sailpoint-api-client 1.7.17 → 1.7.19

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist/v2025/api.js CHANGED
@@ -83,8 +83,8 @@ exports.BackupResponse1V2025TypeV2025 = exports.BackupResponse1V2025StatusV2025
83
83
  exports.CommentDtoAuthorV2025TypeV2025 = exports.CloseAccessRequestV2025CompletionStatusV2025 = exports.CloseAccessRequestV2025ExecutionStatusV2025 = exports.ClientTypeV2025 = exports.CertificationTaskV2025StatusV2025 = exports.CertificationTaskV2025TargetTypeV2025 = exports.CertificationTaskV2025TypeV2025 = exports.CertificationReferenceV2025TypeV2025 = exports.CertificationPhaseV2025 = exports.CertificationDecisionV2025 = exports.CampaignV2025MandatoryCommentRequirementV2025 = exports.CampaignV2025CorrelatedStatusV2025 = exports.CampaignV2025StatusV2025 = exports.CampaignV2025TypeV2025 = exports.CampaignTemplateOwnerRefV2025TypeV2025 = exports.CampaignReportV2025StatusV2025 = exports.CampaignReportV2025TypeV2025 = exports.CampaignReferenceV2025MandatoryCommentRequirementV2025 = exports.CampaignReferenceV2025CorrelatedStatusV2025 = exports.CampaignReferenceV2025CampaignTypeV2025 = exports.CampaignReferenceV2025TypeV2025 = exports.CampaignGeneratedCampaignV2025StatusV2025 = exports.CampaignGeneratedCampaignV2025TypeV2025 = exports.CampaignFilterDetailsV2025ModeV2025 = exports.CampaignEndedCampaignV2025StatusV2025 = exports.CampaignEndedCampaignV2025TypeV2025 = exports.CampaignCompleteOptionsV2025AutoCompleteActionV2025 = exports.CampaignAllOfSourcesWithOrphanEntitlementsV2025TypeV2025 = exports.CampaignAllOfSearchCampaignInfoV2025TypeV2025 = exports.CampaignAllOfSearchCampaignInfoReviewerV2025TypeV2025 = exports.CampaignAllOfRoleCompositionCampaignInfoReviewerV2025TypeV2025 = exports.CampaignAllOfRoleCompositionCampaignInfoRemediatorRefV2025TypeV2025 = exports.CampaignAllOfMachineAccountCampaignInfoV2025ReviewerTypeV2025 = exports.CampaignAllOfFilterV2025TypeV2025 = exports.CampaignAlertV2025LevelV2025 = exports.CampaignActivatedCampaignV2025StatusV2025 = exports.CampaignActivatedCampaignV2025TypeV2025 = exports.BusinessServiceTypeV2025 = exports.BulkAddTaggedObjectV2025OperationV2025 = exports.BucketTypeV2025 = exports.BeforeProvisioningRuleDtoV2025TypeV2025 = exports.BaseAccessOwnerV2025TypeV2025 = exports.BackupResponseV2025CloudStorageStatusV2025 = exports.BackupResponseV2025HydrationStatusV2025 = exports.BackupResponseV2025BackupTypeV2025 = exports.BackupResponseV2025TypeV2025 = exports.BackupResponseV2025StatusV2025 = exports.BackupResponse1V2025CloudStorageStatusV2025 = exports.BackupResponse1V2025HydrationStatusV2025 = exports.BackupResponse1V2025BackupTypeV2025 = void 0;
84
84
  exports.EntitlementAttributeBulkUpdateIdsRequestV2025OperationV2025 = exports.EntitlementAttributeBulkUpdateFilterRequestV2025ReplaceScopeV2025 = exports.EntitlementAttributeBulkUpdateFilterRequestV2025OperationV2025 = exports.EntitlementApprovalSchemeV2025ApproverTypeV2025 = exports.EmailStatusDtoV2025VerificationStatusV2025 = exports.DtoTypeV2025 = exports.DraftResponseV2025ApprovalStatusV2025 = exports.DraftResponseV2025ModeV2025 = exports.DraftResponseV2025TypeV2025 = exports.DraftResponseV2025StatusV2025 = exports.DocumentTypeV2025 = exports.DimensionRefV2025TypeV2025 = exports.DimensionMembershipSelectorTypeV2025 = exports.DimensionCriteriaOperationV2025 = exports.DimensionCriteriaKeyTypeV2025 = exports.DeployResponseV2025CloudStorageStatusV2025 = exports.DeployResponseV2025TypeV2025 = exports.DeployResponseV2025StatusV2025 = exports.DependantConnectionsMissingDtoV2025DependencyTypeV2025 = exports.DeleteSource202ResponseV2025TypeV2025 = exports.DateCompareV2025OperatorV2025 = exports.CustomPasswordInstructionV2025PageIdV2025 = exports.CriteriaTypeV2025 = exports.CreatePrivilegeCriteriaRequestV2025PrivilegeLevelV2025 = exports.CreatePrivilegeCriteriaRequestV2025OperatorV2025 = exports.CreatePrivilegeCriteriaRequestV2025TypeV2025 = exports.CreatePrivilegeCriteriaRequestGroupsInnerV2025OperatorV2025 = exports.CreatePrivilegeCriteriaRequestGroupsInnerCriteriaItemsInnerV2025OperatorV2025 = exports.CreatePrivilegeCriteriaRequestGroupsInnerCriteriaItemsInnerV2025TargetTypeV2025 = exports.CreateFormInstanceRequestV2025StateV2025 = exports.CrawlResourcesSizesOptionsV2025 = exports.CorrelationConfigAttributeAssignmentsInnerV2025MatchModeV2025 = exports.CorrelationConfigAttributeAssignmentsInnerV2025OperationV2025 = exports.CorrelatedGovernanceEventV2025TypeV2025 = exports.ConnectorRuleValidationResponseV2025StateV2025 = exports.ConnectorRuleUpdateRequestV2025TypeV2025 = exports.ConnectorRuleResponseV2025TypeV2025 = exports.ConnectorRuleCreateRequestV2025TypeV2025 = exports.ConnectorDetailV2025StatusV2025 = exports.ConnectedObjectTypeV2025 = exports.ConfigTypeEnumV2025 = exports.ConfigTypeEnumCamelV2025 = exports.ConditionRuleV2025ValueTypeV2025 = exports.ConditionRuleV2025OperatorV2025 = exports.ConditionRuleV2025SourceTypeV2025 = exports.ConditionEffectV2025EffectTypeV2025 = exports.CompletionStatusV2025 = exports.CompletedApprovalStateV2025 = exports.CommonAccessTypeV2025 = exports.CommonAccessItemStateV2025 = void 0;
85
85
  exports.IdentityProfileAllOfOwnerV2025TypeV2025 = exports.IdentityProfileAllOfAuthoritativeSourceV2025TypeV2025 = exports.IdentityPreviewResponseIdentityV2025TypeV2025 = exports.IdentityManagerRefV2025TypeV2025 = exports.IdentityDeletedIdentityV2025TypeV2025 = exports.IdentityCreatedIdentityV2025TypeV2025 = exports.IdentityAttributesChangedIdentityV2025TypeV2025 = exports.HttpDispatchModeV2025 = exports.HttpAuthenticationTypeV2025 = exports.GrantTypeV2025 = exports.GetHistoricalIdentityEvents200ResponseInnerV2025AccessItemTypeV2025 = exports.GetCampaign200ResponseV2025MandatoryCommentRequirementV2025 = exports.GetCampaign200ResponseV2025CorrelatedStatusV2025 = exports.GetCampaign200ResponseV2025StatusV2025 = exports.GetCampaign200ResponseV2025TypeV2025 = exports.GetActiveCampaigns200ResponseInnerV2025MandatoryCommentRequirementV2025 = exports.GetActiveCampaigns200ResponseInnerV2025CorrelatedStatusV2025 = exports.GetActiveCampaigns200ResponseInnerV2025StatusV2025 = exports.GetActiveCampaigns200ResponseInnerV2025TypeV2025 = exports.FormUsedByV2025TypeV2025 = exports.FormOwnerV2025TypeV2025 = exports.FormInstanceResponseV2025StateV2025 = exports.FormInstanceRecipientV2025TypeV2025 = exports.FormInstanceCreatedByV2025TypeV2025 = exports.FormElementValidationsSetV2025ValidationTypeV2025 = exports.FormElementV2025ElementTypeV2025 = exports.FormElementDynamicDataSourceV2025DataSourceTypeV2025 = exports.FormElementDynamicDataSourceConfigV2025ObjectTypeV2025 = exports.FormElementDynamicDataSourceConfigV2025IndicesV2025 = exports.FormDefinitionSelfImportExportDtoV2025TypeV2025 = exports.FormDefinitionInputV2025TypeV2025 = exports.FormConditionV2025RuleOperatorV2025 = exports.FilterTypeV2025 = exports.FieldDetailsDtoV2025TypeV2025 = exports.FederationProtocolDetailsV2025RoleV2025 = exports.ExpressionV2025OperatorV2025 = exports.ExpressionChildrenInnerV2025OperatorV2025 = exports.ExportPayloadV2025IncludeTypesV2025 = exports.ExportPayloadV2025ExcludeTypesV2025 = exports.ExportOptionsV2025IncludeTypesV2025 = exports.ExportOptionsV2025ExcludeTypesV2025 = exports.ExportOptions1V2025IncludeTypesV2025 = exports.ExportOptions1V2025ExcludeTypesV2025 = exports.ExecutionStatusV2025 = exports.ExceptionCriteriaCriteriaListInnerV2025TypeV2025 = exports.EntitlementRefV2025TypeV2025 = exports.EntitlementOwnerV2025TypeV2025 = exports.EntitlementAttributeBulkUpdateQueryRequestV2025ReplaceScopeV2025 = exports.EntitlementAttributeBulkUpdateQueryRequestV2025OperationV2025 = exports.EntitlementAttributeBulkUpdateIdsRequestV2025ReplaceScopeV2025 = void 0;
86
- exports.ManagedClusterEncryptionConfigV2025FormatV2025 = exports.ManagedClientV2025ProvisionStatusV2025 = exports.ManagedClientV2025ClusterTypeV2025 = exports.ManagedClientV2025StatusV2025 = exports.ManagedClientTypeV2025 = exports.ManagedClientStatusCodeV2025 = exports.ManagedClientHealthIndicatorsV2025TypeV2025 = exports.ManagedClientHealthIndicatorsV2025StatusV2025 = exports.ManagedClientHealthIndicatorsBodyV2025ConsolidatedHealthIndicatorsStatusV2025 = exports.ManagedClientHealthIndicatorsBodyV2025StatusV2025 = exports.MailFromAttributesV2025MailFromDomainStatusV2025 = exports.MachineIdentityUpdatedV2025MachineIdentityChangeTypesV2025 = exports.MachineIdentityUpdatedV2025EventTypeV2025 = exports.MachineIdentityUpdatedMachineIdentityV2025SubtypeV2025 = exports.MachineIdentityDeletedV2025EventTypeV2025 = exports.MachineIdentityDeletedMachineIdentityV2025SubtypeV2025 = exports.MachineIdentityCreatedV2025EventTypeV2025 = exports.MachineIdentityCreatedMachineIdentityV2025SubtypeV2025 = exports.MachineIdentityAggregationResponseV2025CompletionStatusV2025 = exports.MachineIdentityAggregationResponseV2025TypeV2025 = exports.MachineClassificationCriteriaOperationV2025 = exports.MachineClassificationConfigV2025ClassificationMethodV2025 = exports.MachineAccountV2025ClassificationMethodV2025 = exports.LocaleOriginV2025 = exports.LoadUncorrelatedAccountsTaskTaskV2025CompletionStatusV2025 = exports.LoadUncorrelatedAccountsTaskTaskMessagesInnerV2025TypeV2025 = exports.LoadAccountsTaskTaskV2025CompletionStatusV2025 = exports.LoadAccountsTaskTaskMessagesInnerV2025TypeV2025 = exports.ListWorkgroupMembers200ResponseInnerV2025TypeV2025 = exports.ListFormInstancesByTenantResponseV2025StateV2025 = exports.LifecyclestateDeletedV2025TypeV2025 = exports.LifecycleStateV2025IdentityStateV2025 = exports.LauncherV2025TypeV2025 = exports.LauncherRequestV2025TypeV2025 = exports.LauncherRequestReferenceV2025TypeV2025 = exports.LauncherReferenceV2025TypeV2025 = exports.LatestOutlierSummaryV2025TypeV2025 = exports.JsonPatchOperationV2025OpV2025 = exports.InvocationStatusTypeV2025 = exports.IndexV2025 = exports.ImportOptionsV2025DefaultReferencesV2025 = exports.ImportOptionsV2025IncludeTypesV2025 = exports.ImportOptionsV2025ExcludeTypesV2025 = exports.ImportObjectV2025TypeV2025 = exports.IdpDetailsV2025RoleV2025 = exports.IdentityWithNewAccessAccessRefsInnerV2025TypeV2025 = exports.IdentityV2025IdentityStatusV2025 = exports.IdentityV2025ProcessingStateV2025 = exports.IdentitySyncJobV2025StatusV2025 = exports.IdentityProfileExportedObjectSelfV2025TypeV2025 = void 0;
87
- exports.PrivilegeCriteriaDTOV2025TypeV2025 = exports.PrivilegeCriteriaDTOGroupsInnerV2025OperatorV2025 = exports.PrivilegeCriteriaDTOGroupsInnerCriteriaItemsInnerV2025OperatorV2025 = exports.PrivilegeCriteriaDTOGroupsInnerCriteriaItemsInnerV2025TargetTypeV2025 = exports.PreApprovalTriggerDetailsV2025DecisionV2025 = exports.PendingApprovalOwnerV2025TypeV2025 = exports.PendingApprovalMaxPermittedAccessDurationV2025TimeUnitV2025 = exports.PendingApprovalActionV2025 = exports.PatchPotentialRoleRequestInnerV2025OpV2025 = exports.PatOwnerV2025TypeV2025 = exports.PasswordStatusV2025StateV2025 = exports.PasswordChangeResponseV2025StateV2025 = exports.ParameterStorageJsonPatchV2025OpV2025 = exports.OwnerReferenceV2025TypeV2025 = exports.OwnerReferenceSegmentsV2025TypeV2025 = exports.OwnerDtoV2025TypeV2025 = exports.OutliersContributingFeatureAccessItemsV2025AccessTypeV2025 = exports.OutlierValueTypeV2025NameV2025 = exports.OutlierV2025UnignoreTypeV2025 = exports.OutlierV2025TypeV2025 = exports.OutlierSummaryV2025TypeV2025 = exports.OrphanIdentitiesReportArgumentsV2025SelectedFormatsV2025 = exports.OperationV2025 = exports.ObjectMappingResponseV2025ObjectTypeV2025 = exports.ObjectMappingRequestV2025ObjectTypeV2025 = exports.NonEmployeeSchemaAttributeTypeV2025 = exports.NonEmployeeIdentityDtoTypeV2025 = exports.NonEmployeeBulkUploadStatusV2025StatusV2025 = exports.NonEmployeeBulkUploadJobV2025StatusV2025 = exports.NativeChangeDetectionConfigV2025OperationsV2025 = exports.NamedConstructsV2025 = exports.MultiHostSourcesV2025StatusV2025 = exports.MultiHostSourcesV2025FeaturesV2025 = exports.MultiHostIntegrationsV2025ConnectionTypeV2025 = exports.MultiHostIntegrationsV2025StatusV2025 = exports.MultiHostIntegrationsV2025FeaturesV2025 = exports.MultiHostIntegrationsOwnerV2025TypeV2025 = exports.MultiHostIntegrationsConnectorAttributesV2025MultihostStatusV2025 = exports.MultiHostIntegrationsBeforeProvisioningRuleV2025TypeV2025 = exports.MfaConfigTestResponseV2025StateV2025 = exports.MetricTypeV2025 = exports.MembershipTypeV2025 = exports.MediumV2025 = exports.ManualWorkItemStateV2025 = exports.ManualWorkItemDetailsOriginalOwnerV2025TypeV2025 = exports.ManualWorkItemDetailsCurrentOwnerV2025TypeV2025 = exports.ManagedClusterV2025ConsolidatedHealthIndicatorsStatusV2025 = exports.ManagedClusterV2025StatusV2025 = exports.ManagedClusterUpdatePreferencesV2025UpdateStateV2025 = exports.ManagedClusterTypesV2025 = void 0;
86
+ exports.ManagedClientV2025ProvisionStatusV2025 = exports.ManagedClientV2025ClusterTypeV2025 = exports.ManagedClientV2025StatusV2025 = exports.ManagedClientTypeV2025 = exports.ManagedClientStatusCodeV2025 = exports.ManagedClientHealthIndicatorsV2025TypeV2025 = exports.ManagedClientHealthIndicatorsV2025StatusV2025 = exports.ManagedClientHealthIndicatorsBodyV2025ConsolidatedHealthIndicatorsStatusV2025 = exports.ManagedClientHealthIndicatorsBodyV2025StatusV2025 = exports.MailFromAttributesV2025MailFromDomainStatusV2025 = exports.MachineIdentityUpdatedV2025MachineIdentityChangeTypesV2025 = exports.MachineIdentityUpdatedV2025EventTypeV2025 = exports.MachineIdentityUpdatedMachineIdentityV2025SubtypeV2025 = exports.MachineIdentityDeletedV2025EventTypeV2025 = exports.MachineIdentityDeletedMachineIdentityV2025SubtypeV2025 = exports.MachineIdentityCreatedV2025EventTypeV2025 = exports.MachineIdentityCreatedMachineIdentityV2025SubtypeV2025 = exports.MachineIdentityAggregationResponseV2025CompletionStatusV2025 = exports.MachineIdentityAggregationResponseV2025TypeV2025 = exports.MachineClassificationCriteriaOperationV2025 = exports.MachineClassificationConfigV2025ClassificationMethodV2025 = exports.MachineAccountV2025ClassificationMethodV2025 = exports.LocaleOriginV2025 = exports.LoadUncorrelatedAccountsTaskTaskV2025CompletionStatusV2025 = exports.LoadUncorrelatedAccountsTaskTaskMessagesInnerV2025TypeV2025 = exports.LoadAccountsTaskTaskV2025CompletionStatusV2025 = exports.LoadAccountsTaskTaskMessagesInnerV2025TypeV2025 = exports.ListWorkgroupMembers200ResponseInnerV2025TypeV2025 = exports.ListFormInstancesByTenantResponseV2025StateV2025 = exports.LifecyclestateDeletedV2025TypeV2025 = exports.LifecycleStateV2025IdentityStateV2025 = exports.LauncherV2025TypeV2025 = exports.LauncherRequestV2025TypeV2025 = exports.LauncherRequestReferenceV2025TypeV2025 = exports.LauncherReferenceV2025TypeV2025 = exports.LatestOutlierSummaryV2025TypeV2025 = exports.JsonPatchOperationV2025OpV2025 = exports.JsonPatchOperationRoleMiningV2025OpV2025 = exports.InvocationStatusTypeV2025 = exports.IndexV2025 = exports.ImportOptionsV2025DefaultReferencesV2025 = exports.ImportOptionsV2025IncludeTypesV2025 = exports.ImportOptionsV2025ExcludeTypesV2025 = exports.ImportObjectV2025TypeV2025 = exports.IdpDetailsV2025RoleV2025 = exports.IdentityWithNewAccessAccessRefsInnerV2025TypeV2025 = exports.IdentityV2025IdentityStatusV2025 = exports.IdentityV2025ProcessingStateV2025 = exports.IdentitySyncJobV2025StatusV2025 = exports.IdentityProfileExportedObjectSelfV2025TypeV2025 = void 0;
87
+ exports.PrivilegeCriteriaDTOV2025TypeV2025 = exports.PrivilegeCriteriaDTOGroupsInnerV2025OperatorV2025 = exports.PrivilegeCriteriaDTOGroupsInnerCriteriaItemsInnerV2025OperatorV2025 = exports.PrivilegeCriteriaDTOGroupsInnerCriteriaItemsInnerV2025TargetTypeV2025 = exports.PreApprovalTriggerDetailsV2025DecisionV2025 = exports.PendingApprovalOwnerV2025TypeV2025 = exports.PendingApprovalMaxPermittedAccessDurationV2025TimeUnitV2025 = exports.PendingApprovalActionV2025 = exports.PatOwnerV2025TypeV2025 = exports.PasswordStatusV2025StateV2025 = exports.PasswordChangeResponseV2025StateV2025 = exports.ParameterStorageJsonPatchV2025OpV2025 = exports.OwnerReferenceV2025TypeV2025 = exports.OwnerReferenceSegmentsV2025TypeV2025 = exports.OwnerDtoV2025TypeV2025 = exports.OutliersContributingFeatureAccessItemsV2025AccessTypeV2025 = exports.OutlierValueTypeV2025NameV2025 = exports.OutlierV2025UnignoreTypeV2025 = exports.OutlierV2025TypeV2025 = exports.OutlierSummaryV2025TypeV2025 = exports.OrphanIdentitiesReportArgumentsV2025SelectedFormatsV2025 = exports.OperationV2025 = exports.ObjectMappingResponseV2025ObjectTypeV2025 = exports.ObjectMappingRequestV2025ObjectTypeV2025 = exports.NonEmployeeSchemaAttributeTypeV2025 = exports.NonEmployeeIdentityDtoTypeV2025 = exports.NonEmployeeBulkUploadStatusV2025StatusV2025 = exports.NonEmployeeBulkUploadJobV2025StatusV2025 = exports.NativeChangeDetectionConfigV2025OperationsV2025 = exports.NamedConstructsV2025 = exports.MultiHostSourcesV2025StatusV2025 = exports.MultiHostSourcesV2025FeaturesV2025 = exports.MultiHostIntegrationsV2025ConnectionTypeV2025 = exports.MultiHostIntegrationsV2025StatusV2025 = exports.MultiHostIntegrationsV2025FeaturesV2025 = exports.MultiHostIntegrationsOwnerV2025TypeV2025 = exports.MultiHostIntegrationsConnectorAttributesV2025MultihostStatusV2025 = exports.MultiHostIntegrationsBeforeProvisioningRuleV2025TypeV2025 = exports.MfaConfigTestResponseV2025StateV2025 = exports.MetricTypeV2025 = exports.MembershipTypeV2025 = exports.MediumV2025 = exports.ManualWorkItemStateV2025 = exports.ManualWorkItemDetailsOriginalOwnerV2025TypeV2025 = exports.ManualWorkItemDetailsCurrentOwnerV2025TypeV2025 = exports.ManagedClusterV2025ConsolidatedHealthIndicatorsStatusV2025 = exports.ManagedClusterV2025StatusV2025 = exports.ManagedClusterUpdatePreferencesV2025UpdateStateV2025 = exports.ManagedClusterTypesV2025 = exports.ManagedClusterEncryptionConfigV2025FormatV2025 = void 0;
88
88
  exports.RoleMetadataBulkUpdateByFilterRequestV2025ReplaceScopeV2025 = exports.RoleMetadataBulkUpdateByFilterRequestV2025OperationV2025 = exports.RoleMembershipSelectorTypeV2025 = exports.RoleInsightsResponseV2025StatusV2025 = exports.RoleGetAllBulkUpdateResponseV2025StatusV2025 = exports.RoleCriteriaOperationV2025 = exports.RoleCriteriaKeyTypeV2025 = exports.RoleBulkUpdateResponseV2025StatusV2025 = exports.RoleAssignmentSourceTypeV2025 = exports.RoleAssignmentDtoAssignerV2025TypeV2025 = exports.ReviewerV2025TypeV2025 = exports.ReviewableEntitlementAccountOwnerV2025TypeV2025 = exports.RequestedItemStatusV2025TypeV2025 = exports.RequestedItemStatusSodViolationContextV2025StateV2025 = exports.RequestedItemStatusRequestedForV2025TypeV2025 = exports.RequestedItemStatusRequestStateV2025 = exports.RequestedItemStatusPreApprovalTriggerDetailsV2025DecisionV2025 = exports.RequestedItemDtoRefV2025TypeV2025 = exports.RequestedItemDetailsV2025TypeV2025 = exports.RequestedItemAccountSelectionsV2025TypeV2025 = exports.RequestableObjectTypeV2025 = exports.RequestableObjectRequestStatusV2025 = exports.RequestableObjectReferenceV2025TypeV2025 = exports.ReportTypeV2025 = exports.ReportResultsV2025AvailableFormatsV2025 = exports.ReportResultsV2025StatusV2025 = exports.ReportResultsV2025ReportTypeV2025 = exports.ReportResultReferenceV2025StatusV2025 = exports.ReportResultReferenceV2025TypeV2025 = exports.ReportDetailsV2025ReportTypeV2025 = exports.ReportDetailsArgumentsV2025SelectedFormatsV2025 = exports.RecommendationV2025MethodV2025 = exports.RecommendationV2025TypeV2025 = exports.RecommendationResponseV2025RecommendationV2025 = exports.ReassignmentTypeV2025 = exports.ReassignmentTypeEnumV2025 = exports.ReassignmentReferenceV2025TypeV2025 = exports.ReassignReferenceV2025TypeV2025 = exports.QueryTypeV2025 = exports.PublicIdentityV2025IdentityStateV2025 = exports.ProvisioningStateV2025 = exports.ProvisioningCriteriaOperationV2025 = exports.ProvisioningCompletedRequesterV2025TypeV2025 = exports.ProvisioningCompletedRecipientV2025TypeV2025 = exports.ProvisioningCompletedAccountRequestsInnerV2025ProvisioningResultV2025 = exports.ProvisioningCompletedAccountRequestsInnerSourceV2025TypeV2025 = exports.ProvisioningCompletedAccountRequestsInnerAttributeRequestsInnerV2025OperationV2025 = exports.ProductV2025OrgTypeV2025 = exports.PrivilegeCriteriaDTOV2025PrivilegeLevelV2025 = exports.PrivilegeCriteriaDTOV2025OperatorV2025 = void 0;
89
89
  exports.SourceBeforeProvisioningRuleV2025TypeV2025 = exports.SourceAccountCorrelationRuleV2025TypeV2025 = exports.SourceAccountCorrelationConfigV2025TypeV2025 = exports.SodViolationContextCheckCompletedV2025StateV2025 = exports.SodReportResultDtoV2025TypeV2025 = exports.SodRecipientV2025TypeV2025 = exports.SodPolicyV2025TypeV2025 = exports.SodPolicyV2025StateV2025 = exports.SodPolicyOwnerRefV2025TypeV2025 = exports.SodPolicyDtoV2025TypeV2025 = exports.SodPolicyDto1V2025TypeV2025 = exports.SlimCampaignV2025CorrelatedStatusV2025 = exports.SlimCampaignV2025StatusV2025 = exports.SlimCampaignV2025TypeV2025 = exports.ServiceProviderConfigurationFederationProtocolDetailsInnerV2025RoleV2025 = exports.ServiceDeskSourceV2025TypeV2025 = exports.SendTestNotificationRequestDtoV2025MediumV2025 = exports.SendAccountVerificationRequestV2025ViaV2025 = exports.SelfImportExportDtoV2025TypeV2025 = exports.SedAssigneeV2025TypeV2025 = exports.SearchScheduleRecipientsInnerV2025TypeV2025 = exports.SearchFilterTypeV2025 = exports.ScopeVisibilityTypeV2025 = exports.ScopeTypeV2025 = exports.SchemaV2025FeaturesV2025 = exports.ScheduledSearchAllOfOwnerV2025TypeV2025 = exports.ScheduledAttributesV2025FrequencyV2025 = exports.ScheduledActionResponseV2025JobTypeV2025 = exports.ScheduledActionPayloadV2025JobTypeV2025 = exports.ScheduleV2025TypeV2025 = exports.ScheduleTypeV2025 = exports.ScheduleMonthsV2025TypeV2025 = exports.ScheduleHoursV2025TypeV2025 = exports.ScheduleDaysV2025TypeV2025 = exports.Schedule1V2025TypeV2025 = exports.RolePropagationStatusResponseV2025ExecutionStageV2025 = exports.RolePropagationStatusResponseV2025StatusV2025 = exports.RolePropagationStatusResponseTerminatedByV2025TypeV2025 = exports.RolePropagationStatusResponseLaunchedByV2025TypeV2025 = exports.RolePropagationOngoingResponseRolePropagationDetailsV2025ExecutionStageV2025 = exports.RolePropagationOngoingResponseRolePropagationDetailsV2025StatusV2025 = exports.RoleMiningSessionStateV2025 = exports.RoleMiningSessionScopingMethodV2025 = exports.RoleMiningRoleTypeV2025 = exports.RoleMiningPotentialRoleProvisionStateV2025 = exports.RoleMiningPotentialRoleExportStateV2025 = exports.RoleMetadataBulkUpdateByQueryRequestV2025ReplaceScopeV2025 = exports.RoleMetadataBulkUpdateByQueryRequestV2025OperationV2025 = exports.RoleMetadataBulkUpdateByIdRequestV2025ReplaceScopeV2025 = exports.RoleMetadataBulkUpdateByIdRequestV2025OperationV2025 = void 0;
90
90
  exports.TriggerTypeV2025 = exports.TransformV2025TypeV2025 = exports.TransformReadV2025TypeV2025 = exports.TestSourceConnectionMultihost200ResponseV2025ResultTypeV2025 = exports.TemplateDtoV2025MediumV2025 = exports.TemplateDtoDefaultV2025MediumV2025 = exports.TemplateBulkDeleteDtoV2025MediumV2025 = exports.TaskStatusV2025CompletionStatusV2025 = exports.TaskStatusV2025TypeV2025 = exports.TaskStatusMessageV2025TypeV2025 = exports.TaskResultSimplifiedV2025CompletionStatusV2025 = exports.TaskResultDtoV2025TypeV2025 = exports.TaskResultDetailsV2025CompletionStatusV2025 = exports.TaskResultDetailsV2025ReportTypeV2025 = exports.TaskResultDetailsV2025TypeV2025 = exports.TaskResultDetailsMessagesInnerV2025TypeV2025 = exports.TargetV2025TypeV2025 = exports.TaggedObjectDtoV2025TypeV2025 = exports.TagTagCategoryRefsInnerV2025TypeV2025 = exports.SubscriptionTypeV2025 = exports.SubscriptionPatchRequestInnerV2025OpV2025 = exports.StatusResponseV2025StatusV2025 = exports.StandardLevelV2025 = exports.SpDetailsV2025RoleV2025 = exports.SpConfigRuleV2025ModesV2025 = exports.SpConfigJobV2025TypeV2025 = exports.SpConfigJobV2025StatusV2025 = exports.SpConfigImportJobStatusV2025TypeV2025 = exports.SpConfigImportJobStatusV2025StatusV2025 = exports.SpConfigExportJobV2025TypeV2025 = exports.SpConfigExportJobV2025StatusV2025 = exports.SpConfigExportJobStatusV2025TypeV2025 = exports.SpConfigExportJobStatusV2025StatusV2025 = exports.SourceV2025StatusV2025 = exports.SourceV2025FeaturesV2025 = exports.SourceUsageStatusV2025StatusV2025 = exports.SourceUpdatedActorV2025TypeV2025 = exports.SourceSyncJobV2025StatusV2025 = exports.SourceSchemasInnerV2025TypeV2025 = exports.SourceScheduleV2025TypeV2025 = exports.SourcePasswordPoliciesInnerV2025TypeV2025 = exports.SourceOwnerV2025TypeV2025 = exports.SourceManagerCorrelationRuleV2025TypeV2025 = exports.SourceManagementWorkgroupV2025TypeV2025 = exports.SourceHealthDtoV2025StatusV2025 = exports.SourceDeletedActorV2025TypeV2025 = exports.SourceCreatedActorV2025TypeV2025 = exports.SourceClusterV2025TypeV2025 = exports.SourceClusterDtoV2025TypeV2025 = exports.SourceClassificationStatusV2025StatusV2025 = void 0;
@@ -1982,10 +1982,18 @@ exports.InvocationStatusTypeV2025 = {
1982
1982
  Test: 'TEST',
1983
1983
  RealTime: 'REAL_TIME'
1984
1984
  };
1985
- exports.JsonPatchOperationV2025OpV2025 = {
1985
+ exports.JsonPatchOperationRoleMiningV2025OpV2025 = {
1986
1986
  Remove: 'remove',
1987
1987
  Replace: 'replace'
1988
1988
  };
1989
+ exports.JsonPatchOperationV2025OpV2025 = {
1990
+ Add: 'add',
1991
+ Remove: 'remove',
1992
+ Replace: 'replace',
1993
+ Move: 'move',
1994
+ Copy: 'copy',
1995
+ Test: 'test'
1996
+ };
1989
1997
  exports.LatestOutlierSummaryV2025TypeV2025 = {
1990
1998
  LowSimilarity: 'LOW_SIMILARITY',
1991
1999
  Structural: 'STRUCTURAL'
@@ -2580,10 +2588,6 @@ exports.PasswordStatusV2025StateV2025 = {
2580
2588
  exports.PatOwnerV2025TypeV2025 = {
2581
2589
  Identity: 'IDENTITY'
2582
2590
  };
2583
- exports.PatchPotentialRoleRequestInnerV2025OpV2025 = {
2584
- Remove: 'remove',
2585
- Replace: 'replace'
2586
- };
2587
2591
  /**
2588
2592
  * Enum represents action that is being processed on an approval.
2589
2593
  * @export
@@ -7288,7 +7292,7 @@ var AccessRequestsV2025ApiAxiosParamCreator = function (configuration) {
7288
7292
  });
7289
7293
  },
7290
7294
  /**
7291
- * >**Required scopes:** ORG_ADMIN requires idn:access-request:manage. USER level requires idn:access-request-self:manage (Personal Access Token only). Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
7295
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. >**Security:** idn:access-request:manage is for ORG_ADMIN level. idn:access-request-self:manage is for USER level. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
7292
7296
  * @summary Submit access request
7293
7297
  * @param {AccessRequestV2025} accessRequestV2025
7294
7298
  * @param {*} [axiosOptions] Override http request option.
@@ -7852,7 +7856,7 @@ var AccessRequestsV2025ApiFp = function (configuration) {
7852
7856
  });
7853
7857
  },
7854
7858
  /**
7855
- * >**Required scopes:** ORG_ADMIN requires idn:access-request:manage. USER level requires idn:access-request-self:manage (Personal Access Token only). Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
7859
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. >**Security:** idn:access-request:manage is for ORG_ADMIN level. idn:access-request-self:manage is for USER level. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
7856
7860
  * @summary Submit access request
7857
7861
  * @param {AccessRequestV2025} accessRequestV2025
7858
7862
  * @param {*} [axiosOptions] Override http request option.
@@ -8083,7 +8087,7 @@ var AccessRequestsV2025ApiFactory = function (configuration, basePath, axios) {
8083
8087
  return localVarFp.closeAccessRequest(requestParameters.closeAccessRequestV2025, axiosOptions).then(function (request) { return request(axios, basePath); });
8084
8088
  },
8085
8089
  /**
8086
- * >**Required scopes:** ORG_ADMIN requires idn:access-request:manage. USER level requires idn:access-request-self:manage (Personal Access Token only). Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
8090
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. >**Security:** idn:access-request:manage is for ORG_ADMIN level. idn:access-request-self:manage is for USER level. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
8087
8091
  * @summary Submit access request
8088
8092
  * @param {AccessRequestsV2025ApiCreateAccessRequestRequest} requestParameters Request parameters.
8089
8093
  * @param {*} [axiosOptions] Override http request option.
@@ -8215,7 +8219,7 @@ var AccessRequestsV2025Api = /** @class */ (function (_super) {
8215
8219
  return (0, exports.AccessRequestsV2025ApiFp)(this.configuration).closeAccessRequest(requestParameters.closeAccessRequestV2025, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
8216
8220
  };
8217
8221
  /**
8218
- * >**Required scopes:** ORG_ADMIN requires idn:access-request:manage. USER level requires idn:access-request-self:manage (Personal Access Token only). Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
8222
+ * Use this API to submit an access request in Identity Security Cloud (ISC), where it follows any ISC approval processes. >**Security:** idn:access-request:manage is for ORG_ADMIN level. idn:access-request-self:manage is for USER level. :::info The ability to request access using this API is constrained by the Access Request Segments defined in the API token\'s user context. ::: Access requests are processed asynchronously by ISC. A successful response from this endpoint means that the request has been submitted to ISC and is queued for processing. Because this endpoint is asynchronous, it does not return an error if you submit duplicate access requests in quick succession or submit an access request for access that is already in progress, approved, or rejected. It is best practice to check for any existing access requests that reference the same access items before submitting a new access request. This can be accomplished by using the [List Access Request Status](https://developer.sailpoint.com/idn/api/v3/list-access-request-status) or the [Pending Access Request Approvals](https://developer.sailpoint.com/idn/api/v3/list-pending-approvals) APIs. You can also use the [Search API](https://developer.sailpoint.com/idn/api/v3/search) to check the existing access items an identity has before submitting an access request to ensure that you aren\'t requesting access that is already granted. If you use this API to request access that an identity already has, without changing the account details or end date information from the existing assignment, the API will cancel the request as a duplicate. There are two types of access request: __GRANT_ACCESS__ * Can be requested for multiple identities in a single request. * Supports self request and request on behalf of other users. Refer to the [Get Access Request Configuration](https://developer.sailpoint.com/idn/api/v3/get-access-request-config) endpoint for request configuration options. * Allows any authenticated token (except API) to call this endpoint to request to grant access to themselves. Depending on the configuration, a user can request access for others. * Roles, access profiles and entitlements can be requested. * You can specify a `removeDate` to set or alter a sunset date-time on an assignment. The removeDate must be a future date-time, in the UTC timezone. Additionally, if the user already has the access assigned with a sunset date, you can also submit a request without a `removeDate` to request removal of the sunset date and time. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Now supports an alternate field \'requestedForWithRequestedItems\' for users to specify account selections while requesting items where they have more than one account on the source. :::caution If any entitlements are being requested, then the maximum number of entitlements that can be requested is 25, and the maximum number of identities that can be requested for is 10. If you exceed these limits, the request will fail with a 400 error. If you are not requesting any entitlements, then there are no limits. ::: __REVOKE_ACCESS__ * Can only be requested for a single identity at a time. * You cannot use an access request to revoke access from an identity if that access has been granted by role membership or by birthright provisioning. * Does not support self request. Only manager can request to revoke access for their directly managed employees. * If a `removeDate` is specified, then the requested role, access profile, or entitlement will be removed on that date and time. * Roles, access profiles, and entitlements can be requested for revocation. * Revoke requests for entitlements are limited to 1 entitlement per access request currently. * You can specify a `removeDate` to add or alter a sunset date and time on an assignment. The `removeDate` must be a future date-time, in the UTC timezone. If the user already has the access assigned with a sunset date and time, the removeDate must be a date-time earlier than the existing sunset date and time. * Allows a manager to request to revoke access for direct employees. A user with ORG_ADMIN authority can also request to revoke access from anyone. * Now supports REVOKE_ACCESS requests for identities with multiple accounts on a single source, with the help of \'assignmentId\' and \'nativeIdentity\' fields. These fields should be used within the \'requestedItems\' section for the revoke requests. * Usage of \'requestedForWithRequestedItems\' field is not supported for revoke requests.
8219
8223
  * @summary Submit access request
8220
8224
  * @param {AccessRequestsV2025ApiCreateAccessRequestRequest} requestParameters Request parameters.
8221
8225
  * @param {*} [axiosOptions] Override http request option.
@@ -11692,8 +11696,8 @@ var ApprovalsV2025ApiAxiosParamCreator = function (configuration) {
11692
11696
  /**
11693
11697
  * Deletes an approval configuration. Configurations at the APPROVAL_REQUEST scope cannot be deleted.
11694
11698
  * @summary Delete Approval Configuration
11695
- * @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE [[sourceID]]:SOURCE [[applicationID]]:APPLICATION ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
11696
- * @param {DeleteApprovalConfigRequestScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE [[sourceID]]:SOURCE [[applicationID]]:APPLICATION ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
11699
+ * @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
11700
+ * @param {DeleteApprovalConfigRequestScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
11697
11701
  * @param {*} [axiosOptions] Override http request option.
11698
11702
  * @throws {RequiredError}
11699
11703
  */
@@ -11906,7 +11910,7 @@ var ApprovalsV2025ApiAxiosParamCreator = function (configuration) {
11906
11910
  /**
11907
11911
  * Retrieves a singular approval configuration that matches the given ID
11908
11912
  * @summary Get Approval Config
11909
- * @param {string} id The id of the object the config applies to, for example one of the following: [(approvalID), (roleID), (entitlementID), (accessProfileID), (sourceID), (applicationID), \"ENTITLEMENT_DESCRIPTIONS\", \"ACCESS_REQUEST_APPROVAL\", (tenantID)]
11913
+ * @param {string} id The id of the object the config applies to, for example one of the following: [(approvalID), (roleID), (entitlementID), (accessProfileID), \"ENTITLEMENT_DESCRIPTIONS\", \"ACCESS_REQUEST_APPROVAL\", (tenantID)]
11910
11914
  * @param {*} [axiosOptions] Override http request option.
11911
11915
  * @throws {RequiredError}
11912
11916
  */
@@ -12013,8 +12017,8 @@ var ApprovalsV2025ApiAxiosParamCreator = function (configuration) {
12013
12017
  /**
12014
12018
  * Upserts a singular approval configuration that matches the given configID and configScope. If id and scope are not provided, it will default to setting the tenant config.
12015
12019
  * @summary Put Approval Config
12016
- * @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE [[sourceID]]:SOURCE [[applicationID]]:APPLICATION ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
12017
- * @param {PutApprovalsConfigScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE [[sourceID]]:SOURCE [[applicationID]]:APPLICATION ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
12020
+ * @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
12021
+ * @param {PutApprovalsConfigScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
12018
12022
  * @param {ApprovalConfigV2025} approvalConfigV2025
12019
12023
  * @param {*} [axiosOptions] Override http request option.
12020
12024
  * @throws {RequiredError}
@@ -12439,8 +12443,8 @@ var ApprovalsV2025ApiFp = function (configuration) {
12439
12443
  /**
12440
12444
  * Deletes an approval configuration. Configurations at the APPROVAL_REQUEST scope cannot be deleted.
12441
12445
  * @summary Delete Approval Configuration
12442
- * @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE [[sourceID]]:SOURCE [[applicationID]]:APPLICATION ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
12443
- * @param {DeleteApprovalConfigRequestScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE [[sourceID]]:SOURCE [[applicationID]]:APPLICATION ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
12446
+ * @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
12447
+ * @param {DeleteApprovalConfigRequestScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
12444
12448
  * @param {*} [axiosOptions] Override http request option.
12445
12449
  * @throws {RequiredError}
12446
12450
  */
@@ -12521,7 +12525,7 @@ var ApprovalsV2025ApiFp = function (configuration) {
12521
12525
  /**
12522
12526
  * Retrieves a singular approval configuration that matches the given ID
12523
12527
  * @summary Get Approval Config
12524
- * @param {string} id The id of the object the config applies to, for example one of the following: [(approvalID), (roleID), (entitlementID), (accessProfileID), (sourceID), (applicationID), \"ENTITLEMENT_DESCRIPTIONS\", \"ACCESS_REQUEST_APPROVAL\", (tenantID)]
12528
+ * @param {string} id The id of the object the config applies to, for example one of the following: [(approvalID), (roleID), (entitlementID), (accessProfileID), \"ENTITLEMENT_DESCRIPTIONS\", \"ACCESS_REQUEST_APPROVAL\", (tenantID)]
12525
12529
  * @param {*} [axiosOptions] Override http request option.
12526
12530
  * @throws {RequiredError}
12527
12531
  */
@@ -12567,8 +12571,8 @@ var ApprovalsV2025ApiFp = function (configuration) {
12567
12571
  /**
12568
12572
  * Upserts a singular approval configuration that matches the given configID and configScope. If id and scope are not provided, it will default to setting the tenant config.
12569
12573
  * @summary Put Approval Config
12570
- * @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE [[sourceID]]:SOURCE [[applicationID]]:APPLICATION ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
12571
- * @param {PutApprovalsConfigScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE [[sourceID]]:SOURCE [[applicationID]]:APPLICATION ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
12574
+ * @param {string} id The ID defined by the scope field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
12575
+ * @param {PutApprovalsConfigScopeV2025} scope The scope of the field, where [[id]]:[[scope]] is the following [[roleID]]:ROLE [[entitlementID]]:ENTITLEMENT [[accessProfileID]]:ACCESS_PROFILE ENTITLEMENT_DESCRIPTIONS:APPROVAL_TYPE ACCESS_REQUEST_APPROVAL:APPROVAL_TYPE [[tenantID]]:TENANT [[domainObjectID]]:DOMAIN_OBJECT
12572
12576
  * @param {ApprovalConfigV2025} approvalConfigV2025
12573
12577
  * @param {*} [axiosOptions] Override http request option.
12574
12578
  * @throws {RequiredError}
@@ -13051,12 +13055,10 @@ exports.ApprovalsV2025Api = ApprovalsV2025Api;
13051
13055
  exports.DeleteApprovalConfigRequestScopeV2025 = {
13052
13056
  DomainObject: 'DOMAIN_OBJECT',
13053
13057
  Role: 'ROLE',
13054
- Application: 'APPLICATION',
13055
13058
  AccessProfile: 'ACCESS_PROFILE',
13056
13059
  Entitlement: 'ENTITLEMENT',
13057
13060
  ApprovalType: 'APPROVAL_TYPE',
13058
- Tenant: 'TENANT',
13059
- Source: 'SOURCE'
13061
+ Tenant: 'TENANT'
13060
13062
  };
13061
13063
  /**
13062
13064
  * @export
@@ -13064,12 +13066,10 @@ exports.DeleteApprovalConfigRequestScopeV2025 = {
13064
13066
  exports.PutApprovalsConfigScopeV2025 = {
13065
13067
  DomainObject: 'DOMAIN_OBJECT',
13066
13068
  Role: 'ROLE',
13067
- Application: 'APPLICATION',
13068
13069
  AccessProfile: 'ACCESS_PROFILE',
13069
13070
  Entitlement: 'ENTITLEMENT',
13070
13071
  ApprovalType: 'APPROVAL_TYPE',
13071
- Tenant: 'TENANT',
13072
- Source: 'SOURCE'
13072
+ Tenant: 'TENANT'
13073
13073
  };
13074
13074
  /**
13075
13075
  * AppsV2025Api - axios parameter creator
@@ -42713,12 +42713,12 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
42713
42713
  * @summary Update a potential role
42714
42714
  * @param {string} sessionId The role mining session id
42715
42715
  * @param {string} potentialRoleId The potential role summary id
42716
- * @param {Array<PatchPotentialRoleRequestInnerV2025>} patchPotentialRoleRequestInnerV2025
42716
+ * @param {Array<JsonPatchOperationRoleMiningV2025>} jsonPatchOperationRoleMiningV2025
42717
42717
  * @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
42718
42718
  * @param {*} [axiosOptions] Override http request option.
42719
42719
  * @throws {RequiredError}
42720
42720
  */
42721
- patchPotentialRole: function (sessionId, potentialRoleId, patchPotentialRoleRequestInnerV2025, xSailPointExperimental, axiosOptions) {
42721
+ patchPotentialRole: function (sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2025, xSailPointExperimental, axiosOptions) {
42722
42722
  if (axiosOptions === void 0) { axiosOptions = {}; }
42723
42723
  return __awaiter(_this, void 0, void 0, function () {
42724
42724
  var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
@@ -42729,8 +42729,8 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
42729
42729
  (0, common_1.assertParamExists)('patchPotentialRole', 'sessionId', sessionId);
42730
42730
  // verify required parameter 'potentialRoleId' is not null or undefined
42731
42731
  (0, common_1.assertParamExists)('patchPotentialRole', 'potentialRoleId', potentialRoleId);
42732
- // verify required parameter 'patchPotentialRoleRequestInnerV2025' is not null or undefined
42733
- (0, common_1.assertParamExists)('patchPotentialRole', 'patchPotentialRoleRequestInnerV2025', patchPotentialRoleRequestInnerV2025);
42732
+ // verify required parameter 'jsonPatchOperationRoleMiningV2025' is not null or undefined
42733
+ (0, common_1.assertParamExists)('patchPotentialRole', 'jsonPatchOperationRoleMiningV2025', jsonPatchOperationRoleMiningV2025);
42734
42734
  if (xSailPointExperimental === undefined) {
42735
42735
  xSailPointExperimental = 'true';
42736
42736
  }
@@ -42756,11 +42756,21 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
42756
42756
  _a.sent();
42757
42757
  // authentication userAuth required
42758
42758
  // oauth required
42759
- return [4 /*yield*/, (0, common_1.setOAuthToObject)(localVarHeaderParameter, "userAuth", [], configuration)];
42759
+ return [4 /*yield*/, (0, common_1.setOAuthToObject)(localVarHeaderParameter, "userAuth", [], configuration)
42760
+ // authentication applicationAuth required
42761
+ // oauth required
42762
+ ];
42760
42763
  case 2:
42761
42764
  // authentication userAuth required
42762
42765
  // oauth required
42763
42766
  _a.sent();
42767
+ // authentication applicationAuth required
42768
+ // oauth required
42769
+ return [4 /*yield*/, (0, common_1.setOAuthToObject)(localVarHeaderParameter, "applicationAuth", [], configuration)];
42770
+ case 3:
42771
+ // authentication applicationAuth required
42772
+ // oauth required
42773
+ _a.sent();
42764
42774
  localVarHeaderParameter['Content-Type'] = 'application/json-patch+json';
42765
42775
  if (xSailPointExperimental != null) {
42766
42776
  localVarHeaderParameter['X-SailPoint-Experimental'] = String(xSailPointExperimental);
@@ -42768,7 +42778,7 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
42768
42778
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
42769
42779
  headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
42770
42780
  localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
42771
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(patchPotentialRoleRequestInnerV2025, localVarRequestOptions, configuration);
42781
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(jsonPatchOperationRoleMiningV2025, localVarRequestOptions, configuration);
42772
42782
  return [2 /*return*/, {
42773
42783
  url: (0, common_1.toPathString)(localVarUrlObj),
42774
42784
  axiosOptions: localVarRequestOptions,
@@ -42782,12 +42792,12 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
42782
42792
  * @summary Update a potential role session
42783
42793
  * @param {string} sessionId The role mining session id
42784
42794
  * @param {string} potentialRoleId The potential role summary id
42785
- * @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025
42795
+ * @param {Array<JsonPatchOperationRoleMiningV2025>} jsonPatchOperationRoleMiningV2025
42786
42796
  * @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
42787
42797
  * @param {*} [axiosOptions] Override http request option.
42788
42798
  * @throws {RequiredError}
42789
42799
  */
42790
- patchPotentialRoleSession: function (sessionId, potentialRoleId, jsonPatchOperationV2025, xSailPointExperimental, axiosOptions) {
42800
+ patchPotentialRoleSession: function (sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2025, xSailPointExperimental, axiosOptions) {
42791
42801
  if (axiosOptions === void 0) { axiosOptions = {}; }
42792
42802
  return __awaiter(_this, void 0, void 0, function () {
42793
42803
  var localVarPath, localVarUrlObj, baseOptions, localVarRequestOptions, localVarHeaderParameter, localVarQueryParameter, headersFromBaseOptions;
@@ -42798,8 +42808,8 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
42798
42808
  (0, common_1.assertParamExists)('patchPotentialRoleSession', 'sessionId', sessionId);
42799
42809
  // verify required parameter 'potentialRoleId' is not null or undefined
42800
42810
  (0, common_1.assertParamExists)('patchPotentialRoleSession', 'potentialRoleId', potentialRoleId);
42801
- // verify required parameter 'jsonPatchOperationV2025' is not null or undefined
42802
- (0, common_1.assertParamExists)('patchPotentialRoleSession', 'jsonPatchOperationV2025', jsonPatchOperationV2025);
42811
+ // verify required parameter 'jsonPatchOperationRoleMiningV2025' is not null or undefined
42812
+ (0, common_1.assertParamExists)('patchPotentialRoleSession', 'jsonPatchOperationRoleMiningV2025', jsonPatchOperationRoleMiningV2025);
42803
42813
  if (xSailPointExperimental === undefined) {
42804
42814
  xSailPointExperimental = 'true';
42805
42815
  }
@@ -42847,7 +42857,7 @@ var IAIRoleMiningV2025ApiAxiosParamCreator = function (configuration) {
42847
42857
  (0, common_1.setSearchParams)(localVarUrlObj, localVarQueryParameter);
42848
42858
  headersFromBaseOptions = baseOptions && baseOptions.headers ? baseOptions.headers : {};
42849
42859
  localVarRequestOptions.headers = __assign(__assign(__assign({}, localVarHeaderParameter), headersFromBaseOptions), axiosOptions.headers);
42850
- localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(jsonPatchOperationV2025, localVarRequestOptions, configuration);
42860
+ localVarRequestOptions.data = (0, common_1.serializeDataIfNeeded)(jsonPatchOperationRoleMiningV2025, localVarRequestOptions, configuration);
42851
42861
  return [2 /*return*/, {
42852
42862
  url: (0, common_1.toPathString)(localVarUrlObj),
42853
42863
  axiosOptions: localVarRequestOptions,
@@ -43593,18 +43603,18 @@ var IAIRoleMiningV2025ApiFp = function (configuration) {
43593
43603
  * @summary Update a potential role
43594
43604
  * @param {string} sessionId The role mining session id
43595
43605
  * @param {string} potentialRoleId The potential role summary id
43596
- * @param {Array<PatchPotentialRoleRequestInnerV2025>} patchPotentialRoleRequestInnerV2025
43606
+ * @param {Array<JsonPatchOperationRoleMiningV2025>} jsonPatchOperationRoleMiningV2025
43597
43607
  * @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
43598
43608
  * @param {*} [axiosOptions] Override http request option.
43599
43609
  * @throws {RequiredError}
43600
43610
  */
43601
- patchPotentialRole: function (sessionId, potentialRoleId, patchPotentialRoleRequestInnerV2025, xSailPointExperimental, axiosOptions) {
43611
+ patchPotentialRole: function (sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2025, xSailPointExperimental, axiosOptions) {
43602
43612
  var _a, _b, _c;
43603
43613
  return __awaiter(this, void 0, void 0, function () {
43604
43614
  var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
43605
43615
  return __generator(this, function (_d) {
43606
43616
  switch (_d.label) {
43607
- case 0: return [4 /*yield*/, localVarAxiosParamCreator.patchPotentialRole(sessionId, potentialRoleId, patchPotentialRoleRequestInnerV2025, xSailPointExperimental, axiosOptions)];
43617
+ case 0: return [4 /*yield*/, localVarAxiosParamCreator.patchPotentialRole(sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2025, xSailPointExperimental, axiosOptions)];
43608
43618
  case 1:
43609
43619
  localVarAxiosArgs = _d.sent();
43610
43620
  localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
@@ -43619,18 +43629,18 @@ var IAIRoleMiningV2025ApiFp = function (configuration) {
43619
43629
  * @summary Update a potential role session
43620
43630
  * @param {string} sessionId The role mining session id
43621
43631
  * @param {string} potentialRoleId The potential role summary id
43622
- * @param {Array<JsonPatchOperationV2025>} jsonPatchOperationV2025
43632
+ * @param {Array<JsonPatchOperationRoleMiningV2025>} jsonPatchOperationRoleMiningV2025
43623
43633
  * @param {string} [xSailPointExperimental] Use this header to enable this experimental API.
43624
43634
  * @param {*} [axiosOptions] Override http request option.
43625
43635
  * @throws {RequiredError}
43626
43636
  */
43627
- patchPotentialRoleSession: function (sessionId, potentialRoleId, jsonPatchOperationV2025, xSailPointExperimental, axiosOptions) {
43637
+ patchPotentialRoleSession: function (sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2025, xSailPointExperimental, axiosOptions) {
43628
43638
  var _a, _b, _c;
43629
43639
  return __awaiter(this, void 0, void 0, function () {
43630
43640
  var localVarAxiosArgs, localVarOperationServerIndex, localVarOperationServerBasePath;
43631
43641
  return __generator(this, function (_d) {
43632
43642
  switch (_d.label) {
43633
- case 0: return [4 /*yield*/, localVarAxiosParamCreator.patchPotentialRoleSession(sessionId, potentialRoleId, jsonPatchOperationV2025, xSailPointExperimental, axiosOptions)];
43643
+ case 0: return [4 /*yield*/, localVarAxiosParamCreator.patchPotentialRoleSession(sessionId, potentialRoleId, jsonPatchOperationRoleMiningV2025, xSailPointExperimental, axiosOptions)];
43634
43644
  case 1:
43635
43645
  localVarAxiosArgs = _d.sent();
43636
43646
  localVarOperationServerIndex = (_a = configuration === null || configuration === void 0 ? void 0 : configuration.serverIndex) !== null && _a !== void 0 ? _a : 0;
@@ -43922,7 +43932,7 @@ var IAIRoleMiningV2025ApiFactory = function (configuration, basePath, axios) {
43922
43932
  * @throws {RequiredError}
43923
43933
  */
43924
43934
  patchPotentialRole: function (requestParameters, axiosOptions) {
43925
- return localVarFp.patchPotentialRole(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.patchPotentialRoleRequestInnerV2025, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(axios, basePath); });
43935
+ return localVarFp.patchPotentialRole(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningV2025, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(axios, basePath); });
43926
43936
  },
43927
43937
  /**
43928
43938
  * The method updates an existing potential role using. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
@@ -43932,7 +43942,7 @@ var IAIRoleMiningV2025ApiFactory = function (configuration, basePath, axios) {
43932
43942
  * @throws {RequiredError}
43933
43943
  */
43934
43944
  patchPotentialRoleSession: function (requestParameters, axiosOptions) {
43935
- return localVarFp.patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationV2025, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(axios, basePath); });
43945
+ return localVarFp.patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningV2025, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(axios, basePath); });
43936
43946
  },
43937
43947
  /**
43938
43948
  * The method updates an existing role mining session using PATCH. Supports op in {\"replace\"} and changes to pruneThreshold and/or minNumIdentitiesInPotentialRole. The potential roles in this role mining session is then re-calculated.
@@ -44233,7 +44243,7 @@ var IAIRoleMiningV2025Api = /** @class */ (function (_super) {
44233
44243
  */
44234
44244
  IAIRoleMiningV2025Api.prototype.patchPotentialRole = function (requestParameters, axiosOptions) {
44235
44245
  var _this = this;
44236
- return (0, exports.IAIRoleMiningV2025ApiFp)(this.configuration).patchPotentialRole(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.patchPotentialRoleRequestInnerV2025, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
44246
+ return (0, exports.IAIRoleMiningV2025ApiFp)(this.configuration).patchPotentialRole(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningV2025, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
44237
44247
  };
44238
44248
  /**
44239
44249
  * The method updates an existing potential role using. The following fields can be modified: * `description` * `name` * `saved` >**NOTE: All other fields cannot be modified.**
@@ -44245,7 +44255,7 @@ var IAIRoleMiningV2025Api = /** @class */ (function (_super) {
44245
44255
  */
44246
44256
  IAIRoleMiningV2025Api.prototype.patchPotentialRoleSession = function (requestParameters, axiosOptions) {
44247
44257
  var _this = this;
44248
- return (0, exports.IAIRoleMiningV2025ApiFp)(this.configuration).patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationV2025, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
44258
+ return (0, exports.IAIRoleMiningV2025ApiFp)(this.configuration).patchPotentialRoleSession(requestParameters.sessionId, requestParameters.potentialRoleId, requestParameters.jsonPatchOperationRoleMiningV2025, requestParameters.xSailPointExperimental, axiosOptions).then(function (request) { return request(_this.axios, _this.basePath); });
44249
44259
  };
44250
44260
  /**
44251
44261
  * The method updates an existing role mining session using PATCH. Supports op in {\"replace\"} and changes to pruneThreshold and/or minNumIdentitiesInPotentialRole. The potential roles in this role mining session is then re-calculated.