sailpoint-api-client 1.7.17 → 1.7.19
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/beta/README.md +2 -2
- package/beta/api.ts +121 -75
- package/beta/common.ts +2 -2
- package/beta/package.json +1 -1
- package/dist/beta/api.d.ts +100 -59
- package/dist/beta/api.js +49 -35
- package/dist/beta/api.js.map +1 -1
- package/dist/beta/common.js +1 -1
- package/dist/v2024/api.d.ts +95 -54
- package/dist/v2024/api.js +46 -32
- package/dist/v2024/api.js.map +1 -1
- package/dist/v2024/common.js +1 -1
- package/dist/v2025/api.d.ts +114 -77
- package/dist/v2025/api.js +58 -48
- package/dist/v2025/api.js.map +1 -1
- package/dist/v2025/common.js +1 -1
- package/dist/v2026/common.js +1 -1
- package/dist/v3/api.d.ts +4 -4
- package/dist/v3/api.js +4 -4
- package/dist/v3/common.js +1 -1
- package/package.json +1 -1
- package/v2024/README.md +2 -2
- package/v2024/api.ts +116 -70
- package/v2024/common.ts +2 -2
- package/v2024/package.json +1 -1
- package/v2025/README.md +2 -2
- package/v2025/api.ts +137 -95
- package/v2025/common.ts +2 -2
- package/v2025/package.json +1 -1
- package/v2026/README.md +2 -2
- package/v2026/common.ts +2 -2
- package/v2026/package.json +1 -1
- package/v3/README.md +2 -2
- package/v3/api.ts +4 -4
- package/v3/common.ts +2 -2
- package/v3/package.json +1 -1
package/dist/v2025/api.js
CHANGED
|
@@ -83,8 +83,8 @@ exports.BackupResponse1V2025TypeV2025 = exports.BackupResponse1V2025StatusV2025
|
|
|
83
83
|
exports.CommentDtoAuthorV2025TypeV2025 = exports.CloseAccessRequestV2025CompletionStatusV2025 = exports.CloseAccessRequestV2025ExecutionStatusV2025 = exports.ClientTypeV2025 = exports.CertificationTaskV2025StatusV2025 = exports.CertificationTaskV2025TargetTypeV2025 = exports.CertificationTaskV2025TypeV2025 = exports.CertificationReferenceV2025TypeV2025 = exports.CertificationPhaseV2025 = exports.CertificationDecisionV2025 = exports.CampaignV2025MandatoryCommentRequirementV2025 = exports.CampaignV2025CorrelatedStatusV2025 = exports.CampaignV2025StatusV2025 = exports.CampaignV2025TypeV2025 = exports.CampaignTemplateOwnerRefV2025TypeV2025 = exports.CampaignReportV2025StatusV2025 = exports.CampaignReportV2025TypeV2025 = exports.CampaignReferenceV2025MandatoryCommentRequirementV2025 = exports.CampaignReferenceV2025CorrelatedStatusV2025 = exports.CampaignReferenceV2025CampaignTypeV2025 = exports.CampaignReferenceV2025TypeV2025 = exports.CampaignGeneratedCampaignV2025StatusV2025 = exports.CampaignGeneratedCampaignV2025TypeV2025 = exports.CampaignFilterDetailsV2025ModeV2025 = exports.CampaignEndedCampaignV2025StatusV2025 = exports.CampaignEndedCampaignV2025TypeV2025 = exports.CampaignCompleteOptionsV2025AutoCompleteActionV2025 = exports.CampaignAllOfSourcesWithOrphanEntitlementsV2025TypeV2025 = exports.CampaignAllOfSearchCampaignInfoV2025TypeV2025 = exports.CampaignAllOfSearchCampaignInfoReviewerV2025TypeV2025 = exports.CampaignAllOfRoleCompositionCampaignInfoReviewerV2025TypeV2025 = exports.CampaignAllOfRoleCompositionCampaignInfoRemediatorRefV2025TypeV2025 = exports.CampaignAllOfMachineAccountCampaignInfoV2025ReviewerTypeV2025 = exports.CampaignAllOfFilterV2025TypeV2025 = exports.CampaignAlertV2025LevelV2025 = exports.CampaignActivatedCampaignV2025StatusV2025 = exports.CampaignActivatedCampaignV2025TypeV2025 = exports.BusinessServiceTypeV2025 = exports.BulkAddTaggedObjectV2025OperationV2025 = exports.BucketTypeV2025 = exports.BeforeProvisioningRuleDtoV2025TypeV2025 = exports.BaseAccessOwnerV2025TypeV2025 = exports.BackupResponseV2025CloudStorageStatusV2025 = exports.BackupResponseV2025HydrationStatusV2025 = exports.BackupResponseV2025BackupTypeV2025 = exports.BackupResponseV2025TypeV2025 = exports.BackupResponseV2025StatusV2025 = exports.BackupResponse1V2025CloudStorageStatusV2025 = exports.BackupResponse1V2025HydrationStatusV2025 = exports.BackupResponse1V2025BackupTypeV2025 = void 0;
|
|
84
84
|
exports.EntitlementAttributeBulkUpdateIdsRequestV2025OperationV2025 = exports.EntitlementAttributeBulkUpdateFilterRequestV2025ReplaceScopeV2025 = exports.EntitlementAttributeBulkUpdateFilterRequestV2025OperationV2025 = exports.EntitlementApprovalSchemeV2025ApproverTypeV2025 = exports.EmailStatusDtoV2025VerificationStatusV2025 = exports.DtoTypeV2025 = exports.DraftResponseV2025ApprovalStatusV2025 = exports.DraftResponseV2025ModeV2025 = exports.DraftResponseV2025TypeV2025 = exports.DraftResponseV2025StatusV2025 = exports.DocumentTypeV2025 = exports.DimensionRefV2025TypeV2025 = exports.DimensionMembershipSelectorTypeV2025 = exports.DimensionCriteriaOperationV2025 = exports.DimensionCriteriaKeyTypeV2025 = exports.DeployResponseV2025CloudStorageStatusV2025 = exports.DeployResponseV2025TypeV2025 = exports.DeployResponseV2025StatusV2025 = exports.DependantConnectionsMissingDtoV2025DependencyTypeV2025 = exports.DeleteSource202ResponseV2025TypeV2025 = exports.DateCompareV2025OperatorV2025 = exports.CustomPasswordInstructionV2025PageIdV2025 = exports.CriteriaTypeV2025 = exports.CreatePrivilegeCriteriaRequestV2025PrivilegeLevelV2025 = exports.CreatePrivilegeCriteriaRequestV2025OperatorV2025 = exports.CreatePrivilegeCriteriaRequestV2025TypeV2025 = exports.CreatePrivilegeCriteriaRequestGroupsInnerV2025OperatorV2025 = exports.CreatePrivilegeCriteriaRequestGroupsInnerCriteriaItemsInnerV2025OperatorV2025 = exports.CreatePrivilegeCriteriaRequestGroupsInnerCriteriaItemsInnerV2025TargetTypeV2025 = exports.CreateFormInstanceRequestV2025StateV2025 = exports.CrawlResourcesSizesOptionsV2025 = exports.CorrelationConfigAttributeAssignmentsInnerV2025MatchModeV2025 = exports.CorrelationConfigAttributeAssignmentsInnerV2025OperationV2025 = exports.CorrelatedGovernanceEventV2025TypeV2025 = exports.ConnectorRuleValidationResponseV2025StateV2025 = exports.ConnectorRuleUpdateRequestV2025TypeV2025 = exports.ConnectorRuleResponseV2025TypeV2025 = exports.ConnectorRuleCreateRequestV2025TypeV2025 = exports.ConnectorDetailV2025StatusV2025 = exports.ConnectedObjectTypeV2025 = exports.ConfigTypeEnumV2025 = exports.ConfigTypeEnumCamelV2025 = exports.ConditionRuleV2025ValueTypeV2025 = exports.ConditionRuleV2025OperatorV2025 = exports.ConditionRuleV2025SourceTypeV2025 = exports.ConditionEffectV2025EffectTypeV2025 = exports.CompletionStatusV2025 = exports.CompletedApprovalStateV2025 = exports.CommonAccessTypeV2025 = exports.CommonAccessItemStateV2025 = void 0;
|
|
85
85
|
exports.IdentityProfileAllOfOwnerV2025TypeV2025 = exports.IdentityProfileAllOfAuthoritativeSourceV2025TypeV2025 = exports.IdentityPreviewResponseIdentityV2025TypeV2025 = exports.IdentityManagerRefV2025TypeV2025 = exports.IdentityDeletedIdentityV2025TypeV2025 = exports.IdentityCreatedIdentityV2025TypeV2025 = exports.IdentityAttributesChangedIdentityV2025TypeV2025 = exports.HttpDispatchModeV2025 = exports.HttpAuthenticationTypeV2025 = exports.GrantTypeV2025 = exports.GetHistoricalIdentityEvents200ResponseInnerV2025AccessItemTypeV2025 = exports.GetCampaign200ResponseV2025MandatoryCommentRequirementV2025 = exports.GetCampaign200ResponseV2025CorrelatedStatusV2025 = exports.GetCampaign200ResponseV2025StatusV2025 = exports.GetCampaign200ResponseV2025TypeV2025 = exports.GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025 = exports.GetActiveCampaigns200ResponseInnerV2025CorrelatedStatusV2025 = exports.GetActiveCampaigns200ResponseInnerV2025StatusV2025 = exports.GetActiveCampaigns200ResponseInnerV2025TypeV2025 = exports.FormUsedByV2025TypeV2025 = exports.FormOwnerV2025TypeV2025 = exports.FormInstanceResponseV2025StateV2025 = exports.FormInstanceRecipientV2025TypeV2025 = exports.FormInstanceCreatedByV2025TypeV2025 = exports.FormElementValidationsSetV2025ValidationTypeV2025 = exports.FormElementV2025ElementTypeV2025 = exports.FormElementDynamicDataSourceV2025DataSourceTypeV2025 = exports.FormElementDynamicDataSourceConfigV2025ObjectTypeV2025 = exports.FormElementDynamicDataSourceConfigV2025IndicesV2025 = exports.FormDefinitionSelfImportExportDtoV2025TypeV2025 = exports.FormDefinitionInputV2025TypeV2025 = exports.FormConditionV2025RuleOperatorV2025 = exports.FilterTypeV2025 = exports.FieldDetailsDtoV2025TypeV2025 = exports.FederationProtocolDetailsV2025RoleV2025 = exports.ExpressionV2025OperatorV2025 = exports.ExpressionChildrenInnerV2025OperatorV2025 = exports.ExportPayloadV2025IncludeTypesV2025 = exports.ExportPayloadV2025ExcludeTypesV2025 = exports.ExportOptionsV2025IncludeTypesV2025 = exports.ExportOptionsV2025ExcludeTypesV2025 = exports.ExportOptions1V2025IncludeTypesV2025 = exports.ExportOptions1V2025ExcludeTypesV2025 = exports.ExecutionStatusV2025 = exports.ExceptionCriteriaCriteriaListInnerV2025TypeV2025 = exports.EntitlementRefV2025TypeV2025 = exports.EntitlementOwnerV2025TypeV2025 = exports.EntitlementAttributeBulkUpdateQueryRequestV2025ReplaceScopeV2025 = exports.EntitlementAttributeBulkUpdateQueryRequestV2025OperationV2025 = exports.EntitlementAttributeBulkUpdateIdsRequestV2025ReplaceScopeV2025 = void 0;
|
|
86
|
-
exports.
|
|
87
|
-
exports.PrivilegeCriteriaDTOV2025TypeV2025 = exports.PrivilegeCriteriaDTOGroupsInnerV2025OperatorV2025 = exports.PrivilegeCriteriaDTOGroupsInnerCriteriaItemsInnerV2025OperatorV2025 = exports.PrivilegeCriteriaDTOGroupsInnerCriteriaItemsInnerV2025TargetTypeV2025 = exports.PreApprovalTriggerDetailsV2025DecisionV2025 = exports.PendingApprovalOwnerV2025TypeV2025 = exports.PendingApprovalMaxPermittedAccessDurationV2025TimeUnitV2025 = exports.PendingApprovalActionV2025 = exports.
|
|
86
|
+
exports.ManagedClientV2025ProvisionStatusV2025 = exports.ManagedClientV2025ClusterTypeV2025 = exports.ManagedClientV2025StatusV2025 = exports.ManagedClientTypeV2025 = exports.ManagedClientStatusCodeV2025 = exports.ManagedClientHealthIndicatorsV2025TypeV2025 = exports.ManagedClientHealthIndicatorsV2025StatusV2025 = exports.ManagedClientHealthIndicatorsBodyV2025ConsolidatedHealthIndicatorsStatusV2025 = exports.ManagedClientHealthIndicatorsBodyV2025StatusV2025 = exports.MailFromAttributesV2025MailFromDomainStatusV2025 = exports.MachineIdentityUpdatedV2025MachineIdentityChangeTypesV2025 = exports.MachineIdentityUpdatedV2025EventTypeV2025 = exports.MachineIdentityUpdatedMachineIdentityV2025SubtypeV2025 = exports.MachineIdentityDeletedV2025EventTypeV2025 = exports.MachineIdentityDeletedMachineIdentityV2025SubtypeV2025 = exports.MachineIdentityCreatedV2025EventTypeV2025 = exports.MachineIdentityCreatedMachineIdentityV2025SubtypeV2025 = exports.MachineIdentityAggregationResponseV2025CompletionStatusV2025 = exports.MachineIdentityAggregationResponseV2025TypeV2025 = exports.MachineClassificationCriteriaOperationV2025 = exports.MachineClassificationConfigV2025ClassificationMethodV2025 = exports.MachineAccountV2025ClassificationMethodV2025 = exports.LocaleOriginV2025 = exports.LoadUncorrelatedAccountsTaskTaskV2025CompletionStatusV2025 = exports.LoadUncorrelatedAccountsTaskTaskMessagesInnerV2025TypeV2025 = exports.LoadAccountsTaskTaskV2025CompletionStatusV2025 = exports.LoadAccountsTaskTaskMessagesInnerV2025TypeV2025 = exports.ListWorkgroupMembers200ResponseInnerV2025TypeV2025 = exports.ListFormInstancesByTenantResponseV2025StateV2025 = exports.LifecyclestateDeletedV2025TypeV2025 = exports.LifecycleStateV2025IdentityStateV2025 = exports.LauncherV2025TypeV2025 = exports.LauncherRequestV2025TypeV2025 = exports.LauncherRequestReferenceV2025TypeV2025 = exports.LauncherReferenceV2025TypeV2025 = exports.LatestOutlierSummaryV2025TypeV2025 = exports.JsonPatchOperationV2025OpV2025 = exports.JsonPatchOperationRoleMiningV2025OpV2025 = exports.InvocationStatusTypeV2025 = exports.IndexV2025 = exports.ImportOptionsV2025DefaultReferencesV2025 = exports.ImportOptionsV2025IncludeTypesV2025 = exports.ImportOptionsV2025ExcludeTypesV2025 = exports.ImportObjectV2025TypeV2025 = exports.IdpDetailsV2025RoleV2025 = exports.IdentityWithNewAccessAccessRefsInnerV2025TypeV2025 = exports.IdentityV2025IdentityStatusV2025 = exports.IdentityV2025ProcessingStateV2025 = exports.IdentitySyncJobV2025StatusV2025 = exports.IdentityProfileExportedObjectSelfV2025TypeV2025 = void 0;
|
|
87
|
+
exports.PrivilegeCriteriaDTOV2025TypeV2025 = exports.PrivilegeCriteriaDTOGroupsInnerV2025OperatorV2025 = exports.PrivilegeCriteriaDTOGroupsInnerCriteriaItemsInnerV2025OperatorV2025 = exports.PrivilegeCriteriaDTOGroupsInnerCriteriaItemsInnerV2025TargetTypeV2025 = exports.PreApprovalTriggerDetailsV2025DecisionV2025 = exports.PendingApprovalOwnerV2025TypeV2025 = exports.PendingApprovalMaxPermittedAccessDurationV2025TimeUnitV2025 = exports.PendingApprovalActionV2025 = exports.PatOwnerV2025TypeV2025 = exports.PasswordStatusV2025StateV2025 = exports.PasswordChangeResponseV2025StateV2025 = exports.ParameterStorageJsonPatchV2025OpV2025 = exports.OwnerReferenceV2025TypeV2025 = exports.OwnerReferenceSegmentsV2025TypeV2025 = exports.OwnerDtoV2025TypeV2025 = exports.OutliersContributingFeatureAccessItemsV2025AccessTypeV2025 = exports.OutlierValueTypeV2025NameV2025 = exports.OutlierV2025UnignoreTypeV2025 = exports.OutlierV2025TypeV2025 = exports.OutlierSummaryV2025TypeV2025 = exports.OrphanIdentitiesReportArgumentsV2025SelectedFormatsV2025 = exports.OperationV2025 = exports.ObjectMappingResponseV2025ObjectTypeV2025 = exports.ObjectMappingRequestV2025ObjectTypeV2025 = exports.NonEmployeeSchemaAttributeTypeV2025 = exports.NonEmployeeIdentityDtoTypeV2025 = exports.NonEmployeeBulkUploadStatusV2025StatusV2025 = exports.NonEmployeeBulkUploadJobV2025StatusV2025 = exports.NativeChangeDetectionConfigV2025OperationsV2025 = exports.NamedConstructsV2025 = exports.MultiHostSourcesV2025StatusV2025 = exports.MultiHostSourcesV2025FeaturesV2025 = exports.MultiHostIntegrationsV2025ConnectionTypeV2025 = exports.MultiHostIntegrationsV2025StatusV2025 = exports.MultiHostIntegrationsV2025FeaturesV2025 = exports.MultiHostIntegrationsOwnerV2025TypeV2025 = exports.MultiHostIntegrationsConnectorAttributesV2025MultihostStatusV2025 = exports.MultiHostIntegrationsBeforeProvisioningRuleV2025TypeV2025 = exports.MfaConfigTestResponseV2025StateV2025 = exports.MetricTypeV2025 = exports.MembershipTypeV2025 = exports.MediumV2025 = exports.ManualWorkItemStateV2025 = exports.ManualWorkItemDetailsOriginalOwnerV2025TypeV2025 = exports.ManualWorkItemDetailsCurrentOwnerV2025TypeV2025 = exports.ManagedClusterV2025ConsolidatedHealthIndicatorsStatusV2025 = exports.ManagedClusterV2025StatusV2025 = exports.ManagedClusterUpdatePreferencesV2025UpdateStateV2025 = exports.ManagedClusterTypesV2025 = exports.ManagedClusterEncryptionConfigV2025FormatV2025 = void 0;
|
|
88
88
|
exports.RoleMetadataBulkUpdateByFilterRequestV2025ReplaceScopeV2025 = exports.RoleMetadataBulkUpdateByFilterRequestV2025OperationV2025 = exports.RoleMembershipSelectorTypeV2025 = exports.RoleInsightsResponseV2025StatusV2025 = exports.RoleGetAllBulkUpdateResponseV2025StatusV2025 = exports.RoleCriteriaOperationV2025 = exports.RoleCriteriaKeyTypeV2025 = exports.RoleBulkUpdateResponseV2025StatusV2025 = exports.RoleAssignmentSourceTypeV2025 = exports.RoleAssignmentDtoAssignerV2025TypeV2025 = exports.ReviewerV2025TypeV2025 = exports.ReviewableEntitlementAccountOwnerV2025TypeV2025 = exports.RequestedItemStatusV2025TypeV2025 = exports.RequestedItemStatusSodViolationContextV2025StateV2025 = exports.RequestedItemStatusRequestedForV2025TypeV2025 = exports.RequestedItemStatusRequestStateV2025 = exports.RequestedItemStatusPreApprovalTriggerDetailsV2025DecisionV2025 = exports.RequestedItemDtoRefV2025TypeV2025 = exports.RequestedItemDetailsV2025TypeV2025 = exports.RequestedItemAccountSelectionsV2025TypeV2025 = exports.RequestableObjectTypeV2025 = exports.RequestableObjectRequestStatusV2025 = exports.RequestableObjectReferenceV2025TypeV2025 = exports.ReportTypeV2025 = exports.ReportResultsV2025AvailableFormatsV2025 = exports.ReportResultsV2025StatusV2025 = exports.ReportResultsV2025ReportTypeV2025 = exports.ReportResultReferenceV2025StatusV2025 = exports.ReportResultReferenceV2025TypeV2025 = exports.ReportDetailsV2025ReportTypeV2025 = exports.ReportDetailsArgumentsV2025SelectedFormatsV2025 = exports.RecommendationV2025MethodV2025 = exports.RecommendationV2025TypeV2025 = exports.RecommendationResponseV2025RecommendationV2025 = exports.ReassignmentTypeV2025 = exports.ReassignmentTypeEnumV2025 = exports.ReassignmentReferenceV2025TypeV2025 = exports.ReassignReferenceV2025TypeV2025 = exports.QueryTypeV2025 = exports.PublicIdentityV2025IdentityStateV2025 = exports.ProvisioningStateV2025 = exports.ProvisioningCriteriaOperationV2025 = exports.ProvisioningCompletedRequesterV2025TypeV2025 = exports.ProvisioningCompletedRecipientV2025TypeV2025 = exports.ProvisioningCompletedAccountRequestsInnerV2025ProvisioningResultV2025 = exports.ProvisioningCompletedAccountRequestsInnerSourceV2025TypeV2025 = exports.ProvisioningCompletedAccountRequestsInnerAttributeRequestsInnerV2025OperationV2025 = exports.ProductV2025OrgTypeV2025 = exports.PrivilegeCriteriaDTOV2025PrivilegeLevelV2025 = exports.PrivilegeCriteriaDTOV2025OperatorV2025 = void 0;
|
|
89
89
|
exports.SourceBeforeProvisioningRuleV2025TypeV2025 = exports.SourceAccountCorrelationRuleV2025TypeV2025 = exports.SourceAccountCorrelationConfigV2025TypeV2025 = exports.SodViolationContextCheckCompletedV2025StateV2025 = exports.SodReportResultDtoV2025TypeV2025 = exports.SodRecipientV2025TypeV2025 = exports.SodPolicyV2025TypeV2025 = exports.SodPolicyV2025StateV2025 = exports.SodPolicyOwnerRefV2025TypeV2025 = exports.SodPolicyDtoV2025TypeV2025 = exports.SodPolicyDto1V2025TypeV2025 = exports.SlimCampaignV2025CorrelatedStatusV2025 = exports.SlimCampaignV2025StatusV2025 = exports.SlimCampaignV2025TypeV2025 = exports.ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025 = exports.ServiceDeskSourceV2025TypeV2025 = exports.SendTestNotificationRequestDtoV2025MediumV2025 = exports.SendAccountVerificationRequestV2025ViaV2025 = exports.SelfImportExportDtoV2025TypeV2025 = exports.SedAssigneeV2025TypeV2025 = exports.SearchScheduleRecipientsInnerV2025TypeV2025 = exports.SearchFilterTypeV2025 = exports.ScopeVisibilityTypeV2025 = exports.ScopeTypeV2025 = exports.SchemaV2025FeaturesV2025 = exports.ScheduledSearchAllOfOwnerV2025TypeV2025 = exports.ScheduledAttributesV2025FrequencyV2025 = exports.ScheduledActionResponseV2025JobTypeV2025 = exports.ScheduledActionPayloadV2025JobTypeV2025 = exports.ScheduleV2025TypeV2025 = exports.ScheduleTypeV2025 = exports.ScheduleMonthsV2025TypeV2025 = exports.ScheduleHoursV2025TypeV2025 = exports.ScheduleDaysV2025TypeV2025 = exports.Schedule1V2025TypeV2025 = exports.RolePropagationStatusResponseV2025ExecutionStageV2025 = exports.RolePropagationStatusResponseV2025StatusV2025 = exports.RolePropagationStatusResponseTerminatedByV2025TypeV2025 = exports.RolePropagationStatusResponseLaunchedByV2025TypeV2025 = exports.RolePropagationOngoingResponseRolePropagationDetailsV2025ExecutionStageV2025 = exports.RolePropagationOngoingResponseRolePropagationDetailsV2025StatusV2025 = exports.RoleMiningSessionStateV2025 = exports.RoleMiningSessionScopingMethodV2025 = exports.RoleMiningRoleTypeV2025 = exports.RoleMiningPotentialRoleProvisionStateV2025 = exports.RoleMiningPotentialRoleExportStateV2025 = exports.RoleMetadataBulkUpdateByQueryRequestV2025ReplaceScopeV2025 = exports.RoleMetadataBulkUpdateByQueryRequestV2025OperationV2025 = exports.RoleMetadataBulkUpdateByIdRequestV2025ReplaceScopeV2025 = exports.RoleMetadataBulkUpdateByIdRequestV2025OperationV2025 = void 0;
|
|
90
90
|
exports.TriggerTypeV2025 = exports.TransformV2025TypeV2025 = exports.TransformReadV2025TypeV2025 = exports.TestSourceConnectionMultihost200ResponseV2025ResultTypeV2025 = exports.TemplateDtoV2025MediumV2025 = exports.TemplateDtoDefaultV2025MediumV2025 = exports.TemplateBulkDeleteDtoV2025MediumV2025 = exports.TaskStatusV2025CompletionStatusV2025 = exports.TaskStatusV2025TypeV2025 = exports.TaskStatusMessageV2025TypeV2025 = exports.TaskResultSimplifiedV2025CompletionStatusV2025 = exports.TaskResultDtoV2025TypeV2025 = exports.TaskResultDetailsV2025CompletionStatusV2025 = exports.TaskResultDetailsV2025ReportTypeV2025 = exports.TaskResultDetailsV2025TypeV2025 = exports.TaskResultDetailsMessagesInnerV2025TypeV2025 = exports.TargetV2025TypeV2025 = exports.TaggedObjectDtoV2025TypeV2025 = exports.TagTagCategoryRefsInnerV2025TypeV2025 = exports.SubscriptionTypeV2025 = exports.SubscriptionPatchRequestInnerV2025OpV2025 = exports.StatusResponseV2025StatusV2025 = exports.StandardLevelV2025 = exports.SpDetailsV2025RoleV2025 = exports.SpConfigRuleV2025ModesV2025 = exports.SpConfigJobV2025TypeV2025 = exports.SpConfigJobV2025StatusV2025 = exports.SpConfigImportJobStatusV2025TypeV2025 = exports.SpConfigImportJobStatusV2025StatusV2025 = exports.SpConfigExportJobV2025TypeV2025 = exports.SpConfigExportJobV2025StatusV2025 = exports.SpConfigExportJobStatusV2025TypeV2025 = exports.SpConfigExportJobStatusV2025StatusV2025 = exports.SourceV2025StatusV2025 = exports.SourceV2025FeaturesV2025 = exports.SourceUsageStatusV2025StatusV2025 = exports.SourceUpdatedActorV2025TypeV2025 = exports.SourceSyncJobV2025StatusV2025 = exports.SourceSchemasInnerV2025TypeV2025 = exports.SourceScheduleV2025TypeV2025 = exports.SourcePasswordPoliciesInnerV2025TypeV2025 = exports.SourceOwnerV2025TypeV2025 = exports.SourceManagerCorrelationRuleV2025TypeV2025 = exports.SourceManagementWorkgroupV2025TypeV2025 = exports.SourceHealthDtoV2025StatusV2025 = exports.SourceDeletedActorV2025TypeV2025 = exports.SourceCreatedActorV2025TypeV2025 = exports.SourceClusterV2025TypeV2025 = exports.SourceClusterDtoV2025TypeV2025 = exports.SourceClassificationStatusV2025StatusV2025 = void 0;
|
|
@@ -1982,10 +1982,18 @@ exports.InvocationStatusTypeV2025 = {
|
|
|
1982
1982
|
Test: 'TEST',
|
|
1983
1983
|
RealTime: 'REAL_TIME'
|
|
1984
1984
|
};
|
|
1985
|
-
exports.
|
|
1985
|
+
exports.JsonPatchOperationRoleMiningV2025OpV2025 = {
|
|
1986
1986
|
Remove: 'remove',
|
|
1987
1987
|
Replace: 'replace'
|
|
1988
1988
|
};
|
|
1989
|
+
exports.JsonPatchOperationV2025OpV2025 = {
|
|
1990
|
+
Add: 'add',
|
|
1991
|
+
Remove: 'remove',
|
|
1992
|
+
Replace: 'replace',
|
|
1993
|
+
Move: 'move',
|
|
1994
|
+
Copy: 'copy',
|
|
1995
|
+
Test: 'test'
|
|
1996
|
+
};
|
|
1989
1997
|
exports.LatestOutlierSummaryV2025TypeV2025 = {
|
|
1990
1998
|
LowSimilarity: 'LOW_SIMILARITY',
|
|
1991
1999
|
Structural: 'STRUCTURAL'
|
|
@@ -2580,10 +2588,6 @@ exports.PasswordStatusV2025StateV2025 = {
|
|
|
2580
2588
|
exports.PatOwnerV2025TypeV2025 = {
|
|
2581
2589
|
Identity: 'IDENTITY'
|
|
2582
2590
|
};
|
|
2583
|
-
exports.PatchPotentialRoleRequestInnerV2025OpV2025 = {
|
|
2584
|
-
Remove: 'remove',
|
|
2585
|
-
Replace: 'replace'
|
|
2586
|
-
};
|
|
2587
2591
|
/**
|
|
2588
2592
|
* Enum represents action that is being processed on an approval.
|
|
2589
2593
|
* @export
|
|
@@ -7288,7 +7292,7 @@ var AccessRequestsV2025ApiAxiosParamCreator = function (configuration) {
|
|
|
7288
7292
|
});
|
|
7289
7293
|
},
|
|
7290
7294
|
/**
|
|
7291
|
-
*
|
|
7295
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. >**Security:** idn:access-request:manage is for ORG_ADMIN level. idn:access-request-self:manage is for USER level. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
|
|
7292
7296
|
* @summary Submit access request
|
|
7293
7297
|
* @param {AccessRequestV2025} accessRequestV2025
|
|
7294
7298
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -7852,7 +7856,7 @@ var AccessRequestsV2025ApiFp = function (configuration) {
|
|
|
7852
7856
|
});
|
|
7853
7857
|
},
|
|
7854
7858
|
/**
|
|
7855
|
-
*
|
|
7859
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. >**Security:** idn:access-request:manage is for ORG_ADMIN level. idn:access-request-self:manage is for USER level. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
|
|
7856
7860
|
* @summary Submit access request
|
|
7857
7861
|
* @param {AccessRequestV2025} accessRequestV2025
|
|
7858
7862
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -8083,7 +8087,7 @@ var AccessRequestsV2025ApiFactory = function (configuration, basePath, axios) {
|
|
|
8083
8087
|
return localVarFp.closeAccessRequest(requestParameters.closeAccessRequestV2025, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
8084
8088
|
},
|
|
8085
8089
|
/**
|
|
8086
|
-
*
|
|
8090
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. >**Security:** idn:access-request:manage is for ORG_ADMIN level. idn:access-request-self:manage is for USER level. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
|
|
8087
8091
|
* @summary Submit access request
|
|
8088
8092
|
* @param {AccessRequestsV2025ApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
8089
8093
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -8215,7 +8219,7 @@ var AccessRequestsV2025Api = /** @class */ (function (_super) {
|
|
|
8215
8219
|
return (0, exports.AccessRequestsV2025ApiFp)(this.configuration).closeAccessRequest(requestParameters.closeAccessRequestV2025, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
8216
8220
|
};
|
|
8217
8221
|
/**
|
|
8218
|
-
*
|
|
8222
|
+
* Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. >**Security:** idn:access-request:manage is for ORG_ADMIN level. idn:access-request-self:manage is for USER level. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
|
|
8219
8223
|
* @summary Submit access request
|
|
8220
8224
|
* @param {AccessRequestsV2025ApiCreateAccessRequestRequest} requestParameters Request parameters.
|
|
8221
8225
|
* @param {*} [axiosOptions] Override http request option.
|
|
@@ -11692,8 +11696,8 @@ var ApprovalsV2025ApiAxiosParamCreator = function (configuration) {
|
|
|
11692
11696
|
/**
|
|
11693
11697
|
* Deletes an approval configuration. Configurations at the APPROVAL_REQUEST scope cannot be deleted.
|
|
11694
11698
|
* @summary Delete Approval Configuration
|
|
11695
|
-
* @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE
|
|
11696
|
-
* @param {DeleteApprovalConfigRequestScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE
|
|
11699
|
+
* @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
|
|
11700
|
+
* @param {DeleteApprovalConfigRequestScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
|
|
11697
11701
|
* @param {*} [axiosOptions] Override http request option.
|
|
11698
11702
|
* @throws {RequiredError}
|
|
11699
11703
|
*/
|
|
@@ -11906,7 +11910,7 @@ var ApprovalsV2025ApiAxiosParamCreator = function (configuration) {
|
|
|
11906
11910
|
/**
|
|
11907
11911
|
* Retrieves a singular approval configuration that matches the given ID
|
|
11908
11912
|
* @summary Get Approval Config
|
|
11909
|
-
* @param {string} id The id of the object the config applies to, for example one of the following: [(approvalID), (roleID), (entitlementID), (accessProfileID),
|
|
11913
|
+
* @param {string} id The id of the object the config applies to, for example one of the following: [(approvalID), (roleID), (entitlementID), (accessProfileID), \"ENTITLEMENT_DESCRIPTIONS\", \"ACCESS_REQUEST_APPROVAL\", (tenantID)]
|
|
11910
11914
|
* @param {*} [axiosOptions] Override http request option.
|
|
11911
11915
|
* @throws {RequiredError}
|
|
11912
11916
|
*/
|
|
@@ -12013,8 +12017,8 @@ var ApprovalsV2025ApiAxiosParamCreator = function (configuration) {
|
|
|
12013
12017
|
/**
|
|
12014
12018
|
* Upserts a singular approval configuration that matches the given configID and configScope. If id and scope are not provided, it will default to setting the tenant config.
|
|
12015
12019
|
* @summary Put Approval Config
|
|
12016
|
-
* @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE
|
|
12017
|
-
* @param {PutApprovalsConfigScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE
|
|
12020
|
+
* @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
|
|
12021
|
+
* @param {PutApprovalsConfigScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
|
|
12018
12022
|
* @param {ApprovalConfigV2025} approvalConfigV2025
|
|
12019
12023
|
* @param {*} [axiosOptions] Override http request option.
|
|
12020
12024
|
* @throws {RequiredError}
|
|
@@ -12439,8 +12443,8 @@ var ApprovalsV2025ApiFp = function (configuration) {
|
|
|
12439
12443
|
/**
|
|
12440
12444
|
* Deletes an approval configuration. Configurations at the APPROVAL_REQUEST scope cannot be deleted.
|
|
12441
12445
|
* @summary Delete Approval Configuration
|
|
12442
|
-
* @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE
|
|
12443
|
-
* @param {DeleteApprovalConfigRequestScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE
|
|
12446
|
+
* @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
|
|
12447
|
+
* @param {DeleteApprovalConfigRequestScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
|
|
12444
12448
|
* @param {*} [axiosOptions] Override http request option.
|
|
12445
12449
|
* @throws {RequiredError}
|
|
12446
12450
|
*/
|
|
@@ -12521,7 +12525,7 @@ var ApprovalsV2025ApiFp = function (configuration) {
|
|
|
12521
12525
|
/**
|
|
12522
12526
|
* Retrieves a singular approval configuration that matches the given ID
|
|
12523
12527
|
* @summary Get Approval Config
|
|
12524
|
-
* @param {string} id The id of the object the config applies to, for example one of the following: [(approvalID), (roleID), (entitlementID), (accessProfileID),
|
|
12528
|
+
* @param {string} id The id of the object the config applies to, for example one of the following: [(approvalID), (roleID), (entitlementID), (accessProfileID), \"ENTITLEMENT_DESCRIPTIONS\", \"ACCESS_REQUEST_APPROVAL\", (tenantID)]
|
|
12525
12529
|
* @param {*} [axiosOptions] Override http request option.
|
|
12526
12530
|
* @throws {RequiredError}
|
|
12527
12531
|
*/
|
|
@@ -12567,8 +12571,8 @@ var ApprovalsV2025ApiFp = function (configuration) {
|
|
|
12567
12571
|
/**
|
|
12568
12572
|
* Upserts a singular approval configuration that matches the given configID and configScope. If id and scope are not provided, it will default to setting the tenant config.
|
|
12569
12573
|
* @summary Put Approval Config
|
|
12570
|
-
* @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE
|
|
12571
|
-
* @param {PutApprovalsConfigScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE
|
|
12574
|
+
* @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
|
|
12575
|
+
* @param {PutApprovalsConfigScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
|
|
12572
12576
|
* @param {ApprovalConfigV2025} approvalConfigV2025
|
|
12573
12577
|
* @param {*} [axiosOptions] Override http request option.
|
|
12574
12578
|
* @throws {RequiredError}
|
|
@@ -13051,12 +13055,10 @@ exports.ApprovalsV2025Api = ApprovalsV2025Api;
|
|
|
13051
13055
|
exports.DeleteApprovalConfigRequestScopeV2025 = {
|
|
13052
13056
|
DomainObject: 'DOMAIN_OBJECT',
|
|
13053
13057
|
Role: 'ROLE',
|
|
13054
|
-
Application: 'APPLICATION',
|
|
13055
13058
|
AccessProfile: 'ACCESS_PROFILE',
|
|
13056
13059
|
Entitlement: 'ENTITLEMENT',
|
|
13057
13060
|
ApprovalType: 'APPROVAL_TYPE',
|
|
13058
|
-
Tenant: 'TENANT'
|
|
13059
|
-
Source: 'SOURCE'
|
|
13061
|
+
Tenant: 'TENANT'
|
|
13060
13062
|
};
|
|
13061
13063
|
/**
|
|
13062
13064
|
* @export
|
|
@@ -13064,12 +13066,10 @@ exports.DeleteApprovalConfigRequestScopeV2025 = {
|
|
|
13064
13066
|
exports.PutApprovalsConfigScopeV2025 = {
|
|
13065
13067
|
DomainObject: 'DOMAIN_OBJECT',
|
|
13066
13068
|
Role: 'ROLE',
|
|
13067
|
-
Application: 'APPLICATION',
|
|
13068
13069
|
AccessProfile: 'ACCESS_PROFILE',
|
|
13069
13070
|
Entitlement: 'ENTITLEMENT',
|
|
13070
13071
|
ApprovalType: 'APPROVAL_TYPE',
|
|
13071
|
-
Tenant: 'TENANT'
|
|
13072
|
-
Source: 'SOURCE'
|
|
13072
|
+
Tenant: 'TENANT'
|
|
13073
13073
|
};
|
|
13074
13074
|
/**
|
|
13075
13075
|
* AppsV2025Api - axios parameter creator
|
|
@@ -42713,12 +42713,12 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
|
|
|
42713
42713
|
* @summary Update a potential role
|
|
42714
42714
|
* @param {string} sessionId The role mining session id
|
|
42715
42715
|
* @param {string} potentialRoleId The potential role summary id
|
|
42716
|
-
* @param {Array<
|
|
42716
|
+
* @param {Array<JsonPatchOperationRoleMiningV2025>} jsonPatchOperationRoleMiningV2025
|
|
42717
42717
|
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
42718
42718
|
* @param {*} [axiosOptions] Override http request option.
|
|
42719
42719
|
* @throws {RequiredError}
|
|
42720
42720
|
*/
|
|
42721
|
-
patchPotentialRole: function (sessionId, potentialRoleId,
|
|
42721
|
+
patchPotentialRole: function (sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2025, xSailPointExperimental, axiosOptions) {
|
|
42722
42722
|
if (axiosOptions === void 0) { axiosOptions = {}; }
|
|
42723
42723
|
return __awaiter(_this, void 0, void 0, function () {
|
|
42724
42724
|
var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
|
|
@@ -42729,8 +42729,8 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
|
|
|
42729
42729
|
(0, common_1.assertParamExists)('patchPotentialRole', 'sessionId', sessionId);
|
|
42730
42730
|
// verify required parameter 'potentialRoleId' is not null or undefined
|
|
42731
42731
|
(0, common_1.assertParamExists)('patchPotentialRole', 'potentialRoleId', potentialRoleId);
|
|
42732
|
-
// verify required parameter '
|
|
42733
|
-
(0, common_1.assertParamExists)('patchPotentialRole', '
|
|
42732
|
+
// verify required parameter 'jsonPatchOperationRoleMiningV2025' is not null or undefined
|
|
42733
|
+
(0, common_1.assertParamExists)('patchPotentialRole', 'jsonPatchOperationRoleMiningV2025', jsonPatchOperationRoleMiningV2025);
|
|
42734
42734
|
if (xSailPointExperimental === undefined) {
|
|
42735
42735
|
xSailPointExperimental = 'true';
|
|
42736
42736
|
}
|
|
@@ -42756,11 +42756,21 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
|
|
|
42756
42756
|
_a.sent();
|
|
42757
42757
|
// authentication userAuth required
|
|
42758
42758
|
// oauth required
|
|
42759
|
-
return [4 /*yield*/, (0, common_1.setOAuthToObject)(localVarHeaderParameter, "userAuth", [], configuration)
|
|
42759
|
+
return [4 /*yield*/, (0, common_1.setOAuthToObject)(localVarHeaderParameter, "userAuth", [], configuration)
|
|
42760
|
+
// authentication applicationAuth required
|
|
42761
|
+
// oauth required
|
|
42762
|
+
];
|
|
42760
42763
|
case 2:
|
|
42761
42764
|
// authentication userAuth required
|
|
42762
42765
|
// oauth required
|
|
42763
42766
|
_a.sent();
|
|
42767
|
+
// authentication applicationAuth required
|
|
42768
|
+
// oauth required
|
|
42769
|
+
return [4 /*yield*/, (0, common_1.setOAuthToObject)(localVarHeaderParameter, "applicationAuth", [], configuration)];
|
|
42770
|
+
case 3:
|
|
42771
|
+
// authentication applicationAuth required
|
|
42772
|
+
// oauth required
|
|
42773
|
+
_a.sent();
|
|
42764
42774
|
localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
|
|
42765
42775
|
if (xSailPointExperimental != null) {
|
|
42766
42776
|
localVarHeaderParameter['X-SailPoint-Experimental'] = String(xSailPointExperimental);
|
|
@@ -42768,7 +42778,7 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
|
|
|
42768
42778
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
42769
42779
|
headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
42770
42780
|
localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
|
|
42771
|
-
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(
|
|
42781
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(jsonPatchOperationRoleMiningV2025, localVarRequestOptions, configuration);
|
|
42772
42782
|
return [2 /*return*/, {
|
|
42773
42783
|
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
42774
42784
|
axiosOptions: localVarRequestOptions,
|
|
@@ -42782,12 +42792,12 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
|
|
|
42782
42792
|
* @summary Update a potential role session
|
|
42783
42793
|
* @param {string} sessionId The role mining session id
|
|
42784
42794
|
* @param {string} potentialRoleId The potential role summary id
|
|
42785
|
-
* @param {Array<
|
|
42795
|
+
* @param {Array<JsonPatchOperationRoleMiningV2025>} jsonPatchOperationRoleMiningV2025
|
|
42786
42796
|
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
42787
42797
|
* @param {*} [axiosOptions] Override http request option.
|
|
42788
42798
|
* @throws {RequiredError}
|
|
42789
42799
|
*/
|
|
42790
|
-
patchPotentialRoleSession: function (sessionId, potentialRoleId,
|
|
42800
|
+
patchPotentialRoleSession: function (sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2025, xSailPointExperimental, axiosOptions) {
|
|
42791
42801
|
if (axiosOptions === void 0) { axiosOptions = {}; }
|
|
42792
42802
|
return __awaiter(_this, void 0, void 0, function () {
|
|
42793
42803
|
var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
|
|
@@ -42798,8 +42808,8 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
|
|
|
42798
42808
|
(0, common_1.assertParamExists)('patchPotentialRoleSession', 'sessionId', sessionId);
|
|
42799
42809
|
// verify required parameter 'potentialRoleId' is not null or undefined
|
|
42800
42810
|
(0, common_1.assertParamExists)('patchPotentialRoleSession', 'potentialRoleId', potentialRoleId);
|
|
42801
|
-
// verify required parameter '
|
|
42802
|
-
(0, common_1.assertParamExists)('patchPotentialRoleSession', '
|
|
42811
|
+
// verify required parameter 'jsonPatchOperationRoleMiningV2025' is not null or undefined
|
|
42812
|
+
(0, common_1.assertParamExists)('patchPotentialRoleSession', 'jsonPatchOperationRoleMiningV2025', jsonPatchOperationRoleMiningV2025);
|
|
42803
42813
|
if (xSailPointExperimental === undefined) {
|
|
42804
42814
|
xSailPointExperimental = 'true';
|
|
42805
42815
|
}
|
|
@@ -42847,7 +42857,7 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
|
|
|
42847
42857
|
(0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
|
|
42848
42858
|
headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
|
|
42849
42859
|
localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
|
|
42850
|
-
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(
|
|
42860
|
+
localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(jsonPatchOperationRoleMiningV2025, localVarRequestOptions, configuration);
|
|
42851
42861
|
return [2 /*return*/, {
|
|
42852
42862
|
url: (0, common_1.toPathString)(localVarUrlObj),
|
|
42853
42863
|
axiosOptions: localVarRequestOptions,
|
|
@@ -43593,18 +43603,18 @@ var IAIRoleMiningV2025ApiFp = function (configuration) {
|
|
|
43593
43603
|
* @summary Update a potential role
|
|
43594
43604
|
* @param {string} sessionId The role mining session id
|
|
43595
43605
|
* @param {string} potentialRoleId The potential role summary id
|
|
43596
|
-
* @param {Array<
|
|
43606
|
+
* @param {Array<JsonPatchOperationRoleMiningV2025>} jsonPatchOperationRoleMiningV2025
|
|
43597
43607
|
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
43598
43608
|
* @param {*} [axiosOptions] Override http request option.
|
|
43599
43609
|
* @throws {RequiredError}
|
|
43600
43610
|
*/
|
|
43601
|
-
patchPotentialRole: function (sessionId, potentialRoleId,
|
|
43611
|
+
patchPotentialRole: function (sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2025, xSailPointExperimental, axiosOptions) {
|
|
43602
43612
|
var _a, _b, _c;
|
|
43603
43613
|
return __awaiter(this, void 0, void 0, function () {
|
|
43604
43614
|
var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
|
|
43605
43615
|
return __generator(this, function (_d) {
|
|
43606
43616
|
switch (_d.label) {
|
|
43607
|
-
case 0: return [4 /*yield*/, localVarAxiosParamCreator.patchPotentialRole(sessionId, potentialRoleId,
|
|
43617
|
+
case 0: return [4 /*yield*/, localVarAxiosParamCreator.patchPotentialRole(sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2025, xSailPointExperimental, axiosOptions)];
|
|
43608
43618
|
case 1:
|
|
43609
43619
|
localVarAxiosArgs = _d.sent();
|
|
43610
43620
|
localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
@@ -43619,18 +43629,18 @@ var IAIRoleMiningV2025ApiFp = function (configuration) {
|
|
|
43619
43629
|
* @summary Update a potential role session
|
|
43620
43630
|
* @param {string} sessionId The role mining session id
|
|
43621
43631
|
* @param {string} potentialRoleId The potential role summary id
|
|
43622
|
-
* @param {Array<
|
|
43632
|
+
* @param {Array<JsonPatchOperationRoleMiningV2025>} jsonPatchOperationRoleMiningV2025
|
|
43623
43633
|
* @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
|
|
43624
43634
|
* @param {*} [axiosOptions] Override http request option.
|
|
43625
43635
|
* @throws {RequiredError}
|
|
43626
43636
|
*/
|
|
43627
|
-
patchPotentialRoleSession: function (sessionId, potentialRoleId,
|
|
43637
|
+
patchPotentialRoleSession: function (sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2025, xSailPointExperimental, axiosOptions) {
|
|
43628
43638
|
var _a, _b, _c;
|
|
43629
43639
|
return __awaiter(this, void 0, void 0, function () {
|
|
43630
43640
|
var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
|
|
43631
43641
|
return __generator(this, function (_d) {
|
|
43632
43642
|
switch (_d.label) {
|
|
43633
|
-
case 0: return [4 /*yield*/, localVarAxiosParamCreator.patchPotentialRoleSession(sessionId, potentialRoleId,
|
|
43643
|
+
case 0: return [4 /*yield*/, localVarAxiosParamCreator.patchPotentialRoleSession(sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2025, xSailPointExperimental, axiosOptions)];
|
|
43634
43644
|
case 1:
|
|
43635
43645
|
localVarAxiosArgs = _d.sent();
|
|
43636
43646
|
localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
|
|
@@ -43922,7 +43932,7 @@ var IAIRoleMiningV2025ApiFactory = function (configuration, basePath, axios) {
|
|
|
43922
43932
|
* @throws {RequiredError}
|
|
43923
43933
|
*/
|
|
43924
43934
|
patchPotentialRole: function (requestParameters, axiosOptions) {
|
|
43925
|
-
return localVarFp.patchPotentialRole(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.
|
|
43935
|
+
return localVarFp.patchPotentialRole(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningV2025, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
43926
43936
|
},
|
|
43927
43937
|
/**
|
|
43928
43938
|
* The method updates an existing potential role using. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
|
|
@@ -43932,7 +43942,7 @@ var IAIRoleMiningV2025ApiFactory = function (configuration, basePath, axios) {
|
|
|
43932
43942
|
* @throws {RequiredError}
|
|
43933
43943
|
*/
|
|
43934
43944
|
patchPotentialRoleSession: function (requestParameters, axiosOptions) {
|
|
43935
|
-
return localVarFp.patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.
|
|
43945
|
+
return localVarFp.patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningV2025, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(axios, basePath); });
|
|
43936
43946
|
},
|
|
43937
43947
|
/**
|
|
43938
43948
|
* The method updates an existing role mining session using PATCH. Supports op in {\"replace\"} and changes to pruneThreshold and/or minNumIdentitiesInPotentialRole. The potential roles in this role mining session is then re-calculated.
|
|
@@ -44233,7 +44243,7 @@ var IAIRoleMiningV2025Api = /** @class */ (function (_super) {
|
|
|
44233
44243
|
*/
|
|
44234
44244
|
IAIRoleMiningV2025Api.prototype.patchPotentialRole = function (requestParameters, axiosOptions) {
|
|
44235
44245
|
var _this = this;
|
|
44236
|
-
return (0, exports.IAIRoleMiningV2025ApiFp)(this.configuration).patchPotentialRole(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.
|
|
44246
|
+
return (0, exports.IAIRoleMiningV2025ApiFp)(this.configuration).patchPotentialRole(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningV2025, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
44237
44247
|
};
|
|
44238
44248
|
/**
|
|
44239
44249
|
* The method updates an existing potential role using. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
|
|
@@ -44245,7 +44255,7 @@ var IAIRoleMiningV2025Api = /** @class */ (function (_super) {
|
|
|
44245
44255
|
*/
|
|
44246
44256
|
IAIRoleMiningV2025Api.prototype.patchPotentialRoleSession = function (requestParameters, axiosOptions) {
|
|
44247
44257
|
var _this = this;
|
|
44248
|
-
return (0, exports.IAIRoleMiningV2025ApiFp)(this.configuration).patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.
|
|
44258
|
+
return (0, exports.IAIRoleMiningV2025ApiFp)(this.configuration).patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningV2025, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
|
|
44249
44259
|
};
|
|
44250
44260
|
/**
|
|
44251
44261
|
* The method updates an existing role mining session using PATCH. Supports op in {\"replace\"} and changes to pruneThreshold and/or minNumIdentitiesInPotentialRole. The potential roles in this role mining session is then re-calculated.
|