sailpoint-api-client 1.6.4 → 1.6.6

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/v3/api.js CHANGED
@@ -78,16 +78,16 @@ var __importDefault = (this && this.__importDefault) || function (mod) {
78
78
  return (mod && mod.__esModule) ? mod : { "default": mod };
79
79
  };
80
80
  Object.defineProperty(exports, "__esModule", { value: true });
81
- exports.CampaignAlertLevelV3 = exports.CampaignMandatoryCommentRequirementV3 = exports.CampaignCorrelatedStatusV3 = exports.CampaignStatusV3 = exports.CampaignTypeV3 = exports.BulkAddTaggedObjectOperationV3 = exports.BucketType = exports.BeforeProvisioningRuleDtoTypeV3 = exports.BaseAccessOwnerTypeV3 = exports.BackupResponseCloudStorageStatusV3 = exports.BackupResponseHydrationStatusV3 = exports.BackupResponseBackupTypeV3 = exports.BackupResponseTypeV3 = exports.BackupResponseStatusV3 = exports.BackupOptionsIncludeTypesV3 = exports.AuthUserCapabilitiesV3 = exports.AttributeDefinitionType = exports.AttributeDefinitionSchemaTypeV3 = exports.ApprovalStatusDtoOriginalOwnerTypeV3 = exports.ApprovalStatusDtoCurrentOwnerTypeV3 = exports.ApprovalStatus = exports.ApprovalSchemeForRoleApproverTypeV3 = exports.ApprovalScheme = exports.AggregationType = exports.AdminReviewReassignReassignToTypeV3 = exports.ActivityInsightsUsageDaysStateV3 = exports.AccountAllOfSourceOwnerTypeV3 = exports.AccountAllOfRecommendationMethodV3 = exports.AccountAllOfRecommendationTypeV3 = exports.AccountAllOfIdentityTypeV3 = exports.AccountActivityItemOperation = exports.AccountActivityApprovalStatus = exports.AccountActionActionV3 = exports.AccountOriginV3 = exports.AccessType = exports.AccessRequestType = exports.AccessRequestPhasesResultV3 = exports.AccessRequestPhasesStateV3 = exports.AccessRequestItemTypeV3 = exports.AccessProfileUsageUsedByInnerTypeV3 = exports.AccessProfileSourceRefTypeV3 = exports.AccessProfileRefTypeV3 = exports.AccessProfileApprovalSchemeApproverTypeV3 = exports.AccessItemReviewedByTypeV3 = exports.AccessItemRequesterTypeV3 = exports.AccessItemRequestedForTypeV3 = exports.AccessCriteriaCriteriaListInnerTypeV3 = exports.AccessConstraintOperatorV3 = exports.AccessConstraintTypeV3 = exports.AccessAppsOwnerTypeV3 = void 0;
82
- exports.GetCampaign200ResponseMandatoryCommentRequirementV3 = exports.GetCampaign200ResponseCorrelatedStatusV3 = exports.GetCampaign200ResponseStatusV3 = exports.GetCampaign200ResponseTypeV3 = exports.GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = exports.GetActiveCampaigns200ResponseInnerCorrelatedStatusV3 = exports.GetActiveCampaigns200ResponseInnerStatusV3 = exports.GetActiveCampaigns200ResponseInnerTypeV3 = exports.FilterType = exports.FederationProtocolDetailsRoleV3 = exports.ExpressionChildrenInnerOperatorV3 = exports.ExpressionOperatorV3 = exports.ExecutionStatus = exports.ExceptionCriteriaCriteriaListInnerTypeV3 = exports.EntitlementRef1TypeV3 = exports.EntitlementRefTypeV3 = exports.EntitlementOwnerTypeV3 = exports.DtoType = exports.DocumentType = exports.DimensionRefTypeV3 = exports.DependantConnectionsMissingDtoDependencyTypeV3 = exports.DeleteSource202ResponseTypeV3 = exports.DateCompareOperatorV3 = exports.CriteriaType = exports.ConnectorDetailStatusV3 = exports.CompletionStatus = exports.CompletedApprovalState = exports.CommentDtoAuthorTypeV3 = exports.ClientType = exports.CertificationTaskStatusV3 = exports.CertificationTaskTargetTypeV3 = exports.CertificationTaskTypeV3 = exports.CertificationReferenceTypeV3 = exports.CertificationPhase = exports.CertificationDecision = exports.CampaignTemplateOwnerRefTypeV3 = exports.CampaignReportStatusV3 = exports.CampaignReportTypeV3 = exports.CampaignReferenceMandatoryCommentRequirementV3 = exports.CampaignReferenceCorrelatedStatusV3 = exports.CampaignReferenceCampaignTypeV3 = exports.CampaignReferenceTypeV3 = exports.CampaignFilterDetailsModeV3 = exports.CampaignCompleteOptionsAutoCompleteActionV3 = exports.CampaignAllOfSourcesWithOrphanEntitlementsTypeV3 = exports.CampaignAllOfSearchCampaignInfoReviewerTypeV3 = exports.CampaignAllOfSearchCampaignInfoTypeV3 = exports.CampaignAllOfRoleCompositionCampaignInfoRemediatorRefTypeV3 = exports.CampaignAllOfMachineAccountCampaignInfoReviewerTypeV3 = exports.CampaignAllOfFilterTypeV3 = void 0;
83
- exports.ReassignmentType = exports.ReassignmentReferenceTypeV3 = exports.ReassignReferenceTypeV3 = exports.QueryType = exports.PublicIdentityIdentityStateV3 = exports.ProvisioningState = exports.ProvisioningCriteriaOperation = exports.PreApprovalTriggerDetailsDecisionV3 = exports.PendingApprovalOwnerTypeV3 = exports.PendingApprovalAction = exports.PatOwnerTypeV3 = exports.PasswordStatusStateV3 = exports.PasswordChangeResponseStateV3 = exports.OwnerReferenceSegmentsTypeV3 = exports.OwnerReferenceTypeV3 = exports.OwnerDtoTypeV3 = exports.OrphanIdentitiesReportArgumentsSelectedFormatsV3 = exports.Operation = exports.ObjectMappingResponseObjectTypeV3 = exports.ObjectMappingRequestObjectTypeV3 = exports.NonEmployeeSchemaAttributeType = exports.NonEmployeeIdentityDtoType = exports.NonEmployeeBulkUploadStatusStatusV3 = exports.NonEmployeeBulkUploadJobStatusV3 = exports.NamedConstructs = exports.MfaConfigTestResponseStateV3 = exports.MetricType = exports.ManualWorkItemState = exports.ManualWorkItemDetailsOriginalOwnerTypeV3 = exports.ManualWorkItemDetailsCurrentOwnerTypeV3 = exports.ManagedClusterTypes = exports.ManagedClusterStatusV3 = exports.ManagedClientType = exports.ManagedClientStatusCode = exports.ManagedClientProvisionStatusV3 = exports.ManagedClientClusterTypeV3 = exports.ManagedClientStatusV3 = exports.LocaleOrigin = exports.LifecyclestateDeletedTypeV3 = exports.KbaAuthResponseStatusV3 = exports.JsonPatchOperationOpV3 = exports.Index = exports.ImportObjectTypeV3 = exports.IdpDetailsRoleV3 = exports.IdentityWithNewAccessAccessRefsInnerTypeV3 = exports.IdentityProfileExportedObjectSelfTypeV3 = exports.IdentityProfileAllOfOwnerTypeV3 = exports.IdentityProfileAllOfAuthoritativeSourceTypeV3 = exports.IdentityPreviewResponseIdentityTypeV3 = exports.GrantType = void 0;
84
- exports.SodReportResultDtoTypeV3 = exports.SodRecipientTypeV3 = exports.SodPolicyOwnerRefTypeV3 = exports.SodPolicyDtoTypeV3 = exports.SodPolicyTypeV3 = exports.SodPolicyStateV3 = exports.SlimCampaignCorrelatedStatusV3 = exports.SlimCampaignStatusV3 = exports.SlimCampaignTypeV3 = exports.ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = exports.ServiceDeskSourceTypeV3 = exports.SendTokenResponseStatusV3 = exports.SendTokenRequestDeliveryTypeV3 = exports.SelectorType = exports.SearchScheduleRecipientsInnerTypeV3 = exports.SearchFilterType = exports.SchemaFeaturesV3 = exports.ScheduledSearchAllOfOwnerTypeV3 = exports.ScheduledAttributesFrequencyV3 = exports.ScheduleType = exports.ScheduleMonthsTypeV3 = exports.ScheduleHoursTypeV3 = exports.ScheduleDaysTypeV3 = exports.ScheduleTypeV3 = exports.RoleMembershipSelectorType = exports.RoleCriteriaOperation = exports.RoleCriteriaKeyType = exports.RoleAssignmentSourceType = exports.ReviewerTypeV3 = exports.ReviewableEntitlementAccountOwnerTypeV3 = exports.RequestedItemStatusSodViolationContextStateV3 = exports.RequestedItemStatusRequestedForTypeV3 = exports.RequestedItemStatusRequestState = exports.RequestedItemStatusPreApprovalTriggerDetailsDecisionV3 = exports.RequestedItemStatusTypeV3 = exports.RequestedItemDtoRefTypeV3 = exports.RequestedItemDetailsTypeV3 = exports.RequestableObjectType = exports.RequestableObjectRequestStatus = exports.RequestableObjectReferenceTypeV3 = exports.ReportType = exports.ReportResultsAvailableFormatsV3 = exports.ReportResultsStatusV3 = exports.ReportResultsReportTypeV3 = exports.ReportResultReferenceStatusV3 = exports.ReportResultReferenceTypeV3 = exports.ReportDetailsArgumentsSelectedFormatsV3 = exports.ReportDetailsReportTypeV3 = exports.RecommendationMethodV3 = exports.RecommendationTypeV3 = void 0;
85
- exports.AccessProfilesApiAxiosParamCreator = exports.WorkflowTriggerAttributesFrequencyV3 = exports.WorkflowTriggerTypeV3 = exports.WorkflowModifiedByTypeV3 = exports.WorkflowLibraryTriggerTypeV3 = exports.WorkflowLibraryFormFieldsTypeV3 = exports.WorkflowExecutionEventTypeV3 = exports.WorkflowExecutionStatusV3 = exports.WorkflowBodyOwnerTypeV3 = exports.WorkflowAllOfCreatorTypeV3 = exports.WorkItemTypeManualWorkItems = exports.WorkItemStateManualWorkItems = exports.WorkItemState = exports.ViolationOwnerAssignmentConfigOwnerRefTypeV3 = exports.ViolationOwnerAssignmentConfigAssignmentRuleV3 = exports.ViolationContextPolicyTypeV3 = exports.VerificationResponseStatusV3 = exports.V3CreateConnectorDtoStatusV3 = exports.V3ConnectorDtoStatusV3 = exports.UsageType = exports.UpdateDetailStatusV3 = exports.UncorrelatedAccountsReportArgumentsSelectedFormatsV3 = exports.TransformReadTypeV3 = exports.TransformTypeV3 = exports.TokenAuthResponseStatusV3 = exports.TokenAuthRequestDeliveryTypeV3 = exports.TaskResultSimplifiedCompletionStatusV3 = exports.TaskResultDtoTypeV3 = exports.TaskResultDetailsMessagesInnerTypeV3 = exports.TaskResultDetailsCompletionStatusV3 = exports.TaskResultDetailsReportTypeV3 = exports.TaskResultDetailsTypeV3 = exports.TaggedObjectDtoTypeV3 = exports.StandardLevel = exports.SpDetailsRoleV3 = exports.SourceUsageStatusStatusV3 = exports.SourceSchemasInnerTypeV3 = exports.SourcePasswordPoliciesInnerTypeV3 = exports.SourceOwnerTypeV3 = exports.SourceManagerCorrelationRuleTypeV3 = exports.SourceManagementWorkgroupTypeV3 = exports.SourceHealthDtoStatusV3 = exports.SourceClusterDtoTypeV3 = exports.SourceClusterTypeV3 = exports.SourceBeforeProvisioningRuleTypeV3 = exports.SourceAccountCorrelationRuleTypeV3 = exports.SourceAccountCorrelationConfigTypeV3 = exports.SourceStatusV3 = exports.SourceFeaturesV3 = exports.SodViolationContextCheckCompletedStateV3 = void 0;
86
- exports.CertificationSummariesApiFactory = exports.CertificationSummariesApiFp = exports.CertificationSummariesApiAxiosParamCreator = exports.GetCampaignDetailV3 = exports.GetActiveCampaignsDetailV3 = exports.CertificationCampaignsApi = exports.CertificationCampaignsApiFactory = exports.CertificationCampaignsApiFp = exports.CertificationCampaignsApiAxiosParamCreator = exports.CertificationCampaignFiltersApi = exports.CertificationCampaignFiltersApiFactory = exports.CertificationCampaignFiltersApiFp = exports.CertificationCampaignFiltersApiAxiosParamCreator = exports.BrandingApi = exports.BrandingApiFactory = exports.BrandingApiFp = exports.BrandingApiAxiosParamCreator = exports.AuthUsersApi = exports.AuthUsersApiFactory = exports.AuthUsersApiFp = exports.AuthUsersApiAxiosParamCreator = exports.GetDiscoveredApplicationsDetailV3 = exports.ApplicationDiscoveryApi = exports.ApplicationDiscoveryApiFactory = exports.ApplicationDiscoveryApiFp = exports.ApplicationDiscoveryApiAxiosParamCreator = exports.ListAccountsDetailLevelV3 = exports.AccountsApi = exports.AccountsApiFactory = exports.AccountsApiFp = exports.AccountsApiAxiosParamCreator = exports.AccountUsagesApi = exports.AccountUsagesApiFactory = exports.AccountUsagesApiFp = exports.AccountUsagesApiAxiosParamCreator = exports.AccountActivitiesApi = exports.AccountActivitiesApiFactory = exports.AccountActivitiesApiFp = exports.AccountActivitiesApiAxiosParamCreator = exports.AccessRequestsApi = exports.AccessRequestsApiFactory = exports.AccessRequestsApiFp = exports.AccessRequestsApiAxiosParamCreator = exports.AccessRequestApprovalsApi = exports.AccessRequestApprovalsApiFactory = exports.AccessRequestApprovalsApiFp = exports.AccessRequestApprovalsApiAxiosParamCreator = exports.AccessProfilesApi = exports.AccessProfilesApiFactory = exports.AccessProfilesApiFp = void 0;
87
- exports.NonEmployeeLifecycleManagementApiAxiosParamCreator = exports.ManagedClustersApi = exports.ManagedClustersApiFactory = exports.ManagedClustersApiFp = exports.ManagedClustersApiAxiosParamCreator = exports.ManagedClientsApi = exports.ManagedClientsApiFactory = exports.ManagedClientsApiFp = exports.ManagedClientsApiAxiosParamCreator = exports.PingVerificationStatusMethodV3 = exports.MFAControllerApi = exports.MFAControllerApiFactory = exports.MFAControllerApiFp = exports.MFAControllerApiAxiosParamCreator = exports.TestMFAConfigMethodV3 = exports.DeleteMFAConfigMethodV3 = exports.MFAConfigurationApi = exports.MFAConfigurationApiFactory = exports.MFAConfigurationApiFp = exports.MFAConfigurationApiAxiosParamCreator = exports.LifecycleStatesApi = exports.LifecycleStatesApiFactory = exports.LifecycleStatesApiFp = exports.LifecycleStatesApiAxiosParamCreator = exports.IdentityProfilesApi = exports.IdentityProfilesApiFactory = exports.IdentityProfilesApiFp = exports.IdentityProfilesApiAxiosParamCreator = exports.GlobalTenantSecuritySettingsApi = exports.GlobalTenantSecuritySettingsApiFactory = exports.GlobalTenantSecuritySettingsApiFp = exports.GlobalTenantSecuritySettingsApiAxiosParamCreator = exports.PutConnectorTranslationsLocaleV3 = exports.GetConnectorTranslationsLocaleV3 = exports.GetConnectorListLocaleV3 = exports.GetConnectorLocaleV3 = exports.ConnectorsApi = exports.ConnectorsApiFactory = exports.ConnectorsApiFp = exports.ConnectorsApiAxiosParamCreator = exports.ConfigurationHubApi = exports.ConfigurationHubApiFactory = exports.ConfigurationHubApiFp = exports.ConfigurationHubApiAxiosParamCreator = exports.CertificationsApi = exports.CertificationsApiFactory = exports.CertificationsApiFp = exports.CertificationsApiAxiosParamCreator = exports.GetIdentityAccessSummariesTypeV3 = exports.CertificationSummariesApi = void 0;
88
- exports.RolesApiAxiosParamCreator = exports.ListRequestableObjectsTypesV3 = exports.RequestableObjectsApi = exports.RequestableObjectsApiFactory = exports.RequestableObjectsApiFp = exports.RequestableObjectsApiAxiosParamCreator = exports.GetReportFileFormatV3 = exports.ReportsDataExtractionApi = exports.ReportsDataExtractionApiFactory = exports.ReportsDataExtractionApiFp = exports.ReportsDataExtractionApiAxiosParamCreator = exports.PublicIdentitiesConfigApi = exports.PublicIdentitiesConfigApiFactory = exports.PublicIdentitiesConfigApiFp = exports.PublicIdentitiesConfigApiAxiosParamCreator = exports.PublicIdentitiesApi = exports.PublicIdentitiesApiFactory = exports.PublicIdentitiesApiFp = exports.PublicIdentitiesApiAxiosParamCreator = exports.PersonalAccessTokensApi = exports.PersonalAccessTokensApiFactory = exports.PersonalAccessTokensApiFp = exports.PersonalAccessTokensApiAxiosParamCreator = exports.PasswordSyncGroupsApi = exports.PasswordSyncGroupsApiFactory = exports.PasswordSyncGroupsApiFp = exports.PasswordSyncGroupsApiAxiosParamCreator = exports.PasswordPoliciesApi = exports.PasswordPoliciesApiFactory = exports.PasswordPoliciesApiFp = exports.PasswordPoliciesApiAxiosParamCreator = exports.PasswordManagementApi = exports.PasswordManagementApiFactory = exports.PasswordManagementApiFp = exports.PasswordManagementApiAxiosParamCreator = exports.PasswordDictionaryApi = exports.PasswordDictionaryApiFactory = exports.PasswordDictionaryApiFp = exports.PasswordDictionaryApiAxiosParamCreator = exports.PasswordConfigurationApi = exports.PasswordConfigurationApiFactory = exports.PasswordConfigurationApiFp = exports.PasswordConfigurationApiAxiosParamCreator = exports.OAuthClientsApi = exports.OAuthClientsApiFactory = exports.OAuthClientsApiFp = exports.OAuthClientsApiAxiosParamCreator = exports.NonEmployeeLifecycleManagementApi = exports.NonEmployeeLifecycleManagementApiFactory = exports.NonEmployeeLifecycleManagementApiFp = void 0;
89
- exports.DeleteTaggedObjectTypeV3 = exports.TaggedObjectsApi = exports.TaggedObjectsApiFactory = exports.TaggedObjectsApiFp = exports.TaggedObjectsApiAxiosParamCreator = exports.GetSourceSchemasIncludeTypesV3 = exports.SourcesApi = exports.SourcesApiFactory = exports.SourcesApiFp = exports.SourcesApiAxiosParamCreator = exports.SourceUsagesApi = exports.SourceUsagesApiFactory = exports.SourceUsagesApiFp = exports.SourceUsagesApiAxiosParamCreator = exports.ServiceDeskIntegrationApi = exports.ServiceDeskIntegrationApiFactory = exports.ServiceDeskIntegrationApiFp = exports.ServiceDeskIntegrationApiAxiosParamCreator = exports.SegmentsApi = exports.SegmentsApiFactory = exports.SegmentsApiFp = exports.SegmentsApiAxiosParamCreator = exports.SearchAttributeConfigurationApi = exports.SearchAttributeConfigurationApiFactory = exports.SearchAttributeConfigurationApiFp = exports.SearchAttributeConfigurationApiAxiosParamCreator = exports.SearchGetIndexV3 = exports.SearchApi = exports.SearchApiFactory = exports.SearchApiFp = exports.SearchApiAxiosParamCreator = exports.ScheduledSearchApi = exports.ScheduledSearchApiFactory = exports.ScheduledSearchApiFp = exports.ScheduledSearchApiAxiosParamCreator = exports.SavedSearchApi = exports.SavedSearchApiFactory = exports.SavedSearchApiFp = exports.SavedSearchApiAxiosParamCreator = exports.SODViolationsApi = exports.SODViolationsApiFactory = exports.SODViolationsApiFp = exports.SODViolationsApiAxiosParamCreator = exports.SODPoliciesApi = exports.SODPoliciesApiFactory = exports.SODPoliciesApiFp = exports.SODPoliciesApiAxiosParamCreator = exports.RolesApi = exports.RolesApiFactory = exports.RolesApiFp = void 0;
90
- exports.WorkflowsApi = exports.WorkflowsApiFactory = exports.WorkflowsApiFp = exports.WorkflowsApiAxiosParamCreator = exports.WorkItemsApi = exports.WorkItemsApiFactory = exports.WorkItemsApiFp = exports.WorkItemsApiAxiosParamCreator = exports.VendorConnectorMappingsApi = exports.VendorConnectorMappingsApiFactory = exports.VendorConnectorMappingsApiFp = exports.VendorConnectorMappingsApiAxiosParamCreator = exports.TransformsApi = exports.TransformsApiFactory = exports.TransformsApiFp = exports.TransformsApiAxiosParamCreator = exports.PutTaggedObjectTypeV3 = exports.ListTaggedObjectsByTypeTypeV3 = exports.GetTaggedObjectTypeV3 = void 0;
81
+ exports.CampaignMandatoryCommentRequirementV3 = exports.CampaignCorrelatedStatusV3 = exports.CampaignStatusV3 = exports.CampaignTypeV3 = exports.BulkAddTaggedObjectOperationV3 = exports.BucketType = exports.BeforeProvisioningRuleDtoTypeV3 = exports.BaseAccessOwnerTypeV3 = exports.BackupResponseCloudStorageStatusV3 = exports.BackupResponseHydrationStatusV3 = exports.BackupResponseBackupTypeV3 = exports.BackupResponseTypeV3 = exports.BackupResponseStatusV3 = exports.BackupOptionsIncludeTypesV3 = exports.AuthUserCapabilitiesV3 = exports.AttributeDefinitionType = exports.AttributeDefinitionSchemaTypeV3 = exports.ApprovalStatusDtoOriginalOwnerTypeV3 = exports.ApprovalStatusDtoCurrentOwnerTypeV3 = exports.ApprovalStatus = exports.ApprovalSchemeForRoleApproverTypeV3 = exports.ApprovalScheme = exports.AggregationType = exports.AdminReviewReassignReassignToTypeV3 = exports.ActivityInsightsUsageDaysStateV3 = exports.AccountAllOfSourceOwnerTypeV3 = exports.AccountAllOfRecommendationMethodV3 = exports.AccountAllOfRecommendationTypeV3 = exports.AccountAllOfIdentityTypeV3 = exports.AccountActivityItemOperation = exports.AccountActivityApprovalStatus = exports.AccountActionActionV3 = exports.AccountOriginV3 = exports.AccessType = exports.AccessRequestType = exports.AccessRequestPhasesResultV3 = exports.AccessRequestPhasesStateV3 = exports.AccessRequestItemTypeV3 = exports.AccessProfileUsageUsedByInnerTypeV3 = exports.AccessProfileSourceRefTypeV3 = exports.AccessProfileRefTypeV3 = exports.AccessProfileApprovalSchemeApproverTypeV3 = exports.AccessItemReviewedByTypeV3 = exports.AccessItemRequesterTypeV3 = exports.AccessItemRequestedForTypeV3 = exports.AccessCriteriaRequestCriteriaListInnerTypeV3 = exports.AccessCriteriaCriteriaListInnerTypeV3 = exports.AccessConstraintOperatorV3 = exports.AccessConstraintTypeV3 = exports.AccessAppsOwnerTypeV3 = void 0;
82
+ exports.GetCampaign200ResponseCorrelatedStatusV3 = exports.GetCampaign200ResponseStatusV3 = exports.GetCampaign200ResponseTypeV3 = exports.GetActiveCampaigns200ResponseInnerMandatoryCommentRequirementV3 = exports.GetActiveCampaigns200ResponseInnerCorrelatedStatusV3 = exports.GetActiveCampaigns200ResponseInnerStatusV3 = exports.GetActiveCampaigns200ResponseInnerTypeV3 = exports.FilterType = exports.FederationProtocolDetailsRoleV3 = exports.ExpressionChildrenInnerOperatorV3 = exports.ExpressionOperatorV3 = exports.ExecutionStatus = exports.ExceptionCriteriaCriteriaListInnerTypeV3 = exports.EntitlementRef1TypeV3 = exports.EntitlementRefTypeV3 = exports.EntitlementOwnerTypeV3 = exports.DtoType = exports.DocumentType = exports.DimensionRefTypeV3 = exports.DependantConnectionsMissingDtoDependencyTypeV3 = exports.DeleteSource202ResponseTypeV3 = exports.DateCompareOperatorV3 = exports.CriteriaType = exports.ConnectorDetailStatusV3 = exports.CompletionStatus = exports.CompletedApprovalState = exports.CommentDtoAuthorTypeV3 = exports.ClientType = exports.CertificationTaskStatusV3 = exports.CertificationTaskTargetTypeV3 = exports.CertificationTaskTypeV3 = exports.CertificationReferenceTypeV3 = exports.CertificationPhase = exports.CertificationDecision = exports.CampaignTemplateOwnerRefTypeV3 = exports.CampaignReportStatusV3 = exports.CampaignReportTypeV3 = exports.CampaignReferenceMandatoryCommentRequirementV3 = exports.CampaignReferenceCorrelatedStatusV3 = exports.CampaignReferenceCampaignTypeV3 = exports.CampaignReferenceTypeV3 = exports.CampaignFilterDetailsModeV3 = exports.CampaignCompleteOptionsAutoCompleteActionV3 = exports.CampaignAllOfSourcesWithOrphanEntitlementsTypeV3 = exports.CampaignAllOfSearchCampaignInfoReviewerTypeV3 = exports.CampaignAllOfSearchCampaignInfoTypeV3 = exports.CampaignAllOfRoleCompositionCampaignInfoRemediatorRefTypeV3 = exports.CampaignAllOfMachineAccountCampaignInfoReviewerTypeV3 = exports.CampaignAllOfFilterTypeV3 = exports.CampaignAlertLevelV3 = void 0;
83
+ exports.ReassignmentReferenceTypeV3 = exports.ReassignReferenceTypeV3 = exports.QueryType = exports.PublicIdentityIdentityStateV3 = exports.ProvisioningState = exports.ProvisioningCriteriaOperation = exports.PreApprovalTriggerDetailsDecisionV3 = exports.PendingApprovalOwnerTypeV3 = exports.PendingApprovalAction = exports.PatOwnerTypeV3 = exports.PasswordStatusStateV3 = exports.PasswordChangeResponseStateV3 = exports.OwnerReferenceSegmentsTypeV3 = exports.OwnerReferenceTypeV3 = exports.OwnerDtoTypeV3 = exports.OrphanIdentitiesReportArgumentsSelectedFormatsV3 = exports.Operation = exports.ObjectMappingResponseObjectTypeV3 = exports.ObjectMappingRequestObjectTypeV3 = exports.NonEmployeeSchemaAttributeType = exports.NonEmployeeIdentityDtoType = exports.NonEmployeeBulkUploadStatusStatusV3 = exports.NonEmployeeBulkUploadJobStatusV3 = exports.NamedConstructs = exports.MfaConfigTestResponseStateV3 = exports.MetricType = exports.ManualWorkItemState = exports.ManualWorkItemDetailsOriginalOwnerTypeV3 = exports.ManualWorkItemDetailsCurrentOwnerTypeV3 = exports.ManagedClusterTypes = exports.ManagedClusterStatusV3 = exports.ManagedClientType = exports.ManagedClientStatusCode = exports.ManagedClientProvisionStatusV3 = exports.ManagedClientClusterTypeV3 = exports.ManagedClientStatusV3 = exports.LocaleOrigin = exports.LifecyclestateDeletedTypeV3 = exports.KbaAuthResponseStatusV3 = exports.JsonPatchOperationOpV3 = exports.Index = exports.ImportObjectTypeV3 = exports.IdpDetailsRoleV3 = exports.IdentityWithNewAccessAccessRefsInnerTypeV3 = exports.IdentityProfileExportedObjectSelfTypeV3 = exports.IdentityProfileAllOfOwnerTypeV3 = exports.IdentityProfileAllOfAuthoritativeSourceTypeV3 = exports.IdentityPreviewResponseIdentityTypeV3 = exports.GrantType = exports.GetCampaign200ResponseMandatoryCommentRequirementV3 = void 0;
84
+ exports.SodPolicyReadStateV3 = exports.SodPolicyOwnerRefTypeV3 = exports.SodPolicyDtoTypeV3 = exports.SodPolicyTypeV3 = exports.SodPolicyStateV3 = exports.SlimCampaignCorrelatedStatusV3 = exports.SlimCampaignStatusV3 = exports.SlimCampaignTypeV3 = exports.ServiceProviderConfigurationFederationProtocolDetailsInnerRoleV3 = exports.ServiceDeskSourceTypeV3 = exports.SendTokenResponseStatusV3 = exports.SendTokenRequestDeliveryTypeV3 = exports.SelectorType = exports.SearchScheduleRecipientsInnerTypeV3 = exports.SearchFilterType = exports.SchemaFeaturesV3 = exports.ScheduledSearchAllOfOwnerTypeV3 = exports.ScheduledAttributesFrequencyV3 = exports.ScheduleType = exports.ScheduleMonthsTypeV3 = exports.ScheduleHoursTypeV3 = exports.ScheduleDaysTypeV3 = exports.ScheduleTypeV3 = exports.RoleMembershipSelectorType = exports.RoleCriteriaOperation = exports.RoleCriteriaKeyType = exports.RoleAssignmentSourceType = exports.ReviewerTypeV3 = exports.ReviewableEntitlementAccountOwnerTypeV3 = exports.RequestedItemStatusSodViolationContextStateV3 = exports.RequestedItemStatusRequestedForTypeV3 = exports.RequestedItemStatusRequestState = exports.RequestedItemStatusPreApprovalTriggerDetailsDecisionV3 = exports.RequestedItemStatusTypeV3 = exports.RequestedItemDtoRefTypeV3 = exports.RequestedItemDetailsTypeV3 = exports.RequestableObjectType = exports.RequestableObjectRequestStatus = exports.RequestableObjectReferenceTypeV3 = exports.ReportType = exports.ReportResultsAvailableFormatsV3 = exports.ReportResultsStatusV3 = exports.ReportResultsReportTypeV3 = exports.ReportResultReferenceStatusV3 = exports.ReportResultReferenceTypeV3 = exports.ReportDetailsArgumentsSelectedFormatsV3 = exports.ReportDetailsReportTypeV3 = exports.RecommendationMethodV3 = exports.RecommendationTypeV3 = exports.ReassignmentType = void 0;
85
+ exports.WorkflowLibraryFormFieldsTypeV3 = exports.WorkflowExecutionEventTypeV3 = exports.WorkflowExecutionStatusV3 = exports.WorkflowBodyOwnerTypeV3 = exports.WorkflowAllOfCreatorTypeV3 = exports.WorkItemTypeManualWorkItems = exports.WorkItemStateManualWorkItems = exports.WorkItemState = exports.ViolationOwnerAssignmentConfigOwnerRefTypeV3 = exports.ViolationOwnerAssignmentConfigAssignmentRuleV3 = exports.ViolationContextPolicyTypeV3 = exports.VerificationResponseStatusV3 = exports.V3CreateConnectorDtoStatusV3 = exports.V3ConnectorDtoStatusV3 = exports.UsageType = exports.UpdateDetailStatusV3 = exports.UncorrelatedAccountsReportArgumentsSelectedFormatsV3 = exports.TransformReadTypeV3 = exports.TransformTypeV3 = exports.TokenAuthResponseStatusV3 = exports.TokenAuthRequestDeliveryTypeV3 = exports.TaskResultSimplifiedCompletionStatusV3 = exports.TaskResultDtoTypeV3 = exports.TaskResultDetailsMessagesInnerTypeV3 = exports.TaskResultDetailsCompletionStatusV3 = exports.TaskResultDetailsReportTypeV3 = exports.TaskResultDetailsTypeV3 = exports.TaggedObjectDtoTypeV3 = exports.StandardLevel = exports.SpDetailsRoleV3 = exports.SourceUsageStatusStatusV3 = exports.SourceSchemasInnerTypeV3 = exports.SourcePasswordPoliciesInnerTypeV3 = exports.SourceOwnerTypeV3 = exports.SourceManagerCorrelationRuleTypeV3 = exports.SourceManagementWorkgroupTypeV3 = exports.SourceHealthDtoStatusV3 = exports.SourceClusterDtoTypeV3 = exports.SourceClusterTypeV3 = exports.SourceBeforeProvisioningRuleTypeV3 = exports.SourceAccountCorrelationRuleTypeV3 = exports.SourceAccountCorrelationConfigTypeV3 = exports.SourceStatusV3 = exports.SourceFeaturesV3 = exports.SodViolationContextCheckCompletedStateV3 = exports.SodReportResultDtoTypeV3 = exports.SodRecipientTypeV3 = exports.SodPolicyRequestTypeV3 = exports.SodPolicyRequestStateV3 = exports.SodPolicyReadTypeV3 = void 0;
86
+ exports.CertificationCampaignsApi = exports.CertificationCampaignsApiFactory = exports.CertificationCampaignsApiFp = exports.CertificationCampaignsApiAxiosParamCreator = exports.CertificationCampaignFiltersApi = exports.CertificationCampaignFiltersApiFactory = exports.CertificationCampaignFiltersApiFp = exports.CertificationCampaignFiltersApiAxiosParamCreator = exports.BrandingApi = exports.BrandingApiFactory = exports.BrandingApiFp = exports.BrandingApiAxiosParamCreator = exports.AuthUsersApi = exports.AuthUsersApiFactory = exports.AuthUsersApiFp = exports.AuthUsersApiAxiosParamCreator = exports.GetDiscoveredApplicationsDetailV3 = exports.ApplicationDiscoveryApi = exports.ApplicationDiscoveryApiFactory = exports.ApplicationDiscoveryApiFp = exports.ApplicationDiscoveryApiAxiosParamCreator = exports.ListAccountsDetailLevelV3 = exports.AccountsApi = exports.AccountsApiFactory = exports.AccountsApiFp = exports.AccountsApiAxiosParamCreator = exports.AccountUsagesApi = exports.AccountUsagesApiFactory = exports.AccountUsagesApiFp = exports.AccountUsagesApiAxiosParamCreator = exports.AccountActivitiesApi = exports.AccountActivitiesApiFactory = exports.AccountActivitiesApiFp = exports.AccountActivitiesApiAxiosParamCreator = exports.AccessRequestsApi = exports.AccessRequestsApiFactory = exports.AccessRequestsApiFp = exports.AccessRequestsApiAxiosParamCreator = exports.AccessRequestApprovalsApi = exports.AccessRequestApprovalsApiFactory = exports.AccessRequestApprovalsApiFp = exports.AccessRequestApprovalsApiAxiosParamCreator = exports.AccessProfilesApi = exports.AccessProfilesApiFactory = exports.AccessProfilesApiFp = exports.AccessProfilesApiAxiosParamCreator = exports.WorkflowTriggerAttributesFrequencyV3 = exports.WorkflowTriggerTypeV3 = exports.WorkflowModifiedByTypeV3 = exports.WorkflowLibraryTriggerTypeV3 = void 0;
87
+ exports.ManagedClientsApi = exports.ManagedClientsApiFactory = exports.ManagedClientsApiFp = exports.ManagedClientsApiAxiosParamCreator = exports.PingVerificationStatusMethodV3 = exports.MFAControllerApi = exports.MFAControllerApiFactory = exports.MFAControllerApiFp = exports.MFAControllerApiAxiosParamCreator = exports.TestMFAConfigMethodV3 = exports.DeleteMFAConfigMethodV3 = exports.MFAConfigurationApi = exports.MFAConfigurationApiFactory = exports.MFAConfigurationApiFp = exports.MFAConfigurationApiAxiosParamCreator = exports.LifecycleStatesApi = exports.LifecycleStatesApiFactory = exports.LifecycleStatesApiFp = exports.LifecycleStatesApiAxiosParamCreator = exports.IdentityProfilesApi = exports.IdentityProfilesApiFactory = exports.IdentityProfilesApiFp = exports.IdentityProfilesApiAxiosParamCreator = exports.GlobalTenantSecuritySettingsApi = exports.GlobalTenantSecuritySettingsApiFactory = exports.GlobalTenantSecuritySettingsApiFp = exports.GlobalTenantSecuritySettingsApiAxiosParamCreator = exports.PutConnectorTranslationsLocaleV3 = exports.GetConnectorTranslationsLocaleV3 = exports.GetConnectorListLocaleV3 = exports.GetConnectorLocaleV3 = exports.ConnectorsApi = exports.ConnectorsApiFactory = exports.ConnectorsApiFp = exports.ConnectorsApiAxiosParamCreator = exports.ConfigurationHubApi = exports.ConfigurationHubApiFactory = exports.ConfigurationHubApiFp = exports.ConfigurationHubApiAxiosParamCreator = exports.CertificationsApi = exports.CertificationsApiFactory = exports.CertificationsApiFp = exports.CertificationsApiAxiosParamCreator = exports.GetIdentityAccessSummariesTypeV3 = exports.CertificationSummariesApi = exports.CertificationSummariesApiFactory = exports.CertificationSummariesApiFp = exports.CertificationSummariesApiAxiosParamCreator = exports.GetCampaignDetailV3 = exports.GetActiveCampaignsDetailV3 = void 0;
88
+ exports.RequestableObjectsApiAxiosParamCreator = exports.GetReportFileFormatV3 = exports.ReportsDataExtractionApi = exports.ReportsDataExtractionApiFactory = exports.ReportsDataExtractionApiFp = exports.ReportsDataExtractionApiAxiosParamCreator = exports.PublicIdentitiesConfigApi = exports.PublicIdentitiesConfigApiFactory = exports.PublicIdentitiesConfigApiFp = exports.PublicIdentitiesConfigApiAxiosParamCreator = exports.PublicIdentitiesApi = exports.PublicIdentitiesApiFactory = exports.PublicIdentitiesApiFp = exports.PublicIdentitiesApiAxiosParamCreator = exports.PersonalAccessTokensApi = exports.PersonalAccessTokensApiFactory = exports.PersonalAccessTokensApiFp = exports.PersonalAccessTokensApiAxiosParamCreator = exports.PasswordSyncGroupsApi = exports.PasswordSyncGroupsApiFactory = exports.PasswordSyncGroupsApiFp = exports.PasswordSyncGroupsApiAxiosParamCreator = exports.PasswordPoliciesApi = exports.PasswordPoliciesApiFactory = exports.PasswordPoliciesApiFp = exports.PasswordPoliciesApiAxiosParamCreator = exports.PasswordManagementApi = exports.PasswordManagementApiFactory = exports.PasswordManagementApiFp = exports.PasswordManagementApiAxiosParamCreator = exports.PasswordDictionaryApi = exports.PasswordDictionaryApiFactory = exports.PasswordDictionaryApiFp = exports.PasswordDictionaryApiAxiosParamCreator = exports.PasswordConfigurationApi = exports.PasswordConfigurationApiFactory = exports.PasswordConfigurationApiFp = exports.PasswordConfigurationApiAxiosParamCreator = exports.OAuthClientsApi = exports.OAuthClientsApiFactory = exports.OAuthClientsApiFp = exports.OAuthClientsApiAxiosParamCreator = exports.NonEmployeeLifecycleManagementApi = exports.NonEmployeeLifecycleManagementApiFactory = exports.NonEmployeeLifecycleManagementApiFp = exports.NonEmployeeLifecycleManagementApiAxiosParamCreator = exports.ManagedClustersApi = exports.ManagedClustersApiFactory = exports.ManagedClustersApiFp = exports.ManagedClustersApiAxiosParamCreator = void 0;
89
+ exports.GetSourceSchemasIncludeTypesV3 = exports.SourcesApi = exports.SourcesApiFactory = exports.SourcesApiFp = exports.SourcesApiAxiosParamCreator = exports.SourceUsagesApi = exports.SourceUsagesApiFactory = exports.SourceUsagesApiFp = exports.SourceUsagesApiAxiosParamCreator = exports.ServiceDeskIntegrationApi = exports.ServiceDeskIntegrationApiFactory = exports.ServiceDeskIntegrationApiFp = exports.ServiceDeskIntegrationApiAxiosParamCreator = exports.SegmentsApi = exports.SegmentsApiFactory = exports.SegmentsApiFp = exports.SegmentsApiAxiosParamCreator = exports.SearchAttributeConfigurationApi = exports.SearchAttributeConfigurationApiFactory = exports.SearchAttributeConfigurationApiFp = exports.SearchAttributeConfigurationApiAxiosParamCreator = exports.SearchGetIndexV3 = exports.SearchApi = exports.SearchApiFactory = exports.SearchApiFp = exports.SearchApiAxiosParamCreator = exports.ScheduledSearchApi = exports.ScheduledSearchApiFactory = exports.ScheduledSearchApiFp = exports.ScheduledSearchApiAxiosParamCreator = exports.SavedSearchApi = exports.SavedSearchApiFactory = exports.SavedSearchApiFp = exports.SavedSearchApiAxiosParamCreator = exports.SODViolationsApi = exports.SODViolationsApiFactory = exports.SODViolationsApiFp = exports.SODViolationsApiAxiosParamCreator = exports.SODPoliciesApi = exports.SODPoliciesApiFactory = exports.SODPoliciesApiFp = exports.SODPoliciesApiAxiosParamCreator = exports.RolesApi = exports.RolesApiFactory = exports.RolesApiFp = exports.RolesApiAxiosParamCreator = exports.ListRequestableObjectsTypesV3 = exports.RequestableObjectsApi = exports.RequestableObjectsApiFactory = exports.RequestableObjectsApiFp = void 0;
90
+ exports.WorkflowsApi = exports.WorkflowsApiFactory = exports.WorkflowsApiFp = exports.WorkflowsApiAxiosParamCreator = exports.WorkItemsApi = exports.WorkItemsApiFactory = exports.WorkItemsApiFp = exports.WorkItemsApiAxiosParamCreator = exports.VendorConnectorMappingsApi = exports.VendorConnectorMappingsApiFactory = exports.VendorConnectorMappingsApiFp = exports.VendorConnectorMappingsApiAxiosParamCreator = exports.TransformsApi = exports.TransformsApiFactory = exports.TransformsApiFp = exports.TransformsApiAxiosParamCreator = exports.PutTaggedObjectTypeV3 = exports.ListTaggedObjectsByTypeTypeV3 = exports.GetTaggedObjectTypeV3 = exports.DeleteTaggedObjectTypeV3 = exports.TaggedObjectsApi = exports.TaggedObjectsApiFactory = exports.TaggedObjectsApiFp = exports.TaggedObjectsApiAxiosParamCreator = void 0;
91
91
  var axios_1 = __importDefault(require("axios"));
92
92
  // Some imports not used depending on template conditions
93
93
  // @ts-ignore
@@ -109,6 +109,9 @@ exports.AccessConstraintOperatorV3 = {
109
109
  exports.AccessCriteriaCriteriaListInnerTypeV3 = {
110
110
  Entitlement: 'ENTITLEMENT'
111
111
  };
112
+ exports.AccessCriteriaRequestCriteriaListInnerTypeV3 = {
113
+ Entitlement: 'ENTITLEMENT'
114
+ };
112
115
  exports.AccessItemRequestedForTypeV3 = {
113
116
  Identity: 'IDENTITY'
114
117
  };
@@ -414,8 +417,7 @@ exports.CampaignAlertLevelV3 = {
414
417
  Info: 'INFO'
415
418
  };
416
419
  exports.CampaignAllOfFilterTypeV3 = {
417
- CampaignFilter: 'CAMPAIGN_FILTER',
418
- Rule: 'RULE'
420
+ CampaignFilter: 'CAMPAIGN_FILTER'
419
421
  };
420
422
  exports.CampaignAllOfMachineAccountCampaignInfoReviewerTypeV3 = {
421
423
  AccountOwner: 'ACCOUNT_OWNER'
@@ -1491,6 +1493,22 @@ exports.SodPolicyOwnerRefTypeV3 = {
1491
1493
  Identity: 'IDENTITY',
1492
1494
  GovernanceGroup: 'GOVERNANCE_GROUP'
1493
1495
  };
1496
+ exports.SodPolicyReadStateV3 = {
1497
+ Enforced: 'ENFORCED',
1498
+ NotEnforced: 'NOT_ENFORCED'
1499
+ };
1500
+ exports.SodPolicyReadTypeV3 = {
1501
+ General: 'GENERAL',
1502
+ ConflictingAccessBased: 'CONFLICTING_ACCESS_BASED'
1503
+ };
1504
+ exports.SodPolicyRequestStateV3 = {
1505
+ Enforced: 'ENFORCED',
1506
+ NotEnforced: 'NOT_ENFORCED'
1507
+ };
1508
+ exports.SodPolicyRequestTypeV3 = {
1509
+ General: 'GENERAL',
1510
+ ConflictingAccessBased: 'CONFLICTING_ACCESS_BASED'
1511
+ };
1494
1512
  exports.SodRecipientTypeV3 = {
1495
1513
  Identity: 'IDENTITY'
1496
1514
  };
@@ -3578,7 +3596,7 @@ var AccessRequestsApiAxiosParamCreator = function (configuration) {
3578
3596
  });
3579
3597
  },
3580
3598
  /**
3581
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
3599
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
3582
3600
  * @summary Submit access request
3583
3601
  * @param {AccessRequest} accessRequest
3584
3602
  * @param {*} [axiosOptions] Override http request option.
@@ -3690,7 +3708,7 @@ var AccessRequestsApiAxiosParamCreator = function (configuration) {
3690
3708
  * @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
3691
3709
  * @param {number} [limit] Max number of results to return.
3692
3710
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
3693
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *in* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
3711
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *eq, in, ge, gt, le, lt, ne, sw* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
3694
3712
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name**
3695
3713
  * @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
3696
3714
  * @param {*} [axiosOptions] Override http request option.
@@ -3857,7 +3875,7 @@ var AccessRequestsApiFp = function (configuration) {
3857
3875
  });
3858
3876
  },
3859
3877
  /**
3860
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
3878
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
3861
3879
  * @summary Submit access request
3862
3880
  * @param {AccessRequest} accessRequest
3863
3881
  * @param {*} [axiosOptions] Override http request option.
@@ -3911,7 +3929,7 @@ var AccessRequestsApiFp = function (configuration) {
3911
3929
  * @param {boolean} [count] If this is true, the *X-Total-Count* response header populates with the number of results that would be returned if limit and offset were ignored.
3912
3930
  * @param {number} [limit] Max number of results to return.
3913
3931
  * @param {number} [offset] Offset into the full result set. Usually specified with *limit* to paginate through the results. Defaults to 0 if not specified.
3914
- * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *in* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
3932
+ * @param {string} [filters] Filter results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#filtering-results) Filtering is supported for the following fields and operators: **accessRequestId**: *eq, in, ge, gt, le, lt, ne, sw* **accountActivityItemId**: *eq, in, ge, gt, le, lt, ne, isnull, sw* **created**: *eq, in, ge, gt, le, lt, ne, isnull, sw*
3915
3933
  * @param {string} [sorters] Sort results using the standard syntax described in [V3 API Standard Collection Parameters](https://developer.sailpoint.com/idn/api/standard-collection-parameters#sorting-results) Sorting is supported for the following fields: **created, modified, accountActivityItemId, name**
3916
3934
  * @param {string} [requestState] Filter the results by the state of the request. The only valid value is *EXECUTING*.
3917
3935
  * @param {*} [axiosOptions] Override http request option.
@@ -3977,7 +3995,7 @@ var AccessRequestsApiFactory = function (configuration, basePath, axios) {
3977
3995
  return localVarFp.cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then(function (request) { return request(axios, basePath); });
3978
3996
  },
3979
3997
  /**
3980
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
3998
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
3981
3999
  * @summary Submit access request
3982
4000
  * @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
3983
4001
  * @param {*} [axiosOptions] Override http request option.
@@ -4043,7 +4061,7 @@ var AccessRequestsApi = /** @class */ (function (_super) {
4043
4061
  return (0, exports.AccessRequestsApiFp)(this.configuration).cancelAccessRequest(requestParameters.cancelAccessRequest, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
4044
4062
  };
4045
4063
  /**
4046
- * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * While requesting entitlements, maximum of 25 entitlements and 10 recipients are allowed in a request. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
4064
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token’s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it doesn\'t return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It\'s best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
4047
4065
  * @summary Submit access request
4048
4066
  * @param {AccessRequestsApiCreateAccessRequestRequest} requestParameters Request parameters.
4049
4067
  * @param {*} [axiosOptions] Override http request option.
@@ -27875,19 +27893,19 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
27875
27893
  /**
27876
27894
  * This creates both General and Conflicting Access Based policy, with a limit of 50 entitlements for each (left & right) criteria for Conflicting Access Based SOD policy. Requires role of ORG_ADMIN.
27877
27895
  * @summary Create sod policy
27878
- * @param {SodPolicy} sodPolicy
27896
+ * @param {SodPolicyRequest} sodPolicyRequest
27879
27897
  * @param {*} [axiosOptions] Override http request option.
27880
27898
  * @throws {RequiredError}
27881
27899
  */
27882
- createSodPolicy: function (sodPolicy, axiosOptions) {
27900
+ createSodPolicy: function (sodPolicyRequest, axiosOptions) {
27883
27901
  if (axiosOptions === void 0) { axiosOptions = {}; }
27884
27902
  return __awaiter(_this, void 0, void 0, function () {
27885
27903
  var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
27886
27904
  return __generator(this, function (_a) {
27887
27905
  switch (_a.label) {
27888
27906
  case 0:
27889
- // verify required parameter 'sodPolicy' is not null or undefined
27890
- (0, common_1.assertParamExists)('createSodPolicy', 'sodPolicy', sodPolicy);
27907
+ // verify required parameter 'sodPolicyRequest' is not null or undefined
27908
+ (0, common_1.assertParamExists)('createSodPolicy', 'sodPolicyRequest', sodPolicyRequest);
27891
27909
  localVarPath = "/sod-policies";
27892
27910
  localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
27893
27911
  if (configuration) {
@@ -27917,7 +27935,7 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
27917
27935
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
27918
27936
  headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
27919
27937
  localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
27920
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(sodPolicy, localVarRequestOptions, configuration);
27938
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(sodPolicyRequest, localVarRequestOptions, configuration);
27921
27939
  return [2 /*return*/, {
27922
27940
  url: (0, common_1.toPathString)(localVarUrlObj),
27923
27941
  axiosOptions: localVarRequestOptions,
@@ -28596,11 +28614,11 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
28596
28614
  * This updates a specified SOD policy. Requires role of ORG_ADMIN.
28597
28615
  * @summary Update sod policy by id
28598
28616
  * @param {string} id The ID of the SOD policy to update.
28599
- * @param {SodPolicy} sodPolicy
28617
+ * @param {SodPolicyRead} sodPolicyRead
28600
28618
  * @param {*} [axiosOptions] Override http request option.
28601
28619
  * @throws {RequiredError}
28602
28620
  */
28603
- putSodPolicy: function (id, sodPolicy, axiosOptions) {
28621
+ putSodPolicy: function (id, sodPolicyRead, axiosOptions) {
28604
28622
  if (axiosOptions === void 0) { axiosOptions = {}; }
28605
28623
  return __awaiter(_this, void 0, void 0, function () {
28606
28624
  var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
@@ -28609,8 +28627,8 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
28609
28627
  case 0:
28610
28628
  // verify required parameter 'id' is not null or undefined
28611
28629
  (0, common_1.assertParamExists)('putSodPolicy', 'id', id);
28612
- // verify required parameter 'sodPolicy' is not null or undefined
28613
- (0, common_1.assertParamExists)('putSodPolicy', 'sodPolicy', sodPolicy);
28630
+ // verify required parameter 'sodPolicyRead' is not null or undefined
28631
+ (0, common_1.assertParamExists)('putSodPolicy', 'sodPolicyRead', sodPolicyRead);
28614
28632
  localVarPath = "/sod-policies/{id}"
28615
28633
  .replace("{".concat("id", "}"), encodeURIComponent(String(id)));
28616
28634
  localVarUrlObj = new URL(localVarPath, common_1.DUMMY_BASE_URL);
@@ -28641,7 +28659,7 @@ var SODPoliciesApiAxiosParamCreator = function (configuration) {
28641
28659
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
28642
28660
  headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
28643
28661
  localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
28644
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(sodPolicy, localVarRequestOptions, configuration);
28662
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(sodPolicyRead, localVarRequestOptions, configuration);
28645
28663
  return [2 /*return*/, {
28646
28664
  url: (0, common_1.toPathString)(localVarUrlObj),
28647
28665
  axiosOptions: localVarRequestOptions,
@@ -28821,17 +28839,17 @@ var SODPoliciesApiFp = function (configuration) {
28821
28839
  /**
28822
28840
  * This creates both General and Conflicting Access Based policy, with a limit of 50 entitlements for each (left & right) criteria for Conflicting Access Based SOD policy. Requires role of ORG_ADMIN.
28823
28841
  * @summary Create sod policy
28824
- * @param {SodPolicy} sodPolicy
28842
+ * @param {SodPolicyRequest} sodPolicyRequest
28825
28843
  * @param {*} [axiosOptions] Override http request option.
28826
28844
  * @throws {RequiredError}
28827
28845
  */
28828
- createSodPolicy: function (sodPolicy, axiosOptions) {
28846
+ createSodPolicy: function (sodPolicyRequest, axiosOptions) {
28829
28847
  var _a, _b, _c;
28830
28848
  return __awaiter(this, void 0, void 0, function () {
28831
28849
  var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
28832
28850
  return __generator(this, function (_d) {
28833
28851
  switch (_d.label) {
28834
- case 0: return [4 /*yield*/, localVarAxiosParamCreator.createSodPolicy(sodPolicy, axiosOptions)];
28852
+ case 0: return [4 /*yield*/, localVarAxiosParamCreator.createSodPolicy(sodPolicyRequest, axiosOptions)];
28835
28853
  case 1:
28836
28854
  localVarAxiosArgs = _d.sent();
28837
28855
  localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
@@ -29128,17 +29146,17 @@ var SODPoliciesApiFp = function (configuration) {
29128
29146
  * This updates a specified SOD policy. Requires role of ORG_ADMIN.
29129
29147
  * @summary Update sod policy by id
29130
29148
  * @param {string} id The ID of the SOD policy to update.
29131
- * @param {SodPolicy} sodPolicy
29149
+ * @param {SodPolicyRead} sodPolicyRead
29132
29150
  * @param {*} [axiosOptions] Override http request option.
29133
29151
  * @throws {RequiredError}
29134
29152
  */
29135
- putSodPolicy: function (id, sodPolicy, axiosOptions) {
29153
+ putSodPolicy: function (id, sodPolicyRead, axiosOptions) {
29136
29154
  var _a, _b, _c;
29137
29155
  return __awaiter(this, void 0, void 0, function () {
29138
29156
  var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
29139
29157
  return __generator(this, function (_d) {
29140
29158
  switch (_d.label) {
29141
- case 0: return [4 /*yield*/, localVarAxiosParamCreator.putSodPolicy(id, sodPolicy, axiosOptions)];
29159
+ case 0: return [4 /*yield*/, localVarAxiosParamCreator.putSodPolicy(id, sodPolicyRead, axiosOptions)];
29142
29160
  case 1:
29143
29161
  localVarAxiosArgs = _d.sent();
29144
29162
  localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
@@ -29235,7 +29253,7 @@ var SODPoliciesApiFactory = function (configuration, basePath, axios) {
29235
29253
  * @throws {RequiredError}
29236
29254
  */
29237
29255
  createSodPolicy: function (requestParameters, axiosOptions) {
29238
- return localVarFp.createSodPolicy(requestParameters.sodPolicy, axiosOptions).then(function (request) { return request(axios, basePath); });
29256
+ return localVarFp.createSodPolicy(requestParameters.sodPolicyRequest, axiosOptions).then(function (request) { return request(axios, basePath); });
29239
29257
  },
29240
29258
  /**
29241
29259
  * This deletes a specified SOD policy. Requires role of ORG_ADMIN.
@@ -29365,7 +29383,7 @@ var SODPoliciesApiFactory = function (configuration, basePath, axios) {
29365
29383
  * @throws {RequiredError}
29366
29384
  */
29367
29385
  putSodPolicy: function (requestParameters, axiosOptions) {
29368
- return localVarFp.putSodPolicy(requestParameters.id, requestParameters.sodPolicy, axiosOptions).then(function (request) { return request(axios, basePath); });
29386
+ return localVarFp.putSodPolicy(requestParameters.id, requestParameters.sodPolicyRead, axiosOptions).then(function (request) { return request(axios, basePath); });
29369
29387
  },
29370
29388
  /**
29371
29389
  * Runs the scheduled report for the policy retrieved by passed policy ID. The report schedule is fetched from the policy retrieved by ID.
@@ -29422,7 +29440,7 @@ var SODPoliciesApi = /** @class */ (function (_super) {
29422
29440
  */
29423
29441
  SODPoliciesApi.prototype.createSodPolicy = function (requestParameters, axiosOptions) {
29424
29442
  var _this = this;
29425
- return (0, exports.SODPoliciesApiFp)(this.configuration).createSodPolicy(requestParameters.sodPolicy, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
29443
+ return (0, exports.SODPoliciesApiFp)(this.configuration).createSodPolicy(requestParameters.sodPolicyRequest, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
29426
29444
  };
29427
29445
  /**
29428
29446
  * This deletes a specified SOD policy. Requires role of ORG_ADMIN.
@@ -29578,7 +29596,7 @@ var SODPoliciesApi = /** @class */ (function (_super) {
29578
29596
  */
29579
29597
  SODPoliciesApi.prototype.putSodPolicy = function (requestParameters, axiosOptions) {
29580
29598
  var _this = this;
29581
- return (0, exports.SODPoliciesApiFp)(this.configuration).putSodPolicy(requestParameters.id, requestParameters.sodPolicy, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
29599
+ return (0, exports.SODPoliciesApiFp)(this.configuration).putSodPolicy(requestParameters.id, requestParameters.sodPolicyRead, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
29582
29600
  };
29583
29601
  /**
29584
29602
  * Runs the scheduled report for the policy retrieved by passed policy ID. The report schedule is fetched from the policy retrieved by ID.