sailpoint-api-client 1.6.4 → 1.6.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/beta/README.md +2 -2
- package/beta/api.ts +7 -7
- package/beta/common.ts +2 -2
- package/beta/package.json +1 -1
- package/dist/beta/api.d.ts +7 -7
- package/dist/beta/api.js +6 -6
- package/dist/beta/common.js +1 -1
- package/dist/v2024/api.d.ts +7 -7
- package/dist/v2024/api.js +6 -6
- package/dist/v2024/common.js +1 -1
- package/dist/v2025/api.d.ts +7 -7
- package/dist/v2025/api.js +6 -6
- package/dist/v2025/common.js +1 -1
- package/dist/v3/api.d.ts +382 -58
- package/dist/v3/api.js +55 -36
- package/dist/v3/api.js.map +1 -1
- package/dist/v3/common.js +1 -1
- package/package.json +1 -1
- package/v2024/README.md +2 -2
- package/v2024/api.ts +7 -7
- package/v2024/common.ts +2 -2
- package/v2024/package.json +1 -1
- package/v2025/README.md +2 -2
- package/v2025/api.ts +7 -7
- package/v2025/common.ts +2 -2
- package/v2025/package.json +1 -1
- package/v3/README.md +2 -2
- package/v3/api.ts +400 -65
- package/v3/common.ts +2 -2
- package/v3/package.json +1 -1
package/dist/v3/api.js
CHANGED
|
@@ -78,16 +78,16 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
78
78
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
79
79
|
};
|
|
80
80
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
81
|
-
exports.
|
|
82
|
-
exports.
|
|
83
|
-
exports.
|
|
84
|
-
exports.
|
|
85
|
-
exports.
|
|
86
|
-
exports.
|
|
87
|
-
exports.
|
|
88
|
-
exports.
|
|
89
|
-
exports.
|
|
90
|
-
exports.WorkflowsApi = exports.WorkflowsApiFactory = exports.WorkflowsApiFp = exports.WorkflowsApiAxiosParamCreator = exports.WorkItemsApi = exports.WorkItemsApiFactory = exports.WorkItemsApiFp = exports.WorkItemsApiAxiosParamCreator = exports.VendorConnectorMappingsApi = exports.VendorConnectorMappingsApiFactory = exports.VendorConnectorMappingsApiFp = exports.VendorConnectorMappingsApiAxiosParamCreator = exports.TransformsApi = exports.TransformsApiFactory = exports.TransformsApiFp = exports.TransformsApiAxiosParamCreator = exports.PutTaggedObjectTypeV3 = exports.ListTaggedObjectsByTypeTypeV3 = exports.GetTaggedObjectTypeV3 = void 0;
|
|
81
|
+
exports.CampaignMandatoryCommentRequirementV3 = exports.CampaignCorrelatedStatusV3 = exports.CampaignStatusV3 = exports.CampaignTypeV3 = exports.BulkAddTaggedObjectOperationV3 = exports.BucketType = exports.BeforeProvisioningRuleDtoTypeV3 = exports.BaseAccessOwnerTypeV3 = exports.BackupResponseCloudStorageStatusV3 = exports.BackupResponseHydrationStatusV3 = exports.BackupResponseBackupTypeV3 = exports.BackupResponseTypeV3 = exports.BackupResponseStatusV3 = exports.BackupOptionsIncludeTypesV3 = exports.AuthUserCapabilitiesV3 = exports.AttributeDefinitionType = exports.AttributeDefinitionSchemaTypeV3 = exports.ApprovalStatusDtoOriginalOwnerTypeV3 = exports.ApprovalStatusDtoCurrentOwnerTypeV3 = exports.ApprovalStatus = exports.ApprovalSchemeForRoleApproverTypeV3 = exports.ApprovalScheme = exports.AggregationType = exports.AdminReviewReassignReassignToTypeV3 = exports.ActivityInsightsUsageDaysStateV3 = exports.AccountAllOfSourceOwnerTypeV3 = exports.AccountAllOfRecommendationMethodV3 = exports.AccountAllOfRecommendationTypeV3 = exports.AccountAllOfIdentityTypeV3 = exports.AccountActivityItemOperation = exports.AccountActivityApprovalStatus = exports.AccountActionActionV3 = exports.AccountOriginV3 = exports.AccessType = exports.AccessRequestType = exports.AccessRequestPhasesResultV3 = exports.AccessRequestPhasesStateV3 = exports.AccessRequestItemTypeV3 = exports.AccessProfileUsageUsedByInnerTypeV3 = exports.AccessProfileSourceRefTypeV3 = exports.AccessProfileRefTypeV3 = exports.AccessProfileApprovalSchemeApproverTypeV3 = exports.AccessItemReviewedByTypeV3 = exports.AccessItemRequesterTypeV3 = exports.AccessItemRequestedForTypeV3 = exports.AccessCriteriaRequestCriteriaListInnerTypeV3 = exports.AccessCriteriaCriteriaListInnerTypeV3 = exports.AccessConstraintOperatorV3 = exports.AccessConstraintTypeV3 = exports.AccessAppsOwnerTypeV3 = void 0;
|
|
82
|
+
exports.GetCampaign200ResponseCorrelatedStatusV3 = exports.GetCampaign200ResponseStatusV3 = exports.GetCampaign200ResponseTypeV3 = exports.GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = exports.GetActiveCampaigns200ResponseInnerCorrelatedStatusV3 = exports.GetActiveCampaigns200ResponseInnerStatusV3 = exports.GetActiveCampaigns200ResponseInnerTypeV3 = exports.FilterType = exports.FederationProtocolDetailsRoleV3 = exports.ExpressionChildrenInnerOperatorV3 = exports.ExpressionOperatorV3 = exports.ExecutionStatus = exports.ExceptionCriteriaCriteriaListInnerTypeV3 = exports.EntitlementRef1TypeV3 = exports.EntitlementRefTypeV3 = exports.EntitlementOwnerTypeV3 = exports.DtoType = exports.DocumentType = exports.DimensionRefTypeV3 = exports.DependantConnectionsMissingDtoDependencyTypeV3 = exports.DeleteSource202ResponseTypeV3 = exports.DateCompareOperatorV3 = exports.CriteriaType = exports.ConnectorDetailStatusV3 = exports.CompletionStatus = exports.CompletedApprovalState = exports.CommentDtoAuthorTypeV3 = exports.ClientType = exports.CertificationTaskStatusV3 = exports.CertificationTaskTargetTypeV3 = exports.CertificationTaskTypeV3 = exports.CertificationReferenceTypeV3 = exports.CertificationPhase = exports.CertificationDecision = exports.CampaignTemplateOwnerRefTypeV3 = exports.CampaignReportStatusV3 = exports.CampaignReportTypeV3 = exports.CampaignReferenceMandatoryCommentRequirementV3 = exports.CampaignReferenceCorrelatedStatusV3 = exports.CampaignReferenceCampaignTypeV3 = exports.CampaignReferenceTypeV3 = exports.CampaignFilterDetailsModeV3 = exports.CampaignCompleteOptionsAutoCompleteActionV3 = exports.CampaignAllOfSourcesWithOrphanEntitlementsTypeV3 = exports.CampaignAllOfSearchCampaignInfoReviewerTypeV3 = exports.CampaignAllOfSearchCampaignInfoTypeV3 = exports.CampaignAllOfRoleCompositionCampaignInfoRemediatorRefTypeV3 = exports.CampaignAllOfMachineAccountCampaignInfoReviewerTypeV3 = exports.CampaignAllOfFilterTypeV3 = exports.CampaignAlertLevelV3 = void 0;
|
|
83
|
+
exports.ReassignmentReferenceTypeV3 = exports.ReassignReferenceTypeV3 = exports.QueryType = exports.PublicIdentityIdentityStateV3 = exports.ProvisioningState = exports.ProvisioningCriteriaOperation = exports.PreApprovalTriggerDetailsDecisionV3 = exports.PendingApprovalOwnerTypeV3 = exports.PendingApprovalAction = exports.PatOwnerTypeV3 = exports.PasswordStatusStateV3 = exports.PasswordChangeResponseStateV3 = exports.OwnerReferenceSegmentsTypeV3 = exports.OwnerReferenceTypeV3 = exports.OwnerDtoTypeV3 = exports.OrphanIdentitiesReportArgumentsSelectedFormatsV3 = exports.Operation = exports.ObjectMappingResponseObjectTypeV3 = exports.ObjectMappingRequestObjectTypeV3 = exports.NonEmployeeSchemaAttributeType = exports.NonEmployeeIdentityDtoType = exports.NonEmployeeBulkUploadStatusStatusV3 = exports.NonEmployeeBulkUploadJobStatusV3 = exports.NamedConstructs = exports.MfaConfigTestResponseStateV3 = exports.MetricType = exports.ManualWorkItemState = exports.ManualWorkItemDetailsOriginalOwnerTypeV3 = exports.ManualWorkItemDetailsCurrentOwnerTypeV3 = exports.ManagedClusterTypes = exports.ManagedClusterStatusV3 = exports.ManagedClientType = exports.ManagedClientStatusCode = exports.ManagedClientProvisionStatusV3 = exports.ManagedClientClusterTypeV3 = exports.ManagedClientStatusV3 = exports.LocaleOrigin = exports.LifecyclestateDeletedTypeV3 = exports.KbaAuthResponseStatusV3 = exports.JsonPatchOperationOpV3 = exports.Index = exports.ImportObjectTypeV3 = exports.IdpDetailsRoleV3 = exports.IdentityWithNewAccessAccessRefsInnerTypeV3 = exports.IdentityProfileExportedObjectSelfTypeV3 = exports.IdentityProfileAllOfOwnerTypeV3 = exports.IdentityProfileAllOfAuthoritativeSourceTypeV3 = exports.IdentityPreviewResponseIdentityTypeV3 = exports.GrantType = exports.GetCampaign200ResponseMandatoryCommentRequirementV3 = void 0;
|
|
84
|
+
exports.SodPolicyReadStateV3 = exports.SodPolicyOwnerRefTypeV3 = exports.SodPolicyDtoTypeV3 = exports.SodPolicyTypeV3 = exports.SodPolicyStateV3 = exports.SlimCampaignCorrelatedStatusV3 = exports.SlimCampaignStatusV3 = exports.SlimCampaignTypeV3 = exports.ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = exports.ServiceDeskSourceTypeV3 = exports.SendTokenResponseStatusV3 = exports.SendTokenRequestDeliveryTypeV3 = exports.SelectorType = exports.SearchScheduleRecipientsInnerTypeV3 = exports.SearchFilterType = exports.SchemaFeaturesV3 = exports.ScheduledSearchAllOfOwnerTypeV3 = exports.ScheduledAttributesFrequencyV3 = exports.ScheduleType = exports.ScheduleMonthsTypeV3 = exports.ScheduleHoursTypeV3 = exports.ScheduleDaysTypeV3 = exports.ScheduleTypeV3 = exports.RoleMembershipSelectorType = exports.RoleCriteriaOperation = exports.RoleCriteriaKeyType = exports.RoleAssignmentSourceType = exports.ReviewerTypeV3 = exports.ReviewableEntitlementAccountOwnerTypeV3 = exports.RequestedItemStatusSodViolationContextStateV3 = exports.RequestedItemStatusRequestedForTypeV3 = exports.RequestedItemStatusRequestState = exports.RequestedItemStatusPreApprovalTriggerDetailsDecisionV3 = exports.RequestedItemStatusTypeV3 = exports.RequestedItemDtoRefTypeV3 = exports.RequestedItemDetailsTypeV3 = exports.RequestableObjectType = exports.RequestableObjectRequestStatus = exports.RequestableObjectReferenceTypeV3 = exports.ReportType = exports.ReportResultsAvailableFormatsV3 = exports.ReportResultsStatusV3 = exports.ReportResultsReportTypeV3 = exports.ReportResultReferenceStatusV3 = exports.ReportResultReferenceTypeV3 = exports.ReportDetailsArgumentsSelectedFormatsV3 = exports.ReportDetailsReportTypeV3 = exports.RecommendationMethodV3 = exports.RecommendationTypeV3 = exports.ReassignmentType = void 0;
|
|
85
|
+
exports.WorkflowLibraryFormFieldsTypeV3 = exports.WorkflowExecutionEventTypeV3 = exports.WorkflowExecutionStatusV3 = exports.WorkflowBodyOwnerTypeV3 = exports.WorkflowAllOfCreatorTypeV3 = exports.WorkItemTypeManualWorkItems = exports.WorkItemStateManualWorkItems = exports.WorkItemState = exports.ViolationOwnerAssignmentConfigOwnerRefTypeV3 = exports.ViolationOwnerAssignmentConfigAssignmentRuleV3 = exports.ViolationContextPolicyTypeV3 = exports.VerificationResponseStatusV3 = exports.V3CreateConnectorDtoStatusV3 = exports.V3ConnectorDtoStatusV3 = exports.UsageType = exports.UpdateDetailStatusV3 = exports.UncorrelatedAccountsReportArgumentsSelectedFormatsV3 = exports.TransformReadTypeV3 = exports.TransformTypeV3 = exports.TokenAuthResponseStatusV3 = exports.TokenAuthRequestDeliveryTypeV3 = exports.TaskResultSimplifiedCompletionStatusV3 = exports.TaskResultDtoTypeV3 = exports.TaskResultDetailsMessagesInnerTypeV3 = exports.TaskResultDetailsCompletionStatusV3 = exports.TaskResultDetailsReportTypeV3 = exports.TaskResultDetailsTypeV3 = exports.TaggedObjectDtoTypeV3 = exports.StandardLevel = exports.SpDetailsRoleV3 = exports.SourceUsageStatusStatusV3 = exports.SourceSchemasInnerTypeV3 = exports.SourcePasswordPoliciesInnerTypeV3 = exports.SourceOwnerTypeV3 = exports.SourceManagerCorrelationRuleTypeV3 = exports.SourceManagementWorkgroupTypeV3 = exports.SourceHealthDtoStatusV3 = exports.SourceClusterDtoTypeV3 = exports.SourceClusterTypeV3 = exports.SourceBeforeProvisioningRuleTypeV3 = exports.SourceAccountCorrelationRuleTypeV3 = exports.SourceAccountCorrelationConfigTypeV3 = exports.SourceStatusV3 = exports.SourceFeaturesV3 = exports.SodViolationContextCheckCompletedStateV3 = exports.SodReportResultDtoTypeV3 = exports.SodRecipientTypeV3 = exports.SodPolicyRequestTypeV3 = exports.SodPolicyRequestStateV3 = exports.SodPolicyReadTypeV3 = void 0;
|
|
86
|
+
exports.CertificationCampaignsApi = exports.CertificationCampaignsApiFactory = exports.CertificationCampaignsApiFp = exports.CertificationCampaignsApiAxiosParamCreator = exports.CertificationCampaignFiltersApi = exports.CertificationCampaignFiltersApiFactory = exports.CertificationCampaignFiltersApiFp = exports.CertificationCampaignFiltersApiAxiosParamCreator = exports.BrandingApi = exports.BrandingApiFactory = exports.BrandingApiFp = exports.BrandingApiAxiosParamCreator = exports.AuthUsersApi = exports.AuthUsersApiFactory = exports.AuthUsersApiFp = exports.AuthUsersApiAxiosParamCreator = exports.GetDiscoveredApplicationsDetailV3 = exports.ApplicationDiscoveryApi = exports.ApplicationDiscoveryApiFactory = exports.ApplicationDiscoveryApiFp = exports.ApplicationDiscoveryApiAxiosParamCreator = exports.ListAccountsDetailLevelV3 = exports.AccountsApi = exports.AccountsApiFactory = exports.AccountsApiFp = exports.AccountsApiAxiosParamCreator = exports.AccountUsagesApi = exports.AccountUsagesApiFactory = exports.AccountUsagesApiFp = exports.AccountUsagesApiAxiosParamCreator = exports.AccountActivitiesApi = exports.AccountActivitiesApiFactory = exports.AccountActivitiesApiFp = exports.AccountActivitiesApiAxiosParamCreator = exports.AccessRequestsApi = exports.AccessRequestsApiFactory = exports.AccessRequestsApiFp = exports.AccessRequestsApiAxiosParamCreator = exports.AccessRequestApprovalsApi = exports.AccessRequestApprovalsApiFactory = exports.AccessRequestApprovalsApiFp = exports.AccessRequestApprovalsApiAxiosParamCreator = exports.AccessProfilesApi = exports.AccessProfilesApiFactory = exports.AccessProfilesApiFp = exports.AccessProfilesApiAxiosParamCreator = exports.WorkflowTriggerAttributesFrequencyV3 = exports.WorkflowTriggerTypeV3 = exports.WorkflowModifiedByTypeV3 = exports.WorkflowLibraryTriggerTypeV3 = void 0;
|
|
87
|
+
exports.ManagedClientsApi = exports.ManagedClientsApiFactory = exports.ManagedClientsApiFp = exports.ManagedClientsApiAxiosParamCreator = exports.PingVerificationStatusMethodV3 = exports.MFAControllerApi = exports.MFAControllerApiFactory = exports.MFAControllerApiFp = exports.MFAControllerApiAxiosParamCreator = exports.TestMFAConfigMethodV3 = exports.DeleteMFAConfigMethodV3 = exports.MFAConfigurationApi = exports.MFAConfigurationApiFactory = exports.MFAConfigurationApiFp = exports.MFAConfigurationApiAxiosParamCreator = exports.LifecycleStatesApi = exports.LifecycleStatesApiFactory = exports.LifecycleStatesApiFp = exports.LifecycleStatesApiAxiosParamCreator = exports.IdentityProfilesApi = exports.IdentityProfilesApiFactory = exports.IdentityProfilesApiFp = exports.IdentityProfilesApiAxiosParamCreator = exports.GlobalTenantSecuritySettingsApi = exports.GlobalTenantSecuritySettingsApiFactory = exports.GlobalTenantSecuritySettingsApiFp = exports.GlobalTenantSecuritySettingsApiAxiosParamCreator = exports.PutConnectorTranslationsLocaleV3 = exports.GetConnectorTranslationsLocaleV3 = exports.GetConnectorListLocaleV3 = exports.GetConnectorLocaleV3 = exports.ConnectorsApi = exports.ConnectorsApiFactory = exports.ConnectorsApiFp = exports.ConnectorsApiAxiosParamCreator = exports.ConfigurationHubApi = exports.ConfigurationHubApiFactory = exports.ConfigurationHubApiFp = exports.ConfigurationHubApiAxiosParamCreator = exports.CertificationsApi = exports.CertificationsApiFactory = exports.CertificationsApiFp = exports.CertificationsApiAxiosParamCreator = exports.GetIdentityAccessSummariesTypeV3 = exports.CertificationSummariesApi = exports.CertificationSummariesApiFactory = exports.CertificationSummariesApiFp = exports.CertificationSummariesApiAxiosParamCreator = exports.GetCampaignDetailV3 = exports.GetActiveCampaignsDetailV3 = void 0;
|
|
88
|
+
exports.RequestableObjectsApiAxiosParamCreator = exports.GetReportFileFormatV3 = exports.ReportsDataExtractionApi = exports.ReportsDataExtractionApiFactory = exports.ReportsDataExtractionApiFp = exports.ReportsDataExtractionApiAxiosParamCreator = exports.PublicIdentitiesConfigApi = exports.PublicIdentitiesConfigApiFactory = exports.PublicIdentitiesConfigApiFp = exports.PublicIdentitiesConfigApiAxiosParamCreator = exports.PublicIdentitiesApi = exports.PublicIdentitiesApiFactory = exports.PublicIdentitiesApiFp = exports.PublicIdentitiesApiAxiosParamCreator = exports.PersonalAccessTokensApi = exports.PersonalAccessTokensApiFactory = exports.PersonalAccessTokensApiFp = exports.PersonalAccessTokensApiAxiosParamCreator = exports.PasswordSyncGroupsApi = exports.PasswordSyncGroupsApiFactory = exports.PasswordSyncGroupsApiFp = exports.PasswordSyncGroupsApiAxiosParamCreator = exports.PasswordPoliciesApi = exports.PasswordPoliciesApiFactory = exports.PasswordPoliciesApiFp = exports.PasswordPoliciesApiAxiosParamCreator = exports.PasswordManagementApi = exports.PasswordManagementApiFactory = exports.PasswordManagementApiFp = exports.PasswordManagementApiAxiosParamCreator = exports.PasswordDictionaryApi = exports.PasswordDictionaryApiFactory = exports.PasswordDictionaryApiFp = exports.PasswordDictionaryApiAxiosParamCreator = exports.PasswordConfigurationApi = exports.PasswordConfigurationApiFactory = exports.PasswordConfigurationApiFp = exports.PasswordConfigurationApiAxiosParamCreator = exports.OAuthClientsApi = exports.OAuthClientsApiFactory = exports.OAuthClientsApiFp = exports.OAuthClientsApiAxiosParamCreator = exports.NonEmployeeLifecycleManagementApi = exports.NonEmployeeLifecycleManagementApiFactory = exports.NonEmployeeLifecycleManagementApiFp = exports.NonEmployeeLifecycleManagementApiAxiosParamCreator = exports.ManagedClustersApi = exports.ManagedClustersApiFactory = exports.ManagedClustersApiFp = exports.ManagedClustersApiAxiosParamCreator = void 0;
|
|
89
|
+
exports.GetSourceSchemasIncludeTypesV3 = exports.SourcesApi = exports.SourcesApiFactory = exports.SourcesApiFp = exports.SourcesApiAxiosParamCreator = exports.SourceUsagesApi = exports.SourceUsagesApiFactory = exports.SourceUsagesApiFp = exports.SourceUsagesApiAxiosParamCreator = exports.ServiceDeskIntegrationApi = exports.ServiceDeskIntegrationApiFactory = exports.ServiceDeskIntegrationApiFp = exports.ServiceDeskIntegrationApiAxiosParamCreator = exports.SegmentsApi = exports.SegmentsApiFactory = exports.SegmentsApiFp = exports.SegmentsApiAxiosParamCreator = exports.SearchAttributeConfigurationApi = exports.SearchAttributeConfigurationApiFactory = exports.SearchAttributeConfigurationApiFp = exports.SearchAttributeConfigurationApiAxiosParamCreator = exports.SearchGetIndexV3 = exports.SearchApi = exports.SearchApiFactory = exports.SearchApiFp = exports.SearchApiAxiosParamCreator = exports.ScheduledSearchApi = exports.ScheduledSearchApiFactory = exports.ScheduledSearchApiFp = exports.ScheduledSearchApiAxiosParamCreator = exports.SavedSearchApi = exports.SavedSearchApiFactory = exports.SavedSearchApiFp = exports.SavedSearchApiAxiosParamCreator = exports.SODViolationsApi = exports.SODViolationsApiFactory = exports.SODViolationsApiFp = exports.SODViolationsApiAxiosParamCreator = exports.SODPoliciesApi = exports.SODPoliciesApiFactory = exports.SODPoliciesApiFp = exports.SODPoliciesApiAxiosParamCreator = exports.RolesApi = exports.RolesApiFactory = exports.RolesApiFp = exports.RolesApiAxiosParamCreator = exports.ListRequestableObjectsTypesV3 = exports.RequestableObjectsApi = exports.RequestableObjectsApiFactory = exports.RequestableObjectsApiFp = void 0;
|
|
90
|
+
exports.WorkflowsApi = exports.WorkflowsApiFactory = exports.WorkflowsApiFp = exports.WorkflowsApiAxiosParamCreator = exports.WorkItemsApi = exports.WorkItemsApiFactory = exports.WorkItemsApiFp = exports.WorkItemsApiAxiosParamCreator = exports.VendorConnectorMappingsApi = exports.VendorConnectorMappingsApiFactory = exports.VendorConnectorMappingsApiFp = exports.VendorConnectorMappingsApiAxiosParamCreator = exports.TransformsApi = exports.TransformsApiFactory = exports.TransformsApiFp = exports.TransformsApiAxiosParamCreator = exports.PutTaggedObjectTypeV3 = exports.ListTaggedObjectsByTypeTypeV3 = exports.GetTaggedObjectTypeV3 = exports.DeleteTaggedObjectTypeV3 = exports.TaggedObjectsApi = exports.TaggedObjectsApiFactory = exports.TaggedObjectsApiFp = exports.TaggedObjectsApiAxiosParamCreator = void 0;
|
|
91
91
|
var axios_1 = __importDefault(require("axios"));
|
|
92
92
|
// Some imports not used depending on template conditions
|
|
93
93
|
// @ts-ignore
|
|
@@ -109,6 +109,9 @@ exports.AccessConstraintOperatorV3 = {
|
|
|
109
109
|
exports.AccessCriteriaCriteriaListInnerTypeV3 = {
|
|
110
110
|
Entitlement: 'ENTITLEMENT'
|
|
111
111
|
};
|
|
112
|
+
exports.AccessCriteriaRequestCriteriaListInnerTypeV3 = {
|
|
113
|
+
Entitlement: 'ENTITLEMENT'
|
|
114
|
+
};
|
|
112
115
|
exports.AccessItemRequestedForTypeV3 = {
|
|
113
116
|
Identity: 'IDENTITY'
|
|
114
117
|
};
|
|
@@ -1491,6 +1494,22 @@ exports.SodPolicyOwnerRefTypeV3 = {
|
|
|
1491
1494
|
Identity: 'IDENTITY',
|
|
1492
1495
|
GovernanceGroup: 'GOVERNANCE_GROUP'
|
|
1493
1496
|
};
|
|
1497
|
+
exports.SodPolicyReadStateV3 = {
|
|
1498
|
+
Enforced: 'ENFORCED',
|
|
1499
|
+
NotEnforced: 'NOT_ENFORCED'
|
|
1500
|
+
};
|
|
1501
|
+
exports.SodPolicyReadTypeV3 = {
|
|
1502
|
+
General: 'GENERAL',
|
|
1503
|
+
ConflictingAccessBased: 'CONFLICTING_ACCESS_BASED'
|
|
1504
|
+
};
|
|
1505
|
+
exports.SodPolicyRequestStateV3 = {
|
|
1506
|
+
Enforced: 'ENFORCED',
|
|
1507
|
+
NotEnforced: 'NOT_ENFORCED'
|
|
1508
|
+
};
|
|
1509
|
+
exports.SodPolicyRequestTypeV3 = {
|
|
1510
|
+
General: 'GENERAL',
|
|
1511
|
+
ConflictingAccessBased: 'CONFLICTING_ACCESS_BASED'
|
|
1512
|
+
};
|
|
1494
1513
|
exports.SodRecipientTypeV3 = {
|
|
1495
1514
|
Identity: 'IDENTITY'
|
|
1496
1515
|
};
|
|
@@ -3578,7 +3597,7 @@ var AccessRequestsApiAxiosParamCreator = function (configuration) {
|
|
|
3578
3597
|
});
|
|
3579
3598
|
},
|
|
3580
3599
|
/**
|
|
3581
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. *
|
|
3600
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
|
|
3582
3601
|
* @summary Submit access request
|
|
3583
3602
|
* @param {AccessRequest} accessRequest
|
|
3584
3603
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -3690,7 +3709,7 @@ var AccessRequestsApiAxiosParamCreator = function (configuration) {
|
|
|
3690
3709
|
* @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
|
|
3691
3710
|
* @param {number} [limit] Max number of results to return.
|
|
3692
3711
|
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
|
|
3693
|
-
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *in* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
|
|
3712
|
+
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *eq, in, ge, gt, le, lt, ne, sw* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
|
|
3694
3713
|
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name**
|
|
3695
3714
|
* @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
|
|
3696
3715
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -3857,7 +3876,7 @@ var AccessRequestsApiFp = function (configuration) {
|
|
|
3857
3876
|
});
|
|
3858
3877
|
},
|
|
3859
3878
|
/**
|
|
3860
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. *
|
|
3879
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
|
|
3861
3880
|
* @summary Submit access request
|
|
3862
3881
|
* @param {AccessRequest} accessRequest
|
|
3863
3882
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -3911,7 +3930,7 @@ var AccessRequestsApiFp = function (configuration) {
|
|
|
3911
3930
|
* @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
|
|
3912
3931
|
* @param {number} [limit] Max number of results to return.
|
|
3913
3932
|
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
|
|
3914
|
-
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *in* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
|
|
3933
|
+
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *eq, in, ge, gt, le, lt, ne, sw* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
|
|
3915
3934
|
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name**
|
|
3916
3935
|
* @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
|
|
3917
3936
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -3977,7 +3996,7 @@ var AccessRequestsApiFactory = function (configuration, basePath, axios) {
|
|
|
3977
3996
|
return localVarFp.cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
3978
3997
|
},
|
|
3979
3998
|
/**
|
|
3980
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. *
|
|
3999
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
|
|
3981
4000
|
* @summary Submit access request
|
|
3982
4001
|
* @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
3983
4002
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -4043,7 +4062,7 @@ var AccessRequestsApi = /** @class */ (function (_super) {
|
|
|
4043
4062
|
return (0, exports.AccessRequestsApiFp)(this.configuration).cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
4044
4063
|
};
|
|
4045
4064
|
/**
|
|
4046
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. *
|
|
4065
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
|
|
4047
4066
|
* @summary Submit access request
|
|
4048
4067
|
* @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
4049
4068
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -27875,19 +27894,19 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
|
|
|
27875
27894
|
/**
|
|
27876
27895
|
* This creates both General and Conflicting Access Based policy, with a limit of 50 entitlements for each (left & right) criteria for Conflicting Access Based SOD policy. Requires role of ORG_ADMIN.
|
|
27877
27896
|
* @summary Create sod policy
|
|
27878
|
-
* @param {
|
|
27897
|
+
* @param {SodPolicyRequest} sodPolicyRequest
|
|
27879
27898
|
* @param {*} [axiosOptions] Override http request option.
|
|
27880
27899
|
* @throws {RequiredError}
|
|
27881
27900
|
*/
|
|
27882
|
-
createSodPolicy: function (
|
|
27901
|
+
createSodPolicy: function (sodPolicyRequest, axiosOptions) {
|
|
27883
27902
|
if (axiosOptions === void 0) { axiosOptions = {}; }
|
|
27884
27903
|
return __awaiter(_this, void 0, void 0, function () {
|
|
27885
27904
|
var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
|
|
27886
27905
|
return __generator(this, function (_a) {
|
|
27887
27906
|
switch (_a.label) {
|
|
27888
27907
|
case 0:
|
|
27889
|
-
// verify required parameter '
|
|
27890
|
-
(0, common_1.assertParamExists)('createSodPolicy', '
|
|
27908
|
+
// verify required parameter 'sodPolicyRequest' is not null or undefined
|
|
27909
|
+
(0, common_1.assertParamExists)('createSodPolicy', 'sodPolicyRequest', sodPolicyRequest);
|
|
27891
27910
|
localVarPath = "/sod-policies";
|
|
27892
27911
|
localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
27893
27912
|
if (configuration) {
|
|
@@ -27917,7 +27936,7 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
|
|
|
27917
27936
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
27918
27937
|
headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
27919
27938
|
localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
|
|
27920
|
-
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(
|
|
27939
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(sodPolicyRequest, localVarRequestOptions, configuration);
|
|
27921
27940
|
return [2 /*return*/, {
|
|
27922
27941
|
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
27923
27942
|
axiosOptions: localVarRequestOptions,
|
|
@@ -28596,11 +28615,11 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
|
|
|
28596
28615
|
* This updates a specified SOD policy. Requires role of ORG_ADMIN.
|
|
28597
28616
|
* @summary Update sod policy by id
|
|
28598
28617
|
* @param {string} id The ID of the SOD policy to update.
|
|
28599
|
-
* @param {
|
|
28618
|
+
* @param {SodPolicyRead} sodPolicyRead
|
|
28600
28619
|
* @param {*} [axiosOptions] Override http request option.
|
|
28601
28620
|
* @throws {RequiredError}
|
|
28602
28621
|
*/
|
|
28603
|
-
putSodPolicy: function (id,
|
|
28622
|
+
putSodPolicy: function (id, sodPolicyRead, axiosOptions) {
|
|
28604
28623
|
if (axiosOptions === void 0) { axiosOptions = {}; }
|
|
28605
28624
|
return __awaiter(_this, void 0, void 0, function () {
|
|
28606
28625
|
var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
|
|
@@ -28609,8 +28628,8 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
|
|
|
28609
28628
|
case 0:
|
|
28610
28629
|
// verify required parameter 'id' is not null or undefined
|
|
28611
28630
|
(0, common_1.assertParamExists)('putSodPolicy', 'id', id);
|
|
28612
|
-
// verify required parameter '
|
|
28613
|
-
(0, common_1.assertParamExists)('putSodPolicy', '
|
|
28631
|
+
// verify required parameter 'sodPolicyRead' is not null or undefined
|
|
28632
|
+
(0, common_1.assertParamExists)('putSodPolicy', 'sodPolicyRead', sodPolicyRead);
|
|
28614
28633
|
localVarPath = "/sod-policies/{id}"
|
|
28615
28634
|
.replace("{".concat("id", "}"), encodeURIComponent(String(id)));
|
|
28616
28635
|
localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
@@ -28641,7 +28660,7 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
|
|
|
28641
28660
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
28642
28661
|
headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
28643
28662
|
localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
|
|
28644
|
-
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(
|
|
28663
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(sodPolicyRead, localVarRequestOptions, configuration);
|
|
28645
28664
|
return [2 /*return*/, {
|
|
28646
28665
|
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
28647
28666
|
axiosOptions: localVarRequestOptions,
|
|
@@ -28821,17 +28840,17 @@ var SODPoliciesApiFp = function (configuration) {
|
|
|
28821
28840
|
/**
|
|
28822
28841
|
* This creates both General and Conflicting Access Based policy, with a limit of 50 entitlements for each (left & right) criteria for Conflicting Access Based SOD policy. Requires role of ORG_ADMIN.
|
|
28823
28842
|
* @summary Create sod policy
|
|
28824
|
-
* @param {
|
|
28843
|
+
* @param {SodPolicyRequest} sodPolicyRequest
|
|
28825
28844
|
* @param {*} [axiosOptions] Override http request option.
|
|
28826
28845
|
* @throws {RequiredError}
|
|
28827
28846
|
*/
|
|
28828
|
-
createSodPolicy: function (
|
|
28847
|
+
createSodPolicy: function (sodPolicyRequest, axiosOptions) {
|
|
28829
28848
|
var _a, _b, _c;
|
|
28830
28849
|
return __awaiter(this, void 0, void 0, function () {
|
|
28831
28850
|
var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
|
|
28832
28851
|
return __generator(this, function (_d) {
|
|
28833
28852
|
switch (_d.label) {
|
|
28834
|
-
case 0: return [4 /*yield*/, localVarAxiosParamCreator.createSodPolicy(
|
|
28853
|
+
case 0: return [4 /*yield*/, localVarAxiosParamCreator.createSodPolicy(sodPolicyRequest, axiosOptions)];
|
|
28835
28854
|
case 1:
|
|
28836
28855
|
localVarAxiosArgs = _d.sent();
|
|
28837
28856
|
localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
@@ -29128,17 +29147,17 @@ var SODPoliciesApiFp = function (configuration) {
|
|
|
29128
29147
|
* This updates a specified SOD policy. Requires role of ORG_ADMIN.
|
|
29129
29148
|
* @summary Update sod policy by id
|
|
29130
29149
|
* @param {string} id The ID of the SOD policy to update.
|
|
29131
|
-
* @param {
|
|
29150
|
+
* @param {SodPolicyRead} sodPolicyRead
|
|
29132
29151
|
* @param {*} [axiosOptions] Override http request option.
|
|
29133
29152
|
* @throws {RequiredError}
|
|
29134
29153
|
*/
|
|
29135
|
-
putSodPolicy: function (id,
|
|
29154
|
+
putSodPolicy: function (id, sodPolicyRead, axiosOptions) {
|
|
29136
29155
|
var _a, _b, _c;
|
|
29137
29156
|
return __awaiter(this, void 0, void 0, function () {
|
|
29138
29157
|
var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
|
|
29139
29158
|
return __generator(this, function (_d) {
|
|
29140
29159
|
switch (_d.label) {
|
|
29141
|
-
case 0: return [4 /*yield*/, localVarAxiosParamCreator.putSodPolicy(id,
|
|
29160
|
+
case 0: return [4 /*yield*/, localVarAxiosParamCreator.putSodPolicy(id, sodPolicyRead, axiosOptions)];
|
|
29142
29161
|
case 1:
|
|
29143
29162
|
localVarAxiosArgs = _d.sent();
|
|
29144
29163
|
localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
@@ -29235,7 +29254,7 @@ var SODPoliciesApiFactory = function (configuration, basePath, axios) {
|
|
|
29235
29254
|
* @throws {RequiredError}
|
|
29236
29255
|
*/
|
|
29237
29256
|
createSodPolicy: function (requestParameters, axiosOptions) {
|
|
29238
|
-
return localVarFp.createSodPolicy(requestParameters.
|
|
29257
|
+
return localVarFp.createSodPolicy(requestParameters.sodPolicyRequest, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
29239
29258
|
},
|
|
29240
29259
|
/**
|
|
29241
29260
|
* This deletes a specified SOD policy. Requires role of ORG_ADMIN.
|
|
@@ -29365,7 +29384,7 @@ var SODPoliciesApiFactory = function (configuration, basePath, axios) {
|
|
|
29365
29384
|
* @throws {RequiredError}
|
|
29366
29385
|
*/
|
|
29367
29386
|
putSodPolicy: function (requestParameters, axiosOptions) {
|
|
29368
|
-
return localVarFp.putSodPolicy(requestParameters.id, requestParameters.
|
|
29387
|
+
return localVarFp.putSodPolicy(requestParameters.id, requestParameters.sodPolicyRead, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
29369
29388
|
},
|
|
29370
29389
|
/**
|
|
29371
29390
|
* Runs the scheduled report for the policy retrieved by passed policy ID. The report schedule is fetched from the policy retrieved by ID.
|
|
@@ -29422,7 +29441,7 @@ var SODPoliciesApi = /** @class */ (function (_super) {
|
|
|
29422
29441
|
*/
|
|
29423
29442
|
SODPoliciesApi.prototype.createSodPolicy = function (requestParameters, axiosOptions) {
|
|
29424
29443
|
var _this = this;
|
|
29425
|
-
return (0, exports.SODPoliciesApiFp)(this.configuration).createSodPolicy(requestParameters.
|
|
29444
|
+
return (0, exports.SODPoliciesApiFp)(this.configuration).createSodPolicy(requestParameters.sodPolicyRequest, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
29426
29445
|
};
|
|
29427
29446
|
/**
|
|
29428
29447
|
* This deletes a specified SOD policy. Requires role of ORG_ADMIN.
|
|
@@ -29578,7 +29597,7 @@ var SODPoliciesApi = /** @class */ (function (_super) {
|
|
|
29578
29597
|
*/
|
|
29579
29598
|
SODPoliciesApi.prototype.putSodPolicy = function (requestParameters, axiosOptions) {
|
|
29580
29599
|
var _this = this;
|
|
29581
|
-
return (0, exports.SODPoliciesApiFp)(this.configuration).putSodPolicy(requestParameters.id, requestParameters.
|
|
29600
|
+
return (0, exports.SODPoliciesApiFp)(this.configuration).putSodPolicy(requestParameters.id, requestParameters.sodPolicyRead, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
29582
29601
|
};
|
|
29583
29602
|
/**
|
|
29584
29603
|
* Runs the scheduled report for the policy retrieved by passed policy ID. The report schedule is fetched from the policy retrieved by ID.
|