sailpoint-api-client 1.7.17 → 1.7.19

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/v2024/api.js CHANGED
@@ -82,8 +82,8 @@ exports.AccountAttributesChangedSourceV2024TypeV2024 = exports.AccountAttributes
82
82
  exports.CampaignEndedCampaignV2024TypeV2024 = exports.CampaignCompleteOptionsV2024AutoCompleteActionV2024 = exports.CampaignAllOfSourcesWithOrphanEntitlementsV2024TypeV2024 = exports.CampaignAllOfSearchCampaignInfoV2024TypeV2024 = exports.CampaignAllOfSearchCampaignInfoReviewerV2024TypeV2024 = exports.CampaignAllOfRoleCompositionCampaignInfoReviewerV2024TypeV2024 = exports.CampaignAllOfRoleCompositionCampaignInfoRemediatorRefV2024TypeV2024 = exports.CampaignAllOfMachineAccountCampaignInfoV2024ReviewerTypeV2024 = exports.CampaignAllOfFilterV2024TypeV2024 = exports.CampaignAlertV2024LevelV2024 = exports.CampaignActivatedCampaignV2024StatusV2024 = exports.CampaignActivatedCampaignV2024TypeV2024 = exports.BulkAddTaggedObjectV2024OperationV2024 = exports.BucketTypeV2024 = exports.BeforeProvisioningRuleDtoV2024TypeV2024 = exports.BaseAccessOwnerV2024TypeV2024 = exports.BackupResponseV2024CloudStorageStatusV2024 = exports.BackupResponseV2024HydrationStatusV2024 = exports.BackupResponseV2024BackupTypeV2024 = exports.BackupResponseV2024TypeV2024 = exports.BackupResponseV2024StatusV2024 = exports.BackupOptionsV2024IncludeTypesV2024 = exports.AuthUserV2024CapabilitiesV2024 = exports.AuthProfileV2024TypeV2024 = exports.AttributeMappingsAllOfTargetV2024TypeV2024 = exports.AttributeDefinitionTypeV2024 = exports.AttributeDefinitionSchemaV2024TypeV2024 = exports.AttrSyncSourceV2024TypeV2024 = exports.ApprovalV2024StatusV2024 = exports.ApprovalV2024ApprovalCriteriaV2024 = exports.ApprovalV2024PriorityV2024 = exports.ApprovalStatusV2024 = exports.ApprovalStatusDtoOriginalOwnerV2024TypeV2024 = exports.ApprovalStatusDtoCurrentOwnerV2024TypeV2024 = exports.ApprovalSchemeV2024 = exports.ApprovalSchemeForRoleV2024ApproverTypeV2024 = exports.ApprovalIdentityV2024TypeV2024 = exports.ApprovalCommentV2024ChangedToStatusV2024 = exports.AggregationTypeV2024 = exports.AdminReviewReassignReassignToV2024TypeV2024 = exports.ActivityInsightsV2024UsageDaysStateV2024 = exports.AccountsCollectedForAggregationV2024StatusV2024 = exports.AccountsCollectedForAggregationSourceV2024TypeV2024 = exports.AccountV2024OriginV2024 = exports.AccountUncorrelatedSourceV2024TypeV2024 = exports.AccountUncorrelatedIdentityV2024TypeV2024 = exports.AccountUncorrelatedAccountV2024TypeV2024 = exports.AccountCorrelatedSourceV2024TypeV2024 = exports.AccountCorrelatedIdentityV2024TypeV2024 = exports.AccountCorrelatedAccountV2024TypeV2024 = void 0;
83
83
  exports.DependantConnectionsMissingDtoV2024DependencyTypeV2024 = exports.DeleteSource202ResponseV2024TypeV2024 = exports.DateCompareV2024OperatorV2024 = exports.CustomPasswordInstructionV2024PageIdV2024 = exports.CriteriaTypeV2024 = exports.CreateFormInstanceRequestV2024StateV2024 = exports.CorrelationConfigAttributeAssignmentsInnerV2024MatchModeV2024 = exports.CorrelationConfigAttributeAssignmentsInnerV2024OperationV2024 = exports.CorrelatedGovernanceEventV2024TypeV2024 = exports.ConnectorRuleValidationResponseV2024StateV2024 = exports.ConnectorRuleUpdateRequestV2024TypeV2024 = exports.ConnectorRuleResponseV2024TypeV2024 = exports.ConnectorRuleCreateRequestV2024TypeV2024 = exports.ConnectorDetailV2024StatusV2024 = exports.ConnectedObjectTypeV2024 = exports.ConfigTypeEnumV2024 = exports.ConfigTypeEnumCamelV2024 = exports.ConditionRuleV2024ValueTypeV2024 = exports.ConditionRuleV2024OperatorV2024 = exports.ConditionRuleV2024SourceTypeV2024 = exports.ConditionEffectV2024EffectTypeV2024 = exports.CompletionStatusV2024 = exports.CompletedApprovalStateV2024 = exports.CommonAccessTypeV2024 = exports.CommonAccessItemStateV2024 = exports.CommentDtoAuthorV2024TypeV2024 = exports.CloseAccessRequestV2024CompletionStatusV2024 = exports.CloseAccessRequestV2024ExecutionStatusV2024 = exports.ClientTypeV2024 = exports.CertificationTaskV2024StatusV2024 = exports.CertificationTaskV2024TargetTypeV2024 = exports.CertificationTaskV2024TypeV2024 = exports.CertificationReferenceV2024TypeV2024 = exports.CertificationPhaseV2024 = exports.CertificationDecisionV2024 = exports.CampaignV2024MandatoryCommentRequirementV2024 = exports.CampaignV2024CorrelatedStatusV2024 = exports.CampaignV2024StatusV2024 = exports.CampaignV2024TypeV2024 = exports.CampaignTemplateOwnerRefV2024TypeV2024 = exports.CampaignReportV2024StatusV2024 = exports.CampaignReportV2024TypeV2024 = exports.CampaignReferenceV2024MandatoryCommentRequirementV2024 = exports.CampaignReferenceV2024CorrelatedStatusV2024 = exports.CampaignReferenceV2024CampaignTypeV2024 = exports.CampaignReferenceV2024TypeV2024 = exports.CampaignGeneratedCampaignV2024StatusV2024 = exports.CampaignGeneratedCampaignV2024TypeV2024 = exports.CampaignFilterDetailsV2024ModeV2024 = exports.CampaignEndedCampaignV2024StatusV2024 = void 0;
84
84
  exports.GetCampaign200ResponseV2024CorrelatedStatusV2024 = exports.GetCampaign200ResponseV2024StatusV2024 = exports.GetCampaign200ResponseV2024TypeV2024 = exports.GetActiveCampaigns200ResponseInnerV2024MandatoryCommentRequirementV2024 = exports.GetActiveCampaigns200ResponseInnerV2024CorrelatedStatusV2024 = exports.GetActiveCampaigns200ResponseInnerV2024StatusV2024 = exports.GetActiveCampaigns200ResponseInnerV2024TypeV2024 = exports.FormUsedByV2024TypeV2024 = exports.FormOwnerV2024TypeV2024 = exports.FormInstanceResponseV2024StateV2024 = exports.FormInstanceRecipientV2024TypeV2024 = exports.FormInstanceCreatedByV2024TypeV2024 = exports.FormElementValidationsSetV2024ValidationTypeV2024 = exports.FormElementV2024ElementTypeV2024 = exports.FormElementDynamicDataSourceV2024DataSourceTypeV2024 = exports.FormElementDynamicDataSourceConfigV2024ObjectTypeV2024 = exports.FormElementDynamicDataSourceConfigV2024IndicesV2024 = exports.FormDefinitionSelfImportExportDtoV2024TypeV2024 = exports.FormDefinitionInputV2024TypeV2024 = exports.FormConditionV2024RuleOperatorV2024 = exports.FilterTypeV2024 = exports.FieldDetailsDtoV2024TypeV2024 = exports.FederationProtocolDetailsV2024RoleV2024 = exports.ExpressionV2024OperatorV2024 = exports.ExpressionChildrenInnerV2024OperatorV2024 = exports.ExportPayloadV2024IncludeTypesV2024 = exports.ExportPayloadV2024ExcludeTypesV2024 = exports.ExportOptionsV2024IncludeTypesV2024 = exports.ExportOptionsV2024ExcludeTypesV2024 = exports.ExportOptions1V2024IncludeTypesV2024 = exports.ExportOptions1V2024ExcludeTypesV2024 = exports.ExecutionStatusV2024 = exports.ExceptionCriteriaCriteriaListInnerV2024TypeV2024 = exports.EntitlementRefV2024TypeV2024 = exports.EntitlementOwnerV2024TypeV2024 = exports.EntitlementApprovalSchemeV2024ApproverTypeV2024 = exports.EmailStatusDtoV2024VerificationStatusV2024 = exports.DtoTypeV2024 = exports.DraftResponseV2024ApprovalStatusV2024 = exports.DraftResponseV2024ModeV2024 = exports.DraftResponseV2024TypeV2024 = exports.DraftResponseV2024StatusV2024 = exports.DocumentTypeV2024 = exports.DimensionRefV2024TypeV2024 = exports.DimensionMembershipSelectorTypeV2024 = exports.DimensionCriteriaOperationV2024 = exports.DimensionCriteriaKeyTypeV2024 = exports.DeployResponseV2024CloudStorageStatusV2024 = exports.DeployResponseV2024TypeV2024 = exports.DeployResponseV2024StatusV2024 = void 0;
85
- exports.ManagedClusterUpdatePreferencesV2024UpdateStateV2024 = exports.ManagedClusterTypesV2024 = exports.ManagedClusterEncryptionConfigV2024FormatV2024 = exports.ManagedClientV2024ProvisionStatusV2024 = exports.ManagedClientV2024ClusterTypeV2024 = exports.ManagedClientV2024StatusV2024 = exports.ManagedClientTypeV2024 = exports.ManagedClientStatusCodeV2024 = exports.MailFromAttributesV2024MailFromDomainStatusV2024 = exports.MachineClassificationCriteriaOperationV2024 = exports.MachineClassificationConfigV2024ClassificationMethodV2024 = exports.MachineAccountV2024ClassificationMethodV2024 = exports.LocaleOriginV2024 = exports.LoadUncorrelatedAccountsTaskTaskV2024CompletionStatusV2024 = exports.LoadUncorrelatedAccountsTaskTaskMessagesInnerV2024TypeV2024 = exports.LoadAccountsTaskTaskV2024CompletionStatusV2024 = exports.LoadAccountsTaskTaskMessagesInnerV2024TypeV2024 = exports.ListWorkgroupMembers200ResponseInnerV2024TypeV2024 = exports.ListFormInstancesByTenantResponseV2024StateV2024 = exports.LifecyclestateDeletedV2024TypeV2024 = exports.LauncherV2024TypeV2024 = exports.LauncherRequestV2024TypeV2024 = exports.LauncherRequestReferenceV2024TypeV2024 = exports.LauncherReferenceV2024TypeV2024 = exports.LatestOutlierSummaryV2024TypeV2024 = exports.JsonPatchOperationV2024OpV2024 = exports.InvocationStatusTypeV2024 = exports.IndexV2024 = exports.ImportOptionsV2024DefaultReferencesV2024 = exports.ImportOptionsV2024IncludeTypesV2024 = exports.ImportOptionsV2024ExcludeTypesV2024 = exports.ImportObjectV2024TypeV2024 = exports.IdpDetailsV2024RoleV2024 = exports.IdentityWithNewAccessAccessRefsInnerV2024TypeV2024 = exports.IdentityV2024IdentityStatusV2024 = exports.IdentityV2024ProcessingStateV2024 = exports.IdentitySyncJobV2024StatusV2024 = exports.IdentityProfileExportedObjectSelfV2024TypeV2024 = exports.IdentityProfileAllOfOwnerV2024TypeV2024 = exports.IdentityProfileAllOfAuthoritativeSourceV2024TypeV2024 = exports.IdentityPreviewResponseIdentityV2024TypeV2024 = exports.IdentityManagerRefV2024TypeV2024 = exports.IdentityDeletedIdentityV2024TypeV2024 = exports.IdentityCreatedIdentityV2024TypeV2024 = exports.IdentityAttributesChangedIdentityV2024TypeV2024 = exports.HttpDispatchModeV2024 = exports.HttpAuthenticationTypeV2024 = exports.GrantTypeV2024 = exports.GetHistoricalIdentityEvents200ResponseInnerV2024AccessItemTypeV2024 = exports.GetCampaign200ResponseV2024MandatoryCommentRequirementV2024 = void 0;
86
- exports.ProvisioningCriteriaOperationV2024 = exports.ProvisioningCompletedRequesterV2024TypeV2024 = exports.ProvisioningCompletedRecipientV2024TypeV2024 = exports.ProvisioningCompletedAccountRequestsInnerV2024ProvisioningResultV2024 = exports.ProvisioningCompletedAccountRequestsInnerSourceV2024TypeV2024 = exports.ProvisioningCompletedAccountRequestsInnerAttributeRequestsInnerV2024OperationV2024 = exports.ProductV2024OrgTypeV2024 = exports.PreApprovalTriggerDetailsV2024DecisionV2024 = exports.PendingApprovalOwnerV2024TypeV2024 = exports.PendingApprovalMaxPermittedAccessDurationV2024TimeUnitV2024 = exports.PendingApprovalActionV2024 = exports.PatchPotentialRoleRequestInnerV2024OpV2024 = exports.PatOwnerV2024TypeV2024 = exports.PasswordStatusV2024StateV2024 = exports.PasswordChangeResponseV2024StateV2024 = exports.OwnerReferenceV2024TypeV2024 = exports.OwnerReferenceSegmentsV2024TypeV2024 = exports.OwnerDtoV2024TypeV2024 = exports.OutliersContributingFeatureAccessItemsV2024AccessTypeV2024 = exports.OutlierValueTypeV2024NameV2024 = exports.OutlierV2024UnignoreTypeV2024 = exports.OutlierV2024TypeV2024 = exports.OutlierSummaryV2024TypeV2024 = exports.OrphanIdentitiesReportArgumentsV2024SelectedFormatsV2024 = exports.OperationV2024 = exports.ObjectMappingResponseV2024ObjectTypeV2024 = exports.ObjectMappingRequestV2024ObjectTypeV2024 = exports.NonEmployeeSchemaAttributeTypeV2024 = exports.NonEmployeeIdentityDtoTypeV2024 = exports.NonEmployeeBulkUploadStatusV2024StatusV2024 = exports.NonEmployeeBulkUploadJobV2024StatusV2024 = exports.NativeChangeDetectionConfigV2024OperationsV2024 = exports.NamedConstructsV2024 = exports.MultiHostSourcesV2024StatusV2024 = exports.MultiHostSourcesV2024FeaturesV2024 = exports.MultiHostIntegrationsV2024ConnectionTypeV2024 = exports.MultiHostIntegrationsV2024StatusV2024 = exports.MultiHostIntegrationsV2024FeaturesV2024 = exports.MultiHostIntegrationsOwnerV2024TypeV2024 = exports.MultiHostIntegrationsConnectorAttributesV2024MultihostStatusV2024 = exports.MultiHostIntegrationsBeforeProvisioningRuleV2024TypeV2024 = exports.MfaConfigTestResponseV2024StateV2024 = exports.MetricTypeV2024 = exports.MembershipTypeV2024 = exports.MediumV2024 = exports.ManualWorkItemStateV2024 = exports.ManualWorkItemDetailsOriginalOwnerV2024TypeV2024 = exports.ManualWorkItemDetailsCurrentOwnerV2024TypeV2024 = exports.ManagedClusterV2024ConsolidatedHealthIndicatorsStatusV2024 = exports.ManagedClusterV2024StatusV2024 = void 0;
85
+ exports.ManagedClusterTypesV2024 = exports.ManagedClusterEncryptionConfigV2024FormatV2024 = exports.ManagedClientV2024ProvisionStatusV2024 = exports.ManagedClientV2024ClusterTypeV2024 = exports.ManagedClientV2024StatusV2024 = exports.ManagedClientTypeV2024 = exports.ManagedClientStatusCodeV2024 = exports.MailFromAttributesV2024MailFromDomainStatusV2024 = exports.MachineClassificationCriteriaOperationV2024 = exports.MachineClassificationConfigV2024ClassificationMethodV2024 = exports.MachineAccountV2024ClassificationMethodV2024 = exports.LocaleOriginV2024 = exports.LoadUncorrelatedAccountsTaskTaskV2024CompletionStatusV2024 = exports.LoadUncorrelatedAccountsTaskTaskMessagesInnerV2024TypeV2024 = exports.LoadAccountsTaskTaskV2024CompletionStatusV2024 = exports.LoadAccountsTaskTaskMessagesInnerV2024TypeV2024 = exports.ListWorkgroupMembers200ResponseInnerV2024TypeV2024 = exports.ListFormInstancesByTenantResponseV2024StateV2024 = exports.LifecyclestateDeletedV2024TypeV2024 = exports.LauncherV2024TypeV2024 = exports.LauncherRequestV2024TypeV2024 = exports.LauncherRequestReferenceV2024TypeV2024 = exports.LauncherReferenceV2024TypeV2024 = exports.LatestOutlierSummaryV2024TypeV2024 = exports.JsonPatchOperationV2024OpV2024 = exports.JsonPatchOperationRoleMiningV2024OpV2024 = exports.InvocationStatusTypeV2024 = exports.IndexV2024 = exports.ImportOptionsV2024DefaultReferencesV2024 = exports.ImportOptionsV2024IncludeTypesV2024 = exports.ImportOptionsV2024ExcludeTypesV2024 = exports.ImportObjectV2024TypeV2024 = exports.IdpDetailsV2024RoleV2024 = exports.IdentityWithNewAccessAccessRefsInnerV2024TypeV2024 = exports.IdentityV2024IdentityStatusV2024 = exports.IdentityV2024ProcessingStateV2024 = exports.IdentitySyncJobV2024StatusV2024 = exports.IdentityProfileExportedObjectSelfV2024TypeV2024 = exports.IdentityProfileAllOfOwnerV2024TypeV2024 = exports.IdentityProfileAllOfAuthoritativeSourceV2024TypeV2024 = exports.IdentityPreviewResponseIdentityV2024TypeV2024 = exports.IdentityManagerRefV2024TypeV2024 = exports.IdentityDeletedIdentityV2024TypeV2024 = exports.IdentityCreatedIdentityV2024TypeV2024 = exports.IdentityAttributesChangedIdentityV2024TypeV2024 = exports.HttpDispatchModeV2024 = exports.HttpAuthenticationTypeV2024 = exports.GrantTypeV2024 = exports.GetHistoricalIdentityEvents200ResponseInnerV2024AccessItemTypeV2024 = exports.GetCampaign200ResponseV2024MandatoryCommentRequirementV2024 = void 0;
86
+ exports.ProvisioningCriteriaOperationV2024 = exports.ProvisioningCompletedRequesterV2024TypeV2024 = exports.ProvisioningCompletedRecipientV2024TypeV2024 = exports.ProvisioningCompletedAccountRequestsInnerV2024ProvisioningResultV2024 = exports.ProvisioningCompletedAccountRequestsInnerSourceV2024TypeV2024 = exports.ProvisioningCompletedAccountRequestsInnerAttributeRequestsInnerV2024OperationV2024 = exports.ProductV2024OrgTypeV2024 = exports.PreApprovalTriggerDetailsV2024DecisionV2024 = exports.PendingApprovalOwnerV2024TypeV2024 = exports.PendingApprovalMaxPermittedAccessDurationV2024TimeUnitV2024 = exports.PendingApprovalActionV2024 = exports.PatOwnerV2024TypeV2024 = exports.PasswordStatusV2024StateV2024 = exports.PasswordChangeResponseV2024StateV2024 = exports.OwnerReferenceV2024TypeV2024 = exports.OwnerReferenceSegmentsV2024TypeV2024 = exports.OwnerDtoV2024TypeV2024 = exports.OutliersContributingFeatureAccessItemsV2024AccessTypeV2024 = exports.OutlierValueTypeV2024NameV2024 = exports.OutlierV2024UnignoreTypeV2024 = exports.OutlierV2024TypeV2024 = exports.OutlierSummaryV2024TypeV2024 = exports.OrphanIdentitiesReportArgumentsV2024SelectedFormatsV2024 = exports.OperationV2024 = exports.ObjectMappingResponseV2024ObjectTypeV2024 = exports.ObjectMappingRequestV2024ObjectTypeV2024 = exports.NonEmployeeSchemaAttributeTypeV2024 = exports.NonEmployeeIdentityDtoTypeV2024 = exports.NonEmployeeBulkUploadStatusV2024StatusV2024 = exports.NonEmployeeBulkUploadJobV2024StatusV2024 = exports.NativeChangeDetectionConfigV2024OperationsV2024 = exports.NamedConstructsV2024 = exports.MultiHostSourcesV2024StatusV2024 = exports.MultiHostSourcesV2024FeaturesV2024 = exports.MultiHostIntegrationsV2024ConnectionTypeV2024 = exports.MultiHostIntegrationsV2024StatusV2024 = exports.MultiHostIntegrationsV2024FeaturesV2024 = exports.MultiHostIntegrationsOwnerV2024TypeV2024 = exports.MultiHostIntegrationsConnectorAttributesV2024MultihostStatusV2024 = exports.MultiHostIntegrationsBeforeProvisioningRuleV2024TypeV2024 = exports.MfaConfigTestResponseV2024StateV2024 = exports.MetricTypeV2024 = exports.MembershipTypeV2024 = exports.MediumV2024 = exports.ManualWorkItemStateV2024 = exports.ManualWorkItemDetailsOriginalOwnerV2024TypeV2024 = exports.ManualWorkItemDetailsCurrentOwnerV2024TypeV2024 = exports.ManagedClusterV2024ConsolidatedHealthIndicatorsStatusV2024 = exports.ManagedClusterV2024StatusV2024 = exports.ManagedClusterUpdatePreferencesV2024UpdateStateV2024 = void 0;
87
87
  exports.RoleMiningSessionStateV2024 = exports.RoleMiningSessionScopingMethodV2024 = exports.RoleMiningRoleTypeV2024 = exports.RoleMiningPotentialRoleProvisionStateV2024 = exports.RoleMiningPotentialRoleExportStateV2024 = exports.RoleMetadataBulkUpdateByQueryRequestV2024ReplaceScopeV2024 = exports.RoleMetadataBulkUpdateByQueryRequestV2024OperationV2024 = exports.RoleMetadataBulkUpdateByIdRequestV2024ReplaceScopeV2024 = exports.RoleMetadataBulkUpdateByIdRequestV2024OperationV2024 = exports.RoleMetadataBulkUpdateByFilterRequestV2024ReplaceScopeV2024 = exports.RoleMetadataBulkUpdateByFilterRequestV2024OperationV2024 = exports.RoleMembershipSelectorTypeV2024 = exports.RoleInsightsResponseV2024StatusV2024 = exports.RoleGetAllBulkUpdateResponseV2024StatusV2024 = exports.RoleCriteriaOperationV2024 = exports.RoleCriteriaKeyTypeV2024 = exports.RoleBulkUpdateResponseV2024StatusV2024 = exports.RoleAssignmentSourceTypeV2024 = exports.RoleAssignmentDtoAssignerV2024TypeV2024 = exports.ReviewerV2024TypeV2024 = exports.ReviewableEntitlementAccountOwnerV2024TypeV2024 = exports.RequestedItemStatusV2024TypeV2024 = exports.RequestedItemStatusSodViolationContextV2024StateV2024 = exports.RequestedItemStatusRequestedForV2024TypeV2024 = exports.RequestedItemStatusRequestStateV2024 = exports.RequestedItemStatusPreApprovalTriggerDetailsV2024DecisionV2024 = exports.RequestedItemDtoRefV2024TypeV2024 = exports.RequestedItemDetailsV2024TypeV2024 = exports.RequestedItemAccountSelectionsV2024TypeV2024 = exports.RequestableObjectTypeV2024 = exports.RequestableObjectRequestStatusV2024 = exports.RequestableObjectReferenceV2024TypeV2024 = exports.ReportTypeV2024 = exports.ReportResultsV2024AvailableFormatsV2024 = exports.ReportResultsV2024StatusV2024 = exports.ReportResultsV2024ReportTypeV2024 = exports.ReportResultReferenceV2024StatusV2024 = exports.ReportResultReferenceV2024TypeV2024 = exports.ReportDetailsV2024ReportTypeV2024 = exports.ReportDetailsArgumentsV2024SelectedFormatsV2024 = exports.RecommendationV2024MethodV2024 = exports.RecommendationV2024TypeV2024 = exports.RecommendationResponseV2024RecommendationV2024 = exports.ReassignmentTypeV2024 = exports.ReassignmentTypeEnumV2024 = exports.ReassignmentReferenceV2024TypeV2024 = exports.ReassignReferenceV2024TypeV2024 = exports.QueryTypeV2024 = exports.PublicIdentityV2024IdentityStateV2024 = exports.ProvisioningStateV2024 = void 0;
88
88
  exports.SourceV2024FeaturesV2024 = exports.SourceUsageStatusV2024StatusV2024 = exports.SourceUpdatedActorV2024TypeV2024 = exports.SourceSyncJobV2024StatusV2024 = exports.SourceSchemasInnerV2024TypeV2024 = exports.SourceScheduleV2024TypeV2024 = exports.SourcePasswordPoliciesInnerV2024TypeV2024 = exports.SourceOwnerV2024TypeV2024 = exports.SourceManagerCorrelationRuleV2024TypeV2024 = exports.SourceManagementWorkgroupV2024TypeV2024 = exports.SourceHealthDtoV2024StatusV2024 = exports.SourceDeletedActorV2024TypeV2024 = exports.SourceCreatedActorV2024TypeV2024 = exports.SourceClusterV2024TypeV2024 = exports.SourceClusterDtoV2024TypeV2024 = exports.SourceBeforeProvisioningRuleV2024TypeV2024 = exports.SourceAccountCorrelationRuleV2024TypeV2024 = exports.SourceAccountCorrelationConfigV2024TypeV2024 = exports.SodViolationContextCheckCompletedV2024StateV2024 = exports.SodReportResultDtoV2024TypeV2024 = exports.SodRecipientV2024TypeV2024 = exports.SodPolicyV2024TypeV2024 = exports.SodPolicyV2024StateV2024 = exports.SodPolicyOwnerRefV2024TypeV2024 = exports.SodPolicyDtoV2024TypeV2024 = exports.SodPolicyDto1V2024TypeV2024 = exports.SlimCampaignV2024CorrelatedStatusV2024 = exports.SlimCampaignV2024StatusV2024 = exports.SlimCampaignV2024TypeV2024 = exports.ServiceProviderConfigurationFederationProtocolDetailsInnerV2024RoleV2024 = exports.ServiceDeskSourceV2024TypeV2024 = exports.SendTestNotificationRequestDtoV2024MediumV2024 = exports.SendAccountVerificationRequestV2024ViaV2024 = exports.SelfImportExportDtoV2024TypeV2024 = exports.SedAssigneeV2024TypeV2024 = exports.SearchScheduleRecipientsInnerV2024TypeV2024 = exports.SearchFilterTypeV2024 = exports.ScopeVisibilityTypeV2024 = exports.ScopeTypeV2024 = exports.SchemaV2024FeaturesV2024 = exports.ScheduledSearchAllOfOwnerV2024TypeV2024 = exports.ScheduledAttributesV2024FrequencyV2024 = exports.ScheduledActionResponseV2024JobTypeV2024 = exports.ScheduledActionPayloadV2024JobTypeV2024 = exports.ScheduleV2024TypeV2024 = exports.ScheduleTypeV2024 = exports.ScheduleMonthsV2024TypeV2024 = exports.ScheduleHoursV2024TypeV2024 = exports.ScheduleDaysV2024TypeV2024 = exports.Schedule1V2024TypeV2024 = void 0;
89
89
  exports.WorkflowAllOfCreatorV2024TypeV2024 = exports.WorkItemTypeManualWorkItemsV2024 = exports.WorkItemStateV2024 = exports.WorkItemStateManualWorkItemsV2024 = exports.ViolationOwnerAssignmentConfigV2024AssignmentRuleV2024 = exports.ViolationOwnerAssignmentConfigOwnerRefV2024TypeV2024 = exports.ViolationContextPolicyV2024TypeV2024 = exports.VAClusterStatusChangeEventV2024TypeV2024 = exports.VAClusterStatusChangeEventPreviousHealthCheckResultV2024StatusV2024 = exports.VAClusterStatusChangeEventHealthCheckResultV2024StatusV2024 = exports.V3CreateConnectorDtoV2024StatusV2024 = exports.V3ConnectorDtoV2024StatusV2024 = exports.UsageTypeV2024 = exports.UpdateMultiHostSourcesRequestInnerV2024OpV2024 = exports.UpdateDetailV2024StatusV2024 = exports.UncorrelatedAccountsReportArgumentsV2024SelectedFormatsV2024 = exports.TriggerTypeV2024 = exports.TransformV2024TypeV2024 = exports.TransformReadV2024TypeV2024 = exports.TestSourceConnectionMultihost200ResponseV2024ResultTypeV2024 = exports.TemplateDtoV2024MediumV2024 = exports.TemplateDtoDefaultV2024MediumV2024 = exports.TemplateBulkDeleteDtoV2024MediumV2024 = exports.TaskStatusV2024CompletionStatusV2024 = exports.TaskStatusV2024TypeV2024 = exports.TaskStatusMessageV2024TypeV2024 = exports.TaskResultSimplifiedV2024CompletionStatusV2024 = exports.TaskResultDtoV2024TypeV2024 = exports.TaskResultDetailsV2024CompletionStatusV2024 = exports.TaskResultDetailsV2024ReportTypeV2024 = exports.TaskResultDetailsV2024TypeV2024 = exports.TaskResultDetailsMessagesInnerV2024TypeV2024 = exports.TargetV2024TypeV2024 = exports.TaggedObjectDtoV2024TypeV2024 = exports.TagTagCategoryRefsInnerV2024TypeV2024 = exports.SubscriptionTypeV2024 = exports.SubscriptionPatchRequestInnerV2024OpV2024 = exports.StatusResponseV2024StatusV2024 = exports.StandardLevelV2024 = exports.SpDetailsV2024RoleV2024 = exports.SpConfigRuleV2024ModesV2024 = exports.SpConfigJobV2024TypeV2024 = exports.SpConfigJobV2024StatusV2024 = exports.SpConfigImportJobStatusV2024TypeV2024 = exports.SpConfigImportJobStatusV2024StatusV2024 = exports.SpConfigExportJobV2024TypeV2024 = exports.SpConfigExportJobV2024StatusV2024 = exports.SpConfigExportJobStatusV2024TypeV2024 = exports.SpConfigExportJobStatusV2024StatusV2024 = exports.SourceV2024StatusV2024 = void 0;
@@ -1679,10 +1679,18 @@ exports.InvocationStatusTypeV2024 = {
1679
1679
  Test: 'TEST',
1680
1680
  RealTime: 'REAL_TIME'
1681
1681
  };
1682
- exports.JsonPatchOperationV2024OpV2024 = {
1682
+ exports.JsonPatchOperationRoleMiningV2024OpV2024 = {
1683
1683
  Remove: 'remove',
1684
1684
  Replace: 'replace'
1685
1685
  };
1686
+ exports.JsonPatchOperationV2024OpV2024 = {
1687
+ Add: 'add',
1688
+ Remove: 'remove',
1689
+ Replace: 'replace',
1690
+ Move: 'move',
1691
+ Copy: 'copy',
1692
+ Test: 'test'
1693
+ };
1686
1694
  exports.LatestOutlierSummaryV2024TypeV2024 = {
1687
1695
  LowSimilarity: 'LOW_SIMILARITY',
1688
1696
  Structural: 'STRUCTURAL'
@@ -2201,10 +2209,6 @@ exports.PasswordStatusV2024StateV2024 = {
2201
2209
  exports.PatOwnerV2024TypeV2024 = {
2202
2210
  Identity: 'IDENTITY'
2203
2211
  };
2204
- exports.PatchPotentialRoleRequestInnerV2024OpV2024 = {
2205
- Remove: 'remove',
2206
- Replace: 'replace'
2207
- };
2208
2212
  /**
2209
2213
  * Enum represents action that is being processed on an approval.
2210
2214
  * @export
@@ -6529,7 +6533,7 @@ var AccessRequestsV2024ApiAxiosParamCreator = function (configuration) {
6529
6533
  });
6530
6534
  },
6531
6535
  /**
6532
- * >**Required scopes:** ORG_ADMIN requires idn:access-request:manage. USER level requires idn:access-request-self:manage (Personal Access Token only). Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
6536
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
6533
6537
  * @summary Submit access request
6534
6538
  * @param {AccessRequestV2024} accessRequestV2024
6535
6539
  * @param {*} [axiosOptions] Override http request option.
@@ -7100,7 +7104,7 @@ var AccessRequestsV2024ApiFp = function (configuration) {
7100
7104
  });
7101
7105
  },
7102
7106
  /**
7103
- * >**Required scopes:** ORG_ADMIN requires idn:access-request:manage. USER level requires idn:access-request-self:manage (Personal Access Token only). Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
7107
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
7104
7108
  * @summary Submit access request
7105
7109
  * @param {AccessRequestV2024} accessRequestV2024
7106
7110
  * @param {*} [axiosOptions] Override http request option.
@@ -7332,7 +7336,7 @@ var AccessRequestsV2024ApiFactory = function (configuration, basePath, axios) {
7332
7336
  return localVarFp.closeAccessRequest(requestParameters.closeAccessRequestV2024, axiosOptions).then(function (request) { return request(axios, basePath); });
7333
7337
  },
7334
7338
  /**
7335
- * >**Required scopes:** ORG_ADMIN requires idn:access-request:manage. USER level requires idn:access-request-self:manage (Personal Access Token only). Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
7339
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
7336
7340
  * @summary Submit access request
7337
7341
  * @param {AccessRequestsV2024ApiCreateAccessRequestRequest} requestParameters Request parameters.
7338
7342
  * @param {*} [axiosOptions] Override http request option.
@@ -7464,7 +7468,7 @@ var AccessRequestsV2024Api = /** @class */ (function (_super) {
7464
7468
  return (0, exports.AccessRequestsV2024ApiFp)(this.configuration).closeAccessRequest(requestParameters.closeAccessRequestV2024, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
7465
7469
  };
7466
7470
  /**
7467
- * >**Required scopes:** ORG_ADMIN requires idn:access-request:manage. USER level requires idn:access-request-self:manage (Personal Access Token only). Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
7471
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
7468
7472
  * @summary Submit access request
7469
7473
  * @param {AccessRequestsV2024ApiCreateAccessRequestRequest} requestParameters Request parameters.
7470
7474
  * @param {*} [axiosOptions] Override http request option.
@@ -36284,12 +36288,12 @@ var IAIRoleMiningV2024ApiAxiosParamCreator = function (configuration) {
36284
36288
  * @summary Update a potential role
36285
36289
  * @param {string} sessionId The role mining session id
36286
36290
  * @param {string} potentialRoleId The potential role summary id
36287
- * @param {Array<PatchPotentialRoleRequestInnerV2024>} patchPotentialRoleRequestInnerV2024
36291
+ * @param {Array<JsonPatchOperationRoleMiningV2024>} jsonPatchOperationRoleMiningV2024
36288
36292
  * @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
36289
36293
  * @param {*} [axiosOptions] Override http request option.
36290
36294
  * @throws {RequiredError}
36291
36295
  */
36292
- patchPotentialRole: function (sessionId, potentialRoleId, patchPotentialRoleRequestInnerV2024, xSailPointExperimental, axiosOptions) {
36296
+ patchPotentialRole: function (sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2024, xSailPointExperimental, axiosOptions) {
36293
36297
  if (axiosOptions === void 0) { axiosOptions = {}; }
36294
36298
  return __awaiter(_this, void 0, void 0, function () {
36295
36299
  var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
@@ -36300,8 +36304,8 @@ var IAIRoleMiningV2024ApiAxiosParamCreator = function (configuration) {
36300
36304
  (0, common_1.assertParamExists)('patchPotentialRole', 'sessionId', sessionId);
36301
36305
  // verify required parameter 'potentialRoleId' is not null or undefined
36302
36306
  (0, common_1.assertParamExists)('patchPotentialRole', 'potentialRoleId', potentialRoleId);
36303
- // verify required parameter 'patchPotentialRoleRequestInnerV2024' is not null or undefined
36304
- (0, common_1.assertParamExists)('patchPotentialRole', 'patchPotentialRoleRequestInnerV2024', patchPotentialRoleRequestInnerV2024);
36307
+ // verify required parameter 'jsonPatchOperationRoleMiningV2024' is not null or undefined
36308
+ (0, common_1.assertParamExists)('patchPotentialRole', 'jsonPatchOperationRoleMiningV2024', jsonPatchOperationRoleMiningV2024);
36305
36309
  if (xSailPointExperimental === undefined) {
36306
36310
  xSailPointExperimental = 'true';
36307
36311
  }
@@ -36327,11 +36331,21 @@ var IAIRoleMiningV2024ApiAxiosParamCreator = function (configuration) {
36327
36331
  _a.sent();
36328
36332
  // authentication userAuth required
36329
36333
  // oauth required
36330
- return [4 /*yield*/, (0, common_1.setOAuthToObject)(localVarHeaderParameter, "userAuth", [], configuration)];
36334
+ return [4 /*yield*/, (0, common_1.setOAuthToObject)(localVarHeaderParameter, "userAuth", [], configuration)
36335
+ // authentication applicationAuth required
36336
+ // oauth required
36337
+ ];
36331
36338
  case 2:
36332
36339
  // authentication userAuth required
36333
36340
  // oauth required
36334
36341
  _a.sent();
36342
+ // authentication applicationAuth required
36343
+ // oauth required
36344
+ return [4 /*yield*/, (0, common_1.setOAuthToObject)(localVarHeaderParameter, "applicationAuth", [], configuration)];
36345
+ case 3:
36346
+ // authentication applicationAuth required
36347
+ // oauth required
36348
+ _a.sent();
36335
36349
  localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
36336
36350
  if (xSailPointExperimental != null) {
36337
36351
  localVarHeaderParameter['X-SailPoint-Experimental'] = String(xSailPointExperimental);
@@ -36339,7 +36353,7 @@ var IAIRoleMiningV2024ApiAxiosParamCreator = function (configuration) {
36339
36353
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
36340
36354
  headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
36341
36355
  localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
36342
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(patchPotentialRoleRequestInnerV2024, localVarRequestOptions, configuration);
36356
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(jsonPatchOperationRoleMiningV2024, localVarRequestOptions, configuration);
36343
36357
  return [2 /*return*/, {
36344
36358
  url: (0, common_1.toPathString)(localVarUrlObj),
36345
36359
  axiosOptions: localVarRequestOptions,
@@ -36353,12 +36367,12 @@ var IAIRoleMiningV2024ApiAxiosParamCreator = function (configuration) {
36353
36367
  * @summary Update a potential role session
36354
36368
  * @param {string} sessionId The role mining session id
36355
36369
  * @param {string} potentialRoleId The potential role summary id
36356
- * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024
36370
+ * @param {Array<JsonPatchOperationRoleMiningV2024>} jsonPatchOperationRoleMiningV2024
36357
36371
  * @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
36358
36372
  * @param {*} [axiosOptions] Override http request option.
36359
36373
  * @throws {RequiredError}
36360
36374
  */
36361
- patchPotentialRoleSession: function (sessionId, potentialRoleId, jsonPatchOperationV2024, xSailPointExperimental, axiosOptions) {
36375
+ patchPotentialRoleSession: function (sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2024, xSailPointExperimental, axiosOptions) {
36362
36376
  if (axiosOptions === void 0) { axiosOptions = {}; }
36363
36377
  return __awaiter(_this, void 0, void 0, function () {
36364
36378
  var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
@@ -36369,8 +36383,8 @@ var IAIRoleMiningV2024ApiAxiosParamCreator = function (configuration) {
36369
36383
  (0, common_1.assertParamExists)('patchPotentialRoleSession', 'sessionId', sessionId);
36370
36384
  // verify required parameter 'potentialRoleId' is not null or undefined
36371
36385
  (0, common_1.assertParamExists)('patchPotentialRoleSession', 'potentialRoleId', potentialRoleId);
36372
- // verify required parameter 'jsonPatchOperationV2024' is not null or undefined
36373
- (0, common_1.assertParamExists)('patchPotentialRoleSession', 'jsonPatchOperationV2024', jsonPatchOperationV2024);
36386
+ // verify required parameter 'jsonPatchOperationRoleMiningV2024' is not null or undefined
36387
+ (0, common_1.assertParamExists)('patchPotentialRoleSession', 'jsonPatchOperationRoleMiningV2024', jsonPatchOperationRoleMiningV2024);
36374
36388
  if (xSailPointExperimental === undefined) {
36375
36389
  xSailPointExperimental = 'true';
36376
36390
  }
@@ -36418,7 +36432,7 @@ var IAIRoleMiningV2024ApiAxiosParamCreator = function (configuration) {
36418
36432
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
36419
36433
  headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
36420
36434
  localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
36421
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(jsonPatchOperationV2024, localVarRequestOptions, configuration);
36435
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(jsonPatchOperationRoleMiningV2024, localVarRequestOptions, configuration);
36422
36436
  return [2 /*return*/, {
36423
36437
  url: (0, common_1.toPathString)(localVarUrlObj),
36424
36438
  axiosOptions: localVarRequestOptions,
@@ -37164,18 +37178,18 @@ var IAIRoleMiningV2024ApiFp = function (configuration) {
37164
37178
  * @summary Update a potential role
37165
37179
  * @param {string} sessionId The role mining session id
37166
37180
  * @param {string} potentialRoleId The potential role summary id
37167
- * @param {Array<PatchPotentialRoleRequestInnerV2024>} patchPotentialRoleRequestInnerV2024
37181
+ * @param {Array<JsonPatchOperationRoleMiningV2024>} jsonPatchOperationRoleMiningV2024
37168
37182
  * @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
37169
37183
  * @param {*} [axiosOptions] Override http request option.
37170
37184
  * @throws {RequiredError}
37171
37185
  */
37172
- patchPotentialRole: function (sessionId, potentialRoleId, patchPotentialRoleRequestInnerV2024, xSailPointExperimental, axiosOptions) {
37186
+ patchPotentialRole: function (sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2024, xSailPointExperimental, axiosOptions) {
37173
37187
  var _a, _b, _c;
37174
37188
  return __awaiter(this, void 0, void 0, function () {
37175
37189
  var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
37176
37190
  return __generator(this, function (_d) {
37177
37191
  switch (_d.label) {
37178
- case 0: return [4 /*yield*/, localVarAxiosParamCreator.patchPotentialRole(sessionId, potentialRoleId, patchPotentialRoleRequestInnerV2024, xSailPointExperimental, axiosOptions)];
37192
+ case 0: return [4 /*yield*/, localVarAxiosParamCreator.patchPotentialRole(sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2024, xSailPointExperimental, axiosOptions)];
37179
37193
  case 1:
37180
37194
  localVarAxiosArgs = _d.sent();
37181
37195
  localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
@@ -37190,18 +37204,18 @@ var IAIRoleMiningV2024ApiFp = function (configuration) {
37190
37204
  * @summary Update a potential role session
37191
37205
  * @param {string} sessionId The role mining session id
37192
37206
  * @param {string} potentialRoleId The potential role summary id
37193
- * @param {Array<JsonPatchOperationV2024>} jsonPatchOperationV2024
37207
+ * @param {Array<JsonPatchOperationRoleMiningV2024>} jsonPatchOperationRoleMiningV2024
37194
37208
  * @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
37195
37209
  * @param {*} [axiosOptions] Override http request option.
37196
37210
  * @throws {RequiredError}
37197
37211
  */
37198
- patchPotentialRoleSession: function (sessionId, potentialRoleId, jsonPatchOperationV2024, xSailPointExperimental, axiosOptions) {
37212
+ patchPotentialRoleSession: function (sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2024, xSailPointExperimental, axiosOptions) {
37199
37213
  var _a, _b, _c;
37200
37214
  return __awaiter(this, void 0, void 0, function () {
37201
37215
  var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
37202
37216
  return __generator(this, function (_d) {
37203
37217
  switch (_d.label) {
37204
- case 0: return [4 /*yield*/, localVarAxiosParamCreator.patchPotentialRoleSession(sessionId, potentialRoleId, jsonPatchOperationV2024, xSailPointExperimental, axiosOptions)];
37218
+ case 0: return [4 /*yield*/, localVarAxiosParamCreator.patchPotentialRoleSession(sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2024, xSailPointExperimental, axiosOptions)];
37205
37219
  case 1:
37206
37220
  localVarAxiosArgs = _d.sent();
37207
37221
  localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
@@ -37493,7 +37507,7 @@ var IAIRoleMiningV2024ApiFactory = function (configuration, basePath, axios) {
37493
37507
  * @throws {RequiredError}
37494
37508
  */
37495
37509
  patchPotentialRole: function (requestParameters, axiosOptions) {
37496
- return localVarFp.patchPotentialRole(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.patchPotentialRoleRequestInnerV2024, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(axios, basePath); });
37510
+ return localVarFp.patchPotentialRole(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningV2024, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(axios, basePath); });
37497
37511
  },
37498
37512
  /**
37499
37513
  * The method updates an existing potential role using. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
@@ -37503,7 +37517,7 @@ var IAIRoleMiningV2024ApiFactory = function (configuration, basePath, axios) {
37503
37517
  * @throws {RequiredError}
37504
37518
  */
37505
37519
  patchPotentialRoleSession: function (requestParameters, axiosOptions) {
37506
- return localVarFp.patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationV2024, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(axios, basePath); });
37520
+ return localVarFp.patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningV2024, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(axios, basePath); });
37507
37521
  },
37508
37522
  /**
37509
37523
  * The method updates an existing role mining session using PATCH. Supports op in {\"replace\"} and changes to pruneThreshold and/or minNumIdentitiesInPotentialRole. The potential roles in this role mining session is then re-calculated.
@@ -37804,7 +37818,7 @@ var IAIRoleMiningV2024Api = /** @class */ (function (_super) {
37804
37818
  */
37805
37819
  IAIRoleMiningV2024Api.prototype.patchPotentialRole = function (requestParameters, axiosOptions) {
37806
37820
  var _this = this;
37807
- return (0, exports.IAIRoleMiningV2024ApiFp)(this.configuration).patchPotentialRole(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.patchPotentialRoleRequestInnerV2024, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
37821
+ return (0, exports.IAIRoleMiningV2024ApiFp)(this.configuration).patchPotentialRole(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningV2024, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
37808
37822
  };
37809
37823
  /**
37810
37824
  * The method updates an existing potential role using. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
@@ -37816,7 +37830,7 @@ var IAIRoleMiningV2024Api = /** @class */ (function (_super) {
37816
37830
  */
37817
37831
  IAIRoleMiningV2024Api.prototype.patchPotentialRoleSession = function (requestParameters, axiosOptions) {
37818
37832
  var _this = this;
37819
- return (0, exports.IAIRoleMiningV2024ApiFp)(this.configuration).patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationV2024, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
37833
+ return (0, exports.IAIRoleMiningV2024ApiFp)(this.configuration).patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningV2024, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
37820
37834
  };
37821
37835
  /**
37822
37836
  * The method updates an existing role mining session using PATCH. Supports op in {\"replace\"} and changes to pruneThreshold and/or minNumIdentitiesInPotentialRole. The potential roles in this role mining session is then re-calculated.