pulumi-snowflake 0.57.0a1722063098__py3-none-any.whl → 0.57.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. pulumi_snowflake/__init__.py +20 -0
  2. pulumi_snowflake/_inputs.py +2475 -237
  3. pulumi_snowflake/account_role.py +226 -0
  4. pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +4 -0
  5. pulumi_snowflake/api_authentication_integration_with_client_credentials.py +4 -0
  6. pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +4 -0
  7. pulumi_snowflake/database.py +63 -63
  8. pulumi_snowflake/external_oauth_integration.py +2 -2
  9. pulumi_snowflake/get_databases.py +2 -2
  10. pulumi_snowflake/get_network_policies.py +122 -0
  11. pulumi_snowflake/get_roles.py +37 -31
  12. pulumi_snowflake/get_schemas.py +117 -36
  13. pulumi_snowflake/get_security_integrations.py +2 -2
  14. pulumi_snowflake/get_streamlits.py +159 -0
  15. pulumi_snowflake/get_warehouses.py +2 -2
  16. pulumi_snowflake/network_policy.py +103 -19
  17. pulumi_snowflake/oauth_integration_for_custom_clients.py +18 -14
  18. pulumi_snowflake/oauth_integration_for_partner_applications.py +18 -14
  19. pulumi_snowflake/outputs.py +5849 -2728
  20. pulumi_snowflake/pulumi-plugin.json +1 -1
  21. pulumi_snowflake/role.py +44 -72
  22. pulumi_snowflake/saml2_integration.py +32 -28
  23. pulumi_snowflake/schema.py +914 -156
  24. pulumi_snowflake/scim_integration.py +25 -21
  25. pulumi_snowflake/secondary_database.py +63 -63
  26. pulumi_snowflake/shared_database.py +63 -63
  27. pulumi_snowflake/streamlit.py +650 -0
  28. pulumi_snowflake/table.py +0 -120
  29. pulumi_snowflake/table_constraint.py +2 -2
  30. pulumi_snowflake/unsafe_execute.py +8 -8
  31. {pulumi_snowflake-0.57.0a1722063098.dist-info → pulumi_snowflake-0.57.1.dist-info}/METADATA +1 -1
  32. {pulumi_snowflake-0.57.0a1722063098.dist-info → pulumi_snowflake-0.57.1.dist-info}/RECORD +34 -30
  33. {pulumi_snowflake-0.57.0a1722063098.dist-info → pulumi_snowflake-0.57.1.dist-info}/WHEEL +1 -1
  34. {pulumi_snowflake-0.57.0a1722063098.dist-info → pulumi_snowflake-0.57.1.dist-info}/top_level.txt +0 -0
@@ -1,5 +1,5 @@
1
1
  {
2
2
  "resource": true,
3
3
  "name": "snowflake",
4
- "version": "0.57.0-alpha.1722063098"
4
+ "version": "0.57.1"
5
5
  }
pulumi_snowflake/role.py CHANGED
@@ -17,21 +17,14 @@ __all__ = ['RoleArgs', 'Role']
17
17
  class RoleArgs:
18
18
  def __init__(__self__, *,
19
19
  comment: Optional[pulumi.Input[str]] = None,
20
- name: Optional[pulumi.Input[str]] = None,
21
- tags: Optional[pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]]] = None):
20
+ name: Optional[pulumi.Input[str]] = None):
22
21
  """
23
22
  The set of arguments for constructing a Role resource.
24
- :param pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]] tags: Definitions of a tag to associate with the resource.
25
23
  """
26
24
  if comment is not None:
27
25
  pulumi.set(__self__, "comment", comment)
28
26
  if name is not None:
29
27
  pulumi.set(__self__, "name", name)
30
- if tags is not None:
31
- warnings.warn("""Use the 'snowflake_tag_association' resource instead.""", DeprecationWarning)
32
- pulumi.log.warn("""tags is deprecated: Use the 'snowflake_tag_association' resource instead.""")
33
- if tags is not None:
34
- pulumi.set(__self__, "tags", tags)
35
28
 
36
29
  @property
37
30
  @pulumi.getter
@@ -51,39 +44,23 @@ class RoleArgs:
51
44
  def name(self, value: Optional[pulumi.Input[str]]):
52
45
  pulumi.set(self, "name", value)
53
46
 
54
- @property
55
- @pulumi.getter
56
- @_utilities.deprecated("""Use the 'snowflake_tag_association' resource instead.""")
57
- def tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]]]:
58
- """
59
- Definitions of a tag to associate with the resource.
60
- """
61
- return pulumi.get(self, "tags")
62
-
63
- @tags.setter
64
- def tags(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]]]):
65
- pulumi.set(self, "tags", value)
66
-
67
47
 
68
48
  @pulumi.input_type
69
49
  class _RoleState:
70
50
  def __init__(__self__, *,
71
51
  comment: Optional[pulumi.Input[str]] = None,
72
52
  name: Optional[pulumi.Input[str]] = None,
73
- tags: Optional[pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]]] = None):
53
+ show_outputs: Optional[pulumi.Input[Sequence[pulumi.Input['RoleShowOutputArgs']]]] = None):
74
54
  """
75
55
  Input properties used for looking up and filtering Role resources.
76
- :param pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]] tags: Definitions of a tag to associate with the resource.
56
+ :param pulumi.Input[Sequence[pulumi.Input['RoleShowOutputArgs']]] show_outputs: Outputs the result of `SHOW ROLES` for the given role.
77
57
  """
78
58
  if comment is not None:
79
59
  pulumi.set(__self__, "comment", comment)
80
60
  if name is not None:
81
61
  pulumi.set(__self__, "name", name)
82
- if tags is not None:
83
- warnings.warn("""Use the 'snowflake_tag_association' resource instead.""", DeprecationWarning)
84
- pulumi.log.warn("""tags is deprecated: Use the 'snowflake_tag_association' resource instead.""")
85
- if tags is not None:
86
- pulumi.set(__self__, "tags", tags)
62
+ if show_outputs is not None:
63
+ pulumi.set(__self__, "show_outputs", show_outputs)
87
64
 
88
65
  @property
89
66
  @pulumi.getter
@@ -104,17 +81,16 @@ class _RoleState:
104
81
  pulumi.set(self, "name", value)
105
82
 
106
83
  @property
107
- @pulumi.getter
108
- @_utilities.deprecated("""Use the 'snowflake_tag_association' resource instead.""")
109
- def tags(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]]]:
84
+ @pulumi.getter(name="showOutputs")
85
+ def show_outputs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RoleShowOutputArgs']]]]:
110
86
  """
111
- Definitions of a tag to associate with the resource.
87
+ Outputs the result of `SHOW ROLES` for the given role.
112
88
  """
113
- return pulumi.get(self, "tags")
89
+ return pulumi.get(self, "show_outputs")
114
90
 
115
- @tags.setter
116
- def tags(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RoleTagArgs']]]]):
117
- pulumi.set(self, "tags", value)
91
+ @show_outputs.setter
92
+ def show_outputs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RoleShowOutputArgs']]]]):
93
+ pulumi.set(self, "show_outputs", value)
118
94
 
119
95
 
120
96
  class Role(pulumi.CustomResource):
@@ -124,29 +100,27 @@ class Role(pulumi.CustomResource):
124
100
  opts: Optional[pulumi.ResourceOptions] = None,
125
101
  comment: Optional[pulumi.Input[str]] = None,
126
102
  name: Optional[pulumi.Input[str]] = None,
127
- tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleTagArgs']]]]] = None,
128
103
  __props__=None):
129
104
  """
130
- ## Example Usage
105
+ > **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use AccountRole instead. <deprecation>
106
+
107
+ The resource is used for role management, where roles can be assigned privileges and, in turn, granted to users and other roles. When granted to roles they can create hierarchies of privilege structures. For more details, refer to the [official documentation](https://docs.snowflake.com/en/user-guide/security-access-control-overview).
131
108
 
132
- ```python
133
- import pulumi
134
- import pulumi_snowflake as snowflake
109
+ ## Minimal
135
110
 
136
- role = snowflake.Role("role",
137
- name="role1",
138
- comment="A role.")
139
- ```
111
+ resource "Role" "minimal" {
112
+ name = "role_name"
113
+ }
140
114
 
141
- ## Import
115
+ ## Complete (with every optional set)
142
116
 
143
- ```sh
144
- $ pulumi import snowflake:index/role:Role example roleName
145
- ```
117
+ resource "Role" "complete" {
118
+ name = "role_name"
119
+ comment = "my account role"
120
+ }
146
121
 
147
122
  :param str resource_name: The name of the resource.
148
123
  :param pulumi.ResourceOptions opts: Options for the resource.
149
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleTagArgs']]]] tags: Definitions of a tag to associate with the resource.
150
124
  """
151
125
  ...
152
126
  @overload
@@ -155,22 +129,22 @@ class Role(pulumi.CustomResource):
155
129
  args: Optional[RoleArgs] = None,
156
130
  opts: Optional[pulumi.ResourceOptions] = None):
157
131
  """
158
- ## Example Usage
132
+ > **Deprecation** This resource is deprecated and will be removed in a future major version release. Please use AccountRole instead. <deprecation>
159
133
 
160
- ```python
161
- import pulumi
162
- import pulumi_snowflake as snowflake
134
+ The resource is used for role management, where roles can be assigned privileges and, in turn, granted to users and other roles. When granted to roles they can create hierarchies of privilege structures. For more details, refer to the [official documentation](https://docs.snowflake.com/en/user-guide/security-access-control-overview).
163
135
 
164
- role = snowflake.Role("role",
165
- name="role1",
166
- comment="A role.")
167
- ```
136
+ ## Minimal
168
137
 
169
- ## Import
138
+ resource "Role" "minimal" {
139
+ name = "role_name"
140
+ }
170
141
 
171
- ```sh
172
- $ pulumi import snowflake:index/role:Role example roleName
173
- ```
142
+ ## Complete (with every optional set)
143
+
144
+ resource "Role" "complete" {
145
+ name = "role_name"
146
+ comment = "my account role"
147
+ }
174
148
 
175
149
  :param str resource_name: The name of the resource.
176
150
  :param RoleArgs args: The arguments to use to populate this resource's properties.
@@ -189,7 +163,6 @@ class Role(pulumi.CustomResource):
189
163
  opts: Optional[pulumi.ResourceOptions] = None,
190
164
  comment: Optional[pulumi.Input[str]] = None,
191
165
  name: Optional[pulumi.Input[str]] = None,
192
- tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleTagArgs']]]]] = None,
193
166
  __props__=None):
194
167
  opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
195
168
  if not isinstance(opts, pulumi.ResourceOptions):
@@ -201,7 +174,7 @@ class Role(pulumi.CustomResource):
201
174
 
202
175
  __props__.__dict__["comment"] = comment
203
176
  __props__.__dict__["name"] = name
204
- __props__.__dict__["tags"] = tags
177
+ __props__.__dict__["show_outputs"] = None
205
178
  super(Role, __self__).__init__(
206
179
  'snowflake:index/role:Role',
207
180
  resource_name,
@@ -214,7 +187,7 @@ class Role(pulumi.CustomResource):
214
187
  opts: Optional[pulumi.ResourceOptions] = None,
215
188
  comment: Optional[pulumi.Input[str]] = None,
216
189
  name: Optional[pulumi.Input[str]] = None,
217
- tags: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleTagArgs']]]]] = None) -> 'Role':
190
+ show_outputs: Optional[pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleShowOutputArgs']]]]] = None) -> 'Role':
218
191
  """
219
192
  Get an existing Role resource's state with the given name, id, and optional extra
220
193
  properties used to qualify the lookup.
@@ -222,7 +195,7 @@ class Role(pulumi.CustomResource):
222
195
  :param str resource_name: The unique name of the resulting resource.
223
196
  :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
224
197
  :param pulumi.ResourceOptions opts: Options for the resource.
225
- :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleTagArgs']]]] tags: Definitions of a tag to associate with the resource.
198
+ :param pulumi.Input[Sequence[pulumi.Input[pulumi.InputType['RoleShowOutputArgs']]]] show_outputs: Outputs the result of `SHOW ROLES` for the given role.
226
199
  """
227
200
  opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
228
201
 
@@ -230,7 +203,7 @@ class Role(pulumi.CustomResource):
230
203
 
231
204
  __props__.__dict__["comment"] = comment
232
205
  __props__.__dict__["name"] = name
233
- __props__.__dict__["tags"] = tags
206
+ __props__.__dict__["show_outputs"] = show_outputs
234
207
  return Role(resource_name, opts=opts, __props__=__props__)
235
208
 
236
209
  @property
@@ -244,11 +217,10 @@ class Role(pulumi.CustomResource):
244
217
  return pulumi.get(self, "name")
245
218
 
246
219
  @property
247
- @pulumi.getter
248
- @_utilities.deprecated("""Use the 'snowflake_tag_association' resource instead.""")
249
- def tags(self) -> pulumi.Output[Optional[Sequence['outputs.RoleTag']]]:
220
+ @pulumi.getter(name="showOutputs")
221
+ def show_outputs(self) -> pulumi.Output[Sequence['outputs.RoleShowOutput']]:
250
222
  """
251
- Definitions of a tag to associate with the resource.
223
+ Outputs the result of `SHOW ROLES` for the given role.
252
224
  """
253
- return pulumi.get(self, "tags")
225
+ return pulumi.get(self, "show_outputs")
254
226
 
@@ -36,7 +36,7 @@ class Saml2IntegrationArgs:
36
36
  """
37
37
  The set of arguments for constructing a Saml2Integration resource.
38
38
  :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
39
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
39
+ :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
40
40
  :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
41
41
  :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
42
42
  :param pulumi.Input[Sequence[pulumi.Input[str]]] allowed_email_patterns: A list of regular expressions that email addresses are matched against to authenticate with a SAML2 security integration. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
@@ -47,10 +47,10 @@ class Saml2IntegrationArgs:
47
47
  :param pulumi.Input[str] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in With button on the login page. FALSE: does not display the Log in With button on the login page. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
48
48
  :param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
49
49
  :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
50
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
50
+ :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
51
51
  :param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
52
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
53
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
52
+ :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
53
+ :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
54
54
  :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
55
55
  """
56
56
  pulumi.set(__self__, "saml2_issuer", saml2_issuer)
@@ -100,7 +100,7 @@ class Saml2IntegrationArgs:
100
100
  @pulumi.getter(name="saml2Provider")
101
101
  def saml2_provider(self) -> pulumi.Input[str]:
102
102
  """
103
- The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
103
+ The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
104
104
  """
105
105
  return pulumi.get(self, "saml2_provider")
106
106
 
@@ -232,7 +232,7 @@ class Saml2IntegrationArgs:
232
232
  @pulumi.getter(name="saml2RequestedNameidFormat")
233
233
  def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[str]]:
234
234
  """
235
- The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
235
+ The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
236
236
  """
237
237
  return pulumi.get(self, "saml2_requested_nameid_format")
238
238
 
@@ -256,7 +256,7 @@ class Saml2IntegrationArgs:
256
256
  @pulumi.getter(name="saml2SnowflakeAcsUrl")
257
257
  def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[str]]:
258
258
  """
259
- The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
259
+ The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
260
260
  """
261
261
  return pulumi.get(self, "saml2_snowflake_acs_url")
262
262
 
@@ -268,7 +268,7 @@ class Saml2IntegrationArgs:
268
268
  @pulumi.getter(name="saml2SnowflakeIssuerUrl")
269
269
  def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[str]]:
270
270
  """
271
- The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
271
+ The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
272
272
  """
273
273
  return pulumi.get(self, "saml2_snowflake_issuer_url")
274
274
 
@@ -323,11 +323,11 @@ class _Saml2IntegrationState:
323
323
  :param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
324
324
  :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
325
325
  :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
326
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
327
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
326
+ :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
327
+ :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
328
328
  :param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
329
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
330
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
329
+ :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
330
+ :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
331
331
  :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
332
332
  :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
333
333
  :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
@@ -496,7 +496,7 @@ class _Saml2IntegrationState:
496
496
  @pulumi.getter(name="saml2Provider")
497
497
  def saml2_provider(self) -> Optional[pulumi.Input[str]]:
498
498
  """
499
- The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
499
+ The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
500
500
  """
501
501
  return pulumi.get(self, "saml2_provider")
502
502
 
@@ -508,7 +508,7 @@ class _Saml2IntegrationState:
508
508
  @pulumi.getter(name="saml2RequestedNameidFormat")
509
509
  def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[str]]:
510
510
  """
511
- The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
511
+ The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
512
512
  """
513
513
  return pulumi.get(self, "saml2_requested_nameid_format")
514
514
 
@@ -532,7 +532,7 @@ class _Saml2IntegrationState:
532
532
  @pulumi.getter(name="saml2SnowflakeAcsUrl")
533
533
  def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[str]]:
534
534
  """
535
- The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
535
+ The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
536
536
  """
537
537
  return pulumi.get(self, "saml2_snowflake_acs_url")
538
538
 
@@ -544,7 +544,7 @@ class _Saml2IntegrationState:
544
544
  @pulumi.getter(name="saml2SnowflakeIssuerUrl")
545
545
  def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[str]]:
546
546
  """
547
- The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
547
+ The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
548
548
  """
549
549
  return pulumi.get(self, "saml2_snowflake_issuer_url")
550
550
 
@@ -627,6 +627,8 @@ class Saml2Integration(pulumi.CustomResource):
627
627
  """
628
628
  !> **V1 release candidate** This resource was reworked and is a release candidate for the V1. We do not expect significant changes in it before the V1. We will welcome any feedback and adjust the resource if needed. Any errors reported will be resolved with a higher priority. We encourage checking this resource out before the V1 release. Please follow the migration guide to use it.
629
629
 
630
+ Resource used to manage saml2 security integration objects. For more information, check [security integrations documentation](https://docs.snowflake.com/en/sql-reference/sql/create-security-integration-saml2).
631
+
630
632
  ## Import
631
633
 
632
634
  ```sh
@@ -644,11 +646,11 @@ class Saml2Integration(pulumi.CustomResource):
644
646
  :param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
645
647
  :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
646
648
  :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
647
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
648
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
649
+ :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
650
+ :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
649
651
  :param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
650
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
651
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
652
+ :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
653
+ :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
652
654
  :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
653
655
  :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
654
656
  :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
@@ -662,6 +664,8 @@ class Saml2Integration(pulumi.CustomResource):
662
664
  """
663
665
  !> **V1 release candidate** This resource was reworked and is a release candidate for the V1. We do not expect significant changes in it before the V1. We will welcome any feedback and adjust the resource if needed. Any errors reported will be resolved with a higher priority. We encourage checking this resource out before the V1 release. Please follow the migration guide to use it.
664
666
 
667
+ Resource used to manage saml2 security integration objects. For more information, check [security integrations documentation](https://docs.snowflake.com/en/sql-reference/sql/create-security-integration-saml2).
668
+
665
669
  ## Import
666
670
 
667
671
  ```sh
@@ -782,11 +786,11 @@ class Saml2Integration(pulumi.CustomResource):
782
786
  :param pulumi.Input[str] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
783
787
  :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
784
788
  :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
785
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
786
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
789
+ :param pulumi.Input[str] saml2_provider: The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
790
+ :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
787
791
  :param pulumi.Input[str] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed. Available options are: "true" or "false". When the value is not set in the configuration the provider will put "default" there which means to use the Snowflake default for this value.
788
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
789
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
792
+ :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
793
+ :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
790
794
  :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page. If this field changes value from non-empty to empty, the whole resource is recreated because of Snowflake limitations.
791
795
  :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
792
796
  :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
@@ -901,7 +905,7 @@ class Saml2Integration(pulumi.CustomResource):
901
905
  @pulumi.getter(name="saml2Provider")
902
906
  def saml2_provider(self) -> pulumi.Output[str]:
903
907
  """
904
- The string describing the IdP. Valid options are: [OKTA ADFS CUSTOM].
908
+ The string describing the IdP. Valid options are: `OKTA` | `ADFS` | `CUSTOM`.
905
909
  """
906
910
  return pulumi.get(self, "saml2_provider")
907
911
 
@@ -909,7 +913,7 @@ class Saml2Integration(pulumi.CustomResource):
909
913
  @pulumi.getter(name="saml2RequestedNameidFormat")
910
914
  def saml2_requested_nameid_format(self) -> pulumi.Output[Optional[str]]:
911
915
  """
912
- The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: [urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos urn:oasis:names:tc:SAML:2.0:nameid-format:persistent urn:oasis:names:tc:SAML:2.0:nameid-format:transient]
916
+ The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. Valid options are: `urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified` | `urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress` | `urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName` | `urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName` | `urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos` | `urn:oasis:names:tc:SAML:2.0:nameid-format:persistent` | `urn:oasis:names:tc:SAML:2.0:nameid-format:transient`.
913
917
  """
914
918
  return pulumi.get(self, "saml2_requested_nameid_format")
915
919
 
@@ -925,7 +929,7 @@ class Saml2Integration(pulumi.CustomResource):
925
929
  @pulumi.getter(name="saml2SnowflakeAcsUrl")
926
930
  def saml2_snowflake_acs_url(self) -> pulumi.Output[Optional[str]]:
927
931
  """
928
- The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
932
+ The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
929
933
  """
930
934
  return pulumi.get(self, "saml2_snowflake_acs_url")
931
935
 
@@ -933,7 +937,7 @@ class Saml2Integration(pulumi.CustomResource):
933
937
  @pulumi.getter(name="saml2SnowflakeIssuerUrl")
934
938
  def saml2_snowflake_issuer_url(self) -> pulumi.Output[Optional[str]]:
935
939
  """
936
- The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
940
+ The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Because Okta does not support underscores in URLs, the underscore in the account name must be converted to a hyphen. See [docs](https://docs.snowflake.com/en/user-guide/organizations-connect#okta-urls).
937
941
  """
938
942
  return pulumi.get(self, "saml2_snowflake_issuer_url")
939
943