pulumi-snowflake 0.63.0a1734416430__py3-none-any.whl → 1.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of pulumi-snowflake might be problematic. Click here for more details.
- pulumi_snowflake/__init__.py +82 -74
- pulumi_snowflake/_inputs.py +12705 -4876
- pulumi_snowflake/account.py +156 -163
- pulumi_snowflake/account_parameter.py +16 -16
- pulumi_snowflake/account_role.py +9 -9
- pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +9 -22
- pulumi_snowflake/api_authentication_integration_with_client_credentials.py +9 -22
- pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +9 -22
- pulumi_snowflake/authentication_policy.py +21 -21
- pulumi_snowflake/config/__init__.pyi +8 -86
- pulumi_snowflake/config/vars.py +10 -110
- pulumi_snowflake/database.py +9 -9
- pulumi_snowflake/database_role.py +14 -14
- pulumi_snowflake/{unsafe_execute.py → execute.py} +35 -25
- pulumi_snowflake/external_oauth_integration.py +27 -27
- pulumi_snowflake/external_volume.py +11 -7
- pulumi_snowflake/function_java.py +1211 -0
- pulumi_snowflake/function_javascript.py +882 -0
- pulumi_snowflake/function_python.py +1212 -0
- pulumi_snowflake/function_scala.py +1212 -0
- pulumi_snowflake/function_sql.py +835 -0
- pulumi_snowflake/get_account_roles.py +129 -0
- pulumi_snowflake/get_accounts.py +41 -19
- pulumi_snowflake/get_alerts.py +4 -0
- pulumi_snowflake/get_connections.py +2 -40
- pulumi_snowflake/get_cortex_search_services.py +4 -0
- pulumi_snowflake/get_current_account.py +4 -0
- pulumi_snowflake/get_current_role.py +2 -2
- pulumi_snowflake/get_database.py +4 -0
- pulumi_snowflake/get_database_role.py +4 -0
- pulumi_snowflake/get_database_roles.py +2 -6
- pulumi_snowflake/get_databases.py +2 -6
- pulumi_snowflake/get_dynamic_tables.py +4 -2
- pulumi_snowflake/get_external_functions.py +4 -0
- pulumi_snowflake/get_external_tables.py +4 -0
- pulumi_snowflake/get_failover_groups.py +4 -2
- pulumi_snowflake/get_file_formats.py +4 -0
- pulumi_snowflake/get_functions.py +4 -0
- pulumi_snowflake/get_grants.py +0 -4
- pulumi_snowflake/get_masking_policies.py +2 -6
- pulumi_snowflake/get_materialized_views.py +4 -0
- pulumi_snowflake/get_network_policies.py +2 -6
- pulumi_snowflake/get_parameters.py +4 -0
- pulumi_snowflake/get_pipes.py +4 -0
- pulumi_snowflake/get_procedures.py +4 -0
- pulumi_snowflake/get_resource_monitors.py +2 -6
- pulumi_snowflake/get_row_access_policies.py +2 -6
- pulumi_snowflake/get_schemas.py +6 -4
- pulumi_snowflake/get_secrets.py +2 -6
- pulumi_snowflake/get_security_integrations.py +2 -6
- pulumi_snowflake/get_sequences.py +4 -0
- pulumi_snowflake/get_shares.py +4 -0
- pulumi_snowflake/get_stages.py +4 -0
- pulumi_snowflake/get_storage_integrations.py +4 -0
- pulumi_snowflake/get_streamlits.py +2 -6
- pulumi_snowflake/get_streams.py +2 -6
- pulumi_snowflake/get_system_generate_scim_access_token.py +4 -0
- pulumi_snowflake/get_system_get_private_link_config.py +4 -0
- pulumi_snowflake/get_system_get_snowflake_platform_info.py +2 -2
- pulumi_snowflake/get_tables.py +4 -0
- pulumi_snowflake/get_tags.py +2 -6
- pulumi_snowflake/get_tasks.py +0 -4
- pulumi_snowflake/get_users.py +2 -6
- pulumi_snowflake/get_views.py +2 -6
- pulumi_snowflake/get_warehouses.py +2 -6
- pulumi_snowflake/grant_account_role.py +21 -21
- pulumi_snowflake/grant_application_role.py +7 -7
- pulumi_snowflake/grant_database_role.py +28 -28
- pulumi_snowflake/grant_ownership.py +14 -14
- pulumi_snowflake/grant_privileges_to_account_role.py +14 -14
- pulumi_snowflake/grant_privileges_to_database_role.py +14 -14
- pulumi_snowflake/grant_privileges_to_share.py +42 -42
- pulumi_snowflake/legacy_service_user.py +21 -21
- pulumi_snowflake/masking_policy.py +21 -21
- pulumi_snowflake/network_policy.py +23 -23
- pulumi_snowflake/oauth_integration_for_custom_clients.py +73 -46
- pulumi_snowflake/oauth_integration_for_partner_applications.py +57 -30
- pulumi_snowflake/outputs.py +10029 -4056
- pulumi_snowflake/password_policy.py +12 -2
- pulumi_snowflake/primary_connection.py +16 -16
- pulumi_snowflake/procedure_java.py +1273 -0
- pulumi_snowflake/procedure_javascript.py +895 -0
- pulumi_snowflake/procedure_python.py +1226 -0
- pulumi_snowflake/procedure_scala.py +1273 -0
- pulumi_snowflake/procedure_sql.py +895 -0
- pulumi_snowflake/provider.py +40 -527
- pulumi_snowflake/pulumi-plugin.json +1 -1
- pulumi_snowflake/resource_monitor.py +16 -20
- pulumi_snowflake/row_access_policy.py +21 -21
- pulumi_snowflake/saml2_integration.py +9 -9
- pulumi_snowflake/schema.py +14 -18
- pulumi_snowflake/scim_integration.py +16 -16
- pulumi_snowflake/secondary_connection.py +16 -16
- pulumi_snowflake/secondary_database.py +16 -16
- pulumi_snowflake/secret_with_authorization_code_grant.py +28 -28
- pulumi_snowflake/secret_with_basic_authentication.py +21 -21
- pulumi_snowflake/secret_with_client_credentials.py +28 -28
- pulumi_snowflake/secret_with_generic_string.py +21 -21
- pulumi_snowflake/service_user.py +21 -21
- pulumi_snowflake/shared_database.py +16 -16
- pulumi_snowflake/stream_on_directory_table.py +28 -41
- pulumi_snowflake/stream_on_external_table.py +28 -41
- pulumi_snowflake/stream_on_table.py +28 -41
- pulumi_snowflake/stream_on_view.py +28 -41
- pulumi_snowflake/streamlit.py +42 -46
- pulumi_snowflake/tag.py +28 -28
- pulumi_snowflake/tag_association.py +28 -86
- pulumi_snowflake/task.py +58 -62
- pulumi_snowflake/user.py +21 -21
- pulumi_snowflake/view.py +28 -41
- pulumi_snowflake/warehouse.py +16 -16
- {pulumi_snowflake-0.63.0a1734416430.dist-info → pulumi_snowflake-1.0.0.dist-info}/METADATA +1 -1
- pulumi_snowflake-1.0.0.dist-info/RECORD +148 -0
- pulumi_snowflake/database_old.py +0 -489
- pulumi_snowflake/function.py +0 -901
- pulumi_snowflake/get_role.py +0 -126
- pulumi_snowflake/get_roles.py +0 -133
- pulumi_snowflake/oauth_integration.py +0 -610
- pulumi_snowflake/procedure.py +0 -910
- pulumi_snowflake/role.py +0 -250
- pulumi_snowflake/saml_integration.py +0 -916
- pulumi_snowflake/session_parameter.py +0 -301
- pulumi_snowflake/stream.py +0 -643
- pulumi_snowflake/tag_masking_policy_association.py +0 -211
- pulumi_snowflake-0.63.0a1734416430.dist-info/RECORD +0 -148
- {pulumi_snowflake-0.63.0a1734416430.dist-info → pulumi_snowflake-1.0.0.dist-info}/WHEEL +0 -0
- {pulumi_snowflake-0.63.0a1734416430.dist-info → pulumi_snowflake-1.0.0.dist-info}/top_level.txt +0 -0
|
@@ -1,916 +0,0 @@
|
|
|
1
|
-
# coding=utf-8
|
|
2
|
-
# *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
|
|
3
|
-
# *** Do not edit by hand unless you're certain you know what you are doing! ***
|
|
4
|
-
|
|
5
|
-
import copy
|
|
6
|
-
import warnings
|
|
7
|
-
import sys
|
|
8
|
-
import pulumi
|
|
9
|
-
import pulumi.runtime
|
|
10
|
-
from typing import Any, Mapping, Optional, Sequence, Union, overload
|
|
11
|
-
if sys.version_info >= (3, 11):
|
|
12
|
-
from typing import NotRequired, TypedDict, TypeAlias
|
|
13
|
-
else:
|
|
14
|
-
from typing_extensions import NotRequired, TypedDict, TypeAlias
|
|
15
|
-
from . import _utilities
|
|
16
|
-
|
|
17
|
-
__all__ = ['SamlIntegrationArgs', 'SamlIntegration']
|
|
18
|
-
|
|
19
|
-
@pulumi.input_type
|
|
20
|
-
class SamlIntegrationArgs:
|
|
21
|
-
def __init__(__self__, *,
|
|
22
|
-
saml2_issuer: pulumi.Input[str],
|
|
23
|
-
saml2_provider: pulumi.Input[str],
|
|
24
|
-
saml2_sso_url: pulumi.Input[str],
|
|
25
|
-
saml2_x509_cert: pulumi.Input[str],
|
|
26
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
|
27
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
28
|
-
saml2_enable_sp_initiated: Optional[pulumi.Input[bool]] = None,
|
|
29
|
-
saml2_force_authn: Optional[pulumi.Input[bool]] = None,
|
|
30
|
-
saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
|
|
31
|
-
saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
|
|
32
|
-
saml2_sign_request: Optional[pulumi.Input[bool]] = None,
|
|
33
|
-
saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
|
|
34
|
-
saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
|
|
35
|
-
saml2_snowflake_x509_cert: Optional[pulumi.Input[str]] = None,
|
|
36
|
-
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None):
|
|
37
|
-
"""
|
|
38
|
-
The set of arguments for constructing a SamlIntegration resource.
|
|
39
|
-
:param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
|
|
40
|
-
:param pulumi.Input[str] saml2_provider: The string describing the IdP. One of the following: OKTA, ADFS, Custom.
|
|
41
|
-
:param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
42
|
-
:param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
43
|
-
:param pulumi.Input[bool] enabled: Specifies whether this security integration is enabled or disabled.
|
|
44
|
-
:param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
|
|
45
|
-
:param pulumi.Input[bool] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
|
|
46
|
-
:param pulumi.Input[bool] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
|
|
47
|
-
:param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
48
|
-
:param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
|
|
49
|
-
:param pulumi.Input[bool] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
|
|
50
|
-
:param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
|
|
51
|
-
:param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
|
|
52
|
-
:param pulumi.Input[str] saml2_snowflake_x509_cert: The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
|
|
53
|
-
:param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page.
|
|
54
|
-
"""
|
|
55
|
-
pulumi.set(__self__, "saml2_issuer", saml2_issuer)
|
|
56
|
-
pulumi.set(__self__, "saml2_provider", saml2_provider)
|
|
57
|
-
pulumi.set(__self__, "saml2_sso_url", saml2_sso_url)
|
|
58
|
-
pulumi.set(__self__, "saml2_x509_cert", saml2_x509_cert)
|
|
59
|
-
if enabled is not None:
|
|
60
|
-
pulumi.set(__self__, "enabled", enabled)
|
|
61
|
-
if name is not None:
|
|
62
|
-
pulumi.set(__self__, "name", name)
|
|
63
|
-
if saml2_enable_sp_initiated is not None:
|
|
64
|
-
pulumi.set(__self__, "saml2_enable_sp_initiated", saml2_enable_sp_initiated)
|
|
65
|
-
if saml2_force_authn is not None:
|
|
66
|
-
pulumi.set(__self__, "saml2_force_authn", saml2_force_authn)
|
|
67
|
-
if saml2_post_logout_redirect_url is not None:
|
|
68
|
-
pulumi.set(__self__, "saml2_post_logout_redirect_url", saml2_post_logout_redirect_url)
|
|
69
|
-
if saml2_requested_nameid_format is not None:
|
|
70
|
-
pulumi.set(__self__, "saml2_requested_nameid_format", saml2_requested_nameid_format)
|
|
71
|
-
if saml2_sign_request is not None:
|
|
72
|
-
pulumi.set(__self__, "saml2_sign_request", saml2_sign_request)
|
|
73
|
-
if saml2_snowflake_acs_url is not None:
|
|
74
|
-
pulumi.set(__self__, "saml2_snowflake_acs_url", saml2_snowflake_acs_url)
|
|
75
|
-
if saml2_snowflake_issuer_url is not None:
|
|
76
|
-
pulumi.set(__self__, "saml2_snowflake_issuer_url", saml2_snowflake_issuer_url)
|
|
77
|
-
if saml2_snowflake_x509_cert is not None:
|
|
78
|
-
pulumi.set(__self__, "saml2_snowflake_x509_cert", saml2_snowflake_x509_cert)
|
|
79
|
-
if saml2_sp_initiated_login_page_label is not None:
|
|
80
|
-
pulumi.set(__self__, "saml2_sp_initiated_login_page_label", saml2_sp_initiated_login_page_label)
|
|
81
|
-
|
|
82
|
-
@property
|
|
83
|
-
@pulumi.getter(name="saml2Issuer")
|
|
84
|
-
def saml2_issuer(self) -> pulumi.Input[str]:
|
|
85
|
-
"""
|
|
86
|
-
The string containing the IdP EntityID / Issuer.
|
|
87
|
-
"""
|
|
88
|
-
return pulumi.get(self, "saml2_issuer")
|
|
89
|
-
|
|
90
|
-
@saml2_issuer.setter
|
|
91
|
-
def saml2_issuer(self, value: pulumi.Input[str]):
|
|
92
|
-
pulumi.set(self, "saml2_issuer", value)
|
|
93
|
-
|
|
94
|
-
@property
|
|
95
|
-
@pulumi.getter(name="saml2Provider")
|
|
96
|
-
def saml2_provider(self) -> pulumi.Input[str]:
|
|
97
|
-
"""
|
|
98
|
-
The string describing the IdP. One of the following: OKTA, ADFS, Custom.
|
|
99
|
-
"""
|
|
100
|
-
return pulumi.get(self, "saml2_provider")
|
|
101
|
-
|
|
102
|
-
@saml2_provider.setter
|
|
103
|
-
def saml2_provider(self, value: pulumi.Input[str]):
|
|
104
|
-
pulumi.set(self, "saml2_provider", value)
|
|
105
|
-
|
|
106
|
-
@property
|
|
107
|
-
@pulumi.getter(name="saml2SsoUrl")
|
|
108
|
-
def saml2_sso_url(self) -> pulumi.Input[str]:
|
|
109
|
-
"""
|
|
110
|
-
The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
111
|
-
"""
|
|
112
|
-
return pulumi.get(self, "saml2_sso_url")
|
|
113
|
-
|
|
114
|
-
@saml2_sso_url.setter
|
|
115
|
-
def saml2_sso_url(self, value: pulumi.Input[str]):
|
|
116
|
-
pulumi.set(self, "saml2_sso_url", value)
|
|
117
|
-
|
|
118
|
-
@property
|
|
119
|
-
@pulumi.getter(name="saml2X509Cert")
|
|
120
|
-
def saml2_x509_cert(self) -> pulumi.Input[str]:
|
|
121
|
-
"""
|
|
122
|
-
The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
123
|
-
"""
|
|
124
|
-
return pulumi.get(self, "saml2_x509_cert")
|
|
125
|
-
|
|
126
|
-
@saml2_x509_cert.setter
|
|
127
|
-
def saml2_x509_cert(self, value: pulumi.Input[str]):
|
|
128
|
-
pulumi.set(self, "saml2_x509_cert", value)
|
|
129
|
-
|
|
130
|
-
@property
|
|
131
|
-
@pulumi.getter
|
|
132
|
-
def enabled(self) -> Optional[pulumi.Input[bool]]:
|
|
133
|
-
"""
|
|
134
|
-
Specifies whether this security integration is enabled or disabled.
|
|
135
|
-
"""
|
|
136
|
-
return pulumi.get(self, "enabled")
|
|
137
|
-
|
|
138
|
-
@enabled.setter
|
|
139
|
-
def enabled(self, value: Optional[pulumi.Input[bool]]):
|
|
140
|
-
pulumi.set(self, "enabled", value)
|
|
141
|
-
|
|
142
|
-
@property
|
|
143
|
-
@pulumi.getter
|
|
144
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
|
145
|
-
"""
|
|
146
|
-
Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
|
|
147
|
-
"""
|
|
148
|
-
return pulumi.get(self, "name")
|
|
149
|
-
|
|
150
|
-
@name.setter
|
|
151
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
|
152
|
-
pulumi.set(self, "name", value)
|
|
153
|
-
|
|
154
|
-
@property
|
|
155
|
-
@pulumi.getter(name="saml2EnableSpInitiated")
|
|
156
|
-
def saml2_enable_sp_initiated(self) -> Optional[pulumi.Input[bool]]:
|
|
157
|
-
"""
|
|
158
|
-
The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
|
|
159
|
-
"""
|
|
160
|
-
return pulumi.get(self, "saml2_enable_sp_initiated")
|
|
161
|
-
|
|
162
|
-
@saml2_enable_sp_initiated.setter
|
|
163
|
-
def saml2_enable_sp_initiated(self, value: Optional[pulumi.Input[bool]]):
|
|
164
|
-
pulumi.set(self, "saml2_enable_sp_initiated", value)
|
|
165
|
-
|
|
166
|
-
@property
|
|
167
|
-
@pulumi.getter(name="saml2ForceAuthn")
|
|
168
|
-
def saml2_force_authn(self) -> Optional[pulumi.Input[bool]]:
|
|
169
|
-
"""
|
|
170
|
-
The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
|
|
171
|
-
"""
|
|
172
|
-
return pulumi.get(self, "saml2_force_authn")
|
|
173
|
-
|
|
174
|
-
@saml2_force_authn.setter
|
|
175
|
-
def saml2_force_authn(self, value: Optional[pulumi.Input[bool]]):
|
|
176
|
-
pulumi.set(self, "saml2_force_authn", value)
|
|
177
|
-
|
|
178
|
-
@property
|
|
179
|
-
@pulumi.getter(name="saml2PostLogoutRedirectUrl")
|
|
180
|
-
def saml2_post_logout_redirect_url(self) -> Optional[pulumi.Input[str]]:
|
|
181
|
-
"""
|
|
182
|
-
The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
183
|
-
"""
|
|
184
|
-
return pulumi.get(self, "saml2_post_logout_redirect_url")
|
|
185
|
-
|
|
186
|
-
@saml2_post_logout_redirect_url.setter
|
|
187
|
-
def saml2_post_logout_redirect_url(self, value: Optional[pulumi.Input[str]]):
|
|
188
|
-
pulumi.set(self, "saml2_post_logout_redirect_url", value)
|
|
189
|
-
|
|
190
|
-
@property
|
|
191
|
-
@pulumi.getter(name="saml2RequestedNameidFormat")
|
|
192
|
-
def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[str]]:
|
|
193
|
-
"""
|
|
194
|
-
The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
|
|
195
|
-
"""
|
|
196
|
-
return pulumi.get(self, "saml2_requested_nameid_format")
|
|
197
|
-
|
|
198
|
-
@saml2_requested_nameid_format.setter
|
|
199
|
-
def saml2_requested_nameid_format(self, value: Optional[pulumi.Input[str]]):
|
|
200
|
-
pulumi.set(self, "saml2_requested_nameid_format", value)
|
|
201
|
-
|
|
202
|
-
@property
|
|
203
|
-
@pulumi.getter(name="saml2SignRequest")
|
|
204
|
-
def saml2_sign_request(self) -> Optional[pulumi.Input[bool]]:
|
|
205
|
-
"""
|
|
206
|
-
The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
|
|
207
|
-
"""
|
|
208
|
-
return pulumi.get(self, "saml2_sign_request")
|
|
209
|
-
|
|
210
|
-
@saml2_sign_request.setter
|
|
211
|
-
def saml2_sign_request(self, value: Optional[pulumi.Input[bool]]):
|
|
212
|
-
pulumi.set(self, "saml2_sign_request", value)
|
|
213
|
-
|
|
214
|
-
@property
|
|
215
|
-
@pulumi.getter(name="saml2SnowflakeAcsUrl")
|
|
216
|
-
def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[str]]:
|
|
217
|
-
"""
|
|
218
|
-
The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
|
|
219
|
-
"""
|
|
220
|
-
return pulumi.get(self, "saml2_snowflake_acs_url")
|
|
221
|
-
|
|
222
|
-
@saml2_snowflake_acs_url.setter
|
|
223
|
-
def saml2_snowflake_acs_url(self, value: Optional[pulumi.Input[str]]):
|
|
224
|
-
pulumi.set(self, "saml2_snowflake_acs_url", value)
|
|
225
|
-
|
|
226
|
-
@property
|
|
227
|
-
@pulumi.getter(name="saml2SnowflakeIssuerUrl")
|
|
228
|
-
def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[str]]:
|
|
229
|
-
"""
|
|
230
|
-
The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
|
|
231
|
-
"""
|
|
232
|
-
return pulumi.get(self, "saml2_snowflake_issuer_url")
|
|
233
|
-
|
|
234
|
-
@saml2_snowflake_issuer_url.setter
|
|
235
|
-
def saml2_snowflake_issuer_url(self, value: Optional[pulumi.Input[str]]):
|
|
236
|
-
pulumi.set(self, "saml2_snowflake_issuer_url", value)
|
|
237
|
-
|
|
238
|
-
@property
|
|
239
|
-
@pulumi.getter(name="saml2SnowflakeX509Cert")
|
|
240
|
-
def saml2_snowflake_x509_cert(self) -> Optional[pulumi.Input[str]]:
|
|
241
|
-
"""
|
|
242
|
-
The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
|
|
243
|
-
"""
|
|
244
|
-
return pulumi.get(self, "saml2_snowflake_x509_cert")
|
|
245
|
-
|
|
246
|
-
@saml2_snowflake_x509_cert.setter
|
|
247
|
-
def saml2_snowflake_x509_cert(self, value: Optional[pulumi.Input[str]]):
|
|
248
|
-
pulumi.set(self, "saml2_snowflake_x509_cert", value)
|
|
249
|
-
|
|
250
|
-
@property
|
|
251
|
-
@pulumi.getter(name="saml2SpInitiatedLoginPageLabel")
|
|
252
|
-
def saml2_sp_initiated_login_page_label(self) -> Optional[pulumi.Input[str]]:
|
|
253
|
-
"""
|
|
254
|
-
The string containing the label to display after the Log In With button on the login page.
|
|
255
|
-
"""
|
|
256
|
-
return pulumi.get(self, "saml2_sp_initiated_login_page_label")
|
|
257
|
-
|
|
258
|
-
@saml2_sp_initiated_login_page_label.setter
|
|
259
|
-
def saml2_sp_initiated_login_page_label(self, value: Optional[pulumi.Input[str]]):
|
|
260
|
-
pulumi.set(self, "saml2_sp_initiated_login_page_label", value)
|
|
261
|
-
|
|
262
|
-
|
|
263
|
-
@pulumi.input_type
|
|
264
|
-
class _SamlIntegrationState:
|
|
265
|
-
def __init__(__self__, *,
|
|
266
|
-
created_on: Optional[pulumi.Input[str]] = None,
|
|
267
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
|
268
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
269
|
-
saml2_digest_methods_used: Optional[pulumi.Input[str]] = None,
|
|
270
|
-
saml2_enable_sp_initiated: Optional[pulumi.Input[bool]] = None,
|
|
271
|
-
saml2_force_authn: Optional[pulumi.Input[bool]] = None,
|
|
272
|
-
saml2_issuer: Optional[pulumi.Input[str]] = None,
|
|
273
|
-
saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
|
|
274
|
-
saml2_provider: Optional[pulumi.Input[str]] = None,
|
|
275
|
-
saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
|
|
276
|
-
saml2_sign_request: Optional[pulumi.Input[bool]] = None,
|
|
277
|
-
saml2_signature_methods_used: Optional[pulumi.Input[str]] = None,
|
|
278
|
-
saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
|
|
279
|
-
saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
|
|
280
|
-
saml2_snowflake_metadata: Optional[pulumi.Input[str]] = None,
|
|
281
|
-
saml2_snowflake_x509_cert: Optional[pulumi.Input[str]] = None,
|
|
282
|
-
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
|
|
283
|
-
saml2_sso_url: Optional[pulumi.Input[str]] = None,
|
|
284
|
-
saml2_x509_cert: Optional[pulumi.Input[str]] = None):
|
|
285
|
-
"""
|
|
286
|
-
Input properties used for looking up and filtering SamlIntegration resources.
|
|
287
|
-
:param pulumi.Input[str] created_on: Date and time when the SAML integration was created.
|
|
288
|
-
:param pulumi.Input[bool] enabled: Specifies whether this security integration is enabled or disabled.
|
|
289
|
-
:param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
|
|
290
|
-
:param pulumi.Input[bool] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
|
|
291
|
-
:param pulumi.Input[bool] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
|
|
292
|
-
:param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
|
|
293
|
-
:param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
294
|
-
:param pulumi.Input[str] saml2_provider: The string describing the IdP. One of the following: OKTA, ADFS, Custom.
|
|
295
|
-
:param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
|
|
296
|
-
:param pulumi.Input[bool] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
|
|
297
|
-
:param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
|
|
298
|
-
:param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
|
|
299
|
-
:param pulumi.Input[str] saml2_snowflake_metadata: Metadata created by Snowflake to provide to SAML2 provider.
|
|
300
|
-
:param pulumi.Input[str] saml2_snowflake_x509_cert: The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
|
|
301
|
-
:param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page.
|
|
302
|
-
:param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
303
|
-
:param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
304
|
-
"""
|
|
305
|
-
if created_on is not None:
|
|
306
|
-
pulumi.set(__self__, "created_on", created_on)
|
|
307
|
-
if enabled is not None:
|
|
308
|
-
pulumi.set(__self__, "enabled", enabled)
|
|
309
|
-
if name is not None:
|
|
310
|
-
pulumi.set(__self__, "name", name)
|
|
311
|
-
if saml2_digest_methods_used is not None:
|
|
312
|
-
pulumi.set(__self__, "saml2_digest_methods_used", saml2_digest_methods_used)
|
|
313
|
-
if saml2_enable_sp_initiated is not None:
|
|
314
|
-
pulumi.set(__self__, "saml2_enable_sp_initiated", saml2_enable_sp_initiated)
|
|
315
|
-
if saml2_force_authn is not None:
|
|
316
|
-
pulumi.set(__self__, "saml2_force_authn", saml2_force_authn)
|
|
317
|
-
if saml2_issuer is not None:
|
|
318
|
-
pulumi.set(__self__, "saml2_issuer", saml2_issuer)
|
|
319
|
-
if saml2_post_logout_redirect_url is not None:
|
|
320
|
-
pulumi.set(__self__, "saml2_post_logout_redirect_url", saml2_post_logout_redirect_url)
|
|
321
|
-
if saml2_provider is not None:
|
|
322
|
-
pulumi.set(__self__, "saml2_provider", saml2_provider)
|
|
323
|
-
if saml2_requested_nameid_format is not None:
|
|
324
|
-
pulumi.set(__self__, "saml2_requested_nameid_format", saml2_requested_nameid_format)
|
|
325
|
-
if saml2_sign_request is not None:
|
|
326
|
-
pulumi.set(__self__, "saml2_sign_request", saml2_sign_request)
|
|
327
|
-
if saml2_signature_methods_used is not None:
|
|
328
|
-
pulumi.set(__self__, "saml2_signature_methods_used", saml2_signature_methods_used)
|
|
329
|
-
if saml2_snowflake_acs_url is not None:
|
|
330
|
-
pulumi.set(__self__, "saml2_snowflake_acs_url", saml2_snowflake_acs_url)
|
|
331
|
-
if saml2_snowflake_issuer_url is not None:
|
|
332
|
-
pulumi.set(__self__, "saml2_snowflake_issuer_url", saml2_snowflake_issuer_url)
|
|
333
|
-
if saml2_snowflake_metadata is not None:
|
|
334
|
-
pulumi.set(__self__, "saml2_snowflake_metadata", saml2_snowflake_metadata)
|
|
335
|
-
if saml2_snowflake_x509_cert is not None:
|
|
336
|
-
pulumi.set(__self__, "saml2_snowflake_x509_cert", saml2_snowflake_x509_cert)
|
|
337
|
-
if saml2_sp_initiated_login_page_label is not None:
|
|
338
|
-
pulumi.set(__self__, "saml2_sp_initiated_login_page_label", saml2_sp_initiated_login_page_label)
|
|
339
|
-
if saml2_sso_url is not None:
|
|
340
|
-
pulumi.set(__self__, "saml2_sso_url", saml2_sso_url)
|
|
341
|
-
if saml2_x509_cert is not None:
|
|
342
|
-
pulumi.set(__self__, "saml2_x509_cert", saml2_x509_cert)
|
|
343
|
-
|
|
344
|
-
@property
|
|
345
|
-
@pulumi.getter(name="createdOn")
|
|
346
|
-
def created_on(self) -> Optional[pulumi.Input[str]]:
|
|
347
|
-
"""
|
|
348
|
-
Date and time when the SAML integration was created.
|
|
349
|
-
"""
|
|
350
|
-
return pulumi.get(self, "created_on")
|
|
351
|
-
|
|
352
|
-
@created_on.setter
|
|
353
|
-
def created_on(self, value: Optional[pulumi.Input[str]]):
|
|
354
|
-
pulumi.set(self, "created_on", value)
|
|
355
|
-
|
|
356
|
-
@property
|
|
357
|
-
@pulumi.getter
|
|
358
|
-
def enabled(self) -> Optional[pulumi.Input[bool]]:
|
|
359
|
-
"""
|
|
360
|
-
Specifies whether this security integration is enabled or disabled.
|
|
361
|
-
"""
|
|
362
|
-
return pulumi.get(self, "enabled")
|
|
363
|
-
|
|
364
|
-
@enabled.setter
|
|
365
|
-
def enabled(self, value: Optional[pulumi.Input[bool]]):
|
|
366
|
-
pulumi.set(self, "enabled", value)
|
|
367
|
-
|
|
368
|
-
@property
|
|
369
|
-
@pulumi.getter
|
|
370
|
-
def name(self) -> Optional[pulumi.Input[str]]:
|
|
371
|
-
"""
|
|
372
|
-
Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
|
|
373
|
-
"""
|
|
374
|
-
return pulumi.get(self, "name")
|
|
375
|
-
|
|
376
|
-
@name.setter
|
|
377
|
-
def name(self, value: Optional[pulumi.Input[str]]):
|
|
378
|
-
pulumi.set(self, "name", value)
|
|
379
|
-
|
|
380
|
-
@property
|
|
381
|
-
@pulumi.getter(name="saml2DigestMethodsUsed")
|
|
382
|
-
def saml2_digest_methods_used(self) -> Optional[pulumi.Input[str]]:
|
|
383
|
-
return pulumi.get(self, "saml2_digest_methods_used")
|
|
384
|
-
|
|
385
|
-
@saml2_digest_methods_used.setter
|
|
386
|
-
def saml2_digest_methods_used(self, value: Optional[pulumi.Input[str]]):
|
|
387
|
-
pulumi.set(self, "saml2_digest_methods_used", value)
|
|
388
|
-
|
|
389
|
-
@property
|
|
390
|
-
@pulumi.getter(name="saml2EnableSpInitiated")
|
|
391
|
-
def saml2_enable_sp_initiated(self) -> Optional[pulumi.Input[bool]]:
|
|
392
|
-
"""
|
|
393
|
-
The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
|
|
394
|
-
"""
|
|
395
|
-
return pulumi.get(self, "saml2_enable_sp_initiated")
|
|
396
|
-
|
|
397
|
-
@saml2_enable_sp_initiated.setter
|
|
398
|
-
def saml2_enable_sp_initiated(self, value: Optional[pulumi.Input[bool]]):
|
|
399
|
-
pulumi.set(self, "saml2_enable_sp_initiated", value)
|
|
400
|
-
|
|
401
|
-
@property
|
|
402
|
-
@pulumi.getter(name="saml2ForceAuthn")
|
|
403
|
-
def saml2_force_authn(self) -> Optional[pulumi.Input[bool]]:
|
|
404
|
-
"""
|
|
405
|
-
The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
|
|
406
|
-
"""
|
|
407
|
-
return pulumi.get(self, "saml2_force_authn")
|
|
408
|
-
|
|
409
|
-
@saml2_force_authn.setter
|
|
410
|
-
def saml2_force_authn(self, value: Optional[pulumi.Input[bool]]):
|
|
411
|
-
pulumi.set(self, "saml2_force_authn", value)
|
|
412
|
-
|
|
413
|
-
@property
|
|
414
|
-
@pulumi.getter(name="saml2Issuer")
|
|
415
|
-
def saml2_issuer(self) -> Optional[pulumi.Input[str]]:
|
|
416
|
-
"""
|
|
417
|
-
The string containing the IdP EntityID / Issuer.
|
|
418
|
-
"""
|
|
419
|
-
return pulumi.get(self, "saml2_issuer")
|
|
420
|
-
|
|
421
|
-
@saml2_issuer.setter
|
|
422
|
-
def saml2_issuer(self, value: Optional[pulumi.Input[str]]):
|
|
423
|
-
pulumi.set(self, "saml2_issuer", value)
|
|
424
|
-
|
|
425
|
-
@property
|
|
426
|
-
@pulumi.getter(name="saml2PostLogoutRedirectUrl")
|
|
427
|
-
def saml2_post_logout_redirect_url(self) -> Optional[pulumi.Input[str]]:
|
|
428
|
-
"""
|
|
429
|
-
The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
430
|
-
"""
|
|
431
|
-
return pulumi.get(self, "saml2_post_logout_redirect_url")
|
|
432
|
-
|
|
433
|
-
@saml2_post_logout_redirect_url.setter
|
|
434
|
-
def saml2_post_logout_redirect_url(self, value: Optional[pulumi.Input[str]]):
|
|
435
|
-
pulumi.set(self, "saml2_post_logout_redirect_url", value)
|
|
436
|
-
|
|
437
|
-
@property
|
|
438
|
-
@pulumi.getter(name="saml2Provider")
|
|
439
|
-
def saml2_provider(self) -> Optional[pulumi.Input[str]]:
|
|
440
|
-
"""
|
|
441
|
-
The string describing the IdP. One of the following: OKTA, ADFS, Custom.
|
|
442
|
-
"""
|
|
443
|
-
return pulumi.get(self, "saml2_provider")
|
|
444
|
-
|
|
445
|
-
@saml2_provider.setter
|
|
446
|
-
def saml2_provider(self, value: Optional[pulumi.Input[str]]):
|
|
447
|
-
pulumi.set(self, "saml2_provider", value)
|
|
448
|
-
|
|
449
|
-
@property
|
|
450
|
-
@pulumi.getter(name="saml2RequestedNameidFormat")
|
|
451
|
-
def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[str]]:
|
|
452
|
-
"""
|
|
453
|
-
The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
|
|
454
|
-
"""
|
|
455
|
-
return pulumi.get(self, "saml2_requested_nameid_format")
|
|
456
|
-
|
|
457
|
-
@saml2_requested_nameid_format.setter
|
|
458
|
-
def saml2_requested_nameid_format(self, value: Optional[pulumi.Input[str]]):
|
|
459
|
-
pulumi.set(self, "saml2_requested_nameid_format", value)
|
|
460
|
-
|
|
461
|
-
@property
|
|
462
|
-
@pulumi.getter(name="saml2SignRequest")
|
|
463
|
-
def saml2_sign_request(self) -> Optional[pulumi.Input[bool]]:
|
|
464
|
-
"""
|
|
465
|
-
The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
|
|
466
|
-
"""
|
|
467
|
-
return pulumi.get(self, "saml2_sign_request")
|
|
468
|
-
|
|
469
|
-
@saml2_sign_request.setter
|
|
470
|
-
def saml2_sign_request(self, value: Optional[pulumi.Input[bool]]):
|
|
471
|
-
pulumi.set(self, "saml2_sign_request", value)
|
|
472
|
-
|
|
473
|
-
@property
|
|
474
|
-
@pulumi.getter(name="saml2SignatureMethodsUsed")
|
|
475
|
-
def saml2_signature_methods_used(self) -> Optional[pulumi.Input[str]]:
|
|
476
|
-
return pulumi.get(self, "saml2_signature_methods_used")
|
|
477
|
-
|
|
478
|
-
@saml2_signature_methods_used.setter
|
|
479
|
-
def saml2_signature_methods_used(self, value: Optional[pulumi.Input[str]]):
|
|
480
|
-
pulumi.set(self, "saml2_signature_methods_used", value)
|
|
481
|
-
|
|
482
|
-
@property
|
|
483
|
-
@pulumi.getter(name="saml2SnowflakeAcsUrl")
|
|
484
|
-
def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[str]]:
|
|
485
|
-
"""
|
|
486
|
-
The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
|
|
487
|
-
"""
|
|
488
|
-
return pulumi.get(self, "saml2_snowflake_acs_url")
|
|
489
|
-
|
|
490
|
-
@saml2_snowflake_acs_url.setter
|
|
491
|
-
def saml2_snowflake_acs_url(self, value: Optional[pulumi.Input[str]]):
|
|
492
|
-
pulumi.set(self, "saml2_snowflake_acs_url", value)
|
|
493
|
-
|
|
494
|
-
@property
|
|
495
|
-
@pulumi.getter(name="saml2SnowflakeIssuerUrl")
|
|
496
|
-
def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[str]]:
|
|
497
|
-
"""
|
|
498
|
-
The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
|
|
499
|
-
"""
|
|
500
|
-
return pulumi.get(self, "saml2_snowflake_issuer_url")
|
|
501
|
-
|
|
502
|
-
@saml2_snowflake_issuer_url.setter
|
|
503
|
-
def saml2_snowflake_issuer_url(self, value: Optional[pulumi.Input[str]]):
|
|
504
|
-
pulumi.set(self, "saml2_snowflake_issuer_url", value)
|
|
505
|
-
|
|
506
|
-
@property
|
|
507
|
-
@pulumi.getter(name="saml2SnowflakeMetadata")
|
|
508
|
-
def saml2_snowflake_metadata(self) -> Optional[pulumi.Input[str]]:
|
|
509
|
-
"""
|
|
510
|
-
Metadata created by Snowflake to provide to SAML2 provider.
|
|
511
|
-
"""
|
|
512
|
-
return pulumi.get(self, "saml2_snowflake_metadata")
|
|
513
|
-
|
|
514
|
-
@saml2_snowflake_metadata.setter
|
|
515
|
-
def saml2_snowflake_metadata(self, value: Optional[pulumi.Input[str]]):
|
|
516
|
-
pulumi.set(self, "saml2_snowflake_metadata", value)
|
|
517
|
-
|
|
518
|
-
@property
|
|
519
|
-
@pulumi.getter(name="saml2SnowflakeX509Cert")
|
|
520
|
-
def saml2_snowflake_x509_cert(self) -> Optional[pulumi.Input[str]]:
|
|
521
|
-
"""
|
|
522
|
-
The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
|
|
523
|
-
"""
|
|
524
|
-
return pulumi.get(self, "saml2_snowflake_x509_cert")
|
|
525
|
-
|
|
526
|
-
@saml2_snowflake_x509_cert.setter
|
|
527
|
-
def saml2_snowflake_x509_cert(self, value: Optional[pulumi.Input[str]]):
|
|
528
|
-
pulumi.set(self, "saml2_snowflake_x509_cert", value)
|
|
529
|
-
|
|
530
|
-
@property
|
|
531
|
-
@pulumi.getter(name="saml2SpInitiatedLoginPageLabel")
|
|
532
|
-
def saml2_sp_initiated_login_page_label(self) -> Optional[pulumi.Input[str]]:
|
|
533
|
-
"""
|
|
534
|
-
The string containing the label to display after the Log In With button on the login page.
|
|
535
|
-
"""
|
|
536
|
-
return pulumi.get(self, "saml2_sp_initiated_login_page_label")
|
|
537
|
-
|
|
538
|
-
@saml2_sp_initiated_login_page_label.setter
|
|
539
|
-
def saml2_sp_initiated_login_page_label(self, value: Optional[pulumi.Input[str]]):
|
|
540
|
-
pulumi.set(self, "saml2_sp_initiated_login_page_label", value)
|
|
541
|
-
|
|
542
|
-
@property
|
|
543
|
-
@pulumi.getter(name="saml2SsoUrl")
|
|
544
|
-
def saml2_sso_url(self) -> Optional[pulumi.Input[str]]:
|
|
545
|
-
"""
|
|
546
|
-
The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
547
|
-
"""
|
|
548
|
-
return pulumi.get(self, "saml2_sso_url")
|
|
549
|
-
|
|
550
|
-
@saml2_sso_url.setter
|
|
551
|
-
def saml2_sso_url(self, value: Optional[pulumi.Input[str]]):
|
|
552
|
-
pulumi.set(self, "saml2_sso_url", value)
|
|
553
|
-
|
|
554
|
-
@property
|
|
555
|
-
@pulumi.getter(name="saml2X509Cert")
|
|
556
|
-
def saml2_x509_cert(self) -> Optional[pulumi.Input[str]]:
|
|
557
|
-
"""
|
|
558
|
-
The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
559
|
-
"""
|
|
560
|
-
return pulumi.get(self, "saml2_x509_cert")
|
|
561
|
-
|
|
562
|
-
@saml2_x509_cert.setter
|
|
563
|
-
def saml2_x509_cert(self, value: Optional[pulumi.Input[str]]):
|
|
564
|
-
pulumi.set(self, "saml2_x509_cert", value)
|
|
565
|
-
|
|
566
|
-
|
|
567
|
-
class SamlIntegration(pulumi.CustomResource):
|
|
568
|
-
@overload
|
|
569
|
-
def __init__(__self__,
|
|
570
|
-
resource_name: str,
|
|
571
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
572
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
|
573
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
574
|
-
saml2_enable_sp_initiated: Optional[pulumi.Input[bool]] = None,
|
|
575
|
-
saml2_force_authn: Optional[pulumi.Input[bool]] = None,
|
|
576
|
-
saml2_issuer: Optional[pulumi.Input[str]] = None,
|
|
577
|
-
saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
|
|
578
|
-
saml2_provider: Optional[pulumi.Input[str]] = None,
|
|
579
|
-
saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
|
|
580
|
-
saml2_sign_request: Optional[pulumi.Input[bool]] = None,
|
|
581
|
-
saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
|
|
582
|
-
saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
|
|
583
|
-
saml2_snowflake_x509_cert: Optional[pulumi.Input[str]] = None,
|
|
584
|
-
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
|
|
585
|
-
saml2_sso_url: Optional[pulumi.Input[str]] = None,
|
|
586
|
-
saml2_x509_cert: Optional[pulumi.Input[str]] = None,
|
|
587
|
-
__props__=None):
|
|
588
|
-
"""
|
|
589
|
-
## Import
|
|
590
|
-
|
|
591
|
-
```sh
|
|
592
|
-
$ pulumi import snowflake:index/samlIntegration:SamlIntegration example name
|
|
593
|
-
```
|
|
594
|
-
|
|
595
|
-
:param str resource_name: The name of the resource.
|
|
596
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
597
|
-
:param pulumi.Input[bool] enabled: Specifies whether this security integration is enabled or disabled.
|
|
598
|
-
:param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
|
|
599
|
-
:param pulumi.Input[bool] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
|
|
600
|
-
:param pulumi.Input[bool] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
|
|
601
|
-
:param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
|
|
602
|
-
:param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
603
|
-
:param pulumi.Input[str] saml2_provider: The string describing the IdP. One of the following: OKTA, ADFS, Custom.
|
|
604
|
-
:param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
|
|
605
|
-
:param pulumi.Input[bool] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
|
|
606
|
-
:param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
|
|
607
|
-
:param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
|
|
608
|
-
:param pulumi.Input[str] saml2_snowflake_x509_cert: The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
|
|
609
|
-
:param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page.
|
|
610
|
-
:param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
611
|
-
:param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
612
|
-
"""
|
|
613
|
-
...
|
|
614
|
-
@overload
|
|
615
|
-
def __init__(__self__,
|
|
616
|
-
resource_name: str,
|
|
617
|
-
args: SamlIntegrationArgs,
|
|
618
|
-
opts: Optional[pulumi.ResourceOptions] = None):
|
|
619
|
-
"""
|
|
620
|
-
## Import
|
|
621
|
-
|
|
622
|
-
```sh
|
|
623
|
-
$ pulumi import snowflake:index/samlIntegration:SamlIntegration example name
|
|
624
|
-
```
|
|
625
|
-
|
|
626
|
-
:param str resource_name: The name of the resource.
|
|
627
|
-
:param SamlIntegrationArgs args: The arguments to use to populate this resource's properties.
|
|
628
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
629
|
-
"""
|
|
630
|
-
...
|
|
631
|
-
def __init__(__self__, resource_name: str, *args, **kwargs):
|
|
632
|
-
resource_args, opts = _utilities.get_resource_args_opts(SamlIntegrationArgs, pulumi.ResourceOptions, *args, **kwargs)
|
|
633
|
-
if resource_args is not None:
|
|
634
|
-
__self__._internal_init(resource_name, opts, **resource_args.__dict__)
|
|
635
|
-
else:
|
|
636
|
-
__self__._internal_init(resource_name, *args, **kwargs)
|
|
637
|
-
|
|
638
|
-
def _internal_init(__self__,
|
|
639
|
-
resource_name: str,
|
|
640
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
641
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
|
642
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
643
|
-
saml2_enable_sp_initiated: Optional[pulumi.Input[bool]] = None,
|
|
644
|
-
saml2_force_authn: Optional[pulumi.Input[bool]] = None,
|
|
645
|
-
saml2_issuer: Optional[pulumi.Input[str]] = None,
|
|
646
|
-
saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
|
|
647
|
-
saml2_provider: Optional[pulumi.Input[str]] = None,
|
|
648
|
-
saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
|
|
649
|
-
saml2_sign_request: Optional[pulumi.Input[bool]] = None,
|
|
650
|
-
saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
|
|
651
|
-
saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
|
|
652
|
-
saml2_snowflake_x509_cert: Optional[pulumi.Input[str]] = None,
|
|
653
|
-
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
|
|
654
|
-
saml2_sso_url: Optional[pulumi.Input[str]] = None,
|
|
655
|
-
saml2_x509_cert: Optional[pulumi.Input[str]] = None,
|
|
656
|
-
__props__=None):
|
|
657
|
-
opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
|
|
658
|
-
if not isinstance(opts, pulumi.ResourceOptions):
|
|
659
|
-
raise TypeError('Expected resource options to be a ResourceOptions instance')
|
|
660
|
-
if opts.id is None:
|
|
661
|
-
if __props__ is not None:
|
|
662
|
-
raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
|
|
663
|
-
__props__ = SamlIntegrationArgs.__new__(SamlIntegrationArgs)
|
|
664
|
-
|
|
665
|
-
__props__.__dict__["enabled"] = enabled
|
|
666
|
-
__props__.__dict__["name"] = name
|
|
667
|
-
__props__.__dict__["saml2_enable_sp_initiated"] = saml2_enable_sp_initiated
|
|
668
|
-
__props__.__dict__["saml2_force_authn"] = saml2_force_authn
|
|
669
|
-
if saml2_issuer is None and not opts.urn:
|
|
670
|
-
raise TypeError("Missing required property 'saml2_issuer'")
|
|
671
|
-
__props__.__dict__["saml2_issuer"] = saml2_issuer
|
|
672
|
-
__props__.__dict__["saml2_post_logout_redirect_url"] = saml2_post_logout_redirect_url
|
|
673
|
-
if saml2_provider is None and not opts.urn:
|
|
674
|
-
raise TypeError("Missing required property 'saml2_provider'")
|
|
675
|
-
__props__.__dict__["saml2_provider"] = saml2_provider
|
|
676
|
-
__props__.__dict__["saml2_requested_nameid_format"] = saml2_requested_nameid_format
|
|
677
|
-
__props__.__dict__["saml2_sign_request"] = saml2_sign_request
|
|
678
|
-
__props__.__dict__["saml2_snowflake_acs_url"] = saml2_snowflake_acs_url
|
|
679
|
-
__props__.__dict__["saml2_snowflake_issuer_url"] = saml2_snowflake_issuer_url
|
|
680
|
-
__props__.__dict__["saml2_snowflake_x509_cert"] = saml2_snowflake_x509_cert
|
|
681
|
-
__props__.__dict__["saml2_sp_initiated_login_page_label"] = saml2_sp_initiated_login_page_label
|
|
682
|
-
if saml2_sso_url is None and not opts.urn:
|
|
683
|
-
raise TypeError("Missing required property 'saml2_sso_url'")
|
|
684
|
-
__props__.__dict__["saml2_sso_url"] = saml2_sso_url
|
|
685
|
-
if saml2_x509_cert is None and not opts.urn:
|
|
686
|
-
raise TypeError("Missing required property 'saml2_x509_cert'")
|
|
687
|
-
__props__.__dict__["saml2_x509_cert"] = saml2_x509_cert
|
|
688
|
-
__props__.__dict__["created_on"] = None
|
|
689
|
-
__props__.__dict__["saml2_digest_methods_used"] = None
|
|
690
|
-
__props__.__dict__["saml2_signature_methods_used"] = None
|
|
691
|
-
__props__.__dict__["saml2_snowflake_metadata"] = None
|
|
692
|
-
super(SamlIntegration, __self__).__init__(
|
|
693
|
-
'snowflake:index/samlIntegration:SamlIntegration',
|
|
694
|
-
resource_name,
|
|
695
|
-
__props__,
|
|
696
|
-
opts)
|
|
697
|
-
|
|
698
|
-
@staticmethod
|
|
699
|
-
def get(resource_name: str,
|
|
700
|
-
id: pulumi.Input[str],
|
|
701
|
-
opts: Optional[pulumi.ResourceOptions] = None,
|
|
702
|
-
created_on: Optional[pulumi.Input[str]] = None,
|
|
703
|
-
enabled: Optional[pulumi.Input[bool]] = None,
|
|
704
|
-
name: Optional[pulumi.Input[str]] = None,
|
|
705
|
-
saml2_digest_methods_used: Optional[pulumi.Input[str]] = None,
|
|
706
|
-
saml2_enable_sp_initiated: Optional[pulumi.Input[bool]] = None,
|
|
707
|
-
saml2_force_authn: Optional[pulumi.Input[bool]] = None,
|
|
708
|
-
saml2_issuer: Optional[pulumi.Input[str]] = None,
|
|
709
|
-
saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
|
|
710
|
-
saml2_provider: Optional[pulumi.Input[str]] = None,
|
|
711
|
-
saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
|
|
712
|
-
saml2_sign_request: Optional[pulumi.Input[bool]] = None,
|
|
713
|
-
saml2_signature_methods_used: Optional[pulumi.Input[str]] = None,
|
|
714
|
-
saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
|
|
715
|
-
saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
|
|
716
|
-
saml2_snowflake_metadata: Optional[pulumi.Input[str]] = None,
|
|
717
|
-
saml2_snowflake_x509_cert: Optional[pulumi.Input[str]] = None,
|
|
718
|
-
saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
|
|
719
|
-
saml2_sso_url: Optional[pulumi.Input[str]] = None,
|
|
720
|
-
saml2_x509_cert: Optional[pulumi.Input[str]] = None) -> 'SamlIntegration':
|
|
721
|
-
"""
|
|
722
|
-
Get an existing SamlIntegration resource's state with the given name, id, and optional extra
|
|
723
|
-
properties used to qualify the lookup.
|
|
724
|
-
|
|
725
|
-
:param str resource_name: The unique name of the resulting resource.
|
|
726
|
-
:param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
|
|
727
|
-
:param pulumi.ResourceOptions opts: Options for the resource.
|
|
728
|
-
:param pulumi.Input[str] created_on: Date and time when the SAML integration was created.
|
|
729
|
-
:param pulumi.Input[bool] enabled: Specifies whether this security integration is enabled or disabled.
|
|
730
|
-
:param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
|
|
731
|
-
:param pulumi.Input[bool] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
|
|
732
|
-
:param pulumi.Input[bool] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
|
|
733
|
-
:param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
|
|
734
|
-
:param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
735
|
-
:param pulumi.Input[str] saml2_provider: The string describing the IdP. One of the following: OKTA, ADFS, Custom.
|
|
736
|
-
:param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
|
|
737
|
-
:param pulumi.Input[bool] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
|
|
738
|
-
:param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
|
|
739
|
-
:param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
|
|
740
|
-
:param pulumi.Input[str] saml2_snowflake_metadata: Metadata created by Snowflake to provide to SAML2 provider.
|
|
741
|
-
:param pulumi.Input[str] saml2_snowflake_x509_cert: The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
|
|
742
|
-
:param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page.
|
|
743
|
-
:param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
744
|
-
:param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
745
|
-
"""
|
|
746
|
-
opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
|
|
747
|
-
|
|
748
|
-
__props__ = _SamlIntegrationState.__new__(_SamlIntegrationState)
|
|
749
|
-
|
|
750
|
-
__props__.__dict__["created_on"] = created_on
|
|
751
|
-
__props__.__dict__["enabled"] = enabled
|
|
752
|
-
__props__.__dict__["name"] = name
|
|
753
|
-
__props__.__dict__["saml2_digest_methods_used"] = saml2_digest_methods_used
|
|
754
|
-
__props__.__dict__["saml2_enable_sp_initiated"] = saml2_enable_sp_initiated
|
|
755
|
-
__props__.__dict__["saml2_force_authn"] = saml2_force_authn
|
|
756
|
-
__props__.__dict__["saml2_issuer"] = saml2_issuer
|
|
757
|
-
__props__.__dict__["saml2_post_logout_redirect_url"] = saml2_post_logout_redirect_url
|
|
758
|
-
__props__.__dict__["saml2_provider"] = saml2_provider
|
|
759
|
-
__props__.__dict__["saml2_requested_nameid_format"] = saml2_requested_nameid_format
|
|
760
|
-
__props__.__dict__["saml2_sign_request"] = saml2_sign_request
|
|
761
|
-
__props__.__dict__["saml2_signature_methods_used"] = saml2_signature_methods_used
|
|
762
|
-
__props__.__dict__["saml2_snowflake_acs_url"] = saml2_snowflake_acs_url
|
|
763
|
-
__props__.__dict__["saml2_snowflake_issuer_url"] = saml2_snowflake_issuer_url
|
|
764
|
-
__props__.__dict__["saml2_snowflake_metadata"] = saml2_snowflake_metadata
|
|
765
|
-
__props__.__dict__["saml2_snowflake_x509_cert"] = saml2_snowflake_x509_cert
|
|
766
|
-
__props__.__dict__["saml2_sp_initiated_login_page_label"] = saml2_sp_initiated_login_page_label
|
|
767
|
-
__props__.__dict__["saml2_sso_url"] = saml2_sso_url
|
|
768
|
-
__props__.__dict__["saml2_x509_cert"] = saml2_x509_cert
|
|
769
|
-
return SamlIntegration(resource_name, opts=opts, __props__=__props__)
|
|
770
|
-
|
|
771
|
-
@property
|
|
772
|
-
@pulumi.getter(name="createdOn")
|
|
773
|
-
def created_on(self) -> pulumi.Output[str]:
|
|
774
|
-
"""
|
|
775
|
-
Date and time when the SAML integration was created.
|
|
776
|
-
"""
|
|
777
|
-
return pulumi.get(self, "created_on")
|
|
778
|
-
|
|
779
|
-
@property
|
|
780
|
-
@pulumi.getter
|
|
781
|
-
def enabled(self) -> pulumi.Output[Optional[bool]]:
|
|
782
|
-
"""
|
|
783
|
-
Specifies whether this security integration is enabled or disabled.
|
|
784
|
-
"""
|
|
785
|
-
return pulumi.get(self, "enabled")
|
|
786
|
-
|
|
787
|
-
@property
|
|
788
|
-
@pulumi.getter
|
|
789
|
-
def name(self) -> pulumi.Output[str]:
|
|
790
|
-
"""
|
|
791
|
-
Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
|
|
792
|
-
"""
|
|
793
|
-
return pulumi.get(self, "name")
|
|
794
|
-
|
|
795
|
-
@property
|
|
796
|
-
@pulumi.getter(name="saml2DigestMethodsUsed")
|
|
797
|
-
def saml2_digest_methods_used(self) -> pulumi.Output[str]:
|
|
798
|
-
return pulumi.get(self, "saml2_digest_methods_used")
|
|
799
|
-
|
|
800
|
-
@property
|
|
801
|
-
@pulumi.getter(name="saml2EnableSpInitiated")
|
|
802
|
-
def saml2_enable_sp_initiated(self) -> pulumi.Output[Optional[bool]]:
|
|
803
|
-
"""
|
|
804
|
-
The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
|
|
805
|
-
"""
|
|
806
|
-
return pulumi.get(self, "saml2_enable_sp_initiated")
|
|
807
|
-
|
|
808
|
-
@property
|
|
809
|
-
@pulumi.getter(name="saml2ForceAuthn")
|
|
810
|
-
def saml2_force_authn(self) -> pulumi.Output[Optional[bool]]:
|
|
811
|
-
"""
|
|
812
|
-
The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
|
|
813
|
-
"""
|
|
814
|
-
return pulumi.get(self, "saml2_force_authn")
|
|
815
|
-
|
|
816
|
-
@property
|
|
817
|
-
@pulumi.getter(name="saml2Issuer")
|
|
818
|
-
def saml2_issuer(self) -> pulumi.Output[str]:
|
|
819
|
-
"""
|
|
820
|
-
The string containing the IdP EntityID / Issuer.
|
|
821
|
-
"""
|
|
822
|
-
return pulumi.get(self, "saml2_issuer")
|
|
823
|
-
|
|
824
|
-
@property
|
|
825
|
-
@pulumi.getter(name="saml2PostLogoutRedirectUrl")
|
|
826
|
-
def saml2_post_logout_redirect_url(self) -> pulumi.Output[Optional[str]]:
|
|
827
|
-
"""
|
|
828
|
-
The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
|
|
829
|
-
"""
|
|
830
|
-
return pulumi.get(self, "saml2_post_logout_redirect_url")
|
|
831
|
-
|
|
832
|
-
@property
|
|
833
|
-
@pulumi.getter(name="saml2Provider")
|
|
834
|
-
def saml2_provider(self) -> pulumi.Output[str]:
|
|
835
|
-
"""
|
|
836
|
-
The string describing the IdP. One of the following: OKTA, ADFS, Custom.
|
|
837
|
-
"""
|
|
838
|
-
return pulumi.get(self, "saml2_provider")
|
|
839
|
-
|
|
840
|
-
@property
|
|
841
|
-
@pulumi.getter(name="saml2RequestedNameidFormat")
|
|
842
|
-
def saml2_requested_nameid_format(self) -> pulumi.Output[Optional[str]]:
|
|
843
|
-
"""
|
|
844
|
-
The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
|
|
845
|
-
"""
|
|
846
|
-
return pulumi.get(self, "saml2_requested_nameid_format")
|
|
847
|
-
|
|
848
|
-
@property
|
|
849
|
-
@pulumi.getter(name="saml2SignRequest")
|
|
850
|
-
def saml2_sign_request(self) -> pulumi.Output[Optional[bool]]:
|
|
851
|
-
"""
|
|
852
|
-
The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
|
|
853
|
-
"""
|
|
854
|
-
return pulumi.get(self, "saml2_sign_request")
|
|
855
|
-
|
|
856
|
-
@property
|
|
857
|
-
@pulumi.getter(name="saml2SignatureMethodsUsed")
|
|
858
|
-
def saml2_signature_methods_used(self) -> pulumi.Output[str]:
|
|
859
|
-
return pulumi.get(self, "saml2_signature_methods_used")
|
|
860
|
-
|
|
861
|
-
@property
|
|
862
|
-
@pulumi.getter(name="saml2SnowflakeAcsUrl")
|
|
863
|
-
def saml2_snowflake_acs_url(self) -> pulumi.Output[str]:
|
|
864
|
-
"""
|
|
865
|
-
The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
|
|
866
|
-
"""
|
|
867
|
-
return pulumi.get(self, "saml2_snowflake_acs_url")
|
|
868
|
-
|
|
869
|
-
@property
|
|
870
|
-
@pulumi.getter(name="saml2SnowflakeIssuerUrl")
|
|
871
|
-
def saml2_snowflake_issuer_url(self) -> pulumi.Output[str]:
|
|
872
|
-
"""
|
|
873
|
-
The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
|
|
874
|
-
"""
|
|
875
|
-
return pulumi.get(self, "saml2_snowflake_issuer_url")
|
|
876
|
-
|
|
877
|
-
@property
|
|
878
|
-
@pulumi.getter(name="saml2SnowflakeMetadata")
|
|
879
|
-
def saml2_snowflake_metadata(self) -> pulumi.Output[str]:
|
|
880
|
-
"""
|
|
881
|
-
Metadata created by Snowflake to provide to SAML2 provider.
|
|
882
|
-
"""
|
|
883
|
-
return pulumi.get(self, "saml2_snowflake_metadata")
|
|
884
|
-
|
|
885
|
-
@property
|
|
886
|
-
@pulumi.getter(name="saml2SnowflakeX509Cert")
|
|
887
|
-
def saml2_snowflake_x509_cert(self) -> pulumi.Output[str]:
|
|
888
|
-
"""
|
|
889
|
-
The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
|
|
890
|
-
"""
|
|
891
|
-
return pulumi.get(self, "saml2_snowflake_x509_cert")
|
|
892
|
-
|
|
893
|
-
@property
|
|
894
|
-
@pulumi.getter(name="saml2SpInitiatedLoginPageLabel")
|
|
895
|
-
def saml2_sp_initiated_login_page_label(self) -> pulumi.Output[Optional[str]]:
|
|
896
|
-
"""
|
|
897
|
-
The string containing the label to display after the Log In With button on the login page.
|
|
898
|
-
"""
|
|
899
|
-
return pulumi.get(self, "saml2_sp_initiated_login_page_label")
|
|
900
|
-
|
|
901
|
-
@property
|
|
902
|
-
@pulumi.getter(name="saml2SsoUrl")
|
|
903
|
-
def saml2_sso_url(self) -> pulumi.Output[str]:
|
|
904
|
-
"""
|
|
905
|
-
The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
|
|
906
|
-
"""
|
|
907
|
-
return pulumi.get(self, "saml2_sso_url")
|
|
908
|
-
|
|
909
|
-
@property
|
|
910
|
-
@pulumi.getter(name="saml2X509Cert")
|
|
911
|
-
def saml2_x509_cert(self) -> pulumi.Output[str]:
|
|
912
|
-
"""
|
|
913
|
-
The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
|
|
914
|
-
"""
|
|
915
|
-
return pulumi.get(self, "saml2_x509_cert")
|
|
916
|
-
|