pulumi-snowflake 0.57.0__py3-none-any.whl → 0.57.0a1721891443__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (32) hide show
  1. pulumi_snowflake/__init__.py +0 -20
  2. pulumi_snowflake/_inputs.py +241 -2479
  3. pulumi_snowflake/_utilities.py +0 -2
  4. pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +0 -4
  5. pulumi_snowflake/api_authentication_integration_with_client_credentials.py +0 -4
  6. pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +0 -4
  7. pulumi_snowflake/database.py +63 -63
  8. pulumi_snowflake/external_oauth_integration.py +2 -2
  9. pulumi_snowflake/get_roles.py +31 -37
  10. pulumi_snowflake/get_schemas.py +38 -115
  11. pulumi_snowflake/network_policy.py +19 -103
  12. pulumi_snowflake/oauth_integration_for_custom_clients.py +14 -18
  13. pulumi_snowflake/oauth_integration_for_partner_applications.py +14 -18
  14. pulumi_snowflake/outputs.py +2761 -5882
  15. pulumi_snowflake/pulumi-plugin.json +1 -1
  16. pulumi_snowflake/role.py +72 -44
  17. pulumi_snowflake/saml2_integration.py +28 -32
  18. pulumi_snowflake/schema.py +151 -905
  19. pulumi_snowflake/scim_integration.py +21 -25
  20. pulumi_snowflake/secondary_database.py +63 -63
  21. pulumi_snowflake/shared_database.py +63 -63
  22. pulumi_snowflake/table.py +120 -0
  23. pulumi_snowflake/table_constraint.py +2 -2
  24. pulumi_snowflake/unsafe_execute.py +8 -8
  25. {pulumi_snowflake-0.57.0.dist-info → pulumi_snowflake-0.57.0a1721891443.dist-info}/METADATA +1 -1
  26. {pulumi_snowflake-0.57.0.dist-info → pulumi_snowflake-0.57.0a1721891443.dist-info}/RECORD +28 -32
  27. {pulumi_snowflake-0.57.0.dist-info → pulumi_snowflake-0.57.0a1721891443.dist-info}/WHEEL +1 -1
  28. pulumi_snowflake/account_role.py +0 -226
  29. pulumi_snowflake/get_network_policies.py +0 -122
  30. pulumi_snowflake/get_streamlits.py +0 -159
  31. pulumi_snowflake/streamlit.py +0 -650
  32. {pulumi_snowflake-0.57.0.dist-info → pulumi_snowflake-0.57.0a1721891443.dist-info}/top_level.txt +0 -0
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "snowflake",
4
- "version": "0.57.0"
4
+ "version": "0.57.0-alpha.1721891443"
5
5
  }
pulumi_snowflake/role.py CHANGED
@@ -17,14 +17,21 @@ __all__ = ['RoleArgs', 'Role']
17
17
  class RoleArgs:
18
18
  def __init__(__self__, *,
19
19
  comment: Optional[pulumi.Input[str]] = None,
20
- name: Optional[pulumi.Input[str]] = None):
20
+ name: Optional[pulumi.Input[str]] = None,
21
+ tags: Optional[pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]]] = None):
21
22
  """
22
23
  The set of arguments for constructing a Role resource.
24
+ :param pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]] tags: Definitions of a tag to associate with the resource.
23
25
  """
24
26
  if comment is not None:
25
27
  pulumi.set(__self__, "comment", comment)
26
28
  if name is not None:
27
29
  pulumi.set(__self__, "name", name)
30
+ if tags is not None:
31
+ warnings.warn("""Use the 'snowflake_tag_association' resource instead.""", DeprecationWarning)
32
+ pulumi.log.warn("""tags is deprecated: Use the 'snowflake_tag_association' resource instead.""")
33
+ if tags is not None:
34
+ pulumi.set(__self__, "tags", tags)
28
35
 
29
36
  @property
30
37
  @pulumi.getter
@@ -44,23 +51,39 @@ class RoleArgs:
44
51
  def name(self, value: Optional[pulumi.Input[str]]):
45
52
  pulumi.set(self, "name", value)
46
53
 
54
+ @property
55
+ @pulumi.getter
56
+ @_utilities.deprecated("""Use the 'snowflake_tag_association' resource instead.""")
57
+ def tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]]]:
58
+ """
59
+ Definitions of a tag to associate with the resource.
60
+ """
61
+ return pulumi.get(self, "tags")
62
+
63
+ @tags.setter
64
+ def tags(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]]]):
65
+ pulumi.set(self, "tags", value)
66
+
47
67
 
48
68
  @pulumi.input_type
49
69
  class _RoleState:
50
70
  def __init__(__self__, *,
51
71
  comment: Optional[pulumi.Input[str]] = None,
52
72
  name: Optional[pulumi.Input[str]] = None,
53
- show_outputs: Optional[pulumi.Input[Sequence[pulumi.Input['RoleShowOutputArgs']]]] = None):
73
+ tags: Optional[pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]]] = None):
54
74
  """
55
75
  Input properties used for looking up and filtering Role resources.
56
- :param pulumi.Input[Sequence[pulumi.Input['RoleShowOutputArgs']]] show_outputs: Outputs the result of `SHOW ROLES` for the given role.
76
+ :param pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]] tags: Definitions of a tag to associate with the resource.
57
77
  """
58
78
  if comment is not None:
59
79
  pulumi.set(__self__, "comment", comment)
60
80
  if name is not None:
61
81
  pulumi.set(__self__, "name", name)
62
- if show_outputs is not None:
63
- pulumi.set(__self__, "show_outputs", show_outputs)
82
+ if tags is not None:
83
+ warnings.warn("""Use the 'snowflake_tag_association' resource instead.""", DeprecationWarning)
84
+ pulumi.log.warn("""tags is deprecated: Use the 'snowflake_tag_association' resource instead.""")
85
+ if tags is not None:
86
+ pulumi.set(__self__, "tags", tags)
64
87
 
65
88
  @property
66
89
  @pulumi.getter
@@ -81,16 +104,17 @@ class _RoleState:
81
104
  pulumi.set(self, "name", value)
82
105
 
83
106
  @property
84
- @pulumi.getter(name="showOutputs")
85
- def show_outputs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RoleShowOutputArgs']]]]:
107
+ @pulumi.getter
108
+ @_utilities.deprecated("""Use the 'snowflake_tag_association' resource instead.""")
109
+ def tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]]]:
86
110
  """
87
- Outputs the result of `SHOW ROLES` for the given role.
111
+ Definitions of a tag to associate with the resource.
88
112
  """
89
- return pulumi.get(self, "show_outputs")
113
+ return pulumi.get(self, "tags")
90
114
 
91
- @show_outputs.setter
92
- def show_outputs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RoleShowOutputArgs']]]]):
93
- pulumi.set(self, "show_outputs", value)
115
+ @tags.setter
116
+ def tags(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]]]):
117
+ pulumi.set(self, "tags", value)
94
118
 
95
119
 
96
120
  class Role(pulumi.CustomResource):
@@ -100,27 +124,29 @@ class Role(pulumi.CustomResource):
100
124
  opts: Optional[pulumi.ResourceOptions] = None,
101
125
  comment: Optional[pulumi.Input[str]] = None,
102
126
  name: Optional[pulumi.Input[str]] = None,
127
+ tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleTagArgs']]]]] = None,
103
128
  __props__=None):
104
129
  """
105
- > **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use AccountRole instead. <deprecation>
106
-
107
- The resource is used for role management, where roles can be assigned privileges and, in turn, granted to users and other roles. When granted to roles they can create hierarchies of privilege structures. For more details, refer to the [official documentation](https://docs.snowflake.com/en/user-guide/security-access-control-overview).
130
+ ## Example Usage
108
131
 
109
- ## Minimal
132
+ ```python
133
+ import pulumi
134
+ import pulumi_snowflake as snowflake
110
135
 
111
- resource "Role" "minimal" {
112
- name = "role_name"
113
- }
136
+ role = snowflake.Role("role",
137
+ name="role1",
138
+ comment="A role.")
139
+ ```
114
140
 
115
- ## Complete (with every optional set)
141
+ ## Import
116
142
 
117
- resource "Role" "complete" {
118
- name = "role_name"
119
- comment = "my account role"
120
- }
143
+ ```sh
144
+ $ pulumi import snowflake:index/role:Role example roleName
145
+ ```
121
146
 
122
147
  :param str resource_name: The name of the resource.
123
148
  :param pulumi.ResourceOptions opts: Options for the resource.
149
+ :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleTagArgs']]]] tags: Definitions of a tag to associate with the resource.
124
150
  """
125
151
  ...
126
152
  @overload
@@ -129,22 +155,22 @@ class Role(pulumi.CustomResource):
129
155
  args: Optional[RoleArgs] = None,
130
156
  opts: Optional[pulumi.ResourceOptions] = None):
131
157
  """
132
- > **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use AccountRole instead. <deprecation>
158
+ ## Example Usage
133
159
 
134
- The resource is used for role management, where roles can be assigned privileges and, in turn, granted to users and other roles. When granted to roles they can create hierarchies of privilege structures. For more details, refer to the [official documentation](https://docs.snowflake.com/en/user-guide/security-access-control-overview).
160
+ ```python
161
+ import pulumi
162
+ import pulumi_snowflake as snowflake
135
163
 
136
- ## Minimal
164
+ role = snowflake.Role("role",
165
+ name="role1",
166
+ comment="A role.")
167
+ ```
137
168
 
138
- resource "Role" "minimal" {
139
- name = "role_name"
140
- }
169
+ ## Import
141
170
 
142
- ## Complete (with every optional set)
143
-
144
- resource "Role" "complete" {
145
- name = "role_name"
146
- comment = "my account role"
147
- }
171
+ ```sh
172
+ $ pulumi import snowflake:index/role:Role example roleName
173
+ ```
148
174
 
149
175
  :param str resource_name: The name of the resource.
150
176
  :param RoleArgs args: The arguments to use to populate this resource's properties.
@@ -163,6 +189,7 @@ class Role(pulumi.CustomResource):
163
189
  opts: Optional[pulumi.ResourceOptions] = None,
164
190
  comment: Optional[pulumi.Input[str]] = None,
165
191
  name: Optional[pulumi.Input[str]] = None,
192
+ tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleTagArgs']]]]] = None,
166
193
  __props__=None):
167
194
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
168
195
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -174,7 +201,7 @@ class Role(pulumi.CustomResource):
174
201
 
175
202
  __props__.__dict__["comment"] = comment
176
203
  __props__.__dict__["name"] = name
177
- __props__.__dict__["show_outputs"] = None
204
+ __props__.__dict__["tags"] = tags
178
205
  super(Role, __self__).__init__(
179
206
  'snowflake:index/role:Role',
180
207
  resource_name,
@@ -187,7 +214,7 @@ class Role(pulumi.CustomResource):
187
214
  opts: Optional[pulumi.ResourceOptions] = None,
188
215
  comment: Optional[pulumi.Input[str]] = None,
189
216
  name: Optional[pulumi.Input[str]] = None,
190
- show_outputs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleShowOutputArgs']]]]] = None) -> 'Role':
217
+ tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleTagArgs']]]]] = None) -> 'Role':
191
218
  """
192
219
  Get an existing Role resource's state with the given name, id, and optional extra
193
220
  properties used to qualify the lookup.
@@ -195,7 +222,7 @@ class Role(pulumi.CustomResource):
195
222
  :param str resource_name: The unique name of the resulting resource.
196
223
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
197
224
  :param pulumi.ResourceOptions opts: Options for the resource.
198
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleShowOutputArgs']]]] show_outputs: Outputs the result of `SHOW ROLES` for the given role.
225
+ :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleTagArgs']]]] tags: Definitions of a tag to associate with the resource.
199
226
  """
200
227
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
201
228
 
@@ -203,7 +230,7 @@ class Role(pulumi.CustomResource):
203
230
 
204
231
  __props__.__dict__["comment"] = comment
205
232
  __props__.__dict__["name"] = name
206
- __props__.__dict__["show_outputs"] = show_outputs
233
+ __props__.__dict__["tags"] = tags
207
234
  return Role(resource_name, opts=opts, __props__=__props__)
208
235
 
209
236
  @property
@@ -217,10 +244,11 @@ class Role(pulumi.CustomResource):
217
244
  return pulumi.get(self, "name")
218
245
 
219
246
  @property
220
- @pulumi.getter(name="showOutputs")
221
- def show_outputs(self) -> pulumi.Output[Sequence['outputs.RoleShowOutput']]:
247
+ @pulumi.getter
248
+ @_utilities.deprecated("""Use the 'snowflake_tag_association' resource instead.""")
249
+ def tags(self) -> pulumi.Output[Optional[Sequence['outputs.RoleTag']]]:
222
250
  """
223
- Outputs the result of `SHOW ROLES` for the given role.
251
+ Definitions of a tag to associate with the resource.
224
252
  """
225
- return pulumi.get(self, "show_outputs")
253
+ return pulumi.get(self, "tags")
226
254
 
@@ -36,7 +36,7 @@ class Saml2IntegrationArgs:
36
36
  """
37
37
  The set of arguments for constructing a Saml2Integration resource.
38
38
  :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
39
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
39
+ :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
40
40
  :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
41
41
  :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
42
42
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
@@ -47,10 +47,10 @@ class Saml2IntegrationArgs:
47
47
  :param pulumi.Input[str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
48
48
  :param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
49
49
  :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
50
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
50
+ :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
51
51
  :param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
52
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
53
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
52
+ :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
53
+ :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
54
54
  :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
55
55
  """
56
56
  pulumi.set(__self__, "saml2_issuer", saml2_issuer)
@@ -100,7 +100,7 @@ class Saml2IntegrationArgs:
100
100
  @pulumi.getter(name="saml2Provider")
101
101
  def saml2_provider(self) -> pulumi.Input[str]:
102
102
  """
103
- The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
103
+ The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
104
104
  """
105
105
  return pulumi.get(self, "saml2_provider")
106
106
 
@@ -232,7 +232,7 @@ class Saml2IntegrationArgs:
232
232
  @pulumi.getter(name="saml2RequestedNameidFormat")
233
233
  def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[str]]:
234
234
  """
235
- The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
235
+ The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
236
236
  """
237
237
  return pulumi.get(self, "saml2_requested_nameid_format")
238
238
 
@@ -256,7 +256,7 @@ class Saml2IntegrationArgs:
256
256
  @pulumi.getter(name="saml2SnowflakeAcsUrl")
257
257
  def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[str]]:
258
258
  """
259
- The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
259
+ The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
260
260
  """
261
261
  return pulumi.get(self, "saml2_snowflake_acs_url")
262
262
 
@@ -268,7 +268,7 @@ class Saml2IntegrationArgs:
268
268
  @pulumi.getter(name="saml2SnowflakeIssuerUrl")
269
269
  def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[str]]:
270
270
  """
271
- The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
271
+ The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
272
272
  """
273
273
  return pulumi.get(self, "saml2_snowflake_issuer_url")
274
274
 
@@ -323,11 +323,11 @@ class _Saml2IntegrationState:
323
323
  :param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
324
324
  :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
325
325
  :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
326
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
327
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
326
+ :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
327
+ :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
328
328
  :param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
329
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
330
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
329
+ :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
330
+ :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
331
331
  :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
332
332
  :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
333
333
  :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
@@ -496,7 +496,7 @@ class _Saml2IntegrationState:
496
496
  @pulumi.getter(name="saml2Provider")
497
497
  def saml2_provider(self) -> Optional[pulumi.Input[str]]:
498
498
  """
499
- The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
499
+ The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
500
500
  """
501
501
  return pulumi.get(self, "saml2_provider")
502
502
 
@@ -508,7 +508,7 @@ class _Saml2IntegrationState:
508
508
  @pulumi.getter(name="saml2RequestedNameidFormat")
509
509
  def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[str]]:
510
510
  """
511
- The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
511
+ The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
512
512
  """
513
513
  return pulumi.get(self, "saml2_requested_nameid_format")
514
514
 
@@ -532,7 +532,7 @@ class _Saml2IntegrationState:
532
532
  @pulumi.getter(name="saml2SnowflakeAcsUrl")
533
533
  def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[str]]:
534
534
  """
535
- The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
535
+ The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
536
536
  """
537
537
  return pulumi.get(self, "saml2_snowflake_acs_url")
538
538
 
@@ -544,7 +544,7 @@ class _Saml2IntegrationState:
544
544
  @pulumi.getter(name="saml2SnowflakeIssuerUrl")
545
545
  def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[str]]:
546
546
  """
547
- The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
547
+ The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
548
548
  """
549
549
  return pulumi.get(self, "saml2_snowflake_issuer_url")
550
550
 
@@ -627,8 +627,6 @@ class Saml2Integration(pulumi.CustomResource):
627
627
  """
628
628
  !> **V1 release candidate** This resource was reworked and is a release candidate for the V1. We do not expect significant changes in it before the V1. We will welcome any feedback and adjust the resource if needed. Any errors reported will be resolved with a higher priority. We encourage checking this resource out before the V1 release. Please follow the migration guide to use it.
629
629
 
630
- Resource used to manage saml2 security integration objects. For more information, check [security integrations documentation](https://docs.snowflake.com/en/sql-reference/sql/create-security-integration-saml2).
631
-
632
630
  ## Import
633
631
 
634
632
  ```sh
@@ -646,11 +644,11 @@ class Saml2Integration(pulumi.CustomResource):
646
644
  :param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
647
645
  :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
648
646
  :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
649
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
650
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
647
+ :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
648
+ :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
651
649
  :param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
652
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
653
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
650
+ :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
651
+ :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
654
652
  :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
655
653
  :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
656
654
  :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
@@ -664,8 +662,6 @@ class Saml2Integration(pulumi.CustomResource):
664
662
  """
665
663
  !> **V1 release candidate** This resource was reworked and is a release candidate for the V1. We do not expect significant changes in it before the V1. We will welcome any feedback and adjust the resource if needed. Any errors reported will be resolved with a higher priority. We encourage checking this resource out before the V1 release. Please follow the migration guide to use it.
666
664
 
667
- Resource used to manage saml2 security integration objects. For more information, check [security integrations documentation](https://docs.snowflake.com/en/sql-reference/sql/create-security-integration-saml2).
668
-
669
665
  ## Import
670
666
 
671
667
  ```sh
@@ -786,11 +782,11 @@ class Saml2Integration(pulumi.CustomResource):
786
782
  :param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
787
783
  :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
788
784
  :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
789
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
790
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
785
+ :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
786
+ :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
791
787
  :param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
792
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
793
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
788
+ :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
789
+ :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
794
790
  :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
795
791
  :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
796
792
  :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
@@ -905,7 +901,7 @@ class Saml2Integration(pulumi.CustomResource):
905
901
  @pulumi.getter(name="saml2Provider")
906
902
  def saml2_provider(self) -> pulumi.Output[str]:
907
903
  """
908
- The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
904
+ The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
909
905
  """
910
906
  return pulumi.get(self, "saml2_provider")
911
907
 
@@ -913,7 +909,7 @@ class Saml2Integration(pulumi.CustomResource):
913
909
  @pulumi.getter(name="saml2RequestedNameidFormat")
914
910
  def saml2_requested_nameid_format(self) -> pulumi.Output[Optional[str]]:
915
911
  """
916
- The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
912
+ The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
917
913
  """
918
914
  return pulumi.get(self, "saml2_requested_nameid_format")
919
915
 
@@ -929,7 +925,7 @@ class Saml2Integration(pulumi.CustomResource):
929
925
  @pulumi.getter(name="saml2SnowflakeAcsUrl")
930
926
  def saml2_snowflake_acs_url(self) -> pulumi.Output[Optional[str]]:
931
927
  """
932
- The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
928
+ The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
933
929
  """
934
930
  return pulumi.get(self, "saml2_snowflake_acs_url")
935
931
 
@@ -937,7 +933,7 @@ class Saml2Integration(pulumi.CustomResource):
937
933
  @pulumi.getter(name="saml2SnowflakeIssuerUrl")
938
934
  def saml2_snowflake_issuer_url(self) -> pulumi.Output[Optional[str]]:
939
935
  """
940
- The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
936
+ The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
941
937
  """
942
938
  return pulumi.get(self, "saml2_snowflake_issuer_url")
943
939