sailpoint-api-client 1.5.0 → 1.6.1
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/beta/README.md +2 -2
- package/beta/api.ts +563 -174
- package/beta/common.ts +2 -2
- package/beta/package.json +1 -1
- package/dist/beta/api.d.ts +487 -129
- package/dist/beta/api.js +177 -114
- package/dist/beta/api.js.map +1 -1
- package/dist/beta/common.js +1 -1
- package/dist/v2024/api.d.ts +1200 -35
- package/dist/v2024/api.js +761 -36
- package/dist/v2024/api.js.map +1 -1
- package/dist/v2024/common.js +1 -1
- package/dist/v2025/api.d.ts +1468 -45
- package/dist/v2025/api.js +886 -53
- package/dist/v2025/api.js.map +1 -1
- package/dist/v2025/common.js +1 -1
- package/dist/v3/api.d.ts +611 -130
- package/dist/v3/api.js +155 -86
- package/dist/v3/api.js.map +1 -1
- package/dist/v3/common.js +1 -1
- package/package.json +1 -1
- package/v2024/README.md +2 -2
- package/v2024/api.ts +1544 -42
- package/v2024/common.ts +2 -2
- package/v2024/package.json +1 -1
- package/v2025/README.md +2 -2
- package/v2025/api.ts +1934 -124
- package/v2025/common.ts +2 -2
- package/v2025/package.json +1 -1
- package/v3/README.md +2 -2
- package/v3/api.ts +658 -143
- package/v3/common.ts +2 -2
- package/v3/package.json +1 -1
package/dist/beta/api.d.ts
CHANGED
|
@@ -769,13 +769,13 @@ export interface AccessItemRoleResponseBeta {
|
|
|
769
769
|
*/
|
|
770
770
|
export interface AccessProfileApprovalSchemeBeta {
|
|
771
771
|
/**
|
|
772
|
-
* Describes the individual or group that is responsible for an approval step.
|
|
772
|
+
* Describes the individual or group that is responsible for an approval step. These are the possible values: **APP_OWNER**: The owner of the Application **OWNER**: Owner of the associated Access Profile or Role **SOURCE_OWNER**: Owner of the Source associated with an Access Profile **MANAGER**: Manager of the Identity making the request **GOVERNANCE_GROUP**: A Governance Group, the ID of which is specified by the **approverId** field
|
|
773
773
|
* @type {string}
|
|
774
774
|
* @memberof AccessProfileApprovalSchemeBeta
|
|
775
775
|
*/
|
|
776
776
|
'approverType'?: AccessProfileApprovalSchemeBetaApproverTypeBeta;
|
|
777
777
|
/**
|
|
778
|
-
*
|
|
778
|
+
* Specific approver ID. Only use this when the `approverType` is `GOVERNANCE_GROUP`.
|
|
779
779
|
* @type {string}
|
|
780
780
|
* @memberof AccessProfileApprovalSchemeBeta
|
|
781
781
|
*/
|
|
@@ -790,43 +790,43 @@ export declare const AccessProfileApprovalSchemeBetaApproverTypeBeta: {
|
|
|
790
790
|
};
|
|
791
791
|
export type AccessProfileApprovalSchemeBetaApproverTypeBeta = typeof AccessProfileApprovalSchemeBetaApproverTypeBeta[keyof typeof AccessProfileApprovalSchemeBetaApproverTypeBeta];
|
|
792
792
|
/**
|
|
793
|
-
* Access
|
|
793
|
+
* Access profile.
|
|
794
794
|
* @export
|
|
795
795
|
* @interface AccessProfileBeta
|
|
796
796
|
*/
|
|
797
797
|
export interface AccessProfileBeta {
|
|
798
798
|
/**
|
|
799
|
-
*
|
|
799
|
+
* Access profile ID.
|
|
800
800
|
* @type {string}
|
|
801
801
|
* @memberof AccessProfileBeta
|
|
802
802
|
*/
|
|
803
803
|
'id'?: string;
|
|
804
804
|
/**
|
|
805
|
-
*
|
|
805
|
+
* Access profile name.
|
|
806
806
|
* @type {string}
|
|
807
807
|
* @memberof AccessProfileBeta
|
|
808
808
|
*/
|
|
809
809
|
'name': string;
|
|
810
810
|
/**
|
|
811
|
-
*
|
|
811
|
+
* Access profile description.
|
|
812
812
|
* @type {string}
|
|
813
813
|
* @memberof AccessProfileBeta
|
|
814
814
|
*/
|
|
815
815
|
'description'?: string | null;
|
|
816
816
|
/**
|
|
817
|
-
* Date the
|
|
817
|
+
* Date and time when the access profile was created.
|
|
818
818
|
* @type {string}
|
|
819
819
|
* @memberof AccessProfileBeta
|
|
820
820
|
*/
|
|
821
821
|
'created'?: string;
|
|
822
822
|
/**
|
|
823
|
-
* Date the
|
|
823
|
+
* Date and time when the access profile was last modified.
|
|
824
824
|
* @type {string}
|
|
825
825
|
* @memberof AccessProfileBeta
|
|
826
826
|
*/
|
|
827
827
|
'modified'?: string;
|
|
828
828
|
/**
|
|
829
|
-
*
|
|
829
|
+
* Indicates whether the access profile is enabled. If it\'s enabled, you must include at least one entitlement.
|
|
830
830
|
* @type {boolean}
|
|
831
831
|
* @memberof AccessProfileBeta
|
|
832
832
|
*/
|
|
@@ -844,13 +844,13 @@ export interface AccessProfileBeta {
|
|
|
844
844
|
*/
|
|
845
845
|
'source': AccessProfileSourceRefBeta;
|
|
846
846
|
/**
|
|
847
|
-
*
|
|
847
|
+
* List of entitlements associated with the access profile. If `enabled` is false, this can be empty. Otherwise, it must contain at least one entitlement.
|
|
848
848
|
* @type {Array<EntitlementRefBeta>}
|
|
849
849
|
* @memberof AccessProfileBeta
|
|
850
850
|
*/
|
|
851
851
|
'entitlements'?: Array<EntitlementRefBeta> | null;
|
|
852
852
|
/**
|
|
853
|
-
*
|
|
853
|
+
* Indicates whether the access profile is requestable by access request. Currently, making an access profile non-requestable is only supported for customers enabled with the new Request Center. Otherwise, attempting to create an access profile with a value **false** in this field results in a 400 error.
|
|
854
854
|
* @type {boolean}
|
|
855
855
|
* @memberof AccessProfileBeta
|
|
856
856
|
*/
|
|
@@ -868,7 +868,7 @@ export interface AccessProfileBeta {
|
|
|
868
868
|
*/
|
|
869
869
|
'revocationRequestConfig'?: RevocabilityBeta | null;
|
|
870
870
|
/**
|
|
871
|
-
* List of IDs
|
|
871
|
+
* List of segment IDs, if any, that the access profile is assigned to.
|
|
872
872
|
* @type {Array<string>}
|
|
873
873
|
* @memberof AccessProfileBeta
|
|
874
874
|
*/
|
|
@@ -1137,19 +1137,19 @@ export type AccessProfileRefBetaTypeBeta = typeof AccessProfileRefBetaTypeBeta[k
|
|
|
1137
1137
|
*/
|
|
1138
1138
|
export interface AccessProfileSourceRefBeta {
|
|
1139
1139
|
/**
|
|
1140
|
-
*
|
|
1140
|
+
* ID of the source the access profile is associated with.
|
|
1141
1141
|
* @type {string}
|
|
1142
1142
|
* @memberof AccessProfileSourceRefBeta
|
|
1143
1143
|
*/
|
|
1144
1144
|
'id'?: string;
|
|
1145
1145
|
/**
|
|
1146
|
-
*
|
|
1146
|
+
* Source\'s DTO type.
|
|
1147
1147
|
* @type {string}
|
|
1148
1148
|
* @memberof AccessProfileSourceRefBeta
|
|
1149
1149
|
*/
|
|
1150
1150
|
'type'?: AccessProfileSourceRefBetaTypeBeta;
|
|
1151
1151
|
/**
|
|
1152
|
-
*
|
|
1152
|
+
* Source name.
|
|
1153
1153
|
* @type {string}
|
|
1154
1154
|
* @memberof AccessProfileSourceRefBeta
|
|
1155
1155
|
*/
|
|
@@ -1283,6 +1283,12 @@ export interface AccessRequestBeta {
|
|
|
1283
1283
|
'clientMetadata'?: {
|
|
1284
1284
|
[key: string]: string;
|
|
1285
1285
|
};
|
|
1286
|
+
/**
|
|
1287
|
+
* Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
|
|
1288
|
+
* @type {Array<RequestedForDtoRefBeta>}
|
|
1289
|
+
* @memberof AccessRequestBeta
|
|
1290
|
+
*/
|
|
1291
|
+
'requestedForWithRequestedItems'?: Array<RequestedForDtoRefBeta> | null;
|
|
1286
1292
|
}
|
|
1287
1293
|
/**
|
|
1288
1294
|
*
|
|
@@ -1493,6 +1499,18 @@ export interface AccessRequestItemBeta {
|
|
|
1493
1499
|
* @memberof AccessRequestItemBeta
|
|
1494
1500
|
*/
|
|
1495
1501
|
'removeDate'?: string;
|
|
1502
|
+
/**
|
|
1503
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
1504
|
+
* @type {string}
|
|
1505
|
+
* @memberof AccessRequestItemBeta
|
|
1506
|
+
*/
|
|
1507
|
+
'assignmentId'?: string | null;
|
|
1508
|
+
/**
|
|
1509
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
1510
|
+
* @type {string}
|
|
1511
|
+
* @memberof AccessRequestItemBeta
|
|
1512
|
+
*/
|
|
1513
|
+
'nativeIdentity'?: string | null;
|
|
1496
1514
|
}
|
|
1497
1515
|
export declare const AccessRequestItemBetaTypeBeta: {
|
|
1498
1516
|
readonly AccessProfile: "ACCESS_PROFILE";
|
|
@@ -3117,6 +3135,25 @@ export interface AccountInfoDtoBeta {
|
|
|
3117
3135
|
*/
|
|
3118
3136
|
'uuid'?: string;
|
|
3119
3137
|
}
|
|
3138
|
+
/**
|
|
3139
|
+
*
|
|
3140
|
+
* @export
|
|
3141
|
+
* @interface AccountItemRefBeta
|
|
3142
|
+
*/
|
|
3143
|
+
export interface AccountItemRefBeta {
|
|
3144
|
+
/**
|
|
3145
|
+
* The uuid for the account, available under the \'objectguid\' attribute
|
|
3146
|
+
* @type {string}
|
|
3147
|
+
* @memberof AccountItemRefBeta
|
|
3148
|
+
*/
|
|
3149
|
+
'accountUuid'?: string | null;
|
|
3150
|
+
/**
|
|
3151
|
+
* The \'distinguishedName\' attribute for the account
|
|
3152
|
+
* @type {string}
|
|
3153
|
+
* @memberof AccountItemRefBeta
|
|
3154
|
+
*/
|
|
3155
|
+
'nativeIdentity'?: string;
|
|
3156
|
+
}
|
|
3120
3157
|
/**
|
|
3121
3158
|
* If an account activity item is associated with an access request, captures details of that request.
|
|
3122
3159
|
* @export
|
|
@@ -4629,7 +4666,7 @@ export interface AttributeDefinitionBeta {
|
|
|
4629
4666
|
* @type {AttributeDefinitionSchemaBeta}
|
|
4630
4667
|
* @memberof AttributeDefinitionBeta
|
|
4631
4668
|
*/
|
|
4632
|
-
'schema'?: AttributeDefinitionSchemaBeta;
|
|
4669
|
+
'schema'?: AttributeDefinitionSchemaBeta | null;
|
|
4633
4670
|
/**
|
|
4634
4671
|
* A human-readable description of the attribute.
|
|
4635
4672
|
* @type {string}
|
|
@@ -4694,6 +4731,7 @@ export declare const AttributeDefinitionTypeBeta: {
|
|
|
4694
4731
|
readonly Long: "LONG";
|
|
4695
4732
|
readonly Int: "INT";
|
|
4696
4733
|
readonly Boolean: "BOOLEAN";
|
|
4734
|
+
readonly Date: "DATE";
|
|
4697
4735
|
};
|
|
4698
4736
|
export type AttributeDefinitionTypeBeta = typeof AttributeDefinitionTypeBeta[keyof typeof AttributeDefinitionTypeBeta];
|
|
4699
4737
|
/**
|
|
@@ -11635,10 +11673,181 @@ export interface GenerateRandomStringBeta {
|
|
|
11635
11673
|
'requiresPeriodicRefresh'?: boolean;
|
|
11636
11674
|
}
|
|
11637
11675
|
/**
|
|
11638
|
-
*
|
|
11676
|
+
*
|
|
11639
11677
|
* @export
|
|
11678
|
+
* @interface GetActiveCampaigns200ResponseInnerBeta
|
|
11640
11679
|
*/
|
|
11641
|
-
export
|
|
11680
|
+
export interface GetActiveCampaigns200ResponseInnerBeta {
|
|
11681
|
+
/**
|
|
11682
|
+
* Id of the campaign
|
|
11683
|
+
* @type {string}
|
|
11684
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11685
|
+
*/
|
|
11686
|
+
'id'?: string;
|
|
11687
|
+
/**
|
|
11688
|
+
* The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
11689
|
+
* @type {string}
|
|
11690
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11691
|
+
*/
|
|
11692
|
+
'name': string;
|
|
11693
|
+
/**
|
|
11694
|
+
* The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
|
|
11695
|
+
* @type {string}
|
|
11696
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11697
|
+
*/
|
|
11698
|
+
'description': string;
|
|
11699
|
+
/**
|
|
11700
|
+
* The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
|
|
11701
|
+
* @type {string}
|
|
11702
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11703
|
+
*/
|
|
11704
|
+
'deadline'?: string;
|
|
11705
|
+
/**
|
|
11706
|
+
* The type of campaign. Could be extended in the future.
|
|
11707
|
+
* @type {string}
|
|
11708
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11709
|
+
*/
|
|
11710
|
+
'type': GetActiveCampaigns200ResponseInnerBetaTypeBeta;
|
|
11711
|
+
/**
|
|
11712
|
+
* Enables email notification for this campaign
|
|
11713
|
+
* @type {boolean}
|
|
11714
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11715
|
+
*/
|
|
11716
|
+
'emailNotificationEnabled'?: boolean;
|
|
11717
|
+
/**
|
|
11718
|
+
* Allows auto revoke for this campaign
|
|
11719
|
+
* @type {boolean}
|
|
11720
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11721
|
+
*/
|
|
11722
|
+
'autoRevokeAllowed'?: boolean;
|
|
11723
|
+
/**
|
|
11724
|
+
* Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
|
|
11725
|
+
* @type {boolean}
|
|
11726
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11727
|
+
*/
|
|
11728
|
+
'recommendationsEnabled'?: boolean;
|
|
11729
|
+
/**
|
|
11730
|
+
* The campaign\'s current status.
|
|
11731
|
+
* @type {string}
|
|
11732
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11733
|
+
*/
|
|
11734
|
+
'status'?: GetActiveCampaigns200ResponseInnerBetaStatusBeta;
|
|
11735
|
+
/**
|
|
11736
|
+
* The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
|
|
11737
|
+
* @type {string}
|
|
11738
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11739
|
+
*/
|
|
11740
|
+
'correlatedStatus'?: GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta;
|
|
11741
|
+
/**
|
|
11742
|
+
* Created time of the campaign
|
|
11743
|
+
* @type {string}
|
|
11744
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11745
|
+
*/
|
|
11746
|
+
'created'?: string;
|
|
11747
|
+
/**
|
|
11748
|
+
* The total number of certifications in this campaign.
|
|
11749
|
+
* @type {number}
|
|
11750
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11751
|
+
*/
|
|
11752
|
+
'totalCertifications'?: number;
|
|
11753
|
+
/**
|
|
11754
|
+
* The number of completed certifications in this campaign.
|
|
11755
|
+
* @type {number}
|
|
11756
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11757
|
+
*/
|
|
11758
|
+
'completedCertifications'?: number;
|
|
11759
|
+
/**
|
|
11760
|
+
* A list of errors and warnings that have accumulated.
|
|
11761
|
+
* @type {Array<CampaignAlertBeta>}
|
|
11762
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11763
|
+
*/
|
|
11764
|
+
'alerts'?: Array<CampaignAlertBeta>;
|
|
11765
|
+
/**
|
|
11766
|
+
* Modified time of the campaign
|
|
11767
|
+
* @type {string}
|
|
11768
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11769
|
+
*/
|
|
11770
|
+
'modified'?: string;
|
|
11771
|
+
/**
|
|
11772
|
+
*
|
|
11773
|
+
* @type {FullcampaignAllOfFilterBeta}
|
|
11774
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11775
|
+
*/
|
|
11776
|
+
'filter'?: FullcampaignAllOfFilterBeta;
|
|
11777
|
+
/**
|
|
11778
|
+
* Determines if comments on sunset date changes are required.
|
|
11779
|
+
* @type {boolean}
|
|
11780
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11781
|
+
*/
|
|
11782
|
+
'sunsetCommentsRequired'?: boolean;
|
|
11783
|
+
/**
|
|
11784
|
+
*
|
|
11785
|
+
* @type {FullcampaignAllOfSourceOwnerCampaignInfoBeta}
|
|
11786
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11787
|
+
*/
|
|
11788
|
+
'sourceOwnerCampaignInfo'?: FullcampaignAllOfSourceOwnerCampaignInfoBeta;
|
|
11789
|
+
/**
|
|
11790
|
+
*
|
|
11791
|
+
* @type {FullcampaignAllOfSearchCampaignInfoBeta}
|
|
11792
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11793
|
+
*/
|
|
11794
|
+
'searchCampaignInfo'?: FullcampaignAllOfSearchCampaignInfoBeta;
|
|
11795
|
+
/**
|
|
11796
|
+
*
|
|
11797
|
+
* @type {FullcampaignAllOfRoleCompositionCampaignInfoBeta}
|
|
11798
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11799
|
+
*/
|
|
11800
|
+
'roleCompositionCampaignInfo'?: FullcampaignAllOfRoleCompositionCampaignInfoBeta;
|
|
11801
|
+
/**
|
|
11802
|
+
*
|
|
11803
|
+
* @type {FullcampaignAllOfMachineAccountCampaignInfoBeta}
|
|
11804
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11805
|
+
*/
|
|
11806
|
+
'machineAccountCampaignInfo'?: FullcampaignAllOfMachineAccountCampaignInfoBeta;
|
|
11807
|
+
/**
|
|
11808
|
+
* A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
|
|
11809
|
+
* @type {Array<FullcampaignAllOfSourcesWithOrphanEntitlementsBeta>}
|
|
11810
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11811
|
+
*/
|
|
11812
|
+
'sourcesWithOrphanEntitlements'?: Array<FullcampaignAllOfSourcesWithOrphanEntitlementsBeta>;
|
|
11813
|
+
/**
|
|
11814
|
+
* Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
|
|
11815
|
+
* @type {string}
|
|
11816
|
+
* @memberof GetActiveCampaigns200ResponseInnerBeta
|
|
11817
|
+
*/
|
|
11818
|
+
'mandatoryCommentRequirement'?: GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta;
|
|
11819
|
+
}
|
|
11820
|
+
export declare const GetActiveCampaigns200ResponseInnerBetaTypeBeta: {
|
|
11821
|
+
readonly Manager: "MANAGER";
|
|
11822
|
+
readonly SourceOwner: "SOURCE_OWNER";
|
|
11823
|
+
readonly Search: "SEARCH";
|
|
11824
|
+
readonly RoleComposition: "ROLE_COMPOSITION";
|
|
11825
|
+
readonly MachineAccount: "MACHINE_ACCOUNT";
|
|
11826
|
+
};
|
|
11827
|
+
export type GetActiveCampaigns200ResponseInnerBetaTypeBeta = typeof GetActiveCampaigns200ResponseInnerBetaTypeBeta[keyof typeof GetActiveCampaigns200ResponseInnerBetaTypeBeta];
|
|
11828
|
+
export declare const GetActiveCampaigns200ResponseInnerBetaStatusBeta: {
|
|
11829
|
+
readonly Pending: "PENDING";
|
|
11830
|
+
readonly Staged: "STAGED";
|
|
11831
|
+
readonly Canceling: "CANCELING";
|
|
11832
|
+
readonly Activating: "ACTIVATING";
|
|
11833
|
+
readonly Active: "ACTIVE";
|
|
11834
|
+
readonly Completing: "COMPLETING";
|
|
11835
|
+
readonly Completed: "COMPLETED";
|
|
11836
|
+
readonly Error: "ERROR";
|
|
11837
|
+
readonly Archived: "ARCHIVED";
|
|
11838
|
+
};
|
|
11839
|
+
export type GetActiveCampaigns200ResponseInnerBetaStatusBeta = typeof GetActiveCampaigns200ResponseInnerBetaStatusBeta[keyof typeof GetActiveCampaigns200ResponseInnerBetaStatusBeta];
|
|
11840
|
+
export declare const GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta: {
|
|
11841
|
+
readonly Correlated: "CORRELATED";
|
|
11842
|
+
readonly Uncorrelated: "UNCORRELATED";
|
|
11843
|
+
};
|
|
11844
|
+
export type GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta = typeof GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta[keyof typeof GetActiveCampaigns200ResponseInnerBetaCorrelatedStatusBeta];
|
|
11845
|
+
export declare const GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta: {
|
|
11846
|
+
readonly AllDecisions: "ALL_DECISIONS";
|
|
11847
|
+
readonly RevokeOnlyDecisions: "REVOKE_ONLY_DECISIONS";
|
|
11848
|
+
readonly NoDecisions: "NO_DECISIONS";
|
|
11849
|
+
};
|
|
11850
|
+
export type GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta = typeof GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta[keyof typeof GetActiveCampaigns200ResponseInnerBetaMandatoryCommentRequirementBeta];
|
|
11642
11851
|
/**
|
|
11643
11852
|
* @type GetDiscoveredApplications200ResponseInnerBeta
|
|
11644
11853
|
* @export
|
|
@@ -19074,7 +19283,7 @@ export declare const OwnerDtoBetaTypeBeta: {
|
|
|
19074
19283
|
};
|
|
19075
19284
|
export type OwnerDtoBetaTypeBeta = typeof OwnerDtoBetaTypeBeta[keyof typeof OwnerDtoBetaTypeBeta];
|
|
19076
19285
|
/**
|
|
19077
|
-
*
|
|
19286
|
+
* Owner of the object.
|
|
19078
19287
|
* @export
|
|
19079
19288
|
* @interface OwnerReferenceBeta
|
|
19080
19289
|
*/
|
|
@@ -19086,13 +19295,13 @@ export interface OwnerReferenceBeta {
|
|
|
19086
19295
|
*/
|
|
19087
19296
|
'type'?: OwnerReferenceBetaTypeBeta;
|
|
19088
19297
|
/**
|
|
19089
|
-
*
|
|
19298
|
+
* Owner\'s identity ID.
|
|
19090
19299
|
* @type {string}
|
|
19091
19300
|
* @memberof OwnerReferenceBeta
|
|
19092
19301
|
*/
|
|
19093
19302
|
'id'?: string;
|
|
19094
19303
|
/**
|
|
19095
|
-
*
|
|
19304
|
+
* Owner\'s name. It may be left null or omitted in a POST or PATCH. If set, it must match the current value of the owner\'s display name, otherwise a 400 Bad Request error will result.
|
|
19096
19305
|
* @type {string}
|
|
19097
19306
|
* @memberof OwnerReferenceBeta
|
|
19098
19307
|
*/
|
|
@@ -19710,19 +19919,6 @@ export declare const PatchPotentialRoleRequestInnerBetaOpBeta: {
|
|
|
19710
19919
|
readonly Replace: "replace";
|
|
19711
19920
|
};
|
|
19712
19921
|
export type PatchPotentialRoleRequestInnerBetaOpBeta = typeof PatchPotentialRoleRequestInnerBetaOpBeta[keyof typeof PatchPotentialRoleRequestInnerBetaOpBeta];
|
|
19713
|
-
/**
|
|
19714
|
-
* A JSONPatch document as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902). Only `replace` operations are accepted by this endpoint.
|
|
19715
|
-
* @export
|
|
19716
|
-
* @interface PatchServiceDeskIntegrationRequestBeta
|
|
19717
|
-
*/
|
|
19718
|
-
export interface PatchServiceDeskIntegrationRequestBeta {
|
|
19719
|
-
/**
|
|
19720
|
-
* Operations to be applied
|
|
19721
|
-
* @type {Array<JsonPatchOperationBeta>}
|
|
19722
|
-
* @memberof PatchServiceDeskIntegrationRequestBeta
|
|
19723
|
-
*/
|
|
19724
|
-
'operations'?: Array<JsonPatchOperationBeta>;
|
|
19725
|
-
}
|
|
19726
19922
|
/**
|
|
19727
19923
|
*
|
|
19728
19924
|
* @export
|
|
@@ -20467,7 +20663,7 @@ export interface ProvisioningConfigPlanInitializerScriptBeta {
|
|
|
20467
20663
|
'source'?: string;
|
|
20468
20664
|
}
|
|
20469
20665
|
/**
|
|
20470
|
-
* Defines matching criteria for an
|
|
20666
|
+
* Defines matching criteria for an account to be provisioned with a specific access profile.
|
|
20471
20667
|
* @export
|
|
20472
20668
|
* @interface ProvisioningCriteriaLevel1Beta
|
|
20473
20669
|
*/
|
|
@@ -20479,26 +20675,26 @@ export interface ProvisioningCriteriaLevel1Beta {
|
|
|
20479
20675
|
*/
|
|
20480
20676
|
'operation'?: ProvisioningCriteriaOperationBeta;
|
|
20481
20677
|
/**
|
|
20482
|
-
* Name of the
|
|
20678
|
+
* Name of the account attribute to be tested. If **operation** is one of `EQUALS`, `NOT_EQUALS`, `CONTAINS`, or `HAS`, this field is required. Otherwise, specifying it results in an error.
|
|
20483
20679
|
* @type {string}
|
|
20484
20680
|
* @memberof ProvisioningCriteriaLevel1Beta
|
|
20485
20681
|
*/
|
|
20486
20682
|
'attribute'?: string | null;
|
|
20487
20683
|
/**
|
|
20488
|
-
* String value to test the
|
|
20684
|
+
* String value to test the account attribute w/r/t the specified operation. If the operation is one of `EQUALS`, `NOT_EQUALS`, or `CONTAINS`, this field is required. Otherwise, specifying it results in an error. If the attribute is not string-typed, the API will convert it to the appropriate type.
|
|
20489
20685
|
* @type {string}
|
|
20490
20686
|
* @memberof ProvisioningCriteriaLevel1Beta
|
|
20491
20687
|
*/
|
|
20492
20688
|
'value'?: string | null;
|
|
20493
20689
|
/**
|
|
20494
|
-
* Array of child criteria.
|
|
20690
|
+
* Array of child criteria. This field is required if the operation is `AND` or `OR`. Otherwise, it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
|
|
20495
20691
|
* @type {Array<ProvisioningCriteriaLevel2Beta>}
|
|
20496
20692
|
* @memberof ProvisioningCriteriaLevel1Beta
|
|
20497
20693
|
*/
|
|
20498
20694
|
'children'?: Array<ProvisioningCriteriaLevel2Beta> | null;
|
|
20499
20695
|
}
|
|
20500
20696
|
/**
|
|
20501
|
-
* Defines matching criteria for an
|
|
20697
|
+
* Defines matching criteria for an account to be provisioned with a specific access profile.
|
|
20502
20698
|
* @export
|
|
20503
20699
|
* @interface ProvisioningCriteriaLevel2Beta
|
|
20504
20700
|
*/
|
|
@@ -20510,26 +20706,26 @@ export interface ProvisioningCriteriaLevel2Beta {
|
|
|
20510
20706
|
*/
|
|
20511
20707
|
'operation'?: ProvisioningCriteriaOperationBeta;
|
|
20512
20708
|
/**
|
|
20513
|
-
* Name of the
|
|
20709
|
+
* Name of the account attribute to be tested. If **operation** is one of `EQUALS`, `NOT_EQUALS`, `CONTAINS`, or `HAS`, this field is required. Otherwise, specifying it results in an error.
|
|
20514
20710
|
* @type {string}
|
|
20515
20711
|
* @memberof ProvisioningCriteriaLevel2Beta
|
|
20516
20712
|
*/
|
|
20517
20713
|
'attribute'?: string | null;
|
|
20518
20714
|
/**
|
|
20519
|
-
* String value to test the
|
|
20715
|
+
* String value to test the account attribute w/r/t the specified operation. If the operation is one of `EQUALS`, `NOT_EQUALS`, or `CONTAINS`, this field is required. Otherwise, specifying it results in an error. If the attribute is not string-typed, the API will convert it to the appropriate type.
|
|
20520
20716
|
* @type {string}
|
|
20521
20717
|
* @memberof ProvisioningCriteriaLevel2Beta
|
|
20522
20718
|
*/
|
|
20523
20719
|
'value'?: string | null;
|
|
20524
20720
|
/**
|
|
20525
|
-
* Array of child criteria.
|
|
20721
|
+
* Array of child criteria. This field is required if the operation is `AND` or `OR`. Otherwise, it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
|
|
20526
20722
|
* @type {Array<ProvisioningCriteriaLevel3Beta>}
|
|
20527
20723
|
* @memberof ProvisioningCriteriaLevel2Beta
|
|
20528
20724
|
*/
|
|
20529
20725
|
'children'?: Array<ProvisioningCriteriaLevel3Beta> | null;
|
|
20530
20726
|
}
|
|
20531
20727
|
/**
|
|
20532
|
-
* Defines matching criteria for an
|
|
20728
|
+
* Defines matching criteria for an account to be provisioned with a specific access profile.
|
|
20533
20729
|
* @export
|
|
20534
20730
|
* @interface ProvisioningCriteriaLevel3Beta
|
|
20535
20731
|
*/
|
|
@@ -20541,26 +20737,26 @@ export interface ProvisioningCriteriaLevel3Beta {
|
|
|
20541
20737
|
*/
|
|
20542
20738
|
'operation'?: ProvisioningCriteriaOperationBeta;
|
|
20543
20739
|
/**
|
|
20544
|
-
* Name of the
|
|
20740
|
+
* Name of the account attribute to be tested. If **operation** is one of `EQUALS`, `NOT_EQUALS`, `CONTAINS`, or `HAS`, this field is required. Otherwise, specifying it results in an error.
|
|
20545
20741
|
* @type {string}
|
|
20546
20742
|
* @memberof ProvisioningCriteriaLevel3Beta
|
|
20547
20743
|
*/
|
|
20548
20744
|
'attribute'?: string | null;
|
|
20549
20745
|
/**
|
|
20550
|
-
* String value to test the
|
|
20746
|
+
* String value to test the account attribute w/r/t the specified operation. If the operation is one of `EQUALS`, `NOT_EQUALS`, or `CONTAINS`, this field is required. Otherwise, specifying it results in an error. If the attribute is not string-typed, the API will convert it to the appropriate type.
|
|
20551
20747
|
* @type {string}
|
|
20552
20748
|
* @memberof ProvisioningCriteriaLevel3Beta
|
|
20553
20749
|
*/
|
|
20554
|
-
'value'?: string;
|
|
20750
|
+
'value'?: string | null;
|
|
20555
20751
|
/**
|
|
20556
|
-
* Array of child criteria.
|
|
20752
|
+
* Array of child criteria. This field is required if the operation is `AND` or `OR`. Otherwise, it must be left null. A maximum of three levels of criteria are supported, including leaf nodes.
|
|
20557
20753
|
* @type {string}
|
|
20558
20754
|
* @memberof ProvisioningCriteriaLevel3Beta
|
|
20559
20755
|
*/
|
|
20560
20756
|
'children'?: string | null;
|
|
20561
20757
|
}
|
|
20562
20758
|
/**
|
|
20563
|
-
* Supported operations on ProvisioningCriteria
|
|
20759
|
+
* Supported operations on `ProvisioningCriteria`.
|
|
20564
20760
|
* @export
|
|
20565
20761
|
* @enum {string}
|
|
20566
20762
|
*/
|
|
@@ -20597,7 +20793,7 @@ export interface ProvisioningPolicyDtoBeta {
|
|
|
20597
20793
|
* @type {string}
|
|
20598
20794
|
* @memberof ProvisioningPolicyDtoBeta
|
|
20599
20795
|
*/
|
|
20600
|
-
'name': string;
|
|
20796
|
+
'name': string | null;
|
|
20601
20797
|
/**
|
|
20602
20798
|
* the description of the provisioning policy
|
|
20603
20799
|
* @type {string}
|
|
@@ -21399,19 +21595,25 @@ export interface RequestOnBehalfOfConfigBeta {
|
|
|
21399
21595
|
*/
|
|
21400
21596
|
export interface RequestabilityBeta {
|
|
21401
21597
|
/**
|
|
21402
|
-
*
|
|
21598
|
+
* Indicates whether the requester of the containing object must provide comments justifying the request.
|
|
21403
21599
|
* @type {boolean}
|
|
21404
21600
|
* @memberof RequestabilityBeta
|
|
21405
21601
|
*/
|
|
21406
21602
|
'commentsRequired'?: boolean | null;
|
|
21407
21603
|
/**
|
|
21408
|
-
*
|
|
21604
|
+
* Indicates whether an approver must provide comments when denying the request.
|
|
21409
21605
|
* @type {boolean}
|
|
21410
21606
|
* @memberof RequestabilityBeta
|
|
21411
21607
|
*/
|
|
21412
21608
|
'denialCommentsRequired'?: boolean | null;
|
|
21413
21609
|
/**
|
|
21414
|
-
*
|
|
21610
|
+
* Indicates whether reauthorization is required for the request.
|
|
21611
|
+
* @type {boolean}
|
|
21612
|
+
* @memberof RequestabilityBeta
|
|
21613
|
+
*/
|
|
21614
|
+
'reauthorizationRequired'?: boolean | null;
|
|
21615
|
+
/**
|
|
21616
|
+
* List describing the steps involved in approving the request.
|
|
21415
21617
|
* @type {Array<AccessProfileApprovalSchemeBeta>}
|
|
21416
21618
|
* @memberof RequestabilityBeta
|
|
21417
21619
|
*/
|
|
@@ -21435,6 +21637,12 @@ export interface RequestabilityForRoleBeta {
|
|
|
21435
21637
|
* @memberof RequestabilityForRoleBeta
|
|
21436
21638
|
*/
|
|
21437
21639
|
'denialCommentsRequired'?: boolean | null;
|
|
21640
|
+
/**
|
|
21641
|
+
* Indicates whether reauthorization is required for the request.
|
|
21642
|
+
* @type {boolean}
|
|
21643
|
+
* @memberof RequestabilityForRoleBeta
|
|
21644
|
+
*/
|
|
21645
|
+
'reauthorizationRequired'?: boolean | null;
|
|
21438
21646
|
/**
|
|
21439
21647
|
* List describing the steps in approving the request
|
|
21440
21648
|
* @type {Array<ApprovalSchemeForRoleBeta>}
|
|
@@ -21605,6 +21813,25 @@ export interface RequestedAccountRefBeta {
|
|
|
21605
21813
|
*/
|
|
21606
21814
|
'sourceName'?: string;
|
|
21607
21815
|
}
|
|
21816
|
+
/**
|
|
21817
|
+
*
|
|
21818
|
+
* @export
|
|
21819
|
+
* @interface RequestedForDtoRefBeta
|
|
21820
|
+
*/
|
|
21821
|
+
export interface RequestedForDtoRefBeta {
|
|
21822
|
+
/**
|
|
21823
|
+
* The identity id for which the access is requested
|
|
21824
|
+
* @type {string}
|
|
21825
|
+
* @memberof RequestedForDtoRefBeta
|
|
21826
|
+
*/
|
|
21827
|
+
'identityId': string;
|
|
21828
|
+
/**
|
|
21829
|
+
* the details for the access items that are requested for the identity
|
|
21830
|
+
* @type {Array<RequestedItemDtoRefBeta>}
|
|
21831
|
+
* @memberof RequestedForDtoRefBeta
|
|
21832
|
+
*/
|
|
21833
|
+
'requestedItems': Array<RequestedItemDtoRefBeta>;
|
|
21834
|
+
}
|
|
21608
21835
|
/**
|
|
21609
21836
|
*
|
|
21610
21837
|
* @export
|
|
@@ -21630,6 +21857,69 @@ export declare const RequestedItemDetailsBetaTypeBeta: {
|
|
|
21630
21857
|
readonly Role: "ROLE";
|
|
21631
21858
|
};
|
|
21632
21859
|
export type RequestedItemDetailsBetaTypeBeta = typeof RequestedItemDetailsBetaTypeBeta[keyof typeof RequestedItemDetailsBetaTypeBeta];
|
|
21860
|
+
/**
|
|
21861
|
+
*
|
|
21862
|
+
* @export
|
|
21863
|
+
* @interface RequestedItemDtoRefBeta
|
|
21864
|
+
*/
|
|
21865
|
+
export interface RequestedItemDtoRefBeta {
|
|
21866
|
+
/**
|
|
21867
|
+
* The type of the item being requested.
|
|
21868
|
+
* @type {string}
|
|
21869
|
+
* @memberof RequestedItemDtoRefBeta
|
|
21870
|
+
*/
|
|
21871
|
+
'type': RequestedItemDtoRefBetaTypeBeta;
|
|
21872
|
+
/**
|
|
21873
|
+
* ID of Role, Access Profile or Entitlement being requested.
|
|
21874
|
+
* @type {string}
|
|
21875
|
+
* @memberof RequestedItemDtoRefBeta
|
|
21876
|
+
*/
|
|
21877
|
+
'id': string;
|
|
21878
|
+
/**
|
|
21879
|
+
* Comment provided by requester. * Comment is required when the request is of type Revoke Access.
|
|
21880
|
+
* @type {string}
|
|
21881
|
+
* @memberof RequestedItemDtoRefBeta
|
|
21882
|
+
*/
|
|
21883
|
+
'comment'?: string;
|
|
21884
|
+
/**
|
|
21885
|
+
* Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
|
|
21886
|
+
* @type {{ [key: string]: string; }}
|
|
21887
|
+
* @memberof RequestedItemDtoRefBeta
|
|
21888
|
+
*/
|
|
21889
|
+
'clientMetadata'?: {
|
|
21890
|
+
[key: string]: string;
|
|
21891
|
+
};
|
|
21892
|
+
/**
|
|
21893
|
+
* The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
|
|
21894
|
+
* @type {string}
|
|
21895
|
+
* @memberof RequestedItemDtoRefBeta
|
|
21896
|
+
*/
|
|
21897
|
+
'removeDate'?: string;
|
|
21898
|
+
/**
|
|
21899
|
+
* The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
|
|
21900
|
+
* @type {string}
|
|
21901
|
+
* @memberof RequestedItemDtoRefBeta
|
|
21902
|
+
*/
|
|
21903
|
+
'assignmentId'?: string | null;
|
|
21904
|
+
/**
|
|
21905
|
+
* The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
|
|
21906
|
+
* @type {string}
|
|
21907
|
+
* @memberof RequestedItemDtoRefBeta
|
|
21908
|
+
*/
|
|
21909
|
+
'nativeIdentity'?: string | null;
|
|
21910
|
+
/**
|
|
21911
|
+
* The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
|
|
21912
|
+
* @type {Array<SourceItemRefBeta>}
|
|
21913
|
+
* @memberof RequestedItemDtoRefBeta
|
|
21914
|
+
*/
|
|
21915
|
+
'accountSelection'?: Array<SourceItemRefBeta> | null;
|
|
21916
|
+
}
|
|
21917
|
+
export declare const RequestedItemDtoRefBetaTypeBeta: {
|
|
21918
|
+
readonly AccessProfile: "ACCESS_PROFILE";
|
|
21919
|
+
readonly Role: "ROLE";
|
|
21920
|
+
readonly Entitlement: "ENTITLEMENT";
|
|
21921
|
+
};
|
|
21922
|
+
export type RequestedItemDtoRefBetaTypeBeta = typeof RequestedItemDtoRefBetaTypeBeta[keyof typeof RequestedItemDtoRefBetaTypeBeta];
|
|
21633
21923
|
/**
|
|
21634
21924
|
*
|
|
21635
21925
|
* @export
|
|
@@ -22198,7 +22488,7 @@ export type ReviewerBetaTypeBeta = typeof ReviewerBetaTypeBeta[keyof typeof Revi
|
|
|
22198
22488
|
*/
|
|
22199
22489
|
export interface RevocabilityBeta {
|
|
22200
22490
|
/**
|
|
22201
|
-
* List describing the steps in approving the revocation request
|
|
22491
|
+
* List describing the steps involved in approving the revocation request.
|
|
22202
22492
|
* @type {Array<AccessProfileApprovalSchemeBeta>}
|
|
22203
22493
|
* @memberof RevocabilityBeta
|
|
22204
22494
|
*/
|
|
@@ -24583,7 +24873,7 @@ export interface SchemaBeta {
|
|
|
24583
24873
|
* @type {string}
|
|
24584
24874
|
* @memberof SchemaBeta
|
|
24585
24875
|
*/
|
|
24586
|
-
'hierarchyAttribute'?: string;
|
|
24876
|
+
'hierarchyAttribute'?: string | null;
|
|
24587
24877
|
/**
|
|
24588
24878
|
* Flag indicating whether or not the include permissions with the object data when aggregating the schema.
|
|
24589
24879
|
* @type {boolean}
|
|
@@ -24619,7 +24909,7 @@ export interface SchemaBeta {
|
|
|
24619
24909
|
* @type {string}
|
|
24620
24910
|
* @memberof SchemaBeta
|
|
24621
24911
|
*/
|
|
24622
|
-
'modified'?: string;
|
|
24912
|
+
'modified'?: string | null;
|
|
24623
24913
|
}
|
|
24624
24914
|
export declare const SchemaBetaFeaturesBeta: {
|
|
24625
24915
|
readonly Authenticate: "AUTHENTICATE";
|
|
@@ -27381,6 +27671,25 @@ export interface SourceEntitlementRequestConfigBeta {
|
|
|
27381
27671
|
*/
|
|
27382
27672
|
'accessRequestConfig'?: EntitlementAccessRequestConfigBeta;
|
|
27383
27673
|
}
|
|
27674
|
+
/**
|
|
27675
|
+
*
|
|
27676
|
+
* @export
|
|
27677
|
+
* @interface SourceItemRefBeta
|
|
27678
|
+
*/
|
|
27679
|
+
export interface SourceItemRefBeta {
|
|
27680
|
+
/**
|
|
27681
|
+
* The id for the source on which account selections are made
|
|
27682
|
+
* @type {string}
|
|
27683
|
+
* @memberof SourceItemRefBeta
|
|
27684
|
+
*/
|
|
27685
|
+
'sourceId'?: string | null;
|
|
27686
|
+
/**
|
|
27687
|
+
* A list of account selections on the source. Currently, only one selection per source is supported.
|
|
27688
|
+
* @type {Array<AccountItemRefBeta>}
|
|
27689
|
+
* @memberof SourceItemRefBeta
|
|
27690
|
+
*/
|
|
27691
|
+
'accounts'?: Array<AccountItemRefBeta> | null;
|
|
27692
|
+
}
|
|
27384
27693
|
/**
|
|
27385
27694
|
*
|
|
27386
27695
|
* @export
|
|
@@ -32368,7 +32677,7 @@ export declare class AccessModelMetadataBetaApi extends BaseAPI {
|
|
|
32368
32677
|
*/
|
|
32369
32678
|
export declare const AccessProfilesBetaApiAxiosParamCreator: (configuration?: Configuration) => {
|
|
32370
32679
|
/**
|
|
32371
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
32680
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
32372
32681
|
* @summary Create Access Profile
|
|
32373
32682
|
* @param {AccessProfileBeta} accessProfileBeta
|
|
32374
32683
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -32451,7 +32760,7 @@ export declare const AccessProfilesBetaApiAxiosParamCreator: (configuration?: Co
|
|
|
32451
32760
|
*/
|
|
32452
32761
|
export declare const AccessProfilesBetaApiFp: (configuration?: Configuration) => {
|
|
32453
32762
|
/**
|
|
32454
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
32763
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
32455
32764
|
* @summary Create Access Profile
|
|
32456
32765
|
* @param {AccessProfileBeta} accessProfileBeta
|
|
32457
32766
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -32534,7 +32843,7 @@ export declare const AccessProfilesBetaApiFp: (configuration?: Configuration) =>
|
|
|
32534
32843
|
*/
|
|
32535
32844
|
export declare const AccessProfilesBetaApiFactory: (configuration?: Configuration, basePath?: string, axios?: AxiosInstance) => {
|
|
32536
32845
|
/**
|
|
32537
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
32846
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
32538
32847
|
* @summary Create Access Profile
|
|
32539
32848
|
* @param {AccessProfilesBetaApiCreateAccessProfileRequest} requestParameters Request parameters.
|
|
32540
32849
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -32788,7 +33097,7 @@ export interface AccessProfilesBetaApiUpdateAccessProfilesInBulkRequest {
|
|
|
32788
33097
|
*/
|
|
32789
33098
|
export declare class AccessProfilesBetaApi extends BaseAPI {
|
|
32790
33099
|
/**
|
|
32791
|
-
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
|
|
33100
|
+
* Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
|
|
32792
33101
|
* @summary Create Access Profile
|
|
32793
33102
|
* @param {AccessProfilesBetaApiCreateAccessProfileRequest} requestParameters Request parameters.
|
|
32794
33103
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -33393,7 +33702,7 @@ export declare const AccessRequestsBetaApiAxiosParamCreator: (configuration?: Co
|
|
|
33393
33702
|
*/
|
|
33394
33703
|
closeAccessRequest: (closeAccessRequestBeta: CloseAccessRequestBeta, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
33395
33704
|
/**
|
|
33396
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
33705
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
33397
33706
|
* @summary Submit Access Request
|
|
33398
33707
|
* @param {AccessRequestBeta} accessRequestBeta
|
|
33399
33708
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -33455,7 +33764,7 @@ export declare const AccessRequestsBetaApiFp: (configuration?: Configuration) =>
|
|
|
33455
33764
|
*/
|
|
33456
33765
|
closeAccessRequest(closeAccessRequestBeta: CloseAccessRequestBeta, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<object>>;
|
|
33457
33766
|
/**
|
|
33458
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
33767
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
33459
33768
|
* @summary Submit Access Request
|
|
33460
33769
|
* @param {AccessRequestBeta} accessRequestBeta
|
|
33461
33770
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -33517,7 +33826,7 @@ export declare const AccessRequestsBetaApiFactory: (configuration?: Configuratio
|
|
|
33517
33826
|
*/
|
|
33518
33827
|
closeAccessRequest(requestParameters: AccessRequestsBetaApiCloseAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<object>;
|
|
33519
33828
|
/**
|
|
33520
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
33829
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
33521
33830
|
* @summary Submit Access Request
|
|
33522
33831
|
* @param {AccessRequestsBetaApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
33523
33832
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -33693,7 +34002,7 @@ export declare class AccessRequestsBetaApi extends BaseAPI {
|
|
|
33693
34002
|
*/
|
|
33694
34003
|
closeAccessRequest(requestParameters: AccessRequestsBetaApiCloseAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<object, any>>;
|
|
33695
34004
|
/**
|
|
33696
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
|
|
34005
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
|
|
33697
34006
|
* @summary Submit Access Request
|
|
33698
34007
|
* @param {AccessRequestsBetaApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
33699
34008
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -57264,11 +57573,11 @@ export declare const ServiceDeskIntegrationBetaApiAxiosParamCreator: (configurat
|
|
|
57264
57573
|
* Update an existing Service Desk integration by ID with a PATCH request.
|
|
57265
57574
|
* @summary Patch a Service Desk Integration
|
|
57266
57575
|
* @param {string} id ID of the Service Desk integration to update
|
|
57267
|
-
* @param {
|
|
57576
|
+
* @param {Array<JsonPatchOperationBeta>} jsonPatchOperationBeta A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only `replace` operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
|
|
57268
57577
|
* @param {*} [axiosOptions] Override http request option.
|
|
57269
57578
|
* @throws {RequiredError}
|
|
57270
57579
|
*/
|
|
57271
|
-
patchServiceDeskIntegration: (id: string,
|
|
57580
|
+
patchServiceDeskIntegration: (id: string, jsonPatchOperationBeta: Array<JsonPatchOperationBeta>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
57272
57581
|
/**
|
|
57273
57582
|
* Update an existing Service Desk integration by ID.
|
|
57274
57583
|
* @summary Update a Service Desk integration
|
|
@@ -57354,11 +57663,11 @@ export declare const ServiceDeskIntegrationBetaApiFp: (configuration?: Configura
|
|
|
57354
57663
|
* Update an existing Service Desk integration by ID with a PATCH request.
|
|
57355
57664
|
* @summary Patch a Service Desk Integration
|
|
57356
57665
|
* @param {string} id ID of the Service Desk integration to update
|
|
57357
|
-
* @param {
|
|
57666
|
+
* @param {Array<JsonPatchOperationBeta>} jsonPatchOperationBeta A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only `replace` operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
|
|
57358
57667
|
* @param {*} [axiosOptions] Override http request option.
|
|
57359
57668
|
* @throws {RequiredError}
|
|
57360
57669
|
*/
|
|
57361
|
-
patchServiceDeskIntegration(id: string,
|
|
57670
|
+
patchServiceDeskIntegration(id: string, jsonPatchOperationBeta: Array<JsonPatchOperationBeta>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceDeskIntegrationDtoBeta>>;
|
|
57362
57671
|
/**
|
|
57363
57672
|
* Update an existing Service Desk integration by ID.
|
|
57364
57673
|
* @summary Update a Service Desk integration
|
|
@@ -57564,10 +57873,10 @@ export interface ServiceDeskIntegrationBetaApiPatchServiceDeskIntegrationRequest
|
|
|
57564
57873
|
readonly id: string;
|
|
57565
57874
|
/**
|
|
57566
57875
|
* A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only `replace` operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
|
|
57567
|
-
* @type {
|
|
57876
|
+
* @type {Array<JsonPatchOperationBeta>}
|
|
57568
57877
|
* @memberof ServiceDeskIntegrationBetaApiPatchServiceDeskIntegration
|
|
57569
57878
|
*/
|
|
57570
|
-
readonly
|
|
57879
|
+
readonly jsonPatchOperationBeta: Array<JsonPatchOperationBeta>;
|
|
57571
57880
|
}
|
|
57572
57881
|
/**
|
|
57573
57882
|
* Request parameters for putServiceDeskIntegration operation in ServiceDeskIntegrationBetaApi.
|
|
@@ -64125,10 +64434,11 @@ export declare const WorkflowsBetaApiAxiosParamCreator: (configuration?: Configu
|
|
|
64125
64434
|
* Get a single workflow by id.
|
|
64126
64435
|
* @summary Get Workflow By Id
|
|
64127
64436
|
* @param {string} id Id of the workflow
|
|
64437
|
+
* @param {boolean} [workflowMetrics] disable workflow metrics
|
|
64128
64438
|
* @param {*} [axiosOptions] Override http request option.
|
|
64129
64439
|
* @throws {RequiredError}
|
|
64130
64440
|
*/
|
|
64131
|
-
getWorkflow: (id: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
64441
|
+
getWorkflow: (id: string, workflowMetrics?: boolean, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
64132
64442
|
/**
|
|
64133
64443
|
* Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
|
|
64134
64444
|
* @summary Get Workflow Execution
|
|
@@ -64196,10 +64506,14 @@ export declare const WorkflowsBetaApiAxiosParamCreator: (configuration?: Configu
|
|
|
64196
64506
|
/**
|
|
64197
64507
|
* List all workflows in the tenant.
|
|
64198
64508
|
* @summary List Workflows
|
|
64509
|
+
* @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
64510
|
+
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
64511
|
+
* @param {string} [triggerId] Trigger ID
|
|
64512
|
+
* @param {string} [connectorInstanceId] Connector Instance ID
|
|
64199
64513
|
* @param {*} [axiosOptions] Override http request option.
|
|
64200
64514
|
* @throws {RequiredError}
|
|
64201
64515
|
*/
|
|
64202
|
-
listWorkflows: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
64516
|
+
listWorkflows: (limit?: number, offset?: number, triggerId?: string, connectorInstanceId?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
64203
64517
|
/**
|
|
64204
64518
|
* Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
|
|
64205
64519
|
* @summary Patch Workflow
|
|
@@ -64226,6 +64540,15 @@ export declare const WorkflowsBetaApiAxiosParamCreator: (configuration?: Configu
|
|
|
64226
64540
|
* @throws {RequiredError}
|
|
64227
64541
|
*/
|
|
64228
64542
|
postWorkflowExternalTrigger: (id: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
64543
|
+
/**
|
|
64544
|
+
* Perform a full update of a workflow. The updated workflow object is returned in the response.
|
|
64545
|
+
* @summary Update Workflow
|
|
64546
|
+
* @param {string} id Id of the Workflow
|
|
64547
|
+
* @param {WorkflowBodyBeta} workflowBodyBeta
|
|
64548
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
64549
|
+
* @throws {RequiredError}
|
|
64550
|
+
*/
|
|
64551
|
+
putWorkflow: (id: string, workflowBodyBeta: WorkflowBodyBeta, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
64229
64552
|
/**
|
|
64230
64553
|
* Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
|
|
64231
64554
|
* @summary Test Workflow via External Trigger
|
|
@@ -64244,15 +64567,6 @@ export declare const WorkflowsBetaApiAxiosParamCreator: (configuration?: Configu
|
|
|
64244
64567
|
* @throws {RequiredError}
|
|
64245
64568
|
*/
|
|
64246
64569
|
testWorkflow: (id: string, testWorkflowRequestBeta: TestWorkflowRequestBeta, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
64247
|
-
/**
|
|
64248
|
-
* Perform a full update of a workflow. The updated workflow object is returned in the response.
|
|
64249
|
-
* @summary Update Workflow
|
|
64250
|
-
* @param {string} id Id of the Workflow
|
|
64251
|
-
* @param {WorkflowBodyBeta} workflowBodyBeta
|
|
64252
|
-
* @param {*} [axiosOptions] Override http request option.
|
|
64253
|
-
* @throws {RequiredError}
|
|
64254
|
-
*/
|
|
64255
|
-
updateWorkflow: (id: string, workflowBodyBeta: WorkflowBodyBeta, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
|
|
64256
64570
|
};
|
|
64257
64571
|
/**
|
|
64258
64572
|
* WorkflowsBetaApi - functional programming interface
|
|
@@ -64287,10 +64601,11 @@ export declare const WorkflowsBetaApiFp: (configuration?: Configuration) => {
|
|
|
64287
64601
|
* Get a single workflow by id.
|
|
64288
64602
|
* @summary Get Workflow By Id
|
|
64289
64603
|
* @param {string} id Id of the workflow
|
|
64604
|
+
* @param {boolean} [workflowMetrics] disable workflow metrics
|
|
64290
64605
|
* @param {*} [axiosOptions] Override http request option.
|
|
64291
64606
|
* @throws {RequiredError}
|
|
64292
64607
|
*/
|
|
64293
|
-
getWorkflow(id: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowBeta>>;
|
|
64608
|
+
getWorkflow(id: string, workflowMetrics?: boolean, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowBeta>>;
|
|
64294
64609
|
/**
|
|
64295
64610
|
* Get a single workflow execution. Workflow executions are available for up to 90 days before being archived. If you attempt to access a workflow execution that has been archived, you will receive a \"404 Not Found\" response.
|
|
64296
64611
|
* @summary Get Workflow Execution
|
|
@@ -64358,10 +64673,14 @@ export declare const WorkflowsBetaApiFp: (configuration?: Configuration) => {
|
|
|
64358
64673
|
/**
|
|
64359
64674
|
* List all workflows in the tenant.
|
|
64360
64675
|
* @summary List Workflows
|
|
64676
|
+
* @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
64677
|
+
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
64678
|
+
* @param {string} [triggerId] Trigger ID
|
|
64679
|
+
* @param {string} [connectorInstanceId] Connector Instance ID
|
|
64361
64680
|
* @param {*} [axiosOptions] Override http request option.
|
|
64362
64681
|
* @throws {RequiredError}
|
|
64363
64682
|
*/
|
|
64364
|
-
listWorkflows(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<WorkflowBeta>>>;
|
|
64683
|
+
listWorkflows(limit?: number, offset?: number, triggerId?: string, connectorInstanceId?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<WorkflowBeta>>>;
|
|
64365
64684
|
/**
|
|
64366
64685
|
* Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
|
|
64367
64686
|
* @summary Patch Workflow
|
|
@@ -64388,6 +64707,15 @@ export declare const WorkflowsBetaApiFp: (configuration?: Configuration) => {
|
|
|
64388
64707
|
* @throws {RequiredError}
|
|
64389
64708
|
*/
|
|
64390
64709
|
postWorkflowExternalTrigger(id: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowOAuthClientBeta>>;
|
|
64710
|
+
/**
|
|
64711
|
+
* Perform a full update of a workflow. The updated workflow object is returned in the response.
|
|
64712
|
+
* @summary Update Workflow
|
|
64713
|
+
* @param {string} id Id of the Workflow
|
|
64714
|
+
* @param {WorkflowBodyBeta} workflowBodyBeta
|
|
64715
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
64716
|
+
* @throws {RequiredError}
|
|
64717
|
+
*/
|
|
64718
|
+
putWorkflow(id: string, workflowBodyBeta: WorkflowBodyBeta, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowBeta>>;
|
|
64391
64719
|
/**
|
|
64392
64720
|
* Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
|
|
64393
64721
|
* @summary Test Workflow via External Trigger
|
|
@@ -64406,15 +64734,6 @@ export declare const WorkflowsBetaApiFp: (configuration?: Configuration) => {
|
|
|
64406
64734
|
* @throws {RequiredError}
|
|
64407
64735
|
*/
|
|
64408
64736
|
testWorkflow(id: string, testWorkflowRequestBeta: TestWorkflowRequestBeta, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<TestWorkflow200ResponseBeta>>;
|
|
64409
|
-
/**
|
|
64410
|
-
* Perform a full update of a workflow. The updated workflow object is returned in the response.
|
|
64411
|
-
* @summary Update Workflow
|
|
64412
|
-
* @param {string} id Id of the Workflow
|
|
64413
|
-
* @param {WorkflowBodyBeta} workflowBodyBeta
|
|
64414
|
-
* @param {*} [axiosOptions] Override http request option.
|
|
64415
|
-
* @throws {RequiredError}
|
|
64416
|
-
*/
|
|
64417
|
-
updateWorkflow(id: string, workflowBodyBeta: WorkflowBodyBeta, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<WorkflowBeta>>;
|
|
64418
64737
|
};
|
|
64419
64738
|
/**
|
|
64420
64739
|
* WorkflowsBetaApi - factory interface
|
|
@@ -64511,10 +64830,11 @@ export declare const WorkflowsBetaApiFactory: (configuration?: Configuration, ba
|
|
|
64511
64830
|
/**
|
|
64512
64831
|
* List all workflows in the tenant.
|
|
64513
64832
|
* @summary List Workflows
|
|
64833
|
+
* @param {WorkflowsBetaApiListWorkflowsRequest} requestParameters Request parameters.
|
|
64514
64834
|
* @param {*} [axiosOptions] Override http request option.
|
|
64515
64835
|
* @throws {RequiredError}
|
|
64516
64836
|
*/
|
|
64517
|
-
listWorkflows(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<WorkflowBeta>>;
|
|
64837
|
+
listWorkflows(requestParameters?: WorkflowsBetaApiListWorkflowsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<WorkflowBeta>>;
|
|
64518
64838
|
/**
|
|
64519
64839
|
* Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
|
|
64520
64840
|
* @summary Patch Workflow
|
|
@@ -64539,6 +64859,14 @@ export declare const WorkflowsBetaApiFactory: (configuration?: Configuration, ba
|
|
|
64539
64859
|
* @throws {RequiredError}
|
|
64540
64860
|
*/
|
|
64541
64861
|
postWorkflowExternalTrigger(requestParameters: WorkflowsBetaApiPostWorkflowExternalTriggerRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<WorkflowOAuthClientBeta>;
|
|
64862
|
+
/**
|
|
64863
|
+
* Perform a full update of a workflow. The updated workflow object is returned in the response.
|
|
64864
|
+
* @summary Update Workflow
|
|
64865
|
+
* @param {WorkflowsBetaApiPutWorkflowRequest} requestParameters Request parameters.
|
|
64866
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
64867
|
+
* @throws {RequiredError}
|
|
64868
|
+
*/
|
|
64869
|
+
putWorkflow(requestParameters: WorkflowsBetaApiPutWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<WorkflowBeta>;
|
|
64542
64870
|
/**
|
|
64543
64871
|
* Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
|
|
64544
64872
|
* @summary Test Workflow via External Trigger
|
|
@@ -64555,14 +64883,6 @@ export declare const WorkflowsBetaApiFactory: (configuration?: Configuration, ba
|
|
|
64555
64883
|
* @throws {RequiredError}
|
|
64556
64884
|
*/
|
|
64557
64885
|
testWorkflow(requestParameters: WorkflowsBetaApiTestWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<TestWorkflow200ResponseBeta>;
|
|
64558
|
-
/**
|
|
64559
|
-
* Perform a full update of a workflow. The updated workflow object is returned in the response.
|
|
64560
|
-
* @summary Update Workflow
|
|
64561
|
-
* @param {WorkflowsBetaApiUpdateWorkflowRequest} requestParameters Request parameters.
|
|
64562
|
-
* @param {*} [axiosOptions] Override http request option.
|
|
64563
|
-
* @throws {RequiredError}
|
|
64564
|
-
*/
|
|
64565
|
-
updateWorkflow(requestParameters: WorkflowsBetaApiUpdateWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<WorkflowBeta>;
|
|
64566
64886
|
};
|
|
64567
64887
|
/**
|
|
64568
64888
|
* Request parameters for cancelWorkflowExecution operation in WorkflowsBetaApi.
|
|
@@ -64615,6 +64935,12 @@ export interface WorkflowsBetaApiGetWorkflowRequest {
|
|
|
64615
64935
|
* @memberof WorkflowsBetaApiGetWorkflow
|
|
64616
64936
|
*/
|
|
64617
64937
|
readonly id: string;
|
|
64938
|
+
/**
|
|
64939
|
+
* disable workflow metrics
|
|
64940
|
+
* @type {boolean}
|
|
64941
|
+
* @memberof WorkflowsBetaApiGetWorkflow
|
|
64942
|
+
*/
|
|
64943
|
+
readonly workflowMetrics?: boolean;
|
|
64618
64944
|
}
|
|
64619
64945
|
/**
|
|
64620
64946
|
* Request parameters for getWorkflowExecution operation in WorkflowsBetaApi.
|
|
@@ -64748,6 +65074,37 @@ export interface WorkflowsBetaApiListWorkflowLibraryTriggersRequest {
|
|
|
64748
65074
|
*/
|
|
64749
65075
|
readonly filters?: string;
|
|
64750
65076
|
}
|
|
65077
|
+
/**
|
|
65078
|
+
* Request parameters for listWorkflows operation in WorkflowsBetaApi.
|
|
65079
|
+
* @export
|
|
65080
|
+
* @interface WorkflowsBetaApiListWorkflowsRequest
|
|
65081
|
+
*/
|
|
65082
|
+
export interface WorkflowsBetaApiListWorkflowsRequest {
|
|
65083
|
+
/**
|
|
65084
|
+
* Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
65085
|
+
* @type {number}
|
|
65086
|
+
* @memberof WorkflowsBetaApiListWorkflows
|
|
65087
|
+
*/
|
|
65088
|
+
readonly limit?: number;
|
|
65089
|
+
/**
|
|
65090
|
+
* Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
|
|
65091
|
+
* @type {number}
|
|
65092
|
+
* @memberof WorkflowsBetaApiListWorkflows
|
|
65093
|
+
*/
|
|
65094
|
+
readonly offset?: number;
|
|
65095
|
+
/**
|
|
65096
|
+
* Trigger ID
|
|
65097
|
+
* @type {string}
|
|
65098
|
+
* @memberof WorkflowsBetaApiListWorkflows
|
|
65099
|
+
*/
|
|
65100
|
+
readonly triggerId?: string;
|
|
65101
|
+
/**
|
|
65102
|
+
* Connector Instance ID
|
|
65103
|
+
* @type {string}
|
|
65104
|
+
* @memberof WorkflowsBetaApiListWorkflows
|
|
65105
|
+
*/
|
|
65106
|
+
readonly connectorInstanceId?: string;
|
|
65107
|
+
}
|
|
64751
65108
|
/**
|
|
64752
65109
|
* Request parameters for patchWorkflow operation in WorkflowsBetaApi.
|
|
64753
65110
|
* @export
|
|
@@ -64799,6 +65156,25 @@ export interface WorkflowsBetaApiPostWorkflowExternalTriggerRequest {
|
|
|
64799
65156
|
*/
|
|
64800
65157
|
readonly id: string;
|
|
64801
65158
|
}
|
|
65159
|
+
/**
|
|
65160
|
+
* Request parameters for putWorkflow operation in WorkflowsBetaApi.
|
|
65161
|
+
* @export
|
|
65162
|
+
* @interface WorkflowsBetaApiPutWorkflowRequest
|
|
65163
|
+
*/
|
|
65164
|
+
export interface WorkflowsBetaApiPutWorkflowRequest {
|
|
65165
|
+
/**
|
|
65166
|
+
* Id of the Workflow
|
|
65167
|
+
* @type {string}
|
|
65168
|
+
* @memberof WorkflowsBetaApiPutWorkflow
|
|
65169
|
+
*/
|
|
65170
|
+
readonly id: string;
|
|
65171
|
+
/**
|
|
65172
|
+
*
|
|
65173
|
+
* @type {WorkflowBodyBeta}
|
|
65174
|
+
* @memberof WorkflowsBetaApiPutWorkflow
|
|
65175
|
+
*/
|
|
65176
|
+
readonly workflowBodyBeta: WorkflowBodyBeta;
|
|
65177
|
+
}
|
|
64802
65178
|
/**
|
|
64803
65179
|
* Request parameters for testExternalExecuteWorkflow operation in WorkflowsBetaApi.
|
|
64804
65180
|
* @export
|
|
@@ -64837,25 +65213,6 @@ export interface WorkflowsBetaApiTestWorkflowRequest {
|
|
|
64837
65213
|
*/
|
|
64838
65214
|
readonly testWorkflowRequestBeta: TestWorkflowRequestBeta;
|
|
64839
65215
|
}
|
|
64840
|
-
/**
|
|
64841
|
-
* Request parameters for updateWorkflow operation in WorkflowsBetaApi.
|
|
64842
|
-
* @export
|
|
64843
|
-
* @interface WorkflowsBetaApiUpdateWorkflowRequest
|
|
64844
|
-
*/
|
|
64845
|
-
export interface WorkflowsBetaApiUpdateWorkflowRequest {
|
|
64846
|
-
/**
|
|
64847
|
-
* Id of the Workflow
|
|
64848
|
-
* @type {string}
|
|
64849
|
-
* @memberof WorkflowsBetaApiUpdateWorkflow
|
|
64850
|
-
*/
|
|
64851
|
-
readonly id: string;
|
|
64852
|
-
/**
|
|
64853
|
-
*
|
|
64854
|
-
* @type {WorkflowBodyBeta}
|
|
64855
|
-
* @memberof WorkflowsBetaApiUpdateWorkflow
|
|
64856
|
-
*/
|
|
64857
|
-
readonly workflowBodyBeta: WorkflowBodyBeta;
|
|
64858
|
-
}
|
|
64859
65216
|
/**
|
|
64860
65217
|
* WorkflowsBetaApi - object-oriented interface
|
|
64861
65218
|
* @export
|
|
@@ -64964,11 +65321,12 @@ export declare class WorkflowsBetaApi extends BaseAPI {
|
|
|
64964
65321
|
/**
|
|
64965
65322
|
* List all workflows in the tenant.
|
|
64966
65323
|
* @summary List Workflows
|
|
65324
|
+
* @param {WorkflowsBetaApiListWorkflowsRequest} requestParameters Request parameters.
|
|
64967
65325
|
* @param {*} [axiosOptions] Override http request option.
|
|
64968
65326
|
* @throws {RequiredError}
|
|
64969
65327
|
* @memberof WorkflowsBetaApi
|
|
64970
65328
|
*/
|
|
64971
|
-
listWorkflows(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<WorkflowBeta[], any>>;
|
|
65329
|
+
listWorkflows(requestParameters?: WorkflowsBetaApiListWorkflowsRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<WorkflowBeta[], any>>;
|
|
64972
65330
|
/**
|
|
64973
65331
|
* Partially update an existing Workflow using [JSON Patch](https://tools.ietf.org/html/rfc6902) syntax.
|
|
64974
65332
|
* @summary Patch Workflow
|
|
@@ -64996,6 +65354,15 @@ export declare class WorkflowsBetaApi extends BaseAPI {
|
|
|
64996
65354
|
* @memberof WorkflowsBetaApi
|
|
64997
65355
|
*/
|
|
64998
65356
|
postWorkflowExternalTrigger(requestParameters: WorkflowsBetaApiPostWorkflowExternalTriggerRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<WorkflowOAuthClientBeta, any>>;
|
|
65357
|
+
/**
|
|
65358
|
+
* Perform a full update of a workflow. The updated workflow object is returned in the response.
|
|
65359
|
+
* @summary Update Workflow
|
|
65360
|
+
* @param {WorkflowsBetaApiPutWorkflowRequest} requestParameters Request parameters.
|
|
65361
|
+
* @param {*} [axiosOptions] Override http request option.
|
|
65362
|
+
* @throws {RequiredError}
|
|
65363
|
+
* @memberof WorkflowsBetaApi
|
|
65364
|
+
*/
|
|
65365
|
+
putWorkflow(requestParameters: WorkflowsBetaApiPutWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<WorkflowBeta, any>>;
|
|
64999
65366
|
/**
|
|
65000
65367
|
* Validate a workflow with an \"External Trigger\" can receive input. The response includes the input that the workflow received, which can be used to validate that the input is intact when it reaches the workflow.
|
|
65001
65368
|
* @summary Test Workflow via External Trigger
|
|
@@ -65014,13 +65381,4 @@ export declare class WorkflowsBetaApi extends BaseAPI {
|
|
|
65014
65381
|
* @memberof WorkflowsBetaApi
|
|
65015
65382
|
*/
|
|
65016
65383
|
testWorkflow(requestParameters: WorkflowsBetaApiTestWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<TestWorkflow200ResponseBeta, any>>;
|
|
65017
|
-
/**
|
|
65018
|
-
* Perform a full update of a workflow. The updated workflow object is returned in the response.
|
|
65019
|
-
* @summary Update Workflow
|
|
65020
|
-
* @param {WorkflowsBetaApiUpdateWorkflowRequest} requestParameters Request parameters.
|
|
65021
|
-
* @param {*} [axiosOptions] Override http request option.
|
|
65022
|
-
* @throws {RequiredError}
|
|
65023
|
-
* @memberof WorkflowsBetaApi
|
|
65024
|
-
*/
|
|
65025
|
-
updateWorkflow(requestParameters: WorkflowsBetaApiUpdateWorkflowRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<WorkflowBeta, any>>;
|
|
65026
65384
|
}
|