sailpoint-api-client 1.6.4 → 1.6.6
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/beta/README.md +2 -2
- package/beta/api.ts +424 -250
- package/beta/common.ts +2 -2
- package/beta/package.json +1 -1
- package/dist/beta/api.d.ts +337 -178
- package/dist/beta/api.js +345 -201
- package/dist/beta/api.js.map +1 -1
- package/dist/beta/common.js +1 -1
- package/dist/v2024/api.d.ts +69 -118
- package/dist/v2024/api.js +75 -151
- package/dist/v2024/api.js.map +1 -1
- package/dist/v2024/common.js +1 -1
- package/dist/v2025/api.d.ts +123 -146
- package/dist/v2025/api.js +104 -189
- package/dist/v2025/api.js.map +1 -1
- package/dist/v2025/common.js +1 -1
- package/dist/v3/api.d.ts +382 -59
- package/dist/v3/api.js +56 -38
- package/dist/v3/api.js.map +1 -1
- package/dist/v3/common.js +1 -1
- package/package.json +1 -1
- package/v2024/README.md +2 -2
- package/v2024/api.ts +108 -232
- package/v2024/common.ts +2 -2
- package/v2024/package.json +1 -1
- package/v2025/README.md +2 -2
- package/v2025/api.ts +177 -282
- package/v2025/common.ts +2 -2
- package/v2025/package.json +1 -1
- package/v3/README.md +2 -2
- package/v3/api.ts +401 -67
- package/v3/common.ts +2 -2
- package/v3/package.json +1 -1
package/dist/v3/api.js
CHANGED
|
@@ -78,16 +78,16 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
|
|
|
78
78
|
return (mod && mod.__esModule) ? mod : { "default": mod };
|
|
79
79
|
};
|
|
80
80
|
Object.defineProperty(exports, "__esModule", { value: true });
|
|
81
|
-
exports.
|
|
82
|
-
exports.
|
|
83
|
-
exports.
|
|
84
|
-
exports.
|
|
85
|
-
exports.
|
|
86
|
-
exports.
|
|
87
|
-
exports.
|
|
88
|
-
exports.
|
|
89
|
-
exports.
|
|
90
|
-
exports.WorkflowsApi = exports.WorkflowsApiFactory = exports.WorkflowsApiFp = exports.WorkflowsApiAxiosParamCreator = exports.WorkItemsApi = exports.WorkItemsApiFactory = exports.WorkItemsApiFp = exports.WorkItemsApiAxiosParamCreator = exports.VendorConnectorMappingsApi = exports.VendorConnectorMappingsApiFactory = exports.VendorConnectorMappingsApiFp = exports.VendorConnectorMappingsApiAxiosParamCreator = exports.TransformsApi = exports.TransformsApiFactory = exports.TransformsApiFp = exports.TransformsApiAxiosParamCreator = exports.PutTaggedObjectTypeV3 = exports.ListTaggedObjectsByTypeTypeV3 = exports.GetTaggedObjectTypeV3 = void 0;
|
|
81
|
+
exports.CampaignMandatoryCommentRequirementV3 = exports.CampaignCorrelatedStatusV3 = exports.CampaignStatusV3 = exports.CampaignTypeV3 = exports.BulkAddTaggedObjectOperationV3 = exports.BucketType = exports.BeforeProvisioningRuleDtoTypeV3 = exports.BaseAccessOwnerTypeV3 = exports.BackupResponseCloudStorageStatusV3 = exports.BackupResponseHydrationStatusV3 = exports.BackupResponseBackupTypeV3 = exports.BackupResponseTypeV3 = exports.BackupResponseStatusV3 = exports.BackupOptionsIncludeTypesV3 = exports.AuthUserCapabilitiesV3 = exports.AttributeDefinitionType = exports.AttributeDefinitionSchemaTypeV3 = exports.ApprovalStatusDtoOriginalOwnerTypeV3 = exports.ApprovalStatusDtoCurrentOwnerTypeV3 = exports.ApprovalStatus = exports.ApprovalSchemeForRoleApproverTypeV3 = exports.ApprovalScheme = exports.AggregationType = exports.AdminReviewReassignReassignToTypeV3 = exports.ActivityInsightsUsageDaysStateV3 = exports.AccountAllOfSourceOwnerTypeV3 = exports.AccountAllOfRecommendationMethodV3 = exports.AccountAllOfRecommendationTypeV3 = exports.AccountAllOfIdentityTypeV3 = exports.AccountActivityItemOperation = exports.AccountActivityApprovalStatus = exports.AccountActionActionV3 = exports.AccountOriginV3 = exports.AccessType = exports.AccessRequestType = exports.AccessRequestPhasesResultV3 = exports.AccessRequestPhasesStateV3 = exports.AccessRequestItemTypeV3 = exports.AccessProfileUsageUsedByInnerTypeV3 = exports.AccessProfileSourceRefTypeV3 = exports.AccessProfileRefTypeV3 = exports.AccessProfileApprovalSchemeApproverTypeV3 = exports.AccessItemReviewedByTypeV3 = exports.AccessItemRequesterTypeV3 = exports.AccessItemRequestedForTypeV3 = exports.AccessCriteriaRequestCriteriaListInnerTypeV3 = exports.AccessCriteriaCriteriaListInnerTypeV3 = exports.AccessConstraintOperatorV3 = exports.AccessConstraintTypeV3 = exports.AccessAppsOwnerTypeV3 = void 0;
|
|
82
|
+
exports.GetCampaign200ResponseCorrelatedStatusV3 = exports.GetCampaign200ResponseStatusV3 = exports.GetCampaign200ResponseTypeV3 = exports.GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = exports.GetActiveCampaigns200ResponseInnerCorrelatedStatusV3 = exports.GetActiveCampaigns200ResponseInnerStatusV3 = exports.GetActiveCampaigns200ResponseInnerTypeV3 = exports.FilterType = exports.FederationProtocolDetailsRoleV3 = exports.ExpressionChildrenInnerOperatorV3 = exports.ExpressionOperatorV3 = exports.ExecutionStatus = exports.ExceptionCriteriaCriteriaListInnerTypeV3 = exports.EntitlementRef1TypeV3 = exports.EntitlementRefTypeV3 = exports.EntitlementOwnerTypeV3 = exports.DtoType = exports.DocumentType = exports.DimensionRefTypeV3 = exports.DependantConnectionsMissingDtoDependencyTypeV3 = exports.DeleteSource202ResponseTypeV3 = exports.DateCompareOperatorV3 = exports.CriteriaType = exports.ConnectorDetailStatusV3 = exports.CompletionStatus = exports.CompletedApprovalState = exports.CommentDtoAuthorTypeV3 = exports.ClientType = exports.CertificationTaskStatusV3 = exports.CertificationTaskTargetTypeV3 = exports.CertificationTaskTypeV3 = exports.CertificationReferenceTypeV3 = exports.CertificationPhase = exports.CertificationDecision = exports.CampaignTemplateOwnerRefTypeV3 = exports.CampaignReportStatusV3 = exports.CampaignReportTypeV3 = exports.CampaignReferenceMandatoryCommentRequirementV3 = exports.CampaignReferenceCorrelatedStatusV3 = exports.CampaignReferenceCampaignTypeV3 = exports.CampaignReferenceTypeV3 = exports.CampaignFilterDetailsModeV3 = exports.CampaignCompleteOptionsAutoCompleteActionV3 = exports.CampaignAllOfSourcesWithOrphanEntitlementsTypeV3 = exports.CampaignAllOfSearchCampaignInfoReviewerTypeV3 = exports.CampaignAllOfSearchCampaignInfoTypeV3 = exports.CampaignAllOfRoleCompositionCampaignInfoRemediatorRefTypeV3 = exports.CampaignAllOfMachineAccountCampaignInfoReviewerTypeV3 = exports.CampaignAllOfFilterTypeV3 = exports.CampaignAlertLevelV3 = void 0;
|
|
83
|
+
exports.ReassignmentReferenceTypeV3 = exports.ReassignReferenceTypeV3 = exports.QueryType = exports.PublicIdentityIdentityStateV3 = exports.ProvisioningState = exports.ProvisioningCriteriaOperation = exports.PreApprovalTriggerDetailsDecisionV3 = exports.PendingApprovalOwnerTypeV3 = exports.PendingApprovalAction = exports.PatOwnerTypeV3 = exports.PasswordStatusStateV3 = exports.PasswordChangeResponseStateV3 = exports.OwnerReferenceSegmentsTypeV3 = exports.OwnerReferenceTypeV3 = exports.OwnerDtoTypeV3 = exports.OrphanIdentitiesReportArgumentsSelectedFormatsV3 = exports.Operation = exports.ObjectMappingResponseObjectTypeV3 = exports.ObjectMappingRequestObjectTypeV3 = exports.NonEmployeeSchemaAttributeType = exports.NonEmployeeIdentityDtoType = exports.NonEmployeeBulkUploadStatusStatusV3 = exports.NonEmployeeBulkUploadJobStatusV3 = exports.NamedConstructs = exports.MfaConfigTestResponseStateV3 = exports.MetricType = exports.ManualWorkItemState = exports.ManualWorkItemDetailsOriginalOwnerTypeV3 = exports.ManualWorkItemDetailsCurrentOwnerTypeV3 = exports.ManagedClusterTypes = exports.ManagedClusterStatusV3 = exports.ManagedClientType = exports.ManagedClientStatusCode = exports.ManagedClientProvisionStatusV3 = exports.ManagedClientClusterTypeV3 = exports.ManagedClientStatusV3 = exports.LocaleOrigin = exports.LifecyclestateDeletedTypeV3 = exports.KbaAuthResponseStatusV3 = exports.JsonPatchOperationOpV3 = exports.Index = exports.ImportObjectTypeV3 = exports.IdpDetailsRoleV3 = exports.IdentityWithNewAccessAccessRefsInnerTypeV3 = exports.IdentityProfileExportedObjectSelfTypeV3 = exports.IdentityProfileAllOfOwnerTypeV3 = exports.IdentityProfileAllOfAuthoritativeSourceTypeV3 = exports.IdentityPreviewResponseIdentityTypeV3 = exports.GrantType = exports.GetCampaign200ResponseMandatoryCommentRequirementV3 = void 0;
|
|
84
|
+
exports.SodPolicyReadStateV3 = exports.SodPolicyOwnerRefTypeV3 = exports.SodPolicyDtoTypeV3 = exports.SodPolicyTypeV3 = exports.SodPolicyStateV3 = exports.SlimCampaignCorrelatedStatusV3 = exports.SlimCampaignStatusV3 = exports.SlimCampaignTypeV3 = exports.ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = exports.ServiceDeskSourceTypeV3 = exports.SendTokenResponseStatusV3 = exports.SendTokenRequestDeliveryTypeV3 = exports.SelectorType = exports.SearchScheduleRecipientsInnerTypeV3 = exports.SearchFilterType = exports.SchemaFeaturesV3 = exports.ScheduledSearchAllOfOwnerTypeV3 = exports.ScheduledAttributesFrequencyV3 = exports.ScheduleType = exports.ScheduleMonthsTypeV3 = exports.ScheduleHoursTypeV3 = exports.ScheduleDaysTypeV3 = exports.ScheduleTypeV3 = exports.RoleMembershipSelectorType = exports.RoleCriteriaOperation = exports.RoleCriteriaKeyType = exports.RoleAssignmentSourceType = exports.ReviewerTypeV3 = exports.ReviewableEntitlementAccountOwnerTypeV3 = exports.RequestedItemStatusSodViolationContextStateV3 = exports.RequestedItemStatusRequestedForTypeV3 = exports.RequestedItemStatusRequestState = exports.RequestedItemStatusPreApprovalTriggerDetailsDecisionV3 = exports.RequestedItemStatusTypeV3 = exports.RequestedItemDtoRefTypeV3 = exports.RequestedItemDetailsTypeV3 = exports.RequestableObjectType = exports.RequestableObjectRequestStatus = exports.RequestableObjectReferenceTypeV3 = exports.ReportType = exports.ReportResultsAvailableFormatsV3 = exports.ReportResultsStatusV3 = exports.ReportResultsReportTypeV3 = exports.ReportResultReferenceStatusV3 = exports.ReportResultReferenceTypeV3 = exports.ReportDetailsArgumentsSelectedFormatsV3 = exports.ReportDetailsReportTypeV3 = exports.RecommendationMethodV3 = exports.RecommendationTypeV3 = exports.ReassignmentType = void 0;
|
|
85
|
+
exports.WorkflowLibraryFormFieldsTypeV3 = exports.WorkflowExecutionEventTypeV3 = exports.WorkflowExecutionStatusV3 = exports.WorkflowBodyOwnerTypeV3 = exports.WorkflowAllOfCreatorTypeV3 = exports.WorkItemTypeManualWorkItems = exports.WorkItemStateManualWorkItems = exports.WorkItemState = exports.ViolationOwnerAssignmentConfigOwnerRefTypeV3 = exports.ViolationOwnerAssignmentConfigAssignmentRuleV3 = exports.ViolationContextPolicyTypeV3 = exports.VerificationResponseStatusV3 = exports.V3CreateConnectorDtoStatusV3 = exports.V3ConnectorDtoStatusV3 = exports.UsageType = exports.UpdateDetailStatusV3 = exports.UncorrelatedAccountsReportArgumentsSelectedFormatsV3 = exports.TransformReadTypeV3 = exports.TransformTypeV3 = exports.TokenAuthResponseStatusV3 = exports.TokenAuthRequestDeliveryTypeV3 = exports.TaskResultSimplifiedCompletionStatusV3 = exports.TaskResultDtoTypeV3 = exports.TaskResultDetailsMessagesInnerTypeV3 = exports.TaskResultDetailsCompletionStatusV3 = exports.TaskResultDetailsReportTypeV3 = exports.TaskResultDetailsTypeV3 = exports.TaggedObjectDtoTypeV3 = exports.StandardLevel = exports.SpDetailsRoleV3 = exports.SourceUsageStatusStatusV3 = exports.SourceSchemasInnerTypeV3 = exports.SourcePasswordPoliciesInnerTypeV3 = exports.SourceOwnerTypeV3 = exports.SourceManagerCorrelationRuleTypeV3 = exports.SourceManagementWorkgroupTypeV3 = exports.SourceHealthDtoStatusV3 = exports.SourceClusterDtoTypeV3 = exports.SourceClusterTypeV3 = exports.SourceBeforeProvisioningRuleTypeV3 = exports.SourceAccountCorrelationRuleTypeV3 = exports.SourceAccountCorrelationConfigTypeV3 = exports.SourceStatusV3 = exports.SourceFeaturesV3 = exports.SodViolationContextCheckCompletedStateV3 = exports.SodReportResultDtoTypeV3 = exports.SodRecipientTypeV3 = exports.SodPolicyRequestTypeV3 = exports.SodPolicyRequestStateV3 = exports.SodPolicyReadTypeV3 = void 0;
|
|
86
|
+
exports.CertificationCampaignsApi = exports.CertificationCampaignsApiFactory = exports.CertificationCampaignsApiFp = exports.CertificationCampaignsApiAxiosParamCreator = exports.CertificationCampaignFiltersApi = exports.CertificationCampaignFiltersApiFactory = exports.CertificationCampaignFiltersApiFp = exports.CertificationCampaignFiltersApiAxiosParamCreator = exports.BrandingApi = exports.BrandingApiFactory = exports.BrandingApiFp = exports.BrandingApiAxiosParamCreator = exports.AuthUsersApi = exports.AuthUsersApiFactory = exports.AuthUsersApiFp = exports.AuthUsersApiAxiosParamCreator = exports.GetDiscoveredApplicationsDetailV3 = exports.ApplicationDiscoveryApi = exports.ApplicationDiscoveryApiFactory = exports.ApplicationDiscoveryApiFp = exports.ApplicationDiscoveryApiAxiosParamCreator = exports.ListAccountsDetailLevelV3 = exports.AccountsApi = exports.AccountsApiFactory = exports.AccountsApiFp = exports.AccountsApiAxiosParamCreator = exports.AccountUsagesApi = exports.AccountUsagesApiFactory = exports.AccountUsagesApiFp = exports.AccountUsagesApiAxiosParamCreator = exports.AccountActivitiesApi = exports.AccountActivitiesApiFactory = exports.AccountActivitiesApiFp = exports.AccountActivitiesApiAxiosParamCreator = exports.AccessRequestsApi = exports.AccessRequestsApiFactory = exports.AccessRequestsApiFp = exports.AccessRequestsApiAxiosParamCreator = exports.AccessRequestApprovalsApi = exports.AccessRequestApprovalsApiFactory = exports.AccessRequestApprovalsApiFp = exports.AccessRequestApprovalsApiAxiosParamCreator = exports.AccessProfilesApi = exports.AccessProfilesApiFactory = exports.AccessProfilesApiFp = exports.AccessProfilesApiAxiosParamCreator = exports.WorkflowTriggerAttributesFrequencyV3 = exports.WorkflowTriggerTypeV3 = exports.WorkflowModifiedByTypeV3 = exports.WorkflowLibraryTriggerTypeV3 = void 0;
|
|
87
|
+
exports.ManagedClientsApi = exports.ManagedClientsApiFactory = exports.ManagedClientsApiFp = exports.ManagedClientsApiAxiosParamCreator = exports.PingVerificationStatusMethodV3 = exports.MFAControllerApi = exports.MFAControllerApiFactory = exports.MFAControllerApiFp = exports.MFAControllerApiAxiosParamCreator = exports.TestMFAConfigMethodV3 = exports.DeleteMFAConfigMethodV3 = exports.MFAConfigurationApi = exports.MFAConfigurationApiFactory = exports.MFAConfigurationApiFp = exports.MFAConfigurationApiAxiosParamCreator = exports.LifecycleStatesApi = exports.LifecycleStatesApiFactory = exports.LifecycleStatesApiFp = exports.LifecycleStatesApiAxiosParamCreator = exports.IdentityProfilesApi = exports.IdentityProfilesApiFactory = exports.IdentityProfilesApiFp = exports.IdentityProfilesApiAxiosParamCreator = exports.GlobalTenantSecuritySettingsApi = exports.GlobalTenantSecuritySettingsApiFactory = exports.GlobalTenantSecuritySettingsApiFp = exports.GlobalTenantSecuritySettingsApiAxiosParamCreator = exports.PutConnectorTranslationsLocaleV3 = exports.GetConnectorTranslationsLocaleV3 = exports.GetConnectorListLocaleV3 = exports.GetConnectorLocaleV3 = exports.ConnectorsApi = exports.ConnectorsApiFactory = exports.ConnectorsApiFp = exports.ConnectorsApiAxiosParamCreator = exports.ConfigurationHubApi = exports.ConfigurationHubApiFactory = exports.ConfigurationHubApiFp = exports.ConfigurationHubApiAxiosParamCreator = exports.CertificationsApi = exports.CertificationsApiFactory = exports.CertificationsApiFp = exports.CertificationsApiAxiosParamCreator = exports.GetIdentityAccessSummariesTypeV3 = exports.CertificationSummariesApi = exports.CertificationSummariesApiFactory = exports.CertificationSummariesApiFp = exports.CertificationSummariesApiAxiosParamCreator = exports.GetCampaignDetailV3 = exports.GetActiveCampaignsDetailV3 = void 0;
|
|
88
|
+
exports.RequestableObjectsApiAxiosParamCreator = exports.GetReportFileFormatV3 = exports.ReportsDataExtractionApi = exports.ReportsDataExtractionApiFactory = exports.ReportsDataExtractionApiFp = exports.ReportsDataExtractionApiAxiosParamCreator = exports.PublicIdentitiesConfigApi = exports.PublicIdentitiesConfigApiFactory = exports.PublicIdentitiesConfigApiFp = exports.PublicIdentitiesConfigApiAxiosParamCreator = exports.PublicIdentitiesApi = exports.PublicIdentitiesApiFactory = exports.PublicIdentitiesApiFp = exports.PublicIdentitiesApiAxiosParamCreator = exports.PersonalAccessTokensApi = exports.PersonalAccessTokensApiFactory = exports.PersonalAccessTokensApiFp = exports.PersonalAccessTokensApiAxiosParamCreator = exports.PasswordSyncGroupsApi = exports.PasswordSyncGroupsApiFactory = exports.PasswordSyncGroupsApiFp = exports.PasswordSyncGroupsApiAxiosParamCreator = exports.PasswordPoliciesApi = exports.PasswordPoliciesApiFactory = exports.PasswordPoliciesApiFp = exports.PasswordPoliciesApiAxiosParamCreator = exports.PasswordManagementApi = exports.PasswordManagementApiFactory = exports.PasswordManagementApiFp = exports.PasswordManagementApiAxiosParamCreator = exports.PasswordDictionaryApi = exports.PasswordDictionaryApiFactory = exports.PasswordDictionaryApiFp = exports.PasswordDictionaryApiAxiosParamCreator = exports.PasswordConfigurationApi = exports.PasswordConfigurationApiFactory = exports.PasswordConfigurationApiFp = exports.PasswordConfigurationApiAxiosParamCreator = exports.OAuthClientsApi = exports.OAuthClientsApiFactory = exports.OAuthClientsApiFp = exports.OAuthClientsApiAxiosParamCreator = exports.NonEmployeeLifecycleManagementApi = exports.NonEmployeeLifecycleManagementApiFactory = exports.NonEmployeeLifecycleManagementApiFp = exports.NonEmployeeLifecycleManagementApiAxiosParamCreator = exports.ManagedClustersApi = exports.ManagedClustersApiFactory = exports.ManagedClustersApiFp = exports.ManagedClustersApiAxiosParamCreator = void 0;
|
|
89
|
+
exports.GetSourceSchemasIncludeTypesV3 = exports.SourcesApi = exports.SourcesApiFactory = exports.SourcesApiFp = exports.SourcesApiAxiosParamCreator = exports.SourceUsagesApi = exports.SourceUsagesApiFactory = exports.SourceUsagesApiFp = exports.SourceUsagesApiAxiosParamCreator = exports.ServiceDeskIntegrationApi = exports.ServiceDeskIntegrationApiFactory = exports.ServiceDeskIntegrationApiFp = exports.ServiceDeskIntegrationApiAxiosParamCreator = exports.SegmentsApi = exports.SegmentsApiFactory = exports.SegmentsApiFp = exports.SegmentsApiAxiosParamCreator = exports.SearchAttributeConfigurationApi = exports.SearchAttributeConfigurationApiFactory = exports.SearchAttributeConfigurationApiFp = exports.SearchAttributeConfigurationApiAxiosParamCreator = exports.SearchGetIndexV3 = exports.SearchApi = exports.SearchApiFactory = exports.SearchApiFp = exports.SearchApiAxiosParamCreator = exports.ScheduledSearchApi = exports.ScheduledSearchApiFactory = exports.ScheduledSearchApiFp = exports.ScheduledSearchApiAxiosParamCreator = exports.SavedSearchApi = exports.SavedSearchApiFactory = exports.SavedSearchApiFp = exports.SavedSearchApiAxiosParamCreator = exports.SODViolationsApi = exports.SODViolationsApiFactory = exports.SODViolationsApiFp = exports.SODViolationsApiAxiosParamCreator = exports.SODPoliciesApi = exports.SODPoliciesApiFactory = exports.SODPoliciesApiFp = exports.SODPoliciesApiAxiosParamCreator = exports.RolesApi = exports.RolesApiFactory = exports.RolesApiFp = exports.RolesApiAxiosParamCreator = exports.ListRequestableObjectsTypesV3 = exports.RequestableObjectsApi = exports.RequestableObjectsApiFactory = exports.RequestableObjectsApiFp = void 0;
|
|
90
|
+
exports.WorkflowsApi = exports.WorkflowsApiFactory = exports.WorkflowsApiFp = exports.WorkflowsApiAxiosParamCreator = exports.WorkItemsApi = exports.WorkItemsApiFactory = exports.WorkItemsApiFp = exports.WorkItemsApiAxiosParamCreator = exports.VendorConnectorMappingsApi = exports.VendorConnectorMappingsApiFactory = exports.VendorConnectorMappingsApiFp = exports.VendorConnectorMappingsApiAxiosParamCreator = exports.TransformsApi = exports.TransformsApiFactory = exports.TransformsApiFp = exports.TransformsApiAxiosParamCreator = exports.PutTaggedObjectTypeV3 = exports.ListTaggedObjectsByTypeTypeV3 = exports.GetTaggedObjectTypeV3 = exports.DeleteTaggedObjectTypeV3 = exports.TaggedObjectsApi = exports.TaggedObjectsApiFactory = exports.TaggedObjectsApiFp = exports.TaggedObjectsApiAxiosParamCreator = void 0;
|
|
91
91
|
var axios_1 = __importDefault(require("axios"));
|
|
92
92
|
// Some imports not used depending on template conditions
|
|
93
93
|
// @ts-ignore
|
|
@@ -109,6 +109,9 @@ exports.AccessConstraintOperatorV3 = {
|
|
|
109
109
|
exports.AccessCriteriaCriteriaListInnerTypeV3 = {
|
|
110
110
|
Entitlement: 'ENTITLEMENT'
|
|
111
111
|
};
|
|
112
|
+
exports.AccessCriteriaRequestCriteriaListInnerTypeV3 = {
|
|
113
|
+
Entitlement: 'ENTITLEMENT'
|
|
114
|
+
};
|
|
112
115
|
exports.AccessItemRequestedForTypeV3 = {
|
|
113
116
|
Identity: 'IDENTITY'
|
|
114
117
|
};
|
|
@@ -414,8 +417,7 @@ exports.CampaignAlertLevelV3 = {
|
|
|
414
417
|
Info: 'INFO'
|
|
415
418
|
};
|
|
416
419
|
exports.CampaignAllOfFilterTypeV3 = {
|
|
417
|
-
CampaignFilter: 'CAMPAIGN_FILTER'
|
|
418
|
-
Rule: 'RULE'
|
|
420
|
+
CampaignFilter: 'CAMPAIGN_FILTER'
|
|
419
421
|
};
|
|
420
422
|
exports.CampaignAllOfMachineAccountCampaignInfoReviewerTypeV3 = {
|
|
421
423
|
AccountOwner: 'ACCOUNT_OWNER'
|
|
@@ -1491,6 +1493,22 @@ exports.SodPolicyOwnerRefTypeV3 = {
|
|
|
1491
1493
|
Identity: 'IDENTITY',
|
|
1492
1494
|
GovernanceGroup: 'GOVERNANCE_GROUP'
|
|
1493
1495
|
};
|
|
1496
|
+
exports.SodPolicyReadStateV3 = {
|
|
1497
|
+
Enforced: 'ENFORCED',
|
|
1498
|
+
NotEnforced: 'NOT_ENFORCED'
|
|
1499
|
+
};
|
|
1500
|
+
exports.SodPolicyReadTypeV3 = {
|
|
1501
|
+
General: 'GENERAL',
|
|
1502
|
+
ConflictingAccessBased: 'CONFLICTING_ACCESS_BASED'
|
|
1503
|
+
};
|
|
1504
|
+
exports.SodPolicyRequestStateV3 = {
|
|
1505
|
+
Enforced: 'ENFORCED',
|
|
1506
|
+
NotEnforced: 'NOT_ENFORCED'
|
|
1507
|
+
};
|
|
1508
|
+
exports.SodPolicyRequestTypeV3 = {
|
|
1509
|
+
General: 'GENERAL',
|
|
1510
|
+
ConflictingAccessBased: 'CONFLICTING_ACCESS_BASED'
|
|
1511
|
+
};
|
|
1494
1512
|
exports.SodRecipientTypeV3 = {
|
|
1495
1513
|
Identity: 'IDENTITY'
|
|
1496
1514
|
};
|
|
@@ -3578,7 +3596,7 @@ var AccessRequestsApiAxiosParamCreator = function (configuration) {
|
|
|
3578
3596
|
});
|
|
3579
3597
|
},
|
|
3580
3598
|
/**
|
|
3581
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. *
|
|
3599
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
|
|
3582
3600
|
* @summary Submit access request
|
|
3583
3601
|
* @param {AccessRequest} accessRequest
|
|
3584
3602
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -3690,7 +3708,7 @@ var AccessRequestsApiAxiosParamCreator = function (configuration) {
|
|
|
3690
3708
|
* @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
|
|
3691
3709
|
* @param {number} [limit] Max number of results to return.
|
|
3692
3710
|
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
|
|
3693
|
-
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *in* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
|
|
3711
|
+
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *eq, in, ge, gt, le, lt, ne, sw* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
|
|
3694
3712
|
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name**
|
|
3695
3713
|
* @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
|
|
3696
3714
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -3857,7 +3875,7 @@ var AccessRequestsApiFp = function (configuration) {
|
|
|
3857
3875
|
});
|
|
3858
3876
|
},
|
|
3859
3877
|
/**
|
|
3860
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. *
|
|
3878
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
|
|
3861
3879
|
* @summary Submit access request
|
|
3862
3880
|
* @param {AccessRequest} accessRequest
|
|
3863
3881
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -3911,7 +3929,7 @@ var AccessRequestsApiFp = function (configuration) {
|
|
|
3911
3929
|
* @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
|
|
3912
3930
|
* @param {number} [limit] Max number of results to return.
|
|
3913
3931
|
* @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
|
|
3914
|
-
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *in* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
|
|
3932
|
+
* @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *eq, in, ge, gt, le, lt, ne, sw* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
|
|
3915
3933
|
* @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name**
|
|
3916
3934
|
* @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
|
|
3917
3935
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -3977,7 +3995,7 @@ var AccessRequestsApiFactory = function (configuration, basePath, axios) {
|
|
|
3977
3995
|
return localVarFp.cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
3978
3996
|
},
|
|
3979
3997
|
/**
|
|
3980
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. *
|
|
3998
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
|
|
3981
3999
|
* @summary Submit access request
|
|
3982
4000
|
* @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
3983
4001
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -4043,7 +4061,7 @@ var AccessRequestsApi = /** @class */ (function (_super) {
|
|
|
4043
4061
|
return (0, exports.AccessRequestsApiFp)(this.configuration).cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
4044
4062
|
};
|
|
4045
4063
|
/**
|
|
4046
|
-
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. *
|
|
4064
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
|
|
4047
4065
|
* @summary Submit access request
|
|
4048
4066
|
* @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
4049
4067
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -27875,19 +27893,19 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
|
|
|
27875
27893
|
/**
|
|
27876
27894
|
* This creates both General and Conflicting Access Based policy, with a limit of 50 entitlements for each (left & right) criteria for Conflicting Access Based SOD policy. Requires role of ORG_ADMIN.
|
|
27877
27895
|
* @summary Create sod policy
|
|
27878
|
-
* @param {
|
|
27896
|
+
* @param {SodPolicyRequest} sodPolicyRequest
|
|
27879
27897
|
* @param {*} [axiosOptions] Override http request option.
|
|
27880
27898
|
* @throws {RequiredError}
|
|
27881
27899
|
*/
|
|
27882
|
-
createSodPolicy: function (
|
|
27900
|
+
createSodPolicy: function (sodPolicyRequest, axiosOptions) {
|
|
27883
27901
|
if (axiosOptions === void 0) { axiosOptions = {}; }
|
|
27884
27902
|
return __awaiter(_this, void 0, void 0, function () {
|
|
27885
27903
|
var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
|
|
27886
27904
|
return __generator(this, function (_a) {
|
|
27887
27905
|
switch (_a.label) {
|
|
27888
27906
|
case 0:
|
|
27889
|
-
// verify required parameter '
|
|
27890
|
-
(0, common_1.assertParamExists)('createSodPolicy', '
|
|
27907
|
+
// verify required parameter 'sodPolicyRequest' is not null or undefined
|
|
27908
|
+
(0, common_1.assertParamExists)('createSodPolicy', 'sodPolicyRequest', sodPolicyRequest);
|
|
27891
27909
|
localVarPath = "/sod-policies";
|
|
27892
27910
|
localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
27893
27911
|
if (configuration) {
|
|
@@ -27917,7 +27935,7 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
|
|
|
27917
27935
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
27918
27936
|
headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
27919
27937
|
localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
|
|
27920
|
-
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(
|
|
27938
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(sodPolicyRequest, localVarRequestOptions, configuration);
|
|
27921
27939
|
return [2 /*return*/, {
|
|
27922
27940
|
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
27923
27941
|
axiosOptions: localVarRequestOptions,
|
|
@@ -28596,11 +28614,11 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
|
|
|
28596
28614
|
* This updates a specified SOD policy. Requires role of ORG_ADMIN.
|
|
28597
28615
|
* @summary Update sod policy by id
|
|
28598
28616
|
* @param {string} id The ID of the SOD policy to update.
|
|
28599
|
-
* @param {
|
|
28617
|
+
* @param {SodPolicyRead} sodPolicyRead
|
|
28600
28618
|
* @param {*} [axiosOptions] Override http request option.
|
|
28601
28619
|
* @throws {RequiredError}
|
|
28602
28620
|
*/
|
|
28603
|
-
putSodPolicy: function (id,
|
|
28621
|
+
putSodPolicy: function (id, sodPolicyRead, axiosOptions) {
|
|
28604
28622
|
if (axiosOptions === void 0) { axiosOptions = {}; }
|
|
28605
28623
|
return __awaiter(_this, void 0, void 0, function () {
|
|
28606
28624
|
var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
|
|
@@ -28609,8 +28627,8 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
|
|
|
28609
28627
|
case 0:
|
|
28610
28628
|
// verify required parameter 'id' is not null or undefined
|
|
28611
28629
|
(0, common_1.assertParamExists)('putSodPolicy', 'id', id);
|
|
28612
|
-
// verify required parameter '
|
|
28613
|
-
(0, common_1.assertParamExists)('putSodPolicy', '
|
|
28630
|
+
// verify required parameter 'sodPolicyRead' is not null or undefined
|
|
28631
|
+
(0, common_1.assertParamExists)('putSodPolicy', 'sodPolicyRead', sodPolicyRead);
|
|
28614
28632
|
localVarPath = "/sod-policies/{id}"
|
|
28615
28633
|
.replace("{".concat("id", "}"), encodeURIComponent(String(id)));
|
|
28616
28634
|
localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
|
|
@@ -28641,7 +28659,7 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
|
|
|
28641
28659
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
28642
28660
|
headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
28643
28661
|
localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
|
|
28644
|
-
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(
|
|
28662
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(sodPolicyRead, localVarRequestOptions, configuration);
|
|
28645
28663
|
return [2 /*return*/, {
|
|
28646
28664
|
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
28647
28665
|
axiosOptions: localVarRequestOptions,
|
|
@@ -28821,17 +28839,17 @@ var SODPoliciesApiFp = function (configuration) {
|
|
|
28821
28839
|
/**
|
|
28822
28840
|
* This creates both General and Conflicting Access Based policy, with a limit of 50 entitlements for each (left & right) criteria for Conflicting Access Based SOD policy. Requires role of ORG_ADMIN.
|
|
28823
28841
|
* @summary Create sod policy
|
|
28824
|
-
* @param {
|
|
28842
|
+
* @param {SodPolicyRequest} sodPolicyRequest
|
|
28825
28843
|
* @param {*} [axiosOptions] Override http request option.
|
|
28826
28844
|
* @throws {RequiredError}
|
|
28827
28845
|
*/
|
|
28828
|
-
createSodPolicy: function (
|
|
28846
|
+
createSodPolicy: function (sodPolicyRequest, axiosOptions) {
|
|
28829
28847
|
var _a, _b, _c;
|
|
28830
28848
|
return __awaiter(this, void 0, void 0, function () {
|
|
28831
28849
|
var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
|
|
28832
28850
|
return __generator(this, function (_d) {
|
|
28833
28851
|
switch (_d.label) {
|
|
28834
|
-
case 0: return [4 /*yield*/, localVarAxiosParamCreator.createSodPolicy(
|
|
28852
|
+
case 0: return [4 /*yield*/, localVarAxiosParamCreator.createSodPolicy(sodPolicyRequest, axiosOptions)];
|
|
28835
28853
|
case 1:
|
|
28836
28854
|
localVarAxiosArgs = _d.sent();
|
|
28837
28855
|
localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
@@ -29128,17 +29146,17 @@ var SODPoliciesApiFp = function (configuration) {
|
|
|
29128
29146
|
* This updates a specified SOD policy. Requires role of ORG_ADMIN.
|
|
29129
29147
|
* @summary Update sod policy by id
|
|
29130
29148
|
* @param {string} id The ID of the SOD policy to update.
|
|
29131
|
-
* @param {
|
|
29149
|
+
* @param {SodPolicyRead} sodPolicyRead
|
|
29132
29150
|
* @param {*} [axiosOptions] Override http request option.
|
|
29133
29151
|
* @throws {RequiredError}
|
|
29134
29152
|
*/
|
|
29135
|
-
putSodPolicy: function (id,
|
|
29153
|
+
putSodPolicy: function (id, sodPolicyRead, axiosOptions) {
|
|
29136
29154
|
var _a, _b, _c;
|
|
29137
29155
|
return __awaiter(this, void 0, void 0, function () {
|
|
29138
29156
|
var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
|
|
29139
29157
|
return __generator(this, function (_d) {
|
|
29140
29158
|
switch (_d.label) {
|
|
29141
|
-
case 0: return [4 /*yield*/, localVarAxiosParamCreator.putSodPolicy(id,
|
|
29159
|
+
case 0: return [4 /*yield*/, localVarAxiosParamCreator.putSodPolicy(id, sodPolicyRead, axiosOptions)];
|
|
29142
29160
|
case 1:
|
|
29143
29161
|
localVarAxiosArgs = _d.sent();
|
|
29144
29162
|
localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
@@ -29235,7 +29253,7 @@ var SODPoliciesApiFactory = function (configuration, basePath, axios) {
|
|
|
29235
29253
|
* @throws {RequiredError}
|
|
29236
29254
|
*/
|
|
29237
29255
|
createSodPolicy: function (requestParameters, axiosOptions) {
|
|
29238
|
-
return localVarFp.createSodPolicy(requestParameters.
|
|
29256
|
+
return localVarFp.createSodPolicy(requestParameters.sodPolicyRequest, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
29239
29257
|
},
|
|
29240
29258
|
/**
|
|
29241
29259
|
* This deletes a specified SOD policy. Requires role of ORG_ADMIN.
|
|
@@ -29365,7 +29383,7 @@ var SODPoliciesApiFactory = function (configuration, basePath, axios) {
|
|
|
29365
29383
|
* @throws {RequiredError}
|
|
29366
29384
|
*/
|
|
29367
29385
|
putSodPolicy: function (requestParameters, axiosOptions) {
|
|
29368
|
-
return localVarFp.putSodPolicy(requestParameters.id, requestParameters.
|
|
29386
|
+
return localVarFp.putSodPolicy(requestParameters.id, requestParameters.sodPolicyRead, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
29369
29387
|
},
|
|
29370
29388
|
/**
|
|
29371
29389
|
* Runs the scheduled report for the policy retrieved by passed policy ID. The report schedule is fetched from the policy retrieved by ID.
|
|
@@ -29422,7 +29440,7 @@ var SODPoliciesApi = /** @class */ (function (_super) {
|
|
|
29422
29440
|
*/
|
|
29423
29441
|
SODPoliciesApi.prototype.createSodPolicy = function (requestParameters, axiosOptions) {
|
|
29424
29442
|
var _this = this;
|
|
29425
|
-
return (0, exports.SODPoliciesApiFp)(this.configuration).createSodPolicy(requestParameters.
|
|
29443
|
+
return (0, exports.SODPoliciesApiFp)(this.configuration).createSodPolicy(requestParameters.sodPolicyRequest, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
29426
29444
|
};
|
|
29427
29445
|
/**
|
|
29428
29446
|
* This deletes a specified SOD policy. Requires role of ORG_ADMIN.
|
|
@@ -29578,7 +29596,7 @@ var SODPoliciesApi = /** @class */ (function (_super) {
|
|
|
29578
29596
|
*/
|
|
29579
29597
|
SODPoliciesApi.prototype.putSodPolicy = function (requestParameters, axiosOptions) {
|
|
29580
29598
|
var _this = this;
|
|
29581
|
-
return (0, exports.SODPoliciesApiFp)(this.configuration).putSodPolicy(requestParameters.id, requestParameters.
|
|
29599
|
+
return (0, exports.SODPoliciesApiFp)(this.configuration).putSodPolicy(requestParameters.id, requestParameters.sodPolicyRead, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
29582
29600
|
};
|
|
29583
29601
|
/**
|
|
29584
29602
|
* Runs the scheduled report for the policy retrieved by passed policy ID. The report schedule is fetched from the policy retrieved by ID.
|