sailpoint-api-client 1.7.17 → 1.7.19

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/beta/README.md CHANGED
@@ -1,4 +1,4 @@
1
- ## sailpoint-sdk@1.7.17
1
+ ## sailpoint-sdk@1.7.19
2
2
 
3
3
  This generator creates TypeScript/JavaScript client that utilizes [axios](https://github.com/axios/axios). The generated Node module can be used in the following environments:
4
4
 
@@ -36,7 +36,7 @@ navigate to the folder of your consuming project and run one of the following co
36
36
  _published:_
37
37
 
38
38
  ```
39
- npm install sailpoint-sdk@1.7.17 --save
39
+ npm install sailpoint-sdk@1.7.19 --save
40
40
  ```
41
41
 
42
42
  _unPublished (not recommended):_
package/beta/api.ts CHANGED
@@ -4913,6 +4913,13 @@ export interface ArgumentBeta {
4913
4913
  */
4914
4914
  export interface ArrayInner1Beta {
4915
4915
  }
4916
+ /**
4917
+ *
4918
+ * @export
4919
+ * @interface ArrayInner2Beta
4920
+ */
4921
+ export interface ArrayInner2Beta {
4922
+ }
4916
4923
  /**
4917
4924
  *
4918
4925
  * @export
@@ -15319,12 +15326,56 @@ export interface JsonPatchOperationBeta {
15319
15326
  }
15320
15327
 
15321
15328
  export const JsonPatchOperationBetaOpBeta = {
15329
+ Add: 'add',
15322
15330
  Remove: 'remove',
15323
- Replace: 'replace'
15331
+ Replace: 'replace',
15332
+ Move: 'move',
15333
+ Copy: 'copy',
15334
+ Test: 'test'
15324
15335
  } as const;
15325
15336
 
15326
15337
  export type JsonPatchOperationBetaOpBeta = typeof JsonPatchOperationBetaOpBeta[keyof typeof JsonPatchOperationBetaOpBeta];
15327
15338
 
15339
+ /**
15340
+ * A JSONPatch Operation for Role Mining endpoints, supporting only remove and replace operations as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902)
15341
+ * @export
15342
+ * @interface JsonPatchOperationRoleMiningBeta
15343
+ */
15344
+ export interface JsonPatchOperationRoleMiningBeta {
15345
+ /**
15346
+ * The operation to be performed
15347
+ * @type {string}
15348
+ * @memberof JsonPatchOperationRoleMiningBeta
15349
+ */
15350
+ 'op': JsonPatchOperationRoleMiningBetaOpBeta;
15351
+ /**
15352
+ * A string JSON Pointer representing the target path to an element to be affected by the operation
15353
+ * @type {string}
15354
+ * @memberof JsonPatchOperationRoleMiningBeta
15355
+ */
15356
+ 'path': string;
15357
+ /**
15358
+ *
15359
+ * @type {JsonPatchOperationRoleMiningValueBeta}
15360
+ * @memberof JsonPatchOperationRoleMiningBeta
15361
+ */
15362
+ 'value'?: JsonPatchOperationRoleMiningValueBeta;
15363
+ }
15364
+
15365
+ export const JsonPatchOperationRoleMiningBetaOpBeta = {
15366
+ Remove: 'remove',
15367
+ Replace: 'replace'
15368
+ } as const;
15369
+
15370
+ export type JsonPatchOperationRoleMiningBetaOpBeta = typeof JsonPatchOperationRoleMiningBetaOpBeta[keyof typeof JsonPatchOperationRoleMiningBetaOpBeta];
15371
+
15372
+ /**
15373
+ * @type JsonPatchOperationRoleMiningValueBeta
15374
+ * The value to be used for the operation, required for \"replace\" operations
15375
+ * @export
15376
+ */
15377
+ export type JsonPatchOperationRoleMiningValueBeta = Array<ArrayInner1Beta> | boolean | number | object | string;
15378
+
15328
15379
  /**
15329
15380
  * A limited JSONPatch Operation as defined by [RFC 6902 - JSON Patch](https://tools.ietf.org/html/rfc6902)
15330
15381
  * @export
@@ -15364,7 +15415,7 @@ export type JsonPatchOperationsBetaOpBeta = typeof JsonPatchOperationsBetaOpBeta
15364
15415
  * The value to be used for the operation, required for \"add\" and \"replace\" operations
15365
15416
  * @export
15366
15417
  */
15367
- export type JsonPatchOperationsValueBeta = Array<ArrayInner1Beta> | boolean | string;
15418
+ export type JsonPatchOperationsValueBeta = Array<ArrayInner2Beta> | boolean | string;
15368
15419
 
15369
15420
  /**
15370
15421
  *
@@ -21296,39 +21347,6 @@ export const PatOwnerBetaTypeBeta = {
21296
21347
 
21297
21348
  export type PatOwnerBetaTypeBeta = typeof PatOwnerBetaTypeBeta[keyof typeof PatOwnerBetaTypeBeta];
21298
21349
 
21299
- /**
21300
- *
21301
- * @export
21302
- * @interface PatchRoleMiningPotentialRoleRequestInnerBeta
21303
- */
21304
- export interface PatchRoleMiningPotentialRoleRequestInnerBeta {
21305
- /**
21306
- * The operation to be performed
21307
- * @type {string}
21308
- * @memberof PatchRoleMiningPotentialRoleRequestInnerBeta
21309
- */
21310
- 'op'?: PatchRoleMiningPotentialRoleRequestInnerBetaOpBeta;
21311
- /**
21312
- * A string JSON Pointer representing the target path to an element to be affected by the operation
21313
- * @type {string}
21314
- * @memberof PatchRoleMiningPotentialRoleRequestInnerBeta
21315
- */
21316
- 'path': string;
21317
- /**
21318
- *
21319
- * @type {UpdateMultiHostSourcesRequestInnerValueBeta}
21320
- * @memberof PatchRoleMiningPotentialRoleRequestInnerBeta
21321
- */
21322
- 'value'?: UpdateMultiHostSourcesRequestInnerValueBeta;
21323
- }
21324
-
21325
- export const PatchRoleMiningPotentialRoleRequestInnerBetaOpBeta = {
21326
- Remove: 'remove',
21327
- Replace: 'replace'
21328
- } as const;
21329
-
21330
- export type PatchRoleMiningPotentialRoleRequestInnerBetaOpBeta = typeof PatchRoleMiningPotentialRoleRequestInnerBetaOpBeta[keyof typeof PatchRoleMiningPotentialRoleRequestInnerBetaOpBeta];
21331
-
21332
21350
  /**
21333
21351
  *
21334
21352
  * @export
@@ -25167,7 +25185,7 @@ export interface RoleMiningIdentityDistributionDistributionInnerBeta {
25167
25185
  * @type {string}
25168
25186
  * @memberof RoleMiningIdentityDistributionDistributionInnerBeta
25169
25187
  */
25170
- 'attributeValue'?: string;
25188
+ 'attributeValue'?: string | null;
25171
25189
  /**
25172
25190
  * The number of identities that have this attribute value
25173
25191
  * @type {number}
@@ -25254,12 +25272,24 @@ export interface RoleMiningPotentialRoleBeta {
25254
25272
  * @memberof RoleMiningPotentialRoleBeta
25255
25273
  */
25256
25274
  'identityIds'?: Array<string>;
25275
+ /**
25276
+ * The status for this identity group which can be OBTAINED or COMPRESSED
25277
+ * @type {string}
25278
+ * @memberof RoleMiningPotentialRoleBeta
25279
+ */
25280
+ 'identityGroupStatus'?: string | null;
25257
25281
  /**
25258
25282
  * Name of the potential role.
25259
25283
  * @type {string}
25260
25284
  * @memberof RoleMiningPotentialRoleBeta
25261
25285
  */
25262
25286
  'name'?: string;
25287
+ /**
25288
+ *
25289
+ * @type {RoleMiningPotentialRolePotentialRoleRefBeta}
25290
+ * @memberof RoleMiningPotentialRoleBeta
25291
+ */
25292
+ 'potentialRoleRef'?: RoleMiningPotentialRolePotentialRoleRefBeta | null;
25263
25293
  /**
25264
25294
  *
25265
25295
  * @type {RoleMiningPotentialRoleProvisionStateBeta}
@@ -25423,6 +25453,25 @@ export const RoleMiningPotentialRoleExportStateBeta = {
25423
25453
  export type RoleMiningPotentialRoleExportStateBeta = typeof RoleMiningPotentialRoleExportStateBeta[keyof typeof RoleMiningPotentialRoleExportStateBeta];
25424
25454
 
25425
25455
 
25456
+ /**
25457
+ * The potential role reference
25458
+ * @export
25459
+ * @interface RoleMiningPotentialRolePotentialRoleRefBeta
25460
+ */
25461
+ export interface RoleMiningPotentialRolePotentialRoleRefBeta {
25462
+ /**
25463
+ * Id of the potential role
25464
+ * @type {string}
25465
+ * @memberof RoleMiningPotentialRolePotentialRoleRefBeta
25466
+ */
25467
+ 'id'?: string;
25468
+ /**
25469
+ * Name of the potential role
25470
+ * @type {string}
25471
+ * @memberof RoleMiningPotentialRolePotentialRoleRefBeta
25472
+ */
25473
+ 'name'?: string;
25474
+ }
25426
25475
  /**
25427
25476
  *
25428
25477
  * @export
@@ -30784,13 +30833,6 @@ export const SubscriptionPatchRequestInnerBetaOpBeta = {
30784
30833
 
30785
30834
  export type SubscriptionPatchRequestInnerBetaOpBeta = typeof SubscriptionPatchRequestInnerBetaOpBeta[keyof typeof SubscriptionPatchRequestInnerBetaOpBeta];
30786
30835
 
30787
- /**
30788
- *
30789
- * @export
30790
- * @interface SubscriptionPatchRequestInnerValueAnyOfInnerBeta
30791
- */
30792
- export interface SubscriptionPatchRequestInnerValueAnyOfInnerBeta {
30793
- }
30794
30836
  /**
30795
30837
  * The value to be used for the operation, required for \"add\" and \"replace\" operations
30796
30838
  * @export
@@ -37558,7 +37600,7 @@ export const AccessRequestsBetaApiAxiosParamCreator = function (configuration?:
37558
37600
  };
37559
37601
  },
37560
37602
  /**
37561
- * >**Required scopes:** ORG_ADMIN requires idn:access-request:manage. USER level requires idn:access-request-self:manage (Personal Access Token only). Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
37603
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
37562
37604
  * @summary Submit access request
37563
37605
  * @param {AccessRequestBeta} accessRequestBeta
37564
37606
  * @param {*} [axiosOptions] Override http request option.
@@ -37906,7 +37948,7 @@ export const AccessRequestsBetaApiFp = function(configuration?: Configuration) {
37906
37948
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
37907
37949
  },
37908
37950
  /**
37909
- * >**Required scopes:** ORG_ADMIN requires idn:access-request:manage. USER level requires idn:access-request-self:manage (Personal Access Token only). Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
37951
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
37910
37952
  * @summary Submit access request
37911
37953
  * @param {AccessRequestBeta} accessRequestBeta
37912
37954
  * @param {*} [axiosOptions] Override http request option.
@@ -38019,7 +38061,7 @@ export const AccessRequestsBetaApiFactory = function (configuration?: Configurat
38019
38061
  return localVarFp.closeAccessRequest(requestParameters.closeAccessRequestBeta, axiosOptions).then((request) => request(axios, basePath));
38020
38062
  },
38021
38063
  /**
38022
- * >**Required scopes:** ORG_ADMIN requires idn:access-request:manage. USER level requires idn:access-request-self:manage (Personal Access Token only). Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
38064
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
38023
38065
  * @summary Submit access request
38024
38066
  * @param {AccessRequestsBetaApiCreateAccessRequestRequest} requestParameters Request parameters.
38025
38067
  * @param {*} [axiosOptions] Override http request option.
@@ -38319,7 +38361,7 @@ export class AccessRequestsBetaApi extends BaseAPI {
38319
38361
  }
38320
38362
 
38321
38363
  /**
38322
- * >**Required scopes:** ORG_ADMIN requires idn:access-request:manage. USER level requires idn:access-request-self:manage (Personal Access Token only). Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
38364
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
38323
38365
  * @summary Submit access request
38324
38366
  * @param {AccessRequestsBetaApiCreateAccessRequestRequest} requestParameters Request parameters.
38325
38367
  * @param {*} [axiosOptions] Override http request option.
@@ -56922,20 +56964,20 @@ export const IAIRoleMiningBetaApiAxiosParamCreator = function (configuration?: C
56922
56964
  },
56923
56965
  /**
56924
56966
  * This method updates an existing potential role using the role mining session id and the potential role summary id. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
56925
- * @summary Update a potential role in session
56967
+ * @summary Update potential role in session
56926
56968
  * @param {string} sessionId The role mining session id
56927
56969
  * @param {string} potentialRoleId The potential role summary id
56928
- * @param {Array<JsonPatchOperationBeta>} jsonPatchOperationBeta
56970
+ * @param {Array<JsonPatchOperationRoleMiningBeta>} jsonPatchOperationRoleMiningBeta
56929
56971
  * @param {*} [axiosOptions] Override http request option.
56930
56972
  * @throws {RequiredError}
56931
56973
  */
56932
- patchPotentialRoleSession: async (sessionId: string, potentialRoleId: string, jsonPatchOperationBeta: Array<JsonPatchOperationBeta>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
56974
+ patchPotentialRoleSession: async (sessionId: string, potentialRoleId: string, jsonPatchOperationRoleMiningBeta: Array<JsonPatchOperationRoleMiningBeta>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
56933
56975
  // verify required parameter 'sessionId' is not null or undefined
56934
56976
  assertParamExists('patchPotentialRoleSession', 'sessionId', sessionId)
56935
56977
  // verify required parameter 'potentialRoleId' is not null or undefined
56936
56978
  assertParamExists('patchPotentialRoleSession', 'potentialRoleId', potentialRoleId)
56937
- // verify required parameter 'jsonPatchOperationBeta' is not null or undefined
56938
- assertParamExists('patchPotentialRoleSession', 'jsonPatchOperationBeta', jsonPatchOperationBeta)
56979
+ // verify required parameter 'jsonPatchOperationRoleMiningBeta' is not null or undefined
56980
+ assertParamExists('patchPotentialRoleSession', 'jsonPatchOperationRoleMiningBeta', jsonPatchOperationRoleMiningBeta)
56939
56981
  const localVarPath = `/role-mining-sessions/{sessionId}/potential-role-summaries/{potentialRoleId}`
56940
56982
  .replace(`{${"sessionId"}}`, encodeURIComponent(String(sessionId)))
56941
56983
  .replace(`{${"potentialRoleId"}}`, encodeURIComponent(String(potentialRoleId)));
@@ -56969,7 +57011,7 @@ export const IAIRoleMiningBetaApiAxiosParamCreator = function (configuration?: C
56969
57011
  setSearchParams(localVarUrlObj, localVarQueryParameter);
56970
57012
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
56971
57013
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
56972
- localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationBeta, localVarRequestOptions, configuration)
57014
+ localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationRoleMiningBeta, localVarRequestOptions, configuration)
56973
57015
 
56974
57016
  return {
56975
57017
  url: toPathString(localVarUrlObj),
@@ -56980,15 +57022,15 @@ export const IAIRoleMiningBetaApiAxiosParamCreator = function (configuration?: C
56980
57022
  * This method updates an existing potential role. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
56981
57023
  * @summary Update a potential role
56982
57024
  * @param {string} potentialRoleId The potential role summary id
56983
- * @param {Array<PatchRoleMiningPotentialRoleRequestInnerBeta>} patchRoleMiningPotentialRoleRequestInnerBeta
57025
+ * @param {Array<JsonPatchOperationRoleMiningBeta>} jsonPatchOperationRoleMiningBeta
56984
57026
  * @param {*} [axiosOptions] Override http request option.
56985
57027
  * @throws {RequiredError}
56986
57028
  */
56987
- patchRoleMiningPotentialRole: async (potentialRoleId: string, patchRoleMiningPotentialRoleRequestInnerBeta: Array<PatchRoleMiningPotentialRoleRequestInnerBeta>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
57029
+ patchRoleMiningPotentialRole: async (potentialRoleId: string, jsonPatchOperationRoleMiningBeta: Array<JsonPatchOperationRoleMiningBeta>, axiosOptions: RawAxiosRequestConfig = {}): Promise<RequestArgs> => {
56988
57030
  // verify required parameter 'potentialRoleId' is not null or undefined
56989
57031
  assertParamExists('patchRoleMiningPotentialRole', 'potentialRoleId', potentialRoleId)
56990
- // verify required parameter 'patchRoleMiningPotentialRoleRequestInnerBeta' is not null or undefined
56991
- assertParamExists('patchRoleMiningPotentialRole', 'patchRoleMiningPotentialRoleRequestInnerBeta', patchRoleMiningPotentialRoleRequestInnerBeta)
57032
+ // verify required parameter 'jsonPatchOperationRoleMiningBeta' is not null or undefined
57033
+ assertParamExists('patchRoleMiningPotentialRole', 'jsonPatchOperationRoleMiningBeta', jsonPatchOperationRoleMiningBeta)
56992
57034
  const localVarPath = `/role-mining-potential-roles/{potentialRoleId}`
56993
57035
  .replace(`{${"potentialRoleId"}}`, encodeURIComponent(String(potentialRoleId)));
56994
57036
  // use dummy base URL string because the URL constructor only accepts absolute URLs.
@@ -57010,6 +57052,10 @@ export const IAIRoleMiningBetaApiAxiosParamCreator = function (configuration?: C
57010
57052
  // oauth required
57011
57053
  await setOAuthToObject(localVarHeaderParameter, "userAuth", [], configuration)
57012
57054
 
57055
+ // authentication applicationAuth required
57056
+ // oauth required
57057
+ await setOAuthToObject(localVarHeaderParameter, "applicationAuth", [], configuration)
57058
+
57013
57059
 
57014
57060
 
57015
57061
  localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
@@ -57017,7 +57063,7 @@ export const IAIRoleMiningBetaApiAxiosParamCreator = function (configuration?: C
57017
57063
  setSearchParams(localVarUrlObj, localVarQueryParameter);
57018
57064
  let headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
57019
57065
  localVarRequestOptions.headers = {...localVarHeaderParameter, ...headersFromBaseOptions, ...axiosOptions.headers};
57020
- localVarRequestOptions.data = serializeDataIfNeeded(patchRoleMiningPotentialRoleRequestInnerBeta, localVarRequestOptions, configuration)
57066
+ localVarRequestOptions.data = serializeDataIfNeeded(jsonPatchOperationRoleMiningBeta, localVarRequestOptions, configuration)
57021
57067
 
57022
57068
  return {
57023
57069
  url: toPathString(localVarUrlObj),
@@ -57481,15 +57527,15 @@ export const IAIRoleMiningBetaApiFp = function(configuration?: Configuration) {
57481
57527
  },
57482
57528
  /**
57483
57529
  * This method updates an existing potential role using the role mining session id and the potential role summary id. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
57484
- * @summary Update a potential role in session
57530
+ * @summary Update potential role in session
57485
57531
  * @param {string} sessionId The role mining session id
57486
57532
  * @param {string} potentialRoleId The potential role summary id
57487
- * @param {Array<JsonPatchOperationBeta>} jsonPatchOperationBeta
57533
+ * @param {Array<JsonPatchOperationRoleMiningBeta>} jsonPatchOperationRoleMiningBeta
57488
57534
  * @param {*} [axiosOptions] Override http request option.
57489
57535
  * @throws {RequiredError}
57490
57536
  */
57491
- async patchPotentialRoleSession(sessionId: string, potentialRoleId: string, jsonPatchOperationBeta: Array<JsonPatchOperationBeta>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<object>> {
57492
- const localVarAxiosArgs = await localVarAxiosParamCreator.patchPotentialRoleSession(sessionId, potentialRoleId, jsonPatchOperationBeta, axiosOptions);
57537
+ async patchPotentialRoleSession(sessionId: string, potentialRoleId: string, jsonPatchOperationRoleMiningBeta: Array<JsonPatchOperationRoleMiningBeta>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<object>> {
57538
+ const localVarAxiosArgs = await localVarAxiosParamCreator.patchPotentialRoleSession(sessionId, potentialRoleId, jsonPatchOperationRoleMiningBeta, axiosOptions);
57493
57539
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
57494
57540
  const localVarOperationServerBasePath = operationServerMap['IAIRoleMiningBetaApi.patchPotentialRoleSession']?.[localVarOperationServerIndex]?.url;
57495
57541
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
@@ -57498,12 +57544,12 @@ export const IAIRoleMiningBetaApiFp = function(configuration?: Configuration) {
57498
57544
  * This method updates an existing potential role. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
57499
57545
  * @summary Update a potential role
57500
57546
  * @param {string} potentialRoleId The potential role summary id
57501
- * @param {Array<PatchRoleMiningPotentialRoleRequestInnerBeta>} patchRoleMiningPotentialRoleRequestInnerBeta
57547
+ * @param {Array<JsonPatchOperationRoleMiningBeta>} jsonPatchOperationRoleMiningBeta
57502
57548
  * @param {*} [axiosOptions] Override http request option.
57503
57549
  * @throws {RequiredError}
57504
57550
  */
57505
- async patchRoleMiningPotentialRole(potentialRoleId: string, patchRoleMiningPotentialRoleRequestInnerBeta: Array<PatchRoleMiningPotentialRoleRequestInnerBeta>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<object>> {
57506
- const localVarAxiosArgs = await localVarAxiosParamCreator.patchRoleMiningPotentialRole(potentialRoleId, patchRoleMiningPotentialRoleRequestInnerBeta, axiosOptions);
57551
+ async patchRoleMiningPotentialRole(potentialRoleId: string, jsonPatchOperationRoleMiningBeta: Array<JsonPatchOperationRoleMiningBeta>, axiosOptions?: RawAxiosRequestConfig): Promise<(axios?: AxiosInstance, basePath?: string) => AxiosPromise<object>> {
57552
+ const localVarAxiosArgs = await localVarAxiosParamCreator.patchRoleMiningPotentialRole(potentialRoleId, jsonPatchOperationRoleMiningBeta, axiosOptions);
57507
57553
  const localVarOperationServerIndex = configuration?.serverIndex ?? 0;
57508
57554
  const localVarOperationServerBasePath = operationServerMap['IAIRoleMiningBetaApi.patchRoleMiningPotentialRole']?.[localVarOperationServerIndex]?.url;
57509
57555
  return (axios, basePath) => createRequestFunction(localVarAxiosArgs, globalAxios, BASE_PATH, configuration)(axios, localVarOperationServerBasePath || basePath);
@@ -57759,13 +57805,13 @@ export const IAIRoleMiningBetaApiFactory = function (configuration?: Configurati
57759
57805
  },
57760
57806
  /**
57761
57807
  * This method updates an existing potential role using the role mining session id and the potential role summary id. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
57762
- * @summary Update a potential role in session
57808
+ * @summary Update potential role in session
57763
57809
  * @param {IAIRoleMiningBetaApiPatchPotentialRoleSessionRequest} requestParameters Request parameters.
57764
57810
  * @param {*} [axiosOptions] Override http request option.
57765
57811
  * @throws {RequiredError}
57766
57812
  */
57767
57813
  patchPotentialRoleSession(requestParameters: IAIRoleMiningBetaApiPatchPotentialRoleSessionRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<object> {
57768
- return localVarFp.patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationBeta, axiosOptions).then((request) => request(axios, basePath));
57814
+ return localVarFp.patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningBeta, axiosOptions).then((request) => request(axios, basePath));
57769
57815
  },
57770
57816
  /**
57771
57817
  * This method updates an existing potential role. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
@@ -57775,7 +57821,7 @@ export const IAIRoleMiningBetaApiFactory = function (configuration?: Configurati
57775
57821
  * @throws {RequiredError}
57776
57822
  */
57777
57823
  patchRoleMiningPotentialRole(requestParameters: IAIRoleMiningBetaApiPatchRoleMiningPotentialRoleRequest, axiosOptions?: RawAxiosRequestConfig): AxiosPromise<object> {
57778
- return localVarFp.patchRoleMiningPotentialRole(requestParameters.potentialRoleId, requestParameters.patchRoleMiningPotentialRoleRequestInnerBeta, axiosOptions).then((request) => request(axios, basePath));
57824
+ return localVarFp.patchRoleMiningPotentialRole(requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningBeta, axiosOptions).then((request) => request(axios, basePath));
57779
57825
  },
57780
57826
  /**
57781
57827
  * The method updates an existing role mining session using PATCH. Supports op in {\"replace\"} and changes to pruneThreshold and/or minNumIdentitiesInPotentialRole. The potential roles in this role mining session is then re-calculated.
@@ -58564,10 +58610,10 @@ export interface IAIRoleMiningBetaApiPatchPotentialRoleSessionRequest {
58564
58610
 
58565
58611
  /**
58566
58612
  *
58567
- * @type {Array<JsonPatchOperationBeta>}
58613
+ * @type {Array<JsonPatchOperationRoleMiningBeta>}
58568
58614
  * @memberof IAIRoleMiningBetaApiPatchPotentialRoleSession
58569
58615
  */
58570
- readonly jsonPatchOperationBeta: Array<JsonPatchOperationBeta>
58616
+ readonly jsonPatchOperationRoleMiningBeta: Array<JsonPatchOperationRoleMiningBeta>
58571
58617
  }
58572
58618
 
58573
58619
  /**
@@ -58585,10 +58631,10 @@ export interface IAIRoleMiningBetaApiPatchRoleMiningPotentialRoleRequest {
58585
58631
 
58586
58632
  /**
58587
58633
  *
58588
- * @type {Array<PatchRoleMiningPotentialRoleRequestInnerBeta>}
58634
+ * @type {Array<JsonPatchOperationRoleMiningBeta>}
58589
58635
  * @memberof IAIRoleMiningBetaApiPatchRoleMiningPotentialRole
58590
58636
  */
58591
- readonly patchRoleMiningPotentialRoleRequestInnerBeta: Array<PatchRoleMiningPotentialRoleRequestInnerBeta>
58637
+ readonly jsonPatchOperationRoleMiningBeta: Array<JsonPatchOperationRoleMiningBeta>
58592
58638
  }
58593
58639
 
58594
58640
  /**
@@ -58901,14 +58947,14 @@ export class IAIRoleMiningBetaApi extends BaseAPI {
58901
58947
 
58902
58948
  /**
58903
58949
  * This method updates an existing potential role using the role mining session id and the potential role summary id. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
58904
- * @summary Update a potential role in session
58950
+ * @summary Update potential role in session
58905
58951
  * @param {IAIRoleMiningBetaApiPatchPotentialRoleSessionRequest} requestParameters Request parameters.
58906
58952
  * @param {*} [axiosOptions] Override http request option.
58907
58953
  * @throws {RequiredError}
58908
58954
  * @memberof IAIRoleMiningBetaApi
58909
58955
  */
58910
58956
  public patchPotentialRoleSession(requestParameters: IAIRoleMiningBetaApiPatchPotentialRoleSessionRequest, axiosOptions?: RawAxiosRequestConfig) {
58911
- return IAIRoleMiningBetaApiFp(this.configuration).patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationBeta, axiosOptions).then((request) => request(this.axios, this.basePath));
58957
+ return IAIRoleMiningBetaApiFp(this.configuration).patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningBeta, axiosOptions).then((request) => request(this.axios, this.basePath));
58912
58958
  }
58913
58959
 
58914
58960
  /**
@@ -58920,7 +58966,7 @@ export class IAIRoleMiningBetaApi extends BaseAPI {
58920
58966
  * @memberof IAIRoleMiningBetaApi
58921
58967
  */
58922
58968
  public patchRoleMiningPotentialRole(requestParameters: IAIRoleMiningBetaApiPatchRoleMiningPotentialRoleRequest, axiosOptions?: RawAxiosRequestConfig) {
58923
- return IAIRoleMiningBetaApiFp(this.configuration).patchRoleMiningPotentialRole(requestParameters.potentialRoleId, requestParameters.patchRoleMiningPotentialRoleRequestInnerBeta, axiosOptions).then((request) => request(this.axios, this.basePath));
58969
+ return IAIRoleMiningBetaApiFp(this.configuration).patchRoleMiningPotentialRole(requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningBeta, axiosOptions).then((request) => request(this.axios, this.basePath));
58924
58970
  }
58925
58971
 
58926
58972
  /**
package/beta/common.ts CHANGED
@@ -147,9 +147,9 @@ export const createRequestFunction = function (axiosArgs: RequestArgs, globalAxi
147
147
  return <T = unknown, R = AxiosResponse<T>>(axios: AxiosInstance = globalAxios, basePath: string = BASE_PATH) => {
148
148
  axiosRetry(axios, configuration.retriesConfig)
149
149
  const headers = {
150
- ...{'User-Agent':'OpenAPI-Generator/1.7.17/ts'},
150
+ ...{'User-Agent':'OpenAPI-Generator/1.7.19/ts'},
151
151
  ...axiosArgs.axiosOptions.headers,
152
- ...{'X-SailPoint-SDK':'typescript-1.7.17'}
152
+ ...{'X-SailPoint-SDK':'typescript-1.7.19'}
153
153
  }
154
154
 
155
155
  if(!configuration.experimental && ("X-SailPoint-Experimental" in headers)) {
package/beta/package.json CHANGED
@@ -1,6 +1,6 @@
1
1
  {
2
2
  "name": "sailpoint-sdk",
3
- "version": "1.7.17",
3
+ "version": "1.7.19",
4
4
  "description": "OpenAPI client for sailpoint-sdk",
5
5
  "author": "OpenAPI-Generator Contributors",
6
6
  "repository": {