* @type {string}
|
|
20193
|
+
* @memberof IdentityEntitlementDetailsV2025
|
|
20194
|
+
*/
|
|
20195
|
+
'identityId'?: string;
|
|
20196
|
+
/**
|
|
20197
|
+
*
|
|
20198
|
+
* @type {IdentityEntitlementDetailsEntitlementDtoV2025}
|
|
20199
|
+
* @memberof IdentityEntitlementDetailsV2025
|
|
20200
|
+
*/
|
|
20201
|
+
'entitlement'?: IdentityEntitlementDetailsEntitlementDtoV2025;
|
|
20202
|
+
/**
|
|
20203
|
+
* Id of Source
|
|
20204
|
+
* @type {string}
|
|
20205
|
+
* @memberof IdentityEntitlementDetailsV2025
|
|
20206
|
+
*/
|
|
20207
|
+
'sourceId'?: string;
|
|
20208
|
+
/**
|
|
20209
|
+
* A list of account targets on the identity provisioned with the requested entitlement.
|
|
20210
|
+
* @type {Array<IdentityEntitlementDetailsAccountTargetV2025>}
|
|
20211
|
+
* @memberof IdentityEntitlementDetailsV2025
|
|
20212
|
+
*/
|
|
20213
|
+
'accountTargets'?: Array<IdentityEntitlementDetailsAccountTargetV2025>;
|
|
20214
|
+
}
|
|
19639
20215
|
/**
|
|
19640
20216
|
*
|
|
19641
20217
|
* @export
|
|
@@ -20500,6 +21076,105 @@ export interface IdentityWithNewAccessV2025 {
|
|
|
20500
21076
|
*/
|
|
20501
21077
|
'accessRefs': Array<IdentityWithNewAccessAccessRefsInnerV2025>;
|
|
20502
21078
|
}
|
|
21079
|
+
/**
|
|
21080
|
+
*
|
|
21081
|
+
* @export
|
|
21082
|
+
* @interface IdpDetailsV2025
|
|
21083
|
+
*/
|
|
21084
|
+
export interface IdpDetailsV2025 {
|
|
21085
|
+
/**
|
|
21086
|
+
* Federation protocol role
|
|
21087
|
+
* @type {string}
|
|
21088
|
+
* @memberof IdpDetailsV2025
|
|
21089
|
+
*/
|
|
21090
|
+
'role'?: IdpDetailsV2025RoleV2025;
|
|
21091
|
+
/**
|
|
21092
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
21093
|
+
* @type {string}
|
|
21094
|
+
* @memberof IdpDetailsV2025
|
|
21095
|
+
*/
|
|
21096
|
+
'entityId'?: string;
|
|
21097
|
+
/**
|
|
21098
|
+
* Defines the binding used for the SAML flow. Used with IDP configurations.
|
|
21099
|
+
* @type {string}
|
|
21100
|
+
* @memberof IdpDetailsV2025
|
|
21101
|
+
*/
|
|
21102
|
+
'binding'?: string;
|
|
21103
|
+
/**
|
|
21104
|
+
* Specifies the SAML authentication method to use. Used with IDP configurations.
|
|
21105
|
+
* @type {string}
|
|
21106
|
+
* @memberof IdpDetailsV2025
|
|
21107
|
+
*/
|
|
21108
|
+
'authnContext'?: string;
|
|
21109
|
+
/**
|
|
21110
|
+
* The IDP logout URL. Used with IDP configurations.
|
|
21111
|
+
* @type {string}
|
|
21112
|
+
* @memberof IdpDetailsV2025
|
|
21113
|
+
*/
|
|
21114
|
+
'logoutUrl'?: string;
|
|
21115
|
+
/**
|
|
21116
|
+
* Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
|
|
21117
|
+
* @type {boolean}
|
|
21118
|
+
* @memberof IdpDetailsV2025
|
|
21119
|
+
*/
|
|
21120
|
+
'includeAuthnContext'?: boolean;
|
|
21121
|
+
/**
|
|
21122
|
+
* The name id format to use. Used with IDP configurations.
|
|
21123
|
+
* @type {string}
|
|
21124
|
+
* @memberof IdpDetailsV2025
|
|
21125
|
+
*/
|
|
21126
|
+
'nameId'?: string;
|
|
21127
|
+
/**
|
|
21128
|
+
*
|
|
21129
|
+
* @type {JITConfigurationV2025}
|
|
21130
|
+
* @memberof IdpDetailsV2025
|
|
21131
|
+
*/
|
|
21132
|
+
'jitConfiguration'?: JITConfigurationV2025;
|
|
21133
|
+
/**
|
|
21134
|
+
* The Base64-encoded certificate used by the IDP. Used with IDP configurations.
|
|
21135
|
+
* @type {string}
|
|
21136
|
+
* @memberof IdpDetailsV2025
|
|
21137
|
+
*/
|
|
21138
|
+
'cert'?: string;
|
|
21139
|
+
/**
|
|
21140
|
+
* The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
|
|
21141
|
+
* @type {string}
|
|
21142
|
+
* @memberof IdpDetailsV2025
|
|
21143
|
+
*/
|
|
21144
|
+
'loginUrlPost'?: string;
|
|
21145
|
+
/**
|
|
21146
|
+
* The IDP Redirect URL. Used with IDP configurations.
|
|
21147
|
+
* @type {string}
|
|
21148
|
+
* @memberof IdpDetailsV2025
|
|
21149
|
+
*/
|
|
21150
|
+
'loginUrlRedirect'?: string;
|
|
21151
|
+
/**
|
|
21152
|
+
* Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
|
|
21153
|
+
* @type {string}
|
|
21154
|
+
* @memberof IdpDetailsV2025
|
|
21155
|
+
*/
|
|
21156
|
+
'mappingAttribute': string;
|
|
21157
|
+
/**
|
|
21158
|
+
* The expiration date extracted from the certificate.
|
|
21159
|
+
* @type {string}
|
|
21160
|
+
* @memberof IdpDetailsV2025
|
|
21161
|
+
*/
|
|
21162
|
+
'certificateExpirationDate'?: string;
|
|
21163
|
+
/**
|
|
21164
|
+
* The name extracted from the certificate.
|
|
21165
|
+
* @type {string}
|
|
21166
|
+
* @memberof IdpDetailsV2025
|
|
21167
|
+
*/
|
|
21168
|
+
'certificateName'?: string;
|
|
21169
|
+
}
|
|
21170
|
+
|
|
21171
|
+
export const IdpDetailsV2025RoleV2025 = {
|
|
21172
|
+
SamlIdp: 'SAML_IDP',
|
|
21173
|
+
SamlSp: 'SAML_SP'
|
|
21174
|
+
} as const;
|
|
21175
|
+
|
|
21176
|
+
export type IdpDetailsV2025RoleV2025 = typeof IdpDetailsV2025RoleV2025[keyof typeof IdpDetailsV2025RoleV2025];
|
|
21177
|
+
|
|
20503
21178
|
/**
|
|
20504
21179
|
*
|
|
20505
21180
|
* @export
|
|
@@ -20945,6 +21620,31 @@ export interface InvocationV2025 {
|
|
|
20945
21620
|
*/
|
|
20946
21621
|
'contentJson'?: object;
|
|
20947
21622
|
}
|
|
21623
|
+
/**
|
|
21624
|
+
*
|
|
21625
|
+
* @export
|
|
21626
|
+
* @interface JITConfigurationV2025
|
|
21627
|
+
*/
|
|
21628
|
+
export interface JITConfigurationV2025 {
|
|
21629
|
+
/**
|
|
21630
|
+
* The indicator for just-in-time provisioning enabled
|
|
21631
|
+
* @type {boolean}
|
|
21632
|
+
* @memberof JITConfigurationV2025
|
|
21633
|
+
*/
|
|
21634
|
+
'enabled'?: boolean;
|
|
21635
|
+
/**
|
|
21636
|
+
* the sourceId that mapped to just-in-time provisioning configuration
|
|
21637
|
+
* @type {string}
|
|
21638
|
+
* @memberof JITConfigurationV2025
|
|
21639
|
+
*/
|
|
21640
|
+
'sourceId'?: string;
|
|
21641
|
+
/**
|
|
21642
|
+
* A mapping of identity profile attribute names to SAML assertion attribute names
|
|
21643
|
+
* @type {{ [key: string]: string; }}
|
|
21644
|
+
* @memberof JITConfigurationV2025
|
|
21645
|
+
*/
|
|
21646
|
+
'sourceAttributeMappings'?: { [key: string]: string; };
|
|
21647
|
+
}
|
|
20948
21648
|
/**
|
|
20949
21649
|
* A JSONPatch Operation as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902)
|
|
20950
21650
|
* @export
|
|
@@ -21290,7 +21990,8 @@ export interface LifecyclestateDeletedV2025 {
|
|
|
21290
21990
|
}
|
|
21291
21991
|
|
|
21292
21992
|
export const LifecyclestateDeletedV2025TypeV2025 = {
|
|
21293
|
-
LifecycleState: 'LIFECYCLE_STATE'
|
|
21993
|
+
LifecycleState: 'LIFECYCLE_STATE',
|
|
21994
|
+
TaskResult: 'TASK_RESULT'
|
|
21294
21995
|
} as const;
|
|
21295
21996
|
|
|
21296
21997
|
export type LifecyclestateDeletedV2025TypeV2025 = typeof LifecyclestateDeletedV2025TypeV2025[keyof typeof LifecyclestateDeletedV2025TypeV2025];
|
|
@@ -22040,6 +22741,31 @@ export interface LocalizedMessageV2025 {
|
|
|
22040
22741
|
*/
|
|
22041
22742
|
'message': string;
|
|
22042
22743
|
}
|
|
22744
|
+
/**
|
|
22745
|
+
*
|
|
22746
|
+
* @export
|
|
22747
|
+
* @interface LockoutConfigurationV2025
|
|
22748
|
+
*/
|
|
22749
|
+
export interface LockoutConfigurationV2025 {
|
|
22750
|
+
/**
|
|
22751
|
+
* The maximum attempts allowed before lockout occurs.
|
|
22752
|
+
* @type {number}
|
|
22753
|
+
* @memberof LockoutConfigurationV2025
|
|
22754
|
+
*/
|
|
22755
|
+
'maximumAttempts'?: number;
|
|
22756
|
+
/**
|
|
22757
|
+
* The total time in minutes a user will be locked out.
|
|
22758
|
+
* @type {number}
|
|
22759
|
+
* @memberof LockoutConfigurationV2025
|
|
22760
|
+
*/
|
|
22761
|
+
'lockoutDuration'?: number;
|
|
22762
|
+
/**
|
|
22763
|
+
* A rolling window where authentication attempts in a series count towards the maximum before lockout occurs.
|
|
22764
|
+
* @type {number}
|
|
22765
|
+
* @memberof LockoutConfigurationV2025
|
|
22766
|
+
*/
|
|
22767
|
+
'lockoutWindow'?: number;
|
|
22768
|
+
}
|
|
22043
22769
|
/**
|
|
22044
22770
|
* The definition of an Identity according to the Reassignment Configuration service
|
|
22045
22771
|
* @export
|
|
@@ -27199,19 +27925,6 @@ export const PatchPotentialRoleRequestInnerV2025OpV2025 = {
|
|
|
27199
27925
|
|
|
27200
27926
|
export type PatchPotentialRoleRequestInnerV2025OpV2025 = typeof PatchPotentialRoleRequestInnerV2025OpV2025[keyof typeof PatchPotentialRoleRequestInnerV2025OpV2025];
|
|
27201
27927
|
|
|
27202
|
-
/**
|
|
27203
|
-
* A JSONPatch document as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902). Only `replace` operations are accepted by this endpoint.
|
|
27204
|
-
* @export
|
|
27205
|
-
* @interface PatchServiceDeskIntegrationRequestV2025
|
|
27206
|
-
*/
|
|
27207
|
-
export interface PatchServiceDeskIntegrationRequestV2025 {
|
|
27208
|
-
/**
|
|
27209
|
-
* Operations to be applied
|
|
27210
|
-
* @type {Array<JsonPatchOperationV2025>}
|
|
27211
|
-
* @memberof PatchServiceDeskIntegrationRequestV2025
|
|
27212
|
-
*/
|
|
27213
|
-
'operations'?: Array<JsonPatchOperationV2025>;
|
|
27214
|
-
}
|
|
27215
27928
|
/**
|
|
27216
27929
|
*
|
|
27217
27930
|
* @export
|
|
@@ -28122,7 +28835,7 @@ export interface ProvisioningPolicyDtoV2025 {
|
|
|
28122
28835
|
* @type {string}
|
|
28123
28836
|
* @memberof ProvisioningPolicyDtoV2025
|
|
28124
28837
|
*/
|
|
28125
|
-
'name': string;
|
|
28838
|
+
'name': string | null;
|
|
28126
28839
|
/**
|
|
28127
28840
|
* the description of the provisioning policy
|
|
28128
28841
|
* @type {string}
|
|
@@ -28155,7 +28868,7 @@ export interface ProvisioningPolicyV2025 {
|
|
|
28155
28868
|
* @type {string}
|
|
28156
28869
|
* @memberof ProvisioningPolicyV2025
|
|
28157
28870
|
*/
|
|
28158
|
-
'name': string;
|
|
28871
|
+
'name': string | null;
|
|
28159
28872
|
/**
|
|
28160
28873
|
* the description of the provisioning policy
|
|
28161
28874
|
* @type {string}
|
|
@@ -29701,6 +30414,83 @@ export interface RequestedAccountRefV2025 {
|
|
|
29701
30414
|
}
|
|
29702
30415
|
|
|
29703
30416
|
|
|
30417
|
+
/**
|
|
30418
|
+
*
|
|
30419
|
+
* @export
|
|
30420
|
+
* @interface RequestedForDtoRefV2025
|
|
30421
|
+
*/
|
|
30422
|
+
export interface RequestedForDtoRefV2025 {
|
|
30423
|
+
/**
|
|
30424
|
+
* The identity id for which the access is requested
|
|
30425
|
+
* @type {string}
|
|
30426
|
+
* @memberof RequestedForDtoRefV2025
|
|
30427
|
+
*/
|
|
30428
|
+
'identityId': string;
|
|
30429
|
+
/**
|
|
30430
|
+
* the details for the access items that are requested for the identity
|
|
30431
|
+
* @type {Array<RequestedItemDtoRefV2025>}
|
|
30432
|
+
* @memberof RequestedForDtoRefV2025
|
|
30433
|
+
*/
|
|
30434
|
+
'requestedItems': Array<RequestedItemDtoRefV2025>;
|
|
30435
|
+
}
|
|
30436
|
+
/**
|
|
30437
|
+
*
|
|
30438
|
+
* @export
|
|
30439
|
+
* @interface RequestedItemAccountSelectionsV2025
|
|
30440
|
+
*/
|
|
30441
|
+
export interface RequestedItemAccountSelectionsV2025 {
|
|
30442
|
+
/**
|
|
30443
|
+
* The description for this requested item
|
|
30444
|
+
* @type {string}
|
|
30445
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
30446
|
+
*/
|
|
30447
|
+
'description'?: string;
|
|
30448
|
+
/**
|
|
30449
|
+
* This field indicates if account selections are not allowed for this requested item. * If true, this field indicates that account selections will not be available for this item and user combination. In this case, no account selections should be provided in the access request for this item and user combination, irrespective of whether the user has single or multiple accounts on a source. * An example is where a user is requesting an access profile that is already assigned to one of their accounts.
|
|
30450
|
+
* @type {boolean}
|
|
30451
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
30452
|
+
*/
|
|
30453
|
+
'accountsSelectionBlocked'?: boolean;
|
|
30454
|
+
/**
|
|
30455
|
+
* If account selections are not allowed for an item, this field will denote the reason.
|
|
30456
|
+
* @type {string}
|
|
30457
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
30458
|
+
*/
|
|
30459
|
+
'accountsSelectionBlockedReason'?: string | null;
|
|
30460
|
+
/**
|
|
30461
|
+
* The type of the item being requested.
|
|
30462
|
+
* @type {string}
|
|
30463
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
30464
|
+
*/
|
|
30465
|
+
'type'?: RequestedItemAccountSelectionsV2025TypeV2025;
|
|
30466
|
+
/**
|
|
30467
|
+
* The id of the requested item
|
|
30468
|
+
* @type {string}
|
|
30469
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
30470
|
+
*/
|
|
30471
|
+
'id'?: string;
|
|
30472
|
+
/**
|
|
30473
|
+
* The name of the requested item
|
|
30474
|
+
* @type {string}
|
|
30475
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
30476
|
+
*/
|
|
30477
|
+
'name'?: string;
|
|
30478
|
+
/**
|
|
30479
|
+
* The details for the sources and accounts for the requested item and identity combination
|
|
30480
|
+
* @type {Array<SourceAccountSelectionsV2025>}
|
|
30481
|
+
* @memberof RequestedItemAccountSelectionsV2025
|
|
30482
|
+
*/
|
|
30483
|
+
'sources'?: Array<SourceAccountSelectionsV2025>;
|
|
30484
|
+
}
|
|
30485
|
+
|
|
30486
|
+
export const RequestedItemAccountSelectionsV2025TypeV2025 = {
|
|
30487
|
+
AccessProfile: 'ACCESS_PROFILE',
|
|
30488
|
+
Role: 'ROLE',
|
|
30489
|
+
Entitlement: 'ENTITLEMENT'
|
|
30490
|
+
} as const;
|
|
30491
|
+
|
|
30492
|
+
export type RequestedItemAccountSelectionsV2025TypeV2025 = typeof RequestedItemAccountSelectionsV2025TypeV2025[keyof typeof RequestedItemAccountSelectionsV2025TypeV2025];
|
|
30493
|
+
|
|
29704
30494
|
/**
|
|
29705
30495
|
*
|
|
29706
30496
|
* @export
|
|
@@ -29729,6 +30519,70 @@ export const RequestedItemDetailsV2025TypeV2025 = {
|
|
|
29729
30519
|
|
|
29730
30520
|
export type RequestedItemDetailsV2025TypeV2025 = typeof RequestedItemDetailsV2025TypeV2025[keyof typeof RequestedItemDetailsV2025TypeV2025];
|
|
29731
30521
|
|
|
30522
|
+
/**
|
|
30523
|
+
*
|
|
30524
|
+
* @export
|
|
30525
|
+
* @interface RequestedItemDtoRefV2025
|
|
30526
|
+
*/
|
|
30527
|
+
export interface RequestedItemDtoRefV2025 {
|
|
30528
|
+
/**
|
|
30529
|
+
* The type of the item being requested.
|
|
30530
|
+
* @type {string}
|
|
30531
|
+
* @memberof RequestedItemDtoRefV2025
|
|
30532
|
+
*/
|
|
30533
|
+
'type': RequestedItemDtoRefV2025TypeV2025;
|
|
30534
|
+
/**
|
|
30535
|
+
* ID of Role, Access Profile or Entitlement being requested.
|
|
30536
|
+
* @type {string}
|
|
30537
|
+
* @memberof RequestedItemDtoRefV2025
|
|
30538
|
+
*/
|
|
30539
|
+
'id': string;
|
|
30540
|
+
/**
|
|
30541
|
+
* Comment provided by requester. * Comment is required when the request is of type Revoke Access.
|
|
30542
|
+
* @type {string}
|
|
30543
|
+
* @memberof RequestedItemDtoRefV2025
|
|
30544
|
+
*/
|
|
30545
|
+
'comment'?: string;
|
|
30546
|
+
/**
|
|
30547
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
|
|
30548
|
+
* @type {{ [key: string]: string; }}
|
|
30549
|
+
* @memberof RequestedItemDtoRefV2025
|
|
30550
|
+
*/
|
|
30551
|
+
'clientMetadata'?: { [key: string]: string; };
|
|
30552
|
+
/**
|
|
30553
|
+
* The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
|
|
30554
|
+
* @type {string}
|
|
30555
|
+
* @memberof RequestedItemDtoRefV2025
|
|
30556
|
+
*/
|
|
30557
|
+
'removeDate'?: string;
|
|
30558
|
+
/**
|
|
30559
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
30560
|
+
* @type {string}
|
|
30561
|
+
* @memberof RequestedItemDtoRefV2025
|
|
30562
|
+
*/
|
|
30563
|
+
'assignmentId'?: string | null;
|
|
30564
|
+
/**
|
|
30565
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
30566
|
+
* @type {string}
|
|
30567
|
+
* @memberof RequestedItemDtoRefV2025
|
|
30568
|
+
*/
|
|
30569
|
+
'nativeIdentity'?: string | null;
|
|
30570
|
+
/**
|
|
30571
|
+
* The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
|
|
30572
|
+
* @type {Array<SourceItemRefV2025>}
|
|
30573
|
+
* @memberof RequestedItemDtoRefV2025
|
|
30574
|
+
*/
|
|
30575
|
+
'accountSelection'?: Array<SourceItemRefV2025> | null;
|
|
30576
|
+
}
|
|
30577
|
+
|
|
30578
|
+
export const RequestedItemDtoRefV2025TypeV2025 = {
|
|
30579
|
+
AccessProfile: 'ACCESS_PROFILE',
|
|
30580
|
+
Role: 'ROLE',
|
|
30581
|
+
Entitlement: 'ENTITLEMENT'
|
|
30582
|
+
} as const;
|
|
30583
|
+
|
|
30584
|
+
export type RequestedItemDtoRefV2025TypeV2025 = typeof RequestedItemDtoRefV2025TypeV2025[keyof typeof RequestedItemDtoRefV2025TypeV2025];
|
|
30585
|
+
|
|
29732
30586
|
/**
|
|
29733
30587
|
*
|
|
29734
30588
|
* @export
|
|
@@ -35990,6 +36844,179 @@ export const ServiceDeskSourceV2025TypeV2025 = {
|
|
|
35990
36844
|
|
|
35991
36845
|
export type ServiceDeskSourceV2025TypeV2025 = typeof ServiceDeskSourceV2025TypeV2025[keyof typeof ServiceDeskSourceV2025TypeV2025];
|
|
35992
36846
|
|
|
36847
|
+
/**
|
|
36848
|
+
*
|
|
36849
|
+
* @export
|
|
36850
|
+
* @interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36851
|
+
*/
|
|
36852
|
+
export interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2025 {
|
|
36853
|
+
/**
|
|
36854
|
+
* Federation protocol role
|
|
36855
|
+
* @type {string}
|
|
36856
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36857
|
+
*/
|
|
36858
|
+
'role'?: ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025;
|
|
36859
|
+
/**
|
|
36860
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
36861
|
+
* @type {string}
|
|
36862
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36863
|
+
*/
|
|
36864
|
+
'entityId'?: string;
|
|
36865
|
+
/**
|
|
36866
|
+
* Defines the binding used for the SAML flow. Used with IDP configurations.
|
|
36867
|
+
* @type {string}
|
|
36868
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36869
|
+
*/
|
|
36870
|
+
'binding'?: string;
|
|
36871
|
+
/**
|
|
36872
|
+
* Specifies the SAML authentication method to use. Used with IDP configurations.
|
|
36873
|
+
* @type {string}
|
|
36874
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36875
|
+
*/
|
|
36876
|
+
'authnContext'?: string;
|
|
36877
|
+
/**
|
|
36878
|
+
* The IDP logout URL. Used with IDP configurations.
|
|
36879
|
+
* @type {string}
|
|
36880
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36881
|
+
*/
|
|
36882
|
+
'logoutUrl'?: string;
|
|
36883
|
+
/**
|
|
36884
|
+
* Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
|
|
36885
|
+
* @type {boolean}
|
|
36886
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36887
|
+
*/
|
|
36888
|
+
'includeAuthnContext'?: boolean;
|
|
36889
|
+
/**
|
|
36890
|
+
* The name id format to use. Used with IDP configurations.
|
|
36891
|
+
* @type {string}
|
|
36892
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36893
|
+
*/
|
|
36894
|
+
'nameId'?: string;
|
|
36895
|
+
/**
|
|
36896
|
+
*
|
|
36897
|
+
* @type {JITConfigurationV2025}
|
|
36898
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36899
|
+
*/
|
|
36900
|
+
'jitConfiguration'?: JITConfigurationV2025;
|
|
36901
|
+
/**
|
|
36902
|
+
* The Base64-encoded certificate used by the IDP. Used with IDP configurations.
|
|
36903
|
+
* @type {string}
|
|
36904
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36905
|
+
*/
|
|
36906
|
+
'cert'?: string;
|
|
36907
|
+
/**
|
|
36908
|
+
* The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
|
|
36909
|
+
* @type {string}
|
|
36910
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36911
|
+
*/
|
|
36912
|
+
'loginUrlPost'?: string;
|
|
36913
|
+
/**
|
|
36914
|
+
* The IDP Redirect URL. Used with IDP configurations.
|
|
36915
|
+
* @type {string}
|
|
36916
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36917
|
+
*/
|
|
36918
|
+
'loginUrlRedirect'?: string;
|
|
36919
|
+
/**
|
|
36920
|
+
* Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
|
|
36921
|
+
* @type {string}
|
|
36922
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36923
|
+
*/
|
|
36924
|
+
'mappingAttribute': string;
|
|
36925
|
+
/**
|
|
36926
|
+
* The expiration date extracted from the certificate.
|
|
36927
|
+
* @type {string}
|
|
36928
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36929
|
+
*/
|
|
36930
|
+
'certificateExpirationDate'?: string;
|
|
36931
|
+
/**
|
|
36932
|
+
* The name extracted from the certificate.
|
|
36933
|
+
* @type {string}
|
|
36934
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36935
|
+
*/
|
|
36936
|
+
'certificateName'?: string;
|
|
36937
|
+
/**
|
|
36938
|
+
* Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
|
|
36939
|
+
* @type {string}
|
|
36940
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36941
|
+
*/
|
|
36942
|
+
'alias'?: string;
|
|
36943
|
+
/**
|
|
36944
|
+
* The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
|
|
36945
|
+
* @type {string}
|
|
36946
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36947
|
+
*/
|
|
36948
|
+
'callbackUrl': string;
|
|
36949
|
+
/**
|
|
36950
|
+
* The legacy ACS URL used for SAML authentication. Used with SP configurations.
|
|
36951
|
+
* @type {string}
|
|
36952
|
+
* @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025
|
|
36953
|
+
*/
|
|
36954
|
+
'legacyAcsUrl'?: string;
|
|
36955
|
+
}
|
|
36956
|
+
|
|
36957
|
+
export const ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025 = {
|
|
36958
|
+
SamlIdp: 'SAML_IDP',
|
|
36959
|
+
SamlSp: 'SAML_SP'
|
|
36960
|
+
} as const;
|
|
36961
|
+
|
|
36962
|
+
export type ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025 = typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025[keyof typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025];
|
|
36963
|
+
|
|
36964
|
+
/**
|
|
36965
|
+
* Represents the IdentityNow as Service Provider Configuration allowing customers to log into IDN via an Identity Provider
|
|
36966
|
+
* @export
|
|
36967
|
+
* @interface ServiceProviderConfigurationV2025
|
|
36968
|
+
*/
|
|
36969
|
+
export interface ServiceProviderConfigurationV2025 {
|
|
36970
|
+
/**
|
|
36971
|
+
* This determines whether or not the SAML authentication flow is enabled for an org
|
|
36972
|
+
* @type {boolean}
|
|
36973
|
+
* @memberof ServiceProviderConfigurationV2025
|
|
36974
|
+
*/
|
|
36975
|
+
'enabled'?: boolean;
|
|
36976
|
+
/**
|
|
36977
|
+
* This allows basic login with the parameter prompt=true. This is often toggled on when debugging SAML authentication setup. When false, only org admins with MFA-enabled can bypass the IDP.
|
|
36978
|
+
* @type {boolean}
|
|
36979
|
+
* @memberof ServiceProviderConfigurationV2025
|
|
36980
|
+
*/
|
|
36981
|
+
'bypassIdp'?: boolean;
|
|
36982
|
+
/**
|
|
36983
|
+
* This indicates whether or not the SAML configuration is valid.
|
|
36984
|
+
* @type {boolean}
|
|
36985
|
+
* @memberof ServiceProviderConfigurationV2025
|
|
36986
|
+
*/
|
|
36987
|
+
'samlConfigurationValid'?: boolean;
|
|
36988
|
+
/**
|
|
36989
|
+
* A list of the abstract implementations of the Federation Protocol details. Typically, this will include on SpDetails object and one IdpDetails object used in tandem to define a SAML integration between a customer\'s identity provider and a customer\'s SailPoint instance (i.e., the service provider).
|
|
36990
|
+
* @type {Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2025>}
|
|
36991
|
+
* @memberof ServiceProviderConfigurationV2025
|
|
36992
|
+
*/
|
|
36993
|
+
'federationProtocolDetails'?: Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2025>;
|
|
36994
|
+
}
|
|
36995
|
+
/**
|
|
36996
|
+
*
|
|
36997
|
+
* @export
|
|
36998
|
+
* @interface SessionConfigurationV2025
|
|
36999
|
+
*/
|
|
37000
|
+
export interface SessionConfigurationV2025 {
|
|
37001
|
+
/**
|
|
37002
|
+
* The maximum time in minutes a session can be idle.
|
|
37003
|
+
* @type {number}
|
|
37004
|
+
* @memberof SessionConfigurationV2025
|
|
37005
|
+
*/
|
|
37006
|
+
'maxIdleTime'?: number;
|
|
37007
|
+
/**
|
|
37008
|
+
* Denotes if \'remember me\' is enabled.
|
|
37009
|
+
* @type {boolean}
|
|
37010
|
+
* @memberof SessionConfigurationV2025
|
|
37011
|
+
*/
|
|
37012
|
+
'rememberMe'?: boolean;
|
|
37013
|
+
/**
|
|
37014
|
+
* The maximum allowable session time in minutes.
|
|
37015
|
+
* @type {number}
|
|
37016
|
+
* @memberof SessionConfigurationV2025
|
|
37017
|
+
*/
|
|
37018
|
+
'maxSessionTime'?: number;
|
|
37019
|
+
}
|
|
35993
37020
|
/**
|
|
35994
37021
|
*
|
|
35995
37022
|
* @export
|
|
@@ -37028,6 +38055,39 @@ export interface SourceAccountDeletedV2025 {
|
|
|
37028
38055
|
*/
|
|
37029
38056
|
'attributes': { [key: string]: any; };
|
|
37030
38057
|
}
|
|
38058
|
+
/**
|
|
38059
|
+
*
|
|
38060
|
+
* @export
|
|
38061
|
+
* @interface SourceAccountSelectionsV2025
|
|
38062
|
+
*/
|
|
38063
|
+
export interface SourceAccountSelectionsV2025 {
|
|
38064
|
+
/**
|
|
38065
|
+
*
|
|
38066
|
+
* @type {DtoTypeV2025}
|
|
38067
|
+
* @memberof SourceAccountSelectionsV2025
|
|
38068
|
+
*/
|
|
38069
|
+
'type'?: DtoTypeV2025;
|
|
38070
|
+
/**
|
|
38071
|
+
* The source id
|
|
38072
|
+
* @type {string}
|
|
38073
|
+
* @memberof SourceAccountSelectionsV2025
|
|
38074
|
+
*/
|
|
38075
|
+
'id'?: string;
|
|
38076
|
+
/**
|
|
38077
|
+
* The source name
|
|
38078
|
+
* @type {string}
|
|
38079
|
+
* @memberof SourceAccountSelectionsV2025
|
|
38080
|
+
*/
|
|
38081
|
+
'name'?: string;
|
|
38082
|
+
/**
|
|
38083
|
+
* The accounts information for a particular source in the requested item
|
|
38084
|
+
* @type {Array<AccountInfoRefV2025>}
|
|
38085
|
+
* @memberof SourceAccountSelectionsV2025
|
|
38086
|
+
*/
|
|
38087
|
+
'accounts'?: Array<AccountInfoRefV2025>;
|
|
38088
|
+
}
|
|
38089
|
+
|
|
38090
|
+
|
|
37031
38091
|
/**
|
|
37032
38092
|
*
|
|
37033
38093
|
* @export
|
|
@@ -37813,6 +38873,25 @@ export const SourceHealthDtoV2025StatusV2025 = {
|
|
|
37813
38873
|
|
|
37814
38874
|
export type SourceHealthDtoV2025StatusV2025 = typeof SourceHealthDtoV2025StatusV2025[keyof typeof SourceHealthDtoV2025StatusV2025];
|
|
37815
38875
|
|
|
38876
|
+
/**
|
|
38877
|
+
*
|
|
38878
|
+
* @export
|
|
38879
|
+
* @interface SourceItemRefV2025
|
|
38880
|
+
*/
|
|
38881
|
+
export interface SourceItemRefV2025 {
|
|
38882
|
+
/**
|
|
38883
|
+
* The id for the source on which account selections are made
|
|
38884
|
+
* @type {string}
|
|
38885
|
+
* @memberof SourceItemRefV2025
|
|
38886
|
+
*/
|
|
38887
|
+
'sourceId'?: string | null;
|
|
38888
|
+
/**
|
|
38889
|
+
* A list of account selections on the source. Currently, only one selection per source is supported.
|
|
38890
|
+
* @type {Array<AccountItemRefV2025>}
|
|
38891
|
+
* @memberof SourceItemRefV2025
|
|
38892
|
+
*/
|
|
38893
|
+
'accounts'?: Array<AccountItemRefV2025> | null;
|
|
38894
|
+
}
|
|
37816
38895
|
/**
|
|
37817
38896
|
* Reference to management workgroup for the source.
|
|
37818
38897
|
* @export
|
|
@@ -38937,6 +40016,51 @@ export interface SpConfigRulesV2025 {
|
|
|
38937
40016
|
*/
|
|
38938
40017
|
'editable'?: boolean;
|
|
38939
40018
|
}
|
|
40019
|
+
/**
|
|
40020
|
+
*
|
|
40021
|
+
* @export
|
|
40022
|
+
* @interface SpDetailsV2025
|
|
40023
|
+
*/
|
|
40024
|
+
export interface SpDetailsV2025 {
|
|
40025
|
+
/**
|
|
40026
|
+
* Federation protocol role
|
|
40027
|
+
* @type {string}
|
|
40028
|
+
* @memberof SpDetailsV2025
|
|
40029
|
+
*/
|
|
40030
|
+
'role'?: SpDetailsV2025RoleV2025;
|
|
40031
|
+
/**
|
|
40032
|
+
* An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
|
|
40033
|
+
* @type {string}
|
|
40034
|
+
* @memberof SpDetailsV2025
|
|
40035
|
+
*/
|
|
40036
|
+
'entityId'?: string;
|
|
40037
|
+
/**
|
|
40038
|
+
* Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
|
|
40039
|
+
* @type {string}
|
|
40040
|
+
* @memberof SpDetailsV2025
|
|
40041
|
+
*/
|
|
40042
|
+
'alias'?: string;
|
|
40043
|
+
/**
|
|
40044
|
+
* The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
|
|
40045
|
+
* @type {string}
|
|
40046
|
+
* @memberof SpDetailsV2025
|
|
40047
|
+
*/
|
|
40048
|
+
'callbackUrl': string;
|
|
40049
|
+
/**
|
|
40050
|
+
* The legacy ACS URL used for SAML authentication. Used with SP configurations.
|
|
40051
|
+
* @type {string}
|
|
40052
|
+
* @memberof SpDetailsV2025
|
|
40053
|
+
*/
|
|
40054
|
+
'legacyAcsUrl'?: string;
|
|
40055
|
+
}
|
|
40056
|
+
|
|
40057
|
+
export const SpDetailsV2025RoleV2025 = {
|
|
40058
|
+
SamlIdp: 'SAML_IDP',
|
|
40059
|
+
SamlSp: 'SAML_SP'
|
|
40060
|
+
} as const;
|
|
40061
|
+
|
|
40062
|
+
export type SpDetailsV2025RoleV2025 = typeof SpDetailsV2025RoleV2025[keyof typeof SpDetailsV2025RoleV2025];
|
|
40063
|
+
|
|
38940
40064
|
/**
|
|
38941
40065
|
*
|
|
38942
40066
|
* @export
|
|
@@ -42655,7 +43779,8 @@ export const WorkflowExecutionV2025StatusV2025 = {
|
|
|
42655
43779
|
Completed: 'Completed',
|
|
42656
43780
|
Failed: 'Failed',
|
|
42657
43781
|
Canceled: 'Canceled',
|
|
42658
|
-
Running: 'Running'
|
|
43782
|
+
Running: 'Running',
|
|
43783
|
+
Queued: 'Queued'
|
|
42659
43784
|
} as const;
|
|
42660
43785
|
|
|
42661
43786
|
export type WorkflowExecutionV2025StatusV2025 = typeof WorkflowExecutionV2025StatusV2025[keyof typeof WorkflowExecutionV2025StatusV2025];
|
|
@@ -43975,7 +45100,7 @@ export class AccessModelMetadataV2025Api extends BaseAPI {
|
|
|
43975
45100
|
export const AccessProfilesV2025ApiAxiosParamCreator = function (configuration?: Configuration) {
|
|
43976
45101
|
return {
|
|
43977
45102
|
/**
|
|
43978
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
45103
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
43979
45104
|
* @summary Create Access Profile
|
|
43980
45105
|
* @param {AccessProfileV2025} accessProfileV2025
|
|
43981
45106
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -44430,7 +45555,7 @@ export const AccessProfilesV2025ApiFp = function(configuration?: Configuration)
|
|
|
44430
45555
|
const localVarAxiosParamCreator = AccessProfilesV2025ApiAxiosParamCreator(configuration)
|
|
44431
45556
|
return {
|
|
44432
45557
|
/**
|
|
44433
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
45558
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
44434
45559
|
* @summary Create Access Profile
|
|
44435
45560
|
* @param {AccessProfileV2025} accessProfileV2025
|
|
44436
45561
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -44558,7 +45683,7 @@ export const AccessProfilesV2025ApiFactory = function (configuration?: Configura
|
|
|
44558
45683
|
const localVarFp = AccessProfilesV2025ApiFp(configuration)
|
|
44559
45684
|
return {
|
|
44560
45685
|
/**
|
|
44561
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
45686
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
44562
45687
|
* @summary Create Access Profile
|
|
44563
45688
|
* @param {AccessProfilesV2025ApiCreateAccessProfileRequest} requestParameters Request parameters.
|
|
44564
45689
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -44858,7 +45983,7 @@ export interface AccessProfilesV2025ApiUpdateAccessProfilesInBulkRequest {
|
|
|
44858
45983
|
*/
|
|
44859
45984
|
export class AccessProfilesV2025Api extends BaseAPI {
|
|
44860
45985
|
/**
|
|
44861
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
45986
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
44862
45987
|
* @summary Create Access Profile
|
|
44863
45988
|
* @param {AccessProfilesV2025ApiCreateAccessProfileRequest} requestParameters Request parameters.
|
|
44864
45989
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -45236,7 +46361,7 @@ export const AccessRequestApprovalsV2025ApiAxiosParamCreator = function (configu
|
|
|
45236
46361
|
* @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
45237
46362
|
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
45238
46363
|
* @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count=true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
45239
|
-
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
|
|
46364
|
+
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
|
|
45240
46365
|
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified**
|
|
45241
46366
|
* @param {*} [axiosOptions] Override http request option.
|
|
45242
46367
|
* @throws {RequiredError}
|
|
@@ -45438,7 +46563,7 @@ export const AccessRequestApprovalsV2025ApiFp = function(configuration?: Configu
|
|
|
45438
46563
|
* @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
45439
46564
|
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
45440
46565
|
* @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count=true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
45441
|
-
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
|
|
46566
|
+
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
|
|
45442
46567
|
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified**
|
|
45443
46568
|
* @param {*} [axiosOptions] Override http request option.
|
|
45444
46569
|
* @throws {RequiredError}
|
|
@@ -45728,7 +46853,7 @@ export interface AccessRequestApprovalsV2025ApiListPendingApprovalsRequest {
|
|
|
45728
46853
|
readonly count?: boolean
|
|
45729
46854
|
|
|
45730
46855
|
/**
|
|
45731
|
-
* Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
|
|
46856
|
+
* Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
|
|
45732
46857
|
* @type {string}
|
|
45733
46858
|
* @memberof AccessRequestApprovalsV2025ApiListPendingApprovals
|
|
45734
46859
|
*/
|
|
@@ -46211,7 +47336,7 @@ export const AccessRequestsV2025ApiAxiosParamCreator = function (configuration?:
|
|
|
46211
47336
|
};
|
|
46212
47337
|
},
|
|
46213
47338
|
/**
|
|
46214
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
47339
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
46215
47340
|
* @summary Submit Access Request
|
|
46216
47341
|
* @param {AccessRequestV2025} accessRequestV2025
|
|
46217
47342
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -46293,23 +47418,26 @@ export const AccessRequestsV2025ApiAxiosParamCreator = function (configuration?:
|
|
|
46293
47418
|
};
|
|
46294
47419
|
},
|
|
46295
47420
|
/**
|
|
46296
|
-
* Use this API to return
|
|
46297
|
-
* @summary
|
|
46298
|
-
* @param {string}
|
|
46299
|
-
* @param {string}
|
|
46300
|
-
* @param {string} [
|
|
46301
|
-
* @param {string} [assignedTo] Filter the results by the specified identity who is the owner of the Identity Request Work Item. *me* indicates the current user.
|
|
46302
|
-
* @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
|
|
46303
|
-
* @param {number} [limit] Max number of results to return.
|
|
46304
|
-
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
|
|
46305
|
-
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *in* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
|
|
46306
|
-
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name**
|
|
46307
|
-
* @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
|
|
47421
|
+
* Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
|
|
47422
|
+
* @summary Identity Entitlement Details
|
|
47423
|
+
* @param {string} identityId The identity ID.
|
|
47424
|
+
* @param {string} entitlementId The entitlement ID
|
|
47425
|
+
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
46308
47426
|
* @param {*} [axiosOptions] Override http request option.
|
|
46309
47427
|
* @throws {RequiredError}
|
|
46310
47428
|
*/
|
|
46311
|
-
|
|
46312
|
-
|
|
47429
|
+
getEntitlementDetailsForIdentity: async (identityId: string, entitlementId: string, xSailPointExperimental?: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
47430
|
+
// verify required parameter 'identityId' is not null or undefined
|
|
47431
|
+
assertParamExists('getEntitlementDetailsForIdentity', 'identityId', identityId)
|
|
47432
|
+
// verify required parameter 'entitlementId' is not null or undefined
|
|
47433
|
+
assertParamExists('getEntitlementDetailsForIdentity', 'entitlementId', entitlementId)
|
|
47434
|
+
if (xSailPointExperimental === undefined) {
|
|
47435
|
+
xSailPointExperimental = 'true';
|
|
47436
|
+
}
|
|
47437
|
+
|
|
47438
|
+
const localVarPath = `/access-requests/revocable-objects`
|
|
47439
|
+
.replace(`{${"identityId"}}`, encodeURIComponent(String(identityId)))
|
|
47440
|
+
.replace(`{${"entitlementId"}}`, encodeURIComponent(String(entitlementId)));
|
|
46313
47441
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
46314
47442
|
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
46315
47443
|
let baseOptions;
|
|
@@ -46329,48 +47457,11 @@ export const AccessRequestsV2025ApiAxiosParamCreator = function (configuration?:
|
|
|
46329
47457
|
// oauth required
|
|
46330
47458
|
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
46331
47459
|
|
|
46332
|
-
if (requestedFor !== undefined) {
|
|
46333
|
-
localVarQueryParameter['requested-for'] = requestedFor;
|
|
46334
|
-
}
|
|
46335
|
-
|
|
46336
|
-
if (requestedBy !== undefined) {
|
|
46337
|
-
localVarQueryParameter['requested-by'] = requestedBy;
|
|
46338
|
-
}
|
|
46339
|
-
|
|
46340
|
-
if (regardingIdentity !== undefined) {
|
|
46341
|
-
localVarQueryParameter['regarding-identity'] = regardingIdentity;
|
|
46342
|
-
}
|
|
46343
|
-
|
|
46344
|
-
if (assignedTo !== undefined) {
|
|
46345
|
-
localVarQueryParameter['assigned-to'] = assignedTo;
|
|
46346
|
-
}
|
|
46347
|
-
|
|
46348
|
-
if (count !== undefined) {
|
|
46349
|
-
localVarQueryParameter['count'] = count;
|
|
46350
|
-
}
|
|
46351
|
-
|
|
46352
|
-
if (limit !== undefined) {
|
|
46353
|
-
localVarQueryParameter['limit'] = limit;
|
|
46354
|
-
}
|
|
46355
|
-
|
|
46356
|
-
if (offset !== undefined) {
|
|
46357
|
-
localVarQueryParameter['offset'] = offset;
|
|
46358
|
-
}
|
|
46359
|
-
|
|
46360
|
-
if (filters !== undefined) {
|
|
46361
|
-
localVarQueryParameter['filters'] = filters;
|
|
46362
|
-
}
|
|
46363
|
-
|
|
46364
|
-
if (sorters !== undefined) {
|
|
46365
|
-
localVarQueryParameter['sorters'] = sorters;
|
|
46366
|
-
}
|
|
46367
|
-
|
|
46368
|
-
if (requestState !== undefined) {
|
|
46369
|
-
localVarQueryParameter['request-state'] = requestState;
|
|
46370
|
-
}
|
|
46371
|
-
|
|
46372
47460
|
|
|
46373
47461
|
|
|
47462
|
+
if (xSailPointExperimental != null) {
|
|
47463
|
+
localVarHeaderParameter['X-SailPoint-Experimental'] = String(xSailPointExperimental);
|
|
47464
|
+
}
|
|
46374
47465
|
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
46375
47466
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
46376
47467
|
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
@@ -46381,8 +47472,8 @@ export const AccessRequestsV2025ApiAxiosParamCreator = function (configuration?:
|
|
|
46381
47472
|
};
|
|
46382
47473
|
},
|
|
46383
47474
|
/**
|
|
46384
|
-
* Use this API to
|
|
46385
|
-
* @summary Access Request Status
|
|
47475
|
+
* Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
|
|
47476
|
+
* @summary Access Request Status
|
|
46386
47477
|
* @param {string} [requestedFor] Filter the results by the identity the requests were made for. *me* indicates the current user. Mutually exclusive with *regarding-identity*.
|
|
46387
47478
|
* @param {string} [requestedBy] Filter the results by the identity who made the requests. *me* indicates the current user. Mutually exclusive with *regarding-identity*.
|
|
46388
47479
|
* @param {string} [regardingIdentity] Filter the results by the specified identity who is either the requester or target of the requests. *me* indicates the current user. Mutually exclusive with *requested-for* and *requested-by*.
|
|
@@ -46390,14 +47481,14 @@ export const AccessRequestsV2025ApiAxiosParamCreator = function (configuration?:
|
|
|
46390
47481
|
* @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
|
|
46391
47482
|
* @param {number} [limit] Max number of results to return.
|
|
46392
47483
|
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
|
|
46393
|
-
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **
|
|
46394
|
-
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name
|
|
47484
|
+
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *in* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
|
|
47485
|
+
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name**
|
|
46395
47486
|
* @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
|
|
46396
47487
|
* @param {*} [axiosOptions] Override http request option.
|
|
46397
47488
|
* @throws {RequiredError}
|
|
46398
47489
|
*/
|
|
46399
|
-
|
|
46400
|
-
const localVarPath = `/access-request-
|
|
47490
|
+
listAccessRequestStatus: async (requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
47491
|
+
const localVarPath = `/access-request-status`;
|
|
46401
47492
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
46402
47493
|
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
46403
47494
|
let baseOptions;
|
|
@@ -46468,6 +47559,138 @@ export const AccessRequestsV2025ApiAxiosParamCreator = function (configuration?:
|
|
|
46468
47559
|
axiosOptions: localVarRequestOptions,
|
|
46469
47560
|
};
|
|
46470
47561
|
},
|
|
47562
|
+
/**
|
|
47563
|
+
* Use this API to get access request statuses of all the access requests in the org based on the specified query parameters. Any user with user level ORG_ADMIN or scope idn:access-request-administration:read can access this endpoint to get the access request statuses
|
|
47564
|
+
* @summary Access Request Status for Administrators
|
|
47565
|
+
* @param {string} [requestedFor] Filter the results by the identity the requests were made for. *me* indicates the current user. Mutually exclusive with *regarding-identity*.
|
|
47566
|
+
* @param {string} [requestedBy] Filter the results by the identity who made the requests. *me* indicates the current user. Mutually exclusive with *regarding-identity*.
|
|
47567
|
+
* @param {string} [regardingIdentity] Filter the results by the specified identity who is either the requester or target of the requests. *me* indicates the current user. Mutually exclusive with *requested-for* and *requested-by*.
|
|
47568
|
+
* @param {string} [assignedTo] Filter the results by the specified identity who is the owner of the Identity Request Work Item. *me* indicates the current user.
|
|
47569
|
+
* @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
|
|
47570
|
+
* @param {number} [limit] Max number of results to return.
|
|
47571
|
+
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
|
|
47572
|
+
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **accessRequestId**: *in* **status**: *in, eq, ne* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
|
|
47573
|
+
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name, accessRequestId**
|
|
47574
|
+
* @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
|
|
47575
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
47576
|
+
* @throws {RequiredError}
|
|
47577
|
+
*/
|
|
47578
|
+
listAdministratorsAccessRequestStatus: async (requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
47579
|
+
const localVarPath = `/access-request-administration`;
|
|
47580
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
47581
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
47582
|
+
let baseOptions;
|
|
47583
|
+
if (configuration) {
|
|
47584
|
+
baseOptions = configuration.baseOptions;
|
|
47585
|
+
}
|
|
47586
|
+
|
|
47587
|
+
const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
|
|
47588
|
+
const localVarHeaderParameter = {} as any;
|
|
47589
|
+
const localVarQueryParameter = {} as any;
|
|
47590
|
+
|
|
47591
|
+
// authentication userAuth required
|
|
47592
|
+
// oauth required
|
|
47593
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
47594
|
+
|
|
47595
|
+
// authentication userAuth required
|
|
47596
|
+
// oauth required
|
|
47597
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
47598
|
+
|
|
47599
|
+
if (requestedFor !== undefined) {
|
|
47600
|
+
localVarQueryParameter['requested-for'] = requestedFor;
|
|
47601
|
+
}
|
|
47602
|
+
|
|
47603
|
+
if (requestedBy !== undefined) {
|
|
47604
|
+
localVarQueryParameter['requested-by'] = requestedBy;
|
|
47605
|
+
}
|
|
47606
|
+
|
|
47607
|
+
if (regardingIdentity !== undefined) {
|
|
47608
|
+
localVarQueryParameter['regarding-identity'] = regardingIdentity;
|
|
47609
|
+
}
|
|
47610
|
+
|
|
47611
|
+
if (assignedTo !== undefined) {
|
|
47612
|
+
localVarQueryParameter['assigned-to'] = assignedTo;
|
|
47613
|
+
}
|
|
47614
|
+
|
|
47615
|
+
if (count !== undefined) {
|
|
47616
|
+
localVarQueryParameter['count'] = count;
|
|
47617
|
+
}
|
|
47618
|
+
|
|
47619
|
+
if (limit !== undefined) {
|
|
47620
|
+
localVarQueryParameter['limit'] = limit;
|
|
47621
|
+
}
|
|
47622
|
+
|
|
47623
|
+
if (offset !== undefined) {
|
|
47624
|
+
localVarQueryParameter['offset'] = offset;
|
|
47625
|
+
}
|
|
47626
|
+
|
|
47627
|
+
if (filters !== undefined) {
|
|
47628
|
+
localVarQueryParameter['filters'] = filters;
|
|
47629
|
+
}
|
|
47630
|
+
|
|
47631
|
+
if (sorters !== undefined) {
|
|
47632
|
+
localVarQueryParameter['sorters'] = sorters;
|
|
47633
|
+
}
|
|
47634
|
+
|
|
47635
|
+
if (requestState !== undefined) {
|
|
47636
|
+
localVarQueryParameter['request-state'] = requestState;
|
|
47637
|
+
}
|
|
47638
|
+
|
|
47639
|
+
|
|
47640
|
+
|
|
47641
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
47642
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
47643
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
47644
|
+
|
|
47645
|
+
return {
|
|
47646
|
+
url: toPathString(localVarUrlObj),
|
|
47647
|
+
axiosOptions: localVarRequestOptions,
|
|
47648
|
+
};
|
|
47649
|
+
},
|
|
47650
|
+
/**
|
|
47651
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
47652
|
+
* @summary Get accounts selections for identity
|
|
47653
|
+
* @param {AccountsSelectionRequestV2025} accountsSelectionRequestV2025
|
|
47654
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
47655
|
+
* @throws {RequiredError}
|
|
47656
|
+
*/
|
|
47657
|
+
loadAccountSelections: async (accountsSelectionRequestV2025: AccountsSelectionRequestV2025, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
47658
|
+
// verify required parameter 'accountsSelectionRequestV2025' is not null or undefined
|
|
47659
|
+
assertParamExists('loadAccountSelections', 'accountsSelectionRequestV2025', accountsSelectionRequestV2025)
|
|
47660
|
+
const localVarPath = `/access-requests/accounts-selection`;
|
|
47661
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
47662
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
47663
|
+
let baseOptions;
|
|
47664
|
+
if (configuration) {
|
|
47665
|
+
baseOptions = configuration.baseOptions;
|
|
47666
|
+
}
|
|
47667
|
+
|
|
47668
|
+
const localVarRequestOptions = { method: 'POST', ...baseOptions, ...axiosOptions};
|
|
47669
|
+
const localVarHeaderParameter = {} as any;
|
|
47670
|
+
const localVarQueryParameter = {} as any;
|
|
47671
|
+
|
|
47672
|
+
// authentication userAuth required
|
|
47673
|
+
// oauth required
|
|
47674
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
47675
|
+
|
|
47676
|
+
// authentication userAuth required
|
|
47677
|
+
// oauth required
|
|
47678
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
47679
|
+
|
|
47680
|
+
|
|
47681
|
+
|
|
47682
|
+
localVarHeaderParameter['Content-Type'] = 'application/json';
|
|
47683
|
+
|
|
47684
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
47685
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
47686
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
47687
|
+
localVarRequestOptions.data = serializeDataIfNeeded(accountsSelectionRequestV2025, localVarRequestOptions, configuration)
|
|
47688
|
+
|
|
47689
|
+
return {
|
|
47690
|
+
url: toPathString(localVarUrlObj),
|
|
47691
|
+
axiosOptions: localVarRequestOptions,
|
|
47692
|
+
};
|
|
47693
|
+
},
|
|
46471
47694
|
/**
|
|
46472
47695
|
* This endpoint replaces the current access-request configuration.
|
|
46473
47696
|
* @summary Update Access Request Configuration
|
|
@@ -46576,7 +47799,7 @@ export const AccessRequestsV2025ApiFp = function(configuration?: Configuration)
|
|
|
46576
47799
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
46577
47800
|
},
|
|
46578
47801
|
/**
|
|
46579
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
47802
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
46580
47803
|
* @summary Submit Access Request
|
|
46581
47804
|
* @param {AccessRequestV2025} accessRequestV2025
|
|
46582
47805
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -46600,6 +47823,21 @@ export const AccessRequestsV2025ApiFp = function(configuration?: Configuration)
|
|
|
46600
47823
|
const localVarOperationServerBasePath = operationServerMap['AccessRequestsV2025Api.getAccessRequestConfig']?.[localVarOperationServerIndex]?.url;
|
|
46601
47824
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
46602
47825
|
},
|
|
47826
|
+
/**
|
|
47827
|
+
* Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
|
|
47828
|
+
* @summary Identity Entitlement Details
|
|
47829
|
+
* @param {string} identityId The identity ID.
|
|
47830
|
+
* @param {string} entitlementId The entitlement ID
|
|
47831
|
+
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
47832
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
47833
|
+
* @throws {RequiredError}
|
|
47834
|
+
*/
|
|
47835
|
+
async getEntitlementDetailsForIdentity(identityId: string, entitlementId: string, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<IdentityEntitlementDetailsV2025>> {
|
|
47836
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.getEntitlementDetailsForIdentity(identityId, entitlementId, xSailPointExperimental, axiosOptions);
|
|
47837
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
47838
|
+
const localVarOperationServerBasePath = operationServerMap['AccessRequestsV2025Api.getEntitlementDetailsForIdentity']?.[localVarOperationServerIndex]?.url;
|
|
47839
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
47840
|
+
},
|
|
46603
47841
|
/**
|
|
46604
47842
|
* Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
|
|
46605
47843
|
* @summary Access Request Status
|
|
@@ -46644,6 +47882,19 @@ export const AccessRequestsV2025ApiFp = function(configuration?: Configuration)
|
|
|
46644
47882
|
const localVarOperationServerBasePath = operationServerMap['AccessRequestsV2025Api.listAdministratorsAccessRequestStatus']?.[localVarOperationServerIndex]?.url;
|
|
46645
47883
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
46646
47884
|
},
|
|
47885
|
+
/**
|
|
47886
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
47887
|
+
* @summary Get accounts selections for identity
|
|
47888
|
+
* @param {AccountsSelectionRequestV2025} accountsSelectionRequestV2025
|
|
47889
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
47890
|
+
* @throws {RequiredError}
|
|
47891
|
+
*/
|
|
47892
|
+
async loadAccountSelections(accountsSelectionRequestV2025: AccountsSelectionRequestV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AccountsSelectionResponseV2025>> {
|
|
47893
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.loadAccountSelections(accountsSelectionRequestV2025, axiosOptions);
|
|
47894
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
47895
|
+
const localVarOperationServerBasePath = operationServerMap['AccessRequestsV2025Api.loadAccountSelections']?.[localVarOperationServerIndex]?.url;
|
|
47896
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
47897
|
+
},
|
|
46647
47898
|
/**
|
|
46648
47899
|
* This endpoint replaces the current access-request configuration.
|
|
46649
47900
|
* @summary Update Access Request Configuration
|
|
@@ -46708,7 +47959,7 @@ export const AccessRequestsV2025ApiFactory = function (configuration?: Configura
|
|
|
46708
47959
|
return localVarFp.closeAccessRequest(requestParameters.closeAccessRequestV2025, requestParameters.xSailPointExperimental, axiosOptions).then((request) => request(axios, basePath));
|
|
46709
47960
|
},
|
|
46710
47961
|
/**
|
|
46711
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
47962
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
46712
47963
|
* @summary Submit Access Request
|
|
46713
47964
|
* @param {AccessRequestsV2025ApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
46714
47965
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -46726,6 +47977,16 @@ export const AccessRequestsV2025ApiFactory = function (configuration?: Configura
|
|
|
46726
47977
|
getAccessRequestConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<AccessRequestConfigV2025> {
|
|
46727
47978
|
return localVarFp.getAccessRequestConfig(axiosOptions).then((request) => request(axios, basePath));
|
|
46728
47979
|
},
|
|
47980
|
+
/**
|
|
47981
|
+
* Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
|
|
47982
|
+
* @summary Identity Entitlement Details
|
|
47983
|
+
* @param {AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest} requestParameters Request parameters.
|
|
47984
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
47985
|
+
* @throws {RequiredError}
|
|
47986
|
+
*/
|
|
47987
|
+
getEntitlementDetailsForIdentity(requestParameters: AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<IdentityEntitlementDetailsV2025> {
|
|
47988
|
+
return localVarFp.getEntitlementDetailsForIdentity(requestParameters.identityId, requestParameters.entitlementId, requestParameters.xSailPointExperimental, axiosOptions).then((request) => request(axios, basePath));
|
|
47989
|
+
},
|
|
46729
47990
|
/**
|
|
46730
47991
|
* Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
|
|
46731
47992
|
* @summary Access Request Status
|
|
@@ -46746,6 +48007,16 @@ export const AccessRequestsV2025ApiFactory = function (configuration?: Configura
|
|
|
46746
48007
|
listAdministratorsAccessRequestStatus(requestParameters: AccessRequestsV2025ApiListAdministratorsAccessRequestStatusRequest = {}, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<AccessRequestAdminItemStatusV2025>> {
|
|
46747
48008
|
return localVarFp.listAdministratorsAccessRequestStatus(requestParameters.requestedFor, requestParameters.requestedBy, requestParameters.regardingIdentity, requestParameters.assignedTo, requestParameters.count, requestParameters.limit, requestParameters.offset, requestParameters.filters, requestParameters.sorters, requestParameters.requestState, axiosOptions).then((request) => request(axios, basePath));
|
|
46748
48009
|
},
|
|
48010
|
+
/**
|
|
48011
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
48012
|
+
* @summary Get accounts selections for identity
|
|
48013
|
+
* @param {AccessRequestsV2025ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
|
|
48014
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
48015
|
+
* @throws {RequiredError}
|
|
48016
|
+
*/
|
|
48017
|
+
loadAccountSelections(requestParameters: AccessRequestsV2025ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<AccountsSelectionResponseV2025> {
|
|
48018
|
+
return localVarFp.loadAccountSelections(requestParameters.accountsSelectionRequestV2025, axiosOptions).then((request) => request(axios, basePath));
|
|
48019
|
+
},
|
|
46749
48020
|
/**
|
|
46750
48021
|
* This endpoint replaces the current access-request configuration.
|
|
46751
48022
|
* @summary Update Access Request Configuration
|
|
@@ -46836,6 +48107,34 @@ export interface AccessRequestsV2025ApiCreateAccessRequestRequest {
|
|
|
46836
48107
|
readonly accessRequestV2025: AccessRequestV2025
|
|
46837
48108
|
}
|
|
46838
48109
|
|
|
48110
|
+
/**
|
|
48111
|
+
* Request parameters for getEntitlementDetailsForIdentity operation in AccessRequestsV2025Api.
|
|
48112
|
+
* @export
|
|
48113
|
+
* @interface AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest
|
|
48114
|
+
*/
|
|
48115
|
+
export interface AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest {
|
|
48116
|
+
/**
|
|
48117
|
+
* The identity ID.
|
|
48118
|
+
* @type {string}
|
|
48119
|
+
* @memberof AccessRequestsV2025ApiGetEntitlementDetailsForIdentity
|
|
48120
|
+
*/
|
|
48121
|
+
readonly identityId: string
|
|
48122
|
+
|
|
48123
|
+
/**
|
|
48124
|
+
* The entitlement ID
|
|
48125
|
+
* @type {string}
|
|
48126
|
+
* @memberof AccessRequestsV2025ApiGetEntitlementDetailsForIdentity
|
|
48127
|
+
*/
|
|
48128
|
+
readonly entitlementId: string
|
|
48129
|
+
|
|
48130
|
+
/**
|
|
48131
|
+
* Use this header to enable this experimental API.
|
|
48132
|
+
* @type {string}
|
|
48133
|
+
* @memberof AccessRequestsV2025ApiGetEntitlementDetailsForIdentity
|
|
48134
|
+
*/
|
|
48135
|
+
readonly xSailPointExperimental?: string
|
|
48136
|
+
}
|
|
48137
|
+
|
|
46839
48138
|
/**
|
|
46840
48139
|
* Request parameters for listAccessRequestStatus operation in AccessRequestsV2025Api.
|
|
46841
48140
|
* @export
|
|
@@ -46990,6 +48289,20 @@ export interface AccessRequestsV2025ApiListAdministratorsAccessRequestStatusRequ
|
|
|
46990
48289
|
readonly requestState?: string
|
|
46991
48290
|
}
|
|
46992
48291
|
|
|
48292
|
+
/**
|
|
48293
|
+
* Request parameters for loadAccountSelections operation in AccessRequestsV2025Api.
|
|
48294
|
+
* @export
|
|
48295
|
+
* @interface AccessRequestsV2025ApiLoadAccountSelectionsRequest
|
|
48296
|
+
*/
|
|
48297
|
+
export interface AccessRequestsV2025ApiLoadAccountSelectionsRequest {
|
|
48298
|
+
/**
|
|
48299
|
+
*
|
|
48300
|
+
* @type {AccountsSelectionRequestV2025}
|
|
48301
|
+
* @memberof AccessRequestsV2025ApiLoadAccountSelections
|
|
48302
|
+
*/
|
|
48303
|
+
readonly accountsSelectionRequestV2025: AccountsSelectionRequestV2025
|
|
48304
|
+
}
|
|
48305
|
+
|
|
46993
48306
|
/**
|
|
46994
48307
|
* Request parameters for setAccessRequestConfig operation in AccessRequestsV2025Api.
|
|
46995
48308
|
* @export
|
|
@@ -47060,7 +48373,7 @@ export class AccessRequestsV2025Api extends BaseAPI {
|
|
|
47060
48373
|
}
|
|
47061
48374
|
|
|
47062
48375
|
/**
|
|
47063
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
48376
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
47064
48377
|
* @summary Submit Access Request
|
|
47065
48378
|
* @param {AccessRequestsV2025ApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
47066
48379
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -47082,6 +48395,18 @@ export class AccessRequestsV2025Api extends BaseAPI {
|
|
|
47082
48395
|
return AccessRequestsV2025ApiFp(this.configuration).getAccessRequestConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
47083
48396
|
}
|
|
47084
48397
|
|
|
48398
|
+
/**
|
|
48399
|
+
* Use this API to return the details for a entitlement on an identity including specific data relating to remove date and the ability to revoke the identity.
|
|
48400
|
+
* @summary Identity Entitlement Details
|
|
48401
|
+
* @param {AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest} requestParameters Request parameters.
|
|
48402
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
48403
|
+
* @throws {RequiredError}
|
|
48404
|
+
* @memberof AccessRequestsV2025Api
|
|
48405
|
+
*/
|
|
48406
|
+
public getEntitlementDetailsForIdentity(requestParameters: AccessRequestsV2025ApiGetEntitlementDetailsForIdentityRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
48407
|
+
return AccessRequestsV2025ApiFp(this.configuration).getEntitlementDetailsForIdentity(requestParameters.identityId, requestParameters.entitlementId, requestParameters.xSailPointExperimental, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
48408
|
+
}
|
|
48409
|
+
|
|
47085
48410
|
/**
|
|
47086
48411
|
* Use this API to return a list of access request statuses based on the specified query parameters. If an access request was made for access that an identity already has, the API ignores the access request. These ignored requests do not display in the list of access request statuses. Any user with any user level can get the status of their own access requests. A user with ORG_ADMIN is required to call this API to get a list of statuses for other users.
|
|
47087
48412
|
* @summary Access Request Status
|
|
@@ -47106,6 +48431,18 @@ export class AccessRequestsV2025Api extends BaseAPI {
|
|
|
47106
48431
|
return AccessRequestsV2025ApiFp(this.configuration).listAdministratorsAccessRequestStatus(requestParameters.requestedFor, requestParameters.requestedBy, requestParameters.regardingIdentity, requestParameters.assignedTo, requestParameters.count, requestParameters.limit, requestParameters.offset, requestParameters.filters, requestParameters.sorters, requestParameters.requestState, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
47107
48432
|
}
|
|
47108
48433
|
|
|
48434
|
+
/**
|
|
48435
|
+
* Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
|
|
48436
|
+
* @summary Get accounts selections for identity
|
|
48437
|
+
* @param {AccessRequestsV2025ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
|
|
48438
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
48439
|
+
* @throws {RequiredError}
|
|
48440
|
+
* @memberof AccessRequestsV2025Api
|
|
48441
|
+
*/
|
|
48442
|
+
public loadAccountSelections(requestParameters: AccessRequestsV2025ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
48443
|
+
return AccessRequestsV2025ApiFp(this.configuration).loadAccountSelections(requestParameters.accountsSelectionRequestV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
48444
|
+
}
|
|
48445
|
+
|
|
47109
48446
|
/**
|
|
47110
48447
|
* This endpoint replaces the current access-request configuration.
|
|
47111
48448
|
* @summary Update Access Request Configuration
|
|
@@ -55045,7 +56382,7 @@ export const CertificationCampaignsV2025ApiFp = function(configuration?: Configu
|
|
|
55045
56382
|
* @param {*} [axiosOptions] Override http request option.
|
|
55046
56383
|
* @throws {RequiredError}
|
|
55047
56384
|
*/
|
|
55048
|
-
async getCampaign(id: string, detail?: GetCampaignDetailV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<
|
|
56385
|
+
async getCampaign(id: string, detail?: GetCampaignDetailV2025, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetCampaign200ResponseV2025>> {
|
|
55049
56386
|
const localVarAxiosArgs = await localVarAxiosParamCreator.getCampaign(id, detail, axiosOptions);
|
|
55050
56387
|
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
55051
56388
|
const localVarOperationServerBasePath = operationServerMap['CertificationCampaignsV2025Api.getCampaign']?.[localVarOperationServerIndex]?.url;
|
|
@@ -55329,7 +56666,7 @@ export const CertificationCampaignsV2025ApiFactory = function (configuration?: C
|
|
|
55329
56666
|
* @param {*} [axiosOptions] Override http request option.
|
|
55330
56667
|
* @throws {RequiredError}
|
|
55331
56668
|
*/
|
|
55332
|
-
getCampaign(requestParameters: CertificationCampaignsV2025ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<
|
|
56669
|
+
getCampaign(requestParameters: CertificationCampaignsV2025ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetCampaign200ResponseV2025> {
|
|
55333
56670
|
return localVarFp.getCampaign(requestParameters.id, requestParameters.detail, axiosOptions).then((request) => request(axios, basePath));
|
|
55334
56671
|
},
|
|
55335
56672
|
/**
|
|
@@ -68967,6 +70304,44 @@ export const GlobalTenantSecuritySettingsV2025ApiAxiosParamCreator = function (c
|
|
|
68967
70304
|
axiosOptions: localVarRequestOptions,
|
|
68968
70305
|
};
|
|
68969
70306
|
},
|
|
70307
|
+
/**
|
|
70308
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
70309
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
70310
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70311
|
+
* @throws {RequiredError}
|
|
70312
|
+
*/
|
|
70313
|
+
getAuthOrgLockoutConfig: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
70314
|
+
const localVarPath = `/auth-org/lockout-config`;
|
|
70315
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
70316
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
70317
|
+
let baseOptions;
|
|
70318
|
+
if (configuration) {
|
|
70319
|
+
baseOptions = configuration.baseOptions;
|
|
70320
|
+
}
|
|
70321
|
+
|
|
70322
|
+
const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
|
|
70323
|
+
const localVarHeaderParameter = {} as any;
|
|
70324
|
+
const localVarQueryParameter = {} as any;
|
|
70325
|
+
|
|
70326
|
+
// authentication userAuth required
|
|
70327
|
+
// oauth required
|
|
70328
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70329
|
+
|
|
70330
|
+
// authentication userAuth required
|
|
70331
|
+
// oauth required
|
|
70332
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70333
|
+
|
|
70334
|
+
|
|
70335
|
+
|
|
70336
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
70337
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
70338
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
70339
|
+
|
|
70340
|
+
return {
|
|
70341
|
+
url: toPathString(localVarUrlObj),
|
|
70342
|
+
axiosOptions: localVarRequestOptions,
|
|
70343
|
+
};
|
|
70344
|
+
},
|
|
68970
70345
|
/**
|
|
68971
70346
|
* This API returns the details of an org\'s network auth configuration.
|
|
68972
70347
|
* @summary Get security network configuration.
|
|
@@ -69005,6 +70380,126 @@ export const GlobalTenantSecuritySettingsV2025ApiAxiosParamCreator = function (c
|
|
|
69005
70380
|
axiosOptions: localVarRequestOptions,
|
|
69006
70381
|
};
|
|
69007
70382
|
},
|
|
70383
|
+
/**
|
|
70384
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
70385
|
+
* @summary Get Service Provider Configuration.
|
|
70386
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70387
|
+
* @throws {RequiredError}
|
|
70388
|
+
*/
|
|
70389
|
+
getAuthOrgServiceProviderConfig: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
70390
|
+
const localVarPath = `/auth-org/service-provider-config`;
|
|
70391
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
70392
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
70393
|
+
let baseOptions;
|
|
70394
|
+
if (configuration) {
|
|
70395
|
+
baseOptions = configuration.baseOptions;
|
|
70396
|
+
}
|
|
70397
|
+
|
|
70398
|
+
const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
|
|
70399
|
+
const localVarHeaderParameter = {} as any;
|
|
70400
|
+
const localVarQueryParameter = {} as any;
|
|
70401
|
+
|
|
70402
|
+
// authentication userAuth required
|
|
70403
|
+
// oauth required
|
|
70404
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70405
|
+
|
|
70406
|
+
// authentication userAuth required
|
|
70407
|
+
// oauth required
|
|
70408
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70409
|
+
|
|
70410
|
+
|
|
70411
|
+
|
|
70412
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
70413
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
70414
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
70415
|
+
|
|
70416
|
+
return {
|
|
70417
|
+
url: toPathString(localVarUrlObj),
|
|
70418
|
+
axiosOptions: localVarRequestOptions,
|
|
70419
|
+
};
|
|
70420
|
+
},
|
|
70421
|
+
/**
|
|
70422
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
70423
|
+
* @summary Get Auth Org Session Configuration.
|
|
70424
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70425
|
+
* @throws {RequiredError}
|
|
70426
|
+
*/
|
|
70427
|
+
getAuthOrgSessionConfig: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
70428
|
+
const localVarPath = `/auth-org/session-config`;
|
|
70429
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
70430
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
70431
|
+
let baseOptions;
|
|
70432
|
+
if (configuration) {
|
|
70433
|
+
baseOptions = configuration.baseOptions;
|
|
70434
|
+
}
|
|
70435
|
+
|
|
70436
|
+
const localVarRequestOptions = { method: 'GET', ...baseOptions, ...axiosOptions};
|
|
70437
|
+
const localVarHeaderParameter = {} as any;
|
|
70438
|
+
const localVarQueryParameter = {} as any;
|
|
70439
|
+
|
|
70440
|
+
// authentication userAuth required
|
|
70441
|
+
// oauth required
|
|
70442
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70443
|
+
|
|
70444
|
+
// authentication userAuth required
|
|
70445
|
+
// oauth required
|
|
70446
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70447
|
+
|
|
70448
|
+
|
|
70449
|
+
|
|
70450
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
70451
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
70452
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
70453
|
+
|
|
70454
|
+
return {
|
|
70455
|
+
url: toPathString(localVarUrlObj),
|
|
70456
|
+
axiosOptions: localVarRequestOptions,
|
|
70457
|
+
};
|
|
70458
|
+
},
|
|
70459
|
+
/**
|
|
70460
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
70461
|
+
* @summary Update Auth Org Lockout Configuration
|
|
70462
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
70463
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70464
|
+
* @throws {RequiredError}
|
|
70465
|
+
*/
|
|
70466
|
+
patchAuthOrgLockoutConfig: async (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
70467
|
+
// verify required parameter 'jsonPatchOperationV2025' is not null or undefined
|
|
70468
|
+
assertParamExists('patchAuthOrgLockoutConfig', 'jsonPatchOperationV2025', jsonPatchOperationV2025)
|
|
70469
|
+
const localVarPath = `/auth-org/lockout-config`;
|
|
70470
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
70471
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
70472
|
+
let baseOptions;
|
|
70473
|
+
if (configuration) {
|
|
70474
|
+
baseOptions = configuration.baseOptions;
|
|
70475
|
+
}
|
|
70476
|
+
|
|
70477
|
+
const localVarRequestOptions = { method: 'PATCH', ...baseOptions, ...axiosOptions};
|
|
70478
|
+
const localVarHeaderParameter = {} as any;
|
|
70479
|
+
const localVarQueryParameter = {} as any;
|
|
70480
|
+
|
|
70481
|
+
// authentication userAuth required
|
|
70482
|
+
// oauth required
|
|
70483
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70484
|
+
|
|
70485
|
+
// authentication userAuth required
|
|
70486
|
+
// oauth required
|
|
70487
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70488
|
+
|
|
70489
|
+
|
|
70490
|
+
|
|
70491
|
+
localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
|
|
70492
|
+
|
|
70493
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
70494
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
70495
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
70496
|
+
localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2025, localVarRequestOptions, configuration)
|
|
70497
|
+
|
|
70498
|
+
return {
|
|
70499
|
+
url: toPathString(localVarUrlObj),
|
|
70500
|
+
axiosOptions: localVarRequestOptions,
|
|
70501
|
+
};
|
|
70502
|
+
},
|
|
69008
70503
|
/**
|
|
69009
70504
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
69010
70505
|
* @summary Update security network configuration.
|
|
@@ -69037,6 +70532,94 @@ export const GlobalTenantSecuritySettingsV2025ApiAxiosParamCreator = function (c
|
|
|
69037
70532
|
|
|
69038
70533
|
|
|
69039
70534
|
|
|
70535
|
+
localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
|
|
70536
|
+
|
|
70537
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
70538
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
70539
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
70540
|
+
localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2025, localVarRequestOptions, configuration)
|
|
70541
|
+
|
|
70542
|
+
return {
|
|
70543
|
+
url: toPathString(localVarUrlObj),
|
|
70544
|
+
axiosOptions: localVarRequestOptions,
|
|
70545
|
+
};
|
|
70546
|
+
},
|
|
70547
|
+
/**
|
|
70548
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
70549
|
+
* @summary Update Service Provider Configuration
|
|
70550
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
70551
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70552
|
+
* @throws {RequiredError}
|
|
70553
|
+
*/
|
|
70554
|
+
patchAuthOrgServiceProviderConfig: async (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
70555
|
+
// verify required parameter 'jsonPatchOperationV2025' is not null or undefined
|
|
70556
|
+
assertParamExists('patchAuthOrgServiceProviderConfig', 'jsonPatchOperationV2025', jsonPatchOperationV2025)
|
|
70557
|
+
const localVarPath = `/auth-org/service-provider-config`;
|
|
70558
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
70559
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
70560
|
+
let baseOptions;
|
|
70561
|
+
if (configuration) {
|
|
70562
|
+
baseOptions = configuration.baseOptions;
|
|
70563
|
+
}
|
|
70564
|
+
|
|
70565
|
+
const localVarRequestOptions = { method: 'PATCH', ...baseOptions, ...axiosOptions};
|
|
70566
|
+
const localVarHeaderParameter = {} as any;
|
|
70567
|
+
const localVarQueryParameter = {} as any;
|
|
70568
|
+
|
|
70569
|
+
// authentication userAuth required
|
|
70570
|
+
// oauth required
|
|
70571
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70572
|
+
|
|
70573
|
+
// authentication userAuth required
|
|
70574
|
+
// oauth required
|
|
70575
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70576
|
+
|
|
70577
|
+
|
|
70578
|
+
|
|
70579
|
+
localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
|
|
70580
|
+
|
|
70581
|
+
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
70582
|
+
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
70583
|
+
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
70584
|
+
localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2025, localVarRequestOptions, configuration)
|
|
70585
|
+
|
|
70586
|
+
return {
|
|
70587
|
+
url: toPathString(localVarUrlObj),
|
|
70588
|
+
axiosOptions: localVarRequestOptions,
|
|
70589
|
+
};
|
|
70590
|
+
},
|
|
70591
|
+
/**
|
|
70592
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
70593
|
+
* @summary Update Auth Org Session Configuration
|
|
70594
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
70595
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70596
|
+
* @throws {RequiredError}
|
|
70597
|
+
*/
|
|
70598
|
+
patchAuthOrgSessionConfig: async (jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
70599
|
+
// verify required parameter 'jsonPatchOperationV2025' is not null or undefined
|
|
70600
|
+
assertParamExists('patchAuthOrgSessionConfig', 'jsonPatchOperationV2025', jsonPatchOperationV2025)
|
|
70601
|
+
const localVarPath = `/auth-org/session-config`;
|
|
70602
|
+
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
70603
|
+
const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
|
|
70604
|
+
let baseOptions;
|
|
70605
|
+
if (configuration) {
|
|
70606
|
+
baseOptions = configuration.baseOptions;
|
|
70607
|
+
}
|
|
70608
|
+
|
|
70609
|
+
const localVarRequestOptions = { method: 'PATCH', ...baseOptions, ...axiosOptions};
|
|
70610
|
+
const localVarHeaderParameter = {} as any;
|
|
70611
|
+
const localVarQueryParameter = {} as any;
|
|
70612
|
+
|
|
70613
|
+
// authentication userAuth required
|
|
70614
|
+
// oauth required
|
|
70615
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70616
|
+
|
|
70617
|
+
// authentication userAuth required
|
|
70618
|
+
// oauth required
|
|
70619
|
+
await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
|
|
70620
|
+
|
|
70621
|
+
|
|
70622
|
+
|
|
69040
70623
|
localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
|
|
69041
70624
|
|
|
69042
70625
|
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
@@ -69072,6 +70655,18 @@ export const GlobalTenantSecuritySettingsV2025ApiFp = function(configuration?: C
|
|
|
69072
70655
|
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.createAuthOrgNetworkConfig']?.[localVarOperationServerIndex]?.url;
|
|
69073
70656
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
69074
70657
|
},
|
|
70658
|
+
/**
|
|
70659
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
70660
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
70661
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70662
|
+
* @throws {RequiredError}
|
|
70663
|
+
*/
|
|
70664
|
+
async getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2025>> {
|
|
70665
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.getAuthOrgLockoutConfig(axiosOptions);
|
|
70666
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
70667
|
+
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.getAuthOrgLockoutConfig']?.[localVarOperationServerIndex]?.url;
|
|
70668
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
70669
|
+
},
|
|
69075
70670
|
/**
|
|
69076
70671
|
* This API returns the details of an org\'s network auth configuration.
|
|
69077
70672
|
* @summary Get security network configuration.
|
|
@@ -69084,6 +70679,43 @@ export const GlobalTenantSecuritySettingsV2025ApiFp = function(configuration?: C
|
|
|
69084
70679
|
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.getAuthOrgNetworkConfig']?.[localVarOperationServerIndex]?.url;
|
|
69085
70680
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
69086
70681
|
},
|
|
70682
|
+
/**
|
|
70683
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
70684
|
+
* @summary Get Service Provider Configuration.
|
|
70685
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70686
|
+
* @throws {RequiredError}
|
|
70687
|
+
*/
|
|
70688
|
+
async getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2025>> {
|
|
70689
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.getAuthOrgServiceProviderConfig(axiosOptions);
|
|
70690
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
70691
|
+
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.getAuthOrgServiceProviderConfig']?.[localVarOperationServerIndex]?.url;
|
|
70692
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
70693
|
+
},
|
|
70694
|
+
/**
|
|
70695
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
70696
|
+
* @summary Get Auth Org Session Configuration.
|
|
70697
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70698
|
+
* @throws {RequiredError}
|
|
70699
|
+
*/
|
|
70700
|
+
async getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2025>> {
|
|
70701
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.getAuthOrgSessionConfig(axiosOptions);
|
|
70702
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
70703
|
+
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.getAuthOrgSessionConfig']?.[localVarOperationServerIndex]?.url;
|
|
70704
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
70705
|
+
},
|
|
70706
|
+
/**
|
|
70707
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
70708
|
+
* @summary Update Auth Org Lockout Configuration
|
|
70709
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
70710
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70711
|
+
* @throws {RequiredError}
|
|
70712
|
+
*/
|
|
70713
|
+
async patchAuthOrgLockoutConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2025>> {
|
|
70714
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.patchAuthOrgLockoutConfig(jsonPatchOperationV2025, axiosOptions);
|
|
70715
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
70716
|
+
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.patchAuthOrgLockoutConfig']?.[localVarOperationServerIndex]?.url;
|
|
70717
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
70718
|
+
},
|
|
69087
70719
|
/**
|
|
69088
70720
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
69089
70721
|
* @summary Update security network configuration.
|
|
@@ -69097,6 +70729,32 @@ export const GlobalTenantSecuritySettingsV2025ApiFp = function(configuration?: C
|
|
|
69097
70729
|
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.patchAuthOrgNetworkConfig']?.[localVarOperationServerIndex]?.url;
|
|
69098
70730
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
69099
70731
|
},
|
|
70732
|
+
/**
|
|
70733
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
70734
|
+
* @summary Update Service Provider Configuration
|
|
70735
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
70736
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70737
|
+
* @throws {RequiredError}
|
|
70738
|
+
*/
|
|
70739
|
+
async patchAuthOrgServiceProviderConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2025>> {
|
|
70740
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.patchAuthOrgServiceProviderConfig(jsonPatchOperationV2025, axiosOptions);
|
|
70741
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
70742
|
+
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.patchAuthOrgServiceProviderConfig']?.[localVarOperationServerIndex]?.url;
|
|
70743
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
70744
|
+
},
|
|
70745
|
+
/**
|
|
70746
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
70747
|
+
* @summary Update Auth Org Session Configuration
|
|
70748
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
70749
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70750
|
+
* @throws {RequiredError}
|
|
70751
|
+
*/
|
|
70752
|
+
async patchAuthOrgSessionConfig(jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2025>> {
|
|
70753
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.patchAuthOrgSessionConfig(jsonPatchOperationV2025, axiosOptions);
|
|
70754
|
+
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
70755
|
+
const localVarOperationServerBasePath = operationServerMap['GlobalTenantSecuritySettingsV2025Api.patchAuthOrgSessionConfig']?.[localVarOperationServerIndex]?.url;
|
|
70756
|
+
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
70757
|
+
},
|
|
69100
70758
|
}
|
|
69101
70759
|
};
|
|
69102
70760
|
|
|
@@ -69117,6 +70775,15 @@ export const GlobalTenantSecuritySettingsV2025ApiFactory = function (configurati
|
|
|
69117
70775
|
createAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiCreateAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2025> {
|
|
69118
70776
|
return localVarFp.createAuthOrgNetworkConfig(requestParameters.networkConfigurationV2025, axiosOptions).then((request) => request(axios, basePath));
|
|
69119
70777
|
},
|
|
70778
|
+
/**
|
|
70779
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
70780
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
70781
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70782
|
+
* @throws {RequiredError}
|
|
70783
|
+
*/
|
|
70784
|
+
getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2025> {
|
|
70785
|
+
return localVarFp.getAuthOrgLockoutConfig(axiosOptions).then((request) => request(axios, basePath));
|
|
70786
|
+
},
|
|
69120
70787
|
/**
|
|
69121
70788
|
* This API returns the details of an org\'s network auth configuration.
|
|
69122
70789
|
* @summary Get security network configuration.
|
|
@@ -69126,6 +70793,34 @@ export const GlobalTenantSecuritySettingsV2025ApiFactory = function (configurati
|
|
|
69126
70793
|
getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2025> {
|
|
69127
70794
|
return localVarFp.getAuthOrgNetworkConfig(axiosOptions).then((request) => request(axios, basePath));
|
|
69128
70795
|
},
|
|
70796
|
+
/**
|
|
70797
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
70798
|
+
* @summary Get Service Provider Configuration.
|
|
70799
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70800
|
+
* @throws {RequiredError}
|
|
70801
|
+
*/
|
|
70802
|
+
getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2025> {
|
|
70803
|
+
return localVarFp.getAuthOrgServiceProviderConfig(axiosOptions).then((request) => request(axios, basePath));
|
|
70804
|
+
},
|
|
70805
|
+
/**
|
|
70806
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
70807
|
+
* @summary Get Auth Org Session Configuration.
|
|
70808
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70809
|
+
* @throws {RequiredError}
|
|
70810
|
+
*/
|
|
70811
|
+
getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2025> {
|
|
70812
|
+
return localVarFp.getAuthOrgSessionConfig(axiosOptions).then((request) => request(axios, basePath));
|
|
70813
|
+
},
|
|
70814
|
+
/**
|
|
70815
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
70816
|
+
* @summary Update Auth Org Lockout Configuration
|
|
70817
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
|
|
70818
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70819
|
+
* @throws {RequiredError}
|
|
70820
|
+
*/
|
|
70821
|
+
patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2025> {
|
|
70822
|
+
return localVarFp.patchAuthOrgLockoutConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(axios, basePath));
|
|
70823
|
+
},
|
|
69129
70824
|
/**
|
|
69130
70825
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
69131
70826
|
* @summary Update security network configuration.
|
|
@@ -69136,6 +70831,26 @@ export const GlobalTenantSecuritySettingsV2025ApiFactory = function (configurati
|
|
|
69136
70831
|
patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2025> {
|
|
69137
70832
|
return localVarFp.patchAuthOrgNetworkConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(axios, basePath));
|
|
69138
70833
|
},
|
|
70834
|
+
/**
|
|
70835
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
70836
|
+
* @summary Update Service Provider Configuration
|
|
70837
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
|
|
70838
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70839
|
+
* @throws {RequiredError}
|
|
70840
|
+
*/
|
|
70841
|
+
patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2025> {
|
|
70842
|
+
return localVarFp.patchAuthOrgServiceProviderConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(axios, basePath));
|
|
70843
|
+
},
|
|
70844
|
+
/**
|
|
70845
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
70846
|
+
* @summary Update Auth Org Session Configuration
|
|
70847
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
|
|
70848
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70849
|
+
* @throws {RequiredError}
|
|
70850
|
+
*/
|
|
70851
|
+
patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2025> {
|
|
70852
|
+
return localVarFp.patchAuthOrgSessionConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(axios, basePath));
|
|
70853
|
+
},
|
|
69139
70854
|
};
|
|
69140
70855
|
};
|
|
69141
70856
|
|
|
@@ -69153,6 +70868,20 @@ export interface GlobalTenantSecuritySettingsV2025ApiCreateAuthOrgNetworkConfigR
|
|
|
69153
70868
|
readonly networkConfigurationV2025: NetworkConfigurationV2025
|
|
69154
70869
|
}
|
|
69155
70870
|
|
|
70871
|
+
/**
|
|
70872
|
+
* Request parameters for patchAuthOrgLockoutConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
70873
|
+
* @export
|
|
70874
|
+
* @interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest
|
|
70875
|
+
*/
|
|
70876
|
+
export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest {
|
|
70877
|
+
/**
|
|
70878
|
+
* A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: `1. maximumAttempts >= 1 && maximumAttempts <= 15 2. lockoutDuration >= 5 && lockoutDuration <= 60 3. lockoutWindow >= 5 && lockoutDuration <= 60`
|
|
70879
|
+
* @type {Array<JsonPatchOperationV2025>}
|
|
70880
|
+
* @memberof GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfig
|
|
70881
|
+
*/
|
|
70882
|
+
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>
|
|
70883
|
+
}
|
|
70884
|
+
|
|
69156
70885
|
/**
|
|
69157
70886
|
* Request parameters for patchAuthOrgNetworkConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
69158
70887
|
* @export
|
|
@@ -69167,6 +70896,34 @@ export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgNetworkConfigRe
|
|
|
69167
70896
|
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>
|
|
69168
70897
|
}
|
|
69169
70898
|
|
|
70899
|
+
/**
|
|
70900
|
+
* Request parameters for patchAuthOrgServiceProviderConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
70901
|
+
* @export
|
|
70902
|
+
* @interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest
|
|
70903
|
+
*/
|
|
70904
|
+
export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest {
|
|
70905
|
+
/**
|
|
70906
|
+
* A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
|
|
70907
|
+
* @type {Array<JsonPatchOperationV2025>}
|
|
70908
|
+
* @memberof GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfig
|
|
70909
|
+
*/
|
|
70910
|
+
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>
|
|
70911
|
+
}
|
|
70912
|
+
|
|
70913
|
+
/**
|
|
70914
|
+
* Request parameters for patchAuthOrgSessionConfig operation in GlobalTenantSecuritySettingsV2025Api.
|
|
70915
|
+
* @export
|
|
70916
|
+
* @interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest
|
|
70917
|
+
*/
|
|
70918
|
+
export interface GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest {
|
|
70919
|
+
/**
|
|
70920
|
+
* A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: `1. maxSessionTime >= 1 && maxSessionTime <= 10080 (1 week) 2. maxIdleTime >= 1 && maxIdleTime <= 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.`
|
|
70921
|
+
* @type {Array<JsonPatchOperationV2025>}
|
|
70922
|
+
* @memberof GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfig
|
|
70923
|
+
*/
|
|
70924
|
+
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>
|
|
70925
|
+
}
|
|
70926
|
+
|
|
69170
70927
|
/**
|
|
69171
70928
|
* GlobalTenantSecuritySettingsV2025Api - object-oriented interface
|
|
69172
70929
|
* @export
|
|
@@ -69186,6 +70943,17 @@ export class GlobalTenantSecuritySettingsV2025Api extends BaseAPI {
|
|
|
69186
70943
|
return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).createAuthOrgNetworkConfig(requestParameters.networkConfigurationV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
69187
70944
|
}
|
|
69188
70945
|
|
|
70946
|
+
/**
|
|
70947
|
+
* This API returns the details of an org\'s lockout auth configuration.
|
|
70948
|
+
* @summary Get Auth Org Lockout Configuration.
|
|
70949
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70950
|
+
* @throws {RequiredError}
|
|
70951
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
70952
|
+
*/
|
|
70953
|
+
public getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig) {
|
|
70954
|
+
return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).getAuthOrgLockoutConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
70955
|
+
}
|
|
70956
|
+
|
|
69189
70957
|
/**
|
|
69190
70958
|
* This API returns the details of an org\'s network auth configuration.
|
|
69191
70959
|
* @summary Get security network configuration.
|
|
@@ -69197,6 +70965,40 @@ export class GlobalTenantSecuritySettingsV2025Api extends BaseAPI {
|
|
|
69197
70965
|
return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).getAuthOrgNetworkConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
69198
70966
|
}
|
|
69199
70967
|
|
|
70968
|
+
/**
|
|
70969
|
+
* This API returns the details of an org\'s service provider auth configuration.
|
|
70970
|
+
* @summary Get Service Provider Configuration.
|
|
70971
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70972
|
+
* @throws {RequiredError}
|
|
70973
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
70974
|
+
*/
|
|
70975
|
+
public getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig) {
|
|
70976
|
+
return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).getAuthOrgServiceProviderConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
70977
|
+
}
|
|
70978
|
+
|
|
70979
|
+
/**
|
|
70980
|
+
* This API returns the details of an org\'s session auth configuration.
|
|
70981
|
+
* @summary Get Auth Org Session Configuration.
|
|
70982
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70983
|
+
* @throws {RequiredError}
|
|
70984
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
70985
|
+
*/
|
|
70986
|
+
public getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig) {
|
|
70987
|
+
return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).getAuthOrgSessionConfig(axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
70988
|
+
}
|
|
70989
|
+
|
|
70990
|
+
/**
|
|
70991
|
+
* This API updates an existing lockout configuration for an org using PATCH
|
|
70992
|
+
* @summary Update Auth Org Lockout Configuration
|
|
70993
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
|
|
70994
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
70995
|
+
* @throws {RequiredError}
|
|
70996
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
70997
|
+
*/
|
|
70998
|
+
public patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
70999
|
+
return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).patchAuthOrgLockoutConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
71000
|
+
}
|
|
71001
|
+
|
|
69200
71002
|
/**
|
|
69201
71003
|
* This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
|
|
69202
71004
|
* @summary Update security network configuration.
|
|
@@ -69208,6 +71010,30 @@ export class GlobalTenantSecuritySettingsV2025Api extends BaseAPI {
|
|
|
69208
71010
|
public patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
69209
71011
|
return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).patchAuthOrgNetworkConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
69210
71012
|
}
|
|
71013
|
+
|
|
71014
|
+
/**
|
|
71015
|
+
* This API updates an existing service provider configuration for an org using PATCH.
|
|
71016
|
+
* @summary Update Service Provider Configuration
|
|
71017
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
|
|
71018
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
71019
|
+
* @throws {RequiredError}
|
|
71020
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
71021
|
+
*/
|
|
71022
|
+
public patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
71023
|
+
return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).patchAuthOrgServiceProviderConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
71024
|
+
}
|
|
71025
|
+
|
|
71026
|
+
/**
|
|
71027
|
+
* This API updates an existing session configuration for an org using PATCH.
|
|
71028
|
+
* @summary Update Auth Org Session Configuration
|
|
71029
|
+
* @param {GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
|
|
71030
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
71031
|
+
* @throws {RequiredError}
|
|
71032
|
+
* @memberof GlobalTenantSecuritySettingsV2025Api
|
|
71033
|
+
*/
|
|
71034
|
+
public patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2025ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
71035
|
+
return GlobalTenantSecuritySettingsV2025ApiFp(this.configuration).patchAuthOrgSessionConfig(requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
71036
|
+
}
|
|
69211
71037
|
}
|
|
69212
71038
|
|
|
69213
71039
|
|
|
@@ -108535,15 +110361,15 @@ export const ServiceDeskIntegrationV2025ApiAxiosParamCreator = function (configu
|
|
|
108535
110361
|
* Update an existing Service Desk integration by ID with a PATCH request.
|
|
108536
110362
|
* @summary Patch a Service Desk Integration
|
|
108537
110363
|
* @param {string} id ID of the Service Desk integration to update
|
|
108538
|
-
* @param {
|
|
110364
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only `replace` operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
|
|
108539
110365
|
* @param {*} [axiosOptions] Override http request option.
|
|
108540
110366
|
* @throws {RequiredError}
|
|
108541
110367
|
*/
|
|
108542
|
-
patchServiceDeskIntegration: async (id: string,
|
|
110368
|
+
patchServiceDeskIntegration: async (id: string, jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
108543
110369
|
// verify required parameter 'id' is not null or undefined
|
|
108544
110370
|
assertParamExists('patchServiceDeskIntegration', 'id', id)
|
|
108545
|
-
// verify required parameter '
|
|
108546
|
-
assertParamExists('patchServiceDeskIntegration', '
|
|
110371
|
+
// verify required parameter 'jsonPatchOperationV2025' is not null or undefined
|
|
110372
|
+
assertParamExists('patchServiceDeskIntegration', 'jsonPatchOperationV2025', jsonPatchOperationV2025)
|
|
108547
110373
|
const localVarPath = `/service-desk-integrations/{id}`
|
|
108548
110374
|
.replace(`{${"id"}}`, encodeURIComponent(String(id)));
|
|
108549
110375
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
@@ -108572,7 +110398,7 @@ export const ServiceDeskIntegrationV2025ApiAxiosParamCreator = function (configu
|
|
|
108572
110398
|
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
108573
110399
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
108574
110400
|
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
108575
|
-
localVarRequestOptions.data = serializeDataIfNeeded(
|
|
110401
|
+
localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationV2025, localVarRequestOptions, configuration)
|
|
108576
110402
|
|
|
108577
110403
|
return {
|
|
108578
110404
|
url: toPathString(localVarUrlObj),
|
|
@@ -108778,12 +110604,12 @@ export const ServiceDeskIntegrationV2025ApiFp = function(configuration?: Configu
|
|
|
108778
110604
|
* Update an existing Service Desk integration by ID with a PATCH request.
|
|
108779
110605
|
* @summary Patch a Service Desk Integration
|
|
108780
110606
|
* @param {string} id ID of the Service Desk integration to update
|
|
108781
|
-
* @param {
|
|
110607
|
+
* @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025 A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only `replace` operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
|
|
108782
110608
|
* @param {*} [axiosOptions] Override http request option.
|
|
108783
110609
|
* @throws {RequiredError}
|
|
108784
110610
|
*/
|
|
108785
|
-
async patchServiceDeskIntegration(id: string,
|
|
108786
|
-
const localVarAxiosArgs = await localVarAxiosParamCreator.patchServiceDeskIntegration(id,
|
|
110611
|
+
async patchServiceDeskIntegration(id: string, jsonPatchOperationV2025: Array<JsonPatchOperationV2025>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceDeskIntegrationDtoV2025>> {
|
|
110612
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.patchServiceDeskIntegration(id, jsonPatchOperationV2025, axiosOptions);
|
|
108787
110613
|
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
108788
110614
|
const localVarOperationServerBasePath = operationServerMap['ServiceDeskIntegrationV2025Api.patchServiceDeskIntegration']?.[localVarOperationServerIndex]?.url;
|
|
108789
110615
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
@@ -108901,7 +110727,7 @@ export const ServiceDeskIntegrationV2025ApiFactory = function (configuration?: C
|
|
|
108901
110727
|
* @throws {RequiredError}
|
|
108902
110728
|
*/
|
|
108903
110729
|
patchServiceDeskIntegration(requestParameters: ServiceDeskIntegrationV2025ApiPatchServiceDeskIntegrationRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceDeskIntegrationDtoV2025> {
|
|
108904
|
-
return localVarFp.patchServiceDeskIntegration(requestParameters.id, requestParameters.
|
|
110730
|
+
return localVarFp.patchServiceDeskIntegration(requestParameters.id, requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(axios, basePath));
|
|
108905
110731
|
},
|
|
108906
110732
|
/**
|
|
108907
110733
|
* Update an existing Service Desk integration by ID.
|
|
@@ -109039,10 +110865,10 @@ export interface ServiceDeskIntegrationV2025ApiPatchServiceDeskIntegrationReques
|
|
|
109039
110865
|
|
|
109040
110866
|
/**
|
|
109041
110867
|
* A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only `replace` operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
|
|
109042
|
-
* @type {
|
|
110868
|
+
* @type {Array<JsonPatchOperationV2025>}
|
|
109043
110869
|
* @memberof ServiceDeskIntegrationV2025ApiPatchServiceDeskIntegration
|
|
109044
110870
|
*/
|
|
109045
|
-
readonly
|
|
110871
|
+
readonly jsonPatchOperationV2025: Array<JsonPatchOperationV2025>
|
|
109046
110872
|
}
|
|
109047
110873
|
|
|
109048
110874
|
/**
|
|
@@ -109178,7 +111004,7 @@ export class ServiceDeskIntegrationV2025Api extends BaseAPI {
|
|
|
109178
111004
|
* @memberof ServiceDeskIntegrationV2025Api
|
|
109179
111005
|
*/
|
|
109180
111006
|
public patchServiceDeskIntegration(requestParameters: ServiceDeskIntegrationV2025ApiPatchServiceDeskIntegrationRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
109181
|
-
return ServiceDeskIntegrationV2025ApiFp(this.configuration).patchServiceDeskIntegration(requestParameters.id, requestParameters.
|
|
111007
|
+
return ServiceDeskIntegrationV2025ApiFp(this.configuration).patchServiceDeskIntegration(requestParameters.id, requestParameters.jsonPatchOperationV2025, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
109182
111008
|
}
|
|
109183
111009
|
|
|
109184
111010
|
/**
|
|
@@ -110660,19 +112486,14 @@ export const SourcesV2025ApiAxiosParamCreator = function (configuration?: Config
|
|
|
110660
112486
|
* Starts an account aggregation on the specified source. If the target source is a delimited file source, then the CSV file needs to be included in the request body. You will also need to set the Content-Type header to `multipart/form-data`.
|
|
110661
112487
|
* @summary Account Aggregation
|
|
110662
112488
|
* @param {string} id Source Id
|
|
110663
|
-
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
110664
112489
|
* @param {File} [file] The CSV file containing the source accounts to aggregate.
|
|
110665
112490
|
* @param {string} [disableOptimization] Use this flag to reprocess every account whether or not the data has changed.
|
|
110666
112491
|
* @param {*} [axiosOptions] Override http request option.
|
|
110667
112492
|
* @throws {RequiredError}
|
|
110668
112493
|
*/
|
|
110669
|
-
importAccounts: async (id: string,
|
|
112494
|
+
importAccounts: async (id: string, file?: File, disableOptimization?: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
|
|
110670
112495
|
// verify required parameter 'id' is not null or undefined
|
|
110671
112496
|
assertParamExists('importAccounts', 'id', id)
|
|
110672
|
-
if (xSailPointExperimental === undefined) {
|
|
110673
|
-
xSailPointExperimental = 'true';
|
|
110674
|
-
}
|
|
110675
|
-
|
|
110676
112497
|
const localVarPath = `/sources/{id}/load-accounts`
|
|
110677
112498
|
.replace(`{${"id"}}`, encodeURIComponent(String(id)));
|
|
110678
112499
|
// use dummy base URL string because the URL constructor only accepts absolute URLs.
|
|
@@ -110707,9 +112528,6 @@ export const SourcesV2025ApiAxiosParamCreator = function (configuration?: Config
|
|
|
110707
112528
|
|
|
110708
112529
|
localVarHeaderParameter['Content-Type'] = 'multipart/form-data';
|
|
110709
112530
|
|
|
110710
|
-
if (xSailPointExperimental != null) {
|
|
110711
|
-
localVarHeaderParameter['X-SailPoint-Experimental'] = String(xSailPointExperimental);
|
|
110712
|
-
}
|
|
110713
112531
|
setSearchParams(localVarUrlObj, localVarQueryParameter);
|
|
110714
112532
|
let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
110715
112533
|
localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
|
|
@@ -112323,14 +114141,13 @@ export const SourcesV2025ApiFp = function(configuration?: Configuration) {
|
|
|
112323
114141
|
* Starts an account aggregation on the specified source. If the target source is a delimited file source, then the CSV file needs to be included in the request body. You will also need to set the Content-Type header to `multipart/form-data`.
|
|
112324
114142
|
* @summary Account Aggregation
|
|
112325
114143
|
* @param {string} id Source Id
|
|
112326
|
-
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
112327
114144
|
* @param {File} [file] The CSV file containing the source accounts to aggregate.
|
|
112328
114145
|
* @param {string} [disableOptimization] Use this flag to reprocess every account whether or not the data has changed.
|
|
112329
114146
|
* @param {*} [axiosOptions] Override http request option.
|
|
112330
114147
|
* @throws {RequiredError}
|
|
112331
114148
|
*/
|
|
112332
|
-
async importAccounts(id: string,
|
|
112333
|
-
const localVarAxiosArgs = await localVarAxiosParamCreator.importAccounts(id,
|
|
114149
|
+
async importAccounts(id: string, file?: File, disableOptimization?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LoadAccountsTaskV2025>> {
|
|
114150
|
+
const localVarAxiosArgs = await localVarAxiosParamCreator.importAccounts(id, file, disableOptimization, axiosOptions);
|
|
112334
114151
|
const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
|
|
112335
114152
|
const localVarOperationServerBasePath = operationServerMap['SourcesV2025Api.importAccounts']?.[localVarOperationServerIndex]?.url;
|
|
112336
114153
|
return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
|
|
@@ -112949,7 +114766,7 @@ export const SourcesV2025ApiFactory = function (configuration?: Configuration, b
|
|
|
112949
114766
|
* @throws {RequiredError}
|
|
112950
114767
|
*/
|
|
112951
114768
|
importAccounts(requestParameters: SourcesV2025ApiImportAccountsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LoadAccountsTaskV2025> {
|
|
112952
|
-
return localVarFp.importAccounts(requestParameters.id, requestParameters.
|
|
114769
|
+
return localVarFp.importAccounts(requestParameters.id, requestParameters.file, requestParameters.disableOptimization, axiosOptions).then((request) => request(axios, basePath));
|
|
112953
114770
|
},
|
|
112954
114771
|
/**
|
|
112955
114772
|
* This API uploads a source schema template file to configure a source\'s account attributes. To retrieve the file to modify and upload, log into Identity Now. Click **Admin** -> **Connections** -> **Sources** -> **`{SourceName}`** -> **Import Data** -> **Account Schema** -> **Options** -> **Download Schema** >**NOTE: This API is designated only for Delimited File sources.**
|
|
@@ -113683,13 +115500,6 @@ export interface SourcesV2025ApiImportAccountsRequest {
|
|
|
113683
115500
|
*/
|
|
113684
115501
|
readonly id: string
|
|
113685
115502
|
|
|
113686
|
-
/**
|
|
113687
|
-
* Use this header to enable this experimental API.
|
|
113688
|
-
* @type {string}
|
|
113689
|
-
* @memberof SourcesV2025ApiImportAccounts
|
|
113690
|
-
*/
|
|
113691
|
-
readonly xSailPointExperimental?: string
|
|
113692
|
-
|
|
113693
115503
|
/**
|
|
113694
115504
|
* The CSV file containing the source accounts to aggregate.
|
|
113695
115505
|
* @type {File}
|
|
@@ -114595,7 +116405,7 @@ export class SourcesV2025Api extends BaseAPI {
|
|
|
114595
116405
|
* @memberof SourcesV2025Api
|
|
114596
116406
|
*/
|
|
114597
116407
|
public importAccounts(requestParameters: SourcesV2025ApiImportAccountsRequest, axiosOptions?: RawAxiosRequestConfig) {
|
|
114598
|
-
return SourcesV2025ApiFp(this.configuration).importAccounts(requestParameters.id, requestParameters.
|
|
116408
|
+
return SourcesV2025ApiFp(this.configuration).importAccounts(requestParameters.id, requestParameters.file, requestParameters.disableOptimization, axiosOptions).then((request) => request(this.axios, this.basePath));
|
|
114599
116409
|
}
|
|
114600
116410
|
|
|
114601
116411
|
/**
|