sailpoint-api-client 1.5.0 → 1.6.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/v3/api.ts CHANGED
@@ -391,43 +391,43 @@ export interface AccessModelMetadataValuesInner {
391
391
  'status'?: string;
392
392
  }
393
393
  /**
394
- * Access Profile
394
+ * Access profile.
395
395
  * @export
396
396
  * @interface AccessProfile
397
397
  */
398
398
  export interface AccessProfile {
399
399
  /**
400
- * The ID of the Access Profile
400
+ * Access profile ID.
401
401
  * @type {string}
402
402
  * @memberof AccessProfile
403
403
  */
404
404
  'id'?: string;
405
405
  /**
406
- * Name of the Access Profile
406
+ * Access profile name.
407
407
  * @type {string}
408
408
  * @memberof AccessProfile
409
409
  */
410
410
  'name': string;
411
411
  /**
412
- * Information about the Access Profile
412
+ * Access profile description.
413
413
  * @type {string}
414
414
  * @memberof AccessProfile
415
415
  */
416
416
  'description'?: string | null;
417
417
  /**
418
- * Date the Access Profile was created
418
+ * Date and time when the access profile was created.
419
419
  * @type {string}
420
420
  * @memberof AccessProfile
421
421
  */
422
422
  'created'?: string;
423
423
  /**
424
- * Date the Access Profile was last modified.
424
+ * Date and time when the access profile was last modified.
425
425
  * @type {string}
426
426
  * @memberof AccessProfile
427
427
  */
428
428
  'modified'?: string;
429
429
  /**
430
- * Whether the Access Profile is enabled. If the Access Profile is enabled then you must include at least one Entitlement.
430
+ * Indicates whether the access profile is enabled. If it\'s enabled, you must include at least one entitlement.
431
431
  * @type {boolean}
432
432
  * @memberof AccessProfile
433
433
  */
@@ -445,13 +445,13 @@ export interface AccessProfile {
445
445
  */
446
446
  'source': AccessProfileSourceRef;
447
447
  /**
448
- * A list of entitlements associated with the Access Profile. If enabled is false this is allowed to be empty otherwise it needs to contain at least one Entitlement.
448
+ * List of entitlements associated with the access profile. If `enabled` is false, this can be empty. Otherwise, it must contain at least one entitlement.
449
449
  * @type {Array<EntitlementRef>}
450
450
  * @memberof AccessProfile
451
451
  */
452
452
  'entitlements'?: Array<EntitlementRef> | null;
453
453
  /**
454
- * Whether the Access Profile is requestable via access request. Currently, making an Access Profile non-requestable is only supported for customers enabled with the new Request Center. Otherwise, attempting to create an Access Profile with a value **false** in this field results in a 400 error.
454
+ * Indicates whether the access profile is requestable by access request. Currently, making an access profile non-requestable is only supported for customers enabled with the new Request Center. Otherwise, attempting to create an access profile with a value **false** in this field results in a 400 error.
455
455
  * @type {boolean}
456
456
  * @memberof AccessProfile
457
457
  */
@@ -469,7 +469,7 @@ export interface AccessProfile {
469
469
  */
470
470
  'revocationRequestConfig'?: Revocability | null;
471
471
  /**
472
- * List of IDs of segments, if any, to which this Access Profile is assigned.
472
+ * List of segment IDs, if any, that the access profile is assigned to.
473
473
  * @type {Array<string>}
474
474
  * @memberof AccessProfile
475
475
  */
@@ -488,13 +488,13 @@ export interface AccessProfile {
488
488
  */
489
489
  export interface AccessProfileApprovalScheme {
490
490
  /**
491
- * Describes the individual or group that is responsible for an approval step. Values are as follows. **APP_OWNER**: The owner of the Application **OWNER**: Owner of the associated Access Profile or Role **SOURCE_OWNER**: Owner of the Source associated with an Access Profile **MANAGER**: Manager of the Identity making the request **GOVERNANCE_GROUP**: A Governance Group, the ID of which is specified by the **approverId** field
491
+ * Describes the individual or group that is responsible for an approval step. These are the possible values: **APP_OWNER**: The owner of the Application **OWNER**: Owner of the associated Access Profile or Role **SOURCE_OWNER**: Owner of the Source associated with an Access Profile **MANAGER**: Manager of the Identity making the request **GOVERNANCE_GROUP**: A Governance Group, the ID of which is specified by the **approverId** field
492
492
  * @type {string}
493
493
  * @memberof AccessProfileApprovalScheme
494
494
  */
495
495
  'approverType'?: AccessProfileApprovalSchemeApproverTypeV3;
496
496
  /**
497
- * Id of the specific approver, used only when approverType is GOVERNANCE_GROUP
497
+ * Specific approver ID. Only use this when the `approverType` is `GOVERNANCE_GROUP`.
498
498
  * @type {string}
499
499
  * @memberof AccessProfileApprovalScheme
500
500
  */
@@ -985,19 +985,19 @@ export interface AccessProfileRole {
985
985
  */
986
986
  export interface AccessProfileSourceRef {
987
987
  /**
988
- * The ID of the Source with with which the Access Profile is associated
988
+ * ID of the source the access profile is associated with.
989
989
  * @type {string}
990
990
  * @memberof AccessProfileSourceRef
991
991
  */
992
992
  'id'?: string;
993
993
  /**
994
- * The type of the Source, will always be SOURCE
994
+ * Source\'s DTO type.
995
995
  * @type {string}
996
996
  * @memberof AccessProfileSourceRef
997
997
  */
998
998
  'type'?: AccessProfileSourceRefTypeV3;
999
999
  /**
1000
- * The display name of the associated Source
1000
+ * Source name.
1001
1001
  * @type {string}
1002
1002
  * @memberof AccessProfileSourceRef
1003
1003
  */
@@ -1146,6 +1146,12 @@ export interface AccessRequest {
1146
1146
  * @memberof AccessRequest
1147
1147
  */
1148
1148
  'clientMetadata'?: { [key: string]: string; };
1149
+ /**
1150
+ * Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
1151
+ * @type {Array<RequestedForDtoRef>}
1152
+ * @memberof AccessRequest
1153
+ */
1154
+ 'requestedForWithRequestedItems'?: Array<RequestedForDtoRef> | null;
1149
1155
  }
1150
1156
 
1151
1157
 
@@ -1228,6 +1234,18 @@ export interface AccessRequestItem {
1228
1234
  * @memberof AccessRequestItem
1229
1235
  */
1230
1236
  'removeDate'?: string;
1237
+ /**
1238
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
1239
+ * @type {string}
1240
+ * @memberof AccessRequestItem
1241
+ */
1242
+ 'assignmentId'?: string | null;
1243
+ /**
1244
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
1245
+ * @type {string}
1246
+ * @memberof AccessRequestItem
1247
+ */
1248
+ 'nativeIdentity'?: string | null;
1231
1249
  }
1232
1250
 
1233
1251
  export const AccessRequestItemTypeV3 = {
@@ -2544,6 +2562,25 @@ export interface AccountAttributesCreateAttributes {
2544
2562
  */
2545
2563
  'sourceId': string;
2546
2564
  }
2565
+ /**
2566
+ *
2567
+ * @export
2568
+ * @interface AccountItemRef
2569
+ */
2570
+ export interface AccountItemRef {
2571
+ /**
2572
+ * The uuid for the account, available under the \'objectguid\' attribute
2573
+ * @type {string}
2574
+ * @memberof AccountItemRef
2575
+ */
2576
+ 'accountUuid'?: string | null;
2577
+ /**
2578
+ * The \'distinguishedName\' attribute for the account
2579
+ * @type {string}
2580
+ * @memberof AccountItemRef
2581
+ */
2582
+ 'nativeIdentity'?: string;
2583
+ }
2547
2584
  /**
2548
2585
  *
2549
2586
  * @export
@@ -3628,7 +3665,8 @@ export const AttributeDefinitionType = {
3628
3665
  String: 'STRING',
3629
3666
  Long: 'LONG',
3630
3667
  Int: 'INT',
3631
- Boolean: 'BOOLEAN'
3668
+ Boolean: 'BOOLEAN',
3669
+ Date: 'DATE'
3632
3670
  } as const;
3633
3671
 
3634
3672
  export type AttributeDefinitionType = typeof AttributeDefinitionType[keyof typeof AttributeDefinitionType];
@@ -9835,6 +9873,188 @@ export const GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = {
9835
9873
 
9836
9874
  export type GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = typeof GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3[keyof typeof GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3];
9837
9875
 
9876
+ /**
9877
+ *
9878
+ * @export
9879
+ * @interface GetCampaign200Response
9880
+ */
9881
+ export interface GetCampaign200Response {
9882
+ /**
9883
+ * Id of the campaign
9884
+ * @type {string}
9885
+ * @memberof GetCampaign200Response
9886
+ */
9887
+ 'id'?: string;
9888
+ /**
9889
+ * The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
9890
+ * @type {string}
9891
+ * @memberof GetCampaign200Response
9892
+ */
9893
+ 'name': string;
9894
+ /**
9895
+ * The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
9896
+ * @type {string}
9897
+ * @memberof GetCampaign200Response
9898
+ */
9899
+ 'description': string | null;
9900
+ /**
9901
+ * The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
9902
+ * @type {string}
9903
+ * @memberof GetCampaign200Response
9904
+ */
9905
+ 'deadline'?: string;
9906
+ /**
9907
+ * The type of campaign. Could be extended in the future.
9908
+ * @type {string}
9909
+ * @memberof GetCampaign200Response
9910
+ */
9911
+ 'type': GetCampaign200ResponseTypeV3;
9912
+ /**
9913
+ * Enables email notification for this campaign
9914
+ * @type {boolean}
9915
+ * @memberof GetCampaign200Response
9916
+ */
9917
+ 'emailNotificationEnabled'?: boolean;
9918
+ /**
9919
+ * Allows auto revoke for this campaign
9920
+ * @type {boolean}
9921
+ * @memberof GetCampaign200Response
9922
+ */
9923
+ 'autoRevokeAllowed'?: boolean;
9924
+ /**
9925
+ * Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
9926
+ * @type {boolean}
9927
+ * @memberof GetCampaign200Response
9928
+ */
9929
+ 'recommendationsEnabled'?: boolean;
9930
+ /**
9931
+ * The campaign\'s current status.
9932
+ * @type {string}
9933
+ * @memberof GetCampaign200Response
9934
+ */
9935
+ 'status'?: GetCampaign200ResponseStatusV3;
9936
+ /**
9937
+ * The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
9938
+ * @type {string}
9939
+ * @memberof GetCampaign200Response
9940
+ */
9941
+ 'correlatedStatus'?: GetCampaign200ResponseCorrelatedStatusV3;
9942
+ /**
9943
+ * Created time of the campaign
9944
+ * @type {string}
9945
+ * @memberof GetCampaign200Response
9946
+ */
9947
+ 'created'?: string;
9948
+ /**
9949
+ * The total number of certifications in this campaign.
9950
+ * @type {number}
9951
+ * @memberof GetCampaign200Response
9952
+ */
9953
+ 'totalCertifications'?: number;
9954
+ /**
9955
+ * The number of completed certifications in this campaign.
9956
+ * @type {number}
9957
+ * @memberof GetCampaign200Response
9958
+ */
9959
+ 'completedCertifications'?: number;
9960
+ /**
9961
+ * A list of errors and warnings that have accumulated.
9962
+ * @type {Array<CampaignAlert>}
9963
+ * @memberof GetCampaign200Response
9964
+ */
9965
+ 'alerts'?: Array<CampaignAlert>;
9966
+ /**
9967
+ * Modified time of the campaign
9968
+ * @type {string}
9969
+ * @memberof GetCampaign200Response
9970
+ */
9971
+ 'modified'?: string;
9972
+ /**
9973
+ *
9974
+ * @type {CampaignAllOfFilter}
9975
+ * @memberof GetCampaign200Response
9976
+ */
9977
+ 'filter'?: CampaignAllOfFilter;
9978
+ /**
9979
+ * Determines if comments on sunset date changes are required.
9980
+ * @type {boolean}
9981
+ * @memberof GetCampaign200Response
9982
+ */
9983
+ 'sunsetCommentsRequired'?: boolean;
9984
+ /**
9985
+ *
9986
+ * @type {CampaignAllOfSourceOwnerCampaignInfo}
9987
+ * @memberof GetCampaign200Response
9988
+ */
9989
+ 'sourceOwnerCampaignInfo'?: CampaignAllOfSourceOwnerCampaignInfo;
9990
+ /**
9991
+ *
9992
+ * @type {CampaignAllOfSearchCampaignInfo}
9993
+ * @memberof GetCampaign200Response
9994
+ */
9995
+ 'searchCampaignInfo'?: CampaignAllOfSearchCampaignInfo;
9996
+ /**
9997
+ *
9998
+ * @type {CampaignAllOfRoleCompositionCampaignInfo}
9999
+ * @memberof GetCampaign200Response
10000
+ */
10001
+ 'roleCompositionCampaignInfo'?: CampaignAllOfRoleCompositionCampaignInfo;
10002
+ /**
10003
+ *
10004
+ * @type {CampaignAllOfMachineAccountCampaignInfo}
10005
+ * @memberof GetCampaign200Response
10006
+ */
10007
+ 'machineAccountCampaignInfo'?: CampaignAllOfMachineAccountCampaignInfo;
10008
+ /**
10009
+ * A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
10010
+ * @type {Array<CampaignAllOfSourcesWithOrphanEntitlements>}
10011
+ * @memberof GetCampaign200Response
10012
+ */
10013
+ 'sourcesWithOrphanEntitlements'?: Array<CampaignAllOfSourcesWithOrphanEntitlements>;
10014
+ /**
10015
+ * Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
10016
+ * @type {string}
10017
+ * @memberof GetCampaign200Response
10018
+ */
10019
+ 'mandatoryCommentRequirement'?: GetCampaign200ResponseMandatoryCommentRequirementV3;
10020
+ }
10021
+
10022
+ export const GetCampaign200ResponseTypeV3 = {
10023
+ Manager: 'MANAGER',
10024
+ SourceOwner: 'SOURCE_OWNER',
10025
+ Search: 'SEARCH',
10026
+ RoleComposition: 'ROLE_COMPOSITION',
10027
+ MachineAccount: 'MACHINE_ACCOUNT'
10028
+ } as const;
10029
+
10030
+ export type GetCampaign200ResponseTypeV3 = typeof GetCampaign200ResponseTypeV3[keyof typeof GetCampaign200ResponseTypeV3];
10031
+ export const GetCampaign200ResponseStatusV3 = {
10032
+ Pending: 'PENDING',
10033
+ Staged: 'STAGED',
10034
+ Canceling: 'CANCELING',
10035
+ Activating: 'ACTIVATING',
10036
+ Active: 'ACTIVE',
10037
+ Completing: 'COMPLETING',
10038
+ Completed: 'COMPLETED',
10039
+ Error: 'ERROR',
10040
+ Archived: 'ARCHIVED'
10041
+ } as const;
10042
+
10043
+ export type GetCampaign200ResponseStatusV3 = typeof GetCampaign200ResponseStatusV3[keyof typeof GetCampaign200ResponseStatusV3];
10044
+ export const GetCampaign200ResponseCorrelatedStatusV3 = {
10045
+ Correlated: 'CORRELATED',
10046
+ Uncorrelated: 'UNCORRELATED'
10047
+ } as const;
10048
+
10049
+ export type GetCampaign200ResponseCorrelatedStatusV3 = typeof GetCampaign200ResponseCorrelatedStatusV3[keyof typeof GetCampaign200ResponseCorrelatedStatusV3];
10050
+ export const GetCampaign200ResponseMandatoryCommentRequirementV3 = {
10051
+ AllDecisions: 'ALL_DECISIONS',
10052
+ RevokeOnlyDecisions: 'REVOKE_ONLY_DECISIONS',
10053
+ NoDecisions: 'NO_DECISIONS'
10054
+ } as const;
10055
+
10056
+ export type GetCampaign200ResponseMandatoryCommentRequirementV3 = typeof GetCampaign200ResponseMandatoryCommentRequirementV3[keyof typeof GetCampaign200ResponseMandatoryCommentRequirementV3];
10057
+
9838
10058
  /**
9839
10059
  * @type GetDiscoveredApplications200ResponseInner
9840
10060
  * @export
@@ -11576,7 +11796,7 @@ export interface IdpDetails {
11576
11796
  * @type {string}
11577
11797
  * @memberof IdpDetails
11578
11798
  */
11579
- 'authContext'?: string;
11799
+ 'authnContext'?: string;
11580
11800
  /**
11581
11801
  * The IDP logout URL. Used with IDP configurations.
11582
11802
  * @type {string}
@@ -11588,7 +11808,7 @@ export interface IdpDetails {
11588
11808
  * @type {boolean}
11589
11809
  * @memberof IdpDetails
11590
11810
  */
11591
- 'includeAuthContext'?: boolean;
11811
+ 'includeAuthnContext'?: boolean;
11592
11812
  /**
11593
11813
  * The name id format to use. Used with IDP configurations.
11594
11814
  * @type {string}
@@ -11624,7 +11844,7 @@ export interface IdpDetails {
11624
11844
  * @type {string}
11625
11845
  * @memberof IdpDetails
11626
11846
  */
11627
- 'mappingAttribute'?: string;
11847
+ 'mappingAttribute': string;
11628
11848
  /**
11629
11849
  * The expiration date extracted from the certificate.
11630
11850
  * @type {string}
@@ -11640,7 +11860,8 @@ export interface IdpDetails {
11640
11860
  }
11641
11861
 
11642
11862
  export const IdpDetailsRoleV3 = {
11643
- SamlIdp: 'SAML_IDP'
11863
+ SamlIdp: 'SAML_IDP',
11864
+ SamlSp: 'SAML_SP'
11644
11865
  } as const;
11645
11866
 
11646
11867
  export type IdpDetailsRoleV3 = typeof IdpDetailsRoleV3[keyof typeof IdpDetailsRoleV3];
@@ -14877,7 +15098,7 @@ export const OwnerDtoTypeV3 = {
14877
15098
  export type OwnerDtoTypeV3 = typeof OwnerDtoTypeV3[keyof typeof OwnerDtoTypeV3];
14878
15099
 
14879
15100
  /**
14880
- * The owner of this object.
15101
+ * Owner of the object.
14881
15102
  * @export
14882
15103
  * @interface OwnerReference
14883
15104
  */
@@ -14889,13 +15110,13 @@ export interface OwnerReference {
14889
15110
  */
14890
15111
  'type'?: OwnerReferenceTypeV3;
14891
15112
  /**
14892
- * Identity id
15113
+ * Owner\'s identity ID.
14893
15114
  * @type {string}
14894
15115
  * @memberof OwnerReference
14895
15116
  */
14896
15117
  'id'?: string;
14897
15118
  /**
14898
- * Human-readable display name of the owner. It may be left null or omitted in a POST or PATCH. If set, it must match the current value of the owner\'s display name, otherwise a 400 Bad Request error will result.
15119
+ * Owner\'s name. It may be left null or omitted in a POST or PATCH. If set, it must match the current value of the owner\'s display name, otherwise a 400 Bad Request error will result.
14899
15120
  * @type {string}
14900
15121
  * @memberof OwnerReference
14901
15122
  */
@@ -15474,19 +15695,6 @@ export const PatOwnerTypeV3 = {
15474
15695
 
15475
15696
  export type PatOwnerTypeV3 = typeof PatOwnerTypeV3[keyof typeof PatOwnerTypeV3];
15476
15697
 
15477
- /**
15478
- * A JSONPatch document as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902). Only `replace` operations are accepted by this endpoint.
15479
- * @export
15480
- * @interface PatchServiceDeskIntegrationRequest
15481
- */
15482
- export interface PatchServiceDeskIntegrationRequest {
15483
- /**
15484
- * Operations to be applied
15485
- * @type {Array<JsonPatchOperation>}
15486
- * @memberof PatchServiceDeskIntegrationRequest
15487
- */
15488
- 'operations'?: Array<JsonPatchOperation>;
15489
- }
15490
15698
  /**
15491
15699
  *
15492
15700
  * @export
@@ -15815,7 +16023,7 @@ export interface ProvisioningConfigPlanInitializerScript {
15815
16023
  'source'?: string;
15816
16024
  }
15817
16025
  /**
15818
- * Defines matching criteria for an Account to be provisioned with a specific Access Profile
16026
+ * Defines matching criteria for an account to be provisioned with a specific access profile.
15819
16027
  * @export
15820
16028
  * @interface ProvisioningCriteriaLevel1
15821
16029
  */
@@ -15827,19 +16035,19 @@ export interface ProvisioningCriteriaLevel1 {
15827
16035
  */
15828
16036
  'operation'?: ProvisioningCriteriaOperation;
15829
16037
  /**
15830
- * Name of the Account attribute to be tested. If **operation** is one of EQUALS, NOT_EQUALS, CONTAINS, or HAS, this field is required. Otherwise, specifying it is an error.
16038
+ * Name of the account attribute to be tested. If **operation** is one of `EQUALS`, `NOT_EQUALS`, `CONTAINS`, or `HAS`, this field is required. Otherwise, specifying it results in an error.
15831
16039
  * @type {string}
15832
16040
  * @memberof ProvisioningCriteriaLevel1
15833
16041
  */
15834
16042
  'attribute'?: string | null;
15835
16043
  /**
15836
- * String value to test the Account attribute w/r/t the specified operation. If the operation is one of EQUALS, NOT_EQUALS, or CONTAINS, this field is required. Otherwise, specifying it is an error. If the Attribute is not String-typed, it will be converted to the appropriate type.
16044
+ * String value to test the account attribute w/r/t the specified operation. If the operation is one of `EQUALS`, `NOT_EQUALS`, or `CONTAINS`, this field is required. Otherwise, specifying it results in an error. If the attribute is not string-typed, the API will convert it to the appropriate type.
15837
16045
  * @type {string}
15838
16046
  * @memberof ProvisioningCriteriaLevel1
15839
16047
  */
15840
16048
  'value'?: string | null;
15841
16049
  /**
15842
- * Array of child criteria. Required if the operation is AND or OR, otherwise it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
16050
+ * Array of child criteria. This field is required if the operation is `AND` or `OR`. Otherwise, it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
15843
16051
  * @type {Array<ProvisioningCriteriaLevel2>}
15844
16052
  * @memberof ProvisioningCriteriaLevel1
15845
16053
  */
@@ -15848,7 +16056,7 @@ export interface ProvisioningCriteriaLevel1 {
15848
16056
 
15849
16057
 
15850
16058
  /**
15851
- * Defines matching criteria for an Account to be provisioned with a specific Access Profile
16059
+ * Defines matching criteria for an account to be provisioned with a specific access profile.
15852
16060
  * @export
15853
16061
  * @interface ProvisioningCriteriaLevel2
15854
16062
  */
@@ -15860,19 +16068,19 @@ export interface ProvisioningCriteriaLevel2 {
15860
16068
  */
15861
16069
  'operation'?: ProvisioningCriteriaOperation;
15862
16070
  /**
15863
- * Name of the Account attribute to be tested. If **operation** is one of EQUALS, NOT_EQUALS, CONTAINS, or HAS, this field is required. Otherwise, specifying it is an error.
16071
+ * Name of the account attribute to be tested. If **operation** is one of `EQUALS`, `NOT_EQUALS`, `CONTAINS`, or `HAS`, this field is required. Otherwise, specifying it results in an error.
15864
16072
  * @type {string}
15865
16073
  * @memberof ProvisioningCriteriaLevel2
15866
16074
  */
15867
16075
  'attribute'?: string | null;
15868
16076
  /**
15869
- * String value to test the Account attribute w/r/t the specified operation. If the operation is one of EQUALS, NOT_EQUALS, or CONTAINS, this field is required. Otherwise, specifying it is an error. If the Attribute is not String-typed, it will be converted to the appropriate type.
16077
+ * String value to test the account attribute w/r/t the specified operation. If the operation is one of `EQUALS`, `NOT_EQUALS`, or `CONTAINS`, this field is required. Otherwise, specifying it results in an error. If the attribute is not string-typed, the API will convert it to the appropriate type.
15870
16078
  * @type {string}
15871
16079
  * @memberof ProvisioningCriteriaLevel2
15872
16080
  */
15873
16081
  'value'?: string | null;
15874
16082
  /**
15875
- * Array of child criteria. Required if the operation is AND or OR, otherwise it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
16083
+ * Array of child criteria. This field is required if the operation is `AND` or `OR`. Otherwise, it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
15876
16084
  * @type {Array<ProvisioningCriteriaLevel3>}
15877
16085
  * @memberof ProvisioningCriteriaLevel2
15878
16086
  */
@@ -15881,7 +16089,7 @@ export interface ProvisioningCriteriaLevel2 {
15881
16089
 
15882
16090
 
15883
16091
  /**
15884
- * Defines matching criteria for an Account to be provisioned with a specific Access Profile
16092
+ * Defines matching criteria for an account to be provisioned with a specific access profile.
15885
16093
  * @export
15886
16094
  * @interface ProvisioningCriteriaLevel3
15887
16095
  */
@@ -15893,19 +16101,19 @@ export interface ProvisioningCriteriaLevel3 {
15893
16101
  */
15894
16102
  'operation'?: ProvisioningCriteriaOperation;
15895
16103
  /**
15896
- * Name of the Account attribute to be tested. If **operation** is one of EQUALS, NOT_EQUALS, CONTAINS, or HAS, this field is required. Otherwise, specifying it is an error.
16104
+ * Name of the account attribute to be tested. If **operation** is one of `EQUALS`, `NOT_EQUALS`, `CONTAINS`, or `HAS`, this field is required. Otherwise, specifying it results in an error.
15897
16105
  * @type {string}
15898
16106
  * @memberof ProvisioningCriteriaLevel3
15899
16107
  */
15900
16108
  'attribute'?: string | null;
15901
16109
  /**
15902
- * String value to test the Account attribute w/r/t the specified operation. If the operation is one of EQUALS, NOT_EQUALS, or CONTAINS, this field is required. Otherwise, specifying it is an error. If the Attribute is not String-typed, it will be converted to the appropriate type.
16110
+ * String value to test the account attribute w/r/t the specified operation. If the operation is one of `EQUALS`, `NOT_EQUALS`, or `CONTAINS`, this field is required. Otherwise, specifying it results in an error. If the attribute is not string-typed, the API will convert it to the appropriate type.
15903
16111
  * @type {string}
15904
16112
  * @memberof ProvisioningCriteriaLevel3
15905
16113
  */
15906
- 'value'?: string;
16114
+ 'value'?: string | null;
15907
16115
  /**
15908
- * Array of child criteria. Required if the operation is AND or OR, otherwise it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
16116
+ * Array of child criteria. This field is required if the operation is `AND` or `OR`. Otherwise, it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
15909
16117
  * @type {string}
15910
16118
  * @memberof ProvisioningCriteriaLevel3
15911
16119
  */
@@ -15914,7 +16122,7 @@ export interface ProvisioningCriteriaLevel3 {
15914
16122
 
15915
16123
 
15916
16124
  /**
15917
- * Supported operations on ProvisioningCriteria
16125
+ * Supported operations on `ProvisioningCriteria`.
15918
16126
  * @export
15919
16127
  * @enum {string}
15920
16128
  */
@@ -15955,7 +16163,7 @@ export interface ProvisioningPolicy {
15955
16163
  * @type {string}
15956
16164
  * @memberof ProvisioningPolicy
15957
16165
  */
15958
- 'name': string;
16166
+ 'name': string | null;
15959
16167
  /**
15960
16168
  * the description of the provisioning policy
15961
16169
  * @type {string}
@@ -15988,7 +16196,7 @@ export interface ProvisioningPolicyDto {
15988
16196
  * @type {string}
15989
16197
  * @memberof ProvisioningPolicyDto
15990
16198
  */
15991
- 'name': string;
16199
+ 'name': string | null;
15992
16200
  /**
15993
16201
  * the description of the provisioning policy
15994
16202
  * @type {string}
@@ -17005,19 +17213,25 @@ export interface RequestOnBehalfOfConfig {
17005
17213
  */
17006
17214
  export interface Requestability {
17007
17215
  /**
17008
- * Whether the requester of the containing object must provide comments justifying the request
17216
+ * Indicates whether the requester of the containing object must provide comments justifying the request.
17009
17217
  * @type {boolean}
17010
17218
  * @memberof Requestability
17011
17219
  */
17012
17220
  'commentsRequired'?: boolean | null;
17013
17221
  /**
17014
- * Whether an approver must provide comments when denying the request
17222
+ * Indicates whether an approver must provide comments when denying the request.
17015
17223
  * @type {boolean}
17016
17224
  * @memberof Requestability
17017
17225
  */
17018
17226
  'denialCommentsRequired'?: boolean | null;
17019
17227
  /**
17020
- * List describing the steps in approving the request
17228
+ * Indicates whether reauthorization is required for the request.
17229
+ * @type {boolean}
17230
+ * @memberof Requestability
17231
+ */
17232
+ 'reauthorizationRequired'?: boolean | null;
17233
+ /**
17234
+ * List describing the steps involved in approving the request.
17021
17235
  * @type {Array<AccessProfileApprovalScheme>}
17022
17236
  * @memberof Requestability
17023
17237
  */
@@ -17041,6 +17255,12 @@ export interface RequestabilityForRole {
17041
17255
  * @memberof RequestabilityForRole
17042
17256
  */
17043
17257
  'denialCommentsRequired'?: boolean | null;
17258
+ /**
17259
+ * Indicates whether reauthorization is required for the request.
17260
+ * @type {boolean}
17261
+ * @memberof RequestabilityForRole
17262
+ */
17263
+ 'reauthorizationRequired'?: boolean | null;
17044
17264
  /**
17045
17265
  * List describing the steps in approving the request
17046
17266
  * @type {Array<ApprovalSchemeForRole>}
@@ -17226,6 +17446,25 @@ export interface RequestedAccountRef {
17226
17446
  }
17227
17447
 
17228
17448
 
17449
+ /**
17450
+ *
17451
+ * @export
17452
+ * @interface RequestedForDtoRef
17453
+ */
17454
+ export interface RequestedForDtoRef {
17455
+ /**
17456
+ * The identity id for which the access is requested
17457
+ * @type {string}
17458
+ * @memberof RequestedForDtoRef
17459
+ */
17460
+ 'identityId': string;
17461
+ /**
17462
+ * the details for the access items that are requested for the identity
17463
+ * @type {Array<RequestedItemDtoRef>}
17464
+ * @memberof RequestedForDtoRef
17465
+ */
17466
+ 'requestedItems': Array<RequestedItemDtoRef>;
17467
+ }
17229
17468
  /**
17230
17469
  *
17231
17470
  * @export
@@ -17254,6 +17493,70 @@ export const RequestedItemDetailsTypeV3 = {
17254
17493
 
17255
17494
  export type RequestedItemDetailsTypeV3 = typeof RequestedItemDetailsTypeV3[keyof typeof RequestedItemDetailsTypeV3];
17256
17495
 
17496
+ /**
17497
+ *
17498
+ * @export
17499
+ * @interface RequestedItemDtoRef
17500
+ */
17501
+ export interface RequestedItemDtoRef {
17502
+ /**
17503
+ * The type of the item being requested.
17504
+ * @type {string}
17505
+ * @memberof RequestedItemDtoRef
17506
+ */
17507
+ 'type': RequestedItemDtoRefTypeV3;
17508
+ /**
17509
+ * ID of Role, Access Profile or Entitlement being requested.
17510
+ * @type {string}
17511
+ * @memberof RequestedItemDtoRef
17512
+ */
17513
+ 'id': string;
17514
+ /**
17515
+ * Comment provided by requester. * Comment is required when the request is of type Revoke Access.
17516
+ * @type {string}
17517
+ * @memberof RequestedItemDtoRef
17518
+ */
17519
+ 'comment'?: string;
17520
+ /**
17521
+ * Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
17522
+ * @type {{ [key: string]: string; }}
17523
+ * @memberof RequestedItemDtoRef
17524
+ */
17525
+ 'clientMetadata'?: { [key: string]: string; };
17526
+ /**
17527
+ * The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
17528
+ * @type {string}
17529
+ * @memberof RequestedItemDtoRef
17530
+ */
17531
+ 'removeDate'?: string;
17532
+ /**
17533
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
17534
+ * @type {string}
17535
+ * @memberof RequestedItemDtoRef
17536
+ */
17537
+ 'assignmentId'?: string | null;
17538
+ /**
17539
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
17540
+ * @type {string}
17541
+ * @memberof RequestedItemDtoRef
17542
+ */
17543
+ 'nativeIdentity'?: string | null;
17544
+ /**
17545
+ * The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
17546
+ * @type {Array<SourceItemRef>}
17547
+ * @memberof RequestedItemDtoRef
17548
+ */
17549
+ 'accountSelection'?: Array<SourceItemRef> | null;
17550
+ }
17551
+
17552
+ export const RequestedItemDtoRefTypeV3 = {
17553
+ AccessProfile: 'ACCESS_PROFILE',
17554
+ Role: 'ROLE',
17555
+ Entitlement: 'ENTITLEMENT'
17556
+ } as const;
17557
+
17558
+ export type RequestedItemDtoRefTypeV3 = typeof RequestedItemDtoRefTypeV3[keyof typeof RequestedItemDtoRefTypeV3];
17559
+
17257
17560
  /**
17258
17561
  *
17259
17562
  * @export
@@ -18129,7 +18432,7 @@ export type ReviewerTypeV3 = typeof ReviewerTypeV3[keyof typeof ReviewerTypeV3];
18129
18432
  */
18130
18433
  export interface Revocability {
18131
18434
  /**
18132
- * List describing the steps in approving the revocation request
18435
+ * List describing the steps involved in approving the revocation request.
18133
18436
  * @type {Array<AccessProfileApprovalScheme>}
18134
18437
  * @memberof Revocability
18135
18438
  */
@@ -20714,10 +21017,121 @@ export interface ServiceProviderConfiguration {
20714
21017
  'federationProtocolDetails'?: Array<ServiceProviderConfigurationFederationProtocolDetailsInner>;
20715
21018
  }
20716
21019
  /**
20717
- * @type ServiceProviderConfigurationFederationProtocolDetailsInner
21020
+ *
20718
21021
  * @export
21022
+ * @interface ServiceProviderConfigurationFederationProtocolDetailsInner
20719
21023
  */
20720
- export type ServiceProviderConfigurationFederationProtocolDetailsInner = IdpDetails | SpDetails;
21024
+ export interface ServiceProviderConfigurationFederationProtocolDetailsInner {
21025
+ /**
21026
+ * Federation protocol role
21027
+ * @type {string}
21028
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21029
+ */
21030
+ 'role'?: ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3;
21031
+ /**
21032
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
21033
+ * @type {string}
21034
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21035
+ */
21036
+ 'entityId'?: string;
21037
+ /**
21038
+ * Defines the binding used for the SAML flow. Used with IDP configurations.
21039
+ * @type {string}
21040
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21041
+ */
21042
+ 'binding'?: string;
21043
+ /**
21044
+ * Specifies the SAML authentication method to use. Used with IDP configurations.
21045
+ * @type {string}
21046
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21047
+ */
21048
+ 'authnContext'?: string;
21049
+ /**
21050
+ * The IDP logout URL. Used with IDP configurations.
21051
+ * @type {string}
21052
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21053
+ */
21054
+ 'logoutUrl'?: string;
21055
+ /**
21056
+ * Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
21057
+ * @type {boolean}
21058
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21059
+ */
21060
+ 'includeAuthnContext'?: boolean;
21061
+ /**
21062
+ * The name id format to use. Used with IDP configurations.
21063
+ * @type {string}
21064
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21065
+ */
21066
+ 'nameId'?: string;
21067
+ /**
21068
+ *
21069
+ * @type {JITConfiguration}
21070
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21071
+ */
21072
+ 'jitConfiguration'?: JITConfiguration;
21073
+ /**
21074
+ * The Base64-encoded certificate used by the IDP. Used with IDP configurations.
21075
+ * @type {string}
21076
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21077
+ */
21078
+ 'cert'?: string;
21079
+ /**
21080
+ * The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
21081
+ * @type {string}
21082
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21083
+ */
21084
+ 'loginUrlPost'?: string;
21085
+ /**
21086
+ * The IDP Redirect URL. Used with IDP configurations.
21087
+ * @type {string}
21088
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21089
+ */
21090
+ 'loginUrlRedirect'?: string;
21091
+ /**
21092
+ * Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
21093
+ * @type {string}
21094
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21095
+ */
21096
+ 'mappingAttribute': string;
21097
+ /**
21098
+ * The expiration date extracted from the certificate.
21099
+ * @type {string}
21100
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21101
+ */
21102
+ 'certificateExpirationDate'?: string;
21103
+ /**
21104
+ * The name extracted from the certificate.
21105
+ * @type {string}
21106
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21107
+ */
21108
+ 'certificateName'?: string;
21109
+ /**
21110
+ * Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
21111
+ * @type {string}
21112
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21113
+ */
21114
+ 'alias'?: string;
21115
+ /**
21116
+ * The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
21117
+ * @type {string}
21118
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21119
+ */
21120
+ 'callbackUrl': string;
21121
+ /**
21122
+ * The legacy ACS URL used for SAML authentication. Used with SP configurations.
21123
+ * @type {string}
21124
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInner
21125
+ */
21126
+ 'legacyAcsUrl'?: string;
21127
+ }
21128
+
21129
+ export const ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = {
21130
+ SamlIdp: 'SAML_IDP',
21131
+ SamlSp: 'SAML_SP'
21132
+ } as const;
21133
+
21134
+ export type ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = typeof ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3[keyof typeof ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3];
20721
21135
 
20722
21136
  /**
20723
21137
  *
@@ -21995,6 +22409,25 @@ export const SourceHealthDtoStatusV3 = {
21995
22409
 
21996
22410
  export type SourceHealthDtoStatusV3 = typeof SourceHealthDtoStatusV3[keyof typeof SourceHealthDtoStatusV3];
21997
22411
 
22412
+ /**
22413
+ *
22414
+ * @export
22415
+ * @interface SourceItemRef
22416
+ */
22417
+ export interface SourceItemRef {
22418
+ /**
22419
+ * The id for the source on which account selections are made
22420
+ * @type {string}
22421
+ * @memberof SourceItemRef
22422
+ */
22423
+ 'sourceId'?: string | null;
22424
+ /**
22425
+ * A list of account selections on the source. Currently, only one selection per source is supported.
22426
+ * @type {Array<AccountItemRef>}
22427
+ * @memberof SourceItemRef
22428
+ */
22429
+ 'accounts'?: Array<AccountItemRef> | null;
22430
+ }
21998
22431
  /**
21999
22432
  * Reference to management workgroup for the source.
22000
22433
  * @export
@@ -22268,10 +22701,17 @@ export interface SpDetails {
22268
22701
  * @type {string}
22269
22702
  * @memberof SpDetails
22270
22703
  */
22271
- 'callbackUrl'?: string;
22704
+ 'callbackUrl': string;
22705
+ /**
22706
+ * The legacy ACS URL used for SAML authentication. Used with SP configurations.
22707
+ * @type {string}
22708
+ * @memberof SpDetails
22709
+ */
22710
+ 'legacyAcsUrl'?: string;
22272
22711
  }
22273
22712
 
22274
22713
  export const SpDetailsRoleV3 = {
22714
+ SamlIdp: 'SAML_IDP',
22275
22715
  SamlSp: 'SAML_SP'
22276
22716
  } as const;
22277
22717
 
@@ -24304,6 +24744,7 @@ export const WorkflowExecutionStatusV3 = {
24304
24744
  Completed: 'Completed',
24305
24745
  Failed: 'Failed',
24306
24746
  Canceled: 'Canceled',
24747
+ Queued: 'Queued',
24307
24748
  Running: 'Running'
24308
24749
  } as const;
24309
24750
 
@@ -24860,7 +25301,7 @@ export type WorkflowTriggerAttributesFrequencyV3 = typeof WorkflowTriggerAttribu
24860
25301
  export const AccessProfilesApiAxiosParamCreator = function (configuration?: Configuration) {
24861
25302
  return {
24862
25303
  /**
24863
- * Create an access profile. A user with only ROLE_SUBADMIN or SOURCE_SUBADMIN authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
25304
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
24864
25305
  * @summary Create Access Profile
24865
25306
  * @param {AccessProfile} accessProfile
24866
25307
  * @param {*} [axiosOptions] Override http request option.
@@ -25119,13 +25560,13 @@ export const AccessProfilesApiAxiosParamCreator = function (configuration?: Conf
25119
25560
  };
25120
25561
  },
25121
25562
  /**
25122
- * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
25563
+ * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
25123
25564
  * @summary List Access Profiles
25124
25565
  * @param {string} [forSubadmin] Filters the returned list according to what is visible to the indicated ROLE_SUBADMIN or SOURCE_SUBADMIN identity. The value of the parameter is either an identity ID or the special value **me**, which is shorthand for the calling identity\&#39;s ID. If you specify an identity that isn\&#39;t a subadmin, the API returns a 400 Bad Request error.
25125
25566
  * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
25126
25567
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
25127
25568
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
25128
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, lt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **source.id**: *eq, in* Supported composite operators are *and, or* Filtering is not supported for access profiles and entitlements that have the \&#39;+\&#39; symbol in their names.
25569
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **source.id**: *eq, in* Supported composite operators are *and, or* Filtering is not supported for access profiles and entitlements that have the \&#39;+\&#39; symbol in their names.
25129
25570
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **name, created, modified**
25130
25571
  * @param {string} [forSegmentIds] Filters access profiles to only those assigned to the segment(s) with the specified IDs. If segmentation is currently unavailable, specifying this parameter results in an error.
25131
25572
  * @param {boolean} [includeUnsegmented] Indicates whether the response list should contain unsegmented access profiles. If &#x60;for-segment-ids&#x60; is absent or empty, specifying *include-unsegmented* as &#x60;false&#x60; results in an error.
@@ -25263,7 +25704,7 @@ export const AccessProfilesApiFp = function(configuration?: Configuration) {
25263
25704
  const localVarAxiosParamCreator = AccessProfilesApiAxiosParamCreator(configuration)
25264
25705
  return {
25265
25706
  /**
25266
- * Create an access profile. A user with only ROLE_SUBADMIN or SOURCE_SUBADMIN authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
25707
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
25267
25708
  * @summary Create Access Profile
25268
25709
  * @param {AccessProfile} accessProfile
25269
25710
  * @param {*} [axiosOptions] Override http request option.
@@ -25333,13 +25774,13 @@ export const AccessProfilesApiFp = function(configuration?: Configuration) {
25333
25774
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
25334
25775
  },
25335
25776
  /**
25336
- * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
25777
+ * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
25337
25778
  * @summary List Access Profiles
25338
25779
  * @param {string} [forSubadmin] Filters the returned list according to what is visible to the indicated ROLE_SUBADMIN or SOURCE_SUBADMIN identity. The value of the parameter is either an identity ID or the special value **me**, which is shorthand for the calling identity\&#39;s ID. If you specify an identity that isn\&#39;t a subadmin, the API returns a 400 Bad Request error.
25339
25780
  * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
25340
25781
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
25341
25782
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
25342
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, lt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **source.id**: *eq, in* Supported composite operators are *and, or* Filtering is not supported for access profiles and entitlements that have the \&#39;+\&#39; symbol in their names.
25783
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **source.id**: *eq, in* Supported composite operators are *and, or* Filtering is not supported for access profiles and entitlements that have the \&#39;+\&#39; symbol in their names.
25343
25784
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **name, created, modified**
25344
25785
  * @param {string} [forSegmentIds] Filters access profiles to only those assigned to the segment(s) with the specified IDs. If segmentation is currently unavailable, specifying this parameter results in an error.
25345
25786
  * @param {boolean} [includeUnsegmented] Indicates whether the response list should contain unsegmented access profiles. If &#x60;for-segment-ids&#x60; is absent or empty, specifying *include-unsegmented* as &#x60;false&#x60; results in an error.
@@ -25377,7 +25818,7 @@ export const AccessProfilesApiFactory = function (configuration?: Configuration,
25377
25818
  const localVarFp = AccessProfilesApiFp(configuration)
25378
25819
  return {
25379
25820
  /**
25380
- * Create an access profile. A user with only ROLE_SUBADMIN or SOURCE_SUBADMIN authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
25821
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
25381
25822
  * @summary Create Access Profile
25382
25823
  * @param {AccessProfilesApiCreateAccessProfileRequest} requestParameters Request parameters.
25383
25824
  * @param {*} [axiosOptions] Override http request option.
@@ -25427,7 +25868,7 @@ export const AccessProfilesApiFactory = function (configuration?: Configuration,
25427
25868
  return localVarFp.getAccessProfileEntitlements(requestParameters.id, requestParameters.limit, requestParameters.offset, requestParameters.count, requestParameters.filters, requestParameters.sorters, axiosOptions).then((request) => request(axios, basePath));
25428
25869
  },
25429
25870
  /**
25430
- * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
25871
+ * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
25431
25872
  * @summary List Access Profiles
25432
25873
  * @param {AccessProfilesApiListAccessProfilesRequest} requestParameters Request parameters.
25433
25874
  * @param {*} [axiosOptions] Override http request option.
@@ -25589,7 +26030,7 @@ export interface AccessProfilesApiListAccessProfilesRequest {
25589
26030
  readonly count?: boolean
25590
26031
 
25591
26032
  /**
25592
- * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, lt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **source.id**: *eq, in* Supported composite operators are *and, or* Filtering is not supported for access profiles and entitlements that have the \&#39;+\&#39; symbol in their names.
26033
+ * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **source.id**: *eq, in* Supported composite operators are *and, or* Filtering is not supported for access profiles and entitlements that have the \&#39;+\&#39; symbol in their names.
25593
26034
  * @type {string}
25594
26035
  * @memberof AccessProfilesApiListAccessProfiles
25595
26036
  */
@@ -25646,7 +26087,7 @@ export interface AccessProfilesApiPatchAccessProfileRequest {
25646
26087
  */
25647
26088
  export class AccessProfilesApi extends BaseAPI {
25648
26089
  /**
25649
- * Create an access profile. A user with only ROLE_SUBADMIN or SOURCE_SUBADMIN authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
26090
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
25650
26091
  * @summary Create Access Profile
25651
26092
  * @param {AccessProfilesApiCreateAccessProfileRequest} requestParameters Request parameters.
25652
26093
  * @param {*} [axiosOptions] Override http request option.
@@ -25706,7 +26147,7 @@ export class AccessProfilesApi extends BaseAPI {
25706
26147
  }
25707
26148
 
25708
26149
  /**
25709
- * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
26150
+ * Get a list of access profiles. >**Note:** When you filter for access profiles that have the \'+\' symbol in their names, the response is blank.
25710
26151
  * @summary List Access Profiles
25711
26152
  * @param {AccessProfilesApiListAccessProfilesRequest} requestParameters Request parameters.
25712
26153
  * @param {*} [axiosOptions] Override http request option.
@@ -25955,7 +26396,7 @@ export const AccessRequestApprovalsApiAxiosParamCreator = function (configuratio
25955
26396
  * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
25956
26397
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
25957
26398
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
25958
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
26399
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
25959
26400
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified**
25960
26401
  * @param {*} [axiosOptions] Override http request option.
25961
26402
  * @throws {RequiredError}
@@ -26141,7 +26582,7 @@ export const AccessRequestApprovalsApiFp = function(configuration?: Configuratio
26141
26582
  * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
26142
26583
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
26143
26584
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
26144
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
26585
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
26145
26586
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified**
26146
26587
  * @param {*} [axiosOptions] Override http request option.
26147
26588
  * @throws {RequiredError}
@@ -26386,7 +26827,7 @@ export interface AccessRequestApprovalsApiListPendingApprovalsRequest {
26386
26827
  readonly count?: boolean
26387
26828
 
26388
26829
  /**
26389
- * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
26830
+ * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
26390
26831
  * @type {string}
26391
26832
  * @memberof AccessRequestApprovalsApiListPendingApprovals
26392
26833
  */
@@ -26554,7 +26995,7 @@ export const AccessRequestsApiAxiosParamCreator = function (configuration?: Conf
26554
26995
  };
26555
26996
  },
26556
26997
  /**
26557
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
26998
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
26558
26999
  * @summary Submit Access Request
26559
27000
  * @param {AccessRequest} accessRequest
26560
27001
  * @param {*} [axiosOptions] Override http request option.
@@ -26791,7 +27232,7 @@ export const AccessRequestsApiFp = function(configuration?: Configuration) {
26791
27232
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
26792
27233
  },
26793
27234
  /**
26794
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
27235
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
26795
27236
  * @summary Submit Access Request
26796
27237
  * @param {AccessRequest} accessRequest
26797
27238
  * @param {*} [axiosOptions] Override http request option.
@@ -26871,7 +27312,7 @@ export const AccessRequestsApiFactory = function (configuration?: Configuration,
26871
27312
  return localVarFp.cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then((request) => request(axios, basePath));
26872
27313
  },
26873
27314
  /**
26874
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
27315
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
26875
27316
  * @summary Submit Access Request
26876
27317
  * @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
26877
27318
  * @param {*} [axiosOptions] Override http request option.
@@ -27051,7 +27492,7 @@ export class AccessRequestsApi extends BaseAPI {
27051
27492
  }
27052
27493
 
27053
27494
  /**
27054
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
27495
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
27055
27496
  * @summary Submit Access Request
27056
27497
  * @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
27057
27498
  * @param {*} [axiosOptions] Override http request option.
@@ -31793,7 +32234,7 @@ export const CertificationCampaignsApiFp = function(configuration?: Configuratio
31793
32234
  * @param {*} [axiosOptions] Override http request option.
31794
32235
  * @throws {RequiredError}
31795
32236
  */
31796
- async getCampaign(id: string, detail?: GetCampaignDetailV3, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetActiveCampaigns200ResponseInner>> {
32237
+ async getCampaign(id: string, detail?: GetCampaignDetailV3, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetCampaign200Response>> {
31797
32238
  const localVarAxiosArgs = await localVarAxiosParamCreator.getCampaign(id, detail, axiosOptions);
31798
32239
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
31799
32240
  const localVarOperationServerBasePath = operationServerMap['CertificationCampaignsApi.getCampaign']?.[localVarOperationServerIndex]?.url;
@@ -32077,7 +32518,7 @@ export const CertificationCampaignsApiFactory = function (configuration?: Config
32077
32518
  * @param {*} [axiosOptions] Override http request option.
32078
32519
  * @throws {RequiredError}
32079
32520
  */
32080
- getCampaign(requestParameters: CertificationCampaignsApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetActiveCampaigns200ResponseInner> {
32521
+ getCampaign(requestParameters: CertificationCampaignsApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetCampaign200Response> {
32081
32522
  return localVarFp.getCampaign(requestParameters.id, requestParameters.detail, axiosOptions).then((request) => request(axios, basePath));
32082
32523
  },
32083
32524
  /**
@@ -50037,9 +50478,9 @@ export const RolesApiAxiosParamCreator = function (configuration?: Configuration
50037
50478
  };
50038
50479
  },
50039
50480
  /**
50040
- * This API deletes a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
50041
- * @summary Delete a Role
50042
- * @param {string} id ID of the Role
50481
+ * Delete a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups the ROLE_SUBADMIN is a member of.
50482
+ * @summary Delete Role
50483
+ * @param {string} id Role ID.
50043
50484
  * @param {*} [axiosOptions] Override http request option.
50044
50485
  * @throws {RequiredError}
50045
50486
  */
@@ -50079,9 +50520,9 @@ export const RolesApiAxiosParamCreator = function (configuration?: Configuration
50079
50520
  };
50080
50521
  },
50081
50522
  /**
50082
- * This API returns a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
50083
- * @summary Get a Role
50084
- * @param {string} id ID of the Role
50523
+ * Get a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of.
50524
+ * @summary Get Role
50525
+ * @param {string} id Role ID.
50085
50526
  * @param {*} [axiosOptions] Override http request option.
50086
50527
  * @throws {RequiredError}
50087
50528
  */
@@ -50194,7 +50635,7 @@ export const RolesApiAxiosParamCreator = function (configuration?: Configuration
50194
50635
  * @param {number} [limit] Note that for this API the maximum value for limit is 50. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
50195
50636
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
50196
50637
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
50197
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, lt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq*
50638
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, ge, le* **modified**: *lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **dimensional**: *eq*
50198
50639
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **name, created, modified**
50199
50640
  * @param {string} [forSegmentIds] If present and not empty, additionally filters Roles to those which are assigned to the Segment(s) with the specified IDs. If segmentation is currently unavailable, specifying this parameter results in an error.
50200
50641
  * @param {boolean} [includeUnsegmented] Whether or not the response list should contain unsegmented Roles. If *for-segment-ids* is absent or empty, specifying *include-unsegmented* as false results in an error.
@@ -50266,9 +50707,9 @@ export const RolesApiAxiosParamCreator = function (configuration?: Configuration
50266
50707
  };
50267
50708
  },
50268
50709
  /**
50269
- * This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing roles, however, any new roles as well as any updates to existing descriptions will be limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
50270
- * @summary Patch a specified Role
50271
- * @param {string} id ID of the Role to patch
50710
+ * Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
50711
+ * @summary Patch Role
50712
+ * @param {string} id Role ID to patch
50272
50713
  * @param {Array<JsonPatchOperation>} jsonPatchOperation
50273
50714
  * @param {*} [axiosOptions] Override http request option.
50274
50715
  * @throws {RequiredError}
@@ -50350,9 +50791,9 @@ export const RolesApiFp = function(configuration?: Configuration) {
50350
50791
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
50351
50792
  },
50352
50793
  /**
50353
- * This API deletes a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
50354
- * @summary Delete a Role
50355
- * @param {string} id ID of the Role
50794
+ * Delete a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups the ROLE_SUBADMIN is a member of.
50795
+ * @summary Delete Role
50796
+ * @param {string} id Role ID.
50356
50797
  * @param {*} [axiosOptions] Override http request option.
50357
50798
  * @throws {RequiredError}
50358
50799
  */
@@ -50363,9 +50804,9 @@ export const RolesApiFp = function(configuration?: Configuration) {
50363
50804
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
50364
50805
  },
50365
50806
  /**
50366
- * This API returns a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
50367
- * @summary Get a Role
50368
- * @param {string} id ID of the Role
50807
+ * Get a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of.
50808
+ * @summary Get Role
50809
+ * @param {string} id Role ID.
50369
50810
  * @param {*} [axiosOptions] Override http request option.
50370
50811
  * @throws {RequiredError}
50371
50812
  */
@@ -50400,7 +50841,7 @@ export const RolesApiFp = function(configuration?: Configuration) {
50400
50841
  * @param {number} [limit] Note that for this API the maximum value for limit is 50. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
50401
50842
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
50402
50843
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
50403
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, lt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq*
50844
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, ge, le* **modified**: *lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **dimensional**: *eq*
50404
50845
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **name, created, modified**
50405
50846
  * @param {string} [forSegmentIds] If present and not empty, additionally filters Roles to those which are assigned to the Segment(s) with the specified IDs. If segmentation is currently unavailable, specifying this parameter results in an error.
50406
50847
  * @param {boolean} [includeUnsegmented] Whether or not the response list should contain unsegmented Roles. If *for-segment-ids* is absent or empty, specifying *include-unsegmented* as false results in an error.
@@ -50414,9 +50855,9 @@ export const RolesApiFp = function(configuration?: Configuration) {
50414
50855
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
50415
50856
  },
50416
50857
  /**
50417
- * This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing roles, however, any new roles as well as any updates to existing descriptions will be limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
50418
- * @summary Patch a specified Role
50419
- * @param {string} id ID of the Role to patch
50858
+ * Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
50859
+ * @summary Patch Role
50860
+ * @param {string} id Role ID to patch
50420
50861
  * @param {Array<JsonPatchOperation>} jsonPatchOperation
50421
50862
  * @param {*} [axiosOptions] Override http request option.
50422
50863
  * @throws {RequiredError}
@@ -50458,8 +50899,8 @@ export const RolesApiFactory = function (configuration?: Configuration, basePath
50458
50899
  return localVarFp.deleteBulkRoles(requestParameters.roleBulkDeleteRequest, axiosOptions).then((request) => request(axios, basePath));
50459
50900
  },
50460
50901
  /**
50461
- * This API deletes a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
50462
- * @summary Delete a Role
50902
+ * Delete a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups the ROLE_SUBADMIN is a member of.
50903
+ * @summary Delete Role
50463
50904
  * @param {RolesApiDeleteRoleRequest} requestParameters Request parameters.
50464
50905
  * @param {*} [axiosOptions] Override http request option.
50465
50906
  * @throws {RequiredError}
@@ -50468,8 +50909,8 @@ export const RolesApiFactory = function (configuration?: Configuration, basePath
50468
50909
  return localVarFp.deleteRole(requestParameters.id, axiosOptions).then((request) => request(axios, basePath));
50469
50910
  },
50470
50911
  /**
50471
- * This API returns a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
50472
- * @summary Get a Role
50912
+ * Get a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of.
50913
+ * @summary Get Role
50473
50914
  * @param {RolesApiGetRoleRequest} requestParameters Request parameters.
50474
50915
  * @param {*} [axiosOptions] Override http request option.
50475
50916
  * @throws {RequiredError}
@@ -50498,8 +50939,8 @@ export const RolesApiFactory = function (configuration?: Configuration, basePath
50498
50939
  return localVarFp.listRoles(requestParameters.forSubadmin, requestParameters.limit, requestParameters.offset, requestParameters.count, requestParameters.filters, requestParameters.sorters, requestParameters.forSegmentIds, requestParameters.includeUnsegmented, axiosOptions).then((request) => request(axios, basePath));
50499
50940
  },
50500
50941
  /**
50501
- * This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing roles, however, any new roles as well as any updates to existing descriptions will be limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
50502
- * @summary Patch a specified Role
50942
+ * Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
50943
+ * @summary Patch Role
50503
50944
  * @param {RolesApiPatchRoleRequest} requestParameters Request parameters.
50504
50945
  * @param {*} [axiosOptions] Override http request option.
50505
50946
  * @throws {RequiredError}
@@ -50545,7 +50986,7 @@ export interface RolesApiDeleteBulkRolesRequest {
50545
50986
  */
50546
50987
  export interface RolesApiDeleteRoleRequest {
50547
50988
  /**
50548
- * ID of the Role
50989
+ * Role ID.
50549
50990
  * @type {string}
50550
50991
  * @memberof RolesApiDeleteRole
50551
50992
  */
@@ -50559,7 +51000,7 @@ export interface RolesApiDeleteRoleRequest {
50559
51000
  */
50560
51001
  export interface RolesApiGetRoleRequest {
50561
51002
  /**
50562
- * ID of the Role
51003
+ * Role ID.
50563
51004
  * @type {string}
50564
51005
  * @memberof RolesApiGetRole
50565
51006
  */
@@ -50650,7 +51091,7 @@ export interface RolesApiListRolesRequest {
50650
51091
  readonly count?: boolean
50651
51092
 
50652
51093
  /**
50653
- * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, lt, ge, le* **modified**: *gt, lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq*
51094
+ * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **name**: *eq, sw* **created**: *gt, ge, le* **modified**: *lt, ge, le* **owner.id**: *eq, in* **requestable**: *eq* **dimensional**: *eq*
50654
51095
  * @type {string}
50655
51096
  * @memberof RolesApiListRoles
50656
51097
  */
@@ -50685,7 +51126,7 @@ export interface RolesApiListRolesRequest {
50685
51126
  */
50686
51127
  export interface RolesApiPatchRoleRequest {
50687
51128
  /**
50688
- * ID of the Role to patch
51129
+ * Role ID to patch
50689
51130
  * @type {string}
50690
51131
  * @memberof RolesApiPatchRole
50691
51132
  */
@@ -50731,8 +51172,8 @@ export class RolesApi extends BaseAPI {
50731
51172
  }
50732
51173
 
50733
51174
  /**
50734
- * This API deletes a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
50735
- * @summary Delete a Role
51175
+ * Delete a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups the ROLE_SUBADMIN is a member of.
51176
+ * @summary Delete Role
50736
51177
  * @param {RolesApiDeleteRoleRequest} requestParameters Request parameters.
50737
51178
  * @param {*} [axiosOptions] Override http request option.
50738
51179
  * @throws {RequiredError}
@@ -50743,8 +51184,8 @@ export class RolesApi extends BaseAPI {
50743
51184
  }
50744
51185
 
50745
51186
  /**
50746
- * This API returns a Role by its ID. A user with ROLE_SUBADMIN authority may only call this API if all Access Profiles included in the Role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member.
50747
- * @summary Get a Role
51187
+ * Get a role by ID. A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of.
51188
+ * @summary Get Role
50748
51189
  * @param {RolesApiGetRoleRequest} requestParameters Request parameters.
50749
51190
  * @param {*} [axiosOptions] Override http request option.
50750
51191
  * @throws {RequiredError}
@@ -50779,8 +51220,8 @@ export class RolesApi extends BaseAPI {
50779
51220
  }
50780
51221
 
50781
51222
  /**
50782
- * This API updates an existing role using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to Sources with management workgroups of which the ROLE_SUBADMIN is a member. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing roles, however, any new roles as well as any updates to existing descriptions will be limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
50783
- * @summary Patch a specified Role
51223
+ * Update an existing role, using the [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax. The following fields are patchable: * name * description * enabled * owner * accessProfiles * entitlements * membership * requestable * accessRequestConfig * revokeRequestConfig * segments * accessModelMetadata A user with ROLE_SUBADMIN authority may only call this API if all access profiles included in the role are associated to sources with management workgroups of the ROLE_SUBADMIN is a member of. The maximum supported length for the description field is 2000 characters. ISC preserves longer descriptions for existing roles. However, any new roles as well as any updates to existing descriptions are limited to 2000 characters. When you use this API to modify a role\'s membership identities, you can only modify up to a limit of 500 membership identities at a time.
51224
+ * @summary Patch Role
50784
51225
  * @param {RolesApiPatchRoleRequest} requestParameters Request parameters.
50785
51226
  * @param {*} [axiosOptions] Override http request option.
50786
51227
  * @throws {RequiredError}
@@ -55938,15 +56379,15 @@ export const ServiceDeskIntegrationApiAxiosParamCreator = function (configuratio
55938
56379
  * Update an existing Service Desk integration by ID with a PATCH request.
55939
56380
  * @summary Patch a Service Desk Integration
55940
56381
  * @param {string} id ID of the Service Desk integration to update
55941
- * @param {PatchServiceDeskIntegrationRequest} patchServiceDeskIntegrationRequest A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
56382
+ * @param {Array<JsonPatchOperation>} jsonPatchOperation A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
55942
56383
  * @param {*} [axiosOptions] Override http request option.
55943
56384
  * @throws {RequiredError}
55944
56385
  */
55945
- patchServiceDeskIntegration: async (id: string, patchServiceDeskIntegrationRequest: PatchServiceDeskIntegrationRequest, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
56386
+ patchServiceDeskIntegration: async (id: string, jsonPatchOperation: Array<JsonPatchOperation>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
55946
56387
  // verify required parameter 'id' is not null or undefined
55947
56388
  assertParamExists('patchServiceDeskIntegration', 'id', id)
55948
- // verify required parameter 'patchServiceDeskIntegrationRequest' is not null or undefined
55949
- assertParamExists('patchServiceDeskIntegration', 'patchServiceDeskIntegrationRequest', patchServiceDeskIntegrationRequest)
56389
+ // verify required parameter 'jsonPatchOperation' is not null or undefined
56390
+ assertParamExists('patchServiceDeskIntegration', 'jsonPatchOperation', jsonPatchOperation)
55950
56391
  const localVarPath = `/service-desk-integrations/{id}`
55951
56392
  .replace(`{${"id"}}`, encodeURIComponent(String(id)));
55952
56393
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
@@ -55975,7 +56416,7 @@ export const ServiceDeskIntegrationApiAxiosParamCreator = function (configuratio
55975
56416
  setSearchParams(localVarUrlObj, localVarQueryParameter);
55976
56417
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
55977
56418
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
55978
- localVarRequestOptions.data = serializeDataIfNeeded(patchServiceDeskIntegrationRequest, localVarRequestOptions, configuration)
56419
+ localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperation, localVarRequestOptions, configuration)
55979
56420
 
55980
56421
  return {
55981
56422
  url: toPathString(localVarUrlObj),
@@ -56181,12 +56622,12 @@ export const ServiceDeskIntegrationApiFp = function(configuration?: Configuratio
56181
56622
  * Update an existing Service Desk integration by ID with a PATCH request.
56182
56623
  * @summary Patch a Service Desk Integration
56183
56624
  * @param {string} id ID of the Service Desk integration to update
56184
- * @param {PatchServiceDeskIntegrationRequest} patchServiceDeskIntegrationRequest A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
56625
+ * @param {Array<JsonPatchOperation>} jsonPatchOperation A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
56185
56626
  * @param {*} [axiosOptions] Override http request option.
56186
56627
  * @throws {RequiredError}
56187
56628
  */
56188
- async patchServiceDeskIntegration(id: string, patchServiceDeskIntegrationRequest: PatchServiceDeskIntegrationRequest, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceDeskIntegrationDto>> {
56189
- const localVarAxiosArgs = await localVarAxiosParamCreator.patchServiceDeskIntegration(id, patchServiceDeskIntegrationRequest, axiosOptions);
56629
+ async patchServiceDeskIntegration(id: string, jsonPatchOperation: Array<JsonPatchOperation>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceDeskIntegrationDto>> {
56630
+ const localVarAxiosArgs = await localVarAxiosParamCreator.patchServiceDeskIntegration(id, jsonPatchOperation, axiosOptions);
56190
56631
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
56191
56632
  const localVarOperationServerBasePath = operationServerMap['ServiceDeskIntegrationApi.patchServiceDeskIntegration']?.[localVarOperationServerIndex]?.url;
56192
56633
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
@@ -56304,7 +56745,7 @@ export const ServiceDeskIntegrationApiFactory = function (configuration?: Config
56304
56745
  * @throws {RequiredError}
56305
56746
  */
56306
56747
  patchServiceDeskIntegration(requestParameters: ServiceDeskIntegrationApiPatchServiceDeskIntegrationRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceDeskIntegrationDto> {
56307
- return localVarFp.patchServiceDeskIntegration(requestParameters.id, requestParameters.patchServiceDeskIntegrationRequest, axiosOptions).then((request) => request(axios, basePath));
56748
+ return localVarFp.patchServiceDeskIntegration(requestParameters.id, requestParameters.jsonPatchOperation, axiosOptions).then((request) => request(axios, basePath));
56308
56749
  },
56309
56750
  /**
56310
56751
  * Update an existing Service Desk integration by ID.
@@ -56442,10 +56883,10 @@ export interface ServiceDeskIntegrationApiPatchServiceDeskIntegrationRequest {
56442
56883
 
56443
56884
  /**
56444
56885
  * A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
56445
- * @type {PatchServiceDeskIntegrationRequest}
56886
+ * @type {Array<JsonPatchOperation>}
56446
56887
  * @memberof ServiceDeskIntegrationApiPatchServiceDeskIntegration
56447
56888
  */
56448
- readonly patchServiceDeskIntegrationRequest: PatchServiceDeskIntegrationRequest
56889
+ readonly jsonPatchOperation: Array<JsonPatchOperation>
56449
56890
  }
56450
56891
 
56451
56892
  /**
@@ -56581,7 +57022,7 @@ export class ServiceDeskIntegrationApi extends BaseAPI {
56581
57022
  * @memberof ServiceDeskIntegrationApi
56582
57023
  */
56583
57024
  public patchServiceDeskIntegration(requestParameters: ServiceDeskIntegrationApiPatchServiceDeskIntegrationRequest, axiosOptions?: RawAxiosRequestConfig) {
56584
- return ServiceDeskIntegrationApiFp(this.configuration).patchServiceDeskIntegration(requestParameters.id, requestParameters.patchServiceDeskIntegrationRequest, axiosOptions).then((request) => request(this.axios, this.basePath));
57025
+ return ServiceDeskIntegrationApiFp(this.configuration).patchServiceDeskIntegration(requestParameters.id, requestParameters.jsonPatchOperation, axiosOptions).then((request) => request(this.axios, this.basePath));
56585
57026
  }
56586
57027
 
56587
57028
  /**
@@ -63174,10 +63615,11 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
63174
63615
  * Get a single workflow by id.
63175
63616
  * @summary Get Workflow By Id
63176
63617
  * @param {string} id Id of the workflow
63618
+ * @param {boolean} [workflowMetrics] disable workflow metrics
63177
63619
  * @param {*} [axiosOptions] Override http request option.
63178
63620
  * @throws {RequiredError}
63179
63621
  */
63180
- getWorkflow: async (id: string, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
63622
+ getWorkflow: async (id: string, workflowMetrics?: boolean, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
63181
63623
  // verify required parameter 'id' is not null or undefined
63182
63624
  assertParamExists('getWorkflow', 'id', id)
63183
63625
  const localVarPath = `/workflows/{id}`
@@ -63201,6 +63643,10 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
63201
63643
  // oauth required
63202
63644
  await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
63203
63645
 
63646
+ if (workflowMetrics !== undefined) {
63647
+ localVarQueryParameter['workflowMetrics'] = workflowMetrics;
63648
+ }
63649
+
63204
63650
 
63205
63651
 
63206
63652
  setSearchParams(localVarUrlObj, localVarQueryParameter);
@@ -63213,7 +63659,7 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
63213
63659
  };
63214
63660
  },
63215
63661
  /**
63216
- * Use this API to get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
63662
+ * Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
63217
63663
  * @summary Get Workflow Execution
63218
63664
  * @param {string} id Workflow execution ID.
63219
63665
  * @param {*} [axiosOptions] Override http request option.
@@ -63553,10 +63999,14 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
63553
63999
  /**
63554
64000
  * List all workflows in the tenant.
63555
64001
  * @summary List Workflows
64002
+ * @param {string} [triggerId] Trigger ID
64003
+ * @param {string} [connectorInstanceId] Connector Instance ID
64004
+ * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
64005
+ * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
63556
64006
  * @param {*} [axiosOptions] Override http request option.
63557
64007
  * @throws {RequiredError}
63558
64008
  */
63559
- listWorkflows: async (axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
64009
+ listWorkflows: async (triggerId?: string, connectorInstanceId?: string, limit?: number, offset?: number, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
63560
64010
  const localVarPath = `/workflows`;
63561
64011
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
63562
64012
  const localVarUrlObj = new URL(localVarPath, DUMMY_BASE_URL);
@@ -63577,6 +64027,22 @@ export const WorkflowsApiAxiosParamCreator = function (configuration?: Configura
63577
64027
  // oauth required
63578
64028
  await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
63579
64029
 
64030
+ if (triggerId !== undefined) {
64031
+ localVarQueryParameter['triggerId'] = triggerId;
64032
+ }
64033
+
64034
+ if (connectorInstanceId !== undefined) {
64035
+ localVarQueryParameter['connectorInstanceId'] = connectorInstanceId;
64036
+ }
64037
+
64038
+ if (limit !== undefined) {
64039
+ localVarQueryParameter['limit'] = limit;
64040
+ }
64041
+
64042
+ if (offset !== undefined) {
64043
+ localVarQueryParameter['offset'] = offset;
64044
+ }
64045
+
63580
64046
 
63581
64047
 
63582
64048
  setSearchParams(localVarUrlObj, localVarQueryParameter);
@@ -63858,17 +64324,18 @@ export const WorkflowsApiFp = function(configuration?: Configuration) {
63858
64324
  * Get a single workflow by id.
63859
64325
  * @summary Get Workflow By Id
63860
64326
  * @param {string} id Id of the workflow
64327
+ * @param {boolean} [workflowMetrics] disable workflow metrics
63861
64328
  * @param {*} [axiosOptions] Override http request option.
63862
64329
  * @throws {RequiredError}
63863
64330
  */
63864
- async getWorkflow(id: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Workflow>> {
63865
- const localVarAxiosArgs = await localVarAxiosParamCreator.getWorkflow(id, axiosOptions);
64331
+ async getWorkflow(id: string, workflowMetrics?: boolean, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Workflow>> {
64332
+ const localVarAxiosArgs = await localVarAxiosParamCreator.getWorkflow(id, workflowMetrics, axiosOptions);
63866
64333
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
63867
64334
  const localVarOperationServerBasePath = operationServerMap['WorkflowsApi.getWorkflow']?.[localVarOperationServerIndex]?.url;
63868
64335
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
63869
64336
  },
63870
64337
  /**
63871
- * Use this API to get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
64338
+ * Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
63872
64339
  * @summary Get Workflow Execution
63873
64340
  * @param {string} id Workflow execution ID.
63874
64341
  * @param {*} [axiosOptions] Override http request option.
@@ -63969,11 +64436,15 @@ export const WorkflowsApiFp = function(configuration?: Configuration) {
63969
64436
  /**
63970
64437
  * List all workflows in the tenant.
63971
64438
  * @summary List Workflows
64439
+ * @param {string} [triggerId] Trigger ID
64440
+ * @param {string} [connectorInstanceId] Connector Instance ID
64441
+ * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
64442
+ * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
63972
64443
  * @param {*} [axiosOptions] Override http request option.
63973
64444
  * @throws {RequiredError}
63974
64445
  */
63975
- async listWorkflows(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<Workflow>>> {
63976
- const localVarAxiosArgs = await localVarAxiosParamCreator.listWorkflows(axiosOptions);
64446
+ async listWorkflows(triggerId?: string, connectorInstanceId?: string, limit?: number, offset?: number, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<Workflow>>> {
64447
+ const localVarAxiosArgs = await localVarAxiosParamCreator.listWorkflows(triggerId, connectorInstanceId, limit, offset, axiosOptions);
63977
64448
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
63978
64449
  const localVarOperationServerBasePath = operationServerMap['WorkflowsApi.listWorkflows']?.[localVarOperationServerIndex]?.url;
63979
64450
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
@@ -64102,10 +64573,10 @@ export const WorkflowsApiFactory = function (configuration?: Configuration, base
64102
64573
  * @throws {RequiredError}
64103
64574
  */
64104
64575
  getWorkflow(requestParameters: WorkflowsApiGetWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Workflow> {
64105
- return localVarFp.getWorkflow(requestParameters.id, axiosOptions).then((request) => request(axios, basePath));
64576
+ return localVarFp.getWorkflow(requestParameters.id, requestParameters.workflowMetrics, axiosOptions).then((request) => request(axios, basePath));
64106
64577
  },
64107
64578
  /**
64108
- * Use this API to get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
64579
+ * Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
64109
64580
  * @summary Get Workflow Execution
64110
64581
  * @param {WorkflowsApiGetWorkflowExecutionRequest} requestParameters Request parameters.
64111
64582
  * @param {*} [axiosOptions] Override http request option.
@@ -64176,11 +64647,12 @@ export const WorkflowsApiFactory = function (configuration?: Configuration, base
64176
64647
  /**
64177
64648
  * List all workflows in the tenant.
64178
64649
  * @summary List Workflows
64650
+ * @param {WorkflowsApiListWorkflowsRequest} requestParameters Request parameters.
64179
64651
  * @param {*} [axiosOptions] Override http request option.
64180
64652
  * @throws {RequiredError}
64181
64653
  */
64182
- listWorkflows(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<Workflow>> {
64183
- return localVarFp.listWorkflows(axiosOptions).then((request) => request(axios, basePath));
64654
+ listWorkflows(requestParameters: WorkflowsApiListWorkflowsRequest = {}, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<Workflow>> {
64655
+ return localVarFp.listWorkflows(requestParameters.triggerId, requestParameters.connectorInstanceId, requestParameters.limit, requestParameters.offset, axiosOptions).then((request) => request(axios, basePath));
64184
64656
  },
64185
64657
  /**
64186
64658
  * Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
@@ -64314,6 +64786,13 @@ export interface WorkflowsApiGetWorkflowRequest {
64314
64786
  * @memberof WorkflowsApiGetWorkflow
64315
64787
  */
64316
64788
  readonly id: string
64789
+
64790
+ /**
64791
+ * disable workflow metrics
64792
+ * @type {boolean}
64793
+ * @memberof WorkflowsApiGetWorkflow
64794
+ */
64795
+ readonly workflowMetrics?: boolean
64317
64796
  }
64318
64797
 
64319
64798
  /**
@@ -64463,6 +64942,41 @@ export interface WorkflowsApiListWorkflowLibraryTriggersRequest {
64463
64942
  readonly filters?: string
64464
64943
  }
64465
64944
 
64945
+ /**
64946
+ * Request parameters for listWorkflows operation in WorkflowsApi.
64947
+ * @export
64948
+ * @interface WorkflowsApiListWorkflowsRequest
64949
+ */
64950
+ export interface WorkflowsApiListWorkflowsRequest {
64951
+ /**
64952
+ * Trigger ID
64953
+ * @type {string}
64954
+ * @memberof WorkflowsApiListWorkflows
64955
+ */
64956
+ readonly triggerId?: string
64957
+
64958
+ /**
64959
+ * Connector Instance ID
64960
+ * @type {string}
64961
+ * @memberof WorkflowsApiListWorkflows
64962
+ */
64963
+ readonly connectorInstanceId?: string
64964
+
64965
+ /**
64966
+ * Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
64967
+ * @type {number}
64968
+ * @memberof WorkflowsApiListWorkflows
64969
+ */
64970
+ readonly limit?: number
64971
+
64972
+ /**
64973
+ * Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
64974
+ * @type {number}
64975
+ * @memberof WorkflowsApiListWorkflows
64976
+ */
64977
+ readonly offset?: number
64978
+ }
64979
+
64466
64980
  /**
64467
64981
  * Request parameters for patchWorkflow operation in WorkflowsApi.
64468
64982
  * @export
@@ -64623,11 +65137,11 @@ export class WorkflowsApi extends BaseAPI {
64623
65137
  * @memberof WorkflowsApi
64624
65138
  */
64625
65139
  public getWorkflow(requestParameters: WorkflowsApiGetWorkflowRequest, axiosOptions?: RawAxiosRequestConfig) {
64626
- return WorkflowsApiFp(this.configuration).getWorkflow(requestParameters.id, axiosOptions).then((request) => request(this.axios, this.basePath));
65140
+ return WorkflowsApiFp(this.configuration).getWorkflow(requestParameters.id, requestParameters.workflowMetrics, axiosOptions).then((request) => request(this.axios, this.basePath));
64627
65141
  }
64628
65142
 
64629
65143
  /**
64630
- * Use this API to get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
65144
+ * Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
64631
65145
  * @summary Get Workflow Execution
64632
65146
  * @param {WorkflowsApiGetWorkflowExecutionRequest} requestParameters Request parameters.
64633
65147
  * @param {*} [axiosOptions] Override http request option.
@@ -64712,12 +65226,13 @@ export class WorkflowsApi extends BaseAPI {
64712
65226
  /**
64713
65227
  * List all workflows in the tenant.
64714
65228
  * @summary List Workflows
65229
+ * @param {WorkflowsApiListWorkflowsRequest} requestParameters Request parameters.
64715
65230
  * @param {*} [axiosOptions] Override http request option.
64716
65231
  * @throws {RequiredError}
64717
65232
  * @memberof WorkflowsApi
64718
65233
  */
64719
- public listWorkflows(axiosOptions?: RawAxiosRequestConfig) {
64720
- return WorkflowsApiFp(this.configuration).listWorkflows(axiosOptions).then((request) => request(this.axios, this.basePath));
65234
+ public listWorkflows(requestParameters: WorkflowsApiListWorkflowsRequest = {}, axiosOptions?: RawAxiosRequestConfig) {
65235
+ return WorkflowsApiFp(this.configuration).listWorkflows(requestParameters.triggerId, requestParameters.connectorInstanceId, requestParameters.limit, requestParameters.offset, axiosOptions).then((request) => request(this.axios, this.basePath));
64721
65236
  }
64722
65237
 
64723
65238
  /**