pulumi-snowflake 0.63.0a1734439451__py3-none-any.whl → 1.0.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of pulumi-snowflake might be problematic. Click here for more details.

Files changed (127) hide show
  1. pulumi_snowflake/__init__.py +82 -74
  2. pulumi_snowflake/_inputs.py +12705 -4876
  3. pulumi_snowflake/account.py +156 -163
  4. pulumi_snowflake/account_parameter.py +16 -16
  5. pulumi_snowflake/account_role.py +9 -9
  6. pulumi_snowflake/api_authentication_integration_with_authorization_code_grant.py +9 -22
  7. pulumi_snowflake/api_authentication_integration_with_client_credentials.py +9 -22
  8. pulumi_snowflake/api_authentication_integration_with_jwt_bearer.py +9 -22
  9. pulumi_snowflake/authentication_policy.py +21 -21
  10. pulumi_snowflake/config/__init__.pyi +8 -86
  11. pulumi_snowflake/config/vars.py +10 -110
  12. pulumi_snowflake/database.py +9 -9
  13. pulumi_snowflake/database_role.py +14 -14
  14. pulumi_snowflake/{unsafe_execute.py → execute.py} +35 -25
  15. pulumi_snowflake/external_oauth_integration.py +27 -27
  16. pulumi_snowflake/external_volume.py +11 -7
  17. pulumi_snowflake/function_java.py +1211 -0
  18. pulumi_snowflake/function_javascript.py +882 -0
  19. pulumi_snowflake/function_python.py +1212 -0
  20. pulumi_snowflake/function_scala.py +1212 -0
  21. pulumi_snowflake/function_sql.py +835 -0
  22. pulumi_snowflake/get_account_roles.py +129 -0
  23. pulumi_snowflake/get_accounts.py +41 -19
  24. pulumi_snowflake/get_alerts.py +4 -0
  25. pulumi_snowflake/get_connections.py +2 -40
  26. pulumi_snowflake/get_cortex_search_services.py +4 -0
  27. pulumi_snowflake/get_current_account.py +4 -0
  28. pulumi_snowflake/get_current_role.py +2 -2
  29. pulumi_snowflake/get_database.py +4 -0
  30. pulumi_snowflake/get_database_role.py +4 -0
  31. pulumi_snowflake/get_database_roles.py +2 -6
  32. pulumi_snowflake/get_databases.py +2 -6
  33. pulumi_snowflake/get_dynamic_tables.py +4 -2
  34. pulumi_snowflake/get_external_functions.py +4 -0
  35. pulumi_snowflake/get_external_tables.py +4 -0
  36. pulumi_snowflake/get_failover_groups.py +4 -2
  37. pulumi_snowflake/get_file_formats.py +4 -0
  38. pulumi_snowflake/get_functions.py +4 -0
  39. pulumi_snowflake/get_grants.py +0 -4
  40. pulumi_snowflake/get_masking_policies.py +2 -6
  41. pulumi_snowflake/get_materialized_views.py +4 -0
  42. pulumi_snowflake/get_network_policies.py +2 -6
  43. pulumi_snowflake/get_parameters.py +4 -0
  44. pulumi_snowflake/get_pipes.py +4 -0
  45. pulumi_snowflake/get_procedures.py +4 -0
  46. pulumi_snowflake/get_resource_monitors.py +2 -6
  47. pulumi_snowflake/get_row_access_policies.py +2 -6
  48. pulumi_snowflake/get_schemas.py +6 -4
  49. pulumi_snowflake/get_secrets.py +2 -6
  50. pulumi_snowflake/get_security_integrations.py +2 -6
  51. pulumi_snowflake/get_sequences.py +4 -0
  52. pulumi_snowflake/get_shares.py +4 -0
  53. pulumi_snowflake/get_stages.py +4 -0
  54. pulumi_snowflake/get_storage_integrations.py +4 -0
  55. pulumi_snowflake/get_streamlits.py +2 -6
  56. pulumi_snowflake/get_streams.py +2 -6
  57. pulumi_snowflake/get_system_generate_scim_access_token.py +4 -0
  58. pulumi_snowflake/get_system_get_private_link_config.py +4 -0
  59. pulumi_snowflake/get_system_get_snowflake_platform_info.py +2 -2
  60. pulumi_snowflake/get_tables.py +4 -0
  61. pulumi_snowflake/get_tags.py +2 -6
  62. pulumi_snowflake/get_tasks.py +0 -4
  63. pulumi_snowflake/get_users.py +2 -6
  64. pulumi_snowflake/get_views.py +2 -6
  65. pulumi_snowflake/get_warehouses.py +2 -6
  66. pulumi_snowflake/grant_account_role.py +21 -21
  67. pulumi_snowflake/grant_application_role.py +7 -7
  68. pulumi_snowflake/grant_database_role.py +28 -28
  69. pulumi_snowflake/grant_ownership.py +14 -14
  70. pulumi_snowflake/grant_privileges_to_account_role.py +14 -14
  71. pulumi_snowflake/grant_privileges_to_database_role.py +14 -14
  72. pulumi_snowflake/grant_privileges_to_share.py +42 -42
  73. pulumi_snowflake/legacy_service_user.py +21 -21
  74. pulumi_snowflake/masking_policy.py +21 -21
  75. pulumi_snowflake/network_policy.py +23 -23
  76. pulumi_snowflake/oauth_integration_for_custom_clients.py +73 -46
  77. pulumi_snowflake/oauth_integration_for_partner_applications.py +57 -30
  78. pulumi_snowflake/outputs.py +10029 -4056
  79. pulumi_snowflake/password_policy.py +12 -2
  80. pulumi_snowflake/primary_connection.py +16 -16
  81. pulumi_snowflake/procedure_java.py +1273 -0
  82. pulumi_snowflake/procedure_javascript.py +895 -0
  83. pulumi_snowflake/procedure_python.py +1226 -0
  84. pulumi_snowflake/procedure_scala.py +1273 -0
  85. pulumi_snowflake/procedure_sql.py +895 -0
  86. pulumi_snowflake/provider.py +40 -527
  87. pulumi_snowflake/pulumi-plugin.json +1 -1
  88. pulumi_snowflake/resource_monitor.py +16 -20
  89. pulumi_snowflake/row_access_policy.py +21 -21
  90. pulumi_snowflake/saml2_integration.py +9 -9
  91. pulumi_snowflake/schema.py +14 -18
  92. pulumi_snowflake/scim_integration.py +16 -16
  93. pulumi_snowflake/secondary_connection.py +16 -16
  94. pulumi_snowflake/secondary_database.py +16 -16
  95. pulumi_snowflake/secret_with_authorization_code_grant.py +28 -28
  96. pulumi_snowflake/secret_with_basic_authentication.py +21 -21
  97. pulumi_snowflake/secret_with_client_credentials.py +28 -28
  98. pulumi_snowflake/secret_with_generic_string.py +21 -21
  99. pulumi_snowflake/service_user.py +21 -21
  100. pulumi_snowflake/shared_database.py +16 -16
  101. pulumi_snowflake/stream_on_directory_table.py +28 -41
  102. pulumi_snowflake/stream_on_external_table.py +28 -41
  103. pulumi_snowflake/stream_on_table.py +28 -41
  104. pulumi_snowflake/stream_on_view.py +28 -41
  105. pulumi_snowflake/streamlit.py +42 -46
  106. pulumi_snowflake/tag.py +28 -28
  107. pulumi_snowflake/tag_association.py +28 -86
  108. pulumi_snowflake/task.py +58 -62
  109. pulumi_snowflake/user.py +21 -21
  110. pulumi_snowflake/view.py +28 -41
  111. pulumi_snowflake/warehouse.py +16 -16
  112. {pulumi_snowflake-0.63.0a1734439451.dist-info → pulumi_snowflake-1.0.0.dist-info}/METADATA +1 -1
  113. pulumi_snowflake-1.0.0.dist-info/RECORD +148 -0
  114. pulumi_snowflake/database_old.py +0 -489
  115. pulumi_snowflake/function.py +0 -901
  116. pulumi_snowflake/get_role.py +0 -126
  117. pulumi_snowflake/get_roles.py +0 -133
  118. pulumi_snowflake/oauth_integration.py +0 -610
  119. pulumi_snowflake/procedure.py +0 -910
  120. pulumi_snowflake/role.py +0 -250
  121. pulumi_snowflake/saml_integration.py +0 -916
  122. pulumi_snowflake/session_parameter.py +0 -301
  123. pulumi_snowflake/stream.py +0 -643
  124. pulumi_snowflake/tag_masking_policy_association.py +0 -211
  125. pulumi_snowflake-0.63.0a1734439451.dist-info/RECORD +0 -148
  126. {pulumi_snowflake-0.63.0a1734439451.dist-info → pulumi_snowflake-1.0.0.dist-info}/WHEEL +0 -0
  127. {pulumi_snowflake-0.63.0a1734439451.dist-info → pulumi_snowflake-1.0.0.dist-info}/top_level.txt +0 -0
@@ -1,916 +0,0 @@
1
- # coding=utf-8
2
- # *** WARNING: this file was generated by the Pulumi Terraform Bridge (tfgen) Tool. ***
3
- # *** Do not edit by hand unless you're certain you know what you are doing! ***
4
-
5
- import copy
6
- import warnings
7
- import sys
8
- import pulumi
9
- import pulumi.runtime
10
- from typing import Any, Mapping, Optional, Sequence, Union, overload
11
- if sys.version_info >= (3, 11):
12
- from typing import NotRequired, TypedDict, TypeAlias
13
- else:
14
- from typing_extensions import NotRequired, TypedDict, TypeAlias
15
- from . import _utilities
16
-
17
- __all__ = ['SamlIntegrationArgs', 'SamlIntegration']
18
-
19
- @pulumi.input_type
20
- class SamlIntegrationArgs:
21
- def __init__(__self__, *,
22
- saml2_issuer: pulumi.Input[str],
23
- saml2_provider: pulumi.Input[str],
24
- saml2_sso_url: pulumi.Input[str],
25
- saml2_x509_cert: pulumi.Input[str],
26
- enabled: Optional[pulumi.Input[bool]] = None,
27
- name: Optional[pulumi.Input[str]] = None,
28
- saml2_enable_sp_initiated: Optional[pulumi.Input[bool]] = None,
29
- saml2_force_authn: Optional[pulumi.Input[bool]] = None,
30
- saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
31
- saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
32
- saml2_sign_request: Optional[pulumi.Input[bool]] = None,
33
- saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
34
- saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
35
- saml2_snowflake_x509_cert: Optional[pulumi.Input[str]] = None,
36
- saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None):
37
- """
38
- The set of arguments for constructing a SamlIntegration resource.
39
- :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
40
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. One of the following: OKTA, ADFS, Custom.
41
- :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
42
- :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
43
- :param pulumi.Input[bool] enabled: Specifies whether this security integration is enabled or disabled.
44
- :param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
45
- :param pulumi.Input[bool] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
46
- :param pulumi.Input[bool] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
47
- :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
48
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
49
- :param pulumi.Input[bool] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
50
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
51
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
52
- :param pulumi.Input[str] saml2_snowflake_x509_cert: The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
53
- :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page.
54
- """
55
- pulumi.set(__self__, "saml2_issuer", saml2_issuer)
56
- pulumi.set(__self__, "saml2_provider", saml2_provider)
57
- pulumi.set(__self__, "saml2_sso_url", saml2_sso_url)
58
- pulumi.set(__self__, "saml2_x509_cert", saml2_x509_cert)
59
- if enabled is not None:
60
- pulumi.set(__self__, "enabled", enabled)
61
- if name is not None:
62
- pulumi.set(__self__, "name", name)
63
- if saml2_enable_sp_initiated is not None:
64
- pulumi.set(__self__, "saml2_enable_sp_initiated", saml2_enable_sp_initiated)
65
- if saml2_force_authn is not None:
66
- pulumi.set(__self__, "saml2_force_authn", saml2_force_authn)
67
- if saml2_post_logout_redirect_url is not None:
68
- pulumi.set(__self__, "saml2_post_logout_redirect_url", saml2_post_logout_redirect_url)
69
- if saml2_requested_nameid_format is not None:
70
- pulumi.set(__self__, "saml2_requested_nameid_format", saml2_requested_nameid_format)
71
- if saml2_sign_request is not None:
72
- pulumi.set(__self__, "saml2_sign_request", saml2_sign_request)
73
- if saml2_snowflake_acs_url is not None:
74
- pulumi.set(__self__, "saml2_snowflake_acs_url", saml2_snowflake_acs_url)
75
- if saml2_snowflake_issuer_url is not None:
76
- pulumi.set(__self__, "saml2_snowflake_issuer_url", saml2_snowflake_issuer_url)
77
- if saml2_snowflake_x509_cert is not None:
78
- pulumi.set(__self__, "saml2_snowflake_x509_cert", saml2_snowflake_x509_cert)
79
- if saml2_sp_initiated_login_page_label is not None:
80
- pulumi.set(__self__, "saml2_sp_initiated_login_page_label", saml2_sp_initiated_login_page_label)
81
-
82
- @property
83
- @pulumi.getter(name="saml2Issuer")
84
- def saml2_issuer(self) -> pulumi.Input[str]:
85
- """
86
- The string containing the IdP EntityID / Issuer.
87
- """
88
- return pulumi.get(self, "saml2_issuer")
89
-
90
- @saml2_issuer.setter
91
- def saml2_issuer(self, value: pulumi.Input[str]):
92
- pulumi.set(self, "saml2_issuer", value)
93
-
94
- @property
95
- @pulumi.getter(name="saml2Provider")
96
- def saml2_provider(self) -> pulumi.Input[str]:
97
- """
98
- The string describing the IdP. One of the following: OKTA, ADFS, Custom.
99
- """
100
- return pulumi.get(self, "saml2_provider")
101
-
102
- @saml2_provider.setter
103
- def saml2_provider(self, value: pulumi.Input[str]):
104
- pulumi.set(self, "saml2_provider", value)
105
-
106
- @property
107
- @pulumi.getter(name="saml2SsoUrl")
108
- def saml2_sso_url(self) -> pulumi.Input[str]:
109
- """
110
- The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
111
- """
112
- return pulumi.get(self, "saml2_sso_url")
113
-
114
- @saml2_sso_url.setter
115
- def saml2_sso_url(self, value: pulumi.Input[str]):
116
- pulumi.set(self, "saml2_sso_url", value)
117
-
118
- @property
119
- @pulumi.getter(name="saml2X509Cert")
120
- def saml2_x509_cert(self) -> pulumi.Input[str]:
121
- """
122
- The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
123
- """
124
- return pulumi.get(self, "saml2_x509_cert")
125
-
126
- @saml2_x509_cert.setter
127
- def saml2_x509_cert(self, value: pulumi.Input[str]):
128
- pulumi.set(self, "saml2_x509_cert", value)
129
-
130
- @property
131
- @pulumi.getter
132
- def enabled(self) -> Optional[pulumi.Input[bool]]:
133
- """
134
- Specifies whether this security integration is enabled or disabled.
135
- """
136
- return pulumi.get(self, "enabled")
137
-
138
- @enabled.setter
139
- def enabled(self, value: Optional[pulumi.Input[bool]]):
140
- pulumi.set(self, "enabled", value)
141
-
142
- @property
143
- @pulumi.getter
144
- def name(self) -> Optional[pulumi.Input[str]]:
145
- """
146
- Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
147
- """
148
- return pulumi.get(self, "name")
149
-
150
- @name.setter
151
- def name(self, value: Optional[pulumi.Input[str]]):
152
- pulumi.set(self, "name", value)
153
-
154
- @property
155
- @pulumi.getter(name="saml2EnableSpInitiated")
156
- def saml2_enable_sp_initiated(self) -> Optional[pulumi.Input[bool]]:
157
- """
158
- The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
159
- """
160
- return pulumi.get(self, "saml2_enable_sp_initiated")
161
-
162
- @saml2_enable_sp_initiated.setter
163
- def saml2_enable_sp_initiated(self, value: Optional[pulumi.Input[bool]]):
164
- pulumi.set(self, "saml2_enable_sp_initiated", value)
165
-
166
- @property
167
- @pulumi.getter(name="saml2ForceAuthn")
168
- def saml2_force_authn(self) -> Optional[pulumi.Input[bool]]:
169
- """
170
- The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
171
- """
172
- return pulumi.get(self, "saml2_force_authn")
173
-
174
- @saml2_force_authn.setter
175
- def saml2_force_authn(self, value: Optional[pulumi.Input[bool]]):
176
- pulumi.set(self, "saml2_force_authn", value)
177
-
178
- @property
179
- @pulumi.getter(name="saml2PostLogoutRedirectUrl")
180
- def saml2_post_logout_redirect_url(self) -> Optional[pulumi.Input[str]]:
181
- """
182
- The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
183
- """
184
- return pulumi.get(self, "saml2_post_logout_redirect_url")
185
-
186
- @saml2_post_logout_redirect_url.setter
187
- def saml2_post_logout_redirect_url(self, value: Optional[pulumi.Input[str]]):
188
- pulumi.set(self, "saml2_post_logout_redirect_url", value)
189
-
190
- @property
191
- @pulumi.getter(name="saml2RequestedNameidFormat")
192
- def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[str]]:
193
- """
194
- The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
195
- """
196
- return pulumi.get(self, "saml2_requested_nameid_format")
197
-
198
- @saml2_requested_nameid_format.setter
199
- def saml2_requested_nameid_format(self, value: Optional[pulumi.Input[str]]):
200
- pulumi.set(self, "saml2_requested_nameid_format", value)
201
-
202
- @property
203
- @pulumi.getter(name="saml2SignRequest")
204
- def saml2_sign_request(self) -> Optional[pulumi.Input[bool]]:
205
- """
206
- The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
207
- """
208
- return pulumi.get(self, "saml2_sign_request")
209
-
210
- @saml2_sign_request.setter
211
- def saml2_sign_request(self, value: Optional[pulumi.Input[bool]]):
212
- pulumi.set(self, "saml2_sign_request", value)
213
-
214
- @property
215
- @pulumi.getter(name="saml2SnowflakeAcsUrl")
216
- def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[str]]:
217
- """
218
- The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
219
- """
220
- return pulumi.get(self, "saml2_snowflake_acs_url")
221
-
222
- @saml2_snowflake_acs_url.setter
223
- def saml2_snowflake_acs_url(self, value: Optional[pulumi.Input[str]]):
224
- pulumi.set(self, "saml2_snowflake_acs_url", value)
225
-
226
- @property
227
- @pulumi.getter(name="saml2SnowflakeIssuerUrl")
228
- def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[str]]:
229
- """
230
- The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
231
- """
232
- return pulumi.get(self, "saml2_snowflake_issuer_url")
233
-
234
- @saml2_snowflake_issuer_url.setter
235
- def saml2_snowflake_issuer_url(self, value: Optional[pulumi.Input[str]]):
236
- pulumi.set(self, "saml2_snowflake_issuer_url", value)
237
-
238
- @property
239
- @pulumi.getter(name="saml2SnowflakeX509Cert")
240
- def saml2_snowflake_x509_cert(self) -> Optional[pulumi.Input[str]]:
241
- """
242
- The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
243
- """
244
- return pulumi.get(self, "saml2_snowflake_x509_cert")
245
-
246
- @saml2_snowflake_x509_cert.setter
247
- def saml2_snowflake_x509_cert(self, value: Optional[pulumi.Input[str]]):
248
- pulumi.set(self, "saml2_snowflake_x509_cert", value)
249
-
250
- @property
251
- @pulumi.getter(name="saml2SpInitiatedLoginPageLabel")
252
- def saml2_sp_initiated_login_page_label(self) -> Optional[pulumi.Input[str]]:
253
- """
254
- The string containing the label to display after the Log In With button on the login page.
255
- """
256
- return pulumi.get(self, "saml2_sp_initiated_login_page_label")
257
-
258
- @saml2_sp_initiated_login_page_label.setter
259
- def saml2_sp_initiated_login_page_label(self, value: Optional[pulumi.Input[str]]):
260
- pulumi.set(self, "saml2_sp_initiated_login_page_label", value)
261
-
262
-
263
- @pulumi.input_type
264
- class _SamlIntegrationState:
265
- def __init__(__self__, *,
266
- created_on: Optional[pulumi.Input[str]] = None,
267
- enabled: Optional[pulumi.Input[bool]] = None,
268
- name: Optional[pulumi.Input[str]] = None,
269
- saml2_digest_methods_used: Optional[pulumi.Input[str]] = None,
270
- saml2_enable_sp_initiated: Optional[pulumi.Input[bool]] = None,
271
- saml2_force_authn: Optional[pulumi.Input[bool]] = None,
272
- saml2_issuer: Optional[pulumi.Input[str]] = None,
273
- saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
274
- saml2_provider: Optional[pulumi.Input[str]] = None,
275
- saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
276
- saml2_sign_request: Optional[pulumi.Input[bool]] = None,
277
- saml2_signature_methods_used: Optional[pulumi.Input[str]] = None,
278
- saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
279
- saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
280
- saml2_snowflake_metadata: Optional[pulumi.Input[str]] = None,
281
- saml2_snowflake_x509_cert: Optional[pulumi.Input[str]] = None,
282
- saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
283
- saml2_sso_url: Optional[pulumi.Input[str]] = None,
284
- saml2_x509_cert: Optional[pulumi.Input[str]] = None):
285
- """
286
- Input properties used for looking up and filtering SamlIntegration resources.
287
- :param pulumi.Input[str] created_on: Date and time when the SAML integration was created.
288
- :param pulumi.Input[bool] enabled: Specifies whether this security integration is enabled or disabled.
289
- :param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
290
- :param pulumi.Input[bool] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
291
- :param pulumi.Input[bool] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
292
- :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
293
- :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
294
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. One of the following: OKTA, ADFS, Custom.
295
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
296
- :param pulumi.Input[bool] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
297
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
298
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
299
- :param pulumi.Input[str] saml2_snowflake_metadata: Metadata created by Snowflake to provide to SAML2 provider.
300
- :param pulumi.Input[str] saml2_snowflake_x509_cert: The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
301
- :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page.
302
- :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
303
- :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
304
- """
305
- if created_on is not None:
306
- pulumi.set(__self__, "created_on", created_on)
307
- if enabled is not None:
308
- pulumi.set(__self__, "enabled", enabled)
309
- if name is not None:
310
- pulumi.set(__self__, "name", name)
311
- if saml2_digest_methods_used is not None:
312
- pulumi.set(__self__, "saml2_digest_methods_used", saml2_digest_methods_used)
313
- if saml2_enable_sp_initiated is not None:
314
- pulumi.set(__self__, "saml2_enable_sp_initiated", saml2_enable_sp_initiated)
315
- if saml2_force_authn is not None:
316
- pulumi.set(__self__, "saml2_force_authn", saml2_force_authn)
317
- if saml2_issuer is not None:
318
- pulumi.set(__self__, "saml2_issuer", saml2_issuer)
319
- if saml2_post_logout_redirect_url is not None:
320
- pulumi.set(__self__, "saml2_post_logout_redirect_url", saml2_post_logout_redirect_url)
321
- if saml2_provider is not None:
322
- pulumi.set(__self__, "saml2_provider", saml2_provider)
323
- if saml2_requested_nameid_format is not None:
324
- pulumi.set(__self__, "saml2_requested_nameid_format", saml2_requested_nameid_format)
325
- if saml2_sign_request is not None:
326
- pulumi.set(__self__, "saml2_sign_request", saml2_sign_request)
327
- if saml2_signature_methods_used is not None:
328
- pulumi.set(__self__, "saml2_signature_methods_used", saml2_signature_methods_used)
329
- if saml2_snowflake_acs_url is not None:
330
- pulumi.set(__self__, "saml2_snowflake_acs_url", saml2_snowflake_acs_url)
331
- if saml2_snowflake_issuer_url is not None:
332
- pulumi.set(__self__, "saml2_snowflake_issuer_url", saml2_snowflake_issuer_url)
333
- if saml2_snowflake_metadata is not None:
334
- pulumi.set(__self__, "saml2_snowflake_metadata", saml2_snowflake_metadata)
335
- if saml2_snowflake_x509_cert is not None:
336
- pulumi.set(__self__, "saml2_snowflake_x509_cert", saml2_snowflake_x509_cert)
337
- if saml2_sp_initiated_login_page_label is not None:
338
- pulumi.set(__self__, "saml2_sp_initiated_login_page_label", saml2_sp_initiated_login_page_label)
339
- if saml2_sso_url is not None:
340
- pulumi.set(__self__, "saml2_sso_url", saml2_sso_url)
341
- if saml2_x509_cert is not None:
342
- pulumi.set(__self__, "saml2_x509_cert", saml2_x509_cert)
343
-
344
- @property
345
- @pulumi.getter(name="createdOn")
346
- def created_on(self) -> Optional[pulumi.Input[str]]:
347
- """
348
- Date and time when the SAML integration was created.
349
- """
350
- return pulumi.get(self, "created_on")
351
-
352
- @created_on.setter
353
- def created_on(self, value: Optional[pulumi.Input[str]]):
354
- pulumi.set(self, "created_on", value)
355
-
356
- @property
357
- @pulumi.getter
358
- def enabled(self) -> Optional[pulumi.Input[bool]]:
359
- """
360
- Specifies whether this security integration is enabled or disabled.
361
- """
362
- return pulumi.get(self, "enabled")
363
-
364
- @enabled.setter
365
- def enabled(self, value: Optional[pulumi.Input[bool]]):
366
- pulumi.set(self, "enabled", value)
367
-
368
- @property
369
- @pulumi.getter
370
- def name(self) -> Optional[pulumi.Input[str]]:
371
- """
372
- Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
373
- """
374
- return pulumi.get(self, "name")
375
-
376
- @name.setter
377
- def name(self, value: Optional[pulumi.Input[str]]):
378
- pulumi.set(self, "name", value)
379
-
380
- @property
381
- @pulumi.getter(name="saml2DigestMethodsUsed")
382
- def saml2_digest_methods_used(self) -> Optional[pulumi.Input[str]]:
383
- return pulumi.get(self, "saml2_digest_methods_used")
384
-
385
- @saml2_digest_methods_used.setter
386
- def saml2_digest_methods_used(self, value: Optional[pulumi.Input[str]]):
387
- pulumi.set(self, "saml2_digest_methods_used", value)
388
-
389
- @property
390
- @pulumi.getter(name="saml2EnableSpInitiated")
391
- def saml2_enable_sp_initiated(self) -> Optional[pulumi.Input[bool]]:
392
- """
393
- The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
394
- """
395
- return pulumi.get(self, "saml2_enable_sp_initiated")
396
-
397
- @saml2_enable_sp_initiated.setter
398
- def saml2_enable_sp_initiated(self, value: Optional[pulumi.Input[bool]]):
399
- pulumi.set(self, "saml2_enable_sp_initiated", value)
400
-
401
- @property
402
- @pulumi.getter(name="saml2ForceAuthn")
403
- def saml2_force_authn(self) -> Optional[pulumi.Input[bool]]:
404
- """
405
- The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
406
- """
407
- return pulumi.get(self, "saml2_force_authn")
408
-
409
- @saml2_force_authn.setter
410
- def saml2_force_authn(self, value: Optional[pulumi.Input[bool]]):
411
- pulumi.set(self, "saml2_force_authn", value)
412
-
413
- @property
414
- @pulumi.getter(name="saml2Issuer")
415
- def saml2_issuer(self) -> Optional[pulumi.Input[str]]:
416
- """
417
- The string containing the IdP EntityID / Issuer.
418
- """
419
- return pulumi.get(self, "saml2_issuer")
420
-
421
- @saml2_issuer.setter
422
- def saml2_issuer(self, value: Optional[pulumi.Input[str]]):
423
- pulumi.set(self, "saml2_issuer", value)
424
-
425
- @property
426
- @pulumi.getter(name="saml2PostLogoutRedirectUrl")
427
- def saml2_post_logout_redirect_url(self) -> Optional[pulumi.Input[str]]:
428
- """
429
- The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
430
- """
431
- return pulumi.get(self, "saml2_post_logout_redirect_url")
432
-
433
- @saml2_post_logout_redirect_url.setter
434
- def saml2_post_logout_redirect_url(self, value: Optional[pulumi.Input[str]]):
435
- pulumi.set(self, "saml2_post_logout_redirect_url", value)
436
-
437
- @property
438
- @pulumi.getter(name="saml2Provider")
439
- def saml2_provider(self) -> Optional[pulumi.Input[str]]:
440
- """
441
- The string describing the IdP. One of the following: OKTA, ADFS, Custom.
442
- """
443
- return pulumi.get(self, "saml2_provider")
444
-
445
- @saml2_provider.setter
446
- def saml2_provider(self, value: Optional[pulumi.Input[str]]):
447
- pulumi.set(self, "saml2_provider", value)
448
-
449
- @property
450
- @pulumi.getter(name="saml2RequestedNameidFormat")
451
- def saml2_requested_nameid_format(self) -> Optional[pulumi.Input[str]]:
452
- """
453
- The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
454
- """
455
- return pulumi.get(self, "saml2_requested_nameid_format")
456
-
457
- @saml2_requested_nameid_format.setter
458
- def saml2_requested_nameid_format(self, value: Optional[pulumi.Input[str]]):
459
- pulumi.set(self, "saml2_requested_nameid_format", value)
460
-
461
- @property
462
- @pulumi.getter(name="saml2SignRequest")
463
- def saml2_sign_request(self) -> Optional[pulumi.Input[bool]]:
464
- """
465
- The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
466
- """
467
- return pulumi.get(self, "saml2_sign_request")
468
-
469
- @saml2_sign_request.setter
470
- def saml2_sign_request(self, value: Optional[pulumi.Input[bool]]):
471
- pulumi.set(self, "saml2_sign_request", value)
472
-
473
- @property
474
- @pulumi.getter(name="saml2SignatureMethodsUsed")
475
- def saml2_signature_methods_used(self) -> Optional[pulumi.Input[str]]:
476
- return pulumi.get(self, "saml2_signature_methods_used")
477
-
478
- @saml2_signature_methods_used.setter
479
- def saml2_signature_methods_used(self, value: Optional[pulumi.Input[str]]):
480
- pulumi.set(self, "saml2_signature_methods_used", value)
481
-
482
- @property
483
- @pulumi.getter(name="saml2SnowflakeAcsUrl")
484
- def saml2_snowflake_acs_url(self) -> Optional[pulumi.Input[str]]:
485
- """
486
- The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
487
- """
488
- return pulumi.get(self, "saml2_snowflake_acs_url")
489
-
490
- @saml2_snowflake_acs_url.setter
491
- def saml2_snowflake_acs_url(self, value: Optional[pulumi.Input[str]]):
492
- pulumi.set(self, "saml2_snowflake_acs_url", value)
493
-
494
- @property
495
- @pulumi.getter(name="saml2SnowflakeIssuerUrl")
496
- def saml2_snowflake_issuer_url(self) -> Optional[pulumi.Input[str]]:
497
- """
498
- The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
499
- """
500
- return pulumi.get(self, "saml2_snowflake_issuer_url")
501
-
502
- @saml2_snowflake_issuer_url.setter
503
- def saml2_snowflake_issuer_url(self, value: Optional[pulumi.Input[str]]):
504
- pulumi.set(self, "saml2_snowflake_issuer_url", value)
505
-
506
- @property
507
- @pulumi.getter(name="saml2SnowflakeMetadata")
508
- def saml2_snowflake_metadata(self) -> Optional[pulumi.Input[str]]:
509
- """
510
- Metadata created by Snowflake to provide to SAML2 provider.
511
- """
512
- return pulumi.get(self, "saml2_snowflake_metadata")
513
-
514
- @saml2_snowflake_metadata.setter
515
- def saml2_snowflake_metadata(self, value: Optional[pulumi.Input[str]]):
516
- pulumi.set(self, "saml2_snowflake_metadata", value)
517
-
518
- @property
519
- @pulumi.getter(name="saml2SnowflakeX509Cert")
520
- def saml2_snowflake_x509_cert(self) -> Optional[pulumi.Input[str]]:
521
- """
522
- The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
523
- """
524
- return pulumi.get(self, "saml2_snowflake_x509_cert")
525
-
526
- @saml2_snowflake_x509_cert.setter
527
- def saml2_snowflake_x509_cert(self, value: Optional[pulumi.Input[str]]):
528
- pulumi.set(self, "saml2_snowflake_x509_cert", value)
529
-
530
- @property
531
- @pulumi.getter(name="saml2SpInitiatedLoginPageLabel")
532
- def saml2_sp_initiated_login_page_label(self) -> Optional[pulumi.Input[str]]:
533
- """
534
- The string containing the label to display after the Log In With button on the login page.
535
- """
536
- return pulumi.get(self, "saml2_sp_initiated_login_page_label")
537
-
538
- @saml2_sp_initiated_login_page_label.setter
539
- def saml2_sp_initiated_login_page_label(self, value: Optional[pulumi.Input[str]]):
540
- pulumi.set(self, "saml2_sp_initiated_login_page_label", value)
541
-
542
- @property
543
- @pulumi.getter(name="saml2SsoUrl")
544
- def saml2_sso_url(self) -> Optional[pulumi.Input[str]]:
545
- """
546
- The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
547
- """
548
- return pulumi.get(self, "saml2_sso_url")
549
-
550
- @saml2_sso_url.setter
551
- def saml2_sso_url(self, value: Optional[pulumi.Input[str]]):
552
- pulumi.set(self, "saml2_sso_url", value)
553
-
554
- @property
555
- @pulumi.getter(name="saml2X509Cert")
556
- def saml2_x509_cert(self) -> Optional[pulumi.Input[str]]:
557
- """
558
- The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
559
- """
560
- return pulumi.get(self, "saml2_x509_cert")
561
-
562
- @saml2_x509_cert.setter
563
- def saml2_x509_cert(self, value: Optional[pulumi.Input[str]]):
564
- pulumi.set(self, "saml2_x509_cert", value)
565
-
566
-
567
- class SamlIntegration(pulumi.CustomResource):
568
- @overload
569
- def __init__(__self__,
570
- resource_name: str,
571
- opts: Optional[pulumi.ResourceOptions] = None,
572
- enabled: Optional[pulumi.Input[bool]] = None,
573
- name: Optional[pulumi.Input[str]] = None,
574
- saml2_enable_sp_initiated: Optional[pulumi.Input[bool]] = None,
575
- saml2_force_authn: Optional[pulumi.Input[bool]] = None,
576
- saml2_issuer: Optional[pulumi.Input[str]] = None,
577
- saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
578
- saml2_provider: Optional[pulumi.Input[str]] = None,
579
- saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
580
- saml2_sign_request: Optional[pulumi.Input[bool]] = None,
581
- saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
582
- saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
583
- saml2_snowflake_x509_cert: Optional[pulumi.Input[str]] = None,
584
- saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
585
- saml2_sso_url: Optional[pulumi.Input[str]] = None,
586
- saml2_x509_cert: Optional[pulumi.Input[str]] = None,
587
- __props__=None):
588
- """
589
- ## Import
590
-
591
- ```sh
592
- $ pulumi import snowflake:index/samlIntegration:SamlIntegration example name
593
- ```
594
-
595
- :param str resource_name: The name of the resource.
596
- :param pulumi.ResourceOptions opts: Options for the resource.
597
- :param pulumi.Input[bool] enabled: Specifies whether this security integration is enabled or disabled.
598
- :param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
599
- :param pulumi.Input[bool] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
600
- :param pulumi.Input[bool] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
601
- :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
602
- :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
603
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. One of the following: OKTA, ADFS, Custom.
604
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
605
- :param pulumi.Input[bool] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
606
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
607
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
608
- :param pulumi.Input[str] saml2_snowflake_x509_cert: The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
609
- :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page.
610
- :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
611
- :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
612
- """
613
- ...
614
- @overload
615
- def __init__(__self__,
616
- resource_name: str,
617
- args: SamlIntegrationArgs,
618
- opts: Optional[pulumi.ResourceOptions] = None):
619
- """
620
- ## Import
621
-
622
- ```sh
623
- $ pulumi import snowflake:index/samlIntegration:SamlIntegration example name
624
- ```
625
-
626
- :param str resource_name: The name of the resource.
627
- :param SamlIntegrationArgs args: The arguments to use to populate this resource's properties.
628
- :param pulumi.ResourceOptions opts: Options for the resource.
629
- """
630
- ...
631
- def __init__(__self__, resource_name: str, *args, **kwargs):
632
- resource_args, opts = _utilities.get_resource_args_opts(SamlIntegrationArgs, pulumi.ResourceOptions, *args, **kwargs)
633
- if resource_args is not None:
634
- __self__._internal_init(resource_name, opts, **resource_args.__dict__)
635
- else:
636
- __self__._internal_init(resource_name, *args, **kwargs)
637
-
638
- def _internal_init(__self__,
639
- resource_name: str,
640
- opts: Optional[pulumi.ResourceOptions] = None,
641
- enabled: Optional[pulumi.Input[bool]] = None,
642
- name: Optional[pulumi.Input[str]] = None,
643
- saml2_enable_sp_initiated: Optional[pulumi.Input[bool]] = None,
644
- saml2_force_authn: Optional[pulumi.Input[bool]] = None,
645
- saml2_issuer: Optional[pulumi.Input[str]] = None,
646
- saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
647
- saml2_provider: Optional[pulumi.Input[str]] = None,
648
- saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
649
- saml2_sign_request: Optional[pulumi.Input[bool]] = None,
650
- saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
651
- saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
652
- saml2_snowflake_x509_cert: Optional[pulumi.Input[str]] = None,
653
- saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
654
- saml2_sso_url: Optional[pulumi.Input[str]] = None,
655
- saml2_x509_cert: Optional[pulumi.Input[str]] = None,
656
- __props__=None):
657
- opts = pulumi.ResourceOptions.merge(_utilities.get_resource_opts_defaults(), opts)
658
- if not isinstance(opts, pulumi.ResourceOptions):
659
- raise TypeError('Expected resource options to be a ResourceOptions instance')
660
- if opts.id is None:
661
- if __props__ is not None:
662
- raise TypeError('__props__ is only valid when passed in combination with a valid opts.id to get an existing resource')
663
- __props__ = SamlIntegrationArgs.__new__(SamlIntegrationArgs)
664
-
665
- __props__.__dict__["enabled"] = enabled
666
- __props__.__dict__["name"] = name
667
- __props__.__dict__["saml2_enable_sp_initiated"] = saml2_enable_sp_initiated
668
- __props__.__dict__["saml2_force_authn"] = saml2_force_authn
669
- if saml2_issuer is None and not opts.urn:
670
- raise TypeError("Missing required property 'saml2_issuer'")
671
- __props__.__dict__["saml2_issuer"] = saml2_issuer
672
- __props__.__dict__["saml2_post_logout_redirect_url"] = saml2_post_logout_redirect_url
673
- if saml2_provider is None and not opts.urn:
674
- raise TypeError("Missing required property 'saml2_provider'")
675
- __props__.__dict__["saml2_provider"] = saml2_provider
676
- __props__.__dict__["saml2_requested_nameid_format"] = saml2_requested_nameid_format
677
- __props__.__dict__["saml2_sign_request"] = saml2_sign_request
678
- __props__.__dict__["saml2_snowflake_acs_url"] = saml2_snowflake_acs_url
679
- __props__.__dict__["saml2_snowflake_issuer_url"] = saml2_snowflake_issuer_url
680
- __props__.__dict__["saml2_snowflake_x509_cert"] = saml2_snowflake_x509_cert
681
- __props__.__dict__["saml2_sp_initiated_login_page_label"] = saml2_sp_initiated_login_page_label
682
- if saml2_sso_url is None and not opts.urn:
683
- raise TypeError("Missing required property 'saml2_sso_url'")
684
- __props__.__dict__["saml2_sso_url"] = saml2_sso_url
685
- if saml2_x509_cert is None and not opts.urn:
686
- raise TypeError("Missing required property 'saml2_x509_cert'")
687
- __props__.__dict__["saml2_x509_cert"] = saml2_x509_cert
688
- __props__.__dict__["created_on"] = None
689
- __props__.__dict__["saml2_digest_methods_used"] = None
690
- __props__.__dict__["saml2_signature_methods_used"] = None
691
- __props__.__dict__["saml2_snowflake_metadata"] = None
692
- super(SamlIntegration, __self__).__init__(
693
- 'snowflake:index/samlIntegration:SamlIntegration',
694
- resource_name,
695
- __props__,
696
- opts)
697
-
698
- @staticmethod
699
- def get(resource_name: str,
700
- id: pulumi.Input[str],
701
- opts: Optional[pulumi.ResourceOptions] = None,
702
- created_on: Optional[pulumi.Input[str]] = None,
703
- enabled: Optional[pulumi.Input[bool]] = None,
704
- name: Optional[pulumi.Input[str]] = None,
705
- saml2_digest_methods_used: Optional[pulumi.Input[str]] = None,
706
- saml2_enable_sp_initiated: Optional[pulumi.Input[bool]] = None,
707
- saml2_force_authn: Optional[pulumi.Input[bool]] = None,
708
- saml2_issuer: Optional[pulumi.Input[str]] = None,
709
- saml2_post_logout_redirect_url: Optional[pulumi.Input[str]] = None,
710
- saml2_provider: Optional[pulumi.Input[str]] = None,
711
- saml2_requested_nameid_format: Optional[pulumi.Input[str]] = None,
712
- saml2_sign_request: Optional[pulumi.Input[bool]] = None,
713
- saml2_signature_methods_used: Optional[pulumi.Input[str]] = None,
714
- saml2_snowflake_acs_url: Optional[pulumi.Input[str]] = None,
715
- saml2_snowflake_issuer_url: Optional[pulumi.Input[str]] = None,
716
- saml2_snowflake_metadata: Optional[pulumi.Input[str]] = None,
717
- saml2_snowflake_x509_cert: Optional[pulumi.Input[str]] = None,
718
- saml2_sp_initiated_login_page_label: Optional[pulumi.Input[str]] = None,
719
- saml2_sso_url: Optional[pulumi.Input[str]] = None,
720
- saml2_x509_cert: Optional[pulumi.Input[str]] = None) -> 'SamlIntegration':
721
- """
722
- Get an existing SamlIntegration resource's state with the given name, id, and optional extra
723
- properties used to qualify the lookup.
724
-
725
- :param str resource_name: The unique name of the resulting resource.
726
- :param pulumi.Input[str] id: The unique provider ID of the resource to lookup.
727
- :param pulumi.ResourceOptions opts: Options for the resource.
728
- :param pulumi.Input[str] created_on: Date and time when the SAML integration was created.
729
- :param pulumi.Input[bool] enabled: Specifies whether this security integration is enabled or disabled.
730
- :param pulumi.Input[str] name: Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
731
- :param pulumi.Input[bool] saml2_enable_sp_initiated: The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
732
- :param pulumi.Input[bool] saml2_force_authn: The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
733
- :param pulumi.Input[str] saml2_issuer: The string containing the IdP EntityID / Issuer.
734
- :param pulumi.Input[str] saml2_post_logout_redirect_url: The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
735
- :param pulumi.Input[str] saml2_provider: The string describing the IdP. One of the following: OKTA, ADFS, Custom.
736
- :param pulumi.Input[str] saml2_requested_nameid_format: The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
737
- :param pulumi.Input[bool] saml2_sign_request: The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
738
- :param pulumi.Input[str] saml2_snowflake_acs_url: The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
739
- :param pulumi.Input[str] saml2_snowflake_issuer_url: The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
740
- :param pulumi.Input[str] saml2_snowflake_metadata: Metadata created by Snowflake to provide to SAML2 provider.
741
- :param pulumi.Input[str] saml2_snowflake_x509_cert: The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
742
- :param pulumi.Input[str] saml2_sp_initiated_login_page_label: The string containing the label to display after the Log In With button on the login page.
743
- :param pulumi.Input[str] saml2_sso_url: The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
744
- :param pulumi.Input[str] saml2_x509_cert: The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
745
- """
746
- opts = pulumi.ResourceOptions.merge(opts, pulumi.ResourceOptions(id=id))
747
-
748
- __props__ = _SamlIntegrationState.__new__(_SamlIntegrationState)
749
-
750
- __props__.__dict__["created_on"] = created_on
751
- __props__.__dict__["enabled"] = enabled
752
- __props__.__dict__["name"] = name
753
- __props__.__dict__["saml2_digest_methods_used"] = saml2_digest_methods_used
754
- __props__.__dict__["saml2_enable_sp_initiated"] = saml2_enable_sp_initiated
755
- __props__.__dict__["saml2_force_authn"] = saml2_force_authn
756
- __props__.__dict__["saml2_issuer"] = saml2_issuer
757
- __props__.__dict__["saml2_post_logout_redirect_url"] = saml2_post_logout_redirect_url
758
- __props__.__dict__["saml2_provider"] = saml2_provider
759
- __props__.__dict__["saml2_requested_nameid_format"] = saml2_requested_nameid_format
760
- __props__.__dict__["saml2_sign_request"] = saml2_sign_request
761
- __props__.__dict__["saml2_signature_methods_used"] = saml2_signature_methods_used
762
- __props__.__dict__["saml2_snowflake_acs_url"] = saml2_snowflake_acs_url
763
- __props__.__dict__["saml2_snowflake_issuer_url"] = saml2_snowflake_issuer_url
764
- __props__.__dict__["saml2_snowflake_metadata"] = saml2_snowflake_metadata
765
- __props__.__dict__["saml2_snowflake_x509_cert"] = saml2_snowflake_x509_cert
766
- __props__.__dict__["saml2_sp_initiated_login_page_label"] = saml2_sp_initiated_login_page_label
767
- __props__.__dict__["saml2_sso_url"] = saml2_sso_url
768
- __props__.__dict__["saml2_x509_cert"] = saml2_x509_cert
769
- return SamlIntegration(resource_name, opts=opts, __props__=__props__)
770
-
771
- @property
772
- @pulumi.getter(name="createdOn")
773
- def created_on(self) -> pulumi.Output[str]:
774
- """
775
- Date and time when the SAML integration was created.
776
- """
777
- return pulumi.get(self, "created_on")
778
-
779
- @property
780
- @pulumi.getter
781
- def enabled(self) -> pulumi.Output[Optional[bool]]:
782
- """
783
- Specifies whether this security integration is enabled or disabled.
784
- """
785
- return pulumi.get(self, "enabled")
786
-
787
- @property
788
- @pulumi.getter
789
- def name(self) -> pulumi.Output[str]:
790
- """
791
- Specifies the name of the SAML2 integration. This name follows the rules for Object Identifiers. The name should be unique among security integrations in your account.
792
- """
793
- return pulumi.get(self, "name")
794
-
795
- @property
796
- @pulumi.getter(name="saml2DigestMethodsUsed")
797
- def saml2_digest_methods_used(self) -> pulumi.Output[str]:
798
- return pulumi.get(self, "saml2_digest_methods_used")
799
-
800
- @property
801
- @pulumi.getter(name="saml2EnableSpInitiated")
802
- def saml2_enable_sp_initiated(self) -> pulumi.Output[Optional[bool]]:
803
- """
804
- The Boolean indicating if the Log In With button will be shown on the login page. TRUE: displays the Log in WIth button on the login page. FALSE: does not display the Log in With button on the login page.
805
- """
806
- return pulumi.get(self, "saml2_enable_sp_initiated")
807
-
808
- @property
809
- @pulumi.getter(name="saml2ForceAuthn")
810
- def saml2_force_authn(self) -> pulumi.Output[Optional[bool]]:
811
- """
812
- The Boolean indicating whether users, during the initial authentication flow, are forced to authenticate again to access Snowflake. When set to TRUE, Snowflake sets the ForceAuthn SAML parameter to TRUE in the outgoing request from Snowflake to the identity provider. TRUE: forces users to authenticate again to access Snowflake, even if a valid session with the identity provider exists. FALSE: does not force users to authenticate again to access Snowflake.
813
- """
814
- return pulumi.get(self, "saml2_force_authn")
815
-
816
- @property
817
- @pulumi.getter(name="saml2Issuer")
818
- def saml2_issuer(self) -> pulumi.Output[str]:
819
- """
820
- The string containing the IdP EntityID / Issuer.
821
- """
822
- return pulumi.get(self, "saml2_issuer")
823
-
824
- @property
825
- @pulumi.getter(name="saml2PostLogoutRedirectUrl")
826
- def saml2_post_logout_redirect_url(self) -> pulumi.Output[Optional[str]]:
827
- """
828
- The endpoint to which Snowflake redirects users after clicking the Log Out button in the classic Snowflake web interface. Snowflake terminates the Snowflake session upon redirecting to the specified endpoint.
829
- """
830
- return pulumi.get(self, "saml2_post_logout_redirect_url")
831
-
832
- @property
833
- @pulumi.getter(name="saml2Provider")
834
- def saml2_provider(self) -> pulumi.Output[str]:
835
- """
836
- The string describing the IdP. One of the following: OKTA, ADFS, Custom.
837
- """
838
- return pulumi.get(self, "saml2_provider")
839
-
840
- @property
841
- @pulumi.getter(name="saml2RequestedNameidFormat")
842
- def saml2_requested_nameid_format(self) -> pulumi.Output[Optional[str]]:
843
- """
844
- The SAML NameID format allows Snowflake to set an expectation of the identifying attribute of the user (i.e. SAML Subject) in the SAML assertion from the IdP to ensure a valid authentication to Snowflake. If a value is not specified, Snowflake sends the urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress value in the authentication request to the IdP. NameID must be one of the following values: urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified, urn:oasis:names:tc:SAML:1.1:nameid-format:emailAddress, urn:oasis:names:tc:SAML:1.1:nameid-format:X509SubjectName, urn:oasis:names:tc:SAML:1.1:nameid-format:WindowsDomainQualifiedName, urn:oasis:names:tc:SAML:2.0:nameid-format:kerberos, urn:oasis:names:tc:SAML:2.0:nameid-format:persistent, urn:oasis:names:tc:SAML:2.0:nameid-format:transient .
845
- """
846
- return pulumi.get(self, "saml2_requested_nameid_format")
847
-
848
- @property
849
- @pulumi.getter(name="saml2SignRequest")
850
- def saml2_sign_request(self) -> pulumi.Output[Optional[bool]]:
851
- """
852
- The Boolean indicating whether SAML requests are signed. TRUE: allows SAML requests to be signed. FALSE: does not allow SAML requests to be signed.
853
- """
854
- return pulumi.get(self, "saml2_sign_request")
855
-
856
- @property
857
- @pulumi.getter(name="saml2SignatureMethodsUsed")
858
- def saml2_signature_methods_used(self) -> pulumi.Output[str]:
859
- return pulumi.get(self, "saml2_signature_methods_used")
860
-
861
- @property
862
- @pulumi.getter(name="saml2SnowflakeAcsUrl")
863
- def saml2_snowflake_acs_url(self) -> pulumi.Output[str]:
864
- """
865
- The string containing the Snowflake Assertion Consumer Service URL to which the IdP will send its SAML authentication response back to Snowflake. This property will be set in the SAML authentication request generated by Snowflake when initiating a SAML SSO operation with the IdP. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use. Default: https://\\n\\n.\\n\\n.snowflakecomputing.com/fed/login
866
- """
867
- return pulumi.get(self, "saml2_snowflake_acs_url")
868
-
869
- @property
870
- @pulumi.getter(name="saml2SnowflakeIssuerUrl")
871
- def saml2_snowflake_issuer_url(self) -> pulumi.Output[str]:
872
- """
873
- The string containing the EntityID / Issuer for the Snowflake service provider. If an incorrect value is specified, Snowflake returns an error message indicating the acceptable values to use.
874
- """
875
- return pulumi.get(self, "saml2_snowflake_issuer_url")
876
-
877
- @property
878
- @pulumi.getter(name="saml2SnowflakeMetadata")
879
- def saml2_snowflake_metadata(self) -> pulumi.Output[str]:
880
- """
881
- Metadata created by Snowflake to provide to SAML2 provider.
882
- """
883
- return pulumi.get(self, "saml2_snowflake_metadata")
884
-
885
- @property
886
- @pulumi.getter(name="saml2SnowflakeX509Cert")
887
- def saml2_snowflake_x509_cert(self) -> pulumi.Output[str]:
888
- """
889
- The Base64 encoded self-signed certificate generated by Snowflake for use with Encrypting SAML Assertions and Signed SAML Requests. You must have at least one of these features (encrypted SAML assertions or signed SAML responses) enabled in your Snowflake account to access the certificate value.
890
- """
891
- return pulumi.get(self, "saml2_snowflake_x509_cert")
892
-
893
- @property
894
- @pulumi.getter(name="saml2SpInitiatedLoginPageLabel")
895
- def saml2_sp_initiated_login_page_label(self) -> pulumi.Output[Optional[str]]:
896
- """
897
- The string containing the label to display after the Log In With button on the login page.
898
- """
899
- return pulumi.get(self, "saml2_sp_initiated_login_page_label")
900
-
901
- @property
902
- @pulumi.getter(name="saml2SsoUrl")
903
- def saml2_sso_url(self) -> pulumi.Output[str]:
904
- """
905
- The string containing the IdP SSO URL, where the user should be redirected by Snowflake (the Service Provider) with a SAML AuthnRequest message.
906
- """
907
- return pulumi.get(self, "saml2_sso_url")
908
-
909
- @property
910
- @pulumi.getter(name="saml2X509Cert")
911
- def saml2_x509_cert(self) -> pulumi.Output[str]:
912
- """
913
- The Base64 encoded IdP signing certificate on a single line without the leading -----BEGIN CERTIFICATE----- and ending -----END CERTIFICATE----- markers.
914
- """
915
- return pulumi.get(self, "saml2_x509_cert")
916
-