sailpoint-api-client 1.5.0 → 1.6.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -769,13 +769,13 @@ export interface AccessItemRoleResponseBeta {
769
769
  */
770
770
  export interface AccessProfileApprovalSchemeBeta {
771
771
  /**
772
- * Describes the individual or group that is responsible for an approval step. Values are as follows. **APP_OWNER**: The owner of the Application **OWNER**: Owner of the associated Access Profile or Role **SOURCE_OWNER**: Owner of the Source associated with an Access Profile **MANAGER**: Manager of the Identity making the request **GOVERNANCE_GROUP**: A Governance Group, the ID of which is specified by the **approverId** field
772
+ * Describes the individual or group that is responsible for an approval step. These are the possible values: **APP_OWNER**: The owner of the Application **OWNER**: Owner of the associated Access Profile or Role **SOURCE_OWNER**: Owner of the Source associated with an Access Profile **MANAGER**: Manager of the Identity making the request **GOVERNANCE_GROUP**: A Governance Group, the ID of which is specified by the **approverId** field
773
773
  * @type {string}
774
774
  * @memberof AccessProfileApprovalSchemeBeta
775
775
  */
776
776
  'approverType'?: AccessProfileApprovalSchemeBetaApproverTypeBeta;
777
777
  /**
778
- * Id of the specific approver, used only when approverType is GOVERNANCE_GROUP
778
+ * Specific approver ID. Only use this when the `approverType` is `GOVERNANCE_GROUP`.
779
779
  * @type {string}
780
780
  * @memberof AccessProfileApprovalSchemeBeta
781
781
  */
@@ -790,43 +790,43 @@ export declare const AccessProfileApprovalSchemeBetaApproverTypeBeta: {
790
790
  };
791
791
  export type AccessProfileApprovalSchemeBetaApproverTypeBeta = typeof AccessProfileApprovalSchemeBetaApproverTypeBeta[keyof typeof AccessProfileApprovalSchemeBetaApproverTypeBeta];
792
792
  /**
793
- * Access Profile
793
+ * Access profile.
794
794
  * @export
795
795
  * @interface AccessProfileBeta
796
796
  */
797
797
  export interface AccessProfileBeta {
798
798
  /**
799
- * The ID of the Access Profile
799
+ * Access profile ID.
800
800
  * @type {string}
801
801
  * @memberof AccessProfileBeta
802
802
  */
803
803
  'id'?: string;
804
804
  /**
805
- * Name of the Access Profile
805
+ * Access profile name.
806
806
  * @type {string}
807
807
  * @memberof AccessProfileBeta
808
808
  */
809
809
  'name': string;
810
810
  /**
811
- * Information about the Access Profile
811
+ * Access profile description.
812
812
  * @type {string}
813
813
  * @memberof AccessProfileBeta
814
814
  */
815
815
  'description'?: string | null;
816
816
  /**
817
- * Date the Access Profile was created
817
+ * Date and time when the access profile was created.
818
818
  * @type {string}
819
819
  * @memberof AccessProfileBeta
820
820
  */
821
821
  'created'?: string;
822
822
  /**
823
- * Date the Access Profile was last modified.
823
+ * Date and time when the access profile was last modified.
824
824
  * @type {string}
825
825
  * @memberof AccessProfileBeta
826
826
  */
827
827
  'modified'?: string;
828
828
  /**
829
- * Whether the Access Profile is enabled. If the Access Profile is enabled then you must include at least one Entitlement.
829
+ * Indicates whether the access profile is enabled. If it\'s enabled, you must include at least one entitlement.
830
830
  * @type {boolean}
831
831
  * @memberof AccessProfileBeta
832
832
  */
@@ -844,13 +844,13 @@ export interface AccessProfileBeta {
844
844
  */
845
845
  'source': AccessProfileSourceRefBeta;
846
846
  /**
847
- * A list of entitlements associated with the Access Profile. If enabled is false this is allowed to be empty otherwise it needs to contain at least one Entitlement.
847
+ * List of entitlements associated with the access profile. If `enabled` is false, this can be empty. Otherwise, it must contain at least one entitlement.
848
848
  * @type {Array<EntitlementRefBeta>}
849
849
  * @memberof AccessProfileBeta
850
850
  */
851
851
  'entitlements'?: Array<EntitlementRefBeta> | null;
852
852
  /**
853
- * Whether the Access Profile is requestable via access request. Currently, making an Access Profile non-requestable is only supported for customers enabled with the new Request Center. Otherwise, attempting to create an Access Profile with a value **false** in this field results in a 400 error.
853
+ * Indicates whether the access profile is requestable by access request. Currently, making an access profile non-requestable is only supported for customers enabled with the new Request Center. Otherwise, attempting to create an access profile with a value **false** in this field results in a 400 error.
854
854
  * @type {boolean}
855
855
  * @memberof AccessProfileBeta
856
856
  */
@@ -868,7 +868,7 @@ export interface AccessProfileBeta {
868
868
  */
869
869
  'revocationRequestConfig'?: RevocabilityBeta | null;
870
870
  /**
871
- * List of IDs of segments, if any, to which this Access Profile is assigned.
871
+ * List of segment IDs, if any, that the access profile is assigned to.
872
872
  * @type {Array<string>}
873
873
  * @memberof AccessProfileBeta
874
874
  */
@@ -1137,19 +1137,19 @@ export type AccessProfileRefBetaTypeBeta = typeof AccessProfileRefBetaTypeBeta[k
1137
1137
  */
1138
1138
  export interface AccessProfileSourceRefBeta {
1139
1139
  /**
1140
- * The ID of the Source with with which the Access Profile is associated
1140
+ * ID of the source the access profile is associated with.
1141
1141
  * @type {string}
1142
1142
  * @memberof AccessProfileSourceRefBeta
1143
1143
  */
1144
1144
  'id'?: string;
1145
1145
  /**
1146
- * The type of the Source, will always be SOURCE
1146
+ * Source\'s DTO type.
1147
1147
  * @type {string}
1148
1148
  * @memberof AccessProfileSourceRefBeta
1149
1149
  */
1150
1150
  'type'?: AccessProfileSourceRefBetaTypeBeta;
1151
1151
  /**
1152
- * The display name of the associated Source
1152
+ * Source name.
1153
1153
  * @type {string}
1154
1154
  * @memberof AccessProfileSourceRefBeta
1155
1155
  */
@@ -1283,6 +1283,12 @@ export interface AccessRequestBeta {
1283
1283
  'clientMetadata'?: {
1284
1284
  [key: string]: string;
1285
1285
  };
1286
+ /**
1287
+ * Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
1288
+ * @type {Array<RequestedForDtoRefBeta>}
1289
+ * @memberof AccessRequestBeta
1290
+ */
1291
+ 'requestedForWithRequestedItems'?: Array<RequestedForDtoRefBeta> | null;
1286
1292
  }
1287
1293
  /**
1288
1294
  *
@@ -1493,6 +1499,18 @@ export interface AccessRequestItemBeta {
1493
1499
  * @memberof AccessRequestItemBeta
1494
1500
  */
1495
1501
  'removeDate'?: string;
1502
+ /**
1503
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
1504
+ * @type {string}
1505
+ * @memberof AccessRequestItemBeta
1506
+ */
1507
+ 'assignmentId'?: string | null;
1508
+ /**
1509
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
1510
+ * @type {string}
1511
+ * @memberof AccessRequestItemBeta
1512
+ */
1513
+ 'nativeIdentity'?: string | null;
1496
1514
  }
1497
1515
  export declare const AccessRequestItemBetaTypeBeta: {
1498
1516
  readonly AccessProfile: "ACCESS_PROFILE";
@@ -3117,6 +3135,25 @@ export interface AccountInfoDtoBeta {
3117
3135
  */
3118
3136
  'uuid'?: string;
3119
3137
  }
3138
+ /**
3139
+ *
3140
+ * @export
3141
+ * @interface AccountItemRefBeta
3142
+ */
3143
+ export interface AccountItemRefBeta {
3144
+ /**
3145
+ * The uuid for the account, available under the \'objectguid\' attribute
3146
+ * @type {string}
3147
+ * @memberof AccountItemRefBeta
3148
+ */
3149
+ 'accountUuid'?: string | null;
3150
+ /**
3151
+ * The \'distinguishedName\' attribute for the account
3152
+ * @type {string}
3153
+ * @memberof AccountItemRefBeta
3154
+ */
3155
+ 'nativeIdentity'?: string;
3156
+ }
3120
3157
  /**
3121
3158
  * If an account activity item is associated with an access request, captures details of that request.
3122
3159
  * @export
@@ -4629,7 +4666,7 @@ export interface AttributeDefinitionBeta {
4629
4666
  * @type {AttributeDefinitionSchemaBeta}
4630
4667
  * @memberof AttributeDefinitionBeta
4631
4668
  */
4632
- 'schema'?: AttributeDefinitionSchemaBeta;
4669
+ 'schema'?: AttributeDefinitionSchemaBeta | null;
4633
4670
  /**
4634
4671
  * A human-readable description of the attribute.
4635
4672
  * @type {string}
@@ -4694,6 +4731,7 @@ export declare const AttributeDefinitionTypeBeta: {
4694
4731
  readonly Long: "LONG";
4695
4732
  readonly Int: "INT";
4696
4733
  readonly Boolean: "BOOLEAN";
4734
+ readonly Date: "DATE";
4697
4735
  };
4698
4736
  export type AttributeDefinitionTypeBeta = typeof AttributeDefinitionTypeBeta[keyof typeof AttributeDefinitionTypeBeta];
4699
4737
  /**
@@ -11635,10 +11673,181 @@ export interface GenerateRandomStringBeta {
11635
11673
  'requiresPeriodicRefresh'?: boolean;
11636
11674
  }
11637
11675
  /**
11638
- * @type GetActiveCampaigns200ResponseInnerBeta
11676
+ *
11639
11677
  * @export
11678
+ * @interface GetActiveCampaigns200ResponseInnerBeta
11640
11679
  */
11641
- export type GetActiveCampaigns200ResponseInnerBeta = CampaignBeta | SlimcampaignBeta;
11680
+ export interface GetActiveCampaigns200ResponseInnerBeta {
11681
+ /**
11682
+ * Id of the campaign
11683
+ * @type {string}
11684
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11685
+ */
11686
+ 'id'?: string;
11687
+ /**
11688
+ * The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
11689
+ * @type {string}
11690
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11691
+ */
11692
+ 'name': string;
11693
+ /**
11694
+ * The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
11695
+ * @type {string}
11696
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11697
+ */
11698
+ 'description': string;
11699
+ /**
11700
+ * The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
11701
+ * @type {string}
11702
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11703
+ */
11704
+ 'deadline'?: string;
11705
+ /**
11706
+ * The type of campaign. Could be extended in the future.
11707
+ * @type {string}
11708
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11709
+ */
11710
+ 'type': GetActiveCampaigns200ResponseInnerBetaTypeBeta;
11711
+ /**
11712
+ * Enables email notification for this campaign
11713
+ * @type {boolean}
11714
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11715
+ */
11716
+ 'emailNotificationEnabled'?: boolean;
11717
+ /**
11718
+ * Allows auto revoke for this campaign
11719
+ * @type {boolean}
11720
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11721
+ */
11722
+ 'autoRevokeAllowed'?: boolean;
11723
+ /**
11724
+ * Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
11725
+ * @type {boolean}
11726
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11727
+ */
11728
+ 'recommendationsEnabled'?: boolean;
11729
+ /**
11730
+ * The campaign\'s current status.
11731
+ * @type {string}
11732
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11733
+ */
11734
+ 'status'?: GetActiveCampaigns200ResponseInnerBetaStatusBeta;
11735
+ /**
11736
+ * The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
11737
+ * @type {string}
11738
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11739
+ */
11740
+ 'correlatedStatus'?: GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta;
11741
+ /**
11742
+ * Created time of the campaign
11743
+ * @type {string}
11744
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11745
+ */
11746
+ 'created'?: string;
11747
+ /**
11748
+ * The total number of certifications in this campaign.
11749
+ * @type {number}
11750
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11751
+ */
11752
+ 'totalCertifications'?: number;
11753
+ /**
11754
+ * The number of completed certifications in this campaign.
11755
+ * @type {number}
11756
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11757
+ */
11758
+ 'completedCertifications'?: number;
11759
+ /**
11760
+ * A list of errors and warnings that have accumulated.
11761
+ * @type {Array<CampaignAlertBeta>}
11762
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11763
+ */
11764
+ 'alerts'?: Array<CampaignAlertBeta>;
11765
+ /**
11766
+ * Modified time of the campaign
11767
+ * @type {string}
11768
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11769
+ */
11770
+ 'modified'?: string;
11771
+ /**
11772
+ *
11773
+ * @type {FullcampaignAllOfFilterBeta}
11774
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11775
+ */
11776
+ 'filter'?: FullcampaignAllOfFilterBeta;
11777
+ /**
11778
+ * Determines if comments on sunset date changes are required.
11779
+ * @type {boolean}
11780
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11781
+ */
11782
+ 'sunsetCommentsRequired'?: boolean;
11783
+ /**
11784
+ *
11785
+ * @type {FullcampaignAllOfSourceOwnerCampaignInfoBeta}
11786
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11787
+ */
11788
+ 'sourceOwnerCampaignInfo'?: FullcampaignAllOfSourceOwnerCampaignInfoBeta;
11789
+ /**
11790
+ *
11791
+ * @type {FullcampaignAllOfSearchCampaignInfoBeta}
11792
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11793
+ */
11794
+ 'searchCampaignInfo'?: FullcampaignAllOfSearchCampaignInfoBeta;
11795
+ /**
11796
+ *
11797
+ * @type {FullcampaignAllOfRoleCompositionCampaignInfoBeta}
11798
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11799
+ */
11800
+ 'roleCompositionCampaignInfo'?: FullcampaignAllOfRoleCompositionCampaignInfoBeta;
11801
+ /**
11802
+ *
11803
+ * @type {FullcampaignAllOfMachineAccountCampaignInfoBeta}
11804
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11805
+ */
11806
+ 'machineAccountCampaignInfo'?: FullcampaignAllOfMachineAccountCampaignInfoBeta;
11807
+ /**
11808
+ * A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
11809
+ * @type {Array<FullcampaignAllOfSourcesWithOrphanEntitlementsBeta>}
11810
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11811
+ */
11812
+ 'sourcesWithOrphanEntitlements'?: Array<FullcampaignAllOfSourcesWithOrphanEntitlementsBeta>;
11813
+ /**
11814
+ * Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
11815
+ * @type {string}
11816
+ * @memberof GetActiveCampaigns200ResponseInnerBeta
11817
+ */
11818
+ 'mandatoryCommentRequirement'?: GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta;
11819
+ }
11820
+ export declare const GetActiveCampaigns200ResponseInnerBetaTypeBeta: {
11821
+ readonly Manager: "MANAGER";
11822
+ readonly SourceOwner: "SOURCE_OWNER";
11823
+ readonly Search: "SEARCH";
11824
+ readonly RoleComposition: "ROLE_COMPOSITION";
11825
+ readonly MachineAccount: "MACHINE_ACCOUNT";
11826
+ };
11827
+ export type GetActiveCampaigns200ResponseInnerBetaTypeBeta = typeof GetActiveCampaigns200ResponseInnerBetaTypeBeta[keyof typeof GetActiveCampaigns200ResponseInnerBetaTypeBeta];
11828
+ export declare const GetActiveCampaigns200ResponseInnerBetaStatusBeta: {
11829
+ readonly Pending: "PENDING";
11830
+ readonly Staged: "STAGED";
11831
+ readonly Canceling: "CANCELING";
11832
+ readonly Activating: "ACTIVATING";
11833
+ readonly Active: "ACTIVE";
11834
+ readonly Completing: "COMPLETING";
11835
+ readonly Completed: "COMPLETED";
11836
+ readonly Error: "ERROR";
11837
+ readonly Archived: "ARCHIVED";
11838
+ };
11839
+ export type GetActiveCampaigns200ResponseInnerBetaStatusBeta = typeof GetActiveCampaigns200ResponseInnerBetaStatusBeta[keyof typeof GetActiveCampaigns200ResponseInnerBetaStatusBeta];
11840
+ export declare const GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta: {
11841
+ readonly Correlated: "CORRELATED";
11842
+ readonly Uncorrelated: "UNCORRELATED";
11843
+ };
11844
+ export type GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta = typeof GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta[keyof typeof GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta];
11845
+ export declare const GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta: {
11846
+ readonly AllDecisions: "ALL_DECISIONS";
11847
+ readonly RevokeOnlyDecisions: "REVOKE_ONLY_DECISIONS";
11848
+ readonly NoDecisions: "NO_DECISIONS";
11849
+ };
11850
+ export type GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta = typeof GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta[keyof typeof GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta];
11642
11851
  /**
11643
11852
  * @type GetDiscoveredApplications200ResponseInnerBeta
11644
11853
  * @export
@@ -19074,7 +19283,7 @@ export declare const OwnerDtoBetaTypeBeta: {
19074
19283
  };
19075
19284
  export type OwnerDtoBetaTypeBeta = typeof OwnerDtoBetaTypeBeta[keyof typeof OwnerDtoBetaTypeBeta];
19076
19285
  /**
19077
- * The owner of this object.
19286
+ * Owner of the object.
19078
19287
  * @export
19079
19288
  * @interface OwnerReferenceBeta
19080
19289
  */
@@ -19086,13 +19295,13 @@ export interface OwnerReferenceBeta {
19086
19295
  */
19087
19296
  'type'?: OwnerReferenceBetaTypeBeta;
19088
19297
  /**
19089
- * Identity id
19298
+ * Owner\'s identity ID.
19090
19299
  * @type {string}
19091
19300
  * @memberof OwnerReferenceBeta
19092
19301
  */
19093
19302
  'id'?: string;
19094
19303
  /**
19095
- * Human-readable display name of the owner. It may be left null or omitted in a POST or PATCH. If set, it must match the current value of the owner\'s display name, otherwise a 400 Bad Request error will result.
19304
+ * Owner\'s name. It may be left null or omitted in a POST or PATCH. If set, it must match the current value of the owner\'s display name, otherwise a 400 Bad Request error will result.
19096
19305
  * @type {string}
19097
19306
  * @memberof OwnerReferenceBeta
19098
19307
  */
@@ -19710,19 +19919,6 @@ export declare const PatchPotentialRoleRequestInnerBetaOpBeta: {
19710
19919
  readonly Replace: "replace";
19711
19920
  };
19712
19921
  export type PatchPotentialRoleRequestInnerBetaOpBeta = typeof PatchPotentialRoleRequestInnerBetaOpBeta[keyof typeof PatchPotentialRoleRequestInnerBetaOpBeta];
19713
- /**
19714
- * A JSONPatch document as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902). Only `replace` operations are accepted by this endpoint.
19715
- * @export
19716
- * @interface PatchServiceDeskIntegrationRequestBeta
19717
- */
19718
- export interface PatchServiceDeskIntegrationRequestBeta {
19719
- /**
19720
- * Operations to be applied
19721
- * @type {Array<JsonPatchOperationBeta>}
19722
- * @memberof PatchServiceDeskIntegrationRequestBeta
19723
- */
19724
- 'operations'?: Array<JsonPatchOperationBeta>;
19725
- }
19726
19922
  /**
19727
19923
  *
19728
19924
  * @export
@@ -20467,7 +20663,7 @@ export interface ProvisioningConfigPlanInitializerScriptBeta {
20467
20663
  'source'?: string;
20468
20664
  }
20469
20665
  /**
20470
- * Defines matching criteria for an Account to be provisioned with a specific Access Profile
20666
+ * Defines matching criteria for an account to be provisioned with a specific access profile.
20471
20667
  * @export
20472
20668
  * @interface ProvisioningCriteriaLevel1Beta
20473
20669
  */
@@ -20479,26 +20675,26 @@ export interface ProvisioningCriteriaLevel1Beta {
20479
20675
  */
20480
20676
  'operation'?: ProvisioningCriteriaOperationBeta;
20481
20677
  /**
20482
- * Name of the Account attribute to be tested. If **operation** is one of EQUALS, NOT_EQUALS, CONTAINS, or HAS, this field is required. Otherwise, specifying it is an error.
20678
+ * Name of the account attribute to be tested. If **operation** is one of `EQUALS`, `NOT_EQUALS`, `CONTAINS`, or `HAS`, this field is required. Otherwise, specifying it results in an error.
20483
20679
  * @type {string}
20484
20680
  * @memberof ProvisioningCriteriaLevel1Beta
20485
20681
  */
20486
20682
  'attribute'?: string | null;
20487
20683
  /**
20488
- * String value to test the Account attribute w/r/t the specified operation. If the operation is one of EQUALS, NOT_EQUALS, or CONTAINS, this field is required. Otherwise, specifying it is an error. If the Attribute is not String-typed, it will be converted to the appropriate type.
20684
+ * String value to test the account attribute w/r/t the specified operation. If the operation is one of `EQUALS`, `NOT_EQUALS`, or `CONTAINS`, this field is required. Otherwise, specifying it results in an error. If the attribute is not string-typed, the API will convert it to the appropriate type.
20489
20685
  * @type {string}
20490
20686
  * @memberof ProvisioningCriteriaLevel1Beta
20491
20687
  */
20492
20688
  'value'?: string | null;
20493
20689
  /**
20494
- * Array of child criteria. Required if the operation is AND or OR, otherwise it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
20690
+ * Array of child criteria. This field is required if the operation is `AND` or `OR`. Otherwise, it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
20495
20691
  * @type {Array<ProvisioningCriteriaLevel2Beta>}
20496
20692
  * @memberof ProvisioningCriteriaLevel1Beta
20497
20693
  */
20498
20694
  'children'?: Array<ProvisioningCriteriaLevel2Beta> | null;
20499
20695
  }
20500
20696
  /**
20501
- * Defines matching criteria for an Account to be provisioned with a specific Access Profile
20697
+ * Defines matching criteria for an account to be provisioned with a specific access profile.
20502
20698
  * @export
20503
20699
  * @interface ProvisioningCriteriaLevel2Beta
20504
20700
  */
@@ -20510,26 +20706,26 @@ export interface ProvisioningCriteriaLevel2Beta {
20510
20706
  */
20511
20707
  'operation'?: ProvisioningCriteriaOperationBeta;
20512
20708
  /**
20513
- * Name of the Account attribute to be tested. If **operation** is one of EQUALS, NOT_EQUALS, CONTAINS, or HAS, this field is required. Otherwise, specifying it is an error.
20709
+ * Name of the account attribute to be tested. If **operation** is one of `EQUALS`, `NOT_EQUALS`, `CONTAINS`, or `HAS`, this field is required. Otherwise, specifying it results in an error.
20514
20710
  * @type {string}
20515
20711
  * @memberof ProvisioningCriteriaLevel2Beta
20516
20712
  */
20517
20713
  'attribute'?: string | null;
20518
20714
  /**
20519
- * String value to test the Account attribute w/r/t the specified operation. If the operation is one of EQUALS, NOT_EQUALS, or CONTAINS, this field is required. Otherwise, specifying it is an error. If the Attribute is not String-typed, it will be converted to the appropriate type.
20715
+ * String value to test the account attribute w/r/t the specified operation. If the operation is one of `EQUALS`, `NOT_EQUALS`, or `CONTAINS`, this field is required. Otherwise, specifying it results in an error. If the attribute is not string-typed, the API will convert it to the appropriate type.
20520
20716
  * @type {string}
20521
20717
  * @memberof ProvisioningCriteriaLevel2Beta
20522
20718
  */
20523
20719
  'value'?: string | null;
20524
20720
  /**
20525
- * Array of child criteria. Required if the operation is AND or OR, otherwise it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
20721
+ * Array of child criteria. This field is required if the operation is `AND` or `OR`. Otherwise, it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
20526
20722
  * @type {Array<ProvisioningCriteriaLevel3Beta>}
20527
20723
  * @memberof ProvisioningCriteriaLevel2Beta
20528
20724
  */
20529
20725
  'children'?: Array<ProvisioningCriteriaLevel3Beta> | null;
20530
20726
  }
20531
20727
  /**
20532
- * Defines matching criteria for an Account to be provisioned with a specific Access Profile
20728
+ * Defines matching criteria for an account to be provisioned with a specific access profile.
20533
20729
  * @export
20534
20730
  * @interface ProvisioningCriteriaLevel3Beta
20535
20731
  */
@@ -20541,26 +20737,26 @@ export interface ProvisioningCriteriaLevel3Beta {
20541
20737
  */
20542
20738
  'operation'?: ProvisioningCriteriaOperationBeta;
20543
20739
  /**
20544
- * Name of the Account attribute to be tested. If **operation** is one of EQUALS, NOT_EQUALS, CONTAINS, or HAS, this field is required. Otherwise, specifying it is an error.
20740
+ * Name of the account attribute to be tested. If **operation** is one of `EQUALS`, `NOT_EQUALS`, `CONTAINS`, or `HAS`, this field is required. Otherwise, specifying it results in an error.
20545
20741
  * @type {string}
20546
20742
  * @memberof ProvisioningCriteriaLevel3Beta
20547
20743
  */
20548
20744
  'attribute'?: string | null;
20549
20745
  /**
20550
- * String value to test the Account attribute w/r/t the specified operation. If the operation is one of EQUALS, NOT_EQUALS, or CONTAINS, this field is required. Otherwise, specifying it is an error. If the Attribute is not String-typed, it will be converted to the appropriate type.
20746
+ * String value to test the account attribute w/r/t the specified operation. If the operation is one of `EQUALS`, `NOT_EQUALS`, or `CONTAINS`, this field is required. Otherwise, specifying it results in an error. If the attribute is not string-typed, the API will convert it to the appropriate type.
20551
20747
  * @type {string}
20552
20748
  * @memberof ProvisioningCriteriaLevel3Beta
20553
20749
  */
20554
- 'value'?: string;
20750
+ 'value'?: string | null;
20555
20751
  /**
20556
- * Array of child criteria. Required if the operation is AND or OR, otherwise it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
20752
+ * Array of child criteria. This field is required if the operation is `AND` or `OR`. Otherwise, it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
20557
20753
  * @type {string}
20558
20754
  * @memberof ProvisioningCriteriaLevel3Beta
20559
20755
  */
20560
20756
  'children'?: string | null;
20561
20757
  }
20562
20758
  /**
20563
- * Supported operations on ProvisioningCriteria
20759
+ * Supported operations on `ProvisioningCriteria`.
20564
20760
  * @export
20565
20761
  * @enum {string}
20566
20762
  */
@@ -20597,7 +20793,7 @@ export interface ProvisioningPolicyDtoBeta {
20597
20793
  * @type {string}
20598
20794
  * @memberof ProvisioningPolicyDtoBeta
20599
20795
  */
20600
- 'name': string;
20796
+ 'name': string | null;
20601
20797
  /**
20602
20798
  * the description of the provisioning policy
20603
20799
  * @type {string}
@@ -21399,19 +21595,25 @@ export interface RequestOnBehalfOfConfigBeta {
21399
21595
  */
21400
21596
  export interface RequestabilityBeta {
21401
21597
  /**
21402
- * Whether the requester of the containing object must provide comments justifying the request
21598
+ * Indicates whether the requester of the containing object must provide comments justifying the request.
21403
21599
  * @type {boolean}
21404
21600
  * @memberof RequestabilityBeta
21405
21601
  */
21406
21602
  'commentsRequired'?: boolean | null;
21407
21603
  /**
21408
- * Whether an approver must provide comments when denying the request
21604
+ * Indicates whether an approver must provide comments when denying the request.
21409
21605
  * @type {boolean}
21410
21606
  * @memberof RequestabilityBeta
21411
21607
  */
21412
21608
  'denialCommentsRequired'?: boolean | null;
21413
21609
  /**
21414
- * List describing the steps in approving the request
21610
+ * Indicates whether reauthorization is required for the request.
21611
+ * @type {boolean}
21612
+ * @memberof RequestabilityBeta
21613
+ */
21614
+ 'reauthorizationRequired'?: boolean | null;
21615
+ /**
21616
+ * List describing the steps involved in approving the request.
21415
21617
  * @type {Array<AccessProfileApprovalSchemeBeta>}
21416
21618
  * @memberof RequestabilityBeta
21417
21619
  */
@@ -21435,6 +21637,12 @@ export interface RequestabilityForRoleBeta {
21435
21637
  * @memberof RequestabilityForRoleBeta
21436
21638
  */
21437
21639
  'denialCommentsRequired'?: boolean | null;
21640
+ /**
21641
+ * Indicates whether reauthorization is required for the request.
21642
+ * @type {boolean}
21643
+ * @memberof RequestabilityForRoleBeta
21644
+ */
21645
+ 'reauthorizationRequired'?: boolean | null;
21438
21646
  /**
21439
21647
  * List describing the steps in approving the request
21440
21648
  * @type {Array<ApprovalSchemeForRoleBeta>}
@@ -21605,6 +21813,25 @@ export interface RequestedAccountRefBeta {
21605
21813
  */
21606
21814
  'sourceName'?: string;
21607
21815
  }
21816
+ /**
21817
+ *
21818
+ * @export
21819
+ * @interface RequestedForDtoRefBeta
21820
+ */
21821
+ export interface RequestedForDtoRefBeta {
21822
+ /**
21823
+ * The identity id for which the access is requested
21824
+ * @type {string}
21825
+ * @memberof RequestedForDtoRefBeta
21826
+ */
21827
+ 'identityId': string;
21828
+ /**
21829
+ * the details for the access items that are requested for the identity
21830
+ * @type {Array<RequestedItemDtoRefBeta>}
21831
+ * @memberof RequestedForDtoRefBeta
21832
+ */
21833
+ 'requestedItems': Array<RequestedItemDtoRefBeta>;
21834
+ }
21608
21835
  /**
21609
21836
  *
21610
21837
  * @export
@@ -21630,6 +21857,69 @@ export declare const RequestedItemDetailsBetaTypeBeta: {
21630
21857
  readonly Role: "ROLE";
21631
21858
  };
21632
21859
  export type RequestedItemDetailsBetaTypeBeta = typeof RequestedItemDetailsBetaTypeBeta[keyof typeof RequestedItemDetailsBetaTypeBeta];
21860
+ /**
21861
+ *
21862
+ * @export
21863
+ * @interface RequestedItemDtoRefBeta
21864
+ */
21865
+ export interface RequestedItemDtoRefBeta {
21866
+ /**
21867
+ * The type of the item being requested.
21868
+ * @type {string}
21869
+ * @memberof RequestedItemDtoRefBeta
21870
+ */
21871
+ 'type': RequestedItemDtoRefBetaTypeBeta;
21872
+ /**
21873
+ * ID of Role, Access Profile or Entitlement being requested.
21874
+ * @type {string}
21875
+ * @memberof RequestedItemDtoRefBeta
21876
+ */
21877
+ 'id': string;
21878
+ /**
21879
+ * Comment provided by requester. * Comment is required when the request is of type Revoke Access.
21880
+ * @type {string}
21881
+ * @memberof RequestedItemDtoRefBeta
21882
+ */
21883
+ 'comment'?: string;
21884
+ /**
21885
+ * Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
21886
+ * @type {{ [key: string]: string; }}
21887
+ * @memberof RequestedItemDtoRefBeta
21888
+ */
21889
+ 'clientMetadata'?: {
21890
+ [key: string]: string;
21891
+ };
21892
+ /**
21893
+ * The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
21894
+ * @type {string}
21895
+ * @memberof RequestedItemDtoRefBeta
21896
+ */
21897
+ 'removeDate'?: string;
21898
+ /**
21899
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
21900
+ * @type {string}
21901
+ * @memberof RequestedItemDtoRefBeta
21902
+ */
21903
+ 'assignmentId'?: string | null;
21904
+ /**
21905
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
21906
+ * @type {string}
21907
+ * @memberof RequestedItemDtoRefBeta
21908
+ */
21909
+ 'nativeIdentity'?: string | null;
21910
+ /**
21911
+ * The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
21912
+ * @type {Array<SourceItemRefBeta>}
21913
+ * @memberof RequestedItemDtoRefBeta
21914
+ */
21915
+ 'accountSelection'?: Array<SourceItemRefBeta> | null;
21916
+ }
21917
+ export declare const RequestedItemDtoRefBetaTypeBeta: {
21918
+ readonly AccessProfile: "ACCESS_PROFILE";
21919
+ readonly Role: "ROLE";
21920
+ readonly Entitlement: "ENTITLEMENT";
21921
+ };
21922
+ export type RequestedItemDtoRefBetaTypeBeta = typeof RequestedItemDtoRefBetaTypeBeta[keyof typeof RequestedItemDtoRefBetaTypeBeta];
21633
21923
  /**
21634
21924
  *
21635
21925
  * @export
@@ -22198,7 +22488,7 @@ export type ReviewerBetaTypeBeta = typeof ReviewerBetaTypeBeta[keyof typeof Revi
22198
22488
  */
22199
22489
  export interface RevocabilityBeta {
22200
22490
  /**
22201
- * List describing the steps in approving the revocation request
22491
+ * List describing the steps involved in approving the revocation request.
22202
22492
  * @type {Array<AccessProfileApprovalSchemeBeta>}
22203
22493
  * @memberof RevocabilityBeta
22204
22494
  */
@@ -24583,7 +24873,7 @@ export interface SchemaBeta {
24583
24873
  * @type {string}
24584
24874
  * @memberof SchemaBeta
24585
24875
  */
24586
- 'hierarchyAttribute'?: string;
24876
+ 'hierarchyAttribute'?: string | null;
24587
24877
  /**
24588
24878
  * Flag indicating whether or not the include permissions with the object data when aggregating the schema.
24589
24879
  * @type {boolean}
@@ -24619,7 +24909,7 @@ export interface SchemaBeta {
24619
24909
  * @type {string}
24620
24910
  * @memberof SchemaBeta
24621
24911
  */
24622
- 'modified'?: string;
24912
+ 'modified'?: string | null;
24623
24913
  }
24624
24914
  export declare const SchemaBetaFeaturesBeta: {
24625
24915
  readonly Authenticate: "AUTHENTICATE";
@@ -27381,6 +27671,25 @@ export interface SourceEntitlementRequestConfigBeta {
27381
27671
  */
27382
27672
  'accessRequestConfig'?: EntitlementAccessRequestConfigBeta;
27383
27673
  }
27674
+ /**
27675
+ *
27676
+ * @export
27677
+ * @interface SourceItemRefBeta
27678
+ */
27679
+ export interface SourceItemRefBeta {
27680
+ /**
27681
+ * The id for the source on which account selections are made
27682
+ * @type {string}
27683
+ * @memberof SourceItemRefBeta
27684
+ */
27685
+ 'sourceId'?: string | null;
27686
+ /**
27687
+ * A list of account selections on the source. Currently, only one selection per source is supported.
27688
+ * @type {Array<AccountItemRefBeta>}
27689
+ * @memberof SourceItemRefBeta
27690
+ */
27691
+ 'accounts'?: Array<AccountItemRefBeta> | null;
27692
+ }
27384
27693
  /**
27385
27694
  *
27386
27695
  * @export
@@ -32368,7 +32677,7 @@ export declare class AccessModelMetadataBetaApi extends BaseAPI {
32368
32677
  */
32369
32678
  export declare const AccessProfilesBetaApiAxiosParamCreator: (configuration?: Configuration) => {
32370
32679
  /**
32371
- * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
32680
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
32372
32681
  * @summary Create Access Profile
32373
32682
  * @param {AccessProfileBeta} accessProfileBeta
32374
32683
  * @param {*} [axiosOptions] Override http request option.
@@ -32451,7 +32760,7 @@ export declare const AccessProfilesBetaApiAxiosParamCreator: (configuration?: Co
32451
32760
  */
32452
32761
  export declare const AccessProfilesBetaApiFp: (configuration?: Configuration) => {
32453
32762
  /**
32454
- * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
32763
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
32455
32764
  * @summary Create Access Profile
32456
32765
  * @param {AccessProfileBeta} accessProfileBeta
32457
32766
  * @param {*} [axiosOptions] Override http request option.
@@ -32534,7 +32843,7 @@ export declare const AccessProfilesBetaApiFp: (configuration?: Configuration) =>
32534
32843
  */
32535
32844
  export declare const AccessProfilesBetaApiFactory: (configuration?: Configuration, basePath?: string, axios?: AxiosInstance) => {
32536
32845
  /**
32537
- * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
32846
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
32538
32847
  * @summary Create Access Profile
32539
32848
  * @param {AccessProfilesBetaApiCreateAccessProfileRequest} requestParameters Request parameters.
32540
32849
  * @param {*} [axiosOptions] Override http request option.
@@ -32788,7 +33097,7 @@ export interface AccessProfilesBetaApiUpdateAccessProfilesInBulkRequest {
32788
33097
  */
32789
33098
  export declare class AccessProfilesBetaApi extends BaseAPI {
32790
33099
  /**
32791
- * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
33100
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
32792
33101
  * @summary Create Access Profile
32793
33102
  * @param {AccessProfilesBetaApiCreateAccessProfileRequest} requestParameters Request parameters.
32794
33103
  * @param {*} [axiosOptions] Override http request option.
@@ -33393,7 +33702,7 @@ export declare const AccessRequestsBetaApiAxiosParamCreator: (configuration?: Co
33393
33702
  */
33394
33703
  closeAccessRequest: (closeAccessRequestBeta: CloseAccessRequestBeta, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
33395
33704
  /**
33396
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
33705
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
33397
33706
  * @summary Submit Access Request
33398
33707
  * @param {AccessRequestBeta} accessRequestBeta
33399
33708
  * @param {*} [axiosOptions] Override http request option.
@@ -33455,7 +33764,7 @@ export declare const AccessRequestsBetaApiFp: (configuration?: Configuration) =>
33455
33764
  */
33456
33765
  closeAccessRequest(closeAccessRequestBeta: CloseAccessRequestBeta, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<object>>;
33457
33766
  /**
33458
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
33767
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
33459
33768
  * @summary Submit Access Request
33460
33769
  * @param {AccessRequestBeta} accessRequestBeta
33461
33770
  * @param {*} [axiosOptions] Override http request option.
@@ -33517,7 +33826,7 @@ export declare const AccessRequestsBetaApiFactory: (configuration?: Configuratio
33517
33826
  */
33518
33827
  closeAccessRequest(requestParameters: AccessRequestsBetaApiCloseAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<object>;
33519
33828
  /**
33520
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
33829
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
33521
33830
  * @summary Submit Access Request
33522
33831
  * @param {AccessRequestsBetaApiCreateAccessRequestRequest} requestParameters Request parameters.
33523
33832
  * @param {*} [axiosOptions] Override http request option.
@@ -33693,7 +34002,7 @@ export declare class AccessRequestsBetaApi extends BaseAPI {
33693
34002
  */
33694
34003
  closeAccessRequest(requestParameters: AccessRequestsBetaApiCloseAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<object, any>>;
33695
34004
  /**
33696
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
34005
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
33697
34006
  * @summary Submit Access Request
33698
34007
  * @param {AccessRequestsBetaApiCreateAccessRequestRequest} requestParameters Request parameters.
33699
34008
  * @param {*} [axiosOptions] Override http request option.
@@ -57264,11 +57573,11 @@ export declare const ServiceDeskIntegrationBetaApiAxiosParamCreator: (configurat
57264
57573
  * Update an existing Service Desk integration by ID with a PATCH request.
57265
57574
  * @summary Patch a Service Desk Integration
57266
57575
  * @param {string} id ID of the Service Desk integration to update
57267
- * @param {PatchServiceDeskIntegrationRequestBeta} patchServiceDeskIntegrationRequestBeta A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
57576
+ * @param {Array<JsonPatchOperationBeta>} jsonPatchOperationBeta A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
57268
57577
  * @param {*} [axiosOptions] Override http request option.
57269
57578
  * @throws {RequiredError}
57270
57579
  */
57271
- patchServiceDeskIntegration: (id: string, patchServiceDeskIntegrationRequestBeta: PatchServiceDeskIntegrationRequestBeta, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
57580
+ patchServiceDeskIntegration: (id: string, jsonPatchOperationBeta: Array<JsonPatchOperationBeta>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
57272
57581
  /**
57273
57582
  * Update an existing Service Desk integration by ID.
57274
57583
  * @summary Update a Service Desk integration
@@ -57354,11 +57663,11 @@ export declare const ServiceDeskIntegrationBetaApiFp: (configuration?: Configura
57354
57663
  * Update an existing Service Desk integration by ID with a PATCH request.
57355
57664
  * @summary Patch a Service Desk Integration
57356
57665
  * @param {string} id ID of the Service Desk integration to update
57357
- * @param {PatchServiceDeskIntegrationRequestBeta} patchServiceDeskIntegrationRequestBeta A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
57666
+ * @param {Array<JsonPatchOperationBeta>} jsonPatchOperationBeta A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
57358
57667
  * @param {*} [axiosOptions] Override http request option.
57359
57668
  * @throws {RequiredError}
57360
57669
  */
57361
- patchServiceDeskIntegration(id: string, patchServiceDeskIntegrationRequestBeta: PatchServiceDeskIntegrationRequestBeta, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceDeskIntegrationDtoBeta>>;
57670
+ patchServiceDeskIntegration(id: string, jsonPatchOperationBeta: Array<JsonPatchOperationBeta>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceDeskIntegrationDtoBeta>>;
57362
57671
  /**
57363
57672
  * Update an existing Service Desk integration by ID.
57364
57673
  * @summary Update a Service Desk integration
@@ -57564,10 +57873,10 @@ export interface ServiceDeskIntegrationBetaApiPatchServiceDeskIntegrationRequest
57564
57873
  readonly id: string;
57565
57874
  /**
57566
57875
  * A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
57567
- * @type {PatchServiceDeskIntegrationRequestBeta}
57876
+ * @type {Array<JsonPatchOperationBeta>}
57568
57877
  * @memberof ServiceDeskIntegrationBetaApiPatchServiceDeskIntegration
57569
57878
  */
57570
- readonly patchServiceDeskIntegrationRequestBeta: PatchServiceDeskIntegrationRequestBeta;
57879
+ readonly jsonPatchOperationBeta: Array<JsonPatchOperationBeta>;
57571
57880
  }
57572
57881
  /**
57573
57882
  * Request parameters for putServiceDeskIntegration operation in ServiceDeskIntegrationBetaApi.
@@ -64125,10 +64434,11 @@ export declare const WorkflowsBetaApiAxiosParamCreator: (configuration?: Configu
64125
64434
  * Get a single workflow by id.
64126
64435
  * @summary Get Workflow By Id
64127
64436
  * @param {string} id Id of the workflow
64437
+ * @param {boolean} [workflowMetrics] disable workflow metrics
64128
64438
  * @param {*} [axiosOptions] Override http request option.
64129
64439
  * @throws {RequiredError}
64130
64440
  */
64131
- getWorkflow: (id: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
64441
+ getWorkflow: (id: string, workflowMetrics?: boolean, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
64132
64442
  /**
64133
64443
  * Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
64134
64444
  * @summary Get Workflow Execution
@@ -64196,10 +64506,14 @@ export declare const WorkflowsBetaApiAxiosParamCreator: (configuration?: Configu
64196
64506
  /**
64197
64507
  * List all workflows in the tenant.
64198
64508
  * @summary List Workflows
64509
+ * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
64510
+ * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
64511
+ * @param {string} [triggerId] Trigger ID
64512
+ * @param {string} [connectorInstanceId] Connector Instance ID
64199
64513
  * @param {*} [axiosOptions] Override http request option.
64200
64514
  * @throws {RequiredError}
64201
64515
  */
64202
- listWorkflows: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
64516
+ listWorkflows: (limit?: number, offset?: number, triggerId?: string, connectorInstanceId?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
64203
64517
  /**
64204
64518
  * Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
64205
64519
  * @summary Patch Workflow
@@ -64226,6 +64540,15 @@ export declare const WorkflowsBetaApiAxiosParamCreator: (configuration?: Configu
64226
64540
  * @throws {RequiredError}
64227
64541
  */
64228
64542
  postWorkflowExternalTrigger: (id: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
64543
+ /**
64544
+ * Perform a full update of a workflow. The updated workflow object is returned in the response.
64545
+ * @summary Update Workflow
64546
+ * @param {string} id Id of the Workflow
64547
+ * @param {WorkflowBodyBeta} workflowBodyBeta
64548
+ * @param {*} [axiosOptions] Override http request option.
64549
+ * @throws {RequiredError}
64550
+ */
64551
+ putWorkflow: (id: string, workflowBodyBeta: WorkflowBodyBeta, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
64229
64552
  /**
64230
64553
  * Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
64231
64554
  * @summary Test Workflow via External Trigger
@@ -64244,15 +64567,6 @@ export declare const WorkflowsBetaApiAxiosParamCreator: (configuration?: Configu
64244
64567
  * @throws {RequiredError}
64245
64568
  */
64246
64569
  testWorkflow: (id: string, testWorkflowRequestBeta: TestWorkflowRequestBeta, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
64247
- /**
64248
- * Perform a full update of a workflow. The updated workflow object is returned in the response.
64249
- * @summary Update Workflow
64250
- * @param {string} id Id of the Workflow
64251
- * @param {WorkflowBodyBeta} workflowBodyBeta
64252
- * @param {*} [axiosOptions] Override http request option.
64253
- * @throws {RequiredError}
64254
- */
64255
- updateWorkflow: (id: string, workflowBodyBeta: WorkflowBodyBeta, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
64256
64570
  };
64257
64571
  /**
64258
64572
  * WorkflowsBetaApi - functional programming interface
@@ -64287,10 +64601,11 @@ export declare const WorkflowsBetaApiFp: (configuration?: Configuration) => {
64287
64601
  * Get a single workflow by id.
64288
64602
  * @summary Get Workflow By Id
64289
64603
  * @param {string} id Id of the workflow
64604
+ * @param {boolean} [workflowMetrics] disable workflow metrics
64290
64605
  * @param {*} [axiosOptions] Override http request option.
64291
64606
  * @throws {RequiredError}
64292
64607
  */
64293
- getWorkflow(id: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowBeta>>;
64608
+ getWorkflow(id: string, workflowMetrics?: boolean, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowBeta>>;
64294
64609
  /**
64295
64610
  * Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
64296
64611
  * @summary Get Workflow Execution
@@ -64358,10 +64673,14 @@ export declare const WorkflowsBetaApiFp: (configuration?: Configuration) => {
64358
64673
  /**
64359
64674
  * List all workflows in the tenant.
64360
64675
  * @summary List Workflows
64676
+ * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
64677
+ * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
64678
+ * @param {string} [triggerId] Trigger ID
64679
+ * @param {string} [connectorInstanceId] Connector Instance ID
64361
64680
  * @param {*} [axiosOptions] Override http request option.
64362
64681
  * @throws {RequiredError}
64363
64682
  */
64364
- listWorkflows(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<WorkflowBeta>>>;
64683
+ listWorkflows(limit?: number, offset?: number, triggerId?: string, connectorInstanceId?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<WorkflowBeta>>>;
64365
64684
  /**
64366
64685
  * Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
64367
64686
  * @summary Patch Workflow
@@ -64388,6 +64707,15 @@ export declare const WorkflowsBetaApiFp: (configuration?: Configuration) => {
64388
64707
  * @throws {RequiredError}
64389
64708
  */
64390
64709
  postWorkflowExternalTrigger(id: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowOAuthClientBeta>>;
64710
+ /**
64711
+ * Perform a full update of a workflow. The updated workflow object is returned in the response.
64712
+ * @summary Update Workflow
64713
+ * @param {string} id Id of the Workflow
64714
+ * @param {WorkflowBodyBeta} workflowBodyBeta
64715
+ * @param {*} [axiosOptions] Override http request option.
64716
+ * @throws {RequiredError}
64717
+ */
64718
+ putWorkflow(id: string, workflowBodyBeta: WorkflowBodyBeta, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowBeta>>;
64391
64719
  /**
64392
64720
  * Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
64393
64721
  * @summary Test Workflow via External Trigger
@@ -64406,15 +64734,6 @@ export declare const WorkflowsBetaApiFp: (configuration?: Configuration) => {
64406
64734
  * @throws {RequiredError}
64407
64735
  */
64408
64736
  testWorkflow(id: string, testWorkflowRequestBeta: TestWorkflowRequestBeta, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<TestWorkflow200ResponseBeta>>;
64409
- /**
64410
- * Perform a full update of a workflow. The updated workflow object is returned in the response.
64411
- * @summary Update Workflow
64412
- * @param {string} id Id of the Workflow
64413
- * @param {WorkflowBodyBeta} workflowBodyBeta
64414
- * @param {*} [axiosOptions] Override http request option.
64415
- * @throws {RequiredError}
64416
- */
64417
- updateWorkflow(id: string, workflowBodyBeta: WorkflowBodyBeta, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowBeta>>;
64418
64737
  };
64419
64738
  /**
64420
64739
  * WorkflowsBetaApi - factory interface
@@ -64511,10 +64830,11 @@ export declare const WorkflowsBetaApiFactory: (configuration?: Configuration, ba
64511
64830
  /**
64512
64831
  * List all workflows in the tenant.
64513
64832
  * @summary List Workflows
64833
+ * @param {WorkflowsBetaApiListWorkflowsRequest} requestParameters Request parameters.
64514
64834
  * @param {*} [axiosOptions] Override http request option.
64515
64835
  * @throws {RequiredError}
64516
64836
  */
64517
- listWorkflows(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<WorkflowBeta>>;
64837
+ listWorkflows(requestParameters?: WorkflowsBetaApiListWorkflowsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<WorkflowBeta>>;
64518
64838
  /**
64519
64839
  * Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
64520
64840
  * @summary Patch Workflow
@@ -64539,6 +64859,14 @@ export declare const WorkflowsBetaApiFactory: (configuration?: Configuration, ba
64539
64859
  * @throws {RequiredError}
64540
64860
  */
64541
64861
  postWorkflowExternalTrigger(requestParameters: WorkflowsBetaApiPostWorkflowExternalTriggerRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<WorkflowOAuthClientBeta>;
64862
+ /**
64863
+ * Perform a full update of a workflow. The updated workflow object is returned in the response.
64864
+ * @summary Update Workflow
64865
+ * @param {WorkflowsBetaApiPutWorkflowRequest} requestParameters Request parameters.
64866
+ * @param {*} [axiosOptions] Override http request option.
64867
+ * @throws {RequiredError}
64868
+ */
64869
+ putWorkflow(requestParameters: WorkflowsBetaApiPutWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<WorkflowBeta>;
64542
64870
  /**
64543
64871
  * Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
64544
64872
  * @summary Test Workflow via External Trigger
@@ -64555,14 +64883,6 @@ export declare const WorkflowsBetaApiFactory: (configuration?: Configuration, ba
64555
64883
  * @throws {RequiredError}
64556
64884
  */
64557
64885
  testWorkflow(requestParameters: WorkflowsBetaApiTestWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<TestWorkflow200ResponseBeta>;
64558
- /**
64559
- * Perform a full update of a workflow. The updated workflow object is returned in the response.
64560
- * @summary Update Workflow
64561
- * @param {WorkflowsBetaApiUpdateWorkflowRequest} requestParameters Request parameters.
64562
- * @param {*} [axiosOptions] Override http request option.
64563
- * @throws {RequiredError}
64564
- */
64565
- updateWorkflow(requestParameters: WorkflowsBetaApiUpdateWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<WorkflowBeta>;
64566
64886
  };
64567
64887
  /**
64568
64888
  * Request parameters for cancelWorkflowExecution operation in WorkflowsBetaApi.
@@ -64615,6 +64935,12 @@ export interface WorkflowsBetaApiGetWorkflowRequest {
64615
64935
  * @memberof WorkflowsBetaApiGetWorkflow
64616
64936
  */
64617
64937
  readonly id: string;
64938
+ /**
64939
+ * disable workflow metrics
64940
+ * @type {boolean}
64941
+ * @memberof WorkflowsBetaApiGetWorkflow
64942
+ */
64943
+ readonly workflowMetrics?: boolean;
64618
64944
  }
64619
64945
  /**
64620
64946
  * Request parameters for getWorkflowExecution operation in WorkflowsBetaApi.
@@ -64748,6 +65074,37 @@ export interface WorkflowsBetaApiListWorkflowLibraryTriggersRequest {
64748
65074
  */
64749
65075
  readonly filters?: string;
64750
65076
  }
65077
+ /**
65078
+ * Request parameters for listWorkflows operation in WorkflowsBetaApi.
65079
+ * @export
65080
+ * @interface WorkflowsBetaApiListWorkflowsRequest
65081
+ */
65082
+ export interface WorkflowsBetaApiListWorkflowsRequest {
65083
+ /**
65084
+ * Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
65085
+ * @type {number}
65086
+ * @memberof WorkflowsBetaApiListWorkflows
65087
+ */
65088
+ readonly limit?: number;
65089
+ /**
65090
+ * Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
65091
+ * @type {number}
65092
+ * @memberof WorkflowsBetaApiListWorkflows
65093
+ */
65094
+ readonly offset?: number;
65095
+ /**
65096
+ * Trigger ID
65097
+ * @type {string}
65098
+ * @memberof WorkflowsBetaApiListWorkflows
65099
+ */
65100
+ readonly triggerId?: string;
65101
+ /**
65102
+ * Connector Instance ID
65103
+ * @type {string}
65104
+ * @memberof WorkflowsBetaApiListWorkflows
65105
+ */
65106
+ readonly connectorInstanceId?: string;
65107
+ }
64751
65108
  /**
64752
65109
  * Request parameters for patchWorkflow operation in WorkflowsBetaApi.
64753
65110
  * @export
@@ -64799,6 +65156,25 @@ export interface WorkflowsBetaApiPostWorkflowExternalTriggerRequest {
64799
65156
  */
64800
65157
  readonly id: string;
64801
65158
  }
65159
+ /**
65160
+ * Request parameters for putWorkflow operation in WorkflowsBetaApi.
65161
+ * @export
65162
+ * @interface WorkflowsBetaApiPutWorkflowRequest
65163
+ */
65164
+ export interface WorkflowsBetaApiPutWorkflowRequest {
65165
+ /**
65166
+ * Id of the Workflow
65167
+ * @type {string}
65168
+ * @memberof WorkflowsBetaApiPutWorkflow
65169
+ */
65170
+ readonly id: string;
65171
+ /**
65172
+ *
65173
+ * @type {WorkflowBodyBeta}
65174
+ * @memberof WorkflowsBetaApiPutWorkflow
65175
+ */
65176
+ readonly workflowBodyBeta: WorkflowBodyBeta;
65177
+ }
64802
65178
  /**
64803
65179
  * Request parameters for testExternalExecuteWorkflow operation in WorkflowsBetaApi.
64804
65180
  * @export
@@ -64837,25 +65213,6 @@ export interface WorkflowsBetaApiTestWorkflowRequest {
64837
65213
  */
64838
65214
  readonly testWorkflowRequestBeta: TestWorkflowRequestBeta;
64839
65215
  }
64840
- /**
64841
- * Request parameters for updateWorkflow operation in WorkflowsBetaApi.
64842
- * @export
64843
- * @interface WorkflowsBetaApiUpdateWorkflowRequest
64844
- */
64845
- export interface WorkflowsBetaApiUpdateWorkflowRequest {
64846
- /**
64847
- * Id of the Workflow
64848
- * @type {string}
64849
- * @memberof WorkflowsBetaApiUpdateWorkflow
64850
- */
64851
- readonly id: string;
64852
- /**
64853
- *
64854
- * @type {WorkflowBodyBeta}
64855
- * @memberof WorkflowsBetaApiUpdateWorkflow
64856
- */
64857
- readonly workflowBodyBeta: WorkflowBodyBeta;
64858
- }
64859
65216
  /**
64860
65217
  * WorkflowsBetaApi - object-oriented interface
64861
65218
  * @export
@@ -64964,11 +65321,12 @@ export declare class WorkflowsBetaApi extends BaseAPI {
64964
65321
  /**
64965
65322
  * List all workflows in the tenant.
64966
65323
  * @summary List Workflows
65324
+ * @param {WorkflowsBetaApiListWorkflowsRequest} requestParameters Request parameters.
64967
65325
  * @param {*} [axiosOptions] Override http request option.
64968
65326
  * @throws {RequiredError}
64969
65327
  * @memberof WorkflowsBetaApi
64970
65328
  */
64971
- listWorkflows(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<WorkflowBeta[], any>>;
65329
+ listWorkflows(requestParameters?: WorkflowsBetaApiListWorkflowsRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<WorkflowBeta[], any>>;
64972
65330
  /**
64973
65331
  * Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
64974
65332
  * @summary Patch Workflow
@@ -64996,6 +65354,15 @@ export declare class WorkflowsBetaApi extends BaseAPI {
64996
65354
  * @memberof WorkflowsBetaApi
64997
65355
  */
64998
65356
  postWorkflowExternalTrigger(requestParameters: WorkflowsBetaApiPostWorkflowExternalTriggerRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<WorkflowOAuthClientBeta, any>>;
65357
+ /**
65358
+ * Perform a full update of a workflow. The updated workflow object is returned in the response.
65359
+ * @summary Update Workflow
65360
+ * @param {WorkflowsBetaApiPutWorkflowRequest} requestParameters Request parameters.
65361
+ * @param {*} [axiosOptions] Override http request option.
65362
+ * @throws {RequiredError}
65363
+ * @memberof WorkflowsBetaApi
65364
+ */
65365
+ putWorkflow(requestParameters: WorkflowsBetaApiPutWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<WorkflowBeta, any>>;
64999
65366
  /**
65000
65367
  * Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
65001
65368
  * @summary Test Workflow via External Trigger
@@ -65014,13 +65381,4 @@ export declare class WorkflowsBetaApi extends BaseAPI {
65014
65381
  * @memberof WorkflowsBetaApi
65015
65382
  */
65016
65383
  testWorkflow(requestParameters: WorkflowsBetaApiTestWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<TestWorkflow200ResponseBeta, any>>;
65017
- /**
65018
- * Perform a full update of a workflow. The updated workflow object is returned in the response.
65019
- * @summary Update Workflow
65020
- * @param {WorkflowsBetaApiUpdateWorkflowRequest} requestParameters Request parameters.
65021
- * @param {*} [axiosOptions] Override http request option.
65022
- * @throws {RequiredError}
65023
- * @memberof WorkflowsBetaApi
65024
- */
65025
- updateWorkflow(requestParameters: WorkflowsBetaApiUpdateWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<WorkflowBeta, any>>;
65026
65384
  }