sailpoint-api-client 1.6.4 → 1.6.5

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/v3/api.js CHANGED
@@ -78,16 +78,16 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
78
78
  return (mod && mod.__esModule) ? mod : { "default": mod };
79
79
  };
80
80
  Object.defineProperty(exports, "__esModule", { value: true });
81
- exports.CampaignAlertLevelV3 = exports.CampaignMandatoryCommentRequirementV3 = exports.CampaignCorrelatedStatusV3 = exports.CampaignStatusV3 = exports.CampaignTypeV3 = exports.BulkAddTaggedObjectOperationV3 = exports.BucketType = exports.BeforeProvisioningRuleDtoTypeV3 = exports.BaseAccessOwnerTypeV3 = exports.BackupResponseCloudStorageStatusV3 = exports.BackupResponseHydrationStatusV3 = exports.BackupResponseBackupTypeV3 = exports.BackupResponseTypeV3 = exports.BackupResponseStatusV3 = exports.BackupOptionsIncludeTypesV3 = exports.AuthUserCapabilitiesV3 = exports.AttributeDefinitionType = exports.AttributeDefinitionSchemaTypeV3 = exports.ApprovalStatusDtoOriginalOwnerTypeV3 = exports.ApprovalStatusDtoCurrentOwnerTypeV3 = exports.ApprovalStatus = exports.ApprovalSchemeForRoleApproverTypeV3 = exports.ApprovalScheme = exports.AggregationType = exports.AdminReviewReassignReassignToTypeV3 = exports.ActivityInsightsUsageDaysStateV3 = exports.AccountAllOfSourceOwnerTypeV3 = exports.AccountAllOfRecommendationMethodV3 = exports.AccountAllOfRecommendationTypeV3 = exports.AccountAllOfIdentityTypeV3 = exports.AccountActivityItemOperation = exports.AccountActivityApprovalStatus = exports.AccountActionActionV3 = exports.AccountOriginV3 = exports.AccessType = exports.AccessRequestType = exports.AccessRequestPhasesResultV3 = exports.AccessRequestPhasesStateV3 = exports.AccessRequestItemTypeV3 = exports.AccessProfileUsageUsedByInnerTypeV3 = exports.AccessProfileSourceRefTypeV3 = exports.AccessProfileRefTypeV3 = exports.AccessProfileApprovalSchemeApproverTypeV3 = exports.AccessItemReviewedByTypeV3 = exports.AccessItemRequesterTypeV3 = exports.AccessItemRequestedForTypeV3 = exports.AccessCriteriaCriteriaListInnerTypeV3 = exports.AccessConstraintOperatorV3 = exports.AccessConstraintTypeV3 = exports.AccessAppsOwnerTypeV3 = void 0;
82
- exports.GetCampaign200ResponseMandatoryCommentRequirementV3 = exports.GetCampaign200ResponseCorrelatedStatusV3 = exports.GetCampaign200ResponseStatusV3 = exports.GetCampaign200ResponseTypeV3 = exports.GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = exports.GetActiveCampaigns200ResponseInnerCorrelatedStatusV3 = exports.GetActiveCampaigns200ResponseInnerStatusV3 = exports.GetActiveCampaigns200ResponseInnerTypeV3 = exports.FilterType = exports.FederationProtocolDetailsRoleV3 = exports.ExpressionChildrenInnerOperatorV3 = exports.ExpressionOperatorV3 = exports.ExecutionStatus = exports.ExceptionCriteriaCriteriaListInnerTypeV3 = exports.EntitlementRef1TypeV3 = exports.EntitlementRefTypeV3 = exports.EntitlementOwnerTypeV3 = exports.DtoType = exports.DocumentType = exports.DimensionRefTypeV3 = exports.DependantConnectionsMissingDtoDependencyTypeV3 = exports.DeleteSource202ResponseTypeV3 = exports.DateCompareOperatorV3 = exports.CriteriaType = exports.ConnectorDetailStatusV3 = exports.CompletionStatus = exports.CompletedApprovalState = exports.CommentDtoAuthorTypeV3 = exports.ClientType = exports.CertificationTaskStatusV3 = exports.CertificationTaskTargetTypeV3 = exports.CertificationTaskTypeV3 = exports.CertificationReferenceTypeV3 = exports.CertificationPhase = exports.CertificationDecision = exports.CampaignTemplateOwnerRefTypeV3 = exports.CampaignReportStatusV3 = exports.CampaignReportTypeV3 = exports.CampaignReferenceMandatoryCommentRequirementV3 = exports.CampaignReferenceCorrelatedStatusV3 = exports.CampaignReferenceCampaignTypeV3 = exports.CampaignReferenceTypeV3 = exports.CampaignFilterDetailsModeV3 = exports.CampaignCompleteOptionsAutoCompleteActionV3 = exports.CampaignAllOfSourcesWithOrphanEntitlementsTypeV3 = exports.CampaignAllOfSearchCampaignInfoReviewerTypeV3 = exports.CampaignAllOfSearchCampaignInfoTypeV3 = exports.CampaignAllOfRoleCompositionCampaignInfoRemediatorRefTypeV3 = exports.CampaignAllOfMachineAccountCampaignInfoReviewerTypeV3 = exports.CampaignAllOfFilterTypeV3 = void 0;
83
- exports.ReassignmentType = exports.ReassignmentReferenceTypeV3 = exports.ReassignReferenceTypeV3 = exports.QueryType = exports.PublicIdentityIdentityStateV3 = exports.ProvisioningState = exports.ProvisioningCriteriaOperation = exports.PreApprovalTriggerDetailsDecisionV3 = exports.PendingApprovalOwnerTypeV3 = exports.PendingApprovalAction = exports.PatOwnerTypeV3 = exports.PasswordStatusStateV3 = exports.PasswordChangeResponseStateV3 = exports.OwnerReferenceSegmentsTypeV3 = exports.OwnerReferenceTypeV3 = exports.OwnerDtoTypeV3 = exports.OrphanIdentitiesReportArgumentsSelectedFormatsV3 = exports.Operation = exports.ObjectMappingResponseObjectTypeV3 = exports.ObjectMappingRequestObjectTypeV3 = exports.NonEmployeeSchemaAttributeType = exports.NonEmployeeIdentityDtoType = exports.NonEmployeeBulkUploadStatusStatusV3 = exports.NonEmployeeBulkUploadJobStatusV3 = exports.NamedConstructs = exports.MfaConfigTestResponseStateV3 = exports.MetricType = exports.ManualWorkItemState = exports.ManualWorkItemDetailsOriginalOwnerTypeV3 = exports.ManualWorkItemDetailsCurrentOwnerTypeV3 = exports.ManagedClusterTypes = exports.ManagedClusterStatusV3 = exports.ManagedClientType = exports.ManagedClientStatusCode = exports.ManagedClientProvisionStatusV3 = exports.ManagedClientClusterTypeV3 = exports.ManagedClientStatusV3 = exports.LocaleOrigin = exports.LifecyclestateDeletedTypeV3 = exports.KbaAuthResponseStatusV3 = exports.JsonPatchOperationOpV3 = exports.Index = exports.ImportObjectTypeV3 = exports.IdpDetailsRoleV3 = exports.IdentityWithNewAccessAccessRefsInnerTypeV3 = exports.IdentityProfileExportedObjectSelfTypeV3 = exports.IdentityProfileAllOfOwnerTypeV3 = exports.IdentityProfileAllOfAuthoritativeSourceTypeV3 = exports.IdentityPreviewResponseIdentityTypeV3 = exports.GrantType = void 0;
84
- exports.SodReportResultDtoTypeV3 = exports.SodRecipientTypeV3 = exports.SodPolicyOwnerRefTypeV3 = exports.SodPolicyDtoTypeV3 = exports.SodPolicyTypeV3 = exports.SodPolicyStateV3 = exports.SlimCampaignCorrelatedStatusV3 = exports.SlimCampaignStatusV3 = exports.SlimCampaignTypeV3 = exports.ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = exports.ServiceDeskSourceTypeV3 = exports.SendTokenResponseStatusV3 = exports.SendTokenRequestDeliveryTypeV3 = exports.SelectorType = exports.SearchScheduleRecipientsInnerTypeV3 = exports.SearchFilterType = exports.SchemaFeaturesV3 = exports.ScheduledSearchAllOfOwnerTypeV3 = exports.ScheduledAttributesFrequencyV3 = exports.ScheduleType = exports.ScheduleMonthsTypeV3 = exports.ScheduleHoursTypeV3 = exports.ScheduleDaysTypeV3 = exports.ScheduleTypeV3 = exports.RoleMembershipSelectorType = exports.RoleCriteriaOperation = exports.RoleCriteriaKeyType = exports.RoleAssignmentSourceType = exports.ReviewerTypeV3 = exports.ReviewableEntitlementAccountOwnerTypeV3 = exports.RequestedItemStatusSodViolationContextStateV3 = exports.RequestedItemStatusRequestedForTypeV3 = exports.RequestedItemStatusRequestState = exports.RequestedItemStatusPreApprovalTriggerDetailsDecisionV3 = exports.RequestedItemStatusTypeV3 = exports.RequestedItemDtoRefTypeV3 = exports.RequestedItemDetailsTypeV3 = exports.RequestableObjectType = exports.RequestableObjectRequestStatus = exports.RequestableObjectReferenceTypeV3 = exports.ReportType = exports.ReportResultsAvailableFormatsV3 = exports.ReportResultsStatusV3 = exports.ReportResultsReportTypeV3 = exports.ReportResultReferenceStatusV3 = exports.ReportResultReferenceTypeV3 = exports.ReportDetailsArgumentsSelectedFormatsV3 = exports.ReportDetailsReportTypeV3 = exports.RecommendationMethodV3 = exports.RecommendationTypeV3 = void 0;
85
- exports.AccessProfilesApiAxiosParamCreator = exports.WorkflowTriggerAttributesFrequencyV3 = exports.WorkflowTriggerTypeV3 = exports.WorkflowModifiedByTypeV3 = exports.WorkflowLibraryTriggerTypeV3 = exports.WorkflowLibraryFormFieldsTypeV3 = exports.WorkflowExecutionEventTypeV3 = exports.WorkflowExecutionStatusV3 = exports.WorkflowBodyOwnerTypeV3 = exports.WorkflowAllOfCreatorTypeV3 = exports.WorkItemTypeManualWorkItems = exports.WorkItemStateManualWorkItems = exports.WorkItemState = exports.ViolationOwnerAssignmentConfigOwnerRefTypeV3 = exports.ViolationOwnerAssignmentConfigAssignmentRuleV3 = exports.ViolationContextPolicyTypeV3 = exports.VerificationResponseStatusV3 = exports.V3CreateConnectorDtoStatusV3 = exports.V3ConnectorDtoStatusV3 = exports.UsageType = exports.UpdateDetailStatusV3 = exports.UncorrelatedAccountsReportArgumentsSelectedFormatsV3 = exports.TransformReadTypeV3 = exports.TransformTypeV3 = exports.TokenAuthResponseStatusV3 = exports.TokenAuthRequestDeliveryTypeV3 = exports.TaskResultSimplifiedCompletionStatusV3 = exports.TaskResultDtoTypeV3 = exports.TaskResultDetailsMessagesInnerTypeV3 = exports.TaskResultDetailsCompletionStatusV3 = exports.TaskResultDetailsReportTypeV3 = exports.TaskResultDetailsTypeV3 = exports.TaggedObjectDtoTypeV3 = exports.StandardLevel = exports.SpDetailsRoleV3 = exports.SourceUsageStatusStatusV3 = exports.SourceSchemasInnerTypeV3 = exports.SourcePasswordPoliciesInnerTypeV3 = exports.SourceOwnerTypeV3 = exports.SourceManagerCorrelationRuleTypeV3 = exports.SourceManagementWorkgroupTypeV3 = exports.SourceHealthDtoStatusV3 = exports.SourceClusterDtoTypeV3 = exports.SourceClusterTypeV3 = exports.SourceBeforeProvisioningRuleTypeV3 = exports.SourceAccountCorrelationRuleTypeV3 = exports.SourceAccountCorrelationConfigTypeV3 = exports.SourceStatusV3 = exports.SourceFeaturesV3 = exports.SodViolationContextCheckCompletedStateV3 = void 0;
86
- exports.CertificationSummariesApiFactory = exports.CertificationSummariesApiFp = exports.CertificationSummariesApiAxiosParamCreator = exports.GetCampaignDetailV3 = exports.GetActiveCampaignsDetailV3 = exports.CertificationCampaignsApi = exports.CertificationCampaignsApiFactory = exports.CertificationCampaignsApiFp = exports.CertificationCampaignsApiAxiosParamCreator = exports.CertificationCampaignFiltersApi = exports.CertificationCampaignFiltersApiFactory = exports.CertificationCampaignFiltersApiFp = exports.CertificationCampaignFiltersApiAxiosParamCreator = exports.BrandingApi = exports.BrandingApiFactory = exports.BrandingApiFp = exports.BrandingApiAxiosParamCreator = exports.AuthUsersApi = exports.AuthUsersApiFactory = exports.AuthUsersApiFp = exports.AuthUsersApiAxiosParamCreator = exports.GetDiscoveredApplicationsDetailV3 = exports.ApplicationDiscoveryApi = exports.ApplicationDiscoveryApiFactory = exports.ApplicationDiscoveryApiFp = exports.ApplicationDiscoveryApiAxiosParamCreator = exports.ListAccountsDetailLevelV3 = exports.AccountsApi = exports.AccountsApiFactory = exports.AccountsApiFp = exports.AccountsApiAxiosParamCreator = exports.AccountUsagesApi = exports.AccountUsagesApiFactory = exports.AccountUsagesApiFp = exports.AccountUsagesApiAxiosParamCreator = exports.AccountActivitiesApi = exports.AccountActivitiesApiFactory = exports.AccountActivitiesApiFp = exports.AccountActivitiesApiAxiosParamCreator = exports.AccessRequestsApi = exports.AccessRequestsApiFactory = exports.AccessRequestsApiFp = exports.AccessRequestsApiAxiosParamCreator = exports.AccessRequestApprovalsApi = exports.AccessRequestApprovalsApiFactory = exports.AccessRequestApprovalsApiFp = exports.AccessRequestApprovalsApiAxiosParamCreator = exports.AccessProfilesApi = exports.AccessProfilesApiFactory = exports.AccessProfilesApiFp = void 0;
87
- exports.NonEmployeeLifecycleManagementApiAxiosParamCreator = exports.ManagedClustersApi = exports.ManagedClustersApiFactory = exports.ManagedClustersApiFp = exports.ManagedClustersApiAxiosParamCreator = exports.ManagedClientsApi = exports.ManagedClientsApiFactory = exports.ManagedClientsApiFp = exports.ManagedClientsApiAxiosParamCreator = exports.PingVerificationStatusMethodV3 = exports.MFAControllerApi = exports.MFAControllerApiFactory = exports.MFAControllerApiFp = exports.MFAControllerApiAxiosParamCreator = exports.TestMFAConfigMethodV3 = exports.DeleteMFAConfigMethodV3 = exports.MFAConfigurationApi = exports.MFAConfigurationApiFactory = exports.MFAConfigurationApiFp = exports.MFAConfigurationApiAxiosParamCreator = exports.LifecycleStatesApi = exports.LifecycleStatesApiFactory = exports.LifecycleStatesApiFp = exports.LifecycleStatesApiAxiosParamCreator = exports.IdentityProfilesApi = exports.IdentityProfilesApiFactory = exports.IdentityProfilesApiFp = exports.IdentityProfilesApiAxiosParamCreator = exports.GlobalTenantSecuritySettingsApi = exports.GlobalTenantSecuritySettingsApiFactory = exports.GlobalTenantSecuritySettingsApiFp = exports.GlobalTenantSecuritySettingsApiAxiosParamCreator = exports.PutConnectorTranslationsLocaleV3 = exports.GetConnectorTranslationsLocaleV3 = exports.GetConnectorListLocaleV3 = exports.GetConnectorLocaleV3 = exports.ConnectorsApi = exports.ConnectorsApiFactory = exports.ConnectorsApiFp = exports.ConnectorsApiAxiosParamCreator = exports.ConfigurationHubApi = exports.ConfigurationHubApiFactory = exports.ConfigurationHubApiFp = exports.ConfigurationHubApiAxiosParamCreator = exports.CertificationsApi = exports.CertificationsApiFactory = exports.CertificationsApiFp = exports.CertificationsApiAxiosParamCreator = exports.GetIdentityAccessSummariesTypeV3 = exports.CertificationSummariesApi = void 0;
88
- exports.RolesApiAxiosParamCreator = exports.ListRequestableObjectsTypesV3 = exports.RequestableObjectsApi = exports.RequestableObjectsApiFactory = exports.RequestableObjectsApiFp = exports.RequestableObjectsApiAxiosParamCreator = exports.GetReportFileFormatV3 = exports.ReportsDataExtractionApi = exports.ReportsDataExtractionApiFactory = exports.ReportsDataExtractionApiFp = exports.ReportsDataExtractionApiAxiosParamCreator = exports.PublicIdentitiesConfigApi = exports.PublicIdentitiesConfigApiFactory = exports.PublicIdentitiesConfigApiFp = exports.PublicIdentitiesConfigApiAxiosParamCreator = exports.PublicIdentitiesApi = exports.PublicIdentitiesApiFactory = exports.PublicIdentitiesApiFp = exports.PublicIdentitiesApiAxiosParamCreator = exports.PersonalAccessTokensApi = exports.PersonalAccessTokensApiFactory = exports.PersonalAccessTokensApiFp = exports.PersonalAccessTokensApiAxiosParamCreator = exports.PasswordSyncGroupsApi = exports.PasswordSyncGroupsApiFactory = exports.PasswordSyncGroupsApiFp = exports.PasswordSyncGroupsApiAxiosParamCreator = exports.PasswordPoliciesApi = exports.PasswordPoliciesApiFactory = exports.PasswordPoliciesApiFp = exports.PasswordPoliciesApiAxiosParamCreator = exports.PasswordManagementApi = exports.PasswordManagementApiFactory = exports.PasswordManagementApiFp = exports.PasswordManagementApiAxiosParamCreator = exports.PasswordDictionaryApi = exports.PasswordDictionaryApiFactory = exports.PasswordDictionaryApiFp = exports.PasswordDictionaryApiAxiosParamCreator = exports.PasswordConfigurationApi = exports.PasswordConfigurationApiFactory = exports.PasswordConfigurationApiFp = exports.PasswordConfigurationApiAxiosParamCreator = exports.OAuthClientsApi = exports.OAuthClientsApiFactory = exports.OAuthClientsApiFp = exports.OAuthClientsApiAxiosParamCreator = exports.NonEmployeeLifecycleManagementApi = exports.NonEmployeeLifecycleManagementApiFactory = exports.NonEmployeeLifecycleManagementApiFp = void 0;
89
- exports.DeleteTaggedObjectTypeV3 = exports.TaggedObjectsApi = exports.TaggedObjectsApiFactory = exports.TaggedObjectsApiFp = exports.TaggedObjectsApiAxiosParamCreator = exports.GetSourceSchemasIncludeTypesV3 = exports.SourcesApi = exports.SourcesApiFactory = exports.SourcesApiFp = exports.SourcesApiAxiosParamCreator = exports.SourceUsagesApi = exports.SourceUsagesApiFactory = exports.SourceUsagesApiFp = exports.SourceUsagesApiAxiosParamCreator = exports.ServiceDeskIntegrationApi = exports.ServiceDeskIntegrationApiFactory = exports.ServiceDeskIntegrationApiFp = exports.ServiceDeskIntegrationApiAxiosParamCreator = exports.SegmentsApi = exports.SegmentsApiFactory = exports.SegmentsApiFp = exports.SegmentsApiAxiosParamCreator = exports.SearchAttributeConfigurationApi = exports.SearchAttributeConfigurationApiFactory = exports.SearchAttributeConfigurationApiFp = exports.SearchAttributeConfigurationApiAxiosParamCreator = exports.SearchGetIndexV3 = exports.SearchApi = exports.SearchApiFactory = exports.SearchApiFp = exports.SearchApiAxiosParamCreator = exports.ScheduledSearchApi = exports.ScheduledSearchApiFactory = exports.ScheduledSearchApiFp = exports.ScheduledSearchApiAxiosParamCreator = exports.SavedSearchApi = exports.SavedSearchApiFactory = exports.SavedSearchApiFp = exports.SavedSearchApiAxiosParamCreator = exports.SODViolationsApi = exports.SODViolationsApiFactory = exports.SODViolationsApiFp = exports.SODViolationsApiAxiosParamCreator = exports.SODPoliciesApi = exports.SODPoliciesApiFactory = exports.SODPoliciesApiFp = exports.SODPoliciesApiAxiosParamCreator = exports.RolesApi = exports.RolesApiFactory = exports.RolesApiFp = void 0;
90
- exports.WorkflowsApi = exports.WorkflowsApiFactory = exports.WorkflowsApiFp = exports.WorkflowsApiAxiosParamCreator = exports.WorkItemsApi = exports.WorkItemsApiFactory = exports.WorkItemsApiFp = exports.WorkItemsApiAxiosParamCreator = exports.VendorConnectorMappingsApi = exports.VendorConnectorMappingsApiFactory = exports.VendorConnectorMappingsApiFp = exports.VendorConnectorMappingsApiAxiosParamCreator = exports.TransformsApi = exports.TransformsApiFactory = exports.TransformsApiFp = exports.TransformsApiAxiosParamCreator = exports.PutTaggedObjectTypeV3 = exports.ListTaggedObjectsByTypeTypeV3 = exports.GetTaggedObjectTypeV3 = void 0;
81
+ exports.CampaignMandatoryCommentRequirementV3 = exports.CampaignCorrelatedStatusV3 = exports.CampaignStatusV3 = exports.CampaignTypeV3 = exports.BulkAddTaggedObjectOperationV3 = exports.BucketType = exports.BeforeProvisioningRuleDtoTypeV3 = exports.BaseAccessOwnerTypeV3 = exports.BackupResponseCloudStorageStatusV3 = exports.BackupResponseHydrationStatusV3 = exports.BackupResponseBackupTypeV3 = exports.BackupResponseTypeV3 = exports.BackupResponseStatusV3 = exports.BackupOptionsIncludeTypesV3 = exports.AuthUserCapabilitiesV3 = exports.AttributeDefinitionType = exports.AttributeDefinitionSchemaTypeV3 = exports.ApprovalStatusDtoOriginalOwnerTypeV3 = exports.ApprovalStatusDtoCurrentOwnerTypeV3 = exports.ApprovalStatus = exports.ApprovalSchemeForRoleApproverTypeV3 = exports.ApprovalScheme = exports.AggregationType = exports.AdminReviewReassignReassignToTypeV3 = exports.ActivityInsightsUsageDaysStateV3 = exports.AccountAllOfSourceOwnerTypeV3 = exports.AccountAllOfRecommendationMethodV3 = exports.AccountAllOfRecommendationTypeV3 = exports.AccountAllOfIdentityTypeV3 = exports.AccountActivityItemOperation = exports.AccountActivityApprovalStatus = exports.AccountActionActionV3 = exports.AccountOriginV3 = exports.AccessType = exports.AccessRequestType = exports.AccessRequestPhasesResultV3 = exports.AccessRequestPhasesStateV3 = exports.AccessRequestItemTypeV3 = exports.AccessProfileUsageUsedByInnerTypeV3 = exports.AccessProfileSourceRefTypeV3 = exports.AccessProfileRefTypeV3 = exports.AccessProfileApprovalSchemeApproverTypeV3 = exports.AccessItemReviewedByTypeV3 = exports.AccessItemRequesterTypeV3 = exports.AccessItemRequestedForTypeV3 = exports.AccessCriteriaRequestCriteriaListInnerTypeV3 = exports.AccessCriteriaCriteriaListInnerTypeV3 = exports.AccessConstraintOperatorV3 = exports.AccessConstraintTypeV3 = exports.AccessAppsOwnerTypeV3 = void 0;
82
+ exports.GetCampaign200ResponseCorrelatedStatusV3 = exports.GetCampaign200ResponseStatusV3 = exports.GetCampaign200ResponseTypeV3 = exports.GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = exports.GetActiveCampaigns200ResponseInnerCorrelatedStatusV3 = exports.GetActiveCampaigns200ResponseInnerStatusV3 = exports.GetActiveCampaigns200ResponseInnerTypeV3 = exports.FilterType = exports.FederationProtocolDetailsRoleV3 = exports.ExpressionChildrenInnerOperatorV3 = exports.ExpressionOperatorV3 = exports.ExecutionStatus = exports.ExceptionCriteriaCriteriaListInnerTypeV3 = exports.EntitlementRef1TypeV3 = exports.EntitlementRefTypeV3 = exports.EntitlementOwnerTypeV3 = exports.DtoType = exports.DocumentType = exports.DimensionRefTypeV3 = exports.DependantConnectionsMissingDtoDependencyTypeV3 = exports.DeleteSource202ResponseTypeV3 = exports.DateCompareOperatorV3 = exports.CriteriaType = exports.ConnectorDetailStatusV3 = exports.CompletionStatus = exports.CompletedApprovalState = exports.CommentDtoAuthorTypeV3 = exports.ClientType = exports.CertificationTaskStatusV3 = exports.CertificationTaskTargetTypeV3 = exports.CertificationTaskTypeV3 = exports.CertificationReferenceTypeV3 = exports.CertificationPhase = exports.CertificationDecision = exports.CampaignTemplateOwnerRefTypeV3 = exports.CampaignReportStatusV3 = exports.CampaignReportTypeV3 = exports.CampaignReferenceMandatoryCommentRequirementV3 = exports.CampaignReferenceCorrelatedStatusV3 = exports.CampaignReferenceCampaignTypeV3 = exports.CampaignReferenceTypeV3 = exports.CampaignFilterDetailsModeV3 = exports.CampaignCompleteOptionsAutoCompleteActionV3 = exports.CampaignAllOfSourcesWithOrphanEntitlementsTypeV3 = exports.CampaignAllOfSearchCampaignInfoReviewerTypeV3 = exports.CampaignAllOfSearchCampaignInfoTypeV3 = exports.CampaignAllOfRoleCompositionCampaignInfoRemediatorRefTypeV3 = exports.CampaignAllOfMachineAccountCampaignInfoReviewerTypeV3 = exports.CampaignAllOfFilterTypeV3 = exports.CampaignAlertLevelV3 = void 0;
83
+ exports.ReassignmentReferenceTypeV3 = exports.ReassignReferenceTypeV3 = exports.QueryType = exports.PublicIdentityIdentityStateV3 = exports.ProvisioningState = exports.ProvisioningCriteriaOperation = exports.PreApprovalTriggerDetailsDecisionV3 = exports.PendingApprovalOwnerTypeV3 = exports.PendingApprovalAction = exports.PatOwnerTypeV3 = exports.PasswordStatusStateV3 = exports.PasswordChangeResponseStateV3 = exports.OwnerReferenceSegmentsTypeV3 = exports.OwnerReferenceTypeV3 = exports.OwnerDtoTypeV3 = exports.OrphanIdentitiesReportArgumentsSelectedFormatsV3 = exports.Operation = exports.ObjectMappingResponseObjectTypeV3 = exports.ObjectMappingRequestObjectTypeV3 = exports.NonEmployeeSchemaAttributeType = exports.NonEmployeeIdentityDtoType = exports.NonEmployeeBulkUploadStatusStatusV3 = exports.NonEmployeeBulkUploadJobStatusV3 = exports.NamedConstructs = exports.MfaConfigTestResponseStateV3 = exports.MetricType = exports.ManualWorkItemState = exports.ManualWorkItemDetailsOriginalOwnerTypeV3 = exports.ManualWorkItemDetailsCurrentOwnerTypeV3 = exports.ManagedClusterTypes = exports.ManagedClusterStatusV3 = exports.ManagedClientType = exports.ManagedClientStatusCode = exports.ManagedClientProvisionStatusV3 = exports.ManagedClientClusterTypeV3 = exports.ManagedClientStatusV3 = exports.LocaleOrigin = exports.LifecyclestateDeletedTypeV3 = exports.KbaAuthResponseStatusV3 = exports.JsonPatchOperationOpV3 = exports.Index = exports.ImportObjectTypeV3 = exports.IdpDetailsRoleV3 = exports.IdentityWithNewAccessAccessRefsInnerTypeV3 = exports.IdentityProfileExportedObjectSelfTypeV3 = exports.IdentityProfileAllOfOwnerTypeV3 = exports.IdentityProfileAllOfAuthoritativeSourceTypeV3 = exports.IdentityPreviewResponseIdentityTypeV3 = exports.GrantType = exports.GetCampaign200ResponseMandatoryCommentRequirementV3 = void 0;
84
+ exports.SodPolicyReadStateV3 = exports.SodPolicyOwnerRefTypeV3 = exports.SodPolicyDtoTypeV3 = exports.SodPolicyTypeV3 = exports.SodPolicyStateV3 = exports.SlimCampaignCorrelatedStatusV3 = exports.SlimCampaignStatusV3 = exports.SlimCampaignTypeV3 = exports.ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = exports.ServiceDeskSourceTypeV3 = exports.SendTokenResponseStatusV3 = exports.SendTokenRequestDeliveryTypeV3 = exports.SelectorType = exports.SearchScheduleRecipientsInnerTypeV3 = exports.SearchFilterType = exports.SchemaFeaturesV3 = exports.ScheduledSearchAllOfOwnerTypeV3 = exports.ScheduledAttributesFrequencyV3 = exports.ScheduleType = exports.ScheduleMonthsTypeV3 = exports.ScheduleHoursTypeV3 = exports.ScheduleDaysTypeV3 = exports.ScheduleTypeV3 = exports.RoleMembershipSelectorType = exports.RoleCriteriaOperation = exports.RoleCriteriaKeyType = exports.RoleAssignmentSourceType = exports.ReviewerTypeV3 = exports.ReviewableEntitlementAccountOwnerTypeV3 = exports.RequestedItemStatusSodViolationContextStateV3 = exports.RequestedItemStatusRequestedForTypeV3 = exports.RequestedItemStatusRequestState = exports.RequestedItemStatusPreApprovalTriggerDetailsDecisionV3 = exports.RequestedItemStatusTypeV3 = exports.RequestedItemDtoRefTypeV3 = exports.RequestedItemDetailsTypeV3 = exports.RequestableObjectType = exports.RequestableObjectRequestStatus = exports.RequestableObjectReferenceTypeV3 = exports.ReportType = exports.ReportResultsAvailableFormatsV3 = exports.ReportResultsStatusV3 = exports.ReportResultsReportTypeV3 = exports.ReportResultReferenceStatusV3 = exports.ReportResultReferenceTypeV3 = exports.ReportDetailsArgumentsSelectedFormatsV3 = exports.ReportDetailsReportTypeV3 = exports.RecommendationMethodV3 = exports.RecommendationTypeV3 = exports.ReassignmentType = void 0;
85
+ exports.WorkflowLibraryFormFieldsTypeV3 = exports.WorkflowExecutionEventTypeV3 = exports.WorkflowExecutionStatusV3 = exports.WorkflowBodyOwnerTypeV3 = exports.WorkflowAllOfCreatorTypeV3 = exports.WorkItemTypeManualWorkItems = exports.WorkItemStateManualWorkItems = exports.WorkItemState = exports.ViolationOwnerAssignmentConfigOwnerRefTypeV3 = exports.ViolationOwnerAssignmentConfigAssignmentRuleV3 = exports.ViolationContextPolicyTypeV3 = exports.VerificationResponseStatusV3 = exports.V3CreateConnectorDtoStatusV3 = exports.V3ConnectorDtoStatusV3 = exports.UsageType = exports.UpdateDetailStatusV3 = exports.UncorrelatedAccountsReportArgumentsSelectedFormatsV3 = exports.TransformReadTypeV3 = exports.TransformTypeV3 = exports.TokenAuthResponseStatusV3 = exports.TokenAuthRequestDeliveryTypeV3 = exports.TaskResultSimplifiedCompletionStatusV3 = exports.TaskResultDtoTypeV3 = exports.TaskResultDetailsMessagesInnerTypeV3 = exports.TaskResultDetailsCompletionStatusV3 = exports.TaskResultDetailsReportTypeV3 = exports.TaskResultDetailsTypeV3 = exports.TaggedObjectDtoTypeV3 = exports.StandardLevel = exports.SpDetailsRoleV3 = exports.SourceUsageStatusStatusV3 = exports.SourceSchemasInnerTypeV3 = exports.SourcePasswordPoliciesInnerTypeV3 = exports.SourceOwnerTypeV3 = exports.SourceManagerCorrelationRuleTypeV3 = exports.SourceManagementWorkgroupTypeV3 = exports.SourceHealthDtoStatusV3 = exports.SourceClusterDtoTypeV3 = exports.SourceClusterTypeV3 = exports.SourceBeforeProvisioningRuleTypeV3 = exports.SourceAccountCorrelationRuleTypeV3 = exports.SourceAccountCorrelationConfigTypeV3 = exports.SourceStatusV3 = exports.SourceFeaturesV3 = exports.SodViolationContextCheckCompletedStateV3 = exports.SodReportResultDtoTypeV3 = exports.SodRecipientTypeV3 = exports.SodPolicyRequestTypeV3 = exports.SodPolicyRequestStateV3 = exports.SodPolicyReadTypeV3 = void 0;
86
+ exports.CertificationCampaignsApi = exports.CertificationCampaignsApiFactory = exports.CertificationCampaignsApiFp = exports.CertificationCampaignsApiAxiosParamCreator = exports.CertificationCampaignFiltersApi = exports.CertificationCampaignFiltersApiFactory = exports.CertificationCampaignFiltersApiFp = exports.CertificationCampaignFiltersApiAxiosParamCreator = exports.BrandingApi = exports.BrandingApiFactory = exports.BrandingApiFp = exports.BrandingApiAxiosParamCreator = exports.AuthUsersApi = exports.AuthUsersApiFactory = exports.AuthUsersApiFp = exports.AuthUsersApiAxiosParamCreator = exports.GetDiscoveredApplicationsDetailV3 = exports.ApplicationDiscoveryApi = exports.ApplicationDiscoveryApiFactory = exports.ApplicationDiscoveryApiFp = exports.ApplicationDiscoveryApiAxiosParamCreator = exports.ListAccountsDetailLevelV3 = exports.AccountsApi = exports.AccountsApiFactory = exports.AccountsApiFp = exports.AccountsApiAxiosParamCreator = exports.AccountUsagesApi = exports.AccountUsagesApiFactory = exports.AccountUsagesApiFp = exports.AccountUsagesApiAxiosParamCreator = exports.AccountActivitiesApi = exports.AccountActivitiesApiFactory = exports.AccountActivitiesApiFp = exports.AccountActivitiesApiAxiosParamCreator = exports.AccessRequestsApi = exports.AccessRequestsApiFactory = exports.AccessRequestsApiFp = exports.AccessRequestsApiAxiosParamCreator = exports.AccessRequestApprovalsApi = exports.AccessRequestApprovalsApiFactory = exports.AccessRequestApprovalsApiFp = exports.AccessRequestApprovalsApiAxiosParamCreator = exports.AccessProfilesApi = exports.AccessProfilesApiFactory = exports.AccessProfilesApiFp = exports.AccessProfilesApiAxiosParamCreator = exports.WorkflowTriggerAttributesFrequencyV3 = exports.WorkflowTriggerTypeV3 = exports.WorkflowModifiedByTypeV3 = exports.WorkflowLibraryTriggerTypeV3 = void 0;
87
+ exports.ManagedClientsApi = exports.ManagedClientsApiFactory = exports.ManagedClientsApiFp = exports.ManagedClientsApiAxiosParamCreator = exports.PingVerificationStatusMethodV3 = exports.MFAControllerApi = exports.MFAControllerApiFactory = exports.MFAControllerApiFp = exports.MFAControllerApiAxiosParamCreator = exports.TestMFAConfigMethodV3 = exports.DeleteMFAConfigMethodV3 = exports.MFAConfigurationApi = exports.MFAConfigurationApiFactory = exports.MFAConfigurationApiFp = exports.MFAConfigurationApiAxiosParamCreator = exports.LifecycleStatesApi = exports.LifecycleStatesApiFactory = exports.LifecycleStatesApiFp = exports.LifecycleStatesApiAxiosParamCreator = exports.IdentityProfilesApi = exports.IdentityProfilesApiFactory = exports.IdentityProfilesApiFp = exports.IdentityProfilesApiAxiosParamCreator = exports.GlobalTenantSecuritySettingsApi = exports.GlobalTenantSecuritySettingsApiFactory = exports.GlobalTenantSecuritySettingsApiFp = exports.GlobalTenantSecuritySettingsApiAxiosParamCreator = exports.PutConnectorTranslationsLocaleV3 = exports.GetConnectorTranslationsLocaleV3 = exports.GetConnectorListLocaleV3 = exports.GetConnectorLocaleV3 = exports.ConnectorsApi = exports.ConnectorsApiFactory = exports.ConnectorsApiFp = exports.ConnectorsApiAxiosParamCreator = exports.ConfigurationHubApi = exports.ConfigurationHubApiFactory = exports.ConfigurationHubApiFp = exports.ConfigurationHubApiAxiosParamCreator = exports.CertificationsApi = exports.CertificationsApiFactory = exports.CertificationsApiFp = exports.CertificationsApiAxiosParamCreator = exports.GetIdentityAccessSummariesTypeV3 = exports.CertificationSummariesApi = exports.CertificationSummariesApiFactory = exports.CertificationSummariesApiFp = exports.CertificationSummariesApiAxiosParamCreator = exports.GetCampaignDetailV3 = exports.GetActiveCampaignsDetailV3 = void 0;
88
+ exports.RequestableObjectsApiAxiosParamCreator = exports.GetReportFileFormatV3 = exports.ReportsDataExtractionApi = exports.ReportsDataExtractionApiFactory = exports.ReportsDataExtractionApiFp = exports.ReportsDataExtractionApiAxiosParamCreator = exports.PublicIdentitiesConfigApi = exports.PublicIdentitiesConfigApiFactory = exports.PublicIdentitiesConfigApiFp = exports.PublicIdentitiesConfigApiAxiosParamCreator = exports.PublicIdentitiesApi = exports.PublicIdentitiesApiFactory = exports.PublicIdentitiesApiFp = exports.PublicIdentitiesApiAxiosParamCreator = exports.PersonalAccessTokensApi = exports.PersonalAccessTokensApiFactory = exports.PersonalAccessTokensApiFp = exports.PersonalAccessTokensApiAxiosParamCreator = exports.PasswordSyncGroupsApi = exports.PasswordSyncGroupsApiFactory = exports.PasswordSyncGroupsApiFp = exports.PasswordSyncGroupsApiAxiosParamCreator = exports.PasswordPoliciesApi = exports.PasswordPoliciesApiFactory = exports.PasswordPoliciesApiFp = exports.PasswordPoliciesApiAxiosParamCreator = exports.PasswordManagementApi = exports.PasswordManagementApiFactory = exports.PasswordManagementApiFp = exports.PasswordManagementApiAxiosParamCreator = exports.PasswordDictionaryApi = exports.PasswordDictionaryApiFactory = exports.PasswordDictionaryApiFp = exports.PasswordDictionaryApiAxiosParamCreator = exports.PasswordConfigurationApi = exports.PasswordConfigurationApiFactory = exports.PasswordConfigurationApiFp = exports.PasswordConfigurationApiAxiosParamCreator = exports.OAuthClientsApi = exports.OAuthClientsApiFactory = exports.OAuthClientsApiFp = exports.OAuthClientsApiAxiosParamCreator = exports.NonEmployeeLifecycleManagementApi = exports.NonEmployeeLifecycleManagementApiFactory = exports.NonEmployeeLifecycleManagementApiFp = exports.NonEmployeeLifecycleManagementApiAxiosParamCreator = exports.ManagedClustersApi = exports.ManagedClustersApiFactory = exports.ManagedClustersApiFp = exports.ManagedClustersApiAxiosParamCreator = void 0;
89
+ exports.GetSourceSchemasIncludeTypesV3 = exports.SourcesApi = exports.SourcesApiFactory = exports.SourcesApiFp = exports.SourcesApiAxiosParamCreator = exports.SourceUsagesApi = exports.SourceUsagesApiFactory = exports.SourceUsagesApiFp = exports.SourceUsagesApiAxiosParamCreator = exports.ServiceDeskIntegrationApi = exports.ServiceDeskIntegrationApiFactory = exports.ServiceDeskIntegrationApiFp = exports.ServiceDeskIntegrationApiAxiosParamCreator = exports.SegmentsApi = exports.SegmentsApiFactory = exports.SegmentsApiFp = exports.SegmentsApiAxiosParamCreator = exports.SearchAttributeConfigurationApi = exports.SearchAttributeConfigurationApiFactory = exports.SearchAttributeConfigurationApiFp = exports.SearchAttributeConfigurationApiAxiosParamCreator = exports.SearchGetIndexV3 = exports.SearchApi = exports.SearchApiFactory = exports.SearchApiFp = exports.SearchApiAxiosParamCreator = exports.ScheduledSearchApi = exports.ScheduledSearchApiFactory = exports.ScheduledSearchApiFp = exports.ScheduledSearchApiAxiosParamCreator = exports.SavedSearchApi = exports.SavedSearchApiFactory = exports.SavedSearchApiFp = exports.SavedSearchApiAxiosParamCreator = exports.SODViolationsApi = exports.SODViolationsApiFactory = exports.SODViolationsApiFp = exports.SODViolationsApiAxiosParamCreator = exports.SODPoliciesApi = exports.SODPoliciesApiFactory = exports.SODPoliciesApiFp = exports.SODPoliciesApiAxiosParamCreator = exports.RolesApi = exports.RolesApiFactory = exports.RolesApiFp = exports.RolesApiAxiosParamCreator = exports.ListRequestableObjectsTypesV3 = exports.RequestableObjectsApi = exports.RequestableObjectsApiFactory = exports.RequestableObjectsApiFp = void 0;
90
+ exports.WorkflowsApi = exports.WorkflowsApiFactory = exports.WorkflowsApiFp = exports.WorkflowsApiAxiosParamCreator = exports.WorkItemsApi = exports.WorkItemsApiFactory = exports.WorkItemsApiFp = exports.WorkItemsApiAxiosParamCreator = exports.VendorConnectorMappingsApi = exports.VendorConnectorMappingsApiFactory = exports.VendorConnectorMappingsApiFp = exports.VendorConnectorMappingsApiAxiosParamCreator = exports.TransformsApi = exports.TransformsApiFactory = exports.TransformsApiFp = exports.TransformsApiAxiosParamCreator = exports.PutTaggedObjectTypeV3 = exports.ListTaggedObjectsByTypeTypeV3 = exports.GetTaggedObjectTypeV3 = exports.DeleteTaggedObjectTypeV3 = exports.TaggedObjectsApi = exports.TaggedObjectsApiFactory = exports.TaggedObjectsApiFp = exports.TaggedObjectsApiAxiosParamCreator = void 0;
91
91
  var axios_1 = __importDefault(require("axios"));
92
92
  // Some imports not used depending on template conditions
93
93
  // @ts-ignore
@@ -109,6 +109,9 @@ exports.AccessConstraintOperatorV3 = {
109
109
  exports.AccessCriteriaCriteriaListInnerTypeV3 = {
110
110
  Entitlement: 'ENTITLEMENT'
111
111
  };
112
+ exports.AccessCriteriaRequestCriteriaListInnerTypeV3 = {
113
+ Entitlement: 'ENTITLEMENT'
114
+ };
112
115
  exports.AccessItemRequestedForTypeV3 = {
113
116
  Identity: 'IDENTITY'
114
117
  };
@@ -1491,6 +1494,22 @@ exports.SodPolicyOwnerRefTypeV3 = {
1491
1494
  Identity: 'IDENTITY',
1492
1495
  GovernanceGroup: 'GOVERNANCE_GROUP'
1493
1496
  };
1497
+ exports.SodPolicyReadStateV3 = {
1498
+ Enforced: 'ENFORCED',
1499
+ NotEnforced: 'NOT_ENFORCED'
1500
+ };
1501
+ exports.SodPolicyReadTypeV3 = {
1502
+ General: 'GENERAL',
1503
+ ConflictingAccessBased: 'CONFLICTING_ACCESS_BASED'
1504
+ };
1505
+ exports.SodPolicyRequestStateV3 = {
1506
+ Enforced: 'ENFORCED',
1507
+ NotEnforced: 'NOT_ENFORCED'
1508
+ };
1509
+ exports.SodPolicyRequestTypeV3 = {
1510
+ General: 'GENERAL',
1511
+ ConflictingAccessBased: 'CONFLICTING_ACCESS_BASED'
1512
+ };
1494
1513
  exports.SodRecipientTypeV3 = {
1495
1514
  Identity: 'IDENTITY'
1496
1515
  };
@@ -3578,7 +3597,7 @@ var AccessRequestsApiAxiosParamCreator = function (configuration) {
3578
3597
  });
3579
3598
  },
3580
3599
  /**
3581
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
3600
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
3582
3601
  * @summary Submit access request
3583
3602
  * @param {AccessRequest} accessRequest
3584
3603
  * @param {*} [axiosOptions] Override http request option.
@@ -3690,7 +3709,7 @@ var AccessRequestsApiAxiosParamCreator = function (configuration) {
3690
3709
  * @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
3691
3710
  * @param {number} [limit] Max number of results to return.
3692
3711
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
3693
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *in* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
3712
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *eq, in, ge, gt, le, lt, ne, sw* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
3694
3713
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name**
3695
3714
  * @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
3696
3715
  * @param {*} [axiosOptions] Override http request option.
@@ -3857,7 +3876,7 @@ var AccessRequestsApiFp = function (configuration) {
3857
3876
  });
3858
3877
  },
3859
3878
  /**
3860
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
3879
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
3861
3880
  * @summary Submit access request
3862
3881
  * @param {AccessRequest} accessRequest
3863
3882
  * @param {*} [axiosOptions] Override http request option.
@@ -3911,7 +3930,7 @@ var AccessRequestsApiFp = function (configuration) {
3911
3930
  * @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
3912
3931
  * @param {number} [limit] Max number of results to return.
3913
3932
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
3914
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *in* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
3933
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *eq, in, ge, gt, le, lt, ne, sw* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
3915
3934
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name**
3916
3935
  * @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
3917
3936
  * @param {*} [axiosOptions] Override http request option.
@@ -3977,7 +3996,7 @@ var AccessRequestsApiFactory = function (configuration, basePath, axios) {
3977
3996
  return localVarFp.cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then(function (request) { return request(axios, basePath); });
3978
3997
  },
3979
3998
  /**
3980
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
3999
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
3981
4000
  * @summary Submit access request
3982
4001
  * @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
3983
4002
  * @param {*} [axiosOptions] Override http request option.
@@ -4043,7 +4062,7 @@ var AccessRequestsApi = /** @class */ (function (_super) {
4043
4062
  return (0, exports.AccessRequestsApiFp)(this.configuration).cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
4044
4063
  };
4045
4064
  /**
4046
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
4065
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
4047
4066
  * @summary Submit access request
4048
4067
  * @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
4049
4068
  * @param {*} [axiosOptions] Override http request option.
@@ -27875,19 +27894,19 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
27875
27894
  /**
27876
27895
  * This creates both General and Conflicting Access Based policy, with a limit of 50 entitlements for each (left & right) criteria for Conflicting Access Based SOD policy. Requires role of ORG_ADMIN.
27877
27896
  * @summary Create sod policy
27878
- * @param {SodPolicy} sodPolicy
27897
+ * @param {SodPolicyRequest} sodPolicyRequest
27879
27898
  * @param {*} [axiosOptions] Override http request option.
27880
27899
  * @throws {RequiredError}
27881
27900
  */
27882
- createSodPolicy: function (sodPolicy, axiosOptions) {
27901
+ createSodPolicy: function (sodPolicyRequest, axiosOptions) {
27883
27902
  if (axiosOptions === void 0) { axiosOptions = {}; }
27884
27903
  return __awaiter(_this, void 0, void 0, function () {
27885
27904
  var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
27886
27905
  return __generator(this, function (_a) {
27887
27906
  switch (_a.label) {
27888
27907
  case 0:
27889
- // verify required parameter 'sodPolicy' is not null or undefined
27890
- (0, common_1.assertParamExists)('createSodPolicy', 'sodPolicy', sodPolicy);
27908
+ // verify required parameter 'sodPolicyRequest' is not null or undefined
27909
+ (0, common_1.assertParamExists)('createSodPolicy', 'sodPolicyRequest', sodPolicyRequest);
27891
27910
  localVarPath = "/sod-policies";
27892
27911
  localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
27893
27912
  if (configuration) {
@@ -27917,7 +27936,7 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
27917
27936
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
27918
27937
  headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
27919
27938
  localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
27920
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(sodPolicy, localVarRequestOptions, configuration);
27939
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(sodPolicyRequest, localVarRequestOptions, configuration);
27921
27940
  return [2 /*return*/, {
27922
27941
  url: (0, common_1.toPathString)(localVarUrlObj),
27923
27942
  axiosOptions: localVarRequestOptions,
@@ -28596,11 +28615,11 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
28596
28615
  * This updates a specified SOD policy. Requires role of ORG_ADMIN.
28597
28616
  * @summary Update sod policy by id
28598
28617
  * @param {string} id The ID of the SOD policy to update.
28599
- * @param {SodPolicy} sodPolicy
28618
+ * @param {SodPolicyRead} sodPolicyRead
28600
28619
  * @param {*} [axiosOptions] Override http request option.
28601
28620
  * @throws {RequiredError}
28602
28621
  */
28603
- putSodPolicy: function (id, sodPolicy, axiosOptions) {
28622
+ putSodPolicy: function (id, sodPolicyRead, axiosOptions) {
28604
28623
  if (axiosOptions === void 0) { axiosOptions = {}; }
28605
28624
  return __awaiter(_this, void 0, void 0, function () {
28606
28625
  var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
@@ -28609,8 +28628,8 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
28609
28628
  case 0:
28610
28629
  // verify required parameter 'id' is not null or undefined
28611
28630
  (0, common_1.assertParamExists)('putSodPolicy', 'id', id);
28612
- // verify required parameter 'sodPolicy' is not null or undefined
28613
- (0, common_1.assertParamExists)('putSodPolicy', 'sodPolicy', sodPolicy);
28631
+ // verify required parameter 'sodPolicyRead' is not null or undefined
28632
+ (0, common_1.assertParamExists)('putSodPolicy', 'sodPolicyRead', sodPolicyRead);
28614
28633
  localVarPath = "/sod-policies/{id}"
28615
28634
  .replace("{".concat("id", "}"), encodeURIComponent(String(id)));
28616
28635
  localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
@@ -28641,7 +28660,7 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
28641
28660
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
28642
28661
  headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
28643
28662
  localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
28644
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(sodPolicy, localVarRequestOptions, configuration);
28663
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(sodPolicyRead, localVarRequestOptions, configuration);
28645
28664
  return [2 /*return*/, {
28646
28665
  url: (0, common_1.toPathString)(localVarUrlObj),
28647
28666
  axiosOptions: localVarRequestOptions,
@@ -28821,17 +28840,17 @@ var SODPoliciesApiFp = function (configuration) {
28821
28840
  /**
28822
28841
  * This creates both General and Conflicting Access Based policy, with a limit of 50 entitlements for each (left & right) criteria for Conflicting Access Based SOD policy. Requires role of ORG_ADMIN.
28823
28842
  * @summary Create sod policy
28824
- * @param {SodPolicy} sodPolicy
28843
+ * @param {SodPolicyRequest} sodPolicyRequest
28825
28844
  * @param {*} [axiosOptions] Override http request option.
28826
28845
  * @throws {RequiredError}
28827
28846
  */
28828
- createSodPolicy: function (sodPolicy, axiosOptions) {
28847
+ createSodPolicy: function (sodPolicyRequest, axiosOptions) {
28829
28848
  var _a, _b, _c;
28830
28849
  return __awaiter(this, void 0, void 0, function () {
28831
28850
  var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
28832
28851
  return __generator(this, function (_d) {
28833
28852
  switch (_d.label) {
28834
- case 0: return [4 /*yield*/, localVarAxiosParamCreator.createSodPolicy(sodPolicy, axiosOptions)];
28853
+ case 0: return [4 /*yield*/, localVarAxiosParamCreator.createSodPolicy(sodPolicyRequest, axiosOptions)];
28835
28854
  case 1:
28836
28855
  localVarAxiosArgs = _d.sent();
28837
28856
  localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
@@ -29128,17 +29147,17 @@ var SODPoliciesApiFp = function (configuration) {
29128
29147
  * This updates a specified SOD policy. Requires role of ORG_ADMIN.
29129
29148
  * @summary Update sod policy by id
29130
29149
  * @param {string} id The ID of the SOD policy to update.
29131
- * @param {SodPolicy} sodPolicy
29150
+ * @param {SodPolicyRead} sodPolicyRead
29132
29151
  * @param {*} [axiosOptions] Override http request option.
29133
29152
  * @throws {RequiredError}
29134
29153
  */
29135
- putSodPolicy: function (id, sodPolicy, axiosOptions) {
29154
+ putSodPolicy: function (id, sodPolicyRead, axiosOptions) {
29136
29155
  var _a, _b, _c;
29137
29156
  return __awaiter(this, void 0, void 0, function () {
29138
29157
  var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
29139
29158
  return __generator(this, function (_d) {
29140
29159
  switch (_d.label) {
29141
- case 0: return [4 /*yield*/, localVarAxiosParamCreator.putSodPolicy(id, sodPolicy, axiosOptions)];
29160
+ case 0: return [4 /*yield*/, localVarAxiosParamCreator.putSodPolicy(id, sodPolicyRead, axiosOptions)];
29142
29161
  case 1:
29143
29162
  localVarAxiosArgs = _d.sent();
29144
29163
  localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
@@ -29235,7 +29254,7 @@ var SODPoliciesApiFactory = function (configuration, basePath, axios) {
29235
29254
  * @throws {RequiredError}
29236
29255
  */
29237
29256
  createSodPolicy: function (requestParameters, axiosOptions) {
29238
- return localVarFp.createSodPolicy(requestParameters.sodPolicy, axiosOptions).then(function (request) { return request(axios, basePath); });
29257
+ return localVarFp.createSodPolicy(requestParameters.sodPolicyRequest, axiosOptions).then(function (request) { return request(axios, basePath); });
29239
29258
  },
29240
29259
  /**
29241
29260
  * This deletes a specified SOD policy. Requires role of ORG_ADMIN.
@@ -29365,7 +29384,7 @@ var SODPoliciesApiFactory = function (configuration, basePath, axios) {
29365
29384
  * @throws {RequiredError}
29366
29385
  */
29367
29386
  putSodPolicy: function (requestParameters, axiosOptions) {
29368
- return localVarFp.putSodPolicy(requestParameters.id, requestParameters.sodPolicy, axiosOptions).then(function (request) { return request(axios, basePath); });
29387
+ return localVarFp.putSodPolicy(requestParameters.id, requestParameters.sodPolicyRead, axiosOptions).then(function (request) { return request(axios, basePath); });
29369
29388
  },
29370
29389
  /**
29371
29390
  * Runs the scheduled report for the policy retrieved by passed policy ID. The report schedule is fetched from the policy retrieved by ID.
@@ -29422,7 +29441,7 @@ var SODPoliciesApi = /** @class */ (function (_super) {
29422
29441
  */
29423
29442
  SODPoliciesApi.prototype.createSodPolicy = function (requestParameters, axiosOptions) {
29424
29443
  var _this = this;
29425
- return (0, exports.SODPoliciesApiFp)(this.configuration).createSodPolicy(requestParameters.sodPolicy, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
29444
+ return (0, exports.SODPoliciesApiFp)(this.configuration).createSodPolicy(requestParameters.sodPolicyRequest, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
29426
29445
  };
29427
29446
  /**
29428
29447
  * This deletes a specified SOD policy. Requires role of ORG_ADMIN.
@@ -29578,7 +29597,7 @@ var SODPoliciesApi = /** @class */ (function (_super) {
29578
29597
  */
29579
29598
  SODPoliciesApi.prototype.putSodPolicy = function (requestParameters, axiosOptions) {
29580
29599
  var _this = this;
29581
- return (0, exports.SODPoliciesApiFp)(this.configuration).putSodPolicy(requestParameters.id, requestParameters.sodPolicy, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
29600
+ return (0, exports.SODPoliciesApiFp)(this.configuration).putSodPolicy(requestParameters.id, requestParameters.sodPolicyRead, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
29582
29601
  };
29583
29602
  /**
29584
29603
  * Runs the scheduled report for the policy retrieved by passed policy ID. The report schedule is fetched from the policy retrieved by ID.