sailpoint-api-client 1.5.0 → 1.6.1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -2254,6 +2254,18 @@ export interface AccessRequestItemV2024 {
2254
2254
  * @memberof AccessRequestItemV2024
2255
2255
  */
2256
2256
  'removeDate'?: string;
2257
+ /**
2258
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
2259
+ * @type {string}
2260
+ * @memberof AccessRequestItemV2024
2261
+ */
2262
+ 'assignmentId'?: string | null;
2263
+ /**
2264
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
2265
+ * @type {string}
2266
+ * @memberof AccessRequestItemV2024
2267
+ */
2268
+ 'nativeIdentity'?: string | null;
2257
2269
  }
2258
2270
  export declare const AccessRequestItemV2024TypeV2024: {
2259
2271
  readonly AccessProfile: "ACCESS_PROFILE";
@@ -2904,6 +2916,12 @@ export interface AccessRequestV2024 {
2904
2916
  'clientMetadata'?: {
2905
2917
  [key: string]: string;
2906
2918
  };
2919
+ /**
2920
+ * Additional submit data structure with requestedFor containing requestedItems allowing distinction for each request item and Identity. * Can only be used when \'requestedFor\' and \'requestedItems\' are not separately provided * Adds ability to specify which account the user wants the access on, in case they have multiple accounts on a source * Allows the ability to request items with different remove dates * Also allows different combinations of request items and identities in the same request
2921
+ * @type {Array<RequestedForDtoRefV2024>}
2922
+ * @memberof AccessRequestV2024
2923
+ */
2924
+ 'requestedForWithRequestedItems'?: Array<RequestedForDtoRefV2024> | null;
2907
2925
  }
2908
2926
  /**
2909
2927
  *
@@ -4428,6 +4446,62 @@ export interface AccountInfoDtoV2024 {
4428
4446
  */
4429
4447
  'uuid'?: string;
4430
4448
  }
4449
+ /**
4450
+ *
4451
+ * @export
4452
+ * @interface AccountInfoRefV2024
4453
+ */
4454
+ export interface AccountInfoRefV2024 {
4455
+ /**
4456
+ * The uuid for the account, available under the \'objectguid\' attribute
4457
+ * @type {string}
4458
+ * @memberof AccountInfoRefV2024
4459
+ */
4460
+ 'uuid'?: string;
4461
+ /**
4462
+ * The \'distinguishedName\' attribute for the account
4463
+ * @type {string}
4464
+ * @memberof AccountInfoRefV2024
4465
+ */
4466
+ 'nativeIdentity'?: string;
4467
+ /**
4468
+ *
4469
+ * @type {DtoTypeV2024}
4470
+ * @memberof AccountInfoRefV2024
4471
+ */
4472
+ 'type'?: DtoTypeV2024;
4473
+ /**
4474
+ * The account id
4475
+ * @type {string}
4476
+ * @memberof AccountInfoRefV2024
4477
+ */
4478
+ 'id'?: string;
4479
+ /**
4480
+ * The account display name
4481
+ * @type {string}
4482
+ * @memberof AccountInfoRefV2024
4483
+ */
4484
+ 'name'?: string;
4485
+ }
4486
+ /**
4487
+ *
4488
+ * @export
4489
+ * @interface AccountItemRefV2024
4490
+ */
4491
+ export interface AccountItemRefV2024 {
4492
+ /**
4493
+ * The uuid for the account, available under the \'objectguid\' attribute
4494
+ * @type {string}
4495
+ * @memberof AccountItemRefV2024
4496
+ */
4497
+ 'accountUuid'?: string | null;
4498
+ /**
4499
+ * The \'distinguishedName\' attribute for the account
4500
+ * @type {string}
4501
+ * @memberof AccountItemRefV2024
4502
+ */
4503
+ 'nativeIdentity'?: string;
4504
+ }
4431
4505
  /**
4432
4506
  * If an account activity item is associated with an access request, captures details of that request.
4433
4507
  * @export
@@ -5191,6 +5265,52 @@ export interface AccountsExportReportArgumentsV2024 {
5191
5265
  */
5192
5266
  'sourceName': string;
5193
5267
  }
5268
+ /**
5269
+ *
5270
+ * @export
5271
+ * @interface AccountsSelectionRequestV2024
5272
+ */
5273
+ export interface AccountsSelectionRequestV2024 {
5274
+ /**
5275
+ * A list of Identity IDs for whom the Access is requested.
5276
+ * @type {Array<string>}
5277
+ * @memberof AccountsSelectionRequestV2024
5278
+ */
5279
+ 'requestedFor': Array<string>;
5280
+ /**
5281
+ *
5282
+ * @type {AccessRequestTypeV2024}
5283
+ * @memberof AccountsSelectionRequestV2024
5284
+ */
5285
+ 'requestType'?: AccessRequestTypeV2024 | null;
5286
+ /**
5287
+ *
5288
+ * @type {Array<AccessRequestItemV2024>}
5289
+ * @memberof AccountsSelectionRequestV2024
5290
+ */
5291
+ 'requestedItems': Array<AccessRequestItemV2024>;
5292
+ /**
5293
+ * Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities.
5294
+ * @type {{ [key: string]: string; }}
5295
+ * @memberof AccountsSelectionRequestV2024
5296
+ */
5297
+ 'clientMetadata'?: {
5298
+ [key: string]: string;
5299
+ };
5300
+ }
5301
+ /**
5302
+ *
5303
+ * @export
5304
+ * @interface AccountsSelectionResponseV2024
5305
+ */
5306
+ export interface AccountsSelectionResponseV2024 {
5307
+ /**
5308
+ * A list of available account selections per identity in the request, for all the requested items
5309
+ * @type {Array<IdentityAccountSelectionsV2024>}
5310
+ * @memberof AccountsSelectionResponseV2024
5311
+ */
5312
+ 'identities'?: Array<IdentityAccountSelectionsV2024>;
5313
+ }
5194
5314
  /**
5195
5315
  *
5196
5316
  * @export
@@ -6513,6 +6633,7 @@ export declare const AttributeDefinitionTypeV2024: {
6513
6633
  readonly Long: "LONG";
6514
6634
  readonly Int: "INT";
6515
6635
  readonly Boolean: "BOOLEAN";
6636
+ readonly Date: "DATE";
6516
6637
  };
6517
6638
  export type AttributeDefinitionTypeV2024 = typeof AttributeDefinitionTypeV2024[keyof typeof AttributeDefinitionTypeV2024];
6518
6639
  /**
@@ -15797,6 +15918,30 @@ export interface FeatureValueDtoV2024 {
15797
15918
  */
15798
15919
  'denominator'?: number;
15799
15920
  }
15921
+ /**
15922
+ *
15923
+ * @export
15924
+ * @interface FederationProtocolDetailsV2024
15925
+ */
15926
+ export interface FederationProtocolDetailsV2024 {
15927
+ /**
15928
+ * Federation protocol role
15929
+ * @type {string}
15930
+ * @memberof FederationProtocolDetailsV2024
15931
+ */
15932
+ 'role'?: FederationProtocolDetailsV2024RoleV2024;
15933
+ /**
15934
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
15935
+ * @type {string}
15936
+ * @memberof FederationProtocolDetailsV2024
15937
+ */
15938
+ 'entityId'?: string;
15939
+ }
15940
+ export declare const FederationProtocolDetailsV2024RoleV2024: {
15941
+ readonly SamlIdp: "SAML_IDP";
15942
+ readonly SamlSp: "SAML_SP";
15943
+ };
15944
+ export type FederationProtocolDetailsV2024RoleV2024 = typeof FederationProtocolDetailsV2024RoleV2024[keyof typeof FederationProtocolDetailsV2024RoleV2024];
15800
15945
  /**
15801
15946
  *
15802
15947
  * @export
@@ -16987,6 +17132,182 @@ export declare const GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequ
16987
17132
  readonly NoDecisions: "NO_DECISIONS";
16988
17133
  };
16989
17134
  export type GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024 = typeof GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024[keyof typeof GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024];
17135
+ /**
17136
+ *
17137
+ * @export
17138
+ * @interface GetCampaign200ResponseV2024
17139
+ */
17140
+ export interface GetCampaign200ResponseV2024 {
17141
+ /**
17142
+ * Id of the campaign
17143
+ * @type {string}
17144
+ * @memberof GetCampaign200ResponseV2024
17145
+ */
17146
+ 'id'?: string | null;
17147
+ /**
17148
+ * The campaign name. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
17149
+ * @type {string}
17150
+ * @memberof GetCampaign200ResponseV2024
17151
+ */
17152
+ 'name': string;
17153
+ /**
17154
+ * The campaign description. If this object is part of a template, special formatting applies; see the `/campaign-templates/{id}/generate` endpoint documentation for details.
17155
+ * @type {string}
17156
+ * @memberof GetCampaign200ResponseV2024
17157
+ */
17158
+ 'description': string | null;
17159
+ /**
17160
+ * The campaign\'s completion deadline. This date must be in the future in order to activate the campaign. If you try to activate a campaign with a deadline of today or in the past, you will receive a 400 error response.
17161
+ * @type {string}
17162
+ * @memberof GetCampaign200ResponseV2024
17163
+ */
17164
+ 'deadline'?: string | null;
17165
+ /**
17166
+ * The type of campaign. Could be extended in the future.
17167
+ * @type {string}
17168
+ * @memberof GetCampaign200ResponseV2024
17169
+ */
17170
+ 'type': GetCampaign200ResponseV2024TypeV2024;
17171
+ /**
17172
+ * Enables email notification for this campaign
17173
+ * @type {boolean}
17174
+ * @memberof GetCampaign200ResponseV2024
17175
+ */
17176
+ 'emailNotificationEnabled'?: boolean;
17177
+ /**
17178
+ * Allows auto revoke for this campaign
17179
+ * @type {boolean}
17180
+ * @memberof GetCampaign200ResponseV2024
17181
+ */
17182
+ 'autoRevokeAllowed'?: boolean;
17183
+ /**
17184
+ * Enables IAI for this campaign. Accepts true even if the IAI product feature is off. If IAI is turned off then campaigns generated from this template will indicate false. The real value will then be returned if IAI is ever enabled for the org in the future.
17185
+ * @type {boolean}
17186
+ * @memberof GetCampaign200ResponseV2024
17187
+ */
17188
+ 'recommendationsEnabled'?: boolean;
17189
+ /**
17190
+ * The campaign\'s current status.
17191
+ * @type {string}
17192
+ * @memberof GetCampaign200ResponseV2024
17193
+ */
17194
+ 'status'?: GetCampaign200ResponseV2024StatusV2024 | null;
17195
+ /**
17196
+ * The correlatedStatus of the campaign. Only SOURCE_OWNER campaigns can be Uncorrelated. An Uncorrelated certification campaign only includes Uncorrelated identities (An identity is uncorrelated if it has no accounts on an authoritative source).
17197
+ * @type {string}
17198
+ * @memberof GetCampaign200ResponseV2024
17199
+ */
17200
+ 'correlatedStatus'?: GetCampaign200ResponseV2024CorrelatedStatusV2024;
17201
+ /**
17202
+ * Created time of the campaign
17203
+ * @type {string}
17204
+ * @memberof GetCampaign200ResponseV2024
17205
+ */
17206
+ 'created'?: string | null;
17207
+ /**
17208
+ * The total number of certifications in this campaign.
17209
+ * @type {number}
17210
+ * @memberof GetCampaign200ResponseV2024
17211
+ */
17212
+ 'totalCertifications'?: number | null;
17213
+ /**
17214
+ * The number of completed certifications in this campaign.
17215
+ * @type {number}
17216
+ * @memberof GetCampaign200ResponseV2024
17217
+ */
17218
+ 'completedCertifications'?: number | null;
17219
+ /**
17220
+ * A list of errors and warnings that have accumulated.
17221
+ * @type {Array<CampaignAlertV2024>}
17222
+ * @memberof GetCampaign200ResponseV2024
17223
+ */
17224
+ 'alerts'?: Array<CampaignAlertV2024> | null;
17225
+ /**
17226
+ * Modified time of the campaign
17227
+ * @type {string}
17228
+ * @memberof GetCampaign200ResponseV2024
17229
+ */
17230
+ 'modified'?: string | null;
17231
+ /**
17232
+ *
17233
+ * @type {CampaignAllOfFilterV2024}
17234
+ * @memberof GetCampaign200ResponseV2024
17235
+ */
17236
+ 'filter'?: CampaignAllOfFilterV2024 | null;
17237
+ /**
17238
+ * Determines if comments on sunset date changes are required.
17239
+ * @type {boolean}
17240
+ * @memberof GetCampaign200ResponseV2024
17241
+ */
17242
+ 'sunsetCommentsRequired'?: boolean;
17243
+ /**
17244
+ *
17245
+ * @type {CampaignAllOfSourceOwnerCampaignInfoV2024}
17246
+ * @memberof GetCampaign200ResponseV2024
17247
+ */
17248
+ 'sourceOwnerCampaignInfo'?: CampaignAllOfSourceOwnerCampaignInfoV2024 | null;
17249
+ /**
17250
+ *
17251
+ * @type {CampaignAllOfSearchCampaignInfoV2024}
17252
+ * @memberof GetCampaign200ResponseV2024
17253
+ */
17254
+ 'searchCampaignInfo'?: CampaignAllOfSearchCampaignInfoV2024 | null;
17255
+ /**
17256
+ *
17257
+ * @type {CampaignAllOfRoleCompositionCampaignInfoV2024}
17258
+ * @memberof GetCampaign200ResponseV2024
17259
+ */
17260
+ 'roleCompositionCampaignInfo'?: CampaignAllOfRoleCompositionCampaignInfoV2024 | null;
17261
+ /**
17262
+ *
17263
+ * @type {CampaignAllOfMachineAccountCampaignInfoV2024}
17264
+ * @memberof GetCampaign200ResponseV2024
17265
+ */
17266
+ 'machineAccountCampaignInfo'?: CampaignAllOfMachineAccountCampaignInfoV2024 | null;
17267
+ /**
17268
+ * A list of sources in the campaign that contain \\\"orphan entitlements\\\" (entitlements without a corresponding Managed Attribute). An empty list indicates the campaign has no orphan entitlements. Null indicates there may be unknown orphan entitlements in the campaign (the campaign was created before this feature was implemented).
17269
+ * @type {Array<CampaignAllOfSourcesWithOrphanEntitlementsV2024>}
17270
+ * @memberof GetCampaign200ResponseV2024
17271
+ */
17272
+ 'sourcesWithOrphanEntitlements'?: Array<CampaignAllOfSourcesWithOrphanEntitlementsV2024> | null;
17273
+ /**
17274
+ * Determines whether comments are required for decisions during certification reviews. You can require comments for all decisions, revoke-only decisions, or no decisions. By default, comments are not required for decisions.
17275
+ * @type {string}
17276
+ * @memberof GetCampaign200ResponseV2024
17277
+ */
17278
+ 'mandatoryCommentRequirement'?: GetCampaign200ResponseV2024MandatoryCommentRequirementV2024;
17279
+ }
17280
+ export declare const GetCampaign200ResponseV2024TypeV2024: {
17281
+ readonly Manager: "MANAGER";
17282
+ readonly SourceOwner: "SOURCE_OWNER";
17283
+ readonly Search: "SEARCH";
17284
+ readonly RoleComposition: "ROLE_COMPOSITION";
17285
+ readonly MachineAccount: "MACHINE_ACCOUNT";
17286
+ };
17287
+ export type GetCampaign200ResponseV2024TypeV2024 = typeof GetCampaign200ResponseV2024TypeV2024[keyof typeof GetCampaign200ResponseV2024TypeV2024];
17288
+ export declare const GetCampaign200ResponseV2024StatusV2024: {
17289
+ readonly Pending: "PENDING";
17290
+ readonly Staged: "STAGED";
17291
+ readonly Canceling: "CANCELING";
17292
+ readonly Activating: "ACTIVATING";
17293
+ readonly Active: "ACTIVE";
17294
+ readonly Completing: "COMPLETING";
17295
+ readonly Completed: "COMPLETED";
17296
+ readonly Error: "ERROR";
17297
+ readonly Archived: "ARCHIVED";
17298
+ };
17299
+ export type GetCampaign200ResponseV2024StatusV2024 = typeof GetCampaign200ResponseV2024StatusV2024[keyof typeof GetCampaign200ResponseV2024StatusV2024];
17300
+ export declare const GetCampaign200ResponseV2024CorrelatedStatusV2024: {
17301
+ readonly Correlated: "CORRELATED";
17302
+ readonly Uncorrelated: "UNCORRELATED";
17303
+ };
17304
+ export type GetCampaign200ResponseV2024CorrelatedStatusV2024 = typeof GetCampaign200ResponseV2024CorrelatedStatusV2024[keyof typeof GetCampaign200ResponseV2024CorrelatedStatusV2024];
17305
+ export declare const GetCampaign200ResponseV2024MandatoryCommentRequirementV2024: {
17306
+ readonly AllDecisions: "ALL_DECISIONS";
17307
+ readonly RevokeOnlyDecisions: "REVOKE_ONLY_DECISIONS";
17308
+ readonly NoDecisions: "NO_DECISIONS";
17309
+ };
17310
+ export type GetCampaign200ResponseV2024MandatoryCommentRequirementV2024 = typeof GetCampaign200ResponseV2024MandatoryCommentRequirementV2024[keyof typeof GetCampaign200ResponseV2024MandatoryCommentRequirementV2024];
16990
17311
  /**
16991
17312
  * @type GetDiscoveredApplications200ResponseInnerV2024
16992
17313
  * @export
@@ -17548,6 +17869,43 @@ export type IdentityAccessV2024 = {
17548
17869
  } & AccessProfileEntitlementV2024 | {
17549
17870
  type: 'ROLE';
17550
17871
  } & AccessProfileRoleV2024;
17872
+ /**
17873
+ *
17874
+ * @export
17875
+ * @interface IdentityAccountSelectionsV2024
17876
+ */
17877
+ export interface IdentityAccountSelectionsV2024 {
17878
+ /**
17879
+ * Available account selections for the identity, per requested item
17880
+ * @type {Array<RequestedItemAccountSelectionsV2024>}
17881
+ * @memberof IdentityAccountSelectionsV2024
17882
+ */
17883
+ 'requestedItems'?: Array<RequestedItemAccountSelectionsV2024>;
17884
+ /**
17885
+ * A boolean indicating whether any account selections will be required for the user to raise an access request
17886
+ * @type {boolean}
17887
+ * @memberof IdentityAccountSelectionsV2024
17888
+ */
17889
+ 'accountsSelectionRequired'?: boolean;
17890
+ /**
17891
+ *
17892
+ * @type {DtoTypeV2024}
17893
+ * @memberof IdentityAccountSelectionsV2024
17894
+ */
17895
+ 'type'?: DtoTypeV2024;
17896
+ /**
17897
+ * The identity id for the user
17898
+ * @type {string}
17899
+ * @memberof IdentityAccountSelectionsV2024
17900
+ */
17901
+ 'id'?: string;
17902
+ /**
17903
+ * The name of the identity
17904
+ * @type {string}
17905
+ * @memberof IdentityAccountSelectionsV2024
17906
+ */
17907
+ 'name'?: string;
17908
+ }
17551
17909
  /**
17552
17910
  *
17553
17911
  * @export
@@ -19674,6 +20032,102 @@ export interface IdentityWithNewAccessV2024 {
19674
20032
  */
19675
20033
  'accessRefs': Array<IdentityWithNewAccessAccessRefsInnerV2024>;
19676
20034
  }
20035
+ /**
20036
+ *
20037
+ * @export
20038
+ * @interface IdpDetailsV2024
20039
+ */
20040
+ export interface IdpDetailsV2024 {
20041
+ /**
20042
+ * Federation protocol role
20043
+ * @type {string}
20044
+ * @memberof IdpDetailsV2024
20045
+ */
20046
+ 'role'?: IdpDetailsV2024RoleV2024;
20047
+ /**
20048
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
20049
+ * @type {string}
20050
+ * @memberof IdpDetailsV2024
20051
+ */
20052
+ 'entityId'?: string;
20053
+ /**
20054
+ * Defines the binding used for the SAML flow. Used with IDP configurations.
20055
+ * @type {string}
20056
+ * @memberof IdpDetailsV2024
20057
+ */
20058
+ 'binding'?: string;
20059
+ /**
20060
+ * Specifies the SAML authentication method to use. Used with IDP configurations.
20061
+ * @type {string}
20062
+ * @memberof IdpDetailsV2024
20063
+ */
20064
+ 'authnContext'?: string;
20065
+ /**
20066
+ * The IDP logout URL. Used with IDP configurations.
20067
+ * @type {string}
20068
+ * @memberof IdpDetailsV2024
20069
+ */
20070
+ 'logoutUrl'?: string;
20071
+ /**
20072
+ * Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
20073
+ * @type {boolean}
20074
+ * @memberof IdpDetailsV2024
20075
+ */
20076
+ 'includeAuthnContext'?: boolean;
20077
+ /**
20078
+ * The name id format to use. Used with IDP configurations.
20079
+ * @type {string}
20080
+ * @memberof IdpDetailsV2024
20081
+ */
20082
+ 'nameId'?: string;
20083
+ /**
20084
+ *
20085
+ * @type {JITConfigurationV2024}
20086
+ * @memberof IdpDetailsV2024
20087
+ */
20088
+ 'jitConfiguration'?: JITConfigurationV2024;
20089
+ /**
20090
+ * The Base64-encoded certificate used by the IDP. Used with IDP configurations.
20091
+ * @type {string}
20092
+ * @memberof IdpDetailsV2024
20093
+ */
20094
+ 'cert'?: string;
20095
+ /**
20096
+ * The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
20097
+ * @type {string}
20098
+ * @memberof IdpDetailsV2024
20099
+ */
20100
+ 'loginUrlPost'?: string;
20101
+ /**
20102
+ * The IDP Redirect URL. Used with IDP configurations.
20103
+ * @type {string}
20104
+ * @memberof IdpDetailsV2024
20105
+ */
20106
+ 'loginUrlRedirect'?: string;
20107
+ /**
20108
+ * Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
20109
+ * @type {string}
20110
+ * @memberof IdpDetailsV2024
20111
+ */
20112
+ 'mappingAttribute': string;
20113
+ /**
20114
+ * The expiration date extracted from the certificate.
20115
+ * @type {string}
20116
+ * @memberof IdpDetailsV2024
20117
+ */
20118
+ 'certificateExpirationDate'?: string;
20119
+ /**
20120
+ * The name extracted from the certificate.
20121
+ * @type {string}
20122
+ * @memberof IdpDetailsV2024
20123
+ */
20124
+ 'certificateName'?: string;
20125
+ }
20126
+ export declare const IdpDetailsV2024RoleV2024: {
20127
+ readonly SamlIdp: "SAML_IDP";
20128
+ readonly SamlSp: "SAML_SP";
20129
+ };
20130
+ export type IdpDetailsV2024RoleV2024 = typeof IdpDetailsV2024RoleV2024[keyof typeof IdpDetailsV2024RoleV2024];
19677
20131
  /**
19678
20132
  *
19679
20133
  * @export
@@ -20107,6 +20561,33 @@ export interface InvocationV2024 {
20107
20561
  */
20108
20562
  'contentJson'?: object;
20109
20563
  }
20564
+ /**
20565
+ *
20566
+ * @export
20567
+ * @interface JITConfigurationV2024
20568
+ */
20569
+ export interface JITConfigurationV2024 {
20570
+ /**
20571
+ * The indicator for just-in-time provisioning enabled
20572
+ * @type {boolean}
20573
+ * @memberof JITConfigurationV2024
20574
+ */
20575
+ 'enabled'?: boolean;
20576
+ /**
20577
+ * the sourceId that mapped to just-in-time provisioning configuration
20578
+ * @type {string}
20579
+ * @memberof JITConfigurationV2024
20580
+ */
20581
+ 'sourceId'?: string;
20582
+ /**
20583
+ * A mapping of identity profile attribute names to SAML assertion attribute names
20584
+ * @type {{ [key: string]: string; }}
20585
+ * @memberof JITConfigurationV2024
20586
+ */
20587
+ 'sourceAttributeMappings'?: {
20588
+ [key: string]: string;
20589
+ };
20590
+ }
20110
20591
  /**
20111
20592
  * A JSONPatch Operation as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902)
20112
20593
  * @export
@@ -20448,6 +20929,7 @@ export interface LifecyclestateDeletedV2024 {
20448
20929
  }
20449
20930
  export declare const LifecyclestateDeletedV2024TypeV2024: {
20450
20931
  readonly LifecycleState: "LIFECYCLE_STATE";
20932
+ readonly TaskResult: "TASK_RESULT";
20451
20933
  };
20452
20934
  export type LifecyclestateDeletedV2024TypeV2024 = typeof LifecyclestateDeletedV2024TypeV2024[keyof typeof LifecyclestateDeletedV2024TypeV2024];
20453
20935
  /**
@@ -21174,6 +21656,31 @@ export interface LocalizedMessageV2024 {
21174
21656
  */
21175
21657
  'message': string;
21176
21658
  }
21659
+ /**
21660
+ *
21661
+ * @export
21662
+ * @interface LockoutConfigurationV2024
21663
+ */
21664
+ export interface LockoutConfigurationV2024 {
21665
+ /**
21666
+ * The maximum attempts allowed before lockout occurs.
21667
+ * @type {number}
21668
+ * @memberof LockoutConfigurationV2024
21669
+ */
21670
+ 'maximumAttempts'?: number;
21671
+ /**
21672
+ * The total time in minutes a user will be locked out.
21673
+ * @type {number}
21674
+ * @memberof LockoutConfigurationV2024
21675
+ */
21676
+ 'lockoutDuration'?: number;
21677
+ /**
21678
+ * A rolling window where authentication attempts in a series count towards the maximum before lockout occurs.
21679
+ * @type {number}
21680
+ * @memberof LockoutConfigurationV2024
21681
+ */
21682
+ 'lockoutWindow'?: number;
21683
+ }
21177
21684
  /**
21178
21685
  * The definition of an Identity according to the Reassignment Configuration service
21179
21686
  * @export
@@ -26290,19 +26797,6 @@ export declare const PatchPotentialRoleRequestInnerV2024OpV2024: {
26290
26797
  readonly Replace: "replace";
26291
26798
  };
26292
26799
  export type PatchPotentialRoleRequestInnerV2024OpV2024 = typeof PatchPotentialRoleRequestInnerV2024OpV2024[keyof typeof PatchPotentialRoleRequestInnerV2024OpV2024];
26293
- /**
26294
- * A JSONPatch document as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902). Only `replace` operations are accepted by this endpoint.
26295
- * @export
26296
- * @interface PatchServiceDeskIntegrationRequestV2024
26297
- */
26298
- export interface PatchServiceDeskIntegrationRequestV2024 {
26299
- /**
26300
- * Operations to be applied
26301
- * @type {Array<JsonPatchOperationV2024>}
26302
- * @memberof PatchServiceDeskIntegrationRequestV2024
26303
- */
26304
- 'operations'?: Array<JsonPatchOperationV2024>;
26305
- }
26306
26800
  /**
26307
26801
  *
26308
26802
  * @export
@@ -27179,7 +27673,7 @@ export interface ProvisioningPolicyDtoV2024 {
27179
27673
  * @type {string}
27180
27674
  * @memberof ProvisioningPolicyDtoV2024
27181
27675
  */
27182
- 'name': string;
27676
+ 'name': string | null;
27183
27677
  /**
27184
27678
  * the description of the provisioning policy
27185
27679
  * @type {string}
@@ -27210,7 +27704,7 @@ export interface ProvisioningPolicyV2024 {
27210
27704
  * @type {string}
27211
27705
  * @memberof ProvisioningPolicyV2024
27212
27706
  */
27213
- 'name': string;
27707
+ 'name': string | null;
27214
27708
  /**
27215
27709
  * the description of the provisioning policy
27216
27710
  * @type {string}
@@ -28701,6 +29195,80 @@ export interface RequestedAccountRefV2024 {
28701
29195
  */
28702
29196
  'sourceName'?: string;
28703
29197
  }
29198
+ /**
29199
+ *
29200
+ * @export
29201
+ * @interface RequestedForDtoRefV2024
29202
+ */
29203
+ export interface RequestedForDtoRefV2024 {
29204
+ /**
29205
+ * The identity id for which the access is requested
29206
+ * @type {string}
29207
+ * @memberof RequestedForDtoRefV2024
29208
+ */
29209
+ 'identityId': string;
29210
+ /**
29211
+ * the details for the access items that are requested for the identity
29212
+ * @type {Array<RequestedItemDtoRefV2024>}
29213
+ * @memberof RequestedForDtoRefV2024
29214
+ */
29215
+ 'requestedItems': Array<RequestedItemDtoRefV2024>;
29216
+ }
29217
+ /**
29218
+ *
29219
+ * @export
29220
+ * @interface RequestedItemAccountSelectionsV2024
29221
+ */
29222
+ export interface RequestedItemAccountSelectionsV2024 {
29223
+ /**
29224
+ * The description for this requested item
29225
+ * @type {string}
29226
+ * @memberof RequestedItemAccountSelectionsV2024
29227
+ */
29228
+ 'description'?: string;
29229
+ /**
29230
+ * This field indicates if account selections are not allowed for this requested item. * If true, this field indicates that account selections will not be available for this item and user combination. In this case, no account selections should be provided in the access request for this item and user combination, irrespective of whether the user has single or multiple accounts on a source. * An example is where a user is requesting an access profile that is already assigned to one of their accounts.
29231
+ * @type {boolean}
29232
+ * @memberof RequestedItemAccountSelectionsV2024
29233
+ */
29234
+ 'accountsSelectionBlocked'?: boolean;
29235
+ /**
29236
+ * If account selections are not allowed for an item, this field will denote the reason.
29237
+ * @type {string}
29238
+ * @memberof RequestedItemAccountSelectionsV2024
29239
+ */
29240
+ 'accountsSelectionBlockedReason'?: string | null;
29241
+ /**
29242
+ * The type of the item being requested.
29243
+ * @type {string}
29244
+ * @memberof RequestedItemAccountSelectionsV2024
29245
+ */
29246
+ 'type'?: RequestedItemAccountSelectionsV2024TypeV2024;
29247
+ /**
29248
+ * The id of the requested item
29249
+ * @type {string}
29250
+ * @memberof RequestedItemAccountSelectionsV2024
29251
+ */
29252
+ 'id'?: string;
29253
+ /**
29254
+ * The name of the requested item
29255
+ * @type {string}
29256
+ * @memberof RequestedItemAccountSelectionsV2024
29257
+ */
29258
+ 'name'?: string;
29259
+ /**
29260
+ * The details for the sources and accounts for the requested item and identity combination
29261
+ * @type {Array<SourceAccountSelectionsV2024>}
29262
+ * @memberof RequestedItemAccountSelectionsV2024
29263
+ */
29264
+ 'sources'?: Array<SourceAccountSelectionsV2024>;
29265
+ }
29266
+ export declare const RequestedItemAccountSelectionsV2024TypeV2024: {
29267
+ readonly AccessProfile: "ACCESS_PROFILE";
29268
+ readonly Role: "ROLE";
29269
+ readonly Entitlement: "ENTITLEMENT";
29270
+ };
29271
+ export type RequestedItemAccountSelectionsV2024TypeV2024 = typeof RequestedItemAccountSelectionsV2024TypeV2024[keyof typeof RequestedItemAccountSelectionsV2024TypeV2024];
28704
29272
  /**
28705
29273
  *
28706
29274
  * @export
@@ -28726,6 +29294,69 @@ export declare const RequestedItemDetailsV2024TypeV2024: {
28726
29294
  readonly Role: "ROLE";
28727
29295
  };
28728
29296
  export type RequestedItemDetailsV2024TypeV2024 = typeof RequestedItemDetailsV2024TypeV2024[keyof typeof RequestedItemDetailsV2024TypeV2024];
29297
+ /**
29298
+ *
29299
+ * @export
29300
+ * @interface RequestedItemDtoRefV2024
29301
+ */
29302
+ export interface RequestedItemDtoRefV2024 {
29303
+ /**
29304
+ * The type of the item being requested.
29305
+ * @type {string}
29306
+ * @memberof RequestedItemDtoRefV2024
29307
+ */
29308
+ 'type': RequestedItemDtoRefV2024TypeV2024;
29309
+ /**
29310
+ * ID of Role, Access Profile or Entitlement being requested.
29311
+ * @type {string}
29312
+ * @memberof RequestedItemDtoRefV2024
29313
+ */
29314
+ 'id': string;
29315
+ /**
29316
+ * Comment provided by requester. * Comment is required when the request is of type Revoke Access.
29317
+ * @type {string}
29318
+ * @memberof RequestedItemDtoRefV2024
29319
+ */
29320
+ 'comment'?: string;
29321
+ /**
29322
+ * Arbitrary key-value pairs. They will never be processed by the IdentityNow system but will be returned on associated APIs such as /account-activities and /access-request-status.
29323
+ * @type {{ [key: string]: string; }}
29324
+ * @memberof RequestedItemDtoRefV2024
29325
+ */
29326
+ 'clientMetadata'?: {
29327
+ [key: string]: string;
29328
+ };
29329
+ /**
29330
+ * The date the role or access profile or entitlement is no longer assigned to the specified identity. Also known as the expiration date. * Specify a date in the future. * The current SLA for the deprovisioning is 24 hours. * This date can be modified to either extend or decrease the duration of access item assignments for the specified identity. You can change the expiration date for requests for yourself or direct reports, but you cannot remove an expiration date on an already approved item. If the access request has not been approved, you can cancel it and submit a new one without the expiration. If it has already been approved, then you have to revoke the access and then re-request without the expiration.
29331
+ * @type {string}
29332
+ * @memberof RequestedItemDtoRefV2024
29333
+ */
29334
+ 'removeDate'?: string;
29335
+ /**
29336
+ * The assignmentId for a specific role assignment on the identity. This id is used to revoke that specific roleAssignment on that identity. * For use with REVOKE_ACCESS requests for roles for identities with multiple accounts on a single source.
29337
+ * @type {string}
29338
+ * @memberof RequestedItemDtoRefV2024
29339
+ */
29340
+ 'assignmentId'?: string | null;
29341
+ /**
29342
+ * The \'distinguishedName\' field for an account on the identity, also called nativeIdentity. This nativeIdentity is used to revoke a specific attributeAssignment on the identity. * For use with REVOKE_ACCESS requests for entitlements for identities with multiple accounts on a single source.
29343
+ * @type {string}
29344
+ * @memberof RequestedItemDtoRefV2024
29345
+ */
29346
+ 'nativeIdentity'?: string | null;
29347
+ /**
29348
+ * The accounts where the access item will be provisioned to * Includes selections performed by the user in the event of multiple accounts existing on the same source * Also includes details for sources where user only has one account
29349
+ * @type {Array<SourceItemRefV2024>}
29350
+ * @memberof RequestedItemDtoRefV2024
29351
+ */
29352
+ 'accountSelection'?: Array<SourceItemRefV2024> | null;
29353
+ }
29354
+ export declare const RequestedItemDtoRefV2024TypeV2024: {
29355
+ readonly AccessProfile: "ACCESS_PROFILE";
29356
+ readonly Role: "ROLE";
29357
+ readonly Entitlement: "ENTITLEMENT";
29358
+ };
29359
+ export type RequestedItemDtoRefV2024TypeV2024 = typeof RequestedItemDtoRefV2024TypeV2024[keyof typeof RequestedItemDtoRefV2024TypeV2024];
28729
29360
  /**
28730
29361
  *
28731
29362
  * @export
@@ -34822,6 +35453,176 @@ export declare const ServiceDeskSourceV2024TypeV2024: {
34822
35453
  readonly Source: "SOURCE";
34823
35454
  };
34824
35455
  export type ServiceDeskSourceV2024TypeV2024 = typeof ServiceDeskSourceV2024TypeV2024[keyof typeof ServiceDeskSourceV2024TypeV2024];
35456
+ /**
35457
+ *
35458
+ * @export
35459
+ * @interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35460
+ */
35461
+ export interface ServiceProviderConfigurationFederationProtocolDetailsInnerV2024 {
35462
+ /**
35463
+ * Federation protocol role
35464
+ * @type {string}
35465
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35466
+ */
35467
+ 'role'?: ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024;
35468
+ /**
35469
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
35470
+ * @type {string}
35471
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35472
+ */
35473
+ 'entityId'?: string;
35474
+ /**
35475
+ * Defines the binding used for the SAML flow. Used with IDP configurations.
35476
+ * @type {string}
35477
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35478
+ */
35479
+ 'binding'?: string;
35480
+ /**
35481
+ * Specifies the SAML authentication method to use. Used with IDP configurations.
35482
+ * @type {string}
35483
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35484
+ */
35485
+ 'authnContext'?: string;
35486
+ /**
35487
+ * The IDP logout URL. Used with IDP configurations.
35488
+ * @type {string}
35489
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35490
+ */
35491
+ 'logoutUrl'?: string;
35492
+ /**
35493
+ * Determines if the configured AuthnContext should be used or the default. Used with IDP configurations.
35494
+ * @type {boolean}
35495
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35496
+ */
35497
+ 'includeAuthnContext'?: boolean;
35498
+ /**
35499
+ * The name id format to use. Used with IDP configurations.
35500
+ * @type {string}
35501
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35502
+ */
35503
+ 'nameId'?: string;
35504
+ /**
35505
+ *
35506
+ * @type {JITConfigurationV2024}
35507
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35508
+ */
35509
+ 'jitConfiguration'?: JITConfigurationV2024;
35510
+ /**
35511
+ * The Base64-encoded certificate used by the IDP. Used with IDP configurations.
35512
+ * @type {string}
35513
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35514
+ */
35515
+ 'cert'?: string;
35516
+ /**
35517
+ * The IDP POST URL, used with IDP HTTP-POST bindings for IDP-initiated logins. Used with IDP configurations.
35518
+ * @type {string}
35519
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35520
+ */
35521
+ 'loginUrlPost'?: string;
35522
+ /**
35523
+ * The IDP Redirect URL. Used with IDP configurations.
35524
+ * @type {string}
35525
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35526
+ */
35527
+ 'loginUrlRedirect'?: string;
35528
+ /**
35529
+ * Return the saml Id for the given user, based on the IDN as SP settings of the org. Used with IDP configurations.
35530
+ * @type {string}
35531
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35532
+ */
35533
+ 'mappingAttribute': string;
35534
+ /**
35535
+ * The expiration date extracted from the certificate.
35536
+ * @type {string}
35537
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35538
+ */
35539
+ 'certificateExpirationDate'?: string;
35540
+ /**
35541
+ * The name extracted from the certificate.
35542
+ * @type {string}
35543
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35544
+ */
35545
+ 'certificateName'?: string;
35546
+ /**
35547
+ * Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
35548
+ * @type {string}
35549
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35550
+ */
35551
+ 'alias'?: string;
35552
+ /**
35553
+ * The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
35554
+ * @type {string}
35555
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35556
+ */
35557
+ 'callbackUrl': string;
35558
+ /**
35559
+ * The legacy ACS URL used for SAML authentication. Used with SP configurations.
35560
+ * @type {string}
35561
+ * @memberof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024
35562
+ */
35563
+ 'legacyAcsUrl'?: string;
35564
+ }
35565
+ export declare const ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024: {
35566
+ readonly SamlIdp: "SAML_IDP";
35567
+ readonly SamlSp: "SAML_SP";
35568
+ };
35569
+ export type ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024 = typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024[keyof typeof ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024];
35570
+ /**
35571
+ * Represents the IdentityNow as Service Provider Configuration allowing customers to log into IDN via an Identity Provider
35572
+ * @export
35573
+ * @interface ServiceProviderConfigurationV2024
35574
+ */
35575
+ export interface ServiceProviderConfigurationV2024 {
35576
+ /**
35577
+ * This determines whether or not the SAML authentication flow is enabled for an org
35578
+ * @type {boolean}
35579
+ * @memberof ServiceProviderConfigurationV2024
35580
+ */
35581
+ 'enabled'?: boolean;
35582
+ /**
35583
+ * This allows basic login with the parameter prompt=true. This is often toggled on when debugging SAML authentication setup. When false, only org admins with MFA-enabled can bypass the IDP.
35584
+ * @type {boolean}
35585
+ * @memberof ServiceProviderConfigurationV2024
35586
+ */
35587
+ 'bypassIdp'?: boolean;
35588
+ /**
35589
+ * This indicates whether or not the SAML configuration is valid.
35590
+ * @type {boolean}
35591
+ * @memberof ServiceProviderConfigurationV2024
35592
+ */
35593
+ 'samlConfigurationValid'?: boolean;
35594
+ /**
35595
+ * A list of the abstract implementations of the Federation Protocol details. Typically, this will include on SpDetails object and one IdpDetails object used in tandem to define a SAML integration between a customer\'s identity provider and a customer\'s SailPoint instance (i.e., the service provider).
35596
+ * @type {Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2024>}
35597
+ * @memberof ServiceProviderConfigurationV2024
35598
+ */
35599
+ 'federationProtocolDetails'?: Array<ServiceProviderConfigurationFederationProtocolDetailsInnerV2024>;
35600
+ }
35601
+ /**
35602
+ *
35603
+ * @export
35604
+ * @interface SessionConfigurationV2024
35605
+ */
35606
+ export interface SessionConfigurationV2024 {
35607
+ /**
35608
+ * The maximum time in minutes a session can be idle.
35609
+ * @type {number}
35610
+ * @memberof SessionConfigurationV2024
35611
+ */
35612
+ 'maxIdleTime'?: number;
35613
+ /**
35614
+ * Denotes if \'remember me\' is enabled.
35615
+ * @type {boolean}
35616
+ * @memberof SessionConfigurationV2024
35617
+ */
35618
+ 'rememberMe'?: boolean;
35619
+ /**
35620
+ * The maximum allowable session time in minutes.
35621
+ * @type {number}
35622
+ * @memberof SessionConfigurationV2024
35623
+ */
35624
+ 'maxSessionTime'?: number;
35625
+ }
34825
35626
  /**
34826
35627
  *
34827
35628
  * @export
@@ -35832,6 +36633,37 @@ export interface SourceAccountDeletedV2024 {
35832
36633
  [key: string]: any;
35833
36634
  };
35834
36635
  }
36636
+ /**
36637
+ *
36638
+ * @export
36639
+ * @interface SourceAccountSelectionsV2024
36640
+ */
36641
+ export interface SourceAccountSelectionsV2024 {
36642
+ /**
36643
+ *
36644
+ * @type {DtoTypeV2024}
36645
+ * @memberof SourceAccountSelectionsV2024
36646
+ */
36647
+ 'type'?: DtoTypeV2024;
36648
+ /**
36649
+ * The source id
36650
+ * @type {string}
36651
+ * @memberof SourceAccountSelectionsV2024
36652
+ */
36653
+ 'id'?: string;
36654
+ /**
36655
+ * The source name
36656
+ * @type {string}
36657
+ * @memberof SourceAccountSelectionsV2024
36658
+ */
36659
+ 'name'?: string;
36660
+ /**
36661
+ * The accounts information for a particular source in the requested item
36662
+ * @type {Array<AccountInfoRefV2024>}
36663
+ * @memberof SourceAccountSelectionsV2024
36664
+ */
36665
+ 'accounts'?: Array<AccountInfoRefV2024>;
36666
+ }
35835
36667
  /**
35836
36668
  *
35837
36669
  * @export
@@ -36601,6 +37433,25 @@ export declare const SourceHealthDtoV2024StatusV2024: {
36601
37433
  readonly SourceStateErrorAccountFileImport: "SOURCE_STATE_ERROR_ACCOUNT_FILE_IMPORT";
36602
37434
  };
36603
37435
  export type SourceHealthDtoV2024StatusV2024 = typeof SourceHealthDtoV2024StatusV2024[keyof typeof SourceHealthDtoV2024StatusV2024];
37436
+ /**
37437
+ *
37438
+ * @export
37439
+ * @interface SourceItemRefV2024
37440
+ */
37441
+ export interface SourceItemRefV2024 {
37442
+ /**
37443
+ * The id for the source on which account selections are made
37444
+ * @type {string}
37445
+ * @memberof SourceItemRefV2024
37446
+ */
37447
+ 'sourceId'?: string | null;
37448
+ /**
37449
+ * A list of account selections on the source. Currently, only one selection per source is supported.
37450
+ * @type {Array<AccountItemRefV2024>}
37451
+ * @memberof SourceItemRefV2024
37452
+ */
37453
+ 'accounts'?: Array<AccountItemRefV2024> | null;
37454
+ }
36604
37455
  /**
36605
37456
  * Reference to management workgroup for the source.
36606
37457
  * @export
@@ -37681,6 +38532,48 @@ export interface SpConfigRulesV2024 {
37681
38532
  */
37682
38533
  'editable'?: boolean;
37683
38534
  }
38535
+ /**
38536
+ *
38537
+ * @export
38538
+ * @interface SpDetailsV2024
38539
+ */
38540
+ export interface SpDetailsV2024 {
38541
+ /**
38542
+ * Federation protocol role
38543
+ * @type {string}
38544
+ * @memberof SpDetailsV2024
38545
+ */
38546
+ 'role'?: SpDetailsV2024RoleV2024;
38547
+ /**
38548
+ * An entity ID is a globally unique name for a SAML entity, either an Identity Provider (IDP) or a Service Provider (SP).
38549
+ * @type {string}
38550
+ * @memberof SpDetailsV2024
38551
+ */
38552
+ 'entityId'?: string;
38553
+ /**
38554
+ * Unique alias used to identify the selected local service provider based on used URL. Used with SP configurations.
38555
+ * @type {string}
38556
+ * @memberof SpDetailsV2024
38557
+ */
38558
+ 'alias'?: string;
38559
+ /**
38560
+ * The allowed callback URL where users will be redirected to after authentication. Used with SP configurations.
38561
+ * @type {string}
38562
+ * @memberof SpDetailsV2024
38563
+ */
38564
+ 'callbackUrl': string;
38565
+ /**
38566
+ * The legacy ACS URL used for SAML authentication. Used with SP configurations.
38567
+ * @type {string}
38568
+ * @memberof SpDetailsV2024
38569
+ */
38570
+ 'legacyAcsUrl'?: string;
38571
+ }
38572
+ export declare const SpDetailsV2024RoleV2024: {
38573
+ readonly SamlIdp: "SAML_IDP";
38574
+ readonly SamlSp: "SAML_SP";
38575
+ };
38576
+ export type SpDetailsV2024RoleV2024 = typeof SpDetailsV2024RoleV2024[keyof typeof SpDetailsV2024RoleV2024];
37684
38577
  /**
37685
38578
  *
37686
38579
  * @export
@@ -41281,6 +42174,7 @@ export declare const WorkflowExecutionV2024StatusV2024: {
41281
42174
  readonly Completed: "Completed";
41282
42175
  readonly Failed: "Failed";
41283
42176
  readonly Canceled: "Canceled";
42177
+ readonly Queued: "Queued";
41284
42178
  readonly Running: "Running";
41285
42179
  };
41286
42180
  export type WorkflowExecutionV2024StatusV2024 = typeof WorkflowExecutionV2024StatusV2024[keyof typeof WorkflowExecutionV2024StatusV2024];
@@ -42345,7 +43239,7 @@ export declare class AccessModelMetadataV2024Api extends BaseAPI {
42345
43239
  */
42346
43240
  export declare const AccessProfilesV2024ApiAxiosParamCreator: (configuration?: Configuration) => {
42347
43241
  /**
42348
- * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
43242
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
42349
43243
  * @summary Create Access Profile
42350
43244
  * @param {AccessProfileV2024} accessProfileV2024
42351
43245
  * @param {*} [axiosOptions] Override http request option.
@@ -42429,7 +43323,7 @@ export declare const AccessProfilesV2024ApiAxiosParamCreator: (configuration?: C
42429
43323
  */
42430
43324
  export declare const AccessProfilesV2024ApiFp: (configuration?: Configuration) => {
42431
43325
  /**
42432
- * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
43326
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
42433
43327
  * @summary Create Access Profile
42434
43328
  * @param {AccessProfileV2024} accessProfileV2024
42435
43329
  * @param {*} [axiosOptions] Override http request option.
@@ -42513,7 +43407,7 @@ export declare const AccessProfilesV2024ApiFp: (configuration?: Configuration) =
42513
43407
  */
42514
43408
  export declare const AccessProfilesV2024ApiFactory: (configuration?: Configuration, basePath?: string, axios?: AxiosInstance) => {
42515
43409
  /**
42516
- * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
43410
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
42517
43411
  * @summary Create Access Profile
42518
43412
  * @param {AccessProfilesV2024ApiCreateAccessProfileRequest} requestParameters Request parameters.
42519
43413
  * @param {*} [axiosOptions] Override http request option.
@@ -42773,7 +43667,7 @@ export interface AccessProfilesV2024ApiUpdateAccessProfilesInBulkRequest {
42773
43667
  */
42774
43668
  export declare class AccessProfilesV2024Api extends BaseAPI {
42775
43669
  /**
42776
- * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters.
43670
+ * Create an access profile. A user with `ROLE_SUBADMIN` or `SOURCE_SUBADMIN` authority must be associated with the access profile\'s source. The maximum supported length for the description field is 2000 characters. Longer descriptions will be preserved for existing access profiles. However, any new access profiles as well as any updates to existing descriptions are limited to 2000 characters. >**Note:** To use this endpoint, you need all the listed scopes.
42777
43671
  * @summary Create Access Profile
42778
43672
  * @param {AccessProfilesV2024ApiCreateAccessProfileRequest} requestParameters Request parameters.
42779
43673
  * @param {*} [axiosOptions] Override http request option.
@@ -42908,7 +43802,7 @@ export declare const AccessRequestApprovalsV2024ApiAxiosParamCreator: (configura
42908
43802
  * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
42909
43803
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
42910
43804
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
42911
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
43805
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
42912
43806
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified**
42913
43807
  * @param {*} [axiosOptions] Override http request option.
42914
43808
  * @throws {RequiredError}
@@ -42987,7 +43881,7 @@ export declare const AccessRequestApprovalsV2024ApiFp: (configuration?: Configur
42987
43881
  * @param {number} [limit] Max number of results to return. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
42988
43882
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
42989
43883
  * @param {boolean} [count] If *true* it will populate the *X-Total-Count* response header with the number of results that would be returned if *limit* and *offset* were ignored. Since requesting a total count can have a performance impact, it is recommended not to send **count&#x3D;true** if that value will not be used. See [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters) for more information.
42990
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
43884
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
42991
43885
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified**
42992
43886
  * @param {*} [axiosOptions] Override http request option.
42993
43887
  * @throws {RequiredError}
@@ -43227,7 +44121,7 @@ export interface AccessRequestApprovalsV2024ApiListPendingApprovalsRequest {
43227
44121
  */
43228
44122
  readonly count?: boolean;
43229
44123
  /**
43230
- * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in*
44124
+ * Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **id**: *eq, in* **requestedFor.id**: *eq, in* **modified**: *gt, lt, ge, le, eq, in* **accessRequestId**: *eq, in* **created**: *gt, lt, ge, le, eq, in*
43231
44125
  * @type {string}
43232
44126
  * @memberof AccessRequestApprovalsV2024ApiListPendingApprovals
43233
44127
  */
@@ -43465,7 +44359,7 @@ export declare const AccessRequestsV2024ApiAxiosParamCreator: (configuration?: C
43465
44359
  */
43466
44360
  closeAccessRequest: (closeAccessRequestV2024: CloseAccessRequestV2024, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
43467
44361
  /**
43468
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
44362
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
43469
44363
  * @summary Submit Access Request
43470
44364
  * @param {AccessRequestV2024} accessRequestV2024
43471
44365
  * @param {*} [axiosOptions] Override http request option.
@@ -43513,6 +44407,14 @@ export declare const AccessRequestsV2024ApiAxiosParamCreator: (configuration?: C
43513
44407
  * @throws {RequiredError}
43514
44408
  */
43515
44409
  listAdministratorsAccessRequestStatus: (requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
44410
+ /**
44411
+ * Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
44412
+ * @summary Get accounts selections for identity
44413
+ * @param {AccountsSelectionRequestV2024} accountsSelectionRequestV2024
44414
+ * @param {*} [axiosOptions] Override http request option.
44415
+ * @throws {RequiredError}
44416
+ */
44417
+ loadAccountSelections: (accountsSelectionRequestV2024: AccountsSelectionRequestV2024, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
43516
44418
  /**
43517
44419
  * This endpoint replaces the current access-request configuration.
43518
44420
  * @summary Update Access Request Configuration
@@ -43561,7 +44463,7 @@ export declare const AccessRequestsV2024ApiFp: (configuration?: Configuration) =
43561
44463
  */
43562
44464
  closeAccessRequest(closeAccessRequestV2024: CloseAccessRequestV2024, xSailPointExperimental?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<object>>;
43563
44465
  /**
43564
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
44466
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
43565
44467
  * @summary Submit Access Request
43566
44468
  * @param {AccessRequestV2024} accessRequestV2024
43567
44469
  * @param {*} [axiosOptions] Override http request option.
@@ -43609,6 +44511,14 @@ export declare const AccessRequestsV2024ApiFp: (configuration?: Configuration) =
43609
44511
  * @throws {RequiredError}
43610
44512
  */
43611
44513
  listAdministratorsAccessRequestStatus(requestedFor?: string, requestedBy?: string, regardingIdentity?: string, assignedTo?: string, count?: boolean, limit?: number, offset?: number, filters?: string, sorters?: string, requestState?: string, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<Array<AccessRequestAdminItemStatusV2024>>>;
44514
+ /**
44515
+ * Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
44516
+ * @summary Get accounts selections for identity
44517
+ * @param {AccountsSelectionRequestV2024} accountsSelectionRequestV2024
44518
+ * @param {*} [axiosOptions] Override http request option.
44519
+ * @throws {RequiredError}
44520
+ */
44521
+ loadAccountSelections(accountsSelectionRequestV2024: AccountsSelectionRequestV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<AccountsSelectionResponseV2024>>;
43612
44522
  /**
43613
44523
  * This endpoint replaces the current access-request configuration.
43614
44524
  * @summary Update Access Request Configuration
@@ -43656,7 +44566,7 @@ export declare const AccessRequestsV2024ApiFactory: (configuration?: Configurati
43656
44566
  */
43657
44567
  closeAccessRequest(requestParameters: AccessRequestsV2024ApiCloseAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<object>;
43658
44568
  /**
43659
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
44569
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
43660
44570
  * @summary Submit Access Request
43661
44571
  * @param {AccessRequestsV2024ApiCreateAccessRequestRequest} requestParameters Request parameters.
43662
44572
  * @param {*} [axiosOptions] Override http request option.
@@ -43686,6 +44596,14 @@ export declare const AccessRequestsV2024ApiFactory: (configuration?: Configurati
43686
44596
  * @throws {RequiredError}
43687
44597
  */
43688
44598
  listAdministratorsAccessRequestStatus(requestParameters?: AccessRequestsV2024ApiListAdministratorsAccessRequestStatusRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<Array<AccessRequestAdminItemStatusV2024>>;
44599
+ /**
44600
+ * Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
44601
+ * @summary Get accounts selections for identity
44602
+ * @param {AccessRequestsV2024ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
44603
+ * @param {*} [axiosOptions] Override http request option.
44604
+ * @throws {RequiredError}
44605
+ */
44606
+ loadAccountSelections(requestParameters: AccessRequestsV2024ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<AccountsSelectionResponseV2024>;
43689
44607
  /**
43690
44608
  * This endpoint replaces the current access-request configuration.
43691
44609
  * @summary Update Access Request Configuration
@@ -43900,6 +44818,19 @@ export interface AccessRequestsV2024ApiListAdministratorsAccessRequestStatusRequ
43900
44818
  */
43901
44819
  readonly requestState?: string;
43902
44820
  }
44821
+ /**
44822
+ * Request parameters for loadAccountSelections operation in AccessRequestsV2024Api.
44823
+ * @export
44824
+ * @interface AccessRequestsV2024ApiLoadAccountSelectionsRequest
44825
+ */
44826
+ export interface AccessRequestsV2024ApiLoadAccountSelectionsRequest {
44827
+ /**
44828
+ *
44829
+ * @type {AccountsSelectionRequestV2024}
44830
+ * @memberof AccessRequestsV2024ApiLoadAccountSelections
44831
+ */
44832
+ readonly accountsSelectionRequestV2024: AccountsSelectionRequestV2024;
44833
+ }
43903
44834
  /**
43904
44835
  * Request parameters for setAccessRequestConfig operation in AccessRequestsV2024Api.
43905
44836
  * @export
@@ -43957,7 +44888,7 @@ export declare class AccessRequestsV2024Api extends BaseAPI {
43957
44888
  */
43958
44889
  closeAccessRequest(requestParameters: AccessRequestsV2024ApiCloseAccessRequestRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<object, any>>;
43959
44890
  /**
43960
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone.
44891
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, the API will ignore the request. These ignored requests do not display when you use the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) API. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the access will be removed on that date and time only for roles, access profiles and entitlements. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` if the access doesn\'t already have a sunset date. The `removeDate` must be a future date, in the UTC timezone. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields.
43961
44892
  * @summary Submit Access Request
43962
44893
  * @param {AccessRequestsV2024ApiCreateAccessRequestRequest} requestParameters Request parameters.
43963
44894
  * @param {*} [axiosOptions] Override http request option.
@@ -43991,6 +44922,15 @@ export declare class AccessRequestsV2024Api extends BaseAPI {
43991
44922
  * @memberof AccessRequestsV2024Api
43992
44923
  */
43993
44924
  listAdministratorsAccessRequestStatus(requestParameters?: AccessRequestsV2024ApiListAdministratorsAccessRequestStatusRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AccessRequestAdminItemStatusV2024[], any>>;
44925
+ /**
44926
+ * Use this API to fetch account information for an identity against the items in an access request. Used to fetch accountSelection for the AccessRequest prior to submitting for async processing.
44927
+ * @summary Get accounts selections for identity
44928
+ * @param {AccessRequestsV2024ApiLoadAccountSelectionsRequest} requestParameters Request parameters.
44929
+ * @param {*} [axiosOptions] Override http request option.
44930
+ * @throws {RequiredError}
44931
+ * @memberof AccessRequestsV2024Api
44932
+ */
44933
+ loadAccountSelections(requestParameters: AccessRequestsV2024ApiLoadAccountSelectionsRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<AccountsSelectionResponseV2024, any>>;
43994
44934
  /**
43995
44935
  * This endpoint replaces the current access-request configuration.
43996
44936
  * @summary Update Access Request Configuration
@@ -47834,7 +48774,7 @@ export declare const CertificationCampaignsV2024ApiFp: (configuration?: Configur
47834
48774
  * @param {*} [axiosOptions] Override http request option.
47835
48775
  * @throws {RequiredError}
47836
48776
  */
47837
- getCampaign(id: string, detail?: GetCampaignDetailV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetActiveCampaigns200ResponseInnerV2024>>;
48777
+ getCampaign(id: string, detail?: GetCampaignDetailV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<GetCampaign200ResponseV2024>>;
47838
48778
  /**
47839
48779
  * Use this API to fetch all reports for a certification campaign by campaign ID.
47840
48780
  * @summary Get Campaign Reports
@@ -48025,7 +48965,7 @@ export declare const CertificationCampaignsV2024ApiFactory: (configuration?: Con
48025
48965
  * @param {*} [axiosOptions] Override http request option.
48026
48966
  * @throws {RequiredError}
48027
48967
  */
48028
- getCampaign(requestParameters: CertificationCampaignsV2024ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetActiveCampaigns200ResponseInnerV2024>;
48968
+ getCampaign(requestParameters: CertificationCampaignsV2024ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<GetCampaign200ResponseV2024>;
48029
48969
  /**
48030
48970
  * Use this API to fetch all reports for a certification campaign by campaign ID.
48031
48971
  * @summary Get Campaign Reports
@@ -48591,7 +49531,7 @@ export declare class CertificationCampaignsV2024Api extends BaseAPI {
48591
49531
  * @throws {RequiredError}
48592
49532
  * @memberof CertificationCampaignsV2024Api
48593
49533
  */
48594
- getCampaign(requestParameters: CertificationCampaignsV2024ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<GetActiveCampaigns200ResponseInnerV2024, any>>;
49534
+ getCampaign(requestParameters: CertificationCampaignsV2024ApiGetCampaignRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<GetCampaign200ResponseV2024, any>>;
48595
49535
  /**
48596
49536
  * Use this API to fetch all reports for a certification campaign by campaign ID.
48597
49537
  * @summary Get Campaign Reports
@@ -55468,6 +56408,13 @@ export declare const GlobalTenantSecuritySettingsV2024ApiAxiosParamCreator: (con
55468
56408
  * @throws {RequiredError}
55469
56409
  */
55470
56410
  createAuthOrgNetworkConfig: (networkConfigurationV2024: NetworkConfigurationV2024, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
56411
+ /**
56412
+ * This API returns the details of an org\'s lockout auth configuration.
56413
+ * @summary Get Auth Org Lockout Configuration.
56414
+ * @param {*} [axiosOptions] Override http request option.
56415
+ * @throws {RequiredError}
56416
+ */
56417
+ getAuthOrgLockoutConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
55471
56418
  /**
55472
56419
  * This API returns the details of an org\'s network auth configuration.
55473
56420
  * @summary Get security network configuration.
@@ -55475,6 +56422,28 @@ export declare const GlobalTenantSecuritySettingsV2024ApiAxiosParamCreator: (con
55475
56422
  * @throws {RequiredError}
55476
56423
  */
55477
56424
  getAuthOrgNetworkConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
56425
+ /**
56426
+ * This API returns the details of an org\'s service provider auth configuration.
56427
+ * @summary Get Service Provider Configuration.
56428
+ * @param {*} [axiosOptions] Override http request option.
56429
+ * @throws {RequiredError}
56430
+ */
56431
+ getAuthOrgServiceProviderConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
56432
+ /**
56433
+ * This API returns the details of an org\'s session auth configuration.
56434
+ * @summary Get Auth Org Session Configuration.
56435
+ * @param {*} [axiosOptions] Override http request option.
56436
+ * @throws {RequiredError}
56437
+ */
56438
+ getAuthOrgSessionConfig: (axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
56439
+ /**
56440
+ * This API updates an existing lockout configuration for an org using PATCH
56441
+ * @summary Update Auth Org Lockout Configuration
56442
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: &#x60;1. maximumAttempts &gt;&#x3D; 1 &amp;&amp; maximumAttempts &lt;&#x3D; 15 2. lockoutDuration &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60 3. lockoutWindow &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60&#x60;
56443
+ * @param {*} [axiosOptions] Override http request option.
56444
+ * @throws {RequiredError}
56445
+ */
56446
+ patchAuthOrgLockoutConfig: (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
55478
56447
  /**
55479
56448
  * This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
55480
56449
  * @summary Update security network configuration.
@@ -55483,6 +56452,22 @@ export declare const GlobalTenantSecuritySettingsV2024ApiAxiosParamCreator: (con
55483
56452
  * @throws {RequiredError}
55484
56453
  */
55485
56454
  patchAuthOrgNetworkConfig: (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
56455
+ /**
56456
+ * This API updates an existing service provider configuration for an org using PATCH.
56457
+ * @summary Update Service Provider Configuration
56458
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
56459
+ * @param {*} [axiosOptions] Override http request option.
56460
+ * @throws {RequiredError}
56461
+ */
56462
+ patchAuthOrgServiceProviderConfig: (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
56463
+ /**
56464
+ * This API updates an existing session configuration for an org using PATCH.
56465
+ * @summary Update Auth Org Session Configuration
56466
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: &#x60;1. maxSessionTime &gt;&#x3D; 1 &amp;&amp; maxSessionTime &lt;&#x3D; 10080 (1 week) 2. maxIdleTime &gt;&#x3D; 1 &amp;&amp; maxIdleTime &lt;&#x3D; 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.&#x60;
56467
+ * @param {*} [axiosOptions] Override http request option.
56468
+ * @throws {RequiredError}
56469
+ */
56470
+ patchAuthOrgSessionConfig: (jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
55486
56471
  };
55487
56472
  /**
55488
56473
  * GlobalTenantSecuritySettingsV2024Api - functional programming interface
@@ -55497,6 +56482,13 @@ export declare const GlobalTenantSecuritySettingsV2024ApiFp: (configuration?: Co
55497
56482
  * @throws {RequiredError}
55498
56483
  */
55499
56484
  createAuthOrgNetworkConfig(networkConfigurationV2024: NetworkConfigurationV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<NetworkConfigurationV2024>>;
56485
+ /**
56486
+ * This API returns the details of an org\'s lockout auth configuration.
56487
+ * @summary Get Auth Org Lockout Configuration.
56488
+ * @param {*} [axiosOptions] Override http request option.
56489
+ * @throws {RequiredError}
56490
+ */
56491
+ getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2024>>;
55500
56492
  /**
55501
56493
  * This API returns the details of an org\'s network auth configuration.
55502
56494
  * @summary Get security network configuration.
@@ -55504,6 +56496,28 @@ export declare const GlobalTenantSecuritySettingsV2024ApiFp: (configuration?: Co
55504
56496
  * @throws {RequiredError}
55505
56497
  */
55506
56498
  getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<NetworkConfigurationV2024>>;
56499
+ /**
56500
+ * This API returns the details of an org\'s service provider auth configuration.
56501
+ * @summary Get Service Provider Configuration.
56502
+ * @param {*} [axiosOptions] Override http request option.
56503
+ * @throws {RequiredError}
56504
+ */
56505
+ getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2024>>;
56506
+ /**
56507
+ * This API returns the details of an org\'s session auth configuration.
56508
+ * @summary Get Auth Org Session Configuration.
56509
+ * @param {*} [axiosOptions] Override http request option.
56510
+ * @throws {RequiredError}
56511
+ */
56512
+ getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2024>>;
56513
+ /**
56514
+ * This API updates an existing lockout configuration for an org using PATCH
56515
+ * @summary Update Auth Org Lockout Configuration
56516
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: &#x60;1. maximumAttempts &gt;&#x3D; 1 &amp;&amp; maximumAttempts &lt;&#x3D; 15 2. lockoutDuration &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60 3. lockoutWindow &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60&#x60;
56517
+ * @param {*} [axiosOptions] Override http request option.
56518
+ * @throws {RequiredError}
56519
+ */
56520
+ patchAuthOrgLockoutConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<LockoutConfigurationV2024>>;
55507
56521
  /**
55508
56522
  * This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
55509
56523
  * @summary Update security network configuration.
@@ -55512,6 +56526,22 @@ export declare const GlobalTenantSecuritySettingsV2024ApiFp: (configuration?: Co
55512
56526
  * @throws {RequiredError}
55513
56527
  */
55514
56528
  patchAuthOrgNetworkConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<NetworkConfigurationV2024>>;
56529
+ /**
56530
+ * This API updates an existing service provider configuration for an org using PATCH.
56531
+ * @summary Update Service Provider Configuration
56532
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
56533
+ * @param {*} [axiosOptions] Override http request option.
56534
+ * @throws {RequiredError}
56535
+ */
56536
+ patchAuthOrgServiceProviderConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceProviderConfigurationV2024>>;
56537
+ /**
56538
+ * This API updates an existing session configuration for an org using PATCH.
56539
+ * @summary Update Auth Org Session Configuration
56540
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: &#x60;1. maxSessionTime &gt;&#x3D; 1 &amp;&amp; maxSessionTime &lt;&#x3D; 10080 (1 week) 2. maxIdleTime &gt;&#x3D; 1 &amp;&amp; maxIdleTime &lt;&#x3D; 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.&#x60;
56541
+ * @param {*} [axiosOptions] Override http request option.
56542
+ * @throws {RequiredError}
56543
+ */
56544
+ patchAuthOrgSessionConfig(jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<SessionConfigurationV2024>>;
55515
56545
  };
55516
56546
  /**
55517
56547
  * GlobalTenantSecuritySettingsV2024Api - factory interface
@@ -55526,6 +56556,13 @@ export declare const GlobalTenantSecuritySettingsV2024ApiFactory: (configuration
55526
56556
  * @throws {RequiredError}
55527
56557
  */
55528
56558
  createAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiCreateAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2024>;
56559
+ /**
56560
+ * This API returns the details of an org\'s lockout auth configuration.
56561
+ * @summary Get Auth Org Lockout Configuration.
56562
+ * @param {*} [axiosOptions] Override http request option.
56563
+ * @throws {RequiredError}
56564
+ */
56565
+ getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2024>;
55529
56566
  /**
55530
56567
  * This API returns the details of an org\'s network auth configuration.
55531
56568
  * @summary Get security network configuration.
@@ -55533,6 +56570,28 @@ export declare const GlobalTenantSecuritySettingsV2024ApiFactory: (configuration
55533
56570
  * @throws {RequiredError}
55534
56571
  */
55535
56572
  getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2024>;
56573
+ /**
56574
+ * This API returns the details of an org\'s service provider auth configuration.
56575
+ * @summary Get Service Provider Configuration.
56576
+ * @param {*} [axiosOptions] Override http request option.
56577
+ * @throws {RequiredError}
56578
+ */
56579
+ getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2024>;
56580
+ /**
56581
+ * This API returns the details of an org\'s session auth configuration.
56582
+ * @summary Get Auth Org Session Configuration.
56583
+ * @param {*} [axiosOptions] Override http request option.
56584
+ * @throws {RequiredError}
56585
+ */
56586
+ getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2024>;
56587
+ /**
56588
+ * This API updates an existing lockout configuration for an org using PATCH
56589
+ * @summary Update Auth Org Lockout Configuration
56590
+ * @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
56591
+ * @param {*} [axiosOptions] Override http request option.
56592
+ * @throws {RequiredError}
56593
+ */
56594
+ patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<LockoutConfigurationV2024>;
55536
56595
  /**
55537
56596
  * This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
55538
56597
  * @summary Update security network configuration.
@@ -55541,6 +56600,22 @@ export declare const GlobalTenantSecuritySettingsV2024ApiFactory: (configuration
55541
56600
  * @throws {RequiredError}
55542
56601
  */
55543
56602
  patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<NetworkConfigurationV2024>;
56603
+ /**
56604
+ * This API updates an existing service provider configuration for an org using PATCH.
56605
+ * @summary Update Service Provider Configuration
56606
+ * @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
56607
+ * @param {*} [axiosOptions] Override http request option.
56608
+ * @throws {RequiredError}
56609
+ */
56610
+ patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<ServiceProviderConfigurationV2024>;
56611
+ /**
56612
+ * This API updates an existing session configuration for an org using PATCH.
56613
+ * @summary Update Auth Org Session Configuration
56614
+ * @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
56615
+ * @param {*} [axiosOptions] Override http request option.
56616
+ * @throws {RequiredError}
56617
+ */
56618
+ patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<SessionConfigurationV2024>;
55544
56619
  };
55545
56620
  /**
55546
56621
  * Request parameters for createAuthOrgNetworkConfig operation in GlobalTenantSecuritySettingsV2024Api.
@@ -55555,6 +56630,19 @@ export interface GlobalTenantSecuritySettingsV2024ApiCreateAuthOrgNetworkConfigR
55555
56630
  */
55556
56631
  readonly networkConfigurationV2024: NetworkConfigurationV2024;
55557
56632
  }
56633
+ /**
56634
+ * Request parameters for patchAuthOrgLockoutConfig operation in GlobalTenantSecuritySettingsV2024Api.
56635
+ * @export
56636
+ * @interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest
56637
+ */
56638
+ export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest {
56639
+ /**
56640
+ * A list of auth org lockout configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Lockout Config conforms to certain logical guidelines, which are: &#x60;1. maximumAttempts &gt;&#x3D; 1 &amp;&amp; maximumAttempts &lt;&#x3D; 15 2. lockoutDuration &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60 3. lockoutWindow &gt;&#x3D; 5 &amp;&amp; lockoutDuration &lt;&#x3D; 60&#x60;
56641
+ * @type {Array<JsonPatchOperationV2024>}
56642
+ * @memberof GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfig
56643
+ */
56644
+ readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>;
56645
+ }
55558
56646
  /**
55559
56647
  * Request parameters for patchAuthOrgNetworkConfig operation in GlobalTenantSecuritySettingsV2024Api.
55560
56648
  * @export
@@ -55568,6 +56656,32 @@ export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgNetworkConfigRe
55568
56656
  */
55569
56657
  readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>;
55570
56658
  }
56659
+ /**
56660
+ * Request parameters for patchAuthOrgServiceProviderConfig operation in GlobalTenantSecuritySettingsV2024Api.
56661
+ * @export
56662
+ * @interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest
56663
+ */
56664
+ export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest {
56665
+ /**
56666
+ * A list of auth org service provider configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Note: /federationProtocolDetails/0 is IdpDetails /federationProtocolDetails/1 is SpDetails Ensures that the patched ServiceProviderConfig conforms to certain logical guidelines, which are: 1. Do not add or remove any elements in the federation protocol details in the service provider configuration. 2. Do not modify, add, or delete the service provider details element in the federation protocol details. 3. If this is the first time the patched ServiceProviderConfig enables Remote IDP sign-in, it must also include IDPDetails. 4. If the patch enables Remote IDP sign in, the entityID in the IDPDetails cannot be null. IDPDetails must include an entityID. 5. Any JIT configuration update must be valid. Just in time configuration update must be valid when enabled. This includes: - A Source ID - Source attribute mappings - Source attribute maps have all the required key values (firstName, lastName, email)
56667
+ * @type {Array<JsonPatchOperationV2024>}
56668
+ * @memberof GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfig
56669
+ */
56670
+ readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>;
56671
+ }
56672
+ /**
56673
+ * Request parameters for patchAuthOrgSessionConfig operation in GlobalTenantSecuritySettingsV2024Api.
56674
+ * @export
56675
+ * @interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest
56676
+ */
56677
+ export interface GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest {
56678
+ /**
56679
+ * A list of auth org session configuration update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Ensures that the patched Session Config conforms to certain logical guidelines, which are: &#x60;1. maxSessionTime &gt;&#x3D; 1 &amp;&amp; maxSessionTime &lt;&#x3D; 10080 (1 week) 2. maxIdleTime &gt;&#x3D; 1 &amp;&amp; maxIdleTime &lt;&#x3D; 1440 (1 day) 3. maxSessionTime must have a greater duration than maxIdleTime.&#x60;
56680
+ * @type {Array<JsonPatchOperationV2024>}
56681
+ * @memberof GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfig
56682
+ */
56683
+ readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>;
56684
+ }
55571
56685
  /**
55572
56686
  * GlobalTenantSecuritySettingsV2024Api - object-oriented interface
55573
56687
  * @export
@@ -55584,6 +56698,14 @@ export declare class GlobalTenantSecuritySettingsV2024Api extends BaseAPI {
55584
56698
  * @memberof GlobalTenantSecuritySettingsV2024Api
55585
56699
  */
55586
56700
  createAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiCreateAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<NetworkConfigurationV2024, any>>;
56701
+ /**
56702
+ * This API returns the details of an org\'s lockout auth configuration.
56703
+ * @summary Get Auth Org Lockout Configuration.
56704
+ * @param {*} [axiosOptions] Override http request option.
56705
+ * @throws {RequiredError}
56706
+ * @memberof GlobalTenantSecuritySettingsV2024Api
56707
+ */
56708
+ getAuthOrgLockoutConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<LockoutConfigurationV2024, any>>;
55587
56709
  /**
55588
56710
  * This API returns the details of an org\'s network auth configuration.
55589
56711
  * @summary Get security network configuration.
@@ -55592,6 +56714,31 @@ export declare class GlobalTenantSecuritySettingsV2024Api extends BaseAPI {
55592
56714
  * @memberof GlobalTenantSecuritySettingsV2024Api
55593
56715
  */
55594
56716
  getAuthOrgNetworkConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<NetworkConfigurationV2024, any>>;
56717
+ /**
56718
+ * This API returns the details of an org\'s service provider auth configuration.
56719
+ * @summary Get Service Provider Configuration.
56720
+ * @param {*} [axiosOptions] Override http request option.
56721
+ * @throws {RequiredError}
56722
+ * @memberof GlobalTenantSecuritySettingsV2024Api
56723
+ */
56724
+ getAuthOrgServiceProviderConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ServiceProviderConfigurationV2024, any>>;
56725
+ /**
56726
+ * This API returns the details of an org\'s session auth configuration.
56727
+ * @summary Get Auth Org Session Configuration.
56728
+ * @param {*} [axiosOptions] Override http request option.
56729
+ * @throws {RequiredError}
56730
+ * @memberof GlobalTenantSecuritySettingsV2024Api
56731
+ */
56732
+ getAuthOrgSessionConfig(axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SessionConfigurationV2024, any>>;
56733
+ /**
56734
+ * This API updates an existing lockout configuration for an org using PATCH
56735
+ * @summary Update Auth Org Lockout Configuration
56736
+ * @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest} requestParameters Request parameters.
56737
+ * @param {*} [axiosOptions] Override http request option.
56738
+ * @throws {RequiredError}
56739
+ * @memberof GlobalTenantSecuritySettingsV2024Api
56740
+ */
56741
+ patchAuthOrgLockoutConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgLockoutConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<LockoutConfigurationV2024, any>>;
55595
56742
  /**
55596
56743
  * This API updates an existing network configuration for an org using PATCH Requires security scope of: \'sp:auth-org:manage\'
55597
56744
  * @summary Update security network configuration.
@@ -55601,6 +56748,24 @@ export declare class GlobalTenantSecuritySettingsV2024Api extends BaseAPI {
55601
56748
  * @memberof GlobalTenantSecuritySettingsV2024Api
55602
56749
  */
55603
56750
  patchAuthOrgNetworkConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgNetworkConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<NetworkConfigurationV2024, any>>;
56751
+ /**
56752
+ * This API updates an existing service provider configuration for an org using PATCH.
56753
+ * @summary Update Service Provider Configuration
56754
+ * @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest} requestParameters Request parameters.
56755
+ * @param {*} [axiosOptions] Override http request option.
56756
+ * @throws {RequiredError}
56757
+ * @memberof GlobalTenantSecuritySettingsV2024Api
56758
+ */
56759
+ patchAuthOrgServiceProviderConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgServiceProviderConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<ServiceProviderConfigurationV2024, any>>;
56760
+ /**
56761
+ * This API updates an existing session configuration for an org using PATCH.
56762
+ * @summary Update Auth Org Session Configuration
56763
+ * @param {GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest} requestParameters Request parameters.
56764
+ * @param {*} [axiosOptions] Override http request option.
56765
+ * @throws {RequiredError}
56766
+ * @memberof GlobalTenantSecuritySettingsV2024Api
56767
+ */
56768
+ patchAuthOrgSessionConfig(requestParameters: GlobalTenantSecuritySettingsV2024ApiPatchAuthOrgSessionConfigRequest, axiosOptions?: RawAxiosRequestConfig): Promise<import("axios").AxiosResponse<SessionConfigurationV2024, any>>;
55604
56769
  }
55605
56770
  /**
55606
56771
  * GovernanceGroupsV2024Api - axios parameter creator
@@ -76022,11 +77187,11 @@ export declare const ServiceDeskIntegrationV2024ApiAxiosParamCreator: (configura
76022
77187
  * Update an existing Service Desk integration by ID with a PATCH request.
76023
77188
  * @summary Patch a Service Desk Integration
76024
77189
  * @param {string} id ID of the Service Desk integration to update
76025
- * @param {PatchServiceDeskIntegrationRequestV2024} patchServiceDeskIntegrationRequestV2024 A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
77190
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
76026
77191
  * @param {*} [axiosOptions] Override http request option.
76027
77192
  * @throws {RequiredError}
76028
77193
  */
76029
- patchServiceDeskIntegration: (id: string, patchServiceDeskIntegrationRequestV2024: PatchServiceDeskIntegrationRequestV2024, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
77194
+ patchServiceDeskIntegration: (id: string, jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig) => Promise<RequestArgs>;
76030
77195
  /**
76031
77196
  * Update an existing Service Desk integration by ID.
76032
77197
  * @summary Update a Service Desk integration
@@ -76112,11 +77277,11 @@ export declare const ServiceDeskIntegrationV2024ApiFp: (configuration?: Configur
76112
77277
  * Update an existing Service Desk integration by ID with a PATCH request.
76113
77278
  * @summary Patch a Service Desk Integration
76114
77279
  * @param {string} id ID of the Service Desk integration to update
76115
- * @param {PatchServiceDeskIntegrationRequestV2024} patchServiceDeskIntegrationRequestV2024 A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
77280
+ * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024 A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
76116
77281
  * @param {*} [axiosOptions] Override http request option.
76117
77282
  * @throws {RequiredError}
76118
77283
  */
76119
- patchServiceDeskIntegration(id: string, patchServiceDeskIntegrationRequestV2024: PatchServiceDeskIntegrationRequestV2024, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceDeskIntegrationDtoV2024>>;
77284
+ patchServiceDeskIntegration(id: string, jsonPatchOperationV2024: Array<JsonPatchOperationV2024>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<ServiceDeskIntegrationDtoV2024>>;
76120
77285
  /**
76121
77286
  * Update an existing Service Desk integration by ID.
76122
77287
  * @summary Update a Service Desk integration
@@ -76322,10 +77487,10 @@ export interface ServiceDeskIntegrationV2024ApiPatchServiceDeskIntegrationReques
76322
77487
  readonly id: string;
76323
77488
  /**
76324
77489
  * A list of SDIM update operations according to the [JSON Patch](https://tools.ietf.org/html/rfc6902) standard. Only &#x60;replace&#x60; operations are accepted by this endpoint. A 403 Forbidden Error indicates that a PATCH operation was attempted that is not allowed.
76325
- * @type {PatchServiceDeskIntegrationRequestV2024}
77490
+ * @type {Array<JsonPatchOperationV2024>}
76326
77491
  * @memberof ServiceDeskIntegrationV2024ApiPatchServiceDeskIntegration
76327
77492
  */
76328
- readonly patchServiceDeskIntegrationRequestV2024: PatchServiceDeskIntegrationRequestV2024;
77493
+ readonly jsonPatchOperationV2024: Array<JsonPatchOperationV2024>;
76329
77494
  }
76330
77495
  /**
76331
77496
  * Request parameters for putServiceDeskIntegration operation in ServiceDeskIntegrationV2024Api.